Wireshark-bugs: [Wireshark-bugs] [Bug 12026] New: Buildbot crash output: fuzz-2016-01-17-25415.p

Date: Mon, 18 Jan 2016 08:20:02 +0000
Bug ID 12026
Summary Buildbot crash output: fuzz-2016-01-17-25415.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2016-01-17-25415.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2016-01-17-25415.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/1487-SEND_client_boot.pcap

Build host information:
Linux wsbb04 3.13.0-74-generic #118-Ubuntu SMP Thu Dec 17 22:52:10 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.3 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_BUILDNUMBER=3474
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=183732fb8f6d8fcd4e56730a957963ef1baa1484

Return value:  0

Dissector bug:  0

Valgrind error count:  6



Git commit
commit 183732fb8f6d8fcd4e56730a957963ef1baa1484
Author: Michael Mann <[email protected]>
Date:   Fri Jan 15 10:00:32 2016 -0500

    Improve Error messages when failing to load pcapng files

    Include the pcapng block name in every error message to give user a better
hint as to where the error is

    Bug: 8798
    Change-Id: Idd80a8541ac37a42b9bd2e988fa8da1ce7bc91a0
    Reviewed-on: https://code.wireshark.org/review/13310
    Petri-Dish: Michael Mann <[email protected]>
    Tested-by: Petri Dish Buildbot <[email protected]>
    Reviewed-by: Michael Mann <[email protected]>


Command and args: ./tools/valgrind-wireshark.sh 

==6284== Memcheck, a memory error detector
==6284== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==6284== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
==6284== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2016-01-17-25415.pcap
==6284== 
==6284== Invalid read of size 1
==6284==    at 0x4C2F1B1: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==6284==    by 0x735A40C: dissect_x509af_T_subjectPublicKey (x509af.cnf:98)
==6284==    by 0x698AA8A: dissect_ber_sequence (packet-ber.c:2401)
==6284==    by 0x735922C: dissect_x509af_SubjectPublicKeyInfo (x509af.cnf:87)
==6284==    by 0x6C3D999: dissect_icmpv6_nd_opt (packet-icmpv6.c:1655)
==6284==    by 0x6C3BA4D: dissect_icmpv6 (packet-icmpv6.c:3745)
==6284==    by 0x687B9C4: call_dissector_through_handle (packet.c:619)
==6284==    by 0x687B9C4: call_dissector_work (packet.c:694)
==6284==    by 0x687B86E: dissector_try_uint_new (packet.c:1153)
==6284==    by 0x6C8650F: ip_try_dissect (packet-ip.c:1976)
==6284==    by 0x6CA6B92: dissect_ipv6 (packet-ipv6.c:2429)
==6284==    by 0x687B9C4: call_dissector_through_handle (packet.c:619)
==6284==    by 0x687B9C4: call_dissector_work (packet.c:694)
==6284==    by 0x687BA89: dissector_try_uint_new (packet.c:1153)
==6284==    by 0x687BA89: dissector_try_uint (packet.c:1179)
==6284==  Address 0x12fed3a0 is 0 bytes inside a block of size 79 free'd
==6284==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==6284==    by 0x7497131: wmem_simple_free_all (wmem_allocator_simple.c:107)
==6284==    by 0x7497F37: wmem_leave_packet_scope (wmem_scopes.c:81)
==6284==    by 0x414774: process_packet (tshark.c:3728)
==6284==    by 0x411D2D: load_cap_file (tshark.c:3484)
==6284==    by 0x411D2D: main (tshark.c:2197)
==6284== 
==6284== Invalid read of size 1
==6284==    at 0x4C2F1C8: strcmp (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==6284==    by 0x735A40C: dissect_x509af_T_subjectPublicKey (x509af.cnf:98)
==6284==    by 0x698AA8A: dissect_ber_sequence (packet-ber.c:2401)
==6284==    by 0x735922C: dissect_x509af_SubjectPublicKeyInfo (x509af.cnf:87)
==6284==    by 0x6C3D999: dissect_icmpv6_nd_opt (packet-icmpv6.c:1655)
==6284==    by 0x6C3BA4D: dissect_icmpv6 (packet-icmpv6.c:3745)
==6284==    by 0x687B9C4: call_dissector_through_handle (packet.c:619)
==6284==    by 0x687B9C4: call_dissector_work (packet.c:694)
==6284==    by 0x687B86E: dissector_try_uint_new (packet.c:1153)
==6284==    by 0x6C8650F: ip_try_dissect (packet-ip.c:1976)
==6284==    by 0x6CA6B92: dissect_ipv6 (packet-ipv6.c:2429)
==6284==    by 0x687B9C4: call_dissector_through_handle (packet.c:619)
==6284==    by 0x687B9C4: call_dissector_work (packet.c:694)
==6284==    by 0x687BA89: dissector_try_uint_new (packet.c:1153)
==6284==    by 0x687BA89: dissector_try_uint (packet.c:1179)
==6284==  Address 0x12fed3a1 is 1 bytes inside a block of size 79 free'd
==6284==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==6284==    by 0x7497131: wmem_simple_free_all (wmem_allocator_simple.c:107)
==6284==    by 0x7497F37: wmem_leave_packet_scope (wmem_scopes.c:81)
==6284==    by 0x414774: process_packet (tshark.c:3728)
==6284==    by 0x411D2D: load_cap_file (tshark.c:3484)
==6284==    by 0x411D2D: main (tshark.c:2197)
==6284== 
==6284== 
==6284== HEAP SUMMARY:
==6284==     in use at exit: 1,098,772 bytes in 30,320 blocks
==6284==   total heap usage: 244,872 allocs, 214,552 frees, 32,951,313 bytes
allocated
==6284== 
==6284== LEAK SUMMARY:
==6284==    definitely lost: 3,068 bytes in 129 blocks
==6284==    indirectly lost: 43,472 bytes in 52 blocks
==6284==      possibly lost: 0 bytes in 0 blocks
==6284==    still reachable: 1,052,232 bytes in 30,139 blocks
==6284==         suppressed: 0 bytes in 0 blocks
==6284== Rerun with --leak-check=full to see details of leaked memory
==6284== 
==6284== For counts of detected and suppressed errors, rerun with: -v
==6284== ERROR SUMMARY: 6 errors from 2 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.