On Wed, 8 Aug 2012, Douglas Mencken wrote:

> sizeof(char*) has been used in an attempt to get string's length.
>
> Program received signal SIGSEGV, Segmentation fault.
> 0x00007ffff5912dfa in _IO_vfprintf_internal (s=0x7fffffffdf60,
>    format=<value optimized out>, ap=0x7fffffffe080) at vfprintf.c:1614
> 1614    vfprintf.c: No such file or directory.
>        in vfprintf.c
> (gdb) bt
> #0  0x00007ffff5912dfa in _IO_vfprintf_internal (s=0x7fffffffdf60,
>    format=<value optimized out>, ap=0x7fffffffe080) at vfprintf.c:1614
> #1  0x00007ffff5932979 in __IO_vsprintf (string=0x7076c0 "/tmp/dtdbcache_",
>    format=0x7ffff74a67e3 "%s/%s%s", args=0x7fffffffe080) at iovsprintf.c:43
> #2  0x00007ffff5919a78 in __sprintf (
>    s=0xffffe165 <Address 0xffffe165 out of bounds>,
>    format=0x7ffff74a67e8 "%s") at sprintf.c:34
> #3  0x00007ffff7484e6e in _DtDtsMMCacheName (override=<value optimized out>)
>    at DtsMM.c:574
> #4  0x00007ffff748512a in _DtDtsMMInit (override=0) at DtsMM.c:319
> ...
>
> This fixes it:
>

Hi, a patch fixing this bug was already submitted by Marc Balmer and
applied as commit facb50dfde50d087a7c72ae5da0e080a208625ff.

Thanks though!

-- 
Jon Trulson

"If the Martian rope-a-dope don't get him, he'll get himself, he'll
  come in too fast and punch himself out."
              - one of my brothers, referring to the Curiosity landing.

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
cdesktopenv-devel mailing list
cdesktopenv-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/cdesktopenv-devel

Reply via email to