Wireshark-bugs: [Wireshark-bugs] [Bug 12461] New: Buildbot crash output: fuzz-2016-05-19-21189.p
Date: Fri, 20 May 2016 04:20:03 +0000
Bug ID | 12461 |
---|---|
Summary | Buildbot crash output: fuzz-2016-05-19-21189.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2016-05-19-21189.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | bugzilla-admin@wireshark.org |
Reporter | buildbot-do-not-reply@wireshark.org |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2016-05-19-21189.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/14548-asan_heap-oob_4557e4_1285_21aa34231f73e6640365f97a56edb8a3.cap Build host information: Linux wsbb04 3.13.0-85-generic #129-Ubuntu SMP Thu Mar 17 20:50:15 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.4 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark BUILDBOT_BUILDNUMBER=131 BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-2.0/ BUILDBOT_BUILDERNAME=Fuzz Test BUILDBOT_SLAVENAME=fuzz-test BUILDBOT_GOT_REVISION=25dfe95163301af07e6a3032e16fb03c406cef8c Return value: 0 Dissector bug: 0 Valgrind error count: 1 Git commit commit 25dfe95163301af07e6a3032e16fb03c406cef8c Author: Anthony Coddington <anthony.coddington@endace.com> Date: Mon Apr 18 13:44:35 2016 +1200 pcap-common: Account for padding in ENCAP_ERF len and caplen Set len and caplen in pcap_read_post_process to actual wlen/payload length like for native ERF. This fixes padding incorrectly showing as an Ethernet trailer or equivalent as well as packet length calculations being incorrect. Fix up rlen when writing ENCAP_ERF so it isn't longer than the actual record length. This differs from native ERF behaviour which pads the record instead but there is currently no non-hackish way to do this for pcap/pcap-ng. Note: This means records captured from a DAG card in Wireshark (or old PCAP(-NG) files opened) will have padding stripped when saved as PCAP(-NG) and thus cannot be transmitted when converted to native ERF without aligning first. However, if the file is saved as native ERF originally the padding will be preserved (and zeroed). Given that extension header write support was very broken and transmission of PCAP(-NG) is not supported without conversion this is not expected to have been common. Ping-Bug: 3606 Change-Id: I49dce03984d7f07431b6eb7e16a993aeb571f288 Reviewed-on: https://code.wireshark.org/review/15359 Petri-Dish: Michael Mann <mmann78@netscape.net> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Michael Mann <mmann78@netscape.net> (cherry picked from commit c38f4e1391cc914271e168606cc1e8adcc973bd8) Reviewed-on: https://code.wireshark.org/review/15428 Reviewed-by: Anders Broman <a.broman58@gmail.com> Command and args: ./tools/valgrind-wireshark.sh ==7650== Memcheck, a memory error detector ==7650== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==7650== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info ==7650== Command: /home/wireshark/builders/wireshark-2.0-fuzz/fuzztest/install/bin/tshark -nr /fuzz/buildbot/fuzztest/valgrind-fuzz-2.0/fuzz-2016-05-19-21189.pcap ==7650== ==7650== Conditional jump or move depends on uninitialised value(s) ==7650== at 0x6889E0C: AirPDcapDecryptWPABroadcastKey (airpdcap.c:318) ==7650== by 0x688A3D2: AirPDcapRsna4WHandshake (airpdcap.c:1405) ==7650== by 0x688AB72: AirPDcapScanForKeys (airpdcap.c:564) ==7650== by 0x688AD9F: AirPDcapPacketProcess (airpdcap.c:696) ==7650== by 0x6C08212: dissect_ieee80211_common (packet-ieee80211.c:17815) ==7650== by 0x6C0A065: dissect_ieee80211 (packet-ieee80211.c:18423) ==7650== by 0x684688E: call_dissector_through_handle (packet.c:618) ==7650== by 0x6847224: call_dissector_work (packet.c:706) ==7650== by 0x6847A1B: dissector_try_uint_new (packet.c:1163) ==7650== by 0x6B1A645: dissect_frame (packet-frame.c:499) ==7650== by 0x684688E: call_dissector_through_handle (packet.c:618) ==7650== by 0x6847224: call_dissector_work (packet.c:706) ==7650== ==7650== ==7650== HEAP SUMMARY: ==7650== in use at exit: 1,039,567 bytes in 28,330 blocks ==7650== total heap usage: 239,420 allocs, 211,090 frees, 31,160,709 bytes allocated ==7650== ==7650== LEAK SUMMARY: ==7650== definitely lost: 2,908 bytes in 125 blocks ==7650== indirectly lost: 36,448 bytes in 48 blocks ==7650== possibly lost: 0 bytes in 0 blocks ==7650== still reachable: 1,000,211 bytes in 28,157 blocks ==7650== suppressed: 0 bytes in 0 blocks ==7650== Rerun with --leak-check=full to see details of leaked memory ==7650== ==7650== For counts of detected and suppressed errors, rerun with: -v ==7650== Use --track-origins=yes to see where uninitialised values come from ==7650== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 12461] Buildbot crash output: fuzz-2016-05-19-21189.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12461] Buildbot crash output: fuzz-2016-05-19-21189.pcap
- Prev by Date: [Wireshark-bugs] [Bug 12458] Analyze -> Conversation Filter does not work with Qt
- Next by Date: [Wireshark-bugs] [Bug 12460] GTK window hangs on dual-NIC burst of DNS req/resp pkts from another Wireshark resolving 1500 IPs
- Previous by thread: [Wireshark-bugs] [Bug 12460] GTK window hangs on dual-NIC burst of DNS req/resp pkts from another Wireshark resolving 1500 IPs
- Next by thread: [Wireshark-bugs] [Bug 12461] Buildbot crash output: fuzz-2016-05-19-21189.pcap
- Index(es):