diff options
author | Li Zhou <li.zhou@windriver.com> | 2017-02-13 10:53:24 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2017-02-15 20:06:44 -0800 |
commit | 1b2857a781b6666feaf5d3c91dc02ac263d0c4f6 (patch) | |
tree | bb7a01c901c1601be9514130d451730f2ec2b959 /meta/recipes-extended/bash/bash_4.3.30.bb | |
parent | 70907e352e62c45566b07c4fca1d116ca8d1bbe5 (diff) | |
download | poky-1b2857a781b6666feaf5d3c91dc02ac263d0c4f6.tar.gz |
bash: fix CVE-2016-9401
popd in bash might allow local users to bypass the restricted shell
and cause a use-after-free via a crafted address.
Porting patch from <https://ftp.gnu.org/pub/gnu/bash/bash-4.4-patches/
bash44-006> to solve CVE-2016-9401.
(From OE-Core rev: 6987b317d5ce8dc50a37ebba395aa8424bec358c)
Signed-off-by: Li Zhou <li.zhou@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/bash/bash_4.3.30.bb')
-rw-r--r-- | meta/recipes-extended/bash/bash_4.3.30.bb | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-extended/bash/bash_4.3.30.bb b/meta/recipes-extended/bash/bash_4.3.30.bb index 765562fbdd..e398e87b60 100644 --- a/meta/recipes-extended/bash/bash_4.3.30.bb +++ b/meta/recipes-extended/bash/bash_4.3.30.bb | |||
@@ -30,6 +30,7 @@ SRC_URI = "${GNU_MIRROR}/bash/${BP}.tar.gz;name=tarball \ | |||
30 | file://fix-run-builtins.patch \ | 30 | file://fix-run-builtins.patch \ |
31 | file://0001-help-fix-printf-format-security-warning.patch \ | 31 | file://0001-help-fix-printf-format-security-warning.patch \ |
32 | file://fix-run-intl.patch \ | 32 | file://fix-run-intl.patch \ |
33 | file://CVE-2016-9401.patch \ | ||
33 | " | 34 | " |
34 | 35 | ||
35 | SRC_URI[tarball.md5sum] = "a27b3ee9be83bd3ba448c0ff52b28447" | 36 | SRC_URI[tarball.md5sum] = "a27b3ee9be83bd3ba448c0ff52b28447" |