|
[PATCH v2] populate_sdk_ext: Fix race condition on bb_unihashes.dat
There is a race were the bb_unihashes.dat file may end up zero sized due to
concurrent builds. Use recently added API within bitbake to copy the file
safely. Also use the opportunity to remove
There is a race were the bb_unihashes.dat file may end up zero sized due to
concurrent builds. Use recently added API within bitbake to copy the file
safely. Also use the opportunity to remove
|
By
Richard Purdie
·
#166467
·
|
|
[PATCH] gcc-cross-canadian: Add nativesdk-zstd dependency
To match the changes to gcc-cross, add a nativesdk-zstd dependency to ensure
our configurations match.
Signed-off-by: Richard Purdie <richard.purdie@...>
---
To match the changes to gcc-cross, add a nativesdk-zstd dependency to ensure
our configurations match.
Signed-off-by: Richard Purdie <richard.purdie@...>
---
|
By
Richard Purdie
·
#166466
·
|
|
[PATCH] openssl: Backport fix for ptest cert expiry
ptests in in openssl have started failing as one of the test certificates has
expired. Backport a fix for this from upstream, replacing the test
certificate to allow the ptests to pass
ptests in in openssl have started failing as one of the test certificates has
expired. Backport a fix for this from upstream, replacing the test
certificate to allow the ptests to pass
|
By
Richard Purdie
·
#166465
·
|
|
Rust recipe fails to build project on kirkstone but works on dunfell
Hi!
I have a recipe[1] for a rust project. It builds the gstreamer plugin
for streaming from AWS S3 that is part of the gst-plugins-rs repo. I'm
upgrading the system from dunfell to kirkstone and
Hi!
I have a recipe[1] for a rust project. It builds the gstreamer plugin
for streaming from AWS S3 that is part of the gst-plugins-rs repo. I'm
upgrading the system from dunfell to kirkstone and
|
By
Bartosz Golaszewski
·
#166464
·
|
|
Re: [qa-build-notification] QA notification for completed autobuilder build (yocto-4.1_M1.rc1)
Hi all,
Intel and WR YP QA is planning for QA execution for YP build yocto-4.1_M1.rc1. We are planning to execute following tests for this cycle:
OEQA-manual tests for following module:
1.
Hi all,
Intel and WR YP QA is planning for QA execution for YP build yocto-4.1_M1.rc1. We are planning to execute following tests for this cycle:
OEQA-manual tests for following module:
1.
|
By
Teoh, Jay Shen
·
#166463
·
|
|
[PATCH] lttng-modules: Fix build failure for 5.10.119+ and 5.15.44+ kernel
The following kernel commit has been back ported to v5.10.119 and v5.15.44.
commit 14c174633f349cb41ea90c2c0aaddac157012f74
Author: Jason A. Donenfeld <Jason@...>
Date: Thu Feb 10 16:40:44
The following kernel commit has been back ported to v5.10.119 and v5.15.44.
commit 14c174633f349cb41ea90c2c0aaddac157012f74
Author: Jason A. Donenfeld <Jason@...>
Date: Thu Feb 10 16:40:44
|
By
He Zhe
·
#166462
·
|
|
[PATCH] perl: Fix build with gcc-12
From: Mingli Yu <mingli.yu@...>
Fix the build failure when debug build is enabled.
Add DEBUG_BUILD = "1" in conf/local.conf.
$ bitbake perl
| In function 'dynprep',
inlined from
From: Mingli Yu <mingli.yu@...>
Fix the build failure when debug build is enabled.
Add DEBUG_BUILD = "1" in conf/local.conf.
$ bitbake perl
| In function 'dynprep',
inlined from
|
By
Yu, Mingli
·
#166461
·
|
|
[dunfell][PATCH v2] e2fsprogs: CVE-2022-1304 out-of-bounds read/write via crafted filesystem
Source: https://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git
MR: 117430
Type: Security Fix
Disposition: Backport from
Source: https://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git
MR: 117430
Type: Security Fix
Disposition: Backport from
|
By
Hitendra Prajapati
·
#166460
·
|
|
[dunfell 11/11] cve-check: Allow warnings to be disabled
From: Richard Purdie <richard.purdie@...>
When running CVE checks in CI we're usually not interested in warnings on the
console for any CVEs present. Add a configuration option
From: Richard Purdie <richard.purdie@...>
When running CVE checks in CI we're usually not interested in warnings on the
console for any CVEs present. Add a configuration option
|
By
Steve Sakoman
·
#166459
·
|
|
[dunfell 10/11] cve-check: Only include installed packages for rootfs manifest
From: Ernst Sjöstrand <ernstp@...>
Before this the rootfs manifest and the summary were identical.
We should separate the summary and rootfs manifest more clearly,
now the summary is for all
From: Ernst Sjöstrand <ernstp@...>
Before this the rootfs manifest and the summary were identical.
We should separate the summary and rootfs manifest more clearly,
now the summary is for all
|
By
Steve Sakoman
·
#166458
·
|
|
[dunfell 09/11] cve-check: Add helper for symlink handling
From: Ernst Sjöstrand <ernstp@...>
Signed-off-by: Ernst Sjöstrand <ernstp@...>
Signed-off-by: Luca Ceresoli <luca.ceresoli@...>
Signed-off-by: Richard Purdie
From: Ernst Sjöstrand <ernstp@...>
Signed-off-by: Ernst Sjöstrand <ernstp@...>
Signed-off-by: Luca Ceresoli <luca.ceresoli@...>
Signed-off-by: Richard Purdie
|
By
Steve Sakoman
·
#166457
·
|
|
[dunfell 08/11] cve-check.bbclass: Added do_populate_sdk[recrdeptask].
