Wireshark-bugs: [Wireshark-bugs] [Bug 11554] New: Buildbot crash output: fuzz-2015-09-28-24093.p
Date: Mon, 28 Sep 2015 11:40:02 +0000
Bug ID | 11554 |
---|---|
Summary | Buildbot crash output: fuzz-2015-09-28-24093.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2015-09-28-24093.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | bugzilla-admin@wireshark.org |
Reporter | buildbot-do-not-reply@wireshark.org |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2015-09-28-24093.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/11262-challenge101-1.pcapng Build host information: Linux wsbb04 3.13.0-61-generic #100-Ubuntu SMP Wed Jul 29 11:21:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.3 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark BUILDBOT_BUILDNUMBER=3321 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=13d28691d6f1deae263a976d9defedd6f1ebb0d2 Return value: 0 Dissector bug: 0 Valgrind error count: 2 Git commit commit 13d28691d6f1deae263a976d9defedd6f1ebb0d2 Author: Stig Bjørlykke <stig@bjorlykke.org> Date: Tue Sep 15 08:46:43 2015 +0200 Qt: Use "" for empty QString const reference. Change-Id: I686eadc865ae38433c3795450aeca8582a74d2c8 Reviewed-on: https://code.wireshark.org/review/10535 Petri-Dish: Stig Bjørlykke <stig@bjorlykke.org> Petri-Dish: Michael Mann <mmann78@netscape.net> Reviewed-by: Michael Mann <mmann78@netscape.net> Command and args: ./tools/valgrind-wireshark.sh ==10889== Memcheck, a memory error detector ==10889== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==10889== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==10889== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-09-28-24093.pcap ==10889== ==10889== Invalid read of size 1 ==10889== at 0xB93CC6A: inflate (in /lib/x86_64-linux-gnu/libz.so.1.2.8) ==10889== by 0x682EE61: tvb_uncompress (tvbuff_zlib.c:111) ==10889== by 0x682F282: tvb_child_uncompress (tvbuff_zlib.c:335) ==10889== by 0x6B9C213: dissect_http_message (packet-http.c:1375) ==10889== by 0x6B9956B: dissect_http (packet-http.c:2950) ==10889== by 0x67FBB9F: call_dissector_work (packet.c:618) ==10889== by 0x67EBC2E: try_conversation_dissector (conversation.c:1312) ==10889== by 0x6F68656: decode_tcp_ports (packet-tcp.c:4103) ==10889== by 0x6F69789: process_tcp_payload (packet-tcp.c:4207) ==10889== by 0x6F68B75: dissect_tcp_payload (packet-tcp.c:2075) ==10889== by 0x6F6C979: dissect_tcp (packet-tcp.c:5115) ==10889== by 0x67FBBBD: call_dissector_work (packet.c:620) ==10889== Address 0x152fd7ca is 0 bytes after a block of size 10 alloc'd ==10889== at 0x4C2AB80: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==10889== by 0xA393610: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==10889== by 0x68301EE: tvb_memdup (tvbuff.c:829) ==10889== by 0x682ECD3: tvb_uncompress (tvbuff_zlib.c:70) ==10889== by 0x682F282: tvb_child_uncompress (tvbuff_zlib.c:335) ==10889== by 0x6B9C213: dissect_http_message (packet-http.c:1375) ==10889== by 0x6B9956B: dissect_http (packet-http.c:2950) ==10889== by 0x67FBB9F: call_dissector_work (packet.c:618) ==10889== by 0x67EBC2E: try_conversation_dissector (conversation.c:1312) ==10889== by 0x6F68656: decode_tcp_ports (packet-tcp.c:4103) ==10889== by 0x6F69789: process_tcp_payload (packet-tcp.c:4207) ==10889== by 0x6F68B75: dissect_tcp_payload (packet-tcp.c:2075) ==10889== ==10889== Invalid read of size 1 ==10889== at 0xB93CC94: inflate (in /lib/x86_64-linux-gnu/libz.so.1.2.8) ==10889== by 0x682EE61: tvb_uncompress (tvbuff_zlib.c:111) ==10889== by 0x682F282: tvb_child_uncompress (tvbuff_zlib.c:335) ==10889== by 0x6B9C213: dissect_http_message (packet-http.c:1375) ==10889== by 0x6B9956B: dissect_http (packet-http.c:2950) ==10889== by 0x67FBB9F: call_dissector_work (packet.c:618) ==10889== by 0x67EBC2E: try_conversation_dissector (conversation.c:1312) ==10889== by 0x6F68656: decode_tcp_ports (packet-tcp.c:4103) ==10889== by 0x6F69789: process_tcp_payload (packet-tcp.c:4207) ==10889== by 0x6F68B75: dissect_tcp_payload (packet-tcp.c:2075) ==10889== by 0x6F6C979: dissect_tcp (packet-tcp.c:5115) ==10889== by 0x67FBBBD: call_dissector_work (packet.c:620) ==10889== Address 0x152fd7cb is 1 bytes after a block of size 10 alloc'd ==10889== at 0x4C2AB80: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==10889== by 0xA393610: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==10889== by 0x68301EE: tvb_memdup (tvbuff.c:829) ==10889== by 0x682ECD3: tvb_uncompress (tvbuff_zlib.c:70) ==10889== by 0x682F282: tvb_child_uncompress (tvbuff_zlib.c:335) ==10889== by 0x6B9C213: dissect_http_message (packet-http.c:1375) ==10889== by 0x6B9956B: dissect_http (packet-http.c:2950) ==10889== by 0x67FBB9F: call_dissector_work (packet.c:618) ==10889== by 0x67EBC2E: try_conversation_dissector (conversation.c:1312) ==10889== by 0x6F68656: decode_tcp_ports (packet-tcp.c:4103) ==10889== by 0x6F69789: process_tcp_payload (packet-tcp.c:4207) ==10889== by 0x6F68B75: dissect_tcp_payload (packet-tcp.c:2075) ==10889== ==10889== ==10889== HEAP SUMMARY: ==10889== in use at exit: 1,037,102 bytes in 28,198 blocks ==10889== total heap usage: 624,853 allocs, 596,655 frees, 45,026,280 bytes allocated ==10889== ==10889== LEAK SUMMARY: ==10889== definitely lost: 2,964 bytes in 128 blocks ==10889== indirectly lost: 36,488 bytes in 51 blocks ==10889== possibly lost: 0 bytes in 0 blocks ==10889== still reachable: 997,650 bytes in 28,019 blocks ==10889== suppressed: 0 bytes in 0 blocks ==10889== Rerun with --leak-check=full to see details of leaked memory ==10889== ==10889== For counts of detected and suppressed errors, rerun with: -v ==10889== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Prev by Date: [Wireshark-bugs] [Bug 11553] New: Duplicated Interfaces instances while refreshing
- Next by Date: [Wireshark-bugs] [Bug 6685] Add support for VoIP Calls statistics in TShark
- Previous by thread: [Wireshark-bugs] [Bug 11553] New: Duplicated Interfaces instances while refreshing
- Next by thread: [Wireshark-bugs] [Bug 6685] Add support for VoIP Calls statistics in TShark
- Index(es):