All of lore.kernel.org
 help / color / mirror / Atom feed
* [meta-java][dunfell] [PATCH] xerces-j: Upgrade to 2.12.2
@ 2022-07-04 12:45 Neetika
  2022-07-04 14:19 ` [OE-core] " Steve Sakoman
  0 siblings, 1 reply; 4+ messages in thread
From: Neetika @ 2022-07-04 12:45 UTC (permalink / raw)
  To: openembedded-core, raj.khem; +Cc: Neetika Singh

From: Neetika Singh <Neetika.Singh@kpit.com>

As per below links CVE-2022-23437 is fixed by upgrade of
xerces-j version to 2.12.2.
https://bugs.gentoo.org/show_bug.cgi?id=CVE-2022-23437
https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=743111a72f39a1b24f87bd1b2fc32ef707b41407

Hence upgrade the version.

Signed-off-by: Neetika Singh <Neetika.Singh@kpit.com>
---
 .../xerces-j/{xerces-j_2.11.0.bb => xerces-j_2.12.2.bb}   | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)
 rename recipes-core/xerces-j/{xerces-j_2.11.0.bb => xerces-j_2.12.2.bb} (88%)

diff --git a/recipes-core/xerces-j/xerces-j_2.11.0.bb b/recipes-core/xerces-j/xerces-j_2.12.2.bb
similarity index 88%
rename from recipes-core/xerces-j/xerces-j_2.11.0.bb
rename to recipes-core/xerces-j/xerces-j_2.12.2.bb
index fda6fe4..bc2780e 100644
--- a/recipes-core/xerces-j/xerces-j_2.11.0.bb
+++ b/recipes-core/xerces-j/xerces-j_2.12.2.bb
@@ -12,7 +12,7 @@ LIC_FILES_CHKSUM = " \
                     file://LICENSE.serializer.txt;md5=d229da563da18fe5d58cd95a6467d584 \
                    "

-SRC_URI = "http://archive.apache.org/dist/xerces/j/Xerces-J-src.${PV}.tar.gz"
+SRC_URI = "http://archive.apache.org/dist/xerces/j/source/Xerces-J-src.${PV}.tar.gz"

 # CVE only applies to some Oracle Java SE and Red Hat Enterprise Linux versions.
 # Already fixed with updates and closed.
@@ -20,7 +20,7 @@ SRC_URI = "http://archive.apache.org/dist/xerces/j/Xerces-J-src.${PV}.tar.gz"
 # https://bugzilla.redhat.com/show_bug.cgi?id=1567542
 CVE_CHECK_WHITELIST += "CVE-2018-2799"

-S = "${WORKDIR}/xerces-2_11_0"
+S = "${WORKDIR}/xerces-2_12_2"

 inherit java-library

@@ -63,7 +63,7 @@ do_compile() {

 }

-SRC_URI[md5sum] = "d01fc11eacbe43b45681cb85ac112ebf"
-SRC_URI[sha256sum] = "f59a5ef7b51bd883f2e9bda37a9360692e6c5e439b98d9b6ac1953e1f98b0680"
+SRC_URI[md5sum] = "41dde3c515fca8d307416123bc07a739"
+SRC_URI[sha256sum] = "6dd1ebd4c88e935c182375346cd7365514bd8dd2ad2f30f0d0b05257bab34ee8"

 BBCLASSEXTEND = "native"
--
2.17.1

This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails.


^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [OE-core] [meta-java][dunfell] [PATCH] xerces-j: Upgrade to 2.12.2
  2022-07-04 12:45 [meta-java][dunfell] [PATCH] xerces-j: Upgrade to 2.12.2 Neetika
@ 2022-07-04 14:19 ` Steve Sakoman
  0 siblings, 0 replies; 4+ messages in thread
From: Steve Sakoman @ 2022-07-04 14:19 UTC (permalink / raw)
  To: Neetika.Singh; +Cc: openembedded-core, raj.khem

Since this is a patch for meta-java it should be sent to:
openembedded-devel@lists.openembedded.org

Also, it shouldn't be tagged for [oe-core], just [meta-java]

Steve

On Mon, Jul 4, 2022 at 2:45 AM Neetika.Singh via
lists.openembedded.org <Neetika.Singh=kpit.com@lists.openembedded.org>
wrote:
>
> From: Neetika Singh <Neetika.Singh@kpit.com>
>
> As per below links CVE-2022-23437 is fixed by upgrade of
> xerces-j version to 2.12.2.
> https://bugs.gentoo.org/show_bug.cgi?id=CVE-2022-23437
> https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=743111a72f39a1b24f87bd1b2fc32ef707b41407
>
> Hence upgrade the version.
>
> Signed-off-by: Neetika Singh <Neetika.Singh@kpit.com>
> ---
>  .../xerces-j/{xerces-j_2.11.0.bb => xerces-j_2.12.2.bb}   | 8 ++++----
>  1 file changed, 4 insertions(+), 4 deletions(-)
>  rename recipes-core/xerces-j/{xerces-j_2.11.0.bb => xerces-j_2.12.2.bb} (88%)
>
> diff --git a/recipes-core/xerces-j/xerces-j_2.11.0.bb b/recipes-core/xerces-j/xerces-j_2.12.2.bb
> similarity index 88%
> rename from recipes-core/xerces-j/xerces-j_2.11.0.bb
> rename to recipes-core/xerces-j/xerces-j_2.12.2.bb
> index fda6fe4..bc2780e 100644
> --- a/recipes-core/xerces-j/xerces-j_2.11.0.bb
> +++ b/recipes-core/xerces-j/xerces-j_2.12.2.bb
> @@ -12,7 +12,7 @@ LIC_FILES_CHKSUM = " \
>                      file://LICENSE.serializer.txt;md5=d229da563da18fe5d58cd95a6467d584 \
>                     "
>
> -SRC_URI = "http://archive.apache.org/dist/xerces/j/Xerces-J-src.${PV}.tar.gz"
> +SRC_URI = "http://archive.apache.org/dist/xerces/j/source/Xerces-J-src.${PV}.tar.gz"
>
>  # CVE only applies to some Oracle Java SE and Red Hat Enterprise Linux versions.
>  # Already fixed with updates and closed.
> @@ -20,7 +20,7 @@ SRC_URI = "http://archive.apache.org/dist/xerces/j/Xerces-J-src.${PV}.tar.gz"
>  # https://bugzilla.redhat.com/show_bug.cgi?id=1567542
>  CVE_CHECK_WHITELIST += "CVE-2018-2799"
>
> -S = "${WORKDIR}/xerces-2_11_0"
> +S = "${WORKDIR}/xerces-2_12_2"
>
>  inherit java-library
>
> @@ -63,7 +63,7 @@ do_compile() {
>
>  }
>
> -SRC_URI[md5sum] = "d01fc11eacbe43b45681cb85ac112ebf"
> -SRC_URI[sha256sum] = "f59a5ef7b51bd883f2e9bda37a9360692e6c5e439b98d9b6ac1953e1f98b0680"
> +SRC_URI[md5sum] = "41dde3c515fca8d307416123bc07a739"
> +SRC_URI[sha256sum] = "6dd1ebd4c88e935c182375346cd7365514bd8dd2ad2f30f0d0b05257bab34ee8"
>
>  BBCLASSEXTEND = "native"
> --
> 2.17.1
>
> This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails.
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#167604): https://lists.openembedded.org/g/openembedded-core/message/167604
> Mute This Topic: https://lists.openembedded.org/mt/92163687/3620601
> Group Owner: openembedded-core+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [steve@sakoman.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [meta-java][dunfell][PATCH] xerces-j: Upgrade to 2.12.2
  2022-07-07  8:52 [meta-java][dunfell][PATCH] " Neetika
@ 2023-03-09 10:55 ` virendrak
  0 siblings, 0 replies; 4+ messages in thread
From: virendrak @ 2023-03-09 10:55 UTC (permalink / raw)
  To: openembedded-devel

[-- Attachment #1: Type: text/plain, Size: 217 bytes --]

It has been a long time since meta-java not getting updated.

https://git.yoctoproject.org/meta-java/commit/?h=dunfell-next&id=6d5620541584e20e195783dc025314a8a29e655b

This change still present in dunfell-next.

[-- Attachment #2: Type: text/html, Size: 404 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [meta-java][dunfell][PATCH] xerces-j: Upgrade to 2.12.2
@ 2022-07-07  8:52 Neetika
  2023-03-09 10:55 ` virendrak
  0 siblings, 1 reply; 4+ messages in thread
From: Neetika @ 2022-07-07  8:52 UTC (permalink / raw)
  To: openembedded-devel, raj.khem; +Cc: Neetika Singh

From: Neetika Singh <Neetika.Singh@kpit.com>

As per below links CVE-2022-23437 is fixed by upgrade of
xerces-j version to 2.12.2.
https://bugs.gentoo.org/show_bug.cgi?id=CVE-2022-23437
https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=743111a72f39a1b24f87bd1b2fc32ef707b41407

Hence upgrade the version.

Signed-off-by: Neetika Singh <Neetika.Singh@kpit.com>
---
 .../xerces-j/{xerces-j_2.11.0.bb => xerces-j_2.12.2.bb}   | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)
 rename recipes-core/xerces-j/{xerces-j_2.11.0.bb => xerces-j_2.12.2.bb} (88%)

diff --git a/recipes-core/xerces-j/xerces-j_2.11.0.bb b/recipes-core/xerces-j/xerces-j_2.12.2.bb
similarity index 88%
rename from recipes-core/xerces-j/xerces-j_2.11.0.bb
rename to recipes-core/xerces-j/xerces-j_2.12.2.bb
index fda6fe4..bc2780e 100644
--- a/recipes-core/xerces-j/xerces-j_2.11.0.bb
+++ b/recipes-core/xerces-j/xerces-j_2.12.2.bb
@@ -12,7 +12,7 @@ LIC_FILES_CHKSUM = " \
                     file://LICENSE.serializer.txt;md5=d229da563da18fe5d58cd95a6467d584 \
                    "

-SRC_URI = "http://archive.apache.org/dist/xerces/j/Xerces-J-src.${PV}.tar.gz"
+SRC_URI = "http://archive.apache.org/dist/xerces/j/source/Xerces-J-src.${PV}.tar.gz"

 # CVE only applies to some Oracle Java SE and Red Hat Enterprise Linux versions.
 # Already fixed with updates and closed.
@@ -20,7 +20,7 @@ SRC_URI = "http://archive.apache.org/dist/xerces/j/Xerces-J-src.${PV}.tar.gz"
 # https://bugzilla.redhat.com/show_bug.cgi?id=1567542
 CVE_CHECK_WHITELIST += "CVE-2018-2799"

-S = "${WORKDIR}/xerces-2_11_0"
+S = "${WORKDIR}/xerces-2_12_2"

 inherit java-library

@@ -63,7 +63,7 @@ do_compile() {

 }

-SRC_URI[md5sum] = "d01fc11eacbe43b45681cb85ac112ebf"
-SRC_URI[sha256sum] = "f59a5ef7b51bd883f2e9bda37a9360692e6c5e439b98d9b6ac1953e1f98b0680"
+SRC_URI[md5sum] = "41dde3c515fca8d307416123bc07a739"
+SRC_URI[sha256sum] = "6dd1ebd4c88e935c182375346cd7365514bd8dd2ad2f30f0d0b05257bab34ee8"

 BBCLASSEXTEND = "native"
--
2.17.1

This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails.


^ permalink raw reply related	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2023-03-09 11:57 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-07-04 12:45 [meta-java][dunfell] [PATCH] xerces-j: Upgrade to 2.12.2 Neetika
2022-07-04 14:19 ` [OE-core] " Steve Sakoman
2022-07-07  8:52 [meta-java][dunfell][PATCH] " Neetika
2023-03-09 10:55 ` virendrak

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.