]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commitdiff
openssh: Whitelist CVE-2021-36368
authorPawan Badganchi <badganchipv@gmail.com>
Mon, 13 Jun 2022 13:48:15 +0000 (19:18 +0530)
committerSteve Sakoman <steve@sakoman.com>
Mon, 13 Jun 2022 16:21:32 +0000 (06:21 -1000)
As per debian, the issue is fixed by a feature called
"agent restriction" in openssh 8.9.
Urgency is unimportant as per debian, Hence this CVE is whitelisting.
Link:
https://security-tracker.debian.org/tracker/CVE-2021-36368
https://bugzilla.mindrot.org/show_bug.cgi?id=3316#c2
https://docs.ssh-mitm.at/trivialauth.html

Signed-off-by: Pawan Badganchi <badganchipv@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/openssh/openssh_8.2p1.bb

index ddc9ed0b323777c542f32f50b4ca7b3a5a2015a3..eaec26cac0452dd268d51cf270e71e730e0d8b72 100644 (file)
@@ -60,6 +60,13 @@ CVE_CHECK_WHITELIST += "CVE-2008-3844"
 # https://ubuntu.com/security/CVE-2016-20012
 CVE_CHECK_WHITELIST += "CVE-2016-20012"
 
+# As per debian, the issue is fixed by a feature called "agent restriction" in openssh 8.9
+# Urgency is unimportant as per debian, Hence this CVE is whitelisting.
+# https://security-tracker.debian.org/tracker/CVE-2021-36368
+# https://bugzilla.mindrot.org/show_bug.cgi?id=3316#c2
+# https://docs.ssh-mitm.at/trivialauth.html
+CVE_CHECK_WHITELIST += "CVE-2021-36368"
+
 PAM_SRC_URI = "file://sshd"
 
 inherit manpages useradd update-rc.d update-alternatives systemd