summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/gnutls/gnutls_3.6.7.bb
Commit message (Collapse)AuthorAgeFilesLines
* gnutls:upgrade 3.6.7 -> 3.6.8Zang Ruochen2019-10-301-64/+0
| | | | | | | | | | | | | | | -Upgrade from gnutls_3.6.7.bb to gnutls_3.6.8.bb. (From OE-Core rev: c5d2ca323a255f09c7b3378af5956671205867f4) Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit b34486a616ab4d4b30247a5dff58a18ef26ed709) [Bug fix only update. Including: CVE-2019-3836 CVE-2019-3829 https://lists.gnupg.org/pipermail/gnutls-help/2019-May/004527.html] Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* gnutls: Use ca-certificates as default trust store filePhilippe Normand2019-06-181-0/+1
| | | | | | | | | | | | | | | | | Since version 2.58 the glib-networking TLS database relies on GnuTLS's system trust store, so not enabling it leads to TLS errors in applications depending on glib-networking. The raised runtime warning is: process:500): GLib-Net-WARNING **: 09:14:09.321: Failed to load TLS database: Failed to load system trust store: GnuTLS was not configured with a system trust (app:490): ... TLS Error: TLS certificate has unknown CA. (From OE-Core rev: 1d147be584d2f016853edbe9751247d7daa0b5d0) (From OE-Core rev: 712c78984c891e6357e1b1dc414431fb6c226c49) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* gnutls: upgrade 3.6.5 -> 3.6.7Adrian Bunk2019-05-121-0/+63
This is a new upstream release from the same stable branch bringing new features and bugfixes (including CVE fixes). COPYING changed http -> https. configure no longer has a --without-libunistring-prefix option. (From OE-Core rev: 93993fe8ffd31e3e94946023b2cd8927ae595fc3) Signed-off-by: Adrian Bunk <bunk@stusta.de> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> [includes: CVE-2019-3836 CVE-2019-3829] Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>