Summary: | pdfsig: Segfault in ~SignatureHandler / double-free | ||
---|---|---|---|
Product: | poppler | Reporter: | Michael Joost <freedesktop> |
Component: | utils | Assignee: | poppler-bugs <poppler-bugs> |
Status: | RESOLVED MOVED | QA Contact: | |
Severity: | minor | ||
Priority: | medium | ||
Version: | unspecified | ||
Hardware: | x86-64 (AMD64) | ||
OS: | Linux (All) | ||
Whiteboard: | |||
i915 platform: | i915 features: |
Description
Michael Joost
2016-07-30 17:17:39 UTC
Isn't that actually a bug in nspr that behaves different in debug vs non debug? No, this is not a bug of nspr, because subsequent access to freed memory is most likely a design fault of its users. The only (light) problem of nspr is that it is debug by default. The DA pattern is most likely intended to identify such invalid use. Whether the double-destroy is a genuine problem of nss or pdfsig is not clear to me; don't know whether it is intended/allowed by nss to manage the same cert object in several lists. There is a condition in nss testing for NULL, which prevents the crash without the DA pattern, but this smells for problems. -- GitLab Migration Automatic Message -- This bug has been migrated to freedesktop.org's GitLab instance and has been closed from further activity. You can subscribe and participate further through the new bug through this link to our GitLab instance: https://gitlab.freedesktop.org/poppler/poppler/issues/212. |
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.