<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/poky.git, branch krogoth-next</title>
<subtitle>Mirror of git.yoctoproject.org/poky</subtitle>
<id>https://git.enea.com/cgit/linux/poky.git/atom?h=krogoth-next</id>
<link rel='self' href='https://git.enea.com/cgit/linux/poky.git/atom?h=krogoth-next'/>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/'/>
<updated>2017-11-07T13:40:32+00:00</updated>
<entry>
<title>bitbake: Replace deprecated git branch parameter "--set-upstream"</title>
<updated>2017-11-07T13:40:32+00:00</updated>
<author>
<name>Andre Rosa</name>
<email>andre.rosa@lge.com</email>
</author>
<published>2017-11-03T11:40:44+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=1083d90888589b9f0d50a1d480f7c774d8b4bda3'/>
<id>urn:sha1:1083d90888589b9f0d50a1d480f7c774d8b4bda3</id>
<content type='text'>
Since 2017-08-17 (git version 2.14.1.473.g3ec7d702a) using deprecated
git branch parameter "--set-upstream" causes a fetcher error. Replace
it by "--set-upstream-to".

https://git.kernel.org/pub/scm/git/git.git/commit/?id=52668846ea2d41ffbd87cda7cb8e492dea9f2c4d
says, it's deprecated since 2012-08-30 so hopefully all still supported
host distributions have new enough git to support "--set-upstream-to".

ERROR: PACKAGE do_unpack: Fetcher failure: ...;
git -c core.fsyncobjectfiles=0 branch --set-upstream master origin/master failed with exit code 128, output:
fatal: the '--set-upstream' option is no longer supported. Please use '--track' or '--set-upstream-to' instead.

ERROR: PACKAGE do_unpack: Function failed: base_do_unpack

(Bitbake rev: 62a53e9dbb6dc7489e44c32340b0caddd4596f0a)

Signed-off-by: Andre Rosa &lt;andre.rosa@lge.com&gt;
Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
(cherry picked from commit 2ab50074c1a6c56a8a178755de108447d7b7acaf)
Signed-off-by: Javier Viguera &lt;javier.viguera@digi.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>wpa_supplicant: fix WPA2 key replay security bug</title>
<updated>2017-10-16T22:47:12+00:00</updated>
<author>
<name>Ross Burton</name>
<email>ross.burton@intel.com</email>
</author>
<published>2017-10-16T22:23:37+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=54e3f82bd77203c3d578e26c86506e6ef5c27000'/>
<id>urn:sha1:54e3f82bd77203c3d578e26c86506e6ef5c27000</id>
<content type='text'>
WPA2 is vulnerable to replay attacks which result in unauthenticated users
having access to the network.

* CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake

* CVE-2017-13078: reinstallation of the group key in the Four-way handshake

* CVE-2017-13079: reinstallation of the integrity group key in the Four-way
handshake

* CVE-2017-13080: reinstallation of the group key in the Group Key handshake

* CVE-2017-13081: reinstallation of the integrity group key in the Group Key
handshake

* CVE-2017-13082: accepting a retransmitted Fast BSS Transition Reassociation
Request and reinstalling the pairwise key while processing it

* CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS)
PeerKey (TPK) key in the TDLS handshake

* CVE-2017-13087: reinstallation of the group key (GTK) when processing a
Wireless Network Management (WNM) Sleep Mode Response frame

* CVE-2017-13088: reinstallation of the integrity group key (IGTK) when
processing a Wireless Network Management (WNM) Sleep Mode Response frame

Backport patches from upstream to resolve these CVEs.

(From OE-Core rev: bfa04fa71c47e8fe9528208848cfcec2e232777d)

Signed-off-by: Ross Burton &lt;ross.burton@intel.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>bitbake: lib/bs4: Fix imports from html5lib &gt;= 0.9999999/1.0b8</title>
<updated>2017-09-04T16:51:16+00:00</updated>
<author>
<name>Daniel Lublin</name>
<email>daniel@lublin.se</email>
</author>
<published>2017-09-04T11:44:12+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=426bc4c3575a85391a60328edb1f7c6a6bdb95fd'/>
<id>urn:sha1:426bc4c3575a85391a60328edb1f7c6a6bdb95fd</id>
<content type='text'>
As of html5lib 0.9999999/1.0b8 (released on July 14, 2016), some modules
have moved from _base to base. Handle this, while staying compatible
with earlier versions.

(Bitbake rev: a37d0f0247c9174fec124789b7a07c792193d909)

Signed-off-by: Daniel Lublin &lt;daniel@lublin.se&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>libgcrypt: fix CVE-2017-9526</title>
<updated>2017-07-19T14:13:47+00:00</updated>
<author>
<name>Ross Burton</name>
<email>ross.burton@intel.com</email>
</author>
<published>2017-07-19T13:27:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=3ca9f90dffad3907ceec605a851ae949dd3b6bd6'/>
<id>urn:sha1:3ca9f90dffad3907ceec605a851ae949dd3b6bd6</id>
<content type='text'>
In libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from
side-channel observation during the signing process) can easily recover the
long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this
session key in secure memory, to ensure that constant-time point operations are
used in the MPI library.

(From OE-Core rev: fb28c54347fcf4957b9b8ee7dee423d859eb7820)

Signed-off-by: Ross Burton &lt;ross.burton@intel.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>libgcrypt: fix CVE-2017-7526</title>
<updated>2017-07-19T14:13:46+00:00</updated>
<author>
<name>Ross Burton</name>
<email>ross.burton@intel.com</email>
</author>
<published>2017-07-19T13:27:31+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=ccc964cf9fde0d71d289c22c2a231f0021461012'/>
<id>urn:sha1:ccc964cf9fde0d71d289c22c2a231f0021461012</id>
<content type='text'>
Fixes CVE-2017-7526, 'flush+reload side-channel attack on RSA secret keys dubbed
"Sliding right into disaster"'.

(From OE-Core rev: 1a713fb654a31a6dd218dc1b5b810e2b380ecbb1)

Signed-off-by: Ross Burton &lt;ross.burton@intel.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>initrdscripts/init-install*: Add rootwait when installing to USB devices</title>
<updated>2017-06-27T22:41:01+00:00</updated>
<author>
<name>California Sullivan</name>
<email>california.l.sullivan@intel.com</email>
</author>
<published>2016-08-09T20:35:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=50fdd784231299bedb008f20adeaeeca3eb1452d'/>
<id>urn:sha1:50fdd784231299bedb008f20adeaeeca3eb1452d</id>
<content type='text'>
It can take a bit for USB devices to be detected, so if a USB device is
your rootfs and you don't set rootwait you will most likely get a kernel
panic. Fix this by adding rootwait to the kernel command line on
installation.

Fixes [YOCTO #9462].

(From OE-Core rev: 7f26cee3d8e4b2e9240b30c21be9fa7661186ccd)

Signed-off-by: California Sullivan &lt;california.l.sullivan@intel.com&gt;
Signed-off-by: Ross Burton &lt;ross.burton@intel.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>bitbake: siggen: Make calc_taskhash match get_taskhash for file checksums</title>
<updated>2017-06-27T12:46:39+00:00</updated>
<author>
<name>Richard Purdie</name>
<email>richard.purdie@linuxfoundation.org</email>
</author>
<published>2017-05-29T10:10:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=3cf0e093481ea260d4f41bed24336ea7f0102bde'/>
<id>urn:sha1:3cf0e093481ea260d4f41bed24336ea7f0102bde</id>
<content type='text'>
The code in these two functions is meant to be equivlanet in behaviour
but isn't. Add in code to ensure files that don't exist are handled
consistently by both functions. Users did report being able to generate
tracebacks otherwise.

(Bitbake rev: 51e913e178a02bb603ddf874669e3ce54f90bd5d)

Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>package_ipk: Clean up Source entry in ipk packages</title>
<updated>2017-06-16T09:21:12+00:00</updated>
<author>
<name>Richard Purdie</name>
<email>richard.purdie@linuxfoundation.org</email>
</author>
<published>2017-06-16T08:42:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=4515fc952963e233d5f24bb319028e8c68ee7622'/>
<id>urn:sha1:4515fc952963e233d5f24bb319028e8c68ee7622</id>
<content type='text'>
There is the potential for sensitive information to leak through the urls
there and removing it brings this into the behavior of the other package
backends since filtering it is likely error prone.

Since ipks don't appear to be generated at all if we don't set this, set
the field to the recipe name used (basename only, no paths). This avoids
information leaking. We may want to drop the field if opkg can allow that
at a future point but the recipe name is a suitable identifier for now.

Reported-by: Andrej Valek &lt;andrej.valek@siemens.com&gt;
(From OE-Core rev: 1aa51cfb4b8d10f478b1a6a68c69a3e35342b1c0)

Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>documentation: Updated all manual revision tables to June, 2017</title>
<updated>2017-06-14T09:19:50+00:00</updated>
<author>
<name>Scott Rifenbark</name>
<email>srifenbark@gmail.com</email>
</author>
<published>2017-06-05T15:04:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=628aea354d9fe6ce09b2bbe25ab1db26adcfb53e'/>
<id>urn:sha1:628aea354d9fe6ce09b2bbe25ab1db26adcfb53e</id>
<content type='text'>
The release was pushed from May to June for 2.1.3 (krogoth). Updated
all manual revision tables.

(From yocto-docs rev: 5ec75c194147fecf0bda8095e430cdd8e6f34b6b)

Signed-off-by: Scott Rifenbark &lt;srifenbark@gmail.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>oeqa/selftest/recipetool: actually fix create_github test</title>
<updated>2017-06-07T14:59:03+00:00</updated>
<author>
<name>Ross Burton</name>
<email>ross.burton@intel.com</email>
</author>
<published>2017-06-07T14:28:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=3565a9697f53ba975a1b7235b802f659418746c3'/>
<id>urn:sha1:3565a9697f53ba975a1b7235b802f659418746c3</id>
<content type='text'>
The Meson revision was locked down but the license list change wasn't actually
committed...

Also specify the exact path for recipetool to write to, for clarity.

(From OE-Core rev: cbd6a2de4d8bda44f1d53956acc49a4bef810e95)

Signed-off-by: Ross Burton &lt;ross.burton@intel.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
</feed>
