Wireshark-bugs: [Wireshark-bugs] [Bug 10460] New: Buildbot crash output: fuzz-2014-09-09-9655.pc
Date: Wed, 10 Sep 2014 04:10:06 +0000
Bug ID | 10460 |
---|---|
Summary | Buildbot crash output: fuzz-2014-09-09-9655.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2014-09-09-9655.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2014-09-09-9655.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/5754-NokiaN900-NokiaBH-501.cap Build host information: Linux wsbb04 3.13.0-35-generic #62-Ubuntu SMP Fri Aug 15 01:58:42 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.1 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark BUILDBOT_BUILDNUMBER=2961 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=aebd9d3c7b236ec55a6ce1d055e204e7c2e3c112 Return value: 0 Dissector bug: 0 Valgrind error count: 45 Git commit commit aebd9d3c7b236ec55a6ce1d055e204e7c2e3c112 Author: Guy Harris <[email protected]> Date: Sun Sep 7 14:01:56 2014 -0700 Remove blank line, add newline at the end of the file. Change-Id: I26bed6f3493ee7bb52439af9d72790a0133485c9 Reviewed-on: https://code.wireshark.org/review/4028 Reviewed-by: Guy Harris <[email protected]> Command and args: ./tools/valgrind-wireshark.sh ==20263== Memcheck, a memory error detector ==20263== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==20263== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==20263== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2014-09-09-9655.pcap ==20263== ==20263== Conditional jump or move depends on uninitialised value(s) ==20263== at 0x67A8BD7: dissect_at_command (packet-bthfp.c:902) ==20263== by 0x67AA42D: dissect_bthfp (packet-bthfp.c:1508) ==20263== by 0x665DF5E: call_dissector_through_handle (packet.c:622) ==20263== by 0x665E844: call_dissector_work (packet.c:713) ==20263== by 0x665EEFB: dissector_try_uint_new (packet.c:1145) ==20263== by 0x67B94C7: dissect_btrfcomm (packet-btrfcomm.c:890) ==20263== by 0x665DF5E: call_dissector_through_handle (packet.c:622) ==20263== by 0x665E844: call_dissector_work (packet.c:713) ==20263== by 0x665EEFB: dissector_try_uint_new (packet.c:1145) ==20263== by 0x67B0495: dissect_b_frame.constprop.15 (packet-btl2cap.c:1503) ==20263== by 0x67B1AA9: dissect_btl2cap (packet-btl2cap.c:2138) ==20263== by 0x665DF5E: call_dissector_through_handle (packet.c:622) ==20263== ==20263== Conditional jump or move depends on uninitialised value(s) ==20263== at 0xA6D68F3: vfprintf (vfprintf.c:1661) ==20263== by 0xA794D74: __vsnprintf_chk (vsnprintf_chk.c:63) ==20263== by 0x664A3D4: col_do_append_fstr (column-utils.c:388) ==20263== by 0x664CD83: col_append_fstr (column-utils.c:404) ==20263== by 0x67A9022: dissect_at_command (packet-bthfp.c:915) ==20263== by 0x67AA42D: dissect_bthfp (packet-bthfp.c:1508) ==20263== by 0x665DF5E: call_dissector_through_handle (packet.c:622) ==20263== by 0x665E844: call_dissector_work (packet.c:713) ==20263== by 0x665EEFB: dissector_try_uint_new (packet.c:1145) ==20263== by 0x67B94C7: dissect_btrfcomm (packet-btrfcomm.c:890) ==20263== by 0x665DF5E: call_dissector_through_handle (packet.c:622) ==20263== by 0x665E844: call_dissector_work (packet.c:713) ==20263== ==20263== Conditional jump or move depends on uninitialised value(s) ==20263== at 0x9A6F807: g_strstr_len (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4000.0) ==20263== by 0x67A9044: dissect_at_command (packet-bthfp.c:922) ==20263== by 0x67AA42D: dissect_bthfp (packet-bthfp.c:1508) ==20263== by 0x665DF5E: call_dissector_through_handle (packet.c:622) ==20263== by 0x665E844: call_dissector_work (packet.c:713) ==20263== by 0x665EEFB: dissector_try_uint_new (packet.c:1145) ==20263== by 0x67B94C7: dissect_btrfcomm (packet-btrfcomm.c:890) ==20263== by 0x665DF5E: call_dissector_through_handle (packet.c:622) ==20263== by 0x665E844: call_dissector_work (packet.c:713) ==20263== by 0x665EEFB: dissector_try_uint_new (packet.c:1145) ==20263== by 0x67B0495: dissect_b_frame.constprop.15 (packet-btl2cap.c:1503) ==20263== by 0x67B1AA9: dissect_btl2cap (packet-btl2cap.c:2138) ==20263== ==20263== ==20263== HEAP SUMMARY: ==20263== in use at exit: 1,219,571 bytes in 29,837 blocks ==20263== total heap usage: 294,183 allocs, 264,346 frees, 32,012,121 bytes allocated ==20263== ==20263== LEAK SUMMARY: ==20263== definitely lost: 9,512 bytes in 423 blocks ==20263== indirectly lost: 36,648 bytes in 49 blocks ==20263== possibly lost: 0 bytes in 0 blocks ==20263== still reachable: 1,173,411 bytes in 29,365 blocks ==20263== suppressed: 0 bytes in 0 blocks ==20263== Rerun with --leak-check=full to see details of leaked memory ==20263== ==20263== For counts of detected and suppressed errors, rerun with: -v ==20263== Use --track-origins=yes to see where uninitialised values come from ==20263== ERROR SUMMARY: 45 errors from 3 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 10460] Buildbot crash output: fuzz-2014-09-09-9655.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10460] Buildbot crash output: fuzz-2014-09-09-9655.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10460] Buildbot crash output: fuzz-2014-09-09-9655.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10460] Buildbot crash output: fuzz-2014-09-09-9655.pcap
- Prev by Date: [Wireshark-bugs] [Bug 10456] ChmodBPF launch daemon not being run by the installer?
- Next by Date: [Wireshark-bugs] [Bug 10461] New: invalid memory accesses in the SnifferDecompress function
- Previous by thread: [Wireshark-bugs] [Bug 10459] BlockCount / LengthInWords in RTCP Packets is being misinterpreted
- Next by thread: [Wireshark-bugs] [Bug 10460] Buildbot crash output: fuzz-2014-09-09-9655.pcap
- Index(es):