mirror of
https://git.yoctoproject.org/poky
synced 2026-04-30 21:32:13 +02:00
openssh: Whitelist CVE-2016-20012
Whitelist CVE-2016-20012 as the upstream OpenSSH developers see this as an important security feature and do not intend to 'fix' it. Link: https://security-tracker.debian.org/tracker/CVE-2016-20012 https://ubuntu.com/security/CVE-2016-20012 (From OE-Core rev: 79c677e994399611819e1e382b3e1b0be16eb6e1) Signed-off-by: Sana Kazi <Sana.Kazi@kpit.com> Signed-off-by: Sana Kazi <sanakazisk19@gmail.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
committed by
Richard Purdie
parent
f4a6761f47
commit
bd07080415
@@ -51,6 +51,15 @@ CVE_CHECK_WHITELIST += "CVE-2020-15778"
|
||||
# https://www.securityfocus.com/bid/30794
|
||||
CVE_CHECK_WHITELIST += "CVE-2008-3844"
|
||||
|
||||
# openssh-ssh1 is provided for compatibility with old devices that
|
||||
# cannot be upgraded to modern protocols. Thus they may not provide security
|
||||
# support for this package because doing so would prevent access to equipment.
|
||||
# The upstream OpenSSH developers see this as an important
|
||||
# security feature and do not intend to 'fix' it.
|
||||
# https://security-tracker.debian.org/tracker/CVE-2016-20012
|
||||
# https://ubuntu.com/security/CVE-2016-20012
|
||||
CVE_CHECK_WHITELIST += "CVE-2016-20012"
|
||||
|
||||
PAM_SRC_URI = "file://sshd"
|
||||
|
||||
inherit manpages useradd update-rc.d update-alternatives systemd
|
||||
|
||||
Reference in New Issue
Block a user