python/hypothesis: update to 6.121.0
[oi-userland.git] / components / library / readline-6 / patches / readline63-003.patch
blobd2cad94f97f5dbf9d86608af00f11f0200a8038e
1 READLINE PATCH REPORT
2 =====================
4 Readline-Release: 6.3
5 Patch-ID: readline63-003
7 Bug-Reported-by:
8 Bug-Reference-ID:
9 Bug-Reference-URL:
11 Bug-Description:
13 There are debugging functions in the readline release that are theoretically
14 exploitable as security problems. They are not public functions, but have
15 global linkage.
17 Patch (apply with `patch -p0'):
19 *** ../readline-6.3/util.c 2013-09-02 13:36:12.000000000 -0400
20 --- util.c 2014-03-20 10:25:53.000000000 -0400
21 ***************
22 *** 477,480 ****
23 --- 479,483 ----
26 + #if defined (DEBUG)
27 #if defined (USE_VARARGS)
28 static FILE *_rl_tracefp;
29 ***************
30 *** 539,542 ****
31 --- 542,546 ----
33 #endif
34 + #endif /* DEBUG */
37 *** ../readline-6.3/patchlevel 2013-11-15 08:11:11.000000000 -0500
38 --- patchlevel 2014-03-21 08:28:40.000000000 -0400
39 ***************
40 *** 1,3 ****
41 # Do not edit -- exists only for use by patch
43 ! 2
44 --- 1,3 ----
45 # Do not edit -- exists only for use by patch
47 ! 3