summaryrefslogtreecommitdiff
path: root/scripts
diff options
context:
space:
mode:
authorWenzong Fan <wenzong.fan@windriver.com>2014-11-21 01:02:05 -0500
committerRichard Purdie <richard.purdie@linuxfoundation.org>2014-11-21 16:50:43 +0000
commit832aa4c5a7989636dae3068f508ab2bff8b4ab23 (patch)
tree7608d905b02bd8329dd7d294ab17254a1dac1b46 /scripts
parent06ffe5637f23f6036aaf58b40f7f9a721624cd5b (diff)
downloadopenembedded-core-832aa4c5a7989636dae3068f508ab2bff8b4ab23.tar.gz
openembedded-core-832aa4c5a7989636dae3068f508ab2bff8b4ab23.tar.bz2
openembedded-core-832aa4c5a7989636dae3068f508ab2bff8b4ab23.zip
serf: uprev to 1.3.7 for fixing CVE-2014-3504
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_- ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in- the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3504 Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts')
0 files changed, 0 insertions, 0 deletions