GNU bug report logs - #37893
fixes for 'shuf -n 0x' and similar issues

Previous Next

Package: coreutils;

Reported by: Paul Eggert <eggert <at> cs.ucla.edu>

Date: Wed, 23 Oct 2019 17:12:01 UTC

Severity: normal

Done: Paul Eggert <eggert <at> cs.ucla.edu>

Bug is archived. No further changes may be made.

Full log


View this message in rfc822 format

From: Paul Eggert <eggert <at> cs.ucla.edu>
To: 37893 <at> debbugs.gnu.org
Subject: bug#37893: fixes for 'shuf -n 0x' and similar issues
Date: Wed, 23 Oct 2019 10:10:44 -0700
[Message part 1 (text/plain, inline)]
I installed the attached patches to fix some minor glitches with 
programs like 'shuf' failing to reject invalid arguments like '-n 0x' 
where the trailing 'x' is ignored. The last two patches do the real 
work; the others are minor cleanups.
[0001-build-re-enable-type-limits-checking.patch (text/x-patch, attachment)]
[0002-build-don-t-worry-about-logical-op-checking.patch (text/x-patch, attachment)]
[0003-shuf-improve-randperm-overflow-checking.patch (text/x-patch, attachment)]
[0004-stdbuf-improve-size-checking.patch (text/x-patch, attachment)]
[0005-all-improve-parsing-of-numeric-arguments.patch (text/x-patch, attachment)]

This bug report was last modified 5 years and 294 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.