generic-poky/meta/recipes-support/gnutls/libtasn1
Yue Tao cb4fd41504 libtasn1: CVE-2017-10790
The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes
a NULL pointer dereference and crash when reading crafted input that
triggers assignment of a NULL value within an asn1_node structure. It
may lead to a remote denial of service attack.

References:
https://nvd.nist.gov/vuln/detail/CVE-2017-10790
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;
h=d8d805e1f2e6799bb2dff4871a8598dc83088a39

(From OE-Core rev: 6176151625c971de031e14c97601ffd75a29772f)

(From OE-Core rev: 649f78102222ec156d490968c13d3222379a1956)

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2017-09-11 22:15:58 +01:00
..
0001-stdint.m4-reintroduce-GNULIB_OVERRIDES_WINT_T-check.patch libtasn1: Upgrade 4.9 -> 4.10 2017-02-05 09:22:16 +00:00
CVE-2017-10790.patch libtasn1: CVE-2017-10790 2017-09-11 22:15:58 +01:00
dont-depend-on-help2man.patch libtasn1: remove help2man dependency 2013-01-07 13:50:41 +00:00