[okular] [Bug 410844] Okular segfault
Tobias Deiminger
bugzilla_noreply at kde.org
Wed Aug 21 00:28:06 BST 2019
https://bugs.kde.org/show_bug.cgi?id=410844
Tobias Deiminger <haxtibal at posteo.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |haxtibal at posteo.de
--- Comment #10 from Tobias Deiminger <haxtibal at posteo.de> ---
(In reply to Albert Astals Cid from comment #9)
> The backtraces really make no sense :/
The only suspicious thing I can spot is the this-pointer of the RefCount object
in comment 0 (this=0xc40c758) and comment 8 (this=0xffe824e92a894476). The
former is uncommonly low, the latter is too high, because it resides in the
hole of non-canonical virtual memory addresses on x86_64. Both traces from two
different people show the same kind of oddness, that's something where one
could dig deeper.
Such an invalid this-pointer could for example occur if in
TextDocumentGenerator::loadDocumentWithPassword, the QVector [] operator in
objects[ info.page ].append(/*...*/)
does an out of bounds access to the objects array.
There's already some safety implemented
if ( info.page >= objects.count() )
continue;
but info.page is a signed int, and the check doesn't catch negative page
numbers. So in theory we could fail here, unless info.page >= 0 is ensured in
some other place.
It's quite late. Can anybody double check for how much nonsense I've just
written?
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the Okular-devel
mailing list