diff options
author | Armin Kuster <akuster@mvista.com> | 2016-01-22 20:13:00 -0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-02-18 07:37:19 +0000 |
commit | bc51411d2edda908cbef733066d78a986dfec0c0 (patch) | |
tree | 0ab0b3bc09cba85e98257693f93d819306854fb2 /meta/recipes-support/sqlite/sqlite3/parallel.patch | |
parent | 31af4a37c429bb1db8bfc64242b2963220f9a0e1 (diff) | |
download | openembedded-core-bc51411d2edda908cbef733066d78a986dfec0c0.tar.gz openembedded-core-bc51411d2edda908cbef733066d78a986dfec0c0.tar.bz2 openembedded-core-bc51411d2edda908cbef733066d78a986dfec0c0.zip |
glibc: CVE-2015-8777.patch
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or
libc6) before 2.23 allows local users to bypass a pointer-guarding protection
mechanism via a zero value of the LD_POINTER_GUARD environment variable.
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-support/sqlite/sqlite3/parallel.patch')
0 files changed, 0 insertions, 0 deletions