Re: possible bugs with colored-stats

2020-10-28 Thread Clark Wang
On Thu, Oct 29, 2020 at 4:11 AM Arnaud wrote: > > Description: > I have colored my prompt with colors, using PS1 and PS0. > > PS1 ends with a color definition, so the command entered is > colored. > PS0 resets the color so the output has the standard colors. > I

Re: possible bugs with colored-stats

2020-10-28 Thread Chet Ramey
On 10/28/20 4:10 PM, Arnaud wrote: > Bash Version: 5.0 > Patch Level: 17 > Release Status: release > > Description: > I have colored my prompt with colors, using PS1 and PS0. > > PS1 ends with a color definition, so the command entered is colored. > PS0 resets the color

possible bugs with colored-stats

2020-10-28 Thread Arnaud
Configuration Information [Automatically generated, do not change]: Machine: x86_64 OS: linux-gnu Compiler: gcc Compilation CFLAGS: -O2 -flto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS

Re: GNU Bash profile code execution vulnerability enquiry

2020-10-28 Thread Chet Ramey
On 10/28/20 1:11 PM, Rachel Alderman wrote: > Hi Bash Maintainers, > > I've been made aware of a GNU Bash profile code execution vulnerability > https://exchange.xforce.ibmcloud.com/vulnerabilities/173116 reported last > December (2019-12-16) > Description: GNU Bash could allow a remote

Re: GNU Bash profile code execution vulnerability enquiry

2020-10-28 Thread Eli Schwartz
On 10/28/20 1:11 PM, Rachel Alderman wrote: > Hi Bash Maintainers, > > I've been made aware of a GNU Bash profile code execution vulnerability > https://exchange.xforce.ibmcloud.com/vulnerabilities/173116 reported last > December (2019-12-16) > Description: GNU Bash could allow a remote

Re: GNU Bash profile code execution vulnerability enquiry

2020-10-28 Thread Greg Wooledge
On Wed, Oct 28, 2020 at 05:11:42PM +, Rachel Alderman wrote: > I've been made aware of a GNU Bash profile code execution vulnerability > https://exchange.xforce.ibmcloud.com/vulnerabilities/173116 reported last > December (2019-12-16) This URL doesn't work without Javascript, and with

GNU Bash profile code execution vulnerability enquiry

2020-10-28 Thread Rachel Alderman
Hi Bash Maintainers, I've been made aware of a GNU Bash profile code execution vulnerability https://exchange.xforce.ibmcloud.com/vulnerabilities/173116 reported last December (2019-12-16) Description: GNU Bash could allow a remote attacker to execute arbitrary code on the system, caused by

Re: New feature in bash 5.1/readline-8.1 rc1 breaks python-pexpect

2020-10-28 Thread Chet Ramey
On 10/28/20 10:51 AM, Dr. Werner Fink wrote: > On 2020/10/28 10:23:57 -0400, Chet Ramey wrote: >> On 10/16/20 9:28 AM, Chet Ramey wrote: >>> On 10/16/20 9:16 AM, Dr. Werner Fink wrote: >>> Also a warning hint in the manual page could help users before enabling this feature :) >>> >>> I

Re: New feature in bash 5.1/readline-8.1 rc1 breaks python-pexpect

2020-10-28 Thread Dr. Werner Fink
On 2020/10/28 10:23:57 -0400, Chet Ramey wrote: > On 10/16/20 9:28 AM, Chet Ramey wrote: > > On 10/16/20 9:16 AM, Dr. Werner Fink wrote: > > > >> Also a warning hint in the manual page could > >> help users before enabling this feature :) > > > > I agree, and the manual page in the release will

Re: New feature in bash 5.1/readline-8.1 rc1 breaks python-pexpect

2020-10-28 Thread Chet Ramey
On 10/16/20 9:28 AM, Chet Ramey wrote: > On 10/16/20 9:16 AM, Dr. Werner Fink wrote: > >> Also a warning hint in the manual page could >> help users before enabling this feature :) > > I agree, and the manual page in the release will reflect bracketed paste's > default setting. However, readline

Re: read with very small timeout sometime hand on stdin

2020-10-28 Thread Chet Ramey
On 10/28/20 7:06 AM, felix wrote: > Bash Version: 5.1 > Patch Level: 0 > Release Status: rc1 > > Description: > Trying to see limits of timeout with `read -t`, I encounter strange > and unconstant result: sometime `read -t .01` don't consider > timeout, when running fastly

read with very small timeout sometime hand on stdin

2020-10-28 Thread felix
Configuration Information: Machine: x86_64 OS: linux-gnu Compiler: gcc Compilation CFLAGS: -g -O2 -Wno-parentheses -Wno-format-security uname output: Linux medium 4.19.0-9-amd64 #1 SMP Debian 4.19.118-2 (2020-04-29) x86_64 GNU/Linux Machine Type: x86_64-pc-linux-gnu Bash Version: 5.1 Patch