Wireshark-bugs: [Wireshark-bugs] [Bug 11669] New: Buildbot crash output: fuzz-2015-11-02-10327.p
Date: Mon, 02 Nov 2015 17:10:02 +0000
Bug ID | 11669 |
---|---|
Summary | Buildbot crash output: fuzz-2015-11-02-10327.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2015-11-02-10327.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | bugzilla-admin@wireshark.org |
Reporter | buildbot-do-not-reply@wireshark.org |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2015-11-02-10327.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/10685-wnm-sleepmode.pcap Build host information: Linux wsbb04 3.13.0-66-generic #108-Ubuntu SMP Wed Oct 7 15:20:27 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.3 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark BUILDBOT_BUILDNUMBER=3351 BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=9180c27c5e47ce4fc8f92113c9e51a5b7294da9b Return value: 0 Dissector bug: 0 Valgrind error count: 24 Git commit commit 9180c27c5e47ce4fc8f92113c9e51a5b7294da9b Author: Martin Kaiser <wireshark@kaiser.cx> Date: Fri Oct 30 19:53:21 2015 +0100 [ssh] don't THROW() an exception from a dissector Change-Id: Ibdbdcf59d7d7d28a812e31c7d7b2123b035f80fa Reviewed-on: https://code.wireshark.org/review/11461 Reviewed-by: Martin Kaiser <wireshark@kaiser.cx> Command and args: ./tools/valgrind-wireshark.sh ==9464== Memcheck, a memory error detector ==9464== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==9464== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==9464== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-11-02-10327.pcap ==9464== ==9464== Use of uninitialised value of size 8 ==9464== at 0x9B6352A: rijndael_decrypt (aes.c:1083) ==9464== by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79) ==9464== by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400) ==9464== by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428) ==9464== by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711) ==9464== by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==9464== by 0x681053D: call_dissector_work (packet.c:620) ==9464== ==9464== Use of uninitialised value of size 8 ==9464== at 0x9B63538: rijndael_decrypt (aes.c:1083) ==9464== by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79) ==9464== by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400) ==9464== by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428) ==9464== by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711) ==9464== by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==9464== by 0x681053D: call_dissector_work (packet.c:620) ==9464== ==9464== Use of uninitialised value of size 8 ==9464== at 0x9B6354D: rijndael_decrypt (aes.c:1080) ==9464== by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79) ==9464== by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400) ==9464== by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428) ==9464== by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711) ==9464== by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==9464== by 0x681053D: call_dissector_work (packet.c:620) ==9464== ==9464== Use of uninitialised value of size 8 ==9464== at 0x9B63583: rijndael_decrypt (aes.c:1080) ==9464== by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79) ==9464== by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400) ==9464== by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428) ==9464== by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711) ==9464== by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==9464== by 0x681053D: call_dissector_work (packet.c:620) ==9464== ==9464== Use of uninitialised value of size 8 ==9464== at 0x9B6358F: rijndael_decrypt (aes.c:1081) ==9464== by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79) ==9464== by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400) ==9464== by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428) ==9464== by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711) ==9464== by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==9464== by 0x681053D: call_dissector_work (packet.c:620) ==9464== ==9464== Use of uninitialised value of size 8 ==9464== at 0x9B635A8: rijndael_decrypt (aes.c:1081) ==9464== by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79) ==9464== by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400) ==9464== by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428) ==9464== by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711) ==9464== by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==9464== by 0x681053D: call_dissector_work (packet.c:620) ==9464== ==9464== Use of uninitialised value of size 8 ==9464== at 0x9B635BE: rijndael_decrypt (aes.c:1082) ==9464== by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79) ==9464== by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400) ==9464== by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428) ==9464== by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711) ==9464== by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==9464== by 0x681053D: call_dissector_work (packet.c:620) ==9464== ==9464== Use of uninitialised value of size 8 ==9464== at 0x9B635D3: rijndael_decrypt (aes.c:1082) ==9464== by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79) ==9464== by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400) ==9464== by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428) ==9464== by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711) ==9464== by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x681051F: call_dissector_work (packet.c:618) ==9464== by 0x680FADC: call_dissector_with_data (packet.c:2549) ==9464== by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801) ==9464== by 0x681053D: call_dissector_work (packet.c:620) ==9464== ==9464== ==9464== HEAP SUMMARY: ==9464== in use at exit: 1,037,706 bytes in 28,230 blocks ==9464== total heap usage: 236,942 allocs, 208,712 frees, 31,404,051 bytes allocated ==9464== ==9464== LEAK SUMMARY: ==9464== definitely lost: 2,908 bytes in 125 blocks ==9464== indirectly lost: 36,448 bytes in 48 blocks ==9464== possibly lost: 0 bytes in 0 blocks ==9464== still reachable: 998,350 bytes in 28,057 blocks ==9464== suppressed: 0 bytes in 0 blocks ==9464== Rerun with --leak-check=full to see details of leaked memory ==9464== ==9464== For counts of detected and suppressed errors, rerun with: -v ==9464== Use --track-origins=yes to see where uninitialised values come from ==9464== ERROR SUMMARY: 24 errors from 8 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Prev by Date: [Wireshark-bugs] [Bug 11666] extcap: configuration not saved between sessions
- Next by Date: [Wireshark-bugs] [Bug 11670] New: Protocol SSL isn't really SSL
- Previous by thread: [Wireshark-bugs] [Bug 11657] extcap: binary still running after capture has stopped
- Next by thread: [Wireshark-bugs] [Bug 11670] New: Protocol SSL isn't really SSL
- Index(es):