summaryrefslogtreecommitdiffstats
path: root/meta-networking/recipes-netkit/netkit-telnet/files/0001-telnetd-utility.c-Fix-buffer-overflow-in-netoprintf.patch
diff options
context:
space:
mode:
authorOvidiu Panait <ovidiu.panait@windriver.com>2020-07-14 11:20:35 +0300
committerArmin Kuster <akuster808@gmail.com>2020-07-14 21:37:09 -0700
commit5d4023848fabc2e0bf924b2f8def06f450d15ec0 (patch)
treec3c5d9c89961483e30751b29942abd6463afc5b1 /meta-networking/recipes-netkit/netkit-telnet/files/0001-telnetd-utility.c-Fix-buffer-overflow-in-netoprintf.patch
parent0e0b4892f50808b87223a1e8dbcd13d4e16368cf (diff)
downloadmeta-openembedded-5d4023848fabc2e0bf924b2f8def06f450d15ec0.tar.gz
nss: Fix CVE-2020-12399
Master (nss version 3.54) is not affected by this issue. This is a backport from nss version 3.54. NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9. Upstream patch: https://hg.mozilla.org/projects/nss/rev/daa823a4a29bcef0fec33a379ec83857429aea2e Signed-off-by: Ovidiu Panait <ovidiu.panait@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-networking/recipes-netkit/netkit-telnet/files/0001-telnetd-utility.c-Fix-buffer-overflow-in-netoprintf.patch')
0 files changed, 0 insertions, 0 deletions