Spam detection software, running on the system desolation.proulx.com, has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email. If you have any questions, see
the administrator of that
On 7/4/15 1:51 PM, John E. Malmberg wrote:
Any resolution for this issue?
In arrayfunc.h:
extern arrayind_t array_expand_index __P((SHELL_VAR *, char *, int));
SHELL_VAR is a struct declared in variables.h.
So passing it const char * should be causing problems.
I will fix it in the
S. Irelan wrote:
I have vested so very many hours and attempts and well, can't get
out from under what I understand is the Shellshock /bash hacking
browser attacking NIGHTMARE !!!
Your report does not indicate any similarities to the well known
Shellshock bug.
Please pardon the incorrectly handled anti-spam message re-send seen
today. One of the listhelper volunteers had a problem vivifying an
incorrectly classified false-positive-as-spam message. Accidents
happen. Your patience and tolerance is appreciated.
Bob
Hi,
With Address Sanitizer I discovered another out of bounds read issue in
bash. This is different from the issue I recently reported here and
for which Chet already provided a patch:
https://lists.gnu.org/archive/html/bug-bash/2015-06/msg00089.html
To reproduce:
a) compile bash with