From: Steve Sakoman <steve@sakoman.com>
To: openembedded-core@lists.openembedded.org
Subject: [OE-core][dunfell 00/20] Patch review
Date: Thu, 3 Feb 2022 09:50:24 -1000 [thread overview]
Message-ID: <cover.1643917717.git.steve@sakoman.com> (raw)
Please review this set of patches for dunfell.
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/3182
The following changes since commit f3be01483b01c88f8c4ba24ca73ccf1bcc33665c:
build-appliance-image: Update to dunfell head revision (2022-01-27 16:16:08 +0000)
are available in the Git repository at:
git://git.openembedded.org/openembedded-core-contrib stable/dunfell-nut
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/dunfell-nut
Alexander Kanavin (1):
libusb1: correct SRC_URI
Joshua Watt (5):
tzdata: Remove BSD License specifier
e2fsprogs: Use specific BSD license variant
glib-2.0: Use specific BSD license variant
shadow: Use specific BSD license variant
libcap: Use specific BSD license variant
Marek Vasut (1):
binutils: Backport Include members in the variable table used when
resolving DW_AT_specification tags.
Marta Rybczynska (2):
grub: add a fix for CVE-2020-25632
grub: add a fix for CVE-2020-25647
Minjae Kim (1):
ghostscript: fix CVE-2021-45949
Peter Kjellerstedt (1):
sstate: A third fix for for touching files inside pseudo
Purushottam Choudhary (1):
systemd: Fix CVE-2021-3997
Ranjitsinh Rathod (1):
util-linux: Fix for CVE-2021-3995 and CVE-2021-3996
Ross Burton (2):
lsof: correct LICENSE
shadow-sysroot: sync license with shadow
Rudolf J Streif (1):
linux-firmware: Add CLM blob to linux-firmware-bcm4373 package
Steve Sakoman (4):
glibc: update to lastest 2.31 release HEAD
expat: fix CVE-2022-23852
expat: add missing Upstream-status, CVE tag and sign-off to
CVE-2021-46143.patch
common-licenses: add Spencer-94
meta/classes/sstate.bbclass | 14 +-
meta/files/common-licenses/Spencer-94 | 12 +
.../grub/files/CVE-2020-25632.patch | 90 +++++
.../grub/files/CVE-2020-25647.patch | 119 +++++++
meta/recipes-bsp/grub/grub2.inc | 2 +
.../expat/expat/CVE-2021-46143.patch | 6 +
.../expat/expat/CVE-2022-23852.patch | 33 ++
meta/recipes-core/expat/expat_2.2.9.bb | 1 +
meta/recipes-core/glib-2.0/glib.inc | 2 +-
meta/recipes-core/glibc/glibc-version.inc | 2 +-
meta/recipes-core/glibc/glibc_2.31.bb | 1 +
.../systemd/systemd/CVE-2021-3997-1.patch | 65 ++++
.../systemd/systemd/CVE-2021-3997-2.patch | 101 ++++++
.../systemd/systemd/CVE-2021-3997-3.patch | 266 +++++++++++++++
...-fsync-after-removing-directory-tree.patch | 35 ++
...children-split-out-body-of-directory.patch | 318 ++++++++++++++++++
meta/recipes-core/systemd/systemd_244.5.bb | 5 +
.../util-linux/util-linux/CVE-2021-3995.patch | 139 ++++++++
.../util-linux/util-linux/CVE-2021-3996.patch | 226 +++++++++++++
...ude-strutils-cleanup-strto-functions.patch | 270 +++++++++++++++
.../util-linux/util-linux_2.35.1.bb | 3 +
.../binutils/binutils-2.34.inc | 1 +
...in-the-variable-table-used-when-reso.patch | 32 ++
meta/recipes-devtools/e2fsprogs/e2fsprogs.inc | 2 +-
.../ghostscript/CVE-2021-45949.patch | 65 ++++
...tack-limits-after-function-evalution.patch | 51 +++
.../ghostscript/ghostscript_9.52.bb | 2 +
meta/recipes-extended/lsof/lsof_4.91.bb | 2 +-
.../shadow/shadow-sysroot_4.6.bb | 2 +-
meta/recipes-extended/shadow/shadow.inc | 2 +-
meta/recipes-extended/timezone/timezone.inc | 2 +-
.../linux-firmware/linux-firmware_20211216.bb | 1 +
meta/recipes-support/libcap/libcap_2.32.bb | 2 +-
meta/recipes-support/libusb/libusb1_1.0.22.bb | 4 +-
34 files changed, 1863 insertions(+), 15 deletions(-)
create mode 100644 meta/files/common-licenses/Spencer-94
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-25632.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2020-25647.patch
