From: Pawan Badganchi
Add below patches to fix CVE-2022-25308, CVE-2022-25309 and CVE-2022-25310
CVE-2022-25308.patch
Link:
https://github.com/fribidi/fribidi/commit/ad3a19e6372b1e667128ed1ea2f49919884587e1
CVE-2022-25309.patch
Link:
https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d
From: Pawan Badganchi
Add below patch to fix CVE-2022-1215
CVE-2022-1215.patch
Link:
https://gitlab.freedesktop.org/libinput/libinput/-/commit/2a8b8fde90d63d48ce09ddae44142674bbca1c28
Signed-off-by: Pawan Badganchi
---
.../wayland/libinput/CVE-2022-1215.patch | 361 ++
..
On 03.05.2022 10:22, Claudius Heine wrote:
The overlayfs_qa_check checks if the current root file system has a
mount configured for each overlayfs, when the overlayfs class is used.
However there are certain instances where this mount point is created at
runtime and not static in a fstab entry o
Hello,
I am puzzled by the following final do_package errors for dbus,
glib-2.0-dev etc in the kirkstone branch, that error messages were
never seen in honister and other branches. dbus glib etc are from
oe-core, could oe-core insiders advise what those error messages are
about and how to fix it?
On 9/13/21 7:00 PM, Richard Purdie wrote:
[Please note: This e-mail is from an EXTERNAL e-mail address]
On Mon, 2021-09-13 at 11:42 +0800, Changqing Li wrote:
ping
On 8/30/21 4:11 PM, Changqing Li wrote:
On 8/6/21 9:21 AM, Changqing Li wrote:
From: Changqing Li
Steps:
1. build out rootfs
Hi, Alex
> PACKAGECONFIG[fips] = "--enable-fips140-mode
> --with-libdl-prefix=${STAGING_BASELIBDIR},--disable-fips140-mode,gnutls-nativ
> e"
> PACKAGECONFIG[fips-native] = "--enable-fips140-mode
> --with-libdl-prefix=${STAGING_BASELIBDIR},--disable-fips140-mode"
I'm sorry that this way doesn’t wo
On Sun, 2022-05-08 at 13:34 +0100, Richard Purdie via
lists.openembedded.org wrote:
> Includes fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406.
>
>
I'm amending this to "Include fix for CVE-2022-27404" since CVE-2022-
27405 and CVE-2022-27406 were already in 2.12.0.
I don't think the C
On Sun, May 8, 2022 at 4:35 AM Mittal, Anuj wrote:
>
> Should we stop tracking numbers for hardknott since it's no longer
> maintained?
Yes, this will be the last one.
Steve
> On Sun, 2022-05-08 at 03:05 -1000, Steve Sakoman wrote:
> > Branch: hardknott
> >
> > New this week: 5 CVEs
> > CVE-202
Should we stop tracking numbers for hardknott since it's no longer
maintained?
Thanks,
Anuj
On Sun, 2022-05-08 at 03:05 -1000, Steve Sakoman wrote:
> Branch: hardknott
>
> New this week: 5 CVEs
> CVE-2022-0908 (CVSS3: 5.5 MEDIUM): tiff
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022
Branch: kirkstone
New this week: 3 CVEs
CVE-2022-27404 (CVSS3: 9.8 CRITICAL): freetype:freetype-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27404 *
CVE-2022-27405 (CVSS3: 7.5 HIGH): freetype:freetype-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27405 *
CV
Branch: honister
New this week: 4 CVEs
CVE-2022-27404 (CVSS3: 9.8 CRITICAL): freetype:freetype-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27404 *
CVE-2022-27405 (CVSS3: 7.5 HIGH): freetype:freetype-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27405 *
CVE
Branch: hardknott
New this week: 5 CVEs
CVE-2022-0908 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0908 *
CVE-2022-27404 (CVSS3: 9.8 CRITICAL): freetype:freetype-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27404 *
CVE-2022-27405 (CVSS3:
On Sun, 2022-05-08 at 13:04 +0200, Max Krummenacher wrote:
> From: Max Krummenacher
>
> This reverts commit 1c90b27d2c65cfb4f9debf0272820b6a95942f76. [2]
>
> To exclude the kernel image from the final rootfs the documentation [1]
> suggest to override `RDEPENDS:${KERNEL_PACKAGE_NAME}-base`.
> Wi
The recent ptest addition was causing reproducibility tests to fail.
Remove the problematic files as they clearly aren't needed on target
to run the ptests. Hack the Makefile so that it doesn't try to rerun
configure and similar.
Also add a missing dependency on make.
Signed-off-by: Richard Purdi
Currently the signatures for do_packagedata don't reflect whether PRServ
was active or not. This means that if you have mxiing of PRServ usage and
non PRServ usage against the same sstate cache it can rarely become
corrupted with one referencing the other.
This likely doesn't happen in general but
Includes fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406.
Signed-off-by: Richard Purdie
---
.../freetype/{freetype_2.12.0.bb => freetype_2.12.1.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-graphics/freetype/{freetype_2.12.0.bb =>
freetype_2.12.
Includes fixes for CVE-2022-1381, CVE-2022-1420.
Signed-off-by: Richard Purdie
---
meta/recipes-support/vim/vim.inc | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc
index 21ff036cf4cf..c5922b7fcd71 100644
Branch: dunfell
New this week: 5 CVEs
CVE-2022-0908 (CVSS3: 5.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0908 *
CVE-2022-27404 (CVSS3: 9.8 CRITICAL): freetype:freetype-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27404 *
CVE-2022-27405 (CVSS3: 7
Branch: master
New this week: 3 CVEs
CVE-2022-27404 (CVSS3: 9.8 CRITICAL): freetype:freetype-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27404 *
CVE-2022-27405 (CVSS3: 7.5 HIGH): freetype:freetype-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27405 *
CVE-2
From: Max Krummenacher
This reverts commit 1c90b27d2c65cfb4f9debf0272820b6a95942f76. [2]
To exclude the kernel image from the final rootfs the documentation [1]
suggest to override `RDEPENDS:${KERNEL_PACKAGE_NAME}-base`.
With the change to RRECOMMENDS all layers which followed that suggestion
no
On Fri, 2022-05-06 at 21:42 -0700, Khem Raj wrote:
> On Fri, May 6, 2022 at 8:14 AM wrote:
> >
> > I reran the gcc 12 testing. We still have an issue with linux-yocto
> > 5.10 and edgerouter:
> >
> > https://autobuilder.yoctoproject.org/typhoon/#/builders/111/builds/3046
> >
>
> why are we pin
21 matches
Mail list logo