From: Roy Li Date: Wed, 29 Apr 2015 08:09:38 +0000 (+0800) Subject: dpkg: upgrade to 1.17.25 X-Git-Tag: 2015-10~2000 X-Git-Url: https://code.ossystems.io/gitweb?a=commitdiff_plain;h=079445990f51f98c8d4f9397dec0ed91ca2490c3;p=openembedded-core.git dpkg: upgrade to 1.17.25 upgrade to fix two CVE defects: CVE-2014-8625 and CVE-2015-0840 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8625 Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0840 The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc). Signed-off-by: Roy Li Signed-off-by: Richard Purdie --- diff --git a/meta/recipes-devtools/dpkg/dpkg_1.17.21.bb b/meta/recipes-devtools/dpkg/dpkg_1.17.25.bb similarity index 81% rename from meta/recipes-devtools/dpkg/dpkg_1.17.21.bb rename to meta/recipes-devtools/dpkg/dpkg_1.17.25.bb index ebb8671473..74b1dd000f 100644 --- a/meta/recipes-devtools/dpkg/dpkg_1.17.21.bb +++ b/meta/recipes-devtools/dpkg/dpkg_1.17.25.bb @@ -15,6 +15,6 @@ SRC_URI += "file://noman.patch \ file://add_armeb_triplet_entry.patch \ " -SRC_URI[md5sum] = "765a96fd0180196613bbfa3c4aef0775" -SRC_URI[sha256sum] = "3ed776627181cb9c1c9ba33f94a6319084be2e9ec9c23dd61ce784c4f602cf05" +SRC_URI[md5sum] = "e48fcfdb2162e77d72c2a83432d537ca" +SRC_URI[sha256sum] = "07019d38ae98fb107c79dbb3690cfadff877f153b8c4970e3a30d2e59aa66baa"