summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/openssh/openssh_6.6p1.bb
diff options
context:
space:
mode:
authorSona Sarmadi <sona.sarmadi@enea.com>2016-01-22 09:38:52 +0100
committerTudor Florea <tudor.florea@enea.com>2016-01-22 18:14:11 +0100
commitc6d12aaaa21048373b280cff9d3dfc0082a025eb (patch)
tree7f571d3d83561fbfc4061109cdd26ccfbaac30f6 /meta/recipes-connectivity/openssh/openssh_6.6p1.bb
parent36009b0af396f7a0920d5508e67cf58ff955478e (diff)
downloadpoky-c6d12aaaa21048373b280cff9d3dfc0082a025eb.tar.gz
openssh: CVE-2016-0777 and CVE-2016-0778
Fixes following CVEs: CVE-2016-0777 OpenSSH: Client Information leak due to use of roaming connection feature CVE-2016-0778 OpenSSH: Client buffer-overflow when using roaming connections References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778 Backported from: http://git.yoctoproject.org/cgit/cgit.cgi/poky/patch/ ?id=9845a542a76156adb5aef6fd33ad5bc5777acf64 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Tudor Florea <tudor.florea@enea.com>
Diffstat (limited to 'meta/recipes-connectivity/openssh/openssh_6.6p1.bb')
-rw-r--r--meta/recipes-connectivity/openssh/openssh_6.6p1.bb4
1 files changed, 3 insertions, 1 deletions
diff --git a/meta/recipes-connectivity/openssh/openssh_6.6p1.bb b/meta/recipes-connectivity/openssh/openssh_6.6p1.bb
index 3807583d95..0ce84aa70e 100644
--- a/meta/recipes-connectivity/openssh/openssh_6.6p1.bb
+++ b/meta/recipes-connectivity/openssh/openssh_6.6p1.bb
@@ -26,7 +26,9 @@ SRC_URI = "ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar.
26 file://openssh-CVE-2014-2532.patch \ 26 file://openssh-CVE-2014-2532.patch \
27 file://openssh-CVE-2014-2653.patch \ 27 file://openssh-CVE-2014-2653.patch \
28 file://auth2-none.c-avoid-authenticate-empty-passwords-to-m.patch \ 28 file://auth2-none.c-avoid-authenticate-empty-passwords-to-m.patch \
29 file://openssh-ptest-fix-sshconnect.patch" 29 file://openssh-ptest-fix-sshconnect.patch \
30 file://CVE-2016-0777_CVE-2016-0778.patch \
31 "
30 32
31PAM_SRC_URI = "file://sshd" 33PAM_SRC_URI = "file://sshd"
32 34