Package: x11vnc
Version: 0.9.13-2
Followup-For: Bug #859213

I confirm this bug. Here is the stacktrace I just got:

#0  0xf7ffb425 in __kernel_vsyscall ()
#1  0xf782ddc0 in __libc_signal_restore_set (set=0xffff9390) at 
../sysdeps/unix/sysv/linux/nptl-signals.h:79
#2  __GI_raise (sig=6) at ../sysdeps/unix/sysv/linux/raise.c:48
#3  0xf782f287 in __GI_abort () at abort.c:89
#4  0xf786937f in __libc_message (do_abort=<optimized out>, fmt=<optimized 
out>) at ../sysdeps/posix/libc_fatal.c:175
#5  0xf78f9d77 in __GI___fortify_fail (msg=0xf79614f5 "stack smashing 
detected") at fortify_fail.c:30
#6  0xf78f9d38 in __stack_chk_fail () at stack_chk_fail.c:28
#7  0x5661a3d4 in __stack_chk_fail_local ()
#8  0x56614b79 in record_CW (ptr=ptr@entry=0x1 <error: Cannot access memory at 
address 0x1>, rec_data=rec_data@entry=0x569e0ec0) at xrecord.c:1347
#9  0x56615041 in record_switch (ptr=0x1 <error: Cannot access memory at 
address 0x1>, rec_data=0x569e0ec0) at xrecord.c:1387
#10 0xf7c2458a in ?? () from /usr/lib/i386-linux-gnu/libXtst.so.6
#11 0xf7c24a36 in ?? () from /usr/lib/i386-linux-gnu/libXtst.so.6
#12 0xf7adb7ff in ?? () from /usr/lib/i386-linux-gnu/libX11.so.6
#13 0xf7adc24b in _XEventsQueued () from /usr/lib/i386-linux-gnu/libX11.so.6
#14 0xf7acd762 in XPending () from /usr/lib/i386-linux-gnu/libX11.so.6
#15 0xf7c259d8 in XRecordProcessReplies () from 
/usr/lib/i386-linux-gnu/libXtst.so.6
#16 0x565f2706 in check_xrecord_mouse () at userinput.c:2988
#17 check_xrecord () at userinput.c:3164
#18 0x565fdd9d in check_user_input (dt=0.00043401506263762712, 
dtr=0.014273106004111469, tile_diffs=0, cnt=0xffff9e8c) at userinput.c:5712
#19 0x565c44b0 in watch_loop () at screen.c:4561
#20 0x5656537f in main (argc=<optimized out>, argv=<optimized out>) at 
x11vnc.c:5990


This seems to match perfectly with the patch you linked.

Dear maintainer, please apply this patch soon. Some instances of the bug
are 100% reproducible to me, makeing me unable to open some popup-menus
without crashing x11vnc.

Best regards,
Celelibi


-- System Information:
Debian Release: 9.0
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 
'testing-debug'), (500, 'unstable')
Architecture: i386 (x86_64)

Kernel: Linux 3.10.11 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: sysvinit (via /sbin/init)

Versions of packages x11vnc depends on:
ii  libavahi-client3  0.6.32-2
ii  libavahi-common3  0.6.32-2
ii  libc6             2.24-10
ii  libjpeg62-turbo   1:1.5.1-2
ii  libssl1.1         1.1.0e-1
ii  libvncclient1     0.9.11+dfsg-1
ii  libvncserver1     0.9.11+dfsg-1
ii  libx11-6          2:1.6.4-3
ii  libxdamage1       1:1.1.4-2+b3
ii  libxext6          2:1.3.3-1+b2
ii  libxfixes3        1:5.0.3-1
ii  libxinerama1      2:1.1.3-1+b3
ii  libxrandr2        2:1.5.1-1
ii  libxtst6          2:1.2.3-1
ii  openssl           1.1.0e-1
ii  tk                8.6.0+9
ii  x11vnc-data       0.9.13-2
ii  zlib1g            1:1.2.8.dfsg-5

x11vnc recommends no packages.

x11vnc suggests no packages.

-- no debconf information

Reply via email to