diff options
author | Kai Kang <kai.kang@windriver.com> | 2014-10-15 13:56:24 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2014-10-23 16:11:50 +0100 |
commit | a4fa519de008ccd5b9411fcb1880e0a64383ce9c (patch) | |
tree | eeceaca3846641c017651285befcfa4f096bd3fd /meta/classes/cpan-base.bbclass | |
parent | 5163eb2c3c492d3640aa0628c29f6b8d446a8261 (diff) | |
download | openembedded-core-a4fa519de008ccd5b9411fcb1880e0a64383ce9c.tar.gz openembedded-core-a4fa519de008ccd5b9411fcb1880e0a64383ce9c.tar.bz2 openembedded-core-a4fa519de008ccd5b9411fcb1880e0a64383ce9c.zip |
readline: Security Advisory - readline - CVE-2014-2524
The _rl_tropen function in util.c in GNU readline before 6.3 patch 3
allows local users to create or overwrite arbitrary files via a symlink
attack on a /var/tmp/rltrace.[PID] file.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2524
Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Diffstat (limited to 'meta/classes/cpan-base.bbclass')
0 files changed, 0 insertions, 0 deletions