On Sat 10 Sep 2005 at 12:08:36 +0200, you wrote: > X-Loop: [EMAIL PROTECTED] > Reply-To: Branden Robinson <[EMAIL PROTECTED]>, [EMAIL PROTECTED] > X-Debian-PR-Message: report 314363 > X-Debian-PR-Package: bash > X-Debian-PR-Keywords: > X-Mailer: reportbug 3.12 > Delivered-To: [EMAIL PROTECTED] > X-Virus-Scanned: by amavisd-new at cs.tu-berlin.de (including spamassassin) > X-Spam-Status: No, hits=0 tagged_above=0 required=3 tests= > X-Spam-Level: > Resent-From: Branden Robinson <[EMAIL PROTECTED]> > Resent-To: debian-bugs-dist@lists.debian.org > Resent-Cc: Matthias Klose <[EMAIL PROTECTED]> > Resent-Date: Wed, 15 Jun 2005 22:18:01 UTC > Resent-Message-ID: <[EMAIL PROTECTED]> > Resent-Sender: Debian BTS <[EMAIL PROTECTED]> > From: Branden Robinson <[EMAIL PROTECTED]> > To: Debian Bug Tracking System <[EMAIL PROTECTED]> > Subject: Bug#314363: bash: tab completion fails with awk error when first arg > is gdb and second arg is subshell expansion > Date: Wed, 15 Jun 2005 17:01:51 -0500 > > Package: bash > Version: 3.0-15 > Severity: normal > > $ gdb $(which svn) svn_exawk: {if ($1 ~ /^$(which > awk: ^ unterminated regexp > awk: fatal: Unmatched ( or \(: /^$(which/ > > Nasty. > > ( > > I typed: > > gdb $(which svn) svn_e<TAB> > > ) > > * Replacing "gdb" with "ls" makes the problem go away. > * Replacing "$(which svn)" with "/usr/bin/svn" suppresses the error, but the > completion does nothing useful. It apparently doesn't know what to look > for, > and it certainly doesn't offer any completions in $PWD. > > -- System Information: > Debian Release: testing/unstable > APT prefers unstable > APT policy: (500, 'unstable') > Architecture: powerpc (ppc) > Shell: /bin/sh linked to /bin/bash > Kernel: Linux 2.6.9-powerpc-smp > Locale: LANG=C, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) > > Versions of packages bash depends on: > ii base-files 3.1.4 Debian base system miscellaneous > f > ii libc6 2.3.2.ds1-22 GNU C Library: Shared libraries > an > ii libncurses5 5.4-6 Shared libraries for terminal > hand > ii passwd 1:4.0.3-35 change and administer password > and > > -- no debconf information
This has been fixed for the next release, although there are probably more vulnerabilities of this kind elsewhere in the code. Ian -- Ian Macdonald | Your goose is cooked. (Your current chick [EMAIL PROTECTED] | is burned up too!) http://www.caliban.org/ | | | -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]