ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 11020] New: Buildbot crash output: fuzz-2015-02-28-6313.pc

Date: Sat, 28 Feb 2015 13:40:03 +0000
Bug ID 11020
Summary Buildbot crash output: fuzz-2015-02-28-6313.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2015-02-28-6313.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2015-02-28-6313.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/003transf.cap

Build host information:
Linux wsbb04 3.13.0-45-generic #74-Ubuntu SMP Tue Jan 13 19:36:28 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.2 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_BUILDNUMBER=3169
BUILDBOT_URL=http://buildbot.wireshark.org/trunk/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=1e66e74fa26a2bc29e0162a3a8740a66cbb5f55f

Return value:  0

Dissector bug:  0

Valgrind error count:  2



Git commit
commit 1e66e74fa26a2bc29e0162a3a8740a66cbb5f55f
Author: Dmitry Bazhenov <[email protected]>
Date:   Thu Feb 26 16:47:50 2015 +0500

    Add dissector for "Bad Password Threshold" IPMI LAN configuration
parameter.

    Add dissectors for IPv6-related IPMI LAN configuration parameters.

    Bug:11012
    Change-Id: I9b7380d2451acb6d68a03361e26dc3a6ebc129a0
    Reviewed-on: https://code.wireshark.org/review/7404
    Reviewed-by: Alexis La Goutte <[email protected]>
    Tested-by: Alexis La Goutte <[email protected]>
    Reviewed-by: Michael Mann <[email protected]>


Command and args: ./tools/valgrind-wireshark.sh 

==13676== Memcheck, a memory error detector
==13676== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==13676== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright
info
==13676== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-02-28-6313.pcap
==13676== 
==13676== Invalid read of size 1
==13676==    at 0x4C2E0E2: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==13676==    by 0x67010F8: ipx_to_str (address_types.c:409)
==13676==    by 0x67016F0: address_to_str (address_types.c:905)
==13676==    by 0x6AFDF9B: dissect_ipx (packet-ipx.c:350)
==13676==    by 0x6717333: call_dissector_through_handle (packet.c:614)
==13676==    by 0x6717D04: call_dissector_work (packet.c:700)
==13676==    by 0x671844B: dissector_try_uint_new (packet.c:1132)
==13676==    by 0x6718496: dissector_try_uint (packet.c:1158)
==13676==    by 0x6B76FB1: dissect_llc (packet-llc.c:501)
==13676==    by 0x6717333: call_dissector_through_handle (packet.c:614)
==13676==    by 0x6717D04: call_dissector_work (packet.c:700)
==13676==    by 0x6719981: call_dissector_with_data (packet.c:2386)
==13676==  Address 0x12883d36 is 0 bytes after a block of size 22 alloc'd
==13676==    at 0x4C2AB80: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==13676==    by 0x9C35610: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==13676==    by 0x726AD2B: wmem_simple_alloc (wmem_allocator_simple.c:55)
==13676==    by 0x67016DD: address_to_str (address_types.c:904)
==13676==    by 0x6AFDF9B: dissect_ipx (packet-ipx.c:350)
==13676==    by 0x6717333: call_dissector_through_handle (packet.c:614)
==13676==    by 0x6717D04: call_dissector_work (packet.c:700)
==13676==    by 0x671844B: dissector_try_uint_new (packet.c:1132)
==13676==    by 0x6718496: dissector_try_uint (packet.c:1158)
==13676==    by 0x6B76FB1: dissect_llc (packet-llc.c:501)
==13676==    by 0x6717333: call_dissector_through_handle (packet.c:614)
==13676==    by 0x6717D04: call_dissector_work (packet.c:700)
==13676== 
==13676== Invalid read of size 1
==13676==    at 0x4C2E0E2: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==13676==    by 0x67010F8: ipx_to_str (address_types.c:409)
==13676==    by 0x67016F0: address_to_str (address_types.c:905)
==13676==    by 0x6AFE006: dissect_ipx (packet-ipx.c:355)
==13676==    by 0x6717333: call_dissector_through_handle (packet.c:614)
==13676==    by 0x6717D04: call_dissector_work (packet.c:700)
==13676==    by 0x671844B: dissector_try_uint_new (packet.c:1132)
==13676==    by 0x6718496: dissector_try_uint (packet.c:1158)
==13676==    by 0x6B76FB1: dissect_llc (packet-llc.c:501)
==13676==    by 0x6717333: call_dissector_through_handle (packet.c:614)
==13676==    by 0x6717D04: call_dissector_work (packet.c:700)
==13676==    by 0x6719981: call_dissector_with_data (packet.c:2386)
==13676==  Address 0x12883d96 is 0 bytes after a block of size 22 alloc'd
==13676==    at 0x4C2AB80: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==13676==    by 0x9C35610: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4002.0)
==13676==    by 0x726AD2B: wmem_simple_alloc (wmem_allocator_simple.c:55)
==13676==    by 0x67016DD: address_to_str (address_types.c:904)
==13676==    by 0x6AFE006: dissect_ipx (packet-ipx.c:355)
==13676==    by 0x6717333: call_dissector_through_handle (packet.c:614)
==13676==    by 0x6717D04: call_dissector_work (packet.c:700)
==13676==    by 0x671844B: dissector_try_uint_new (packet.c:1132)
==13676==    by 0x6718496: dissector_try_uint (packet.c:1158)
==13676==    by 0x6B76FB1: dissect_llc (packet-llc.c:501)
==13676==    by 0x6717333: call_dissector_through_handle (packet.c:614)
==13676==    by 0x6717D04: call_dissector_work (packet.c:700)
==13676== 
==13676== 
==13676== HEAP SUMMARY:
==13676==     in use at exit: 1,221,229 bytes in 29,813 blocks
==13676==   total heap usage: 364,693 allocs, 334,880 frees, 34,875,704 bytes
allocated
==13676== 
==13676== LEAK SUMMARY:
==13676==    definitely lost: 3,320 bytes in 142 blocks
==13676==    indirectly lost: 36,968 bytes in 51 blocks
==13676==      possibly lost: 0 bytes in 0 blocks
==13676==    still reachable: 1,180,941 bytes in 29,620 blocks
==13676==         suppressed: 0 bytes in 0 blocks
==13676== Rerun with --leak-check=full to see details of leaked memory
==13676== 
==13676== For counts of detected and suppressed errors, rerun with: -v
==13676== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.