diff options
author | Joe Slater <jslater@windriver.com> | 2017-08-18 10:43:44 -0700 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2017-08-19 22:15:39 +0100 |
commit | ee195eb03460e9dca41084695d4775ec830cfde7 (patch) | |
tree | 3a21ec16fe8dd9cfc618eee966c2b23784f41c8b /meta/recipes-bsp/grub/grub_2.02.bb | |
parent | 342393587cdc364c12c0a0ba1694f3198cd49158 (diff) | |
download | poky-ee195eb03460e9dca41084695d4775ec830cfde7.tar.gz |
ruby: fix CVE-2017-922{6-9}
CVE-2017-9226 : check too big code point value for single byte
CVE-2017-9227 : access to invalid address by reg->dmin value
CVE-2017-9228 : invalid state(CCS_VALUE) in parse_char_class()
CVE-2017-9229 : access to invalid address by reg->dmax value
(From OE-Core rev: f15f01edbaa431829a50053d07ed6d6b333584c7)
Signed-off-by: Joe Slater <jslater@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-bsp/grub/grub_2.02.bb')
0 files changed, 0 insertions, 0 deletions