From patchwork Fri Jul 19 10:31:22 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Markus Volk X-Patchwork-Id: 46652 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6A361C3DA5D for ; Fri, 19 Jul 2024 10:31:14 +0000 (UTC) Received: from mailout12.t-online.de (mailout12.t-online.de [194.25.134.22]) by mx.groups.io with SMTP id smtpd.web10.15997.1721385070157993172 for ; Fri, 19 Jul 2024 03:31:10 -0700 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: t-online.de, ip: 194.25.134.22, mailfrom: f_l_k@t-online.de) Received: from fwd74.aul.t-online.de (fwd74.aul.t-online.de [10.223.144.100]) by mailout12.t-online.de (Postfix) with SMTP id 0BB711A56E for ; Fri, 19 Jul 2024 12:30:22 +0200 (CEST) Received: from intel-corei7-64.fritz.box ([84.163.38.70]) by fwd74.t-online.de with (TLSv1.3:TLS_AES_256_GCM_SHA384 encrypted) esmtp id 1sUksS-1D8kaX0; Fri, 19 Jul 2024 12:30:16 +0200 From: Markus Volk To: openembedded-devel@lists.openembedded.org Subject: [meta-multimedia][PATCH] dav1d: update 1.4.2 -> 1.4.3 Date: Fri, 19 Jul 2024 12:31:22 +0200 Message-ID: <20240719103122.297666-1-f_l_k@t-online.de> X-Mailer: git-send-email 2.45.1 MIME-Version: 1.0 X-TOI-EXPURGATEID: 150726::1721385016-F9FEB098-65672AB5/0/0 CLEAN NORMAL X-TOI-MSGID: c957db55-2e15-4a77-8381-d16327867333 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 19 Jul 2024 10:31:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/111414 Changes for 1.4.3 'Road Runner': -------------------------------- 1.4.3 is a small release focused on security issues - AArch64: Fix potential out of bounds access in DotProd H/HV filters - cli: Prevent buffer over-read Signed-off-by: Markus Volk --- .../recipes-multimedia/dav1d/{dav1d_1.4.2.bb => dav1d_1.4.3.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta-multimedia/recipes-multimedia/dav1d/{dav1d_1.4.2.bb => dav1d_1.4.3.bb} (90%) diff --git a/meta-multimedia/recipes-multimedia/dav1d/dav1d_1.4.2.bb b/meta-multimedia/recipes-multimedia/dav1d/dav1d_1.4.3.bb similarity index 90% rename from meta-multimedia/recipes-multimedia/dav1d/dav1d_1.4.2.bb rename to meta-multimedia/recipes-multimedia/dav1d/dav1d_1.4.3.bb index 4e8412303..52dbc710e 100644 --- a/meta-multimedia/recipes-multimedia/dav1d/dav1d_1.4.2.bb +++ b/meta-multimedia/recipes-multimedia/dav1d/dav1d_1.4.3.bb @@ -7,7 +7,7 @@ LICENSE = "BSD-2-Clause" LIC_FILES_CHKSUM = "file://COPYING;md5=c8055cfe7548dfdaa3a6dc45d8793669" SRC_URI = "git://code.videolan.org/videolan/dav1d.git;protocol=https;branch=master" -SRCREV = "805d9e5a8ffce3ef78cebde4bfedf3642907b2d3" +SRCREV = "e9986de7f4264940af6fa1df1498fd2754077de4" S = "${WORKDIR}/git"