Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package bash for openSUSE:Factory checked in at 2021-05-11 23:03:26 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/bash (Old) and /work/SRC/openSUSE:Factory/.bash.new.2988 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "bash" Tue May 11 23:03:26 2021 rev:169 rq:890765 version:5.1.4 Changes: -------- --- /work/SRC/openSUSE:Factory/bash/bash.changes 2021-01-20 18:22:56.723286543 +0100 +++ /work/SRC/openSUSE:Factory/.bash.new.2988/bash.changes 2021-05-11 23:03:27.073151775 +0200 @@ -1,0 +2,14 @@ +Wed May 5 14:59:54 UTC 2021 - Dr. Werner Fink <wer...@suse.de> + +- Add official patch bash51-005 + * Fix two memory leaks when assigning arrays using compound assignment syntax. +- Add official patch bash51-006 + * Make sure child processes forked to run command substitutions are in the + proper process group. +- Add official patch bash51-007 + * The code to check readline versions in an inputrc file had the sense of the + comparisons reversed. +- Add official patch bash51-008 + * Process substitution FIFOs opened by child processes as targets of redirections + were not removed appropriately, leaving remnants in the file system. +------------------------------------------------------------------- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ bash.spec ++++++ --- /var/tmp/diff_new_pack.HW9ssC/_old 2021-05-11 23:03:27.933147851 +0200 +++ /var/tmp/diff_new_pack.HW9ssC/_new 2021-05-11 23:03:27.937147833 +0200 @@ -86,7 +86,7 @@ BuildRequires: sed BuildRequires: update-alternatives Requires(post): update-alternatives -Requires(preun): update-alternatives +Requires(preun):update-alternatives Provides: /bin/bash Provides: /bin/sh %global _sysconfdir /etc ++++++ bash-5.1-patches.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/bash-5.1-patches/bash51-001 new/bash-5.1-patches/bash51-001 --- old/bash-5.1-patches/bash51-001 2020-12-19 20:19:39.000000000 +0100 +++ new/bash-5.1-patches/bash51-001 2021-01-11 13:15:29.627736386 +0100 @@ -15,7 +15,7 @@ Patch (apply with `patch -p0'): -*** ../bash-5.1-patched/Makefile.in 2020-12-04 09:51:19.000000000 -0500 +*** Makefile.in 2020-12-04 09:51:19.000000000 -0500 --- Makefile.in 2020-12-16 11:28:36.000000000 -0500 *************** *** 1316,1319 **** @@ -34,7 +34,7 @@ builtins/getopt.o: config.h ${BASHINCDIR}/memalloc.h builtins/getopt.o: shell.h syntax.h bashjmp.h command.h general.h xmalloc.h error.h -*** ../bash-5.1-patched/builtins/Makefile.in 2019-07-25 08:03:45.000000000 -0400 +*** builtins/Makefile.in 2019-07-25 08:03:45.000000000 -0400 --- builtins/Makefile.in 2020-12-16 11:29:29.000000000 -0500 *************** *** 362,366 **** @@ -50,7 +50,7 @@ #evalstring.o: $(topdir)/y.tab.h getopt.o: ../config.h $(BASHINCDIR)/memalloc.h -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 +*** patchlevel.h 2020-06-22 14:51:03.000000000 -0400 --- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 *************** *** 1,5 **** diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/bash-5.1-patches/bash51-002 new/bash-5.1-patches/bash51-002 --- old/bash-5.1-patches/bash51-002 2020-12-19 20:19:48.000000000 +0100 +++ new/bash-5.1-patches/bash51-002 2021-01-11 13:15:29.687735229 +0100 @@ -16,7 +16,7 @@ Patch (apply with `patch -p0'): -*** ../bash-5.1-patched/builtins/wait.def 2020-04-09 15:13:57.000000000 -0400 +*** builtins/wait.def 2020-04-09 15:13:57.000000000 -0400 --- builtins/wait.def 2020-12-11 09:46:49.000000000 -0500 *************** *** 214,222 **** @@ -40,7 +40,7 @@ if (list) unset_waitlist (); -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 +*** patchlevel.h 2020-06-22 14:51:03.000000000 -0400 --- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 *************** *** 26,30 **** diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/bash-5.1-patches/bash51-003 new/bash-5.1-patches/bash51-003 --- old/bash-5.1-patches/bash51-003 2020-12-19 20:20:01.000000000 +0100 +++ new/bash-5.1-patches/bash51-003 2021-01-11 13:15:29.699734997 +0100 @@ -16,7 +16,7 @@ Patch (apply with `patch -p0'): -*** ../bash-5.1-patched/subst.c 2020-11-16 10:33:15.000000000 -0500 +*** subst.c 2020-11-16 10:33:15.000000000 -0500 --- subst.c 2020-12-12 13:50:11.000000000 -0500 *************** *** 6357,6362 **** @@ -36,7 +36,7 @@ pipeline_pgrp = shell_pgrp; cleanup_the_pipeline (); -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 +*** patchlevel.h 2020-06-22 14:51:03.000000000 -0400 --- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 *************** *** 26,30 **** diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/bash-5.1-patches/bash51-004 new/bash-5.1-patches/bash51-004 --- old/bash-5.1-patches/bash51-004 2020-12-19 20:20:12.000000000 +0100 +++ new/bash-5.1-patches/bash51-004 2021-01-11 13:15:29.711734766 +0100 @@ -19,7 +19,7 @@ Patch (apply with `patch -p0'): -*** ../bash-5.1-patched/arrayfunc.c 2020-10-09 11:38:58.000000000 -0400 +*** arrayfunc.c 2020-10-09 11:38:58.000000000 -0400 --- arrayfunc.c 2020-12-11 15:12:22.000000000 -0500 *************** *** 598,601 **** @@ -62,7 +62,7 @@ ! if (assoc_p (var) && kvpair_assignment_p (nlist)) { iflags = flags & ~ASS_APPEND; -*** ../bash-5.1-patched/arrayfunc.h 2020-04-29 17:24:15.000000000 -0400 +*** arrayfunc.h 2020-04-29 17:24:15.000000000 -0400 --- arrayfunc.h 2020-12-11 14:23:50.000000000 -0500 *************** *** 68,71 **** @@ -74,7 +74,7 @@ + extern int unbind_array_element PARAMS((SHELL_VAR *, char *, int)); extern int skipsubscript PARAMS((const char *, int, int)); -*** ../bash-5.1-patched/subst.c 2020-11-16 10:33:15.000000000 -0500 +*** subst.c 2020-11-16 10:33:15.000000000 -0500 --- subst.c 2020-12-11 15:11:10.000000000 -0500 *************** *** 11605,11608 **** @@ -109,7 +109,7 @@ if ((nl->word->flags & W_ASSIGNMENT) == 0) t = sh_single_quote (nl->word->word ? nl->word->word : ""); -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 +*** patchlevel.h 2020-06-22 14:51:03.000000000 -0400 --- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 *************** *** 26,30 **** diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/bash-5.1-patches/bash51-005 new/bash-5.1-patches/bash51-005 --- old/bash-5.1-patches/bash51-005 1970-01-01 01:00:00.000000000 +0100 +++ new/bash-5.1-patches/bash51-005 2021-05-04 17:47:16.000000000 +0200 @@ -0,0 +1,100 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 5.1 +Patch-ID: bash51-005 + +Bug-Reported-by: Alexander Mescheryakov <alexander....@gmail.com>, + konsolebox <konsole...@gmail.com> +Bug-Reference-ID: <5ffd7f3d.1c69fb81.dee25.1...@mx.google.com>, + <cajnmqwavs7m6nbqzzchy5c2+yhkteg7p+o8zwua7sn+6n1q...@mail.gmail.com> +Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2021-01/msg00082.html, + https://lists.gnu.org/archive/html/bug-bash/2021-04/msg00160.html + +Bug-Description: + +Fix two memory leaks when assigning arrays using compound assignment syntax. + +Patch (apply with `patch -p0'): + +*** ../bash-5.1-patched/subst.c 2020-12-16 17:01:32.000000000 -0500 +--- subst.c 2021-01-24 17:48:40.000000000 -0500 +*************** +*** 11674,11677 **** +--- 11674,11679 ---- + + value = string_list (l); ++ dispose_words (l); ++ + wlen = STRLEN (value); + +*** ../bash-5.1-patched/arrayfunc.c 2020-12-16 17:01:32.000000000 -0500 +--- arrayfunc.c 2021-04-19 16:43:09.000000000 -0400 +*************** +*** 565,574 **** + WORD_LIST *list; + char *akey, *aval, *k, *v; +- int free_aval; + + for (list = nlist; list; list = list->next) + { +- free_aval = 0; +- + k = list->word->word; + v = list->next ? list->next->word->word : 0; +--- 565,571 ---- +*************** +*** 578,583 **** + + akey = expand_assignment_string_to_string (k, 0); +- aval = expand_assignment_string_to_string (v, 0); +- + if (akey == 0 || *akey == 0) + { +--- 575,578 ---- +*************** +*** 586,599 **** + continue; + } + if (aval == 0) + { + aval = (char *)xmalloc (1); + aval[0] = '\0'; /* like do_assignment_internal */ +- free_aval = 1; + } + + bind_assoc_var_internal (var, h, akey, aval, flags); +! if (free_aval) +! free (aval); + } + } +--- 581,594 ---- + continue; + } ++ ++ aval = expand_assignment_string_to_string (v, 0); + if (aval == 0) + { + aval = (char *)xmalloc (1); + aval[0] = '\0'; /* like do_assignment_internal */ + } + + bind_assoc_var_internal (var, h, akey, aval, flags); +! free (aval); + } + } +*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 4 + + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 5 + + #endif /* _PATCHLEVEL_H_ */ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/bash-5.1-patches/bash51-006 new/bash-5.1-patches/bash51-006 --- old/bash-5.1-patches/bash51-006 1970-01-01 01:00:00.000000000 +0100 +++ new/bash-5.1-patches/bash51-006 2021-05-04 17:47:16.000000000 +0200 @@ -0,0 +1,48 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 5.1 +Patch-ID: bash51-006 + +Bug-Reported-by: oguzismailuy...@gmail.com +Bug-Reference-ID: <cah7i3loy7c+pv_yg2lxwpntaw3kirkxmb4kcl1dtsih0u2b...@mail.gmail.com> +Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2020-12/msg00108.html + +Bug-Description: + +Make sure child processes forked to run command substitutions are in the +proper process group. + +Patch (apply with `patch -p0'): + +*** ../bash-5.1-patched/subst.c 2020-12-16 17:01:32.000000000 -0500 +--- subst.c 2020-12-25 19:20:25.000000000 -0500 +*************** +*** 6413,6416 **** +--- 6413,6423 ---- + interactive = 0; + ++ #if defined (JOB_CONTROL) ++ /* Invariant: in child processes started to run command substitutions, ++ pipeline_pgrp == shell_pgrp. Other parts of the shell assume this. */ ++ if (pipeline_pgrp > 0 && pipeline_pgrp != shell_pgrp) ++ shell_pgrp = pipeline_pgrp; ++ #endif ++ + set_sigint_handler (); /* XXX */ + +*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 5 + + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 6 + + #endif /* _PATCHLEVEL_H_ */ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/bash-5.1-patches/bash51-007 new/bash-5.1-patches/bash51-007 --- old/bash-5.1-patches/bash51-007 1970-01-01 01:00:00.000000000 +0100 +++ new/bash-5.1-patches/bash51-007 2021-05-04 17:47:16.000000000 +0200 @@ -0,0 +1,95 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 5.1 +Patch-ID: bash51-007 + +Bug-Reported-by: Tom Tromey <t...@tromey.com> +Bug-Reference-ID: <875z3u9fd0....