grep: fix for CVE-2012-5667
authorMing Liu <ming.liu@windriver.com>
Wed, 15 May 2013 05:56:50 +0000 (05:56 +0000)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 30 May 2013 19:59:11 +0000 (20:59 +0100)
commit7c14f4e453f943be75929f1c2550199ce04ab4c7
tree122d76947d62281eddd582b8c6b1cc45a43feb9e
parentf1e8509ec78cdb7d990514fd5cc5f8d6da2735d4
grep: fix for CVE-2012-5667

Multiple integer overflows in GNU Grep before 2.11 might allow
context-dependent attackers to execute arbitrary code via vectors
involving a long input line that triggers a heap-based buffer overflow.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5667

(From OE-Core rev: 7dd4d0178e2b057f76cd2b0b6fe8402f8c1ab23d)

Signed-off-by: Ming Liu <ming.liu@windriver.com>
Signed-off-by: Mark Hatle <mark.hatle@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-extended/grep/grep-2.5.1a/grep-CVE-2012-5667.patch [new file with mode: 0644]
meta/recipes-extended/grep/grep_2.5.1a.bb