Fuzz job issue: fuzz-2025-10-18-11764223541.pcap
Problems have been found with the following capture file:
https://www.wireshark.org/download/automated/captures/fuzz-2025-10-18-11764223541.pcap.gz
stderr:
Branch: master
Input file: /var/menagerie/menagerie/11032-packet-btsdp.pcap
CI job name: Valgrind Menagerie Fuzz, ID: 11764223541
CI job URL: https://gitlab.com/wireshark/wireshark/-/jobs/11764223541
Return value: 0
Dissector bug: 0
Valgrind error count: 129
Date and time: Sat Oct 18 11:29:38 PM UTC 2025
Commits in the last 48 hours:
6a342cea31 ORAN FH CUS: Fix a clang uninitialised warning
8ded5ea9e4 tls: Abbreviated Handshake Using New Session Ticket
d99b02bc30 test: don't check the Lrexlib version.
68e8f8df5b wsutil: Call SHGetKnownFolderPath on Windows
07f5ddf675 Qt: Fix compilation with clang-cl
f45a52cc33 Give detect_bad_proto_tree_add.py execute permission
f2a672f2a6 decode_as: Abstract "reset all" call for DCE/RPC
c76c3b7ce3 Bluetooth: Register Bluetooth UUID type
491b3cabba Add tool for detecting bad proto_tree_add_* calls and fix known instances.
49090b3a34 wsutil: Use a common struct for SI/IEC prefixes.
65d51ec101 Create interface for handling generic UUID table lookups
Build host information:
Linux 6.8.0-85-generic #85~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Sep 19 16:18:59 UTC 2 x86_64
Distributor ID: Ubuntu
Description: Ubuntu 24.04.3 LTS
Release: 24.04
Codename: noble
Command and args: ./tools/valgrind-wireshark.sh -b /builds/wireshark/wireshark/_install/bin
==13474== Memcheck, a memory error detector
==13474== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al.
==13474== Using Valgrind-3.22.0 and LibVEX; rerun with -h for copyright info
==13474== Command: /builds/wireshark/wireshark/_install/bin/tshark -nr /tmp/fuzz/fuzz-2025-10-18-11764223541.pcap
==13474==
Running as user "root" and group "root". This could be dangerous.
==13474== Use of uninitialised value of size 8
==13474== at 0xD2BBC88: wmem_map_lookup (wsutil/wmem/wmem_map.c:379)
==13474== by 0x91B7402: uuid_type_lookup (epan/uuid_types.c:102)
==13474== by 0x757103E: bluetooth_get_custom_uuid_description (epan/dissectors/packet-bluetooth.c:264)
==13474== by 0x7571AAC: print_bluetooth_uuid (epan/dissectors/packet-bluetooth.c:693)
==13474== by 0x765F825: dissect_sdp_type (epan/dissectors/packet-btsdp.c:3518)
==13474== by 0x7657013: dissect_sdp_service_search_request (epan/dissectors/packet-btsdp.c:4120)
==13474== by 0x7656D21: dissect_btsdp (epan/dissectors/packet-btsdp.c:4555)
==13474== by 0x914049B: call_dissector_through_handle (epan/packet.c:939)
==13474== by 0x913B8FC: call_dissector_work (epan/packet.c:1030)
==13474== by 0x913B702: dissector_try_uint_with_data (epan/packet.c:1752)
==13474== by 0x76267C7: dissect_b_frame (epan/dissectors/packet-btl2cap.c:2349)
==13474== by 0x7621393: dissect_btl2cap (epan/dissectors/packet-btl2cap.c:3249)
==13474==
==13474== Conditional jump or move depends on uninitialised value(s)
==13474== at 0xD2BBCA1: wmem_map_lookup (wsutil/wmem/wmem_map.c:383)
==13474== by 0x91B7402: uuid_type_lookup (epan/uuid_types.c:102)
==13474== by 0x757103E: bluetooth_get_custom_uuid_description (epan/dissectors/packet-bluetooth.c:264)
==13474== by 0x7571AAC: print_bluetooth_uuid (epan/dissectors/packet-bluetooth.c:693)
==13474== by 0x765F825: dissect_sdp_type (epan/dissectors/packet-btsdp.c:3518)
==13474== by 0x7657013: dissect_sdp_service_search_request (epan/dissectors/packet-btsdp.c:4120)
==13474== by 0x7656D21: dissect_btsdp (epan/dissectors/packet-btsdp.c:4555)
==13474== by 0x914049B: call_dissector_through_handle (epan/packet.c:939)
==13474== by 0x913B8FC: call_dissector_work (epan/packet.c:1030)
==13474== by 0x913B702: dissector_try_uint_with_data (epan/packet.c:1752)
==13474== by 0x76267C7: dissect_b_frame (epan/dissectors/packet-btl2cap.c:2349)
==13474== by 0x7621393: dissect_btl2cap (epan/dissectors/packet-btl2cap.c:3249)
==13474==
==13474==
==13474== HEAP SUMMARY:
==13474== in use at exit: 69,502 bytes in 381 blocks
==13474== total heap usage: 354,039 allocs, 353,658 frees, 66,155,923 bytes allocated
==13474==
==13474== LEAK SUMMARY:
==13474== definitely lost: 0 bytes in 0 blocks
==13474== indirectly lost: 0 bytes in 0 blocks
==13474== possibly lost: 0 bytes in 0 blocks
==13474== still reachable: 52,214 bytes in 361 blocks
==13474== suppressed: 17,288 bytes in 20 blocks
==13474== Rerun with --leak-check=full to see details of leaked memory
==13474==
==13474== Use --track-origins=yes to see where uninitialised values come from
==13474== For lists of detected and suppressed errors, rerun with: -s
==13474== ERROR SUMMARY: 129 errors from 2 contexts (suppressed: 0 from 0)
fuzz-test.sh stderr:
Running as user "root" and group "root". This could be dangerous.
no debug trace