Configuration Information:
Machine: x86_64
OS: linux-gnu
Compiler: gcc
Compilation CFLAGS: -g -O2 -Wno-parentheses -Wno-format-security
uname output: Linux medium 4.19.0-9-amd64 #1 SMP Debian 4.19.118-2 (2020-04-29)
x86_64 GNU/Linux
Machine Type: x86_64-pc-linux-gnu
Bash Version: 5.1
Patch Level:
On 10/28/20 7:06 AM, felix wrote:
> Bash Version: 5.1
> Patch Level: 0
> Release Status: rc1
>
> Description:
> Trying to see limits of timeout with `read -t`, I encounter strange
> and unconstant result: sometime `read -t .01` don't consider
> timeout, when running fastly multipl
On 10/16/20 9:28 AM, Chet Ramey wrote:
> On 10/16/20 9:16 AM, Dr. Werner Fink wrote:
>
>> Also a warning hint in the manual page could
>> help users before enabling this feature :)
>
> I agree, and the manual page in the release will reflect bracketed paste's
> default setting. However, readline
On 2020/10/28 10:23:57 -0400, Chet Ramey wrote:
> On 10/16/20 9:28 AM, Chet Ramey wrote:
> > On 10/16/20 9:16 AM, Dr. Werner Fink wrote:
> >
> >> Also a warning hint in the manual page could
> >> help users before enabling this feature :)
> >
> > I agree, and the manual page in the release will r
On 10/28/20 10:51 AM, Dr. Werner Fink wrote:
> On 2020/10/28 10:23:57 -0400, Chet Ramey wrote:
>> On 10/16/20 9:28 AM, Chet Ramey wrote:
>>> On 10/16/20 9:16 AM, Dr. Werner Fink wrote:
>>>
Also a warning hint in the manual page could
help users before enabling this feature :)
>>>
>>> I ag
Hi Bash Maintainers,
I've been made aware of a GNU Bash profile code execution vulnerability
https://exchange.xforce.ibmcloud.com/vulnerabilities/173116 reported last
December (2019-12-16)
Description: GNU Bash could allow a remote attacker to execute arbitrary
code on the system, caused by imp
On Wed, Oct 28, 2020 at 05:11:42PM +, Rachel Alderman wrote:
> I've been made aware of a GNU Bash profile code execution vulnerability
> https://exchange.xforce.ibmcloud.com/vulnerabilities/173116 reported last
> December (2019-12-16)
This URL doesn't work without Javascript, and with Javasc
On 10/28/20 1:11 PM, Rachel Alderman wrote:
> Hi Bash Maintainers,
>
> I've been made aware of a GNU Bash profile code execution vulnerability
> https://exchange.xforce.ibmcloud.com/vulnerabilities/173116 reported last
> December (2019-12-16)
> Description: GNU Bash could allow a remote attacker
On 10/28/20 1:11 PM, Rachel Alderman wrote:
> Hi Bash Maintainers,
>
> I've been made aware of a GNU Bash profile code execution vulnerability
> https://exchange.xforce.ibmcloud.com/vulnerabilities/173116 reported last
> December (2019-12-16)
> Description: GNU Bash could allow a remote attacker
Configuration Information [Automatically generated, do not change]:
Machine: x86_64
OS: linux-gnu
Compiler: gcc
Compilation CFLAGS: -O2 -flto -ffat-lto-objects -fexceptions -g
-grecord-gcc-switches -pipe -Wall -Werror=format-security
-Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS
-specs=/usr/
On 10/28/20 4:10 PM, Arnaud wrote:
> Bash Version: 5.0
> Patch Level: 17
> Release Status: release
>
> Description:
> I have colored my prompt with colors, using PS1 and PS0.
>
> PS1 ends with a color definition, so the command entered is colored.
> PS0 resets the color s
On Thu, Oct 29, 2020 at 4:11 AM Arnaud wrote:
>
> Description:
> I have colored my prompt with colors, using PS1 and PS0.
>
> PS1 ends with a color definition, so the command entered is
> colored.
> PS0 resets the color so the output has the standard colors.
> I ha
12 matches
Mail list logo