Your message dated Mon, 1 Mar 2010 12:54:18 -0600
with message-id <20100301185418.ga31...@progeny.tock>
has caused the   report #173664,
regarding mawk crashes
to be marked as having been forwarded to the upstream software
author(s) 

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
173664: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=173664
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
tags 163664 - fixed-upstream
thanks

Hi Aleksey and Thomas,

Aleksey Cheusov wrote:

> mawk crashes if the script contains long strings or regular expressions.
> The following is a stack:
> 
> #0  0x0804da9d in collect_string () at scan.c:985
> #1  0x0804d27c in yylex () at scan.c:651
> #2  0x0804978f in yyparse () at y.tab.c:1408
> #3  0x080496bb in parse () at parse.y:1363
> #4  0x0804de4e in main (argc=3, argv=0xbffff174) at main.c:63
> #5  0x400627ee in __libc_start_main () from /lib/libc.so.6
> 
> Look at this limit
> 
> sizes.h:83 #define  MIN_SPRINTF    400 

Thanks for the report.  This is still a problem with the latest
upstream version:

; # 640 a’s
; letters="aaaaaaaaaa"
; letters="$letters$letters$letters$letters"
; letters="$letters$letters$letters$letters"
; letters="$letters$letters$letters$letters"
; mawk 'BEGIN {print "$letters$letters";}'
Segmentation fault

That is on i386.  You might need double the length on a system with
64-bit pointers.

This is not fixed by the patch in http://bugs.debian.org/391051 but
could be fixed by something similar.  As with that bug, I think the
check should be <= SPRINTF_SZ - whatever.

Thought you might like to know.

Cheers,
Jonathan


--- End Message ---

Reply via email to