create mode 100644 meta/recipes-core/expat/expat/CVE-2022-23852.patch
create mode 100644 meta/recipes-core/systemd/systemd/CVE-2021-3997-1.patch
create mode 100644 meta/recipes-core/systemd/systemd/CVE-2021-3997-2.patch
create mode 100644 meta/recipes-core/systemd/systemd/CVE-2021-3997-3.patch
create mode 100644 meta/recipes-core/systemd/systemd/rm-rf-optionally-fsync-after-removing-directory-tree.patch
create mode 100644 meta/recipes-core/systemd/systemd/rm-rf-refactor-rm-rf-children-split-out-body-of-directory.patch
create mode 100644 meta/recipes-core/util-linux/util-linux/CVE-2021-3995.patch
create mode 100644 meta/recipes-core/util-linux/util-linux/CVE-2021-3996.patch
create mode 100644 meta/recipes-core/util-linux/util-linux/include-strutils-cleanup-strto-functions.patch
create mode 100644 meta/recipes-devtools/binutils/binutils/0018-Include-members-in-the-variable-table-used-when-reso.patch
create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2021-45949.patch
create mode 100644 meta/recipes-extended/ghostscript/ghostscript/check-stack-limits-after-function-evalution.patch
--
2.25.1
next reply other threads:[~2022-02-03 19:51 UTC|newest]
Thread overview: 25+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-02-03 19:50 Steve Sakoman [this message]
2022-02-03 19:50 ` [OE-core][dunfell 01/20] glibc: update to lastest 2.31 release HEAD Steve Sakoman
2022-02-05 0:06 ` Ranjitsinh Rathod
2022-02-03 19:50 ` [OE-core][dunfell 02/20] systemd: Fix CVE-2021-3997 Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 03/20] grub: add a fix for CVE-2020-25632 Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 04/20] grub: add a fix for CVE-2020-25647 Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 05/20] ghostscript: fix CVE-2021-45949 Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 06/20] expat: fix CVE-2022-23852 Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 07/20] expat: add missing Upstream-status, CVE tag and sign-off to CVE-2021-46143.patch Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 08/20] util-linux: Fix for CVE-2021-3995 and CVE-2021-3996 Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 09/20] binutils: Backport Include members in the variable table used when resolving DW_AT_specification tags Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 10/20] sstate: A third fix for for touching files inside pseudo Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 11/20] common-licenses: add Spencer-94 Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 12/20] lsof: correct LICENSE Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 13/20] tzdata: Remove BSD License specifier Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 14/20] e2fsprogs: Use specific BSD license variant Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 15/20] glib-2.0: " Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 16/20] shadow: " Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 17/20] shadow-sysroot: sync license with shadow Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 18/20] libcap: Use specific BSD license variant Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 19/20] linux-firmware: Add CLM blob to linux-firmware-bcm4373 package Steve Sakoman
2022-02-03 19:50 ` [OE-core][dunfell 20/20] libusb1: correct SRC_URI Steve Sakoman
-- strict thread matches above, loose matches on Subject: below --
2022-02-21 14:13 [OE-core][dunfell 00/20] Patch review Steve Sakoman
2020-11-06 14:35 Steve Sakoman
2020-07-17 14:37 Steve Sakoman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1643917717.git.steve@sakoman.com \
--to=steve@sakoman.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox