avogadro crashed with SIGSEGV in Avogadro::GLWidget::undoStack()

Bug #1503261 reported by MMALAIDURAI
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
avogadro (Ubuntu)
New
Medium
Unassigned

Bug Description

i could not correct

ProblemType: Crash
DistroRelease: Ubuntu 15.10
Package: avogadro 1.1.1-0ubuntu5
ProcVersionSignature: Ubuntu 4.2.0-13.15-generic 4.2.1
Uname: Linux 4.2.0-13-generic i686
ApportVersion: 2.19-0ubuntu1
Architecture: i386
CurrentDesktop: Unity
Date: Tue Oct 6 15:32:27 2015
ExecutablePath: /usr/bin/avogadro
InstallationDate: Installed on 2015-09-13 (23 days ago)
InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Release i386 (20150422)
ProcCmdline: avogadro
ProcEnviron:
 PATH=(custom, no user)
 SHELL=/bin/bash
 LANG=en_US.UTF-8
 LANGUAGE=en_US
 XDG_RUNTIME_DIR=<set>
SegvAnalysis:
 Segfault happened at: 0xb6325307 <_ZNK8Avogadro8GLWidget9undoStackEv+7>: mov 0x8c(%eax),%eax
 PC (0xb6325307) ok
 source "0x8c(%eax)" (0x0000008c) not located in a known VMA region (needed readable region)!
 destination "%eax" ok
SegvReason: reading NULL VMA
Signal: 11
SourcePackage: avogadro
StacktraceTop:
 Avogadro::GLWidget::undoStack() const () from /usr/lib/libavogadro.so.1
 ?? () from /usr/lib/avogadro/1_1/tools/manipulatetool.so
 ?? () from /usr/lib/avogadro/1_1/tools/manipulatetool.so
 ?? () from /usr/lib/avogadro/1_1/tools/manipulatetool.so
 QMetaObject::activate(QObject*, QMetaObject const*, int, void**) () from /usr/lib/i386-linux-gnu/libQtCore.so.4
Title: avogadro crashed with SIGSEGV in Avogadro::GLWidget::undoStack()
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo

Revision history for this message
MMALAIDURAI (mmduraiphy) wrote :
Revision history for this message
Apport retracing service (apport) wrote :

StacktraceTop:
 Avogadro::GLWidget::undoStack (this=0x8ec6dc0) at /build/avogadro-fEWzzu/avogadro-1.1.1/libavogadro/src/glwidget.cpp:2206
 Avogadro::ManipulateTool::applyManualManipulation (this=0x8625280) at /build/avogadro-fEWzzu/avogadro-1.1.1/libavogadro/src/tools/manipulatetool.cpp:106
 Avogadro::ManipulateTool::buttonClicked (this=0x8625280, button=0x907b008) at /build/avogadro-fEWzzu/avogadro-1.1.1/libavogadro/src/tools/manipulatetool.cpp:173
 Avogadro::ManipulateTool::qt_static_metacall (_o=0x8625280, _c=QMetaObject::InvokeMetaMethod, _id=0, _a=0xbf8709c4) at /build/avogadro-fEWzzu/avogadro-1.1.1/obj-i686-linux-gnu/libavogadro/src/tools/moc_manipulatetool.cxx:49
 QMetaObject::activate (sender=0x907c0a8, m=0xb740d738 <QDialogButtonBox::staticMetaObject>, local_signal_index=0, argv=0xbf8709c4) at kernel/qobject.cpp:3567

Revision history for this message
Apport retracing service (apport) wrote : Stacktrace.txt
Revision history for this message
Apport retracing service (apport) wrote : StacktraceSource.txt
Revision history for this message
Apport retracing service (apport) wrote : ThreadStacktrace.txt
Changed in avogadro (Ubuntu):
importance: Undecided → Medium
tags: removed: need-i386-retrace
Revision history for this message
Seth Arnold (seth-arnold) wrote : Bug is not a security issue

Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find.

information type: Private Security → Public
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.