Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 11669] New: Buildbot crash output: fuzz-2015-11-02-10327.p

Date: Mon, 02 Nov 2015 17:10:02 +0000
Bug ID 11669
Summary Buildbot crash output: fuzz-2015-11-02-10327.pcap
Product Wireshark
Version unspecified
Hardware x86-64
URL https://www.wireshark.org/download/automated/captures/fuzz-2015-11-02-10327.pcap
OS Ubuntu
Status CONFIRMED
Severity Major
Priority High
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2015-11-02-10327.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/10685-wnm-sleepmode.pcap

Build host information:
Linux wsbb04 3.13.0-66-generic #108-Ubuntu SMP Wed Oct 7 15:20:27 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID:    Ubuntu
Description:    Ubuntu 14.04.3 LTS
Release:    14.04
Codename:    trusty

Buildbot information:
BUILDBOT_REPOSITORY=ssh://[email protected]:29418/wireshark
BUILDBOT_BUILDNUMBER=3351
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_SLAVENAME=clang-code-analysis
BUILDBOT_GOT_REVISION=9180c27c5e47ce4fc8f92113c9e51a5b7294da9b

Return value:  0

Dissector bug:  0

Valgrind error count:  24



Git commit
commit 9180c27c5e47ce4fc8f92113c9e51a5b7294da9b
Author: Martin Kaiser <[email protected]>
Date:   Fri Oct 30 19:53:21 2015 +0100

    [ssh] don't THROW() an exception from a dissector

    Change-Id: Ibdbdcf59d7d7d28a812e31c7d7b2123b035f80fa
    Reviewed-on: https://code.wireshark.org/review/11461
    Reviewed-by: Martin Kaiser <[email protected]>


Command and args: ./tools/valgrind-wireshark.sh 

==9464== Memcheck, a memory error detector
==9464== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==9464== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info
==9464== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2015-11-02-10327.pcap
==9464== 
==9464== Use of uninitialised value of size 8
==9464==    at 0x9B6352A: rijndael_decrypt (aes.c:1083)
==9464==    by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79)
==9464==    by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400)
==9464==    by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428)
==9464==    by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711)
==9464==    by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==9464==    by 0x681053D: call_dissector_work (packet.c:620)
==9464== 
==9464== Use of uninitialised value of size 8
==9464==    at 0x9B63538: rijndael_decrypt (aes.c:1083)
==9464==    by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79)
==9464==    by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400)
==9464==    by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428)
==9464==    by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711)
==9464==    by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==9464==    by 0x681053D: call_dissector_work (packet.c:620)
==9464== 
==9464== Use of uninitialised value of size 8
==9464==    at 0x9B6354D: rijndael_decrypt (aes.c:1080)
==9464==    by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79)
==9464==    by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400)
==9464==    by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428)
==9464==    by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711)
==9464==    by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==9464==    by 0x681053D: call_dissector_work (packet.c:620)
==9464== 
==9464== Use of uninitialised value of size 8
==9464==    at 0x9B63583: rijndael_decrypt (aes.c:1080)
==9464==    by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79)
==9464==    by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400)
==9464==    by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428)
==9464==    by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711)
==9464==    by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==9464==    by 0x681053D: call_dissector_work (packet.c:620)
==9464== 
==9464== Use of uninitialised value of size 8
==9464==    at 0x9B6358F: rijndael_decrypt (aes.c:1081)
==9464==    by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79)
==9464==    by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400)
==9464==    by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428)
==9464==    by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711)
==9464==    by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==9464==    by 0x681053D: call_dissector_work (packet.c:620)
==9464== 
==9464== Use of uninitialised value of size 8
==9464==    at 0x9B635A8: rijndael_decrypt (aes.c:1081)
==9464==    by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79)
==9464==    by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400)
==9464==    by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428)
==9464==    by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711)
==9464==    by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==9464==    by 0x681053D: call_dissector_work (packet.c:620)
==9464== 
==9464== Use of uninitialised value of size 8
==9464==    at 0x9B635BE: rijndael_decrypt (aes.c:1082)
==9464==    by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79)
==9464==    by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400)
==9464==    by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428)
==9464==    by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711)
==9464==    by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==9464==    by 0x681053D: call_dissector_work (packet.c:620)
==9464== 
==9464== Use of uninitialised value of size 8
==9464==    at 0x9B635D3: rijndael_decrypt (aes.c:1082)
==9464==    by 0x685C2A7: AES_unwrap (airpdcap_rijndael.c:79)
==9464==    by 0x685B831: AirPDcapDecryptWPABroadcastKey (airpdcap.c:400)
==9464==    by 0x685AA84: AirPDcapScanForKeys (airpdcap.c:1428)
==9464==    by 0x6BE8F0E: dissect_ieee80211_common (packet-ieee80211.c:17711)
==9464==    by 0x6BE5F75: dissect_ieee80211 (packet-ieee80211.c:18318)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x681051F: call_dissector_work (packet.c:618)
==9464==    by 0x680FADC: call_dissector_with_data (packet.c:2549)
==9464==    by 0x6BD514B: dissect_radiotap (packet-ieee80211-radiotap.c:1801)
==9464==    by 0x681053D: call_dissector_work (packet.c:620)
==9464== 
==9464== 
==9464== HEAP SUMMARY:
==9464==     in use at exit: 1,037,706 bytes in 28,230 blocks
==9464==   total heap usage: 236,942 allocs, 208,712 frees, 31,404,051 bytes
allocated
==9464== 
==9464== LEAK SUMMARY:
==9464==    definitely lost: 2,908 bytes in 125 blocks
==9464==    indirectly lost: 36,448 bytes in 48 blocks
==9464==      possibly lost: 0 bytes in 0 blocks
==9464==    still reachable: 998,350 bytes in 28,057 blocks
==9464==         suppressed: 0 bytes in 0 blocks
==9464== Rerun with --leak-check=full to see details of leaked memory
==9464== 
==9464== For counts of detected and suppressed errors, rerun with: -v
==9464== Use --track-origins=yes to see where uninitialised values come from
==9464== ERROR SUMMARY: 24 errors from 8 contexts (suppressed: 0 from 0)

[ no debug trace ]


You are receiving this mail because:
  • You are watching all bug changes.