summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/openssh/openssh-6.4p1/openssh-CVE-2011-4327.patch
diff options
context:
space:
mode:
authorPaul Eggleton <paul.eggleton@linux.intel.com>2013-11-11 13:59:12 +0000
committerRichard Purdie <richard.purdie@linuxfoundation.org>2013-11-12 16:00:27 +0000
commit7fd89192c5687ffe177e40cfb6be26f54a8f83bd (patch)
treebb924c94d0e0faed8ef256849291b26365717c5f /meta/recipes-connectivity/openssh/openssh-6.4p1/openssh-CVE-2011-4327.patch
parente6b71801a11b546dc33ca129b9a129be170dc8dd (diff)
downloadpoky-7fd89192c5687ffe177e40cfb6be26f54a8f83bd.tar.gz
openssh: upgrade to 6.4p1
(From OE-Core rev: 19a483c157e783ded40e8dacac338a4d770a2d1a) Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/openssh/openssh-6.4p1/openssh-CVE-2011-4327.patch')
-rw-r--r--meta/recipes-connectivity/openssh/openssh-6.4p1/openssh-CVE-2011-4327.patch29
1 files changed, 29 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/openssh/openssh-6.4p1/openssh-CVE-2011-4327.patch b/meta/recipes-connectivity/openssh/openssh-6.4p1/openssh-CVE-2011-4327.patch
new file mode 100644
index 0000000000..30c11cf432
--- /dev/null
+++ b/meta/recipes-connectivity/openssh/openssh-6.4p1/openssh-CVE-2011-4327.patch
@@ -0,0 +1,29 @@
1openssh-CVE-2011-4327
2
3A security flaw was found in the way ssh-keysign,
4a ssh helper program for host based authentication,
5attempted to retrieve enough entropy information on configurations that
6lacked a built-in entropy pool in OpenSSL (a ssh-rand-helper program would
7be executed to retrieve the entropy from the system environment).
8A local attacker could use this flaw to obtain unauthorized access to host keys
9via ptrace(2) process trace attached to the 'ssh-rand-helper' program.
10
11https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4327
12http://www.openssh.com/txt/portable-keysign-rand-helper.adv
13
14Upstream-Status: Pending
15
16Signed-off-by: Li Wang <li.wang@windriver.com>
17--- a/ssh-keysign.c
18+++ b/ssh-keysign.c
19@@ -170,6 +170,10 @@
20 key_fd[i++] = open(_PATH_HOST_DSA_KEY_FILE, O_RDONLY);
21 key_fd[i++] = open(_PATH_HOST_ECDSA_KEY_FILE, O_RDONLY);
22 key_fd[i++] = open(_PATH_HOST_RSA_KEY_FILE, O_RDONLY);
23+ if (fcntl(key_fd[0], F_SETFD, FD_CLOEXEC) != 0 ||
24+ fcntl(key_fd[1], F_SETFD, FD_CLOEXEC) != 0 ||
25+ fcntl(key_fd[2], F_SETFD, FD_CLOEXEC) != 0)
26+ fatal("fcntl failed");
27
28 original_real_uid = getuid(); /* XXX readconf.c needs this */
29 if ((pw = getpwuid(original_real_uid)) == NULL)