Mailinglist Archive: opensuse-bugs (4690 mails)

< Previous Next >
[Bug 582599] New: rpm crashes on kernel-source.spec
  • From: bugzilla_noreply@xxxxxxxxxx
  • Date: Wed, 24 Feb 2010 09:40:00 +0000
  • Message-id: <bug-582599-21960@xxxxxxxxxxxxxxxxxxxxxxxx/>
http://bugzilla.novell.com/show_bug.cgi?id=582599

http://bugzilla.novell.com/show_bug.cgi?id=582599#c0


Summary: rpm crashes on kernel-source.spec
Classification: openSUSE
Product: openSUSE 11.3
Version: Factory
Platform: Other
OS/Version: Other
Status: NEW
Severity: Critical
Priority: P5 - None
Component: Development
AssignedTo: mls@xxxxxxxxxx
ReportedBy: coolo@xxxxxxxxxx
QAContact: qa@xxxxxxx
CC: adrian@xxxxxxxxxx, rguenther@xxxxxxxxxx
Found By: ---
Blocker: ---


This needs urgent fixing. This seems to be a combination of stricter gcc 4.5
FORTIFY checks and MALLOC_CHECK_=3

==28999== Invalid read of size 4
==28999== at 0x69224C9: readLine (parseSpec.c:140)
==28999== by 0x691E0E8: parsePreamble (parsePreamble.c:903)
==28999== by 0x6921ED5: parseSpec (parseSpec.c:468)
==28999== by 0x804A74D: buildForTarget (build.c:253)
==28999== by 0x804AD6B: build (build.c:312)
==28999== by 0x804BA98: main (rpmqv.c:701)
==28999== Address 0x76b03b4 is 8,204 bytes inside a block of size 8,212 free'd
==28999== at 0x68FE886: free (in
/usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==28999== by 0x69223C4: readLine (system.h:236)
==28999== by 0x691E0E8: parsePreamble (parsePreamble.c:903)
==28999== by 0x6921ED5: parseSpec (parseSpec.c:468)
==28999== by 0x804A74D: buildForTarget (build.c:253)
==28999== by 0x804AD6B: build (build.c:312)
==28999== by 0x804BA98: main (rpmqv.c:701)
==28999==
==28999== Invalid read of size 1
==28999== at 0x69224CF: readLine (parseSpec.c:142)
==28999== by 0x691E0E8: parsePreamble (parsePreamble.c:903)
==28999== by 0x6921ED5: parseSpec (parseSpec.c:468)
==28999== by 0x804A74D: buildForTarget (build.c:253)
==28999== by 0x804AD6B: build (build.c:312)
==28999== by 0x804BA98: main (rpmqv.c:701)
==28999== Address 0x76ae3c3 is 27 bytes inside a block of size 8,212 free'd
==28999== at 0x68FE886: free (in
/usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==28999== by 0x69223C4: readLine (system.h:236)
==28999== by 0x691E0E8: parsePreamble (parsePreamble.c:903)
==28999== by 0x6921ED5: parseSpec (parseSpec.c:468)
==28999== by 0x804A74D: buildForTarget (build.c:253)
==28999== by 0x804AD6B: build (build.c:312)
==28999== by 0x804BA98: main (rpmqv.c:701)
==28999==
==28999== Invalid write of size 4
==28999== at 0x69224F9: readLine (parseSpec.c:146)
==28999== by 0x691E0E8: parsePreamble (parsePreamble.c:903)
==28999== by 0x6921ED5: parseSpec (parseSpec.c:468)
==28999== by 0x804A74D: buildForTarget (build.c:253)
==28999== by 0x804AD6B: build (build.c:312)
==28999== by 0x804BA98: main (rpmqv.c:701)
==28999== Address 0x76b03b4 is 8,204 bytes inside a block of size 8,212 free'd
==28999== at 0x68FE886: free (in
/usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==28999== by 0x69223C4: readLine (system.h:236)
==28999== by 0x691E0E8: parsePreamble (parsePreamble.c:903)
==28999== by 0x6921ED5: parseSpec (parseSpec.c:468)
==28999== by 0x804A74D: buildForTarget (build.c:253)
==28999== by 0x804AD6B: build (build.c:312)
==28999== by 0x804BA98: main (rpmqv.c:701)

--
Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

< Previous Next >