From: Alexander Kanavin <[email protected]> libinput 1.19.4 fixes CVE-2022-1215 with a format string vulnerability
Signed-off-by: Alexander Kanavin <[email protected]> Signed-off-by: Luca Ceresoli <[email protected]> Signed-off-by: Richard Purdie <[email protected]> (cherry picked from commit d32d51753aadf6c2747c79927dad0c9a044ad5df) Signed-off-by: Steve Sakoman <[email protected]> --- .../wayland/{libinput_1.19.3.bb => libinput_1.19.4.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-graphics/wayland/{libinput_1.19.3.bb => libinput_1.19.4.bb} (95%) diff --git a/meta/recipes-graphics/wayland/libinput_1.19.3.bb b/meta/recipes-graphics/wayland/libinput_1.19.4.bb similarity index 95% rename from meta/recipes-graphics/wayland/libinput_1.19.3.bb rename to meta/recipes-graphics/wayland/libinput_1.19.4.bb index a7f13240d5..a7d0c4be69 100644 --- a/meta/recipes-graphics/wayland/libinput_1.19.3.bb +++ b/meta/recipes-graphics/wayland/libinput_1.19.4.bb @@ -16,7 +16,7 @@ SRC_URI = "http://www.freedesktop.org/software/${BPN}/${BP}.tar.xz \ file://run-ptest \ file://determinism.patch \ " -SRC_URI[sha256sum] = "3cae78ccde19d7d0f387e58bc734d4d17ab5f6426f54a9e8b728c90b17baa068" +SRC_URI[sha256sum] = "ff33a570b5a936c81e6c08389a8581c2665311d026ce3d225c88d09c49f9b440" UPSTREAM_CHECK_REGEX = "libinput-(?P<pver>\d+\.\d+\.(?!9\d+)\d+)" -- 2.25.1
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#165759): https://lists.openembedded.org/g/openembedded-core/message/165759 Mute This Topic: https://lists.openembedded.org/mt/91170124/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
