summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/openssh
diff options
context:
space:
mode:
authorSteve Sakoman <steve@sakoman.com>2022-02-07 06:33:32 -1000
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-02-23 23:43:42 +0000
commit9c8b42009673796bd6e7c553203346576c1723e2 (patch)
treeea539851812912963fd761fbec6e136f814868cb /meta/recipes-connectivity/openssh
parent17023dee9baeb88791373345c130b886a942296f (diff)
downloadpoky-9c8b42009673796bd6e7c553203346576c1723e2.tar.gz
connman: fix CVE-2022-23098
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received. Backport patch from: https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=d8708b85c1e8fe25af7803e8a20cf20e7201d8a4 CVE: CVE-2022-23098 (From OE-Core rev: af56acf66b4196c961a20ec59faa580cc3e3ee23) Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/openssh')
0 files changed, 0 insertions, 0 deletions