diff options
author | Roy Li <rongqing.li@windriver.com> | 2015-04-28 14:22:54 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2015-06-28 09:44:06 +0100 |
commit | def79f5f31bdbe53696651769beb79040b81f1dc (patch) | |
tree | d92850eb91e9dd884b22eb96cc0614cfad2feec1 /meta/recipes-devtools/gcc/gcc-configure-common.inc | |
parent | 7620a4ad38a85ccb8e0225605205874e74e6d7b8 (diff) | |
download | ast2050-yocto-poky-def79f5f31bdbe53696651769beb79040b81f1dc.zip ast2050-yocto-poky-def79f5f31bdbe53696651769beb79040b81f1dc.tar.gz |
elfutils: Security Advisory - CVE-2015-0255
Directory traversal vulnerability in the read_long_names function in
libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers
to write to arbitrary files to the root directory via a / (slash) in a
crafted archive, as demonstrated using the ar program.
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9447
(From OE-Core rev: 4a65944b89a76f18c8ff6e148f17508882d387cf)
(From OE-Core rev: 5eda84a62201461b9c69498ec35585d2c8142dec)
Signed-off-by: Roy Li <rongqing.li@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/gcc/gcc-configure-common.inc')
0 files changed, 0 insertions, 0 deletions