summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndrej Valek <andrej.valek@siemens.com>2017-02-02 09:35:00 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-02-05 09:20:22 +0000
commit4d20e8295dbca4bd6e0c8ad36ab922d9dd4d8616 (patch)
treeb8eca70a025b7816077a1c426d3dd0b71ac2457d
parent0635a96d82f5f5dd65a2d45ddca7559dea847916 (diff)
downloadopenembedded-core-contrib-4d20e8295dbca4bd6e0c8ad36ab922d9dd4d8616.tar.gz
openembedded-core-contrib-4d20e8295dbca4bd6e0c8ad36ab922d9dd4d8616.tar.bz2
openembedded-core-contrib-4d20e8295dbca4bd6e0c8ad36ab922d9dd4d8616.zip
openssl: Updgrade 1.0.2j -> 1.0.2k
Signed-off-by: Andrej Valek <andrej.valek@siemens.com> Signed-off-by: Pascal Bach <pascal.bach@siemens.com> Signed-off-by: Ross Burton <ross.burton@intel.com>
-rw-r--r--meta/recipes-connectivity/openssl/openssl/CVE-2016-7055.patch43
-rw-r--r--meta/recipes-connectivity/openssl/openssl_1.0.2k.bb (renamed from meta/recipes-connectivity/openssl/openssl_1.0.2j.bb)5
2 files changed, 2 insertions, 46 deletions
diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2016-7055.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2016-7055.patch
deleted file mode 100644
index 83a74cdacb..0000000000
--- a/meta/recipes-connectivity/openssl/openssl/CVE-2016-7055.patch
+++ /dev/null
@@ -1,43 +0,0 @@
-From 57c4b9f6a2f800b41ce2836986fe33640f6c3f8a Mon Sep 17 00:00:00 2001
-From: Andy Polyakov <appro@openssl.org>
-Date: Sun, 6 Nov 2016 18:33:17 +0100
-Subject: [PATCH] bn/asm/x86_64-mont.pl: fix for CVE-2016-7055 (Low severity).
-
-Reviewed-by: Rich Salz <rsalz@openssl.org>
-(cherry picked from commit 2fac86d9abeaa643677d1ffd0a139239fdf9406a)
-
-Upstream-Status: Backport [https://github.com/openssl/openssl/commit/57c4b9f6a2f800b41ce2836986fe33640f6c3f8a]
-CVE: CVE-2016-7055
-Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
----
- crypto/bn/asm/x86_64-mont.pl | 5 ++---
- 1 file changed, 2 insertions(+), 3 deletions(-)
-
-diff --git a/crypto/bn/asm/x86_64-mont.pl b/crypto/bn/asm/x86_64-mont.pl
-index 044fd7e..80492d8 100755
---- a/crypto/bn/asm/x86_64-mont.pl
-+++ b/crypto/bn/asm/x86_64-mont.pl
-@@ -1148,18 +1148,17 @@ $code.=<<___;
- mulx 2*8($aptr),%r15,%r13 # ...
- adox -3*8($tptr),%r11
- adcx %r15,%r12
-- adox $zero,%r12
-+ adox -2*8($tptr),%r12
- adcx $zero,%r13
-+ adox $zero,%r13
-
- mov $bptr,8(%rsp) # off-load &b[i]
-- .byte 0x67
- mov $mi,%r15
- imulq 24(%rsp),$mi # "t[0]"*n0
- xor %ebp,%ebp # xor $zero,$zero # cf=0, of=0
-
- mulx 3*8($aptr),%rax,%r14
- mov $mi,%rdx
-- adox -2*8($tptr),%r12
- adcx %rax,%r13
- adox -1*8($tptr),%r13
- adcx $zero,%r14
---
-2.7.4
-
diff --git a/meta/recipes-connectivity/openssl/openssl_1.0.2j.bb b/meta/recipes-connectivity/openssl/openssl_1.0.2k.bb
index 94672f90bc..1973f81a24 100644
--- a/meta/recipes-connectivity/openssl/openssl_1.0.2j.bb
+++ b/meta/recipes-connectivity/openssl/openssl_1.0.2k.bb
@@ -41,10 +41,9 @@ SRC_URI += "file://find.pl;subdir=${BP}/util/ \
file://configure-musl-target.patch \
file://parallel.patch \
file://openssl-util-perlpath.pl-cwd.patch \
- file://CVE-2016-7055.patch \
"
-SRC_URI[md5sum] = "96322138f0b69e61b7212bc53d5e912b"
-SRC_URI[sha256sum] = "e7aff292be21c259c6af26469c7a9b3ba26e9abaaffd325e3dccc9785256c431"
+SRC_URI[md5sum] = "f965fc0bf01bf882b31314b61391ae65"
+SRC_URI[sha256sum] = "6b3977c61f2aedf0f96367dcfb5c6e578cf37e7b8d913b4ecb6643c3cb88d8c0"
PACKAGES =+ "${PN}-engines"
FILES_${PN}-engines = "${libdir}/ssl/engines/*.so ${libdir}/engines"