diff options
Diffstat (limited to 'debian/patches/bash51-014.diff')
-rw-r--r-- | debian/patches/bash51-014.diff | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/debian/patches/bash51-014.diff b/debian/patches/bash51-014.diff new file mode 100644 index 0000000..47dfe35 --- /dev/null +++ b/debian/patches/bash51-014.diff @@ -0,0 +1,26 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 5.1 +Patch-ID: bash51-014 + +Bug-Reported-by: platon7pronko@gmail.com +Bug-Reference-ID: +Bug-Reference-URL: https://savannah.gnu.org/patch/?10035 + +Bug-Description: + +Bash may produce corrupted input if a multibyte character spans a 512-byte +boundary while reading the output of a command substitution. + +--- a/subst.c ++++ b/subst.c +@@ -6242,7 +6242,7 @@ read_comsub (fd, quoted, flags, rflag) + /* read a multibyte character from buf */ + /* punt on the hard case for now */ + memset (&ps, '\0', sizeof (mbstate_t)); +- mblen = mbrtowc (&wc, bufp-1, bufn+1, &ps); ++ mblen = mbrtowc (&wc, bufp-1, bufn, &ps); + if (MB_INVALIDCH (mblen) || mblen == 0 || mblen == 1) + istring[istring_index++] = c; + else |