[prev in list] [next in list] [prev in thread] [next in thread]
List: wireshark-bugs
Subject: [Wireshark-bugs] [Bug 16298] New: Buildbot crash output: fuzz-2019-12-26-1591.pcap
From: bugzilla-daemon () wireshark ! org
Date: 2019-12-26 5:10:03
Message-ID: bug-16298-15 () https ! bugs ! wireshark ! org/bugzilla/
[Download RAW message or body]
--15773370040.4eFb3BAaF.15861
Date: Thu, 26 Dec 2019 05:10:03 +0000
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16298
Bug ID: 16298
Summary: Buildbot crash output: fuzz-2019-12-26-1591.pcap
Product: Wireshark
Version: unspecified
Hardware: x86-64
OS: Ubuntu
Status: CONFIRMED
Severity: Major
Priority: High
Component: Dissection engine (libwireshark)
Assignee: bugzilla-admin@wireshark.org
Reporter: buildbot-do-not-reply@wireshark.org
Target Milestone: ---
Problems have been found with the following capture file:
https://www.wireshark.org/download/automated/captures/fuzz-2019-12-26-1591.pcap
stderr:
Input file: /home/wireshark/menagerie/menagerie/11933-whois_examples.pcapng
Build host information:
Linux build6 4.15.0-72-generic #81-Ubuntu SMP Tue Nov 26 12:20:02 UTC 2019
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 18.04.3 LTS
Release: 18.04
Codename: bionic
Buildbot information:
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=5169
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark
BUILDBOT_GOT_REVISION=b21276d9a06fdcef0babd39f5bcad9b70c23855a
Return value: 0
Dissector bug: 0
Valgrind error count: 8
Git commit
commit b21276d9a06fdcef0babd39f5bcad9b70c23855a
Author: dennisschagt <dennisschagt@gmail.com>
Date: Wed Dec 25 13:40:27 2019 +0100
Qt: Create directories recursively
Bug: 16143
Change-Id: Ibdd888157919315775637eb639158ea2e6cb26f0
Reviewed-on: https://code.wireshark.org/review/35561
Reviewed-by: Michael Mann <mmann78@netscape.net>
Petri-Dish: Michael Mann <mmann78@netscape.net>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <guy@alum.mit.edu>
Command and args: ./tools/valgrind-wireshark.sh -b
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin
==991== Memcheck, a memory error detector
==991== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==991== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info
==991== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2019-12-26-1591.pcap
==991==
==991== Invalid read of size 1
==991== at 0xC3FFD14: g_strlcat (in
/usr/lib/x86_64-linux-gnu/libglib-2.0.so.0.5600.4)
==991== by 0x82C8958: col_do_append_str (column-utils.c:832)
==991== by 0x82C8826: col_append_str (column-utils.c:843)
==991== by 0x7954813: dissect_whois (packet-whois.c:74)
==991== by 0x82EC5C7: call_dissector_through_handle (packet.c:706)
==991== by 0x82E814C: call_dissector_work (packet.c:799)
==991== by 0x82E7F27: dissector_try_uint_new (packet.c:1399)
==991== by 0x783C2F6: decode_tcp_ports (packet-tcp.c:5862)
==991== by 0x783DDD1: process_tcp_payload (packet-tcp.c:5931)
==991== by 0x783D471: desegment_tcp (packet-tcp.c:3359)
==991== by 0x783CB69: dissect_tcp_payload (packet-tcp.c:6004)
==991== by 0x78419A1: dissect_tcp (packet-tcp.c:6865)
==991== Address 0x194c185e is 0 bytes after a block of size 14 alloc'd
==991== at 0x4C2FB0F: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==991== by 0xC3E5AB8: g_malloc (in
/usr/lib/x86_64-linux-gnu/libglib-2.0.so.0.5600.4)
==991== by 0x82787D3: wmem_alloc (wmem_core.c:35)
==991== by 0x827B239: wmem_simple_alloc (wmem_allocator_simple.c:43)
==991== by 0x8278849: wmem_alloc (wmem_core.c:44)
==991== by 0x834947D: tvb_memdup (tvbuff.c:905)
==991== by 0x79547B3: dissect_whois (packet-whois.c:68)
==991== by 0x82EC5C7: call_dissector_through_handle (packet.c:706)
==991== by 0x82E814C: call_dissector_work (packet.c:799)
==991== by 0x82E7F27: dissector_try_uint_new (packet.c:1399)
==991== by 0x783C2F6: decode_tcp_ports (packet-tcp.c:5862)
==991== by 0x783DDD1: process_tcp_payload (packet-tcp.c:5931)
==991==
==991==
==991== HEAP SUMMARY:
==991== in use at exit: 43,134 bytes in 201 blocks
==991== total heap usage: 324,063 allocs, 323,862 frees, 40,112,178 bytes
allocated
==991==
==991== LEAK SUMMARY:
==991== definitely lost: 0 bytes in 0 blocks
==991== indirectly lost: 0 bytes in 0 blocks
==991== possibly lost: 304 bytes in 1 blocks
==991== still reachable: 42,027 bytes in 167 blocks
==991== suppressed: 803 bytes in 33 blocks
==991== Rerun with --leak-check=full to see details of leaked memory
==991==
==991== For counts of detected and suppressed errors, rerun with: -v
==991== ERROR SUMMARY: 8 errors from 1 contexts (suppressed: 0 from 0)
[ no debug trace ]
--
You are receiving this mail because:
You are watching all bug changes.
--15773370040.4eFb3BAaF.15861
Date: Thu, 26 Dec 2019 05:10:04 +0000
MIME-Version: 1.0
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Bugzilla-URL: https://bugs.wireshark.org/bugzilla/
Auto-Submitted: auto-generated
<html>
<head>
<base href="https://bugs.wireshark.org/bugzilla/" />
<style>
body, th, td {
font-size: 12px;
font-family: Arial, Helvetica, sans-serif; }
p, pre { margin-top: 1em; }
pre {
font-family: Bitstream Vera Sans Mono, Consolas, Lucida Console, \
monospace; white-space: pre-wrap;
}
table { border: 0; border-spacing: 0; border-collapse: collapse; }
th, td {
padding: 0.25em;
padding-left: 0.5em;
padding-right: 0.5em;
}
th { background: rgb(240, 240, 240); }
th.th_top { border-bottom: 1px solid rgb(116, 126, 147); }
th.th_left { border-right: 1px solid rgb(116, 126, 147); }
td.removed { background-color: #ffcccc; }
td.added { background-color: #e4ffc7; }
</style>
</head>
<body><table>
<tr>
<th class="th_left">Bug ID</th>
<td><a class="bz_bug_link
bz_status_CONFIRMED "
title="CONFIRMED - Buildbot crash output: fuzz-2019-12-26-1591.pcap"
href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16298">16298</a>
</td>
</tr>
<tr>
<th class="th_left">Summary</th>
<td>Buildbot crash output: fuzz-2019-12-26-1591.pcap
</td>
</tr>
<tr>
<th class="th_left">Product</th>
<td>Wireshark
</td>
</tr>
<tr>
<th class="th_left">Version</th>
<td>unspecified
</td>
</tr>
<tr>
<th class="th_left">Hardware</th>
<td>x86-64
</td>
</tr>
<tr>
<th class="th_left">OS</th>
<td>Ubuntu
</td>
</tr>
<tr>
<th class="th_left">Status</th>
<td>CONFIRMED
</td>
</tr>
<tr>
<th class="th_left">Severity</th>
<td>Major
</td>
</tr>
<tr>
<th class="th_left">Priority</th>
<td>High
</td>
</tr>
<tr>
<th class="th_left">Component</th>
<td>Dissection engine (libwireshark)
</td>
</tr>
<tr>
<th class="th_left">Assignee</th>
<td>bugzilla-admin@wireshark.org
</td>
</tr>
<tr>
<th class="th_left">Reporter</th>
<td>buildbot-do-not-reply@wireshark.org
</td>
</tr>
<tr>
<th class="th_left">Target Milestone</th>
<td>---
</td>
</tr></table>
<p>
<div>
<pre>Problems have been found with the following capture file:
<a href="https://www.wireshark.org/download/automated/captures/fuzz-2019-12-26-1591.pc \
ap">https://www.wireshark.org/download/automated/captures/fuzz-2019-12-26-1591.pcap</a>
stderr:
Input file: /home/wireshark/menagerie/menagerie/11933-whois_examples.pcapng
Build host information:
Linux build6 4.15.0-72-generic #81-Ubuntu SMP Tue Nov 26 12:20:02 UTC 2019
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 18.04.3 LTS
Release: 18.04
Codename: bionic
Buildbot information:
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=5169
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_URL=<a href="http://buildbot.wireshark.org/wireshark-master/">http://buildbot.wireshark.org/wireshark-master/</a>
BUILDBOT_REPOSITORY=ssh://<a \
href="mailto:wireshark-buildbot@code.wireshark.org">wireshark-buildbot@code.wireshark.org</a>:29418/wireshark
BUILDBOT_GOT_REVISION=b21276d9a06fdcef0babd39f5bcad9b70c23855a
Return value: 0
Dissector bug: 0
Valgrind error count: 8
Git commit
<a href="https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b21276d9a06fdcef0babd39f5bcad9b70c23855a">commit \
b21276d9a06fdcef0babd39f5bcad9b70c23855a</a>
Author: dennisschagt <<a \
href="mailto:dennisschagt@gmail.com">dennisschagt@gmail.com</a>>
Date: Wed Dec 25 13:40:27 2019 +0100
Qt: Create directories recursively
Bug: 16143
Change-Id: <a href="https://code.wireshark.org/review/#/q/Ibdd888157919315775637eb639158ea2e6cb26f0">Ibdd888157919315775637eb639158ea2e6cb26f0</a>
Reviewed-on: <a href="https://code.wireshark.org/review/35561">https://code.wireshark.org/review/35561</a>
Reviewed-by: Michael Mann <<a \
href="mailto:mmann78@netscape.net">mmann78@netscape.net</a>> Petri-Dish: \
Michael Mann <<a href="mailto:mmann78@netscape.net">mmann78@netscape.net</a>>
Tested-by: Petri Dish Buildbot
Reviewed-by: Guy Harris <<a \
href="mailto:guy@alum.mit.edu">guy@alum.mit.edu</a>>
Command and args: ./tools/valgrind-wireshark.sh -b
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin
==991== Memcheck, a memory error detector
==991== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==991== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info
==991== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2019-12-26-1591.pcap
==991==
==991== Invalid read of size 1
==991== at 0xC3FFD14: g_strlcat (in
/usr/lib/x86_64-linux-gnu/libglib-2.0.so.0.5600.4)
==991== by 0x82C8958: col_do_append_str (column-utils.c:832)
==991== by 0x82C8826: col_append_str (column-utils.c:843)
==991== by 0x7954813: dissect_whois (packet-whois.c:74)
==991== by 0x82EC5C7: call_dissector_through_handle (packet.c:706)
==991== by 0x82E814C: call_dissector_work (packet.c:799)
==991== by 0x82E7F27: dissector_try_uint_new (packet.c:1399)
==991== by 0x783C2F6: decode_tcp_ports (packet-tcp.c:5862)
==991== by 0x783DDD1: process_tcp_payload (packet-tcp.c:5931)
==991== by 0x783D471: desegment_tcp (packet-tcp.c:3359)
==991== by 0x783CB69: dissect_tcp_payload (packet-tcp.c:6004)
==991== by 0x78419A1: dissect_tcp (packet-tcp.c:6865)
==991== Address 0x194c185e is 0 bytes after a block of size 14 alloc'd
==991== at 0x4C2FB0F: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==991== by 0xC3E5AB8: g_malloc (in
/usr/lib/x86_64-linux-gnu/libglib-2.0.so.0.5600.4)
==991== by 0x82787D3: wmem_alloc (wmem_core.c:35)
==991== by 0x827B239: wmem_simple_alloc (wmem_allocator_simple.c:43)
==991== by 0x8278849: wmem_alloc (wmem_core.c:44)
==991== by 0x834947D: tvb_memdup (tvbuff.c:905)
==991== by 0x79547B3: dissect_whois (packet-whois.c:68)
==991== by 0x82EC5C7: call_dissector_through_handle (packet.c:706)
==991== by 0x82E814C: call_dissector_work (packet.c:799)
==991== by 0x82E7F27: dissector_try_uint_new (packet.c:1399)
==991== by 0x783C2F6: decode_tcp_ports (packet-tcp.c:5862)
==991== by 0x783DDD1: process_tcp_payload (packet-tcp.c:5931)
==991==
==991==
==991== HEAP SUMMARY:
==991== in use at exit: 43,134 bytes in 201 blocks
==991== total heap usage: 324,063 allocs, 323,862 frees, 40,112,178 bytes
allocated
==991==
==991== LEAK SUMMARY:
==991== definitely lost: 0 bytes in 0 blocks
==991== indirectly lost: 0 bytes in 0 blocks
==991== possibly lost: 304 bytes in 1 blocks
==991== still reachable: 42,027 bytes in 167 blocks
==991== suppressed: 803 bytes in 33 blocks
==991== Rerun with --leak-check=full to see details of leaked memory
==991==
==991== For counts of detected and suppressed errors, rerun with: -v
==991== ERROR SUMMARY: 8 errors from 1 contexts (suppressed: 0 from 0)
[ no debug trace ]</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>
--15773370040.4eFb3BAaF.15861--
[Attachment #3 (text/plain)]
___________________________________________________________________________
Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives: https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
mailto:wireshark-bugs-request@wireshark.org?subject=unsubscribe
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic