summaryrefslogtreecommitdiffstats
path: root/package/python-enum34/python-enum34.mk
diff options
context:
space:
mode:
authorPeter Korsgaard <peter@korsgaard.com>2018-10-09 10:39:59 +0200
committerThomas Petazzoni <thomas.petazzoni@bootlin.com>2018-10-09 14:48:11 +0200
commitd0758184c03f6bb7928cb957faa649be68a145c5 (patch)
treefd110b573ebb76cfed68feae9005bf8f1ff0e04c /package/python-enum34/python-enum34.mk
parent507d56a6be67b7b4e5c40b55c2e56ffbb4ff0386 (diff)
downloadbuildroot-d0758184c03f6bb7928cb957faa649be68a145c5.tar.gz
buildroot-d0758184c03f6bb7928cb957faa649be68a145c5.zip
tinc: security bump to version 1.0.35
Fixes the following security issues: CVE-2018-16758: Michael Yonli discovered that tinc 1.0.34 and earlier allow a man-in-the-middle attack that, even if the MITM cannot decrypt the traffic sent between the two endpoints, when the MITM can correctly predict when an ephemeral key exchange message is sent in a TCP connection between two nodes, allows the MITM to force one node to send UDP packets in plaintext. The tinc 1.1pre versions are not affected by this. CVE-2018-16738: Michael Yonli discoverd that tinc versions 1.0.30 to 1.0.34 allow an oracle attack, similar to CVE-2018-16737, but due to the mitigations put in place for the Sweet32 attack in tinc 1.0.30, it now requires a timing attack that has only a limited time to complete. Tinc 1.1pre16 and earlier are also affected if there are nodes on the same VPN that still use the legacy protocol from tinc version 1.0.x. Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
Diffstat (limited to 'package/python-enum34/python-enum34.mk')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud