summaryrefslogtreecommitdiffstats
path: root/documentation/mega-manual/figures/kernelshark-output-display.png
diff options
context:
space:
mode:
authorRahul Taya <Rahul.Taya@kpit.com>2020-07-30 14:11:51 +0530
committerRichard Purdie <richard.purdie@linuxfoundation.org>2020-08-12 10:53:51 +0100
commitfb9a4d23c3de9b0140c999322034f8c969e8b1c7 (patch)
treea3c91fcef429a107edc8ca12ce0a9e4c758e4291 /documentation/mega-manual/figures/kernelshark-output-display.png
parent908d6ca32d10ede970343c88480906bc67645931 (diff)
downloadpoky-fb9a4d23c3de9b0140c999322034f8c969e8b1c7.tar.gz
libpcre: Add fix for CVE-2020-14155
Added below patch in libpcre CVE-2020-14155.patch This patch fixes below error: PCRE could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow in libpcre via a large number after (?C substring. By sending a request with a large number, an attacker can execute arbitrary code on the system or cause the application to crash. Tested-by: Rahul Taya <Rahul.Taya@kpit.com> (From OE-Core rev: 3f536edfa56ce3f93223c23ed48427a0c24ede1a) Signed-off-by: Saloni Jain <Saloni.Jain@kpit.com> Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'documentation/mega-manual/figures/kernelshark-output-display.png')
0 files changed, 0 insertions, 0 deletions