summaryrefslogtreecommitdiffstats
path: root/scripts/lib/checklayer/__init__.py
diff options
context:
space:
mode:
authorZhang Peng <peng.zhang1.cn@windriver.com>2025-10-27 14:09:15 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2025-10-30 11:06:28 +0000
commit78a15a355690eb0eb6943b411c6b21c1e8f6c075 (patch)
treec8e042ec17a0191c79781c26e9910c51a867719f /scripts/lib/checklayer/__init__.py
parent280f06735a693244a1d29dbad076fba0af30eb00 (diff)
downloadpoky-78a15a355690eb0eb6943b411c6b21c1e8f6c075.tar.gz
avahi: fix CVE-2024-52615
CVE-2024-52615: A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected. Reference: [https://nvd.nist.gov/vuln/detail/CVE-2024-52615] [https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g] Upstream patches: [https://github.com/avahi/avahi/commit/4e2e1ea0908d7e6ad7f38ae04fdcdf2411f8b942] (Cherry pick from commit: ec22ec26b3f40ed5e0d84d60c29d8c315cf72e23) (From OE-Core rev: 97d60090dbe96dca423af47c8d55cc53e172fb4c) Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/lib/checklayer/__init__.py')
0 files changed, 0 insertions, 0 deletions