GNOME Bugzilla – Bug 351526
internet radio ogg stream
Last modified: 2006-08-16 01:29:50 UTC
From: Danny Schneider <Danny_Schneider_Hessen@web.de> To: submit@bugs.gnome.org X-Mailer: bug-buddy 2.14.0 Subject: internet radio ogg stream Distribution: Ubuntu 6.06 (dapper) Package: rhythmbox Severity: Normal Version: GNOME2.14.3 0.9.3.1 Gnome-Distributor: Ubuntu Synopsis: internet radio ogg stream Bugzilla-Product: rhythmbox Bugzilla-Component: general Bugzilla-Version: 0.9.3.1 BugBuddy-GnomeVersion: 2.0 (2.14.1) Description: Description of the crash: http://www.dradio.de/wir/ogg/ Steps to reproduce the crash: 1. added internet radio with: http://www.dradio.de/wir/ogg/ 2. pressed play 3. crashed Expected Results: crash How often does this happen? first time Additional Information: none Debugging Information: Backtrace was generated from '/usr/bin/rhythmbox' (no debugging symbols found) Using host libthread_db library "/lib/libthread_db.so.1". (no debugging symbols found) [Thread debugging using libthread_db enabled] [New Thread 46912596604112 (LWP 7945)] [New Thread 1082399072 (LWP 7948)] [New Thread 1082132832 (LWP 7947)] 0x00002aaaad7350ca in waitpid () from /lib/libpthread.so.0
+ Trace 70510
Thread 1 (Thread 46912596604112 (LWP 7945))
------- Bug created by bug-buddy at 2006-08-15 20:15 -------
That link seems to be broken: http://www.dradio.de/wir/ogg/ doesn't redirect to an OGG stream, it just goes to a webpage, which is why it can't "play" the stream. You might want to check with the radio stream providers, maybe their OGG link is broken and they weren't aware of it. With rhythmbox 0.9.5, it doesn't crash, it fails gracefuly and produces a message: Couldn't start playback You do not have a decoder installed to handle this file. You might need to install the necessary plugins.
For example on that same page, the link: http://www.dradio.de/streaming/dkultur_ogg.pls works fine in rhythmbox in 0.9.5 with gstreamer/gstreamer-plugins-base-0.10.9 and gstreamer-plugins-good-0.10.4.
Crashing where that trace indicates it is bug 343562, which would access random memory if the message contained a %s. It's already been fixed in cvs. *** This bug has been marked as a duplicate of 343562 ***