From 58538b070384f7ff0a31bba3877ca09b1c790bc4 Mon Sep 17 00:00:00 2001 From: Sona Sarmadi Date: Wed, 14 Sep 2016 14:34:38 +0200 Subject: dropbear: upgrade to 2016.72 The upgrade addresses CVE-2016-3116: - Validate X11 forwarding input. Could allow bypass of authorized_keys command= restrictions, found by github.com/tintinweb. Thanks for Damien Miller for a patch. CVE-2016-3116 References: https://matt.ucc.asn.au/dropbear/CHANGES https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3116 (From OE-Core rev: 5ebac39d1d6dcf041e05002c0b8bf18bfb38e6d3) Signed-off-by: Sona Sarmadi Signed-off-by: Armin Kuster Signed-off-by: Richard Purdie --- meta/recipes-core/dropbear/dropbear_2015.71.bb | 5 ----- meta/recipes-core/dropbear/dropbear_2016.72.bb | 4 ++++ 2 files changed, 4 insertions(+), 5 deletions(-) delete mode 100644 meta/recipes-core/dropbear/dropbear_2015.71.bb create mode 100644 meta/recipes-core/dropbear/dropbear_2016.72.bb diff --git a/meta/recipes-core/dropbear/dropbear_2015.71.bb b/meta/recipes-core/dropbear/dropbear_2015.71.bb deleted file mode 100644 index 6332579e77..0000000000 --- a/meta/recipes-core/dropbear/dropbear_2015.71.bb +++ /dev/null @@ -1,5 +0,0 @@ -require dropbear.inc - -SRC_URI[md5sum] = "2ccc0a2f3e37ca221db12c5af6a88137" -SRC_URI[sha256sum] = "376214169c0e187ee9f48ae1a99b3f835016ad5b98ede4bfd1cf581deba783af" - diff --git a/meta/recipes-core/dropbear/dropbear_2016.72.bb b/meta/recipes-core/dropbear/dropbear_2016.72.bb new file mode 100644 index 0000000000..1385efd0aa --- /dev/null +++ b/meta/recipes-core/dropbear/dropbear_2016.72.bb @@ -0,0 +1,4 @@ +require dropbear.inc + +SRC_URI[md5sum] = "96226b82725a8cbecad9fc738930d1d2" +SRC_URI[sha256sum] = "9323766d3257699fd7d6e7b282c5a65790864ab32fd09ac73ea3d46c9ca2d681" -- cgit v1.2.3-54-g00ecf