bash: fix CVE-2014-6271
authorRoss Burton <ross.burton@intel.com>
Thu, 25 Sep 2014 23:05:18 +0000 (00:05 +0100)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Mon, 29 Sep 2014 11:12:46 +0000 (12:12 +0100)
commit3a829d50b63e78c42041aafb1c52b0be9516c9e0
treed432382118af58362e1e8ebfa05225c4ea474e17
parent6199ac8ae0f374916aba01283a01c5201a53fba6
bash: fix CVE-2014-6271

CVE-2014-6271 aka ShellShock.

"GNU Bash through 4.3 processes trailing strings after function definitions in
the values of environment variables, which allows remote attackers to execute
arbitrary code via a crafted environment."

(From OE-Core rev: 798d833c9d4bd9ab287fa86b85b4d5f128170ed3)

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-extended/bash/bash-3.2.48/cve-2014-6271.patch [new file with mode: 0644]
meta/recipes-extended/bash/bash/cve-2014-6271.patch [new file with mode: 0644]
meta/recipes-extended/bash/bash_3.2.48.bb
meta/recipes-extended/bash/bash_4.3.bb