On Sun, Jul 10, 2022 at 11:27 PM Bruce Ashfield via
lists.openembedded.org
wrote:
>
> On Sun, Jul 10, 2022 at 9:29 PM Bruce Ashfield via
> lists.openembedded.org
> wrote:
> >
> > On Fri, Jul 8, 2022 at 10:47 AM Richard Purdie
> > wrote:
> > >
> > > On Fri, 2022-07-08 at 09:37 -0400, Bruce Ashfie
From: Bruce Ashfield
Integrating the following commit(s) to linux-yocto/5.15:
Author: Bruce Ashfield
Date: Sun Jul 10 22:56:53 2022 -0400
lib/build_OID_registry: fix reproducibility issues
The script build_OID_registry captures the full path of itself
in the generated data. Th
On Sun, Jul 10, 2022 at 9:29 PM Bruce Ashfield via
lists.openembedded.org
wrote:
>
> On Fri, Jul 8, 2022 at 10:47 AM Richard Purdie
> wrote:
> >
> > On Fri, 2022-07-08 at 09:37 -0400, Bruce Ashfield wrote:
> > > On Fri, Jul 8, 2022 at 7:07 AM Richard Purdie
> > > wrote:
> > > >
> > > > Hi All,
>
From: Bruce Ashfield
Updating to the latest korg -stable release that comprises
the following commits:
545aecd22961 Linux 5.15.52
ea512d540a55 io_uring: fix not locked access to fixed buf table
5696f7983d5d net: mscc: ocelot: allow unregistered IP multicast flooding to
CPU
8109
From: Bruce Ashfield
Updating to the latest korg -stable release that comprises
the following commits:
ea86c1430c83 Linux 5.10.128
2d10984d99ac net: mscc: ocelot: allow unregistered IP multicast flooding
6a656280e775 powerpc/ftrace: Remove ftrace init tramp once kernel init is
comp
From: Bruce Ashfield
Richard,
Here's the next set of updates to -stable (I had already staged
them before we ran into the buildpaths QA issues), and on top of
them is a RFC fix that I did for the buildpaths issue you found
in the linux-src package with the conmakehash.
That fix is still prelimi
Looks good to me, and better than what we had before.
I've fast tracked it into master, so we can see what the
next set of autobuilder runs uncover.
Many thanks for looking at this.
Bruce
In message: [meta-virtualization][PATCH] xen, xen-tools: pass prefix maps to
fix buildpaths reproducible
On Fri, Jul 8, 2022 at 10:47 AM Richard Purdie
wrote:
>
> On Fri, 2022-07-08 at 09:37 -0400, Bruce Ashfield wrote:
> > On Fri, Jul 8, 2022 at 7:07 AM Richard Purdie
> > wrote:
> > >
> > > Hi All,
> > >
> > > We've made good progress and I appreciate the help from people. I ran a
> > > fresh build
Em sáb., 9 de jul. de 2022 às 17:26, An?bal Lim?n
escreveu:
> From: Aníbal Limón
>
> Check if systemd is enabled to install .service file only instead of
> service and sysvinit files because it will to rngd service twice by
> systemd compatibility.
>
> One called rng-tools.service (sysv compat)
Signed-off-by: Otavio Salvador
---
(no changes since v1)
.../cargo/cargo-cross-canadian.inc| 20 ++-
1 file changed, 19 insertions(+), 1 deletion(-)
diff --git a/meta/recipes-devtools/cargo/cargo-cross-canadian.inc
b/meta/recipes-devtools/cargo/cargo-cross-canadian
We need full target passed for build so we changed the
rust-cross-canadian to use same code used in regular rust recipes and
added support to use specific llvm-target for the building host.
Fixes: ef566af964 ("rust: fix issue building cross-canadian tools for aarch64
on x86_64")
Fixes: bd36593ba3
From: Christoph Lauer
Since commit d756b346f248df47b0540644adb1d0f17bcc4b6e kernel modules are
stripped by the functions 'runstrip' and 'splitdebuginfo'. Signed modules must
not be stripped. Function 'runstrip' avoids this by running
is_kernel_module_signed. Apply the same check to splitdebugi
Branch: kirkstone
New this week: 6 CVEs
CVE-2022-2257 (CVSS3: 7.8 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2257 *
CVE-2022-2264 (CVSS3: 7.8 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2264 *
CVE-2022-2284 (CVSS3: 7.8 HIGH): vim
https://web.nv
Branch: dunfell
New this week: 12 CVEs
CVE-2022-2206 (CVSS3: 7.8 HIGH): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2206 *
CVE-2022-2207 (CVSS3: 9.8 CRITICAL): vim
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2207 *
CVE-2022-2208 (CVSS3: 5.5 MEDIUM): vim
https://w
Branch: master
New this week: 9 CVEs
CVE-2022-2056 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2056 *
CVE-2022-2057 (CVSS3: 6.5 MEDIUM): tiff
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2057 *
CVE-2022-2058 (CVSS3: 6.5 MEDIUM): tiff
https://
15 matches
Mail list logo