The makefile checks for bc during for compilation
[YOCTO #6781]
Signed-off-by: Alejandro Hernandez
---
meta/classes/kernel.bbclass | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/classes/kernel.bbclass b/meta/classes/kernel.bbclass
index 78b33ce..0782923 100644
--- a/me
From: Konrad Scherer
The Makedoc.sh script uses the following line to set TMPDIR
export TMPDIR=`mktemp -d ${TMPDIR:-/tmp}/ldt.XX`;
and then later in the script:
chmod u+x $TMPDIR/linuxdoc
Since TMPDIR is not set the script will default to /tmp and if /tmp
is set to noexec (which is be
On Thu, Oct 2, 2014 at 12:48 PM, Mark Hatle wrote:
> On 10/2/14, 10:13 AM, Paul Eggleton wrote:
>>
>> On Thursday 02 October 2014 09:48:29 Mark Hatle wrote:
>>>
>>> With the recent vulnerabilities, a bunch of patches are being sent up to
>>> the
>>> list. The content is generally fine, but I'm wo
On Thu, Oct 2, 2014 at 1:51 PM, Viguera, Javier wrote:
>
>
>> -Original Message-
>> From: Burton, Ross [mailto:ross.bur...@intel.com]
>>
>> If we're adding u-boot to the SDK then we should add every bootloader.
>> But why install grub for a PPC SDK? This is why I suggested adding
>> the r
On Thu, Oct 02, 2014 at 10:19:17AM -0500, Alejandro Hernandez wrote:
> The makefile checks for bc during for compilation
It's needed only by 3.9 and newer, so that's why it wasn't globally
required by kernel.bbclass, but only in linux-yocto (3.10+ at that
time) and I've applied it in couple kernel
> -Original Message-
> From: Burton, Ross [mailto:ross.bur...@intel.com]
>
> If we're adding u-boot to the SDK then we should add every bootloader.
> But why install grub for a PPC SDK? This is why I suggested adding
> the right bootloader for each machine.
Hi Ross,
Not sure if I foll
On 2 October 2014 16:06, Mark Hatle wrote:
> This is actually correct in this instance.
>
> The bash community patches the generated files for these types of patches.
Of course they do...
Ross
--
___
Openembedded-core mailing list
Openembedded-core@li
On 10/2/14, 10:13 AM, Paul Eggleton wrote:
On Thursday 02 October 2014 09:48:29 Mark Hatle wrote:
With the recent vulnerabilities, a bunch of patches are being sent up to the
list. The content is generally fine, but I'm wondering if for master we
should apply all of the official bash patches to
Alejandro,
Sorry this was my bad, I was not clear on your question to me earlier,
since this was for the kernel.bbclass it should be
kernel: ...
So please submit corrected v2
Sorry
Sau!
On 10/02/2014 08:19 AM, Alejandro Hernandez wrote:
The makefile checks for bc during for compila
Hi Alejandro,
On Thursday 02 October 2014 10:19:17 Alejandro Hernandez wrote:
> The makefile checks for bc during for compilation
>
> [YOCTO #6781]
>
> Signed-off-by: Alejandro Hernandez
> ---
> meta/classes/kernel.bbclass | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git
The makefile checks for bc during for compilation
[YOCTO #6781]
Signed-off-by: Alejandro Hernandez
---
meta/classes/kernel.bbclass | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/classes/kernel.bbclass b/meta/classes/kernel.bbclass
index 78b33ce..0782923 100644
--- a/me
On Thursday 02 October 2014 09:48:29 Mark Hatle wrote:
> With the recent vulnerabilities, a bunch of patches are being sent up to the
> list. The content is generally fine, but I'm wondering if for master we
> should apply all of the official bash patches to get to the latest patch
> version, inst
On 10/2/14, 9:47 AM, Burton, Ross wrote:
On 2 October 2014 15:29, Sona Sarmadi wrote:
.../bash/bash-3.2.48/cve-2014-7186.patch | 87 ++
.../recipes-extended/bash/bash/cve-2014-7186.patch | 1303
The second patch contains generated files, can you remove them
On Thu, Oct 02, 2014 at 11:22:11AM +0200, Andreas Müller wrote:
> On Mon, Sep 8, 2014 at 1:58 PM, Ross Burton wrote:
>
> > From: Martin Jansa
> >
> > * in some cases (e.g. with external toolchain which doesn't respect our
> > reasonably old version set in OLDEST_KERNEL) it's possible to have l
With the recent vulnerabilities, a bunch of patches are being sent up to the
list. The content is generally fine, but I'm wondering if for master we should
apply all of the official bash patches to get to the latest patch version,
instead of applying various 'security' fixes that may or may not
On 2 October 2014 15:29, Sona Sarmadi wrote:
> .../bash/bash-3.2.48/cve-2014-7186.patch | 87 ++
> .../recipes-extended/bash/bash/cve-2014-7186.patch | 1303
>
The second patch contains generated files, can you remove them from the patch?
Ross
--
__
On 10/2/14, 9:28 AM, Sona Sarmadi wrote:
This is a followup patch to incomplete CVE-2014-6271 fix code execution via
specially-crafted environment.
CVE-2014-6277: bash: untrusted pointer use issue leading to code execution
CVE-2014-6278: bash: code execution via specially crafted environment var
On 2 October 2014 15:34, Viguera, Javier wrote:
> Hi Ross,
>
> I was not targeting any specific BSP. I was just using a generic toolchain
> created with poky. My steps:
>
> 1. Clone Poky (or oe-core)
> 2. Created a generic project and configure for 'qemuarm' (MACHINE=qemuarm
> changed in local.c
> -Original Message-
> From: Burton, Ross [mailto:ross.bur...@intel.com]
>
> On 2 October 2014 09:06, Javier Viguera
> wrote:
> > Add the 'mkimage' host tool to the toolchains generated with 'bitbake
> > meta-toolchain' or with 'bitbake -c populate_sdk '.
>
> But not all BSPs uses u-boot
This is a followup patch to incomplete CVE-2014-6271 fix code execution via
specially-crafted environment.
CVE-2014-6277: bash: untrusted pointer use issue leading to code execution
CVE-2014-6278: bash: code execution via specially crafted environment variables
Signed-off-by: Sona Sarmadi
---
.
On Thursday 02 October 2014 13:28:54 Paul Eggleton wrote:
> On Thursday 02 October 2014 00:07:41 Robert Yang wrote:
> > From: Khem Raj
> >
> > This is a followup patch to incomplete CVE-2014-6271 fix
> > code execution via specially-crafted environment
> >
> > Change-Id: Ibb0a587ee6e09b8174e92d0
Fixes for the patches being missed from the 4.2 recipes when the CVE
patches were backported.
The following changes since commit 1c8f43767c7d78872d38652ea808f30ea825bbef:
bash: Fix CVE-2014-7169 (2014-10-02 00:03:41 -0700)
are available in the git repository at:
git://git.openembedded.org/
The bash_4.2 recipe was missed when the fix was backported to the dora
branch.
Patch from OE-Core master rev: 76a2d6b83472995edbe967aed80f0fcbb784b3fc
by Khem Raj
Signed-off-by: Paul Eggleton
---
meta/recipes-extended/bash/bash-4.2/cve-2014-7169.patch | 16
meta/recipes-extend
The bash_4.2 recipe was missed when the fix was backported to the dora
branch.
Patch based on the one from OE-Core master rev
798d833c9d4bd9ab287fa86b85b4d5f128170ed3 by Ross Burton
, with the content replaced from the
appropriate upstream patch.
Signed-off-by: Paul Eggleton
---
.../bash/bash-4
Hi Ross,
On Thu, Oct 02, 2014 at 02:54:05PM +0100, Burton, Ross wrote:
> On 1 October 2014 14:29, Maxin B. John wrote:
> > Details of vulnerabilities are available below:
> > CVE-2014-3613: http://curl.haxx.se/docs/adv_20140910A.html
> > CVE-2014-3620: http://curl.haxx.se/docs/adv_20140910B.html
On 1 October 2014 14:29, Maxin B. John wrote:
> Details of vulnerabilities are available below:
> CVE-2014-3613: http://curl.haxx.se/docs/adv_20140910A.html
> CVE-2014-3620: http://curl.haxx.se/docs/adv_20140910B.html
>
> Signed-off-by: Maxin B. John
> ---
Still fails to apply the patches (diffe
On Thursday 02 October 2014 00:07:41 Robert Yang wrote:
> From: Khem Raj
>
> This is a followup patch to incomplete CVE-2014-6271 fix
> code execution via specially-crafted environment
>
> Change-Id: Ibb0a587ee6e09b8174e92d005356e822ad40d4ed
> (From OE-Core master rev: 76a2d6b83472995edbe967aed8
On 2 October 2014 09:06, Javier Viguera wrote:
> Add the 'mkimage' host tool to the toolchains generated with 'bitbake
> meta-toolchain' or with 'bitbake -c populate_sdk '.
But not all BSPs uses u-boot. Having the bootloader tooling makes
sense, but it needs to be the right tooling.
Ross
--
__
Hi Bryan,
On Wednesday 01 October 2014 12:54:31 Bryan Evenson wrote:
> I see that patches for bash to fix CVE-2014-7169 and CVE-2014-6271 have been
> applied to the daisy and master branches of openembedded-core two days ago.
> I saw some talk on this mailing list about applying the patches to th
Signed-off-by: Richard Purdie
diff --git a/meta/recipes-core/meta/uninative-tarball.bb
b/meta/recipes-core/meta/uninative-tarball.bb
index ed1279f..e17685a 100644
--- a/meta/recipes-core/meta/uninative-tarball.bb
+++ b/meta/recipes-core/meta/uninative-tarball.bb
@@ -6,7 +6,7 @@ LIC_FILES_CHKSUM
We fixed these in parselog but not here. This test really can just be
deleted now really.
Signed-off-by: Richard Purdie
diff --git a/meta/lib/oeqa/runtime/dmesg.py b/meta/lib/oeqa/runtime/dmesg.py
index 43e16c3..5831471 100644
--- a/meta/lib/oeqa/runtime/dmesg.py
+++ b/meta/lib/oeqa/runtime/dmes
We've been seeing an issue on the autobuilder due to the way it builds
package feed indexes. Packages get copied into the nightly build which
then creates indexes however this is done without the knowledge of
sstate. When adt-installer is built, it has dependencies on the toolchain
and when ipk fil
On Mon, Sep 8, 2014 at 1:58 PM, Ross Burton wrote:
> From: Martin Jansa
>
> * in some cases (e.g. with external toolchain which doesn't respect our
> reasonably old version set in OLDEST_KERNEL) it's possible to have libc
> which requires newer kernel than what we have on builders, qemu supp
Add the 'mkimage' host tool to the toolchains generated with 'bitbake
meta-toolchain' or with 'bitbake -c populate_sdk '.
This allows to use the standalone toolchain to build kernel images of
type uImage (with u-boot header)
Signed-off-by: Javier Viguera
---
meta/recipes-core/packagegroups/nati
Hi,
After a while of absence for other projects I built my standard image (xfce
based for gumstix). When starting xserver I see lots of
(EE) FBDEV(0): FBIOPUTCMAP: Invalid argument
Anybody out there with similar experiences or even better ideas to solve?
Andreas
--
Hello,
How's this going on, please ?
// Robert
On 09/10/2014 11:13 PM, Darren Hart wrote:
On 9/10/14, 1:27, "Richard Purdie"
wrote:
On Tue, 2014-09-09 at 17:42 -0700, Darren Hart wrote:
I'm working on a project which needs to have the full kernel sources
installed on the target. The kerne
From: Tobias Blom
Prefix to EnvironmentFile should be preciding the filenamn.
(From OE-Core rev: 1f694e4cb493b0737b6009382c0957e6837ebbed)
Signed-off-by: Tobias Blom
Signed-off-by: Saul Wold
Signed-off-by: Richard Purdie
---
meta/recipes-bsp/apmd/apmd-3.2.2-14/apmd.service |2 +-
1 file
From: Ross Burton
CVE-2014-6271 aka ShellShock.
"GNU Bash through 4.3 processes trailing strings after function definitions in
the values of environment variables, which allows remote attackers to execute
arbitrary code via a crafted environment."
(From OE-Core master rev: 798d833c9d4bd9ab287fa
From: Khem Raj
This is a followup patch to incomplete CVE-2014-6271 fix
code execution via specially-crafted environment
Change-Id: Ibb0a587ee6e09b8174e92d005356e822ad40d4ed
(From OE-Core master rev: 76a2d6b83472995edbe967aed80f0fcbb784b3fc)
Signed-off-by: Khem Raj
Signed-off-by: Richard Purdi
The following changes since commit 5c51dd2e9bab54013652475888554bc4660dcff3:
qt4: Fix Qt 4.8.5 source to new location (2014-08-11 12:08:03 +0100)
are available in the git repository at:
git://git.openembedded.org/openembedded-core-contrib robert/dora-next
http://cgit.openembedded.org/cgit
40 matches
Mail list logo