mirror of
https://git.in.rschanz.org/ryan77627/guix.git
synced 2024-11-08 16:06:16 -05:00
d9721bcf27
* gnu/packages/patches/readline-6.2-CVE-2014-2524.patch: New file. * gnu/local.mk (dist_patch_DATA): Add it. * gnu/packages/readline.scm (readline-6.2): Use it.
42 lines
949 B
Diff
42 lines
949 B
Diff
Fix CVE-2014-2524:
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2524
|
|
http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html
|
|
|
|
Patch copied from:
|
|
https://ftp.gnu.org/gnu/readline/readline-6.3-patches/readline63-003
|
|
|
|
READLINE PATCH REPORT
|
|
=====================
|
|
|
|
Readline-Release: 6.3
|
|
Patch-ID: readline63-003
|
|
|
|
Bug-Reported-by:
|
|
Bug-Reference-ID:
|
|
Bug-Reference-URL:
|
|
|
|
Bug-Description:
|
|
|
|
There are debugging functions in the readline release that are theoretically
|
|
exploitable as security problems. They are not public functions, but have
|
|
global linkage.
|
|
|
|
Patch (apply with `patch -p0'):
|
|
|
|
*** ../readline-6.3/util.c 2013-09-02 13:36:12.000000000 -0400
|
|
--- util.c 2014-03-20 10:25:53.000000000 -0400
|
|
***************
|
|
*** 477,480 ****
|
|
--- 479,483 ----
|
|
}
|
|
|
|
+ #if defined (DEBUG)
|
|
#if defined (USE_VARARGS)
|
|
static FILE *_rl_tracefp;
|
|
***************
|
|
*** 539,542 ****
|
|
--- 542,546 ----
|
|
}
|
|
#endif
|
|
+ #endif /* DEBUG */
|