diff options
| author | Martin Weinelt <hexa@darmstadt.ccc.de> | 2020-12-01 16:54:21 +0100 |
|---|---|---|
| committer | Martin Weinelt <hexa@darmstadt.ccc.de> | 2020-12-01 16:54:21 +0100 |
| commit | c3f268000e02651f6c9fdeacfd115cc479c35b17 (patch) | |
| tree | 4a0cc09a6b119b330ea48e2738311f4ec8a9ced1 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch | |
| parent | 72cb12e4ab448144ab91d529f534195e8c0eb809 (diff) | |
qemu: fix CVE-2020-28916
While receiving packets via e1000e_write_packet_to_guest an infinite
loop could be triggered if the receive descriptor had a NULL buffer
address.
A privileged guest user could use this to induce a DoS Scenario.
Fixes: CVE-2020-28916
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions
