]> code.ossystems Code Review - openembedded-core.git/commit
openssh: CVE-2011-4327
authorLi Wang <li.wang@windriver.com>
Tue, 27 Nov 2012 06:13:21 +0000 (14:13 +0800)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Wed, 28 Nov 2012 07:38:26 +0000 (07:38 +0000)
commitbdce08215396e5ab99ada5fa0f62c3b002a44582
tree53e773566cc69c3d3150478eaeacd5d6b2b5227a
parent8a4f07d5111feaa3114e039431785d6ad37529b2
openssh: CVE-2011-4327

A security flaw was found in the way ssh-keysign,
a ssh helper program for host based authentication,
attempted to retrieve enough entropy information on configurations that
lacked a built-in entropy pool in OpenSSL (a ssh-rand-helper program would
be executed to retrieve the entropy from the system environment).
A local attacker could use this flaw to obtain unauthorized access to host keys
via ptrace(2) process trace attached to the 'ssh-rand-helper' program.

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4327
http://www.openssh.com/txt/portable-keysign-rand-helper.adv

[YOCTO #3493]

Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-connectivity/openssh/openssh-6.0p1/openssh-CVE-2011-4327.patch [new file with mode: 0644]
meta/recipes-connectivity/openssh/openssh_6.0p1.bb