summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools
diff options
context:
space:
mode:
authorMariano Lopez <mariano.lopez@linux.intel.com>2016-01-08 12:03:58 +0000
committerRichard Purdie <richard.purdie@linuxfoundation.org>2016-01-11 23:26:32 +0000
commite5c011b041dc27cdfeb840b6933dcb9752886bb9 (patch)
tree3737c18bbdaf971699c800e8983b25ae29db6fc9 /meta/recipes-devtools
parentf04fb8806c75fa7eb9d139c4daaae2de6da6e1ea (diff)
downloadpoky-e5c011b041dc27cdfeb840b6933dcb9752886bb9.tar.gz
Add "CVE:" tag to current patches in OE-core
The currnet patches in OE-core doesn't have the "CVE:" tag, now part of the policy of the patches. This is patch add this tag to several patches. There might be patches that I miss; the tag can be added in the future. (From OE-Core rev: 065ebeb3e15311d0d45385e15bf557b1c95b1669) Signed-off-by: Mariano Lopez <mariano.lopez@linux.intel.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools')
-rw-r--r--meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch1
-rw-r--r--meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch2
-rw-r--r--meta/recipes-devtools/elfutils/elfutils-0.148/elf_begin.c-CVE-2014-9447-fix.patch1
-rw-r--r--meta/recipes-devtools/rpm/rpm/rpm-CVE-2013-6435.patch1
-rw-r--r--meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch1
-rw-r--r--meta/recipes-devtools/rsync/rsync-2.6.9/rsync-2.6.9-fname-obo.patch1
-rw-r--r--meta/recipes-devtools/rsync/rsync-3.1.1/0001-Complain-if-an-inc-recursive-path-is-not-right-for-i.patch1
-rw-r--r--meta/recipes-devtools/rsync/rsync-3.1.1/rsync.git-eac858085.patch1
8 files changed, 8 insertions, 1 deletions
diff --git a/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch b/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch
index 72f77cc6bd..b904e46bda 100644
--- a/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch
+++ b/meta/recipes-devtools/e2fsprogs/e2fsprogs/0001-libext2fs-fix-potential-buffer-overflow-in-closefs.patch
@@ -4,6 +4,7 @@ Date: Fri, 6 Feb 2015 12:46:39 -0500
4Subject: [PATCH] libext2fs: fix potential buffer overflow in closefs() 4Subject: [PATCH] libext2fs: fix potential buffer overflow in closefs()
5 5
6Upstream-Status: Backport 6Upstream-Status: Backport
7CVE: CVE-2015-1572
7 8
8The bug fix in f66e6ce4446: "libext2fs: avoid buffer overflow if 9The bug fix in f66e6ce4446: "libext2fs: avoid buffer overflow if
9s_first_meta_bg is too big" had a typo in the fix for 10s_first_meta_bg is too big" had a typo in the fix for
diff --git a/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch b/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch
index 4de67c9704..5b6346b150 100644
--- a/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch
+++ b/meta/recipes-devtools/e2fsprogs/e2fsprogs/CVE-2015-0247.patch
@@ -11,8 +11,8 @@ fs->desc_blocks. This doesn't correct the bad s_first_meta_bg value,
11but it avoids causing the e2fsprogs userspace programs from 11but it avoids causing the e2fsprogs userspace programs from
12potentially crashing. 12potentially crashing.
13 13
14Fixes CVE-2015-0247
15Upstream-Status: Backport 14Upstream-Status: Backport
15CVE: CVE-2015-0247
16 16
17Signed-off-by: Theodore Ts'o <tytso@mit.edu> 17Signed-off-by: Theodore Ts'o <tytso@mit.edu>
18Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com> 18Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
diff --git a/meta/recipes-devtools/elfutils/elfutils-0.148/elf_begin.c-CVE-2014-9447-fix.patch b/meta/recipes-devtools/elfutils/elfutils-0.148/elf_begin.c-CVE-2014-9447-fix.patch
index 84e8ddcca7..deba45fa86 100644
--- a/meta/recipes-devtools/elfutils/elfutils-0.148/elf_begin.c-CVE-2014-9447-fix.patch
+++ b/meta/recipes-devtools/elfutils/elfutils-0.148/elf_begin.c-CVE-2014-9447-fix.patch
@@ -7,6 +7,7 @@ this patch is from:
7 https://git.fedorahosted.org/cgit/elfutils.git/commit/?id=147018e729e7c22eeabf15b82d26e4bf68a0d18e 7 https://git.fedorahosted.org/cgit/elfutils.git/commit/?id=147018e729e7c22eeabf15b82d26e4bf68a0d18e
8 8
