d426450b0b
acpid.c in acpid before 2.0.9 does not properly handle a situation in which a process has connected to acpid.socket but is not reading any data, which allows local users to cause a denial of service (daemon hang) via a crafted application that performs a connect system call but no read system calls. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1159 (From OE-Core master rev: e7b2b84dece29d16b8f05daf962b69e78dd64cb3) (From OE-Core rev: 56f1ea2cd8eeb189ee345f215deb5867a77cd0a1) Signed-off-by: Yue Tao <yue.tao@windriver.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Mark Hatle <mark.hatle@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> |
||
---|---|---|
.. | ||
acpid | ||
acpid.inc | ||
acpid_1.0.10.bb |