public inbox for openembedded-core@lists.openembedded.org
 help / color / mirror / Atom feed
* [PATCH 00/13] Jethro, Fido openssl and libxml security fixes vi git
@ 2016-01-12 23:25 Armin Kuster
  2016-01-14  6:22 ` Robert Yang
  2016-01-15 15:17 ` Joshua G Lock
  0 siblings, 2 replies; 3+ messages in thread
From: Armin Kuster @ 2016-01-12 23:25 UTC (permalink / raw)
  To: openembedded-core

changes in contrib branch for alt integration.

The following changes since commit 0073b234d793099a371b2e529f740987decce756:

  yocto-bsp: Typo on the file extension (2016-01-07 12:13:55 +0000)

are available in the git repository at:

  git://git.yoctoproject.org/poky-contrib akuster/jethro_sec_fixes
  http://git.yoctoproject.org/cgit.cgi/poky-contrib/log/?h=akuster/jethro_sec_fixes

Armin Kuster (13):
  openssl: fix for CVE-2015-3193
  openssl: fix for CVE-2015-3194
  openssl: fix for CVE-2015-3195
  libxml2: security fix CVE-2015-7941
  libxml2: security fix CVE-2015-8317
  libxml2: security fix CVE-2015-7942
  libxml2: security fix CVE-2015-8035
  libxml2: security fix CVE-2015-7498
  libxml2: security fix CVE-2015-7497
  libxml2: security fix CVE-2015-7499
  libxml2: security fix CVE-2015-7500
  libxml2: security fix CVE-2015-8242
  libxml2: security fix CVE-2015-5312

 .../openssl/0001-Add-test-for-CVE-2015-3194.patch  |  66 ++++++++++
 ...64-mont5.pl-fix-carry-propagating-bug-CVE.patch | 101 +++++++++++++++
 .../CVE-2015-3194-1-Add-PSS-parameter-check.patch  |  45 +++++++
 ...CVE-2015-3195-Fix-leak-with-ASN.1-combine.patch |  66 ++++++++++
 .../recipes-connectivity/openssl/openssl_1.0.2d.bb |   4 +
 meta/recipes-core/libxml/libxml2.inc               |  14 +++
 ...-2015-5312-Another-entity-expansion-issue.patch |  39 ++++++
 ...97-Avoid-an-heap-buffer-overflow-in-xmlDi.patch |  40 ++++++
 ...00-Fix-memory-access-error-due-to-incorre.patch | 131 +++++++++++++++++++
 ...2015-8035-Fix-XZ-compression-support-loop.patch |  38 ++++++
 ...42-Buffer-overead-with-HTML-parser-in-pus.patch |  49 ++++++++
 ...n-name-parsing-at-the-end-of-current-inpu.patch | 138 +++++++++++++++++++++
 ...ssing-entities-after-encoding-conversion-.patch |  89 +++++++++++++
 ...99-1-Add-xmlHaltParser-to-stop-the-parser.patch |  88 +++++++++++++
 ...VE-2015-7499-2-Detect-incoherency-on-GROW.patch |  43 +++++++
 ...top-parsing-on-entities-boundaries-errors.patch |  39 ++++++
 ...leanup-conditional-section-error-handling.patch |  56 +++++++++
 ...ror-in-previous-Conditional-section-patch.patch |  35 ++++++
 ...iation-of-overflow-in-Conditional-section.patch |  39 ++++++
 ...ng-early-on-if-encoding-conversion-failed.patch |  42 +++++++
 20 files changed, 1162 insertions(+)
 create mode 100644 meta/recipes-connectivity/openssl/openssl/0001-Add-test-for-CVE-2015-3194.patch
 create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2015-3193-bn-asm-x86_64-mont5.pl-fix-carry-propagating-bug-CVE.patch
 create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2015-3194-1-Add-PSS-parameter-check.patch
 create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2015-3195-Fix-leak-with-ASN.1-combine.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-5312-Another-entity-expansion-issue.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-7497-Avoid-an-heap-buffer-overflow-in-xmlDi.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-7500-Fix-memory-access-error-due-to-incorre.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-8035-Fix-XZ-compression-support-loop.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-8242-Buffer-overead-with-HTML-parser-in-pus.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/0001-Fix-a-bug-on-name-parsing-at-the-end-of-current-inpu.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7498-Avoid-processing-entities-after-encoding-conversion-.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7499-1-Add-xmlHaltParser-to-stop-the-parser.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7499-2-Detect-incoherency-on-GROW.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7941-1-Stop-parsing-on-entities-boundaries-errors.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7941-2-Cleanup-conditional-section-error-handling.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7942-2-Fix-an-error-in-previous-Conditional-section-patch.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7942-Another-variation-of-overflow-in-Conditional-section.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-8317-Fail-parsing-early-on-if-encoding-conversion-failed.patch

