slackware-current/source/a/bash/bash-5.1-patches/bash51-005
Patrick J Volkerding e89deabfb2 Wed May 5 19:56:53 UTC 2021
a/bash-5.1.008-x86_64-1.txz:  Upgraded.
d/python-setuptools-56.1.0-x86_64-1.txz:  Upgraded.
l/libgnt-2.14.1-x86_64-1.txz:  Added.
  Thanks to Robby Workman.
l/mozjs78-78.10.1esr-x86_64-1.txz:  Upgraded.
l/python-six-1.16.0-x86_64-1.txz:  Upgraded.
l/readline-8.1.001-x86_64-1.txz:  Upgraded.
n/mutt-2.0.7-x86_64-1.txz:  Upgraded.
n/php-7.4.19-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-88.0.1-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/88.0.1/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2021-20/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29953
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29952
  (* Security fix *)
xap/mozilla-thunderbird-78.10.1-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/78.10.1/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2021-19/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29951
  (* Security fix *)
xap/pidgin-2.14.4-x86_64-2.txz:  Rebuilt.
  Recompiled against libgnt-2.14.1 to restore the finch cli app.
  Thanks to Robby Workman.
xfce/xfce4-clipman-plugin-1.6.2-x86_64-1.txz:  Upgraded.
extra/php8/php8-8.0.6-x86_64-1.txz:  Upgraded.
2021-05-06 08:59:52 +02:00

100 lines
2.5 KiB
Text

BASH PATCH REPORT
=================
Bash-Release: 5.1
Patch-ID: bash51-005
Bug-Reported-by: Alexander Mescheryakov <alexander.s.m@gmail.com>,
konsolebox <konsolebox@gmail.com>
Bug-Reference-ID: <5ffd7f3d.1c69fb81.dee25.166c@mx.google.com>,
<CAJnmqwaVs7M6NBqZzcHy5c2+yHkTEg7p+o8ZWuA7sN+6N1q4CA@mail.gmail.com>
Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2021-01/msg00082.html,
https://lists.gnu.org/archive/html/bug-bash/2021-04/msg00160.html
Bug-Description:
Fix two memory leaks when assigning arrays using compound assignment syntax.
Patch (apply with `patch -p0'):
*** ../bash-5.1-patched/subst.c 2020-12-16 17:01:32.000000000 -0500
--- subst.c 2021-01-24 17:48:40.000000000 -0500
***************
*** 11674,11677 ****
--- 11674,11679 ----
value = string_list (l);
+ dispose_words (l);
+
wlen = STRLEN (value);
*** ../bash-5.1-patched/arrayfunc.c 2020-12-16 17:01:32.000000000 -0500
--- arrayfunc.c 2021-04-19 16:43:09.000000000 -0400
***************
*** 565,574 ****
WORD_LIST *list;
char *akey, *aval, *k, *v;
- int free_aval;
for (list = nlist; list; list = list->next)
{
- free_aval = 0;
-
k = list->word->word;
v = list->next ? list->next->word->word : 0;
--- 565,571 ----
***************
*** 578,583 ****
akey = expand_assignment_string_to_string (k, 0);
- aval = expand_assignment_string_to_string (v, 0);
-
if (akey == 0 || *akey == 0)
{
--- 575,578 ----
***************
*** 586,599 ****
continue;
}
if (aval == 0)
{
aval = (char *)xmalloc (1);
aval[0] = '\0'; /* like do_assignment_internal */
- free_aval = 1;
}
bind_assoc_var_internal (var, h, akey, aval, flags);
! if (free_aval)
! free (aval);
}
}
--- 581,594 ----
continue;
}
+
+ aval = expand_assignment_string_to_string (v, 0);
if (aval == 0)
{
aval = (char *)xmalloc (1);
aval[0] = '\0'; /* like do_assignment_internal */
}
bind_assoc_var_internal (var, h, akey, aval, flags);
! free (aval);
}
}
*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400
--- patchlevel.h 2020-10-01 11:01:28.000000000 -0400
***************
*** 26,30 ****
looks for to find the patch level (for the sccs version string). */
! #define PATCHLEVEL 4
#endif /* _PATCHLEVEL_H_ */
--- 26,30 ----
looks for to find the patch level (for the sccs version string). */
! #define PATCHLEVEL 5
#endif /* _PATCHLEVEL_H_ */