Wireshark-bugs: [Wireshark-bugs] [Bug 11937] New: Buildbot crash output: fuzz-2015-12-27-17041.p

Date: Tue, 29 Dec 2015 02:10:06 +0000
Bug ID 11937
Summary Buildbot crash output: fuzz-2015-12-27-17041.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2015-12-27-17041.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2015-12-27-17041.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/cmp-trace.pcap.gz

Build host information:
Linux wsbb04 3.13.0-71-generic #114-Ubuntu SMP Tue Dec 1 02:34:22 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.3 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_BUILDNUMBER=3450
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=ec6fa1a8a0d1fa536f2f39e472a67fcae23b93a4

Return value:  0

Dissector bug:  0

Valgrind error count:  3



Git commit
commit ec6fa1a8a0d1fa536f2f39e472a67fcae23b93a4
Author: Simon Barber <[email protected]>
Date:   Wed Dec 23 15:42:43 2015 -0800

    Refactor VHT rates table, to use Ndbps (number of data bits per symbol)
    to calculate rate. This will enable calculation of FEC rounding precisely
    later on.

    Change-Id: If7dcee39e12db208636fc8a90bfd784ffbea723c
    Reviewed-on: https://code.wireshark.org/review/12857
    Petri-Dish: Michael Mann <[email protected]>
    Tested-by: Petri Dish Buildbot <[email protected]>
    Reviewed-by: Michael Mann <[email protected]>


Command and args: ./tools/valgrind-wireshark.sh 

==22604== Memcheck, a memory error detector
==22604== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==22604== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
==22604== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-12-27-17041.pcap
==22604== 
==22604== Invalid read of size 1
==22604==    at 0x4C2F1B1: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==22604==    by 0x730350C: dissect_x509af_T_subjectPublicKey (x509af.cnf:98)
==22604==    by 0x69444EA: dissect_ber_sequence (packet-ber.c:2400)
==22604==    by 0x730232C: dissect_x509af_SubjectPublicKeyInfo (x509af.cnf:87)
==22604==    by 0x69444EA: dissect_ber_sequence (packet-ber.c:2400)
==22604==    by 0x711F05F: dissect_crmf_CertTemplate (packet-crmf-fn.c:43)
==22604==    by 0x69444EA: dissect_ber_sequence (packet-ber.c:2400)
==22604==    by 0x711F11F: dissect_crmf_CertRequest (crmf.cnf:117)
==22604==    by 0x69444EA: dissect_ber_sequence (packet-ber.c:2400)
==22604==    by 0x711F2CF: dissect_crmf_CertReqMsg (crmf.cnf:304)
==22604==    by 0x69465FF: dissect_ber_sq_of (packet-ber.c:3490)
==22604==    by 0x6946AF5: dissect_ber_sequence_of (packet-ber.c:3521)
==22604==  Address 0x13e6bc70 is 0 bytes inside a block of size 101 free'd
==22604==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==22604==    by 0x743FE61: wmem_simple_free_all (wmem_allocator_simple.c:107)
==22604==    by 0x7440C67: wmem_leave_packet_scope (wmem_scopes.c:81)
==22604==    by 0x413C64: process_packet (tshark.c:3728)
==22604==    by 0x411188: load_cap_file (tshark.c:3484)
==22604==    by 0x411188: main (tshark.c:2197)
==22604== 
==22604== Invalid read of size 1
==22604==    at 0x4C2F1C8: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==22604==    by 0x730350C: dissect_x509af_T_subjectPublicKey (x509af.cnf:98)
==22604==    by 0x69444EA: dissect_ber_sequence (packet-ber.c:2400)
==22604==    by 0x730232C: dissect_x509af_SubjectPublicKeyInfo (x509af.cnf:87)
==22604==    by 0x69444EA: dissect_ber_sequence (packet-ber.c:2400)
==22604==    by 0x711F05F: dissect_crmf_CertTemplate (packet-crmf-fn.c:43)
==22604==    by 0x69444EA: dissect_ber_sequence (packet-ber.c:2400)
==22604==    by 0x711F11F: dissect_crmf_CertRequest (crmf.cnf:117)
==22604==    by 0x69444EA: dissect_ber_sequence (packet-ber.c:2400)
==22604==    by 0x711F2CF: dissect_crmf_CertReqMsg (crmf.cnf:304)
==22604==    by 0x69465FF: dissect_ber_sq_of (packet-ber.c:3490)
==22604==    by 0x6946AF5: dissect_ber_sequence_of (packet-ber.c:3521)
==22604==  Address 0x13e6bc71 is 1 bytes inside a block of size 101 free'd
==22604==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==22604==    by 0x743FE61: wmem_simple_free_all (wmem_allocator_simple.c:107)
==22604==    by 0x7440C67: wmem_leave_packet_scope (wmem_scopes.c:81)
==22604==    by 0x413C64: process_packet (tshark.c:3728)
==22604==    by 0x411188: load_cap_file (tshark.c:3484)
==22604==    by 0x411188: main (tshark.c:2197)
==22604== 
==22604== 
==22604== HEAP SUMMARY:
==22604==     in use at exit: 1,094,138 bytes in 30,153 blocks
==22604==   total heap usage: 417,375 allocs, 387,222 frees, 41,456,258 bytes
allocated
==22604== 
==22604== LEAK SUMMARY:
==22604==    definitely lost: 3,340 bytes in 146 blocks
==22604==    indirectly lost: 43,216 bytes in 52 blocks
==22604==      possibly lost: 0 bytes in 0 blocks
==22604==    still reachable: 1,047,582 bytes in 29,955 blocks
==22604==         suppressed: 0 bytes in 0 blocks
==22604== Rerun with --leak-check=full to see details of leaked memory
==22604== 
==22604== For counts of detected and suppressed errors, rerun with: -v
==22604== ERROR SUMMARY: 3 errors from 2 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.