summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity
diff options
context:
space:
mode:
authorsana kazi <sanakazisk19@gmail.com>2021-09-30 13:46:30 +0530
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-10-07 15:10:33 +0100
commit914ee53a873a92c53b9f440f652e922a8628e4ff (patch)
treed89d79176ef7b1ae4b1fea9cf138ae3958344ec2 /meta/recipes-connectivity
parent32308c930f4e5d620a16fbace3be962b3030e7c8 (diff)
downloadpoky-914ee53a873a92c53b9f440f652e922a8628e4ff.tar.gz
openssh: Fix CVE-2021-28041
Added patch to fix CVE-2021-28041. Link: http://archive.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_8.2p1-4ubuntu0.3.debian.tar.xz (From OE-Core rev: 969e14a6849a4ec9030d09059e8d81dce0ff0c49) Signed-off-by: Sana Kazi <Sana.Kazi@kpit.com> Signed-off-by: Sana Kazi <sanakazisk19@gmail.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity')
-rw-r--r--meta/recipes-connectivity/openssh/openssh/CVE-2021-28041.patch20
-rw-r--r--meta/recipes-connectivity/openssh/openssh_8.2p1.bb1
2 files changed, 21 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/openssh/openssh/CVE-2021-28041.patch b/meta/recipes-connectivity/openssh/openssh/CVE-2021-28041.patch
new file mode 100644
index 0000000000..9fd7e932d1
--- /dev/null
+++ b/meta/recipes-connectivity/openssh/openssh/CVE-2021-28041.patch
@@ -0,0 +1,20 @@
1Description: fix double-free memory corruption in ssh-agent
2Author: Marc Deslauriers <marc.deslauriers@canonical.com>
3Origin: minimal fix for https://github.com/openssh/openssh-portable/commit/e04fd6dde16de1cdc5a4d9946397ff60d96568db
4
5Signed-off-by: Sana Kazi <Sana.Kazi@kpit.com>
6
7CVE: CVE-2021-28041
8Upstream-Status: Backport [http://archive.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_8.2p1-4ubuntu0.3.debian.tar.xz]
9Comment: No change in any hunk
10
11--- a/ssh-agent.c
12+++ b/ssh-agent.c
13@@ -496,6 +496,7 @@ process_add_identity(SocketEntry *e)
14 goto err;
15 }
16 free(ext_name);
17+ ext_name = NULL;
18 break;
19 default:
20 error("%s: Unknown constraint %d", __func__, ctype);
diff --git a/meta/recipes-connectivity/openssh/openssh_8.2p1.bb b/meta/recipes-connectivity/openssh/openssh_8.2p1.bb
index 64a0a72a8f..5f03bdc877 100644
--- a/meta/recipes-connectivity/openssh/openssh_8.2p1.bb
+++ b/meta/recipes-connectivity/openssh/openssh_8.2p1.bb
@@ -25,6 +25,7 @@ SRC_URI = "http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar
25 file://sshd_check_keys \ 25 file://sshd_check_keys \
26 file://add-test-support-for-busybox.patch \ 26 file://add-test-support-for-busybox.patch \
27 file://CVE-2020-14145.patch \ 27 file://CVE-2020-14145.patch \
28 file://CVE-2021-28041.patch \
28 " 29 "
29SRC_URI[md5sum] = "3076e6413e8dbe56d33848c1054ac091" 30SRC_URI[md5sum] = "3076e6413e8dbe56d33848c1054ac091"
30SRC_URI[sha256sum] = "43925151e6cf6cee1450190c0e9af4dc36b41c12737619edff8bcebdff64e671" 31SRC_URI[sha256sum] = "43925151e6cf6cee1450190c0e9af4dc36b41c12737619edff8bcebdff64e671"