- 264 license table entries with exact download URLs (224/264 resolved) - Complete sources/ directory with all BitBake recipes - Build configuration: tqma6ul-multi-mba6ulx, spaetzle (musl) - Full traceability for Softwarefreigabeantrag - GCC 13.4.0, Linux 6.6.102, U-Boot 2023.04, musl 1.2.4 - License distribution: GPL-2.0 (24), MIT (23), GPL-2.0+ (18), BSD-3 (16)
32 lines
953 B
Diff
32 lines
953 B
Diff
From 5f4ffda88770f95482fd0e66aa44106614dbf466 Mon Sep 17 00:00:00 2001
|
|
From: Jakub Jelen <jjelen@redhat.com>
|
|
Date: Tue, 22 Apr 2025 21:18:44 +0200
|
|
Subject: CVE-2025-5318: sftpserver: Fix possible buffer overrun
|
|
|
|
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
|
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
Upstream-Status: Backport [https://git.libssh.org/projects/libssh.git/commit/?id=5f4ffda88770f95482fd0e66aa44106614dbf466]
|
|
CVE: CVE-2025-5318
|
|
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
|
|
---
|
|
src/sftpserver.c | 2 +-
|
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
|
|
diff --git a/src/sftpserver.c b/src/sftpserver.c
|
|
index 9117f155..b3349e16 100644
|
|
--- a/src/sftpserver.c
|
|
+++ b/src/sftpserver.c
|
|
@@ -538,7 +538,7 @@ void *sftp_handle(sftp_session sftp, ssh_string handle){
|
|
|
|
memcpy(&val, ssh_string_data(handle), sizeof(uint32_t));
|
|
|
|
- if (val > SFTP_HANDLES) {
|
|
+ if (val >= SFTP_HANDLES) {
|
|
return NULL;
|
|
}
|
|
|
|
--
|
|
2.49.0
|
|
|