X-Recipient: archive-cygwin AT delorie DOT com DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:reply-to:subject:to:references:from:message-id :date:mime-version:in-reply-to:content-type :content-transfer-encoding; q=dns; s=default; b=wV/ESQctnrUtBtCR W+fWkx4ar3OgT9GT7v7rMLLnVhAPRo8lG9clPJEEjFxjeOzBg75zLjmEaMXCYada uKUKhGdhhOPnL7ZGtbaAXPG1b/srp5f+fF2fbGeHy0KOunlWYmofk/QX0OXFOUOC DyK+YyOrzXSDrqJht0tkBBqHZG0= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:reply-to:subject:to:references:from:message-id :date:mime-version:in-reply-to:content-type :content-transfer-encoding; s=default; bh=UCLpDOb79sNu9HqEUAcxrd yw1EY=; b=oTTNxI/rYIJM2aLBXJeSqWamnGb0Y5u1VEJH6VqZILLhImmmFL6sXr Q6VOQzIIikiSyx+4zIDaycIgP1CF0pQgFFqHgOpaQaamIeh8xLSWXxKDqPxRzuCl YubyXwNIOZqqWg9+2SD5Y8BdyHJlYon0kVZkEKuZHOkDdHzFg8oi4= Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner AT cygwin DOT com Mail-Followup-To: cygwin AT cygwin DOT com Delivered-To: mailing list cygwin AT cygwin DOT com Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-3.3 required=5.0 tests=AWL,BAYES_00,RCVD_IN_DNSWL_LOW autolearn=ham version=3.3.1 spammy=calgary, Calgary, sk:corinna, discretion X-HELO: smtp-out-no.shaw.ca Reply-To: Brian DOT Inglis AT SystematicSw DOT ab DOT ca Subject: Re: xman 1.1.5-1 immediately terminates with 'buffer overflow detected' To: cygwin AT cygwin DOT com References: <098dccde-6dde-6301-b020-b457c5cc5f05 AT comcast DOT net> From: Brian Inglis Openpgp: preference=signencrypt Message-ID: <749aa1d8-700b-8871-12b2-eab159dd0007@SystematicSw.ab.ca> Date: Sat, 21 Dec 2019 22:44:57 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1 MIME-Version: 1.0 In-Reply-To: <098dccde-6dde-6301-b020-b457c5cc5f05@comcast.net> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-IsSubscribed: yes On 2019-12-21 17:44, Ken wrote: > Issue: xman 1.1.5-1 fails with 'buffer overflow detected' > Cygwin versions tested: 3.1.2-1, 3.1.1-1, and 3.0.7-1 > OS: Windows 10 Pro 1903 (and also in Windows 7 Pro; tested only with cygwin 3.0.7) > Attached is cygcheck.out of the package status. > Details: > I first noticed the xman package began failing when it was bumped from 1.1.4-1 > to 1.1.5-1 in cygwin 3.0.x. > I confirmed that it still fails with cygwin 3.1.1-1 and 3.1.2-1 with fresh > installations. > $ xman > *** buffer overflow detected ***: terminated > Dropping back to xman 1.1.4-1 fixes the issue. WJFFM W10 1809, Cygwin 3.0.7, xorg-server 1.20.4, xman 1.1.5: $ uname -srvmo CYGWIN_NT-10.0 3.0.7(0.338/5/3) 2019-04-30 18:08 x86_64 Cygwin $ head /proc/version CYGWIN_NT-10.0-17763 version 3.0.7-338.x86_64 (corinna AT calimero) (gcc version 7.4.0 20181206 (Fedora Cygwin 7.4.0-1) (GCC) ) 2019-04-30 18:08 UTC $ xman & [1] 35536 browsie...browsie...browsie...browsie...browsie...browsie...browsie...browsie...Quit -- Take care. Thanks, Brian Inglis, Calgary, Alberta, Canada This email may be disturbing to some readers as it contains too much technical detail. Reader discretion is advised. -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple