generic-poky/meta/recipes-devtools/apt/apt-0.9.9.4
Chong Lu 6a30031708 apt: fix for CVE-2014-0478
APT before 1.0.4 does not properly validate source packages, which allows
man-in-the-middle attackers to download and install Trojan horse packages
by removing the Release signature.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0478

(From OE-Core rev: 3dd692fcf2b0c11731b3f30abdf2b1878458a898)

Signed-off-by: Wenlin Kang <wenlin.kang@windriver.com>
Signed-off-by: Chong Lu <Chong.Lu@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-09-30 14:10:34 +01:00
..
apt-0.9.9.4-CVE-2014-0478.patch apt: fix for CVE-2014-0478 2014-09-30 14:10:34 +01:00
disable-configure-in-makefile.patch apt: Upgrade from 0.9.8.2 to 0.9.9.4 2013-08-03 10:33:08 +01:00
fix-gcc-4.6-null-not-defined.patch apt: Upgrade from 0.9.8.2 to 0.9.9.4 2013-08-03 10:33:08 +01:00
makerace.patch apt: Upgrade from 0.9.8.2 to 0.9.9.4 2013-08-03 10:33:08 +01:00
no-ko-translation.patch apt: Upgrade from 0.9.8.2 to 0.9.9.4 2013-08-03 10:33:08 +01:00
no-nls-dpkg.patch apt: Upgrade from 0.9.8.2 to 0.9.9.4 2013-08-03 10:33:08 +01:00
noconfigure.patch apt: Upgrade from 0.9.8.2 to 0.9.9.4 2013-08-03 10:33:08 +01:00
nodoc.patch apt: Upgrade from 0.9.8.2 to 0.9.9.4 2013-08-03 10:33:08 +01:00
truncate-filename.patch apt: Upgrade from 0.9.8.2 to 0.9.9.4 2013-08-03 10:33:08 +01:00
use-host.patch apt: Upgrade from 0.9.8.2 to 0.9.9.4 2013-08-03 10:33:08 +01:00