public inbox for openembedded-core@lists.openembedded.org
 help / color / mirror / Atom feed
From: Steve Sakoman <steve@sakoman.com>
To: openembedded-core@lists.openembedded.org
Subject: [OE-core][kirkstone 00/22] Patch review
Date: Tue, 25 Feb 2025 06:29:35 -0800	[thread overview]
Message-ID: <cover.1740493685.git.steve@sakoman.com> (raw)

Please review this set of hcanges for kirkstone and have comments back by
end of day Thursday, February 27

Passed a-full on autobuilder:

https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/1076

The following changes since commit 573f5b2d8fec9f8a4ed17e836ef3feeb6de62e5a:

  procps: replaced one use of fputs(3) with a write(2) call (2025-02-19 06:43:20 -0800)

are available in the Git repository at:

  https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
  https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut

Archana Polampalli (5):
  gstreamer1.0-rtsp-server: fix CVE-2024-44331
  ffmpeg: fix CVE-2024-36618
  ffmpeg: fix CVE-2024-28661
  ffmpeg: fix CVE-2024-35369
  ffmpeg: fix CVE-2025-25473

Carlos Dominguez (1):
  u-boot: Fix CVE-2022-30767

Divya Chellam (1):
  vim: Upgrade 9.1.0764 -> 9.1.1043

Hitendra Prajapati (1):
  libcap: fix CVE-2025-1390

Hongxu Jia (6):
  u-boot: fix CVE-2024-57254
  u-boot: fix CVE-2024-57255
  u-boot: fix CVE-2024-57256
  u-boot: fix CVE-2024-57257
  u-boot: fix CVE-2024-57258
  u-boot: fix CVE-2024-57259

Kai Kang (2):
  Revert "ovmf: Fix CVE-2023-45237"
  Revert "ovmf: Fix CVE-2023-45236"

Peter Marko (5):
  libxml2: fix compilation of explicit child axis in pattern
  libxml2: patch CVE-2024-56171
  libxml2: patch CVE-2025-24928
  ffmpeg: ignore 5 CVEs
  ffmpeg: ignore CVE-2024-7272

Sakib Sajal (1):
  u-boot: fix CVE-2022-2347 and CVE-2022-30790

 .../u-boot/files/0001-CVE-2022-30767.patch    |   44 +
 .../u-boot/files/CVE-2022-2347_1.patch        |  129 ++
 .../u-boot/files/CVE-2022-2347_2.patch        |   66 +
 .../u-boot/files/CVE-2022-30790.patch         |  149 ++
 .../u-boot/files/CVE-2024-57254.patch         |   47 +
 .../u-boot/files/CVE-2024-57255.patch         |   53 +
 .../u-boot/files/CVE-2024-57256.patch         |   51 +
 .../u-boot/files/CVE-2024-57257.patch         |  228 +++
 .../u-boot/files/CVE-2024-57258-1.patch       |   47 +
 .../u-boot/files/CVE-2024-57258-2.patch       |   43 +
 .../u-boot/files/CVE-2024-57258-3.patch       |   40 +
 .../u-boot/files/CVE-2024-57259.patch         |   41 +
 meta/recipes-bsp/u-boot/u-boot_2022.01.bb     |   12 +
 ...x-compilation-of-explicit-child-axis.patch |   31 +
 .../libxml/libxml2/CVE-2024-56171.patch       |   42 +
 .../libxml/libxml2/CVE-2025-24928.patch       |   58 +
 meta/recipes-core/libxml/libxml2_2.9.14.bb    |    3 +
 .../ovmf/ovmf/CVE-2023-45236.patch            |  829 -----------
 .../ovmf/ovmf/CVE-2023-45237-0001.patch       |   78 -
 .../ovmf/ovmf/CVE-2023-45237-0002.patch       | 1288 -----------------
 meta/recipes-core/ovmf/ovmf_git.bb            |    3 -
 .../ffmpeg/ffmpeg/CVE-2024-28661.patch        |   40 +
 .../ffmpeg/ffmpeg/CVE-2024-35369.patch        |   38 +
 .../ffmpeg/ffmpeg/CVE-2024-36618.patch        |   36 +
 .../ffmpeg/ffmpeg/CVE-2025-25473.patch        |   36 +
 .../recipes-multimedia/ffmpeg/ffmpeg_5.0.1.bb |   27 +
 .../CVE-2024-44331.patch                      |   44 +
 .../gstreamer1.0-rtsp-server_1.20.7.bb        |    4 +-
 .../libcap/files/CVE-2025-1390.patch          |   36 +
 meta/recipes-support/libcap/libcap_2.66.bb    |    1 +
 meta/recipes-support/vim/vim.inc              |    4 +-
 31 files changed, 1347 insertions(+), 2201 deletions(-)
 create mode 100644 meta/recipes-bsp/u-boot/files/0001-CVE-2022-30767.patch
 create mode 100644 meta/recipes-bsp/u-boot/files/CVE-2022-2347_1.patch
 create mode 100644 meta/recipes-bsp/u-boot/files/CVE-2022-2347_2.patch
 create mode 100644 meta/recipes-bsp/u-boot/files/CVE-2022-30790.patch
 create mode 100644 meta/recipes-bsp/u-boot/files/CVE-2024-57254.patch
 create mode 100644 meta/recipes-bsp/u-boot/files/CVE-2024-57255.patch
 create mode 100644 meta/recipes-bsp/u-boot/files/CVE-2024-57256.patch
 create mode 100644 meta/recipes-bsp/u-boot/files/CVE-2024-57257.patch
 create mode 100644 meta/recipes-bsp/u-boot/files/CVE-2024-57258-1.patch
 create mode 100644 meta/recipes-bsp/u-boot/files/CVE-2024-57258-2.patch
 create mode 100644 meta/recipes-bsp/u-boot/files/CVE-2024-57258-3.patch
 create mode 100644 meta/recipes-bsp/u-boot/files/CVE-2024-57259.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/0001-pattern-Fix-compilation-of-explicit-child-axis.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2024-56171.patch
 create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2025-24928.patch
 delete mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45236.patch
 delete mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45237-0001.patch
 delete mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45237-0002.patch
 create mode 100644 meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-28661.patch
 create mode 100644 meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-35369.patch
 create mode 100644 meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-36618.patch
 create mode 100644 meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2025-25473.patch
 create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-rtsp-server/CVE-2024-44331.patch
 create mode 100644 meta/recipes-support/libcap/files/CVE-2025-1390.patch

