CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflow
Pengutronix has released new versions of their OSELAS Toolchains, which fix the CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflow issue:
OSELAS version | glibc version |
---|---|
2014.12.2 | 2.20 |
2013.12.3 | 2.18 |
2012.12.2 | 2.16.0 |
2011.11.4 | 2.14.1 |
2011.03.2 | 2.13 |
TQ strongly recommends to switch your PTXdist based BSP(s) to one of the above mentioned (or later) OSELAS toolchains.
For deployed systems with network connectivity, an update should be taken into consideration!
Step-by-step instructions to switch your BSP to a new toolchain
1. Build the new OSELAS toolchain
- Choose the new toolchain version, which fits best and build it according to the Application Note: Building OSELAS.Toolchains().
2. Reconfigure your BSP / platform
- Move to your BSP root folder and execute
ptxdist platformconfig
- Navigate to
architecture --> toolchain -->
and modify the following options
(OSELAS.Toolchain-YYYY.MM.P) check for specific toolchain vendor (MAJOR.MINOR[.PATCH]) check for specific glibc version
to match the version information for the toochain you built in the first step.
- Exit PTXdist and make sure your changes are saved.
- To make PTXdist use the new toolchain for your BSP / platform execute
ptxdist toolchain <path to the new toolchain>
3. Rebuild your BSP
- For a clean rebuild execute
ptxdist clean ptxdist go --git