summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/glibc/glibc-testing.inc
diff options
context:
space:
mode:
authorAndre McCurdy <armccurdy@gmail.com>2018-05-24 17:14:19 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2018-07-02 11:41:26 +0100
commit7ff0775d278ff9f2cdb4a2155342a320287b9a43 (patch)
tree6feef6fd2f8dd5c43726ab3f80f597e449ec078e /meta/recipes-core/glibc/glibc-testing.inc
parent80c4c6eabd2f709f76f6b11a76d5c7d5f1e45863 (diff)
downloadpoky-7ff0775d278ff9f2cdb4a2155342a320287b9a43.tar.gz
cpio: fix CVE-2016-2037
"The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file." https://nvd.nist.gov/vuln/detail/CVE-2016-2037 Note that there appear to be two versions of this fix. The original patch posted to the bug-cpio mailing list [1] is used by Debian [2], but apparently causes regression [3]. The patch accepted to the upstream git repo [4] seems to be the most complete fix. [1] https://lists.gnu.org/archive/html/bug-cpio/2016-01/msg00005.html [2] https://security-tracker.debian.org/tracker/CVE-2016-2037 [3] https://www.mail-archive.com/bug-cpio@gnu.org/msg00584.html [4] http://git.savannah.gnu.org/cgit/cpio.git/commit/?id=d36ec5f4e93130efb24fb9678aafd88e8070095b (From OE-Core rev: f170288ac706126e69a504a14d564b2e5c3513e4) (From OE-Core rev: 5f9d19c53c7704bb8d14f3f7dc36fe54fa501e67) Signed-off-by: Andre McCurdy <armccurdy@gmail.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 31a87d4d1dc80c6054c15a6f7dbc83b4d79bf0b2) Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/glibc/glibc-testing.inc')
0 files changed, 0 insertions, 0 deletions