aboutsummaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/glibc/glibc/CVE-2015-9761_1.patch
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2016-01-22 20:19:24 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-02-18 07:37:26 +0000
commite0f71f123147bf4f48cc90c7f26a50164ed4115e (patch)
treebe8517e4c9782445f1b9da5fd93f6763d6c8587d /meta/recipes-core/glibc/glibc/CVE-2015-9761_1.patch
parentbc51411d2edda908cbef733066d78a986dfec0c0 (diff)
downloadopenembedded-core-contrib-e0f71f123147bf4f48cc90c7f26a50164ed4115e.tar.gz
glibc: CVE-2015-8779
A stack overflow vulnerability in the catopen function was found, causing applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/glibc/glibc/CVE-2015-9761_1.patch')
0 files changed, 0 insertions, 0 deletions