aboutsummaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/grep/grep_2.5.1a.bb
diff options
context:
space:
mode:
authorMing Liu <ming.liu@windriver.com>2013-05-15 05:56:50 +0000
committerPaul Eggleton <paul.eggleton@linux.intel.com>2013-07-08 10:30:18 +0100
commitaefb760f6bb2522e0a0fec19a6bf1a761cf3c03e (patch)
tree294d52078f44fca5416235817e476b133dd6019f /meta/recipes-extended/grep/grep_2.5.1a.bb
parent7494dcf0c33a2bf256d9f43432113425e0f5ddbe (diff)
downloadopenembedded-core-aefb760f6bb2522e0a0fec19a6bf1a761cf3c03e.tar.gz
openembedded-core-aefb760f6bb2522e0a0fec19a6bf1a761cf3c03e.tar.bz2
openembedded-core-aefb760f6bb2522e0a0fec19a6bf1a761cf3c03e.zip
grep: fix for CVE-2012-5667
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5667 (From OE-Core master rev: 7dd4d0178e2b057f76cd2b0b6fe8402f8c1ab23d) Signed-off-by: Ming Liu <ming.liu@windriver.com> Signed-off-by: Mark Hatle <mark.hatle@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/grep/grep_2.5.1a.bb')
-rw-r--r--meta/recipes-extended/grep/grep_2.5.1a.bb3
1 files changed, 2 insertions, 1 deletions
diff --git a/meta/recipes-extended/grep/grep_2.5.1a.bb b/meta/recipes-extended/grep/grep_2.5.1a.bb
index d6386edb3f..247c837004 100644
--- a/meta/recipes-extended/grep/grep_2.5.1a.bb
+++ b/meta/recipes-extended/grep/grep_2.5.1a.bb
@@ -13,7 +13,8 @@ SRC_URI = "${GNU_MIRROR}/grep/grep-${PV}.tar.bz2 \
file://gettext.patch \
file://fix64-int-to-pointer.patch \
file://Makevars \
- "
+ file://grep-CVE-2012-5667.patch \
+ "
SRC_URI[md5sum] = "52202fe462770fa6be1bb667bd6cf30c"
SRC_URI[sha256sum] = "38c8a2bb9223d1fb1b10bdd607cf44830afc92fd451ac4cd07619bf92bdd3132"