Wireshark-bugs: [Wireshark-bugs] [Bug 12034] New: "Conditional jump or move depends on uninitial
Date: Tue, 19 Jan 2016 20:35:03 +0000
| Bug ID | 12034 |
|---|---|
| Summary | "Conditional jump or move depends on uninitialised value(s)" in HTTP reassembly |
| Product | Wireshark |
| Version | 2.0.1 |
| Hardware | x86-64 |
| OS | Ubuntu |
| Status | CONFIRMED |
| Severity | Major |
| Priority | Low |
| Component | Dissection engine (libwireshark) |
| Assignee | bugzilla-admin@wireshark.org |
| Reporter | guy@alum.mit.edu |
Build Information:
Git 8458a0c1bba27819ba3af23abfb7c88132d92043 on the 2.0 buildbot.
--
Running ./tools/valgrind-wireshark.sh -b
/home/wireshark/builders/wireshark-2.0-fuzz/fuzztest/install/bin with args: ""
"-T" (1 passes)
Starting pass 1:
/home/wireshark/menagerie/menagerie/0000.cap: () (-T) OK
/home/wireshark/menagerie/menagerie/0001.txt.10: Not a valid capture file
/home/wireshark/menagerie/menagerie/0001.txt.147: Not a valid capture file
/home/wireshark/menagerie/menagerie/0001.txt.40: () (-T) OK
/home/wireshark/menagerie/menagerie/0001.txt.6: () (-T) OK
/home/wireshark/menagerie/menagerie/0001.txt.743: () (-T) OK
/home/wireshark/menagerie/menagerie/001349.cap: ()
ERROR
Processing failed. Capture info follows:
Input file: /home/wireshark/menagerie/menagerie/001349.cap
Output file:
/fuzz/buildbot/fuzztest/valgrind-fuzz-2.0/fuzz-2016-01-19-31758.pcap
stderr follows:
Input file: /home/wireshark/menagerie/menagerie/001349.cap
Build host information:
Linux wsbb04 3.13.0-74-generic #118-Ubuntu SMP Thu Dec 17 22:52:10 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 14.04.3 LTS
Release: 14.04
Codename: trusty
Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-buildbot@code.wireshark.org:29418/wireshark
BUILDBOT_BUILDNUMBER=62
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-2.0/
BUILDBOT_BUILDERNAME=Fuzz Test
BUILDBOT_SLAVENAME=fuzz-test
BUILDBOT_GOT_REVISION=8458a0c1bba27819ba3af23abfb7c88132d92043
Return value: 0
Dissector bug: 0
Valgrind error count: 11
Git commit
commit 8458a0c1bba27819ba3af23abfb7c88132d92043
Author: João Valverde <joao.valverde@tecnico.ulisboa.pt>
Date: Mon Jan 18 17:06:39 2016 +0000
Fix "Apply As Filter..." for BASE_PT field display types
Change-Id: Id92c16d04836b7871a26a285bee5bcf358ca50ef
Reviewed-on: https://code.wireshark.org/review/13399
Reviewed-by: João Valverde <j@v6e.pt>
(cherry picked from commit 69e80c4d87a259c09721198aecd62a7fdb2f4f7e)
Reviewed-on: https://code.wireshark.org/review/13402
Command and args: ./tools/valgrind-wireshark.sh
==1615== Memcheck, a memory error detector
==1615== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==1615== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
==1615== Command:
/home/wireshark/builders/wireshark-2.0-fuzz/fuzztest/install/bin/tshark -nr
/fuzz/buildbot/fuzztest/valgrind-fuzz-2.0/fuzz-2016-01-19-31758.pcap
==1615==
==1615== Conditional jump or move depends on uninitialised value(s)
==1615== at 0x68648EA: req_resp_hdrs_do_reassembly (req_resp_hdrs.c:148)
==1615== by 0x6BC04FF: dissect_http_message (packet-http.c:810)
==1615== by 0x6BC28FE: dissect_http (packet-http.c:2951)
==1615== by 0x6840A0E: call_dissector_through_handle (packet.c:618)
==1615== by 0x68413A4: call_dissector_work (packet.c:706)
==1615== by 0x6841B9B: dissector_try_uint_new (packet.c:1163)
==1615== by 0x6F8B505: decode_tcp_ports (packet-tcp.c:4622)
==1615== by 0x6F8B8BE: process_tcp_payload (packet-tcp.c:4680)
==1615== by 0x6F8BEA5: desegment_tcp (packet-tcp.c:2270)
==1615== by 0x6F8BEA5: dissect_tcp_payload (packet-tcp.c:4747)
==1615== by 0x6F8DBDB: dissect_tcp (packet-tcp.c:5602)
==1615== by 0x68409D3: call_dissector_through_handle (packet.c:620)
==1615== by 0x68413A4: call_dissector_work (packet.c:706)
==1615==
==1615== Conditional jump or move depends on uninitialised value(s)
==1615== at 0x686498F: req_resp_hdrs_do_reassembly (req_resp_hdrs.c:228)
==1615== by 0x6BC04FF: dissect_http_message (packet-http.c:810)
==1615== by 0x6BC28FE: dissect_http (packet-http.c:2951)
==1615== by 0x6840A0E: call_dissector_through_handle (packet.c:618)
==1615== by 0x68413A4: call_dissector_work (packet.c:706)
==1615== by 0x6841B9B: dissector_try_uint_new (packet.c:1163)
==1615== by 0x6F8B505: decode_tcp_ports (packet-tcp.c:4622)
==1615== by 0x6F8B8BE: process_tcp_payload (packet-tcp.c:4680)
==1615== by 0x6F8BEA5: desegment_tcp (packet-tcp.c:2270)
==1615== by 0x6F8BEA5: dissect_tcp_payload (packet-tcp.c:4747)
==1615== by 0x6F8DBDB: dissect_tcp (packet-tcp.c:5602)
==1615== by 0x68409D3: call_dissector_through_handle (packet.c:620)
==1615== by 0x68413A4: call_dissector_work (packet.c:706)
==1615==
==1615==
==1615== HEAP SUMMARY:
==1615== in use at exit: 1,039,793 bytes in 28,333 blocks
==1615== total heap usage: 238,029 allocs, 209,696 frees, 31,116,685 bytes
allocated
==1615==
==1615== LEAK SUMMARY:
==1615== definitely lost: 2,908 bytes in 125 blocks
==1615== indirectly lost: 36,448 bytes in 48 blocks
==1615== possibly lost: 0 bytes in 0 blocks
==1615== still reachable: 1,000,437 bytes in 28,160 blocks
==1615== suppressed: 0 bytes in 0 blocks
==1615== Rerun with --leak-check=full to see details of leaked memory
==1615==
==1615== For counts of detected and suppressed errors, rerun with: -v
==1615== Use --track-origins=yes to see where uninitialised values come from
==1615== ERROR SUMMARY: 11 errors from 2 contexts (suppressed: 0 from 0)
You are receiving this mail because:
- You are watching all bug changes.
- Follow-Ups:
- Prev by Date: [Wireshark-bugs] [Bug 12032] Server Hello type 4 is actually type 2
- Next by Date: [Wireshark-bugs] [Bug 12034] "Conditional jump or move depends on uninitialised value(s)" in HTTP reassembly
- Previous by thread: [Wireshark-bugs] [Bug 12033] Add a dissector for FlexRay
- Next by thread: [Wireshark-bugs] [Bug 12034] "Conditional jump or move depends on uninitialised value(s)" in HTTP reassembly
- Index(es):