Your message dated Fri, 23 Nov 2018 21:33:35 +0000
with message-id <e1gqj4x-000itu...@fasolo.debian.org>
and subject line Bug#914262: fixed in xkeycaps 2.47-4.1+deb9u1
has caused the Debian Bug report #914262,
regarding Segfaults on "Write Output" if more than 8 keysyms per key are present
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
914262: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914262
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: xkeycaps
Version: 2.47-4.1
Severity: grave
Tags: stretch patch
The code only deals with 8 names per key, but unfortunately doesn't expose that
number as a constant that is easily changed. Clip to 8 so we don't segfault.
Program received signal SIGSEGV, Segmentation fault.
strlen () at ../sysdeps/x86_64/strlen.S:106
106 ../sysdeps/x86_64/strlen.S: Datei oder Verzeichnis nicht gefunden.
(gdb) bt
#0 strlen () at ../sysdeps/x86_64/strlen.S:106
#1 0x00007ffff6a2fa45 in __GI__IO_fputs (
str=str@entry=0x7fff0000000a <error: Cannot access memory at address
0x7fff0000000a>,
fp=fp@entry=0x5555559f6da0) at iofputs.c:33
#2 0x00005555555dc2a4 in fprintf (__fmt=0x5555555e49e1 "%s",
__stream=<optimized out>)
at /usr/include/x86_64-linux-gnu/bits/stdio2.h:97
#3 button_write (button=<optimized out>, client_data=<optimized out>,
call_data=<optimized out>) at commands.c:629
#4 0x00007ffff7944aad in ?? () from /usr/lib/x86_64-linux-gnu/libXt.so.6
#5 0x00007ffff7944f15 in ?? () from /usr/lib/x86_64-linux-gnu/libXt.so.6
#6 0x00007ffff7945bdd in _XtTranslateEvent () from
/usr/lib/x86_64-linux-gnu/libXt.so.6
#7 0x00007ffff791def2 in XtDispatchEventToWidget () from
/usr/lib/x86_64-linux-gnu/libXt.so.6
#8 0x00007ffff791e8dd in ?? () from /usr/lib/x86_64-linux-gnu/libXt.so.6
#9 0x00007ffff791e9b9 in XtDispatchEvent () from
/usr/lib/x86_64-linux-gnu/libXt.so.6
#10 0x00005555555d2d96 in xkeycaps_main_loop (app=0x5555559a81a0,
keyboard=<optimized out>)
at xkeycaps.c:232
#11 main (argc=<optimized out>, argv=<optimized out>) at xkeycaps.c:355
(gdb) f 3
#3 button_write (button=<optimized out>, client_data=<optimized out>,
call_data=<optimized out>) at commands.c:629
629 fprintf (out, "%s", differences[i].names[j]);
(gdb) p i
$1 = 1
(gdb) p j
$2 = 9
(gdb) p differences
$3 = {{key = 0x555555a0dde0, count = 3, names = {0x7ffff6e13fc6
<_XkeyTable+134> "Escape",
0x5555555e4448 "NoSymbol", 0x7ffff6e13fc6 <_XkeyTable+134> "Escape", 0x0,
0x1d7 <error: Cannot access memory at address 0x1d7>,
0x1000 <error: Cannot access memory at address 0x1000>,
0x8 <error: Cannot access memory at address 0x8>,
0x5a42ab91 <error: Cannot access memory at address 0x5a42ab91>}}, {key =
0x555555a0dfa0,
count = 10, names = {0x7ffff6e144be <_XkeyTable+1406> "F1",
0x7ffff6e144be <_XkeyTable+1406> "F1", 0x7ffff6e144be <_XkeyTable+1406>
"F1",
0x7ffff6e144be <_XkeyTable+1406> "F1", 0x7ffff6e144be <_XkeyTable+1406>
"F1",
0x7ffff6e144be <_XkeyTable+1406> "F1",
0x7ffff6e1dfaf <_XkeyTable+41071> "XF86Switch_VT_1",
0x7ffff6e144be <_XkeyTable+1406> "F1"}}, {key = 0x555555a0e160, count =
10, names = {
0x7ffff6e144c7 <_XkeyTable+1415> "F2", 0x7ffff6e144c7 <_XkeyTable+1415>
"F2",
0x7ffff6e144c7 <_XkeyTable+1415> "F2", 0x7ffff6e144c7 <_XkeyTable+1415>
"F2",
0x7ffff6e144c7 <_XkeyTable+1415> "F2", 0x7ffff6e144c7 <_XkeyTable+1415>
"F2",
0x7ffff6e1dfc5 <_XkeyTable+41093> "XF86Switch_VT_2",
0x7ffff6e144c7 <_XkeyTable+1415> "F2"}},
--- a/commands.c
+++ b/commands.c
@@ -440,6 +440,7 @@ button_write (button, client_data, call_
keysyms = XGetKeyboardMapping (XtDisplay (widget),
key->key.keycode,
1, &count);
+ if (count > 8) count = 8; /* FIXME: we are only prepared for 8
names per key, clip here */
if (! keysyms) count = 0;
all [all_count].key = key;
for (; count > 0; count--)
Christoph
--- End Message ---
--- Begin Message ---
Source: xkeycaps
Source-Version: 2.47-4.1+deb9u1
We believe that the bug you reported is fixed in the latest version of
xkeycaps, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 914...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Christoph Berg <christoph.b...@credativ.de> (supplier of updated xkeycaps
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 21 Nov 2018 09:47:46 +0100
Source: xkeycaps
Binary: xkeycaps
Architecture: source
Version: 2.47-4.1+deb9u1
Distribution: stretch
Urgency: medium
Maintainer: Christoph Berg <m...@debian.org>
Changed-By: Christoph Berg <christoph.b...@credativ.de>
Description:
xkeycaps - manipulate X11 keymaps (for xmodmap) graphically
Closes: 914262
Changes:
xkeycaps (2.47-4.1+deb9u1) stretch; urgency=medium
.
* Prevent segfault in commands.c when more than 8 keysyms per key are
present. (Closes: #914262)
Checksums-Sha1:
2d6f8aa46635208a662c3b2af7a01fc9762186fd 1710 xkeycaps_2.47-4.1+deb9u1.dsc
40d04dfda87b22405918880ff49ce0aa6f01258c 6420 xkeycaps_2.47-4.1+deb9u1.diff.gz
Checksums-Sha256:
59b913d71d007cd29d7ee148811528319b3b3e16de4a2ea1bf3904059383276f 1710
xkeycaps_2.47-4.1+deb9u1.dsc
19fb95e733174925ed0a516047e7e366cd60bda032f27939094236cf8123609e 6420
xkeycaps_2.47-4.1+deb9u1.diff.gz
Files:
a6ed9b77989aabef4f7820c2e428db9e 1710 x11 optional xkeycaps_2.47-4.1+deb9u1.dsc
d4b1cbb8d6c2a1ccb292dcc39e5b242e 6420 x11 optional
xkeycaps_2.47-4.1+deb9u1.diff.gz
-----BEGIN PGP SIGNATURE-----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=N31+
-----END PGP SIGNATURE-----
--- End Message ---