Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > gnu.bash.bug > #11368

Bash-4.3 Official Patch 40

Path csiph.com!optima2.xanadu-bbs.net!xanadu-bbs.net!news.glorb.com!usenet.stanford.edu!not-for-mail
From Chet Ramey <chet.ramey@case.edu>
Newsgroups gnu.bash.bug
Subject Bash-4.3 Official Patch 40
Date Tue, 18 Aug 2015 09:15:38 -0400
Lines 53
Sender Chet Ramey <chet@caleb.local>
Approved bug-bash@gnu.org
Message-ID <mailman.8527.1439907299.904.bug-bash@gnu.org> (permalink)
Reply-To chet.ramey@case.edu
NNTP-Posting-Host lists.gnu.org
Mime-Version 1.0
Content-Type text/plain; charset=us-ascii
X-Trace usenet.stanford.edu 1439907300 11938 208.118.235.17 (18 Aug 2015 14:15:00 GMT)
X-Complaints-To action@cs.stanford.edu
Cc chet.ramey@case.edu
To bug-bash@gnu.org
Envelope-to bug-bash@gnu.org
Read-Receipt-To chet.ramey@case.edu
X-Junkmail-Status score=10/50, host=mpv6.cwru.edu
X-Junkmail-Whitelist YES (by domain whitelist at mpv1.tis.cwru.edu)
X-detected-operating-system by eggs.gnu.org: GNU/Linux 2.4.x-2.6.x [generic]
X-Received-From 129.22.105.36
X-BeenThere bug-bash@gnu.org
X-Mailman-Version 2.1.14
Precedence list
List-Id Bug reports for the GNU Bourne Again SHell <bug-bash.gnu.org>
List-Unsubscribe <https://lists.gnu.org/mailman/options/bug-bash>, <mailto:bug-bash-request@gnu.org?subject=unsubscribe>
List-Archive <http://lists.gnu.org/archive/html/bug-bash>
List-Post <mailto:bug-bash@gnu.org>
List-Help <mailto:bug-bash-request@gnu.org?subject=help>
List-Subscribe <https://lists.gnu.org/mailman/listinfo/bug-bash>, <mailto:bug-bash-request@gnu.org?subject=subscribe>
Xref csiph.com gnu.bash.bug:11368

Show key headers only | View raw


			     BASH PATCH REPORT
			     =================

Bash-Release:	4.3
Patch-ID:	bash43-040

Bug-Reported-by:	Jean Delvare <jdelvare@suse.de>
Bug-Reference-ID:	<20150609180231.5f463695@endymion.delvare>
Bug-Reference-URL:	http://lists.gnu.org/archive/html/bug-bash/2015-06/msg00033.html

Bug-Description:

There is a memory leak that occurs when bash expands an array reference on
the rhs of an assignment statement.

Patch (apply with `patch -p0'):

*** ../bash-4.3-patched/subst.c	2014-10-01 12:57:47.000000000 -0400
--- subst.c	2015-06-22 09:16:53.000000000 -0400
***************
*** 5783,5787 ****
        if (pflags & PF_ASSIGNRHS)
          {
!           temp = array_variable_name (name, &tt, (int *)0);
            if (ALL_ELEMENT_SUB (tt[0]) && tt[1] == ']')
  	    temp = array_value (name, quoted|Q_DOUBLE_QUOTES, 0, &atype, &ind);
--- 5783,5787 ----
        if (pflags & PF_ASSIGNRHS)
          {
!           var = array_variable_part (name, &tt, (int *)0);
            if (ALL_ELEMENT_SUB (tt[0]) && tt[1] == ']')
  	    temp = array_value (name, quoted|Q_DOUBLE_QUOTES, 0, &atype, &ind);
*** ../bash-4.3/patchlevel.h	2012-12-29 10:47:57.000000000 -0500
--- patchlevel.h	2014-03-20 20:01:28.000000000 -0400
***************
*** 26,30 ****
     looks for to find the patch level (for the sccs version string). */
  
! #define PATCHLEVEL 39
  
  #endif /* _PATCHLEVEL_H_ */
--- 26,30 ----
     looks for to find the patch level (for the sccs version string). */
  
! #define PATCHLEVEL 40
  
  #endif /* _PATCHLEVEL_H_ */

-- 
``The lyf so short, the craft so long to lerne.'' - Chaucer
		 ``Ars longa, vita brevis'' - Hippocrates
Chet Ramey, ITS, CWRU    chet@case.edu    http://cnswww.cns.cwru.edu/~chet/

Back to gnu.bash.bug | Previous | Next | Find similar


Thread

Bash-4.3 Official Patch 40 Chet Ramey <chet.ramey@case.edu> - 2015-08-18 09:15 -0400

csiph-web