From: leimaohui <leimaohui@...>
As product, sdk should do cve check as well as rootfs.
Signed-off-by: Lei Maohui <leimaohui@...>
Signed-off-by: Luca Ceresoli
From: leimaohui <leimaohui@...>
As product, sdk should do cve check as well as rootfs.
Signed-off-by: Lei Maohui <leimaohui@...>
Signed-off-by: Luca Ceresoli
|
By
Steve Sakoman
·
#166456
·
|
|
[dunfell 07/11] vim: Upgrade 8.2.4912 -> 8.2.5034 to fix 9 CVEs
From: Richard Purdie <richard.purdie@...>
Address CVE-2022-1621, CVE-2022-1629, CVE-2022-1674, CVE-2022-1733, CVE-2022-1735
CVE-2022-1769, CVE-2022-1771, CVE-2022-1785,
From: Richard Purdie <richard.purdie@...>
Address CVE-2022-1621, CVE-2022-1629, CVE-2022-1674, CVE-2022-1733, CVE-2022-1735
CVE-2022-1769, CVE-2022-1771, CVE-2022-1785,
|
By
Steve Sakoman
·
#166455
·
|
|
[dunfell 06/11] libxml2: Fix CVE-2022-29824 for libxml2
From: Riyaz <Riyaz.Khan@...>
Add patch for CVE issue: CVE-2022-29824
CVE-2022-29824
Link: [https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab]
Dependent
From: Riyaz <Riyaz.Khan@...>
Add patch for CVE issue: CVE-2022-29824
CVE-2022-29824
Link: [https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab]
Dependent
|
By
Steve Sakoman
·
#166454
·
|
|
[dunfell 05/11] ncurses: Fix CVE-2022-29458
From: Dan Tran <MSFT.DanTran@...>
ncurses 6.3 before patch 20220416 has an out-of-bounds read and
segmentation violation in convert_strings in tinfo/read_entry.c in the
terminfo
From: Dan Tran <MSFT.DanTran@...>
ncurses 6.3 before patch 20220416 has an out-of-bounds read and
segmentation violation in convert_strings in tinfo/read_entry.c in the
terminfo
|
By
Steve Sakoman
·
#166453
·
|
|
[dunfell 04/11] ffmpeg: Fix for CVE-2022-1475
From: Virendra Thakur <virendra.thakur@...>
Add patch to fix CVE-2022-1475
Signed-off-by: Virendra Thakur <virendra.thakur@...>
Signed-off-by: Steve Sakoman <steve@...>
---
From: Virendra Thakur <virendra.thakur@...>
Add patch to fix CVE-2022-1475
Signed-off-by: Virendra Thakur <virendra.thakur@...>
Signed-off-by: Steve Sakoman <steve@...>
---
|
By
Steve Sakoman
·
#166452
·
|
|
[dunfell 03/11] libsdl2: Add fix for CVE-2021-33657
From: Ranjitsinh Rathod <ranjitsinh.rathod@...>
Add patch to fix CVE-2021-33657 issue for libsdl2
Link: https://security-tracker.debian.org/tracker/CVE-2021-33657
Signed-off-by: Ranjitsinh
From: Ranjitsinh Rathod <ranjitsinh.rathod@...>
Add patch to fix CVE-2021-33657 issue for libsdl2
Link: https://security-tracker.debian.org/tracker/CVE-2021-33657
Signed-off-by: Ranjitsinh
|
By
Steve Sakoman
·
#166451
·
|
|
[dunfell 02/11] ruby: Whitelist CVE-2021-28966 as this affects Windows OS only
From: Ranjitsinh Rathod <ranjitsinh.rathod@...>
As per below debian link, CVE-2021-28966 affects Windows only
Link: https://security-tracker.debian.org/tracker/CVE-2021-28966
Signed-off-by:
From: Ranjitsinh Rathod <ranjitsinh.rathod@...>
As per below debian link, CVE-2021-28966 affects Windows only
Link: https://security-tracker.debian.org/tracker/CVE-2021-28966
Signed-off-by:
|
By
Steve Sakoman
·
#166450
·
|
|
[dunfell 01/11] ruby: Upgrade ruby to 2.7.6 for security fix
From: Ranjitsinh Rathod <ranjitsinh.rathod@...>
Upgrade ruby to 2.7.6
Link: https://www.ruby-lang.org/en/news/2022/04/12/ruby-2-7-6-released/
This includes CVE-2022-28739 security
From: Ranjitsinh Rathod <ranjitsinh.rathod@...>
Upgrade ruby to 2.7.6
Link: https://www.ruby-lang.org/en/news/2022/04/12/ruby-2-7-6-released/
This includes CVE-2022-28739 security
|
By
Steve Sakoman
·
#166449
·
|
|
[dunfell 00/11] Patch review
Please review this set of patches for dunfell and have comments back by end
of day Friday.
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/3738
The
Please review this set of patches for dunfell and have comments back by end
of day Friday.
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/3738
The
|
By
Steve Sakoman
·
#166448
·
|