e99089ce24
Backport 3 patches to fix CVE-2017-10971: In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. Reference: https://nvd.nist.gov/vuln/detail/CVE-2017-10971 (From OE-Core rev: 20428f660f2c046c63bbf63c4e4af95dac9f2b3d) (From OE-Core rev: 8c42a9508bded870d1ac018e2cfa129772983c52) Signed-off-by: Jackie Huang <jackie.huang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> |
||
---|---|---|
.. | ||
0001-configure.ac-Fix-check-for-CLOCK_MONOTONIC.patch | ||
0002-configure.ac-Fix-wayland-scanner-and-protocols-locat.patch | ||
0003-Remove-check-for-useSIGIO-option.patch | ||
0003-modesetting-Fix-16-bit-depth-bpp-mode.patch | ||
CVE-2017-10971-1.patch | ||
CVE-2017-10971-2.patch | ||
CVE-2017-10971-3.patch | ||
macro_tweak.patch | ||
musl-arm-inb-outb.patch |