From: Armin Kuster <akuster808@gmail.com>
To: akuster@mvista.com, openembedded-core@lists.openembedded.org
Subject: [PATCH 00/14][v2] Krogoth next pull request
Date: Mon, 26 Sep 2016 15:46:00 -0700 [thread overview]
Message-ID: <cover.1474929712.git.akuster@mvista.com> (raw)
From: Armin Kuster <akuster@mvista.com>
Fixed several typos in the openssl commits.
This includes a fix for systemd
[Yocto # 10329]
The following changes since commit e6c1d03d3d161cbbda254a5dae7008ff7e37d874:
oeqa/buildiptables: Switch from netfilter.org to yoctoproject.org mirror (2016-09-24 09:27:51 +0100)
are available in the git repository at:
http://git.yoctoproject.org/git/poky-contrib akuster/krogoth-next
http://git.yoctoproject.org/cgit.cgi/poky-contrib/log/?h=akuster/krogoth-next
Armin Kuster (9):
openssl: Security fix CVE-2016-2178
openssl: Security fix CVE-2016-2179
openssl: Security fix CVE-2016-2180
openssl: Security fix CVE-2016-2181
openssl: Security fix CVE-2016-2182
openssl: Security fix CVE-2016-6302
openssl: Security fix CVE-2016-6303
openssl: Security fix CVE-2016-6304
openssl: Security fix CVE-2016-6306
Dengke Du (1):
cracklib: Apply patch to fix CVE-2016-6318
Khem Raj (1):
useradd.bbclass: Strip trailing ';' in cmd params
Martin Jansa (1):
useradd: use bindir_native for pseudo PATH
Zhixiong Chi (2):
wpa_supplicant: Security Advisory-CVE-2016-4476
wpa_supplicant: Security Advisory-CVE-2016-4477
meta/classes/useradd.bbclass | 18 +-
.../openssl/openssl/CVE-2016-2178.patch | 54 +++++
.../openssl/openssl/CVE-2016-2179.patch | 255 +++++++++++++++++++++
.../openssl/openssl/CVE-2016-2180.patch | 44 ++++
.../openssl/openssl/CVE-2016-2181_p1.patch | 91 ++++++++
.../openssl/openssl/CVE-2016-2181_p2.patch | 239 +++++++++++++++++++
.../openssl/openssl/CVE-2016-2181_p3.patch | 30 +++
.../openssl/openssl/CVE-2016-2182.patch | 70 ++++++
.../openssl/openssl/CVE-2016-6302.patch | 53 +++++
.../openssl/openssl/CVE-2016-6303.patch | 36 +++
.../openssl/openssl/CVE-2016-6304.patch | 75 ++++++
.../openssl/openssl/CVE-2016-6306.patch | 71 ++++++
.../recipes-connectivity/openssl/openssl_1.0.2h.bb | 11 +
...parameter-set-with-invalid-passphrase-cha.patch | 55 +++++
...ject-a-Credential-with-invalid-passphrase.patch | 86 +++++++
...CRED-commands-with-newline-characters-in-.patch | 66 ++++++
...ines-from-wpa_supplicant-config-network-o.patch | 86 +++++++
...commands-with-newline-characters-in-the-s.patch | 54 +++++
.../wpa-supplicant/wpa-supplicant_2.5.bb | 5 +
.../0001-Apply-patch-to-fix-CVE-2016-6318.patch | 105 +++++++++
meta/recipes-extended/cracklib/cracklib_2.9.5.bb | 1 +
21 files changed, 1496 insertions(+), 9 deletions(-)
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2016-2178.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2016-2179.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2016-2180.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2016-2181_p1.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2016-2181_p2.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2016-2181_p3.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2016-2182.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2016-6302.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2016-6303.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2016-6304.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2016-6306.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0001-Reject-psk-parameter-set-with-invalid-passphrase-cha.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0001-WPS-Reject-a-Credential-with-invalid-passphrase.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0002-Reject-SET_CRED-commands-with-newline-characters-in-.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0002-Remove-newlines-from-wpa_supplicant-config-network-o.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0003-Reject-SET-commands-with-newline-characters-in-the-s.patch
create mode 100644 meta/recipes-extended/cracklib/cracklib/0001-Apply-patch-to-fix-CVE-2016-6318.patch
--
2.7.4
reply other threads:[~2016-09-26 22:46 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1474929712.git.akuster@mvista.com \
--to=akuster808@gmail.com \
--cc=akuster@mvista.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox