From: Steve Sakoman <steve@sakoman.com>
To: openembedded-core@lists.openembedded.org
Subject: [OE-core][kirkstone 00/22] Patch review
Date: Wed, 11 Sep 2024 16:22:57 -0700 [thread overview]
Message-ID: <cover.1726096839.git.steve@sakoman.com> (raw)
Please review this set of changes for kirkstone and have comments back by
end of day Friday, September 13
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/7324
The following changes since commit c40a3fec49942ac6d25ba33e57e801a550e252c9:
build-appliance-image: Update to kirkstone head revision (2024-09-07 05:39:34 -0700)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Alexandre Belloni (1):
cve-exclusion: Drop the version comparision/warning
Archana Polampalli (3):
expat: fix CVE-2024-45490
expat: fix CVE-2024-45491
expat: fix CVE-2024-45492
Bruce Ashfield (6):
linux-yocto/5.10: update to v5.10.216
linux-yocto/5.10: remove obsolete options
linux-yocto/5.10: update to v5.10.223
linux-yocto/5.10: fix NFSV3 config warning
linux-yocto/5.15: update to v5.15.165
linux-yocto/5.15: update to v5.15.166
Hitendra Prajapati (1):
python3: fix CVE-2023-27043
Hugo SIMELIERE (1):
python3: CVE-2024-6232 CVE-2024-7592 fixes
Niko Mauno (6):
iw: Fix LICENSE
dejagnu: Fix LICENSE
unzip: Fix LICENSE
zip: Fix LICENSE
tiff: Fix LICENSE
gcr: Fix LICENSE
Richard Purdie (2):
ruby: Make docs generation deterministic
libedit: Make docs generation deterministic
Siddharth Doshi (1):
openssl: Upgrade 3.0.14 -> 3.0.15
Vijay Anusuri (1):
qemu: Backport fix for CVE-2024-4467
meta/recipes-connectivity/iw/iw_5.16.bb | 2 +-
.../openssl/openssl/CVE-2024-5535_1.patch | 115 --
.../openssl/openssl/CVE-2024-5535_2.patch | 44 -
.../openssl/openssl/CVE-2024-5535_3.patch | 84 --
.../openssl/openssl/CVE-2024-5535_4.patch | 178 ---
.../openssl/openssl/CVE-2024-5535_5.patch | 1175 -----------------
.../openssl/openssl/CVE-2024-5535_6.patch | 45 -
.../openssl/openssl/CVE-2024-5535_7.patch | 68 -
.../openssl/openssl/CVE-2024-5535_8.patch | 273 ----
.../openssl/openssl/CVE-2024-5535_9.patch | 205 ---
.../{openssl_3.0.14.bb => openssl_3.0.15.bb} | 13 +-
.../expat/expat/CVE-2024-45490-0001.patch | 35 +
.../expat/expat/CVE-2024-45490-0002.patch | 250 ++++
.../expat/expat/CVE-2024-45490-0003.patch | 91 ++
.../expat/expat/CVE-2024-45490-0004.patch | 49 +
.../expat/expat/CVE-2024-45491.patch | 39 +
.../expat/expat/CVE-2024-45492.patch | 38 +
meta/recipes-core/expat/expat_2.5.0.bb | 6 +
.../recipes-devtools/dejagnu/dejagnu_1.6.3.bb | 2 +-
.../libedit/libedit_20210910-3.1.bb | 7 +
.../python/python3/CVE-2023-27043.patch | 510 +++++++
.../python/python3/CVE-2024-6232.patch | 251 ++++
.../python/python3/CVE-2024-7592.patch | 140 ++
.../python/python3_3.10.14.bb | 3 +
meta/recipes-devtools/qemu/qemu.inc | 5 +
.../qemu/qemu/CVE-2024-4467-0001.patch | 214 +++
.../qemu/qemu/CVE-2024-4467-0002.patch | 73 +
.../qemu/qemu/CVE-2024-4467-0003.patch | 76 ++
.../qemu/qemu/CVE-2024-4467-0004.patch | 571 ++++++++
.../qemu/qemu/CVE-2024-4467-0005.patch | 265 ++++
meta/recipes-devtools/ruby/ruby_3.1.3.bb | 1 +
meta/recipes-extended/unzip/unzip_6.0.bb | 2 +-
meta/recipes-extended/zip/zip_3.0.bb | 2 +-
meta/recipes-gnome/gcr/gcr_3.40.0.bb | 2 +-
.../linux/cve-exclusion_5.10.inc | 14 +-
.../linux/cve-exclusion_5.15.inc | 14 +-
.../linux/linux-yocto-rt_5.10.bb | 6 +-
.../linux/linux-yocto-rt_5.15.bb | 6 +-
.../linux/linux-yocto-tiny_5.10.bb | 8 +-
.../linux/linux-yocto-tiny_5.15.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +-
meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +-
meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 2 +-
43 files changed, 2684 insertions(+), 2256 deletions(-)
delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_1.patch
delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_2.patch
delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_3.patch
delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_4.patch
delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_5.patch
delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_6.patch
delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_7.patch
delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_8.patch
delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_9.patch
rename meta/recipes-connectivity/openssl/{openssl_3.0.14.bb => openssl_3.0.15.bb} (94%)
create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45490-0001.patch
create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45490-0002.patch
create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45490-0003.patch
create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45490-0004.patch
create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45491.patch
create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45492.patch
create mode 100644 meta/recipes-devtools/python/python3/CVE-2023-27043.patch
create mode 100644 meta/recipes-devtools/python/python3/CVE-2024-6232.patch
create mode 100644 meta/recipes-devtools/python/python3/CVE-2024-7592.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-4467-0001.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-4467-0002.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-4467-0003.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-4467-0004.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-4467-0005.patch
--
2.34.1
next reply other threads:[~2024-09-11 23:23 UTC|newest]
Thread overview: 27+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-09-11 23:22 Steve Sakoman [this message]
2024-09-11 23:22 ` [OE-core][kirkstone 01/22] python3: CVE-2024-6232 CVE-2024-7592 fixes Steve Sakoman
2024-09-11 23:22 ` [OE-core][kirkstone 02/22] python3: fix CVE-2023-27043 Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 03/22] qemu: Backport fix for CVE-2024-4467 Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 04/22] expat: fix CVE-2024-45490 Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 05/22] expat: fix CVE-2024-45491 Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 06/22] expat: fix CVE-2024-45492 Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 07/22] openssl: Upgrade 3.0.14 -> 3.0.15 Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 08/22] linux-yocto/5.10: update to v5.10.216 Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 09/22] linux-yocto/5.10: remove obsolete options Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 10/22] linux-yocto/5.10: update to v5.10.223 Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 11/22] linux-yocto/5.10: fix NFSV3 config warning Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 12/22] linux-yocto/5.15: update to v5.15.165 Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 13/22] linux-yocto/5.15: update to v5.15.166 Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 14/22] cve-exclusion: Drop the version comparision/warning Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 15/22] iw: Fix LICENSE Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 16/22] dejagnu: " Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 17/22] unzip: " Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 18/22] zip: " Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 19/22] tiff: " Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 20/22] gcr: " Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 21/22] ruby: Make docs generation deterministic Steve Sakoman
2024-09-11 23:23 ` [OE-core][kirkstone 22/22] libedit: " Steve Sakoman
-- strict thread matches above, loose matches on Subject: below --
2025-02-25 14:29 [OE-core][kirkstone 00/22] Patch review Steve Sakoman
2024-02-25 21:52 Steve Sakoman
2023-03-15 14:00 Steve Sakoman
2022-06-08 14:39 Steve Sakoman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1726096839.git.steve@sakoman.com \
--to=steve@sakoman.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox