summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/glibc/glibc_2.22.bb
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2016-01-22 20:19:24 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-01-30 12:13:08 +0000
commite10ec6f3be71dffb3babe7ed5c03f01df9746094 (patch)
tree8831749d616f8192ba78a589afacf3474391647b /meta/recipes-core/glibc/glibc_2.22.bb
parenta5a965d4090112143b3da01c0d7db1b7f3e4043c (diff)
downloadpoky-e10ec6f3be71dffb3babe7ed5c03f01df9746094.tar.gz
glibc: CVE-2015-8779
A stack overflow vulnerability in the catopen function was found, causing applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (From OE-Core rev: af20e323932caba8883c91dac610e1ba2b3d4ab5) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/glibc/glibc_2.22.bb')
-rw-r--r--meta/recipes-core/glibc/glibc_2.22.bb1
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-core/glibc/glibc_2.22.bb b/meta/recipes-core/glibc/glibc_2.22.bb
index 8348313b1d..382c992d8a 100644
--- a/meta/recipes-core/glibc/glibc_2.22.bb
+++ b/meta/recipes-core/glibc/glibc_2.22.bb
@@ -42,6 +42,7 @@ SRC_URI = "${GLIBC_GIT_URI};branch=${SRCBRANCH};name=glibc \
42 file://strcoll-Remove-incorrect-STRDIFF-based-optimization-.patch \ 42 file://strcoll-Remove-incorrect-STRDIFF-based-optimization-.patch \
43 file://0028-Clear-ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA-for-prel.patch \ 43 file://0028-Clear-ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA-for-prel.patch \
44 file://CVE-2015-8777.patch \ 44 file://CVE-2015-8777.patch \
45 file://CVE-2015-8779.patch \
45" 46"
46 47
47SRC_URI += "\ 48SRC_URI += "\