Package: csh Version: 20110502-4 Severity: important Tags: upstream
-- System Information: Debian Release: 10.0 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-5-amd64 (SMP w/1 CPU core) Kernel taint flags: TAINT_CRAP Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages csh depends on: ii libbsd0 0.9.1-2 ii libc6 2.28-10 csh recommends no packages. csh suggests no packages. -- no debconf information This bug was previously reported against Ubuntu. Details, including a suggested fix, are available at https://bugs.launchpad.net/ubuntu/+source/csh/+bug/1739505 The problem was introduced by debian/patches/pointer_deref_comparison.patch which silenced a compiler warning but broke csh's "eval" command with a null pointer dereference. That patch should be backed out, and the csh sources from OpenBSD should be updated to include the correct fix. The correct fix is commit bdb0dae4088 in https://github.com/openbsd/src applied on 2018-09-19. I'll add a comment to the bug report on launchpad.net pointing to this one.