openssh: drop already applied patch

This patch was part of the 6.6p1 release.

(From OE-Core rev: 45206510ab48bfee6e183f698f963fea8f03e2a5)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
Paul Eggleton
2014-11-19 08:53:20 +00:00
committed by Richard Purdie
parent bc41835eee
commit 4d6772706c
2 changed files with 0 additions and 23 deletions

View File

@@ -1,22 +0,0 @@
Upstream-Status: Backport
Fix for CVE-2014-2532
Backported from openssh-6.6p1.tar.gz
Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
---
--- a/session.c
+++ b/session.c
@@ -955,6 +955,11 @@
u_int envsize;
u_int i, namelen;
+ if (strchr(name, '=') != NULL) {
+ error("Invalid environment variable \"%.100s\"", name);
+ return;
+ }
+
/*
* If we're passed an uninitialized list, allocate a single null
* entry before continuing.

View File

@@ -23,7 +23,6 @@ SRC_URI = "ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar.
file://volatiles.99_sshd \
file://add-test-support-for-busybox.patch \
file://run-ptest \
file://openssh-CVE-2014-2532.patch \
file://openssh-CVE-2014-2653.patch \
file://auth2-none.c-avoid-authenticate-empty-passwords-to-m.patch"