diff options
author | Armin Kuster <akuster@mvista.com> | 2016-01-22 20:23:04 -0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-01-30 12:13:08 +0000 |
commit | a4134af78bfcbd8a7233cf37577a7693efbd6c7f (patch) | |
tree | a4f7ab9f08b8e2c754b9abecc8248e725b7bf51b /meta/recipes-core/glibc/glibc_2.22.bb | |
parent | e10ec6f3be71dffb3babe7ed5c03f01df9746094 (diff) | |
download | poky-a4134af78bfcbd8a7233cf37577a7693efbd6c7f.tar.gz |
glibc: CVE-2015-9761
A stack overflow vulnerability was found in nan* functions that could cause
applications which process long strings with the nan function to crash or,
potentially, execute arbitrary code.
(From OE-Core rev: fd3da8178c8c06b549dbc19ecec40e98ab934d49)
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/glibc/glibc_2.22.bb')
-rw-r--r-- | meta/recipes-core/glibc/glibc_2.22.bb | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/meta/recipes-core/glibc/glibc_2.22.bb b/meta/recipes-core/glibc/glibc_2.22.bb index 382c992d8a..920506645d 100644 --- a/meta/recipes-core/glibc/glibc_2.22.bb +++ b/meta/recipes-core/glibc/glibc_2.22.bb | |||
@@ -43,6 +43,8 @@ SRC_URI = "${GLIBC_GIT_URI};branch=${SRCBRANCH};name=glibc \ | |||
43 | file://0028-Clear-ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA-for-prel.patch \ | 43 | file://0028-Clear-ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA-for-prel.patch \ |
44 | file://CVE-2015-8777.patch \ | 44 | file://CVE-2015-8777.patch \ |
45 | file://CVE-2015-8779.patch \ | 45 | file://CVE-2015-8779.patch \ |
46 | file://CVE-2015-9761_1.patch \ | ||
47 | file://CVE-2015-9761_2.patch \ | ||
46 | " | 48 | " |
47 | 49 | ||
48 | SRC_URI += "\ | 50 | SRC_URI += "\ |