From: Steve Sakoman <steve@sakoman.com>
To: openembedded-core@lists.openembedded.org
Subject: [OE-core][dunfell 00/12] Pull request (cover letter only)
Date: Tue, 11 Jan 2022 12:18:33 -1000 [thread overview]
Message-ID: <cover.1641939388.git.steve@sakoman.com> (raw)
The following changes since commit 1ab7aee542589f6b6c76f8515b4230ce870a8678:
selftest: skip virgl test on fedora 34 entirely (2021-12-23 06:21:37 -1000)
are available in the Git repository at:
git://git.openembedded.org/openembedded-core-contrib stable/dunfell-next
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/dunfell-next
Alexander Kanavin (1):
lib/oe/reproducible: correctly set .git location when recursively
looking for git repos
Marek Vasut (1):
weston: Backport patches to always activate the top-level surface
Marta Rybczynska (1):
grub: fix CVE-2020-14372 and CVE-2020-27779
Richard Purdie (4):
openssl: Add reproducibility fix
oeqa/selftest/bbtests: Use YP sources mirror instead of GNU
oeqa/selftest/tinfoil: Update to use test command
scripts: Update to use exec_module() instead of load_module()
Steve Sakoman (3):
libpcre2: update SRC_URI
selftest: skip virgl test on fedora 35
asciidoc: properly detect and compare Python versions >= 3.10
Tim Orling (1):
scripts/buildhistory-diff: drop use of distutils
wangmy (1):
linux-firmware: upgrade 20211027 -> 20211216
meta/lib/oe/reproducible.py | 2 +-
meta/lib/oeqa/selftest/cases/bbtests.py | 2 +-
meta/lib/oeqa/selftest/cases/runtime_test.py | 2 +
meta/lib/oeqa/selftest/cases/tinfoil.py | 6 +-
.../grub/files/CVE-2020-14372.patch | 76 +++
.../grub/files/CVE-2020-14372_1.patch | 130 ++++++
.../grub/files/CVE-2020-14372_2.patch | 431 ++++++++++++++++++
.../grub/files/CVE-2020-14372_3.patch | 57 +++
.../grub/files/CVE-2020-14372_4.patch | 52 +++
.../grub/files/CVE-2020-14372_5.patch | 158 +++++++
.../grub/files/CVE-2020-27779.patch | 70 +++
.../grub/files/CVE-2020-27779_2.patch | 105 +++++
.../grub/files/CVE-2020-27779_3.patch | 37 ++
.../grub/files/CVE-2020-27779_4.patch | 35 ++
.../grub/files/CVE-2020-27779_5.patch | 62 +++
.../grub/files/CVE-2020-27779_6.patch | 61 +++
.../grub/files/CVE-2020-27779_7.patch | 65 +++
.../grub/files/no-insmod-on-sb.patch | 107 +++++
meta/recipes-bsp/grub/grub2.inc | 14 +
.../openssl/openssl/reproducibility.patch | 22 +
.../openssl/openssl_1.1.1l.bb | 1 +
.../asciidoc/detect-python-version.patch | 42 ++
.../asciidoc/asciidoc_8.6.9.bb | 3 +-
...move-no-op-de-activation-of-the-xdg-.patch | 32 ++
...name-gain-lose-keyboard-focus-to-act.patch | 57 +++
...bed-keyboard-focus-handle-code-when-.patch | 99 ++++
meta/recipes-graphics/wayland/weston_8.0.0.bb | 3 +
...20211027.bb => linux-firmware_20211216.bb} | 4 +-
.../recipes-support/libpcre/libpcre2_10.34.bb | 2 +-
scripts/buildhistory-diff | 5 -
scripts/lib/scriptutils.py | 7 +-
scripts/lib/wic/pluginbase.py | 8 +-
32 files changed, 1739 insertions(+), 18 deletions(-)
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-14372.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-14372_1.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-14372_2.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-14372_3.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-14372_4.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-14372_5.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-27779.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-27779_2.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-27779_3.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-27779_4.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-27779_5.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-27779_6.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-27779_7.patch
create mode 100644 meta/recipes-bsp/grub/files/no-insmod-on-sb.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/reproducibility.patch
create mode 100644 meta/recipes-extended/asciidoc/asciidoc/detect-python-version.patch
create mode 100644 meta/recipes-graphics/wayland/weston/0002-desktop-shell-Remove-no-op-de-activation-of-the-xdg-.patch
create mode 100644 meta/recipes-graphics/wayland/weston/0003-desktop-shell-Rename-gain-lose-keyboard-focus-to-act.patch
create mode 100644 meta/recipes-graphics/wayland/weston/0004-desktop-shell-Embed-keyboard-focus-handle-code-when-.patch
rename meta/recipes-kernel/linux-firmware/{linux-firmware_20211027.bb => linux-firmware_20211216.bb} (99%)
--
2.25.1
next reply other threads:[~2022-01-11 22:18 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-01-11 22:18 Steve Sakoman [this message]
-- strict thread matches above, loose matches on Subject: below --
2022-07-06 14:49 [OE-core][dunfell 00/12] Pull request (cover letter only) Steve Sakoman
2022-06-21 21:43 Steve Sakoman
2021-08-24 14:29 Steve Sakoman
2021-07-15 0:44 Steve Sakoman
2021-01-12 22:35 Steve Sakoman
[not found] <163DBD610FCA88DD.13380@lists.openembedded.org>
2020-10-15 14:07 ` Steve Sakoman
2020-10-15 14:13 ` Joshua Watt
2020-10-15 14:20 ` Steve Sakoman
2020-10-15 15:38 ` Richard Purdie
2020-10-14 3:14 Steve Sakoman
2020-08-26 23:29 Steve Sakoman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1641939388.git.steve@sakoman.com \
--to=steve@sakoman.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox