From: Anuj Mittal <anuj.mittal@intel.com>
To: openembedded-core@lists.openembedded.org
Subject: [hardknott][PATCH 00/17] Patch review
Date: Thu, 27 Jan 2022 13:09:53 +0800 [thread overview]
Message-ID: <cover.1643259953.git.anuj.mittal@intel.com> (raw)
Next set of changes for hardknott. Please review. No problems seen while
testing on autobuilder except for an intermittent ptest failure in
lttng-tools.
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/3160
Thanks,
Anuj
The following changes since commit 155c238d340fdc82420ba9f367cb23014c78b705:
cve-check: add lockfile to task (2022-01-17 10:37:09 +0800)
are available in the Git repository at:
git://push.openembedded.org/openembedded-core-contrib anujm/hardknott
Bruce Ashfield (4):
linux-yocto/5.4: update to v5.4.169
linux-yocto/5.4: update to v5.4.170
linux-yocto/5.4: update to v5.4.171
linux-yocto/5.4: update to v5.4.172
Changqing Li (1):
pigz: fix one failure of command "unpigz -l"
Jagadeesh Krishnanjanappa (1):
tune-cortexa72: remove crypto for the default cortex-a72
Kai Kang (1):
speex: fix CVE-2020-23903
Kevin Hao (2):
tune-cortexa72: Enable the crc extension by default for cortexa72
tune-cortexa72: Drop the redundant cortexa72-crc tune
Mingli Yu (1):
socat: update SRC_URI
Pgowda (2):
binutils: upgrade binutils-2.36 to latest version
gcc: upgrade to gcc-10.3 version
Ross Burton (1):
lighttpd: backport a fix for CVE-2022-22707
Steve Sakoman (3):
expat fix CVE-2022-22822 through CVE-2022-22827
expat: fix CVE-2021-45960
expat: fix CVE-2021-46143
pgowda (1):
glibc: upgrade glibc-2.33 to latest version
meta/conf/distro/include/maintainers.inc | 2 +-
meta/conf/machine/include/tune-cortexa72.inc | 12 +-
.../socat/socat_1.7.4.1.bb | 2 +-
.../expat/expat/CVE-2021-45960.patch | 65 ++
.../expat/expat/CVE-2021-46143.patch | 43 ++
.../expat/expat/CVE-2022-22822-27.patch | 257 +++++++
meta/recipes-core/expat/expat_2.2.10.bb | 3 +
meta/recipes-core/glibc/glibc-version.inc | 2 +-
.../glibc/glibc/0031-CVE-2021-43396.patch | 182 -----
meta/recipes-core/glibc/glibc_2.33.bb | 1 -
.../binutils/binutils-2.36.inc | 5 +-
.../binutils/0001-CVE-2021-20197.patch | 201 ------
.../binutils/0001-CVE-2021-42574.patch | 4 +-
.../binutils/0002-CVE-2021-20197.patch | 170 -----
.../binutils/0003-CVE-2021-20197.patch | 171 -----
.../gcc/{gcc-10.2.inc => gcc-10.3.inc} | 12 +-
...ian_10.2.bb => gcc-cross-canadian_10.3.bb} | 0
.../{gcc-cross_10.2.bb => gcc-cross_10.3.bb} | 0
...-crosssdk_10.2.bb => gcc-crosssdk_10.3.bb} | 0
...cc-runtime_10.2.bb => gcc-runtime_10.3.bb} | 0
...itizers_10.2.bb => gcc-sanitizers_10.3.bb} | 0
...{gcc-source_10.2.bb => gcc-source_10.3.bb} | 0
.../gcc/gcc/0001-CVE-2021-35465.patch | 22 +-
...-up-__aarch64_cas16_acq_rel-fallback.patch | 66 --
...ight-Line-Speculation-SLS-mitigation.patch | 202 ------
...e-SLS-mitigation-for-RET-and-BR-inst.patch | 607 ----------------
...h64-Mitigate-SLS-for-BLR-instruction.patch | 658 ------------------
...gcc-Fix-argument-list-too-long-error.patch | 5 +-
...Re-introduce-spe-commandline-options.patch | 2 +-
...ngw32-Enable-operation_not_supported.patch | 4 +-
.../gcc/0038-arm-neoverse-n2-support.patch | 88 ---
.../gcc/0039-arm64-neoverse-n2-support.patch | 60 --
.../gcc/{gcc_10.2.bb => gcc_10.3.bb} | 0
...initial_10.2.bb => libgcc-initial_10.3.bb} | 0
.../gcc/{libgcc_10.2.bb => libgcc_10.3.bb} | 0
...ibgfortran_10.2.bb => libgfortran_10.3.bb} | 0
...ix-out-of-bounds-OOB-write-fixes-313.patch | 97 +++
.../lighttpd/lighttpd_1.4.59.bb | 1 +
...0001-Fix-bug-when-combining-l-with-d.patch | 50 ++
meta/recipes-extended/pigz/pigz_2.6.bb | 3 +-
.../linux/linux-yocto-rt_5.4.bb | 6 +-
.../linux/linux-yocto-tiny_5.4.bb | 8 +-
meta/recipes-kernel/linux/linux-yocto_5.4.bb | 22 +-
.../speex/speex/CVE-2020-23903.patch | 30 +
meta/recipes-multimedia/speex/speex_1.2.0.bb | 4 +-
45 files changed, 602 insertions(+), 2465 deletions(-)
create mode 100644 meta/recipes-core/expat/expat/CVE-2021-45960.patch
create mode 100644 meta/recipes-core/expat/expat/CVE-2021-46143.patch
create mode 100644 meta/recipes-core/expat/expat/CVE-2022-22822-27.patch
