* openssl: Need PRINC+1 in recipe?
@ 2014-04-10 20:20 Bryan Evenson
2014-04-10 21:30 ` Alexandru Vaduva
0 siblings, 1 reply; 5+ messages in thread
From: Bryan Evenson @ 2014-04-10 20:20 UTC (permalink / raw)
To: poky@yoctoproject.org
All,
I was previously on dylan-1.4.1 and today I upgraded to poky/dylan HEAD to take in the openssl security patches. Things are rebuilding, but I noticed that the built package version is openssl-1.0.1e-r15.0, which is the same version currently installed on my system. Shouldn't the PR line change to:
PR = "${INC_PR+1}.0"
For the packaging systems to take in the update?
Thanks,
Bryan
^ permalink raw reply [flat|nested] 5+ messages in thread* Re: openssl: Need PRINC+1 in recipe? 2014-04-10 20:20 openssl: Need PRINC+1 in recipe? Bryan Evenson @ 2014-04-10 21:30 ` Alexandru Vaduva 2014-04-10 21:43 ` Denys Dmytriyenko 0 siblings, 1 reply; 5+ messages in thread From: Alexandru Vaduva @ 2014-04-10 21:30 UTC (permalink / raw) To: Bryan Evenson; +Cc: poky@yoctoproject.org [-- Attachment #1: Type: text/plain, Size: 1060 bytes --] Sorry to hijack this conversation but I believe in the next version of poky the package openssl should be updated and and for the rest of the version a patch should be applied to solve the newly appeared exploit. More info here: http://thehackernews.com/2014/04/heartbleed-openssl-zero-day-bug-leaves.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 Alex On Thu, Apr 10, 2014 at 11:20 PM, Bryan Evenson <bevenson@melinkcorp.com>wrote: > All, > > I was previously on dylan-1.4.1 and today I upgraded to poky/dylan HEAD to > take in the openssl security patches. Things are rebuilding, but I noticed > that the built package version is openssl-1.0.1e-r15.0, which is the same > version currently installed on my system. Shouldn't the PR line change to: > > PR = "${INC_PR+1}.0" > > For the packaging systems to take in the update? > > Thanks, > Bryan > > > > -- > _______________________________________________ > poky mailing list > poky@yoctoproject.org > https://lists.yoctoproject.org/listinfo/poky > [-- Attachment #2: Type: text/html, Size: 1788 bytes --] ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: openssl: Need PRINC+1 in recipe? 2014-04-10 21:30 ` Alexandru Vaduva @ 2014-04-10 21:43 ` Denys Dmytriyenko 2014-04-11 12:46 ` Paul Eggleton 0 siblings, 1 reply; 5+ messages in thread From: Denys Dmytriyenko @ 2014-04-10 21:43 UTC (permalink / raw) To: Alexandru Vaduva; +Cc: poky@yoctoproject.org On Fri, Apr 11, 2014 at 12:30:31AM +0300, Alexandru Vaduva wrote: > Sorry to hijack this conversation but I believe in the next version of poky > the package openssl should be updated and and for the rest of the version a > patch should be applied to solve the newly appeared exploit. > More info here: > http://thehackernews.com/2014/04/heartbleed-openssl-zero-day-bug-leaves.html > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 Yes, that's what he was referring to... > On Thu, Apr 10, 2014 at 11:20 PM, Bryan Evenson <bevenson@melinkcorp.com>wrote: > > > All, > > > > I was previously on dylan-1.4.1 and today I upgraded to poky/dylan HEAD to > > take in the openssl security patches. Things are rebuilding, but I noticed > > that the built package version is openssl-1.0.1e-r15.0, which is the same > > version currently installed on my system. Shouldn't the PR line change to: > > > > PR = "${INC_PR+1}.0" > > > > For the packaging systems to take in the update? Well, I guess people are so used to not caring about tracking PRs anymore, they forget to bump them when backporting fixes to older branches. Paul? -- Denys ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: openssl: Need PRINC+1 in recipe? 2014-04-10 21:43 ` Denys Dmytriyenko @ 2014-04-11 12:46 ` Paul Eggleton 2014-04-11 12:52 ` Paul Eggleton 0 siblings, 1 reply; 5+ messages in thread From: Paul Eggleton @ 2014-04-11 12:46 UTC (permalink / raw) To: Denys Dmytriyenko, Alexandru Vaduva; +Cc: poky On Thursday 10 April 2014 17:43:18 Denys Dmytriyenko wrote: > On Fri, Apr 11, 2014 at 12:30:31AM +0300, Alexandru Vaduva wrote: > > Sorry to hijack this conversation but I believe in the next version of > > poky > > the package openssl should be updated and and for the rest of the version > > a > > patch should be applied to solve the newly appeared exploit. > > More info here: > > http://thehackernews.com/2014/04/heartbleed-openssl-zero-day-bug-leaves.ht > > ml https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 Just for reference this bug has been fixed in master (by an upgrade to 1.0.1g) and both dora and dylan. For dora and dylan only the patch to fix the bug was backported rather than the full upgrade (along with three other OpenSSL CVEs). > > On Thu, Apr 10, 2014 at 11:20 PM, Bryan Evenson <bevenson@melinkcorp.com>wrote: > > > All, > > > > > > I was previously on dylan-1.4.1 and today I upgraded to poky/dylan HEAD > > > to > > > take in the openssl security patches. Things are rebuilding, but I > > > noticed > > > that the built package version is openssl-1.0.1e-r15.0, which is the > > > same > > > version currently installed on my system. Shouldn't the PR line change > > > to: > > > > > > PR = "${INC_PR+1}.0" > > > > > > For the packaging systems to take in the update? > > Well, I guess people are so used to not caring about tracking PRs anymore, > they forget to bump them when backporting fixes to older branches. Paul? It seems to me that we already decided for dylan not to bump PR values as part of standard procedure on changes - I am struggling to find a citation for this though. However, given the severity of this bug, for people's peace of mind I have sent out a PR bump patch for openssl for both dylan and dora, so it's a little easier to tell you have the patch applied. Cheers, Paul -- Paul Eggleton Intel Open Source Technology Centre ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: openssl: Need PRINC+1 in recipe? 2014-04-11 12:46 ` Paul Eggleton @ 2014-04-11 12:52 ` Paul Eggleton 0 siblings, 0 replies; 5+ messages in thread From: Paul Eggleton @ 2014-04-11 12:52 UTC (permalink / raw) To: Denys Dmytriyenko, Bryan Evenson; +Cc: poky On Friday 11 April 2014 13:46:50 Paul Eggleton wrote: > On Thursday 10 April 2014 17:43:18 Denys Dmytriyenko wrote: > > On Fri, Apr 11, 2014 at 12:30:31AM +0300, Alexandru Vaduva wrote: > > > Sorry to hijack this conversation but I believe in the next version of > > > poky > > > the package openssl should be updated and and for the rest of the > > > version > > > a > > > patch should be applied to solve the newly appeared exploit. > > > More info here: > > > http://thehackernews.com/2014/04/heartbleed-openssl-zero-day-bug-leaves. > > > ht > > > ml https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 > > Just for reference this bug has been fixed in master (by an upgrade to > 1.0.1g) and both dora and dylan. For dora and dylan only the patch to fix > the bug was backported rather than the full upgrade (along with three other > OpenSSL CVEs). > > > On Thu, Apr 10, 2014 at 11:20 PM, Bryan Evenson > > <bevenson@melinkcorp.com>wrote: > > > > All, > > > > > > > > I was previously on dylan-1.4.1 and today I upgraded to poky/dylan > > > > HEAD > > > > to > > > > take in the openssl security patches. Things are rebuilding, but I > > > > noticed > > > > that the built package version is openssl-1.0.1e-r15.0, which is the > > > > same > > > > version currently installed on my system. Shouldn't the PR line > > > > change > > > > to: > > > > > > > > PR = "${INC_PR+1}.0" > > > > > > > > For the packaging systems to take in the update? > > > > Well, I guess people are so used to not caring about tracking PRs anymore, > > they forget to bump them when backporting fixes to older branches. Paul? > > It seems to me that we already decided for dylan not to bump PR values as > part of standard procedure on changes - I am struggling to find a citation > for this though. However, given the severity of this bug, for people's > peace of mind I have sent out a PR bump patch for openssl for both dylan > and dora, so it's a little easier to tell you have the patch applied. I perhaps neglected to mention, if you are maintaining a package feed and therefore need PR values to increment automatically on changes, you should enable the PR service: http://www.yoctoproject.org/docs/current/dev-manual/dev-manual.html#incrementing-a-package-revision-number Cheers, Paul -- Paul Eggleton Intel Open Source Technology Centre ^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2014-04-11 12:52 UTC | newest] Thread overview: 5+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2014-04-10 20:20 openssl: Need PRINC+1 in recipe? Bryan Evenson 2014-04-10 21:30 ` Alexandru Vaduva 2014-04-10 21:43 ` Denys Dmytriyenko 2014-04-11 12:46 ` Paul Eggleton 2014-04-11 12:52 ` Paul Eggleton
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.