diff options
author | Sona Sarmadi <sona.sarmadi@enea.com> | 2016-09-14 14:34:38 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-09-23 15:27:05 +0100 |
commit | 58538b070384f7ff0a31bba3877ca09b1c790bc4 (patch) | |
tree | e6bf9dd652019aecbf483722f805cd225323f868 /meta/recipes-core/dropbear/dropbear_2015.71.bb | |
parent | 96fe15caf6761c5746f1848fbdfd4351189462f7 (diff) | |
download | poky-58538b070384f7ff0a31bba3877ca09b1c790bc4.tar.gz |
dropbear: upgrade to 2016.72
The upgrade addresses CVE-2016-3116:
- Validate X11 forwarding input. Could allow bypass of
authorized_keys command= restrictions,
found by github.com/tintinweb.
Thanks for Damien Miller for a patch. CVE-2016-3116
References:
https://matt.ucc.asn.au/dropbear/CHANGES
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3116
(From OE-Core rev: 5ebac39d1d6dcf041e05002c0b8bf18bfb38e6d3)
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/dropbear/dropbear_2015.71.bb')
-rw-r--r-- | meta/recipes-core/dropbear/dropbear_2015.71.bb | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/meta/recipes-core/dropbear/dropbear_2015.71.bb b/meta/recipes-core/dropbear/dropbear_2015.71.bb deleted file mode 100644 index 6332579e77..0000000000 --- a/meta/recipes-core/dropbear/dropbear_2015.71.bb +++ /dev/null | |||
@@ -1,5 +0,0 @@ | |||
1 | require dropbear.inc | ||
2 | |||
3 | SRC_URI[md5sum] = "2ccc0a2f3e37ca221db12c5af6a88137" | ||
4 | SRC_URI[sha256sum] = "376214169c0e187ee9f48ae1a99b3f835016ad5b98ede4bfd1cf581deba783af" | ||
5 | |||