@tromey.com> +Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-readline/2021-01/msg00009.html + +Bug-Description: + +The code to check readline versions in an inputrc file had the sense of the +comparisons reversed. + +Patch (apply with `patch -p0'): + +*** ../bash-5.1-patched/lib/readline/bind.c 2020-10-26 10:03:14.000000000 -0400 +--- lib/readline/bind.c 2021-01-18 16:38:48.000000000 -0500 +*************** +*** 1235,1239 **** + else if (_rl_strnicmp (args, "version", 7) == 0) + { +! int rlversion, versionarg, op, previ, major, minor; + + _rl_parsing_conditionalized_out = 1; +--- 1235,1239 ---- + else if (_rl_strnicmp (args, "version", 7) == 0) + { +! int rlversion, versionarg, op, previ, major, minor, opresult; + + _rl_parsing_conditionalized_out = 1; +*************** +*** 1295,1316 **** + { + case OP_EQ: +! _rl_parsing_conditionalized_out = rlversion == versionarg; + break; + case OP_NE: +! _rl_parsing_conditionalized_out = rlversion != versionarg; + break; + case OP_GT: +! _rl_parsing_conditionalized_out = rlversion > versionarg; + break; + case OP_GE: +! _rl_parsing_conditionalized_out = rlversion >= versionarg; + break; + case OP_LT: +! _rl_parsing_conditionalized_out = rlversion < versionarg; + break; + case OP_LE: +! _rl_parsing_conditionalized_out = rlversion <= versionarg; + break; + } + } + /* Check to see if the first word in ARGS is the same as the +--- 1295,1317 ---- + { + case OP_EQ: +! opresult = rlversion == versionarg; + break; + case OP_NE: +! opresult = rlversion != versionarg; + break; + case OP_GT: +! opresult = rlversion > versionarg; + break; + case OP_GE: +! opresult = rlversion >= versionarg; + break; + case OP_LT: +! opresult = rlversion < versionarg; + break; + case OP_LE: +! opresult = rlversion <= versionarg; + break; + } ++ _rl_parsing_conditionalized_out = 1 - opresult; + } + /* Check to see if the first word in ARGS is the same as the +*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 6 + + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 7 + + #endif /* _PATCHLEVEL_H_ */ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/bash-5.1-patches/bash51-008 new/bash-5.1-patches/bash51-008 --- old/bash-5.1-patches/bash51-008 1970-01-01 01:00:00.000000000 +0100 +++ new/bash-5.1-patches/bash51-008 2021-05-04 17:47:16.000000000 +0200 @@ -0,0 +1,61 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 5.1 +Patch-ID: bash51-008 + +Bug-Reported-by: Michael Felt <aixto...@gmail.com> +Bug-Reference-ID: <b82d9a2f-5d8a-ffb2-4115-420c09272...@felt.demon.nl> +Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2021-03/msg00028.html + +Bug-Description: + +Process substitution FIFOs opened by child processes as targets of redirections +were not removed appropriately, leaving remnants in the file system. + +Patch (apply with `patch -p0'): + +*** ../bash-5.1-patched/execute_cmd.c 2020-10-12 10:16:13.000000000 -0400 +--- execute_cmd.c 2021-05-04 11:12:39.000000000 -0400 +*************** +*** 5557,5565 **** + /* Try to remove named pipes that may have been created as the + result of redirections. */ +! unlink_fifo_list (); + #endif /* PROCESS_SUBSTITUTION */ + exit (EXECUTION_FAILURE); + } + + if (async) + interactive = old_interactive; +--- 5557,5571 ---- + /* Try to remove named pipes that may have been created as the + result of redirections. */ +! unlink_all_fifos (); + #endif /* PROCESS_SUBSTITUTION */ + exit (EXECUTION_FAILURE); + } + ++ #if defined (PROCESS_SUBSTITUTION) && !defined (HAVE_DEV_FD) ++ /* This should only contain FIFOs created as part of redirection ++ expansion. */ ++ unlink_all_fifos (); ++ #endif ++ + if (async) + interactive = old_interactive; +*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 7 + + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 8 + + #endif /* _PATCHLEVEL_H_ */