diff options
author | Haris Okanovic <haris.okanovic@ni.com> | 2015-05-15 16:57:11 -0500 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2015-05-16 22:37:21 +0100 |
commit | c0f0b6e6ef1edc0a9f9e1ceffb1cdbbef2e409c6 (patch) | |
tree | ace3396f4523421002f79e6cf5e8f0e1985a90bf /meta/recipes-support/libksba | |
parent | aa2e02a4f78d87bd466bbf92ca57147066c5367f (diff) | |
download | openembedded-core-c0f0b6e6ef1edc0a9f9e1ceffb1cdbbef2e409c6.tar.gz openembedded-core-c0f0b6e6ef1edc0a9f9e1ceffb1cdbbef2e409c6.tar.bz2 openembedded-core-c0f0b6e6ef1edc0a9f9e1ceffb1cdbbef2e409c6.zip |
glibc: CVE-2015-1781: resolv/nss_dns/dns-host.c buffer overflow
Backport Arjun Shankar's patch for CVE-2015-1781:
A buffer overflow flaw was found in the way glibc's gethostbyname_r() and
other related functions computed the size of a buffer when passed a
misaligned buffer as input. An attacker able to make an application call
any of these functions with a misaligned buffer could use this flaw to
crash the application or, potentially, execute arbitrary code with the
permissions of the user running the application.
https://sourceware.org/bugzilla/show_bug.cgi?id=18287
Signed-off-by: Haris Okanovic <haris.okanovic@ni.com>
Reviewed-by: Ben Shelton <ben.shelton@ni.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-support/libksba')
0 files changed, 0 insertions, 0 deletions