X2Go Bug report logs - #1460
Windows client crashes if Jumphost runs NetBSD 6 (probably race)

version graph

Package: x2goclient; Maintainer for x2goclient is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goclient is src:x2goclient.

Reported by: Edgar Fuß <ef@math.uni-bonn.de>

Date: Sun, 19 Apr 2020 18:25:01 UTC

Severity: normal

Found in version

Full log

🔗 View this message in rfc822 format

X-Loop: owner@bugs.x2go.org
Subject: Bug#1460: possible backtrace
Reply-To: Edgar Fuß <ef@math.uni-bonn.de>, 1460@bugs.x2go.org
Resent-From: Edgar Fuß <ef@math.uni-bonn.de>
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Mon, 04 May 2020 15:50:01 +0000
Resent-Message-ID: <handler.1460.B1460.158860730630909@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: followup 1460
X-X2Go-PR-Package: x2goclient
References: <20200419182314.GT12762@trav.math.uni-bonn.de> <handler.1460.B.158732059822516.ack@bugs.x2go.org> <20200419182314.GT12762@trav.math.uni-bonn.de>
Received: via spool by 1460-submit@bugs.x2go.org id=B1460.158860730630909
          (code B ref 1460); Mon, 04 May 2020 15:50:01 +0000
Received: (at 1460) by bugs.x2go.org; 4 May 2020 15:48:26 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on
X-Spam-Status: No, score=0.8 required=3.0 tests=BAYES_50,SPF_HELO_NONE
	autolearn=ham autolearn_force=no version=3.4.2
Received: from ems.math.uni-bonn.de (ems.math.uni-bonn.de [])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id 2C7D05DAC1
	for <1460@bugs.x2go.org>; Mon,  4 May 2020 17:48:22 +0200 (CEST)
Received: from trav.math.uni-bonn.de (p54932A39.dip0.t-ipconnect.de [])
	by ems.math.uni-bonn.de (Postfix) with ESMTPSA id 53BB4BC9F1
	for <1460@bugs.x2go.org>; Mon,  4 May 2020 17:48:21 +0200 (CEST)
	(envelope-from ef@math.uni-bonn.de)
Date: Mon, 4 May 2020 17:48:19 +0200
From: Edgar Fuß <ef@math.uni-bonn.de>
To: 1460@bugs.x2go.org
Message-ID: <20200504154819.GC12762@trav.math.uni-bonn.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <handler.1460.B.158732059822516.ack@bugs.x2go.org>
User-Agent: Mutt/1.11.4 (2019-03-13)
I may have been able to obtain a backtrace (using windebug):

 # ChildEBP RetAddr  Args to Child              
00 0607e87c 771d98cb 77114c88 933a9ca3 01b70000 ntdll!RtlpValidateHeapEntry+0x63ad4
01 0607e8dc 7712dd3e 015bfd78 933a9dcf 015bfd70 ntdll!RtlDebugFreeHeap+0xc6 (FPO: [Non-Fpo])
02 0607e9b0 77176ceb 015bfd70 015bfd78 015bfd78 ntdll!RtlpFreeHeap+0xce (FPO: [Non-Fpo])
03 0607ea0c 7712dc16 00000000 00000000 00000000 ntdll!RtlpFreeHeapInternal+0x783 (FPO: [Non-Fpo])
04 0607ea2c 754d7409 01b70000 00000000 015bfd78 ntdll!RtlFreeHeap+0x46 (FPO: [Non-Fpo])
05 0607ea78 61af8e1a 015bfd78 0000008b 0000008b msvcrt!free+0x69 (FPO: [Non-Fpo])
06 0607eac8 61ae8470 03be64f0 03addae8 0000000a libssh!ssh_threads_get_pthread+0x291a
07 0607eb08 61ae3c8c 03befbe0 03be64f0 0607eb3c libssh!ssh_pki_copy_cert_to_privkey+0x250
08 0607eb48 61ae2d84 03b1a620 00000015 03be65b0 libssh!ssh_bind_options_parse_config+0x215c
09 0607eb88 61ae3407 03b1a620 00000015 61b1b180 libssh!ssh_bind_options_parse_config+0x1254
0a 0607ebf8 61ae394f 03bc5070 00000010 03b1a620 libssh!ssh_bind_options_parse_config+0x18d7
0b 0607ec38 61ac55b7 03bc4ec0 0607ecb0 000001c0 libssh!ssh_bind_options_parse_config+0x1e1f
0c 00000000 00000000 00000000 00000000 00000000 libssh!ssh_buffer_add_data+0xe7

Unfortunately, this looks like a double free in libssh to me.

Send a report that this bug log contains spam.

X2Go Developers <owner@bugs.x2go.org>. Last modified: Wed Oct 27 13:11:15 2021; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.