diff options
author | Armin Kuster <akuster808@gmail.com> | 2021-09-10 19:59:17 -0700 |
---|---|---|
committer | Anuj Mittal <anuj.mittal@intel.com> | 2021-09-15 10:05:49 +0800 |
commit | 2b1a8731359d990b3a8eec6403d689144a516207 (patch) | |
tree | 90c66a8fd17b2357a53ea184072104f36468eb7c /meta/recipes-extended/mc/files/CVE-2021-36370.patch | |
parent | b0c311d784e939342c4bfa771790a0113fc7a704 (diff) | |
download | openembedded-core-contrib-2b1a8731359d990b3a8eec6403d689144a516207.tar.gz |
apr: Security fix for CVE-2021-35940
An out-of-bounds array read in the apr_time_exp*() functions was fixed in the
Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The fix for this issue
was not carried forward to the APR 1.7.x branch, and hence version 1.7.0 regressed
compared to 1.6.3 and is vulnerable to the same issue.
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit d52b78c75323fb254b5d0216f9183573b353abd3)
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Diffstat (limited to 'meta/recipes-extended/mc/files/CVE-2021-36370.patch')
0 files changed, 0 insertions, 0 deletions