Wireshark-bugs: [Wireshark-bugs] [Bug 11623] New: Buildbot crash output: fuzz-2015-10-21-29235.p
Date: Wed, 21 Oct 2015 14:30:02 +0000
Bug ID | 11623 |
---|---|
Summary | Buildbot crash output: fuzz-2015-10-21-29235.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2015-10-21-29235.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | bugzilla-admin@wireshark.org |
Reporter | buildbot-do-not-reply@wireshark.org |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2015-10-21-29235.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/13690-tdls_decrypt_wireshark.pcap Build host information: Linux wsbb04 3.13.0-65-generic #105-Ubuntu SMP Mon Sep 21 18:50:58 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.3 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark BUILDBOT_BUILDNUMBER=3340 BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=e8a37694cebe030252f028e926ee5d4fd966a812 Return value: 0 Dissector bug: 0 Valgrind error count: 19 Git commit commit e8a37694cebe030252f028e926ee5d4fd966a812 Author: Pascal Quantin <pascal.quantin@gmail.com> Date: Mon Oct 19 12:07:50 2015 +0200 X509AF: protect against a comparison with a NULL algorithm_id string Bug: 11611 Change-Id: Ide8a26f74c99405b53acf394041ddf4a599da90a Reviewed-on: https://code.wireshark.org/review/11143 Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> Command and args: ./tools/valgrind-wireshark.sh ==17009== Memcheck, a memory error detector ==17009== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==17009== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==17009== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-10-21-29235.pcap ==17009== ==17009== Conditional jump or move depends on uninitialised value(s) ==17009== at 0x684E092: AirPDcapDecryptWPABroadcastKey (airpdcap.c:409) ==17009== by 0x684D2C4: AirPDcapScanForKeys (airpdcap.c:1428) ==17009== by 0x6BDB19E: dissect_ieee80211_common (packet-ieee80211.c:17710) ==17009== by 0x6BD6B05: dissect_ieee80211 (packet-ieee80211.c:18317) ==17009== by 0x6802DEF: call_dissector_work (packet.c:618) ==17009== by 0x68023AC: call_dissector_with_data (packet.c:2549) ==17009== by 0x6802DEF: call_dissector_work (packet.c:618) ==17009== by 0x68023AC: call_dissector_with_data (packet.c:2549) ==17009== by 0x6BC5C9B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==17009== by 0x6802E0D: call_dissector_work (packet.c:620) ==17009== by 0x6802C8E: dissector_try_uint_new (packet.c:1163) ==17009== by 0x6AEFAAF: dissect_frame (packet-frame.c:499) ==17009== ==17009== Use of uninitialised value of size 8 ==17009== at 0x684E099: AirPDcapDecryptWPABroadcastKey (airpdcap.c:415) ==17009== by 0x684D2C4: AirPDcapScanForKeys (airpdcap.c:1428) ==17009== by 0x6BDB19E: dissect_ieee80211_common (packet-ieee80211.c:17710) ==17009== by 0x6BD6B05: dissect_ieee80211 (packet-ieee80211.c:18317) ==17009== by 0x6802DEF: call_dissector_work (packet.c:618) ==17009== by 0x68023AC: call_dissector_with_data (packet.c:2549) ==17009== by 0x6802DEF: call_dissector_work (packet.c:618) ==17009== by 0x68023AC: call_dissector_with_data (packet.c:2549) ==17009== by 0x6BC5C9B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==17009== by 0x6802E0D: call_dissector_work (packet.c:620) ==17009== by 0x6802C8E: dissector_try_uint_new (packet.c:1163) ==17009== by 0x6AEFAAF: dissect_frame (packet-frame.c:499) ==17009== ==17009== Conditional jump or move depends on uninitialised value(s) ==17009== at 0x684E0A5: AirPDcapDecryptWPABroadcastKey (airpdcap.c:415) ==17009== by 0x684D2C4: AirPDcapScanForKeys (airpdcap.c:1428) ==17009== by 0x6BDB19E: dissect_ieee80211_common (packet-ieee80211.c:17710) ==17009== by 0x6BD6B05: dissect_ieee80211 (packet-ieee80211.c:18317) ==17009== by 0x6802DEF: call_dissector_work (packet.c:618) ==17009== by 0x68023AC: call_dissector_with_data (packet.c:2549) ==17009== by 0x6802DEF: call_dissector_work (packet.c:618) ==17009== by 0x68023AC: call_dissector_with_data (packet.c:2549) ==17009== by 0x6BC5C9B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==17009== by 0x6802E0D: call_dissector_work (packet.c:620) ==17009== by 0x6802C8E: dissector_try_uint_new (packet.c:1163) ==17009== by 0x6AEFAAF: dissect_frame (packet-frame.c:499) ==17009== ==17009== Conditional jump or move depends on uninitialised value(s) ==17009== at 0x684E0AC: AirPDcapDecryptWPABroadcastKey (airpdcap.c:416) ==17009== by 0x684D2C4: AirPDcapScanForKeys (airpdcap.c:1428) ==17009== by 0x6BDB19E: dissect_ieee80211_common (packet-ieee80211.c:17710) ==17009== by 0x6BD6B05: dissect_ieee80211 (packet-ieee80211.c:18317) ==17009== by 0x6802DEF: call_dissector_work (packet.c:618) ==17009== by 0x68023AC: call_dissector_with_data (packet.c:2549) ==17009== by 0x6802DEF: call_dissector_work (packet.c:618) ==17009== by 0x68023AC: call_dissector_with_data (packet.c:2549) ==17009== by 0x6BC5C9B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==17009== by 0x6802E0D: call_dissector_work (packet.c:620) ==17009== by 0x6802C8E: dissector_try_uint_new (packet.c:1163) ==17009== by 0x6AEFAAF: dissect_frame (packet-frame.c:499) ==17009== ==17009== Use of uninitialised value of size 8 ==17009== at 0x684E07B: AirPDcapDecryptWPABroadcastKey (airpdcap.c:419) ==17009== by 0x684D2C4: AirPDcapScanForKeys (airpdcap.c:1428) ==17009== by 0x6BDB19E: dissect_ieee80211_common (packet-ieee80211.c:17710) ==17009== by 0x6BD6B05: dissect_ieee80211 (packet-ieee80211.c:18317) ==17009== by 0x6802DEF: call_dissector_work (packet.c:618) ==17009== by 0x68023AC: call_dissector_with_data (packet.c:2549) ==17009== by 0x6802DEF: call_dissector_work (packet.c:618) ==17009== by 0x68023AC: call_dissector_with_data (packet.c:2549) ==17009== by 0x6BC5C9B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==17009== by 0x6802E0D: call_dissector_work (packet.c:620) ==17009== by 0x6802C8E: dissector_try_uint_new (packet.c:1163) ==17009== by 0x6AEFAAF: dissect_frame (packet-frame.c:499) ==17009== ==17009== ==17009== HEAP SUMMARY: ==17009== in use at exit: 1,037,993 bytes in 28,228 blocks ==17009== total heap usage: 442,974 allocs, 414,746 frees, 37,692,045 bytes allocated ==17009== ==17009== LEAK SUMMARY: ==17009== definitely lost: 3,020 bytes in 127 blocks ==17009== indirectly lost: 36,448 bytes in 48 blocks ==17009== possibly lost: 0 bytes in 0 blocks ==17009== still reachable: 998,525 bytes in 28,053 blocks ==17009== suppressed: 0 bytes in 0 blocks ==17009== Rerun with --leak-check=full to see details of leaked memory ==17009== ==17009== For counts of detected and suppressed errors, rerun with: -v ==17009== Use --track-origins=yes to see where uninitialised values come from ==17009== ERROR SUMMARY: 19 errors from 5 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 11623] Buildbot crash output: fuzz-2015-10-21-29235.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 11623] Buildbot crash output: fuzz-2015-10-21-29235.pcap
- Prev by Date: [Wireshark-bugs] [Bug 11617] build error in extcap/androiddump.c.o
- Next by Date: [Wireshark-bugs] [Bug 11617] relocation R_X86_64_32 against `.rodata.str1.8' can not be used when making a shared object; recompile with -fPIC
- Previous by thread: [Wireshark-bugs] [Bug 11481] v1.12.x will not reassemble some tcp packets
- Next by thread: [Wireshark-bugs] [Bug 11623] Buildbot crash output: fuzz-2015-10-21-29235.pcap
- Index(es):