*** This bug is a duplicate of bug 38429 ***
    https://bugs.launchpad.net/bugs/38429

(evolution:6307): libexchangemapi-DEBUG: Create profile with xxx.xxx
xxxx xxxx.xxxxxx.net

(evolution:6307): libexchangemapi-DEBUG: exchange-mapi-connection.c:3301: 
exchange_mapi_create_profile: lock(connect_lock)
(evolution:6307): libexchangemapi-DEBUG: exchange-mapi-connection.c:87: 
ensure_mapi_init_called: lock(connect_lock)
(evolution:6307): libexchangemapi-DEBUG: exchange-mapi-connection.c:89: 
ensure_mapi_init_called: unlock(connect_lock)
(evolution:6307): libexchangemapi-DEBUG: Logging into the server... 
==6307== Invalid read of size 4
==6307==    at 0xFEFA7DA: ??? (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFA8F8: _krb5_config_vget_next (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFA9DF: _krb5_config_vget (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFAACB: krb5_config_vget_string (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFADC0: krb5_config_vget_bool_default (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFAE92: krb5_config_get_bool_default (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFF110C7: ??? (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFF11159: krb5_get_init_creds_opt_set_default_flags (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE61555: kerberos_kinit_password_cc (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE6A707: kinit_to_ccache (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE69189: cli_credentials_get_named_ccache (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE6923E: cli_credentials_get_ccache (in 
/usr/lib/libgensec.so.0.0.1)
==6307==  Address 0x78c888c is 3 bytes after a block of size 1 alloc'd
==6307==    at 0x4025BD3: malloc (vg_replace_malloc.c:236)
==6307==    by 0x51E146F: strdup (strdup.c:43)
==6307==    by 0x54A4D51: krb5_set_default_realm (in /usr/lib/libkrb5.so.3.3)
==6307==    by 0xFE64E6F: smb_krb5_init_context_basic (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE64F9F: smb_krb5_init_context (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE688A4: cli_credentials_get_krb5_context (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE68E60: ??? (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE69141: cli_credentials_get_named_ccache (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE6923E: cli_credentials_get_ccache (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE69481: cli_credentials_get_client_gss_creds (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE6CA88: ??? (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEADEEB: ??? (in /usr/lib/libgensec.so.0.0.1)
==6307== 
==6307== Invalid read of size 1
==6307==    at 0x40271F0: strcmp (mc_replace_strmem.c:426)
==6307==    by 0xFEFA7EB: ??? (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFA8F8: _krb5_config_vget_next (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFA9DF: _krb5_config_vget (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFAACB: krb5_config_vget_string (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFADC0: krb5_config_vget_bool_default (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFAE92: krb5_config_get_bool_default (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFF110C7: ??? (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFF11159: krb5_get_init_creds_opt_set_default_flags (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE61555: kerberos_kinit_password_cc (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE6A707: kinit_to_ccache (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE69189: cli_credentials_get_named_ccache (in 
/usr/lib/libgensec.so.0.0.1)
==6307==  Address 0x0 is not stack'd, malloc'd or (recently) free'd
==6307== 
==6307== 
==6307== Process terminating with default action of signal 11 (SIGSEGV)
==6307==  Access not within mapped region at address 0x0
==6307==    at 0x40271F0: strcmp (mc_replace_strmem.c:426)
==6307==    by 0xFEFA7EB: ??? (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFA8F8: _krb5_config_vget_next (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFA9DF: _krb5_config_vget (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFAACB: krb5_config_vget_string (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFADC0: krb5_config_vget_bool_default (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFEFAE92: krb5_config_get_bool_default (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFF110C7: ??? (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFF11159: krb5_get_init_creds_opt_set_default_flags (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE61555: kerberos_kinit_password_cc (in 
/usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE6A707: kinit_to_ccache (in /usr/lib/libgensec.so.0.0.1)
==6307==    by 0xFE69189: cli_credentials_get_named_ccache (in 
/usr/lib/libgensec.so.0.0.1)
==6307==  If you believe this happened as a result of a stack
==6307==  overflow in your program's main thread (unlikely but
==6307==  possible), you can try to increase the size of the
==6307==  main thread stack using the --main-stacksize= flag.
==6307==  The main thread stack size used in this run was 8388608.
==6307== 
==6307== HEAP SUMMARY:
==6307==     in use at exit: 10,304,295 bytes in 80,123 blocks
==6307==   total heap usage: 1,083,887 allocs, 1,003,764 frees, 147,057,482 
bytes allocated
==6307== 
==6307== LEAK SUMMARY:
==6307==    definitely lost: 111,590 bytes in 1,271 blocks
==6307==    indirectly lost: 121,434 bytes in 1,991 blocks
==6307==      possibly lost: 7,881,941 bytes in 63,623 blocks
==6307==    still reachable: 2,189,330 bytes in 13,238 blocks
==6307==         suppressed: 0 bytes in 0 blocks
==6307== Rerun with --leak-check=full to see details of leaked memory
==6307== 
==6307== For counts of detected and suppressed errors, rerun with: -v
==6307== Use --track-origins=yes to see where uninitialised values come from
==6307== ERROR SUMMARY: 736 errors from 50 contexts (suppressed: 755 from 12)

-- 
"subscribe to other user's folder" has no effect whatsoever
https://bugs.launchpad.net/bugs/612960
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to