(From a rebuild from the package) run with -t:
(gdb) bt full
#0 0x00007ffff7814e35 in __GI_raise (sig=sig@entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:63
resultvar = 0
pid = 22722
selftid = 22722
#1 0x00007ffff7818498 in __GI_abort () at abort.c:90
save_stage = 2
act = {__sigaction_handler = {sa_handler = 0x7fffffffd8aa, sa_sigaction
= 0x7fffffffd8aa}, sa_mask = {__val = {
6, 140737347178919, 2, 140737488345278, 2, 140737347169863, 1,
140737347178915, 3, 140737488345252, 12,
140737347178919, 2, 140737488345936, 13, 140737488347696}},
sa_flags = 94, sa_restorer = 0x5}
sigs = {__val = {32, 0 <repeats 15 times>}}
#2 0x00007ffff78515ab in __libc_message (do_abort=do_abort@entry=2,
fmt=fmt@entry=0x7ffff795d12b "*** %s ***: %s terminated\n") at
../sysdeps/unix/sysv/linux/libc_fatal.c:200
ap = {{gp_offset = 32, fp_offset = 48, overflow_arg_area =
0x7fffffffe240, reg_save_area = 0x7fffffffe150}}
ap_copy = {{gp_offset = 16, fp_offset = 48, overflow_arg_area =
0x7fffffffe240, reg_save_area = 0x7fffffffe150}}
fd = 8
on_2 = <optimised out>
list = <optimised out>
nlist = <optimised out>
cp = <optimised out>
written = <optimised out>
#3 0x00007ffff78ec40c in __GI___fortify_fail (msg=<optimised out>,
msg@entry=0x7ffff795d0c2 "buffer overflow detected")
at fortify_fail.c:37
do_abort = 2
#4 0x00007ffff78eb3a0 in __GI___chk_fail () at chk_fail.c:28
No locals.
#5 0x00000000004051a2 in memset (__len=16, __ch=0, __dest=0x60ac80) at
/usr/include/x86_64-linux-gnu/bits/string3.h:84
No locals.
#6 time_ascii (ret=ret@entry=0x60abf0 "") at time.c:45
tp = 0x60ae40
tzp = 0x60ac80
brokentime = <optimised out>
#7 0x000000000040258d in display_status (out=0x7ffff7b9a280 <_IO_2_1_stdout_>,
conn=0x60a160,
status=status@entry=SYN_SENT) at display.c:96
client_name = 0x7ffff7fd0718 "192.168.66.33"
server_name = <optimised out>
s_time = 0x60abf0 ""
status_string = <optimised out>
#8 0x00000000004038ca in status_switch (prev=0x60ad90,
status=status@entry=SYN_SENT) at tracker.c:38
No locals.
#9 0x00000000004039fa in newconn (prev_ring=<optimised out>) at tracker.c:87
---Type <return> to continue, or q <return> to quit---
conn = <optimised out>
#10 0x0000000000404f3e in verify () at verify.c:139
Desc = 0x0
prev_conn = 0x60ad90
#11 0x000000000040360d in got_packet (useless=<optimised out>,
hdr=0x7fffffffe3c0, packet=<optimised out>) at loop.c:101
No locals.
#12 0x00007ffff7ba564e in ?? () from /usr/lib/x86_64-linux-gnu/libpcap.so.0.8
No symbol table info available.
#13 0x00007ffff7bac591 in pcap_loop () from
/usr/lib/x86_64-linux-gnu/libpcap.so.0.8
No symbol table info available.
#14 0x0000000000401887 in main (argc=<optimised out>, argv=<optimised out>) at
tcpick.c:265
tbuf = "2012-12-06 20:00
GMT\000\177\000\000\t\000\000\000\000\000\000\000x\337~\367\377\177\000\000\270\251\377\367\377\177\000\000\344\000\000\000\000\000\000\000\000\346\377\377\377\177\000\000\344\262\360\000\000\000\000\000\302\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\355Z@\000\000\000\000\000,!\312\t",
'\000' <repeats 12 times>"\220, Z@\000\000\000\000\000D\032@\000\000\000\000"
tm = <optimised out>
now = 1354824005
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1086534
Title:
*** buffer overflow detected ***: tcpick terminated with -t arg
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpick/+bug/1086534/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs