diff options
author | Ross Burton <ross.burton@intel.com> | 2013-04-29 15:05:23 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2013-04-29 18:00:00 +0100 |
commit | 2cc162ac12db6f5c36e3bed96de87f12b4a6e22a (patch) | |
tree | 9b798ed39fe7a5e470bcaf78f86e3de66e71c5ac /meta/recipes-connectivity/bluez | |
parent | 4a9b9004bca6d1cb58ecc8bccf7f09b38b0e6c73 (diff) | |
download | poky-2cc162ac12db6f5c36e3bed96de87f12b4a6e22a.tar.gz |
openssh: fix CVE-2010-5107
From http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5107:
"The default configuration of OpenSSH through 6.1 enforces a fixed time limit
between establishing a TCP connection and completing a login, which makes it
easier for remote attackers to cause a denial of service (connection-slot
exhaustion) by periodically making many new TCP connections."
Integrate patches from upstream to enable "random early drop" by default./
(From OE-Core rev: 1d4f2d5ef65135e61d78ac0db90afe7f5d166d05)
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/bluez')
0 files changed, 0 insertions, 0 deletions