Robert Yang
c1d31cf2c7
patch: fix CVE-2015-1196
...
A directory traversal flaw was reported in patch:
References:
http://www.openwall.com/lists/oss-security/2015/01/18/6
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227
https://bugzilla.redhat.com/show_bug.cgi?id=1182154
[YOCTO #7182 ]
(From OE-Core rev: bf986b527038821b49c81c4b9abc10e2dff32c38)
Signed-off-by: Robert Yang <liezhi.yang@windriver.com >
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org >
2015-03-31 22:24:29 +01:00
Nitin A Kamble
2e4518bf18
recipes: Fix the Upstream-Status format
...
(From OE-Core rev: d7237140554ad076be12edf915d6d15206c9b8c7)
Signed-off-by: Nitin A Kamble <nitin.a.kamble@intel.com >
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org >
2011-05-11 17:14:26 +01:00
Nitin A Kamble
a5cd66b70a
patch: update upstream status for patches
...
(From OE-Core rev: 66599b6cc6272f25840807b4e1164f4fe5af75ee)
Signed-off-by: Nitin A Kamble <nitin.a.kamble@intel.com >
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org >
2011-05-09 14:09:02 +01:00
Nitin A Kamble
f528a1530e
patch_2.5.9: clean up the recipe
...
Earlier the recipe was using 2.5.4 tar ball and a patch for upgrading to
2.5.9. Replaces these with pointer to 2.5.9 tarball.
Also noted that both 2.5.4 & 2.5.9 are GPLv2 sources.
Updated checksums and license of the recipe
Signed-off-by: Nitin A Kamble <nitin.a.kamble@intel.com >
2010-12-16 15:53:09 +00:00