diff options
author | Armin Kuster <akuster@mvista.com> | 2016-02-28 10:53:32 -0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-03-21 15:48:47 +0000 |
commit | dae5ee4e5e41b9bbfb2d0f22521247efa5cadeb0 (patch) | |
tree | 85e5264b3adc3fe9c778e9971c6e7bd6d4259917 /meta/recipes-core/glibc/glibc_2.20.bb | |
parent | bebaaf1d21f17014bc3671e6496dbb202a048259 (diff) | |
download | poky-dae5ee4e5e41b9bbfb2d0f22521247efa5cadeb0.tar.gz |
glibc: CVE-2015-8777
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or
libc6) before 2.23 allows local users to bypass a pointer-guarding protection
mechanism via a zero value of the LD_POINTER_GUARD environment variable.
(From OE-Core rev: 22570ba08d7c6157aec58764c73b1134405b0252)
(From OE-Core rev: bb6ce1334bfb3711428b4b82bca4c0d5339ee2f8)
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/glibc/glibc_2.20.bb')
-rw-r--r-- | meta/recipes-core/glibc/glibc_2.20.bb | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/meta/recipes-core/glibc/glibc_2.20.bb b/meta/recipes-core/glibc/glibc_2.20.bb index a928293ed4..5e03570cf3 100644 --- a/meta/recipes-core/glibc/glibc_2.20.bb +++ b/meta/recipes-core/glibc/glibc_2.20.bb | |||
@@ -48,7 +48,9 @@ CVEPATCHES = "\ | |||
48 | file://CVE-2015-1781-resolv-nss_dns-dns-host.c-buffer-overf.patch \ | 48 | file://CVE-2015-1781-resolv-nss_dns-dns-host.c-buffer-overf.patch \ |
49 | file://CVE-2015-1472-wscanf-allocates-too-little-memory.patch \ | 49 | file://CVE-2015-1472-wscanf-allocates-too-little-memory.patch \ |
50 | file://CVE-2015-7547.patch \ | 50 | file://CVE-2015-7547.patch \ |
51 | " | 51 | file://CVE-2015-8777.patch \ |
52 | " | ||
53 | |||
52 | LIC_FILES_CHKSUM = "file://LICENSES;md5=e9a558e243b36d3209f380deb394b213 \ | 54 | LIC_FILES_CHKSUM = "file://LICENSES;md5=e9a558e243b36d3209f380deb394b213 \ |
53 | file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ | 55 | file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ |
54 | file://posix/rxspencer/COPYRIGHT;md5=dc5485bb394a13b2332ec1c785f5d83a \ | 56 | file://posix/rxspencer/COPYRIGHT;md5=dc5485bb394a13b2332ec1c785f5d83a \ |