diff options
author | Haris Okanovic <haris.okanovic@ni.com> | 2015-05-15 16:57:11 -0500 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2015-05-18 09:23:03 +0100 |
commit | 37fe48d801a1ae8e3e79e9d6a96d6b52666c3fc5 (patch) | |
tree | add0905067488ccc5fbb19a6910d62cc5210db53 /meta-yocto-bsp/recipes-core | |
parent | bc162d21dd148252efcf3ed771e04c791ef4d869 (diff) | |
download | poky-37fe48d801a1ae8e3e79e9d6a96d6b52666c3fc5.tar.gz |
glibc: CVE-2015-1781: resolv/nss_dns/dns-host.c buffer overflow
Backport Arjun Shankar's patch for CVE-2015-1781:
A buffer overflow flaw was found in the way glibc's gethostbyname_r() and
other related functions computed the size of a buffer when passed a
misaligned buffer as input. An attacker able to make an application call
any of these functions with a misaligned buffer could use this flaw to
crash the application or, potentially, execute arbitrary code with the
permissions of the user running the application.
https://sourceware.org/bugzilla/show_bug.cgi?id=18287
(From OE-Core rev: c0f0b6e6ef1edc0a9f9e1ceffb1cdbbef2e409c6)
Signed-off-by: Haris Okanovic <haris.okanovic@ni.com>
Reviewed-by: Ben Shelton <ben.shelton@ni.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta-yocto-bsp/recipes-core')
0 files changed, 0 insertions, 0 deletions