diff options
author | Ovidiu Panait <ovidiu.panait@windriver.com> | 2020-07-14 11:20:35 +0300 |
---|---|---|
committer | Armin Kuster <akuster808@gmail.com> | 2020-07-14 21:37:09 -0700 |
commit | 5d4023848fabc2e0bf924b2f8def06f450d15ec0 (patch) | |
tree | c3c5d9c89961483e30751b29942abd6463afc5b1 /meta-networking/recipes-netkit/netkit-telnet/files/0001-telnetd-utility.c-Fix-buffer-overflow-in-netoprintf.patch | |
parent | 0e0b4892f50808b87223a1e8dbcd13d4e16368cf (diff) | |
download | meta-openembedded-5d4023848fabc2e0bf924b2f8def06f450d15ec0.tar.gz |
nss: Fix CVE-2020-12399
Master (nss version 3.54) is not affected by this issue. This is a backport
from nss version 3.54.
NSS has shown timing differences when performing DSA signatures, which was
exploitable and could eventually leak private keys. This vulnerability affects
Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.
Upstream patch:
https://hg.mozilla.org/projects/nss/rev/daa823a4a29bcef0fec33a379ec83857429aea2e
Signed-off-by: Ovidiu Panait <ovidiu.panait@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-networking/recipes-netkit/netkit-telnet/files/0001-telnetd-utility.c-Fix-buffer-overflow-in-netoprintf.patch')
0 files changed, 0 insertions, 0 deletions