Hi Luca,
Thank-you for your feedback. Yes, the patch was a mistake. I have rectified it
and submitted version-2 for the same.
However, i am looking into how to change the name which unfortunately i am not
able to do currently even though my git credentials are in sync.
By the next patch submis
From: Siddharth Doshi
OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level
security vulnerability [1].
Upgrade the recipe to point to 3.0.8.
CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as
well.
[1] https://www.openssl.org/news/vulnerabilities.h
From: Siddharth Doshi
OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level
security vulnerability [1].
Upgrade the recipe to point to 3.0.8.
CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as
well.
[1] https://www.openssl.org/news/vulnerabilities.h
From: Siddharth Doshi
OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level
security vulnerability [1].
Upgrade the recipe to point to 3.0.8.
CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as
well.
[1] https://www.openssl.org/news/vulnerabilities.h
Have submitted the patch to master branch. Do you want me to re-submit to LTS
branches ?
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#176946):
https://lists.openembedded.org/g/openembedded-core/message/176946
Mute This Topic: https://lists.opene
From: Siddharth Doshi
OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level
security vulnerability [1].
Upgrade the recipe to point to 3.0.8.
CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as
well.
[1] https://www.openssl.org/news/vulnerabilities.h
From: Siddharth Doshi
OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level
security vulnerability [1].
Upgrade the recipe to point to 3.0.8.
CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as
well.
[1] https://www.openssl.org/news/vulnerabilities.h
From: Siddharth Doshi
OpenSSL 3.0.8 fixes 1 HIGH level security vulnerability and 7 MODERATE level
security vulnerability [1].
Upgrade the recipe to point to 3.0.8.
CVE-2022-3996 is reported fixed in 3.0.8, so drop the patch for that as
well.
[1] https://www.openssl.org/news/vulnerabilities.h
From: Siddharth Doshi
Upstream-Status: Backport
[https://github.com/ThomasDickey/xterm-snapshots/commit/787636674918873a091e7a4ef5977263ba982322]
CVE: CVE-2022-45063
Signed-off-by: Siddharth Doshi
---
.../xorg-app/xterm/CVE-2022-45063.patch | 764 ++
.../recipes-graphics/
From: Siddharth Doshi
Upstream-Status: Backport
[https://github.com/ThomasDickey/xterm-snapshots/commit/787636674918873a091e7a4ef5977263ba982322]
CVE: CVE-2022-45063
Signed-off-by: Siddharth Doshi
---
.../xorg-app/xterm/CVE-2022-45063.patch | 763 ++
.../recipes-graphics/
From: Siddharth Doshi
Upstream-Status: Backport
[https://github.com/ThomasDickey/xterm-snapshots/commit/787636674918873a091e7a4ef5977263ba982322]
CVE: CVE-2022-45063
Signed-off-by: Siddharth Doshi
---
.../xorg-app/xterm/0001-CVE-2022-45063.patch | 763 ++
.../recipes-graphics/
Hi,
I sent this patch to the list a couple of days ago following the
instructions given previously. What's the state of the patch?
There were some discussions regarding wether it should be separated in two
commits or not.
Could anybody inform me if the patch has been accepted?
Regards,
Víctor.
Updated the commit message and patch.
2013/7/1 Víctor MV
> Working with the meta-ros project we detected that the ROS nodes didn't
> launch properly the reason was that by default apr_cv_mutex_recursive in
> apr is set to no and this leads to the APRENOTIMPL r
Working with the meta-ros project we detected that the ROS nodes didn't
launch properly the reason was that by default apr_cv_mutex_recursive in
apr is set to no and this leads to the APRENOTIMPL return value of
apr_thread_mutex_create in thread_mutex.c when APR_THREAD_MUTEX_NESTED is
requested via
14 matches
Mail list logo