summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/glibc/glibc_2.22.bb
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2016-01-22 20:19:24 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-02-18 07:37:49 +0000
commitefa1ae5e458666eb66dcff93078beb4e21a00fdc (patch)
treeec468b312e9faf1d56cfc9c91cfb946ee3bc575f /meta/recipes-core/glibc/glibc_2.22.bb
parentaefe1fadfa041673360ad31901655ead70c32d75 (diff)
downloadpoky-efa1ae5e458666eb66dcff93078beb4e21a00fdc.tar.gz
glibc: CVE-2015-8779
A stack overflow vulnerability in the catopen function was found, causing applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (From OE-Core rev: e0f71f123147bf4f48cc90c7f26a50164ed4115e) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/glibc/glibc_2.22.bb')
-rw-r--r--meta/recipes-core/glibc/glibc_2.22.bb1
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-core/glibc/glibc_2.22.bb b/meta/recipes-core/glibc/glibc_2.22.bb
index c828310586..336463a5c3 100644
--- a/meta/recipes-core/glibc/glibc_2.22.bb
+++ b/meta/recipes-core/glibc/glibc_2.22.bb
@@ -44,6 +44,7 @@ SRC_URI = "${GLIBC_GIT_URI};branch=${SRCBRANCH};name=glibc \
44 file://strcoll-Remove-incorrect-STRDIFF-based-optimization-.patch \ 44 file://strcoll-Remove-incorrect-STRDIFF-based-optimization-.patch \
45 file://0029-fix-getmntent-empty-lines.patch \ 45 file://0029-fix-getmntent-empty-lines.patch \
46 file://CVE-2015-8777.patch \ 46 file://CVE-2015-8777.patch \
47 file://CVE-2015-8779.patch \
47" 48"
48 49
49SRC_URI += "\ 50SRC_URI += "\