Wireshark-bugs: [Wireshark-bugs] [Bug 10811] New: Buildbot crash output: fuzz-2014-12-26-2795.pc
Date: Sun, 28 Dec 2014 08:00:08 +0000
Bug ID | 10811 |
---|---|
Summary | Buildbot crash output: fuzz-2014-12-26-2795.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2014-12-26-2795.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2014-12-26-2795.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/9630-ATLAS_FTAM_TCP_TRACE_2012110713400115.pcap Build host information: Linux wsbb04 3.13.0-39-generic #66-Ubuntu SMP Tue Oct 28 13:30:27 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.1 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark BUILDBOT_BUILDNUMBER=3087 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=de8c81cd9235f97541db28b0eed6865bf3a6a291 Return value: 0 Dissector bug: 0 Valgrind error count: 124 Git commit commit de8c81cd9235f97541db28b0eed6865bf3a6a291 Author: Guy Harris <[email protected]> Date: Thu Dec 25 01:13:24 2014 -0800 Use getopt_long(). Change-Id: I8ff74de7cedee64bc46d88f23a6d1e771d4a4a10 Reviewed-on: https://code.wireshark.org/review/6048 Reviewed-by: Guy Harris <[email protected]> Command and args: ./tools/valgrind-wireshark.sh ==23335== Memcheck, a memory error detector ==23335== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==23335== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==23335== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2014-12-26-2795.pcap ==23335== ==23335== Invalid read of size 1 ==23335== at 0x9B42FE0: g_str_hash (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==23335== by 0x9B42568: g_hash_table_lookup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==23335== by 0x67CA950: call_ber_oid_callback (packet-ber.c:544) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F430BF: dissect_ftam_T_document_type (ftam.cnf:91) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== by 0x6F4254F: dissect_ftam_Contents_Type_Attribute (ftam.cnf:137) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F440BF: dissect_ftam_F_OPEN_response (ftam.cnf:743) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== by 0x6F449F5: dissect_ftam_File_PDU (ftam.cnf:103) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== Address 0x12a7e300 is 0 bytes inside a block of size 57 free'd ==23335== at 0x4C2BDEC: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x66C1F74: emem_free_all (emem.c:1187) ==23335== by 0x66C30E0: epan_dissect_run_with_taps (epan.c:350) ==23335== by 0x413813: process_packet (tshark.c:3571) ==23335== by 0x40C86F: main (tshark.c:3334) ==23335== ==23335== Invalid read of size 1 ==23335== at 0x9B42FFD: g_str_hash (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==23335== by 0x9B42568: g_hash_table_lookup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==23335== by 0x67CA950: call_ber_oid_callback (packet-ber.c:544) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F430BF: dissect_ftam_T_document_type (ftam.cnf:91) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== by 0x6F4254F: dissect_ftam_Contents_Type_Attribute (ftam.cnf:137) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F440BF: dissect_ftam_F_OPEN_response (ftam.cnf:743) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== by 0x6F449F5: dissect_ftam_File_PDU (ftam.cnf:103) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== Address 0x12a7e301 is 1 bytes inside a block of size 57 free'd ==23335== at 0x4C2BDEC: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x66C1F74: emem_free_all (emem.c:1187) ==23335== by 0x66C30E0: epan_dissect_run_with_taps (epan.c:350) ==23335== by 0x413813: process_packet (tshark.c:3571) ==23335== by 0x40C86F: main (tshark.c:3334) ==23335== ==23335== Invalid read of size 1 ==23335== at 0x4C2E0E2: strlen (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x9B6FB02: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==23335== by 0x66CDD30: find_string_dtbl_entry (packet.c:1231) ==23335== by 0x66CE636: dissector_try_string (packet.c:1420) ==23335== by 0x67CA9B8: call_ber_oid_callback (packet-ber.c:1113) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F430BF: dissect_ftam_T_document_type (ftam.cnf:91) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== by 0x6F4254F: dissect_ftam_Contents_Type_Attribute (ftam.cnf:137) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F440BF: dissect_ftam_F_OPEN_response (ftam.cnf:743) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== Address 0x12a7e300 is 0 bytes inside a block of size 57 free'd ==23335== at 0x4C2BDEC: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x66C1F74: emem_free_all (emem.c:1187) ==23335== by 0x66C30E0: epan_dissect_run_with_taps (epan.c:350) ==23335== by 0x413813: process_packet (tshark.c:3571) ==23335== by 0x40C86F: main (tshark.c:3334) ==23335== ==23335== Invalid read of size 1 ==23335== at 0x4C2E0F4: strlen (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x9B6FB02: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==23335== by 0x66CDD30: find_string_dtbl_entry (packet.c:1231) ==23335== by 0x66CE636: dissector_try_string (packet.c:1420) ==23335== by 0x67CA9B8: call_ber_oid_callback (packet-ber.c:1113) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F430BF: dissect_ftam_T_document_type (ftam.cnf:91) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== by 0x6F4254F: dissect_ftam_Contents_Type_Attribute (ftam.cnf:137) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F440BF: dissect_ftam_F_OPEN_response (ftam.cnf:743) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== Address 0x12a7e301 is 1 bytes inside a block of size 57 free'd ==23335== at 0x4C2BDEC: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x66C1F74: emem_free_all (emem.c:1187) ==23335== by 0x66C30E0: epan_dissect_run_with_taps (epan.c:350) ==23335== by 0x413813: process_packet (tshark.c:3571) ==23335== by 0x40C86F: main (tshark.c:3334) ==23335== ==23335== Invalid read of size 8 ==23335== at 0x4C2F790: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x9B6FB1C: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==23335== by 0x66CDD30: find_string_dtbl_entry (packet.c:1231) ==23335== by 0x66CE636: dissector_try_string (packet.c:1420) ==23335== by 0x67CA9B8: call_ber_oid_callback (packet-ber.c:1113) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F430BF: dissect_ftam_T_document_type (ftam.cnf:91) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== by 0x6F4254F: dissect_ftam_Contents_Type_Attribute (ftam.cnf:137) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F440BF: dissect_ftam_F_OPEN_response (ftam.cnf:743) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== Address 0x12a7e300 is 0 bytes inside a block of size 57 free'd ==23335== at 0x4C2BDEC: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x66C1F74: emem_free_all (emem.c:1187) ==23335== by 0x66C30E0: epan_dissect_run_with_taps (epan.c:350) ==23335== by 0x413813: process_packet (tshark.c:3571) ==23335== by 0x40C86F: main (tshark.c:3334) ==23335== ==23335== Invalid read of size 8 ==23335== at 0x4C2F79E: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x9B6FB1C: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==23335== by 0x66CDD30: find_string_dtbl_entry (packet.c:1231) ==23335== by 0x66CE636: dissector_try_string (packet.c:1420) ==23335== by 0x67CA9B8: call_ber_oid_callback (packet-ber.c:1113) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F430BF: dissect_ftam_T_document_type (ftam.cnf:91) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== by 0x6F4254F: dissect_ftam_Contents_Type_Attribute (ftam.cnf:137) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F440BF: dissect_ftam_F_OPEN_response (ftam.cnf:743) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== Address 0x12a7e310 is 16 bytes inside a block of size 57 free'd ==23335== at 0x4C2BDEC: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x66C1F74: emem_free_all (emem.c:1187) ==23335== by 0x66C30E0: epan_dissect_run_with_taps (epan.c:350) ==23335== by 0x413813: process_packet (tshark.c:3571) ==23335== by 0x40C86F: main (tshark.c:3334) ==23335== ==23335== Invalid read of size 2 ==23335== at 0x4C2F7E0: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x9B6FB1C: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==23335== by 0x66CDD30: find_string_dtbl_entry (packet.c:1231) ==23335== by 0x66CE636: dissector_try_string (packet.c:1420) ==23335== by 0x67CA9B8: call_ber_oid_callback (packet-ber.c:1113) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F430BF: dissect_ftam_T_document_type (ftam.cnf:91) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== by 0x6F4254F: dissect_ftam_Contents_Type_Attribute (ftam.cnf:137) ==23335== by 0x67CB59C: dissect_ber_sequence (packet-ber.c:2418) ==23335== by 0x6F440BF: dissect_ftam_F_OPEN_response (ftam.cnf:743) ==23335== by 0x67C9986: dissect_ber_choice (packet-ber.c:2918) ==23335== Address 0x12a7e338 is 56 bytes inside a block of size 57 free'd ==23335== at 0x4C2BDEC: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==23335== by 0x66C1F74: emem_free_all (emem.c:1187) ==23335== by 0x66C30E0: epan_dissect_run_with_taps (epan.c:350) ==23335== by 0x413813: process_packet (tshark.c:3571) ==23335== by 0x40C86F: main (tshark.c:3334) ==23335== ==23335== ==23335== HEAP SUMMARY: ==23335== in use at exit: 1,229,290 bytes in 30,582 blocks ==23335== total heap usage: 983,545 allocs, 952,963 frees, 63,707,274 bytes allocated ==23335== ==23335== LEAK SUMMARY: ==23335== definitely lost: 11,528 bytes in 1,020 blocks ==23335== indirectly lost: 36,744 bytes in 51 blocks ==23335== possibly lost: 0 bytes in 0 blocks ==23335== still reachable: 1,181,018 bytes in 29,511 blocks ==23335== suppressed: 0 bytes in 0 blocks ==23335== Rerun with --leak-check=full to see details of leaked memory ==23335== ==23335== For counts of detected and suppressed errors, rerun with: -v ==23335== ERROR SUMMARY: 124 errors from 7 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 10811] Buildbot crash output: fuzz-2014-12-26-2795.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10811] Buildbot crash output: fuzz-2014-12-26-2795.pcap
- Prev by Date: [Wireshark-bugs] [Bug 10520] ISIS TLV 242 (Router CAPABILITY TLV) no decoded
- Next by Date: [Wireshark-bugs] [Bug 10811] Buildbot crash output: fuzz-2014-12-26-2795.pcap
- Previous by thread: [Wireshark-bugs] [Bug 10810] Cannot access online tool IPv4 and IPv6 Connectivity Test
- Next by thread: [Wireshark-bugs] [Bug 10811] Buildbot crash output: fuzz-2014-12-26-2795.pcap
- Index(es):