diff options
author | Yogita Urade <yogita.urade@windriver.com> | 2023-09-08 14:01:15 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2023-09-09 22:14:41 +0100 |
commit | a09d8afd4850e3878698ad931b9f8513677ccf80 (patch) | |
tree | 2243ef11605861d684f6e269cb99f3a0e1de67e8 /meta/recipes-core/sysvinit | |
parent | bcc6c86fb744d0e6eb5714dcea83a77e0f71f069 (diff) | |
download | poky-a09d8afd4850e3878698ad931b9f8513677ccf80.tar.gz |
dropbear: fix CVE-2023-36328
Integer Overflow vulnerability in mp_grow in libtom libtommath before
commit beba892bc0d4e4ded4d667ab1d2a94f4d75109a9, allows attackers to
execute arbitrary code and cause a denial of service (DoS).
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-36328
https://github.com/libtom/libtommath/pull/546
(From OE-Core rev: aa392840d625f5c45832e7ddf60c4dfaba3c4287)
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/sysvinit')
0 files changed, 0 insertions, 0 deletions