summaryrefslogtreecommitdiffstats
path: root/meta/recipes-multimedia/gstreamer/gst-plugins-base_0.10.36.bb
diff options
context:
space:
mode:
authorLi Wang <li.wang@windriver.com>2012-11-27 14:13:21 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2012-11-28 07:41:26 +0000
commitb629d940304ec65c2d799e0aa44d03562a784bd6 (patch)
tree2832168b5944ceb31705266a585841283ff6e57f /meta/recipes-multimedia/gstreamer/gst-plugins-base_0.10.36.bb
parent8d1aed5dd236a82da9caae6c486c5165cd877d85 (diff)
downloadpoky-b629d940304ec65c2d799e0aa44d03562a784bd6.tar.gz
openssh: CVE-2011-4327
A security flaw was found in the way ssh-keysign, a ssh helper program for host based authentication, attempted to retrieve enough entropy information on configurations that lacked a built-in entropy pool in OpenSSL (a ssh-rand-helper program would be executed to retrieve the entropy from the system environment). A local attacker could use this flaw to obtain unauthorized access to host keys via ptrace(2) process trace attached to the 'ssh-rand-helper' program. https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4327 http://www.openssh.com/txt/portable-keysign-rand-helper.adv [YOCTO #3493] (From OE-Core rev: bdce08215396e5ab99ada5fa0f62c3b002a44582) Signed-off-by: Li Wang <li.wang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-multimedia/gstreamer/gst-plugins-base_0.10.36.bb')
0 files changed, 0 insertions, 0 deletions