PDA

View Full Version : *** glibc detected *** Centos 4.2 .6.0-DR3


Acolyte
12-28-2005, 08:33 PM
Starting zone:

[root@server EQEmuLinux]# ./zone . 204.13.68.100 7990 127.0.0.1
[Status] Starting Log: logs/eqemu_zone.log
[Status] Using database 'eqemu' at localhost
[Status] CURRENT_ZONE_VERSION: EQEMu 0.6.0-DR3
[Status] Mapping Opcodes
[Status] Loading Variables
[Status] Loading zone names
[Status] Loading items
[Status] libEMuShareMem.so loaded
[Status] Loading npcs
[Status] Loading npc faction lists
[Status] Loading NPC Faction Lists from database...
[Status] Loading loot tables
[Status] Loading Loot tables from database...
[Status] Loading doors
[Status] Loading Doors from database...
[Status] FileLoadSPDat() Loading spells from ./spells_us.txt
*** glibc detected *** double free or corruption (out): 0x083feab0 ***
Aborted


Any ideas?

sdabbs65
12-29-2005, 02:44 AM
Starting zone:

[root@server EQEmuLinux]# ./zone . 204.13.68.100 7990 127.0.0.1
[Status] Starting Log: logs/eqemu_zone.log
[Status] Using database 'eqemu' at localhost
[Status] CURRENT_ZONE_VERSION: EQEMu 0.6.0-DR3
[Status] Mapping Opcodes
[Status] Loading Variables
[Status] Loading zone names
[Status] Loading items
[Status] libEMuShareMem.so loaded
[Status] Loading npcs
[Status] Loading npc faction lists
[Status] Loading NPC Faction Lists from database...
[Status] Loading loot tables
[Status] Loading Loot tables from database...
[Status] Loading doors
[Status] Loading Doors from database...
[Status] FileLoadSPDat() Loading spells from ./spells_us.txt
*** glibc detected *** double free or corruption (out): 0x083feab0 ***
Aborted


Any ideas?

My guess this is a Red Hat system and thats a MYSQL error.
im guessing since this problem is isolated to running EQEMU only then
what version of MYSQL are you useing and how much memory do you have ?


http://xforce.iss.net/xforce/xfdb/11199

MySQL versions prior to 3.23.55 are vulnerable to a denial of service attack, caused by a vulnerability regarding a double-free memory pointer in the mysql_change_user() function. A remote or local attacker with a valid user account and using a malicious MySQL client could exploit this vulnerability to cause the mysqld service to crash.

Acolyte
12-29-2005, 03:33 AM
mysql Ver 14.7 Distrib 4.1.12, for redhat-linux-gnu -- so it's 4.1.12 default install on CentOS 4.2.

[root@server ~]# free
total used free shared buffers cached
Mem: 515108 450736 64372 0 44372 331580
-/+ buffers/cache: 74784 440324
Swap: 2104504 144 2104360