Control: fixed 857498 0.9.13-6
Dear Maintainer, just tried to make a more readable stack out of these backtraces. So that one points to function "record_CW" and a buffer overflow in that function got fixed in [1], like mentioned in last message. Therefore marking as fixed. Kind regards, Bernhard [1] https://github.com/LibVNC/x11vnc/pull/25 https://github.com/LibVNC/x11vnc/pull/25/commits/a3a34ca49c60738cc958096ebb06dc7dbff4660a *** stack smashing detected ***: x11vnc terminated ======= Backtrace: ========= /lib/x86_64-linux-gnu/libc.so.6(+0x70bcb)[0x7f016a945bcb] /lib/x86_64-linux-gnu/libc.so.6(__fortify_fail+0x37)[0x7f016a9ce0b7] /lib/x86_64-linux-gnu/libc.so.6(__fortify_fail+0x0)[0x7f016a9ce080] x11vnc(+0xb8887)[0x55babf222887] xrecord.c, line 1347: callq 0x55555555e3b0 <__stack_chk_fail@plt> x11vnc(+0xb8d3b)[0x55babf222d3b] xrecord.c, line 1387: callq 0x55555560bc80 <record_CW> /usr/lib/x86_64-linux-gnu/libXtst.so.6(+0x19d8)[0x7f016c6b59d8] src/XRecord.c, line 856: callq *%rax /usr/lib/x86_64-linux-gnu/libXtst.so.6(+0x1f55)[0x7f016c6b5f55] src/XRecord.c, line 987: callq 0x7ffff6e1a910 <parse_reply_call_callback> /usr/lib/x86_64-linux-gnu/libX11.so.6(+0x421dd)[0x7f016b98d1dd] src/xcb_io.c, line 305: callq *0x8(%rax) /usr/lib/x86_64-linux-gnu/libX11.so.6(_XEventsQueued+0x55)[0x7f016b98db15] src/xcb_io.c, line 350: callq 0x7ffff60f2190 <handle_response> /usr/lib/x86_64-linux-gnu/libX11.so.6(XPending+0x57)[0x7f016b97f7e7] src/Pending.c, line 55: callq 0x7ffff60cc2c0 <_XEventsQueued@plt> x11vnc(+0x97060)[0x55babf201060] userinput.c, line 2988: callq 0x55555555e490 <XRecordProcessReplies@plt> -> jmpq 0x7ffff6e1a2e0 <XPending@plt> x11vnc(+0xa1f95)[0x55babf20bf95] userinput.c, line 5712: callq 0x5555555eab00 <check_xrecord> x11vnc(+0x6a77c)[0x55babf1d477c] screen.c, line 4561: callq 0x5555555f5e90 <check_user_input> x11vnc(+0x13ae4)[0x55babf17dae4] x11vnc.c, line 5990: callq 0x5555555bdd10 <watch_loop> /lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf1)[0x7f016a8f52b1] x11vnc(+0x1cd7a)[0x55babf186d7a]
# Jessie amd64 qemu VM 2019-03-28 apt update apt dist-upgrade ######## approx: debian-9-stretch-snapshot.debian.org https://snapshot.debian.org/archive/debian/20170311T000000Z/ sources.list: deb [check-valid-until=no] http://192.168.178.25:9999/debian-9-stretch-snapshot.debian.org/ stretch main deb-src [check-valid-until=no] http://192.168.178.25:9999/debian-9-stretch-snapshot.debian.org/ stretch main echo 'Acquire::Languages "none";' > /etc/apt/apt.conf.d/99disable-translations echo 'Acquire::Check-Valid-Until "no";' > /etc/apt/apt.conf.d/99disable-check-valid-until apt update apt dist-upgrade apt install dpkg-dev devscripts x11vnc gdb wget https://snapshot.debian.org/archive/debian-debug/20161222T030857Z/pool/main/x/x11vnc/x11vnc-dbgsym_0.9.13-2_amd64.deb dpkg -i x11vnc-dbgsym_0.9.13-2_amd64.deb wget https://snapshot.debian.org/archive/debian-debug/20170128T030650Z/pool/main/libx/libx11/libx11-6-dbgsym_1.6.4-3_amd64.deb dpkg -i libx11-6-dbgsym_1.6.4-3_amd64.deb wget https://snapshot.debian.org/archive/debian-debug/20161206T030437Z/pool/main/libx/libxtst/libxtst6-dbgsym_1.2.3-1_amd64.deb dpkg -i libxtst6-dbgsym_1.2.3-1_amd64.deb mkdir /home/benutzer/source/x11vnc/orig -p cd /home/benutzer/source/x11vnc/orig apt source x11vnc gdb -q -ex 'set width 0' -ex 'set pagination off' -ex 'set backtrace past-main on' -ex 'directory /home/benutzer/source/x11vnc/orig/x11vnc-0.9.13/x11vnc' -ex 'b main' -ex 'run' --args x11vnc script -c "gdb -q -ex 'set width 0' -ex 'set pagination off' -ex 'set backtrace past-main on' -ex 'directory /home/benutzer/source/x11vnc/orig/x11vnc-0.9.13/x11vnc' -ex 'b main' -ex 'run' --args x11vnc" -a x11vnc-gdb_$(date +%Y-%m-%d_%H-%M-%S).log disassemble main benutzer@debian:~$ grep "ae4 " x11vnc-gdb_2019-03-29_01-45-59.log -B1 0x0000555555567adf <+19871>: callq 0x5555555bdd10 <watch_loop> 0x0000555555567ae4 <+19876>: xor %eax,%eax *** stack smashing detected ***: x11vnc terminated ======= Backtrace: ========= /lib/x86_64-linux-gnu/libc.so.6(+0x70bcb)[0x7f016a945bcb] /lib/x86_64-linux-gnu/libc.so.6(__fortify_fail+0x37)[0x7f016a9ce0b7] /lib/x86_64-linux-gnu/libc.so.6(__fortify_fail+0x0)[0x7f016a9ce080] x11vnc(+0xb8887)[0x55babf222887] xrecord.c, line 1347: callq 0x55555555e3b0 <__stack_chk_fail@plt> x11vnc(+0xb8d3b)[0x55babf222d3b] xrecord.c, line 1387: callq 0x55555560bc80 <record_CW> /usr/lib/x86_64-linux-gnu/libXtst.so.6(+0x19d8)[0x7f016c6b59d8] src/XRecord.c, line 856: callq *%rax /usr/lib/x86_64-linux-gnu/libXtst.so.6(+0x1f55)[0x7f016c6b5f55] src/XRecord.c, line 987: callq 0x7ffff6e1a910 <parse_reply_call_callback> /usr/lib/x86_64-linux-gnu/libX11.so.6(+0x421dd)[0x7f016b98d1dd] src/xcb_io.c, line 305: callq *0x8(%rax) /usr/lib/x86_64-linux-gnu/libX11.so.6(_XEventsQueued+0x55)[0x7f016b98db15] src/xcb_io.c, line 350: callq 0x7ffff60f2190 <handle_response> /usr/lib/x86_64-linux-gnu/libX11.so.6(XPending+0x57)[0x7f016b97f7e7] src/Pending.c, line 55: callq 0x7ffff60cc2c0 <_XEventsQueued@plt> x11vnc(+0x97060)[0x55babf201060] userinput.c, line 2988: callq 0x55555555e490 <XRecordProcessReplies@plt> -> jmpq 0x7ffff6e1a2e0 <XPending@plt> x11vnc(+0xa1f95)[0x55babf20bf95] userinput.c, line 5712: callq 0x5555555eab00 <check_xrecord> x11vnc(+0x6a77c)[0x55babf1d477c] screen.c, line 4561: callq 0x5555555f5e90 <check_user_input> x11vnc(+0x13ae4)[0x55babf17dae4] x11vnc.c, line 5990: callq 0x5555555bdd10 <watch_loop> /lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf1)[0x7f016a8f52b1] x11vnc(+0x1cd7a)[0x55babf186d7a] ======= Memory map: ======== https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851496 https://github.com/LibVNC/x11vnc/pull/25 https://github.com/LibVNC/x11vnc/pull/25/commits/a3a34ca49c60738cc958096ebb06dc7dbff4660a