diff options
author | Armin Kuster <akuster@mvista.com> | 2016-01-22 20:19:24 -0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-01-30 12:08:36 +0000 |
commit | af20e323932caba8883c91dac610e1ba2b3d4ab5 (patch) | |
tree | b41cbb37ef32dc18213c937b9d51653ae19113ef /meta/recipes-bsp/alsa-state | |
parent | 22570ba08d7c6157aec58764c73b1134405b0252 (diff) | |
download | openembedded-core-contrib-af20e323932caba8883c91dac610e1ba2b3d4ab5.tar.gz |
glibc: CVE-2015-8779
A stack overflow vulnerability in the catopen function was found, causing
applications which pass long strings to the catopen function to crash or,
potentially execute arbitrary code.
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Diffstat (limited to 'meta/recipes-bsp/alsa-state')
0 files changed, 0 insertions, 0 deletions