diff options
author | Jussi Kukkonen <jussi.kukkonen@intel.com> | 2016-04-15 15:03:17 +0300 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-04-18 16:28:22 +0100 |
commit | 74ab080d3475cfbf4ad0f6e747601c71709f2e44 (patch) | |
tree | c33acd22aec37ec41be50f18e07c6584aaa7dc6e /meta/recipes-connectivity/ppp-dialin | |
parent | d488d78db0b60433b54e0aec45624970309567b6 (diff) | |
download | poky-74ab080d3475cfbf4ad0f6e747601c71709f2e44.tar.gz |
bind: CVE-2016-2088
Duplicate EDNS COOKIE options in a response could trigger an
assertion failure: Fix with a backport.
bind as built with the oe-core recipe is not at risk: Only servers
which are built with DNS cookie support (--enable-sit) are vulnerable
to denial of service.
Fixes [YOCTO #9438]
(From OE-Core rev: da38a9840b32e80464e2938395db5c9167729f7e)
Signed-off-by: Jussi Kukkonen <jussi.kukkonen@intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/ppp-dialin')
0 files changed, 0 insertions, 0 deletions