Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 406698 Details for
Bug 526796
x11-misc/x11vnc-0.9.14-r1: stack smashing attack
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
x11vnc-backtrace.log (gdb)
x11vnc-backtrace.log (text/plain), 2.68 KB, created by
Ed Santiago
on 2015-07-13 18:47:16 UTC
(
hide
)
Description:
x11vnc-backtrace.log (gdb)
Filename:
MIME Type:
Creator:
Ed Santiago
Created:
2015-07-13 18:47:16 UTC
Size:
2.68 KB
patch
obsolete
>Starting program: /usr/bin/x11vnc >warning: Could not load shared library symbols for linux-vdso.so.1. >Do you need "set solib-search-path" or "set sysroot"? >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". > >Program received signal SIGABRT, Aborted. >0x00007ffff5889b3e in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:55 >55 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. >A debugging session is active. > > Inferior 1 [process 23709] will be killed. > >Quit anyway? (y or n) Starting program: /usr/bin/x11vnc >warning: Could not load shared library symbols for linux-vdso.so.1. >Do you need "set solib-search-path" or "set sysroot"? >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". > >Program received signal SIGABRT, Aborted. >0x00007ffff5889b3e in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:55 >55 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. >#0 0x00007ffff5889b3e in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:55 >#1 0x00007ffff588b2a1 in __GI_abort () at abort.c:89 >#2 0x00007ffff58cc99f in __libc_message (do_abort=do_abort@entry=2, fmt=fmt@entry=0x7ffff59c8360 "*** %s ***: %s terminated\n") at ../sysdeps/posix/libc_fatal.c:175 >#3 0x00007ffff595aa4f in __GI___fortify_fail (msg=msg@entry=0x7ffff59c8348 "stack smashing detected") at fortify_fail.c:31 >#4 0x00007ffff595a9f3 in __stack_chk_fail () at stack_chk_fail.c:28 >#5 0x0000555555612c44 in record_CW (ptr=ptr@entry=0x1 <error: Cannot access memory at address 0x1>, rec_data=rec_data@entry=0x555555ec3060) at xrecord.c:1344 >#6 0x00005555556133a3 in record_switch (ptr=0x1 <error: Cannot access memory at address 0x1>, rec_data=0x555555ec3060) at xrecord.c:1384 >#7 0x00007ffff70d1ba9 in parse_reply_call_callback.isra () from /usr/lib64/libXtst.so.6 >#8 0x00007ffff70d213e in record_async_handler () from /usr/lib64/libXtst.so.6 >#9 0x00007ffff618c4e5 in ?? () from /usr/lib64/libX11.so.6 >#10 0x00007ffff618cfed in _XEventsQueued () from /usr/lib64/libX11.so.6 >#11 0x00007ffff617c7d5 in XPending () from /usr/lib64/libX11.so.6 >#12 0x00005555555ef3ba in check_xrecord_mouse () at userinput.c:2930 >#13 check_xrecord () at userinput.c:3106 >#14 0x00005555555facdd in check_user_input (dt=dt@entry=0.00557708740234375, dtr=<optimized out>, tile_diffs=tile_diffs@entry=10, cnt=cnt@entry=0x7fffffff7c64) > at userinput.c:5654 >#15 0x00005555555c4b7e in watch_loop () at screen.c:4456 >#16 0x0000555555566178 in main (argc=<optimized out>, argv=<optimized out>) at x11vnc.c:6011 >A debugging session is active. > > Inferior 1 [process 23792] will be killed. > >Quit anyway? (y or n)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 526796
:
406648
|
406666
| 406698 |
454568