diff options
author | Yogita Urade <yogita.urade@windriver.com> | 2023-09-08 11:46:44 +0000 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2023-09-20 05:23:02 -1000 |
commit | 31176477ce76428a45dd3e0d31546c09cd389e5e (patch) | |
tree | 776b8aa391013ced7ded13be48bc73119535742f /documentation/dev-manual/temporary-source-code.rst | |
parent | 2bd4e2392b89c97006d29795ad2bd59d2227f5d4 (diff) | |
download | poky-31176477ce76428a45dd3e0d31546c09cd389e5e.tar.gz |
dropbear: fix CVE-2023-36328
Integer Overflow vulnerability in mp_grow in libtom libtommath before
commit beba892bc0d4e4ded4d667ab1d2a94f4d75109a9, allows attackers to
execute arbitrary code and cause a denial of service (DoS).
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-36328
https://github.com/libtom/libtommath/pull/546
(From OE-Core rev: e2fe2c2066b066b1561eaba7bd7f27d4079c3cd6)
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'documentation/dev-manual/temporary-source-code.rst')
0 files changed, 0 insertions, 0 deletions