diff options
| author | Soumya Sambu <soumya.sambu@windriver.com> | 2025-09-26 17:14:28 +0530 |
|---|---|---|
| committer | Gyorgy Sarvari <skandigraun@gmail.com> | 2025-09-26 15:01:57 +0200 |
| commit | 0a0ba8f46745c8743bb1979e3250aa1fa932f643 (patch) | |
| tree | 8ef9f8d94e3f6b80e25f9e3b019b4ac17a40cd8d /meta-python/recipes-devtools/python/python-scrypt/0001-py-scrypt-remove-the-hard-coded-include-paths.patch | |
| parent | 8f65fa4e2eb7598384d5d1d1be07beef10c0b4e8 (diff) | |
| download | meta-openembedded-0a0ba8f46745c8743bb1979e3250aa1fa932f643.tar.gz | |
iperf3: Fix CVE-2023-7250
A flaw was found in iperf, a utility for testing network performance using TCP, UDP,
and SCTP. A malicious or malfunctioning client can send less than the expected amount
of data to the iperf server, which can cause the server to hang indefinitely waiting
for the remainder or until the connection gets closed. This will prevent other
connections to the server, leading to a denial of service.
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-7250
https://security-tracker.debian.org/tracker/CVE-2023-7250
Upstream patch:
https://github.com/esnet/iperf/commit/5e3704dd850a5df2fb2b3eafd117963d017d07b4
Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python-scrypt/0001-py-scrypt-remove-the-hard-coded-include-paths.patch')
0 files changed, 0 insertions, 0 deletions
