summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/avahi/files
diff options
context:
space:
mode:
authorZhai Edwin <edwin.zhai@intel.com>2011-04-13 10:46:02 +0800
committerSaul Wold <sgw@linux.intel.com>2011-05-06 17:44:24 -0700
commit2343f81fb4845a654c8a8f030dd676c57d311170 (patch)
treeeabb06512e340dc9583238b7bcf3de54d7732d4e /meta/recipes-connectivity/avahi/files
parentd8f4a335006c8fc0201f9f28c4492d58fe4afe9a (diff)
downloadpoky-2343f81fb4845a654c8a8f030dd676c57d311170.tar.gz
avahi: Upgrade to 0.6.30 (from 0.6.28)
This upgrade fix the one security issue: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1002 [YOCTO #975] fixed. This should be included in the Bernard point-release. (From OE-Core rev: b52e9922e8d9acaa9b94b0f19c54bdee18ae49f1) Signed-off-by: Zhai Edwin <edwin.zhai@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/avahi/files')
-rw-r--r--meta/recipes-connectivity/avahi/files/initscript.patch2
1 files changed, 2 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/avahi/files/initscript.patch b/meta/recipes-connectivity/avahi/files/initscript.patch
index f76a965b85..193889eb5c 100644
--- a/meta/recipes-connectivity/avahi/files/initscript.patch
+++ b/meta/recipes-connectivity/avahi/files/initscript.patch
@@ -1,3 +1,5 @@
1Upstream-Status: Pending
2
1diff --git a/initscript/debian/avahi-daemon.in b/initscript/debian/avahi-daemon.in 3diff --git a/initscript/debian/avahi-daemon.in b/initscript/debian/avahi-daemon.in
2index 30a2c2f..b5848a8 100755 4index 30a2c2f..b5848a8 100755
3--- a/initscript/debian/avahi-daemon.in 5--- a/initscript/debian/avahi-daemon.in