summaryrefslogtreecommitdiff
path: root/target/linux/s3c24xx/patches-2.6.24/1163-Fix-possible-null-pointer-dereference-in-s3c24xx_i2c.patch
diff options
context:
space:
mode:
authorHans Dedecker <dedeckeh@gmail.com>2018-08-24 15:02:24 +0200
committerHauke Mehrtens <hauke@hauke-m.de>2018-08-27 14:14:57 +0200
commitbb7c4cff2086fffddf5cb20e40cfe4979ba1a7e6 (patch)
treee80e7a1a46bf4ba3d19d463245075205599447df /target/linux/s3c24xx/patches-2.6.24/1163-Fix-possible-null-pointer-dereference-in-s3c24xx_i2c.patch
parent8a72a868fd8000b826d5337fc413a51b01f39b5d (diff)
downloadmtk-20170518-bb7c4cff2086fffddf5cb20e40cfe4979ba1a7e6.zip
mtk-20170518-bb7c4cff2086fffddf5cb20e40cfe4979ba1a7e6.tar.gz
mtk-20170518-bb7c4cff2086fffddf5cb20e40cfe4979ba1a7e6.tar.bz2
dropbear: backport upstream fix for CVE-2018-15599
CVE description : The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase. Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
Diffstat (limited to 'target/linux/s3c24xx/patches-2.6.24/1163-Fix-possible-null-pointer-dereference-in-s3c24xx_i2c.patch')
0 files changed, 0 insertions, 0 deletions