Wireshark-bugs: [Wireshark-bugs] [Bug 10410] Buildbot crash output: fuzz-2014-08-25-8573.pcap
Date: Mon, 25 Aug 2014 06:56:01 +0000
Comment # 2
on bug 10410
from Marian Ďurkovič
Sorry, wrong bug, this is the correct packet which causes the crash: Frame 126: 68 bytes on wire (544 bits), 68 bytes captured (544 bits) on interface 0 Interface id: 0 (unknown) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Apr 27, 2013 21:27:08.750261000 CEST [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1367090828.750261000 seconds [Time delta from previous captured frame: 0.000049000 seconds] [Time delta from previous displayed frame: 0.000049000 seconds] [Time since reference or first frame: 103.906625000 seconds] Frame Number: 126 Frame Length: 68 bytes (544 bits) Capture Length: 68 bytes (544 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 105 Source: d027881958fe0000 Protocol: IP (0x0800) Internet Protocol Version 4, Src: 10.0.0.2 (10.0.0.2), Dst: 10.0.0.30 (10.0.0.30) 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes Differentiated Services Field: 0x68 (DSCP 0x1a: Assured Forwarding 31; ECN: 0x00: Not-ECT (Not ECN-Capable Transport)) 0110 10.. = Differentiated Services Codepoint: Assured Forwarding 31 (0x1a) .... ..00 = Explicit Congestion Notification: Not-ECT (Not ECN-Capable Transport) (0x00) Total Length: 52 Identification: 0xca7c (51836) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x5bc0 [validation disabled] [Good: False] [Bad: False] Source: 10.0.0.2 (10.0.0.2) Destination: 10.0.0.30 (10.0.0.30) Transmission Control Protocol, Src Port: 2000 (2000), Dst Port: 35079 (35079), Seq: 597, Ack: 1668, Len: 0 Source Port: 2000 (2000) Destination Port: 35079 (35079) [Stream index: 21] [TCP Segment Len: 0] Sequence number: 597 (relative sequence number) Acknowledgment number: 1668 (relative ack number) Header Length: 32 bytes .... 0000 0001 0000 = Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set Window size value: 78 [Calculated window size: 9984] [Window size scaling factor: 128] Checksum: 0xc846 [validation disabled] [Good Checksum: False] [Bad Checksum: False] Urgent pointer: 0 Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps No-Operation (NOP) Type: 1 0... .... = Copy on fragmentation: No .00. .... = Class: Control (0) ...0 0001 = Number: No-Operation (NOP) (1) No-Operation (NOP) Type: 1 0... .... = Copy on fragmentation: No .00. .... = Class: Control (0) ...0 0001 = Number: No-Operation (NOP) (1) Timestamps: TSval 3540229, TSecr 4294945964 Kind: Time Stamp Option (8) Length: 10 Timestamp value: 3540229 Timestamp echo reply: 4294945964 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 125] [The RTT to ACK the segment was: 0.000049000 seconds] [iRTT: 0.001644000 seconds] [TCP Analysis Flags] [Expert Info (Warn/Sequence): ACKed segment that wasn't captured (common at capture start)] [ACKed segment that wasn't captured (common at capture start)] [Severity level: Warn] [Group: Sequence] 0000 00 04 00 01 00 69 d0 27 88 19 58 fe 00 00 08 00 .....i.'..X..... 0010 45 68 00 34 ca 7c 40 00 40 06 5b c0 0a 00 00 02 Eh.4.|@.@.[..... 0020 0a 00 00 1e 07 d0 89 07 ed d3 d1 c6 49 d5 4d da ............I.M. 0030 80 10 00 4e c8 46 00 00 01 01 08 0a 00 36 05 05 ...N.F.......6.. 0040 ff ff ac ac .... ** ERROR:wmem_strbuf.c:65:wmem_strbuf_sized_new: assertion failed: ((max_len == 0) || (alloc_len <= max_len))
You are receiving this mail because:
- You are watching all bug changes.
- References:
- [Wireshark-bugs] [Bug 10410] New: Buildbot crash output: fuzz-2014-08-25-8573.pcap
- From: bugzilla-daemon
- [Wireshark-bugs] [Bug 10410] New: Buildbot crash output: fuzz-2014-08-25-8573.pcap
- Prev by Date: [Wireshark-bugs] [Bug 10408] Buildbot crash output: fuzz-2014-08-23-12325.pcap
- Next by Date: [Wireshark-bugs] [Bug 10406] Need better mechanisms for allowing non-privileged users to capture network traffic
- Previous by thread: [Wireshark-bugs] [Bug 10410] Buildbot crash output: fuzz-2014-08-25-8573.pcap
- Next by thread: [Wireshark-bugs] [Bug 10410] Buildbot crash output: fuzz-2014-08-25-8573.pcap
- Index(es):