Your message dated Wed, 2 Feb 2005 14:38:16 -0500
with message-id <[EMAIL PROTECTED]>
has caused the Debian Bug report #293364,
regarding Bug in ZSH (zshell) using Debian-testing (Sarge)
to be marked as having been forwarded to the upstream software
author(s) [EMAIL PROTECTED]
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
---------------------------------------
Received: (at 293364-forwarded) by bugs.debian.org; 2 Feb 2005 19:38:17 +0000
>From [EMAIL PROTECTED] Wed Feb 02 11:38:17 2005
Return-path: <[EMAIL PROTECTED]>
Received: from acolyte.scowler.net [216.254.112.45]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CwQKP-0000nI-00; Wed, 02 Feb 2005 11:38:17 -0800
Received: by acolyte.scowler.net (Postfix, from userid 1000)
id A01737004A; Wed, 2 Feb 2005 14:38:16 -0500 (EST)
Date: Wed, 2 Feb 2005 14:38:16 -0500
From: Clint Adams <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: [EMAIL PROTECTED]: Bug#293364: Bug in ZSH (zshell) using
Debian-testing (Sarge)]
Message-ID: <[EMAIL PROTECTED]>
Mail-Followup-To: [EMAIL PROTECTED],
[EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER,
HAS_PACKAGE autolearn=ham version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
#0 0x00030bdc in loadautofn ()
#1 0x00030b80 in getproc ()
#2 0x0002d5d8 in execsubst ()
#3 0x0002bca0 in execlist ()
#4 0x0002b1d8 in execlist ()
#5 0x0002af0c in execlist ()
#6 0x0002a894 in execode ()
#7 0x00031348 in runshfunc ()
#8 0x00030fe0 in doshfunc ()
#9 0x0006d0f0 in dotrapargs ()
#10 0x00025288 in zexit ()
#11 0x00024f54 in bin_break ()
#12 0x0001a7c0 in execbuiltin ()
#13 0x0002d8c4 in execsubst ()
#14 0x0002bca0 in execlist ()
#15 0x0002b1d8 in execlist ()
#16 0x0002af0c in execlist ()
#17 0x0002a894 in execode ()
#18 0x0003f0c0 in loop ()
#19 0x00041a64 in zsh_main ()
#20 0x70171034 in __libc_start_main () from /lib/v9/libc.so.6
#21 0x00019f74 in _start ()
#22 0x00019f74 in _start ()
Previous frame identical to this frame (corrupt stack?)
----- Forwarded message from Arno van Amersfoort <[EMAIL PROTECTED]> -----
Package: zsh
Version: 4.2.3-1
When I exit a zshell (for example when exiting from su) zshell segfaults
when:
- /usr/share/zsh/functions/TRAPEXIT exists and is executable
- And the function is loaded (for example from /etc/zsh/zshrc with
"autoload ${^/usr/share/zsh/functions}/*(.xN:t)" )
I am using Debian GNU/Linux 3.2 (testing/sarge)
----- End forwarded message -----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]