diff options
author | Kai Kang <kai.kang@windriver.com> | 2014-10-15 13:56:24 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2014-10-18 16:12:56 +0200 |
commit | 0e95eef8817f51504dcc50d855dcbef172cfc897 (patch) | |
tree | 8d04c637121d854d59979715c8b2ec2c71a19078 /meta/recipes-support | |
parent | d1e0f3e71ce9978ff0fc94d71e67b528dad84c5c (diff) | |
download | openembedded-core-0e95eef8817f51504dcc50d855dcbef172cfc897.tar.gz openembedded-core-0e95eef8817f51504dcc50d855dcbef172cfc897.tar.bz2 openembedded-core-0e95eef8817f51504dcc50d855dcbef172cfc897.zip |
readline: Security Advisory - readline - CVE-2014-2524
The _rl_tropen function in util.c in GNU readline before 6.3 patch 3
allows local users to create or overwrite arbitrary files via a symlink
attack on a /var/tmp/rltrace.[PID] file.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2524
Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Diffstat (limited to 'meta/recipes-support')
0 files changed, 0 insertions, 0 deletions