summaryrefslogtreecommitdiffstats
path: root/source/a/bash/bash-4.4-patches/bash44-008
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2019-01-11 21:15:41 +0000
committer Eric Hameleers <alien@slackware.com>2019-01-12 08:59:44 +0100
commite6dca6f9460ca8b3504ff908a27d48bd533e4e16 (patch)
tree69bbb0c68f4f38b1d2059aa6d477fdc2e26bbdcf /source/a/bash/bash-4.4-patches/bash44-008
parent9bf4df6951d0e5c9d2f7a691fcc18d053cca1c1b (diff)
downloadcurrent-e6dca6f9460ca8b3504ff908a27d48bd533e4e16.tar.gz
current-e6dca6f9460ca8b3504ff908a27d48bd533e4e16.tar.xz
Fri Jan 11 21:15:41 UTC 201920190111211541
a/bash-5.0.000-x86_64-1.txz: Upgraded. a/glibc-zoneinfo-2018i-noarch-1.txz: Upgraded. a/lzlib-1.11-x86_64-1.txz: Upgraded. ap/vim-8.1.0727-x86_64-1.txz: Upgraded. Fixed vimrc to work with "crontab -e" again now that cron's files have been moved into /run/cron/. Thanks to Andreas Vögel. d/subversion-1.11.1-x86_64-1.txz: Upgraded. n/irssi-1.1.2-x86_64-1.txz: Upgraded. This update addresses bugs including security and stability issues: A NULL pointer dereference occurs for an "empty" nick. Certain nick names could result in out-of-bounds access when printing theme strings. Crash due to a NULL pointer dereference w hen the number of windows exceeds the available space. Use-after-free when SASL messages are received in an unexpected order. Use-after-free when a server is disconnected during netsplits. Use-after-free when hidden lines were expired from the scroll buffer. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7051 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7053 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7054 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5882 (* Security fix *) xap/vim-gvim-8.1.0727-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/a/bash/bash-4.4-patches/bash44-008')
-rw-r--r--source/a/bash/bash-4.4-patches/bash44-00884
1 files changed, 0 insertions, 84 deletions
diff --git a/source/a/bash/bash-4.4-patches/bash44-008 b/source/a/bash/bash-4.4-patches/bash44-008
deleted file mode 100644
index 94c5d4aeb..000000000
--- a/source/a/bash/bash-4.4-patches/bash44-008
+++ /dev/null
@@ -1,84 +0,0 @@
- BASH PATCH REPORT
- =================
-
-Bash-Release: 4.4
-Patch-ID: bash44-008
-
-Bug-Reported-by: Koichi MURASE <myoga.murase@gmail.com>
-Bug-Reference-ID: <CAFLRLk-V+1AeQ2k=pY7ih6V+MfQ_w8EF3YWL2E+wmLfgKBtzXA@mail.gmail.com>
-Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2016-11/msg00050.html
-
-Bug-Description:
-
-Under certain circumstances, bash will evaluate arithmetic expressions as
-part of reading an expression token even when evaluation is suppressed. This
-happens while evaluating a conditional expression and skipping over the
-failed branch of the expression.
-
-Patch (apply with `patch -p0'):
-
-*** ../bash-4.4-patched/expr.c 2015-10-11 14:46:36.000000000 -0400
---- expr.c 2016-11-08 11:55:46.000000000 -0500
-***************
-*** 579,585 ****
- if (curtok == QUES) /* found conditional expr */
- {
-- readtok ();
-- if (curtok == 0 || curtok == COL)
-- evalerror (_("expression expected"));
- if (cval == 0)
- {
---- 579,582 ----
-***************
-*** 588,591 ****
---- 585,592 ----
- }
-
-+ readtok ();
-+ if (curtok == 0 || curtok == COL)
-+ evalerror (_("expression expected"));
-+
- val1 = EXP_HIGHEST ();
-
-***************
-*** 594,600 ****
- if (curtok != COL)
- evalerror (_("`:' expected for conditional expression"));
-! readtok ();
-! if (curtok == 0)
-! evalerror (_("expression expected"));
- set_noeval = 0;
- if (cval)
---- 595,599 ----
- if (curtok != COL)
- evalerror (_("`:' expected for conditional expression"));
-!
- set_noeval = 0;
- if (cval)
-***************
-*** 604,608 ****
---- 603,611 ----
- }
-
-+ readtok ();
-+ if (curtok == 0)
-+ evalerror (_("expression expected"));
- val2 = expcond ();
-+
- if (set_noeval)
- noeval--;
-*** ../bash-4.4/patchlevel.h 2016-06-22 14:51:03.000000000 -0400
---- patchlevel.h 2016-10-01 11:01:28.000000000 -0400
-***************
-*** 26,30 ****
- looks for to find the patch level (for the sccs version string). */
-
-! #define PATCHLEVEL 7
-
- #endif /* _PATCHLEVEL_H_ */
---- 26,30 ----
- looks for to find the patch level (for the sccs version string). */
-
-! #define PATCHLEVEL 8
-
- #endif /* _PATCHLEVEL_H_ */