Wireshark-bugs: [Wireshark-bugs] [Bug 11020] New: Buildbot crash output: fuzz-2015-02-28-6313.pc
Date: Sat, 28 Feb 2015 13:40:03 +0000
Bug ID | 11020 |
---|---|
Summary | Buildbot crash output: fuzz-2015-02-28-6313.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2015-02-28-6313.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2015-02-28-6313.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/003transf.cap Build host information: Linux wsbb04 3.13.0-45-generic #74-Ubuntu SMP Tue Jan 13 19:36:28 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.2 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark BUILDBOT_BUILDNUMBER=3169 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=1e66e74fa26a2bc29e0162a3a8740a66cbb5f55f Return value: 0 Dissector bug: 0 Valgrind error count: 2 Git commit commit 1e66e74fa26a2bc29e0162a3a8740a66cbb5f55f Author: Dmitry Bazhenov <[email protected]> Date: Thu Feb 26 16:47:50 2015 +0500 Add dissector for "Bad Password Threshold" IPMI LAN configuration parameter. Add dissectors for IPv6-related IPMI LAN configuration parameters. Bug:11012 Change-Id: I9b7380d2451acb6d68a03361e26dc3a6ebc129a0 Reviewed-on: https://code.wireshark.org/review/7404 Reviewed-by: Alexis La Goutte <[email protected]> Tested-by: Alexis La Goutte <[email protected]> Reviewed-by: Michael Mann <[email protected]> Command and args: ./tools/valgrind-wireshark.sh ==13676== Memcheck, a memory error detector ==13676== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==13676== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==13676== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-02-28-6313.pcap ==13676== ==13676== Invalid read of size 1 ==13676== at 0x4C2E0E2: strlen (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==13676== by 0x67010F8: ipx_to_str (address_types.c:409) ==13676== by 0x67016F0: address_to_str (address_types.c:905) ==13676== by 0x6AFDF9B: dissect_ipx (packet-ipx.c:350) ==13676== by 0x6717333: call_dissector_through_handle (packet.c:614) ==13676== by 0x6717D04: call_dissector_work (packet.c:700) ==13676== by 0x671844B: dissector_try_uint_new (packet.c:1132) ==13676== by 0x6718496: dissector_try_uint (packet.c:1158) ==13676== by 0x6B76FB1: dissect_llc (packet-llc.c:501) ==13676== by 0x6717333: call_dissector_through_handle (packet.c:614) ==13676== by 0x6717D04: call_dissector_work (packet.c:700) ==13676== by 0x6719981: call_dissector_with_data (packet.c:2386) ==13676== Address 0x12883d36 is 0 bytes after a block of size 22 alloc'd ==13676== at 0x4C2AB80: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==13676== by 0x9C35610: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==13676== by 0x726AD2B: wmem_simple_alloc (wmem_allocator_simple.c:55) ==13676== by 0x67016DD: address_to_str (address_types.c:904) ==13676== by 0x6AFDF9B: dissect_ipx (packet-ipx.c:350) ==13676== by 0x6717333: call_dissector_through_handle (packet.c:614) ==13676== by 0x6717D04: call_dissector_work (packet.c:700) ==13676== by 0x671844B: dissector_try_uint_new (packet.c:1132) ==13676== by 0x6718496: dissector_try_uint (packet.c:1158) ==13676== by 0x6B76FB1: dissect_llc (packet-llc.c:501) ==13676== by 0x6717333: call_dissector_through_handle (packet.c:614) ==13676== by 0x6717D04: call_dissector_work (packet.c:700) ==13676== ==13676== Invalid read of size 1 ==13676== at 0x4C2E0E2: strlen (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==13676== by 0x67010F8: ipx_to_str (address_types.c:409) ==13676== by 0x67016F0: address_to_str (address_types.c:905) ==13676== by 0x6AFE006: dissect_ipx (packet-ipx.c:355) ==13676== by 0x6717333: call_dissector_through_handle (packet.c:614) ==13676== by 0x6717D04: call_dissector_work (packet.c:700) ==13676== by 0x671844B: dissector_try_uint_new (packet.c:1132) ==13676== by 0x6718496: dissector_try_uint (packet.c:1158) ==13676== by 0x6B76FB1: dissect_llc (packet-llc.c:501) ==13676== by 0x6717333: call_dissector_through_handle (packet.c:614) ==13676== by 0x6717D04: call_dissector_work (packet.c:700) ==13676== by 0x6719981: call_dissector_with_data (packet.c:2386) ==13676== Address 0x12883d96 is 0 bytes after a block of size 22 alloc'd ==13676== at 0x4C2AB80: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==13676== by 0x9C35610: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==13676== by 0x726AD2B: wmem_simple_alloc (wmem_allocator_simple.c:55) ==13676== by 0x67016DD: address_to_str (address_types.c:904) ==13676== by 0x6AFE006: dissect_ipx (packet-ipx.c:355) ==13676== by 0x6717333: call_dissector_through_handle (packet.c:614) ==13676== by 0x6717D04: call_dissector_work (packet.c:700) ==13676== by 0x671844B: dissector_try_uint_new (packet.c:1132) ==13676== by 0x6718496: dissector_try_uint (packet.c:1158) ==13676== by 0x6B76FB1: dissect_llc (packet-llc.c:501) ==13676== by 0x6717333: call_dissector_through_handle (packet.c:614) ==13676== by 0x6717D04: call_dissector_work (packet.c:700) ==13676== ==13676== ==13676== HEAP SUMMARY: ==13676== in use at exit: 1,221,229 bytes in 29,813 blocks ==13676== total heap usage: 364,693 allocs, 334,880 frees, 34,875,704 bytes allocated ==13676== ==13676== LEAK SUMMARY: ==13676== definitely lost: 3,320 bytes in 142 blocks ==13676== indirectly lost: 36,968 bytes in 51 blocks ==13676== possibly lost: 0 bytes in 0 blocks ==13676== still reachable: 1,180,941 bytes in 29,620 blocks ==13676== suppressed: 0 bytes in 0 blocks ==13676== Rerun with --leak-check=full to see details of leaked memory ==13676== ==13676== For counts of detected and suppressed errors, rerun with: -v ==13676== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 11020] Buildbot crash output: fuzz-2015-02-28-6313.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 11020] Buildbot crash output: fuzz-2015-02-28-6313.pcap
- Prev by Date: [Wireshark-bugs] [Bug 11019] wireshark QT IO graph focuses "circle cursor" on old curve even the real-time curve has been unselected.
- Next by Date: [Wireshark-bugs] [Bug 11020] Buildbot crash output: fuzz-2015-02-28-6313.pcap
- Previous by thread: [Wireshark-bugs] [Bug 11019] wireshark QT IO graph focuses "circle cursor" on old curve even the real-time curve has been unselected.
- Next by thread: [Wireshark-bugs] [Bug 11020] Buildbot crash output: fuzz-2015-02-28-6313.pcap
- Index(es):