diff options
author | Armin Kuster <akuster@mvista.com> | 2016-02-28 10:53:33 -0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-03-21 15:48:21 +0000 |
commit | 01e9f306e0af4ea2d9fe611c1592b0f19d83f487 (patch) | |
tree | fb7a3c56b7d58797027f8cde7f2fad9f433f4db1 /meta/recipes-kernel/modutils | |
parent | bb6ce1334bfb3711428b4b82bca4c0d5339ee2f8 (diff) | |
download | openembedded-core-01e9f306e0af4ea2d9fe611c1592b0f19d83f487.tar.gz openembedded-core-01e9f306e0af4ea2d9fe611c1592b0f19d83f487.tar.bz2 openembedded-core-01e9f306e0af4ea2d9fe611c1592b0f19d83f487.zip |
glibc: CVE-2015-8779
A stack overflow vulnerability in the catopen function was found, causing
applications which pass long strings to the catopen function to crash or,
potentially execute arbitrary code.
(From OE-Core rev: af20e323932caba8883c91dac610e1ba2b3d4ab5)
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-kernel/modutils')
0 files changed, 0 insertions, 0 deletions