From: "Steve Sakoman" <steve@sakoman.com>
To: openembedded-core@lists.openembedded.org
Subject: [OE-core][dunfell 00/36] Patch review
Date: Sat, 28 Aug 2021 08:10:48 -1000 [thread overview]
Message-ID: <cover.1630174149.git.steve@sakoman.com> (raw)
Please review this next set of patches for dunfell and have comments back by
end of day Tuesday.
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/2519
The following changes since commit eea71d274fe4d5f23ba0ab35d14be4fff2e64e2b:
sdk: Enable do_populate_sdk with multilibs (2021-08-19 05:30:01 -1000)
are available in the Git repository at:
git://git.openembedded.org/openembedded-core-contrib stable/dunfell-nut
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/dunfell-nut
Alexander Kanavin (6):
gnupg: update 2.2.21 -> 2.2.22
gnupg: update 2.2.23 -> 2.2.26
tcf-agent: fetching over git:// no longer works
qemurunner.py: print output from runqemu/qemu-system in stop()
qemurunner.py: handle getOutput() having nothing to read
selftest: disable virgl headless test
Andrej Valek (1):
mklibs-native: drop deprecated cpp17 exceptions
Armin Kuster (11):
glibc: Security fix CVE-2021-33574
glibc: Security fix for CVE-2021-38604
qemu: Security fix CVE-2020-25085
qemu: Security fix CVE-2020-25624
Qemu: Security fix for CVE-2020-25625/2021-3409/2020-17380
qemu: Security fix for CVE-2020-29443
qemu: Security fix CVE-2021-20221
qemu: Security fix CVE-2021-3544
qemu: Security fixes CVE-2021-3545/6
binutils: Security fix for CVE-2021-3549
binutils: Security fix for CVE-2020-16593
Bruce Ashfield (2):
linux-yocto/5.4: update to v5.4.142
parselogs.py: ignore intermittent CD/DVDROM identification failure
Lee Chee Yang (1):
qemu: fix CVE-2021-3527
Marek Vasut (1):
image_types: Restore pre-btrfs-tools 4.14.1 mkfs.btrfs shrink behavior
Marta Rybczynska (1):
lzo: add CVE_PRODUCT
Mikko Rapeli (1):
openssl: update from 1.1.1k to 1.1.1l
Oleksandr Popovych (1):
utils: Reduce the number of calls to the "dirname" command
Ranjitsinh Rathod (1):
rpm: Add fix for CVE-2021-20266
Richard Purdie (1):
gnupg: upgrade 2.2.20 -> 2.2.21
Sakib Sajal (6):
qemu: fix CVE-2021-20181
qemu: fix CVE-2021-3416
qemu: fix CVE-2021-20257
qemu: fix CVE-2021-3582
qemu: fix CVE-2021-3607
qemu: fix CVE-2021-3608
Saul Wold (1):
gnupg: uprev 2.2.22 -> 2.2.23
Wang Mingyu (1):
gnupg: upgrade 2.2.26 -> 2.2.27
jbouchard (1):
Use the label provided when formating a dos partition
meta/classes/image_types.bbclass | 2 +-
meta/classes/utils.bbclass | 2 +-
meta/lib/oeqa/runtime/cases/parselogs.py | 1 +
meta/lib/oeqa/selftest/cases/runtime_test.py | 1 +
meta/lib/oeqa/utils/qemurunner.py | 7 +-
.../{openssl_1.1.1k.bb => openssl_1.1.1l.bb} | 2 +-
.../glibc/glibc/CVE-2021-33574_1.patch | 72 +++
.../glibc/glibc/CVE-2021-33574_2.patch | 73 +++
.../glibc/glibc/CVE-2021-38604.patch | 41 ++
meta/recipes-core/glibc/glibc_2.31.bb | 3 +
.../binutils/binutils-2.34.inc | 2 +
.../binutils/binutils/CVE-2020-16593.patch | 204 +++++++++
.../binutils/binutils/CVE-2021-3549.patch | 187 ++++++++
...ecated-exception-specification-cpp17.patch | 431 ++++++++++++++++++
.../mklibs/mklibs-native_0.1.44.bb | 1 +
meta/recipes-devtools/qemu/qemu.inc | 69 ++-
.../qemu/qemu/CVE-2020-25085.patch | 46 ++
.../qemu/qemu/CVE-2020-25624_1.patch | 87 ++++
.../qemu/qemu/CVE-2020-25624_2.patch | 101 ++++
.../qemu/qemu/CVE-2020-25625.patch | 42 ++
.../qemu/qemu/CVE-2020-29443.patch | 45 ++
.../qemu/qemu/CVE-2021-20181.patch | 81 ++++
.../qemu/qemu/CVE-2021-20221.patch | 67 +++
.../qemu/qemu/CVE-2021-20257.patch | 55 +++
.../qemu/qemu/CVE-2021-3416_1.patch | 177 +++++++
.../qemu/qemu/CVE-2021-3416_10.patch | 41 ++
.../qemu/qemu/CVE-2021-3416_2.patch | 42 ++
.../qemu/qemu/CVE-2021-3416_3.patch | 43 ++
.../qemu/qemu/CVE-2021-3416_5.patch | 42 ++
.../qemu/qemu/CVE-2021-3416_6.patch | 40 ++
