diff options
author | Rahul Taya <Rahul.Taya@kpit.com> | 2020-07-30 14:11:51 +0530 |
---|---|---|
committer | Anuj Mittal <anuj.mittal@intel.com> | 2020-08-10 08:52:49 +0800 |
commit | 3f536edfa56ce3f93223c23ed48427a0c24ede1a (patch) | |
tree | 055935b7789fe6d0409f3bef5dc69b78565fbcf6 /meta/recipes-devtools | |
parent | 0e8526ce8694ebd6988c3804e4d2ccf39cda90c7 (diff) | |
download | openembedded-core-contrib-stable/zeus-next.tar.gz |
libpcre: Add fix for CVE-2020-14155stable/zeus-next
Added below patch in libpcre
CVE-2020-14155.patch
This patch fixes below error:
PCRE could allow a remote attacker to execute arbitrary
code on the system, caused by an integer overflow in
libpcre via a large number after (?C substring.
By sending a request with a large number, an attacker
can execute arbitrary code on the system or
cause the application to crash.
Tested-by: Rahul Taya <Rahul.Taya@kpit.com>
Signed-off-by: Saloni Jain <Saloni.Jain@kpit.com>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Diffstat (limited to 'meta/recipes-devtools')
0 files changed, 0 insertions, 0 deletions