From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 58558 invoked by alias); 12 May 2016 18:25:38 -0000 Mailing-List: contact crossgcc-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: crossgcc-owner@sourceware.org Received: (qmail 58531 invoked by uid 89); 12 May 2016 18:25:37 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=0.1 required=5.0 tests=AWL,BAYES_50,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=ham version=3.3.2 spammy=crosstool-ng, crosstoolng, H*c:mimHpHrt, bryan X-HELO: m69-169.mailgun.net Received: from m69-169.mailgun.net (HELO m69-169.mailgun.net) (166.78.69.169) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Thu, 12 May 2016 18:25:27 +0000 X-Mailgun-Sid: WyIwZTgzNyIsICJjcm9zc2djY0Bzb3VyY2V3YXJlLm9yZyIsICI0MGYiXQ== Received: from github.com (Unknown [192.30.252.40]) by mxa.mailgun.org with ESMTP id 5734ca4f.7ff56cc8e840-in01; Thu, 12 May 2016 18:24:15 -0000 (UTC) Date: Thu, 12 May 2016 18:25:00 -0000 From: Bryan Hundven Reply-To: Bryan Hundven To: crossgcc@sourceware.org Message-ID: <5734ca4f361ed_58a3fb2e8b1729c848b9@hookshot-fe6-cp1-prd.iad.github.net.mail> Subject: [crosstool-ng/crosstool-ng] 9c7a41: Add patch for glibc 2.22 for CVE-2015-7547. Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="--==_mimepart_5734ca4f35daf_58a3fb2e8b1729c8476e"; charset=UTF-8 Content-Transfer-Encoding: 7bit X-IsSubscribed: yes X-SW-Source: 2016-05/txt/msg00000.txt.bz2 ----==_mimepart_5734ca4f35daf_58a3fb2e8b1729c8476e Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Content-length: 1084 Branch: refs/heads/master Home: https://github.com/crosstool-ng/crosstool-ng Commit: 9c7a41ea645e33541cb96ad9ef3a4fecc026b721 https://github.com/crosstool-ng/crosstool-ng/commit/9c7a41ea645e33541cb96ad9ef3a4fecc026b721 Author: Reser, Ben Date: 2016-03-04 (Fri, 04 Mar 2016) Changed paths: A patches/glibc/2.22/120-cve-2105-7547-getaddrinfo-stack.patch Log Message: ----------- Add patch for glibc 2.22 for CVE-2015-7547. This resolves a vulnerability related to getaddrinfo(). Commit: 176594e4a14a0c1779250db7949169cbbf00dc68 https://github.com/crosstool-ng/crosstool-ng/commit/176594e4a14a0c1779250db7949169cbbf00dc68 Author: Bryan Hundven Date: 2016-05-12 (Thu, 12 May 2016) Changed paths: A patches/glibc/2.22/120-cve-2105-7547-getaddrinfo-stack.patch Log Message: ----------- Merge pull request #366 from CDKGlobal/glibc-getaddrinfo Add patch for glibc 2.22 for CVE-2015-7547. Compare: https://github.com/crosstool-ng/crosstool-ng/compare/e1d494a2489b...176594e4a14a ----==_mimepart_5734ca4f35daf_58a3fb2e8b1729c8476e Content-Type: text/plain; charset=us-ascii Content-length: 71 -- For unsubscribe information see http://sourceware.org/lists.html#faq ----==_mimepart_5734ca4f35daf_58a3fb2e8b1729c8476e--