* openssl: Need PRINC+1 in recipe?
@ 2014-04-10 20:20 Bryan Evenson
2014-04-10 21:30 ` Alexandru Vaduva
0 siblings, 1 reply; 5+ messages in thread
From: Bryan Evenson @ 2014-04-10 20:20 UTC (permalink / raw)
To: poky@yoctoproject.org
All,
I was previously on dylan-1.4.1 and today I upgraded to poky/dylan HEAD to take in the openssl security patches. Things are rebuilding, but I noticed that the built package version is openssl-1.0.1e-r15.0, which is the same version currently installed on my system. Shouldn't the PR line change to:
PR = "${INC_PR+1}.0"
For the packaging systems to take in the update?
Thanks,
Bryan
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: openssl: Need PRINC+1 in recipe?
2014-04-10 20:20 openssl: Need PRINC+1 in recipe? Bryan Evenson
@ 2014-04-10 21:30 ` Alexandru Vaduva
2014-04-10 21:43 ` Denys Dmytriyenko
0 siblings, 1 reply; 5+ messages in thread
From: Alexandru Vaduva @ 2014-04-10 21:30 UTC (permalink / raw)
To: Bryan Evenson; +Cc: poky@yoctoproject.org
[-- Attachment #1: Type: text/plain, Size: 1060 bytes --]
Sorry to hijack this conversation but I believe in the next version of poky
the package openssl should be updated and and for the rest of the version a
patch should be applied to solve the newly appeared exploit.
More info here:
http://thehackernews.com/2014/04/heartbleed-openssl-zero-day-bug-leaves.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
Alex
On Thu, Apr 10, 2014 at 11:20 PM, Bryan Evenson <bevenson@melinkcorp.com>wrote:
> All,
>
> I was previously on dylan-1.4.1 and today I upgraded to poky/dylan HEAD to
> take in the openssl security patches. Things are rebuilding, but I noticed
> that the built package version is openssl-1.0.1e-r15.0, which is the same
> version currently installed on my system. Shouldn't the PR line change to:
>
> PR = "${INC_PR+1}.0"
>
> For the packaging systems to take in the update?
>
> Thanks,
> Bryan
>
>
>
> --
> _______________________________________________
> poky mailing list
> poky@yoctoproject.org
> https://lists.yoctoproject.org/listinfo/poky
>
[-- Attachment #2: Type: text/html, Size: 1788 bytes --]
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: openssl: Need PRINC+1 in recipe?
2014-04-10 21:30 ` Alexandru Vaduva
@ 2014-04-10 21:43 ` Denys Dmytriyenko
2014-04-11 12:46 ` Paul Eggleton
0 siblings, 1 reply; 5+ messages in thread
From: Denys Dmytriyenko @ 2014-04-10 21:43 UTC (permalink / raw)
To: Alexandru Vaduva; +Cc: poky@yoctoproject.org
On Fri, Apr 11, 2014 at 12:30:31AM +0300, Alexandru Vaduva wrote:
> Sorry to hijack this conversation but I believe in the next version of poky
> the package openssl should be updated and and for the rest of the version a
> patch should be applied to solve the newly appeared exploit.
> More info here:
> http://thehackernews.com/2014/04/heartbleed-openssl-zero-day-bug-leaves.html
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
Yes, that's what he was referring to...
> On Thu, Apr 10, 2014 at 11:20 PM, Bryan Evenson <bevenson@melinkcorp.com>wrote:
>
> > All,
> >
> > I was previously on dylan-1.4.1 and today I upgraded to poky/dylan HEAD to
> > take in the openssl security patches. Things are rebuilding, but I noticed
> > that the built package version is openssl-1.0.1e-r15.0, which is the same
> > version currently installed on my system. Shouldn't the PR line change to:
> >
> > PR = "${INC_PR+1}.0"
> >
> > For the packaging systems to take in the update?
Well, I guess people are so used to not caring about tracking PRs anymore,
they forget to bump them when backporting fixes to older branches. Paul?
--
Denys
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: openssl: Need PRINC+1 in recipe?
2014-04-10 21:43 ` Denys Dmytriyenko
@ 2014-04-11 12:46 ` Paul Eggleton
2014-04-11 12:52 ` Paul Eggleton
0 siblings, 1 reply; 5+ messages in thread
From: Paul Eggleton @ 2014-04-11 12:46 UTC (permalink / raw)
To: Denys Dmytriyenko, Alexandru Vaduva; +Cc: poky
On Thursday 10 April 2014 17:43:18 Denys Dmytriyenko wrote:
> On Fri, Apr 11, 2014 at 12:30:31AM +0300, Alexandru Vaduva wrote:
> > Sorry to hijack this conversation but I believe in the next version of
> > poky
> > the package openssl should be updated and and for the rest of the version
> > a
> > patch should be applied to solve the newly appeared exploit.