-- 
2.3.5



^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH 00/13] Jethro, Fido openssl and libxml security fixes vi git
  2016-01-12 23:25 [PATCH 00/13] Jethro, Fido openssl and libxml security fixes vi git Armin Kuster
@ 2016-01-14  6:22 ` Robert Yang
  2016-01-15 15:17 ` Joshua G Lock
  1 sibling, 0 replies; 3+ messages in thread
From: Robert Yang @ 2016-01-14  6:22 UTC (permalink / raw)
  To: Wold, Saul, Richard Purdie; +Cc: openembedded-core

Hi RP and Saul,

I've verified that these patches built well on jethro, would you please help
to merge them?

   git://git.openembedded.org/openembedded-core-contrib rbt/jethro-next
 
http://cgit.openembedded.org/cgit.cgi/openembedded-core-contrib/log/?h=rbt/jethro-next

Armin Kuster (13):
   openssl: fix for CVE-2015-3193
   openssl: fix for CVE-2015-3194
   openssl: fix for CVE-2015-3195
   libxml2: security fix CVE-2015-7941
   libxml2: security fix CVE-2015-8317
   libxml2: security fix CVE-2015-7942
   libxml2: security fix CVE-2015-8035
   libxml2: security fix CVE-2015-7498
   libxml2: security fix CVE-2015-7497
   libxml2: security fix CVE-2015-7499
   libxml2: security fix CVE-2015-7500
   libxml2: security fix CVE-2015-8242
   libxml2: security fix CVE-2015-5312

