On 05/07/2015 06:19 PM, Haris Okanovic wrote:
Backport Paul Pluzhnikov's glibc patch for CVE-2015-1472:
Under certain conditions wscanf can allocate too little memory for the
to-be-scanned arguments and overflow the allocated buffer. The
implementation now correctly computes the required buffer size when
using malloc.
https://sourceware.org/bugzilla/show_bug.cgi?id=16618
Signed-off-by: Haris Okanovic <[email protected]>
Signed-off-by: Ken Sharp <[email protected]>
Reviewed-by: Rich Tollerton <[email protected]>
---
Note that this patch is to apply to the Dizzy branch of
openembedded-core (glibc 2.20). It might cleanly apply to other branches
also using glibc 2.20, but I've only tested with Dizzy.
CVE-2015-1472 is fixed in glibc 2.21 and later.
Thanks,
Haris
--
_______________________________________________
Openembedded-core mailing list
[email protected]
http://lists.openembedded.org/mailman/listinfo/openembedded-core