diff options
author | Sona Sarmadi <sona.sarmadi@enea.com> | 2016-05-09 13:29:01 +0200 |
---|---|---|
committer | Tudor Florea <tudor.florea@enea.com> | 2016-05-10 10:26:16 +0200 |
commit | 94e9e6a21b26c8bd0b194d4c2a65cbcb9464a553 (patch) | |
tree | 9d5cf6f89dadcdf9365e632962b393c9fb35c828 /meta/recipes-connectivity/openssl/openssl_1.0.1p.bb | |
parent | 9c5b66788d746491a471bed3c7c7333862f95ea7 (diff) | |
download | poky-dizzy-enea.tar.gz |
OpenSSL: Upgrade to 1.0.1t to fix multiple CVEsdizzy-enea
Upgrade 1.0.1p --> 1.0.1t addresses following vulnerabilities:
CVE-2016-2107
CVE-2016-2108
CVE-2016-2105
CVE-2016-2106
CVE-2016-2109
CVE-2016-2176
Reference:
URL for the OpenSSL Security Advisory:
https://www.openssl.org/news/secadv/20160503.txt
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Tudor Florea <tudor.florea@enea.com>
Diffstat (limited to 'meta/recipes-connectivity/openssl/openssl_1.0.1p.bb')
-rw-r--r-- | meta/recipes-connectivity/openssl/openssl_1.0.1p.bb | 58 |
1 files changed, 0 insertions, 58 deletions
diff --git a/meta/recipes-connectivity/openssl/openssl_1.0.1p.bb b/meta/recipes-connectivity/openssl/openssl_1.0.1p.bb deleted file mode 100644 index 0fa3572969..0000000000 --- a/meta/recipes-connectivity/openssl/openssl_1.0.1p.bb +++ /dev/null | |||
@@ -1,58 +0,0 @@ | |||
1 | require openssl.inc | ||
2 | |||
3 | # For target side versions of openssl enable support for OCF Linux driver | ||
4 | # if they are available. | ||
5 | DEPENDS += "cryptodev-linux" | ||
6 | |||
7 | CFLAG += "-DHAVE_CRYPTODEV -DUSE_CRYPTODEV_DIGESTS" | ||
8 | |||
9 | LIC_FILES_CHKSUM = "file://LICENSE;md5=f9a8f968107345e0b75aa8c2ecaa7ec8" | ||
10 | |||
11 | export DIRS = "crypto ssl apps engines" | ||
12 | export OE_LDFLAGS="${LDFLAGS}" | ||
13 | |||
14 | SRC_URI += "file://configure-targets.patch \ | ||
15 | file://shared-libs.patch \ | ||
16 | file://oe-ldflags.patch \ | ||
17 | file://engines-install-in-libdir-ssl.patch \ | ||
18 | file://debian/version-script.patch \ | ||
19 | file://debian/pic.patch \ | ||
20 | file://debian/c_rehash-compat.patch \ | ||
21 | file://debian/ca.patch \ | ||
22 | file://debian/make-targets.patch \ | ||
23 | file://debian/no-rpath.patch \ | ||
24 | file://debian/man-dir.patch \ | ||
25 | file://debian/man-section.patch \ | ||
26 | file://debian/no-symbolic.patch \ | ||
27 | file://debian/debian-targets.patch \ | ||
28 | file://openssl_fix_for_x32.patch \ | ||
29 | file://fix-cipher-des-ede3-cfb1.patch \ | ||
30 | file://openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch \ | ||
31 | file://initial-aarch64-bits.patch \ | ||
32 | file://find.pl \ | ||
33 | file://openssl-fix-des.pod-error.patch \ | ||
34 | file://Makefiles-ptest.patch \ | ||
35 | file://ptest-deps.patch \ | ||
36 | file://run-ptest \ | ||
37 | file://CVE-2015-3194-Add-PSS-parameter-check.patch \ | ||
38 | file://CVE-2015-3195-Fix-leak-with-ASN.1-combine.patch \ | ||
39 | file://CVE-2016-0800.patch \ | ||
40 | " | ||
41 | |||
42 | SRC_URI[md5sum] = "7563e92327199e0067ccd0f79f436976" | ||
43 | SRC_URI[sha256sum] = "bd5ee6803165c0fb60bbecbacacf244f1f90d2aa0d71353af610c29121e9b2f1" | ||
44 | |||
45 | PACKAGES =+ " \ | ||
46 | ${PN}-engines \ | ||
47 | ${PN}-engines-dbg \ | ||
48 | " | ||
49 | |||
50 | FILES_${PN}-engines = "${libdir}/ssl/engines/*.so ${libdir}/engines" | ||
51 | FILES_${PN}-engines-dbg = "${libdir}/ssl/engines/.debug" | ||
52 | |||
53 | PARALLEL_MAKE = "" | ||
54 | PARALLEL_MAKEINST = "" | ||
55 | |||
56 | do_configure_prepend() { | ||
57 | cp ${WORKDIR}/find.pl ${S}/util/find.pl | ||
58 | } | ||