readline: actually apply readline63-003 (aka CVE-2014-2524)

This file wasn't named as a patch, nor told to apply explicity, so it was just
unpacked to the work directory and not applied.  Rename the file so the patch is
applied correctly.

(thanks to Petter Mabäcker <petter@technux.se> for spotting this)

(From OE-Core master rev: 02be728762c77962f9c3034cd7995ad51afaee95)

(From OE-Core rev: 7f2e2d57c7496547b7970377547482ead2e152cf)

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Joshua Lock <joshua.lock@collabora.co.uk>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
Ross Burton
2015-10-06 14:04:20 +01:00
committed by Richard Purdie
parent ddb058ca08
commit 2761a2bd8b
2 changed files with 1 additions and 1 deletions

View File

@@ -1,6 +1,6 @@
require readline.inc
SRC_URI += "file://readline63-003 \
SRC_URI += "file://readline63-003.patch;striplevel=0 \
file://readline-dispatch-multikey.patch"
SRC_URI[archive.md5sum] = "33c8fb279e981274f485fd91da77e94a"