summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/musl
diff options
context:
space:
mode:
authorSona Sarmadi <sona.sarmadi@enea.com>2016-09-14 14:34:38 +0200
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-09-23 15:27:05 +0100
commit58538b070384f7ff0a31bba3877ca09b1c790bc4 (patch)
treee6bf9dd652019aecbf483722f805cd225323f868 /meta/recipes-core/musl
parent96fe15caf6761c5746f1848fbdfd4351189462f7 (diff)
downloadpoky-58538b070384f7ff0a31bba3877ca09b1c790bc4.tar.gz
dropbear: upgrade to 2016.72
The upgrade addresses CVE-2016-3116: - Validate X11 forwarding input. Could allow bypass of authorized_keys command= restrictions, found by github.com/tintinweb. Thanks for Damien Miller for a patch. CVE-2016-3116 References: https://matt.ucc.asn.au/dropbear/CHANGES https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3116 (From OE-Core rev: 5ebac39d1d6dcf041e05002c0b8bf18bfb38e6d3) Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/musl')
0 files changed, 0 insertions, 0 deletions