diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2019-01-11 21:15:41 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2019-01-12 08:59:44 +0100 |
commit | e6dca6f9460ca8b3504ff908a27d48bd533e4e16 (patch) | |
tree | 69bbb0c68f4f38b1d2059aa6d477fdc2e26bbdcf /source/a/bash/bash-4.4-patches/bash44-016 | |
parent | 9bf4df6951d0e5c9d2f7a691fcc18d053cca1c1b (diff) | |
download | current-e6dca6f9460ca8b3504ff908a27d48bd533e4e16.tar.gz current-e6dca6f9460ca8b3504ff908a27d48bd533e4e16.tar.xz |
Fri Jan 11 21:15:41 UTC 201920190111211541
a/bash-5.0.000-x86_64-1.txz: Upgraded.
a/glibc-zoneinfo-2018i-noarch-1.txz: Upgraded.
a/lzlib-1.11-x86_64-1.txz: Upgraded.
ap/vim-8.1.0727-x86_64-1.txz: Upgraded.
Fixed vimrc to work with "crontab -e" again now that cron's files have been
moved into /run/cron/. Thanks to Andreas Vögel.
d/subversion-1.11.1-x86_64-1.txz: Upgraded.
n/irssi-1.1.2-x86_64-1.txz: Upgraded.
This update addresses bugs including security and stability issues:
A NULL pointer dereference occurs for an "empty" nick.
Certain nick names could result in out-of-bounds access when printing
theme strings.
Crash due to a NULL pointer dereference w hen the number of windows
exceeds the available space.
Use-after-free when SASL messages are received in an unexpected order.
Use-after-free when a server is disconnected during netsplits.
Use-after-free when hidden lines were expired from the scroll buffer.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5882
(* Security fix *)
xap/vim-gvim-8.1.0727-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/a/bash/bash-4.4-patches/bash44-016')
-rw-r--r-- | source/a/bash/bash-4.4-patches/bash44-016 | 78 |
1 files changed, 0 insertions, 78 deletions
diff --git a/source/a/bash/bash-4.4-patches/bash44-016 b/source/a/bash/bash-4.4-patches/bash44-016 deleted file mode 100644 index 94ae90baa..000000000 --- a/source/a/bash/bash-4.4-patches/bash44-016 +++ /dev/null @@ -1,78 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 4.4 -Patch-ID: bash44-016 - -Bug-Reported-by: Luiz Angelo Daros de Luca <luizluca@gmail.com> -Bug-Reference-ID: <CAJq09z7G1-QnLyiUQA0DS=V3da_rtHF8VdYbbdzPe_W3kydpRg@mail.gmail.com> -Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2016-09/msg00092.html - -Bug-Description: - -Bash can perform trap processing while reading command substitution output -instead of waiting until the command completes. - -Patch (apply with `patch -p0'): - -*** ../bash-4.4/lib/sh/zread.c 2014-12-22 10:48:04.000000000 -0500 ---- lib/sh/zread.c 2016-09-29 15:21:36.000000000 -0400 -*************** -*** 38,42 **** ---- 38,45 ---- - #endif - -+ extern int executing_builtin; -+ - extern void check_signals_and_traps (void); -+ extern void check_signals (void); - extern int signal_is_trapped (int); - -*************** -*** 51,69 **** - ssize_t r; - -- #if 0 -- #if defined (HAVE_SIGINTERRUPT) -- if (signal_is_trapped (SIGCHLD)) -- siginterrupt (SIGCHLD, 1); -- #endif -- #endif -- - while ((r = read (fd, buf, len)) < 0 && errno == EINTR) -! check_signals_and_traps (); /* XXX - should it be check_signals()? */ -! -! #if 0 -! #if defined (HAVE_SIGINTERRUPT) -! siginterrupt (SIGCHLD, 0); -! #endif -! #endif - - return r; ---- 54,64 ---- - ssize_t r; - - while ((r = read (fd, buf, len)) < 0 && errno == EINTR) -! /* XXX - bash-5.0 */ -! /* We check executing_builtin and run traps here for backwards compatibility */ -! if (executing_builtin) -! check_signals_and_traps (); /* XXX - should it be check_signals()? */ -! else -! check_signals (); - - return r; -*** ../bash-4.4/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 15 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 16 - - #endif /* _PATCHLEVEL_H_ */ |