diff options
author | Jussi Kukkonen <jussi.kukkonen@intel.com> | 2016-05-18 15:11:55 +0300 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-05-19 08:39:26 +0100 |
commit | 5e24780ac0fea9012f28f6e3f1040c431d3a742e (patch) | |
tree | 8b938417a8c19911be71adddb73c7dc2c6ffd413 /meta/recipes-connectivity/openssh/openssh/CVE-2016-1907_upstream_commit.patch | |
parent | 53da74155942febd520836cabf3aa727c53ce5ca (diff) | |
download | openembedded-core-contrib-5e24780ac0fea9012f28f6e3f1040c431d3a742e.tar.gz |
openssh: Upgrade 7.1p2 -> 7.2p2
Remove patches that are in the release.
Signed-off-by: Jussi Kukkonen <jussi.kukkonen@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/openssh/openssh/CVE-2016-1907_upstream_commit.patch')
-rw-r--r-- | meta/recipes-connectivity/openssh/openssh/CVE-2016-1907_upstream_commit.patch | 33 |
1 files changed, 0 insertions, 33 deletions
diff --git a/meta/recipes-connectivity/openssh/openssh/CVE-2016-1907_upstream_commit.patch b/meta/recipes-connectivity/openssh/openssh/CVE-2016-1907_upstream_commit.patch deleted file mode 100644 index f3d132e43d..0000000000 --- a/meta/recipes-connectivity/openssh/openssh/CVE-2016-1907_upstream_commit.patch +++ /dev/null @@ -1,33 +0,0 @@ -From d77148e3a3ef6c29b26ec74331455394581aa257 Mon Sep 17 00:00:00 2001 -From: "djm@openbsd.org" <djm@openbsd.org> -Date: Sun, 8 Nov 2015 21:59:11 +0000 -Subject: [PATCH] upstream commit - -fix OOB read in packet code caused by missing return - statement found by Ben Hawkes; ok markus@ deraadt@ - -Upstream-ID: a3e3a85434ebfa0690d4879091959591f30efc62 - -Upstream-Status: Backport -CVE: CVE-2016-1907 - -[YOCTO #8935] - -Signed-off-by: Armin Kuster <akuster@mvista.com> - ---- - packet.c | 1 + - 1 file changed, 1 insertion(+) - -Index: openssh-7.1p2/packet.c -=================================================================== ---- openssh-7.1p2.orig/packet.c -+++ openssh-7.1p2/packet.c -@@ -1855,6 +1855,7 @@ ssh_packet_process_incoming(struct ssh * - if (len >= state->packet_discard) { - if ((r = ssh_packet_stop_discard(ssh)) != 0) - return r; -+ return SSH_ERR_CONN_CORRUPT; - } - state->packet_discard -= len; - return 0; |