Hello community,

here is the log from the commit of package bash for openSUSE:Factory checked in 
at 2011-11-28 12:53:02
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/bash (Old)
 and      /work/SRC/openSUSE:Factory/.bash.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "bash", Maintainer is "[email protected]"

Changes:
--------
--- /work/SRC/openSUSE:Factory/bash/bash.changes        2011-11-22 
17:47:21.000000000 +0100
+++ /work/SRC/openSUSE:Factory/.bash.new/bash.changes   2011-11-28 
12:53:04.000000000 +0100
@@ -1,0 +2,11 @@
+Fri Nov 25 17:08:30 UTC 2011 - [email protected]
+
+- Make build check quiet
+
+-------------------------------------------------------------------
+Fri Nov 25 16:32:14 UTC 2011 - [email protected]
+
+- Update bash 4.2 to patch level 20
+- Update readline 6.2 to patch level 2
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ bash.spec ++++++
--- /var/tmp/diff_new_pack.pwDRYE/_old  2011-11-28 12:53:07.000000000 +0100
+++ /var/tmp/diff_new_pack.pwDRYE/_new  2011-11-28 12:53:07.000000000 +0100
@@ -372,7 +372,8 @@
   CFLAGS_FOR_BUILD="$CFLAGS"
   LDFLAGS_FOR_BUILD="$LDFLAGS"
   export CC_FOR_BUILD CFLAGS_FOR_BUILD LDFLAGS_FOR_BUILD CFLAGS LDFLAGS CC
-  ./configure --disable-static --build=%{_target_cpu}-suse-linux       \
+  ./configure --build=%{_target_cpu}-suse-linux        \
+       --disable-static                \
        --prefix=%{_prefix}                     \
        --with-curses                   \
        --mandir=%{_mandir}             \

++++++ bash-4.2-patches.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/bash-4.2-patches/bash-4.2-assoc-reassign-memleak.patch 
new/bash-4.2-patches/bash-4.2-assoc-reassign-memleak.patch
--- old/bash-4.2-patches/bash-4.2-assoc-reassign-memleak.patch  2011-10-07 
17:00:28.000000000 +0200
+++ new/bash-4.2-patches/bash-4.2-assoc-reassign-memleak.patch  1970-01-01 
01:00:00.000000000 +0100
@@ -1,14 +0,0 @@
-*** ../bash-4.2-patched/assoc.c        2009-08-05 20:19:40.000000000 -0400
---- assoc.c    2011-10-04 20:23:07.000000000 -0400
-***************
-*** 78,81 ****
---- 78,86 ----
-    if (b == 0)
-      return -1;
-+   /* If we are overwriting an existing element's value, we're not going to
-+      use the key.  Nothing in the array assignment code path frees the key
-+      string, so we can free it here to avoid a memory leak. */
-+   if (b->key != key)
-+     free (key);
-    FREE (b->data);
-    b->data = value ? savestring (value) : (char *)0;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash-4.2-quoted-nulls.patch 
new/bash-4.2-patches/bash-4.2-quoted-nulls.patch
--- old/bash-4.2-patches/bash-4.2-quoted-nulls.patch    2011-05-12 
10:59:19.000000000 +0200
+++ new/bash-4.2-patches/bash-4.2-quoted-nulls.patch    1970-01-01 
01:00:00.000000000 +0100
@@ -1,18 +0,0 @@
-*** ../bash-4.2-patched/subst.c        2011-03-06 14:11:11.000000000 -0500
---- subst.c    2011-05-11 11:23:33.000000000 -0400
-***************
-*** 3707,3711 ****
-       }
-        else if (string[i] == CTLNUL)
-!      i++;
-  
-        prev_i = i;
---- 3710,3717 ----
-       }
-        else if (string[i] == CTLNUL)
-!      {
-!        i++;
-!        continue;
-!      }
-  
-        prev_i = i;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash-4.2-read-assoc-array.patch 
new/bash-4.2-patches/bash-4.2-read-assoc-array.patch
--- old/bash-4.2-patches/bash-4.2-read-assoc-array.patch        2011-06-21 
18:54:47.000000000 +0200
+++ new/bash-4.2-patches/bash-4.2-read-assoc-array.patch        1970-01-01 
01:00:00.000000000 +0100
@@ -1,40 +0,0 @@
-*** ../bash-4.2-patched/builtins/read.def      2011-01-04 11:43:36.000000000 
-0500
---- builtins/read.def  2011-06-21 10:31:02.000000000 -0400
-***************
-*** 456,460 ****
-    add_unwind_protect (xfree, input_string);
-    interrupt_immediately++;
--   terminate_immediately++;
-  
-    unbuffered_read = (nchars > 0) || (delim != '\n') || input_is_pipe;
---- 456,459 ----
-***************
-*** 513,516 ****
---- 512,516 ----
-        if (retval <= 0)
-       {
-+        CHECK_TERMSIG;
-         eof = 1;
-         break;
-***************
-*** 623,627 ****
-  
-    interrupt_immediately--;
--   terminate_immediately--;
-  
-  #if defined (ARRAY_VARS)
---- 623,626 ----
-***************
-*** 643,646 ****
---- 642,651 ----
-         return EXECUTION_FAILURE;     /* readonly or noassign */
-       }
-+       if (assoc_p (var))
-+      {
-+           builtin_error (_("%s: cannot convert associative to indexed 
array"), arrayname);
-+        xfree (input_string);
-+        return EXECUTION_FAILURE;     /* existing associative array */
-+      }
-        array_flush (array_cell (var));
-  
-
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash-4.2-sigterm.patch 
new/bash-4.2-patches/bash-4.2-sigterm.patch
--- old/bash-4.2-patches/bash-4.2-sigterm.patch 1970-01-01 01:00:00.000000000 
+0100
+++ new/bash-4.2-patches/bash-4.2-sigterm.patch 2011-11-25 17:30:48.000000000 
+0100
@@ -0,0 +1,26 @@
+*** ../bash-4.2-patched/builtins/read.def      2011-01-04 11:43:36.000000000 
-0500
+--- builtins/read.def  2011-06-21 10:31:02.000000000 -0400
+***************
+*** 456,460 ****
+    add_unwind_protect (xfree, input_string);
+    interrupt_immediately++;
+-   terminate_immediately++;
+  
+    unbuffered_read = (nchars > 0) || (delim != '\n') || input_is_pipe;
+--- 456,459 ----
+***************
+*** 513,516 ****
+--- 512,516 ----
+        if (retval <= 0)
+       {
++        CHECK_TERMSIG;
+         eof = 1;
+         break;
+***************
+*** 623,627 ****
+  
+    interrupt_immediately--;
+-   terminate_immediately--;
+  
+  #if defined (ARRAY_VARS)
+--- 623,626 ----
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash42-011 
new/bash-4.2-patches/bash42-011
--- old/bash-4.2-patches/bash42-011     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-4.2-patches/bash42-011     2011-11-21 23:59:43.000000000 +0100
@@ -0,0 +1,46 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  4.2
+Patch-ID:      bash42-011
+
+Bug-Reported-by:       "David Parks" <[email protected]>
+Bug-Reference-ID:      <014101cc82c6$46ac1540$d4043fc0$@com>
+Bug-Reference-URL:     
http://lists.gnu.org/archive/html/bug-bash/2011-10/msg00031.html
+
+Bug-Description:
+
+Overwriting a value in an associative array causes the memory allocated to
+store the key on the second and subsequent assignments to leak.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-4.2-patched/assoc.c        2009-08-05 20:19:40.000000000 -0400
+--- assoc.c    2011-10-04 20:23:07.000000000 -0400
+***************
+*** 78,81 ****
+--- 78,86 ----
+    if (b == 0)
+      return -1;
++   /* If we are overwriting an existing element's value, we're not going to
++      use the key.  Nothing in the array assignment code path frees the key
++      string, so we can free it here to avoid a memory leak. */
++   if (b->key != key)
++     free (key);
+    FREE (b->data);
+    b->data = value ? savestring (value) : (char *)0;
+*** ../bash-4.2-patched/patchlevel.h   Sat Jun 12 20:14:48 2010
+--- patchlevel.h       Thu Feb 24 21:41:34 2011
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 10
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 11
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash42-012 
new/bash-4.2-patches/bash42-012
--- old/bash-4.2-patches/bash42-012     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-4.2-patches/bash42-012     2011-11-21 23:59:53.000000000 +0100
@@ -0,0 +1,151 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  4.2
+Patch-ID:      bash42-012
+
+Bug-Reported-by:       Rui Santos <[email protected]>
+Bug-Reference-ID:      <[email protected]>
+Bug-Reference-URL:     
http://lists.gnu.org/archive/html/bug-bash/2011-06/msg00079.html
+
+Bug-Description:
+
+When calling the parser to recursively parse a command substitution within
+an arithmetic expansion, the shell overwrote the saved shell input line and
+associated state, resulting in a garbled command.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-4.2-patched/parse.y        2011-02-26 19:19:05.000000000 -0500
+--- parse.y    2011-06-24 20:08:22.000000000 -0400
+***************
+*** 3843,3846 ****
+--- 3849,3853 ----
+  {
+    sh_parser_state_t ps;
++   sh_input_line_state_t ls;
+    int orig_ind, nc, sflags;
+    char *ret, *s, *ep, *ostring;
+***************
+*** 3850,3857 ****
+--- 3857,3866 ----
+    ostring = string;
+  
++ /*itrace("xparse_dolparen: size = %d shell_input_line = `%s'", 
shell_input_line_size, shell_input_line);*/
+    sflags = SEVAL_NONINT|SEVAL_NOHIST|SEVAL_NOFREE;
+    if (flags & SX_NOLONGJMP)
+      sflags |= SEVAL_NOLONGJMP;
+    save_parser_state (&ps);
++   save_input_line_state (&ls);
+  
+    /*(*/
+***************
+*** 3862,3865 ****
+--- 3871,3876 ----
+    restore_parser_state (&ps);
+    reset_parser ();
++   /* reset_parser clears shell_input_line and associated variables */
++   restore_input_line_state (&ls);
+    if (interactive)
+      token_to_read = 0;
+***************
+*** 5909,5912 ****
+--- 5920,5929 ----
+    ps->echo_input_at_read = echo_input_at_read;
+  
++   ps->token = token;
++   ps->token_buffer_size = token_buffer_size;
++   /* Force reallocation on next call to read_token_word */
++   token = 0;
++   token_buffer_size = 0;
++ 
+    return (ps);
+  }
+***************
+*** 5950,5953 ****
+--- 5967,6006 ----
+    expand_aliases = ps->expand_aliases;
+    echo_input_at_read = ps->echo_input_at_read;
++ 
++   FREE (token);
++   token = ps->token;
++   token_buffer_size = ps->token_buffer_size;
++ }
++ 
++ sh_input_line_state_t *
++ save_input_line_state (ls)
++      sh_input_line_state_t *ls;
++ {
++   if (ls == 0)
++     ls = (sh_input_line_state_t *)xmalloc (sizeof (sh_input_line_state_t));
++   if (ls == 0)
++     return ((sh_input_line_state_t *)NULL);
++ 
++   ls->input_line = shell_input_line;
++   ls->input_line_size = shell_input_line_size;
++   ls->input_line_len = shell_input_line_len;
++   ls->input_line_index = shell_input_line_index;
++ 
++   /* force reallocation */
++   shell_input_line = 0;
++   shell_input_line_size = shell_input_line_len = shell_input_line_index = 0;
++ }
++ 
++ void
++ restore_input_line_state (ls)
++      sh_input_line_state_t *ls;
++ {
++   FREE (shell_input_line);
++   shell_input_line = ls->input_line;
++   shell_input_line_size = ls->input_line_size;
++   shell_input_line_len = ls->input_line_len;
++   shell_input_line_index = ls->input_line_index;
++ 
++   set_line_mbstate ();
+  }
+  
+*** ../bash-4.2-patched/shell.h        2011-01-06 22:16:55.000000000 -0500
+--- shell.h    2011-06-24 19:12:25.000000000 -0400
+***************
+*** 137,140 ****
+--- 139,145 ----
+    int *token_state;
+  
++   char *token;
++   int token_buffer_size;
++ 
+    /* input line state -- line number saved elsewhere */
+    int input_line_terminator;
+***************
+*** 167,171 ****
+--- 172,186 ----
+  } sh_parser_state_t;
+  
++ typedef struct _sh_input_line_state_t {
++   char *input_line;
++   int input_line_index;
++   int input_line_size;
++   int input_line_len;
++ } sh_input_line_state_t;
++ 
+  /* Let's try declaring these here. */
+  extern sh_parser_state_t *save_parser_state __P((sh_parser_state_t *));
+  extern void restore_parser_state __P((sh_parser_state_t *));
++ 
++ extern sh_input_line_state_t *save_input_line_state 
__P((sh_input_line_state_t *));
++ extern void restore_input_line_state __P((sh_input_line_state_t *));
+*** ../bash-4.2-patched/patchlevel.h   Sat Jun 12 20:14:48 2010
+--- patchlevel.h       Thu Feb 24 21:41:34 2011
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 11
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 12
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash42-013 
new/bash-4.2-patches/bash42-013
--- old/bash-4.2-patches/bash42-013     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-4.2-patches/bash42-013     2011-11-22 00:00:03.000000000 +0100
@@ -0,0 +1,52 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  4.2
+Patch-ID:      bash42-013
+
+Bug-Reported-by:       Marten Wikstrom <[email protected]>
+Bug-Reference-ID:      <[email protected]>
+Bug-Reference-URL:     
http://lists.gnu.org/archive/html/bug-bash/2011-05/msg00049.html
+
+Bug-Description:
+
+An off-by-one error caused the shell to skip over CTLNUL characters,
+which are used internally to mark quoted null strings.  The effect
+was to have stray 0x7f characters left after expanding words like
+""""""""aa.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-4.2-patched/subst.c        2011-03-06 14:11:11.000000000 -0500
+--- subst.c    2011-05-11 11:23:33.000000000 -0400
+***************
+*** 3707,3711 ****
+       }
+        else if (string[i] == CTLNUL)
+!      i++;
+  
+        prev_i = i;
+--- 3710,3717 ----
+       }
+        else if (string[i] == CTLNUL)
+!      {
+!        i++;
+!        continue;
+!      }
+  
+        prev_i = i;
+*** ../bash-4.2-patched/patchlevel.h   Sat Jun 12 20:14:48 2010
+--- patchlevel.h       Thu Feb 24 21:41:34 2011
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 12
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 13
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash42-014 
new/bash-4.2-patches/bash42-014
--- old/bash-4.2-patches/bash42-014     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-4.2-patches/bash42-014     2011-11-22 00:00:14.000000000 +0100
@@ -0,0 +1,47 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  4.2
+Patch-ID:      bash42-014
+
+Bug-Reported-by:       Shawn Bohrer <[email protected]>
+Bug-Reference-ID:      <[email protected]>
+Bug-Reference-URL:     
http://lists.gnu.org/archive/html/bug-bash/2011-05/msg00018.html
+
+Bug-Description:
+
+The regular expression matching operator did not correctly match
+expressions with an embedded ^A.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-4.2-patched/pathexp.c      2010-08-13 23:21:57.000000000 -0400
+--- pathexp.c  2011-05-05 16:40:58.000000000 -0400
+***************
+*** 197,201 ****
+         if ((qflags & QGLOB_FILENAME) && pathname[i+1] == '/')
+           continue;
+!        if ((qflags & QGLOB_REGEXP) && ere_char (pathname[i+1]) == 0)
+           continue;
+         temp[j++] = '\\';
+--- 197,201 ----
+         if ((qflags & QGLOB_FILENAME) && pathname[i+1] == '/')
+           continue;
+!        if (pathname[i+1] != CTLESC && (qflags & QGLOB_REGEXP) && ere_char 
(pathname[i+1]) == 0)
+           continue;
+         temp[j++] = '\\';
+*** ../bash-4.2-patched/patchlevel.h   Sat Jun 12 20:14:48 2010
+--- patchlevel.h       Thu Feb 24 21:41:34 2011
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 13
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 14
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash42-015 
new/bash-4.2-patches/bash42-015
--- old/bash-4.2-patches/bash42-015     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-4.2-patches/bash42-015     2011-11-22 00:00:27.000000000 +0100
@@ -0,0 +1,81 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  4.2
+Patch-ID:      bash42-015
+
+Bug-Reported-by:       <[email protected]>
+Bug-Reference-ID:      
<728_1312188080_4e3666b0_728_118711_1_3b5d3e0f95cc5c478d6500cdce8b691f7aaaa4a...@puexcb2b.nanterre.francetelecom.fr>
+Bug-Reference-URL:     
http://lists.gnu.org/archive/html/bug-bash/2011-08/msg00000.html
+
+Bug-Description:
+
+When in a context where arithmetic evaluation is not taking place, the
+evaluator should not check for division by 0.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-4.2-patched/expr.c 2010-12-21 11:12:13.000000000 -0500
+--- expr.c     2011-08-02 20:58:28.000000000 -0400
+***************
+*** 477,480 ****
+--- 481,492 ----
+        if (special)
+       {
++        if ((op == DIV || op == MOD) && value == 0)
++          {
++            if (noeval == 0)
++              evalerror (_("division by 0"));
++            else
++              value = 1;
++          }
++ 
+         switch (op)
+           {
+***************
+*** 483,493 ****
+             break;
+           case DIV:
+-            if (value == 0)
+-              evalerror (_("division by 0"));
+             lvalue /= value;
+             break;
+           case MOD:
+-            if (value == 0)
+-              evalerror (_("division by 0"));
+             lvalue %= value;
+             break;
+--- 495,501 ----
+***************
+*** 805,809 ****
+  
+        if (((op == DIV) || (op == MOD)) && (val2 == 0))
+!      evalerror (_("division by 0"));
+  
+        if (op == MUL)
+--- 813,822 ----
+  
+        if (((op == DIV) || (op == MOD)) && (val2 == 0))
+!      {
+!        if (noeval == 0)
+!          evalerror (_("division by 0"));
+!        else
+!          val2 = 1;
+!      }
+  
+        if (op == MUL)
+*** ../bash-4.2-patched/patchlevel.h   Sat Jun 12 20:14:48 2010
+--- patchlevel.h       Thu Feb 24 21:41:34 2011
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 14
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 15
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash42-016 
new/bash-4.2-patches/bash42-016
--- old/bash-4.2-patches/bash42-016     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-4.2-patches/bash42-016     2011-11-22 00:00:40.000000000 +0100
@@ -0,0 +1,46 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  4.2
+Patch-ID:      bash42-016
+
+Bug-Reported-by:       Martin von Gagern <[email protected]>
+Bug-Reference-ID:      <[email protected]>
+Bug-Reference-URL:     
http://lists.gnu.org/archive/html/bug-bash/2011-08/msg00141.html
+
+Bug-Description:
+
+Bash should not check for mail while executing the `eval' builtin.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-4.2-patched/parse.y        Fri Feb 25 12:07:41 2011
+--- parse.y    Thu Aug 11 19:02:26 2011
+***************
+*** 2500,2504 ****
+        is the mail alarm reset; nothing takes place in check_mail ()
+        except the checking of mail.  Please don't change this. */
+!       if (prompt_is_ps1 && time_to_check_mail ())
+       {
+         check_mail ();
+--- 2498,2502 ----
+        is the mail alarm reset; nothing takes place in check_mail ()
+        except the checking of mail.  Please don't change this. */
