diff options
| author | Ross Burton <ross.burton@intel.com> | 2014-09-26 00:05:18 +0100 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2014-09-29 12:12:46 +0100 |
| commit | 215e7b98ae4865b0f24b1cb9c53161fef170b270 (patch) | |
| tree | f42d68da7db2af51636641f6552690b4a6d2df61 /documentation/ref-manual/examples/hello-single | |
| parent | cf9fbf53b933d627bab71cc3f3dbb50a6bca3ec1 (diff) | |
| download | poky-215e7b98ae4865b0f24b1cb9c53161fef170b270.tar.gz | |
bash: fix CVE-2014-6271
CVE-2014-6271 aka ShellShock.
"GNU Bash through 4.3 processes trailing strings after function definitions in
the values of environment variables, which allows remote attackers to execute
arbitrary code via a crafted environment."
(From OE-Core rev: 798d833c9d4bd9ab287fa86b85b4d5f128170ed3)
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'documentation/ref-manual/examples/hello-single')
0 files changed, 0 insertions, 0 deletions
