Wireshark-bugs: [Wireshark-bugs] [Bug 11623] New: Buildbot crash output: fuzz-2015-10-21-29235.p
Date: Wed, 21 Oct 2015 14:30:02 +0000
Bug ID 11623
Summary Buildbot crash output: fuzz-2015-10-21-29235.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2015-10-21-29235.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter buildbot-do-not-reply@wireshark.org

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2015-10-21-29235.pcap

stderr:
Input file:
/home/wireshark/menagerie/menagerie/13690-tdls_decrypt_wireshark.pcap

Build host information:
Linux wsbb04 3.13.0-65-generic #105-Ubuntu SMP Mon Sep 21 18:50:58 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.3 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark
BUILDBOT_BUILDNUMBER=3340
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=e8a37694cebe030252f028e926ee5d4fd966a812

Return value:  0

Dissector bug:  0

Valgrind error count:  19



Git commit
commit e8a37694cebe030252f028e926ee5d4fd966a812
Author: Pascal Quantin <pascal.quantin@gmail.com>
Date:   Mon Oct 19 12:07:50 2015 +0200

    X509AF: protect against a comparison with a NULL algorithm_id string

    Bug: 11611
    Change-Id: Ide8a26f74c99405b53acf394041ddf4a599da90a
    Reviewed-on: https://code.wireshark.org/review/11143
    Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com>
    Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
    Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>


