Wireshark-bugs: [Wireshark-bugs] [Bug 9268] Buildbot crash output:	fuzz-2013-10-12-19881.pcap
      
      
    
     Evan Huus
 changed
              bug 9268
        
             
          
            | What | 
            Removed | 
            Added | 
          
         
           | CC | 
           
                
            | 
           eapache@gmail.com
            | 
         
      
        
            Comment # 1
              on bug 9268
              from  Evan Huus
        The original problems all appear fixed, but I'm seeing others in the OID code:
==8628== Use of uninitialised value of size 8
==8628==    at 0xA16C5AB: _itoa_word (_itoa.c:179)
==8628==    by 0xA170AE1: vfprintf (vfprintf.c:1654)
==8628==    by 0xA2336BF: __vsnprintf_chk (vsnprintf_chk.c:63)
==8628==    by 0x9534B21: g_snprintf (gprintf.c:162)
==8628==    by 0x648CEAB: rel_oid_subid2string (oids.c:847)
==8628==    by 0x648DB64: oid_encoded2string (oids.c:1097)
==8628==    by 0x6589658: dissect_ber_any_oid_str (packet-ber.c:3927)
==8628==    by 0x65896E9: dissect_ber_object_identifier_str (packet-ber.c:3961)
==8628==    by 0x6D1BDB6: dissect_spnego_MechType (spnego.cnf:26)
==8628==    by 0x6D1C257: dissect_spnego_T_supportedMech (spnego.cnf:169)
==8628==    by 0x6586A56: dissect_ber_sequence (packet-ber.c:2234)
==8628==    by 0x6D1BACF: dissect_spnego_NegTokenTarg (spnego.cnf:252)
==8628== 
==8628== Conditional jump or move depends on uninitialised value(s)
==8628==    at 0xA16C5B5: _itoa_word (_itoa.c:179)
==8628==    by 0xA170AE1: vfprintf (vfprintf.c:1654)
==8628==    by 0xA2336BF: __vsnprintf_chk (vsnprintf_chk.c:63)
==8628==    by 0x9534B21: g_snprintf (gprintf.c:162)
==8628==    by 0x648CEAB: rel_oid_subid2string (oids.c:847)
==8628==    by 0x648DB64: oid_encoded2string (oids.c:1097)
==8628==    by 0x6589658: dissect_ber_any_oid_str (packet-ber.c:3927)
==8628==    by 0x65896E9: dissect_ber_object_identifier_str (packet-ber.c:3961)
==8628==    by 0x6D1BDB6: dissect_spnego_MechType (spnego.cnf:26)
==8628==    by 0x6D1C257: dissect_spnego_T_supportedMech (spnego.cnf:169)
==8628==    by 0x6586A56: dissect_ber_sequence (packet-ber.c:2234)
==8628==    by 0x6D1BACF: dissect_spnego_NegTokenTarg (spnego.cnf:252)
         
      
      
      You are receiving this mail because:
      
      
          - You are watching all bug changes.