Wireshark-bugs: [Wireshark-bugs] [Bug 11726] New: Buildbot crash output: fuzz-2015-11-18-14495.p
Date: Thu, 19 Nov 2015 01:50:03 +0000
Bug ID 11726
Summary Buildbot crash output: fuzz-2015-11-18-14495.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2015-11-18-14495.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter buildbot-do-not-reply@wireshark.org

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2015-11-18-14495.pcap

stderr:
Input file:
/home/wireshark/menagerie/menagerie/13843-nwp_sample_neighbor_list.pcap

Build host information:
Linux wsbb04 3.13.0-66-generic #108-Ubuntu SMP Wed Oct 7 15:20:27 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.3 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark
BUILDBOT_BUILDNUMBER=3360
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=2773596970c362a6d81c7e44311781590074c43f

Return value:  0

Dissector bug:  0

Valgrind error count:  46



Git commit
commit 2773596970c362a6d81c7e44311781590074c43f
Author: Pascal Quantin <pascal.quantin@gmail.com>
Date:   Sun Nov 15 22:57:43 2015 +0100

    Qt: add a reference counter to sequence analysis info

    Increment the reference counter each time a flow sequence window is opened.
    Free seq_analysis_info_t structure once the last flow sequence / VoIP calls
/ SIP flow window is closed.

    Bug: 11712
    Change-Id: I20fcb922b0516417d4bd74cdf75475dcb31f8b90
    Reviewed-on: https://code.wireshark.org/review/11851
    Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
    Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
    Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
    Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>


Command and args: ./tools/valgrind-wireshark.sh 

==23264== Memcheck, a memory error detector
==23264== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==23264== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright
info
==23264== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-11-18-14495.pcap
==23264== 
==23264== Invalid read of size 1
==23264==    at 0x4C2E0E2: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==23264==    by 0x413FA8: print_packet (tshark.c:3940)
==23264==    by 0x413B31: process_packet (tshark.c:3742)
==23264==    by 0x411016: main (tshark.c:3484)
==23264==  Address 0x12cf7850 is 0 bytes inside a block of size 80 free'd
==23264==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==23264==    by 0x74162AE: wmem_simple_free_all (wmem_allocator_simple.c:107)
==23264==    by 0x7416EE7: wmem_leave_packet_scope (wmem_scopes.c:81)
==23264==    by 0x413AE4: process_packet (tshark.c:3728)
==23264==    by 0x411016: main (tshark.c:3484)
==23264== 
==23264== Invalid read of size 1
==23264==    at 0x4C2E0F4: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==23264==    by 0x413FA8: print_packet (tshark.c:3940)
==23264==    by 0x413B31: process_packet (tshark.c:3742)
==23264==    by 0x411016: main (tshark.c:3484)
==23264==  Address 0x12cf7851 is 1 bytes inside a block of size 80 free'd
==23264==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==23264==    by 0x74162AE: wmem_simple_free_all (wmem_allocator_simple.c:107)
==23264==    by 0x7416EE7: wmem_leave_packet_scope (wmem_scopes.c:81)
==23264==    by 0x413AE4: process_packet (tshark.c:3728)
==23264==    by 0x411016: main (tshark.c:3484)
==23264== 
==23264== Invalid read of size 2
==23264==    at 0x4C2F7E0: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==23264==    by 0x41401F: print_packet (tshark.c:3838)
==23264==    by 0x413B31: process_packet (tshark.c:3742)
==23264==    by 0x411016: main (tshark.c:3484)
==23264==  Address 0x12cf7850 is 0 bytes inside a block of size 80 free'd
==23264==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==23264==    by 0x74162AE: wmem_simple_free_all (wmem_allocator_simple.c:107)
==23264==    by 0x7416EE7: wmem_leave_packet_scope (wmem_scopes.c:81)
==23264==    by 0x413AE4: process_packet (tshark.c:3728)
==23264==    by 0x411016: main (tshark.c:3484)
==23264== 
==23264== Invalid read of size 2
==23264==    at 0x4C2F7EF: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==23264==    by 0x41401F: print_packet (tshark.c:3838)
==23264==    by 0x413B31: process_packet (tshark.c:3742)
==23264==    by 0x411016: main (tshark.c:3484)
==23264==  Address 0x12cf7854 is 4 bytes inside a block of size 80 free'd
==23264==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==23264==    by 0x74162AE: wmem_simple_free_all (wmem_allocator_simple.c:107)
==23264==    by 0x7416EE7: wmem_leave_packet_scope (wmem_scopes.c:81)
==23264==    by 0x413AE4: process_packet (tshark.c:3728)
==23264==    by 0x411016: main (tshark.c:3484)
==23264== 
==23264== 
==23264== HEAP SUMMARY:
==23264==     in use at exit: 1,038,623 bytes in 28,267 blocks
==23264==   total heap usage: 237,780 allocs, 209,513 frees, 31,440,358 bytes
allocated
==23264== 
==23264== LEAK SUMMARY:
==23264==    definitely lost: 2,908 bytes in 125 blocks
==23264==    indirectly lost: 36,448 bytes in 48 blocks
==23264==      possibly lost: 0 bytes in 0 blocks
==23264==    still reachable: 999,267 bytes in 28,094 blocks
==23264==         suppressed: 0 bytes in 0 blocks
==23264== Rerun with --leak-check=full to see details of leaked memory
==23264== 
==23264== For counts of detected and suppressed errors, rerun with: -v
==23264== ERROR SUMMARY: 46 errors from 4 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.