[gnome-continuous-yocto/gnomeostree-3.22-krogoth: 61/246] dropbear: upgrade to 2016.72



commit 58538b070384f7ff0a31bba3877ca09b1c790bc4
Author: Sona Sarmadi <sona sarmadi enea com>
Date:   Wed Sep 14 14:34:38 2016 +0200

    dropbear: upgrade to 2016.72
    
    The upgrade addresses CVE-2016-3116:
    
    - Validate X11 forwarding input. Could allow bypass of
      authorized_keys command= restrictions,
      found by github.com/tintinweb.
      Thanks for Damien Miller for a patch. CVE-2016-3116
    
    References:
    https://matt.ucc.asn.au/dropbear/CHANGES
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3116
    
    (From OE-Core rev: 5ebac39d1d6dcf041e05002c0b8bf18bfb38e6d3)
    
    Signed-off-by: Sona Sarmadi <sona sarmadi enea com>
    Signed-off-by: Armin Kuster <akuster808 gmail com>
    Signed-off-by: Richard Purdie <richard purdie linuxfoundation org>

 meta/recipes-core/dropbear/dropbear_2015.71.bb |    5 -----
 meta/recipes-core/dropbear/dropbear_2016.72.bb |    4 ++++
 2 files changed, 4 insertions(+), 5 deletions(-)
---
diff --git a/meta/recipes-core/dropbear/dropbear_2016.72.bb b/meta/recipes-core/dropbear/dropbear_2016.72.bb
new file mode 100644
index 0000000..1385efd
--- /dev/null
+++ b/meta/recipes-core/dropbear/dropbear_2016.72.bb
@@ -0,0 +1,4 @@
+require dropbear.inc
+
+SRC_URI[md5sum] = "96226b82725a8cbecad9fc738930d1d2"
+SRC_URI[sha256sum] = "9323766d3257699fd7d6e7b282c5a65790864ab32fd09ac73ea3d46c9ca2d681"


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]