summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/readline/readline_6.3.bb
AgeCommit message (Collapse)Author
2016-11-23readline: Update to version 7.0Fabio Berton
Remove readline 6.3 patches and config-dirent-symbols.patch already apply on upstream. (From OE-Core rev: 983a4986947b63e9b6042fc8c083cde3bc1c30ad) Signed-off-by: Fabio Berton <fabio.berton@ossystems.com.br> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2015-12-01readline: apply missing upstream patchesPetter Mabäcker
Some readline-6.3 upstream patches was missing. Also ensure that the upstream patches are applied in the same way as in readline-5.2. Remove 'readline-dispatch-multikey.patch' and 'readline-cve-2014-2524.patch' since they are already included in upstream patches 'readline63-002' and 'readline63-003'. [YOCTO #8451] (From OE-Core rev: 7b1fde3f65b674f5973800731c0c284f7d415248) Signed-off-by: Petter Mabäcker <petter@technux.se> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2015-12-01readline: prepare for readline6.3 upstream patchesPetter Mabäcker
Upstream patches are always preferred to be applied first (before integration patches). In order to apply readline-6.3 specific upstream patches in a preferred order we need to apply the integration-patches at the end in the 6.3 specific recipe (this is already the case for readline-5.2). Also take the oppertunity to move 'norpath.patch' to readline-6.3 dir since this patch is not shared between the 5.2 and 6.3 recipe. [YOCTO #8451] (From OE-Core rev: d454d1c06247b658c6b7d12de610eb6ac72cd7d4) Signed-off-by: Petter Mabäcker <petter@technux.se> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2015-11-16readline: rename patch to contain CVE referenceRoss Burton
To help automated scanning of CVEs, put the CVE ID in the filename. (From OE-Core rev: 211bce4f23230c7898cccdb73b582420f830f977) Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2015-10-07readline: actually apply readline63-003 (aka CVE-2014-2524)Ross Burton
This file wasn't named as a patch, nor told to apply explicity, so it was just unpacked to the work directory and not applied. Rename the file so the patch is applied correctly. (thanks to Petter Mabäcker <petter@technux.se> for spotting this) (From OE-Core rev: 02be728762c77962f9c3034cd7995ad51afaee95) Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-11-08readline: Patch for readline multikey dispatch issueSaul Wold
(From OE-Core rev: d301ef7c2a5e857bd87be2a24251243ff181fa24) Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-10-18readline: Security Advisory - readline - CVE-2014-2524Kai Kang
The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2524 (From OE-Core rev: 0e95eef8817f51504dcc50d855dcbef172cfc897) Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-03-05readline: upgrade to 6.3Hongxu Jia
The readline-6.2-patches is obsolete for 6.3 (From OE-Core rev: 66bc6f4127e88db18e260c71d181aecfd58c7999) Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>