summaryrefslogtreecommitdiffstats
path: root/documentation/bsp-guide
diff options
context:
space:
mode:
authorZhixiong Chi <zhixiong.chi@windriver.com>2017-04-20 15:04:54 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-05-12 08:51:09 +0100
commit9ef73fbeba5dd95e1cf4c5afebe98a2d76a8df2e (patch)
treedc05011f2219ad8e675e756be7633529b6409cc8 /documentation/bsp-guide
parent68002417e487896fcb745747aa7b34ec88cb1c86 (diff)
downloadpoky-9ef73fbeba5dd95e1cf4c5afebe98a2d76a8df2e.tar.gz
bash: CVE-2016-0634
A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string. Porting patch from <https://ftp.gnu.org/gnu/bash/bash-4.3-patches/ bash43-047> to solve CVE-2016-0634 CVE: CVE-2016-0634 (From OE-Core rev: 7dd6aa1a4bf6e9fc8a1998cda6ac5397bb5cd5cb) Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'documentation/bsp-guide')
0 files changed, 0 insertions, 0 deletions