** Attachment added: "The message which causes a segfault when piped into spamc"
https://bugs.launchpad.net/bugs/645009/+attachment/1621515/+files/spamd-crash.txt
--
spamd segfaults a message
https://bugs.launchpad.net/bugs/645009
You received this bug notification because you are a member o
And the version of perl-base is 5.10.1-8ubuntu2
--
spamd segfaults a message
https://bugs.launchpad.net/bugs/645009
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to spamassassin in ubuntu.
--
Ubuntu-server-bugs mailing list
Ubuntu-server-
Public bug reported:
Binary package hint: spamassassin
Description:Ubuntu 10.04.1 LTS
Release:10.04
spamassassin 3.3.1-1
I find the following in syslog after piping the attached message into
spamc.
Sep 22 09:40:31 beczulka spamd[25056]: spamd: connection from beczulka
[127
zulka spamd[1443]: prefork: child states: II
--
Marcin Owsiany http://marcin.owsiany.pl/
GnuPG: 1024D/60F41216 FE67 DA2D 0ACA FC5E 3F75 D6F6 3A0D 8AA0 60F4 1216
"Every program in development at MIT expands until it can read mail."
I had a look at the history of segfaults in my syslog and found the
following things:
There were the following two kernel messages, with slightly different
frequencies:
29 times: segfault at 108 ip 7f6269838a81 sp 7fffb3255900 error
4 in libperl.so.5.10.1[7f6269795000+162000]
40
another thing: removing ~/.spamassassin does not help
--
spamd segfaults a message
https://bugs.launchpad.net/bugs/645009
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to spamassassin in ubuntu.
--
Ubuntu-server-bugs mailing list
Ubuntu-s
After installing perl-debug and attaching to a spamd child I managed to
obtain the following backtrace:
Program received signal SIGSEGV, Segmentation fault.
0x7f6269838a86 in S_share_hek_flags (my_perl=0x165e010, str=0x4652010
"OpenVZ", len=6, hash=2293735283, flags=0) at hv.c:2460
2460hv
o me:
(gdb) p entry
$1 = (HE *) 0x1f1fa00
(gdb) p *entry
$2 = {hent_next = 0x1, hent_hek = 0x38e8fd3a1, he_valu = {hent_val =
0x100898ce2, hent_refcount = 4303981794}}
I guess this bug should be closed as unreproducible.
--
Marcin Owsiany http://marcin.owsiany.pl/
GnuPG: 1024D/60