generic-poky/meta/recipes-devtools/dpkg
Roy Li 150fe37203 dpkg: upgrade to 1.17.25
upgrade to fix two CVE defects: CVE-2014-8625 and CVE-2015-0840

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8625

Multiple format string vulnerabilities in the parse_error_msg
function in parsehelp.c in dpkg before 1.17.22 allow remote attackers
to cause a denial of service (crash) and possibly execute arbitrary
code via format string specifiers in the (1) package or (2)
architecture name.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0840

The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before
1.17.25 allows remote attackers to bypass signature verification
via a crafted Debian source control file (.dsc).

(From OE-Core rev: 079445990f51f98c8d4f9397dec0ed91ca2490c3)

Signed-off-by: Roy Li <rongqing.li@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2015-04-30 23:04:15 +01:00
..
dpkg dpkg: add triplet entry to fix build error for armeb 2015-04-10 18:10:24 +01:00
dpkg.inc dpkg-native: Avoid 'file changed' errors from tar 2015-03-31 22:23:19 +01:00
dpkg_1.17.25.bb dpkg: upgrade to 1.17.25 2015-04-30 23:04:15 +01:00