Skip to content

Fuzz job issue: fuzz-2025-10-18-11764223541.pcap

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2025-10-18-11764223541.pcap.gz

stderr:

Branch: master
Input file: /var/menagerie/menagerie/11032-packet-btsdp.pcap
CI job name: Valgrind Menagerie Fuzz, ID: 11764223541
CI job URL: https://gitlab.com/wireshark/wireshark/-/jobs/11764223541
Return value: 0
Dissector bug: 0
Valgrind error count: 129
Date and time: Sat Oct 18 11:29:38 PM UTC 2025

Commits in the last 48 hours:
6a342cea31 ORAN FH CUS: Fix a clang uninitialised warning
8ded5ea9e4 tls: Abbreviated Handshake Using New Session Ticket
d99b02bc30 test: don't check the Lrexlib version.
68e8f8df5b wsutil: Call SHGetKnownFolderPath on Windows
07f5ddf675 Qt: Fix compilation with clang-cl
f45a52cc33 Give detect_bad_proto_tree_add.py execute permission
f2a672f2a6 decode_as: Abstract "reset all" call for DCE/RPC
c76c3b7ce3 Bluetooth: Register Bluetooth UUID type
491b3cabba Add tool for detecting bad proto_tree_add_* calls and fix known instances.
49090b3a34 wsutil: Use a common struct for SI/IEC prefixes.
65d51ec101 Create interface for handling generic UUID table lookups

Build host information:
Linux 6.8.0-85-generic #85~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Sep 19 16:18:59 UTC 2 x86_64
Distributor ID:	Ubuntu
Description:	Ubuntu 24.04.3 LTS
Release:	24.04
Codename:	noble

Command and args: ./tools/valgrind-wireshark.sh -b /builds/wireshark/wireshark/_install/bin  
==13474== Memcheck, a memory error detector
==13474== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al.
==13474== Using Valgrind-3.22.0 and LibVEX; rerun with -h for copyright info
==13474== Command: /builds/wireshark/wireshark/_install/bin/tshark -nr /tmp/fuzz/fuzz-2025-10-18-11764223541.pcap
==13474== 
Running as user "root" and group "root". This could be dangerous.
==13474== Use of uninitialised value of size 8
==13474==    at 0xD2BBC88: wmem_map_lookup (wsutil/wmem/wmem_map.c:379)
==13474==    by 0x91B7402: uuid_type_lookup (epan/uuid_types.c:102)
==13474==    by 0x757103E: bluetooth_get_custom_uuid_description (epan/dissectors/packet-bluetooth.c:264)
==13474==    by 0x7571AAC: print_bluetooth_uuid (epan/dissectors/packet-bluetooth.c:693)
==13474==    by 0x765F825: dissect_sdp_type (epan/dissectors/packet-btsdp.c:3518)
==13474==    by 0x7657013: dissect_sdp_service_search_request (epan/dissectors/packet-btsdp.c:4120)
==13474==    by 0x7656D21: dissect_btsdp (epan/dissectors/packet-btsdp.c:4555)
==13474==    by 0x914049B: call_dissector_through_handle (epan/packet.c:939)
==13474==    by 0x913B8FC: call_dissector_work (epan/packet.c:1030)
==13474==    by 0x913B702: dissector_try_uint_with_data (epan/packet.c:1752)
==13474==    by 0x76267C7: dissect_b_frame (epan/dissectors/packet-btl2cap.c:2349)
==13474==    by 0x7621393: dissect_btl2cap (epan/dissectors/packet-btl2cap.c:3249)
==13474== 
==13474== Conditional jump or move depends on uninitialised value(s)
==13474==    at 0xD2BBCA1: wmem_map_lookup (wsutil/wmem/wmem_map.c:383)
==13474==    by 0x91B7402: uuid_type_lookup (epan/uuid_types.c:102)
==13474==    by 0x757103E: bluetooth_get_custom_uuid_description (epan/dissectors/packet-bluetooth.c:264)
==13474==    by 0x7571AAC: print_bluetooth_uuid (epan/dissectors/packet-bluetooth.c:693)
==13474==    by 0x765F825: dissect_sdp_type (epan/dissectors/packet-btsdp.c:3518)
==13474==    by 0x7657013: dissect_sdp_service_search_request (epan/dissectors/packet-btsdp.c:4120)
==13474==    by 0x7656D21: dissect_btsdp (epan/dissectors/packet-btsdp.c:4555)
==13474==    by 0x914049B: call_dissector_through_handle (epan/packet.c:939)
==13474==    by 0x913B8FC: call_dissector_work (epan/packet.c:1030)
==13474==    by 0x913B702: dissector_try_uint_with_data (epan/packet.c:1752)
==13474==    by 0x76267C7: dissect_b_frame (epan/dissectors/packet-btl2cap.c:2349)
==13474==    by 0x7621393: dissect_btl2cap (epan/dissectors/packet-btl2cap.c:3249)
==13474== 
==13474== 
==13474== HEAP SUMMARY:
==13474==     in use at exit: 69,502 bytes in 381 blocks
==13474==   total heap usage: 354,039 allocs, 353,658 frees, 66,155,923 bytes allocated
==13474== 
==13474== LEAK SUMMARY:
==13474==    definitely lost: 0 bytes in 0 blocks
==13474==    indirectly lost: 0 bytes in 0 blocks
==13474==      possibly lost: 0 bytes in 0 blocks
==13474==    still reachable: 52,214 bytes in 361 blocks
==13474==         suppressed: 17,288 bytes in 20 blocks
==13474== Rerun with --leak-check=full to see details of leaked memory
==13474== 
==13474== Use --track-origins=yes to see where uninitialised values come from
==13474== For lists of detected and suppressed errors, rerun with: -s
==13474== ERROR SUMMARY: 129 errors from 2 contexts (suppressed: 0 from 0)

fuzz-test.sh stderr:
Running as user "root" and group "root". This could be dangerous.

no debug trace

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information