ShellShock where my browser window randomly re-encodes with what looks like Chinese

2015-07-06 Thread S. Irelan
Spam detection software, running on the system desolation.proulx.com, has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see the administrator of that

Re: Source Code Bug in Bash-4.3.31 Module variables.c

2015-07-06 Thread Chet Ramey
On 7/4/15 1:51 PM, John E. Malmberg wrote: Any resolution for this issue? In arrayfunc.h: extern arrayind_t array_expand_index __P((SHELL_VAR *, char *, int)); SHELL_VAR is a struct declared in variables.h. So passing it const char * should be causing problems. I will fix it in the

Re: ShellShock where my browser window randomly re-encodes with what looks like Chinese

2015-07-06 Thread Bob Proulx
S. Irelan wrote: I have vested so very many hours and attempts and well, can't get out from under what I understand is the Shellshock /bash hacking browser attacking NIGHTMARE !!! Your report does not indicate any similarities to the well known Shellshock bug.

Please pardon the incorrectly handled anti-spam

2015-07-06 Thread Bob Proulx
Please pardon the incorrectly handled anti-spam message re-send seen today. One of the listhelper volunteers had a problem vivifying an incorrectly classified false-positive-as-spam message. Accidents happen. Your patience and tolerance is appreciated. Bob

Another out of bounds heap read in bash completion

2015-07-06 Thread Hanno Böck
Hi, With Address Sanitizer I discovered another out of bounds read issue in bash. This is different from the issue I recently reported here and for which Chet already provided a patch: https://lists.gnu.org/archive/html/bug-bash/2015-06/msg00089.html To reproduce: a) compile bash with