From: Steve Sakoman <steve@sakoman.com>
To: openembedded-core@lists.openembedded.org
Subject: [OE-core][kirkstone 00/19] Patch review
Date: Tue, 7 Jan 2025 10:08:18 -0800 [thread overview]
Message-ID: <cover.1736273200.git.steve@sakoman.com> (raw)
Please review this set of changes for kirkstone and have comments back by
end of day Thursday, January 9
Passed a-full on autobuilder:
https://valkyrie.yoctoproject.org/#/builders/29/builds/758
The following changes since commit fb9ebc811800eb8880e3687243d75bafab77a700:
ovmf-native: remove .pyc files from install (2025-01-06 05:56:49 -0800)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Bruce Ashfield (10):
linux-yocto/5.15: update to v5.15.167
linux-yocto/5.10: update to v5.10.226
linux-yocto/5.10: update to v5.10.227
linux-yocto/5.15: update to v5.15.168
linux-yocto/5.15: update to v5.15.169
linux-yocto/5.15: update to v5.15.170
linux-yocto/5.15: update to v5.15.171
linux-yocto/5.15: update to v5.15.173
linux-yocto/5.15: update to v5.15.174
linux-yocto/5.15: update to v5.15.175
Vijay Anusuri (9):
gstreamer1.0-plugins-base: Fix for multiple CVE's
gstreamer1.0: Backport fix for CVE-2024-47606
gstreamer1.0-plugins-good: fix several CVE's
gstreamer1.0-plugins-good: Fix for CVE-2024-47599
gstreamer1.0-plugins-good: Fix multiple CVEs
gstreamer1.0-plugins-good: Fix CVE-2024-47606
gstreamer1.0-plugins-good: Fix CVE-2024-47613
gstreamer1.0-plugins-good: Fix CVE-2024-47774
gstreamer1.0-plugins-good: Fix multiple CVE's
.../linux/linux-yocto-rt_5.10.bb | 6 +-
.../linux/linux-yocto-rt_5.15.bb | 6 +-
.../linux/linux-yocto-tiny_5.10.bb | 8 +-
.../linux/linux-yocto-tiny_5.15.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +-
meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +-
.../CVE-2024-47538.patch | 35 ++
.../CVE-2024-47541-1.patch | 38 ++
.../CVE-2024-47541-2.patch | 99 ++++
.../CVE-2024-47542.patch | 64 +++
.../CVE-2024-47600.patch | 38 ++
.../CVE-2024-47607.patch | 41 ++
.../CVE-2024-47615-1.patch | 79 +++
.../CVE-2024-47615-2.patch | 168 +++++++
.../CVE-2024-47835.patch | 39 ++
.../gstreamer1.0-plugins-base_1.20.7.bb | 9 +
...7544_47545_47546_47596_47597_47598-1.patch | 64 +++
...544_47545_47546_47596_47597_47598-10.patch | 97 ++++
...544_47545_47546_47596_47597_47598-11.patch | 36 ++
...544_47545_47546_47596_47597_47598-12.patch | 37 ++
...7544_47545_47546_47596_47597_47598-2.patch | 73 +++
...7544_47545_47546_47596_47597_47598-3.patch | 36 ++
...7544_47545_47546_47596_47597_47598-4.patch | 63 +++
...7544_47545_47546_47596_47597_47598-5.patch | 44 ++
...7544_47545_47546_47596_47597_47598-6.patch | 120 +++++
...7544_47545_47546_47596_47597_47598-7.patch | 449 ++++++++++++++++++
...7544_47545_47546_47596_47597_47598-8.patch | 56 +++
...7544_47545_47546_47596_47597_47598-9.patch | 49 ++
...4_47545_47546_47596_47597_47598-pre1.patch | 127 +++++
...2024-47540_47601_47602_47603_47834-1.patch | 56 +++
...2024-47540_47601_47602_47603_47834-2.patch | 31 ++
...2024-47540_47601_47602_47603_47834-3.patch | 39 ++
...2024-47540_47601_47602_47603_47834-4.patch | 47 ++
...2024-47540_47601_47602_47603_47834-5.patch | 48 ++
...2024-47540_47601_47602_47603_47834-6.patch | 39 ++
...2024-47540_47601_47602_47603_47834-7.patch | 40 ++
.../CVE-2024-47599.patch | 99 ++++
.../CVE-2024-47606.patch | 44 ++
.../CVE-2024-47613.patch | 53 +++
.../CVE-2024-47774.patch | 46 ++
.../CVE-2024-47775_47776_47777_47778-1.patch | 171 +++++++
.../CVE-2024-47775_47776_47777_47778-2.patch | 38 ++
.../CVE-2024-47775_47776_47777_47778-3.patch | 62 +++
.../CVE-2024-47775_47776_47777_47778-4.patch | 34 ++
.../CVE-2024-47775_47776_47777_47778-5.patch | 37 ++
.../CVE-2024-47775_47776_47777_47778-6.patch | 44 ++
.../CVE-2024-47775_47776_47777_47778-7.patch | 38 ++
.../gstreamer1.0-plugins-good_1.20.7.bb | 31 ++
.../gstreamer1.0/CVE-2024-47606.patch | 56 +++
.../gstreamer/gstreamer1.0_1.20.7.bb | 1 +
50 files changed, 2953 insertions(+), 38 deletions(-)
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base/CVE-2024-47538.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base/CVE-2024-47541-1.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base/CVE-2024-47541-2.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base/CVE-2024-47542.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base/CVE-2024-47600.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base/CVE-2024-47607.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base/CVE-2024-47615-1.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base/CVE-2024-47615-2.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base/CVE-2024-47835.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-1.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-10.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-11.