Wireshark-bugs: [Wireshark-bugs] [Bug 10340] New: Buildbot crash output: fuzz-2014-08-02-21443.p
Date: Sun, 03 Aug 2014 14:50:05 +0000
Bug ID | 10340 |
---|---|
Summary | Buildbot crash output: fuzz-2014-08-02-21443.pcap |
Classification | Unclassified |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | http://www.wireshark.org/download/automated/captures/fuzz-2014-08-02-21443.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Problems have been found with the following capture file: http://www.wireshark.org/download/automated/captures/fuzz-2014-08-02-21443.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/4979-failedTest.pcap Build host information: Linux wsbb04 3.13.0-32-generic #57-Ubuntu SMP Tue Jul 15 03:51:08 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.1 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark BUILDBOT_BUILDNUMBER=2895 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=a644744fb9502971fee751b8a1e390d255b82d78 Return value: 0 Dissector bug: 0 Valgrind error count: 1 Git commit commit a644744fb9502971fee751b8a1e390d255b82d78 Author: Evan Huus <[email protected]> Date: Thu Jul 31 13:18:21 2014 -0400 Use packet_scope instead of a stack local As clang pointed out we end up storing a reference to it in a global and (more relevantly) pushing that global to a tap which would run after the current frame has returned. Thanks to Alexis for bringing this to my attention. Change-Id: I3aac43a806d217b0dc8a973f6bb2fa48cdd041bb Reviewed-on: https://code.wireshark.org/review/3289 Reviewed-by: Alexis La Goutte <[email protected]> Petri-Dish: Alexis La Goutte <[email protected]> Reviewed-by: Anders Broman <[email protected]> Command and args: ./tools/valgrind-wireshark.sh ==20749== Memcheck, a memory error detector ==20749== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==20749== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==20749== Command: /home/wireshark/builders/trunk-clang-ca/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2014-08-02-21443.pcap ==20749== ==20749== Use of uninitialised value of size 8 ==20749== at 0x998E593: g_hash_table_lookup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4000.0) ==20749== by 0x6CEB95E: ssl_restore_master_key.part.19 (packet-ssl-utils.c:4348) ==20749== by 0x6CED7AB: ssl_finalize_decryption (packet-ssl-utils.c:4394) ==20749== by 0x6CF2B24: dissect_ssl3_record (packet-ssl.c:1564) ==20749== by 0x6CF38C4: dissect_ssl (packet-ssl.c:717) ==20749== by 0x66222DE: call_dissector_through_handle (packet.c:622) ==20749== by 0x6622BC4: call_dissector_work (packet.c:713) ==20749== by 0x662327B: dissector_try_uint_new (packet.c:1145) ==20749== by 0x6D0756B: decode_tcp_ports (packet-tcp.c:3973) ==20749== by 0x6D078DE: process_tcp_payload (packet-tcp.c:4045) ==20749== by 0x6D07EAF: dissect_tcp_payload (packet-tcp.c:1868) ==20749== by 0x6D09B4B: dissect_tcp (packet-tcp.c:4942) ==20749== ==20749== ==20749== HEAP SUMMARY: ==20749== in use at exit: 1,266,469 bytes in 29,876 blocks ==20749== total heap usage: 918,870 allocs, 888,994 frees, 61,235,373 bytes allocated ==20749== ==20749== LEAK SUMMARY: ==20749== definitely lost: 8,928 bytes in 382 blocks ==20749== indirectly lost: 48,927 bytes in 265 blocks ==20749== possibly lost: 0 bytes in 0 blocks ==20749== still reachable: 1,208,614 bytes in 29,229 blocks ==20749== suppressed: 0 bytes in 0 blocks ==20749== Rerun with --leak-check=full to see details of leaked memory ==20749== ==20749== For counts of detected and suppressed errors, rerun with: -v ==20749== Use --track-origins=yes to see where uninitialised values come from ==20749== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 10340] Buildbot crash output: fuzz-2014-08-02-21443.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10340] Buildbot crash output: fuzz-2014-08-02-21443.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10340] Buildbot crash output: fuzz-2014-08-02-21443.pcap
- Prev by Date: [Wireshark-bugs] [Bug 10338] MySQL: Request Unknown (133) (SSL: Handshake response packet)
- Next by Date: [Wireshark-bugs] [Bug 10336] Statistics ! Conversations ! TCP appears to be broken
- Previous by thread: [Wireshark-bugs] [Bug 10339] MySQL: decoding response fails
- Next by thread: [Wireshark-bugs] [Bug 10340] Buildbot crash output: fuzz-2014-08-02-21443.pcap
- Index(es):