summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/glibc/glibc/CVE-2015-8779.patch
Commit message (Collapse)AuthorAgeFilesLines
* glibc: remove unused CVE patchesRobert Yang2016-04-061-262/+0
| | | | | | | | | They were CEVs and should be already in the source after upgraded. (From OE-Core rev: e8a5332d467434ee65e0f29927abb9c51b025aff) Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* glibc: CVE-2015-8779Armin Kuster2016-02-181-0/+262
A stack overflow vulnerability in the catopen function was found, causing applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (From OE-Core rev: e0f71f123147bf4f48cc90c7f26a50164ed4115e) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>