Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 9292] New: Buildbot crash output: fuzz-2013-10-19-7892.pca

Date: Sat, 19 Oct 2013 10:00:12 +0000
Bug ID 9292
Summary Buildbot crash output: fuzz-2013-10-19-7892.pcap
Classification Unclassified
Product Wireshark
Version unspecified
Hardware x86-64
URL http://www.wireshark.org/download/automated/captures/fuzz-2013-10-19-7892.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

http://www.wireshark.org/download/automated/captures/fuzz-2013-10-19-7892.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/03-13_los_altos.pcap

Build host information:
Linux wsbb04 3.2.0-49-generic #75-Ubuntu SMP Tue Jun 18 17:39:32 UTC 2013
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 12.04.2 LTS
Release:    12.04
Codename:    precise

Buildbot information:
BUILDBOT_REPOSITORY=http://code.wireshark.org/git/wireshark
BUILDBOT_BUILDNUMBER=2136
BUILDBOT_URL=http://buildbot.wireshark.org/trunk/
BUILDBOT_BUILDERNAME=Clang-Code-Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=744f47107e28a8632cf79fde901713f73fd0e349

Return value:  0

Dissector bug:  0

Valgrind error count:  744



Git commit
commit 744f47107e28a8632cf79fde901713f73fd0e349
Author: Tomas Kukosa <[email protected]>
Date:   Thu Oct 17 11:24:43 2013 +0000

    H.225.0: fix handling of compound parameters in Generic Extensible
Framework (H.460.22 did not work well)

