Wireshark-bugs: [Wireshark-bugs] [Bug 8599] Buildbot crash output: fuzz-2013-04-20-29140.pcap

Date: Sat, 20 Apr 2013 21:05:58 +0000

changed bug 8599

What Removed Added
CC   [email protected]

Comment # 1 on bug 8599 from
==11865== Conditional jump or move depends on uninitialised value(s)
==11865==    at 0x63C1FA9: fragment_add_seq_common (reassemble.c:1826)
==11865==    by 0x63C21E5: fragment_add_seq_check_work (reassemble.c:1969)
==11865==    by 0x63C2897: fragment_add_seq_next (reassemble.c:2037)
==11865==    by 0x687AC2A: dissect_ositp_internal (packet-ositp.c:1186)
==11865==    by 0x63A39CE: call_dissector_through_handle (packet.c:454)
==11865==    by 0x63A41BC: call_dissector_work (packet.c:549)
==11865==    by 0x63A5F40: call_dissector_with_data (packet.c:2073)
==11865==    by 0x6A27A58: dissect_tpkt_encap (packet-tpkt.c:554)
==11865==    by 0x63A3987: call_dissector_through_handle (packet.c:458)
==11865==    by 0x63A41BC: call_dissector_work (packet.c:549)
==11865==    by 0x63A4A0F: dissector_try_uint_new (packet.c:966)
==11865==    by 0x63A4A66: dissector_try_uint (packet.c:992)
==11865== 
==11865== Conditional jump or move depends on uninitialised value(s)
==11865==    at 0x6B50F50: dissect_mms_MMSpdu (mms.cnf:46)
==11865==    by 0x6B5102F: dissect_mms (packet-mms-template.c:76)
==11865==    by 0x63A3987: call_dissector_through_handle (packet.c:458)
==11865==    by 0x63A41BC: call_dissector_work (packet.c:549)
==11865==    by 0x63A4CFE: dissector_try_string (packet.c:1225)
==11865==    by 0x64A3E01: call_ber_oid_callback (packet-ber.c:994)
==11865==    by 0x6BAA720: dissect_pres_T_single_ASN1_type (pres.cnf:44)
==11865==    by 0x649CE8B: dissect_ber_choice (packet-ber.c:3399)
==11865==    by 0x6BA976F: dissect_pres_T_presentation_data_values
(pres.cnf:101)
==11865==    by 0x64A2986: dissect_ber_sequence (packet-ber.c:2222)
==11865==    by 0x6BA942F: dissect_pres_PDV_list (pres.cnf:118)
==11865==    by 0x649FD28: dissect_ber_sq_of (packet-ber.c:4187)
==11865== 
==11865== Use of uninitialised value of size 8
==11865==    at 0x6B50F5D: dissect_mms_MMSpdu (mms.cnf:46)
==11865==    by 0x6B5102F: dissect_mms (packet-mms-template.c:76)
==11865==    by 0x63A3987: call_dissector_through_handle (packet.c:458)
==11865==    by 0x63A41BC: call_dissector_work (packet.c:549)
==11865==    by 0x63A4CFE: dissector_try_string (packet.c:1225)
==11865==    by 0x64A3E01: call_ber_oid_callback (packet-ber.c:994)
==11865==    by 0x6BAA720: dissect_pres_T_single_ASN1_type (pres.cnf:44)
==11865==    by 0x649CE8B: dissect_ber_choice (packet-ber.c:3399)
==11865==    by 0x6BA976F: dissect_pres_T_presentation_data_values
(pres.cnf:101)
==11865==    by 0x64A2986: dissect_ber_sequence (packet-ber.c:2222)
==11865==    by 0x6BA942F: dissect_pres_PDV_list (pres.cnf:118)
==11865==    by 0x649FD28: dissect_ber_sq_of (packet-ber.c:4187)
==11865== 
==11865== Conditional jump or move depends on uninitialised value(s)
==11865==    at 0x63C1FA9: fragment_add_seq_common (reassemble.c:1826)
==11865==    by 0x63C21E5: fragment_add_seq_check_work (reassemble.c:1969)
==11865==    by 0x63C2897: fragment_add_seq_next (reassemble.c:2037)
==11865==    by 0x68A15F8: dissect_pop (packet-pop.c:233)
==11865==    by 0x63A3987: call_dissector_through_handle (packet.c:458)
==11865==    by 0x63A41BC: call_dissector_work (packet.c:549)
==11865==    by 0x63A4A0F: dissector_try_uint_new (packet.c:966)
==11865==    by 0x63A4A66: dissector_try_uint (packet.c:992)
==11865==    by 0x6A070B6: decode_tcp_ports (packet-tcp.c:3950)
==11865==    by 0x6A074B1: process_tcp_payload (packet-tcp.c:4009)
==11865==    by 0x6A07A8C: dissect_tcp_payload (packet-tcp.c:1830)
==11865==    by 0x6A09459: dissect_tcp (packet-tcp.c:4869)


You are receiving this mail because:
  • You are watching all bug changes.