summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/readline/readline-6.3/readline63-003.patch
diff options
context:
space:
mode:
authorRoss Burton <ross.burton@intel.com>2015-10-06 14:04:20 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2015-12-08 13:27:34 +0000
commit2761a2bd8b215e35830e21725c3dfd2e5598ba32 (patch)
tree6cf62822fdf156396c53654dc8686b4491409752 /meta/recipes-core/readline/readline-6.3/readline63-003.patch
parentddb058ca089a9564e21d558d457800d991183bd8 (diff)
downloadpoky-2761a2bd8b215e35830e21725c3dfd2e5598ba32.tar.gz
readline: actually apply readline63-003 (aka CVE-2014-2524)
This file wasn't named as a patch, nor told to apply explicity, so it was just unpacked to the work directory and not applied. Rename the file so the patch is applied correctly. (thanks to Petter Mabäcker <petter@technux.se> for spotting this) (From OE-Core master rev: 02be728762c77962f9c3034cd7995ad51afaee95) (From OE-Core rev: 7f2e2d57c7496547b7970377547482ead2e152cf) Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Joshua Lock <joshua.lock@collabora.co.uk> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/readline/readline-6.3/readline63-003.patch')
-rw-r--r--meta/recipes-core/readline/readline-6.3/readline63-003.patch43
1 files changed, 43 insertions, 0 deletions
diff --git a/meta/recipes-core/readline/readline-6.3/readline63-003.patch b/meta/recipes-core/readline/readline-6.3/readline63-003.patch
new file mode 100644
index 0000000000..98a9d810b6
--- /dev/null
+++ b/meta/recipes-core/readline/readline-6.3/readline63-003.patch
@@ -0,0 +1,43 @@
1readline: Security Advisory - readline - CVE-2014-2524
2
3Upstream-Status: Backport
4
5Signed-off-by: Yue Tao <yue.tao@windriver.com>
6
7 READLINE PATCH REPORT
8 =====================
9
10Readline-Release: 6.3
11Patch-ID: readline63-003
12
13Bug-Reported-by:
14Bug-Reference-ID:
15Bug-Reference-URL:
16
17Bug-Description:
18
19There are debugging functions in the readline release that are theoretically
20exploitable as security problems. They are not public functions, but have
21global linkage.
22
23Patch (apply with `patch -p0'):
24
25*** ../readline-6.3/util.c 2013-09-02 13:36:12.000000000 -0400
26--- util.c 2014-03-20 10:25:53.000000000 -0400
27***************
28*** 477,480 ****
29--- 479,483 ----
30 }
31
32+ #if defined (DEBUG)
33 #if defined (USE_VARARGS)
34 static FILE *_rl_tracefp;
35***************
36*** 539,542 ****
37--- 542,546 ----
38 }
39 #endif
40+ #endif /* DEBUG */
41
42
43