summaryrefslogtreecommitdiffstats
path: root/meta/classes/testimage.bbclass
diff options
context:
space:
mode:
authorArchana Polampalli <archana.polampalli@windriver.com>2023-12-28 06:40:39 +0000
committerSteve Sakoman <steve@sakoman.com>2024-01-04 05:00:13 -1000
commitdf2f696e68812689366447278d12ceb5ccdbbea8 (patch)
tree1e1b7c567e1a023d2ca22369e5d6168b02c38ce6 /meta/classes/testimage.bbclass
parentbad31561c0ee9fb6a77edba822addd668ca864f1 (diff)
downloadpoky-df2f696e68812689366447278d12ceb5ccdbbea8.tar.gz
openssh: fix CVE-2023-51385
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name. References: https://nvd.nist.gov/vuln/detail/CVE-2023-51385 Upstream patches: https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a (From OE-Core rev: 617640bd045f07b0870dc9f3bc838b3a9fbc3de7) Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/classes/testimage.bbclass')
0 files changed, 0 insertions, 0 deletions