Wireshark-bugs: [Wireshark-bugs] [Bug 8409] APPCRASH in libglib-2.0-0.dll
Date: Thu, 28 Feb 2013 02:33:08 +0000
What | Removed | Added |
---|---|---|
Priority | Low | Medium |
Status | UNCONFIRMED | CONFIRMED |
Version | 1.8.5 | SVN |
Hardware | x86 | All |
CC | [email protected] | |
Ever confirmed | 1 | |
Severity | Normal | Major |
OS | Windows Server 2008 | All |
Comment # 2
on bug 8409
from Evan Huus
Valgrinding on trunk gives the following: ==16896== Conditional jump or move depends on uninitialised value(s) ==16896== at 0x695C578: get_unicode_or_ascii_string (packet-smb-common.c:240) ==16896== by 0x697CAD1: dissect_get_dfs_request_data (packet-smb.c:10874) ==16896== by 0x698E055: dissect_smb2_ioctl_data (packet-smb2.c:4444) ==16896== by 0x698CBEC: dissect_smb2_ioctl_request (packet-smb2.c:4556) ==16896== by 0x698B8CD: dissect_smb2 (packet-smb2.c:6429) ==16896== by 0x698C526: dissect_smb2_heur (packet-smb2.c:6850) ==16896== by 0x638063F: dissector_try_heuristic (packet.c:1801) ==16896== by 0x6805883: dissect_netbios_payload (packet-netbios.c:1060) ==16896== by 0x67D0735: dissect_nbss_packet (packet-nbns.c:1623) ==16896== by 0x67D090A: dissect_nbss (packet-nbns.c:1827) ==16896== by 0x637E7E7: call_dissector_through_handle (packet.c:455) ==16896== by 0x637F00C: call_dissector_work (packet.c:546) ==16896== Uninitialised value was created by a stack allocation ==16896== at 0x69CE057: dissect_tcp (packet-tcp.c:4096) ==16896== ==16896== Conditional jump or move depends on uninitialised value(s) ==16896== at 0x6831C10: dissect_ntlmssp_auth (packet-ntlmssp.c:1714) ==16896== by 0x6832D61: dissect_ntlmssp (packet-ntlmssp.c:2181) ==16896== by 0x637E7E7: call_dissector_through_handle (packet.c:455) ==16896== by 0x637F00C: call_dissector_work (packet.c:546) ==16896== by 0x6380D80: call_dissector_with_data (packet.c:2070) ==16896== by 0x6BF23BC: dissect_spnego_T_responseToken (spnego.cnf:206) ==16896== by 0x647E141: dissect_ber_sequence (packet-ber.c:2221) ==16896== by 0x6BF1FDF: dissect_spnego_NegTokenTarg (spnego.cnf:252) ==16896== by 0x647865B: dissect_ber_choice (packet-ber.c:3398) ==16896== by 0x6BF3C45: dissect_spnego (spnego.cnf:273) ==16896== by 0x637E7E7: call_dissector_through_handle (packet.c:455) ==16896== by 0x637F00C: call_dissector_work (packet.c:546) ==16896== Uninitialised value was created by a heap allocation ==16896== at 0x4C2CD7B: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==16896== by 0x9275CD0: g_malloc (gmem.c:159) ==16896== by 0x6372215: emem_alloc_glib (emem.c:862) ==16896== by 0x63725ED: emem_alloc (emem.c:877) ==16896== by 0x6832BFA: dissect_ntlmssp (packet-ntlmssp.c:1524) ==16896== by 0x637E7E7: call_dissector_through_handle (packet.c:455) ==16896== by 0x637F00C: call_dissector_work (packet.c:546) ==16896== by 0x6380D80: call_dissector_with_data (packet.c:2070) ==16896== by 0x6BF23BC: dissect_spnego_T_responseToken (spnego.cnf:206) ==16896== by 0x647E141: dissect_ber_sequence (packet-ber.c:2221) ==16896== by 0x6BF1FDF: dissect_spnego_NegTokenTarg (spnego.cnf:252) ==16896== by 0x647865B: dissect_ber_choice (packet-ber.c:3398) ==16896== ==16896== Conditional jump or move depends on uninitialised value(s) ==16896== at 0x695C578: get_unicode_or_ascii_string (packet-smb-common.c:240) ==16896== by 0x6964FEC: dissect_dfs_referral_strings (packet-smb.c:11486) ==16896== by 0x696D375: dissect_dfs_referral_entry_v3.part.18 (packet-smb.c:11505) ==16896== by 0x697D05E: dissect_get_dfs_referral_data (packet-smb.c:11796) ==16896== by 0x698E9A4: dissect_smb2_ioctl_data (packet-smb2.c:4446) ==16896== by 0x698C9A7: dissect_smb2_ioctl_response (packet-smb2.c:4617) ==16896== by 0x698B8CD: dissect_smb2 (packet-smb2.c:6429) ==16896== by 0x698C526: dissect_smb2_heur (packet-smb2.c:6850) ==16896== by 0x638063F: dissector_try_heuristic (packet.c:1801) ==16896== by 0x6805883: dissect_netbios_payload (packet-netbios.c:1060) ==16896== by 0x67D0735: dissect_nbss_packet (packet-nbns.c:1623) ==16896== by 0x67D090A: dissect_nbss (packet-nbns.c:1827) ==16896== Uninitialised value was created by a stack allocation ==16896== at 0x69CE057: dissect_tcp (packet-tcp.c:4096) ==16896== ==16896== Conditional jump or move depends on uninitialised value(s) ==16896== at 0x695C578: get_unicode_or_ascii_string (packet-smb-common.c:240) ==16896== by 0x6964FEC: dissect_dfs_referral_strings (packet-smb.c:11486) ==16896== by 0x696D326: dissect_dfs_referral_entry_v3.part.18 (packet-smb.c:11626) ==16896== by 0x697D05E: dissect_get_dfs_referral_data (packet-smb.c:11796) ==16896== by 0x698E9A4: dissect_smb2_ioctl_data (packet-smb2.c:4446) ==16896== by 0x698C9A7: dissect_smb2_ioctl_response (packet-smb2.c:4617) ==16896== by 0x698B8CD: dissect_smb2 (packet-smb2.c:6429) ==16896== by 0x698C526: dissect_smb2_heur (packet-smb2.c:6850) ==16896== by 0x638063F: dissector_try_heuristic (packet.c:1801) ==16896== by 0x6805883: dissect_netbios_payload (packet-netbios.c:1060) ==16896== by 0x67D0735: dissect_nbss_packet (packet-nbns.c:1623) ==16896== by 0x67D090A: dissect_nbss (packet-nbns.c:1827) ==16896== Uninitialised value was created by a stack allocation ==16896== at 0x69CE057: dissect_tcp (packet-tcp.c:4096)
You are receiving this mail because:
- You are watching all bug changes.
- References:
- [Wireshark-bugs] [Bug 8409] New: APPCRASH in libglib-2.0-0.dll
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 8409] New: APPCRASH in libglib-2.0-0.dll
- Prev by Date: [Wireshark-bugs] [Bug 8378] Decoding of GSM MAP SMS Diagnostics
- Next by Date: [Wireshark-bugs] [Bug 8409] APPCRASH in libglib-2.0-0.dll
- Previous by thread: [Wireshark-bugs] [Bug 8409] APPCRASH in libglib-2.0-0.dll
- Next by thread: [Wireshark-bugs] [Bug 8409] APPCRASH in libglib-2.0-0.dll
- Index(es):