Bug ID |
12447
|
Summary |
Buildbot crash output: fuzz-2016-05-15-10672.pcap
|
Product |
Wireshark
|
Version |
unspecified
|
Hardware |
x86-64
|
URL |
https://www.wireshark.org/download/automated/captures/fuzz-2016-05-15-10672.pcap
|
OS |
Ubuntu
|
Status |
CONFIRMED
|
Severity |
Major
|
Priority |
High
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Problems have been found with the following capture file:
https://www.wireshark.org/download/automated/captures/fuzz-2016-05-15-10672.pcap
stderr:
Input file:
/home/wireshark/menagerie/menagerie/14549-asan_heap-oob_4557e4_4089_48b71f6d4c1deccaae1d67a233556e69931a551c78d36c34.cap
Build host information:
Linux wsbb04 3.13.0-85-generic #129-Ubuntu SMP Thu Mar 17 20:50:15 UTC 2016
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 14.04.4 LTS
Release: 14.04
Codename: trusty
Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_BUILDNUMBER=129
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-2.0/
BUILDBOT_BUILDERNAME=Fuzz Test
BUILDBOT_SLAVENAME=fuzz-test
BUILDBOT_GOT_REVISION=2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7
Return value: 0
Dissector bug: 0
Valgrind error count: 1
Git commit
commit 2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7
Author: Guy Harris <[email protected]>
Date: Sat May 14 01:15:56 2016 -0700
The WTAP_ENCAP_ETHERNET dissector needs to be passed a struct eth_phdr.
We now require that. Make it so.
Bug: 12440
Change-Id: Iffee520976b013800699bde3c6092a3e86be0d76
Reviewed-on: https://code.wireshark.org/review/15424
Reviewed-by: Guy Harris <[email protected]>
Command and args: ./tools/valgrind-wireshark.sh
==12073== Memcheck, a memory error detector
==12073== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==12073== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
==12073== Command:
/home/wireshark/builders/wireshark-2.0-fuzz/fuzztest/install/bin/tshark -nr
/fuzz/buildbot/fuzztest/valgrind-fuzz-2.0/fuzz-2016-05-15-10672.pcap
==12073==
==12073== Conditional jump or move depends on uninitialised value(s)
==12073== at 0x68898BC: AirPDcapDecryptWPABroadcastKey (airpdcap.c:318)
==12073== by 0x6889E82: AirPDcapRsna4WHandshake (airpdcap.c:1405)
==12073== by 0x688A622: AirPDcapScanForKeys (airpdcap.c:564)
==12073== by 0x688A84F: AirPDcapPacketProcess (airpdcap.c:696)
==12073== by 0x6C07CC2: dissect_ieee80211_common (packet-ieee80211.c:17815)
==12073== by 0x6C09B15: dissect_ieee80211 (packet-ieee80211.c:18423)
==12073== by 0x684633E: call_dissector_through_handle (packet.c:618)
==12073== by 0x6846CD4: call_dissector_work (packet.c:706)
==12073== by 0x68474CB: dissector_try_uint_new (packet.c:1163)
==12073== by 0x6B1A0F5: dissect_frame (packet-frame.c:499)
==12073== by 0x684633E: call_dissector_through_handle (packet.c:618)
==12073== by 0x6846CD4: call_dissector_work (packet.c:706)
==12073==
==12073==
==12073== HEAP SUMMARY:
==12073== in use at exit: 1,039,567 bytes in 28,330 blocks
==12073== total heap usage: 239,349 allocs, 211,019 frees, 31,158,370 bytes
allocated
==12073==
==12073== LEAK SUMMARY:
==12073== definitely lost: 2,908 bytes in 125 blocks
==12073== indirectly lost: 36,448 bytes in 48 blocks
==12073== possibly lost: 0 bytes in 0 blocks
==12073== still reachable: 1,000,211 bytes in 28,157 blocks
==12073== suppressed: 0 bytes in 0 blocks
==12073== Rerun with --leak-check=full to see details of leaked memory
==12073==
==12073== For counts of detected and suppressed errors, rerun with: -v
==12073== Use --track-origins=yes to see where uninitialised values come from
==12073== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
[ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.