Debug backtrace: "#0 msn_session_set_login_step (session=0x2, step=MSN_LOGIN_STEP_AUTH) at ../../../../src/protocols/msn/session.c:370 #1 0xb71ea51b in nexus_connect_cb (data=0x855c0d0, gsc=0x8543970, cond=GAIM_INPUT_READ) at ../../../../src/protocols/msn/nexus.c:482 #2 0xb71a6fb3 in ssl_gnutls_handshake_cb (data=0x8543970, source=14, cond=GAIM_INPUT_READ) at ../../../plugins/ssl/ssl-gnutls.c:96 #3 0x080fafe3 in gaim_gtk_io_invoke (source=0x84ada00, condition=G_IO_IN, data=0x853c7f0) at ../../src/gtkeventloop.c:74 #4 0xb78acc8d in g_io_unix_dispatch (source=0x85772e0, callback=0x80fafa0 <gaim_gtk_io_invoke>, user_data=0x853c7f0) at giounix.c:162 #5 0xb7883802 in IA__g_main_context_dispatch (context=0x8184180) at gmain.c:2045 #6 0xb78867df in g_main_context_iterate (context=0x8184180, block=1, dispatch=1, self=0x8165378) at gmain.c:2677 #7 0xb7886b89 in IA__g_main_loop_run (loop=0x85476b8) at gmain.c:2881 #8 0xb7bb8574 in IA__gtk_main () at gtkmain.c:1024 #9 0x0810fd0c in main (argc=Cannot access memory at address 0x5 ) at ../../src/gtkmain.c:764"
Might be similar to http://sourceforge.net/tracker/index.php?func=detail&aid=1235998&group_id=235&atid=100235 upstream which has been closed without any clear reason (or the SF bug tracker is confusing)? Does anybody knows if that has been fixed or if the bug should be reopened upstream? ** Summary changed: - gaim crash after an unsuccessfull connection "read error" + gaim crash after an unsuccessfull connection "read error" (msn_session_set_login_step) ** Changed in: gaim (Ubuntu) Importance: Undecided => Medium Status: Unconfirmed => Confirmed ** Bug watch added: SourceForge.net Tracker #1235998 http://sourceforge.net/support/tracker.php?aid=1235998 ** Also affects: gaim (upstream) via http://sourceforge.net/support/tracker.php?aid=1235998 Importance: Unknown Status: Unknown -- gaim crash after an unsuccessfull connection "read error" (msn_session_set_login_step) https://launchpad.net/bugs/71031 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs