public inbox for openembedded-core@lists.openembedded.org
 help / color / mirror / Atom feed
* CVE-2016-3116: dropbear: X11 forwarding input not validated properly
@ 2016-09-14  8:49 Sona Sarmadi
  2016-09-14  9:06 ` Alexander Kanavin
  0 siblings, 1 reply; 7+ messages in thread
From: Sona Sarmadi @ 2016-09-14  8:49 UTC (permalink / raw)
  To: openembedded-core, akuster,
	Purdie, Richard (richard.purdie@intel.com),
	'Maxin B. John'

Hi guys,

I need your advice how to address this CVE in krogoth (master is not affected)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3116

I couldn't find a patch for this specific CVE in dropbear git or somewhere else, if we want to address this issue it seems that we need to update the dropbear version in krogoth to "2016.72". Is this ok?

Dropbear version in krogoth is 2015.71:
http://git.yoctoproject.org/cgit/cgit.cgi/poky/tree/meta/recipes-core/dropbear?h=krogoth
dropbear_2015.71.bb


https://matt.ucc.asn.au/dropbear/CHANGES
.....
2016.72 - 9 March 2016    <<<<<<< dropbear version this CVE has been fixed
- Validate X11 forwarding input. Could allow bypass of authorized_keys command= restrictions,
  found by github.com/tintinweb. Thanks for Damien Miller for a patch. CVE-2016-3116

2015.71 - 3 December 2015  <<<< dropbear version in krogoth
.....

Looking at dropbear git repo I see some more commits between these versions but CHANGES file doesn't mention this so probably these are minor changes.

Thanks
//Sona

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2016-09-14 20:19 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-09-14  8:49 CVE-2016-3116: dropbear: X11 forwarding input not validated properly Sona Sarmadi
2016-09-14  9:06 ` Alexander Kanavin
2016-09-14  9:43   ` Richard Purdie
2016-09-14  9:58     ` Alexander Kanavin
2016-09-14 10:24       ` Sona Sarmadi
2016-09-14 10:31         ` Alexander Kanavin
2016-09-14 20:19     ` akuster808

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox