[Bug 72117] Re: Stack Smashing Prevents Use

2010-06-10 Thread Sebastien Bacher
the fix is still in lucid, don't reopen closed bugs but open a new ticket rather for your issue ** Changed in: nvclock (Ubuntu) Status: New = Fix Released -- Stack Smashing Prevents Use https://bugs.launchpad.net/bugs/72117 You received this bug notification because you are a member of

[Bug 72117] Re: Stack Smashing Prevents Use

2010-04-11 Thread Dooitze de Jong
In Lucid the problem has returnd, so its new ** Changed in: nvclock (Ubuntu) Status: Fix Released = New -- Stack Smashing Prevents Use https://bugs.launchpad.net/bugs/72117 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. --

[Bug 72117] Re: Stack Smashing Prevents Use

2009-07-30 Thread Tharrrk
Hi there, try modifying backend/bios.c in function verify_bios like this... /* All bioses start with this '0x55 0xAA' signature */ if((rom[0] != (char)0x55) || ((rom[1] 0xff) != (char)0xAA)) return 0; Don't know why rom[1] is 0xff55 when my

[Bug 72117] Re: Stack Smashing Prevents Use

2009-07-08 Thread Yuriy Padlyak
Houls I fill in new bug report? -- Stack Smashing Prevents Use https://bugs.launchpad.net/bugs/72117 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com

[Bug 72117] Re: Stack Smashing Prevents Use

2009-07-08 Thread Yuriy Padlyak
As miky91 noted, it happens in Jaunty. E. g. y...@spacecraft:~$ nvclock -T *** stack smashing detected ***: nvclock terminated === Backtrace: = /lib/tls/i686/cmov/libc.so.6(__fortify_fail+0x48)[0xb7eb5da8] /lib/tls/i686/cmov/libc.so.6(__fortify_fail+0x0)[0xb7eb5d60] nvclock[0x8058e39]

[Bug 72117] Re: Stack Smashing Prevents Use

2009-07-08 Thread Yuriy Padlyak
*Should I fill in new bug report? -- Stack Smashing Prevents Use https://bugs.launchpad.net/bugs/72117 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com

[Bug 72117] Re: Stack Smashing Prevents Use

2009-04-29 Thread miky91
I have the same problem with Jaunty (nvclock 0.8b4-1ubuntu2) -- Stack Smashing Prevents Use https://bugs.launchpad.net/bugs/72117 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com

[Bug 72117] Re: Stack Smashing Prevents Use

2007-06-09 Thread Evan goers
The problem still seems to be an issue for me. $ uname -a: Linux falcon-2 2.6.20-16-lowlatency #2 SMP PREEMPT Wed May 23 01:49:41 UTC 2007 i686 GNU/Linux -- Stack Smashing Prevents Use https://bugs.launchpad.net/bugs/72117 You received this bug notification because you are a member of Ubuntu

[Bug 72117] Re: Stack Smashing Prevents Use

2007-03-22 Thread William Grant
** Changed in: nvclock (Ubuntu) Status: Fix Committed = Fix Released -- Stack Smashing Prevents Use https://launchpad.net/bugs/72117 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 72117] Re: Stack Smashing Prevents Use

2007-03-14 Thread OrkanSpec
I confirm that latest nvclock package (0.8b2-1ubuntu1) solved the problem in my Feisty amd64. -- Stack Smashing Prevents Use https://launchpad.net/bugs/72117 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 72117] Re: Stack Smashing Prevents Use

2007-03-12 Thread Steve Kowalik
nvclock (0.8b2-1ubuntu1) feisty; urgency=low * Hack in dpatch. * Use patch from Andreas Simon to fix buffer overflow. (LP: #72117) * Update Maintainer address. -- Steve Kowalik [EMAIL PROTECTED] Tue, 13 Mar 2007 16:23:34 +1100 ** Changed in: nvclock (Ubuntu) Status: Confirmed =

[Bug 72117] Re: Stack Smashing Prevents Use

2007-03-07 Thread Andreas Simon
Here is a debdiff which fixes the issue here. In src/backend/back_linux.c I changed the line if(sscanf(buffer,%s %d %d,name, size, used) != 3) continue; to if(sscanf(buffer,%19s %d %d,name, size, used) != 3) continue; to prevend a overflow of name[]. I attached a debdiff and will also notify

[Bug 72117] Re: Stack Smashing Prevents Use

2007-03-07 Thread Andreas Simon
** Tags added: patch -- Stack Smashing Prevents Use https://launchpad.net/bugs/72117 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 72117] Re: Stack Smashing Prevents Use

2007-01-19 Thread ville palo
** Changed in: nvclock (Ubuntu) Assignee: ville palo = (unassigned) Status: In Progress = Confirmed -- Stack Smashing Prevents Use https://launchpad.net/bugs/72117 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 72117] Re: Stack Smashing Prevents Use

2007-01-10 Thread wally
If you are asking me: cpufreq_conservative 8712 0 - Live 0xf8b07000 Is longest having just 20 chars, no more. -- Stack Smashing Prevents Use https://launchpad.net/bugs/72117 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 72117] Re: Stack Smashing Prevents Use

2007-01-10 Thread ville palo
Thanks! 20 chars + NULL char is enough to crash the stack: from back_linux.c (buffer contains line from /proc/modules) char name[20]; int size; int used; /* Check to see if NVdriver/nvidia is loaded and if it is used. / For various versions the driver isn't initialized whe n X hasn't / been

[Bug 72117] Re: Stack Smashing Prevents Use

2007-01-10 Thread wally
Thanks, I got it working by _dirty_ little trick: As I know I am always using nvidia driver, so I changed whole function to: static int check_driver() {return 2; //driver nvidia} Re-compiled no more stack smashing. I also tried to increase char name[20] size, but somehow it didn't work. I am

[Bug 72117] Re: Stack Smashing Prevents Use

2007-01-09 Thread ville palo
Please, could you check your /proc/modules file? Is there some modules with a name longer than 20 charachters? -- Stack Smashing Prevents Use https://launchpad.net/bugs/72117 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 72117] Re: Stack Smashing Prevents Use

2007-01-09 Thread ville palo
** Changed in: nvclock (Ubuntu) Importance: Undecided = Medium Assignee: (unassigned) = ville palo Status: Unconfirmed = Confirmed -- Stack Smashing Prevents Use https://launchpad.net/bugs/72117 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com

[Bug 72117] Re: Stack Smashing Prevents Use

2007-01-08 Thread wally
This happens every single time with nvclock 0.8b2 on my fresh Edgy install (and I am pretty sure it also did it with my previous Dapper install). For reproducing, have a (Asus) GF 7300 (GT), download source from http://www.linuxhardware.org/nvclock/, ./configure make make install nvclock -s.

[Bug 72117] Re: Stack Smashing Prevents Use

2007-01-08 Thread wally
see previous comment ** Attachment added: backtrace of nvclock 0.8b2 crashing http://librarian.launchpad.net/5629265/gdb-nvclock.txt -- Stack Smashing Prevents Use https://launchpad.net/bugs/72117 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com

[Bug 72117] Re: Stack Smashing Prevents Use

2007-01-08 Thread justinchudgar
With current 2.6.20-4 kernel, it happens reliably. [EMAIL PROTECTED]:/home/justin# uname -a Linux justin01 2.6.20-4-generic #2 SMP Fri Jan 5 04:31:55 UTC 2007 i686 GNU/Linux [EMAIL PROTECTED]:/home/justin# nvclock -s *** stack smashing detected ***: nvclock terminated Aborted (core dumped) --

[Bug 72117] Re: Stack Smashing Prevents Use

2006-11-18 Thread justinchudgar
Woops. Seems that a reboot fixes the issue. My suggestion is that whatever flag be set in order to have the Update Notification applet indicate that a reboot is necessary. -- Stack Smashing Prevents Use https://launchpad.net/bugs/72117 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com

[Bug 72117] Re: Stack Smashing Prevents Use

2006-11-18 Thread ville palo
I was not able to reproduce on my edgy, could you please attach the crash dump/backtraces, instructions can be found here: https://wiki.ubuntu.com/DebuggingProgramCrash -- Stack Smashing Prevents Use https://launchpad.net/bugs/72117 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com