]> code.ossystems Code Review - openembedded-core.git/commit
glibc: CVE-2015-1781: resolv/nss_dns/dns-host.c buffer overflow
authorHaris Okanovic <haris.okanovic@ni.com>
Fri, 15 May 2015 21:57:11 +0000 (16:57 -0500)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Mon, 20 Jul 2015 19:53:07 +0000 (20:53 +0100)
commit96ff830b79c64d8f35c311b66906b492cbeeeb55
tree95f130b4ed1d9df431a27e4f9cc97462cb6c9953
parente4c1374330679f84436796a3f6c50b486465a7ed
glibc: CVE-2015-1781: resolv/nss_dns/dns-host.c buffer overflow

Backport Arjun Shankar's patch for CVE-2015-1781:

A buffer overflow flaw was found in the way glibc's gethostbyname_r() and
other related functions computed the size of a buffer when passed a
misaligned buffer as input. An attacker able to make an application call
any of these functions with a misaligned buffer could use this flaw to
crash the application or, potentially, execute arbitrary code with the
permissions of the user running the application.

https://sourceware.org/bugzilla/show_bug.cgi?id=18287

(From OE-Core rev: c0f0b6e6ef1edc0a9f9e1ceffb1cdbbef2e409c6)

Signed-off-by: Haris Okanovic <haris.okanovic@ni.com>
Reviewed-by: Ben Shelton <ben.shelton@ni.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
meta/recipes-core/glibc/glibc/CVE-2015-1781-resolv-nss_dns-dns-host.c-buffer-overf.patch [new file with mode: 0644]
meta/recipes-core/glibc/glibc_2.20.bb