summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/openssh/openssh/CVE-2015-8325.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-connectivity/openssh/openssh/CVE-2015-8325.patch')
-rw-r--r--meta/recipes-connectivity/openssh/openssh/CVE-2015-8325.patch39
1 files changed, 39 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/openssh/openssh/CVE-2015-8325.patch b/meta/recipes-connectivity/openssh/openssh/CVE-2015-8325.patch
new file mode 100644
index 0000000000..226389718d
--- /dev/null
+++ b/meta/recipes-connectivity/openssh/openssh/CVE-2015-8325.patch
@@ -0,0 +1,39 @@
1From 85bdcd7c92fe7ff133bbc4e10a65c91810f88755 Mon Sep 17 00:00:00 2001
2From: Damien Miller <djm@mindrot.org>
3Date: Wed, 13 Apr 2016 10:39:57 +1000
4Subject: ignore PAM environment vars when UseLogin=yes
5
6If PAM is configured to read user-specified environment variables
7and UseLogin=yes in sshd_config, then a hostile local user may
8attack /bin/login via LD_PRELOAD or similar environment variables
9set via PAM.
10
11CVE-2015-8325, found by Shayan Sadigh, via Colin Watson
12
13
14
15https://anongit.mindrot.org/openssh.git/commit/session.c?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755
16
17CVE: CVE-2015-8325
18Upstream-Status: Backport
19Signed-off-by: Jussi Kukkonen <jussi.kukkonen@intel.com>
20---
21 session.c | 2 +-
22 1 file changed, 1 insertion(+), 1 deletion(-)
23
24diff --git a/session.c b/session.c
25index 4859245..4653b09 100644
26--- a/session.c
27+++ b/session.c
28@@ -1322,7 +1322,7 @@ do_setup_env(Session *s, const char *shell)
29 * Pull in any environment variables that may have
30 * been set by PAM.
31 */
32- if (options.use_pam) {
33+ if (options.use_pam && !options.use_login) {
34 char **p;
35
36 p = fetch_pam_child_environment();
37--
38cgit v0.11.2
39