gvfsd-mtp crashed with SIGSEGV in __strlen_avx2()

Bug #1766346 reported by Igor Almeida
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
gvfs (Ubuntu)
New
Medium
Unassigned

Bug Description

the bug was at login

ProblemType: Crash
DistroRelease: Ubuntu 18.04
Package: gvfs-backends 1.36.1-0ubuntu1
ProcVersionSignature: Ubuntu 4.15.0-15.16-generic 4.15.15
Uname: Linux 4.15.0-15-generic x86_64
ApportVersion: 2.20.9-0ubuntu6
Architecture: amd64
CrashCounter: 1
CurrentDesktop: ubuntu:GNOME
Date: Mon Apr 23 00:28:57 2018
ExecutablePath: /usr/lib/gvfs/gvfsd-mtp
InstallationDate: Installed on 2018-04-09 (13 days ago)
InstallationMedia: Ubuntu 18.04 LTS "Bionic Beaver" - Beta amd64 (20180404)
ProcCmdline: /usr/lib/gvfs/gvfsd-mtp --spawner :1.24 /org/gtk/gvfs/exec_spaw/17
ProcEnviron:
 LANG=pt_PT.UTF-8
 LANGUAGE=pt:pt_BR:en
 PATH=(custom, no user)
 SHELL=/bin/bash
 XDG_RUNTIME_DIR=<set>
SegvAnalysis:
 Segfault happened at: 0x7f97bd4e55c7 <__strlen_avx2+55>: vpcmpeqb (%rdi),%ymm0,%ymm1
 PC (0x7f97bd4e55c7) ok
 source "(%rdi)" (0x5add1aa0) not located in a known VMA region (needed readable region)!
 destination "%ymm0" ok
 Stack memory exhausted (SP below stack segment)
SegvReason: reading unknown VMA
Signal: 11
SourcePackage: gvfs
StacktraceTop:
 __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:93
 ?? () from /usr/lib/x86_64-linux-gnu/libmtp.so.9
 ?? () from /usr/lib/x86_64-linux-gnu/libmtp.so.9
 ?? () from /usr/lib/x86_64-linux-gnu/libmtp.so.9
 ?? () from /usr/lib/x86_64-linux-gnu/libmtp.so.9
Title: gvfsd-mtp crashed with SIGSEGV in __strlen_avx2()
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo

Revision history for this message
Igor Almeida (profigor) wrote :
Revision history for this message
Apport retracing service (apport) wrote :

StacktraceTop:
 __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:93
 ptp_unpack_PTPTIME (str=0x5add1ab7 <error: Cannot access memory at address 0x5add1ab7>) at ptp-pack.c:646
 ptp_object_want (params=0x7f97a401d910, handle=1, want=want@entry=5, retob=retob@entry=0x7f97b8d2bb60) at ptp.c:6772
 ptp_add_object_to_cache (params=<optimized out>, handle=<optimized out>) at ptp.c:6895
 add_object_to_cache (device=0x7f97a4023ad0, object_id=<optimized out>) at libmtp.c:9134

Revision history for this message
Apport retracing service (apport) wrote : Stacktrace.txt
Revision history for this message
Apport retracing service (apport) wrote : StacktraceSource.txt
Changed in gvfs (Ubuntu):
importance: Undecided → Medium
tags: removed: need-amd64-retrace
Revision history for this message
Seth Arnold (seth-arnold) wrote : Bug is not a security issue

Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find.

information type: Private Security → Public
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.