Re: [OE-core] [[master][PATCH]] Upgrade OpenSSL 3.0.7 -> 3.0.8

2023-02-09 Thread mv
Hi Luca, Thank-you for your feedback. Yes, the patch was a mistake. I have rectified it and submitted version-2 for the same. However, i am looking into how to change the name which unfortunately i am not able to do currently even though my git credentials are in sync. By the next patch submis

[OE-core] [kirkstone][PATCH-v2] Upgrade OpenSSL 3.0.7 -> 3.0.8

2023-02-09 Thread mv
From: Siddharth Doshi OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level security vulnerability [1]. Upgrade the recipe to point to 3.0.8. CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as well. [1] https://www.openssl.org/news/vulnerabilities.h

[OE-core] [langdale][PATCH-v2] Upgrade OpenSSL 3.0.7 -> 3.0.8

2023-02-09 Thread mv
From: Siddharth Doshi OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level security vulnerability [1]. Upgrade the recipe to point to 3.0.8. CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as well. [1] https://www.openssl.org/news/vulnerabilities.h

[OE-core] [master][PATCH-v2] Upgrade OpenSSL 3.0.7 -> 3.0.8

2023-02-09 Thread mv
From: Siddharth Doshi OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level security vulnerability [1]. Upgrade the recipe to point to 3.0.8. CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as well. [1] https://www.openssl.org/news/vulnerabilities.h

Re: [OE-core] [[langdale][PATCH]] Upgrade OpenSSL 3.0.7 -> 3.0.8

2023-02-09 Thread mv
Have submitted the patch to master branch. Do you want me to re-submit to LTS branches ? -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#176946): https://lists.openembedded.org/g/openembedded-core/message/176946 Mute This Topic: https://lists.opene

[OE-core] [[master][PATCH]] Upgrade OpenSSL 3.0.7 -> 3.0.8

2023-02-09 Thread mv
From: Siddharth Doshi OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level security vulnerability [1]. Upgrade the recipe to point to 3.0.8. CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as well. [1] https://www.openssl.org/news/vulnerabilities.h

[OE-core] [[langdale][PATCH]] Upgrade OpenSSL 3.0.7 -> 3.0.8

2023-02-09 Thread mv
From: Siddharth Doshi OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level security vulnerability [1]. Upgrade the recipe to point to 3.0.8. CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as well. [1] https://www.openssl.org/news/vulnerabilities.h

[OE-core] [[kirkstone][PATCH] openssl : Upgrade OpenSSL 3.0.7 -> 3.0.8] openssl: Upgrade 3.0.7 -> 3.0.8

2023-02-09 Thread mv
From: Siddharth Doshi OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level security vulnerability [1]. Upgrade the recipe to point to 3.0.8. CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as well. [1] https://www.openssl.org/news/vulnerabilities.h

[OE-core] [[kirkstone][PATCH v3] xterm : Fix CVE-2022-45063 code execution via OSC 50 input sequences] CVE-2022-45063

2022-12-22 Thread mv
From: Siddharth Doshi Upstream-Status: Backport [https://github.com/ThomasDickey/xterm-snapshots/commit/787636674918873a091e7a4ef5977263ba982322] CVE: CVE-2022-45063 Signed-off-by: Siddharth Doshi --- .../xorg-app/xterm/CVE-2022-45063.patch | 764 ++ .../recipes-graphics/

[OE-core] [[kirkstone][PATCH v2] xterm : Fix CVE-2022-45063 code execution via OSC 50 input sequences] CVE-2022-45063

2022-12-22 Thread mv
From: Siddharth Doshi Upstream-Status: Backport [https://github.com/ThomasDickey/xterm-snapshots/commit/787636674918873a091e7a4ef5977263ba982322] CVE: CVE-2022-45063 Signed-off-by: Siddharth Doshi --- .../xorg-app/xterm/CVE-2022-45063.patch | 763 ++ .../recipes-graphics/

[OE-core] [[kirkstone][PATCH] xterm : Fix CVE-2022-45063 code execution via OSC 50 input sequences] CVE-2022-45063

2022-12-22 Thread mv
From: Siddharth Doshi Upstream-Status: Backport [https://github.com/ThomasDickey/xterm-snapshots/commit/787636674918873a091e7a4ef5977263ba982322] CVE: CVE-2022-45063 Signed-off-by: Siddharth Doshi --- .../xorg-app/xterm/0001-CVE-2022-45063.patch | 763 ++ .../recipes-graphics/

[OE-core] Fwd: [oe-core][PATCH] apr: add apr_cv_mutex_recursive=yes to support meta-ros

2013-07-07 Thread Víctor MV
Hi, I sent this patch to the list a couple of days ago following the instructions given previously. What's the state of the patch? There were some discussions regarding wether it should be separated in two commits or not. Could anybody inform me if the patch has been accepted? Regards, Víctor.

Re: [OE-core] apr: Add EXTRA_OECONF += "apr_cv_mutex_recursive=yes"

2013-07-01 Thread Víctor MV
Updated the commit message and patch. 2013/7/1 Víctor MV > Working with the meta-ros project we detected that the ROS nodes didn't > launch properly the reason was that by default apr_cv_mutex_recursive in > apr is set to no and this leads to the APRENOTIMPL r

[OE-core] apr: Add EXTRA_OECONF += "apr_cv_mutex_recursive=yes"

2013-07-01 Thread Víctor MV
Working with the meta-ros project we detected that the ROS nodes didn't launch properly the reason was that by default apr_cv_mutex_recursive in apr is set to no and this leads to the APRENOTIMPL return value of apr_thread_mutex_create in thread_mutex.c when APR_THREAD_MUTEX_NESTED is requested via