summaryrefslogtreecommitdiffstats
path: root/package/php-imagick/php-imagick.hash
diff options
context:
space:
mode:
authorPeter Korsgaard <peter@korsgaard.com>2017-05-30 15:03:24 +0200
committerThomas Petazzoni <thomas.petazzoni@free-electrons.com>2017-05-30 23:37:26 +0200
commite43efb9b654ae19e9e47ae5828d9e99b044f37c9 (patch)
tree86c436401a49246396805ed2ed0d240a875a9ead /package/php-imagick/php-imagick.hash
parente1c2c432a914e1da9022f370906c06d139e41aee (diff)
downloadbuildroot-e43efb9b654ae19e9e47ae5828d9e99b044f37c9.tar.gz
buildroot-e43efb9b654ae19e9e47ae5828d9e99b044f37c9.zip
strongswan: add upstream security patches
Fixes: CVE-2017-9022 - RSA public keys passed to the gmp plugin aren't validated sufficiently before attempting signature verification, so that invalid input might lead to a floating point exception and crash of the process. A certificate with an appropriately prepared public key sent by a peer could be used for a denial-of-service attack. https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-%28cve-2017-9022%29.html CVE-2017-9023 - ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when parsing X.509 certificates with extensions that use such types. This could lead to infinite looping of the thread parsing a specifically crafted certificate. https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-%28cve-2017-9023%29.html Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Diffstat (limited to 'package/php-imagick/php-imagick.hash')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud