diff options
author | Mariano Lopez <mariano.lopez@linux.intel.com> | 2016-01-08 12:03:58 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-01-11 23:26:32 +0000 |
commit | e5c011b041dc27cdfeb840b6933dcb9752886bb9 (patch) | |
tree | 3737c18bbdaf971699c800e8983b25ae29db6fc9 /meta/recipes-devtools | |
parent | f04fb8806c75fa7eb9d139c4daaae2de6da6e1ea (diff) | |
download | poky-e5c011b041dc27cdfeb840b6933dcb9752886bb9.tar.gz |
Add "CVE:" tag to current patches in OE-core
The currnet patches in OE-core doesn't have the "CVE:"
tag, now part of the policy of the patches.
This is patch add this tag to several patches. There might
be patches that I miss; the tag can be added in the future.
(From OE-Core rev: 065ebeb3e15311d0d45385e15bf557b1c95b1669)
Signed-off-by: Mariano Lopez <mariano.lopez@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools')
8 files changed, 8 insertions, 1 deletions
diff --git a/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch b/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch index 72f77cc6bd..b904e46bda 100644 --- a/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch +++ b/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch | |||
@@ -4,6 +4,7 @@ Date: Fri, 6 Feb 2015 12:46:39 -0500 | |||
4 | Subject: [PATCH] libext2fs: fix potential buffer overflow in closefs() | 4 | Subject: [PATCH] libext2fs: fix potential buffer overflow in closefs() |
5 | 5 | ||
6 | Upstream-Status: Backport | 6 | Upstream-Status: Backport |
7 | CVE: CVE-2015-1572 | ||
7 | 8 | ||
8 | The bug fix in f66e6ce4446: "libext2fs: avoid buffer overflow if | 9 | The bug fix in f66e6ce4446: "libext2fs: avoid buffer overflow if |
9 | s_first_meta_bg is too big" had a typo in the fix for | 10 | s_first_meta_bg is too big" had a typo in the fix for |
diff --git a/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch b/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch index 4de67c9704..5b6346b150 100644 --- a/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch +++ b/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch | |||
@@ -11,8 +11,8 @@ fs->desc_blocks. This doesn't correct the bad s_first_meta_bg value, | |||
11 | but it avoids causing the e2fsprogs userspace programs from | 11 | but it avoids causing the e2fsprogs userspace programs from |
12 | potentially crashing. | 12 | potentially crashing. |
13 | 13 | ||
14 | Fixes CVE-2015-0247 | ||
15 | Upstream-Status: Backport | 14 | Upstream-Status: Backport |
15 | CVE: CVE-2015-0247 | ||
16 | 16 | ||
17 | Signed-off-by: Theodore Ts'o <tytso@mit.edu> | 17 | Signed-off-by: Theodore Ts'o <tytso@mit.edu> |
18 | Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> | 18 | Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> |
diff --git a/meta/recipes-devtools/elfutils/elfutils-0.148/elf_begin.c-CVE-2014-9447-fix.patch b/meta/recipes-devtools/elfutils/elfutils-0.148/elf_begin.c-CVE-2014-9447-fix.patch index 84e8ddcca7..deba45fa86 100644 --- a/meta/recipes-devtools/elfutils/elfutils-0.148/elf_begin.c-CVE-2014-9447-fix.patch +++ b/meta/recipes-devtools/elfutils/elfutils-0.148/elf_begin.c-CVE-2014-9447-fix.patch | |||
@@ -7,6 +7,7 @@ this patch is from: | |||
7 | https://git.fedorahosted.org/cgit/elfutils.git/commit/?id=147018e729e7c22eeabf15b82d26e4bf68a0d18e | 7 | https://git.fedorahosted.org/cgit/elfutils.git/commit/?id=147018e729e7c22eeabf15b82d26e4bf68a0d18e |
8 | 8 | ||
9 | Upstream-Status: Backport | 9 | Upstream-Status: Backport |
10 | CVE: CVE-2014-9447 | ||
10 | 11 | ||
11 | Signed-off-by: Li Xin <lixin.fnst@cn.fujitsu.com> | 12 | Signed-off-by: Li Xin <lixin.fnst@cn.fujitsu.com> |
12 | --- | 13 | --- |
diff --git a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2013-6435.patch b/meta/recipes-devtools/rpm/rpm/rpm-CVE-2013-6435.patch index b107e8f047..a2691f6da8 100644 --- a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2013-6435.patch +++ b/meta/recipes-devtools/rpm/rpm/rpm-CVE-2013-6435.patch | |||
