* ${EXTENDPE} and ${PR} was already dropped from ${WORKDIR} in:
https://lists.openembedded.org/g/openembedded-core/message/185818
adjust -fmacro-prefix-map and -fdebug-prefix-map similarly.
As we don't depend on PR in WORKDIR maybe we don't need it in
/usr/src/debug paths as well anymore.
Thank you for your submission. Patchtest identified one
or more issues with the patch. Please see the log below for
more information:
---
Testing patch
/home/patchtest/share/mboxes/2-2-bitbake.conf-ovmf-go-cross-canadian-cargo-libjpeg-turbo-ffmpeg-acpica-perf-drop-PE-and-PR-from--f-file-macro-deb
* ${EXTENDPE} and ${PR} was already dropped from ${WORKDIR} in:
https://lists.openembedded.org/g/openembedded-core/message/185818
adjust -fmacro-prefix-map and -fdebug-prefix-map similarly.
As we don't depend on PR in WORKDIR maybe we don't need it in
/usr/src/debug paths as well anymore.
From: Martin Jansa
* similarly as direct dependencies before
* this doesn't fix any issue (at least AFAIK),
just keeps the log files more deterministic to avoid unnecessary churn like
in:
perl-native.log.do_configure:
-NOTE: Installed into sysroot: ['zlib-native', 'make-native',
'perlcro
Hello,
I've tried this multiple times but this is failing because it is
impossible to fetch:
https://files.pythonhosted.org/packages/source/r/ruamel.yaml/ruamel.yaml-0.18.4.tar.gz
I guess we need 0.18.5.
On 03/11/2023 15:43:13+0800, wangmy wrote:
> From: Wang Mingyu
>
> Changelog:
> =
I've sent a v2 that would fix the issue by adding openssl tls support
by default. tls can be switched to gnutls by using PACKAGECONFIG
On Sun, Nov 12 2023 at 09:59:39 PM +01:00:00, Markus Volk
wrote:
Hi,
| hash.c:16:12: fatal error: gnutls/crypto.h: No such file or
directory
|16 | # i
- enable tls by default to fix:
| hash.c:16:12: fatal error: gnutls/crypto.h: No such file or directory
|16 | # include
Changes in CUPS v2.4.7 (2023-09-20)
---
- CVE-2023-4504 - Fixed Heap-based buffer overflow when reading Postscript
in PPD files
- Added O
Hi,
| hash.c:16:12: fatal error: gnutls/crypto.h: No such file or directory
|16 | # include
it fails because there is no tls implementation activated by default. I
do my builds with gnutls enabled and removing the bbappend that
contains the packageconfig makes this problem reproducible f
Hello,
This fails:
reproducible:
https://autobuilder.yoctoproject.org/typhoon/#/builders/117/builds/3912/steps/12/logs/errors
lib32:
https://autobuilder.yoctoproject.org/typhoon/#/builders/52/builds/7998/steps/11/logs/stdio
https://autobuilder.yoctoproject.org/typhoon/#/builders/108/builds/5334/
Branch: nanbield
New this week: 12 CVEs
CVE-2023-3397 (CVSS3: 6.3 MEDIUM): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3397 *
CVE-2023-38469 (CVSS3: 5.5 MEDIUM): avahi
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38469 *
CVE-2023-38470 (CVSS3: 5.5 MEDIUM):
Branch: mickledore
New this week: 14 CVEs
CVE-2023-1193 (CVSS3: 6.5 MEDIUM): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1193 *
CVE-2023-3397 (CVSS3: 6.3 MEDIUM): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3397 *
CVE-2023-38469 (CVSS3: 5.5 MED
Branch: kirkstone
New this week: 7 CVEs
CVE-2023-38469 (CVSS3: 5.5 MEDIUM): avahi
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38469 *
CVE-2023-38470 (CVSS3: 5.5 MEDIUM): avahi
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38470 *
CVE-2023-38471 (CVSS3: 5.5 MEDIUM): avah
Thank you for your submission. Patchtest identified one
or more issues with the patch. Please see the log below for
more information:
---
Tests failed for the patch, but the results log could not be processed due to
excessive result line length.
---
Please address the issues identified and
submi
From: Xiangyu Chen
CVE: CVE-2023-4692
Crafted file system images can cause heap-based buffer
overflow and may allow arbitrary code execution and secure boot bypass.
Upstream-Status: Backport
[https://git.savannah.gnu.org/cgit/grub.git/commit/?id=43651027d24e62a7a463254165e1e46e42aecdea]
CVE: C
Branch: dunfell
New this week: 7 CVEs
CVE-2023-3164 (CVSS3: 7.1 HIGH): gawk
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164 *
CVE-2023-38469 (CVSS3: 5.5 MEDIUM): avahi
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38469 *
CVE-2023-38470 (CVSS3: 5.5 MEDIUM): avahi
http
Why don't you add this only to meta-sicom layer? It doesn't seem to be used
in many recipes to include it in oe-core.
On Tue, Nov 7, 2023 at 12:53 PM Zoltan Boszormenyi
wrote:
> The Baekmuk font uses this license.
>
> The license file was extracted from
> http://kldp.net/baekmuk/release/865-baek
libgs is eg. needed to build ghostscript support for gimp
also install the data target
Signed-off-by: Markus Volk
---
meta/recipes-extended/ghostscript/ghostscript_10.02.1.bb | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/meta/recipes-extended/ghostscript/ghostscript_10.0
libgs is eg. needed to build ghostscript support for gimp
Signed-off-by: Markus Volk
---
meta/recipes-extended/ghostscript/ghostscript_10.02.1.bb | 5 +
1 file changed, 5 insertions(+)
diff --git a/meta/recipes-extended/ghostscript/ghostscript_10.02.1.bb
b/meta/recipes-extended/ghostscript
Branch: master
New this week: 8 CVEs
CVE-2023-3397 (CVSS3: 6.3 MEDIUM): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3397 *
CVE-2023-38469 (CVSS3: 5.5 MEDIUM): avahi
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38469 *
CVE-2023-38470 (CVSS3: 5.5 MEDIUM): ava
19 matches
Mail list logo