summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/python/python3/0001-Avoid-shebang-overflow-on-python-config.py.patch
diff options
context:
space:
mode:
authorZhang Peng <peng.zhang1.cn@windriver.com>2025-01-16 21:51:38 +0800
committerSteve Sakoman <steve@sakoman.com>2025-01-24 07:59:38 -0800
commit0d1f714793cb73f3e4a95e67e2f7d5ebd98a3462 (patch)
tree260e806dda3429d84b6b9dd1ae7ebf73d6885c66 /meta/recipes-devtools/python/python3/0001-Avoid-shebang-overflow-on-python-config.py.patch
parenta65e0b9646335de25a906954dec9826c091d1fe2 (diff)
downloadpoky-0d1f714793cb73f3e4a95e67e2f7d5ebd98a3462.tar.gz
avahi: fix CVE-2024-52616
CVE-2024-52616: A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs. Reference: [https://nvd.nist.gov/vuln/detail/CVE-2024-52616] [https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm] Upstream patches: [https://github.com/avahi/avahi/commit/f8710bdc8b29ee1176fe3bfaeabebbda1b7a79f7] (From OE-Core rev: 28de3f131b17dc4165df927060ee51f0de3ada90) Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-devtools/python/python3/0001-Avoid-shebang-overflow-on-python-config.py.patch')
0 files changed, 0 insertions, 0 deletions