| Message ID | cover.1643078162.git.anuj.mittal@intel.com |
|---|---|
| State | Not Applicable, archived |
| Headers | show
Return-Path: <anuj.mittal@intel.com> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C2539C433F5 for <webhook@archiver.kernel.org>; Tue, 25 Jan 2022 02:38:20 +0000 (UTC) Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by mx.groups.io with SMTP id smtpd.web11.2044.1643078299603511111 for <openembedded-core@lists.openembedded.org>; Mon, 24 Jan 2022 18:38:20 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=BuZcW3Qe; spf=pass (domain: intel.com, ip: 134.134.136.31, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1643078299; x=1674614299; h=from:to:subject:date:message-id:mime-version: content-transfer-encoding; bh=g8xg32MPL4BHVuOCp4IbNEFWuaoDbIO7OArt5fo6U/k=; b=BuZcW3QeVDXHgSOE4MhPb/H9W5A6F5hKQir0HvA0inkTY164rZzwA29G SH90lquf5RJt2OOMs9ZWrFN6qECrYStfpqmhfz68XlSIU6MfrkOuadKJH ylPJtxZFZL70mpgBuVmHiRL1pZrbvAPy8+qXy5ksxSMjPRNGs24U4wE7v bPpI0+R/2VdsxlS/itjGntERQ/w6LfmOizUThI2BYMaJSVEx9An9xefSe pmOXduPg93MyPgYu8QvNyfaMoaAm2uZju9aaZXIPnXR6XknDuj9RfAQT3 H0Pv8Z2ltKV4+3pBUb9s1SV0rRENAtaOVP6btyOGIbIoiGqYbaGl4jYqU Q==; X-IronPort-AV: E=McAfee;i="6200,9189,10237"; a="306917730" X-IronPort-AV: E=Sophos;i="5.88,313,1635231600"; d="scan'208";a="306917730" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Jan 2022 18:38:19 -0800 X-IronPort-AV: E=Sophos;i="5.88,313,1635231600"; d="scan'208";a="624310867" Received: from yongyuns-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.213.129.99]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Jan 2022 18:38:16 -0800 From: Anuj Mittal <anuj.mittal@intel.com> To: openembedded-core@lists.openembedded.org Subject: [hardknott][PATCH 00/15] Pull request (cover letter only) Date: Tue, 25 Jan 2022 10:38:11 +0800 Message-Id: <cover.1643078162.git.anuj.mittal@intel.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit List-Id: <openembedded-core.lists.openembedded.org> X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for <openembedded-core@lists.openembedded.org>; Tue, 25 Jan 2022 02:38:20 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160908 |
The following changes since commit 7e569186820163d731cbb14f8c25ce6a2cc45dc9: python3-pyelftools: fix the override syntax (2022-01-11 10:07:36 +0800) are available in the Git repository at: git://push.openembedded.org/openembedded-core-contrib stable/hardknott-next Bruce Ashfield (5): linux-yocto/5.10: update to v5.10.89 linux-yocto/5.10/cfg: add kcov feature fragment linux-yocto/5.10: update to v5.10.90 linux-yocto/5.10: amdgpu: updates for CVE-2021-42327 linux-yocto/5.10: update to v5.10.91 Changqing Li (1): libsndfile1: fix CVE-2021-4156 Chen Qi (1): populate_sdk_base: remove unneeded dirs such as /dev Joshua Watt (1): selftest: reproducible: Set maximum report size Kevin Hao (2): arch-armv8-5a.inc: Add tune include for armv8.5a armv9a/tune: Add the support for the Neoverse N2 core Konrad Weihmann (1): cve-check: add lockfile to task Richard Purdie (1): scripts: Update to use exec_module() instead of load_module() Robert Joslyn (1): curl: Backport CVE fixes Ross Burton (1): xserver-xorg: whitelist two CVEs Sakib Sajal (1): go: upgrade 1.16.10 -> 1.16.13 meta/classes/cve-check.bbclass | 1 + meta/classes/populate_sdk_base.bbclass | 11 +- .../machine/include/arm/arch-armv8-5a.inc | 19 + .../include/arm/armv9a/tune-neoversen2.inc | 22 ++ meta/lib/oeqa/selftest/cases/reproducible.py | 10 +- .../go/{go-1.16.10.inc => go-1.16.13.inc} | 4 +- ...1.16.10.bb => go-binary-native_1.16.13.bb} | 4 +- ....16.10.bb => go-cross-canadian_1.16.13.bb} | 0 ...o-cross_1.16.10.bb => go-cross_1.16.13.bb} | 0 ...ssdk_1.16.10.bb => go-crosssdk_1.16.13.bb} | 0 ...native_1.16.10.bb => go-native_1.16.13.bb} | 0 ...ntime_1.16.10.bb => go-runtime_1.16.13.bb} | 0 .../go/{go_1.16.10.bb => go_1.16.13.bb} | 0 .../xorg-xserver/xserver-xorg.inc | 8 + .../linux/linux-yocto-rt_5.10.bb | 6 +- .../linux/linux-yocto-tiny_5.10.bb | 8 +- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +- .../libsndfile1/CVE-2021-4156.patch | 32 ++ .../libsndfile/libsndfile1_1.0.28.bb | 1 + .../curl/curl/CVE-2021-22945.patch | 35 ++ .../curl/curl/CVE-2021-22946.patch | 333 ++++++++++++++++ .../curl/curl/CVE-2021-22947.patch | 357 ++++++++++++++++++ meta/recipes-support/curl/curl_7.75.0.bb | 8 + scripts/lib/scriptutils.py | 7 +- scripts/lib/wic/pluginbase.py | 8 +- 25 files changed, 867 insertions(+), 31 deletions(-) create mode 100644 meta/conf/machine/include/arm/arch-armv8-5a.inc create mode 100644 meta/conf/machine/include/arm/armv9a/tune-neoversen2.inc rename meta/recipes-devtools/go/{go-1.16.10.inc => go-1.16.13.inc} (91%) rename meta/recipes-devtools/go/{go-binary-native_1.16.10.bb => go-binary-native_1.16.13.bb} (83%) rename meta/recipes-devtools/go/{go-cross-canadian_1.16.10.bb => go-cross-canadian_1.16.13.bb} (100%) rename meta/recipes-devtools/go/{go-cross_1.16.10.bb => go-cross_1.16.13.bb} (100%) rename meta/recipes-devtools/go/{go-crosssdk_1.16.10.bb => go-crosssdk_1.16.13.bb} (100%) rename meta/recipes-devtools/go/{go-native_1.16.10.bb => go-native_1.16.13.bb} (100%) rename meta/recipes-devtools/go/{go-runtime_1.16.10.bb => go-runtime_1.16.13.bb} (100%) rename meta/recipes-devtools/go/{go_1.16.10.bb => go_1.16.13.bb} (100%) create mode 100644 meta/recipes-multimedia/libsndfile/libsndfile1/CVE-2021-4156.patch create mode 100644 meta/recipes-support/curl/curl/CVE-2021-22945.patch create mode 100644 meta/recipes-support/curl/curl/CVE-2021-22946.patch create mode 100644 meta/recipes-support/curl/curl/CVE-2021-22947.patch