From: Steve Sakoman <steve@sakoman.com>
To: openembedded-core@lists.openembedded.org
Subject: [OE-core][dunfell 00/13] Pull request (cover letter only)
Date: Tue, 20 Dec 2022 16:32:19 -1000 [thread overview]
Message-ID: <cover.1671589894.git.steve@sakoman.com> (raw)
The following changes since commit e44f0cda8176186d42a752631810c1cb5f1971eb:
kernel.bbclass: make KERNEL_DEBUG_TIMESTAMPS work at rebuild (2022-12-06 07:52:17 -1000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/dunfell-next
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/dunfell-next
Alexey Smirnov (1):
classes: make TOOLCHAIN more permissive for kernel
Chen Qi (1):
psplash: consider the situation of psplash not exist for systemd
Harald Seiler (1):
opkg: Set correct info_dir and status_file in opkg.conf
Hitendra Prajapati (3):
libarchive: CVE-2022-36227 NULL pointer dereference in archive_write.c
sysstat: fix CVE-2022-39377
golang: CVE-2022-41715 regexp/syntax: limit memory used by parsing
regexps
Lee Chee Yang (1):
dropbear: fix CVE-2021-36369
Mathieu Dubois-Briand (1):
curl: Fix CVE CVE-2022-35260
Minjae Kim (1):
xserver-xorg: backport fixes for CVE-2022-3550, CVE-2022-3551 and
CVE-2022-3553
Pawan Badganchi (1):
python3: Fix CVE-2022-37454
Qiu, Zheng (1):
vim: upgrade 9.0.0820 -> 9.0.0947
Richard Purdie (1):
oeqa/selftest/tinfoil: Add test for separate config_data with
recipe_parse_file()
Riyaz Khan (1):
rpm: Fix rpm CVE CVE-2021-3521
meta/classes/kernel-arch.bbclass | 2 +-
meta/lib/oeqa/selftest/cases/tinfoil.py | 14 +
meta/recipes-core/dropbear/dropbear.inc | 1 +
.../dropbear/dropbear/CVE-2021-36369.patch | 145 ++++++++
.../psplash/files/psplash-start.service | 1 +
.../psplash/files/psplash-systemd.service | 1 +
meta/recipes-devtools/go/go-1.14.inc | 1 +
.../go/go-1.14/CVE-2022-41715.patch | 271 ++++++++++++++
meta/recipes-devtools/opkg/opkg_0.4.2.bb | 4 +-
.../python/python3/CVE-2022-37454.patch | 105 ++++++
.../recipes-devtools/python/python3_3.8.14.bb | 1 +
.../rpm/files/CVE-2021-3521-01.patch | 60 ++++
.../rpm/files/CVE-2021-3521-02.patch | 55 +++
.../rpm/files/CVE-2021-3521-03.patch | 34 ++
.../rpm/files/CVE-2021-3521.patch | 330 ++++++++++++++++++
meta/recipes-devtools/rpm/rpm_4.14.2.1.bb | 4 +
.../libarchive/CVE-2022-36227.patch | 43 +++
.../libarchive/libarchive_3.4.2.bb | 1 +
.../sysstat/sysstat/CVE-2022-39377.patch | 92 +++++
.../sysstat/sysstat_12.2.1.bb | 4 +-
.../xserver-xorg/CVE-2022-3550.patch | 40 +++
.../xserver-xorg/CVE-2022-3551.patch | 64 ++++
.../xserver-xorg/CVE-2022-3553.patch | 49 +++
.../xorg-xserver/xserver-xorg_1.20.14.bb | 3 +
.../curl/curl/CVE-2022-35260.patch | 68 ++++
meta/recipes-support/curl/curl_7.69.1.bb | 1 +
meta/recipes-support/vim/vim.inc | 4 +-
27 files changed, 1393 insertions(+), 5 deletions(-)
create mode 100644 meta/recipes-core/dropbear/dropbear/CVE-2021-36369.patch
create mode 100644 meta/recipes-devtools/go/go-1.14/CVE-2022-41715.patch
create mode 100644 meta/recipes-devtools/python/python3/CVE-2022-37454.patch
create mode 100644 meta/recipes-devtools/rpm/files/CVE-2021-3521-01.patch
create mode 100644 meta/recipes-devtools/rpm/files/CVE-2021-3521-02.patch
create mode 100644 meta/recipes-devtools/rpm/files/CVE-2021-3521-03.patch
create mode 100644 meta/recipes-devtools/rpm/files/CVE-2021-3521.patch
create mode 100644 meta/recipes-extended/libarchive/libarchive/CVE-2022-36227.patch
create mode 100644 meta/recipes-extended/sysstat/sysstat/CVE-2022-39377.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2022-3550.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2022-3551.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2022-3553.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2022-35260.patch
--
2.25.1
next reply other threads:[~2022-12-21 2:32 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-12-21 2:32 Steve Sakoman [this message]
-- strict thread matches above, loose matches on Subject: below --
2022-03-23 22:28 [OE-core][dunfell 00/13] Pull request (cover letter only) Steve Sakoman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1671589894.git.steve@sakoman.com \
--to=steve@sakoman.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox