openssh: fix for CVE-2014-2532
authorChen Qi <Qi.Chen@windriver.com>
Tue, 13 May 2014 07:46:26 +0000 (15:46 +0800)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Tue, 13 May 2014 18:32:06 +0000 (19:32 +0100)
commitdc7c2d554c6cb4adff010f88acfd02f96319bf21
tree9c3143c12c314f1ebdbc62142c7a509a7e530864
parent3c84abdf8ee2551e8d89c33c1e851471a73b06c4
openssh: fix for CVE-2014-2532

sshd in OpenSSH before 6.6 does not properly support wildcards on
AcceptEnv lines in sshd_config, which allows remote attackers to
bypass intended environment restrictions by using a substring located
before a wildcard character.

(From OE-Core rev: a8d3b8979c27a8dc87971b66a1d9d9282f660596)

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-connectivity/openssh/openssh/openssh-CVE-2014-2532.patch [new file with mode: 0644]
meta/recipes-connectivity/openssh/openssh_6.5p1.bb