Wireshark-bugs: [Wireshark-bugs] [Bug 9263] Buildbot crash output: fuzz-2013-10-10-12811.pcap
Date: Fri, 11 Oct 2013 00:16:37 +0000

Comment # 2 on bug 9263 from
This is an interesting one, it looks like a wiretap issue of some sort...

==6351== Conditional jump or move depends on uninitialised value(s)
==6351==    at 0x64B6445: get_token_len (strutil.c:127)
==6351==    by 0x67FE50A: dissect_imap (packet-imap.c:216)
==6351==    by 0x648EF73: call_dissector_through_handle (packet.c:492)
==6351==    by 0x648F62F: call_dissector_work (packet.c:586)
==6351==    by 0x648FEEB: dissector_try_uint_new (packet.c:1017)
==6351==    by 0x648FF46: dissector_try_uint (packet.c:1043)
==6351==    by 0x6AEA696: decode_tcp_ports (packet-tcp.c:3867)
==6351==    by 0x6AEAAC1: process_tcp_payload (packet-tcp.c:3926)
==6351==    by 0x6AEB089: dissect_tcp_payload (packet-tcp.c:1751)
==6351==    by 0x6AECAE5: dissect_tcp (packet-tcp.c:4779)
==6351==    by 0x648EF73: call_dissector_through_handle (packet.c:492)
==6351==    by 0x648F62F: call_dissector_work (packet.c:586)
==6351==  Uninitialised value was created by a heap allocation
==6351==    at 0x4C2C6AE: realloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==6351==    by 0x94F7E5E: g_realloc (gmem.c:169)
==6351==    by 0x4E3E29F: buffer_assure_space (buffer.c:85)
==6351==    by 0x4E69DBF: wtap_read_packet_bytes (wtap.c:923)
==6351==    by 0x4E5DFC4: pcapng_read_packet_block.isra.5 (pcapng.c:1158)
==6351==    by 0x4E5EAF9: pcapng_read_block (pcapng.c:2067)
==6351==    by 0x4E5FE32: pcapng_read (pcapng.c:2301)
==6351==    by 0x4E69D21: wtap_read (wtap.c:875)
==6351==    by 0x40B412: main (tshark.c:3136)


You are receiving this mail because:
  • You are watching all bug changes.