On 3/16/21 12:25 AM, Rahul Taya wrote:
> Hi Martin,
>
> Is there any update for nghttp2 CVE-2020-11080  fix that you have sent
> earlier ?
> https://git.openembedded.org/meta-openembedded-contrib/commit/?h=jansa/dunfell&id=3a3a6c4e42d0b1c22d4e0d9cfd42d3e119972ce0
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgit.openembedded.org%2Fmeta-openembedded-contrib%2Fcommit%2F%3Fh%3Djansa%2Fdunfell%26id%3D3a3a6c4e42d0b1c22d4e0d9cfd42d3e119972ce0&data=04%7C01%7CRahul.Taya%40kpit.com%7C10953aac03c94ff4821808d8de5c5d97%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637503835614843758%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=qNySlF2ouK6IiAvo2J68imnOZRB66RjwjCGhTYCoAnw%3D&reserved=0>
>
> I think it's still not merged.

I took the v2 and its in dunfell-next.
-armin
>
> Thanks and Regards,
> Rahul Taya
> ------------------------------------------------------------------------
> *From:* Martin Jansa <martin.ja...@gmail.com>
> *Sent:* Wednesday, March 3, 2021 9:22 PM
> *To:* Rahul Taya <rahul.t...@kpit.com>
> *Cc:* openembedded-devel <openembedded-devel@lists.openembedded.org>;
> Harpritkaur Bhandari <harpritkaur.bhand...@kpit.com>; Nisha Parrakat
> <nisha.parra...@kpit.com>
> *Subject:* Re: [oe] [meta-python2][dunfell][PATCH] python: Add fix for
> CVE-2019-9674
>  
> On Wed, Mar 3, 2021 at 4:26 PM Rahul Taya <rahul.t...@kpit.com
> <mailto:rahul.t...@kpit.com>> wrote:
>
>     Hi Martin,
>
>     No i run devtool modify python only once and it applies the patch
>     in source file.
>
>
> Then you had to run "git am" manually in this directory and never
> finish? you need to finish it or all git am --abort when you give up.
>
>     What i’ m not getting is how i generate a patch after this.
>      By taking git diff b/w the original source file and the patched
>     file or what?
>
>
> either "git format-patch" when you have applied the patch manually or
> "devtool finish --force-patch-refresh ..." will call "git
> format-patch" for you when devtool was able to apply the patch with
> just a fuzz.
>
> Anyway you're still expected to review the changes in regenerated
> patch to confirm that it still does what it was supposed to do.
>
>     Yes martin you applied my patch in master-next which is also
>     required for dunfell.As i have other patches too i.e
>     CVE-2019-20907 for python that i have sent and nghttp2 patch
>     that’s why i thought to fix their warnings also using devtool and
>     then send to you for applying.
>
>
> I've already applied CVE-2019-20907 as well and fixed the patch-fuzz
> there, will push it to master-next as well. I'll push it to
> gatesgarth-next and dunfell-next as well.
>
> And for nghttp2 patch I've sent the fix as well, see:
> https://git.openembedded.org/meta-openembedded-contrib/commit/?h=jansa/dunfell&id=3a3a6c4e42d0b1c22d4e0d9cfd42d3e119972ce0
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgit.openembedded.org%2Fmeta-openembedded-contrib%2Fcommit%2F%3Fh%3Djansa%2Fdunfell%26id%3D3a3a6c4e42d0b1c22d4e0d9cfd42d3e119972ce0&data=04%7C01%7CRahul.Taya%40kpit.com%7C10953aac03c94ff4821808d8de5c5d97%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637503835614843758%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=qNySlF2ouK6IiAvo2J68imnOZRB66RjwjCGhTYCoAnw%3D&reserved=0>
> which I've sent when your version of the patch was in dunfell-next, see:
> https://lists.openembedded.org/g/openembedded-devel/message/89628
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Flists.openembedded.org%2Fg%2Fopenembedded-devel%2Fmessage%2F89628&data=04%7C01%7CRahul.Taya%40kpit.com%7C10953aac03c94ff4821808d8de5c5d97%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637503835614843758%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=dUbJ%2BoCGl7NtsJPluCH7LXWPAvlNWajSyDjZeXC3gjA%3D&reserved=0>
>  
>
> +oe-devel ML
>
>     *From:* Martin Jansa <martin.ja...@gmail.com
>     <mailto:martin.ja...@gmail.com>>
>     *Sent:* Wednesday, March 3, 2021 8:03:12 PM
>     *To:* Rahul Taya <rahul.t...@kpit.com <mailto:rahul.t...@kpit.com>>
>     *Cc:* openembedded-devel@lists.openembedded.org
>     <mailto:openembedded-devel@lists.openembedded.org>
>     <openembedded-devel@lists.openembedded.org
>     <mailto:openembedded-devel@lists.openembedded.org>>
>     *Subject:* Re: [oe] [meta-python2][dunfell][PATCH] python: Add fix
>     for CVE-2019-9674
>      
>     Did you run "devtool modify python" twice? If the first call
>     failed to apply patches you need to go
>     into workspace/sources/python and finish applying it manually.
>
>     But as said in previous e-mails I've already updated your python
>     patch to apply cleanly (and it's in meta-python2/master-next), so
>     I'm not sure what you're trying to do now.
>
>     On Wed, Mar 3, 2021 at 2:51 PM Rahul Taya <rahul.t...@kpit.com
>     <mailto:rahul.t...@kpit.com>> wrote:
>
>         Hi Martin,
>
>         Firstlty i run : *devtool modify python*
>
>         this command applied all the patches in the source code.
>         After this when i run :
>
>                  devtool finish --force-patch-refresh <recipe> <layer_path>
>
>         where recipe = python and layer path = /workspace/sources/python
>
>         i'm getting message:  *workspace/sources/python appears to be
>         in the middle of 'git am' or 'git apply' - please resolve this
>         first*
>         *
>         *
>         Can you please help why i'm getting this and how to resolve it ?
>
>         Thanks and Regards,
>         Rahul Taya
>         
> ------------------------------------------------------------------------
>         *From:* openembedded-devel@lists.openembedded.org
>         <mailto:openembedded-devel@lists.openembedded.org>
>         <openembedded-devel@lists.openembedded.org
>         <mailto:openembedded-devel@lists.openembedded.org>> on behalf
>         of Martin Jansa via lists.openembedded.org
>         
> <https://apc01.safelinks.protection.outlook.com/?url=http%3A%2F%2Flists.openembedded.org%2F&data=04%7C01%7CRahul.Taya%40kpit.com%7C10953aac03c94ff4821808d8de5c5d97%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637503835614853753%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=fvYJtvQvNCvjys3z0icl%2Bg5BNhax0egcZWkemoHy1To%3D&reserved=0>
>         <Martin.Jansa=gmail....@lists.openembedded.org
>         <mailto:gmail....@lists.openembedded.org>>
>         *Sent:* Monday, March 1, 2021 8:16 PM
>         *To:* Rahul Taya <rahul.t...@kpit.com
>         <mailto:rahul.t...@kpit.com>>
>         *Cc:* openembedded-devel
>         <openembedded-devel@lists.openembedded.org
>         <mailto:openembedded-devel@lists.openembedded.org>>
>         *Subject:* Re: [oe] [meta-python2][dunfell][PATCH] python: Add
>         fix for CVE-2019-9674
>          
>         > Can you please tell me what i should do if a fuzz is
>         detected while applying patch or i see some warning message ?
>
>         The QA warning/error message about patch-fuzz shows you how to
>         easily resolve the fuzz with devtool.
>
>         If it doesn't apply at all (like that nghttp2 patch), then you
>         need to apply it manually by resolving all conflicts and then
>         refresh the patch file (I usually create a git repo in ${S} if
>         it isn't there already from SRC_URI, then manually apply the
>         failing patch and then git format-patch it).
>
>         On Mon, Mar 1, 2021 at 3:26 PM Rahul Taya <rahul.t...@kpit.com
>         <mailto:rahul.t...@kpit.com>> wrote:
>
>             Hi Martin,
>
>             Yes i think you are right it can be possible that i
>             overlooked or missed the warning.
>
>             Can you please tell me what i should do if a fuzz is
>             detected while applying patch or i see some warning message ?
>
>
>             For nghttp patch please check attached screenshot this is
>             the last message that i saw.
>             Can you tell me what next to do for that patch ?
>
>             Thanks and Regards,
>             Rahul Taya
>             
> ------------------------------------------------------------------------
>             *From:* Martin Jansa <martin.ja...@gmail.com
>             <mailto:martin.ja...@gmail.com>>
>             *Sent:* Thursday, February 25, 2021 10:33 PM
>             *To:* Rahul Taya <rahul.t...@kpit.com
>             <mailto:rahul.t...@kpit.com>>
>             *Cc:* openembedded-devel
>             <openembedded-devel@lists.openembedded.org
>             <mailto:openembedded-devel@lists.openembedded.org>>
>             *Subject:* Re: [oe] [meta-python2][dunfell][PATCH] python:
>             Add fix for CVE-2019-9674
>              
>             Hi Rahul,
>
>             you probably don't have patch-fuzz in ERROR_QA and
>             overlooked the warning generated by this QA check which is
>             by default only in WARN_QA.
>
>             Or you weren't testing it with master branch as the
>             subject says it's for dunfell, but it the python version
>             is the same in master and dunfell, so the warning should
>             be triggered in both.
>
>             On Thu, Feb 25, 2021 at 5:19 PM Rahul Taya
>             <rahul.t...@kpit.com <mailto:rahul.t...@kpit.com>> wrote:
>
>                 Hi Martin,
>
>                 I have tested my changes before sending to you or ML i
>                 don’t know why it is failing now at your side.
>
>                 Thanks and Regards,
>                 Rahul
>
>                 Get Outlook for iOS
>                 
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Faka.ms%2Fo0ukef&data=04%7C01%7CRahul.Taya%40kpit.com%7C10953aac03c94ff4821808d8de5c5d97%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637503835614853753%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=923piAM9LEXp054cWFKRMfu3HGdFb9RX5UVcchwZJWk%3D&reserved=0>
>                 
> ------------------------------------------------------------------------
>                 *From:* Martin Jansa <martin.ja...@gmail.com
>                 <mailto:martin.ja...@gmail.com>>
>                 *Sent:* Thursday, February 25, 2021 8:25:50 PM
>                 *To:* Rahul Taya <rahul.t...@kpit.com
>                 <mailto:rahul.t...@kpit.com>>
>                 *Cc:* openembedded-devel
>                 <openembedded-devel@lists.openembedded.org
>                 <mailto:openembedded-devel@lists.openembedded.org>>
>                 *Subject:* Re: [oe] [meta-python2][dunfell][PATCH]
>                 python: Add fix for CVE-2019-9674
>                  
>                 Hi,
>
>                 normally you should fork meta-python2 and send a link
>                 to meta-python2 change I can cherry-pick, not the blob
>                 in otherwise empty repo.
>
>                 But as I've said in previous reply, I've already
>                 manually applied your change in meta-python2
>                 master-next where it's now failing:
>
>                 ERROR: python-native-2.7.18-r0 do_patch: Fuzz detected:
>
>                 Applying patch CVE-2019-9674.patch
>                 patching file Doc/library/zipfile.rst
>                 Hunk #1 succeeded at 554 with fuzz 2 (offset -20 lines).
>
>
>                 The context lines in the patches can be updated with devtool:
>
>                     devtool modify python-native
>                     devtool finish --force-patch-refresh python-native 
> <layer_path>
>
>                 Don't forget to review changes done by devtool!
>
>                 ERROR: python-native-2.7.18-r0 do_patch: QA Issue: Patch log 
> indicates that patches do not apply cleanly. [patch-fuzz]
>
>                 so I'll fix this as well, but next time please better test 
> your changes (nghttp2 patch also didn't apply, see my reply there, not sure 
> if you have fixed that in v2)
>
>                 Regards,
>
>
>
>
>                 On Thu, Feb 25, 2021 at 9:09 AM Rahul Taya
>                 <rahul.t...@kpit.com <mailto:rahul.t...@kpit.com>> wrote:
>
>                     Hi Martin,
>
>                     I removed the emoticons and uploaded the patch to
>                     my git repo pls access below link:
>
>                     
> https://github.com/Rahult9/upstream_patch/blob/main/CVE-2019-9674.patch
>                     
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FRahult9%2Fupstream_patch%2Fblob%2Fmain%2FCVE-2019-9674.patch&data=04%7C01%7CRahul.Taya%40kpit.com%7C10953aac03c94ff4821808d8de5c5d97%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637503835614863746%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=CC%2BRWYUzuXwF6IuPmgo%2BBNYSam6ki%2BKf3opXGs4jpBw%3D&reserved=0>
>
>
>                     Thanks and Regards,
>                     Rahul Taya
>                     
> ------------------------------------------------------------------------
>                     *From:* Martin Jansa <martin.ja...@gmail.com
>                     <mailto:martin.ja...@gmail.com>>
>                     *Sent:* Thursday, February 18, 2021 10:58 PM
>                     *To:* Rahul Taya <rahul.t...@kpit.com
>                     <mailto:rahul.t...@kpit.com>>
>                     *Cc:* openembedded-devel
>                     <openembedded-devel@lists.openembedded.org
>                     <mailto:openembedded-devel@lists.openembedded.org>>;
>                     Khem Raj <raj.k...@gmail.com
>                     <mailto:raj.k...@gmail.com>>; Nisha Parrakat
>                     <nisha.parra...@kpit.com
>                     <mailto:nisha.parra...@kpit.com>>; Harpritkaur
>                     Bhandari <harpritkaur.bhand...@kpit.com
>                     <mailto:harpritkaur.bhand...@kpit.com>>
>                     *Subject:* Re: [oe] [meta-python2][dunfell][PATCH]
>                     python: Add fix for CVE-2019-9674
>                      
>                     "git am" doesn't like those emoticons in the
>                     .patch file..
>
>                     git am ~/py2/cur/16136689*
>                     error: cannot convert from 8bit to UTF-8
>                     fatal: could not parse patch
>
>                     either drop them or upload it to some git repo so
>                     I can cherry-pick it from there.
>
>                     On Thu, Feb 18, 2021 at 3:18 PM Rahul Taya
>                     <rahul.t...@kpit.com <mailto:rahul.t...@kpit.com>>
>                     wrote:
>
>                         For python and python-native added patch to fix
>                         CVE-2019-9674
>
>                         Signed-off-by: Rahul Taya <rahul.t...@kpit.com
>                         <mailto:rahul.t...@kpit.com>>
>                         ---
>                          recipes-devtools/python/python.inc           
>                         |  1 +
>                          .../python/python/CVE-2019-9674.patch       
>                          | 83 +++++++++++++++++++
>                          2 files changed, 84 insertions(+)
>                          create mode 100644
>                         recipes-devtools/python/python/CVE-2019-9674.patch
>
>                         diff --git
>                         a/recipes-devtools/python/python.inc
>                         b/recipes-devtools/python/python.inc
>                         index a4ba0c5..787f23e 100644
>                         --- a/recipes-devtools/python/python.inc
>                         +++ b/recipes-devtools/python/python.inc
>                         @@ -8,6 +8,7 @@ INC_PR = "r1"
>                          LIC_FILES_CHKSUM =
>                         "file://LICENSE;md5=203a6dbc802ee896020a47161e759642"
>
>                          SRC_URI =
>                         
> "http://www.python.org/ftp/python/${PV}/Python-${PV}.tar.xz
>                         
> <https://apc01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.python.org%2Fftp%2Fpython%2F%24%257BPV%257D%2FPython-%24%257BPV%257D.tar.xz&data=04%7C01%7CRahul.Taya%40kpit.com%7C10953aac03c94ff4821808d8de5c5d97%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637503835614873740%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=fZ5XDPu0Tyw92t%2FlJ1ilsBn76Fi4BUGsHy5upFtw20c%3D&reserved=0>
>                         \
>                         +           file://CVE-2019-9674.patch \
>                                     "
>
>                          SRC_URI[sha256sum] =
>                         
> "b62c0e7937551d0cc02b8fd5cb0f544f9405bafc9a54d3808ed4594812edef43"
>                         diff --git
>                         a/recipes-devtools/python/python/CVE-2019-9674.patch
>                         b/recipes-devtools/python/python/CVE-2019-9674.patch
>                         new file mode 100644
>                         index 0000000..647d9da
>                         --- /dev/null
>                         +++
>                         b/recipes-devtools/python/python/CVE-2019-9674.patch
>                         @@ -0,0 +1,83 @@
>                         +From 3ba51d587f6897a45301ce9126300c14fcd4eba2
>                         Mon Sep 17 00:00:00 2001
>                         +From: JunWei Song <sungboss2...@gmail.com
>                         <mailto:sungboss2...@gmail.com>>
>                         +Date: Wed, 11 Sep 2019 23:04:12 +0800
>                         +Subject: [PATCH] bpo-36260: Add pitfalls to
>                         zipfile module documentation
>                         + (#13378)
>                         +MIME-Version: 1.0
>                         +Content-Type: text/plain; charset=UTF-8
>                         +Content-Transfer-Encoding: 8bit
>                         +
>                         +* bpo-36260: Add pitfalls to zipfile module
>                         documentation
>                         +
>                         +We saw vulnerability warning description
>                         (including zip bomb) in Doc/library/xml.rst file.
>                         +This gave us the idea of documentation
>                         improvement.
>                         +
>                         +So, we moved a little bit forward :P
>                         +And the doc patch can be found (pr).
