Wireshark-bugs: [Wireshark-bugs] [Bug 11436] New: Buildbot crash output: fuzz-2015-08-11-31521.p
Date: Tue, 11 Aug 2015 14:40:03 +0000
Bug ID | 11436 |
---|---|
Summary | Buildbot crash output: fuzz-2015-08-11-31521.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2015-08-11-31521.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2015-08-11-31521.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/13377-HR_SENSOR_btsnoop_hci.log Build host information: Linux wsbb04 3.13.0-55-generic #92-Ubuntu SMP Sun Jun 14 18:32:20 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.2 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark BUILDBOT_BUILDNUMBER=3286 BUILDBOT_URL=http://buildbot.wireshark.org/trunk/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=4bba83bd9ca200881a32b7bcb3356fca21397da4 Return value: 0 Dissector bug: 0 Valgrind error count: 6334 Git commit commit 4bba83bd9ca200881a32b7bcb3356fca21397da4 Author: Gerald Combs <[email protected]> Date: Sat Aug 8 16:29:24 2015 -0700 Reset the splash timer after processing events. Change-Id: Id71a3ac5e8f04df6a19e92021e47ea64728c2595 Reviewed-on: https://code.wireshark.org/review/9936 Reviewed-by: Gerald Combs <[email protected]> Command and args: ./tools/valgrind-wireshark.sh -T ==30337== Memcheck, a memory error detector ==30337== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==30337== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info ==30337== Command: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -Vx -nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-08-11-31521.pcap ==30337== ==30337== Conditional jump or move depends on uninitialised value(s) ==30337== at 0x4C2E0F8: strlen (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==30337== by 0xA2F0B02: g_strdup (in /lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0) ==30337== by 0x680AFEF: string_fvalue_set_string (ftype-string.c:51) ==30337== by 0x67CF1AE: proto_tree_new_item (proto.c:3271) ==30337== by 0x68FD708: dissect_attribute_value (packet-btatt.c:1851) ==30337== by 0x68FC9A1: dissect_btatt (packet-btatt.c:3305) ==30337== by 0x67BC34F: call_dissector_work (packet.c:618) ==30337== by 0x67BC1EE: dissector_try_uint_new (packet.c:1138) ==30337== by 0x6928686: dissect_btl2cap (packet-btl2cap.c:2051) ==30337== by 0x67BC34F: call_dissector_work (packet.c:618) ==30337== by 0x67BB91C: call_dissector_with_data (packet.c:2510) ==30337== by 0x690C0F3: dissect_bthci_acl (packet-bthci_acl.c:417) ==30337== ==30337== Conditional jump or move depends on uninitialised value(s) ==30337== at 0x4C2E0F8: strlen (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==30337== by 0x67D6ADE: proto_item_fill_label (proto.c:4340) ==30337== by 0x67C8792: proto_tree_print_node (print.c:163) ==30337== by 0x67CBE59: proto_tree_children_foreach (proto.c:647) ==30337== by 0x67C88BB: proto_tree_print_node (print.c:218) ==30337== by 0x67CBE59: proto_tree_children_foreach (proto.c:647) ==30337== by 0x67C88BB: proto_tree_print_node (print.c:218) ==30337== by 0x67CBE59: proto_tree_children_foreach (proto.c:647) ==30337== by 0x67C872D: proto_tree_print (print.c:132) ==30337== by 0x413B21: print_packet (tshark.c:4070) ==30337== by 0x413110: process_packet (tshark.c:3680) ==30337== by 0x4109DD: main (tshark.c:3425) ==30337== ==30337== Use of uninitialised value of size 8 ==30337== at 0x67C9CF2: print_hex_data_buffer (print.c:987) ==30337== by 0x67C9A99: print_hex_data (print.c:903) ==30337== by 0x413B90: print_packet (tshark.c:4093) ==30337== by 0x413110: process_packet (tshark.c:3680) ==30337== by 0x4109DD: main (tshark.c:3425) ==30337== ==30337== Use of uninitialised value of size 8 ==30337== at 0x67C9D08: print_hex_data_buffer (print.c:988) ==30337== by 0x67C9A99: print_hex_data (print.c:903) ==30337== by 0x413B90: print_packet (tshark.c:4093) ==30337== by 0x413110: process_packet (tshark.c:3680) ==30337== by 0x4109DD: main (tshark.c:3425) ==30337== ==30337== Conditional jump or move depends on uninitialised value(s) ==30337== at 0x67C9D41: print_hex_data_buffer (print.c:993) ==30337== by 0x67C9A99: print_hex_data (print.c:903) ==30337== by 0x413B90: print_packet (tshark.c:4093) ==30337== by 0x413110: process_packet (tshark.c:3680) ==30337== by 0x4109DD: main (tshark.c:3425) ==30337== ==30337== Conditional jump or move depends on uninitialised value(s) ==30337== at 0x4C2E0F8: strlen (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==30337== by 0xC68E73E: fputs (iofputs.c:35) ==30337== by 0x67CB1AF: print_line_text (print_stream.c:131) ==30337== by 0x67C9D83: print_hex_data_buffer (print.c:1003) ==30337== by 0x67C9A99: print_hex_data (print.c:903) ==30337== by 0x413B90: print_packet (tshark.c:4093) ==30337== by 0x413110: process_packet (tshark.c:3680) ==30337== by 0x4109DD: main (tshark.c:3425) ==30337== ==30337== Syscall param write(buf) points to uninitialised byte(s) ==30337== at 0xC70B870: __write_nocancel (syscall-template.S:81) ==30337== by 0xC699002: _IO_file_write@@GLIBC_2.2.5 (fileops.c:1261) ==30337== by 0xC69A4DB: _IO_do_write@@GLIBC_2.2.5 (fileops.c:538) ==30337== by 0xC69A97A: _IO_file_overflow@@GLIBC_2.2.5 (fileops.c:871) ==30337== by 0xC692008: putc (putc.c:31) ==30337== by 0x67CB1BE: print_line_text (print_stream.c:132) ==30337== by 0x67C9D83: print_hex_data_buffer (print.c:1003) ==30337== by 0x67C9A99: print_hex_data (print.c:903) ==30337== by 0x413B90: print_packet (tshark.c:4093) ==30337== by 0x413110: process_packet (tshark.c:3680) ==30337== by 0x4109DD: main (tshark.c:3425) ==30337== Address 0x4027f67 is not stack'd, malloc'd or (recently) free'd ==30337== ==30337== Syscall param write(buf) points to uninitialised byte(s) ==30337== at 0xC70B870: __write_nocancel (syscall-template.S:81) ==30337== by 0xC699002: _IO_file_write@@GLIBC_2.2.5 (fileops.c:1261) ==30337== by 0xC69A4DB: _IO_do_write@@GLIBC_2.2.5 (fileops.c:538) ==30337== by 0xC6996A0: _IO_file_xsputn@@GLIBC_2.2.5 (fileops.c:1332) ==30337== by 0xC68E7C3: fputs (iofputs.c:40) ==30337== by 0x67CB1AF: print_line_text (print_stream.c:131) ==30337== by 0x67C9D83: print_hex_data_buffer (print.c:1003) ==30337== by 0x67C9A99: print_hex_data (print.c:903) ==30337== by 0x413B90: print_packet (tshark.c:4093) ==30337== by 0x413110: process_packet (tshark.c:3680) ==30337== by 0x4109DD: main (tshark.c:3425) ==30337== Address 0x402703a is not stack'd, malloc'd or (recently) free'd ==30337== ==30337== ==30337== HEAP SUMMARY: ==30337== in use at exit: 1,227,375 bytes in 29,476 blocks ==30337== total heap usage: 705,302 allocs, 675,826 frees, 56,016,208 bytes allocated ==30337== ==30337== LEAK SUMMARY: ==30337== definitely lost: 2,932 bytes in 126 blocks ==30337== indirectly lost: 36,456 bytes in 49 blocks ==30337== possibly lost: 0 bytes in 0 blocks ==30337== still reachable: 1,187,987 bytes in 29,301 blocks ==30337== suppressed: 0 bytes in 0 blocks ==30337== Rerun with --leak-check=full to see details of leaked memory ==30337== ==30337== For counts of detected and suppressed errors, rerun with: -v ==30337== Use --track-origins=yes to see where uninitialised values come from ==30337== ERROR SUMMARY: 6334 errors from 8 contexts (suppressed: 0 from 0) [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 11436] Buildbot crash output: fuzz-2015-08-11-31521.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 11436] Buildbot crash output: fuzz-2015-08-11-31521.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 11436] Buildbot crash output: fuzz-2015-08-11-31521.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 11436] Buildbot crash output: fuzz-2015-08-11-31521.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 11436] Buildbot crash output: fuzz-2015-08-11-31521.pcap
- Prev by Date: [Wireshark-bugs] [Bug 11420] Wire Shark Not Capturing register, invite , 200 ok , bye etc which i can see in tcpdump
- Next by Date: [Wireshark-bugs] [Bug 8795] pcapng files wouldn't merge if containing packets from multiple interfaces
- Previous by thread: [Wireshark-bugs] [Bug 11435] DNP3 dissector does not parse multiple DNP3 data link frames in one UDP datagram
- Next by thread: [Wireshark-bugs] [Bug 11436] Buildbot crash output: fuzz-2015-08-11-31521.pcap
- Index(es):