CVE-2015-1593 stack ASLR integer overflow (rhbz 1192519 1192520)

This commit is contained in:
Josh Boyer 2015-02-16 14:13:37 -05:00
commit d2fb0bf021
2 changed files with 113 additions and 0 deletions

View file

@ -617,6 +617,9 @@ Patch26133: ntp-Fixup-adjtimex-freq-validation-on-32bit-systems.patch
Patch26134: perf-tools-Define-_GNU_SOURCE-on-pthread_attr_setaff.patch
#CVE-2015-1593 rhbz 1192519 1192520
Patch26135: ASLR-fix-stack-randomization-on-64-bit-systems.patch
# git clone ssh://git.fedorahosted.org/git/kernel-arm64.git, git diff master...devel
Patch30000: kernel-arm64.patch
@ -1343,6 +1346,9 @@ ApplyPatch ntp-Fixup-adjtimex-freq-validation-on-32bit-systems.patch
ApplyPatch perf-tools-Define-_GNU_SOURCE-on-pthread_attr_setaff.patch
#CVE-2015-1593 rhbz 1192519 1192520
ApplyPatch ASLR-fix-stack-randomization-on-64-bit-systems.patch
%if 0%{?aarch64patches}
ApplyPatch kernel-arm64.patch
%ifnarch aarch64 # this is stupid, but i want to notice before secondary koji does.
@ -2209,6 +2215,9 @@ fi
# ||----w |
# || ||
%changelog
* Mon Feb 16 2015 Josh Boyer <jwboyer@fedoraproject.org>
- CVE-2015-1593 stack ASLR integer overflow (rhbz 1192519 1192520)
* Mon Feb 16 2015 Peter Robinson <pbrobinson@fedoraproject.org>
- Minor updates for ARMv7/ARM64