Blame SOURCES/bash42-021

ff19ae
			     BASH PATCH REPORT
ff19ae
			     =================
ff19ae
ff19ae
Bash-Release:	4.2
ff19ae
Patch-ID:	bash42-021
ff19ae
ff19ae
Bug-Reported-by:	Dan Douglas <ormaaj@gmail.com>
ff19ae
Bug-Reference-ID:	<4585554.nZWb4q7YoZ@smorgbox>
ff19ae
Bug-Reference-URL:	http://lists.gnu.org/archive/html/bug-bash/2011-12/msg00084.html
ff19ae
ff19ae
Bug-Description:
ff19ae
ff19ae
Using `read -N' to assign values to an array can result in NUL values being
ff19ae
assigned to some array elements.  These values cause seg faults when referenced
ff19ae
later.
ff19ae
ff19ae
Patch (apply with `patch -p0'):
ff19ae
ff19ae
*** ../bash-4.2-patched/builtins/read.def	2011-11-21 18:03:38.000000000 -0500
ff19ae
--- builtins/read.def	2011-12-19 19:52:12.000000000 -0500
ff19ae
***************
ff19ae
*** 738,742 ****
ff19ae
  	    }
ff19ae
  	  else
ff19ae
! 	    var = bind_read_variable (varname, t);
ff19ae
  	}
ff19ae
        else
ff19ae
--- 775,779 ----
ff19ae
  	    }
ff19ae
  	  else
ff19ae
! 	    var = bind_read_variable (varname, t ? t : "");
ff19ae
  	}
ff19ae
        else
ff19ae
***************
ff19ae
*** 799,803 ****
ff19ae
      }
ff19ae
    else
ff19ae
!     var = bind_read_variable (list->word->word, input_string);
ff19ae
  
ff19ae
    if (var)
ff19ae
--- 836,840 ----
ff19ae
      }
ff19ae
    else
ff19ae
!     var = bind_read_variable (list->word->word, input_string ? input_string : "");
ff19ae
  
ff19ae
    if (var)
ff19ae
*** ../bash-4.2-patched/patchlevel.h	Sat Jun 12 20:14:48 2010
ff19ae
--- patchlevel.h	Thu Feb 24 21:41:34 2011
ff19ae
***************
ff19ae
*** 26,30 ****
ff19ae
     looks for to find the patch level (for the sccs version string). */
ff19ae
  
ff19ae
! #define PATCHLEVEL 20
ff19ae
  
ff19ae
  #endif /* _PATCHLEVEL_H_ */
ff19ae
--- 26,30 ----
ff19ae
     looks for to find the patch level (for the sccs version string). */
ff19ae
  
ff19ae
! #define PATCHLEVEL 21
ff19ae
  
ff19ae
  #endif /* _PATCHLEVEL_H_ */