summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-sqlparse/0001-sqlparse-change-shebang-to-python3.patch
diff options
context:
space:
mode:
authorUrade, Yogita t.mo <Yogita.Urade@windriver.com>2023-06-09 14:35:05 +0000
committerArmin Kuster <akuster808@gmail.com>2023-06-15 08:10:11 -0400
commitfec772d55fa6003e9a87b3b2413905ff57f077fb (patch)
treee0e4c5026e6ba6c9680c5b32eec6b0f2a454f461 /meta-python/recipes-devtools/python/python3-sqlparse/0001-sqlparse-change-shebang-to-python3.patch
parent5fb3554563dd46c731fd21b38923b6b7f3554686 (diff)
downloadmeta-openembedded-fec772d55fa6003e9a87b3b2413905ff57f077fb.tar.gz
c-ares: fix CVE-2023-32067
c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1. References: https://nvd.nist.gov/vuln/detail/CVE-2023-32067 https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-sqlparse/0001-sqlparse-change-shebang-to-python3.patch')
0 files changed, 0 insertions, 0 deletions