mirror of
git://slackware.nl/current.git
synced 2024-12-30 10:24:23 +01:00
fc0ff5a5d7
a/bash-5.2.015-x86_64-1.txz: Upgraded. a/tcsh-6.24.06-x86_64-1.txz: Upgraded. ap/inxi-3.3.24_1-noarch-1.txz: Upgraded. ap/nano-7.1-x86_64-1.txz: Upgraded. d/git-2.39.0-x86_64-1.txz: Upgraded. d/rust-1.65.0-x86_64-1.txz: Upgraded. d/strace-6.1-x86_64-1.txz: Upgraded. kde/krita-5.1.4-x86_64-1.txz: Upgraded. l/imagemagick-7.1.0_54-x86_64-1.txz: Upgraded. l/nodejs-19.3.0-x86_64-1.txz: Upgraded. l/pcre2-10.42-x86_64-1.txz: Upgraded. n/iproute2-6.1.0-x86_64-1.txz: Upgraded. x/makedepend-1.0.8-x86_64-1.txz: Upgraded. x/xhost-1.0.9-x86_64-1.txz: Upgraded. x/xorg-server-21.1.5-x86_64-1.txz: Upgraded. This release fixes 6 recently reported security vulnerabilities in various extensions. For more information, see: https://lists.x.org/archives/xorg-announce/2022-December/003302.html https://www.cve.org/CVERecord?id=CVE-2022-46340 https://www.cve.org/CVERecord?id=CVE-2022-46341 https://www.cve.org/CVERecord?id=CVE-2022-46342 https://www.cve.org/CVERecord?id=CVE-2022-46343 https://www.cve.org/CVERecord?id=CVE-2022-46344 https://www.cve.org/CVERecord?id=CVE-2022-4283 (* Security fix *) x/xorg-server-xephyr-21.1.5-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.5-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.5-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-22.1.6-x86_64-1.txz: Upgraded. This release fixes 6 recently reported security vulnerabilities in various extensions. For more information, see: https://lists.x.org/archives/xorg-announce/2022-December/003302.html https://www.cve.org/CVERecord?id=CVE-2022-46340 https://www.cve.org/CVERecord?id=CVE-2022-46341 https://www.cve.org/CVERecord?id=CVE-2022-46342 https://www.cve.org/CVERecord?id=CVE-2022-46343 https://www.cve.org/CVERecord?id=CVE-2022-46344 https://www.cve.org/CVERecord?id=CVE-2022-4283 (* Security fix *) xap/mozilla-thunderbird-102.6.0-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/security/advisories/mfsa2022-53/ https://www.cve.org/CVERecord?id=CVE-2022-46880 https://www.cve.org/CVERecord?id=CVE-2022-46872 https://www.cve.org/CVERecord?id=CVE-2022-46881 https://www.cve.org/CVERecord?id=CVE-2022-46874 https://www.cve.org/CVERecord?id=CVE-2022-46875 https://www.cve.org/CVERecord?id=CVE-2022-46882 https://www.cve.org/CVERecord?id=CVE-2022-46878 (* Security fix *) xap/xscreensaver-6.06-x86_64-1.txz: Upgraded. testing/packages/mozilla-firefox-108.0-x86_64-1.txz: Upgraded. Starting this out in /testing for now, since I've been trying for 2 days to get it to compile on 32-bit with no luck. It ends up failing with a bunch of errors like this: ld.lld: error: undefined hidden symbol: tabs_4d51_TabsStore_sync Any help getting this to build on 32-bit would be greatly appreciated. I've tried most of ponce's bag of tricks already. :-)
119 lines
3.2 KiB
Text
119 lines
3.2 KiB
Text
BASH PATCH REPORT
|
|
=================
|
|
|
|
Bash-Release: 5.2
|
|
Patch-ID: bash52-014
|
|
|
|
Bug-Reported-by: Andreas Schwab <schwab@suse.de>
|
|
Bug-Reference-ID: <mvmv8opcbha.fsf@suse.de>
|
|
Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2022-10/msg00076.html
|
|
|
|
Bug-Description:
|
|
|
|
Bash defers processing additional terminating signals when running the
|
|
EXIT trap while exiting due to a terminating signal. This patch allows the
|
|
new terminating signal to kill the shell immediately.
|
|
|
|
Patch (apply with `patch -p0'):
|
|
|
|
*** ../bash-5.2-patched/execute_cmd.c 2022-11-23 17:09:18.000000000 -0500
|
|
--- execute_cmd.c 2022-11-28 10:36:08.000000000 -0500
|
|
***************
|
|
*** 3625,3628 ****
|
|
--- 3649,3653 ----
|
|
|
|
dispose_words (es);
|
|
+ QUIT;
|
|
|
|
if (match)
|
|
*** ../bash-5.2-patched/sig.c 2021-11-04 14:15:31.000000000 -0400
|
|
--- sig.c 2022-12-06 09:45:11.000000000 -0500
|
|
***************
|
|
*** 95,98 ****
|
|
--- 95,99 ----
|
|
|
|
static void initialize_shell_signals PARAMS((void));
|
|
+ static void kill_shell PARAMS((int));
|
|
|
|
void
|
|
***************
|
|
*** 487,490 ****
|
|
--- 495,500 ----
|
|
}
|
|
|
|
+ static int handling_termsig = 0;
|
|
+
|
|
sighandler
|
|
termsig_sighandler (sig)
|
|
***************
|
|
*** 533,536 ****
|
|
--- 543,554 ----
|
|
terminate_immediately = 1;
|
|
|
|
+ /* If we are currently handling a terminating signal, we have a couple of
|
|
+ choices here. We can ignore this second terminating signal and let the
|
|
+ shell exit from the first one, or we can exit immediately by killing
|
|
+ the shell with this signal. This code implements the latter; to implement
|
|
+ the former, replace the kill_shell(sig) with return. */
|
|
+ if (handling_termsig)
|
|
+ kill_shell (sig); /* just short-circuit now */
|
|
+
|
|
terminating_signal = sig;
|
|
|
|
***************
|
|
*** 565,572 ****
|
|
int sig;
|
|
{
|
|
- static int handling_termsig = 0;
|
|
- int i, core;
|
|
- sigset_t mask;
|
|
-
|
|
/* Simple semaphore to keep this function from being executed multiple
|
|
times. Since we no longer are running as a signal handler, we don't
|
|
--- 585,588 ----
|
|
***************
|
|
*** 574,578 ****
|
|
if (handling_termsig)
|
|
return;
|
|
! handling_termsig = 1;
|
|
terminating_signal = 0; /* keep macro from re-testing true. */
|
|
|
|
--- 590,595 ----
|
|
if (handling_termsig)
|
|
return;
|
|
!
|
|
! handling_termsig = terminating_signal; /* for termsig_sighandler */
|
|
terminating_signal = 0; /* keep macro from re-testing true. */
|
|
|
|
***************
|
|
*** 614,617 ****
|
|
--- 631,644 ----
|
|
run_exit_trap (); /* XXX - run exit trap possibly in signal context? */
|
|
|
|
+ kill_shell (sig);
|
|
+ }
|
|
+
|
|
+ static void
|
|
+ kill_shell (sig)
|
|
+ int sig;
|
|
+ {
|
|
+ int i, core;
|
|
+ sigset_t mask;
|
|
+
|
|
/* We don't change the set of blocked signals. If a user starts the shell
|
|
with a terminating signal blocked, we won't get here (and if by some
|
|
*** ../bash-5.2/patchlevel.h 2020-06-22 14:51:03.000000000 -0400
|
|
--- patchlevel.h 2020-10-01 11:01:28.000000000 -0400
|
|
***************
|
|
*** 26,30 ****
|
|
looks for to find the patch level (for the sccs version string). */
|
|
|
|
! #define PATCHLEVEL 13
|
|
|
|
#endif /* _PATCHLEVEL_H_ */
|
|
--- 26,30 ----
|
|
looks for to find the patch level (for the sccs version string). */
|
|
|
|
! #define PATCHLEVEL 14
|
|
|
|
#endif /* _PATCHLEVEL_H_ */
|