Your message dated Tue, 15 Aug 2006 13:57:18 +0300
with message-id <[EMAIL PROTECTED]>
has caused the Debian Bug report #380439,
regarding tinyscheme: Segmentation fault on (let (x 1))
to be marked as having been forwarded to the upstream software
author(s) [EMAIL PROTECTED], [EMAIL PROTECTED]
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
(Sorry for the doubles. I'm learning to use Debian's BTS. Please
preserve the [EMAIL PROTECTED] address in CC on reply.)
Hello, I received the following bug report against tinyscheme 1.37. It
seems that if the formals list in (let) has anything but (var value)
lists, tinyscheme may crash. The use of |cadar| in OP_LET1 and |caar|
in OP_LET2 is unprotected.
----- Forwarded message from Volker Grabsch <[EMAIL PROTECTED]> -----
X-Sieve: cmu-sieve 2.0
Resent-From: [EMAIL PROTECTED]
Resent-Date: Wed, 9 Aug 2006 19:43:03 +0300
Resent-Message-ID: <[EMAIL PROTECTED]>
Resent-To: [EMAIL PROTECTED]
X-Sieve: CMU Sieve 2.2
Subject: Bug#380439: tinyscheme: Segmentation fault on (let (x 1))
Reply-To: Volker Grabsch <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Resent-From: Volker Grabsch <[EMAIL PROTECTED]>
Resent-To: debian-bugs-dist@lists.debian.org
Resent-CC: Panu Kalliokoski <[EMAIL PROTECTED]>
Resent-Date: Sun, 30 Jul 2006 08:33:13 UTC
Resent-Message-ID: <[EMAIL PROTECTED]>
X-Debian-PR-Message: report 380439
X-Debian-PR-Package: tinyscheme
X-Debian-PR-Keywords:
X-Debian-PR-Source: tinyscheme
From: Volker Grabsch <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-7.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
RCVD_IN_SORBS autolearn=no version=2.60-bugs.debian.org_2005_01_02
Resent-Sender: Debian BTS <[EMAIL PROTECTED]>
Resent-Date: Sun, 30 Jul 2006 01:33:17 -0700
X-Spam-Score: -1.7 (-)
Package: tinyscheme
Version: 1.37-3
Severity: important
To reproduce the bug, type this at the command line:
$ tinyscheme
TinyScheme 1.37
> (let (x 1))
Segmentation fault
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14.3-satapm
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C)
Versions of packages tinyscheme depends on:
ii libc6 2.3.6-13 GNU C Library: Shared libraries
tinyscheme recommends no packages.
-- no debconf information
----- End forwarded message -----
--
personal contact: [EMAIL PROTECTED], +35841 5323835
technical contact: [EMAIL PROTECTED], http://www.iki.fi/atehwa/
PGP fingerprint: 0EA5 9D33 6590 FFD4 921C 5A5F BE85 08F1 3169 70EC
Please consider membership of http://www.hospitalityclub.org/!
--- End Message ---