summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/glibc/glibc/CVE-2015-8779.patch
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2016-02-28 10:53:32 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-03-21 15:48:47 +0000
commitdae5ee4e5e41b9bbfb2d0f22521247efa5cadeb0 (patch)
tree85e5264b3adc3fe9c778e9971c6e7bd6d4259917 /meta/recipes-core/glibc/glibc/CVE-2015-8779.patch
parentbebaaf1d21f17014bc3671e6496dbb202a048259 (diff)
downloadpoky-dae5ee4e5e41b9bbfb2d0f22521247efa5cadeb0.tar.gz
glibc: CVE-2015-8777
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable. (From OE-Core rev: 22570ba08d7c6157aec58764c73b1134405b0252) (From OE-Core rev: bb6ce1334bfb3711428b4b82bca4c0d5339ee2f8) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/glibc/glibc/CVE-2015-8779.patch')
0 files changed, 0 insertions, 0 deletions