@@ -4,6 +4,7 @@ Date: Wed, 10 Jun 2015 14:36:56 +0000 | |||
4 | Subject: [PATCH 2/2] rpm: CVE-2013-6435 | 4 | Subject: [PATCH 2/2] rpm: CVE-2013-6435 |
5 | 5 | ||
6 | Upstream-Status: Backport | 6 | Upstream-Status: Backport |
7 | CVE: CVE-2013-6435 | ||
7 | 8 | ||
8 | Reference: | 9 | Reference: |
9 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-6435 | 10 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-6435 |
diff --git a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch b/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch index bf1795ca49..985f150f0f 100644 --- a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch +++ b/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch | |||
@@ -4,6 +4,7 @@ Date: Wed, 10 Jun 2015 12:56:55 +0000 | |||
4 | Subject: [PATCH 1/2] rpm: CVE-2014-8118 | 4 | Subject: [PATCH 1/2] rpm: CVE-2014-8118 |
5 | 5 | ||
6 | Upstream-Status: Backport | 6 | Upstream-Status: Backport |
7 | CVE: CVE-2014-8118 | ||
7 | 8 | ||
8 | Reference: | 9 | Reference: |
9 | https://bugzilla.redhat.com/show_bug.cgi?id=1168715 | 10 | https://bugzilla.redhat.com/show_bug.cgi?id=1168715 |
diff --git a/meta/recipes-devtools/rsync/rsync-2.6.9/rsync-2.6.9-fname-obo.patch b/meta/recipes-devtools/rsync/rsync-2.6.9/rsync-2.6.9-fname-obo.patch index f054452f37..bea325ea05 100644 --- a/meta/recipes-devtools/rsync/rsync-2.6.9/rsync-2.6.9-fname-obo.patch +++ b/meta/recipes-devtools/rsync/rsync-2.6.9/rsync-2.6.9-fname-obo.patch | |||
@@ -1,4 +1,5 @@ | |||
1 | Upstream-Status: Backport [ The patch is rsync-2.6.9 specific ] | 1 | Upstream-Status: Backport [ The patch is rsync-2.6.9 specific ] |
2 | CVE: CVE-2007-4091 | ||
2 | 3 | ||
3 | The patch is from https://issues.rpath.com/browse/RPL-1647 and is used to | 4 | The patch is from https://issues.rpath.com/browse/RPL-1647 and is used to |
4 | address http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-4091 | 5 | address http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-4091 |
diff --git a/meta/recipes-devtools/rsync/rsync-3.1.1/0001-Complain-if-an-inc-recursive-path-is-not-right-for-i.patch b/meta/recipes-devtools/rsync/rsync-3.1.1/0001-Complain-if-an-inc-recursive-path-is-not-right-for-i.patch index 5ece5420a3..19e7f39167 100644 --- a/meta/recipes-devtools/rsync/rsync-3.1.1/0001-Complain-if-an-inc-recursive-path-is-not-right-for-i.patch +++ b/meta/recipes-devtools/rsync/rsync-3.1.1/0001-Complain-if-an-inc-recursive-path-is-not-right-for-i.patch | |||
@@ -6,6 +6,7 @@ Subject: [PATCH] Complain if an inc-recursive path is not right for its dir. | |||
6 | trasnfer path. | 6 | trasnfer path. |
7 | 7 | ||
8 | Upstream-Status: BackPort | 8 | Upstream-Status: BackPort |
9 | CVE: CVE-2014-9512 | ||
9 | 10 | ||
10 | Fix the CVE-2014-9512, rsync 3.1.1 allows remote attackers to write to arbitrary | 11 | Fix the CVE-2014-9512, rsync 3.1.1 allows remote attackers to write to arbitrary |
11 | files via a symlink attack on a file in the synchronization path. | 12 | files via a symlink attack on a file in the synchronization path. |
diff --git a/meta/recipes-devtools/rsync/rsync-3.1.1/rsync.git-eac858085.patch b/meta/recipes-devtools/rsync/rsync-3.1.1/rsync.git-eac858085.patch index 1fcac490ae..c86f478ef1 100644 --- a/meta/recipes-devtools/rsync/rsync-3.1.1/rsync.git-eac858085.patch +++ b/meta/recipes-devtools/rsync/rsync-3.1.1/rsync.git-eac858085.patch | |||
@@ -5,6 +5,7 @@ Subject: [PATCH 1/1] Add compat flag to allow proper seed checksum order. | |||
5 | Fixes the equivalent of librsync's CVE-2014-8242 issue. | 5 | Fixes the equivalent of librsync's CVE-2014-8242 issue. |
6 | 6 | ||
7 | Upstream-Status: Backport | 7 | Upstream-Status: Backport |
8 | CVE: CVE-2014-8242 | ||
8 | 9 | ||
9 | Signed-off-by: Roy Li <rongqing.li@windriver.com> | 10 | Signed-off-by: Roy Li <rongqing.li@windriver.com> |
10 | --- | 11 | --- |