9Upstream-Status: Backport 9Upstream-Status: Backport
10CVE: CVE-2014-9447
10 11
11Signed-off-by: Li Xin <lixin.fnst@cn.fujitsu.com> 12Signed-off-by: Li Xin <lixin.fnst@cn.fujitsu.com>
12--- 13---
diff --git a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2013-6435.patch b/meta/recipes-devtools/rpm/rpm/rpm-CVE-2013-6435.patch
index b107e8f047..a2691f6da8 100644
--- a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2013-6435.patch
+++ b/meta/recipes-devtools/rpm/rpm/rpm-CVE-2013-6435.patch
@@ -4,6 +4,7 @@ Date: Wed, 10 Jun 2015 14:36:56 +0000
4Subject: [PATCH 2/2] rpm: CVE-2013-6435 4Subject: [PATCH 2/2] rpm: CVE-2013-6435
5 5
6Upstream-Status: Backport 6Upstream-Status: Backport
7CVE: CVE-2013-6435
7 8
8Reference: 9Reference:
9https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-6435 10https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-6435
diff --git a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch b/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch
index bf1795ca49..985f150f0f 100644
--- a/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch
+++ b/meta/recipes-devtools/rpm/rpm/rpm-CVE-2014-8118.patch
@@ -4,6 +4,7 @@ Date: Wed, 10 Jun 2015 12:56:55 +0000
4Subject: [PATCH 1/2] rpm: CVE-2014-8118 4Subject: [PATCH 1/2] rpm: CVE-2014-8118
5 5
6Upstream-Status: Backport 6Upstream-Status: Backport
7CVE: CVE-2014-8118
7 8
8Reference: 9Reference:
9https://bugzilla.redhat.com/show_bug.cgi?id=1168715 10https://bugzilla.redhat.com/show_bug.cgi?id=1168715
diff --git a/meta/recipes-devtools/rsync/rsync-2.6.9/rsync-2.6.9-fname-obo.patch b/meta/recipes-devtools/rsync/rsync-2.6.9/rsync-2.6.9-fname-obo.patch
index f054452f37..bea325ea05 100644
--- a/meta/recipes-devtools/rsync/rsync-2.6.9/rsync-2.6.9-fname-obo.patch
+++ b/meta/recipes-devtools/rsync/rsync-2.6.9/rsync-2.6.9-fname-obo.patch
@@ -1,4 +1,5 @@
1Upstream-Status: Backport [ The patch is rsync-2.6.9 specific ] 1Upstream-Status: Backport [ The patch is rsync-2.6.9 specific ]
2CVE: CVE-2007-4091
2 3
3The patch is from https://issues.rpath.com/browse/RPL-1647 and is used to 4The patch is from https://issues.rpath.com/browse/RPL-1647 and is used to
4address http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-4091 5address http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-4091
diff --git a/meta/recipes-devtools/rsync/rsync-3.1.1/0001-Complain-if-an-inc-recursive-path-is-not-right-for-i.patch b/meta/recipes-devtools/rsync/rsync-3.1.1/0001-Complain-if-an-inc-recursive-path-is-not-right-for-i.patch
index 5ece5420a3..19e7f39167 100644
--- a/meta/recipes-devtools/rsync/rsync-3.1.1/0001-Complain-if-an-inc-recursive-path-is-not-right-for-i.patch
+++ b/meta/recipes-devtools/rsync/rsync-3.1.1/0001-Complain-if-an-inc-recursive-path-is-not-right-for-i.patch
@@ -6,6 +6,7 @@ Subject: [PATCH] Complain if an inc-recursive path is not right for its dir.
6 trasnfer path. 6 trasnfer path.
7 7
8Upstream-Status: BackPort 8Upstream-Status: BackPort
9CVE: CVE-2014-9512
9 10
10Fix the CVE-2014-9512, rsync 3.1.1 allows remote attackers to write to arbitrary 11Fix the CVE-2014-9512, rsync 3.1.1 allows remote attackers to write to arbitrary
11files via a symlink attack on a file in the synchronization path. 12files via a symlink attack on a file in the synchronization path.
diff --git a/meta/recipes-devtools/rsync/rsync-3.1.1/rsync.git-eac858085.patch b/meta/recipes-devtools/rsync/rsync-3.1.1/rsync.git-eac858085.patch
index 1fcac490ae..c86f478ef1 100644
--- a/meta/recipes-devtools/rsync/rsync-3.1.1/rsync.git-eac858085.patch
+++ b/meta/recipes-devtools/rsync/rsync-3.1.1/rsync.git-eac858085.patch
@@ -5,6 +5,7 @@ Subject: [PATCH 1/1] Add compat flag to allow proper seed checksum order.
5 Fixes the equivalent of librsync's CVE-2014-8242 issue. 5 Fixes the equivalent of librsync's CVE-2014-8242 issue.
6 6
7Upstream-Status: Backport 7Upstream-Status: Backport
8CVE: CVE-2014-8242
8 9
9Signed-off-by: Roy Li <rongqing.li@windriver.com> 10Signed-off-by: Roy Li <rongqing.li@windriver.com>
10--- 11---