On Sun, Feb 20, 2022 at 9:04 PM wrote:
>
> FWIW, there is also the pure patch to fix CVE-2021-4160 in openssl 1.1.1l for
> dunfell:
>
> https://lists.openembedded.org/g/openembedded-core/message/161652
>
> Patch versus letter version update, which one is preferred?
Yes, I'm aware of the CVE
FWIW, there is also the pure patch to fix CVE-2021-4160 in openssl 1.1.1l for
dunfell:
https://lists.openembedded.org/g/openembedded-core/message/161652
Patch versus letter version update, which one is preferred?
-Mikko
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this
On Fri, Feb 18, 2022 at 2:27 PM Tim Orling wrote:
>
>
>
> On Fri, Feb 18, 2022 at 3:36 PM Steve Sakoman wrote:
>>
>> On Tue, Feb 15, 2022 at 5:59 PM Tim Orling wrote:
>> >
>> > Changes are only security and bug fixes.
>>
>> I'm seeing ptest errors:
>>
>> WARNING:
On Fri, Feb 18, 2022 at 3:36 PM Steve Sakoman wrote:
> On Tue, Feb 15, 2022 at 5:59 PM Tim Orling wrote:
> >
> > Changes are only security and bug fixes.
>
> I'm seeing ptest errors:
>
> WARNING: core-image-sato-sdk-ptest-1.0-r0 do_testimage: There were
> failing ptests.
> Traceback (most
On Tue, Feb 15, 2022 at 5:59 PM Tim Orling wrote:
>
> Changes are only security and bug fixes.
I'm seeing ptest errors:
WARNING: core-image-sato-sdk-ptest-1.0-r0 do_testimage: There were
failing ptests.
Traceback (most recent call last):
File
Changes are only security and bug fixes.
https://www.openssl.org/news/cl111.txt
https://git.openssl.org/?p=openssl.git;a=log;h=refs/tags/OpenSSL_1_1_1m
CVE: CVE-2021-4160
https://nvd.nist.gov/vuln/detail/CVE-2021-4160
Signed-off-by: Tim Orling
---
Changes in v2:
- drop SRC_URI[md5sum] that