> > More info here:
> > http://thehackernews.com/2014/04/heartbleed-openssl-zero-day-bug-leaves.ht
> > ml https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
Just for reference this bug has been fixed in master (by an upgrade to 1.0.1g)
and both dora and dylan. For dora and dylan only the patch to fix the bug was
backported rather than the full upgrade (along with three other OpenSSL CVEs).
> > On Thu, Apr 10, 2014 at 11:20 PM, Bryan Evenson
<bevenson@melinkcorp.com>wrote:
> > > All,
> > >
> > > I was previously on dylan-1.4.1 and today I upgraded to poky/dylan HEAD
> > > to
> > > take in the openssl security patches. Things are rebuilding, but I
> > > noticed
> > > that the built package version is openssl-1.0.1e-r15.0, which is the
> > > same
> > > version currently installed on my system. Shouldn't the PR line change
> > > to:
> > >
> > > PR = "${INC_PR+1}.0"
> > >
> > > For the packaging systems to take in the update?
>
> Well, I guess people are so used to not caring about tracking PRs anymore,
> they forget to bump them when backporting fixes to older branches. Paul?
It seems to me that we already decided for dylan not to bump PR values as part
of standard procedure on changes - I am struggling to find a citation for this
though. However, given the severity of this bug, for people's peace of mind I
have sent out a PR bump patch for openssl for both dylan and dora, so it's a
little easier to tell you have the patch applied.
Cheers,
Paul
--
Paul Eggleton
Intel Open Source Technology Centre
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: openssl: Need PRINC+1 in recipe?
2014-04-11 12:46 ` Paul Eggleton
@ 2014-04-11 12:52 ` Paul Eggleton
0 siblings, 0 replies; 5+ messages in thread
From: Paul Eggleton @ 2014-04-11 12:52 UTC (permalink / raw)
To: Denys Dmytriyenko, Bryan Evenson; +Cc: poky
On Friday 11 April 2014 13:46:50 Paul Eggleton wrote:
> On Thursday 10 April 2014 17:43:18 Denys Dmytriyenko wrote:
> > On Fri, Apr 11, 2014 at 12:30:31AM +0300, Alexandru Vaduva wrote:
> > > Sorry to hijack this conversation but I believe in the next version of
> > > poky
> > > the package openssl should be updated and and for the rest of the
> > > version
> > > a
> > > patch should be applied to solve the newly appeared exploit.
> > > More info here:
> > > http://thehackernews.com/2014/04/heartbleed-openssl-zero-day-bug-leaves.
> > > ht
> > > ml https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
>
> Just for reference this bug has been fixed in master (by an upgrade to
> 1.0.1g) and both dora and dylan. For dora and dylan only the patch to fix
> the bug was backported rather than the full upgrade (along with three other
> OpenSSL CVEs).
> > > On Thu, Apr 10, 2014 at 11:20 PM, Bryan Evenson
>
> <bevenson@melinkcorp.com>wrote:
> > > > All,
> > > >
> > > > I was previously on dylan-1.4.1 and today I upgraded to poky/dylan
> > > > HEAD
> > > > to
> > > > take in the openssl security patches. Things are rebuilding, but I
> > > > noticed
> > > > that the built package version is openssl-1.0.1e-r15.0, which is the
> > > > same
> > > > version currently installed on my system. Shouldn't the PR line
> > > > change
> > > > to:
> > > >
> > > > PR = "${INC_PR+1}.0"
> > > >
> > > > For the packaging systems to take in the update?
> >
> > Well, I guess people are so used to not caring about tracking PRs anymore,
> > they forget to bump them when backporting fixes to older branches. Paul?
>
> It seems to me that we already decided for dylan not to bump PR values as
> part of standard procedure on changes - I am struggling to find a citation
> for this though. However, given the severity of this bug, for people's
> peace of mind I have sent out a PR bump patch for openssl for both dylan
> and dora, so it's a little easier to tell you have the patch applied.
I perhaps neglected to mention, if you are maintaining a package feed
and therefore need PR values to increment automatically on changes,
you should enable the PR service:
http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#incrementing-a-package-revision-number
Cheers,
Paul
--
Paul Eggleton
Intel Open Source Technology Centre
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2014-04-11 12:52 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-04-10 20:20 openssl: Need PRINC+1 in recipe? Bryan Evenson
2014-04-10 21:30 ` Alexandru Vaduva
2014-04-10 21:43 ` Denys Dmytriyenko
2014-04-11 12:46 ` Paul Eggleton
2014-04-11 12:52 ` Paul Eggleton
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.