+!       if (prompt_is_ps1 && parse_and_execute_level == 0 && 
time_to_check_mail ())
+       {
+         check_mail ();
+*** ../bash-4.2-patched/patchlevel.h   Sat Jun 12 20:14:48 2010
+--- patchlevel.h       Thu Feb 24 21:41:34 2011
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 15
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 16
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash42-017 
new/bash-4.2-patches/bash42-017
--- old/bash-4.2-patches/bash42-017     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-4.2-patches/bash42-017     2011-11-22 00:00:54.000000000 +0100
@@ -0,0 +1,47 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  4.2
+Patch-ID:      bash42-017
+
+Bug-Reported-by:       Curtis Doty <[email protected]>
+Bug-Reference-ID:      <[email protected]>
+Bug-Reference-URL:     
http://lists.gnu.org/archive/html/bug-bash/2011-06/msg00053.html
+
+Bug-Description:
+
+Using `read -a foo' where foo was an already-declared associative array
+caused the shell to die with a segmentation fault.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-4.2-patched/builtins/read.def      2011-01-04 11:43:36.000000000 
-0500
+--- builtins/read.def  2011-06-21 10:31:02.000000000 -0400
+***************
+*** 643,646 ****
+--- 642,651 ----
+         return EXECUTION_FAILURE;     /* readonly or noassign */
+       }
++       if (assoc_p (var))
++      {
++           builtin_error (_("%s: cannot convert associative to indexed 
array"), arrayname);
++        xfree (input_string);
++        return EXECUTION_FAILURE;     /* existing associative array */
++      }
+        array_flush (array_cell (var));
+  
+*** ../bash-4.2-patched/patchlevel.h   Sat Jun 12 20:14:48 2010
+--- patchlevel.h       Thu Feb 24 21:41:34 2011
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 16
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 17
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash42-018 
new/bash-4.2-patches/bash42-018
--- old/bash-4.2-patches/bash42-018     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-4.2-patches/bash42-018     2011-11-22 00:01:09.000000000 +0100
@@ -0,0 +1,74 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  4.2
+Patch-ID:      bash42-018
+
+Bug-Reported-by:       Thomas Cort <[email protected]>
+Bug-Reference-ID:      <[email protected]>
+Bug-Reference-URL:     
http://lists.gnu.org/archive/html/bug-bash/2011-06/msg00110.html
+
+Bug-Description:
+
+Bash fails to compile unless JOB_CONTROL is defined.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-4.2-patched/execute_cmd.c  2011-02-09 17:32:25.000000000 -0500
+--- execute_cmd.c      2011-11-06 15:12:48.000000000 -0500
+***************
+*** 2197,2200 ****
+--- 2315,2319 ----
+      cmd->flags |= CMD_IGNORE_RETURN;
+  
++ #if defined (JOB_CONTROL)
+    lastpipe_flag = 0;
+    begin_unwind_frame ("lastpipe-exec");
+***************
+*** 2216,2228 ****
+         add_unwind_protect (lastpipe_cleanup, lastpipe_jid);
+       }
+!       cmd->flags |= CMD_LASTPIPE;
+      }          
+    if (prev >= 0)
+      add_unwind_protect (close, prev);
+  
+    exec_result = execute_command_internal (cmd, asynchronous, prev, pipe_out, 
fds_to_close);
+  
+    if (lstdin > 0)
+      restore_stdin (lstdin);
+  
+    if (prev >= 0)
+--- 2335,2351 ----
+         add_unwind_protect (lastpipe_cleanup, lastpipe_jid);
+       }
+!       if (cmd)
+!      cmd->flags |= CMD_LASTPIPE;
+      }          
+    if (prev >= 0)
+      add_unwind_protect (close, prev);
++ #endif
+  
+    exec_result = execute_command_internal (cmd, asynchronous, prev, pipe_out, 
fds_to_close);
+  
++ #if defined (JOB_CONTROL)
+    if (lstdin > 0)
