ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 10937] New: Buildbot crash output: fuzz-2015-02-07-20407.p

Date: Sat, 07 Feb 2015 07:10:03 +0000
Bug ID 10937
Summary Buildbot crash output: fuzz-2015-02-07-20407.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2015-02-07-20407.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2015-02-07-20407.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/10606-9p.pcap.gz

Build host information:
Linux wsbb04 3.13.0-44-generic #73-Ubuntu SMP Tue Dec 16 00:22:43 UTC 2014
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.1 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_BUILDNUMBER=3135
BUILDBOT_URL=http://buildbot.wireshark.org/trunk/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=1fdc6f409fb6b8baa333d51a03a2d3c5a9b2ddb3

Return value:  0

Dissector bug:  0

Valgrind error count:  100



Git commit
commit 1fdc6f409fb6b8baa333d51a03a2d3c5a9b2ddb3
Author: Pascal Quantin <[email protected]>
Date:   Thu Feb 5 12:45:50 2015 +0100

    QNX6: avoid deferencing a null pointer

    Bug: 10920
    Change-Id: Ibf3539c188431d2514c523c094d1e2d86b77f0b5
    Reviewed-on: https://code.wireshark.org/review/6967
    Reviewed-by: Evan Huus <[email protected]>
    Petri-Dish: Pascal Quantin <[email protected]>
    Reviewed-by: Pascal Quantin <[email protected]>


Command and args: ./tools/valgrind-wireshark.sh 

==12269== Memcheck, a memory error detector
==12269== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==12269== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright
info
==12269== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-02-07-20407.pcap
==12269== 
==12269== Invalid read of size 1
==12269==    at 0x4C2E0E2: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x41337F: print_packet (tshark.c:3829)
==12269==    by 0x4139EA: process_packet (tshark.c:3633)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269==  Address 0x10cfdb70 is 0 bytes inside a block of size 80 free'd
==12269==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x725F2BC: wmem_simple_free_all (wmem_allocator_simple.c:107)
==12269==    by 0x725FF3B: wmem_leave_packet_scope (wmem_scopes.c:81)
==12269==    by 0x4136A3: process_packet (tshark.c:3619)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269== 
==12269== Invalid read of size 1
==12269==    at 0x4C2E0F4: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x41337F: print_packet (tshark.c:3829)
==12269==    by 0x4139EA: process_packet (tshark.c:3633)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269==  Address 0x10cfdb71 is 1 bytes inside a block of size 80 free'd
==12269==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x725F2BC: wmem_simple_free_all (wmem_allocator_simple.c:107)
==12269==    by 0x725FF3B: wmem_leave_packet_scope (wmem_scopes.c:81)
==12269==    by 0x4136A3: process_packet (tshark.c:3619)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269== 
==12269== Invalid read of size 2
==12269==    at 0x4C2F7E0: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x4133B3: print_packet (string3.h:51)
==12269==    by 0x4139EA: process_packet (tshark.c:3633)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269==  Address 0x10cfdb70 is 0 bytes inside a block of size 80 free'd
==12269==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x725F2BC: wmem_simple_free_all (wmem_allocator_simple.c:107)
==12269==    by 0x725FF3B: wmem_leave_packet_scope (wmem_scopes.c:81)
==12269==    by 0x4136A3: process_packet (tshark.c:3619)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269== 
==12269== Invalid read of size 2
==12269==    at 0x4C2F7EF: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x4133B3: print_packet (string3.h:51)
==12269==    by 0x4139EA: process_packet (tshark.c:3633)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269==  Address 0x10cfdb74 is 4 bytes inside a block of size 80 free'd
==12269==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x725F2BC: wmem_simple_free_all (wmem_allocator_simple.c:107)
==12269==    by 0x725FF3B: wmem_leave_packet_scope (wmem_scopes.c:81)
==12269==    by 0x4136A3: process_packet (tshark.c:3619)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269== 
==12269== Invalid read of size 1
==12269==    at 0x4C2F950: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x4133B3: print_packet (string3.h:51)
==12269==    by 0x4139EA: process_packet (tshark.c:3633)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269==  Address 0x13ed1860 is 0 bytes inside a block of size 80 free'd
==12269==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x725F2BC: wmem_simple_free_all (wmem_allocator_simple.c:107)
==12269==    by 0x725FF3B: wmem_leave_packet_scope (wmem_scopes.c:81)
==12269==    by 0x4136A3: process_packet (tshark.c:3619)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269== 
==12269== Invalid read of size 1
==12269==    at 0x4C2F95E: memcpy@@GLIBC_2.14 (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x4133B3: print_packet (string3.h:51)
==12269==    by 0x4139EA: process_packet (tshark.c:3633)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269==  Address 0x13ed1862 is 2 bytes inside a block of size 80 free'd
==12269==    at 0x4C2BDEC: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==12269==    by 0x725F2BC: wmem_simple_free_all (wmem_allocator_simple.c:107)
==12269==    by 0x725FF3B: wmem_leave_packet_scope (wmem_scopes.c:81)
==12269==    by 0x4136A3: process_packet (tshark.c:3619)
==12269==    by 0x40C849: main (tshark.c:3380)
==12269== 
==12269== 
==12269== HEAP SUMMARY:
==12269==     in use at exit: 1,225,389 bytes in 30,049 blocks
==12269==   total heap usage: 1,007,723 allocs, 977,674 frees, 65,995,502 bytes
allocated
==12269== 
==12269== LEAK SUMMARY:
==12269==    definitely lost: 7,512 bytes in 397 blocks
==12269==    indirectly lost: 36,968 bytes in 51 blocks
==12269==      possibly lost: 0 bytes in 0 blocks
==12269==    still reachable: 1,180,909 bytes in 29,601 blocks
==12269==         suppressed: 0 bytes in 0 blocks
==12269== Rerun with --leak-check=full to see details of leaked memory
==12269== 
==12269== For counts of detected and suppressed errors, rerun with: -v
==12269== ERROR SUMMARY: 100 errors from 6 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.