Wireshark-bugs: [Wireshark-bugs] [Bug 11116] New: Buildbot crash output: fuzz-2015-04-10-23271.p
Date: Sun, 12 Apr 2015 11:30:05 +0000
Bug ID | 11116 |
---|---|
Summary | Buildbot crash output: fuzz-2015-04-10-23271.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2015-04-10-23271.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | bugzilla-admin@wireshark.org |
Reporter | buildbot-do-not-reply@wireshark.org |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2015-04-10-23271.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/trace2.TRC001-1 Build host information: Linux wsbb04 3.13.0-46-generic #79-Ubuntu SMP Tue Mar 10 20:06:50 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.2 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark BUILDBOT_BUILDNUMBER=3202 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=356e9c45647071ac9f9389256dea53bbbd9c7707 Return value: 0 Dissector bug: 0 Valgrind error count: 7 Git commit commit 356e9c45647071ac9f9389256dea53bbbd9c7707 Author: Roland Knall <rknall@gmail.com> Date: Wed Apr 8 12:44:50 2015 +0200 androiddump: Fix missing headers for Mac OSX Add sys/socket.h as well as arpa/inet.h and the definition of closesocket. Change-Id: I3986a1cd019c40e7c27cecb3752fd8b7374de6da Reviewed-on: https://code.wireshark.org/review/7980 Reviewed-by: Michal Labedzki <michal.labedzki@tieto.com> Tested-by: Michal Labedzki <michal.labedzki@tieto.com> Command and args: ./tools/valgrind-wireshark.sh ==15874== Memcheck, a memory error detector ==15874== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==15874== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==15874== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-04-10-23271.pcap ==15874== ==15874== Invalid read of size 1 ==15874== at 0xB4EAC6A: inflate (in /lib/x86_64-linux-gnu/libz.so.1.2.8) ==15874== by 0x6750811: tvb_uncompress (tvbuff_zlib.c:111) ==15874== by 0x6750C32: tvb_child_uncompress (tvbuff_zlib.c:335) ==15874== by 0x6AB0AB0: dissect_http_message (packet-http.c:1370) ==15874== by 0x6AADCA2: dissect_http (packet-http.c:2935) ==15874== by 0x672069F: call_dissector_work (packet.c:612) ==15874== by 0x672053E: dissector_try_uint_new (packet.c:1132) ==15874== by 0x6E69D6F: decode_tcp_ports (packet-tcp.c:4115) ==15874== by 0x6E6AE19: process_tcp_payload (packet-tcp.c:4187) ==15874== by 0x6E6A205: dissect_tcp_payload (packet-tcp.c:2061) ==15874== by 0x6E6DE70: dissect_tcp (packet-tcp.c:5075) ==15874== by 0x67206BD: call_dissector_work (packet.c:614) ==15874== Address 0x16cf9c8a is 0 bytes after a block of size 10 alloc'd ==15874== at 0x4C2AB80: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15874== by 0x9F42610: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==15874== by 0x6751B9E: tvb_memdup (tvbuff.c:829) ==15874== by 0x6750683: tvb_uncompress (tvbuff_zlib.c:70) ==15874== by 0x6750C32: tvb_child_uncompress (tvbuff_zlib.c:335) ==15874== by 0x6AB0AB0: dissect_http_message (packet-http.c:1370) ==15874== by 0x6AADCA2: dissect_http (packet-http.c:2935) ==15874== by 0x672069F: call_dissector_work (packet.c:612) ==15874== by 0x672053E: dissector_try_uint_new (packet.c:1132) ==15874== by 0x6E69D6F: decode_tcp_ports (packet-tcp.c:4115) ==15874== by 0x6E6AE19: process_tcp_payload (packet-tcp.c:4187) ==15874== by 0x6E6A205: dissect_tcp_payload (packet-tcp.c:2061) ==15874== ==15874== Invalid read of size 1 ==15874== at 0xB4EAC94: inflate (in /lib/x86_64-linux-gnu/libz.so.1.2.8) ==15874== by 0x6750811: tvb_uncompress (tvbuff_zlib.c:111) ==15874== by 0x6750C32: tvb_child_uncompress (tvbuff_zlib.c:335) ==15874== by 0x6AB0AB0: dissect_http_message (packet-http.c:1370) ==15874== by 0x6AADCA2: dissect_http (packet-http.c:2935) ==15874== by 0x672069F: call_dissector_work (packet.c:612) ==15874== by 0x672053E: dissector_try_uint_new (packet.c:1132) ==15874== by 0x6E69D6F: decode_tcp_ports (packet-tcp.c:4115) ==15874== by 0x6E6AE19: process_tcp_payload (packet-tcp.c:4187) ==15874== by 0x6E6A205: dissect_tcp_payload (packet-tcp.c:2061) ==15874== by 0x6E6DE70: dissect_tcp (packet-tcp.c:5075) ==15874== by 0x67206BD: call_dissector_work (packet.c:614) ==15874== Address 0x16cf9c8b is 1 bytes after a block of size 10 alloc'd ==15874== at 0x4C2AB80: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15874== by 0x9F42610: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==15874== by 0x6751B9E: tvb_memdup (tvbuff.c:829) ==15874== by 0x6750683: tvb_uncompress (tvbuff_zlib.c:70) ==15874== by 0x6750C32: tvb_child_uncompress (tvbuff_zlib.c:335) ==15874== by 0x6AB0AB0: dissect_http_message (packet-http.c:1370) ==15874== by 0x6AADCA2: dissect_http (packet-http.c:2935) ==15874== by 0x672069F: call_dissector_work (packet.c:612) ==15874== by 0x672053E: dissector_try_uint_new (packet.c:1132) ==15874== by 0x6E69D6F: decode_tcp_ports (packet-tcp.c:4115) ==15874== by 0x6E6AE19: process_tcp_payload (packet-tcp.c:4187) ==15874== by 0x6E6A205: dissect_tcp_payload (packet-tcp.c:2061) ==15874== ==15874== ==15874== HEAP SUMMARY: ==15874== in use at exit: 1,246,416 bytes in 30,460 blocks ==15874== total heap usage: 2,176,724 allocs, 2,146,264 frees, 126,146,337 bytes allocated ==15874== ==15874== LEAK SUMMARY: ==15874== definitely lost: 9,976 bytes in 558 blocks ==15874== indirectly lost: 40,056 bytes in 228 blocks ==15874== possibly lost: 0 bytes in 0 blocks ==15874== still reachable: 1,196,384 bytes in 29,674 blocks ==15874== suppressed: 0 bytes in 0 blocks ==15874== Rerun with --leak-check=full to see details of leaked memory ==15874== ==15874== For counts of detected and suppressed errors, rerun with: -v ==15874== ERROR SUMMARY: 7 errors from 2 contexts (suppressed: 1 from 1) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 11116] Buildbot crash output: fuzz-2015-04-10-23271.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 11116] Buildbot crash output: fuzz-2015-04-10-23271.pcap
- Prev by Date: [Wireshark-bugs] [Bug 11115] wireshark-qt Follow UDP Stream Segmentation Fault
- Next by Date: [Wireshark-bugs] [Bug 11115] wireshark-qt Follow UDP Stream Segmentation Fault
- Previous by thread: [Wireshark-bugs] [Bug 11115] wireshark-qt Follow UDP Stream Segmentation Fault
- Next by thread: [Wireshark-bugs] [Bug 11116] Buildbot crash output: fuzz-2015-04-10-23271.pcap
- Index(es):