=================================================================
==126285==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x607000000068 at pc 0x000000744b27 bp 0x7fff6e00fe20 sp 0x7fff6e00fe18
READ of size 4 at 0x607000000068 thread T0
    #0 0x744b26 in EXTRACT_BE_U_4 tcpdump/./extract.h:98:26
    #1 0x74ff59 in ikev1_n_print tcpdump/./print-isakmp.c:1766:4
    #2 0x75d39c in ikev2_sub0_print tcpdump/./print-isakmp.c:2914:8
    #3 0x75cb25 in ikev2_sub_print tcpdump/./print-isakmp.c:2947:8
    #4 0x743e5b in ikev2_print tcpdump/./print-isakmp.c:3014:3
    #5 0x7420d2 in isakmp_print tcpdump/./print-isakmp.c:3081:3
    #6 0x64800b in udp_print tcpdump/./print-udp.c:608:5
    #7 0x565d62 in ip_print_demux tcpdump/./print-ip.c:406:3
    #8 0x569f41 in ip_print tcpdump/./print-ip.c:696:3
    #9 0x5c2fb1 in null_if_print tcpdump/./print-null.c:112:3
    #10 0x51d539 in pretty_print_packet tcpdump/./print.c:389:11
    #11 0x519f42 in print_packet tcpdump/./tcpdump.c:2957:2
    #12 0x8b6a75 in pcap_offline_read libpcap/./savefile.c:505:4
    #13 0x85eac8 in pcap_loop libpcap/./pcap.c:2581:8
    #14 0x51336a in main tcpdump/./tcpdump.c:2411:12
    #15 0x7fd7183af2b0 in __libc_start_main
    #16 0x41d8c9 in _start

0x607000000069 is located 0 bytes to the right of 73-byte region [0x607000000020,0x607000000069)
allocated by thread T0 here:
    #0 0x4d2f10 in malloc (tcpdump/tcpdump+0x4d2f10)
    #1 0x8b9a05 in pcap_check_header libpcap/./sf-pcap.c:397:14
    #2 0x8b5f0c in pcap_fopen_offline_with_tstamp_precision libpcap/./savefile.c:378:7
    #3 0x8b5aa1 in pcap_open_offline_with_tstamp_precision libpcap/./savefile.c:285:6
    #4 0x51105e in main tcpdump/./tcpdump.c:1967:8
    #5 0x7fd7183af2b0 in __libc_start_main

SUMMARY: AddressSanitizer: heap-buffer-overflow tcpdump/./extract.h:98:26 in EXTRACT_BE_U_4
Shadow bytes around the buggy address:
  0x0c0e7fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c0e7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c0e7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c0e7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c0e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c0e7fff8000: fa fa fa fa 00 00 00 00 00 00 00 00 00[01]fa fa
  0x0c0e7fff8010: fa fa fd fd fd fd fd fd fd fd fd fa fa fa fa fa
  0x0c0e7fff8020: 00 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa
  0x0c0e7fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c0e7fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c0e7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
==126285==ABORTING
