Wireshark-bugs: [Wireshark-bugs] [Bug 10581] New: Buildbot crash output: fuzz-2014-10-15-24388.p
Date: Fri, 17 Oct 2014 06:30:04 +0000
Bug ID | 10581 |
---|---|
Summary | Buildbot crash output: fuzz-2014-10-15-24388.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2014-10-15-24388.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | bugzilla-admin@wireshark.org |
Reporter | buildbot-do-not-reply@wireshark.org |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2014-10-15-24388.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/8969-smb3_encryption-ntlmssp-A1b2C3d4.pcap.gz Build host information: Linux wsbb04 3.13.0-37-generic #64-Ubuntu SMP Mon Sep 22 21:28:38 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.1 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark BUILDBOT_BUILDNUMBER=3003 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=2359e67f9c42cc285935c70fe8e9cc6b9f369797 Return value: 0 Dissector bug: 0 Valgrind error count: 32 Git commit commit 2359e67f9c42cc285935c70fe8e9cc6b9f369797 Author: AndersBroman <anders.broman@ericsson.com> Date: Tue Oct 14 15:56:49 2014 +0200 GTPv2 Dissect more bits in IE Indication. Change-Id: I19d0b67e06ec22bfc5bafc58fdeb445e30e25f95 Reviewed-on: https://code.wireshark.org/review/4682 Reviewed-by: Anders Broman <a.broman58@gmail.com> Command and args: ./tools/valgrind-wireshark.sh ==7682== Memcheck, a memory error detector ==7682== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==7682== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==7682== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2014-10-15-24388.pcap ==7682== ==7682== Use of uninitialised value of size 8 ==7682== at 0x4C30C09: __memcmp_sse4_1 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==7682== by 0x6D41502: dissect_smb2 (packet-smb2.c:6719) ==7682== by 0x6D41BC6: dissect_smb2_heur (packet-smb2.c:7223) ==7682== by 0x668D499: dissector_try_heuristic (packet.c:2028) ==7682== by 0x6B8C45D: dissect_netbios_payload (packet-netbios.c:1076) ==7682== by 0x6B56AB7: dissect_nbss_packet (packet-nbns.c:1484) ==7682== by 0x6B56C8D: dissect_nbss (packet-nbns.c:1804) ==7682== by 0x668B68E: call_dissector_through_handle (packet.c:622) ==7682== by 0x668BF74: call_dissector_work (packet.c:713) ==7682== by 0x668C62B: dissector_try_uint_new (packet.c:1145) ==7682== by 0x6D887AB: decode_tcp_ports (packet-tcp.c:4035) ==7682== by 0x6D88B1E: process_tcp_payload (packet-tcp.c:4107) ==7682== ==7682== Conditional jump or move depends on uninitialised value(s) ==7682== at 0x4C30C11: __memcmp_sse4_1 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==7682== by 0x6D41502: dissect_smb2 (packet-smb2.c:6719) ==7682== by 0x6D41BC6: dissect_smb2_heur (packet-smb2.c:7223) ==7682== by 0x668D499: dissector_try_heuristic (packet.c:2028) ==7682== by 0x6B8C45D: dissect_netbios_payload (packet-netbios.c:1076) ==7682== by 0x6B56AB7: dissect_nbss_packet (packet-nbns.c:1484) ==7682== by 0x6B56C8D: dissect_nbss (packet-nbns.c:1804) ==7682== by 0x668B68E: call_dissector_through_handle (packet.c:622) ==7682== by 0x668BF74: call_dissector_work (packet.c:713) ==7682== by 0x668C62B: dissector_try_uint_new (packet.c:1145) ==7682== by 0x6D887AB: decode_tcp_ports (packet-tcp.c:4035) ==7682== by 0x6D88B1E: process_tcp_payload (packet-tcp.c:4107) ==7682== ==7682== Use of uninitialised value of size 8 ==7682== at 0x4C30C20: __memcmp_sse4_1 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==7682== by 0x6D41502: dissect_smb2 (packet-smb2.c:6719) ==7682== by 0x6D41BC6: dissect_smb2_heur (packet-smb2.c:7223) ==7682== by 0x668D499: dissector_try_heuristic (packet.c:2028) ==7682== by 0x6B8C45D: dissect_netbios_payload (packet-netbios.c:1076) ==7682== by 0x6B56AB7: dissect_nbss_packet (packet-nbns.c:1484) ==7682== by 0x6B56C8D: dissect_nbss (packet-nbns.c:1804) ==7682== by 0x668B68E: call_dissector_through_handle (packet.c:622) ==7682== by 0x668BF74: call_dissector_work (packet.c:713) ==7682== by 0x668C62B: dissector_try_uint_new (packet.c:1145) ==7682== by 0x6D887AB: decode_tcp_ports (packet-tcp.c:4035) ==7682== by 0x6D88B1E: process_tcp_payload (packet-tcp.c:4107) ==7682== ==7682== Conditional jump or move depends on uninitialised value(s) ==7682== at 0x4C30C32: __memcmp_sse4_1 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==7682== by 0x6D41502: dissect_smb2 (packet-smb2.c:6719) ==7682== by 0x6D41BC6: dissect_smb2_heur (packet-smb2.c:7223) ==7682== by 0x668D499: dissector_try_heuristic (packet.c:2028) ==7682== by 0x6B8C45D: dissect_netbios_payload (packet-netbios.c:1076) ==7682== by 0x6B56AB7: dissect_nbss_packet (packet-nbns.c:1484) ==7682== by 0x6B56C8D: dissect_nbss (packet-nbns.c:1804) ==7682== by 0x668B68E: call_dissector_through_handle (packet.c:622) ==7682== by 0x668BF74: call_dissector_work (packet.c:713) ==7682== by 0x668C62B: dissector_try_uint_new (packet.c:1145) ==7682== by 0x6D887AB: decode_tcp_ports (packet-tcp.c:4035) ==7682== by 0x6D88B1E: process_tcp_payload (packet-tcp.c:4107) ==7682== ==7682== ==7682== HEAP SUMMARY: ==7682== in use at exit: 1,217,601 bytes in 29,628 blocks ==7682== total heap usage: 226,568 allocs, 196,940 frees, 28,717,429 bytes allocated ==7682== ==7682== LEAK SUMMARY: ==7682== definitely lost: 5,457 bytes in 165 blocks ==7682== indirectly lost: 36,744 bytes in 51 blocks ==7682== possibly lost: 0 bytes in 0 blocks ==7682== still reachable: 1,175,400 bytes in 29,412 blocks ==7682== suppressed: 0 bytes in 0 blocks ==7682== Rerun with --leak-check=full to see details of leaked memory ==7682== ==7682== For counts of detected and suppressed errors, rerun with: -v ==7682== Use --track-origins=yes to see where uninitialised values come from ==7682== ERROR SUMMARY: 32 errors from 4 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 10581] Buildbot crash output: fuzz-2014-10-15-24388.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10581] Buildbot crash output: fuzz-2014-10-15-24388.pcap
- Prev by Date: [Wireshark-bugs] [Bug 10580] New: Changing diplay filters on a 20MB file takes time to redisplay
- Next by Date: [Wireshark-bugs] [Bug 10466] CFM dissector should be updated to reflect the latest ITU spec
- Previous by thread: [Wireshark-bugs] [Bug 10580] Changing diplay filters on a 20MB file takes time to redisplay
- Next by thread: [Wireshark-bugs] [Bug 10581] Buildbot crash output: fuzz-2014-10-15-24388.pcap
- Index(es):