gvfsd-sftp crashed with SIGSEGV in fast_validate_len()

Bug #1034660 reported by tr33m4n
44
This bug affects 9 people
Affects Status Importance Assigned to Milestone
gvfs (Ubuntu)
Confirmed
Medium
Unassigned

Bug Description

Attempted to connect to a remote server via Nautilus using SSH

Description: Ubuntu quantal (development branch)
Release: 12.10
gvfs:
  Installed: 1.13.6-0ubuntu1
  Candidate: 1.13.6-0ubuntu1
  Version table:
 *** 1.13.6-0ubuntu1 0
        500 http://gb.archive.ubuntu.com/ubuntu/ quantal/main amd64 Packages
        100 /var/lib/dpkg/status

ProblemType: Crash
DistroRelease: Ubuntu 12.10
Package: gvfs-backends 1.13.6-0ubuntu1
ProcVersionSignature: Ubuntu 3.5.0-8.8-generic 3.5.0
Uname: Linux 3.5.0-8-generic x86_64
ApportVersion: 2.4-0ubuntu6
Architecture: amd64
Date: Wed Aug 8 23:37:44 2012
ExecutablePath: /usr/lib/gvfs/gvfsd-sftp
InstallationMedia: Ubuntu 12.10 "Quantal Quetzal" - Alpha amd64 (20120724.2)
ProcCmdline: /usr/lib/gvfs/gvfsd-sftp --spawner :1.7 /org/gtk/gvfs/exec_spaw/3
ProcEnviron:
 SHELL=/bin/bash
 PATH=(custom, no user)
 LANGUAGE=en_GB:en
 LANG=en_GB.UTF-8
SegvAnalysis:
 Segfault happened at: 0x7fc87ab16f28 <g_utf8_validate+456>: movzbl (%rdi),%r8d
 PC (0x7fc87ab16f28) ok
 source "(%rdi)" (0x6874756120656854) not located in a known VMA region (needed readable region)!
 destination "%r8d" ok
 Stack memory exhausted (SP below stack segment)
SegvReason: reading unknown VMA
Signal: 11
SourcePackage: gvfs
StacktraceTop:
 g_utf8_validate () from /lib/x86_64-linux-gnu/libglib-2.0.so.0
 g_variant_new_string () from /lib/x86_64-linux-gnu/libglib-2.0.so.0
 g_variant_new_strv () from /lib/x86_64-linux-gnu/libglib-2.0.so.0
 ?? () from /lib/x86_64-linux-gnu/libglib-2.0.so.0
 ?? () from /lib/x86_64-linux-gnu/libglib-2.0.so.0
Title: gvfsd-sftp crashed with SIGSEGV in g_utf8_validate()
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo

Revision history for this message
tr33m4n (tr33m4n) wrote :
visibility: private → public
Revision history for this message
Apport retracing service (apport) wrote :

StacktraceTop:
 fast_validate_len (max_len=<optimized out>, str=<optimized out>) at /build/buildd/glib2.0-2.33.8/./glib/gutf8.c:1582
 g_utf8_validate (str=0x6874756120656854 <Address 0x6874756120656854 out of bounds>, max_len=-1, end=0x0) at /build/buildd/glib2.0-2.33.8/./glib/gutf8.c:1631
 g_variant_new_variant (value=0x6874756120656854) at /build/buildd/glib2.0-2.33.8/./glib/gvariant.c:731
 ?? ()
 ?? ()

Revision history for this message
Apport retracing service (apport) wrote : Stacktrace.txt
Revision history for this message
Apport retracing service (apport) wrote : StacktraceSource.txt
Revision history for this message
Apport retracing service (apport) wrote : ThreadStacktrace.txt
Changed in gvfs (Ubuntu):
importance: Undecided → Medium
summary: - gvfsd-sftp crashed with SIGSEGV in g_utf8_validate()
+ gvfsd-sftp crashed with SIGSEGV in fast_validate_len()
tags: removed: need-amd64-retrace
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in gvfs (Ubuntu):
status: New → Confirmed
Revision history for this message
joey.blacksmith (joey-blacksmith) wrote :

Hi,

I will just add steps to reproduce. Open nautilus, connect to server, but it must be server you never logged into. Fill the protocol and other info. Connect. Crash. If you connect via terminal, it asks you for storing RSA key fingerprint. Afterwards you can also use nautilus' way. My guess is that it has something with authentification for the first time.

Hope this will help you guys!

Revision history for this message
vmerlet (vmerlet) wrote :

Hi,

I don't know if it can help somebody, but in my case, I was lacking the gvfs-backends package. So nautilus wasn't able to connect using sftp protocol.

Reinstallation of this package solved the problem.

bug #1033275 is for a different problem.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.