Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package bash for openSUSE:Factory checked in 
at 2021-05-11 23:03:26
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/bash (Old)
 and      /work/SRC/openSUSE:Factory/.bash.new.2988 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "bash"

Tue May 11 23:03:26 2021 rev:169 rq:890765 version:5.1.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/bash/bash.changes        2021-01-20 
18:22:56.723286543 +0100
+++ /work/SRC/openSUSE:Factory/.bash.new.2988/bash.changes      2021-05-11 
23:03:27.073151775 +0200
@@ -1,0 +2,14 @@
+Wed May  5 14:59:54 UTC 2021 - Dr. Werner Fink <wer...@suse.de>
+
+- Add official patch bash51-005
+  * Fix two memory leaks when assigning arrays using compound assignment 
syntax.
+- Add official patch bash51-006
+  * Make sure child processes forked to run command substitutions are in the
+    proper process group.
+- Add official patch bash51-007
+  * The code to check readline versions in an inputrc file had the sense of the
+    comparisons reversed. 
+- Add official patch bash51-008
+  * Process substitution FIFOs opened by child processes as targets of 
redirections
+    were not removed appropriately, leaving remnants in the file system.
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ bash.spec ++++++
--- /var/tmp/diff_new_pack.HW9ssC/_old  2021-05-11 23:03:27.933147851 +0200
+++ /var/tmp/diff_new_pack.HW9ssC/_new  2021-05-11 23:03:27.937147833 +0200
@@ -86,7 +86,7 @@
 BuildRequires:  sed
 BuildRequires:  update-alternatives
 Requires(post): update-alternatives
-Requires(preun): update-alternatives
+Requires(preun):update-alternatives
 Provides:       /bin/bash
 Provides:       /bin/sh
 %global         _sysconfdir /etc

++++++ bash-5.1-patches.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-5.1-patches/bash51-001 
new/bash-5.1-patches/bash51-001
--- old/bash-5.1-patches/bash51-001     2020-12-19 20:19:39.000000000 +0100
+++ new/bash-5.1-patches/bash51-001     2021-01-11 13:15:29.627736386 +0100
@@ -15,7 +15,7 @@
 
 Patch (apply with `patch -p0'):
 
-*** ../bash-5.1-patched/Makefile.in    2020-12-04 09:51:19.000000000 -0500
+*** Makefile.in        2020-12-04 09:51:19.000000000 -0500
 --- Makefile.in        2020-12-16 11:28:36.000000000 -0500
 ***************
 *** 1316,1319 ****
@@ -34,7 +34,7 @@
   builtins/getopt.o: config.h ${BASHINCDIR}/memalloc.h
   builtins/getopt.o: shell.h syntax.h bashjmp.h command.h general.h xmalloc.h 
error.h
 
-*** ../bash-5.1-patched/builtins/Makefile.in   2019-07-25 08:03:45.000000000 
-0400
+*** builtins/Makefile.in       2019-07-25 08:03:45.000000000 -0400
 --- builtins/Makefile.in       2020-12-16 11:29:29.000000000 -0500
 ***************
 *** 362,366 ****
@@ -50,7 +50,7 @@
   #evalstring.o: $(topdir)/y.tab.h
   getopt.o: ../config.h $(BASHINCDIR)/memalloc.h
 
-*** ../bash-5.1/patchlevel.h   2020-06-22 14:51:03.000000000 -0400
+*** patchlevel.h       2020-06-22 14:51:03.000000000 -0400
 --- patchlevel.h       2020-10-01 11:01:28.000000000 -0400
 ***************
 *** 1,5 ****
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-5.1-patches/bash51-002 
new/bash-5.1-patches/bash51-002
--- old/bash-5.1-patches/bash51-002     2020-12-19 20:19:48.000000000 +0100
+++ new/bash-5.1-patches/bash51-002     2021-01-11 13:15:29.687735229 +0100
@@ -16,7 +16,7 @@
 
 Patch (apply with `patch -p0'):
 
-*** ../bash-5.1-patched/builtins/wait.def      2020-04-09 15:13:57.000000000 
-0400
+*** builtins/wait.def  2020-04-09 15:13:57.000000000 -0400
 --- builtins/wait.def  2020-12-11 09:46:49.000000000 -0500
 ***************
 *** 214,222 ****
@@ -40,7 +40,7 @@
         if (list)
        unset_waitlist ();
 
