diff options
author | Hongxu Jia <hongxu.jia@windriver.com> | 2019-06-16 22:17:41 -0400 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2019-06-18 11:23:48 +0100 |
commit | 57588174445781f0c1ca83faa4680612d728ff64 (patch) | |
tree | 5f49a21feec330854bbe173d823ea73e38c78f46 /meta/recipes-kernel | |
parent | 27d60c5a812774f0e5c43161e5b514c4aebdf301 (diff) | |
download | poky-57588174445781f0c1ca83faa4680612d728ff64.tar.gz |
openssh: fix potential signed overflow in pointer arithmatic
Pointer arithmatic results in implementation defined signed integer
type, so that 'd - dst’ in strlcat may trigger signed overflow if
pointer ‘d’ is near 0x7fffffff in 32 bits system. In case of ompilation
by gcc or clang with -ftrapv option, the overflow would generate
program abort.
(From OE-Core rev: 1c4b8d797c76a08ebd1658066e9d32972b6abe58)
Signed-off-by: hguo3 <heng.guo@windriver.com>
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-kernel')
0 files changed, 0 insertions, 0 deletions