Files
poky/meta/recipes-extended
Divya Chellam a5e0237596 libpam: fix CVE-2024-10041
A vulnerability was found in PAM. The secret information is
stored in memory, where the attacker can trigger the victim
program to execute by sending characters to its standard
input (stdin). As this occurs, the attacker can train the
branch predictor to execute an ROP chain speculatively.
This flaw could result in leaked passwords, such as those
found in /etc/shadow while performing authentications.

References:
https://security-tracker.debian.org/tracker/CVE-2024-10041

Upstream patches:
b3020da7da

(From OE-Core rev: 0e76d9bf150ac3bf96081cc1bda07e03e16fe994)

Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-12-13 05:21:54 -08:00
..
2024-12-06 05:50:24 -08:00
2023-01-12 23:08:59 +00:00
2023-03-12 23:39:13 +00:00
2024-07-17 05:36:13 -07:00
2024-06-19 08:34:57 -07:00
2023-06-27 16:23:40 +01:00
2024-07-17 05:36:13 -07:00
2024-02-03 22:08:25 +00:00
2023-07-30 07:54:44 +01:00
2023-05-22 10:53:48 +01:00
2024-11-26 06:11:30 -08:00
2022-10-29 16:28:35 +01:00
2024-07-23 06:05:47 -07:00
2022-04-19 14:14:12 +01:00
2024-02-03 22:08:26 +00:00
2024-08-10 06:34:25 -07:00
2023-11-05 11:28:40 +00:00
2023-07-17 15:30:04 +01:00
2023-07-30 07:54:44 +01:00
2024-02-03 22:08:26 +00:00
2024-03-07 17:25:02 +00:00
2024-06-20 06:29:43 -07:00
2024-02-08 10:59:06 +00:00
2023-12-08 16:58:34 +00:00
2024-09-09 06:08:10 -07:00
2024-03-07 17:25:02 +00:00
2023-11-05 11:28:40 +00:00
2023-11-05 11:28:39 +00:00
2024-12-13 05:21:54 -08:00
2023-07-30 07:54:44 +01:00
2021-08-02 15:44:10 +01:00
2023-09-02 18:23:06 +01:00
2022-11-22 12:26:46 +00:00
2023-09-18 08:53:10 +01:00
2022-11-14 16:19:43 +00:00
2022-08-21 22:51:42 +01:00
2023-09-02 18:23:06 +01:00
2023-12-23 08:46:00 +00:00
2023-09-28 12:37:46 +01:00
2023-04-13 11:56:07 +01:00
2022-08-17 19:57:32 +01:00
2024-09-19 05:11:35 -07:00
2024-07-03 06:28:34 -07:00
2023-04-05 08:39:43 +01:00
2024-09-19 05:11:35 -07:00
2023-12-08 16:58:34 +00:00