The cirros image was rebuilt against the 3.13.0-83 kernel, drivers e1000e, igbvf...
[packages/trusty/cirros-testvm.git] / cirros-testvm / src-cirros / buildroot-2015.05 / package / readline / 0003-patchlevel-3.patch
diff --git a/cirros-testvm/src-cirros/buildroot-2015.05/package/readline/0003-patchlevel-3.patch b/cirros-testvm/src-cirros/buildroot-2015.05/package/readline/0003-patchlevel-3.patch
new file mode 100644 (file)
index 0000000..195ed55
--- /dev/null
@@ -0,0 +1,51 @@
+From http://ftp.gnu.org/pub/gnu/readline/readline-6.3-patches/readline63-003
+
+Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
+
+                          READLINE PATCH REPORT
+                          =====================
+
+Readline-Release: 6.3
+Patch-ID: readline63-003
+
+Bug-Reported-by:
+Bug-Reference-ID:
+Bug-Reference-URL:
+
+Bug-Description:
+
+There are debugging functions in the readline release that are theoretically
+exploitable as security problems.  They are not public functions, but have
+global linkage.
+
+Patch (apply with `patch -p0'):
+
+*** a/readline-6.3/util.c      2013-09-02 13:36:12.000000000 -0400
+--- b/util.c   2014-03-20 10:25:53.000000000 -0400
+***************
+*** 477,480 ****
+--- 479,483 ----
+  }
+  
++ #if defined (DEBUG)
+  #if defined (USE_VARARGS)
+  static FILE *_rl_tracefp;
+***************
+*** 539,542 ****
+--- 542,546 ----
+  }
+  #endif
++ #endif /* DEBUG */
+  
+  
+*** a/readline-6.3/patchlevel  2013-11-15 08:11:11.000000000 -0500
+--- b/patchlevel       2014-03-21 08:28:40.000000000 -0400
+***************
+*** 1,3 ****
+  # Do not edit -- exists only for use by patch
+  
+! 2
+--- 1,3 ----
+  # Do not edit -- exists only for use by patch
+  
+! 3