summaryrefslogtreecommitdiffstats
path: root/meta/lib/rootfspostcommands.py
diff options
context:
space:
mode:
authorJiaying Song <jiaying.song.cn@windriver.com>2025-08-20 17:13:44 +0800
committerSteve Sakoman <steve@sakoman.com>2025-08-29 08:33:32 -0700
commitd6f3ce165174cd09f4af6c055d4974a15d9630ae (patch)
tree1cd09bd43d0e5ac4a470954acfd0f7d8e74b3bf7 /meta/lib/rootfspostcommands.py
parent6b05a9736953089e1f900a1c49cca37404737cfd (diff)
downloadpoky-d6f3ce165174cd09f4af6c055d4974a15d9630ae.tar.gz
openssl: fix CVE-2023-50781
A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data. The CVE-2023-50781 in M2Crypto is addressed by modifying OpenSSL because M2Crypto relies on OpenSSL for its cryptographic operations.The issue stems from OpenSSL’s RSA PKCS#1 v1.5 padding verification being vulnerable to Bleichenbacher-type attacks.To mitigate this, OpenSSL introduced an implicit rejection mechanism in the RSA PKCS#1 v1.5 padding.Therefore, resolving the vulnerability requires changes within OpenSSL itself to ensure M2Crypto’s security. References: https://nvd.nist.gov/vuln/detail/CVE-2023-50781 https://github.com/openssl/openssl/pull/13817/commits https://todo.sr.ht/~mcepl/m2crypto/342?__goaway_challenge=meta-refresh&__goaway_id=45a03d6accb7b343867110db1f7fb334 (From OE-Core rev: d24c4923d6f7a25bdc3ec5d4ac6bee32bb0bae88) Signed-off-by: Jiaying Song <jiaying.song.cn@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/lib/rootfspostcommands.py')
0 files changed, 0 insertions, 0 deletions