summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/glibc/glibc/CVE-2015-9761_1.patch
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2016-02-28 10:53:33 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-03-21 15:48:47 +0000
commit14a42e27195a100ca5edc551007a6a120b10c398 (patch)
tree92dccbf97faab8209fb0255bafdc6a0cb0a8446f /meta/recipes-core/glibc/glibc/CVE-2015-9761_1.patch
parentdae5ee4e5e41b9bbfb2d0f22521247efa5cadeb0 (diff)
downloadpoky-14a42e27195a100ca5edc551007a6a120b10c398.tar.gz
glibc: CVE-2015-8779
A stack overflow vulnerability in the catopen function was found, causing applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (From OE-Core rev: af20e323932caba8883c91dac610e1ba2b3d4ab5) (From OE-Core rev: 01e9f306e0af4ea2d9fe611c1592b0f19d83f487) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/glibc/glibc/CVE-2015-9761_1.patch')
0 files changed, 0 insertions, 0 deletions