mirror of
https://git.yoctoproject.org/poky
synced 2026-04-22 15:32:14 +02:00
openssh: Whitelist CVE-2021-36368
As per debian, the issue is fixed by a feature called "agent restriction" in openssh 8.9. Urgency is unimportant as per debian, Hence this CVE is whitelisting. Link: https://security-tracker.debian.org/tracker/CVE-2021-36368 https://bugzilla.mindrot.org/show_bug.cgi?id=3316#c2 https://docs.ssh-mitm.at/trivialauth.html (From OE-Core rev: 179b862e97d95ef57f8ee847e54a78b5f3f52ee7) Signed-off-by: Pawan Badganchi <badganchipv@gmail.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
committed by
Richard Purdie
parent
95cda9d091
commit
23ed0037b6
@@ -60,6 +60,13 @@ CVE_CHECK_WHITELIST += "CVE-2008-3844"
|
||||
# https://ubuntu.com/security/CVE-2016-20012
|
||||
CVE_CHECK_WHITELIST += "CVE-2016-20012"
|
||||
|
||||
# As per debian, the issue is fixed by a feature called "agent restriction" in openssh 8.9
|
||||
# Urgency is unimportant as per debian, Hence this CVE is whitelisting.
|
||||
# https://security-tracker.debian.org/tracker/CVE-2021-36368
|
||||
# https://bugzilla.mindrot.org/show_bug.cgi?id=3316#c2
|
||||
# https://docs.ssh-mitm.at/trivialauth.html
|
||||
CVE_CHECK_WHITELIST += "CVE-2021-36368"
|
||||
|
||||
PAM_SRC_URI = "file://sshd"
|
||||
|
||||
inherit manpages useradd update-rc.d update-alternatives systemd
|
||||
|
||||
Reference in New Issue
Block a user