Wireshark-bugs: [Wireshark-bugs] [Bug 10749] New: Buildbot crash output: fuzz-2014-12-01-20009.p

Date: Tue, 02 Dec 2014 15:30:02 +0000
Bug ID 10749
Summary Buildbot crash output: fuzz-2014-12-01-20009.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2014-12-01-20009.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2014-12-01-20009.pcap

stderr:
Input file:
/home/wireshark/menagerie/menagerie/9630-ATLAS_FTAM_TCP_TRACE_2012110713400115.pcap

Build host information:
Linux wsbb04 3.13.0-39-generic #66-Ubuntu SMP Tue Oct 28 13:30:27 UTC 2014
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.1 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_BUILDNUMBER=3076
BUILDBOT_URL=http://buildbot.wireshark.org/trunk/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=785ef839640e00fd7db46130e367fc731525ccad

Return value:  0

Dissector bug:  0

Valgrind error count:  111



Git commit
commit 785ef839640e00fd7db46130e367fc731525ccad
Author: Guy Harris <[email protected]>
Date:   Sat Nov 29 07:26:42 2014 +0000

    Revert "Add QNX' QNET protocol"

    This reverts commit 72b91a56f86e3bbab700900366f81dc8c353b91d.

    value_string_ext tables ***MUST*** be sorted numerically, otherwise the
code prints warnings such as the ones in

       
http://buildbot.wireshark.org/trunk/builders/Ubuntu%2014.04%20x64/builds/1419/steps/test.sh/logs/stdio

    Fix this and resubmit.

    Change-Id: I448025bb7b19a607e992831202ed31d243ce70d8
    Reviewed-on: https://code.wireshark.org/review/5530
    Reviewed-by: Guy Harris <[email protected]>


Command and args: ./tools/valgrind-wireshark.sh 

==678== Memcheck, a memory error detector
==678== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==678== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info
==678== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2014-12-01-20009.pcap
==678== 
==678== Invalid read of size 1
==678==    at 0x9AECFE0: g_str_hash (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x9AEC568: g_hash_table_lookup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x67A81F0: call_ber_oid_callback (packet-ber.c:550)
==678==    by 0x67A7256: dissect_ber_choice (packet-ber.c:2903)
==678==    by 0x6EE739F: dissect_acse_T_encoding (acse.cnf:129)
==678==    by 0x67A8E3C: dissect_ber_sequence (packet-ber.c:2403)
==678==    by 0x6EE6FDF: dissect_acse_EXTERNALt_U (acse.cnf:147)
==678==    by 0x67A644A: dissect_ber_tagged_type (packet-ber.c:716)
==678==    by 0x6EE6EAD: dissect_acse_EXTERNALt (acse.cnf:157)
==678==    by 0x67AABC6: dissect_ber_sq_of (packet-ber.c:3502)
==678==    by 0x67AB37D: dissect_ber_sequence_of (packet-ber.c:3533)
==678==    by 0x6EE804F: dissect_acse_Association_data (acse.cnf:287)
==678==  Address 0x141665f0 is 0 bytes inside a block of size 35 free'd
==678==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==678==    by 0x669E494: emem_free_all (emem.c:1187)
==678==    by 0x669F600: epan_dissect_run_with_taps (epan.c:350)
==678==    by 0x413693: process_packet (tshark.c:3529)
==678==    by 0x40C7F7: main (tshark.c:3317)
==678== 
==678== Invalid read of size 1
==678==    at 0x9AECFFD: g_str_hash (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x9AEC568: g_hash_table_lookup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x67A81F0: call_ber_oid_callback (packet-ber.c:550)
==678==    by 0x67A7256: dissect_ber_choice (packet-ber.c:2903)
==678==    by 0x6EE739F: dissect_acse_T_encoding (acse.cnf:129)
==678==    by 0x67A8E3C: dissect_ber_sequence (packet-ber.c:2403)
==678==    by 0x6EE6FDF: dissect_acse_EXTERNALt_U (acse.cnf:147)
==678==    by 0x67A644A: dissect_ber_tagged_type (packet-ber.c:716)
==678==    by 0x6EE6EAD: dissect_acse_EXTERNALt (acse.cnf:157)
==678==    by 0x67AABC6: dissect_ber_sq_of (packet-ber.c:3502)
==678==    by 0x67AB37D: dissect_ber_sequence_of (packet-ber.c:3533)
==678==    by 0x6EE804F: dissect_acse_Association_data (acse.cnf:287)
==678==  Address 0x141665f1 is 1 bytes inside a block of size 35 free'd
==678==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==678==    by 0x669E494: emem_free_all (emem.c:1187)
==678==    by 0x669F600: epan_dissect_run_with_taps (epan.c:350)
==678==    by 0x413693: process_packet (tshark.c:3529)
==678==    by 0x40C7F7: main (tshark.c:3317)
==678== 
==678== Invalid read of size 1
==678==    at 0x9AECFE0: g_str_hash (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x9AEC568: g_hash_table_lookup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x66AAA7F: dissector_try_string (packet.c:1394)
==678==    by 0x67A8258: call_ber_oid_callback (packet-ber.c:1116)
==678==    by 0x67A7256: dissect_ber_choice (packet-ber.c:2903)
==678==    by 0x6EE739F: dissect_acse_T_encoding (acse.cnf:129)
==678==    by 0x67A8E3C: dissect_ber_sequence (packet-ber.c:2403)
==678==    by 0x6EE6FDF: dissect_acse_EXTERNALt_U (acse.cnf:147)
==678==    by 0x67A644A: dissect_ber_tagged_type (packet-ber.c:716)
==678==    by 0x6EE6EAD: dissect_acse_EXTERNALt (acse.cnf:157)
==678==    by 0x67AABC6: dissect_ber_sq_of (packet-ber.c:3502)
==678==    by 0x67AB37D: dissect_ber_sequence_of (packet-ber.c:3533)
==678==  Address 0x141665f0 is 0 bytes inside a block of size 35 free'd
==678==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==678==    by 0x669E494: emem_free_all (emem.c:1187)
==678==    by 0x669F600: epan_dissect_run_with_taps (epan.c:350)
==678==    by 0x413693: process_packet (tshark.c:3529)
==678==    by 0x40C7F7: main (tshark.c:3317)
==678== 
==678== Invalid read of size 1
==678==    at 0x9AECFFD: g_str_hash (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x9AEC568: g_hash_table_lookup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x66AAA7F: dissector_try_string (packet.c:1394)
==678==    by 0x67A8258: call_ber_oid_callback (packet-ber.c:1116)
==678==    by 0x67A7256: dissect_ber_choice (packet-ber.c:2903)
==678==    by 0x6EE739F: dissect_acse_T_encoding (acse.cnf:129)
==678==    by 0x67A8E3C: dissect_ber_sequence (packet-ber.c:2403)
==678==    by 0x6EE6FDF: dissect_acse_EXTERNALt_U (acse.cnf:147)
==678==    by 0x67A644A: dissect_ber_tagged_type (packet-ber.c:716)
==678==    by 0x6EE6EAD: dissect_acse_EXTERNALt (acse.cnf:157)
==678==    by 0x67AABC6: dissect_ber_sq_of (packet-ber.c:3502)
==678==    by 0x67AB37D: dissect_ber_sequence_of (packet-ber.c:3533)
==678==  Address 0x141665f1 is 1 bytes inside a block of size 35 free'd
==678==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==678==    by 0x669E494: emem_free_all (emem.c:1187)
==678==    by 0x669F600: epan_dissect_run_with_taps (epan.c:350)
==678==    by 0x413693: process_packet (tshark.c:3529)
==678==    by 0x40C7F7: main (tshark.c:3317)
==678== 
==678== Invalid read of size 1
==678==    at 0x4C2F1B4: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==678==    by 0x9AECFC8: g_str_equal (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x9AEC5EF: g_hash_table_lookup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x66AAA7F: dissector_try_string (packet.c:1394)
==678==    by 0x67A8258: call_ber_oid_callback (packet-ber.c:1116)
==678==    by 0x67A7256: dissect_ber_choice (packet-ber.c:2903)
==678==    by 0x6EE739F: dissect_acse_T_encoding (acse.cnf:129)
==678==    by 0x67A8E3C: dissect_ber_sequence (packet-ber.c:2403)
==678==    by 0x6EE6FDF: dissect_acse_EXTERNALt_U (acse.cnf:147)
==678==    by 0x67A644A: dissect_ber_tagged_type (packet-ber.c:716)
==678==    by 0x6EE6EAD: dissect_acse_EXTERNALt (acse.cnf:157)
==678==    by 0x67AABC6: dissect_ber_sq_of (packet-ber.c:3502)
==678==  Address 0x145c3280 is 0 bytes inside a block of size 13 free'd
==678==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==678==    by 0x71D7CCC: wmem_simple_free_all (wmem_allocator_simple.c:107)
==678==    by 0x71D894B: wmem_leave_packet_scope (wmem_scopes.c:81)
==678==    by 0x413693: process_packet (tshark.c:3529)
==678==    by 0x40C7F7: main (tshark.c:3317)
==678== 
==678== Invalid read of size 1
==678==    at 0x4C2F1CB: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==678==    by 0x9AECFC8: g_str_equal (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x9AEC5EF: g_hash_table_lookup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==678==    by 0x66AAA7F: dissector_try_string (packet.c:1394)
==678==    by 0x67A8258: call_ber_oid_callback (packet-ber.c:1116)
==678==    by 0x67A7256: dissect_ber_choice (packet-ber.c:2903)
==678==    by 0x6EE739F: dissect_acse_T_encoding (acse.cnf:129)
==678==    by 0x67A8E3C: dissect_ber_sequence (packet-ber.c:2403)
==678==    by 0x6EE6FDF: dissect_acse_EXTERNALt_U (acse.cnf:147)
==678==    by 0x67A644A: dissect_ber_tagged_type (packet-ber.c:716)
==678==    by 0x6EE6EAD: dissect_acse_EXTERNALt (acse.cnf:157)
==678==    by 0x67AABC6: dissect_ber_sq_of (packet-ber.c:3502)
==678==  Address 0x145c3281 is 1 bytes inside a block of size 13 free'd
==678==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==678==    by 0x71D7CCC: wmem_simple_free_all (wmem_allocator_simple.c:107)
==678==    by 0x71D894B: wmem_leave_packet_scope (wmem_scopes.c:81)
==678==    by 0x413693: process_packet (tshark.c:3529)
==678==    by 0x40C7F7: main (tshark.c:3317)
==678== 
==678== 
==678== HEAP SUMMARY:
==678==     in use at exit: 1,226,901 bytes in 30,581 blocks
==678==   total heap usage: 990,821 allocs, 960,240 frees, 64,156,860 bytes
allocated
==678== 
==678== LEAK SUMMARY:
==678==    definitely lost: 11,992 bytes in 1,107 blocks
==678==    indirectly lost: 36,744 bytes in 51 blocks
==678==      possibly lost: 0 bytes in 0 blocks
==678==    still reachable: 1,178,165 bytes in 29,423 blocks
==678==         suppressed: 0 bytes in 0 blocks
==678== Rerun with --leak-check=full to see details of leaked memory
==678== 
==678== For counts of detected and suppressed errors, rerun with: -v
==678== ERROR SUMMARY: 111 errors from 6 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.