From: Steve Sakoman <steve@sakoman.com>
To: openembedded-core@lists.openembedded.org
Subject: [OE-core][dunfell 0/8] Patch review
Date: Fri, 26 Jan 2024 04:20:33 -1000 [thread overview]
Message-ID: <cover.1706278642.git.steve@sakoman.com> (raw)
Please review this set of changes for dunfell and have comments back by
end of day Tuesday, January 30
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/6495
The following changes since commit 82e67bd9c77f0c5cbb652ca91071b9e57bdcfb33:
build-appliance-image: Update to dunfell head revision (2024-01-22 03:34:05 -1000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/dunfell-nut
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/dunfell-nut
Khem Raj (1):
systemtap: Fix build with gcc-12
Ranjitsinh Rathod (1):
openssh: Fix CVE-2023-51385
Vijay Anusuri (5):
sqlite3: Backport fix for CVE-2023-7104
gnutls: Backport fix for CVE-2023-5981
gnutls: Backport fix for CVE-2024-0553
pam: Fix for CVE-2024-22365
xserver-xorg: Multiple CVE fixes
virendra thakur (1):
opkg: Fix bad memory access error observe in file_read_line_alloc
.../openssh/openssh/CVE-2023-51385.patch | 95 ++++++++
.../openssh/openssh_8.2p1.bb | 1 +
...possible-bad-memory-access-in-file_r.patch | 50 ++++
meta/recipes-devtools/opkg/opkg_0.4.2.bb | 1 +
.../pam/libpam/CVE-2024-22365.patch | 59 +++++
meta/recipes-extended/pam/libpam_1.3.1.bb | 1 +
.../xserver-xorg/CVE-2023-6816.patch | 55 +++++
.../xserver-xorg/CVE-2024-0229-1.patch | 87 +++++++
.../xserver-xorg/CVE-2024-0229-2.patch | 221 ++++++++++++++++++
.../xserver-xorg/CVE-2024-0229-3.patch | 41 ++++
.../xserver-xorg/CVE-2024-0229-4.patch | 45 ++++
.../xserver-xorg/CVE-2024-0408.patch | 64 +++++
.../xserver-xorg/CVE-2024-0409.patch | 46 ++++
.../xserver-xorg/CVE-2024-21885.patch | 113 +++++++++
.../xserver-xorg/CVE-2024-21886-1.patch | 74 ++++++
.../xserver-xorg/CVE-2024-21886-2.patch | 57 +++++
.../xorg-xserver/xserver-xorg_1.20.14.bb | 10 +
...ility-re-tweak-for-rhel6-use-functio.patch | 49 ++++
.../recipes-kernel/systemtap/systemtap_git.bb | 4 +-
.../gnutls/gnutls/CVE-2023-5981.patch | 206 ++++++++++++++++
.../gnutls/gnutls/CVE-2024-0553.patch | 125 ++++++++++
meta/recipes-support/gnutls/gnutls_3.6.14.bb | 2 +
.../sqlite/files/CVE-2023-7104.patch | 46 ++++
meta/recipes-support/sqlite/sqlite3_3.31.1.bb | 1 +
24 files changed, 1452 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-connectivity/openssh/openssh/CVE-2023-51385.patch
create mode 100644 meta/recipes-devtools/opkg/opkg/0001-file_util.c-fix-possible-bad-memory-access-in-file_r.patch
create mode 100644 meta/recipes-extended/pam/libpam/CVE-2024-22365.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2023-6816.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2024-0229-1.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2024-0229-2.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2024-0229-3.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2024-0229-4.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2024-0408.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2024-0409.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2024-21885.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2024-21886-1.patch
create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE-2024-21886-2.patch
create mode 100644 meta/recipes-kernel/systemtap/systemtap/0001-gcc12-c-compatibility-re-tweak-for-rhel6-use-functio.patch
create mode 100644 meta/recipes-support/gnutls/gnutls/CVE-2023-5981.patch
create mode 100644 meta/recipes-support/gnutls/gnutls/CVE-2024-0553.patch
create mode 100644 meta/recipes-support/sqlite/files/CVE-2023-7104.patch
--
2.34.1
next reply other threads:[~2024-01-26 14:21 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-01-26 14:20 Steve Sakoman [this message]
2024-01-26 14:20 ` [OE-core][dunfell 1/8] openssh: Fix CVE-2023-51385 Steve Sakoman
2024-01-26 14:20 ` [OE-core][dunfell 2/8] sqlite3: Backport fix for CVE-2023-7104 Steve Sakoman
2024-01-26 14:20 ` [OE-core][dunfell 3/8] gnutls: Backport fix for CVE-2023-5981 Steve Sakoman
2024-01-26 14:20 ` [OE-core][dunfell 4/8] gnutls: Backport fix for CVE-2024-0553 Steve Sakoman
2024-01-26 14:20 ` [OE-core][dunfell 5/8] pam: Fix for CVE-2024-22365 Steve Sakoman
2024-01-26 14:20 ` [OE-core][dunfell 6/8] xserver-xorg: Multiple CVE fixes Steve Sakoman
2024-01-26 14:20 ` [OE-core][dunfell 7/8] opkg: Fix bad memory access error observe in file_read_line_alloc Steve Sakoman
2024-01-26 14:20 ` [OE-core][dunfell 8/8] systemtap: Fix build with gcc-12 Steve Sakoman
-- strict thread matches above, loose matches on Subject: below --
2023-01-11 14:34 [OE-core][dunfell 0/8] Patch review Steve Sakoman
2022-11-06 16:03 Steve Sakoman
2022-04-04 2:30 Steve Sakoman
2020-12-28 14:35 Steve Sakoman
2020-10-15 14:15 Steve Sakoman
2020-06-02 0:12 Steve Sakoman
2020-05-11 14:38 Steve Sakoman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1706278642.git.steve@sakoman.com \
--to=steve@sakoman.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox