<feed xmlns='http://www.w3.org/2005/Atom'>
<title>multitech-oe.git/recipes/php, branch org.openembedded.dev</title>
<subtitle>Multi-Tech CoreCDP 1.x OpenEmbedded Tree</subtitle>
<link rel='alternate' type='text/html' href='https://git.multitech.net/cgit/multitech-oe.git/'/>
<entry>
<title>php: removed some old versions</title>
<updated>2010-08-14T10:09:39+00:00</updated>
<author>
<name>Frans Meulenbroeks</name>
<email>fransmeulenbroeks@gmail.com</email>
</author>
<published>2010-08-14T10:09:39+00:00</published>
<link rel='alternate' type='text/html' href='https://git.multitech.net/cgit/multitech-oe.git/commit/?id=77090290235ba10b46520a88bf2e971af90b04aa'/>
<id>77090290235ba10b46520a88bf2e971af90b04aa</id>
<content type='text'>
Signed-off-by: Frans Meulenbroeks &lt;fransmeulenbroeks@gmail.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Frans Meulenbroeks &lt;fransmeulenbroeks@gmail.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>php: make sed avoid unaccessible .pc files left by quilt</title>
<updated>2010-07-14T21:47:20+00:00</updated>
<author>
<name>Denys Dmytriyenko</name>
<email>denis@denix.org</email>
</author>
<published>2010-07-14T21:47:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.multitech.net/cgit/multitech-oe.git/commit/?id=fc29167bbe48a053ad8d2295dbdb65182aea13d6'/>
<id>fc29167bbe48a053ad8d2295dbdb65182aea13d6</id>
<content type='text'>
Signed-off-by: Denys Dmytriyenko &lt;denis@denix.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Denys Dmytriyenko &lt;denis@denix.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>php-native: Drop unnecessary FILESPATH</title>
<updated>2010-06-09T17:50:56+00:00</updated>
<author>
<name>Tom Rini</name>
<email>tom_rini@mentor.com</email>
</author>
<published>2010-06-09T17:49:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.multitech.net/cgit/multitech-oe.git/commit/?id=0c7fd5d39fa1cb1a6d9e0ecd8720772eb30fc8fb'/>
<id>0c7fd5d39fa1cb1a6d9e0ecd8720772eb30fc8fb</id>
<content type='text'>
Signed-off-by: Tom Rini &lt;tom_rini@mentor.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Tom Rini &lt;tom_rini@mentor.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Make the do_patch apply=yes param implicit if extension is .diff/.patch</title>
<updated>2010-05-25T19:54:52+00:00</updated>
<author>
<name>Chris Larson</name>
<email>chris_larson@mentor.com</email>
</author>
<published>2010-05-24T20:01:00+00:00</published>
<link rel='alternate' type='text/html' href='https://git.multitech.net/cgit/multitech-oe.git/commit/?id=6fe7cef27069415f2eba36bc640cf59013d4979b'/>
<id>6fe7cef27069415f2eba36bc640cf59013d4979b</id>
<content type='text'>
For .diff/.patch you need to apply manually, you can specify apply=no.

Signed-off-by: Chris Larson &lt;chris_larson@mentor.com&gt;
Acked-by: Denys Dmytriyenko &lt;denis@denix.org&gt;
Acked-by: Khem Raj &lt;raj.khem@gmail.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
For .diff/.patch you need to apply manually, you can specify apply=no.

Signed-off-by: Chris Larson &lt;chris_larson@mentor.com&gt;
Acked-by: Denys Dmytriyenko &lt;denis@denix.org&gt;
Acked-by: Khem Raj &lt;raj.khem@gmail.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Rename url params patch=&lt;ignored&gt;/pnum=&lt;n&gt; to apply={yes,no}/striplevel=&lt;n&gt;</title>
<updated>2010-05-25T19:53:41+00:00</updated>
<author>
<name>Chris Larson</name>
<email>chris_larson@mentor.com</email>
</author>
<published>2010-05-24T03:23:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git.multitech.net/cgit/multitech-oe.git/commit/?id=bf7d0467a0788a7fcc1c96e0dc35a25ae09278a0'/>
<id>bf7d0467a0788a7fcc1c96e0dc35a25ae09278a0</id>
<content type='text'>
I think this makes the behavior rather more clear.

Signed-off-by: Chris Larson &lt;chris_larson@mentor.com&gt;
Acked-by: Denys Dmytriyenko &lt;denis@denix.org&gt;
Acked-by: Khem Raj &lt;raj.khem@gmail.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
I think this makes the behavior rather more clear.

Signed-off-by: Chris Larson &lt;chris_larson@mentor.com&gt;
Acked-by: Denys Dmytriyenko &lt;denis@denix.org&gt;
Acked-by: Khem Raj &lt;raj.khem@gmail.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>recipes: move checksums to recipes from checksums.ini</title>
<updated>2010-04-12T18:07:27+00:00</updated>
<author>
<name>Martin Jansa</name>
<email>Martin.Jansa@gmail.com</email>
</author>
<published>2010-04-10T09:21:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.multitech.net/cgit/multitech-oe.git/commit/?id=44985d56bc556786812a0a02d6219afd31a7381d'/>
<id>44985d56bc556786812a0a02d6219afd31a7381d</id>
<content type='text'>
* fetch all *.bb with patched utils.bbclass appending all checksums
  found only in checksums.ini to recipe

Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* fetch all *.bb with patched utils.bbclass appending all checksums
  found only in checksums.ini to recipe

Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>php: 5.2.13 and 5.3.2 both have flaws in the handling of xmlrpc</title>
<updated>2010-03-21T03:00:48+00:00</updated>
<author>
<name>Holger Hans Peter Freyther</name>
<email>zecke@selfish.org</email>
</author>
<published>2010-03-21T03:00:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.multitech.net/cgit/multitech-oe.git/commit/?id=30c7c2f4a647216d58a6e4599d73356e0249a2b5'/>
<id>30c7c2f4a647216d58a6e4599d73356e0249a2b5</id>
<content type='text'>
This is addressing CVE-2010-0397.patch.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This is addressing CVE-2010-0397.patch.
</pre>
</div>
</content>
</entry>
<entry>
<title>php* : fix for autoconf 2.64+ problems</title>
<updated>2010-03-18T19:42:37+00:00</updated>
<author>
<name>Graeme Gregory</name>
<email>dp@xora.org.uk</email>
</author>
<published>2010-03-15T23:47:36+00:00</published>
<link rel='alternate' type='text/html' href='https://git.multitech.net/cgit/multitech-oe.git/commit/?id=19c27b7d168d8121ae85d321f68775e8c9076c21'/>
<id>19c27b7d168d8121ae85d321f68775e8c9076c21</id>
<content type='text'>
Patch was taked from pld linux. As part of the debug happened to
update php-native to 5.3.2 so this is added as well.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Patch was taked from pld linux. As part of the debug happened to
update php-native to 5.3.2 so this is added as well.
</pre>
</div>
</content>
</entry>
<entry>
<title>php: Upgrade from php 5.1.12 to 5.1.13</title>
<updated>2010-03-05T00:10:09+00:00</updated>
<author>
<name>Holger Hans Peter Freyther</name>
<email>zecke@selfish.org</email>
</author>
<published>2010-03-05T00:10:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.multitech.net/cgit/multitech-oe.git/commit/?id=4c2a2a7af095761bb214f1fee46bb2a852e9f776'/>
<id>4c2a2a7af095761bb214f1fee46bb2a852e9f776</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>php-5.2.11: Upgrade to 5.2.12 to fix various issues</title>
<updated>2010-03-04T23:04:00+00:00</updated>
<author>
<name>Holger Hans Peter Freyther</name>
<email>zecke@selfish.org</email>
</author>
<published>2010-03-04T22:23:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.multitech.net/cgit/multitech-oe.git/commit/?id=70c732de4a75c4bc51a8f7c83130eef631eaae55'/>
<id>70c732de4a75c4bc51a8f7c83130eef631eaae55</id>
<content type='text'>
Fix CVE-2009-3557, CVE-2009-3558, CVE-2009-4017,
CVE-2009-4142 and CVE-2009-4143.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix CVE-2009-3557, CVE-2009-3558, CVE-2009-4017,
CVE-2009-4142 and CVE-2009-4143.
</pre>
</div>
</content>
</entry>
</feed>
