From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mail.openembedded.org (Postfix) with ESMTP id BB46D6FF5D for ; Mon, 18 Jan 2016 09:19:08 +0000 (UTC) Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga101.fm.intel.com with ESMTP; 18 Jan 2016 01:19:10 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.22,312,1449561600"; d="scan'208";a="862926720" Received: from jlock-mobl1.gar.corp.intel.com ([10.252.31.203]) by orsmga001.jf.intel.com with ESMTP; 18 Jan 2016 01:19:07 -0800 From: Joshua Lock To: openembedded-core@lists.openembedded.org Date: Mon, 18 Jan 2016 09:18:55 +0000 Message-Id: X-Mailer: git-send-email 2.5.0 Subject: [PATCH 00/16][Fido] Consolidated pull X-BeenThere: openembedded-core@lists.openembedded.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Patches and discussions about the oe-core layer List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 18 Jan 2016 09:19:10 -0000 The following changes since commit 3f2701c102e4e5b95fc79a8d967f9c48f8232fc6: grub2: Fix CVE-2015-8370 (2016-01-11 11:10:11 +0000) are available in the git repository at: git://git.openembedded.org/openembedded-core-contrib joshuagl/fido-next http://cgit.openembedded.org/cgit.cgi/openembedded-core-contrib/log/?h=joshuagl/fido-next Armin Kuster (13): openssl: fix for CVE-2015-3193 openssl: fix for CVE-2015-3194 openssl: fix for CVE-2015-3195 libxml2: security fix CVE-2015-7941 libxml2: security fix CVE-2015-8317 libxml2: security fix CVE-2015-7942 libxml2: security fix CVE-2015-8035 libxml2: security fix CVE-2015-7498 libxml2: security fix CVE-2015-7497 libxml2: security fix CVE-2015-7499 libxml2: security fix CVE-2015-7500 libxml2: security fix CVE-2015-8242 libxml2: security fix CVE-2015-5312 Hongxu Jia (1): logrotate: do not move binary logrotate to /usr/bin Joshua Lock (1): libxml2: remove files for easier maintenance Martin Jansa (1): texinfo: don't create dependency on INHERIT variable .../openssl/0001-Add-test-for-CVE-2015-3194.patch | 66 ++++++++++ ...64-mont5.pl-fix-carry-propagating-bug-CVE.patch | 101 +++++++++++++++ .../CVE-2015-3194-1-Add-PSS-parameter-check.patch | 45 +++++++ ...CVE-2015-3195-Fix-leak-with-ASN.1-combine.patch | 66 ++++++++++ .../recipes-connectivity/openssl/openssl_1.0.2d.bb | 4 + meta/recipes-core/libxml/libxml2.inc | 16 ++- ...-2015-5312-Another-entity-expansion-issue.patch | 39 ++++++ ...97-Avoid-an-heap-buffer-overflow-in-xmlDi.patch | 40 ++++++ ...00-Fix-memory-access-error-due-to-incorre.patch | 131 +++++++++++++++++++ ...015-8035-Fix-XZ-compression-support-loop.patch} | 9 +- ...42-Buffer-overead-with-HTML-parser-in-pus.patch | 49 ++++++++ ...n-name-parsing-at-the-end-of-current-inpu.patch | 138 +++++++++++++++++++++ ...ssing-entities-after-encoding-conversion-.patch | 89 +++++++++++++ ...99-1-Add-xmlHaltParser-to-stop-the-parser.patch | 88 +++++++++++++ ...VE-2015-7499-2-Detect-incoherency-on-GROW.patch | 43 +++++++ ...top-parsing-on-entities-boundaries-errors.patch | 39 ++++++ ...eanup-conditional-section-error-handling.patch} | 25 ++-- ...ror-in-previous-Conditional-section-patch.patch | 35 ++++++ ...iation-of-overflow-in-Conditional-section.patch | 39 ++++++ ...ng-early-on-if-encoding-conversion-failed.patch | 42 +++++++ meta/recipes-extended/logrotate/logrotate_3.8.8.bb | 2 +- meta/recipes-extended/texinfo/texinfo_5.2.bb | 2 +- 22 files changed, 1086 insertions(+), 22 deletions(-) create mode 100644 meta/recipes-connectivity/openssl/openssl/0001-Add-test-for-CVE-2015-3194.patch create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2015-3193-bn-asm-x86_64-mont5.pl-fix-carry-propagating-bug-CVE.patch create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2015-3194-1-Add-PSS-parameter-check.patch create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2015-3195-Fix-leak-with-ASN.1-combine.patch create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-5312-Another-entity-expansion-issue.patch create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-7497-Avoid-an-heap-buffer-overflow-in-xmlDi.patch create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-7500-Fix-memory-access-error-due-to-incorre.patch rename meta/recipes-core/libxml/libxml2/{CVE-2015-8035.patch => 0001-CVE-2015-8035-Fix-XZ-compression-support-loop.patch} (83%) create mode 100644 meta/recipes-core/libxml/libxml2/0001-CVE-2015-8242-Buffer-overead-with-HTML-parser-in-pus.patch create mode 100644 meta/recipes-core/libxml/libxml2/0001-Fix-a-bug-on-name-parsing-at-the-end-of-current-inpu.patch create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7498-Avoid-processing-entities-after-encoding-conversion-.patch create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7499-1-Add-xmlHaltParser-to-stop-the-parser.patch create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7499-2-Detect-incoherency-on-GROW.patch create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7941-1-Stop-parsing-on-entities-boundaries-errors.patch rename meta/recipes-core/libxml/libxml2/{CVE-2015-7942.patch => CVE-2015-7941-2-Cleanup-conditional-section-error-handling.patch} (68%) create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7942-2-Fix-an-error-in-previous-Conditional-section-patch.patch create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-7942-Another-variation-of-overflow-in-Conditional-section.patch create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2015-8317-Fail-parsing-early-on-if-encoding-conversion-failed.patch -- 2.5.0