Bugs item #312550, was changed at 07/06/2010 02:11 by Samuel Thibault
You can respond by visiting: 
https://alioth.debian.org/tracker/?func=detail&atid=411594&aid=312550&group_id=30628

Status: Open
Priority: 3
Submitted By: Samuel Thibault (sthibault)
Assigned to: Nobody (None)
Summary: *** glibc detected *** /usr/bin/perl: free(): invalid pointer: 
0x01026000 *** 
Category: None
Group: None
Resolution: None


Initial Comment:
a few perl applications, perldoc notably, crash with

*** glibc detected *** /usr/bin/perl: free(): invalid pointer: 0x01026000 ***

This is in perl_destruct:

        for (i = 0; environ[i]; i++)
            safesysfree(environ[i]);

        /* Must use safesysfree() when working with environ. */
        safesysfree(environ);

It's trying to free the environ that glibc has settled. This part of
the perl code really looks like black magic to me, I guess the hurd
part of glibc is even darker.

This seems to happen only within a fakeroot-tcp session.


----------------------------------------------------------------------

>Comment By: Samuel Thibault (sthibault)
Date: 09/04/2011 15:55

Message:
Upstream bug reported upstream.

Actually a bad interaction of perl's assumption that nobody calls
putenv and can thus tinker with it, and libfakeroot which actually
calls putenv.


----------------------------------------------------------------------

You can respond by visiting: 
https://alioth.debian.org/tracker/?func=detail&atid=411594&aid=312550&group_id=30628


-- 
To UNSUBSCRIBE, email to debian-hurd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1q8ydv-0004zc...@alioth.debian.org

Reply via email to