delete mode 100644 meta/recipes-core/glibc/glibc/0031-CVE-2021-43396.patch
delete mode 100644 meta/recipes-devtools/binutils/binutils/0001-CVE-2021-20197.patch
delete mode 100644 meta/recipes-devtools/binutils/binutils/0002-CVE-2021-20197.patch
delete mode 100644 meta/recipes-devtools/binutils/binutils/0003-CVE-2021-20197.patch
rename meta/recipes-devtools/gcc/{gcc-10.2.inc => gcc-10.3.inc} (90%)
rename meta/recipes-devtools/gcc/{gcc-cross-canadian_10.2.bb => gcc-cross-canadian_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-cross_10.2.bb => gcc-cross_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-crosssdk_10.2.bb => gcc-crosssdk_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-runtime_10.2.bb => gcc-runtime_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-sanitizers_10.2.bb => gcc-sanitizers_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-source_10.2.bb => gcc-source_10.3.bb} (100%)
delete mode 100644 meta/recipes-devtools/gcc/gcc/0001-aarch64-Fix-up-__aarch64_cas16_acq_rel-fallback.patch
delete mode 100644 meta/recipes-devtools/gcc/gcc/0001-aarch64-New-Straight-Line-Speculation-SLS-mitigation.patch
delete mode 100644 meta/recipes-devtools/gcc/gcc/0002-aarch64-Introduce-SLS-mitigation-for-RET-and-BR-inst.patch
delete mode 100644 meta/recipes-devtools/gcc/gcc/0003-aarch64-Mitigate-SLS-for-BLR-instruction.patch
delete mode 100644 meta/recipes-devtools/gcc/gcc/0038-arm-neoverse-n2-support.patch
delete mode 100644 meta/recipes-devtools/gcc/gcc/0039-arm64-neoverse-n2-support.patch
rename meta/recipes-devtools/gcc/{gcc_10.2.bb => gcc_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{libgcc-initial_10.2.bb => libgcc-initial_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{libgcc_10.2.bb => libgcc_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{libgfortran_10.2.bb => libgfortran_10.3.bb} (100%)
create mode 100644 meta/recipes-extended/lighttpd/lighttpd/0001-mod_extforward-fix-out-of-bounds-OOB-write-fixes-313.patch
create mode 100644 meta/recipes-extended/pigz/files/0001-Fix-bug-when-combining-l-with-d.patch
create mode 100644 meta/recipes-multimedia/speex/speex/CVE-2020-23903.patch
--
2.34.1
next reply other threads:[~2022-01-27 5:10 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-01-27 5:09 Anuj Mittal [this message]
2022-01-27 5:09 ` [hardknott][PATCH 01/17] tune-cortexa72: remove crypto for the default cortex-a72 Anuj Mittal
2022-01-27 5:09 ` [hardknott][PATCH 02/17] tune-cortexa72: Enable the crc extension by default for cortexa72 Anuj Mittal
2022-01-27 5:09 ` [hardknott][PATCH 03/17] tune-cortexa72: Drop the redundant cortexa72-crc tune Anuj Mittal
2022-01-27 5:09 ` [hardknott][PATCH 04/17] socat: update SRC_URI Anuj Mittal
2022-01-27 5:09 ` [hardknott][PATCH 05/17] pigz: fix one failure of command "unpigz -l" Anuj Mittal
2022-01-27 5:09 ` [hardknott][PATCH 06/17] binutils: upgrade binutils-2.36 to latest version Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 07/17] gcc: upgrade to gcc-10.3 version Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 08/17] glibc: upgrade glibc-2.33 to latest version Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 09/17] linux-yocto/5.4: update to v5.4.169 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 10/17] linux-yocto/5.4: update to v5.4.170 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 11/17] linux-yocto/5.4: update to v5.4.171 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 12/17] linux-yocto/5.4: update to v5.4.172 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 13/17] expat fix CVE-2022-22822 through CVE-2022-22827 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 14/17] expat: fix CVE-2021-45960 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 15/17] expat: fix CVE-2021-46143 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 16/17] speex: fix CVE-2020-23903 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 17/17] lighttpd: backport a fix for CVE-2022-22707 Anuj Mittal
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1643259953.git.anuj.mittal@intel.com \
--to=anuj.mittal@intel.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox