Important Notes
CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflow
Pengutronix has released new versions of their OSELAS Toolchains, which fix the CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflow issue:
OSELAS version | glibc version |
---|---|
2014.12.2 | 2.20 |
2013.12.3 | 2.18 |
2012.12.2 | 2.16.0 |
2011.11.4 | 2.14.1 |
2011.03.2 | 2.13 |
TQ strongly recommends to switch your PTXdist based BSP(s) to one of the above mentioned (or later) OSELAS toolchains.
For deployed systems with network connectivity, an update should be taken into consideration!
Step-by-step instructions to switch your BSP to a new toolchain
1. Build the new OSELAS toolchain
2. Reconfigure your BSP / platform
ptxdist platformconfig
architecture --> toolchain -->
and modify the following options
(OSELAS.Toolchain-YYYY.MM.P) check for specific toolchain vendor (MAJOR.MINOR[.PATCH]) check for specific glibc version
to match the version information for the toochain you built in the first step.
ptxdist toolchain <path to the new toolchain>
3. Rebuild your BSP
ptxdist clean ptxdist go --git