summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/tar/tar-1.26/remove-gets.patch
diff options
context:
space:
mode:
authorYue Tao <Yue.Tao@windriver.com>2014-05-19 15:00:38 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2014-06-10 17:36:44 +0100
commit033f5a5fa50bc8f9a9b9ae2da7201aff58358313 (patch)
treee8dc3afeefb6d62faf7911d1a1db57ded996bed8 /meta/recipes-extended/tar/tar-1.26/remove-gets.patch
parentefdb05cf3184125f49778c846104eb5f05863a1c (diff)
downloadpoky-033f5a5fa50bc8f9a9b9ae2da7201aff58358313.tar.gz
openssl: fix for CVE-2010-5298
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5298 (From OE-Core master rev: 751f81ed8dc488c500837aeb3eb41ebf3237e10b) (From OE-Core rev: bf2d5380808bb3e0ad470e7853e3ae20617bbfd6) Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/tar/tar-1.26/remove-gets.patch')
0 files changed, 0 insertions, 0 deletions