    svn path=/trunk/; revision=52659


Command and args: ./tools/valgrind-wireshark.sh -T

==18934== Memcheck, a memory error detector
==18934== Copyright (C) 2002-2011, and GNU GPL'd, by Julian Seward et al.
==18934== Using Valgrind-3.7.0 and LibVEX; rerun with -h for copyright info
==18934== Command:
/home/wireshark/builders/trunk-clang-ca/clangcodeanalysis/install/bin/tshark
-Vx -nr
/fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2013-10-19-7892.pcap
==18934== 
==18934== Conditional jump or move depends on uninitialised value(s)
==18934==    at 0x4C2BFB8: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94F32D1: g_strdup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64D1BDA: string_fvalue_set (ftype-string.c:55)
==18934==    by 0x649BD77: proto_tree_add_string (proto.c:2442)
==18934==    by 0x649BE70: proto_tree_add_string_format (proto.c:2482)
==18934==    by 0x67CD418: dissect_http_message (packet-http.c:2433)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x6B3F0CE: decode_udp_ports (packet-udp.c:367)
==18934==    by 0x6B3F759: dissect (packet-udp.c:696)
==18934== 
==18934== Invalid read of size 1
==18934==    at 0x4C2BFB4: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94F32D1: g_strdup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64D1BDA: string_fvalue_set (ftype-string.c:55)
==18934==    by 0x649BD77: proto_tree_add_string (proto.c:2442)
==18934==    by 0x649BE70: proto_tree_add_string_format (proto.c:2482)
==18934==    by 0x67CD418: dissect_http_message (packet-http.c:2433)
==18934==    by 0x67CE4A8: dissect_http (packet-http.c:2704)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x6B0FE17: decode_tcp_ports (packet-tcp.c:3853)
==18934==  Address 0x10f6a56d is 0 bytes after a block of size 173 alloc'd
==18934==    at 0x4C2B6CD: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94DEA78: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64A76A9: fragment_add_work.isra.7 (reassemble.c:1064)
==18934==    by 0x64A7AA3: fragment_add_common (reassemble.c:1371)
==18934==    by 0x64A8287: fragment_add (reassemble.c:1391)
==18934==    by 0x6B125EE: dissect_tcp (packet-tcp.c:4686)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x681D62E: dissect_ip (packet-ip.c:2407)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934== 
==18934== Invalid read of size 1
==18934==    at 0x4C2D08F: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94F32EE: g_strdup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64D1BDA: string_fvalue_set (ftype-string.c:55)
==18934==    by 0x649BD77: proto_tree_add_string (proto.c:2442)
==18934==    by 0x649BE70: proto_tree_add_string_format (proto.c:2482)
==18934==    by 0x67CD418: dissect_http_message (packet-http.c:2433)
==18934==    by 0x67CE4A8: dissect_http (packet-http.c:2704)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x6B0FE17: decode_tcp_ports (packet-tcp.c:3853)
==18934==  Address 0x10f6a56d is 0 bytes after a block of size 173 alloc'd
==18934==    at 0x4C2B6CD: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94DEA78: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64A76A9: fragment_add_work.isra.7 (reassemble.c:1064)
==18934==    by 0x64A7AA3: fragment_add_common (reassemble.c:1371)
==18934==    by 0x64A8287: fragment_add (reassemble.c:1391)
==18934==    by 0x6B125EE: dissect_tcp (packet-tcp.c:4686)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x681D62E: dissect_ip (packet-ip.c:2407)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934== 
==18934== Invalid read of size 2
==18934==    at 0x4C2D060: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94F32EE: g_strdup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64D1BDA: string_fvalue_set (ftype-string.c:55)
==18934==    by 0x649BD77: proto_tree_add_string (proto.c:2442)
==18934==    by 0x649BE70: proto_tree_add_string_format (proto.c:2482)
==18934==    by 0x67CDBFD: dissect_http_message (packet-http.c:2369)
==18934==    by 0x67CE4A8: dissect_http (packet-http.c:2704)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x6B0FE17: decode_tcp_ports (packet-tcp.c:3853)
==18934==  Address 0x10f6a56c is 172 bytes inside a block of size 173 alloc'd
==18934==    at 0x4C2B6CD: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94DEA78: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64A76A9: fragment_add_work.isra.7 (reassemble.c:1064)
==18934==    by 0x64A7AA3: fragment_add_common (reassemble.c:1371)
==18934==    by 0x64A8287: fragment_add (reassemble.c:1391)
==18934==    by 0x6B125EE: dissect_tcp (packet-tcp.c:4686)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x681D62E: dissect_ip (packet-ip.c:2407)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934== 
==18934== Invalid read of size 1
==18934==    at 0x4C2D1A0: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94F32EE: g_strdup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64D1BDA: string_fvalue_set (ftype-string.c:55)
==18934==    by 0x649BD77: proto_tree_add_string (proto.c:2442)
==18934==    by 0x649BE70: proto_tree_add_string_format (proto.c:2482)
==18934==    by 0x67CD418: dissect_http_message (packet-http.c:2433)
==18934==    by 0x67CE4A8: dissect_http (packet-http.c:2704)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x6B0FE17: decode_tcp_ports (packet-tcp.c:3853)
==18934==  Address 0xec8fd0d is 0 bytes after a block of size 173 alloc'd
==18934==    at 0x4C2B6CD: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94DEA78: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64A76A9: fragment_add_work.isra.7 (reassemble.c:1064)
==18934==    by 0x64A7AA3: fragment_add_common (reassemble.c:1371)
