Your message dated Sat, 21 Sep 2019 08:59:26 -0400 with message-id <c57d937eed0feea1b49a750719619b3aaff4fc92.camel@debian.org> and subject line Closing bug 699288 for Debian ksh has caused the Debian Bug report #699288, regarding Segmentation fault in "kill %string" to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 699288: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699288 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: Segmentation fault in "kill %string"
- From: Jonny <jonny@csc.jp>
- Date: Wed, 30 Jan 2013 04:17:56 +0900
- Message-id: <20130130041756.230e23561b2881edee3b888a@csc.jp>
Package: ksh Version: 93u+20120801-1 Hi, ksh crashes when passing a "%string" to the kill command: $ strace ksh -c "kill %a" execve("/usr/bin/ksh", ["ksh", "-c", "kill %a"], [/* 16 vars */]) = 0 brk(0) = 0x81b3000 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb772d000 access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) open("/etc/ld.so.cache", O_RDONLY) = 3 fstat64(3, {st_mode=S_IFREG|0644, st_size=31208, ...}) = 0 mmap2(NULL, 31208, PROT_READ, MAP_PRIVATE, 3, 0) = 0xb7725000 close(3) = 0 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) open("/lib/i386-linux-gnu/i686/cmov/libdl.so.2", O_RDONLY) = 3 read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0`\n\0\0004\0\0\0"..., 512) = 512 fstat64(3, {st_mode=S_IFREG|0644, st_size=9844, ...}) = 0 mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb7724000 mmap2(NULL, 12408, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xb7720000 mmap2(0xb7722000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1) = 0xb7722000 close(3) = 0 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) open("/lib/i386-linux-gnu/i686/cmov/libutil.so.1", O_RDONLY) = 3 read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0 \n\0\0004\0\0\0"..., 512) = 512 fstat64(3, {st_mode=S_IFREG|0644, st_size=9800, ...}) = 0 mmap2(NULL, 12424, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xb771c000 mmap2(0xb771e000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1) = 0xb771e000 close(3) = 0 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) open("/lib/i386-linux-gnu/i686/cmov/libm.so.6", O_RDONLY) = 3 read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\2604\0\0004\0\0\0"..., 512) = 512 fstat64(3, {st_mode=S_IFREG|0644, st_size=148996, ...}) = 0 mmap2(NULL, 151680, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xb76f6000 mmap2(0xb771a000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x23) = 0xb771a000 close(3) = 0 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) open("/lib/i386-linux-gnu/i686/cmov/libc.so.6", O_RDONLY) = 3 read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\240o\1\0004\0\0\0"..., 512) = 512 fstat64(3, {st_mode=S_IFREG|0755, st_size=1437864, ...}) = 0 mmap2(NULL, 1452408, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xb7593000 mprotect(0xb76ef000, 4096, PROT_NONE) = 0 mmap2(0xb76f0000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15c) = 0xb76f0000 mmap2(0xb76f3000, 10616, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xb76f3000 close(3) = 0 mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb7592000 mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb7591000 set_thread_area({entry_number:-1 -> 6, base_addr:0xb7592b40, limit:1048575, seg_32bit:1, contents:0, read_exec_only:0, limit_in_pages:1, seg_not_present:0, useable:1}) = 0 mprotect(0xb76f0000, 8192, PROT_READ) = 0 mprotect(0xb771a000, 4096, PROT_READ) = 0 mprotect(0xb771e000, 4096, PROT_READ) = 0 mprotect(0xb7722000, 4096, PROT_READ) = 0 mprotect(0x81a0000, 36864, PROT_READ) = 0 mprotect(0xb774b000, 4096, PROT_READ) = 0 munmap(0xb7725000, 31208) = 0 mmap2(NULL, 81920, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb757d000 rt_sigaction(SIGSEGV, {0x81206f0, [], SA_INTERRUPT}, {SIG_DFL, [], 0}, 8) = 0 rt_sigaction(SIGSEGV, {SIG_DFL, [], SA_INTERRUPT}, {0x81206f0, [], SA_INTERRUPT}, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [SEGV], NULL, 8) = 0 getpid() = 495 getppid() = 494 getuid32() = 1001 geteuid32() = 1001 getgid32() = 1001 getegid32() = 1001 getrlimit(RLIMIT_STACK, {rlim_cur=8192*1024, rlim_max=RLIM_INFINITY}) = 0 getrlimit(RLIMIT_NPROC, {rlim_cur=1495, rlim_max=1495}) = 0 open("/proc/sys/kernel/ngroups_max", O_RDONLY) = 3 read(3, "65536\n", 31) = 6 close(3) = 0 umask(0) = 027 umask(027) = 0 getrlimit(RLIMIT_NOFILE, {rlim_cur=1024, rlim_max=4*1024}) = 0 fcntl64(0, F_GETFL) = 0x2 (flags O_RDWR) stat64("/dev/null", {st_mode=S_IFCHR|0666, st_rdev=makedev(1, 3), ...}) = 0 ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, {B9600 opost isig icanon echo ...}) = 0 _llseek(0, 0, 0xbf88eba0, SEEK_CUR) = -1 ESPIPE (Illegal seek) fstat64(0, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 2), ...}) = 0 fstat64(0, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 2), ...}) = 0 stat64("/dev/null", {st_mode=S_IFCHR|0666, st_rdev=makedev(1, 3), ...}) = 0 fstat64(0, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 2), ...}) = 0 fcntl64(1, F_GETFL) = 0x2 (flags O_RDWR) ioctl(1, SNDCTL_TMR_TIMEBASE or TCGETS, {B9600 opost isig icanon echo ...}) = 0 _llseek(1, 0, 0xbf88eba0, SEEK_CUR) = -1 ESPIPE (Illegal seek) fstat64(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 2), ...}) = 0 fstat64(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 2), ...}) = 0 brk(0) = 0x81b3000 mmap2(NULL, 49152, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb7571000 rt_sigaction(SIGSEGV, {0x81206f0, [], SA_INTERRUPT}, {SIG_DFL, [], SA_INTERRUPT}, 8) = 0 rt_sigaction(SIGSEGV, {SIG_DFL, [], SA_INTERRUPT}, {0x81206f0, [], SA_INTERRUPT}, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [SEGV], NULL, 8) = 0 fstat64(2, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 2), ...}) = 0 ioctl(2, SNDCTL_TMR_TIMEBASE or TCGETS, {B9600 opost isig icanon echo ...}) = 0 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0 gettimeofday({1359486703, 189021}, NULL) = 0 readlink("/proc/self/exe", "/bin/ksh93", 4097) = 10 time(NULL) = 1359486703 stat64("/home/JO", {st_mode=S_IFDIR|0750, st_size=4096, ...}) = 0 stat64(".", {st_mode=S_IFDIR|0750, st_size=4096, ...}) = 0 rt_sigaction(SIGCHLD, {0x8070eb0, [], SA_INTERRUPT}, {SIG_DFL, [], 0}, 8) = 0 --- SIGSEGV (Segmentation fault) @ 0 (0) --- +++ killed by SIGSEGV +++
--- End Message ---
--- Begin Message ---
- To: 699288-done@bugs.debian.org
- Subject: Closing bug 699288 for Debian ksh
- From: Boyuan Yang <byang@debian.org>
- Date: Sat, 21 Sep 2019 08:59:26 -0400
- Message-id: <c57d937eed0feea1b49a750719619b3aaff4fc92.camel@debian.org>
Version: 2020.0.0~beta1-1 Control: found -1 93u+20120801-3.4 Control: fixed -1 2020.0.0~beta1-1 At least this bug is fixed in the latest version (2020.0.0-beta1). Thanks, Boyuan YangAttachment: signature.asc
Description: This is a digitally signed message part
--- End Message ---