Wireshark-bugs: [Wireshark-bugs] [Bug 12037] New: Buildbot crash output: fuzz-2016-01-19-24032.p
Date: Wed, 20 Jan 2016 16:40:02 +0000
Bug ID 12037
Summary Buildbot crash output: fuzz-2016-01-19-24032.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2016-01-19-24032.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee bugzilla-admin@wireshark.org
Reporter buildbot-do-not-reply@wireshark.org

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2016-01-19-24032.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/1487-SEND_client_boot.pcap

Build host information:
Linux wsbb04 3.13.0-74-generic #118-Ubuntu SMP Thu Dec 17 22:52:10 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.3 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark
BUILDBOT_BUILDNUMBER=3475
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=609ea4baa62a523434cdd8ff350d56d135d588ae

Return value:  0

Dissector bug:  0

Valgrind error count:  21



Git commit
commit 609ea4baa62a523434cdd8ff350d56d135d588ae
Author: Guy Harris <guy@alum.mit.edu>
Date:   Sun Jan 17 20:49:25 2016 -0800

    Directly call the FDDI and "raw IP" dissectors from the nettl dissector.

    Just get handles for the dissectors, don't go through the wtap_encap
    dissector table.

    Change-Id: I459249b98741cc069495c84ad4c47c0aa6768096
    Reviewed-on: https://code.wireshark.org/review/13383
    Reviewed-by: Guy Harris <guy@alum.mit.edu>


Command and args: ./tools/valgrind-wireshark.sh 

==32534== Memcheck, a memory error detector
==32534== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==32534== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
==32534== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-01-19-24032.pcap
==32534== 
==32534== Invalid read of size 1
==32534==    at 0x4C2F1B1: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==32534==    by 0x735AE0C: dissect_x509af_T_subjectPublicKey (x509af.cnf:98)
==32534==    by 0x698B01A: dissect_ber_sequence (packet-ber.c:2401)
==32534==    by 0x7359C2C: dissect_x509af_SubjectPublicKeyInfo (x509af.cnf:87)
==32534==    by 0x6C3E139: dissect_icmpv6_nd_opt (packet-icmpv6.c:1655)
==32534==    by 0x6C3C1ED: dissect_icmpv6 (packet-icmpv6.c:3745)
==32534==    by 0x687BEF4: call_dissector_through_handle (packet.c:619)
==32534==    by 0x687BEF4: call_dissector_work (packet.c:694)
==32534==    by 0x687BD9E: dissector_try_uint_new (packet.c:1153)
==32534==    by 0x6C86BBF: ip_try_dissect (packet-ip.c:1976)
==32534==    by 0x6CA7242: dissect_ipv6 (packet-ipv6.c:2429)
==32534==    by 0x687BEF4: call_dissector_through_handle (packet.c:619)
==32534==    by 0x687BEF4: call_dissector_work (packet.c:694)
==32534==    by 0x687BFB9: dissector_try_uint_new (packet.c:1153)
==32534==    by 0x687BFB9: dissector_try_uint (packet.c:1179)
==32534==  Address 0x12ffe640 is 0 bytes inside a block of size 79 free'd
==32534==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==32534==    by 0x7497B31: wmem_simple_free_all (wmem_allocator_simple.c:107)
==32534==    by 0x7498937: wmem_leave_packet_scope (wmem_scopes.c:81)
==32534==    by 0x414664: process_packet (tshark.c:3728)
==32534==    by 0x411C1D: load_cap_file (tshark.c:3484)
==32534==    by 0x411C1D: main (tshark.c:2197)
==32534== 
==32534== Invalid read of size 1
==32534==    at 0x4C2F1C8: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==32534==    by 0x735AE0C: dissect_x509af_T_subjectPublicKey (x509af.cnf:98)
==32534==    by 0x698B01A: dissect_ber_sequence (packet-ber.c:2401)
==32534==    by 0x7359C2C: dissect_x509af_SubjectPublicKeyInfo (x509af.cnf:87)
==32534==    by 0x6C3E139: dissect_icmpv6_nd_opt (packet-icmpv6.c:1655)
==32534==    by 0x6C3C1ED: dissect_icmpv6 (packet-icmpv6.c:3745)
==32534==    by 0x687BEF4: call_dissector_through_handle (packet.c:619)
==32534==    by 0x687BEF4: call_dissector_work (packet.c:694)
==32534==    by 0x687BD9E: dissector_try_uint_new (packet.c:1153)
==32534==    by 0x6C86BBF: ip_try_dissect (packet-ip.c:1976)
==32534==    by 0x6CA7242: dissect_ipv6 (packet-ipv6.c:2429)
==32534==    by 0x687BEF4: call_dissector_through_handle (packet.c:619)
==32534==    by 0x687BEF4: call_dissector_work (packet.c:694)
==32534==    by 0x687BFB9: dissector_try_uint_new (packet.c:1153)
==32534==    by 0x687BFB9: dissector_try_uint (packet.c:1179)
==32534==  Address 0x12ffe641 is 1 bytes inside a block of size 79 free'd
==32534==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==32534==    by 0x7497B31: wmem_simple_free_all (wmem_allocator_simple.c:107)
==32534==    by 0x7498937: wmem_leave_packet_scope (wmem_scopes.c:81)
==32534==    by 0x414664: process_packet (tshark.c:3728)
==32534==    by 0x411C1D: load_cap_file (tshark.c:3484)
==32534==    by 0x411C1D: main (tshark.c:2197)
==32534== 
==32534== 
==32534== HEAP SUMMARY:
==32534==     in use at exit: 1,098,772 bytes in 30,320 blocks
==32534==   total heap usage: 244,859 allocs, 214,539 frees, 32,995,905 bytes
allocated
==32534== 
==32534== LEAK SUMMARY:
==32534==    definitely lost: 3,068 bytes in 129 blocks
==32534==    indirectly lost: 43,472 bytes in 52 blocks
==32534==      possibly lost: 0 bytes in 0 blocks
==32534==    still reachable: 1,052,232 bytes in 30,139 blocks
==32534==         suppressed: 0 bytes in 0 blocks
==32534== Rerun with --leak-check=full to see details of leaked memory
==32534== 
==32534== For counts of detected and suppressed errors, rerun with: -v
==32534== ERROR SUMMARY: 21 errors from 2 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.