Fix CVE-2014-2524: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2524 http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html Patch copied from: https://ftp.gnu.org/gnu/readline/readline-6.3-patches/readline63-003 READLINE PATCH REPORT ===================== Readline-Release: 6.3 Patch-ID: readline63-003 Bug-Reported-by: Bug-Reference-ID: Bug-Reference-URL: Bug-Description: There are debugging functions in the readline release that are theoretically exploitable as security problems. They are not public functions, but have global linkage. Patch (apply with `patch -p0'): *** ../readline-6.3/util.c 2013-09-02 13:36:12.000000000 -0400 --- util.c 2014-03-20 10:25:53.000000000 -0400 *************** *** 477,480 **** --- 479,483 ---- } + #if defined (DEBUG) #if defined (USE_VARARGS) static FILE *_rl_tracefp; *************** *** 539,542 **** --- 542,546 ---- } #endif + #endif /* DEBUG */
aboutsummaryrefslogtreecommitdiff
path: root/build-aux/pre-inst-env.in
AgeCommit message (Expand)Author
2020-08-29build: Remove references to the 'nix-hash' program....Ludovic Courtès
2019-09-08daemon: Remove 'NIX_LIBEXEC_DIR'....Ludovic Courtès
2019-09-08daemon: Run 'guix offload' directly....Ludovic Courtès
2019-09-08daemon: Invoke 'guix gc --list-busy' instead of 'list-runtime-roots'....Ludovic Courtès