summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/popt/popt/pkgconfig_fix.patch
diff options
context:
space:
mode:
authorRoss Burton <ross.burton@intel.com>2013-04-29 14:47:22 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2013-04-29 18:00:00 +0100
commit4a9b9004bca6d1cb58ecc8bccf7f09b38b0e6c73 (patch)
treef3f3e7eb9c869655abe5e83584c20a8d6630df0b /meta/recipes-support/popt/popt/pkgconfig_fix.patch
parenta69769e3b3e7f475e416d3a49d68dab088592851 (diff)
downloadpoky-4a9b9004bca6d1cb58ecc8bccf7f09b38b0e6c73.tar.gz
gnupg: integrate fix for CVE-2012-6085
From http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6085: "The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet." Patch taken from upstream git, which is identical in both branches. (From OE-Core rev: 44ed6605c1978325782d229d0c01329465c4c5c7) Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-support/popt/popt/pkgconfig_fix.patch')
0 files changed, 0 insertions, 0 deletions