mirror of
https://git.yoctoproject.org/poky
synced 2026-04-17 18:32:12 +02:00
openssh: fix for CVE-2014-2532
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character. (From OE-Core rev: a8d3b8979c27a8dc87971b66a1d9d9282f660596) (From OE-Core rev: e5786afbfa79e1288d1df2401684c4c151c60406) Signed-off-by: Chen Qi <Qi.Chen@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Conflicts: meta/recipes-connectivity/openssh/openssh_6.5p1.bb
This commit is contained in:
@@ -0,0 +1,22 @@
|
||||
Upstream-Status: Backport
|
||||
|
||||
Fix for CVE-2014-2532
|
||||
|
||||
Backported from openssh-6.6p1.tar.gz
|
||||
|
||||
Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
|
||||
---
|
||||
--- a/session.c
|
||||
+++ b/session.c
|
||||
@@ -955,6 +955,11 @@
|
||||
u_int envsize;
|
||||
u_int i, namelen;
|
||||
|
||||
+ if (strchr(name, '=') != NULL) {
|
||||
+ error("Invalid environment variable \"%.100s\"", name);
|
||||
+ return;
|
||||
+ }
|
||||
+
|
||||
/*
|
||||
* If we're passed an uninitialized list, allocate a single null
|
||||
* entry before continuing.
|
||||
@@ -27,7 +27,8 @@ SRC_URI = "ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar.
|
||||
file://sshd.socket \
|
||||
file://sshd@.service \
|
||||
file://sshdgenkeys.service \
|
||||
file://volatiles.99_sshd "
|
||||
file://volatiles.99_sshd \
|
||||
file://openssh-CVE-2014-2532.patch"
|
||||
|
||||
PAM_SRC_URI = "file://sshd"
|
||||
|
||||
|
||||
Reference in New Issue
Block a user