diff options
| author | yanjun.zhu <yanjun.zhu@windriver.com> | 2014-03-28 17:43:37 +0800 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2014-03-30 10:10:32 +0100 |
| commit | 6a3cadea0ce3f26306389f19121876378cf8925b (patch) | |
| tree | a656e6e7e3b67297d38cf8ac661fa86ca4751403 /scripts/runqemu-extract-sdk | |
| parent | c4c31eb76170ee4d7cb436954b35b27971a46e84 (diff) | |
| download | poky-6a3cadea0ce3f26306389f19121876378cf8925b.tar.gz | |
nss-3.15.1: fix CVE-2013-1741
Integer overflow in Mozilla Network Security Services (NSS)
3.15 before 3.15.3 allows remote attackers to cause a denial
of service or possibly have unspecified other impact via a
large size value.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1741
(From OE-Core rev: b666d173ff0ba213bf81e2c035a605a28e5395ea)
Signed-off-by: yanjun.zhu <yanjun.zhu@windriver.com>
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/runqemu-extract-sdk')
0 files changed, 0 insertions, 0 deletions
