Evan Huus
changed
bug 9268
Comment # 1
on bug 9268
from Evan Huus
The original problems all appear fixed, but I'm seeing others in the OID code:
==8628== Use of uninitialised value of size 8
==8628== at 0xA16C5AB: _itoa_word (_itoa.c:179)
==8628== by 0xA170AE1: vfprintf (vfprintf.c:1654)
==8628== by 0xA2336BF: __vsnprintf_chk (vsnprintf_chk.c:63)
==8628== by 0x9534B21: g_snprintf (gprintf.c:162)
==8628== by 0x648CEAB: rel_oid_subid2string (oids.c:847)
==8628== by 0x648DB64: oid_encoded2string (oids.c:1097)
==8628== by 0x6589658: dissect_ber_any_oid_str (packet-ber.c:3927)
==8628== by 0x65896E9: dissect_ber_object_identifier_str (packet-ber.c:3961)
==8628== by 0x6D1BDB6: dissect_spnego_MechType (spnego.cnf:26)
==8628== by 0x6D1C257: dissect_spnego_T_supportedMech (spnego.cnf:169)
==8628== by 0x6586A56: dissect_ber_sequence (packet-ber.c:2234)
==8628== by 0x6D1BACF: dissect_spnego_NegTokenTarg (spnego.cnf:252)
==8628==
==8628== Conditional jump or move depends on uninitialised value(s)
==8628== at 0xA16C5B5: _itoa_word (_itoa.c:179)
==8628== by 0xA170AE1: vfprintf (vfprintf.c:1654)
==8628== by 0xA2336BF: __vsnprintf_chk (vsnprintf_chk.c:63)
==8628== by 0x9534B21: g_snprintf (gprintf.c:162)
==8628== by 0x648CEAB: rel_oid_subid2string (oids.c:847)
==8628== by 0x648DB64: oid_encoded2string (oids.c:1097)
==8628== by 0x6589658: dissect_ber_any_oid_str (packet-ber.c:3927)
==8628== by 0x65896E9: dissect_ber_object_identifier_str (packet-ber.c:3961)
==8628== by 0x6D1BDB6: dissect_spnego_MechType (spnego.cnf:26)
==8628== by 0x6D1C257: dissect_spnego_T_supportedMech (spnego.cnf:169)
==8628== by 0x6586A56: dissect_ber_sequence (packet-ber.c:2234)
==8628== by 0x6D1BACF: dissect_spnego_NegTokenTarg (spnego.cnf:252)
You are receiving this mail because:
- You are watching all bug changes.