On 12/30/24 15:51, Mingyu Wang (Fujitsu) wrote:
If so, please add corresponding info in the commit message.
May I ask what commit information shold be written?
Reason about why these files are safe to be overridden by their
lib32/lib64 variants.
Regards,
Qi
--
Best Regards
--
> If so, please add corresponding info in the commit message.
May I ask what commit information shold be written?
--
Best Regards
---
Wang Mingyu
FUJITSU NANJING SOFTWARE TECHNOLOGY CO., LTD. (FNST)
No.6 Wenzhu Road, Nanjing, 210012, China
TEL:+86
Some CVEs may be patched during the build process without incrementing
the version number, save the CVEs fixed by patches to cve_by_status
which was parsed as "Patched" status to add new_vex_patched_relationship
to pkg_objset
Take recipe unzip for example, CVE-2015-1315 is patched in oe-core and
i
From: Changqing Li
By default, create-log-dirs is enabled in systemd, and a link
/var/log/README will be created, point to {{DOC_DIR}}/README.logs, but,
for oe, there are two problems here, firstly, DOC_DIR is packaged in
another package systemd-doc, so /var/log/README is a dead link when
system
From: Changqing Li
When TMPDIR has length 410, bitbake uninative-tarball will fail at
do_populate_sdk with error: Failed to open backup database:
"TMPDIR/work/x86_64-nativesdk-pokysdk-linux/uninative-tarball/1.0/sdk/image/var/lib/dnf/history.sqlite"
sqlite3 has a hardcode max pathname limit 512
From: Wang Mingyu
Signed-off-by: Wang Mingyu
---
...{systemd-boot-native_257.bb => systemd-boot-native_257.1.bb} | 0
.../systemd/{systemd-boot_257.bb => systemd-boot_257.1.bb} | 0
meta/recipes-core/systemd/systemd.inc | 2 +-
meta/recipes-core/systemd/{systemd_2
From: Wang Mingyu
Signed-off-by: Wang Mingyu
---
...hon3-hypothesis_6.122.6.bb => python3-hypothesis_6.123.2.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-devtools/python/{python3-hypothesis_6.122.6.bb =>
python3-hypothesis_6.123.2.bb} (91%)
diff --git a/meta/
From: Wang Mingyu
Signed-off-by: Wang Mingyu
---
.../{bash-completion_2.15.0.bb => bash-completion_2.16.0.bb}| 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-support/bash-completion/{bash-completion_2.15.0.bb =>
bash-completion_2.16.0.bb} (92%)
diff --git a/meta/
From: Wang Mingyu
Signed-off-by: Wang Mingyu
---
.../libical/{libical_3.0.18.bb => libical_3.0.19.bb}| 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-support/libical/{libical_3.0.18.bb => libical_3.0.19.bb}
(96%)
diff --git a/meta/recipes-support/libical/
From: Wang Mingyu
Signed-off-by: Wang Mingyu
---
.../cracklib/{cracklib_2.10.2.bb => cracklib_2.10.3.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-extended/cracklib/{cracklib_2.10.2.bb =>
cracklib_2.10.3.bb} (93%)
diff --git a/meta/recipes-extended/cra
From: Wang Mingyu
Signed-off-by: Wang Mingyu
---
...{ca-certificates_20240203.bb => ca-certificates_20241223.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-support/ca-certificates/{ca-certificates_20240203.bb =>
ca-certificates_20241223.bb} (97%)
diff --git a/m
From: Divya Chellam
Changes between 2.12.8 -> 2.12.9
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.9
Security
* [CVE-2024-40896] Fix XXE protection in downstream code
Improvements
* Undeprecate xmlKeepBlanksDefault.
Signed-off-by: Divya Chellam
---
Hi Mingyu,
These files look like configuration files and databases. Are you sure
these files can be safely overridden by their lib64/lib32 variants? If
so, please add corresponding info in the commit message.
Regards,
Qi
On 12/30/24 13:23, wangmy via lists.openembedded.org wrote:
Signed-off
From: Wang Mingyu
Signed-off-by: Wang Mingyu
---
meta/recipes-core/ncurses/ncurses.inc | 74 ++-
1 file changed, 73 insertions(+), 1 deletion(-)
diff --git a/meta/recipes-core/ncurses/ncurses.inc
b/meta/recipes-core/ncurses/ncurses.inc
index e96ee075bd..11d8fd7c3c 1006
Sorry about the spam.
Forgot about the fact that there's a class that fixes the issue I was seeing.
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#209136):
https://lists.openembedded.org/g/openembedded-core/message/209136
Mute This Topic: https://
Error:
libtool: Version mismatch error. This is libtool 2.5.4, but the
libtool: definition of this LT_INIT comes from libtool 2.5.2.
libtool: You should recreate aclocal.m4 with macros from libtool 2.5.4
libtool: and run autoconf again.
Signed-off-by: Vincent Davis Jr
---
meta/recipes-core/get
Commit adds in hackish fix for
libtool: Version mismatch.
Along with subsequent errors that occur after fix.
Signed-off-by: Vincent Davis Jr
---
meta/recipes-core/gettext/gettext_0.22.5.bb | 28 +
1 file changed, 28 insertions(+)
diff --git a/meta/recipes-core/gettext/gette
Commit adds in hackish fix for
libtool: Version mismatch.
Along with subsequent errors that occur after fix.
Signed-off-by: Vincent Davis Jr
---
meta/recipes-core/gettext/gettext_0.22.5.bb | 28 +
1 file changed, 28 insertions(+)
diff --git a/meta/recipes-core/gettext/gette
It seems Patchtest is still buggy
https://bugzilla.yoctoproject.org/show_bug.cgi?id=15517
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#209132):
https://lists.openembedded.org/g/openembedded-core/message/209132
Mute This Topic: https://lists.opene
Branch: styhead
New this week: 10 CVEs
CVE-2024-53089 (CVSS3: 5.5 MEDIUM): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-53089 *
CVE-2024-53090 (CVSS3: 5.5 MEDIUM): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-53090 *
CVE-2024-53091 (CVSS3: 5.5 ME
Branch: scarthgap
New this week: 12 CVEs
CVE-2024-26962 (CVSS3: 5.5 MEDIUM): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-26962 *
CVE-2024-27010 (CVSS3: 5.5 MEDIUM): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-27010 *
CVE-2024-27011 (CVSS3: 5.5
Branch: kirkstone
New this week: 14 CVEs
CVE-2022-48695 (CVSS3: 7.8 HIGH): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48695 *
CVE-2024-26962 (CVSS3: 5.5 MEDIUM): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-26962 *
CVE-2024-26983 (CVSS3: 7.8 HI
Branch: master
New this week: 0 CVEs
Removed this week: 0 CVEs
Full list: Found 18 unpatched CVEs
CVE-2019-14899 (CVSS3: 7.4 HIGH): linux-yocto
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14899 *
CVE-2021-3714 (CVSS3: 5.9 MEDIUM): linux-yocto
https://web.nvd.nist.gov/view/vuln/d
23 matches
Mail list logo