diff options
author | Ross Burton <ross.burton@intel.com> | 2015-10-06 14:04:20 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2015-10-07 00:07:51 +0100 |
commit | 02be728762c77962f9c3034cd7995ad51afaee95 (patch) | |
tree | c3134f38bf8ae3f995da9ecdd4674a50a55d2468 /meta/recipes-core/readline/readline-6.3/readline63-003.patch | |
parent | 26e90d64b51e1e53e9314f9c56939f5f6d525449 (diff) | |
download | openembedded-core-contrib-02be728762c77962f9c3034cd7995ad51afaee95.tar.gz |
readline: actually apply readline63-003 (aka CVE-2014-2524)
This file wasn't named as a patch, nor told to apply explicity, so it was just
unpacked to the work directory and not applied. Rename the file so the patch is
applied correctly.
(thanks to Petter Mabäcker <petter@technux.se> for spotting this)
Signed-off-by: Ross Burton <ross.burton@intel.com>
Diffstat (limited to 'meta/recipes-core/readline/readline-6.3/readline63-003.patch')
-rw-r--r-- | meta/recipes-core/readline/readline-6.3/readline63-003.patch | 43 |
1 files changed, 43 insertions, 0 deletions
diff --git a/meta/recipes-core/readline/readline-6.3/readline63-003.patch b/meta/recipes-core/readline/readline-6.3/readline63-003.patch new file mode 100644 index 0000000000..98a9d810b6 --- /dev/null +++ b/meta/recipes-core/readline/readline-6.3/readline63-003.patch @@ -0,0 +1,43 @@ +readline: Security Advisory - readline - CVE-2014-2524 + +Upstream-Status: Backport + +Signed-off-by: Yue Tao <yue.tao@windriver.com> + + READLINE PATCH REPORT + ===================== + +Readline-Release: 6.3 +Patch-ID: readline63-003 + +Bug-Reported-by: +Bug-Reference-ID: +Bug-Reference-URL: + +Bug-Description: + +There are debugging functions in the readline release that are theoretically +exploitable as security problems. They are not public functions, but have +global linkage. + +Patch (apply with `patch -p0'): + +*** ../readline-6.3/util.c 2013-09-02 13:36:12.000000000 -0400 +--- util.c 2014-03-20 10:25:53.000000000 -0400 +*************** +*** 477,480 **** +--- 479,483 ---- + } + ++ #if defined (DEBUG) + #if defined (USE_VARARGS) + static FILE *_rl_tracefp; +*************** +*** 539,542 **** +--- 542,546 ---- + } + #endif ++ #endif /* DEBUG */ + + + |