diff options
author | Armin Kuster <akuster@mvista.com> | 2016-01-22 20:19:24 -0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-02-18 07:37:26 +0000 |
commit | e0f71f123147bf4f48cc90c7f26a50164ed4115e (patch) | |
tree | be8517e4c9782445f1b9da5fd93f6763d6c8587d /.gitignore | |
parent | bc51411d2edda908cbef733066d78a986dfec0c0 (diff) | |
download | openembedded-core-e0f71f123147bf4f48cc90c7f26a50164ed4115e.tar.gz openembedded-core-e0f71f123147bf4f48cc90c7f26a50164ed4115e.tar.bz2 openembedded-core-e0f71f123147bf4f48cc90c7f26a50164ed4115e.zip |
glibc: CVE-2015-8779
A stack overflow vulnerability in the catopen function was found, causing
applications which pass long strings to the catopen function to crash or,
potentially execute arbitrary code.
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to '.gitignore')
0 files changed, 0 insertions, 0 deletions