iphone-set-info crashed with SIGSEGV in plist_get_string_val()

Bug #755799 reported by ma la
24
This bug affects 4 people
Affects Status Importance Assigned to Milestone
libgpod (Ubuntu)
New
Medium
Unassigned

Bug Description

crash gtpod

ProblemType: Crash
DistroRelease: Ubuntu 11.04
Package: libgpod-common 0.7.95-1build2
ProcVersionSignature: Ubuntu 2.6.38-8.41-generic 2.6.38.2
Uname: Linux 2.6.38-8-generic i686
Architecture: i386
Date: Sat Apr 9 22:24:53 2011
ExecutablePath: /lib/udev/iphone-set-info
InstallationMedia: Ubuntu 10.10 "Maverick Meerkat" - Release i386 (20101007)
ProcCmdline: /lib/udev/iphone-set-info
ProcEnviron:

SegvAnalysis:
 Segfault happened at: 0xa91706: movdqu (%edi),%xmm1
 PC (0x00a91706) ok
 source "(%edi)" (0x00000000) not located in a known VMA region (needed readable region)!
 destination "%xmm1" ok
SegvReason: reading NULL VMA
Signal: 11
SourcePackage: libgpod
StacktraceTop:
 ?? () from /lib/i386-linux-gnu/libc.so.6
 plist_get_string_val () from /usr/lib/libplist.so.1
 ?? ()
 ?? ()
 __libc_start_main () from /lib/i386-linux-gnu/libc.so.6
Title: iphone-set-info crashed with SIGSEGV in plist_get_string_val()
UpgradeStatus: Upgraded to natty on 2011-04-08 (1 days ago)
UserGroups:

Revision history for this message
ma la (boehser-speedy) wrote :
Revision history for this message
Apport retracing service (apport) wrote :

StacktraceTop:
 __strlen_sse2_bsf () at ../sysdeps/i386/i686/multiarch/strlen-sse2-bsf.S:52
 plist_get_string_val (node=0x0, val=0xbfb54680) at /build/buildd/libplist-1.4/src/plist.c:526
 read_sysinfo_extended_by_uuid (uuid=0xbfb54ef9 "5cc82950626d6c5e1acfc89b2c6785983e362bd8") at ../../../tools/ipod-lockdown.c:81
 write_sysinfo_extended (argc=1, argv=0xbfb54784) at ../../../tools/iphone-callout.c:15
 main (argc=1, argv=0xbfb54784) at ../../../tools/iphone-callout.c:63

Revision history for this message
Apport retracing service (apport) wrote : Stacktrace.txt
Revision history for this message
Apport retracing service (apport) wrote : ThreadStacktrace.txt
Changed in libgpod (Ubuntu):
importance: Undecided → Medium
tags: removed: need-i386-retrace
security vulnerability: yes → no
visibility: private → public
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.