diff options
| author | Armin Kuster <akuster@mvista.com> | 2016-01-22 20:19:24 -0800 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-02-18 07:37:49 +0000 |
| commit | efa1ae5e458666eb66dcff93078beb4e21a00fdc (patch) | |
| tree | ec468b312e9faf1d56cfc9c91cfb946ee3bc575f /scripts/lib/scriptpath.py | |
| parent | aefe1fadfa041673360ad31901655ead70c32d75 (diff) | |
| download | poky-efa1ae5e458666eb66dcff93078beb4e21a00fdc.tar.gz | |
glibc: CVE-2015-8779
A stack overflow vulnerability in the catopen function was found, causing
applications which pass long strings to the catopen function to crash or,
potentially execute arbitrary code.
(From OE-Core rev: e0f71f123147bf4f48cc90c7f26a50164ed4115e)
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/lib/scriptpath.py')
0 files changed, 0 insertions, 0 deletions
