]> code.ossystems Code Review - openembedded-core.git/commit
glibc: CVE-2015-1781: resolv/nss_dns/dns-host.c buffer overflow
authorHaris Okanovic <haris.okanovic@ni.com>
Fri, 15 May 2015 21:57:11 +0000 (16:57 -0500)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Sun, 28 Jun 2015 08:41:55 +0000 (09:41 +0100)
commit54f5e2001249c117cdfc1c26631ba50bc7a155dd
tree5ef4472eef8e3029239be5b233d99612b2915daf
parente0814f2306e1404fffafc7695862c6ee542b08fa
glibc: CVE-2015-1781: resolv/nss_dns/dns-host.c buffer overflow

Backport Arjun Shankar's patch for CVE-2015-1781:

A buffer overflow flaw was found in the way glibc's gethostbyname_r() and
other related functions computed the size of a buffer when passed a
misaligned buffer as input. An attacker able to make an application call
any of these functions with a misaligned buffer could use this flaw to
crash the application or, potentially, execute arbitrary code with the
permissions of the user running the application.

https://sourceware.org/bugzilla/show_bug.cgi?id=18287

(From OE-Core rev: c0f0b6e6ef1edc0a9f9e1ceffb1cdbbef2e409c6)

Signed-off-by: Haris Okanovic <haris.okanovic@ni.com>
Reviewed-by: Ben Shelton <ben.shelton@ni.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-core/glibc/glibc/CVE-2015-1781-resolv-nss_dns-dns-host.c-buffer-overf.patch [new file with mode: 0644]
meta/recipes-core/glibc/glibc_2.21.bb