diff options
author | Zhixiong Chi <zhixiong.chi@windriver.com> | 2017-04-20 15:04:54 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2017-05-18 13:17:44 +0100 |
commit | e5aa1ac23669a45491de9ecffac491c01e70203f (patch) | |
tree | d24e2427ea067272dc58e12e46126c75a72550bf /documentation/mega-manual/figures/variable-added.png | |
parent | abae42362ad327df4caf86743d02f632931f1f1d (diff) | |
download | poky-e5aa1ac23669a45491de9ecffac491c01e70203f.tar.gz |
bash: CVE-2016-0634
A vulnerability was found in a way bash expands the $HOSTNAME.
Injecting the hostname with malicious code would cause it to run
each time bash expanded \h in the prompt string.
Porting patch from <https://ftp.gnu.org/gnu/bash/bash-4.3-patches/
bash43-047> to solve CVE-2016-0634
CVE: CVE-2016-0634
(From OE-Core rev: 7dd6aa1a4bf6e9fc8a1998cda6ac5397bb5cd5cb)
(From OE-Core rev: a4b37b05140b549960baef49237ce3316e84a041)
Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'documentation/mega-manual/figures/variable-added.png')
0 files changed, 0 insertions, 0 deletions