Wireshark-bugs: [Wireshark-bugs] [Bug 12102] New: Buildbot crash output: fuzz-2016-02-09-15665.p
Date: Tue, 09 Feb 2016 06:40:09 +0000
Bug ID | 12102 |
---|---|
Summary | Buildbot crash output: fuzz-2016-02-09-15665.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2016-02-09-15665.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2016-02-09-15665.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/13863-test_decript1.pcapng Build host information: Linux wsbb04 3.13.0-74-generic #118-Ubuntu SMP Thu Dec 17 22:52:10 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 14.04.3 LTS Release: 14.04 Codename: trusty Buildbot information: BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark BUILDBOT_BUILDNUMBER=3496 BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_SLAVENAME=clang-code-analysis BUILDBOT_GOT_REVISION=0af5ef3fce9f6eb72d4d45b4424a4f219f7cb976 Return value: 1 Dissector bug: 0 Valgrind error count: 0 Git commit commit 0af5ef3fce9f6eb72d4d45b4424a4f219f7cb976 Author: Gerald Combs <[email protected]> Date: Mon Feb 8 12:13:52 2016 -0800 QCP: Fix retina label calculations. The retina fixes in gb10bad1 and gb3f3d66 were incomplete and caused rendering problems in our axis labels. Handle the device pixel ratio in a couple of more places so that our axis rects are correctly sized. Add a switch (WS_ENABLE_DP_RATIO) to make it easy to turn scaling on and off. Change-Id: I633d94d633e0743be2a607c9a4cbb3409e9eed62 Ping-Bug: 11710 Reviewed-on: https://code.wireshark.org/review/13834 Petri-Dish: Gerald Combs <[email protected]> Tested-by: Petri Dish Buildbot <[email protected]> Reviewed-by: Gerald Combs <[email protected]> Command and args: /home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark -nVxr ================================================================= ==31518==ERROR: AddressSanitizer: global-buffer-overflow on address 0x7fc8d2dd4fb0 at pc 0x7fc8d10ce2a6 bp 0x7fffa382fbc0 sp 0x7fffa382fbb8 READ of size 4 at 0x7fc8d2dd4fb0 thread T0 #0 0x7fc8d10ce2a5 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x79902a5) #1 0x7fc8d0a6e9e1 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x73309e1) #2 0x7fc8d0a6cabc (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x732eabc) #3 0x7fc8d10d4347 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x7996347) #4 0x7fc8d0a6e9e1 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x73309e1) #5 0x7fc8d0a6e67a (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x733067a) #6 0x7fc8d0f9cfe5 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x785efe5) #7 0x7fc8d0a6e9e1 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x73309e1) #8 0x7fc8d0a6cabc (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x732eabc) #9 0x7fc8d0a6c2d8 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x732e2d8) #10 0x7fc8d0a4ca3e (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x730ea3e) #11 0x501145 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark+0x501145) #12 0x4fb96b (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark+0x4fb96b) #13 0x7fc8c637cec4 (/lib/x86_64-linux-gnu/libc.so.6+0x21ec4) #14 0x43fc26 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark+0x43fc26) 0x7fc8d2dd4fb0 is located 48 bytes to the left of global variable 'Nhteltf' defined in 'packet-ieee80211-radio.c:705:30' (0x7fc8d2dd4fe0) of size 16 0x7fc8d2dd4fb0 is located 0 bytes to the right of global variable 'Nhtdltf' defined in 'packet-ieee80211-radio.c:704:30' (0x7fc8d2dd4fa0) of size 16 Shadow bytes around the buggy address: 0x0ff99a5b29a0: 05 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 0x0ff99a5b29b0: 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 00 04 f9 f9 0x0ff99a5b29c0: f9 f9 f9 f9 00 03 f9 f9 f9 f9 f9 f9 00 01 f9 f9 0x0ff99a5b29d0: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 0x0ff99a5b29e0: f9 f9 f9 f9 03 f9 f9 f9 f9 f9 f9 f9 07 f9 f9 f9 =>0x0ff99a5b29f0: f9 f9 f9 f9 00 00[f9]f9 f9 f9 f9 f9 00 00 f9 f9 0x0ff99a5b2a00: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 05 f9 f9 0x0ff99a5b2a10: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 05 f9 f9 0x0ff99a5b2a20: f9 f9 f9 f9 06 f9 f9 f9 f9 f9 f9 f9 00 00 f9 f9 0x0ff99a5b2a30: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 0x0ff99a5b2a40: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==31518==ABORTING [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 12102] Buildbot crash output: fuzz-2016-02-09-15665.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12102] Buildbot crash output: fuzz-2016-02-09-15665.pcap
- Prev by Date: [Wireshark-bugs] [Bug 12099] MP2T Dissector does parse RTP properly in 2.0.1
- Next by Date: [Wireshark-bugs] [Bug 12063] Wireshark is decoding wrongly for long header format of DRTReq version zero message over GTPP
- Previous by thread: [Wireshark-bugs] [Bug 12101] Error dialog displayed when using context menu colorize conversation feature
- Next by thread: [Wireshark-bugs] [Bug 12102] Buildbot crash output: fuzz-2016-02-09-15665.pcap
- Index(es):