From ff5c6bd86fa26645ff56a4e6822f2463a223b8f1 Mon Sep 17 00:00:00 2001 From: Khem Raj Date: Sat, 28 Sep 2024 19:42:22 +0200 Subject: [PATCH] openssh: Mark CVE-2023-51767 as wont-fix (From OE-Core rev: 1b4bada6c003ef743df09283e45953e6d9ea4c5a) (From OE-Core rev: 9376c14f367477a8d02df1331908e3df3bd009b6) Signed-off-by: Khem Raj Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- meta/recipes-connectivity/openssh/openssh_9.6p1.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-connectivity/openssh/openssh_9.6p1.bb b/meta/recipes-connectivity/openssh/openssh_9.6p1.bb index 3c507cf911..a8ba67e360 100644 --- a/meta/recipes-connectivity/openssh/openssh_9.6p1.bb +++ b/meta/recipes-connectivity/openssh/openssh_9.6p1.bb @@ -40,6 +40,7 @@ CVE_STATUS[CVE-2014-9278] = "not-applicable-platform: This CVE is specific to Op Red Hat Enterprise Linux 7 and when running in a Kerberos environment" CVE_STATUS[CVE-2008-3844] = "not-applicable-platform: Only applies to some distributed RHEL binaries." +CVE_STATUS[CVE-2023-51767] = "upstream-wontfix: It was demonstrated on modified sshd and does not exist in upstream openssh https://bugzilla.mindrot.org/show_bug.cgi?id=3656#c1." PAM_SRC_URI = "file://sshd"