]> code.ossystems Code Review - openembedded-core.git/commit
openssh: fix CVE-2010-5107
authorRoss Burton <ross.burton@intel.com>
Mon, 29 Apr 2013 14:05:23 +0000 (15:05 +0100)
committerRoss Burton <ross.burton@intel.com>
Mon, 29 Apr 2013 14:05:23 +0000 (15:05 +0100)
commit1d4f2d5ef65135e61d78ac0db90afe7f5d166d05
treee38693484675f1e883812a8cc101872a4665a821
parent44ed6605c1978325782d229d0c01329465c4c5c7
openssh: fix CVE-2010-5107

From http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5107:
"The default configuration of OpenSSH through 6.1 enforces a fixed time limit
between establishing a TCP connection and completing a login, which makes it
easier for remote attackers to cause a denial of service (connection-slot
exhaustion) by periodically making many new TCP connections."

Integrate patches from upstream to enable "random early drop" by default./

Signed-off-by: Ross Burton <ross.burton@intel.com>
meta/recipes-connectivity/openssh/openssh-6.0p1/cve-2010-5107.patch [new file with mode: 0644]
meta/recipes-connectivity/openssh/openssh_6.0p1.bb