summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python-pygpgme/0003-handle-generic-error-when-no-passphrase-callback-pre.patch
diff options
context:
space:
mode:
authorPeter Marko <peter.marko@siemens.com>2023-03-14 20:49:28 +0100
committerArmin Kuster <akuster808@gmail.com>2023-03-16 08:13:19 -0400
commitfd298f6e6b029302e3988a3898dc76a74e5688e6 (patch)
tree48e08fdfa4f12cc1570b6c8f0ae97f10140baf9f /meta-python/recipes-devtools/python/python-pygpgme/0003-handle-generic-error-when-no-passphrase-callback-pre.patch
parentc401890cfe73bb437d29ccaadb7fd13cff08d644 (diff)
downloadmeta-openembedded-fd298f6e6b029302e3988a3898dc76a74e5688e6.tar.gz
ntp: whitelist CVE-2019-11331
Links from https://nvd.nist.gov/vuln/detail/CVE-2019-11331 lead to conclusion that this is how icurrent ntp protocol is designed. New RFC is propsed for future but it will not be compatible with current one. See https://support.f5.com/csp/article/K09940637 Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python-pygpgme/0003-handle-generic-error-when-no-passphrase-callback-pre.patch')
0 files changed, 0 insertions, 0 deletions