From: Paul Eggleton <paul.eggleton@linux.intel.com>
To: openembedded-core@lists.openembedded.org
Subject: [dora][PATCH 0/6] OpenSSL CVE fixes for the dora branch
Date: Mon, 9 Jun 2014 16:53:42 +0100 [thread overview]
Message-ID: <cover.1402329156.git.paul.eggleton@linux.intel.com> (raw)
The following changes since commit 68da848e0f7f026bf18707d8d59143177ff66f9b:
gnutls: patch for CVE-2014-3466 backported (2014-06-06 10:27:11 +0100)
are available in the git repository at:
git://git.openembedded.org/openembedded-core-contrib paule/openssl-dora
http://cgit.openembedded.org/cgit.cgi/openembedded-core-contrib/log/?h=paule/openssl-dora
Paul Eggleton (5):
openssl: fix CVE-2014-0195
openssl: use upstream fix for CVE-2014-0198
openssl: fix CVE-2014-0221
openssl: fix CVE-2014-0224
openssl: fix CVE-2014-3470
Yue Tao (1):
openssl: fix for CVE-2010-5298
.../openssl-1.0.1e-cve-2014-0195.patch | 40 ++++++++
.../openssl-1.0.1e-cve-2014-0198.patch | 38 ++++++++
.../openssl-1.0.1e-cve-2014-0221.patch | 38 ++++++++
.../openssl-1.0.1e-cve-2014-0224.patch | 103 +++++++++++++++++++++
.../openssl-1.0.1e-cve-2014-3470.patch | 31 +++++++
.../openssl-1.0.1e/openssl-CVE-2010-5298.patch | 24 +++++
.../openssl-1.0.1e/openssl-CVE-2014-0198-fix.patch | 23 -----
.../recipes-connectivity/openssl/openssl_1.0.1e.bb | 7 +-
8 files changed, 280 insertions(+), 24 deletions(-)
create mode 100644 meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-1.0.1e-cve-2014-0195.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-1.0.1e-cve-2014-0198.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-1.0.1e-cve-2014-0221.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-1.0.1e-cve-2014-0224.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-1.0.1e-cve-2014-3470.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-CVE-2010-5298.patch
delete mode 100644 meta/recipes-connectivity/openssl/openssl-1.0.1e/openssl-CVE-2014-0198-fix.patch
--
1.9.3
next reply other threads:[~2014-06-09 15:53 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-06-09 15:53 Paul Eggleton [this message]
2014-06-09 15:53 ` [dora][PATCH 1/6] openssl: fix CVE-2014-0195 Paul Eggleton
2014-06-09 15:53 ` [dora][PATCH 2/6] openssl: use upstream fix for CVE-2014-0198 Paul Eggleton
2014-06-09 15:53 ` [dora][PATCH 3/6] openssl: fix CVE-2014-0221 Paul Eggleton
2014-06-09 15:53 ` [dora][PATCH 4/6] openssl: fix CVE-2014-0224 Paul Eggleton
2014-06-09 15:53 ` [dora][PATCH 5/6] openssl: fix CVE-2014-3470 Paul Eggleton
2014-06-09 15:53 ` [dora][PATCH 6/6] openssl: fix for CVE-2010-5298 Paul Eggleton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1402329156.git.paul.eggleton@linux.intel.com \
--to=paul.eggleton@linux.intel.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.