+      restore_stdin (lstdin);
++ #endif
+  
+    if (prev >= 0)
+*** ../bash-4.2-patched/patchlevel.h   Sat Jun 12 20:14:48 2010
+--- patchlevel.h       Thu Feb 24 21:41:34 2011
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 17
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 18
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash42-019 
new/bash-4.2-patches/bash42-019
--- old/bash-4.2-patches/bash42-019     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-4.2-patches/bash42-019     2011-11-22 00:01:18.000000000 +0100
@@ -0,0 +1,47 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  4.2
+Patch-ID:      bash42-019
+
+Bug-Reported-by:       Diego Augusto Molina <[email protected]>
+Bug-Reference-ID:      
<cagoxldhcsqu3ck9qy3prjj_nbu5tapsavnm-95-nlq9szwb...@mail.gmail.com>
+Bug-Reference-URL:     
lists.gnu.org/archive/html/bug-bash/2011-09/msg00047.html
+
+Bug-Description:
+
+Using `declare' with attributes and an invalid array variable name or
+assignment reference resulted in a segmentation fault instead of a
+declaration error.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-4.2-patched/builtins/declare.def   2010-05-30 18:25:21.000000000 
-0400
+--- builtins/declare.def       2011-09-15 15:20:20.000000000 -0400
+***************
+*** 514,517 ****
+--- 514,522 ----
+             var = assign_array_element (name, value, 0);      /* XXX - not 
aflags */
+             *subscript_start = '\0';
++            if (var == 0)     /* some kind of assignment error */
++              {
++                assign_error++;
++                NEXT_VARIABLE ();
++              }
+           }
+         else if (simple_array_assign)
+*** ../bash-4.2-patched/patchlevel.h   Sat Jun 12 20:14:48 2010
+--- patchlevel.h       Thu Feb 24 21:41:34 2011
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 18
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 19
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-4.2-patches/bash42-020 
new/bash-4.2-patches/bash42-020
--- old/bash-4.2-patches/bash42-020     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-4.2-patches/bash42-020     2011-11-22 00:01:31.000000000 +0100
@@ -0,0 +1,60 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  4.2
+Patch-ID:      bash42-020
+
+Bug-Reported-by:       Vincent Sheffer <[email protected]>
+Bug-Reference-ID:      <[email protected]>
+Bug-Reference-URL:     
https://lists.gnu.org/archive/html/bug-readline/2011-08/msg00000.html
+
+Bug-Description:
+
+The shared object helper script needs to be updated for Mac OS X 10.7
+(Lion, darwin11).
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-4.2-patched/support/shobj-conf     2009-10-28 09:20:21.000000000 
-0400
+--- support/shobj-conf 2011-08-27 13:25:23.000000000 -0400
+***************
+*** 158,162 ****
+  
+  # Darwin/MacOS X
+! darwin[89]*|darwin10*)
+       SHOBJ_STATUS=supported
+       SHLIB_STATUS=supported
+--- 172,176 ----
+  
+  # Darwin/MacOS X
+! darwin[89]*|darwin1[012]*)
+       SHOBJ_STATUS=supported
+       SHLIB_STATUS=supported
+***************
+*** 187,191 ****
+  
+       case "${host_os}" in
+!      darwin[789]*|darwin10*) SHOBJ_LDFLAGS=''
+                       SHLIB_XLDFLAGS='-dynamiclib -arch_only `/usr/bin/arch` 
-install_name $(libdir)/$@ -current_version $(SHLIB_MAJOR)$(SHLIB_MINOR) 
-compatibility_version $(SHLIB_MAJOR) -v'
+                       ;;
+--- 201,205 ----
+  
+       case "${host_os}" in
+!      darwin[789]*|darwin1[012]*)     SHOBJ_LDFLAGS=''
+                       SHLIB_XLDFLAGS='-dynamiclib -arch_only `/usr/bin/arch` 
-install_name $(libdir)/$@ -current_version $(SHLIB_MAJOR)$(SHLIB_MINOR) 