Command and args: ./tools/valgrind-wireshark.sh 

==17009== Memcheck, a memory error detector
==17009== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==17009== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright
info
==17009== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-10-21-29235.pcap
==17009== 
==17009== Conditional jump or move depends on uninitialised value(s)
==17009==    at 0x684E092: AirPDcapDecryptWPABroadcastKey (airpdcap.c:409)
==17009==    by 0x684D2C4: AirPDcapScanForKeys (airpdcap.c:1428)
==17009==    by 0x6BDB19E: dissect_ieee80211_common (packet-ieee80211.c:17710)
==17009==    by 0x6BD6B05: dissect_ieee80211 (packet-ieee80211.c:18317)
==17009==    by 0x6802DEF: call_dissector_work (packet.c:618)
==17009==    by 0x68023AC: call_dissector_with_data (packet.c:2549)
==17009==    by 0x6802DEF: call_dissector_work (packet.c:618)
==17009==    by 0x68023AC: call_dissector_with_data (packet.c:2549)
==17009==    by 0x6BC5C9B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==17009==    by 0x6802E0D: call_dissector_work (packet.c:620)
==17009==    by 0x6802C8E: dissector_try_uint_new (packet.c:1163)
==17009==    by 0x6AEFAAF: dissect_frame (packet-frame.c:499)
==17009== 
==17009== Use of uninitialised value of size 8
==17009==    at 0x684E099: AirPDcapDecryptWPABroadcastKey (airpdcap.c:415)
==17009==    by 0x684D2C4: AirPDcapScanForKeys (airpdcap.c:1428)
==17009==    by 0x6BDB19E: dissect_ieee80211_common (packet-ieee80211.c:17710)
==17009==    by 0x6BD6B05: dissect_ieee80211 (packet-ieee80211.c:18317)
==17009==    by 0x6802DEF: call_dissector_work (packet.c:618)
==17009==    by 0x68023AC: call_dissector_with_data (packet.c:2549)
==17009==    by 0x6802DEF: call_dissector_work (packet.c:618)
==17009==    by 0x68023AC: call_dissector_with_data (packet.c:2549)
==17009==    by 0x6BC5C9B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==17009==    by 0x6802E0D: call_dissector_work (packet.c:620)
==17009==    by 0x6802C8E: dissector_try_uint_new (packet.c:1163)
==17009==    by 0x6AEFAAF: dissect_frame (packet-frame.c:499)
==17009== 
==17009== Conditional jump or move depends on uninitialised value(s)
==17009==    at 0x684E0A5: AirPDcapDecryptWPABroadcastKey (airpdcap.c:415)
==17009==    by 0x684D2C4: AirPDcapScanForKeys (airpdcap.c:1428)
==17009==    by 0x6BDB19E: dissect_ieee80211_common (packet-ieee80211.c:17710)
==17009==    by 0x6BD6B05: dissect_ieee80211 (packet-ieee80211.c:18317)
==17009==    by 0x6802DEF: call_dissector_work (packet.c:618)
==17009==    by 0x68023AC: call_dissector_with_data (packet.c:2549)
==17009==    by 0x6802DEF: call_dissector_work (packet.c:618)
==17009==    by 0x68023AC: call_dissector_with_data (packet.c:2549)
==17009==    by 0x6BC5C9B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==17009==    by 0x6802E0D: call_dissector_work (packet.c:620)
==17009==    by 0x6802C8E: dissector_try_uint_new (packet.c:1163)
==17009==    by 0x6AEFAAF: dissect_frame (packet-frame.c:499)
==17009== 
==17009== Conditional jump or move depends on uninitialised value(s)
==17009==    at 0x684E0AC: AirPDcapDecryptWPABroadcastKey (airpdcap.c:416)
==17009==    by 0x684D2C4: AirPDcapScanForKeys (airpdcap.c:1428)
==17009==    by 0x6BDB19E: dissect_ieee80211_common (packet-ieee80211.c:17710)
==17009==    by 0x6BD6B05: dissect_ieee80211 (packet-ieee80211.c:18317)
==17009==    by 0x6802DEF: call_dissector_work (packet.c:618)
==17009==    by 0x68023AC: call_dissector_with_data (packet.c:2549)
==17009==    by 0x6802DEF: call_dissector_work (packet.c:618)
==17009==    by 0x68023AC: call_dissector_with_data (packet.c:2549)
==17009==    by 0x6BC5C9B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==17009==    by 0x6802E0D: call_dissector_work (packet.c:620)
==17009==    by 0x6802C8E: dissector_try_uint_new (packet.c:1163)
==17009==    by 0x6AEFAAF: dissect_frame (packet-frame.c:499)
==17009== 
==17009== Use of uninitialised value of size 8
==17009==    at 0x684E07B: AirPDcapDecryptWPABroadcastKey (airpdcap.c:419)
==17009==    by 0x684D2C4: AirPDcapScanForKeys (airpdcap.c:1428)
==17009==    by 0x6BDB19E: dissect_ieee80211_common (packet-ieee80211.c:17710)
==17009==    by 0x6BD6B05: dissect_ieee80211 (packet-ieee80211.c:18317)
==17009==    by 0x6802DEF: call_dissector_work (packet.c:618)
==17009==    by 0x68023AC: call_dissector_with_data (packet.c:2549)
==17009==    by 0x6802DEF: call_dissector_work (packet.c:618)
==17009==    by 0x68023AC: call_dissector_with_data (packet.c:2549)
==17009==    by 0x6BC5C9B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==17009==    by 0x6802E0D: call_dissector_work (packet.c:620)
==17009==    by 0x6802C8E: dissector_try_uint_new (packet.c:1163)
==17009==    by 0x6AEFAAF: dissect_frame (packet-frame.c:499)
==17009== 
==17009== 
==17009== HEAP SUMMARY:
==17009==     in use at exit: 1,037,993 bytes in 28,228 blocks
==17009==   total heap usage: 442,974 allocs, 414,746 frees, 37,692,045 bytes
allocated
==17009== 
==17009== LEAK SUMMARY:
==17009==    definitely lost: 3,020 bytes in 127 blocks
==17009==    indirectly lost: 36,448 bytes in 48 blocks
==17009==      possibly lost: 0 bytes in 0 blocks
==17009==    still reachable: 998,525 bytes in 28,053 blocks
==17009==         suppressed: 0 bytes in 0 blocks
==17009== Rerun with --leak-check=full to see details of leaked memory
==17009== 
==17009== For counts of detected and suppressed errors, rerun with: -v
==17009== Use --track-origins=yes to see where uninitialised values come from
==17009== ERROR SUMMARY: 19 errors from 5 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.