Wireshark-bugs: [Wireshark-bugs] [Bug 9362] New: Buildbot crash output: fuzz-2013-10-31-23023.pc
Date: Thu, 31 Oct 2013 20:00:06 +0000
Bug ID | 9362 |
---|---|
Summary | Buildbot crash output: fuzz-2013-10-31-23023.pcap |
Classification | Unclassified |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | http://www.wireshark.org/download/automated/captures/fuzz-2013-10-31-23023.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Problems have been found with the following capture file: http://www.wireshark.org/download/automated/captures/fuzz-2013-10-31-23023.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/03-13_los_altos.pcap Build host information: Linux wsbb04 3.2.0-49-generic #75-Ubuntu SMP Tue Jun 18 17:39:32 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 12.04.2 LTS Release: 12.04 Codename: precise Buildbot information: BUILDBOT_REPOSITORY=http://code.wireshark.org/git/wireshark BUILDBOT_BUILDNUMBER=2151 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang-Code-Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=de0fda9436b5ff1b45366e40d2047a3ec1096cc3 Return value: 0 Dissector bug: 0 Valgrind error count: 229 Git commit commit de0fda9436b5ff1b45366e40d2047a3ec1096cc3 Author: Jeff Morriss <[email protected]> Date: Tue Oct 29 21:18:22 2013 +0000 Revert r52905 and r52908: they're causing plenty of fuzz failures. https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9323 is tracking the fix. svn path=/trunk/; revision=52966 Command and args: ./tools/valgrind-wireshark.sh -T ==6339== Memcheck, a memory error detector ==6339== Copyright (C) 2002-2011, and GNU GPL'd, by Julian Seward et al. ==6339== Using Valgrind-3.7.0 and LibVEX; rerun with -h for copyright info ==6339== Command: /home/wireshark/builders/trunk-clang-ca/clangcodeanalysis/install/bin/tshark -Vx -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2013-10-31-23023.pcap ==6339== ==6339== Conditional jump or move depends on uninitialised value(s) ==6339== at 0x4C2BFB8: strlen (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x955B2D1: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64F6C47: string_fvalue_set (ftype-string.c:57) ==6339== by 0x64C0DA7: proto_tree_add_string (proto.c:2494) ==6339== by 0x64C0EA0: proto_tree_add_string_format (proto.c:2534) ==6339== by 0x67F2618: dissect_http_message (packet-http.c:2433) ==6339== by 0x67F36A8: dissect_http (packet-http.c:2704) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x6B3A9F7: decode_tcp_ports (packet-tcp.c:3853) ==6339== ==6339== Invalid read of size 1 ==6339== at 0x4C2BFB4: strlen (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x955B2D1: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64F6C47: string_fvalue_set (ftype-string.c:57) ==6339== by 0x64C0DA7: proto_tree_add_string (proto.c:2494) ==6339== by 0x64C0EA0: proto_tree_add_string_format (proto.c:2534) ==6339== by 0x67F2618: dissect_http_message (packet-http.c:2433) ==6339== by 0x67F36A8: dissect_http (packet-http.c:2704) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x6B3A9CC: decode_tcp_ports (packet-tcp.c:3867) ==6339== Address 0x1118398d is 0 bytes after a block of size 173 alloc'd ==6339== at 0x4C2B6CD: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x9546A78: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64CC709: fragment_add_work.isra.7 (reassemble.c:1064) ==6339== by 0x64CCB03: fragment_add_common (reassemble.c:1371) ==6339== by 0x64CD2E7: fragment_add (reassemble.c:1391) ==6339== by 0x6B3D1CE: dissect_tcp (packet-tcp.c:4686) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x684279F: dissect_ip (packet-ip.c:2394) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== ==6339== Invalid read of size 1 ==6339== at 0x4C2D1A0: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x955B2EE: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64F6C47: string_fvalue_set (ftype-string.c:57) ==6339== by 0x64C0DA7: proto_tree_add_string (proto.c:2494) ==6339== by 0x64C0EA0: proto_tree_add_string_format (proto.c:2534) ==6339== by 0x67F2618: dissect_http_message (packet-http.c:2433) ==6339== by 0x67F36A8: dissect_http (packet-http.c:2704) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x6B3A9CC: decode_tcp_ports (packet-tcp.c:3867) ==6339== Address 0x11183996 is 9 bytes after a block of size 173 alloc'd ==6339== at 0x4C2B6CD: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x9546A78: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64CC709: fragment_add_work.isra.7 (reassemble.c:1064) ==6339== by 0x64CCB03: fragment_add_common (reassemble.c:1371) ==6339== by 0x64CD2E7: fragment_add (reassemble.c:1391) ==6339== by 0x6B3D1CE: dissect_tcp (packet-tcp.c:4686) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x684279F: dissect_ip (packet-ip.c:2394) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== ==6339== Invalid read of size 1 ==6339== at 0x4C2D1AD: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x955B2EE: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64F6C47: string_fvalue_set (ftype-string.c:57) ==6339== by 0x64C0DA7: proto_tree_add_string (proto.c:2494) ==6339== by 0x64C0EA0: proto_tree_add_string_format (proto.c:2534) ==6339== by 0x67F2618: dissect_http_message (packet-http.c:2433) ==6339== by 0x67F36A8: dissect_http (packet-http.c:2704) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x6B3A9CC: decode_tcp_ports (packet-tcp.c:3867) ==6339== Address 0x11183994 is 7 bytes after a block of size 173 alloc'd ==6339== at 0x4C2B6CD: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x9546A78: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64CC709: fragment_add_work.isra.7 (reassemble.c:1064) ==6339== by 0x64CCB03: fragment_add_common (reassemble.c:1371) ==6339== by 0x64CD2E7: fragment_add (reassemble.c:1391) ==6339== by 0x6B3D1CE: dissect_tcp (packet-tcp.c:4686) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x684279F: dissect_ip (packet-ip.c:2394) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== ==6339== Invalid read of size 2 ==6339== at 0x4C2D160: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x955B2EE: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64F6C47: string_fvalue_set (ftype-string.c:57) ==6339== by 0x64C0DA7: proto_tree_add_string (proto.c:2494) ==6339== by 0x64C0EA0: proto_tree_add_string_format (proto.c:2534) ==6339== by 0x67F2618: dissect_http_message (packet-http.c:2433) ==6339== by 0x67F36A8: dissect_http (packet-http.c:2704) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x6B3A9CC: decode_tcp_ports (packet-tcp.c:3867) ==6339== Address 0x10411a9c is 172 bytes inside a block of size 173 alloc'd ==6339== at 0x4C2B6CD: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x9546A78: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64CC709: fragment_add_work.isra.7 (reassemble.c:1064) ==6339== by 0x64CCB03: fragment_add_common (reassemble.c:1371) ==6339== by 0x64CD2E7: fragment_add (reassemble.c:1391) ==6339== by 0x6B3D1CE: dissect_tcp (packet-tcp.c:4686) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x684279F: dissect_ip (packet-ip.c:2394) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== ==6339== Invalid read of size 1 ==6339== at 0x4C2D08F: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x955B2EE: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64F6C47: string_fvalue_set (ftype-string.c:57) ==6339== by 0x64C0DA7: proto_tree_add_string (proto.c:2494) ==6339== by 0x64C0EA0: proto_tree_add_string_format (proto.c:2534) ==6339== by 0x67F2618: dissect_http_message (packet-http.c:2433) ==6339== by 0x67F36A8: dissect_http (packet-http.c:2704) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x6B3A9F7: decode_tcp_ports (packet-tcp.c:3853) ==6339== Address 0xf9ba62d is 0 bytes after a block of size 173 alloc'd ==6339== at 0x4C2B6CD: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x9546A78: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64CC709: fragment_add_work.isra.7 (reassemble.c:1064) ==6339== by 0x64CCB03: fragment_add_common (reassemble.c:1371) ==6339== by 0x64CD2E7: fragment_add (reassemble.c:1391) ==6339== by 0x6B3D1CE: dissect_tcp (packet-tcp.c:4686) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x684279F: dissect_ip (packet-ip.c:2394) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== ==6339== Invalid read of size 1 ==6339== at 0x4C2D080: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x955B2EE: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64F6C47: string_fvalue_set (ftype-string.c:57) ==6339== by 0x64C0DA7: proto_tree_add_string (proto.c:2494) ==6339== by 0x64C0EA0: proto_tree_add_string_format (proto.c:2534) ==6339== by 0x67F2618: dissect_http_message (packet-http.c:2433) ==6339== by 0x67F36A8: dissect_http (packet-http.c:2704) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x6B3A9F7: decode_tcp_ports (packet-tcp.c:3853) ==6339== Address 0x127baef4 is 0 bytes after a block of size 660 alloc'd ==6339== at 0x4C2B6CD: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==6339== by 0x9546A78: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3) ==6339== by 0x64CC709: fragment_add_work.isra.7 (reassemble.c:1064) ==6339== by 0x64CCB03: fragment_add_common (reassemble.c:1371) ==6339== by 0x64CD2E7: fragment_add (reassemble.c:1391) ==6339== by 0x6B3B1E4: dissect_tcp_payload (packet-tcp.c:1713) ==6339== by 0x6B3C920: dissect_tcp (packet-tcp.c:4779) ==6339== by 0x64AE747: call_dissector_through_handle (packet.c:515) ==6339== by 0x64AF094: call_dissector_work (packet.c:609) ==6339== by 0x64AFA42: dissector_try_uint_new (packet.c:1040) ==6339== by 0x64AFA96: dissector_try_uint (packet.c:1066) ==6339== by 0x684279F: dissect_ip (packet-ip.c:2394) ==6339== ==6339== ==6339== HEAP SUMMARY: ==6339== in use at exit: 2,757,611 bytes in 49,890 blocks ==6339== total heap usage: 8,916,387 allocs, 8,866,497 frees, 829,973,845 bytes allocated ==6339== ==6339== LEAK SUMMARY: ==6339== definitely lost: 10,865 bytes in 1,338 blocks ==6339== indirectly lost: 29,000 bytes in 96 blocks ==6339== possibly lost: 0 bytes in 0 blocks ==6339== still reachable: 2,717,746 bytes in 48,456 blocks ==6339== suppressed: 0 bytes in 0 blocks ==6339== Rerun with --leak-check=full to see details of leaked memory ==6339== ==6339== For counts of detected and suppressed errors, rerun with: -v ==6339== Use --track-origins=yes to see where uninitialised values come from ==6339== ERROR SUMMARY: 229 errors from 7 contexts (suppressed: 7 from 5) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 9362] Buildbot crash output: fuzz-2013-10-31-23023.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 9362] Buildbot crash output: fuzz-2013-10-31-23023.pcap
- Prev by Date: [Wireshark-bugs] [Bug 9361] AllJoyn protocol dissector
- Next by Date: [Wireshark-bugs] [Bug 9362] Buildbot crash output: fuzz-2013-10-31-23023.pcap
- Previous by thread: [Wireshark-bugs] [Bug 9361] AllJoyn protocol dissector
- Next by thread: [Wireshark-bugs] [Bug 9362] Buildbot crash output: fuzz-2013-10-31-23023.pcap
- Index(es):