https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15446

            Bug ID: 15446
           Summary: Buildbot crash output: fuzz-2019-01-25-4370.pcap
           Product: Wireshark
           Version: unspecified
          Hardware: x86-64
                OS: Ubuntu
            Status: CONFIRMED
          Severity: Major
          Priority: High
         Component: Dissection engine (libwireshark)
          Assignee: bugzilla-ad...@wireshark.org
          Reporter: buildbot-do-not-re...@wireshark.org
  Target Milestone: ---

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2019-01-25-4370.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/10129-trc_00004_20130227111552

Build host information:
Linux wsbb04 4.15.0-43-generic #46-Ubuntu SMP Thu Dec 6 14:45:28 UTC 2018
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description:    Ubuntu 18.04.1 LTS
Release:        18.04
Codename:       bionic

Buildbot information:
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=4992
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_REPOSITORY=ssh://wireshark-build...@code.wireshark.org:29418/wireshark
BUILDBOT_GOT_REVISION=38ee25b3f51543f8dc885c9c601428986c200531

Return value:  0

Dissector bug:  0

Valgrind error count:  1



Git commit
commit 38ee25b3f51543f8dc885c9c601428986c200531
Author: Anders Broman <anders.bro...@ericsson.com>
Date:   Fri Jan 25 13:23:00 2019 +0100

    nas5gs: v15.2.1 Updates and corrections

    - Update the IE paragraph references
    - Don't dissect encrypted messages
    - Introuduce preference to force dissection of encrypted messages a
    s plain.
    - Fix idssection of Tracing area.
    - Dissect Replayed S1 UE security capabilities.

    Change-Id: If3dce4c34cbd72b1d8afd0079b81c719a7e94598
    Reviewed-on: https://code.wireshark.org/review/31730
    Petri-Dish: Anders Broman <a.broma...@gmail.com>
    Tested-by: Petri Dish Buildbot
    Reviewed-by: Anders Broman <a.broma...@gmail.com>


Command and args: ./tools/valgrind-wireshark.sh -b
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin
 
==16266== Memcheck, a memory error detector
==16266== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==16266== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info
==16266== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2019-01-25-4370.pcap
==16266== 
==16266== Conditional jump or move depends on uninitialised value(s)
==16266==    at 0xC98D106: ??? (in /lib/x86_64-linux-gnu/libgcrypt.so.20.2.1)
==16266==    by 0xC9855E4: ??? (in /lib/x86_64-linux-gnu/libgcrypt.so.20.2.1)
==16266==    by 0x76AC674: update_preauth_hash (packet-smb2.c:834)
==16266==    by 0x76A857F: dissect_smb2_session_setup_request
(packet-smb2.c:3163)
==16266==    by 0x76A6F3A: dissect_smb2_command (packet-smb2.c:9189)
==16266==    by 0x76A62BE: dissect_smb2 (packet-smb2.c:9543)
==16266==    by 0x76A2ED9: dissect_smb2_heur (packet-smb2.c:9598)
==16266==    by 0x816604F: dissector_try_heuristic (packet.c:2750)
==16266==    by 0x7332D74: dissect_netbios_payload (packet-nbt.c:1066)
==16266==    by 0x73332F6: dissect_nbss_packet (packet-nbt.c:1374)
==16266==    by 0x7330D35: dissect_nbss (packet-nbt.c:1674)
==16266==    by 0x8167D87: call_dissector_through_handle (packet.c:706)
==16266== 
==16266== Conditional jump or move depends on uninitialised value(s)
==16266==    at 0x4C366F2: memmove (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==16266==    by 0x76AC6E2: update_preauth_hash (packet-smb2.c:837)
==16266==    by 0x76A857F: dissect_smb2_session_setup_request
(packet-smb2.c:3163)
==16266==    by 0x76A6F3A: dissect_smb2_command (packet-smb2.c:9189)
==16266==    by 0x76A62BE: dissect_smb2 (packet-smb2.c:9543)
==16266==    by 0x76A2ED9: dissect_smb2_heur (packet-smb2.c:9598)
==16266==    by 0x816604F: dissector_try_heuristic (packet.c:2750)
==16266==    by 0x7332D74: dissect_netbios_payload (packet-nbt.c:1066)
==16266==    by 0x73332F6: dissect_nbss_packet (packet-nbt.c:1374)
==16266==    by 0x7330D35: dissect_nbss (packet-nbt.c:1674)
==16266==    by 0x8167D87: call_dissector_through_handle (packet.c:706)
==16266==    by 0x8163A59: call_dissector_work (packet.c:791)
==16266== 
==16266== Conditional jump or move depends on uninitialised value(s)
==16266==    at 0x4C36702: memmove (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==16266==    by 0x76AC6E2: update_preauth_hash (packet-smb2.c:837)
==16266==    by 0x76A857F: dissect_smb2_session_setup_request
(packet-smb2.c:3163)
==16266==    by 0x76A6F3A: dissect_smb2_command (packet-smb2.c:9189)
==16266==    by 0x76A62BE: dissect_smb2 (packet-smb2.c:9543)
==16266==    by 0x76A2ED9: dissect_smb2_heur (packet-smb2.c:9598)
==16266==    by 0x816604F: dissector_try_heuristic (packet.c:2750)
==16266==    by 0x7332D74: dissect_netbios_payload (packet-nbt.c:1066)
==16266==    by 0x73332F6: dissect_nbss_packet (packet-nbt.c:1374)
==16266==    by 0x7330D35: dissect_nbss (packet-nbt.c:1674)
==16266==    by 0x8167D87: call_dissector_through_handle (packet.c:706)
==16266==    by 0x8163A59: call_dissector_work (packet.c:791)
==16266== 
==16266== Use of uninitialised value of size 8
==16266==    at 0x4C367E3: memmove (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==16266==    by 0x76AC6E2: update_preauth_hash (packet-smb2.c:837)
==16266==    by 0x76A857F: dissect_smb2_session_setup_request
(packet-smb2.c:3163)
==16266==    by 0x76A6F3A: dissect_smb2_command (packet-smb2.c:9189)
==16266==    by 0x76A62BE: dissect_smb2 (packet-smb2.c:9543)
==16266==    by 0x76A2ED9: dissect_smb2_heur (packet-smb2.c:9598)
==16266==    by 0x816604F: dissector_try_heuristic (packet.c:2750)
==16266==    by 0x7332D74: dissect_netbios_payload (packet-nbt.c:1066)
==16266==    by 0x73332F6: dissect_nbss_packet (packet-nbt.c:1374)
==16266==    by 0x7330D35: dissect_nbss (packet-nbt.c:1674)
==16266==    by 0x8167D87: call_dissector_through_handle (packet.c:706)
==16266==    by 0x8163A59: call_dissector_work (packet.c:791)
==16266== 
==16266== Invalid write of size 8
==16266==    at 0x4C367E3: memmove (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==16266==    by 0x76AC6E2: update_preauth_hash (packet-smb2.c:837)
==16266==    by 0x76A857F: dissect_smb2_session_setup_request
(packet-smb2.c:3163)
==16266==    by 0x76A6F3A: dissect_smb2_command (packet-smb2.c:9189)
==16266==    by 0x76A62BE: dissect_smb2 (packet-smb2.c:9543)
==16266==    by 0x76A2ED9: dissect_smb2_heur (packet-smb2.c:9598)
==16266==    by 0x816604F: dissector_try_heuristic (packet.c:2750)
==16266==    by 0x7332D74: dissect_netbios_payload (packet-nbt.c:1066)
==16266==    by 0x73332F6: dissect_nbss_packet (packet-nbt.c:1374)
==16266==    by 0x7330D35: dissect_nbss (packet-nbt.c:1674)
==16266==    by 0x8167D87: call_dissector_through_handle (packet.c:706)
==16266==    by 0x8163A59: call_dissector_work (packet.c:791)
==16266==  Address 0x0 is not stack'd, malloc'd or (recently) free'd
==16266== 
==16266== 
==16266== Process terminating with default action of signal 11 (SIGSEGV):
dumping core
==16266==  Access not within mapped region at address 0x0
==16266==    at 0x4C367E3: memmove (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==16266==    by 0x76AC6E2: update_preauth_hash (packet-smb2.c:837)
==16266==    by 0x76A857F: dissect_smb2_session_setup_request
(packet-smb2.c:3163)
==16266==    by 0x76A6F3A: dissect_smb2_command (packet-smb2.c:9189)
==16266==    by 0x76A62BE: dissect_smb2 (packet-smb2.c:9543)
==16266==    by 0x76A2ED9: dissect_smb2_heur (packet-smb2.c:9598)
==16266==    by 0x816604F: dissector_try_heuristic (packet.c:2750)
==16266==    by 0x7332D74: dissect_netbios_payload (packet-nbt.c:1066)
==16266==    by 0x73332F6: dissect_nbss_packet (packet-nbt.c:1374)
==16266==    by 0x7330D35: dissect_nbss (packet-nbt.c:1674)
==16266==    by 0x8167D87: call_dissector_through_handle (packet.c:706)
==16266==    by 0x8163A59: call_dissector_work (packet.c:791)
==16266==  If you believe this happened as a result of a stack
==16266==  overflow in your program's main thread (unlikely but
==16266==  possible), you can try to increase the size of the
==16266==  main thread stack using the --main-stacksize= flag.
==16266==  The main thread stack size used in this run was 2084864.
==16266== 
==16266== HEAP SUMMARY:
==16266==     in use at exit: 27,879,642 bytes in 300,881 blocks
==16266==   total heap usage: 492,740 allocs, 191,859 frees, 46,713,124 bytes
allocated
==16266== 
==16266== LEAK SUMMARY:
==16266==    definitely lost: 0 bytes in 0 blocks
==16266==    indirectly lost: 0 bytes in 0 blocks
==16266==      possibly lost: 304 bytes in 1 blocks
==16266==    still reachable: 27,873,851 bytes in 300,795 blocks
==16266==         suppressed: 5,487 bytes in 85 blocks
==16266== Rerun with --leak-check=full to see details of leaked memory
==16266== 
==16266== For counts of detected and suppressed errors, rerun with: -v
==16266== Use --track-origins=yes to see where uninitialised values come from
==16266== ERROR SUMMARY: 5 errors from 5 contexts (suppressed: 0 from 0)

[ no debug trace ]

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to