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-12.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-2.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-3.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-4.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-5.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-6.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-7.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-8.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-9.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47537_47539_47543_47544_47545_47546_47596_47597_47598-pre1.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47540_47601_47602_47603_47834-1.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47540_47601_47602_47603_47834-2.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47540_47601_47602_47603_47834-3.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47540_47601_47602_47603_47834-4.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47540_47601_47602_47603_47834-5.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47540_47601_47602_47603_47834-6.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47540_47601_47602_47603_47834-7.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47599.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47606.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47613.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47774.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47775_47776_47777_47778-1.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47775_47776_47777_47778-2.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47775_47776_47777_47778-3.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47775_47776_47777_47778-4.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47775_47776_47777_47778-5.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47775_47776_47777_47778-6.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good/CVE-2024-47775_47776_47777_47778-7.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0/CVE-2024-47606.patch
--
2.43.0
next reply other threads:[~2025-01-07 18:08 UTC|newest]
Thread overview: 27+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-01-07 18:08 Steve Sakoman [this message]
2025-01-07 18:08 ` [OE-core][kirkstone 01/19] gstreamer1.0-plugins-base: Fix for multiple CVE's Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 02/19] gstreamer1.0: Backport fix for CVE-2024-47606 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 03/19] gstreamer1.0-plugins-good: fix several CVE's Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 04/19] gstreamer1.0-plugins-good: Fix for CVE-2024-47599 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 05/19] gstreamer1.0-plugins-good: Fix multiple CVEs Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 06/19] gstreamer1.0-plugins-good: Fix CVE-2024-47606 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 07/19] gstreamer1.0-plugins-good: Fix CVE-2024-47613 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 08/19] gstreamer1.0-plugins-good: Fix CVE-2024-47774 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 09/19] gstreamer1.0-plugins-good: Fix multiple CVE's Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 10/19] linux-yocto/5.15: update to v5.15.167 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 11/19] linux-yocto/5.10: update to v5.10.226 Steve Sakoman
2025-01-07 18:24 ` Patchtest results for " patchtest
2025-01-07 18:08 ` [OE-core][kirkstone 12/19] linux-yocto/5.10: update to v5.10.227 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 13/19] linux-yocto/5.15: update to v5.15.168 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 14/19] linux-yocto/5.15: update to v5.15.169 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 15/19] linux-yocto/5.15: update to v5.15.170 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 16/19] linux-yocto/5.15: update to v5.15.171 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 17/19] linux-yocto/5.15: update to v5.15.173 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 18/19] linux-yocto/5.15: update to v5.15.174 Steve Sakoman
2025-01-07 18:08 ` [OE-core][kirkstone 19/19] linux-yocto/5.15: update to v5.15.175 Steve Sakoman
-- strict thread matches above, loose matches on Subject: below --
2024-11-22 21:26 [OE-core][kirkstone 00/19] Patch review Steve Sakoman
2024-11-13 3:15 Steve Sakoman
2024-10-29 18:59 Steve Sakoman
2022-12-18 16:12 Steve Sakoman
2022-08-31 14:39 Steve Sakoman
2022-05-25 14:29 Steve Sakoman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1736273200.git.steve@sakoman.com \
--to=steve@sakoman.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox