debian-hurd-Bugs item #312550 was changed at 29/12/2017 18:17 by Samuel Thibault You can respond by visiting: https://alioth.debian.org/tracker/?func=detail&atid=411594&aid=312550&group_id=30628
Status: Open Priority: 3 Submitted By: Samuel Thibault (sthibault) Assigned to: Nobody (None) Summary: *** glibc detected *** /usr/bin/perl: free(): invalid pointer: 0x01026000 *** Category: None Group: None Resolution: None Initial Comment: a few perl applications, perldoc notably, crash with *** glibc detected *** /usr/bin/perl: free(): invalid pointer: 0x01026000 *** This is in perl_destruct: for (i = 0; environ[i]; i++) safesysfree(environ[i]); /* Must use safesysfree() when working with environ. */ safesysfree(environ); It's trying to free the environ that glibc has settled. This part of the perl code really looks like black magic to me, I guess the hurd part of glibc is even darker. This seems to happen only within a fakeroot-tcp session. ---------------------------------------------------------------------- >Comment By: Samuel Thibault (sthibault) Date: 29/12/2017 18:17 Message: FTR, here is the upstream bug url: http://rt.perl.org/rt3/Ticket/Display.html?id=91452 ---------------------------------------------------------------------- Comment By: Samuel Thibault (sthibault) Date: 09/04/2011 15:55 Message: Upstream bug reported upstream. Actually a bad interaction of perl's assumption that nobody calls putenv and can thus tinker with it, and libfakeroot which actually calls putenv. ---------------------------------------------------------------------- You can respond by visiting: https://alioth.debian.org/tracker/?func=detail&atid=411594&aid=312550&group_id=30628