summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/glib-2.0
diff options
context:
space:
mode:
authorArmin Kuster <akuster@mvista.com>2016-02-06 15:14:42 -0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-02-07 17:23:03 +0000
commit7ff74d177cc120c3f25370d1e6e9496ac09adbc4 (patch)
treeeafc05229d3294e05d63b62eca646bdfe6a89f57 /meta/recipes-core/glib-2.0
parent9845a542a76156adb5aef6fd33ad5bc5777acf64 (diff)
downloadast2050-yocto-poky-7ff74d177cc120c3f25370d1e6e9496ac09adbc4.zip
ast2050-yocto-poky-7ff74d177cc120c3f25370d1e6e9496ac09adbc4.tar.gz
glibc: CVE-2015-8777
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable. (From OE-Core rev: 22570ba08d7c6157aec58764c73b1134405b0252) (From OE-Core rev: 9cc998978bd67bc5569cc1478f4ddee40020b929) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/glib-2.0')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud