* gnu/packages/patches/readline-6.2-CVE-2014-2524.patch: New file. * gnu/local.mk (dist_patch_DATA): Add it. * gnu/packages/readline.scm (readline-6.2): Use it.
		
			
				
	
	
		
			42 lines
		
	
	
	
		
			949 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			42 lines
		
	
	
	
		
			949 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
| Fix CVE-2014-2524:
 | |
| 
 | |
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2524
 | |
| http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html
 | |
| 
 | |
| Patch copied from:
 | |
| https://ftp.gnu.org/gnu/readline/readline-6.3-patches/readline63-003
 | |
| 
 | |
| 			   READLINE PATCH REPORT
 | |
| 			   =====================
 | |
| 
 | |
| Readline-Release: 6.3
 | |
| Patch-ID: readline63-003
 | |
| 
 | |
| Bug-Reported-by:
 | |
| Bug-Reference-ID:
 | |
| Bug-Reference-URL:
 | |
| 
 | |
| Bug-Description:
 | |
| 
 | |
| There are debugging functions in the readline release that are theoretically
 | |
| exploitable as security problems.  They are not public functions, but have
 | |
| global linkage.
 | |
| 
 | |
| Patch (apply with `patch -p0'):
 | |
| 
 | |
| *** ../readline-6.3/util.c	2013-09-02 13:36:12.000000000 -0400
 | |
| --- util.c	2014-03-20 10:25:53.000000000 -0400
 | |
| ***************
 | |
| *** 477,480 ****
 | |
| --- 479,483 ----
 | |
|   }
 | |
|   
 | |
| + #if defined (DEBUG)
 | |
|   #if defined (USE_VARARGS)
 | |
|   static FILE *_rl_tracefp;
 | |
| ***************
 | |
| *** 539,542 ****
 | |
| --- 542,546 ----
 | |
|   }
 | |
|   #endif
 | |
| + #endif /* DEBUG */
 |