summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/gpgme/gpgme_1.4.3.bb
diff options
context:
space:
mode:
authorHaris Okanovic <haris.okanovic@ni.com>2015-05-15 16:57:11 -0500
committerRichard Purdie <richard.purdie@linuxfoundation.org>2015-07-20 20:54:33 +0100
commit215c4d948df8d480179e842781158bcee216d9d3 (patch)
tree691363e2c8e32057835cf292a8246978d2d7958c /meta/recipes-support/gpgme/gpgme_1.4.3.bb
parent9ae261263a9cefc3eacc8dc53d023f207df6e890 (diff)
downloadpoky-215c4d948df8d480179e842781158bcee216d9d3.tar.gz
glibc: CVE-2015-1781: resolv/nss_dns/dns-host.c buffer overflow
Backport Arjun Shankar's patch for CVE-2015-1781: A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. https://sourceware.org/bugzilla/show_bug.cgi?id=18287 (From OE-Core rev: c0f0b6e6ef1edc0a9f9e1ceffb1cdbbef2e409c6) (From OE-Core rev: 96ff830b79c64d8f35c311b66906b492cbeeeb55) Signed-off-by: Haris Okanovic <haris.okanovic@ni.com> Reviewed-by: Ben Shelton <ben.shelton@ni.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-support/gpgme/gpgme_1.4.3.bb')
0 files changed, 0 insertions, 0 deletions