]>
Commit | Line | Data |
---|---|---|
5be71d2a AB |
1 | BASH PATCH REPORT |
2 | ================= | |
3 | ||
4 | Bash-Release: 5.2 | |
5 | Patch-ID: bash52-005 | |
6 | ||
7 | Bug-Reported-by: Justin Wood (Callek) <callek@gmail.com> | |
8 | Bug-Reference-ID: <CANBDKY9fp2yiXONP7RY4kNuRteuovUebxSJaqePHeu7cyaFS9Q@mail.gmail.com> | |
9 | Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2022-10/msg00088.html | |
10 | ||
11 | Bug-Description: | |
12 | ||
13 | Null pattern substitution replacement strings can cause a crash. | |
14 | ||
15 | Patch (apply with `patch -p0'): | |
16 | ||
17 | *** ../bash-5.2-patched/subst.c 2022-10-05 10:22:02.000000000 -0400 | |
18 | --- subst.c 2022-10-13 16:57:26.000000000 -0400 | |
19 | *************** | |
20 | *** 8966,8970 **** | |
21 | } | |
22 | else if (*string == 0 && (match_pattern (string, pat, mtype, &s, &e) != 0)) | |
23 | ! return ((mflags & MATCH_EXPREP) ? strcreplace (rep, '&', "", 2) : savestring (rep)); | |
24 | ||
25 | ret = (char *)xmalloc (rsize = 64); | |
26 | --- 8966,8971 ---- | |
27 | } | |
28 | else if (*string == 0 && (match_pattern (string, pat, mtype, &s, &e) != 0)) | |
29 | ! return (mflags & MATCH_EXPREP) ? strcreplace (rep, '&', "", 2) | |
30 | ! : (rep ? savestring (rep) : savestring ("")); | |
31 | ||
32 | ret = (char *)xmalloc (rsize = 64); | |
33 | *** ../bash-5.2/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 | |
34 | --- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 | |
35 | *************** | |
36 | *** 26,30 **** | |
37 | looks for to find the patch level (for the sccs version string). */ | |
38 | ||
39 | ! #define PATCHLEVEL 4 | |
40 | ||
41 | #endif /* _PATCHLEVEL_H_ */ | |
42 | --- 26,30 ---- | |
43 | looks for to find the patch level (for the sccs version string). */ | |
44 | ||
45 | ! #define PATCHLEVEL 5 | |
46 | ||
47 | #endif /* _PATCHLEVEL_H_ */ |