diff options
| author | Divya Chellam <divya.chellam@windriver.com> | 2025-11-18 16:50:48 +0530 |
|---|---|---|
| committer | Gyorgy Sarvari <skandigraun@gmail.com> | 2025-11-30 15:13:57 +0100 |
| commit | 4ae2ec4620c86afc3ec14ab63405fb7c28019443 (patch) | |
| tree | 770e6a8353d7cc2f9e8f1cf3d43ba921ed7009db /meta-python/recipes-devtools | |
| parent | 44689d795c05bd1e31aa74c7d917df818b1a0264 (diff) | |
| download | meta-openembedded-4ae2ec4620c86afc3ec14ab63405fb7c28019443.tar.gz | |
libssh : fix CVE-2025-8114
A flaw was found in libssh, a library that implements the SSH protocol.
When calculating the session ID during the key exchange (KEX) process,
an allocation failure in cryptographic functions may lead to a NULL
pointer dereference. This issue can cause the client or server to crash.
Reference:
https://security-tracker.debian.org/tracker/CVE-2025-8114
Upstream-patch:
https://git.libssh.org/projects/libssh.git/commit/?id=53ac23ded4cb2c5463f6c4cd1525331bd578812d
Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools')
0 files changed, 0 insertions, 0 deletions