// Robert

On 01/13/2016 07:25 AM, Armin Kuster wrote:
> changes in contrib branch for alt integration.
>
> The following changes since commit 0073b234d793099a371b2e529f740987decce756:
>
>    yocto-bsp: Typo on the file extension (2016-01-07 12:13:55 +0000)
>
> are available in the git repository at:
>
>    git://git.yoctoproject.org/poky-contrib akuster/jethro_sec_fixes
>    http://git.yoctoproject.org/cgit.cgi/poky-contrib/log/?h=akuster/jethro_sec_fixes
>
> Armin Kuster (13):
>    openssl: fix for CVE-2015-3193
>    openssl: fix for CVE-2015-3194
>    openssl: fix for CVE-2015-3195
>    libxml2: security fix CVE-2015-7941
>    libxml2: security fix CVE-2015-8317
>    libxml2: security fix CVE-2015-7942
>    libxml2: security fix CVE-2015-8035
>    libxml2: security fix CVE-2015-7498
>    libxml2: security fix CVE-2015-7497
>    libxml2: security fix CVE-2015-7499
>    libxml2: security fix CVE-2015-7500
>    libxml2: security fix CVE-2015-8242
>    libxml2: security fix CVE-2015-5312
>
>   .../openssl/0001-Add-test-for-CVE-2015-3194.patch  |  66 ++++++++++
>   ...64-mont5.pl-fix-carry-propagating-bug-CVE.patch | 101 +++++++++++++++
>   .../CVE-2015-3194-1-Add-PSS-parameter-check.patch  |  45 +++++++
>   ...CVE-2015-3195-Fix-leak-with-ASN.1-combine.patch |  66 ++++++++++
>   .../recipes-connectivity/openssl/openssl_1.0.2d.bb |   4 +
>   meta/recipes-core/libxml/libxml2.inc               |  14 +++
>   ...-2015-5312-Another-entity-expansion-issue.patch |  39 ++++++
>   ...97-Avoid-an-heap-buffer-overflow-in-xmlDi.patch |  40 ++++++
>   ...00-Fix-memory-access-error-due-to-incorre.patch | 131 +++++++++++++++++++
>   ...2015-8035-Fix-XZ-compression-support-loop.patch |  38 ++++++
>   ...42-Buffer-overead-with-HTML-parser-in-pus.patch |  49 ++++++++
>   ...n-name-parsing-at-the-end-of-current-inpu.patch | 138 +++++++++++++++++++++
>   ...ssing-entities-after-encoding-conversion-.patch |  89 +++++++++++++
>   ...99-1-Add-xmlHaltParser-to-stop-the-parser.patch |  88 +++++++++++++
>   ...VE-2015-7499-2-Detect-incoherency-on-GROW.patch |  43 +++++++
>   ...top-parsing-on-entities-boundaries-errors.patch |  39 ++++++
>   ...leanup-conditional-section-error-handling.patch |  56 +++++++++
>   ...ror-in-previous-Conditional-section-patch.patch |  35 ++++++
>   ...iation-of-overflow-in-Conditional-section.patch |  39 ++++++
>   ...ng-early-on-if-encoding-conversion-failed.patch |  42 +++++++
>   20 files changed, 1162 insertions(+)
>   create mode 100644 meta/recipes-connectivity/openssl/openssl/0001-Add-test-for-CVE-2015-3194.patch
>   create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2015-3193-bn-asm-x86_64-mont5.pl-fix-carry-propagating-bug-CVE.patch
>   create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2015-3194-1-Add-PSS-parameter-check.patch
>   create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2015-3195-Fix-leak-with-ASN.1-combine.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-5312-Another-entity-expansion-issue.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-7497-Avoid-an-heap-buffer-overflow-in-xmlDi.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-7500-Fix-memory-access-error-due-to-incorre.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-8035-Fix-XZ-compression-support-loop.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-8242-Buffer-overead-with-HTML-parser-in-pus.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/0001-Fix-a-bug-on-name-parsing-at-the-end-of-current-inpu.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7498-Avoid-processing-entities-after-encoding-conversion-.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7499-1-Add-xmlHaltParser-to-stop-the-parser.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7499-2-Detect-incoherency-on-GROW.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7941-1-Stop-parsing-on-entities-boundaries-errors.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7941-2-Cleanup-conditional-section-error-handling.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7942-2-Fix-an-error-in-previous-Conditional-section-patch.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7942-Another-variation-of-overflow-in-Conditional-section.patch
>   create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-8317-Fail-parsing-early-on-if-encoding-conversion-failed.patch
>


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH 00/13] Jethro, Fido openssl and libxml security fixes vi git
  2016-01-12 23:25 [PATCH 00/13] Jethro, Fido openssl and libxml security fixes vi git Armin Kuster
  2016-01-14  6:22 ` Robert Yang
@ 2016-01-15 15:17 ` Joshua G Lock
  1 sibling, 0 replies; 3+ messages in thread
From: Joshua G Lock @ 2016-01-15 15:17 UTC (permalink / raw)
  To: Armin Kuster, openembedded-core

On Tue, 2016-01-12 at 15:25 -0800, Armin Kuster wrote:
> changes in contrib branch for alt integration.
> 
> The following changes since commit
> 0073b234d793099a371b2e529f740987decce756:
> 
>   yocto-bsp: Typo on the file extension (2016-01-07 12:13:55 +0000)
> 
> are available in the git repository at:
> 

Thanks very much for these Armin. I've included them in my
joshugal/fido-next branch and intend to submit that for merge soon.

