]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commit
dropbear: fix CVE-2023-36328
authorYogita Urade <yogita.urade@windriver.com>
Fri, 8 Sep 2023 14:01:15 +0000 (14:01 +0000)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Sat, 9 Sep 2023 21:13:24 +0000 (22:13 +0100)
commitaa392840d625f5c45832e7ddf60c4dfaba3c4287
tree724b1235b2e603e8b4657c90cbf6ec6eb1d02268
parent1a209ef31165049c450018c7722013aa4d983fd8
dropbear: fix CVE-2023-36328

Integer Overflow vulnerability in mp_grow in libtom libtommath before
commit beba892bc0d4e4ded4d667ab1d2a94f4d75109a9, allows attackers to
execute arbitrary code and cause a denial of service (DoS).

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-36328
https://github.com/libtom/libtommath/pull/546

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-core/dropbear/dropbear/CVE-2023-36328.patch [new file with mode: 0644]
meta/recipes-core/dropbear/dropbear_2022.83.bb