]> code.ossystems Code Review - openembedded-core.git/commit
openssl: update to 1.0.2i (CVE-2016-6304 and more)
authorPatrick Ohly <patrick.ohly@intel.com>
Fri, 23 Sep 2016 13:26:05 +0000 (15:26 +0200)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Fri, 23 Sep 2016 17:06:10 +0000 (18:06 +0100)
commitd6b69279b5d1370d9c4982d5b1842a471cfd2b0e
tree996e51823dcd4afc80200fe2afd1107c4a846f43
parent4c10376bdfd54af75de840bd4a31386e6e89477e
openssl: update to 1.0.2i (CVE-2016-6304 and more)

This update fixes several CVEs:
* OCSP Status Request extension unbounded memory growth (CVE-2016-6304)
* SWEET32 Mitigation (CVE-2016-2183)
* OOB write in MDC2_Update() (CVE-2016-6303)
* Malformed SHA512 ticket DoS (CVE-2016-6302)
* OOB write in BN_bn2dec() (CVE-2016-2182)
* OOB read in TS_OBJ_print_bio() (CVE-2016-2180)
* DTLS buffered message DoS (CVE-2016-2179)
* DTLS replay protection DoS (CVE-2016-2181)
* Certificate message OOB reads (CVE-2016-6306)

Of these, only CVE-2016-6304 is considered of high
severity. Everything else is low. CVE-2016-2177 and CVE-2016-2178 were
already fixed via local patches, which can be removed now.

See https://www.openssl.org/news/secadv/20160922.txt for details.

Some patches had to be refreshed and one compile error fix from
upstream's OpenSSL_1_0_2-stable was required. The server.pem
file is needed for test_dtls.

Signed-off-by: Patrick Ohly <patrick.ohly@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-connectivity/openssl/openssl.inc
meta/recipes-connectivity/openssl/openssl/CVE-2016-2177.patch [deleted file]
meta/recipes-connectivity/openssl/openssl/CVE-2016-2178.patch [deleted file]
meta/recipes-connectivity/openssl/openssl/Fix-typo-introduced-by-a03f81f4.patch [new file with mode: 0644]
meta/recipes-connectivity/openssl/openssl/debian/ca.patch
meta/recipes-connectivity/openssl/openssl/parallel.patch
meta/recipes-connectivity/openssl/openssl_1.0.2i.bb [moved from meta/recipes-connectivity/openssl/openssl_1.0.2h.bb with 91% similarity]