summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity
diff options
context:
space:
mode:
authorZhixiong Chi <zhixiong.chi@windriver.com>2017-04-20 15:04:54 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-05-18 13:17:44 +0100
commite5aa1ac23669a45491de9ecffac491c01e70203f (patch)
treed24e2427ea067272dc58e12e46126c75a72550bf /meta/recipes-connectivity
parentabae42362ad327df4caf86743d02f632931f1f1d (diff)
downloadpoky-e5aa1ac23669a45491de9ecffac491c01e70203f.tar.gz
bash: CVE-2016-0634
A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string. Porting patch from <https://ftp.gnu.org/gnu/bash/bash-4.3-patches/ bash43-047> to solve CVE-2016-0634 CVE: CVE-2016-0634 (From OE-Core rev: 7dd6aa1a4bf6e9fc8a1998cda6ac5397bb5cd5cb) (From OE-Core rev: a4b37b05140b549960baef49237ce3316e84a041) Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity')
0 files changed, 0 insertions, 0 deletions