summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/curl
diff options
context:
space:
mode:
authorZhixiong Chi <zhixiong.chi@windriver.com>2017-04-20 15:04:54 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-05-12 08:49:30 +0100
commit7dd6aa1a4bf6e9fc8a1998cda6ac5397bb5cd5cb (patch)
tree06b7c69f5ee223c53e5e5384cde292fef8504264 /meta/recipes-support/curl
parent841da7e566799d6a2f2c6c7f3de885d328e8a972 (diff)
downloadopenembedded-core-7dd6aa1a4bf6e9fc8a1998cda6ac5397bb5cd5cb.tar.gz
bash: CVE-2016-0634
A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string. Porting patch from <https://ftp.gnu.org/gnu/bash/bash-4.3-patches/ bash43-047> to solve CVE-2016-0634 CVE: CVE-2016-0634 Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com>
Diffstat (limited to 'meta/recipes-support/curl')
0 files changed, 0 insertions, 0 deletions