diff options
author | Armin Kuster <akuster@mvista.com> | 2016-01-22 20:19:24 -0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-01-30 12:13:08 +0000 |
commit | e10ec6f3be71dffb3babe7ed5c03f01df9746094 (patch) | |
tree | 8831749d616f8192ba78a589afacf3474391647b /meta/recipes-core/systemd | |
parent | a5a965d4090112143b3da01c0d7db1b7f3e4043c (diff) | |
download | poky-e10ec6f3be71dffb3babe7ed5c03f01df9746094.tar.gz |
glibc: CVE-2015-8779
A stack overflow vulnerability in the catopen function was found, causing
applications which pass long strings to the catopen function to crash or,
potentially execute arbitrary code.
(From OE-Core rev: af20e323932caba8883c91dac610e1ba2b3d4ab5)
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/systemd')
0 files changed, 0 insertions, 0 deletions