Backport of couple patches from upstream.
Signed-off-by: Victor Kamensky
---
...gcc-version-compatibility-hack-redux.patch | 32
...e.cxx-gcc-version-compatibility-hack.patch | 52 +++
.../systemtap/systemtap_git.inc | 2 +
3 files changed, 86 insertio
- connect them to webrtc
This avoids:
../gst-plugins-bad-1.24.3/ext/sctp/meson.build:8:33: ERROR: Feature sctp
cannot be disabled: webrtc option is enabled
../gst-plugins-bad-1.24.3/ext/srtp/meson.build:10:33: ERROR: Feature srtp
cannot be disabled: webrtc option is enabled
Signed-off-by: Mar
The variable contains the suffix of the CVE JSON manifest file.
By default, this variable is set to 'json', so the current behavior
is not changed, but enables developers to use some other suffix,
e.g., cve.json (similar to spdx.json).
Signed-off-by: Aleksandar Nikolic
---
meta/classes/cve-check
The variable contains the suffix of the CVE JSON manifest file.
By default, this variable is set to 'json', so the current behavior
is not changed, but enables developers to use some other suffix,
e.g., cve.json (similar to spdx.json).
Signed-off-by: Aleksandar Nikolic
---
meta/classes/cve-check
ver 0.66:
Fix issue with handling event callback when stopping ACD.
Fix issue with handling ICMPv6 DNS and domain lists.
Add support for notification lists.
Signed-off-by: Markus Volk
---
meta/recipes-core/ell/{ell_0.65.bb => ell_0.66.bb} | 2 +-
1 file changed, 1 inserti
Jörg Sommer via lists.openembedded.org schrieb am So 09. Jun, 16:59 (GMT):
> diff --git a/meta/classes-recipe/kernel.bbclass
> b/meta/classes-recipe/kernel.bbclass
> index d6eedf942c..89badd90f1 100644
> --- a/meta/classes-recipe/kernel.bbclass
> +++ b/meta/classes-recipe/kernel.bbclass
> @@ -115,
From: Jörg Sommer
The commit “Use a copy of image for kernel*.rpm if fs doesn't support
symlinks” [1] added postinst and postrm scripts to the kernel package which
create a symlink after package installation. This should not happen if
`KERNEL_IMAGETYPE_SYMLINK` is not `1`.
Background: The u-boot
Branch: scarthgap
New this week: 0 CVEs
Removed this week: 0 CVEs
Full list: Found 68 unpatched CVEs
CVE-2019-14899 (CVSS3: 7.4 HIGH): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 *
CVE-2021-3714 (CVSS3: 5.9 MEDIUM): linux-yocto
https://web.nvd.nist.gov/view/vul
Branch: kirkstone
New this week: 0 CVEs
Removed this week: 0 CVEs
Full list: Found 33 unpatched CVEs
CVE-2021-35937 (CVSS3: 6.4 MEDIUM): rpm:rpm-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35937 *
CVE-2021-35938 (CVSS3: 6.7 MEDIUM): rpm:rpm-native
https://web.nvd.nist.gov
Branch: master
New this week: 0 CVEs
Removed this week: 1 CVEs
CVE-2022-46456 (CVSS3: 6.1 MEDIUM): nasm:nasm-native
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46456 *
Full list: Found 36 unpatched CVEs
CVE-2019-14899 (CVSS3: 7.4 HIGH): linux-yocto
https://web.nvd.nist.gov/view/
The eBPFs are pre-compiled during the systemd-build with a different
compiler than the cross-compiler used to build systemd itself.
This is either a 'clang-native' or a gcc (bpf-unknown-none) which do
not see the BUILD_CFLAGS set -isystem ${STAGING_INCDIR}. For this the
meson.build file constructi
Thank you for your submission. Patchtest identified one
or more issues with the patch. Please see the log below for
more information:
---
Testing patch
/home/patchtest/share/mboxes/v1-2-2-systemd-bpf-framework-pass-STAGING_INCDIR-to-eBPF-compiler.patch
FAIL: test Upstream-Status presence: Added
The bpf-framework is used to pre-compile eBPFs that required for the
systemd.resource-control features RestrictFileSystems=[1] and
RestrictNetworkInterfaces=[2] to work.
Apart from 'clang-native' to compile the eBPFs, the required kernel
switches are described in [3].
Link:
https://www.freedeskt
The eBPFs are pre-compiled during the systemd-build with a different
compiler than the cross-compiler used to build systemd itself.
This is either a 'clang-native' or a gcc (bpf-unknown-none) which do
not see the BUILD_CFLAGS set -isystem ${STAGING_INCDIR}. For this the
meson.build file constructi
Systemd has eBPF based resource-control features to limit file-system
and network-interface access [1][2]
For these to be usable the corresponding eBPFs that come with systemd
need to be compiled an deployed to the system - this could now be done
by setting the PACKAGECONFIG+="bpf-framework" in th
15 matches
Mail list logo