.../qemu/qemu/CVE-2021-3416_7.patch | 42 ++
.../qemu/qemu/CVE-2021-3416_8.patch | 44 ++
.../qemu/qemu/CVE-2021-3416_9.patch | 41 ++
.../qemu/qemu/CVE-2021-3527-1.patch | 42 ++
.../qemu/qemu/CVE-2021-3527-2.patch | 59 +++
.../qemu/qemu/CVE-2021-3544.patch | 29 ++
.../qemu/qemu/CVE-2021-3544_2.patch | 39 ++
.../qemu/qemu/CVE-2021-3544_3.patch | 39 ++
.../qemu/qemu/CVE-2021-3544_4.patch | 46 ++
.../qemu/qemu/CVE-2021-3544_5.patch | 47 ++
.../qemu/qemu/CVE-2021-3545.patch | 41 ++
.../qemu/qemu/CVE-2021-3546.patch | 47 ++
.../qemu/qemu/CVE-2021-3582.patch | 47 ++
.../qemu/qemu/CVE-2021-3607.patch | 43 ++
.../qemu/qemu/CVE-2021-3608.patch | 40 ++
.../rpm/files/CVE-2021-20266.patch | 109 +++++
meta/recipes-devtools/rpm/rpm_4.14.2.1.bb | 1 +
.../tcf-agent/tcf-agent_git.bb | 2 +-
.../linux/linux-yocto-rt_5.4.bb | 6 +-
.../linux/linux-yocto-tiny_5.4.bb | 8 +-
meta/recipes-kernel/linux/linux-yocto_5.4.bb | 22 +-
...-a-custom-value-for-the-location-of-.patch | 6 +-
.../0003-dirmngr-uses-libgpg-error.patch | 24 +-
.../gnupg/gnupg/relocate.patch | 20 +-
.../{gnupg_2.2.20.bb => gnupg_2.2.27.bb} | 3 +-
meta/recipes-support/lzo/lzo_2.10.bb | 2 +
.../lib/wic/plugins/source/bootimg-pcbios.py | 6 +-
57 files changed, 2788 insertions(+), 74 deletions(-)
rename meta/recipes-connectivity/openssl/{openssl_1.1.1k.bb => openssl_1.1.1l.bb} (98%)
create mode 100644 meta/recipes-core/glibc/glibc/CVE-2021-33574_1.patch
create mode 100644 meta/recipes-core/glibc/glibc/CVE-2021-33574_2.patch
create mode 100644 meta/recipes-core/glibc/glibc/CVE-2021-38604.patch
create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2020-16593.patch
create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2021-3549.patch
create mode 100644 meta/recipes-devtools/mklibs/files/remove-deprecated-exception-specification-cpp17.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2020-25085.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2020-25624_1.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2020-25624_2.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2020-25625.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2020-29443.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-20181.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-20221.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-20257.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3416_1.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3416_10.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3416_2.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3416_3.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3416_5.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3416_6.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3416_7.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3416_8.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3416_9.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3527-1.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3527-2.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3544.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3544_2.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3544_3.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3544_4.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3544_5.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3545.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3546.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3582.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3607.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2021-3608.patch
create mode 100644 meta/recipes-devtools/rpm/files/CVE-2021-20266.patch
rename meta/recipes-support/gnupg/{gnupg_2.2.20.bb => gnupg_2.2.27.bb} (95%)
--
2.25.1
next reply other threads:[~2021-08-28 18:11 UTC|newest]
Thread overview: 37+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-08-28 18:10 Steve Sakoman [this message]
2021-08-28 18:10 ` [OE-core][dunfell 01/36] glibc: Security fix CVE-2021-33574 Steve Sakoman
2021-08-28 18:10 ` [OE-core][dunfell 02/36] glibc: Security fix for CVE-2021-38604 Steve Sakoman
2021-08-28 18:10 ` [OE-core][dunfell 03/36] gnupg: upgrade 2.2.20 -> 2.2.21 Steve Sakoman
2021-08-28 18:10 ` [OE-core][dunfell 04/36] gnupg: update 2.2.21 -> 2.2.22 Steve Sakoman
2021-08-28 18:10 ` [OE-core][dunfell 05/36] gnupg: uprev 2.2.22 -> 2.2.23 Steve Sakoman
2021-08-28 18:10 ` [OE-core][dunfell 06/36] gnupg: update 2.2.23 -> 2.2.26 Steve Sakoman
2021-08-28 18:10 ` [OE-core][dunfell 07/36] gnupg: upgrade 2.2.26 -> 2.2.27 Steve Sakoman
2021-08-28 18:10 ` [OE-core][dunfell 08/36] qemu: Security fix CVE-2020-25085 Steve Sakoman
2021-08-28 18:10 ` [OE-core][dunfell 09/36] qemu: Security fix CVE-2020-25624 Steve Sakoman
2021-08-28 18:10 ` [OE-core][dunfell 10/36] Qemu: Security fix for CVE-2020-25625/2021-3409/2020-17380 Steve Sakoman
2021-08-28 18:10 ` [OE-core][dunfell 11/36] qemu: Security fix for CVE-2020-29443 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 12/36] qemu: Security fix CVE-2021-20221 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 13/36] qemu: fix CVE-2021-20181 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 14/36] qemu: fix CVE-2021-3416 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 15/36] qemu: fix CVE-2021-20257 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 16/36] qemu: Security fix CVE-2021-3544 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 17/36] qemu: Security fixes CVE-2021-3545/6 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 18/36] qemu: fix CVE-2021-3527 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 19/36] qemu: fix CVE-2021-3582 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 20/36] qemu: fix CVE-2021-3607 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 21/36] qemu: fix CVE-2021-3608 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 22/36] rpm: Add fix for CVE-2021-20266 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 23/36] binutils: Security fix for CVE-2021-3549 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 24/36] binutils: Security fix for CVE-2020-16593 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 25/36] openssl: update from 1.1.1k to 1.1.1l Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 26/36] Use the label provided when formating a dos partition Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 27/36] lzo: add CVE_PRODUCT Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 28/36] utils: Reduce the number of calls to the "dirname" command Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 29/36] tcf-agent: fetching over git:// no longer works Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 30/36] mklibs-native: drop deprecated cpp17 exceptions Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 31/36] image_types: Restore pre-btrfs-tools 4.14.1 mkfs.btrfs shrink behavior Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 32/36] linux-yocto/5.4: update to v5.4.142 Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 33/36] qemurunner.py: print output from runqemu/qemu-system in stop() Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 34/36] qemurunner.py: handle getOutput() having nothing to read Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 35/36] parselogs.py: ignore intermittent CD/DVDROM identification failure Steve Sakoman
2021-08-28 18:11 ` [OE-core][dunfell 36/36] selftest: disable virgl headless test Steve Sakoman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1630174149.git.steve@sakoman.com \
--to=steve@sakoman.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox