Devuan bug report logs - #640
xorg: X server segfaults when using xpdf

version graph

Package: xorg; Maintainer for xorg is (unknown); Source for xorg is src:xorg.

Reported by: David Haworth <dh@thelancashireman.org>

Date: Tue, 30 Nov 2021 16:52:02 UTC

Severity: normal

Tags: debian

Found in version 1:7.7+23

Forwarded to https://bugs.debian.org/1000887

Full log


Message #15 received at 640@bugs.devuan.org (full text, mbox, reply):

Received: (at 640) by bugs.devuan.org; 30 Nov 2021 21:27:05 +0000
Return-Path: <dh@thelancashireman.org>
Delivered-To: devuanbugs@dyne.org
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Tue, 30 Nov 2021 21:27:05 +0000 (UTC)
Received: from mail2.runhosting.com (mail2.runhosting.com [185.176.40.12])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id C00D8F60C73
	for <640@bugs.devuan.org>; Tue, 30 Nov 2021 22:25:58 +0100 (CET)
Received: from mail2.runhosting.com (out2.runhosting.com [185.176.40.21])
	by mail2.runhosting.com (Postfix) with ESMTP id 339432D079917;
	Tue, 30 Nov 2021 21:25:57 +0000 (UTC)
Received: from thelancashireman.org (p2e551a3c.dip0.t-ipconnect.de [46.85.26.60])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by mail2.runhosting.com (Postfix) with ESMTPSA id C99DC2D079221;
	Tue, 30 Nov 2021 21:25:51 +0000 (UTC)
Date: Tue, 30 Nov 2021 22:25:50 +0100
From: David Haworth <dh@thelancashireman.org>
To: Mark Hindley <mark@hindley.org.uk>
Cc: David Haworth <dh@thelancashireman.org>, 640@bugs.devuan.org
Subject: Re: bug#640: xorg: X server segfaults when using xpdf
Message-ID: <YaaW3iRgxYPF0lJq@thelancashireman.org>
References: <163829099973.15973.9147358722255734011.reportbug@fionn.haworth.lan>
 <YaZdM/Ex71BsujkY@hindley.org.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <YaZdM/Ex71BsujkY@hindley.org.uk>
X-Virus-Scanned: ClamAV using ClamSMTP (out2.defender.mail(185.176.40.21), client: 185.176.40.12)
X-Spam-Status: No, score=-0.7 required=5.0 tests=RCVD_IN_DNSWL_LOW,
	RCVD_IN_MSPIKE_H2 autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org
Hi Mark,

The debian bug report is #1000887:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000887

I guess you can close this report.

All the best,
Dave

On 2021-11-30 17:19:47 +0000, Mark Hindley wrote:
> Control: tags -1 debian
> 
> David,
> 
> Thanks for this.
> 
> On Tue, Nov 30, 2021 at 05:49:59PM +0100, David Haworth wrote:
> > Package: xorg
> > Version: 1:7.7+23
> > Severity: normal
> 
> However, xorg and (as far as I can see) all of the packages possibly relating to
> this are not forked in Devuan. Devuan uses the Debian versions directly without
> recompilation.
> 
> > [ 10759.860] (EE) 0: /usr/lib/xorg/Xorg (OsLookupColor+0x135) [0x55662f3b7e05]
> > [ 10759.861] (EE) 1: /lib/x86_64-linux-gnu/libpthread.so.0 (funlockfile+0x50) [0x7fe2d501b8e0]
> > [ 10759.861] (EE) 2: ? (?+0x0) [0x7fe2c169003a]
> > [ 10759.861] (EE) 
> > [ 10759.861] (EE) Segmentation fault at address 0x7fe2c28be000
> > [ 10759.861] (EE) 
> 
> Please report to Debian's BTS.
> 
> Thanks.
> 
> Mark

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Tue Apr 30 03:52:19 2024;