Patches are ok. I was wondering if BACKPORTS variable was good enough for cve patches too. Anyway the patch name ha cve informations On Jan 25, 2016 12:35 PM, "Armin Kuster" <akuster...@gmail.com> wrote:
> noticed this did not hit the patchwork. resending. > > Please consider these for the next fido update. > > The following changes since commit > 9845a542a76156adb5aef6fd33ad5bc5777acf64: > > openssh: CVE-2016-077x (2016-01-20 17:08:30 +0000) > > are available in the git repository at: > > git://git.yoctoproject.org/poky-contrib akuster/fido_glibc_cve_fixes > > http://git.yoctoproject.org/cgit.cgi//log/?h=akuster/fido_glibc_cve_fixes > > Armin Kuster (4): > glibc: CVE-2015-8777 > glibc: CVE-2015-8779 > glibc: CVE-2015-9761 > glibc: CVE_2015-8776 > > meta/recipes-core/glibc/glibc/CVE-2015-8776.patch | 176 +++ > meta/recipes-core/glibc/glibc/CVE-2015-8777.patch | 143 ++ > meta/recipes-core/glibc/glibc/CVE-2015-8779.patch | 282 ++++ > meta/recipes-core/glibc/glibc/CVE-2015-9761.patch | 1452 > +++++++++++++++++++++ > meta/recipes-core/glibc/glibc_2.21.bb | 4 + > 5 files changed, 2057 insertions(+) > create mode 100644 meta/recipes-core/glibc/glibc/CVE-2015-8776.patch > create mode 100644 meta/recipes-core/glibc/glibc/CVE-2015-8777.patch > create mode 100644 meta/recipes-core/glibc/glibc/CVE-2015-8779.patch > create mode 100644 meta/recipes-core/glibc/glibc/CVE-2015-9761.patch > > -- > 2.3.5 > > -- > _______________________________________________ > Openembedded-core mailing list > Openembedded-core@lists.openembedded.org > http://lists.openembedded.org/mailman/listinfo/openembedded-core >
-- _______________________________________________ Openembedded-core mailing list Openembedded-core@lists.openembedded.org http://lists.openembedded.org/mailman/listinfo/openembedded-core