summaryrefslogtreecommitdiff
path: root/meta/recipes-connectivity/wpa-supplicant
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2016-02-28 10:53:34 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-03-21 15:48:29 +0000
commit1916b4c34ee9d752c12b8311cb9fd41e09b82900 (patch)
tree8bfcb1fa8111f94600b44804a53e4d9e32cc0481 /meta/recipes-connectivity/wpa-supplicant
parent01e9f306e0af4ea2d9fe611c1592b0f19d83f487 (diff)
downloadopenembedded-core-1916b4c34ee9d752c12b8311cb9fd41e09b82900.tar.gz
openembedded-core-1916b4c34ee9d752c12b8311cb9fd41e09b82900.tar.bz2
openembedded-core-1916b4c34ee9d752c12b8311cb9fd41e09b82900.zip
glibc: CVE-2015-9761
A stack overflow vulnerability was found in nan* functions that could cause applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (From OE-Core rev: fd3da8178c8c06b549dbc19ecec40e98ab934d49) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/wpa-supplicant')
0 files changed, 0 insertions, 0 deletions