On 16 October 2014 21:44, Cliff Brake wrote:
> It seems the gitsm fetcher should be modified to do a recursive update:
>
> http://cgit.openembedded.org/bitbake/tree/lib/bb/fetch2/gitsm.py
>
> replace:
>
> runfetchcmd(ud.basecmd + " submodule init", d)
> runfetchcmd(ud.basecmd + " s
On Wed, Oct 15, 2014 at 9:22 PM, Chris Morgan wrote:
> Hello all.
>
> I posted some time ago about git with submodules and was pointed to
> gitsm. I've been using gitsm for sometime but ran into another issue.
>
> It looks like gitsm is not performing a recursive submodule update. I
> have a repos
On 10/16/2014 11:27 AM, Otavio Salvador wrote:
On Thu, Oct 16, 2014 at 1:45 PM, Burton, Ross wrote:
On 15 October 2014 16:31, Burton, Ross wrote:
There's a openssl 1.0.1j out now (fixing FOUR (!) CVEs, including
"disabling SSLv3 didn't work"...). I think considering the situation
we'd take
On Thu, Oct 16, 2014 at 1:45 PM, Burton, Ross wrote:
> On 15 October 2014 16:31, Burton, Ross wrote:
>> There's a openssl 1.0.1j out now (fixing FOUR (!) CVEs, including
>> "disabling SSLv3 didn't work"...). I think considering the situation
>> we'd take the upgrade for dizzy, even though we've
Matt S.
Sent from my pocket
On Oct 15, 2014, at 8:48 PM, Christian Ege
mailto:k423...@gmail.com>> wrote:
Am 16.10.2014 02:40 schrieb "Matt Schuckmann"
mailto:matt.schuckm...@planar.com>>:
>
> I'm pretty confused about what is the best way to go on this.
> I realize that there are several pat
Hi all,
I'm working on creating a layer for the rust compiler (which uses
llvm) and was wondering if there were any best practices and/or
examples people could point me at.
The compiler is designed to be built for multiple targets at once
(unlike the gcc model of having a single compiler build fo
On 15 October 2014 16:31, Burton, Ross wrote:
> There's a openssl 1.0.1j out now (fixing FOUR (!) CVEs, including
> "disabling SSLv3 didn't work"...). I think considering the situation
> we'd take the upgrade for dizzy, even though we've frozen. Anyone
> volunteering to take lead of upgrading di
On 16 October 2014 17:09, Sona Sarmadi wrote:
> Do you know if gnutls implements the SSLv3 protocol? I don't see any new
> security updates for gnutls (related to the SSLv3 vulnerability) ?
Yes it does, and no there isn't.
Ross
--
___
yocto mailing
Ross,
> > Presumably the list of affected packages is:
> > - gnutls
> > - openssl
> > - nss
>
> There's a openssl 1.0.1j out now (fixing FOUR (!) CVEs, including "disabling
> SSLv3 didn't work"...). I think considering the situation we'd take the
> upgrade for dizzy, even though we've frozen. A
Hi Ross
> There's a openssl 1.0.1j out now (fixing FOUR (!) CVEs, including "disabling
> SSLv3 didn't work"...). I think considering the situation we'd take the
> upgrade for dizzy, even though we've frozen. Anyone volunteering to take
> lead of upgrading dizzy to 1.0.1j and backporting the rele
10 matches
Mail list logo