==18934==    by 0x64A8287: fragment_add (reassemble.c:1391)
==18934==    by 0x6B125EE: dissect_tcp (packet-tcp.c:4686)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x681D62E: dissect_ip (packet-ip.c:2407)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934== 
==18934== Invalid read of size 2
==18934==    at 0x4C2D160: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94F32EE: g_strdup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64D1BDA: string_fvalue_set (ftype-string.c:55)
==18934==    by 0x649BD77: proto_tree_add_string (proto.c:2442)
==18934==    by 0x649BE70: proto_tree_add_string_format (proto.c:2482)
==18934==    by 0x67CD418: dissect_http_message (packet-http.c:2433)
==18934==    by 0x67CE4A8: dissect_http (packet-http.c:2704)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x6B0FE17: decode_tcp_ports (packet-tcp.c:3853)
==18934==  Address 0xec8fd0c is 172 bytes inside a block of size 173 alloc'd
==18934==    at 0x4C2B6CD: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94DEA78: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64A76A9: fragment_add_work.isra.7 (reassemble.c:1064)
==18934==    by 0x64A7AA3: fragment_add_common (reassemble.c:1371)
==18934==    by 0x64A8287: fragment_add (reassemble.c:1391)
==18934==    by 0x6B125EE: dissect_tcp (packet-tcp.c:4686)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x681D62E: dissect_ip (packet-ip.c:2407)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934== 
==18934== Invalid read of size 1
==18934==    at 0x4C2D1AD: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94F32EE: g_strdup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64D1BDA: string_fvalue_set (ftype-string.c:55)
==18934==    by 0x649BD77: proto_tree_add_string (proto.c:2442)
==18934==    by 0x649BE70: proto_tree_add_string_format (proto.c:2482)
==18934==    by 0x67CD418: dissect_http_message (packet-http.c:2433)
==18934==    by 0x67CE4A8: dissect_http (packet-http.c:2704)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x6B0FE17: decode_tcp_ports (packet-tcp.c:3853)
==18934==  Address 0x10281c4e is not stack'd, malloc'd or (recently) free'd
==18934== 
==18934== Invalid read of size 2
==18934==    at 0x4C2D050: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94F32EE: g_strdup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64D1BDA: string_fvalue_set (ftype-string.c:55)
==18934==    by 0x649BD77: proto_tree_add_string (proto.c:2442)
==18934==    by 0x649BE70: proto_tree_add_string_format (proto.c:2482)
==18934==    by 0x67CD418: dissect_http_message (packet-http.c:2433)
==18934==    by 0x67CE4A8: dissect_http (packet-http.c:2704)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x6B0FE17: decode_tcp_ports (packet-tcp.c:3853)
==18934==  Address 0x1152e77c is 172 bytes inside a block of size 173 alloc'd
==18934==    at 0x4C2B6CD: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94DEA78: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64A76A9: fragment_add_work.isra.7 (reassemble.c:1064)
==18934==    by 0x64A7AA3: fragment_add_common (reassemble.c:1371)
==18934==    by 0x64A8287: fragment_add (reassemble.c:1391)
==18934==    by 0x6B125EE: dissect_tcp (packet-tcp.c:4686)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x681D62E: dissect_ip (packet-ip.c:2407)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934== 
==18934== Invalid read of size 1
==18934==    at 0x4C2D080: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94F32EE: g_strdup (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64D1BDA: string_fvalue_set (ftype-string.c:55)
==18934==    by 0x649BD77: proto_tree_add_string (proto.c:2442)
==18934==    by 0x649BE70: proto_tree_add_string_format (proto.c:2482)
==18934==    by 0x67CD418: dissect_http_message (packet-http.c:2433)
==18934==    by 0x67CE4A8: dissect_http (packet-http.c:2704)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x6B0FE17: decode_tcp_ports (packet-tcp.c:3853)
==18934==  Address 0x10675fec is 0 bytes after a block of size 172 alloc'd
==18934==    at 0x4C2B6CD: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==18934==    by 0x94DEA78: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.3200.3)
==18934==    by 0x64A76A9: fragment_add_work.isra.7 (reassemble.c:1064)
==18934==    by 0x64A7AA3: fragment_add_common (reassemble.c:1371)
==18934==    by 0x64A8287: fragment_add (reassemble.c:1391)
==18934==    by 0x6B125EE: dissect_tcp (packet-tcp.c:4686)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934==    by 0x648A094: call_dissector_work (packet.c:613)
==18934==    by 0x648AA42: dissector_try_uint_new (packet.c:1044)
==18934==    by 0x648AA96: dissector_try_uint (packet.c:1070)
==18934==    by 0x681D62E: dissect_ip (packet-ip.c:2407)
==18934==    by 0x6489747: call_dissector_through_handle (packet.c:519)
==18934== 
==18934== 
==18934== HEAP SUMMARY:
==18934==     in use at exit: 508,347 bytes in 8,263 blocks
==18934==   total heap usage: 8,936,628 allocs, 8,928,365 frees, 818,345,389
bytes allocated
==18934== 
==18934== LEAK SUMMARY:
==18934==    definitely lost: 7,764 bytes in 1,514 blocks
==18934==    indirectly lost: 1,224 bytes in 40 blocks
==18934==      possibly lost: 0 bytes in 0 blocks
==18934==    still reachable: 499,359 bytes in 6,709 blocks
==18934==         suppressed: 0 bytes in 0 blocks
==18934== Rerun with --leak-check=full to see details of leaked memory
==18934== 
==18934== For counts of detected and suppressed errors, rerun with: -v
==18934== Use --track-origins=yes to see where uninitialised values come from
==18934== ERROR SUMMARY: 744 errors from 9 contexts (suppressed: 15 from 5)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.