-- 
2.43.0



             reply	other threads:[~2025-02-25 14:30 UTC|newest]

Thread overview: 27+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-02-25 14:29 Steve Sakoman [this message]
2025-02-25 14:29 ` [OE-core][kirkstone 01/22] u-boot: Fix CVE-2022-30767 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 02/22] u-boot: fix CVE-2022-2347 and CVE-2022-30790 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 03/22] u-boot: fix CVE-2024-57254 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 04/22] u-boot: fix CVE-2024-57255 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 05/22] u-boot: fix CVE-2024-57256 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 06/22] u-boot: fix CVE-2024-57257 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 07/22] u-boot: fix CVE-2024-57258 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 08/22] u-boot: fix CVE-2024-57259 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 09/22] Revert "ovmf: Fix CVE-2023-45237" Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 10/22] Revert "ovmf: Fix CVE-2023-45236" Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 11/22] libxml2: fix compilation of explicit child axis in pattern Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 12/22] libxml2: patch CVE-2024-56171 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 13/22] libxml2: patch CVE-2025-24928 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 14/22] libcap: fix CVE-2025-1390 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 15/22] ffmpeg: ignore 5 CVEs Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 16/22] ffmpeg: ignore CVE-2024-7272 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 17/22] gstreamer1.0-rtsp-server: fix CVE-2024-44331 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 18/22] ffmpeg: fix CVE-2024-36618 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 19/22] ffmpeg: fix CVE-2024-28661 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 20/22] ffmpeg: fix CVE-2024-35369 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 21/22] ffmpeg: fix CVE-2025-25473 Steve Sakoman
2025-02-25 14:29 ` [OE-core][kirkstone 22/22] vim: Upgrade 9.1.0764 -> 9.1.1043 Steve Sakoman
  -- strict thread matches above, loose matches on Subject: below --
2024-09-11 23:22 [OE-core][kirkstone 00/22] Patch review Steve Sakoman
2024-02-25 21:52 Steve Sakoman
2023-03-15 14:00 Steve Sakoman
2022-06-08 14:39 Steve Sakoman

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cover.1740493685.git.steve@sakoman.com \
    --to=steve@sakoman.com \
    --cc=openembedded-core@lists.openembedded.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox