Followup-For: Bug #933057
Control: tag -1 pending
buster-pu request: https://bugs.debian.org/948850
Andreas
Yes, that's one possible fix.
But if you grab a newer version from upstream, pointer_deref_comparison.patch
isn't necessary at all. The change from '\0' to NULL was already made 2018-09-19
as I described above in message #5 on this report.
I suppose grabbing the newer version make sense in the
Modifying pointer_deref_comparison.patch as follows works for me.
--- a/debian/patches/pointer_deref_comparison.patch
+++ b/debian/patches/pointer_deref_comparison.patch
@@ -5,7 +5,7 @@
}
if (alvec) {
-if ((alvecp = *alvec) != '\0') {
-+if (*(alvecp = *alvec) != '\0') {
++
Control: severity -1 serious
Control: found -1 csh/20110502-3
Control: tags -1 + patch
Hi Keith
Thanks for reporting. I'm bumping the severity to serious, as this
breaks unrelated software, and changing the version to 20110502-3,
where the bug was introduced.
Regards
Graham
Package: csh
Version: 20110502-4
Severity: important
Tags: upstream
-- System Information:
Debian Release: 10.0
APT prefers stable
APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 4.19.0-5-amd64 (SMP w/1 CPU core)
Kernel taint flags: TAINT_CRAP
Locale:
5 matches
Mail list logo