Hi Armin,
did you see this updated patch?
It just aligns the PV with the actual version, and it silences cve-check also.
Regards
//Ernst
On Wed, 2022-01-12 at 08:06 +0100, Ernst Sjöstrand wrote:
> Since SRCREV is pointing to the release tag we can drop the PV part and
> just use it fr
Since SRCREV is pointing to the release tag we can drop the PV part and
just use it from the filename.
Signed-off-by: Ernst Sjöstrand
---
meta-oe/recipes-support/c-ares/c-ares_1.16.1.bb | 2 --
1 file changed, 2 deletions(-)
diff --git a/meta-oe/recipes-support/c-ares/c-ares_1.16.1.bb
b/meta
Signed-off-by: Ernst Sjöstrand
---
meta-oe/recipes-support/c-ares/c-ares_1.16.1.bb | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta-oe/recipes-support/c-ares/c-ares_1.16.1.bb
b/meta-oe/recipes-support/c-ares/c-ares_1.16.1.bb
index b77604797..692a5f0d6 100644
--- a/meta
On Tue, 2021-12-21 at 14:29 -0800, akuster808 wrote:
> Ernst,
>
> On 12/21/21 5:09 AM, Ernst Sjöstrand wrote:
> > Extract patch from the 0.9.71 release commit.
> Does this affect any other branch ? What version does it affect?
Only version 0.9.70 is vulnerable, and gat
Extract patch from the 0.9.71 release commit.
Signed-off-by: Ernst Sjöstrand
---
.../libmicrohttpd/CVE-2021-3466.patch | 152 ++
.../libmicrohttpd/libmicrohttpd_0.9.70.bb | 3 +-
2 files changed, 154 insertions(+), 1 deletion(-)
create mode 100644
meta-oe/recipes