summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python-scrypt/0001-py-scrypt-remove-the-hard-coded-include-paths.patch
diff options
context:
space:
mode:
authorSoumya Sambu <soumya.sambu@windriver.com>2025-09-26 17:14:28 +0530
committerGyorgy Sarvari <skandigraun@gmail.com>2025-09-26 15:01:57 +0200
commit0a0ba8f46745c8743bb1979e3250aa1fa932f643 (patch)
tree8ef9f8d94e3f6b80e25f9e3b019b4ac17a40cd8d /meta-python/recipes-devtools/python/python-scrypt/0001-py-scrypt-remove-the-hard-coded-include-paths.patch
parent8f65fa4e2eb7598384d5d1d1be07beef10c0b4e8 (diff)
downloadmeta-openembedded-0a0ba8f46745c8743bb1979e3250aa1fa932f643.tar.gz
iperf3: Fix CVE-2023-7250
A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service. References: https://nvd.nist.gov/vuln/detail/CVE-2023-7250 https://security-tracker.debian.org/tracker/CVE-2023-7250 Upstream patch: https://github.com/esnet/iperf/commit/5e3704dd850a5df2fb2b3eafd117963d017d07b4 Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com> Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python-scrypt/0001-py-scrypt-remove-the-hard-coded-include-paths.patch')
0 files changed, 0 insertions, 0 deletions