diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2019-01-11 21:15:41 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2019-01-12 08:59:44 +0100 |
commit | e6dca6f9460ca8b3504ff908a27d48bd533e4e16 (patch) | |
tree | 69bbb0c68f4f38b1d2059aa6d477fdc2e26bbdcf /source/a/bash/bash-4.4-patches/bash44-003 | |
parent | 9bf4df6951d0e5c9d2f7a691fcc18d053cca1c1b (diff) | |
download | current-e6dca6f9460ca8b3504ff908a27d48bd533e4e16.tar.gz current-e6dca6f9460ca8b3504ff908a27d48bd533e4e16.tar.xz |
Fri Jan 11 21:15:41 UTC 201920190111211541
a/bash-5.0.000-x86_64-1.txz: Upgraded.
a/glibc-zoneinfo-2018i-noarch-1.txz: Upgraded.
a/lzlib-1.11-x86_64-1.txz: Upgraded.
ap/vim-8.1.0727-x86_64-1.txz: Upgraded.
Fixed vimrc to work with "crontab -e" again now that cron's files have been
moved into /run/cron/. Thanks to Andreas Vögel.
d/subversion-1.11.1-x86_64-1.txz: Upgraded.
n/irssi-1.1.2-x86_64-1.txz: Upgraded.
This update addresses bugs including security and stability issues:
A NULL pointer dereference occurs for an "empty" nick.
Certain nick names could result in out-of-bounds access when printing
theme strings.
Crash due to a NULL pointer dereference w hen the number of windows
exceeds the available space.
Use-after-free when SASL messages are received in an unexpected order.
Use-after-free when a server is disconnected during netsplits.
Use-after-free when hidden lines were expired from the scroll buffer.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5882
(* Security fix *)
xap/vim-gvim-8.1.0727-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/a/bash/bash-4.4-patches/bash44-003')
-rw-r--r-- | source/a/bash/bash-4.4-patches/bash44-003 | 58 |
1 files changed, 0 insertions, 58 deletions
diff --git a/source/a/bash/bash-4.4-patches/bash44-003 b/source/a/bash/bash-4.4-patches/bash44-003 deleted file mode 100644 index 01b6b6c9d..000000000 --- a/source/a/bash/bash-4.4-patches/bash44-003 +++ /dev/null @@ -1,58 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 4.4 -Patch-ID: bash44-003 - -Bug-Reported-by: op7ic \x00 <op7ica@gmail.com> -Bug-Reference-ID: <CAFHyJTopWC5Jx+U7WcvxSZKu+KrqSf+_3sHPiRWo=VzXSiPq=w@mail.gmail.com> -Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2016-11/msg00005.html - -Bug-Description: - -Specially-crafted input, in this case an incomplete pathname expansion -bracket expression containing an invalid collating symbol, can cause the -shell to crash. - -Patch (apply with `patch -p0'): - -*** ../bash-4.4/lib/glob/sm_loop.c 2016-04-10 11:23:21.000000000 -0400 ---- lib/glob/sm_loop.c 2016-11-02 14:03:34.000000000 -0400 -*************** -*** 331,334 **** ---- 331,340 ---- - if (p[pc] == L('.') && p[pc+1] == L(']')) - break; -+ if (p[pc] == 0) -+ { -+ if (vp) -+ *vp = INVALID; -+ return (p + pc); -+ } - val = COLLSYM (p, pc); - if (vp) -*************** -*** 484,487 **** ---- 490,496 ---- - c = FOLD (c); - -+ if (c == L('\0')) -+ return ((test == L('[')) ? savep : (CHAR *)0); -+ - if ((flags & FNM_PATHNAME) && c == L('/')) - /* [/] can never match when matching a pathname. */ -*** ../bash-4.4/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 2 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 3 - - #endif /* _PATCHLEVEL_H_ */ |