From e6dca6f9460ca8b3504ff908a27d48bd533e4e16 Mon Sep 17 00:00:00 2001 From: Patrick J Volkerding Date: Fri, 11 Jan 2019 21:15:41 +0000 Subject: Fri Jan 11 21:15:41 UTC 2019 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit a/bash-5.0.000-x86_64-1.txz: Upgraded. a/glibc-zoneinfo-2018i-noarch-1.txz: Upgraded. a/lzlib-1.11-x86_64-1.txz: Upgraded. ap/vim-8.1.0727-x86_64-1.txz: Upgraded. Fixed vimrc to work with "crontab -e" again now that cron's files have been moved into /run/cron/. Thanks to Andreas Vögel. d/subversion-1.11.1-x86_64-1.txz: Upgraded. n/irssi-1.1.2-x86_64-1.txz: Upgraded. This update addresses bugs including security and stability issues: A NULL pointer dereference occurs for an "empty" nick. Certain nick names could result in out-of-bounds access when printing theme strings. Crash due to a NULL pointer dereference w hen the number of windows exceeds the available space. Use-after-free when SASL messages are received in an unexpected order. Use-after-free when a server is disconnected during netsplits. Use-after-free when hidden lines were expired from the scroll buffer. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7051 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7053 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7054 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5882 (* Security fix *) xap/vim-gvim-8.1.0727-x86_64-1.txz: Upgraded. --- source/a/bash/bash-4.4-patches/bash44-017 | 45 ------------------------------- 1 file changed, 45 deletions(-) delete mode 100644 source/a/bash/bash-4.4-patches/bash44-017 (limited to 'source/a/bash/bash-4.4-patches/bash44-017') diff --git a/source/a/bash/bash-4.4-patches/bash44-017 b/source/a/bash/bash-4.4-patches/bash44-017 deleted file mode 100644 index f427732d3..000000000 --- a/source/a/bash/bash-4.4-patches/bash44-017 +++ /dev/null @@ -1,45 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 4.4 -Patch-ID: bash44-017 - -Bug-Reported-by: ZhangXiao -Bug-Reference-ID: <58AD3EAC.4020608@windriver.com> -Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2017-02/msg00061.html - -Bug-Description: - -There is a memory leak when `read -e' is used to read a line using readline. - -Patch (apply with `patch -p0'): - -*** ../bash-20170217/builtins/read.def 2017-01-02 16:53:02.000000000 -0500 ---- builtins/read.def 2017-02-22 09:43:14.000000000 -0500 -*************** -*** 691,694 **** ---- 691,699 ---- - CHECK_ALRM; - -+ #if defined (READLINE) -+ if (edit) -+ free (rlbuf); -+ #endif -+ - if (retval < 0) - { -*** ../bash-4.4/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 16 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 17 - - #endif /* _PATCHLEVEL_H_ */ -- cgit v1.2.3-65-gdbad