Wireshark-bugs: [Wireshark-bugs] [Bug 10655] New: Buildbot crash output: fuzz-2014-10-31-21006.p

Date: Sun, 02 Nov 2014 08:40:03 +0000
Bug ID 10655
Summary Buildbot crash output: fuzz-2014-10-31-21006.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2014-10-31-21006.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2014-10-31-21006.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/cmp-trace.pcap.gz

Build host information:
Linux wsbb04 3.13.0-39-generic #66-Ubuntu SMP Tue Oct 28 13:30:27 UTC 2014
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.1 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_BUILDNUMBER=3038
BUILDBOT_URL=http://buildbot.wireshark.org/trunk/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=d93be95fc0e7011e8b4ade9171e7e66146063296

Return value:  0

Dissector bug:  0

Valgrind error count:  94



Git commit
commit d93be95fc0e7011e8b4ade9171e7e66146063296
Author: AndersBroman <[email protected]>
Date:   Fri Oct 31 15:13:36 2014 +0100

    Clean up handling of BDC coded numbers a bit.

    Change-Id: Ic3d523664e3c78b4ed289b7e5acf3f53614c6d54
    Reviewed-on: https://code.wireshark.org/review/5027
    Reviewed-by: Anders Broman <[email protected]>


Command and args: ./tools/valgrind-wireshark.sh 

==21480== Memcheck, a memory error detector
==21480== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==21480== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright
info
==21480== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2014-10-31-21006.pcap
==21480== 
==21480== Invalid read of size 1
==21480==    at 0x9AC4FE0: g_str_hash (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==21480==    by 0x9AC4568: g_hash_table_lookup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==21480==    by 0x6794850: call_ber_oid_callback (packet-ber.c:538)
==21480==    by 0x6FBD8AC: dissect_pkix1explicit_T_extnValue
(pkix1explicit.cnf:61)
==21480==    by 0x67954FC: dissect_ber_sequence (packet-ber.c:2403)
==21480==    by 0x6FBD6EF: dissect_pkix1explicit_Extension
(pkix1explicit.cnf:79)
==21480==    by 0x679713F: dissect_ber_sq_of (packet-ber.c:3486)
==21480==    by 0x679792D: dissect_ber_sequence_of (packet-ber.c:3517)
==21480==    by 0x6FBDEBF: dissect_pkix1explicit_Extensions
(pkix1explicit.cnf:92)
==21480==    by 0x67954FC: dissect_ber_sequence (packet-ber.c:2403)
==21480==    by 0x6EE983F: dissect_crmf_CertTemplate (packet-crmf-fn.c:43)
==21480==    by 0x67954FC: dissect_ber_sequence (packet-ber.c:2403)
==21480==  Address 0x1282af80 is 0 bytes inside a block of size 46 free'd
==21480==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==21480==    by 0x668C924: emem_free_all (emem.c:1187)
==21480==    by 0x668DA90: epan_dissect_run_with_taps (epan.c:350)
==21480==    by 0x4135C3: process_packet (tshark.c:3524)
==21480==    by 0x40C3E3: main (tshark.c:3312)
==21480== 
==21480== Invalid read of size 1
==21480==    at 0x9AC4FFD: g_str_hash (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==21480==    by 0x9AC4568: g_hash_table_lookup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==21480==    by 0x6794850: call_ber_oid_callback (packet-ber.c:538)
==21480==    by 0x6FBD8AC: dissect_pkix1explicit_T_extnValue
(pkix1explicit.cnf:61)
==21480==    by 0x67954FC: dissect_ber_sequence (packet-ber.c:2403)
==21480==    by 0x6FBD6EF: dissect_pkix1explicit_Extension
(pkix1explicit.cnf:79)
==21480==    by 0x679713F: dissect_ber_sq_of (packet-ber.c:3486)
==21480==    by 0x679792D: dissect_ber_sequence_of (packet-ber.c:3517)
==21480==    by 0x6FBDEBF: dissect_pkix1explicit_Extensions
(pkix1explicit.cnf:92)
==21480==    by 0x67954FC: dissect_ber_sequence (packet-ber.c:2403)
==21480==    by 0x6EE983F: dissect_crmf_CertTemplate (packet-crmf-fn.c:43)
==21480==    by 0x67954FC: dissect_ber_sequence (packet-ber.c:2403)
==21480==  Address 0x1282af81 is 1 bytes inside a block of size 46 free'd
==21480==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==21480==    by 0x668C924: emem_free_all (emem.c:1187)
==21480==    by 0x668DA90: epan_dissect_run_with_taps (epan.c:350)
==21480==    by 0x4135C3: process_packet (tshark.c:3524)
==21480==    by 0x40C3E3: main (tshark.c:3312)
==21480== 
==21480== Invalid read of size 1
==21480==    at 0x9AC4FE0: g_str_hash (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==21480==    by 0x9AC4568: g_hash_table_lookup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==21480==    by 0x6698DBF: dissector_try_string (packet.c:1397)
==21480==    by 0x67948B8: call_ber_oid_callback (packet-ber.c:1104)
==21480==    by 0x6FBD8AC: dissect_pkix1explicit_T_extnValue
(pkix1explicit.cnf:61)
==21480==    by 0x67954FC: dissect_ber_sequence (packet-ber.c:2403)
==21480==    by 0x6FBD6EF: dissect_pkix1explicit_Extension
(pkix1explicit.cnf:79)
==21480==    by 0x679713F: dissect_ber_sq_of (packet-ber.c:3486)
==21480==    by 0x679792D: dissect_ber_sequence_of (packet-ber.c:3517)
==21480==    by 0x6FBDEBF: dissect_pkix1explicit_Extensions
(pkix1explicit.cnf:92)
==21480==    by 0x67954FC: dissect_ber_sequence (packet-ber.c:2403)
==21480==    by 0x6EE983F: dissect_crmf_CertTemplate (packet-crmf-fn.c:43)
==21480==  Address 0x1282af80 is 0 bytes inside a block of size 46 free'd
==21480==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==21480==    by 0x668C924: emem_free_all (emem.c:1187)
==21480==    by 0x668DA90: epan_dissect_run_with_taps (epan.c:350)
==21480==    by 0x4135C3: process_packet (tshark.c:3524)
==21480==    by 0x40C3E3: main (tshark.c:3312)
==21480== 
==21480== Invalid read of size 1
==21480==    at 0x9AC4FFD: g_str_hash (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==21480==    by 0x9AC4568: g_hash_table_lookup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==21480==    by 0x6698DBF: dissector_try_string (packet.c:1397)
==21480==    by 0x67948B8: call_ber_oid_callback (packet-ber.c:1104)
==21480==    by 0x6FBD8AC: dissect_pkix1explicit_T_extnValue
(pkix1explicit.cnf:61)
==21480==    by 0x67954FC: dissect_ber_sequence (packet-ber.c:2403)
==21480==    by 0x6FBD6EF: dissect_pkix1explicit_Extension
(pkix1explicit.cnf:79)
==21480==    by 0x679713F: dissect_ber_sq_of (packet-ber.c:3486)
==21480==    by 0x679792D: dissect_ber_sequence_of (packet-ber.c:3517)
==21480==    by 0x6FBDEBF: dissect_pkix1explicit_Extensions
(pkix1explicit.cnf:92)
==21480==    by 0x67954FC: dissect_ber_sequence (packet-ber.c:2403)
==21480==    by 0x6EE983F: dissect_crmf_CertTemplate (packet-crmf-fn.c:43)
==21480==  Address 0x1282af81 is 1 bytes inside a block of size 46 free'd
==21480==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==21480==    by 0x668C924: emem_free_all (emem.c:1187)
==21480==    by 0x668DA90: epan_dissect_run_with_taps (epan.c:350)
==21480==    by 0x4135C3: process_packet (tshark.c:3524)
==21480==    by 0x40C3E3: main (tshark.c:3312)
==21480== 
==21480== 
==21480== HEAP SUMMARY:
==21480==     in use at exit: 1,241,373 bytes in 29,657 blocks
==21480==   total heap usage: 405,552 allocs, 375,895 frees, 38,635,061 bytes
allocated
==21480== 
==21480== LEAK SUMMARY:
==21480==    definitely lost: 5,849 bytes in 194 blocks
==21480==    indirectly lost: 36,648 bytes in 49 blocks
==21480==      possibly lost: 0 bytes in 0 blocks
==21480==    still reachable: 1,198,876 bytes in 29,414 blocks
==21480==         suppressed: 0 bytes in 0 blocks
==21480== Rerun with --leak-check=full to see details of leaked memory
==21480== 
==21480== For counts of detected and suppressed errors, rerun with: -v
==21480== ERROR SUMMARY: 94 errors from 4 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.