Wireshark-bugs: [Wireshark-bugs] [Bug 10410] Buildbot crash output: fuzz-2014-08-25-8573.pcap
Date: Mon, 25 Aug 2014 06:56:01 +0000

Comment # 2 on bug 10410 from
Sorry, wrong bug, this is the correct packet which causes the crash:


Frame 126: 68 bytes on wire (544 bits), 68 bytes captured (544 bits) on
interface 0
    Interface id: 0 (unknown)
    Encapsulation type: Linux cooked-mode capture (25)
    Arrival Time: Apr 27, 2013 21:27:08.750261000 CEST
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1367090828.750261000 seconds
    [Time delta from previous captured frame: 0.000049000 seconds]
    [Time delta from previous displayed frame: 0.000049000 seconds]
    [Time since reference or first frame: 103.906625000 seconds]
    Frame Number: 126
    Frame Length: 68 bytes (544 bits)
    Capture Length: 68 bytes (544 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
    Packet type: Sent by us (4)
    Link-layer address type: 1
    Link-layer address length: 105
    Source: d027881958fe0000
    Protocol: IP (0x0800)
Internet Protocol Version 4, Src: 10.0.0.2 (10.0.0.2), Dst: 10.0.0.30
(10.0.0.30)
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes
    Differentiated Services Field: 0x68 (DSCP 0x1a: Assured Forwarding 31; ECN:
0x00: Not-ECT (Not ECN-Capable Transport))
        0110 10.. = Differentiated Services Codepoint: Assured Forwarding 31
(0x1a)
        .... ..00 = Explicit Congestion Notification: Not-ECT (Not ECN-Capable
Transport) (0x00)
    Total Length: 52
    Identification: 0xca7c (51836)
    Flags: 0x02 (Don't Fragment)
        0... .... = Reserved bit: Not set
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: TCP (6)
    Header checksum: 0x5bc0 [validation disabled]
        [Good: False]
        [Bad: False]
    Source: 10.0.0.2 (10.0.0.2)
    Destination: 10.0.0.30 (10.0.0.30)
Transmission Control Protocol, Src Port: 2000 (2000), Dst Port: 35079 (35079),
Seq: 597, Ack: 1668, Len: 0
    Source Port: 2000 (2000)
    Destination Port: 35079 (35079)
    [Stream index: 21]
    [TCP Segment Len: 0]
    Sequence number: 597    (relative sequence number)
    Acknowledgment number: 1668    (relative ack number)
    Header Length: 32 bytes
    .... 0000 0001 0000 = Flags: 0x010 (ACK)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...1 .... = Acknowledgment: Set
        .... .... 0... = Push: Not set
        .... .... .0.. = Reset: Not set
        .... .... ..0. = Syn: Not set
        .... .... ...0 = Fin: Not set
    Window size value: 78
    [Calculated window size: 9984]
    [Window size scaling factor: 128]
    Checksum: 0xc846 [validation disabled]
        [Good Checksum: False]
        [Bad Checksum: False]
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
        No-Operation (NOP)
            Type: 1
                0... .... = Copy on fragmentation: No
                .00. .... = Class: Control (0)
                ...0 0001 = Number: No-Operation (NOP) (1)
        No-Operation (NOP)
            Type: 1
                0... .... = Copy on fragmentation: No
                .00. .... = Class: Control (0)
                ...0 0001 = Number: No-Operation (NOP) (1)
        Timestamps: TSval 3540229, TSecr 4294945964
            Kind: Time Stamp Option (8)
            Length: 10
            Timestamp value: 3540229
            Timestamp echo reply: 4294945964
    [SEQ/ACK analysis]
        [This is an ACK to the segment in frame: 125]
        [The RTT to ACK the segment was: 0.000049000 seconds]
        [iRTT: 0.001644000 seconds]
        [TCP Analysis Flags]
            [Expert Info (Warn/Sequence): ACKed segment that wasn't captured
(common at capture start)]
                [ACKed segment that wasn't captured (common at capture start)]
                [Severity level: Warn]
                [Group: Sequence]

0000  00 04 00 01 00 69 d0 27 88 19 58 fe 00 00 08 00   .....i.'..X.....
0010  45 68 00 34 ca 7c 40 00 40 06 5b c0 0a 00 00 02   Eh.4.|@.@.[.....
0020  0a 00 00 1e 07 d0 89 07 ed d3 d1 c6 49 d5 4d da   ............I.M.
0030  80 10 00 4e c8 46 00 00 01 01 08 0a 00 36 05 05   ...N.F.......6..
0040  ff ff ac ac                                       ....

**
ERROR:wmem_strbuf.c:65:wmem_strbuf_sized_new: assertion failed: ((max_len == 0)
|| (alloc_len <= max_len))


You are receiving this mail because:
  • You are watching all bug changes.