-compatibility_version $(SHLIB_MAJOR) -v'
+                       ;;
+*** ../bash-4.2-patched/patchlevel.h   Sat Jun 12 20:14:48 2010
+--- patchlevel.h       Thu Feb 24 21:41:34 2011
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 19
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 20
+  
+  #endif /* _PATCHLEVEL_H_ */

++++++ bash-4.2.dif ++++++
--- /var/tmp/diff_new_pack.pwDRYE/_old  2011-11-28 12:53:07.000000000 +0100
+++ /var/tmp/diff_new_pack.pwDRYE/_new  2011-11-28 12:53:07.000000000 +0100
@@ -104,6 +104,15 @@
  int current_readline_line_index = 0;
  
  static int
+@@ -5983,6 +5983,8 @@ save_input_line_state (ls)
+   /* force reallocation */
+   shell_input_line = 0;
+   shell_input_line_size = shell_input_line_len = shell_input_line_index = 0;
++
++  return ls;
+ }
+ 
+ void
 --- shell.c
 +++ shell.c    2006-03-27 12:15:25.000000000 +0000
 @@ -479,7 +479,7 @@ main (argc, argv, env)
@@ -173,6 +182,16 @@
  .PD
  .SH AUTHORS
  Brian Fox, Free Software Foundation
+--- support/man2html.c
++++ support/man2html.c 2011-11-25 17:07:28.895646776 +0000
+@@ -77,6 +77,7 @@
+ #include <time.h>
+ #include <sys/time.h>
+ #include <errno.h>
++#include <unistd.h>
+ 
+ #define NULL_TERMINATED(n) ((n) + 1)
+ 
 --- support/printenv.c
 +++ support/printenv.c 2007-12-06 15:33:46.899561365 +0000
 @@ -27,6 +27,7 @@

++++++ readline-6.2-patches.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/readline-6.2-patches/readline62-002 
new/readline-6.2-patches/readline62-002
--- old/readline-6.2-patches/readline62-002     1970-01-01 01:00:00.000000000 
+0100
+++ new/readline-6.2-patches/readline62-002     2011-11-23 02:05:37.000000000 
+0100
@@ -0,0 +1,57 @@
+                          READLINE PATCH REPORT
+                          =====================
+
+Readline-Release: 6.2
+Patch-ID: readline62-002
+
+Bug-Reported-by:       Vincent Sheffer <[email protected]>
+Bug-Reference-ID:      <[email protected]>
+Bug-Reference-URL:     
https://lists.gnu.org/archive/html/bug-readline/2011-08/msg00000.html
+
+Bug-Description:
+
+The readline shared library helper script needs to be updated for Mac OS X
+10.7 (Lion, darwin11).
+
+Patch (apply with `patch -p0'):
+
+*** ../readline-6.2-patched/support/shobj-conf 2009-10-28 09:20:21.000000000 
-0400
+--- support/shobj-conf 2011-08-27 13:25:23.000000000 -0400
+***************
+*** 158,162 ****
+  
+  # Darwin/MacOS X
+! darwin[89]*|darwin10*)
+       SHOBJ_STATUS=supported
+       SHLIB_STATUS=supported
+--- 172,176 ----
+  
+  # Darwin/MacOS X
+! darwin[89]*|darwin1[012]*)
+       SHOBJ_STATUS=supported
+       SHLIB_STATUS=supported
+***************
+*** 187,191 ****
+  
+       case "${host_os}" in
+!      darwin[789]*|darwin10*) SHOBJ_LDFLAGS=''
+                       SHLIB_XLDFLAGS='-dynamiclib -arch_only `/usr/bin/arch` 
-install_name $(libdir)/$@ -current_version $(SHLIB_MAJOR)$(SHLIB_MINOR) 
-compatibility_version $(SHLIB_MAJOR) -v'
+                       ;;
+--- 201,205 ----
+  
+       case "${host_os}" in
+!      darwin[789]*|darwin1[012]*)     SHOBJ_LDFLAGS=''
+                       SHLIB_XLDFLAGS='-dynamiclib -arch_only `/usr/bin/arch` 
-install_name $(libdir)/$@ -current_version $(SHLIB_MAJOR)$(SHLIB_MINOR) 
-compatibility_version $(SHLIB_MAJOR) -v'
+                       ;;
+
+*** ../readline-6.2-patched/patchlevel 2010-01-14 10:15:52.000000000 -0500
+--- patchlevel 2011-11-17 11:09:35.000000000 -0500
+***************
+*** 1,3 ****
+  # Do not edit -- exists only for use by patch
+  
+! 1
+--- 1,3 ----
+  # Do not edit -- exists only for use by patch
+  
+! 2

-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to