diff options
| author | Maxin B. John <maxin.john@intel.com> | 2016-08-22 14:15:40 +0300 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-09-02 08:48:29 +0100 |
| commit | 6980d4fa2feba6147013933a173621513ec2dcd0 (patch) | |
| tree | 3b2a8d81a0edd8a5a9dc244209efb5492c3990d6 | |
| parent | 094a36886f2ac3e8e67220ffc938973879b3762a (diff) | |
| download | poky-6980d4fa2feba6147013933a173621513ec2dcd0.tar.gz | |
curl: security fix for CVE-2016-5420
Affected versions: libcurl 7.1 to and including 7.50.0
(From OE-Core rev: cc567d8fb9eca630cd21d40ece99babcc5b7d045)
Signed-off-by: Maxin B. John <maxin.john@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
| -rw-r--r-- | meta/recipes-support/curl/curl/CVE-2016-5420.patch | 31 | ||||
| -rw-r--r-- | meta/recipes-support/curl/curl_7.47.1.bb | 1 |
2 files changed, 32 insertions, 0 deletions
diff --git a/meta/recipes-support/curl/curl/CVE-2016-5420.patch b/meta/recipes-support/curl/curl/CVE-2016-5420.patch new file mode 100644 index 0000000000..6bfacd7c9d --- /dev/null +++ b/meta/recipes-support/curl/curl/CVE-2016-5420.patch | |||
| @@ -0,0 +1,31 @@ | |||
| 1 | From 11ec5ad4352bba384404c56e77c7fab9382fd22d Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Daniel Stenberg <daniel@haxx.se> | ||
| 3 | Date: Sun, 31 Jul 2016 00:51:48 +0200 | ||
| 4 | Subject: [PATCH] TLS: only reuse connections with the same client cert | ||
| 5 | |||
| 6 | Bug: https://curl.haxx.se/docs/adv_20160803B.html | ||
| 7 | |||
| 8 | Upstream-Status: Backport | ||
| 9 | https://curl.haxx.se/CVE-2016-5420.patch | ||
| 10 | |||
| 11 | CVE: CVE-2016-5420 | ||
| 12 | Signed-off-by: Maxin B. John <maxin.john@intel.com> | ||
| 13 | --- | ||
| 14 | lib/vtls/vtls.c | 1 + | ||
| 15 | 1 file changed, 1 insertion(+) | ||
| 16 | |||
| 17 | diff --git a/lib/vtls/vtls.c b/lib/vtls/vtls.c | ||
| 18 | index 33e209d..3863777 100644 | ||
| 19 | --- a/lib/vtls/vtls.c | ||
| 20 | +++ b/lib/vtls/vtls.c | ||
| 21 | @@ -99,6 +99,7 @@ Curl_ssl_config_matches(struct ssl_config_data* data, | ||
| 22 | (data->verifyhost == needle->verifyhost) && | ||
| 23 | safe_strequal(data->CApath, needle->CApath) && | ||
| 24 | safe_strequal(data->CAfile, needle->CAfile) && | ||
| 25 | + safe_strequal(data->clientcert, needle->clientcert) && | ||
| 26 | safe_strequal(data->random_file, needle->random_file) && | ||
| 27 | safe_strequal(data->egdsocket, needle->egdsocket) && | ||
| 28 | safe_strequal(data->cipher_list, needle->cipher_list)) | ||
| 29 | -- | ||
| 30 | 2.4.0 | ||
| 31 | |||
diff --git a/meta/recipes-support/curl/curl_7.47.1.bb b/meta/recipes-support/curl/curl_7.47.1.bb index 945840b1a9..8d459c75d6 100644 --- a/meta/recipes-support/curl/curl_7.47.1.bb +++ b/meta/recipes-support/curl/curl_7.47.1.bb | |||
| @@ -12,6 +12,7 @@ SRC_URI = "http://curl.haxx.se/download/curl-${PV}.tar.bz2" | |||
| 12 | # | 12 | # |
| 13 | SRC_URI += " file://configure_ac.patch \ | 13 | SRC_URI += " file://configure_ac.patch \ |
| 14 | file://CVE-2016-5419.patch \ | 14 | file://CVE-2016-5419.patch \ |
| 15 | file://CVE-2016-5420.patch \ | ||
| 15 | " | 16 | " |
| 16 | 17 | ||
| 17 | SRC_URI[md5sum] = "9ea3123449439bbd960cd25cf98796fb" | 18 | SRC_URI[md5sum] = "9ea3123449439bbd960cd25cf98796fb" |
