Package: csh
Version: 20110502-4
Severity: important
Tags: upstream


-- System Information:
Debian Release: 10.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-5-amd64 (SMP w/1 CPU core)
Kernel taint flags: TAINT_CRAP
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages csh depends on:
ii  libbsd0  0.9.1-2
ii  libc6    2.28-10

csh recommends no packages.

csh suggests no packages.

-- no debconf information

This bug was previously reported against Ubuntu.

Details, including a suggested fix, are available at
https://bugs.launchpad.net/ubuntu/+source/csh/+bug/1739505

The problem was introduced by
    debian/patches/pointer_deref_comparison.patch
which silenced a compiler warning but broke csh's "eval" command
with a null pointer dereference.  That patch should be backed out,
and the csh sources from OpenBSD should be updated to include
the correct fix.

The correct fix is commit bdb0dae4088 in https://github.com/openbsd/src
applied on 2018-09-19.

I'll add a comment to the bug report on launchpad.net pointing to
this one.

Reply via email to