aboutsummaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/glibc/glibc_2.21.bb
diff options
context:
space:
mode:
authorHaris Okanovic <haris.okanovic@ni.com>2015-05-15 16:57:11 -0500
committerRichard Purdie <richard.purdie@linuxfoundation.org>2015-05-16 22:37:21 +0100
commitc0f0b6e6ef1edc0a9f9e1ceffb1cdbbef2e409c6 (patch)
treeace3396f4523421002f79e6cf5e8f0e1985a90bf /meta/recipes-core/glibc/glibc_2.21.bb
parentaa2e02a4f78d87bd466bbf92ca57147066c5367f (diff)
downloadopenembedded-core-contrib-c0f0b6e6ef1edc0a9f9e1ceffb1cdbbef2e409c6.tar.gz
glibc: CVE-2015-1781: resolv/nss_dns/dns-host.c buffer overflow
Backport Arjun Shankar's patch for CVE-2015-1781: A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application. https://sourceware.org/bugzilla/show_bug.cgi?id=18287 Signed-off-by: Haris Okanovic <haris.okanovic@ni.com> Reviewed-by: Ben Shelton <ben.shelton@ni.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/glibc/glibc_2.21.bb')
-rw-r--r--meta/recipes-core/glibc/glibc_2.21.bb4
1 files changed, 4 insertions, 0 deletions
diff --git a/meta/recipes-core/glibc/glibc_2.21.bb b/meta/recipes-core/glibc/glibc_2.21.bb
index ac8e8f8200..0c2881450b 100644
--- a/meta/recipes-core/glibc/glibc_2.21.bb
+++ b/meta/recipes-core/glibc/glibc_2.21.bb
@@ -28,6 +28,7 @@ SRC_URI = "git://sourceware.org/git/glibc.git;branch=${BRANCH} \
file://elf-Makefile-fix-a-typo.patch \
file://makesyscall.patch \
${EGLIBCPATCHES} \
+ ${CVEPATCHES} \
"
EGLIBCPATCHES = "\
file://timezone-re-written-tzselect-as-posix-sh.patch \
@@ -43,6 +44,9 @@ EGLIBCPATCHES = "\
# file://eglibc-install-pic-archives.patch \
# file://initgroups_keys.patch \
#
+CVEPATCHES = "\
+ file://CVE-2015-1781-resolv-nss_dns-dns-host.c-buffer-overf.patch \
+"
LIC_FILES_CHKSUM = "file://LICENSES;md5=e9a558e243b36d3209f380deb394b213 \
file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263 \