kumquat-buildroot/package/glibc
Peter Korsgaard c87fdfb605 glibc: add upstream security patches fixing CVE-2017-1000366 (stack clash)
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH
values to manipulate the heap/stack, causing them to alias, potentially
resulting in arbitrary code execution.  Please note that additional
hardening changes have been made to glibc to prevent manipulation of stack
and heap memory but these issues are not directly exploitable, as such they
have not been given a CVE.

https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt

Patches are identical to upstream, except that the ChangeLog modifications
have been stripped.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2017-06-28 23:28:47 +02:00
..
0001-sh-Fix-building-with-gcc5-6.patch
0002-CVE-2017-1000366-Ignore-LD_LIBRARY_PATH-for-AT_SECUR.patch glibc: add upstream security patches fixing CVE-2017-1000366 (stack clash) 2017-06-28 23:28:47 +02:00
0003-ld.so-Reject-overly-long-LD_PRELOAD-path-elements.patch glibc: add upstream security patches fixing CVE-2017-1000366 (stack clash) 2017-06-28 23:28:47 +02:00
0004-ld.so-Reject-overly-long-LD_AUDIT-path-elements.patch glibc: add upstream security patches fixing CVE-2017-1000366 (stack clash) 2017-06-28 23:28:47 +02:00
Config.in
glibc.hash
glibc.mk
nsswitch.conf