All of lore.kernel.org
 help / color / mirror / Atom feed
From: Robert Yang <liezhi.yang@windriver.com>
To: Paul Eggleton <paul.eggleton@linux.intel.com>,
	<openembedded-core@lists.openembedded.org>
Subject: Re: [dora][PATCH 0/4] OpenSSL CVE fixes for the dora branch
Date: Thu, 10 Apr 2014 10:32:20 +0800	[thread overview]
Message-ID: <534602B4.1050509@windriver.com> (raw)
In-Reply-To: <cover.1396980809.git.paul.eggleton@linux.intel.com>


Reviewed and Tested by Robert Yang <liezhi.yang@windriver.com>

// Robert

On 04/09/2014 02:15 AM, Paul Eggleton wrote:
> Three backports for CVE fixes from master, plus one new fix for the
> latest CVE (CVE-2014-0160). The latter is not needed for master with
> Cristiana's upgrade to version 1.0.1g sent out today.
>
>
> The following changes since commit 590c2135858bb5d0cfc375c0d82ca610550ccd4a:
>
>    Revert "buildhistory_analysis: fix error when comparing image contents" (2014-04-04 16:16:39 +0100)
>
> are available in the git repository at:
>
>    git://git.openembedded.org/openembedded-core-contrib paule/openssl-cves
>    http://cgit.openembedded.org/cgit.cgi/openembedded-core-contrib/log/?h=paule/openssl-cves
>
> Paul Eggleton (1):
>    openssl: backport fix for CVE-2014-0160
>
> Yue Tao (3):
>    Security Advisory - openssl - CVE-2013-4353
>    Security Advisory - openssl - CVE-2013-6450
>    Security Advisory - openssl - CVE-2013-6449
>
>   ...DTLS-retransmission-from-previous-session.patch |  81 ++++++++++++++
>   ...or-TLS-record-tampering-bug-CVE-2013-4353.patch |  31 ++++++
>   ...e-version-in-SSL_METHOD-not-SSL-structure.patch |  33 ++++++
>   .../openssl/openssl-1.0.1e/CVE-2014-0160.patch     | 118 +++++++++++++++++++++
>   .../recipes-connectivity/openssl/openssl_1.0.1e.bb |   4 +
>   5 files changed, 267 insertions(+)
>   create mode 100644 meta/recipes-connectivity/openssl/openssl-1.0.1e/0001-Fix-DTLS-retransmission-from-previous-session.patch
>   create mode 100644 meta/recipes-connectivity/openssl/openssl-1.0.1e/0001-Fix-for-TLS-record-tampering-bug-CVE-2013-4353.patch
>   create mode 100644 meta/recipes-connectivity/openssl/openssl-1.0.1e/0001-Use-version-in-SSL_METHOD-not-SSL-structure.patch
>   create mode 100644 meta/recipes-connectivity/openssl/openssl-1.0.1e/CVE-2014-0160.patch
>


      parent reply	other threads:[~2014-04-10  2:32 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-04-08 18:15 [dora][PATCH 0/4] OpenSSL CVE fixes for the dora branch Paul Eggleton
2014-04-08 18:15 ` [dora][PATCH 1/4] Security Advisory - openssl - CVE-2013-4353 Paul Eggleton
2014-04-08 18:15 ` [dora][PATCH 2/4] Security Advisory - openssl - CVE-2013-6450 Paul Eggleton
2014-04-08 18:15 ` [dora][PATCH 3/4] Security Advisory - openssl - CVE-2013-6449 Paul Eggleton
2014-04-08 18:15 ` [dora][PATCH 4/4] openssl: backport fix for CVE-2014-0160 Paul Eggleton
2014-04-10  2:32 ` Robert Yang [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=534602B4.1050509@windriver.com \
    --to=liezhi.yang@windriver.com \
    --cc=openembedded-core@lists.openembedded.org \
    --cc=paul.eggleton@linux.intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.