Wireshark-bugs: [Wireshark-bugs] [Bug 12886] New: Buildbot crash output: fuzz-2016-09-11-21126.p
Date: Mon, 12 Sep 2016 13:30:03 +0000
Bug ID | 12886 |
---|---|
Summary | Buildbot crash output: fuzz-2016-09-11-21126.pcap |
Product | Wireshark |
Version | unspecified |
Hardware | x86-64 |
URL | https://www.wireshark.org/download/automated/captures/fuzz-2016-09-11-21126.pcap |
OS | Ubuntu |
Status | CONFIRMED |
Severity | Major |
Priority | High |
Component | Dissection engine (libwireshark) |
Assignee | [email protected] |
Reporter | [email protected] |
Problems have been found with the following capture file: https://www.wireshark.org/download/automated/captures/fuzz-2016-09-11-21126.pcap stderr: Input file: /home/wireshark/menagerie/menagerie/9186-avrcp.log Build host information: Linux wsbb04 4.4.0-34-generic #53-Ubuntu SMP Wed Jul 27 16:06:39 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux Distributor ID: Ubuntu Description: Ubuntu 16.04.1 LTS Release: 16.04 Codename: xenial Buildbot information: BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark BUILDBOT_WORKERNAME=clang-code-analysis BUILDBOT_BUILDNUMBER=3685 BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/ BUILDBOT_BUILDERNAME=Clang Code Analysis BUILDBOT_GOT_REVISION=8629e60922e226665832f19aa698c8aff41eacef Return value: 1 Dissector bug: 0 Valgrind error count: 0 Git commit commit 8629e60922e226665832f19aa698c8aff41eacef Author: Guy Harris <[email protected]> Date: Sun Sep 11 13:48:35 2016 -0700 More signed vs. unsigned argument cleanups. Use the get.*guint32 routines to get unsigned values. Change-Id: I75e83b2d21bdf08c7c995e36e4deb3b1c6d6959d Reviewed-on: https://code.wireshark.org/review/17651 Reviewed-by: Guy Harris <[email protected]> ================================================================= ==5371==ERROR: AddressSanitizer: global-buffer-overflow on address 0x7fdf36c00b26 at pc 0x00000049478d bp 0x7ffdf8bfebd0 sp 0x7ffdf8bfe380 READ of size 7 at 0x7fdf36c00b26 thread T0 #0 0x49478c (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark+0x49478c) #1 0x7fdf352f40ed (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x7bf30ed) #2 0x7fdf352ea1e5 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x7be91e5) #3 0x7fdf34fe677c (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78e577c) #4 0x7fdf34fe45ec (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78e35ec) #5 0x7fdf352aefe6 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x7badfe6) #6 0x7fdf34fe677c (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78e577c) #7 0x7fdf34fe644a (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78e544a) #8 0x7fdf3567eb41 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x7f7db41) #9 0x7fdf34fe677c (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78e577c) #10 0x7fdf34fe644a (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78e544a) #11 0x7fdf35246119 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x7b45119) #12 0x7fdf34fe677c (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78e577c) #13 0x7fdf34fe644a (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78e544a) #14 0x7fdf3558fbbf (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x7e8ebbf) #15 0x7fdf34fe677c (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78e577c) #16 0x7fdf34fe45ec (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78e35ec) #17 0x7fdf34fe3dba (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78e2dba) #18 0x7fdf34fc9fae (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/lib/libwireshark.so.0+0x78c8fae) #19 0x50e664 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark+0x50e664) #20 0x508d35 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark+0x508d35) #21 0x7fdf2afb982f (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #22 0x4232d8 (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark+0x4232d8) 0x7fdf36c00b26 is located 58 bytes to the left of global variable '<string literal>' defined in 'packet-bluetooth.c:106:17' (0x7fdf36c00b60) of size 42 '<string literal>' is ascii string 'Service Discovery Server Service Class ID' 0x7fdf36c00b26 is located 0 bytes to the right of global variable '<string literal>' defined in 'packet-bluetooth.c:104:17' (0x7fdf36c00b20) of size 6 '<string literal>' is ascii string 'L2CAP' SUMMARY: AddressSanitizer: global-buffer-overflow (/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark+0x49478c) Shadow bytes around the buggy address: 0x0ffc66d78110: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 00 00 00 01 0x0ffc66d78120: f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 00 00 06 f9 0x0ffc66d78130: f9 f9 f9 f9 06 f9 f9 f9 f9 f9 f9 f9 06 f9 f9 f9 0x0ffc66d78140: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 00 04 f9 f9 0x0ffc66d78150: f9 f9 f9 f9 00 00 05 f9 f9 f9 f9 f9 00 00 02 f9 =>0x0ffc66d78160: f9 f9 f9 f9[06]f9 f9 f9 f9 f9 f9 f9 00 00 00 00 0x0ffc66d78170: 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 00 01 f9 f9 0x0ffc66d78180: f9 f9 f9 f9 00 00 04 f9 f9 f9 f9 f9 00 04 f9 f9 0x0ffc66d78190: f9 f9 f9 f9 00 00 05 f9 f9 f9 f9 f9 00 00 02 f9 0x0ffc66d781a0: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 00 00 01 f9 0x0ffc66d781b0: f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9 00 00 02 f9 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==5371==ABORTING [ no debug trace ]
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- [Wireshark-bugs] [Bug 12886] Buildbot crash output: fuzz-2016-09-11-21126.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 12886] Buildbot crash output: fuzz-2016-09-11-21126.pcap
- Prev by Date: [Wireshark-bugs] [Bug 12885] VTPv3 dissection
- Next by Date: [Wireshark-bugs] [Bug 12804] Version 2.0.5 maybe TLS dissector having problems. Single packet causes 200MB+ of memory usage
- Previous by thread: [Wireshark-bugs] [Bug 12885] VTPv3 dissection
- Next by thread: [Wireshark-bugs] [Bug 12886] Buildbot crash output: fuzz-2016-09-11-21126.pcap
- Index(es):