synaptic crashed with SIGSEGV in vtable for debRecordParser()

Bug #945742 reported by gackthugo
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
synaptic (Ubuntu)
New
Medium
Unassigned

Bug Description

ubuntu 12.04 beta1

Finished removing various applications at once (mupen64plus+extras) and crashed right after trying to close window.

ProblemType: Crash
DistroRelease: Ubuntu 12.04
Package: synaptic 0.75.5~exp6
ProcVersionSignature: Ubuntu 3.2.0-17.27-generic-pae 3.2.6
Uname: Linux 3.2.0-17-generic-pae i686
NonfreeKernelModules: wl nvidia
ApportVersion: 1.94-0ubuntu1
Architecture: i386
CrashCounter: 1
Date: Sat Mar 3 18:03:24 2012
ExecutablePath: /usr/sbin/synaptic
InstallationMedia: Ubuntu 12.04 LTS "Precise Pangolin" - Beta i386 (20120301)
ProcCmdline: /usr/sbin/synaptic
ProcEnviron:
 SHELL=/bin/bash
 LANG=pt_PT.UTF-8
 LANGUAGE=pt:pt_BR:en
 PATH=(custom, no user)
SegvAnalysis:
 Segfault happened at: 0xb76cd528 <_ZTV15debRecordParser+8>: jo 0xb76cd510 <_ZTI15debRecordParser>
 PC (0xb76cd528) in non-executable VMA region: 0xb76cc000-0xb76ce000 r--p /usr/lib/i386-linux-gnu/libapt-pkg.so.4.12.0
 source "0xb76cd510" (0xb76cd510) ok
SegvReason: executing non-writable VMA /usr/lib/i386-linux-gnu/libapt-pkg.so.4.12.0
Signal: 11
SourcePackage: synaptic
StacktraceTop:
 vtable for debRecordParser () from /usr/lib/i386-linux-gnu/libapt-pkg.so.4.12
 ?? () from /usr/lib/i386-linux-gnu/libgtk-x11-2.0.so.0
 g_closure_invoke () from /usr/lib/i386-linux-gnu/libgobject-2.0.so.0
 ?? () from /usr/lib/i386-linux-gnu/libgobject-2.0.so.0
 g_signal_emit_valist () from /usr/lib/i386-linux-gnu/libgobject-2.0.so.0
Title: synaptic crashed with SIGSEGV in vtable for debRecordParser()
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups:

Revision history for this message
gackthugo (gackthugo) wrote :
Revision history for this message
Apport retracing service (apport) wrote :

StacktraceTop:
 vtable for debRecordParser () from /tmp/tmpTcPnUo/usr/lib/i386-linux-gnu/libapt-pkg.so.4.12
 _gtk_marshal_BOOLEAN__BOXED (closure=0x90e8bd8, return_value=0xbfee87a4, n_param_values=2, param_values=0x9986fb8, invocation_hint=0xbfee8790, marshal_data=0x0) at /build/buildd/gtk+2.0-2.24.10/gtk/gtkmarshalers.c:86
 g_closure_invoke (closure=0x90e8bd8, return_value=0xbfee87a4, n_param_values=2, param_values=0x9986fb8, invocation_hint=0xbfee8790) at /build/buildd/glib2.0-2.31.18/./gobject/gclosure.c:774
 signal_emit_unlocked_R (node=0x8a38bf8, detail=0, instance=0x8cb0450, emission_return=0xbfee88dc, instance_and_params=0x9986fb8) at /build/buildd/glib2.0-2.31.18/./gobject/gsignal.c:3302
 g_signal_emit_valist (instance=0x8cb0450, signal_id=39, detail=0, var_args=0xbfee8940 "l\211\356\277\360\"\326\bP\004\313\b\031\262&\267P\004\313\b\200\067\243\b") at /build/buildd/glib2.0-2.31.18/./gobject/gsignal.c:3043

Revision history for this message
Apport retracing service (apport) wrote : Stacktrace.txt
Revision history for this message
Apport retracing service (apport) wrote : ThreadStacktrace.txt
Changed in synaptic (Ubuntu):
importance: Undecided → Medium
tags: removed: need-i386-retrace
Revision history for this message
Robert Roth (evfool) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find.

Robert Roth (evfool)
information type: Private → Public
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.