Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 9268] Buildbot crash output: fuzz-2013-10-12-19881.pcap

Date: Tue, 15 Oct 2013 12:22:46 +0000

changed bug 9268

What Removed Added
CC   [email protected]

Comment # 1 on bug 9268 from
The original problems all appear fixed, but I'm seeing others in the OID code:

==8628== Use of uninitialised value of size 8
==8628==    at 0xA16C5AB: _itoa_word (_itoa.c:179)
==8628==    by 0xA170AE1: vfprintf (vfprintf.c:1654)
==8628==    by 0xA2336BF: __vsnprintf_chk (vsnprintf_chk.c:63)
==8628==    by 0x9534B21: g_snprintf (gprintf.c:162)
==8628==    by 0x648CEAB: rel_oid_subid2string (oids.c:847)
==8628==    by 0x648DB64: oid_encoded2string (oids.c:1097)
==8628==    by 0x6589658: dissect_ber_any_oid_str (packet-ber.c:3927)
==8628==    by 0x65896E9: dissect_ber_object_identifier_str (packet-ber.c:3961)
==8628==    by 0x6D1BDB6: dissect_spnego_MechType (spnego.cnf:26)
==8628==    by 0x6D1C257: dissect_spnego_T_supportedMech (spnego.cnf:169)
==8628==    by 0x6586A56: dissect_ber_sequence (packet-ber.c:2234)
==8628==    by 0x6D1BACF: dissect_spnego_NegTokenTarg (spnego.cnf:252)
==8628== 
==8628== Conditional jump or move depends on uninitialised value(s)
==8628==    at 0xA16C5B5: _itoa_word (_itoa.c:179)
==8628==    by 0xA170AE1: vfprintf (vfprintf.c:1654)
==8628==    by 0xA2336BF: __vsnprintf_chk (vsnprintf_chk.c:63)
==8628==    by 0x9534B21: g_snprintf (gprintf.c:162)
==8628==    by 0x648CEAB: rel_oid_subid2string (oids.c:847)
==8628==    by 0x648DB64: oid_encoded2string (oids.c:1097)
==8628==    by 0x6589658: dissect_ber_any_oid_str (packet-ber.c:3927)
==8628==    by 0x65896E9: dissect_ber_object_identifier_str (packet-ber.c:3961)
==8628==    by 0x6D1BDB6: dissect_spnego_MechType (spnego.cnf:26)
==8628==    by 0x6D1C257: dissect_spnego_T_supportedMech (spnego.cnf:169)
==8628==    by 0x6586A56: dissect_ber_sequence (packet-ber.c:2234)
==8628==    by 0x6D1BACF: dissect_spnego_NegTokenTarg (spnego.cnf:252)


You are receiving this mail because:
  • You are watching all bug changes.