>                         +
>                         +* fix trailing whitespace
>                         +
>                         +* 📜🤖 Added by blurb_it.
>                         +
>                         +* Reformat text for consistency.
>                         +
>                         +Upstream-Status:
>                         
> Backport[http://archive.ubuntu.com/ubuntu/pool/main/p/python3.5/python3.5_3.5.2-2ubuntu0~16.04.12.debian.tar.xz
>                         
> <https://apc01.safelinks.protection.outlook.com/?url=http:%2F%2Farchive.ubuntu.com%2Fubuntu%2Fpool%2Fmain%2Fp%2Fpython3.5%2Fpython3.5_3.5.2-2ubuntu0~16.04.12.debian.tar.xz&data=04%7C01%7CRahul.Taya%40kpit.com%7C10953aac03c94ff4821808d8de5c5d97%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637503835614873740%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=TMC75PnOu04fyODBF8KdtXjUhmR0YfU4ncWRWTRiLQg%3D&reserved=0>]
>                         +CVE: CVE-2019-9674
>                         +Link:
>                         
> http://archive.ubuntu.com/ubuntu/pool/main/p/python3.5/python3.5_3.5.2-2ubuntu0~16.04.12.debian.tar.xz
>                         
> <https://apc01.safelinks.protection.outlook.com/?url=http:%2F%2Farchive.ubuntu.com%2Fubuntu%2Fpool%2Fmain%2Fp%2Fpython3.5%2Fpython3.5_3.5.2-2ubuntu0~16.04.12.debian.tar.xz&data=04%7C01%7CRahul.Taya%40kpit.com%7C10953aac03c94ff4821808d8de5c5d97%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637503835614883733%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=anqhyt5ynucB%2FlVaUnLA6RWrl0GKlz3u34kqk4ZUlXE%3D&reserved=0>
>                         +Comment: From the original patch skipped
>                         changes for file
>                         
> +Misc/NEWS.d/next/Documentation/2019-06-04-09-29-00.bpo-36260.WrGuc-.rst
>                         +as this file is not present in our source code.
>                         +---
>                         + Doc/library/zipfile.rst                     
>                          | 41 +++++++++++++++++++
>                         + 1 files changed, 41 insertions(+)
>                         +
>                         +diff --git a/Doc/library/zipfile.rst
>                         b/Doc/library/zipfile.rst
>                         +index b421ea5..2e0a91d 100644
>                         +--- a/Doc/library/zipfile.rst
>                         ++++ b/Doc/library/zipfile.rst
>                         +@@ -574,4 +574,45 @@ Instances have the
>                         following attributes:
>                         +
>                         +    Size of the uncompressed file.
>                         +
>                         ++Decompression pitfalls
>                         ++----------------------
>                         ++
>                         ++The extraction in zipfile module might fail
>                         due to some pitfalls listed below.
>                         ++
>                         ++From file itself
>                         ++~~~~~~~~~~~~~~~~
>                         ++
>                         ++Decompression may fail due to incorrect
>                         password / CRC checksum / ZIP format or
>                         ++unsupported compression method / decryption.
>                         ++
>                         ++File System limitations
>                         ++~~~~~~~~~~~~~~~~~~~~~~~
>                         ++
>                         ++Exceeding limitations on different file
>                         systems can cause decompression failed.
>                         ++Such as allowable characters in the
>                         directory entries, length of the file name,
>                         ++length of the pathname, size of a single
>                         file, and number of files, etc.
>                         ++
>                         ++Resources limitations
>                         ++~~~~~~~~~~~~~~~~~~~~~
>                         ++
>                         ++The lack of memory or disk volume would lead
>                         to decompression
>                         ++failed. For example, decompression bombs
>                         (aka `ZIP bomb`_)
>                         ++apply to zipfile library that can cause disk
>                         volume exhaustion.
>                         ++
>                         ++Interruption
>                         ++~~~~~~~~~~~~
>                         ++
>                         ++Interruption during the decompression, such
>                         as pressing control-C or killing the
>                         ++decompression process may result in
>                         incomplete decompression of the archive.
>                         ++
>                         ++Default behaviors of extraction
>                         ++~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>                         ++
>                         ++Not knowing the default extraction behaviors
>                         ++can cause unexpected decompression results.
>                         ++For example, when extracting the same
>                         archive twice,
>                         ++it overwrites files without asking.
