diff options
author | Yue Tao <Yue.Tao@windriver.com> | 2014-05-19 15:00:38 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2014-06-10 17:36:44 +0100 |
commit | 033f5a5fa50bc8f9a9b9ae2da7201aff58358313 (patch) | |
tree | e8dc3afeefb6d62faf7911d1a1db57ded996bed8 /meta/recipes-extended/tar/tar-1.26/remove-gets.patch | |
parent | efdb05cf3184125f49778c846104eb5f05863a1c (diff) | |
download | poky-033f5a5fa50bc8f9a9b9ae2da7201aff58358313.tar.gz |
openssl: fix for CVE-2010-5298
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL
through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote
attackers to inject data across sessions or cause a denial of service
(use-after-free and parsing error) via an SSL connection in a
multithreaded environment.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5298
(From OE-Core master rev: 751f81ed8dc488c500837aeb3eb41ebf3237e10b)
(From OE-Core rev: bf2d5380808bb3e0ad470e7853e3ae20617bbfd6)
Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Roy Li <rongqing.li@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/tar/tar-1.26/remove-gets.patch')
0 files changed, 0 insertions, 0 deletions