Bug 172160

Summary: perl bug # 22372: SIGSEGV in sv_chop()
Product: Red Hat Enterprise Linux 3 Reporter: Jason Vas Dias <jvdias>
Component: perlAssignee: Jason Vas Dias <jvdias>
Status: CLOSED ERRATA QA Contact: David Lawrence <dkl>
Severity: medium Docs Contact:
Priority: medium    
Version: 3.0CC: poelstra, prockai
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: RHSA-2005-881 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-12-20 14:59:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 168424    

Description Jason Vas Dias 2005-11-01 00:54:33 UTC
Description of problem:

This legal PERL program causes a SIGSEGV (memory access violation) crash
in all RHEL-3 perl-5.8.0 versions prior to perl-5.8.0-90.1:

--- BEGIN
#!/usr/bin/perl
format STDOUT =
^<<<<<<<<<<<<<<~~
$el
.
%hash = ("k" => "v");
for $el (keys %hash) {
write;
}
--- END

This is upstream perl bug # 22372 
( http://rt.perl.org/rt3/Ticket/Display.html?id=22372 )
that was fixed in the upstream perl-5.8.1 release with
patch # 19645
( http://public.activestate.com/cgi-bin/perlbrowse?patch=19645 ).

Version-Release number of selected component (if applicable):
perl-5.8.0-88.4 - perl-5.8.0-89.11

How reproducible:
100%

Steps to Reproduce:
Run the program quoted above
  
Actual results:
perl crashes with a SIGSEGV

Expected results:
The program should print 'k\n' .

Additional info:

Comment 1 Jason Vas Dias 2005-11-01 00:55:36 UTC
This bug is fixed with perl-5.8.0-90.1, now submitted to RHEL-3 CVS.


Comment 5 Red Hat Bugzilla 2005-12-20 14:59:38 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2005-881.html