summaryrefslogtreecommitdiffstats
path: root/scripts/lib/devtool/runqemu.py
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2016-01-22 20:13:00 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-01-30 12:13:08 +0000
commita5a965d4090112143b3da01c0d7db1b7f3e4043c (patch)
treec35fd58f670c13a9cacfab7a5e1643624633da20 /scripts/lib/devtool/runqemu.py
parent2fb7ee2628e23d7efc9b041bb9daae7c4a8de541 (diff)
downloadpoky-a5a965d4090112143b3da01c0d7db1b7f3e4043c.tar.gz
glibc: CVE-2015-8777.patch
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable. (From OE-Core rev: 22570ba08d7c6157aec58764c73b1134405b0252) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/lib/devtool/runqemu.py')
0 files changed, 0 insertions, 0 deletions