Wireshark-bugs: [Wireshark-bugs] [Bug 11212] New: Buildbot crash output: fuzz-2015-05-18-6989.pc
Date: Tue, 19 May 2015 15:20:02 +0000
Bug ID | 11212 |
---|---|
Summary | Buildbot crash output: fuzz-2015-05-18-6989.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2015-05-18-6989.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2015-05-18-6989.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/6845-104-HSS.pcap Build host information: Linux wsbb04 3.13.0-52-generic #86-Ubuntu SMP Mon May 4 04:32:59 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.2 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark BUILDBOT_BUILDNUMBER=3229 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=b4a68bcd4934bad6bd78c05d5630a93cf4639edd Return value: 0 Dissector bug: 0 Valgrind error count: 1 Git commit commit b4a68bcd4934bad6bd78c05d5630a93cf4639edd Author: Alexis La Goutte <[email protected]> Date: Sat May 16 18:02:12 2015 +0200 SIP: Fix typo lenght => length Change-Id: Ib533bd2526c27cf5f1161616fcf52136e40c827a Reviewed-on: https://code.wireshark.org/review/8484 Reviewed-by: Michael Mann <[email protected]> Command and args: ./tools/valgrind-wireshark.sh ==15711== Memcheck, a memory error detector ==15711== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==15711== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==15711== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-05-18-6989.pcap ==15711== ==15711== Invalid read of size 1 ==15711== at 0xB583C94: inflate (in /lib/x86_64-linux-gnu/libz.so.1.2.8) ==15711== by 0x6787061: tvb_uncompress (tvbuff_zlib.c:111) ==15711== by 0x6787482: tvb_child_uncompress (tvbuff_zlib.c:335) ==15711== by 0x6AED6A0: dissect_http_message (packet-http.c:1370) ==15711== by 0x6AEA892: dissect_http (packet-http.c:2935) ==15711== by 0x67568CF: call_dissector_work (packet.c:612) ==15711== by 0x675676E: dissector_try_uint_new (packet.c:1132) ==15711== by 0x6EA8C0F: decode_tcp_ports (packet-tcp.c:4115) ==15711== by 0x6EA9CB9: process_tcp_payload (packet-tcp.c:4187) ==15711== by 0x6EA90A5: dissect_tcp_payload (packet-tcp.c:2061) ==15711== by 0x6EACD10: dissect_tcp (packet-tcp.c:5075) ==15711== by 0x67568ED: call_dissector_work (packet.c:614) ==15711== Address 0x13022b26 is 0 bytes after a block of size 998 alloc'd ==15711== at 0x4C2AB80: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15711== by 0x9FDA610: g_malloc (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==15711== by 0x67883EE: tvb_memdup (tvbuff.c:829) ==15711== by 0x6786ED3: tvb_uncompress (tvbuff_zlib.c:70) ==15711== by 0x6787482: tvb_child_uncompress (tvbuff_zlib.c:335) ==15711== by 0x6AED6A0: dissect_http_message (packet-http.c:1370) ==15711== by 0x6AEA892: dissect_http (packet-http.c:2935) ==15711== by 0x67568CF: call_dissector_work (packet.c:612) ==15711== by 0x675676E: dissector_try_uint_new (packet.c:1132) ==15711== by 0x6EA8C0F: decode_tcp_ports (packet-tcp.c:4115) ==15711== by 0x6EA9CB9: process_tcp_payload (packet-tcp.c:4187) ==15711== by 0x6EA90A5: dissect_tcp_payload (packet-tcp.c:2061) ==15711== ==15711== ==15711== HEAP SUMMARY: ==15711== in use at exit: 1,249,882 bytes in 30,100 blocks ==15711== total heap usage: 320,533 allocs, 290,433 frees, 39,908,991 bytes allocated ==15711== ==15711== LEAK SUMMARY: ==15711== definitely lost: 3,664 bytes in 160 blocks ==15711== indirectly lost: 37,560 bytes in 68 blocks ==15711== possibly lost: 0 bytes in 0 blocks ==15711== still reachable: 1,208,658 bytes in 29,872 blocks ==15711== suppressed: 0 bytes in 0 blocks ==15711== Rerun with --leak-check=full to see details of leaked memory ==15711== ==15711== For counts of detected and suppressed errors, rerun with: -v ==15711== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 11212] Buildbot crash output: fuzz-2015-05-18-6989.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 11212] Buildbot crash output: fuzz-2015-05-18-6989.pcap
- Prev by Date: [Wireshark-bugs] [Bug 11210] wireshark does not display x.400 addresses correctly
- Next by Date: [Wireshark-bugs] [Bug 11198] Dissector bug, proto SunRPC: reassemble.c:121 0: failed assertion "tvb_bytes_exist(tvb, offset, frag_data_len)
- Previous by thread: [Wireshark-bugs] [Bug 11211] performing remote capture from Windows (wireshark-1.12.4) for Linux (RHEL 6.4)
- Next by thread: [Wireshark-bugs] [Bug 11212] Buildbot crash output: fuzz-2015-05-18-6989.pcap
- Index(es):