Wireshark-bugs: [Wireshark-bugs] [Bug 10581] New: Buildbot crash output: fuzz-2014-10-15-24388.p

Date: Fri, 17 Oct 2014 06:30:04 +0000
Bug ID 10581
Summary Buildbot crash output: fuzz-2014-10-15-24388.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2014-10-15-24388.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2014-10-15-24388.pcap

stderr:
Input file:
/home/wireshark/menagerie/menagerie/8969-smb3_encryption-ntlmssp-A1b2C3d4.pcap.gz

Build host information:
Linux wsbb04 3.13.0-37-generic #64-Ubuntu SMP Mon Sep 22 21:28:38 UTC 2014
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.1 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_BUILDNUMBER=3003
BUILDBOT_URL=http://buildbot.wireshark.org/trunk/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=2359e67f9c42cc285935c70fe8e9cc6b9f369797

Return value:  0

Dissector bug:  0

Valgrind error count:  32



Git commit
commit 2359e67f9c42cc285935c70fe8e9cc6b9f369797
Author: AndersBroman <[email protected]>
Date:   Tue Oct 14 15:56:49 2014 +0200

    GTPv2 Dissect more bits in IE Indication.

    Change-Id: I19d0b67e06ec22bfc5bafc58fdeb445e30e25f95
    Reviewed-on: https://code.wireshark.org/review/4682
    Reviewed-by: Anders Broman <[email protected]>


Command and args: ./tools/valgrind-wireshark.sh 

==7682== Memcheck, a memory error detector
==7682== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==7682== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info
==7682== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2014-10-15-24388.pcap
==7682== 
==7682== Use of uninitialised value of size 8
==7682==    at 0x4C30C09: __memcmp_sse4_1 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==7682==    by 0x6D41502: dissect_smb2 (packet-smb2.c:6719)
==7682==    by 0x6D41BC6: dissect_smb2_heur (packet-smb2.c:7223)
==7682==    by 0x668D499: dissector_try_heuristic (packet.c:2028)
==7682==    by 0x6B8C45D: dissect_netbios_payload (packet-netbios.c:1076)
==7682==    by 0x6B56AB7: dissect_nbss_packet (packet-nbns.c:1484)
==7682==    by 0x6B56C8D: dissect_nbss (packet-nbns.c:1804)
==7682==    by 0x668B68E: call_dissector_through_handle (packet.c:622)
==7682==    by 0x668BF74: call_dissector_work (packet.c:713)
==7682==    by 0x668C62B: dissector_try_uint_new (packet.c:1145)
==7682==    by 0x6D887AB: decode_tcp_ports (packet-tcp.c:4035)
==7682==    by 0x6D88B1E: process_tcp_payload (packet-tcp.c:4107)
==7682== 
==7682== Conditional jump or move depends on uninitialised value(s)
==7682==    at 0x4C30C11: __memcmp_sse4_1 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==7682==    by 0x6D41502: dissect_smb2 (packet-smb2.c:6719)
==7682==    by 0x6D41BC6: dissect_smb2_heur (packet-smb2.c:7223)
==7682==    by 0x668D499: dissector_try_heuristic (packet.c:2028)
==7682==    by 0x6B8C45D: dissect_netbios_payload (packet-netbios.c:1076)
==7682==    by 0x6B56AB7: dissect_nbss_packet (packet-nbns.c:1484)
==7682==    by 0x6B56C8D: dissect_nbss (packet-nbns.c:1804)
==7682==    by 0x668B68E: call_dissector_through_handle (packet.c:622)
==7682==    by 0x668BF74: call_dissector_work (packet.c:713)
==7682==    by 0x668C62B: dissector_try_uint_new (packet.c:1145)
==7682==    by 0x6D887AB: decode_tcp_ports (packet-tcp.c:4035)
==7682==    by 0x6D88B1E: process_tcp_payload (packet-tcp.c:4107)
==7682== 
==7682== Use of uninitialised value of size 8
==7682==    at 0x4C30C20: __memcmp_sse4_1 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==7682==    by 0x6D41502: dissect_smb2 (packet-smb2.c:6719)
==7682==    by 0x6D41BC6: dissect_smb2_heur (packet-smb2.c:7223)
==7682==    by 0x668D499: dissector_try_heuristic (packet.c:2028)
==7682==    by 0x6B8C45D: dissect_netbios_payload (packet-netbios.c:1076)
==7682==    by 0x6B56AB7: dissect_nbss_packet (packet-nbns.c:1484)
==7682==    by 0x6B56C8D: dissect_nbss (packet-nbns.c:1804)
==7682==    by 0x668B68E: call_dissector_through_handle (packet.c:622)
==7682==    by 0x668BF74: call_dissector_work (packet.c:713)
==7682==    by 0x668C62B: dissector_try_uint_new (packet.c:1145)
==7682==    by 0x6D887AB: decode_tcp_ports (packet-tcp.c:4035)
==7682==    by 0x6D88B1E: process_tcp_payload (packet-tcp.c:4107)
==7682== 
==7682== Conditional jump or move depends on uninitialised value(s)
==7682==    at 0x4C30C32: __memcmp_sse4_1 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==7682==    by 0x6D41502: dissect_smb2 (packet-smb2.c:6719)
==7682==    by 0x6D41BC6: dissect_smb2_heur (packet-smb2.c:7223)
==7682==    by 0x668D499: dissector_try_heuristic (packet.c:2028)
==7682==    by 0x6B8C45D: dissect_netbios_payload (packet-netbios.c:1076)
==7682==    by 0x6B56AB7: dissect_nbss_packet (packet-nbns.c:1484)
==7682==    by 0x6B56C8D: dissect_nbss (packet-nbns.c:1804)
==7682==    by 0x668B68E: call_dissector_through_handle (packet.c:622)
==7682==    by 0x668BF74: call_dissector_work (packet.c:713)
==7682==    by 0x668C62B: dissector_try_uint_new (packet.c:1145)
==7682==    by 0x6D887AB: decode_tcp_ports (packet-tcp.c:4035)
==7682==    by 0x6D88B1E: process_tcp_payload (packet-tcp.c:4107)
==7682== 
==7682== 
==7682== HEAP SUMMARY:
==7682==     in use at exit: 1,217,601 bytes in 29,628 blocks
==7682==   total heap usage: 226,568 allocs, 196,940 frees, 28,717,429 bytes
allocated
==7682== 
==7682== LEAK SUMMARY:
==7682==    definitely lost: 5,457 bytes in 165 blocks
==7682==    indirectly lost: 36,744 bytes in 51 blocks
==7682==      possibly lost: 0 bytes in 0 blocks
==7682==    still reachable: 1,175,400 bytes in 29,412 blocks
==7682==         suppressed: 0 bytes in 0 blocks
==7682== Rerun with --leak-check=full to see details of leaked memory
==7682== 
==7682== For counts of detected and suppressed errors, rerun with: -v
==7682== Use --track-origins=yes to see where uninitialised values come from
==7682== ERROR SUMMARY: 32 errors from 4 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.