summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorMartin Weinelt <hexa@darmstadt.ccc.de>2020-12-01 16:54:21 +0100
committerMartin Weinelt <hexa@darmstadt.ccc.de>2020-12-01 16:54:21 +0100
commitc3f268000e02651f6c9fdeacfd115cc479c35b17 (patch)
tree4a0cc09a6b119b330ea48e2738311f4ec8a9ced1 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parent72cb12e4ab448144ab91d529f534195e8c0eb809 (diff)
qemu: fix CVE-2020-28916
While receiving packets via e1000e_write_packet_to_guest an infinite loop could be triggered if the receive descriptor had a NULL buffer address. A privileged guest user could use this to induce a DoS Scenario. Fixes: CVE-2020-28916
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions