summaryrefslogtreecommitdiffstats
path: root/meta-yocto-bsp/recipes-bsp/gma500-gfx-check
diff options
context:
space:
mode:
authorLi Zhou <li.zhou@windriver.com>2017-02-13 10:53:24 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-05-18 13:07:32 +0100
commit30166f042dbae918178c470c645c3b947ddf5b41 (patch)
tree2f4161bdd94db81142d0a8feff4ebc1bb5852311 /meta-yocto-bsp/recipes-bsp/gma500-gfx-check
parent924e576b8930fd2268d85f0b151e5f68a3c2afce (diff)
downloadpoky-30166f042dbae918178c470c645c3b947ddf5b41.tar.gz
bash: fix CVE-2016-9401
popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address. Porting patch from <https://ftp.gnu.org/pub/gnu/bash/bash-4.4-patches/ bash44-006> to solve CVE-2016-9401. (From OE-Core rev: 9b5e17b45ca5b2518f1f7c13bb2f79b5b669744f) Signed-off-by: Li Zhou <li.zhou@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com> (cherry picked from commit 6987b317d5ce8dc50a37ebba395aa8424bec358c) Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta-yocto-bsp/recipes-bsp/gma500-gfx-check')
0 files changed, 0 insertions, 0 deletions