diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2021-05-05 19:56:53 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2021-05-06 08:59:52 +0200 |
commit | e89deabfb2b29504e31d9208e7ac5593907add1d (patch) | |
tree | a2a3374e0edd56c7a101f824e72a51fbdad3c33d /source/a/bash/bash-5.1-patches/bash51-005 | |
parent | c0094e9a928f8fa62798dfadf5394bcebf321b55 (diff) | |
download | current-e89deabfb2b29504e31d9208e7ac5593907add1d.tar.gz current-e89deabfb2b29504e31d9208e7ac5593907add1d.tar.xz |
Wed May 5 19:56:53 UTC 202120210505195653
a/bash-5.1.008-x86_64-1.txz: Upgraded.
d/python-setuptools-56.1.0-x86_64-1.txz: Upgraded.
l/libgnt-2.14.1-x86_64-1.txz: Added.
Thanks to Robby Workman.
l/mozjs78-78.10.1esr-x86_64-1.txz: Upgraded.
l/python-six-1.16.0-x86_64-1.txz: Upgraded.
l/readline-8.1.001-x86_64-1.txz: Upgraded.
n/mutt-2.0.7-x86_64-1.txz: Upgraded.
n/php-7.4.19-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-88.0.1-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/88.0.1/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2021-20/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29952
(* Security fix *)
xap/mozilla-thunderbird-78.10.1-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/78.10.1/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2021-19/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29951
(* Security fix *)
xap/pidgin-2.14.4-x86_64-2.txz: Rebuilt.
Recompiled against libgnt-2.14.1 to restore the finch cli app.
Thanks to Robby Workman.
xfce/xfce4-clipman-plugin-1.6.2-x86_64-1.txz: Upgraded.
extra/php8/php8-8.0.6-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/a/bash/bash-5.1-patches/bash51-005')
-rw-r--r-- | source/a/bash/bash-5.1-patches/bash51-005 | 100 |
1 files changed, 100 insertions, 0 deletions
diff --git a/source/a/bash/bash-5.1-patches/bash51-005 b/source/a/bash/bash-5.1-patches/bash51-005 new file mode 100644 index 000000000..dee89561d --- /dev/null +++ b/source/a/bash/bash-5.1-patches/bash51-005 @@ -0,0 +1,100 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 5.1 +Patch-ID: bash51-005 + +Bug-Reported-by: Alexander Mescheryakov <alexander.s.m@gmail.com>, + konsolebox <konsolebox@gmail.com> +Bug-Reference-ID: <5ffd7f3d.1c69fb81.dee25.166c@mx.google.com>, + <CAJnmqwaVs7M6NBqZzcHy5c2+yHkTEg7p+o8ZWuA7sN+6N1q4CA@mail.gmail.com> +Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2021-01/msg00082.html, + https://lists.gnu.org/archive/html/bug-bash/2021-04/msg00160.html + +Bug-Description: + +Fix two memory leaks when assigning arrays using compound assignment syntax. + +Patch (apply with `patch -p0'): + +*** ../bash-5.1-patched/subst.c 2020-12-16 17:01:32.000000000 -0500 +--- subst.c 2021-01-24 17:48:40.000000000 -0500 +*************** +*** 11674,11677 **** +--- 11674,11679 ---- + + value = string_list (l); ++ dispose_words (l); ++ + wlen = STRLEN (value); + +*** ../bash-5.1-patched/arrayfunc.c 2020-12-16 17:01:32.000000000 -0500 +--- arrayfunc.c 2021-04-19 16:43:09.000000000 -0400 +*************** +*** 565,574 **** + WORD_LIST *list; + char *akey, *aval, *k, *v; +- int free_aval; + + for (list = nlist; list; list = list->next) + { +- free_aval = 0; +- + k = list->word->word; + v = list->next ? list->next->word->word : 0; +--- 565,571 ---- +*************** +*** 578,583 **** + + akey = expand_assignment_string_to_string (k, 0); +- aval = expand_assignment_string_to_string (v, 0); +- + if (akey == 0 || *akey == 0) + { +--- 575,578 ---- +*************** +*** 586,599 **** + continue; + } + if (aval == 0) + { + aval = (char *)xmalloc (1); + aval[0] = '\0'; /* like do_assignment_internal */ +- free_aval = 1; + } + + bind_assoc_var_internal (var, h, akey, aval, flags); +! if (free_aval) +! free (aval); + } + } +--- 581,594 ---- + continue; + } ++ ++ aval = expand_assignment_string_to_string (v, 0); + if (aval == 0) + { + aval = (char *)xmalloc (1); + aval[0] = '\0'; /* like do_assignment_internal */ + } + + bind_assoc_var_internal (var, h, akey, aval, flags); +! free (aval); + } + } +*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 4 + + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 5 + + #endif /* _PATCHLEVEL_H_ */ |