Bug#933057: csh: bsd-csh eval command always dies with segmentation fault

2020-01-13 Thread Andreas Beckmann
Followup-For: Bug #933057 Control: tag -1 pending buster-pu request: https://bugs.debian.org/948850 Andreas

Bug#933057: csh: bsd-csh eval command always dies with segmentation fault

2019-09-20 Thread Keith Thompson
Yes, that's one possible fix. But if you grab a newer version from upstream, pointer_deref_comparison.patch isn't necessary at all. The change from '\0' to NULL was already made 2018-09-19 as I described above in message #5 on this report. I suppose grabbing the newer version make sense in the

Bug#933057: csh: bsd-csh eval command always dies with segmentation fault

2019-09-20 Thread Graham Inggs
Modifying pointer_deref_comparison.patch as follows works for me. --- a/debian/patches/pointer_deref_comparison.patch +++ b/debian/patches/pointer_deref_comparison.patch @@ -5,7 +5,7 @@ } if (alvec) { -if ((alvecp = *alvec) != '\0') { -+if (*(alvecp = *alvec) != '\0') { ++

Bug#933057: csh: bsd-csh eval command always dies with segmentation fault

2019-09-20 Thread Graham Inggs
Control: severity -1 serious Control: found -1 csh/20110502-3 Control: tags -1 + patch Hi Keith Thanks for reporting. I'm bumping the severity to serious, as this breaks unrelated software, and changing the version to 20110502-3, where the bug was introduced. Regards Graham

Bug#933057: csh: bsd-csh eval command always dies with segmentation fault

2019-07-26 Thread Keith Thompson
Package: csh Version: 20110502-4 Severity: important Tags: upstream -- System Information: Debian Release: 10.0 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-5-amd64 (SMP w/1 CPU core) Kernel taint flags: TAINT_CRAP Locale: