Wireshark-bugs: [Wireshark-bugs] [Bug 12002] New: Buildbot crash output: fuzz-2016-01-12-29381.p
Date: Wed, 13 Jan 2016 06:40:03 +0000
Bug ID 12002
Summary Buildbot crash output: fuzz-2016-01-12-29381.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2016-01-12-29381.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter buildbot-do-not-reply@wireshark.org

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2016-01-12-29381.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/1487-SEND_client_boot.pcap

Build host information:
Linux wsbb04 3.13.0-74-generic #118-Ubuntu SMP Thu Dec 17 22:52:10 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.3 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark
BUILDBOT_BUILDNUMBER=3463
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=20f1100312ae7520ae7876c428d975e6acf81fd4

Return value:  0

Dissector bug:  0

Valgrind error count:  21



Git commit
commit 20f1100312ae7520ae7876c428d975e6acf81fd4
Author: Pascal Quantin <pascal.quantin@gmail.com>
Date:   Sun Jan 10 21:01:26 2016 +0100

    LPP: upgrade dissector to v13.0.0

    Change-Id: I0b01e48eae8be010175fb7f3aa1208957b871f06
    Reviewed-on: https://code.wireshark.org/review/13174
    Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
    Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
    Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>


Command and args: ./tools/valgrind-wireshark.sh 

==16730== Memcheck, a memory error detector
==16730== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==16730== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
==16730== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-01-12-29381.pcap
==16730== 
==16730== Invalid read of size 1
==16730==    at 0x4C2F1B1: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==16730==    by 0x7323BFC: dissect_x509af_T_subjectPublicKey (x509af.cnf:98)
==16730==    by 0x695CCEA: dissect_ber_sequence (packet-ber.c:2400)
==16730==    by 0x7322A1C: dissect_x509af_SubjectPublicKeyInfo (x509af.cnf:87)
==16730==    by 0x6C0FC69: dissect_icmpv6_nd_opt (packet-icmpv6.c:1655)
==16730==    by 0x6C0DD1D: dissect_icmpv6 (packet-icmpv6.c:3745)
==16730==    by 0x684E714: call_dissector_through_handle (packet.c:619)
==16730==    by 0x684E714: call_dissector_work (packet.c:694)
==16730==    by 0x684E5BE: dissector_try_uint_new (packet.c:1151)
==16730==    by 0x6C5883F: ip_try_dissect (packet-ip.c:1976)
==16730==    by 0x6C78E32: dissect_ipv6 (packet-ipv6.c:2429)
==16730==    by 0x684E714: call_dissector_through_handle (packet.c:619)
==16730==    by 0x684E714: call_dissector_work (packet.c:694)
==16730==    by 0x684E7D9: dissector_try_uint_new (packet.c:1151)
==16730==    by 0x684E7D9: dissector_try_uint (packet.c:1177)
==16730==  Address 0x12f7b500 is 0 bytes inside a block of size 79 free'd
==16730==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==16730==    by 0x7460791: wmem_simple_free_all (wmem_allocator_simple.c:107)
==16730==    by 0x7461597: wmem_leave_packet_scope (wmem_scopes.c:81)
==16730==    by 0x4145F4: process_packet (tshark.c:3728)
==16730==    by 0x411B18: load_cap_file (tshark.c:3484)
==16730==    by 0x411B18: main (tshark.c:2197)
==16730== 
==16730== Invalid read of size 1
==16730==    at 0x4C2F1C8: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==16730==    by 0x7323BFC: dissect_x509af_T_subjectPublicKey (x509af.cnf:98)
==16730==    by 0x695CCEA: dissect_ber_sequence (packet-ber.c:2400)
==16730==    by 0x7322A1C: dissect_x509af_SubjectPublicKeyInfo (x509af.cnf:87)
==16730==    by 0x6C0FC69: dissect_icmpv6_nd_opt (packet-icmpv6.c:1655)
==16730==    by 0x6C0DD1D: dissect_icmpv6 (packet-icmpv6.c:3745)
==16730==    by 0x684E714: call_dissector_through_handle (packet.c:619)
==16730==    by 0x684E714: call_dissector_work (packet.c:694)
==16730==    by 0x684E5BE: dissector_try_uint_new (packet.c:1151)
==16730==    by 0x6C5883F: ip_try_dissect (packet-ip.c:1976)
==16730==    by 0x6C78E32: dissect_ipv6 (packet-ipv6.c:2429)
==16730==    by 0x684E714: call_dissector_through_handle (packet.c:619)
==16730==    by 0x684E714: call_dissector_work (packet.c:694)
==16730==    by 0x684E7D9: dissector_try_uint_new (packet.c:1151)
==16730==    by 0x684E7D9: dissector_try_uint (packet.c:1177)
==16730==  Address 0x12f7b501 is 1 bytes inside a block of size 79 free'd
==16730==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==16730==    by 0x7460791: wmem_simple_free_all (wmem_allocator_simple.c:107)
==16730==    by 0x7461597: wmem_leave_packet_scope (wmem_scopes.c:81)
==16730==    by 0x4145F4: process_packet (tshark.c:3728)
==16730==    by 0x411B18: load_cap_file (tshark.c:3484)
==16730==    by 0x411B18: main (tshark.c:2197)
==16730== 
==16730== 
==16730== HEAP SUMMARY:
==16730==     in use at exit: 1,097,756 bytes in 30,292 blocks
==16730==   total heap usage: 244,751 allocs, 214,459 frees, 32,928,599 bytes
allocated
==16730== 
==16730== LEAK SUMMARY:
==16730==    definitely lost: 3,068 bytes in 129 blocks
==16730==    indirectly lost: 43,472 bytes in 52 blocks
==16730==      possibly lost: 0 bytes in 0 blocks
==16730==    still reachable: 1,051,216 bytes in 30,111 blocks
==16730==         suppressed: 0 bytes in 0 blocks
==16730== Rerun with --leak-check=full to see details of leaked memory
==16730== 
==16730== For counts of detected and suppressed errors, rerun with: -v
==16730== ERROR SUMMARY: 21 errors from 2 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.