User Tools

Site Tools


vmware.png nfs.png tftp.png subversion.png eclipse.png logo.png tutorial.png

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

en:arm:notice_cve-2015-7547 [2016/03/07 10:40] (current)
lenz created
Line 1: Line 1:
 +++++CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflow|
 +Pengutronix has released new versions of their OSELAS Toolchains, which fix the [[https://​web.nvd.nist.gov/​view/​vuln/​detail?​vulnId=CVE-2015-7547|CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflow]] issue:
  
 +^ OSELAS version ​ ^ glibc version ​ ^
 +| [[http://​www.pengutronix.de/​oselas/​toolchain/​download/​OSELAS.Toolchain-2014.12.2.tar.bz2|2014.12.2]] | 2.20   |
 +| [[http://​www.pengutronix.de/​oselas/​toolchain/​download/​OSELAS.Toolchain-2013.12.3.tar.bz2|2013.12.3]] | 2.18   |
 +| [[http://​www.pengutronix.de/​oselas/​toolchain/​download/​OSELAS.Toolchain-2012.12.2.tar.bz2|2012.12.2]] | 2.16.0 |
 +| [[http://​www.pengutronix.de/​oselas/​toolchain/​download/​OSELAS.Toolchain-2011.11.4.tar.bz2|2011.11.4]] | 2.14.1 |
 +| [[http://​www.pengutronix.de/​oselas/​toolchain/​download/​OSELAS.Toolchain-2011.03.2.tar.bz2|2011.03.2]] | 2.13   |
 +\\
 +
 +<WRAP round important>​
 +TQ **strongly recommends** to switch your PTXdist based BSP(s) to one of the above mentioned (or later) OSELAS toolchains.
 +</​WRAP>​
 +
 +
 +<WRAP round alert>
 +**For deployed systems with network connectivity,​ an update should be taken into consideration!**
 +</​WRAP>​
 +
 +
 +
 +**__Step-by-step instructions to switch your BSP to a new toolchain__**
 +
 +
 +1. Build the new OSELAS toolchain
 +  * Choose the new toolchain version, which fits best and build it according to the [[http://​www.pengutronix.de/​software/​ptxdist/​appnotes/​AppNote_BuildingToolchain.pdf|Application Note: Building OSELAS.Toolchains()]].\\
 +
 +2. Reconfigure your BSP / platform
 +  * Move to your BSP root folder and execute<​code>​
 +ptxdist platformconfig
 +</​code>​
 +  * Navigate to<​code>​
 +architecture --> ​ toolchain -->
 +</​code>​and modify the following options<​code>​
 +(OSELAS.Toolchain-YYYY.MM.P) check for specific toolchain vendor
 +(MAJOR.MINOR[.PATCH]) check for specific glibc version
 +</​code>​to match the version information for the toochain you built in the first step.
 +  * Exit PTXdist and make sure your changes are saved.
 +  * To make PTXdist use the new toolchain for your BSP / platform execute<​code>​
 +ptxdist toolchain <path to the new toolchain>​
 +</​code>​
 +
 +3. Rebuild your BSP
 +  * For a clean rebuild execute<​code>​
 +ptxdist clean
 +ptxdist go --git
 +</​code>​
 +
 +++++

en/arm/notice_cve-2015-7547.txt · Last modified: 2016/03/07 10:40 by lenz


Disclaimer

TQ-Systems GmbH provides the Board Support Packages (BSP) free of charge. The software included in the shipment has been configured individually for the starter kits. The software is only intended to evaluate the module. The use of the Board Support Packages (BSP) is only allowed within the scope of functionality described by TQ-Systems GmbH. TQ-Systems GmbH does not accept any liability for all further changes of the Board Support Package and for any damage resulting from its use.


Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Share Alike 4.0 International
Recent changes RSS feed Valid XHTML 1.0 Valid CSS Driven by DokuWiki