generic-poky/meta/recipes-connectivity/openssl
Paul Eggleton c5d81c3386 openssl: fix CVE-2014-0195
http://www.openssl.org/news/secadv_20140605.txt

DTLS invalid fragment vulnerability (CVE-2014-0195)

A buffer overrun attack can be triggered by sending invalid DTLS fragments
to an OpenSSL DTLS client or server. This is potentially exploitable to
run arbitrary code on a vulnerable client or server.

Only applications using OpenSSL as a DTLS client or server affected.

(Patch borrowed from Fedora.)

(From OE-Core rev: c707b3ea9e1fbff2c6a82670e4b1af2b4f53d5e2)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-06-10 17:12:23 +01:00
..
openssl-1.0.1e openssl: fix CVE-2014-0195 2014-06-10 17:12:23 +01:00
ocf-linux.inc recipes: Fix ALLOW_EMPTY with no package specified 2013-03-05 13:14:52 +00:00
ocf-linux_20120127.bb ocf-linux: Update to 20120127 2012-12-03 14:47:56 +00:00
openssl.inc openssl: use PACKAGECONFIG to disable perl bits 2014-02-09 11:04:15 +00:00
openssl_1.0.1e.bb openssl: fix CVE-2014-0195 2014-06-10 17:12:23 +01:00