>                         ++
>                         ++
>                         ++.. _ZIP bomb:
>                         https://en.wikipedia.org/wiki/Zip_bomb
>                         
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FZip_bomb&data=04%7C01%7CRahul.Taya%40kpit.com%7C10953aac03c94ff4821808d8de5c5d97%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637503835614893728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=47O05DRkPnU6CjbSKXWLQuM%2BO4%2B2Q%2FwKFrdzmpqB%2FF0%3D&reserved=0>
>                         + .. _PKZIP Application Note:
>                         
> https://pkware.cachefly.net/webdocs/casestudies/APPNOTE.TXT
>                         
> <https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpkware.cachefly.net%2Fwebdocs%2Fcasestudies%2FAPPNOTE.TXT&data=04%7C01%7CRahul.Taya%40kpit.com%7C10953aac03c94ff4821808d8de5c5d97%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637503835614893728%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=E9aClMux7AXNYYe36EdbrksrvWp57TbGEpeo%2BJefZBM%3D&reserved=0>
>                         --
>                         2.17.1
>
>                         This message contains information that may be
>                         privileged or confidential and is the property
>                         of the KPIT Technologies Ltd. It is intended
>                         only for the person to whom it is addressed.
>                         If you are not the intended recipient, you are
>                         not authorized to read, print, retain copy,
>                         disseminate, distribute, or use this message
>                         or any part thereof. If you receive this
>                         message in error, please notify the sender
>                         immediately and delete all copies of this
>                         message. KPIT Technologies Ltd. does not
>                         accept any liability for virus infected mails.
>
>
>
>                     This message contains information that may be
>                     privileged or confidential and is the property of
>                     the KPIT Technologies Ltd. It is intended only for
>                     the person to whom it is addressed. If you are not
>                     the intended recipient, you are not authorized to
>                     read, print, retain copy, disseminate, distribute,
>                     or use this message or any part thereof. If you
>                     receive this message in error, please notify the
>                     sender immediately and delete all copies of this
>                     message. KPIT Technologies Ltd. does not accept
>                     any liability for virus infected mails.
>
>                 This message contains information that may be
>                 privileged or confidential and is the property of the
>                 KPIT Technologies Ltd. It is intended only for the
>                 person to whom it is addressed. If you are not the
>                 intended recipient, you are not authorized to read,
>                 print, retain copy, disseminate, distribute, or use
>                 this message or any part thereof. If you receive this
>                 message in error, please notify the sender immediately
>                 and delete all copies of this message. KPIT
>                 Technologies Ltd. does not accept any liability for
>                 virus infected mails.
>
>             This message contains information that may be privileged
>             or confidential and is the property of the KPIT
>             Technologies Ltd. It is intended only for the person to
>             whom it is addressed. If you are not the intended
>             recipient, you are not authorized to read, print, retain
>             copy, disseminate, distribute, or use this message or any
>             part thereof. If you receive this message in error, please
>             notify the sender immediately and delete all copies of
>             this message. KPIT Technologies Ltd. does not accept any
>             liability for virus infected mails.
>
>         This message contains information that may be privileged or
>         confidential and is the property of the KPIT Technologies Ltd.
>         It is intended only for the person to whom it is addressed. If
>         you are not the intended recipient, you are not authorized to
>         read, print, retain copy, disseminate, distribute, or use this
>         message or any part thereof. If you receive this message in
>         error, please notify the sender immediately and delete all
>         copies of this message. KPIT Technologies Ltd. does not accept
>         any liability for virus infected mails.
>
>     This message contains information that may be privileged or
>     confidential and is the property of the KPIT Technologies Ltd. It
>     is intended only for the person to whom it is addressed. If you
>     are not the intended recipient, you are not authorized to read,
>     print, retain copy, disseminate, distribute, or use this message
>     or any part thereof. If you receive this message in error, please
>     notify the sender immediately and delete all copies of this
>     message. KPIT Technologies Ltd. does not accept any liability for
>     virus infected mails.
>
> This message contains information that may be privileged or
> confidential and is the property of the KPIT Technologies Ltd. It is
> intended only for the person to whom it is addressed. If you are not
> the intended recipient, you are not authorized to read, print, retain
> copy, disseminate, distribute, or use this message or any part
> thereof. If you receive this message in error, please notify the
> sender immediately and delete all copies of this message. KPIT
> Technologies Ltd. does not accept any liability for virus infected mails.
>
> 
>

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#90164): 
https://lists.openembedded.org/g/openembedded-devel/message/90164
Mute This Topic: https://lists.openembedded.org/mt/80729615/21656
Group Owner: openembedded-devel+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to