-*** ../bash-5.1/patchlevel.h   2020-06-22 14:51:03.000000000 -0400
+*** patchlevel.h       2020-06-22 14:51:03.000000000 -0400
 --- patchlevel.h       2020-10-01 11:01:28.000000000 -0400
 ***************
 *** 26,30 ****
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-5.1-patches/bash51-003 
new/bash-5.1-patches/bash51-003
--- old/bash-5.1-patches/bash51-003     2020-12-19 20:20:01.000000000 +0100
+++ new/bash-5.1-patches/bash51-003     2021-01-11 13:15:29.699734997 +0100
@@ -16,7 +16,7 @@
 
 Patch (apply with `patch -p0'):
 
-*** ../bash-5.1-patched/subst.c        2020-11-16 10:33:15.000000000 -0500
+*** subst.c    2020-11-16 10:33:15.000000000 -0500
 --- subst.c    2020-12-12 13:50:11.000000000 -0500
 ***************
 *** 6357,6362 ****
@@ -36,7 +36,7 @@
       pipeline_pgrp = shell_pgrp;
     cleanup_the_pipeline ();
 
-*** ../bash-5.1/patchlevel.h   2020-06-22 14:51:03.000000000 -0400
+*** patchlevel.h       2020-06-22 14:51:03.000000000 -0400
 --- patchlevel.h       2020-10-01 11:01:28.000000000 -0400
 ***************
 *** 26,30 ****
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-5.1-patches/bash51-004 
new/bash-5.1-patches/bash51-004
--- old/bash-5.1-patches/bash51-004     2020-12-19 20:20:12.000000000 +0100
+++ new/bash-5.1-patches/bash51-004     2021-01-11 13:15:29.711734766 +0100
@@ -19,7 +19,7 @@
 
 Patch (apply with `patch -p0'):
 
-*** ../bash-5.1-patched/arrayfunc.c    2020-10-09 11:38:58.000000000 -0400
+*** arrayfunc.c        2020-10-09 11:38:58.000000000 -0400
 --- arrayfunc.c        2020-12-11 15:12:22.000000000 -0500
 ***************
 *** 598,601 ****
@@ -62,7 +62,7 @@
 !   if (assoc_p (var) && kvpair_assignment_p (nlist))
       {
         iflags = flags & ~ASS_APPEND;
-*** ../bash-5.1-patched/arrayfunc.h    2020-04-29 17:24:15.000000000 -0400
+*** arrayfunc.h        2020-04-29 17:24:15.000000000 -0400
 --- arrayfunc.h        2020-12-11 14:23:50.000000000 -0500
 ***************
 *** 68,71 ****
@@ -74,7 +74,7 @@
 + 
   extern int unbind_array_element PARAMS((SHELL_VAR *, char *, int));
   extern int skipsubscript PARAMS((const char *, int, int));
-*** ../bash-5.1-patched/subst.c        2020-11-16 10:33:15.000000000 -0500
+*** subst.c    2020-11-16 10:33:15.000000000 -0500
 --- subst.c    2020-12-11 15:11:10.000000000 -0500
 ***************
 *** 11605,11608 ****
@@ -109,7 +109,7 @@
          if ((nl->word->flags & W_ASSIGNMENT) == 0)
            t = sh_single_quote (nl->word->word ? nl->word->word : "");
 
-*** ../bash-5.1/patchlevel.h   2020-06-22 14:51:03.000000000 -0400
+*** patchlevel.h       2020-06-22 14:51:03.000000000 -0400
 --- patchlevel.h       2020-10-01 11:01:28.000000000 -0400
 ***************
 *** 26,30 ****
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-5.1-patches/bash51-005 
new/bash-5.1-patches/bash51-005
--- old/bash-5.1-patches/bash51-005     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-5.1-patches/bash51-005     2021-05-04 17:47:16.000000000 +0200
@@ -0,0 +1,100 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  5.1
+Patch-ID:      bash51-005
+
+Bug-Reported-by:       Alexander Mescheryakov <alexander....@gmail.com>,
+                       konsolebox <konsole...@gmail.com>   
+Bug-Reference-ID:      <5ffd7f3d.1c69fb81.dee25.1...@mx.google.com>,
+                       
<cajnmqwavs7m6nbqzzchy5c2+yhkteg7p+o8zwua7sn+6n1q...@mail.gmail.com>
+Bug-Reference-URL:     
https://lists.gnu.org/archive/html/bug-bash/2021-01/msg00082.html,
+                       
https://lists.gnu.org/archive/html/bug-bash/2021-04/msg00160.html
+
+Bug-Description:
+
+Fix two memory leaks when assigning arrays using compound assignment syntax.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-5.1-patched/subst.c        2020-12-16 17:01:32.000000000 -0500
+--- subst.c    2021-01-24 17:48:40.000000000 -0500
+***************
+*** 11674,11677 ****
+--- 11674,11679 ----
+  
+    value = string_list (l);
++   dispose_words (l);
++ 
+    wlen = STRLEN (value);
+  
+*** ../bash-5.1-patched/arrayfunc.c    2020-12-16 17:01:32.000000000 -0500
+--- arrayfunc.c        2021-04-19 16:43:09.000000000 -0400
+***************
+*** 565,574 ****
+    WORD_LIST *list;
+    char *akey, *aval, *k, *v;
+-   int free_aval;
+  
+    for (list = nlist; list; list = list->next)
+      {
+-       free_aval = 0;
+- 
+        k = list->word->word;
+        v = list->next ? list->next->word->word : 0;
+--- 565,571 ----
+***************
+*** 578,583 ****
+  
+        akey = expand_assignment_string_to_string (k, 0);
+-       aval = expand_assignment_string_to_string (v, 0);
+- 
+        if (akey == 0 || *akey == 0)
+       {
+--- 575,578 ----
+***************
+*** 586,599 ****
+         continue;
+       }             
+        if (aval == 0)
+       {
+         aval = (char *)xmalloc (1);
+         aval[0] = '\0';       /* like do_assignment_internal */
+-        free_aval = 1;
+       }
+  
+        bind_assoc_var_internal (var, h, akey, aval, flags);
+!       if (free_aval)
+!      free (aval);
+      }
+  }
+--- 581,594 ----
+         continue;
+       }             
++ 
++       aval = expand_assignment_string_to_string (v, 0);
+        if (aval == 0)
+       {
+         aval = (char *)xmalloc (1);
+         aval[0] = '\0';       /* like do_assignment_internal */
+       }
+  
+        bind_assoc_var_internal (var, h, akey, aval, flags);
+!       free (aval);
+      }
+  }
+*** ../bash-5.1/patchlevel.h   2020-06-22 14:51:03.000000000 -0400
+--- patchlevel.h       2020-10-01 11:01:28.000000000 -0400
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 4
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 5
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-5.1-patches/bash51-006 
new/bash-5.1-patches/bash51-006
--- old/bash-5.1-patches/bash51-006     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-5.1-patches/bash51-006     2021-05-04 17:47:16.000000000 +0200
@@ -0,0 +1,48 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  5.1
+Patch-ID:      bash51-006
+
+Bug-Reported-by:       oguzismailuy...@gmail.com
+Bug-Reference-ID:      
<cah7i3loy7c+pv_yg2lxwpntaw3kirkxmb4kcl1dtsih0u2b...@mail.gmail.com>
+Bug-Reference-URL:     
https://lists.gnu.org/archive/html/bug-bash/2020-12/msg00108.html
+
+Bug-Description:
+
+Make sure child processes forked to run command substitutions are in the
+proper process group.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-5.1-patched/subst.c        2020-12-16 17:01:32.000000000 -0500
+--- subst.c    2020-12-25 19:20:25.000000000 -0500
+***************
+*** 6413,6416 ****
+--- 6413,6423 ----
+        interactive = 0;
+  
++ #if defined (JOB_CONTROL)
++       /* Invariant: in child processes started to run command substitutions,
++       pipeline_pgrp == shell_pgrp. Other parts of the shell assume this. */
++       if (pipeline_pgrp > 0 && pipeline_pgrp != shell_pgrp)
++      shell_pgrp = pipeline_pgrp;
++ #endif
++ 
+        set_sigint_handler (); /* XXX */
+  
+*** ../bash-5.1/patchlevel.h   2020-06-22 14:51:03.000000000 -0400
+--- patchlevel.h       2020-10-01 11:01:28.000000000 -0400
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 5
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 6
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-5.1-patches/bash51-007 
new/bash-5.1-patches/bash51-007
--- old/bash-5.1-patches/bash51-007     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-5.1-patches/bash51-007     2021-05-04 17:47:16.000000000 +0200
@@ -0,0 +1,95 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  5.1
+Patch-ID:      bash51-007
+
+Bug-Reported-by:       Tom Tromey <t...@tromey.com>
+Bug-Reference-ID:      <875z3u9fd0....@tromey.com>
+Bug-Reference-URL:     
https://lists.gnu.org/archive/html/bug-readline/2021-01/msg00009.html
+
+Bug-Description:
+
+The code to check readline versions in an inputrc file had the sense of the
+comparisons reversed.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-5.1-patched/lib/readline/bind.c    2020-10-26 10:03:14.000000000 
-0400
+--- lib/readline/bind.c        2021-01-18 16:38:48.000000000 -0500
+***************
+*** 1235,1239 ****
+    else if (_rl_strnicmp (args, "version", 7) == 0)
+      {
+!       int rlversion, versionarg, op, previ, major, minor;
+  
+        _rl_parsing_conditionalized_out = 1;
+--- 1235,1239 ----
+    else if (_rl_strnicmp (args, "version", 7) == 0)
+      {
+!       int rlversion, versionarg, op, previ, major, minor, opresult;
+  
+        _rl_parsing_conditionalized_out = 1;
+***************
+*** 1295,1316 ****
+       {
+       case OP_EQ:
+!        _rl_parsing_conditionalized_out = rlversion == versionarg;
+         break;
+       case OP_NE:
+!        _rl_parsing_conditionalized_out = rlversion != versionarg;
+         break;
+       case OP_GT:
+!        _rl_parsing_conditionalized_out = rlversion > versionarg;
+         break;
+       case OP_GE:
+!        _rl_parsing_conditionalized_out = rlversion >= versionarg;
+         break;
+       case OP_LT:
+!        _rl_parsing_conditionalized_out = rlversion < versionarg;
+         break;
+       case OP_LE:
+!        _rl_parsing_conditionalized_out = rlversion <= versionarg;
+         break;
+       }
+      }
+    /* Check to see if the first word in ARGS is the same as the
+--- 1295,1317 ----
+       {
+       case OP_EQ:
+!        opresult = rlversion == versionarg;
+         break;
+       case OP_NE:
+!        opresult = rlversion != versionarg;
+         break;
+       case OP_GT:
+!        opresult = rlversion > versionarg;
+         break;
+       case OP_GE:
+!        opresult = rlversion >= versionarg;
+         break;
+       case OP_LT:
+!        opresult = rlversion < versionarg;
+         break;
+       case OP_LE:
+!        opresult = rlversion <= versionarg;
+         break;
+       }
++       _rl_parsing_conditionalized_out = 1 - opresult;
+      }
+    /* Check to see if the first word in ARGS is the same as the
+*** ../bash-5.1/patchlevel.h   2020-06-22 14:51:03.000000000 -0400
+--- patchlevel.h       2020-10-01 11:01:28.000000000 -0400
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 6
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 7
+  
+  #endif /* _PATCHLEVEL_H_ */
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/bash-5.1-patches/bash51-008 
new/bash-5.1-patches/bash51-008
--- old/bash-5.1-patches/bash51-008     1970-01-01 01:00:00.000000000 +0100
+++ new/bash-5.1-patches/bash51-008     2021-05-04 17:47:16.000000000 +0200
@@ -0,0 +1,61 @@
+                            BASH PATCH REPORT
+                            =================
+
+Bash-Release:  5.1
+Patch-ID:      bash51-008
+
+Bug-Reported-by:       Michael Felt <aixto...@gmail.com>
+Bug-Reference-ID:      <b82d9a2f-5d8a-ffb2-4115-420c09272...@felt.demon.nl>
+Bug-Reference-URL:     
https://lists.gnu.org/archive/html/bug-bash/2021-03/msg00028.html
+
+Bug-Description:
+
+Process substitution FIFOs opened by child processes as targets of redirections
+were not removed appropriately, leaving remnants in the file system.
+
+Patch (apply with `patch -p0'):
+
+*** ../bash-5.1-patched/execute_cmd.c  2020-10-12 10:16:13.000000000 -0400
+--- execute_cmd.c      2021-05-04 11:12:39.000000000 -0400
+***************
+*** 5557,5565 ****
+         /* Try to remove named pipes that may have been created as the
+            result of redirections. */
+!        unlink_fifo_list ();
+  #endif /* PROCESS_SUBSTITUTION */
+         exit (EXECUTION_FAILURE);
+       }
+  
+        if (async)
+       interactive = old_interactive;
+--- 5557,5571 ----
+         /* Try to remove named pipes that may have been created as the
+            result of redirections. */
+!        unlink_all_fifos ();
+  #endif /* PROCESS_SUBSTITUTION */
+         exit (EXECUTION_FAILURE);
+       }
+  
++ #if defined (PROCESS_SUBSTITUTION) && !defined (HAVE_DEV_FD)
++       /* This should only contain FIFOs created as part of redirection
++       expansion. */
++       unlink_all_fifos ();
++ #endif
++ 
+        if (async)
+       interactive = old_interactive;
+*** ../bash-5.1/patchlevel.h   2020-06-22 14:51:03.000000000 -0400
+--- patchlevel.h       2020-10-01 11:01:28.000000000 -0400
+***************
+*** 26,30 ****
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 7
+  
+  #endif /* _PATCHLEVEL_H_ */
+--- 26,30 ----
+     looks for to find the patch level (for the sccs version string). */
+  
+! #define PATCHLEVEL 8
+  
+  #endif /* _PATCHLEVEL_H_ */

Reply via email to