summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/openssh/openssh_6.7p1.bb
diff options
context:
space:
mode:
authorTudor Florea <tudor.florea@enea.com>2015-10-29 01:14:18 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2015-12-08 13:27:28 +0000
commitb8eb509ca53eed5f26642895a9078689de129a3f (patch)
tree23fe603792f90cf132ec36a595bdddb4d914c8c7 /meta/recipes-connectivity/openssh/openssh_6.7p1.bb
parent7e9516cb0e2660c0fc4347628ebd11ae6321cad0 (diff)
downloadast2050-yocto-poky-b8eb509ca53eed5f26642895a9078689de129a3f.zip
ast2050-yocto-poky-b8eb509ca53eed5f26642895a9078689de129a3f.tar.gz
unzip: CVE-2015-7696, CVE-2015-7697
CVE-2015-7696: Fixes a heap overflow triggered by unzipping a file with password CVE-2015-7697: Fixes a denial of service with a file that never finishes unzipping References: http://www.openwall.com/lists/oss-security/2015/10/11/5 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7696 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7697 (From OE-Core rev: 458d877590bcd39c7f05d31cc6e7600ca59de332) Signed-off-by: Tudor Florea <tudor.florea@enea.com> Signed-off-by: Joshua Lock <joshua.lock@collabora.co.uk> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/openssh/openssh_6.7p1.bb')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud