diff options
author | Mariano Lopez <mariano.lopez@linux.intel.com> | 2016-01-08 12:03:58 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-01-11 23:26:32 +0000 |
commit | e5c011b041dc27cdfeb840b6933dcb9752886bb9 (patch) | |
tree | 3737c18bbdaf971699c800e8983b25ae29db6fc9 /meta/recipes-devtools/e2fsprogs | |
parent | f04fb8806c75fa7eb9d139c4daaae2de6da6e1ea (diff) | |
download | poky-e5c011b041dc27cdfeb840b6933dcb9752886bb9.tar.gz |
Add "CVE:" tag to current patches in OE-core
The currnet patches in OE-core doesn't have the "CVE:"
tag, now part of the policy of the patches.
This is patch add this tag to several patches. There might
be patches that I miss; the tag can be added in the future.
(From OE-Core rev: 065ebeb3e15311d0d45385e15bf557b1c95b1669)
Signed-off-by: Mariano Lopez <mariano.lopez@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/e2fsprogs')
-rw-r--r-- | meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch | 1 | ||||
-rw-r--r-- | meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch | 2 |
2 files changed, 2 insertions, 1 deletions
diff --git a/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch b/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch index 72f77cc6bd..b904e46bda 100644 --- a/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch +++ b/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch | |||
@@ -4,6 +4,7 @@ Date: Fri, 6 Feb 2015 12:46:39 -0500 | |||
4 | Subject: [PATCH] libext2fs: fix potential buffer overflow in closefs() | 4 | Subject: [PATCH] libext2fs: fix potential buffer overflow in closefs() |
5 | 5 | ||
6 | Upstream-Status: Backport | 6 | Upstream-Status: Backport |
7 | CVE: CVE-2015-1572 | ||
7 | 8 | ||
8 | The bug fix in f66e6ce4446: "libext2fs: avoid buffer overflow if | 9 | The bug fix in f66e6ce4446: "libext2fs: avoid buffer overflow if |
9 | s_first_meta_bg is too big" had a typo in the fix for | 10 | s_first_meta_bg is too big" had a typo in the fix for |
diff --git a/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch b/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch index 4de67c9704..5b6346b150 100644 --- a/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch +++ b/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch | |||
@@ -11,8 +11,8 @@ fs->desc_blocks. This doesn't correct the bad s_first_meta_bg value, | |||
11 | but it avoids causing the e2fsprogs userspace programs from | 11 | but it avoids causing the e2fsprogs userspace programs from |
12 | potentially crashing. | 12 | potentially crashing. |
13 | 13 | ||
14 | Fixes CVE-2015-0247 | ||
15 | Upstream-Status: Backport | 14 | Upstream-Status: Backport |
15 | CVE: CVE-2015-0247 | ||
16 | 16 | ||
17 | Signed-off-by: Theodore Ts'o <tytso@mit.edu> | 17 | Signed-off-by: Theodore Ts'o <tytso@mit.edu> |
18 | Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> | 18 | Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> |