Hello Michael Becker,
unfortunately it is not enough to just install the debug
information for the executable.

In your case the shared library leads us to the libsane package:
  # dpkg -S /usr/lib/x86_64-linux-gnu/sane/libsane-mustek_usb2.so.1
  libsane:amd64: /usr/lib/x86_64-linux-gnu/sane/libsane-mustek_usb2.so.1

Unfortunately libsane has not yet a dbgsym package, but there is an old style 
libsane-dbg.
With that installed your backtrace would be a lot more easier to read.

Nevertheless, from running xsane without such a hardware and just from
inspecting the assembly addresses I think this stack smashing happens somewhere
in function Mustek_DMAWrite [1].

I think this is the same issue as another user reported in bug #886777.
There is also a short draft how I think it could be possible to get
the exact location of the overwriting.

Unfortunately there I used wrongly "libsane-dbgsym" instead of "libsane-dbg".
Probably thereof that user never reported back ...

But probably you could give it a try?

Kind regards,
Bernhard


#886777 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886777
[1]     
https://gitlab.com/sane-project/backends/blob/master/backend/mustek_usb2_asic.c#L304

Reply via email to