Fix CVE-2014-2524: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2524 http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html Patch copied from: https://ftp.gnu.org/gnu/readline/readline-6.3-patches/readline63-003 READLINE PATCH REPORT ===================== Readline-Release: 6.3 Patch-ID: readline63-003 Bug-Reported-by: Bug-Reference-ID: Bug-Reference-URL: Bug-Description: There are debugging functions in the readline release that are theoretically exploitable as security problems. They are not public functions, but have global linkage. Patch (apply with `patch -p0'): *** ../readline-6.3/util.c 2013-09-02 13:36:12.000000000 -0400 --- util.c 2014-03-20 10:25:53.000000000 -0400 *************** *** 477,480 **** --- 479,483 ---- } + #if defined (DEBUG) #if defined (USE_VARARGS) static FILE *_rl_tracefp; *************** *** 539,542 **** --- 542,546 ---- } #endif + #endif /* DEBUG */ put type='submit' value='switch'/> Wojtek's customized Guix
aboutsummaryrefslogtreecommitdiff
path: root/gnu/packages/patches/python-pyatspi-python-37.patch
diff options
context:
space:
mode:
authorTimothy Sample <samplet@ngyro.com>2019-10-31 13:11:51 -0400
committerTimothy Sample <samplet@ngyro.com>2019-11-20 20:48:27 -0500
commita6a79897bc492cf708c8cbe8df665cdbc13f38f8 (patch)
tree50d52baa7242561321544d39029b26bf8fe0e686 /gnu/packages/patches/python-pyatspi-python-37.patch
parent8a5924dcfecf02ae755d717cd11643b8a42bd7fc (diff)
downloadguix-a6a79897bc492cf708c8cbe8df665cdbc13f38f8.tar.gz
guix-a6a79897bc492cf708c8cbe8df665cdbc13f38f8.zip
gnu: ghc-http-client: Update to 0.6.4.
* gnu/packages/haskell-web.scm (ghc-http-client): Update to 0.6.4.
Diffstat (limited to 'gnu/packages/patches/python-pyatspi-python-37.patch')
0 files changed, 0 insertions, 0 deletions