Wireshark-bugs: [Wireshark-bugs] [Bug 11862] New: Buildbot crash output: fuzz-2015-12-07-21739.p
Date: Mon, 07 Dec 2015 18:20:02 +0000
Bug ID | 11862 |
---|---|
Summary | Buildbot crash output: fuzz-2015-12-07-21739.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2015-12-07-21739.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | bugzilla-admin@wireshark.org |
Reporter | buildbot-do-not-reply@wireshark.org |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2015-12-07-21739.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/10685-wnm-sleepmode.pcap Build host information: Linux wsbb04 3.13.0-71-generic #114-Ubuntu SMP Tue Dec 1 02:34:22 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.3 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark BUILDBOT_BUILDNUMBER=3427 BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=d382c7d321642dae8f25e4257da644d87b645c65 Return value: 0 Dissector bug: 0 Valgrind error count: 5 Git commit commit d382c7d321642dae8f25e4257da644d87b645c65 Author: Michael Tüxen <tuexen@wireshark.org> Date: Sat Dec 5 14:43:11 2015 +0100 SCTP: It is odd that the body of dissect_heartbeat_ack_chunk' function is fully equivalent to the body of 'dissect_heartbeat_chunk' function found by PVS Studio (V524) This is just a cosmetic change, which makes sense. No funtional change. Change-Id: Id24d162379093207863608e70f405e66f789276c Reviewed-on: https://code.wireshark.org/review/12440 Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com> Petri-Dish: Alexis La Goutte <alexis.lagoutte@gmail.com> Reviewed-by: Michael Tüxen Reviewed-by: Michael Tüxen <tuexen@wireshark.org> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Command and args: ./tools/valgrind-wireshark.sh ==15228== Memcheck, a memory error detector ==15228== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==15228== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info ==15228== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-12-07-21739.pcap ==15228== ==15228== Conditional jump or move depends on uninitialised value(s) ==15228== at 0x687A94E: AirPDcapDecryptWPABroadcastKey (airpdcap.c:421) ==15228== by 0x6879659: AirPDcapRsna4WHandshake (airpdcap.c:1405) ==15228== by 0x6879659: AirPDcapScanForKeys (airpdcap.c:563) ==15228== by 0x68790B2: AirPDcapPacketProcess (airpdcap.c:762) ==15228== by 0x6C0F743: dissect_ieee80211_common (packet-ieee80211.c:17767) ==15228== by 0x6C0C0E5: dissect_ieee80211 (packet-ieee80211.c:18375) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682E37C: call_dissector_only (packet.c:2662) ==15228== by 0x682E37C: call_dissector_with_data (packet.c:2675) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682E37C: call_dissector_only (packet.c:2662) ==15228== by 0x682E37C: call_dissector_with_data (packet.c:2675) ==15228== by 0x6BFB3A2: dissect_radiotap (packet-ieee80211-radiotap.c:1796) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682ECEE: dissector_try_uint_new (packet.c:1148) ==15228== ==15228== Conditional jump or move depends on uninitialised value(s) ==15228== at 0x687A96A: AirPDcapDecryptWPABroadcastKey (airpdcap.c:415) ==15228== by 0x6879659: AirPDcapRsna4WHandshake (airpdcap.c:1405) ==15228== by 0x6879659: AirPDcapScanForKeys (airpdcap.c:563) ==15228== by 0x68790B2: AirPDcapPacketProcess (airpdcap.c:762) ==15228== by 0x6C0F743: dissect_ieee80211_common (packet-ieee80211.c:17767) ==15228== by 0x6C0C0E5: dissect_ieee80211 (packet-ieee80211.c:18375) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682E37C: call_dissector_only (packet.c:2662) ==15228== by 0x682E37C: call_dissector_with_data (packet.c:2675) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682E37C: call_dissector_only (packet.c:2662) ==15228== by 0x682E37C: call_dissector_with_data (packet.c:2675) ==15228== by 0x6BFB3A2: dissect_radiotap (packet-ieee80211-radiotap.c:1796) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682ECEE: dissector_try_uint_new (packet.c:1148) ==15228== ==15228== Use of uninitialised value of size 8 ==15228== at 0x687A943: AirPDcapDecryptWPABroadcastKey (airpdcap.c:421) ==15228== by 0x6879659: AirPDcapRsna4WHandshake (airpdcap.c:1405) ==15228== by 0x6879659: AirPDcapScanForKeys (airpdcap.c:563) ==15228== by 0x68790B2: AirPDcapPacketProcess (airpdcap.c:762) ==15228== by 0x6C0F743: dissect_ieee80211_common (packet-ieee80211.c:17767) ==15228== by 0x6C0C0E5: dissect_ieee80211 (packet-ieee80211.c:18375) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682E37C: call_dissector_only (packet.c:2662) ==15228== by 0x682E37C: call_dissector_with_data (packet.c:2675) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682E37C: call_dissector_only (packet.c:2662) ==15228== by 0x682E37C: call_dissector_with_data (packet.c:2675) ==15228== by 0x6BFB3A2: dissect_radiotap (packet-ieee80211-radiotap.c:1796) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682ECEE: dissector_try_uint_new (packet.c:1148) ==15228== ==15228== Conditional jump or move depends on uninitialised value(s) ==15228== at 0x687A954: AirPDcapDecryptWPABroadcastKey (airpdcap.c:422) ==15228== by 0x6879659: AirPDcapRsna4WHandshake (airpdcap.c:1405) ==15228== by 0x6879659: AirPDcapScanForKeys (airpdcap.c:563) ==15228== by 0x68790B2: AirPDcapPacketProcess (airpdcap.c:762) ==15228== by 0x6C0F743: dissect_ieee80211_common (packet-ieee80211.c:17767) ==15228== by 0x6C0C0E5: dissect_ieee80211 (packet-ieee80211.c:18375) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682E37C: call_dissector_only (packet.c:2662) ==15228== by 0x682E37C: call_dissector_with_data (packet.c:2675) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682E37C: call_dissector_only (packet.c:2662) ==15228== by 0x682E37C: call_dissector_with_data (packet.c:2675) ==15228== by 0x6BFB3A2: dissect_radiotap (packet-ieee80211-radiotap.c:1796) ==15228== by 0x682EE44: call_dissector_through_handle (packet.c:616) ==15228== by 0x682EE44: call_dissector_work (packet.c:691) ==15228== by 0x682ECEE: dissector_try_uint_new (packet.c:1148) ==15228== ==15228== ==15228== HEAP SUMMARY: ==15228== in use at exit: 1,040,252 bytes in 28,310 blocks ==15228== total heap usage: 239,010 allocs, 210,700 frees, 31,472,201 bytes allocated ==15228== ==15228== LEAK SUMMARY: ==15228== definitely lost: 3,020 bytes in 127 blocks ==15228== indirectly lost: 36,448 bytes in 48 blocks ==15228== possibly lost: 0 bytes in 0 blocks ==15228== still reachable: 1,000,784 bytes in 28,135 blocks ==15228== suppressed: 0 bytes in 0 blocks ==15228== Rerun with --leak-check=full to see details of leaked memory ==15228== ==15228== For counts of detected and suppressed errors, rerun with: -v ==15228== Use --track-origins=yes to see where uninitialised values come from ==15228== ERROR SUMMARY: 5 errors from 4 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 11862] Buildbot crash output: fuzz-2015-12-07-21739.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 11862] Buildbot crash output: fuzz-2015-12-07-21739.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 11862] Buildbot crash output: fuzz-2015-12-07-21739.pcap
- Prev by Date: [Wireshark-bugs] [Bug 11860] Display filter operator != not working as exepected
- Next by Date: [Wireshark-bugs] [Bug 11861] DSCP field isn't discovered
- Previous by thread: [Wireshark-bugs] [Bug 11861] DSCP field isn't discovered
- Next by thread: [Wireshark-bugs] [Bug 11862] Buildbot crash output: fuzz-2015-12-07-21739.pcap
- Index(es):