Regards,

Joshua

>   git://git.yoctoproject.org/poky-contrib akuster/jethro_sec_fixes
>   http://git.yoctoproject.org/cgit.cgi/poky-contrib/log/?h=akuster/je
> thro_sec_fixes
> 
> Armin Kuster (13):
>   openssl: fix for CVE-2015-3193
>   openssl: fix for CVE-2015-3194
>   openssl: fix for CVE-2015-3195
>   libxml2: security fix CVE-2015-7941
>   libxml2: security fix CVE-2015-8317
>   libxml2: security fix CVE-2015-7942
>   libxml2: security fix CVE-2015-8035
>   libxml2: security fix CVE-2015-7498
>   libxml2: security fix CVE-2015-7497
>   libxml2: security fix CVE-2015-7499
>   libxml2: security fix CVE-2015-7500
>   libxml2: security fix CVE-2015-8242
>   libxml2: security fix CVE-2015-5312
> 
>  .../openssl/0001-Add-test-for-CVE-2015-3194.patch  |  66 ++++++++++
>  ...64-mont5.pl-fix-carry-propagating-bug-CVE.patch | 101
> +++++++++++++++
>  .../CVE-2015-3194-1-Add-PSS-parameter-check.patch  |  45 +++++++
>  ...CVE-2015-3195-Fix-leak-with-ASN.1-combine.patch |  66 ++++++++++
>  .../recipes-connectivity/openssl/openssl_1.0.2d.bb |   4 +
>  meta/recipes-core/libxml/libxml2.inc               |  14 +++
>  ...-2015-5312-Another-entity-expansion-issue.patch |  39 ++++++
>  ...97-Avoid-an-heap-buffer-overflow-in-xmlDi.patch |  40 ++++++
>  ...00-Fix-memory-access-error-due-to-incorre.patch | 131
> +++++++++++++++++++
>  ...2015-8035-Fix-XZ-compression-support-loop.patch |  38 ++++++
>  ...42-Buffer-overead-with-HTML-parser-in-pus.patch |  49 ++++++++
>  ...n-name-parsing-at-the-end-of-current-inpu.patch | 138
> +++++++++++++++++++++
>  ...ssing-entities-after-encoding-conversion-.patch |  89
> +++++++++++++
>  ...99-1-Add-xmlHaltParser-to-stop-the-parser.patch |  88
> +++++++++++++
>  ...VE-2015-7499-2-Detect-incoherency-on-GROW.patch |  43 +++++++
>  ...top-parsing-on-entities-boundaries-errors.patch |  39 ++++++
>  ...leanup-conditional-section-error-handling.patch |  56 +++++++++
>  ...ror-in-previous-Conditional-section-patch.patch |  35 ++++++
>  ...iation-of-overflow-in-Conditional-section.patch |  39 ++++++
>  ...ng-early-on-if-encoding-conversion-failed.patch |  42 +++++++
>  20 files changed, 1162 insertions(+)
>  create mode 100644 meta/recipes-connectivity/openssl/openssl/0001-
> Add-test-for-CVE-2015-3194.patch
>  create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-
> 2015-3193-bn-asm-x86_64-mont5.pl-fix-carry-propagating-bug-CVE.patch
>  create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-
> 2015-3194-1-Add-PSS-parameter-check.patch
>  create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-
> 2015-3195-Fix-leak-with-ASN.1-combine.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-
> 5312-Another-entity-expansion-issue.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-
> 7497-Avoid-an-heap-buffer-overflow-in-xmlDi.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-
> 7500-Fix-memory-access-error-due-to-incorre.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-
> 8035-Fix-XZ-compression-support-loop.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-
> 8242-Buffer-overead-with-HTML-parser-in-pus.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/0001-Fix-a-bug-
> on-name-parsing-at-the-end-of-current-inpu.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7498-
> Avoid-processing-entities-after-encoding-conversion-.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7499-1-
> Add-xmlHaltParser-to-stop-the-parser.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7499-2-
> Detect-incoherency-on-GROW.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7941-1-
> Stop-parsing-on-entities-boundaries-errors.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7941-2-
> Cleanup-conditional-section-error-handling.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7942-2-
> Fix-an-error-in-previous-Conditional-section-patch.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7942-
> Another-variation-of-overflow-in-Conditional-section.patch
>  create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-8317-
> Fail-parsing-early-on-if-encoding-conversion-failed.patch
> 
> -- 
> 2.3.5
> 


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2016-01-15 15:18 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-01-12 23:25 [PATCH 00/13] Jethro, Fido openssl and libxml security fixes vi git Armin Kuster
2016-01-14  6:22 ` Robert Yang
2016-01-15 15:17 ` Joshua G Lock

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox