Build openssl with shared state cache may meet problem under below conditions:
1. sstate cache generated by another user on same machine
2. inappropriate PERL5LIB setting
3. openssl build from scratch but perl using cache
When building openssl, without appropriate PERL5LIB setting, perl tries
to
Hi Leon
On Friday, 4 November 2022 01:27:55 NZST Leon Anavi wrote:
> Following the update from 3.10.6 to 3.11.0, the source code of
> module re for regular expression operations has been moved to
> Lib/re/. File python3-manifest.json has been modified according
> to the new path.
>
> According
On Wed, Apr 19, 2023 at 6:54 PM Richard Purdie
wrote:
>
> On Wed, 2023-04-19 at 23:34 +0100, Jose Quaresma wrote:
> > Hi,
> >
> > Not related with the previous discussion but just for
> > your information.
> > The rm_work.bbclass has an exception for the kernel recipes [1].
> > So I don't
Fails to patch - https://errors.yoctoproject.org/Errors/Details/700408/
On Wed, Apr 19, 2023 at 6:41 AM Ross Burton wrote:
>
> Signed-off-by: Ross Burton
> ---
> ...posite-Fix-use-after-free-of-the-COW.patch | 46 +++
> .../xorg-xserver/xserver-xorg_21.1.7.bb | 3 +-
> 2
On Wed, 2023-04-19 at 23:34 +0100, Jose Quaresma wrote:
> Hi,
>
> Not related with the previous discussion but just for
> your information.
> The rm_work.bbclass has an exception for the kernel recipes [1].
> So I don't understand why we can't do the same for the make-mod-
> scripts
> who is the
Hi,
Not related with the previous discussion but just for your information.
The rm_work.bbclass has an exception for the kernel recipes [1].
So I don't understand why we can't do the same for the make-mod-scripts
who is the twin brother of all these kernel recipes.
[1]
On Wed, Apr 19, 2023 at 11:54 AM Peter Marko via
lists.openembedded.org
wrote:
>
> This CVE is specific to Microsoft Windows, ignore it.
>
> Patch fixing it (https://go-review.googlesource.com/c/go/+/446916)
> also adds a redundant check to generic os/exec which
> could be backported but it
This CVE is specific to Microsoft Windows, ignore it.
Patch fixing it (https://go-review.googlesource.com/c/go/+/446916)
also adds a redundant check to generic os/exec which
could be backported but it should not be necessary as
backport always takes a small risk to break old code.
Signed-off-by:
This CVE is specific to Microsoft Windows, ignore it.
Patch fixing it (https://go-review.googlesource.com/c/go/+/446916)
also adds a redundant check to generic os/exec which
could be backported but it should not be necessary as
backport always takes a small risk to break old code.
Signed-off-by:
On Tue, Apr 18, 2023 at 8:18 PM Xiangyu Chen
wrote:
>
> From: Xiangyu Chen
>
> The fix of CVE-2023-29383.patch contains a bug that it rejects all
> characters that are not control ones, so backup another patch named
> "0001-Overhaul-valid_field.patch" from upstream to fix it.
>
> Signed-off-by:
On Wed, Apr 19, 2023 at 2:39 AM Shubham Kulkarni wrote:
>
> Hello Steve,
>
> I have sent a dunfell branch patch with the subject
> "[OE-core][dunfell][PATCH] go-runtime: Security fix for CVE-2022-41722". I am
> not sure why it's showing as a reply on kirkstone patch, not a separate
> email.
On Wed, Apr 19, 2023 at 9:52 AM Jose Quaresma wrote:
>
>
>
> Bruce Ashfield escreveu no dia terça, 18/04/2023
> à(s) 22:12:
>>
>> On Tue, Apr 18, 2023 at 5:04 PM Richard Purdie
>> wrote:
>> >
>> > On Tue, 2023-04-18 at 16:25 -0400, Bruce Ashfield wrote:
>> > > On Mon, Apr 17, 2023 at 6:31 PM
Bruce Ashfield escreveu no dia terça, 18/04/2023
à(s) 22:12:
> On Tue, Apr 18, 2023 at 5:04 PM Richard Purdie
> wrote:
> >
> > On Tue, 2023-04-18 at 16:25 -0400, Bruce Ashfield wrote:
> > > On Mon, Apr 17, 2023 at 6:31 PM Jose Quaresma
> wrote:
> > > >
> > > >
> > > >
> > > > Richard Purdie
Signed-off-by: Ross Burton
---
.../screen/screen/signal-permission.patch | 40 +++
meta/recipes-extended/screen/screen_4.9.0.bb | 1 +
2 files changed, 41 insertions(+)
create mode 100644 meta/recipes-extended/screen/screen/signal-permission.patch
diff --git
Signed-off-by: Ross Burton
---
...posite-Fix-use-after-free-of-the-COW.patch | 46 +++
.../xorg-xserver/xserver-xorg_21.1.7.bb | 3 +-
2 files changed, 48 insertions(+), 1 deletion(-)
create mode 100644
On 4/19/23 15:15, florian.cathelin...@smile.fr wrote:
> # FIXME: the LIC_FILES_CHKSUM values have been updated by 'devtool upgrade'.
> # The following is the difference between the old and the new license text.
> # Please update the LICENSE value if needed, and summarize the changes in
> # the
# FIXME: the LIC_FILES_CHKSUM values have been updated by 'devtool upgrade'.
# The following is the difference between the old and the new license text.
# Please update the LICENSE value if needed, and summarize the changes in
# the commit message via 'License-Update:' tag.
# (example:
Hello Steve,
I have sent a dunfell branch patch with the subject
"[OE-core][*dunfell*][PATCH]
go-runtime: Security fix for CVE-2022-41722". I am not sure why it's
showing as a reply on kirkstone patch, not a separate email. Please
consider this patch to fix CVE-2022-41722 in dunfell.
Thanks,
From: Shubham Kulkarni
path/filepath: do not Clean("a/../c:/b") into c:\b on Windows
Backport from
https://github.com/golang/go/commit/bdf07c2e168baf736e4c057279ca12a4d674f18c
Signed-off-by: Shubham Kulkarni
---
meta/recipes-devtools/go/go-1.14.inc | 2 +
Hello,
I'm working to fix the known failures that come when enabling
time64.inc and run as much runtime tests as I can think of. Work in
progress is accumulated here:
https://git.yoctoproject.org/poky-contrib/log/?h=akanavin/y2038
I hope to get the patchset to the point where it can be submitted
From: rajmohan r
Below patch files to fix CVE-2023-26604
CVE-2023-26604-1.patch, CVE-2023-26604-2.patch and
CVE-2023-26604-3.patch and CVE-2023-26604-4.patch
make pager secure when under euid is changed or explicitly
requested
Reference:
CVE-2023-26604-1.patch:
Thanks for sharing the logs. I will check the failures.
Regards,
Yash
On Wed, 19 Apr 2023, 1:14 pm Luca Ceresoli,
wrote:
> Hello Yash,
>
> On Tue, 18 Apr 2023 14:40:13 +0530
> "Yash Shinde" wrote:
>
> > The patch implements Rust testing framework similar to other selftest,
> > specifically
Hello Yash,
On Tue, 18 Apr 2023 14:40:13 +0530
"Yash Shinde" wrote:
> The patch implements Rust testing framework similar to other selftest,
> specifically the gcc selftest in OE. It uses the client and server
> based method to test the binaries for cross-target on the image.
> The test
From: Xiangyu Chen
The fix of CVE-2023-29383.patch contains a bug that it rejects all
characters that are not control ones, so backup another patch named
"0001-Overhaul-valid_field.patch" from upstream to fix it.
Signed-off-by: Xiangyu Chen
---
Changes
v1->v2:
1. Based on latest oe-core
Signed-off-by: Khem Raj
---
...ion-Check-if-transform-is-supported-.patch | 37 +++
meta/recipes-support/apr/apr-util_1.6.3.bb| 1 +
2 files changed, 38 insertions(+)
create mode 100644
25 matches
Mail list logo