From e89deabfb2b29504e31d9208e7ac5593907add1d Mon Sep 17 00:00:00 2001 From: Patrick J Volkerding Date: Wed, 5 May 2021 19:56:53 +0000 Subject: Wed May 5 19:56:53 UTC 2021 a/bash-5.1.008-x86_64-1.txz: Upgraded. d/python-setuptools-56.1.0-x86_64-1.txz: Upgraded. l/libgnt-2.14.1-x86_64-1.txz: Added. Thanks to Robby Workman. l/mozjs78-78.10.1esr-x86_64-1.txz: Upgraded. l/python-six-1.16.0-x86_64-1.txz: Upgraded. l/readline-8.1.001-x86_64-1.txz: Upgraded. n/mutt-2.0.7-x86_64-1.txz: Upgraded. n/php-7.4.19-x86_64-1.txz: Upgraded. xap/mozilla-firefox-88.0.1-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/88.0.1/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2021-20/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29953 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29952 (* Security fix *) xap/mozilla-thunderbird-78.10.1-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/78.10.1/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2021-19/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29951 (* Security fix *) xap/pidgin-2.14.4-x86_64-2.txz: Rebuilt. Recompiled against libgnt-2.14.1 to restore the finch cli app. Thanks to Robby Workman. xfce/xfce4-clipman-plugin-1.6.2-x86_64-1.txz: Upgraded. extra/php8/php8-8.0.6-x86_64-1.txz: Upgraded. --- source/a/bash/bash-5.1-patches/bash51-005 | 100 ++++++++++++++++++++++++++++++ 1 file changed, 100 insertions(+) create mode 100644 source/a/bash/bash-5.1-patches/bash51-005 (limited to 'source/a/bash/bash-5.1-patches/bash51-005') diff --git a/source/a/bash/bash-5.1-patches/bash51-005 b/source/a/bash/bash-5.1-patches/bash51-005 new file mode 100644 index 000000000..dee89561d --- /dev/null +++ b/source/a/bash/bash-5.1-patches/bash51-005 @@ -0,0 +1,100 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 5.1 +Patch-ID: bash51-005 + +Bug-Reported-by: Alexander Mescheryakov , + konsolebox +Bug-Reference-ID: <5ffd7f3d.1c69fb81.dee25.166c@mx.google.com>, + +Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2021-01/msg00082.html, + https://lists.gnu.org/archive/html/bug-bash/2021-04/msg00160.html + +Bug-Description: + +Fix two memory leaks when assigning arrays using compound assignment syntax. + +Patch (apply with `patch -p0'): + +*** ../bash-5.1-patched/subst.c 2020-12-16 17:01:32.000000000 -0500 +--- subst.c 2021-01-24 17:48:40.000000000 -0500 +*************** +*** 11674,11677 **** +--- 11674,11679 ---- + + value = string_list (l); ++ dispose_words (l); ++ + wlen = STRLEN (value); + +*** ../bash-5.1-patched/arrayfunc.c 2020-12-16 17:01:32.000000000 -0500 +--- arrayfunc.c 2021-04-19 16:43:09.000000000 -0400 +*************** +*** 565,574 **** + WORD_LIST *list; + char *akey, *aval, *k, *v; +- int free_aval; + + for (list = nlist; list; list = list->next) + { +- free_aval = 0; +- + k = list->word->word; + v = list->next ? list->next->word->word : 0; +--- 565,571 ---- +*************** +*** 578,583 **** + + akey = expand_assignment_string_to_string (k, 0); +- aval = expand_assignment_string_to_string (v, 0); +- + if (akey == 0 || *akey == 0) + { +--- 575,578 ---- +*************** +*** 586,599 **** + continue; + } + if (aval == 0) + { + aval = (char *)xmalloc (1); + aval[0] = '\0'; /* like do_assignment_internal */ +- free_aval = 1; + } + + bind_assoc_var_internal (var, h, akey, aval, flags); +! if (free_aval) +! free (aval); + } + } +--- 581,594 ---- + continue; + } ++ ++ aval = expand_assignment_string_to_string (v, 0); + if (aval == 0) + { + aval = (char *)xmalloc (1); + aval[0] = '\0'; /* like do_assignment_internal */ + } + + bind_assoc_var_internal (var, h, akey, aval, flags); +! free (aval); + } + } +*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 4 + + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 5 + + #endif /* _PATCHLEVEL_H_ */ -- cgit v1.2.3-80-g2a13