[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#459381: marked as done (xterm: segmentation fault when selecting multi-line text)



Your message dated Sun, 6 Jan 2008 13:34:14 +0100
with message-id <20080106123412.GE11383@patate.is-a-geek.org>
and subject line Bug#459041: fixed in xterm 231-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: xterm
Version: 230-1
Severity: important

*** Please type your report below this line ***

Selecting more than one line crashes xterm. The crash depends on what
the xterm window contains.

Steps to reproduce:
1. Start xterm
2. 'cat test.txt' (see attachment) The xterm window should look like the
attached xterm-before-selection.png
3. Position the pointer to the end of the '--disable-rectangles' string
4. Start selecting text left and upwards

Result:

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0xb7a9f8c0 (LWP 24435)]
0x08075444 in ?? ()
(gdb) bt
#0  0x08075444 in ?? ()
#1  0x080b9044 in ?? ()
#2  0xbfe664b8 in ?? ()
#3  0x0804e543 in ?? ()
#4  0x080b7e68 in ?? ()
#5  0x00000007 in ?? ()
#6  0x00000035 in ?? ()
#7  0xbfe664d8 in ?? ()
#8  0x080b7d68 in ?? ()
#9  0xb7e5b558 in ?? () from /usr/lib/libXt.so.6
#10 0xbfe664e8 in ?? ()
#11 0x08050e36 in ?? ()
#12 0xbfe664d8 in ?? ()
#13 0x080b7d68 in ?? ()
#14 0xbfe664e8 in ?? ()
#15 0xb7e236a1 in XtWidgetToApplicationContext () from
/usr/lib/libXt.so.6
Backtrace stopped: previous frame inner to this frame (corrupt stack?)


-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.23 (PREEMPT)
Locale: LANG=hu_HU, LC_CTYPE=hu_HU (charmap=ISO-8859-2)
Shell: /bin/sh linked to /bin/bash

Versions of packages xterm depends on:
ii  libc6                     2.7-5          GNU C Library: Shared libraries
ii  libfontconfig1            2.4.2-1.2      generic font configuration library
ii  libice6                   2:1.0.4-1      X11 Inter-Client Exchange library
ii  libncurses5               5.6+20071124-1 Shared libraries for terminal hand
ii  libsm6                    2:1.0.3-1+b1   X11 Session Management library
ii  libx11-6                  2:1.0.3-7      X11 client-side library
ii  libxaw7                   2:1.0.4-1      X11 Athena Widget library
ii  libxext6                  1:1.0.3-2      X11 miscellaneous extension librar
ii  libxft2                   2.1.12-2       FreeType-based font drawing librar
ii  libxmu6                   1:1.0.3-1      X11 miscellaneous utility library
ii  libxt6                    1:1.0.5-3      X11 toolkit intrinsics library
ii  xbitmaps                  1.0.1-2        Base X bitmaps

Versions of packages xterm recommends:
ii  xutils                      1:7.1.ds.3-1 X Window System utility programs

-- no debconf information

--disable-full-tgetent --disable-desktop --disable-setuid --disable-setgid --disable-imake --disable-active-icon --disable-ansi-color --disable-16-color --disable-blink-cursor --disable-c1-print --disable-bold-color --disable-color-class --disable-color-mode --disable-highlighting --disable-doublechars --disable-boxchars --disable-freetype --disable-sun-fkeys --disable-i18n --disable-initial-erase --disable-input-method --disable-maximize --disable-num-lock --disable-pty-handshake --disable-regex --disable-rightbar --disable-samename --disable-session-mgt --disable-tek4014 --disable-vt52 --disable-rectangles --disable-ziconbeep --disable-leaks --disable-echo

PNG image


--- End Message ---
--- Begin Message ---
Source: xterm
Source-Version: 231-1

[resending this, as I typoed the bug number in the changelog
 --Julien Cristau]


We believe that the bug you reported is fixed in the latest version of
xterm, which is due to be installed in the Debian FTP archive:

xterm_231-1.diff.gz
  to pool/main/x/xterm/xterm_231-1.diff.gz
xterm_231-1.dsc
  to pool/main/x/xterm/xterm_231-1.dsc
xterm_231-1_i386.deb
  to pool/main/x/xterm/xterm_231-1_i386.deb
xterm_231.orig.tar.gz
  to pool/main/x/xterm/xterm_231.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 459041@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Cristau <jcristau@debian.org> (supplier of updated xterm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 06 Jan 2008 10:13:28 +0100
Source: xterm
Binary: xterm
Architecture: source i386
Version: 231-1
Distribution: unstable
Urgency: low
Maintainer: Debian X Strike Force <debian-x@lists.debian.org>
Changed-By: Julien Cristau <jcristau@debian.org>
Description: 
 xterm      - X terminal emulator
Closes: 459014
Changes: 
 xterm (231-1) unstable; urgency=low
 .
   * New upstream release
     + undo change to getXtermCell() from patch #230 using PACK_PAIR macro
       (closes: #459014, analysis by Caetano Jimenez Carezzato).
Files: 
 abaa888d8ea6ddae017583aa038d441d 805 x11 optional xterm_231-1.dsc
 b767d702e1464e16802b90c2187252c6 850863 x11 optional xterm_231.orig.tar.gz
 ce834ff2e604e239d1927a4ccddfbaa7 61449 x11 optional xterm_231-1.diff.gz
 cb7a210bd50a78163709eb1e8345b67a 462338 x11 optional xterm_231-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHgKpwmEvTgKxfcAwRAj8QAKChoJ12c5vuQVujQ3nAH/Z6juDGLwCghSEr
qHWQYQxaWKCncxFuV6Teyxg=
=FDQ+
-----END PGP SIGNATURE-----




--- End Message ---

Reply to: