bash: update to patchlevel 025 and apply 2nd patch for CVE-2014-6271.
See http://seclists.org/oss-sec/2014/q3/690
This commit is contained in:
parent
35870216f4
commit
2dd9420b25
4 changed files with 41 additions and 101 deletions
13
srcpkgs/bash/patches/eol-pushback.patch
Normal file
13
srcpkgs/bash/patches/eol-pushback.patch
Normal file
|
@ -0,0 +1,13 @@
|
|||
CVE-2014-6271: remote code execution through bash (2/2)
|
||||
|
||||
*** parse.y 2014-08-26 15:09:42.000000000 -0400
|
||||
--- parse.y 2014-09-24 22:47:28.000000000 -0400
|
||||
***************
|
||||
*** 2959,2962 ****
|
||||
--- 2959,2964 ----
|
||||
word_desc_to_read = (WORD_DESC *)NULL;
|
||||
|
||||
+ eol_ungetc_lookahead = 0;
|
||||
+
|
||||
current_token = '\n'; /* XXX */
|
||||
last_read_token = '\n';
|
Loading…
Add table
Add a link
Reference in a new issue