| Message ID | cover.1670423873.git.steve@sakoman.com |
|---|---|
| State | Not Applicable, archived |
| Headers | show
Return-Path: <steve@sakoman.com>
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
aws-us-west-2-korg-lkml-1.web.codeaurora.org
Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org
(localhost.localdomain [127.0.0.1])
by smtp.lore.kernel.org (Postfix) with ESMTP id DD56EC4708E
for <webhook@archiver.kernel.org>; Wed, 7 Dec 2022 14:39:01 +0000 (UTC)
Received: from mail-pg1-f176.google.com (mail-pg1-f176.google.com
[209.85.215.176])
by mx.groups.io with SMTP id smtpd.web11.16801.1670423931531454470
for <openembedded-core@lists.openembedded.org>;
Wed, 07 Dec 2022 06:38:51 -0800
Authentication-Results: mx.groups.io;
dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112
header.b=F2TVGUKO;
spf=softfail (domain: sakoman.com, ip: 209.85.215.176,
mailfrom: steve@sakoman.com)
Received: by mail-pg1-f176.google.com with SMTP id v3so16558265pgh.4
for <openembedded-core@lists.openembedded.org>;
Wed, 07 Dec 2022 06:38:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=sakoman-com.20210112.gappssmtp.com; s=20210112;
h=content-transfer-encoding:mime-version:message-id:date:subject:to
:from:from:to:cc:subject:date:message-id:reply-to;
bh=rEXqxolTw7Cnfe3whU1XeVfZDDQGw3nlrchixt51VGo=;
b=F2TVGUKOAR3fTjTZ6yXnsLoTLuW9ABWmMPy4elWmffp0Fj6y5K1/P0T9JzqZwUZ8+K
dGtDH4cB/CktuYv/0Vn11tJb50RuuYKhT87rE1NtuTtJ1NkFizHm1AmOGEIR4G/MWtt4
+pVOlfoeQIZXBYxEX7sUnE1KtzmGNXdRAB7mmozEpQG7IPTzGi0i+hw4/ODLqz84fziT
AGFIwdxizj0P4fdJJa6EdkIhrpEXXv23v6m/L0iZnX1bp0WMvTZyTsp89uxJJUPK6DpD
e6DoUERjskC1jhQ70660njef93/dHfe3Y/L2ABeqvf39TFjtdooHIOvLjp+4iqlDsAhj
pUwA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=content-transfer-encoding:mime-version:message-id:date:subject:to
:from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
bh=rEXqxolTw7Cnfe3whU1XeVfZDDQGw3nlrchixt51VGo=;
b=6D1GJn3feHsP8/JpdKImmHyFd7em47gK0XBEcw65QvdJwpcUnlIPbLBaTZe3n6fQB6
Xz9J0vB1iJjH+5pARVksSFyOyf/oRXn4f7122BtD0IAh9zPTzrreHETWLrpkxfRWkjlO
rbuWffXhcMczabKtU+4XeObprq5QxsBRF0z37wHTUV1xkwTVEv6vlch6t3SK19vh2nn9
7/AP8N9EEM43/FNVBbwSB7jbtpo73F/DEoHJOoynSpf0yQCTGp3mTmxlItNJswNb6ltg
gixWGdQqemJr2yFdEjrYA+EqADrijKesqdjTbQtjUKvrSiR1cHFM0QmjUN+haeiWUwn8
CCKw==
X-Gm-Message-State: ANoB5pnVd3xn0TQil2lzUoO/g8SfIyRyFSz9XP1jnxnk+XCQ5zk+VCUd
yKo8COcPSfiP1s/0SJeQi26UgPICsY9sf71gNVfmGw==
X-Google-Smtp-Source:
AA0mqf5vk3a9X/SGXeaAQbf775T3ohAFlqsa4oPiQncZX3idMVqTM+HGxQHGmJnTJnot4vRiokWZlg==
X-Received: by 2002:a63:f30d:0:b0:478:e6de:c3da with SMTP id
l13-20020a63f30d000000b00478e6dec3damr6003529pgh.290.1670423929965;
Wed, 07 Dec 2022 06:38:49 -0800 (PST)
Received: from hexa.router0800d9.com (dhcp-72-253-6-214.hawaiiantel.net.
[72.253.6.214])
by smtp.gmail.com with ESMTPSA id
z65-20020a633344000000b00470275c8d6dsm11396476pgz.10.2022.12.07.06.38.48
for <openembedded-core@lists.openembedded.org>
(version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
Wed, 07 Dec 2022 06:38:49 -0800 (PST)
From: Steve Sakoman <steve@sakoman.com>
To: openembedded-core@lists.openembedded.org
Subject: [OE-core][kirkstone 00/23] Pull request (cover letter only)
Date: Wed, 7 Dec 2022 04:38:41 -1000
Message-Id: <cover.1670423873.git.steve@sakoman.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
List-Id: <openembedded-core.lists.openembedded.org>
X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by
aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for
<openembedded-core@lists.openembedded.org>; Wed, 07 Dec 2022 14:39:01 -0000
X-Groupsio-URL:
https://lists.openembedded.org/g/openembedded-core/message/174357
|
The following changes since commit 5b2ee67e3a5587b4c7d97d2a9bc00022d1eedae3: create-spdx: default share_src for shared sources (2022-11-25 08:08:10 -1000) are available in the Git repository at: https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-next http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-next Bhabu Bindu (3): curl: Fix CVE-2022-32221 curl: Fix CVE-2022-42916 curl: Fix CVE-2022-42915 Bruce Ashfield (5): linux-yocto/5.15: update to v5.15.74 linux-yocto/5.15: update to v5.15.76 linux-yocto/5.15: update to v5.15.78 linux-yocto/5.15: fix CONFIG_CRYPTO_CCM mismatch warnings kern-tools: integrate ZFS speedup patch Chee Yang Lee (1): dropbear: fix CVE-2021-36369 Chen Qi (3): kernel.bbclass: make KERNEL_DEBUG_TIMESTAMPS work at rebuild resolvconf: make it work dhcpcd: fix to work with systemd Dmitry Baryshkov (2): linux-firmware: upgrade 20221012 -> 20221109 linux-firmware: add new fw file to ${PN}-qcom-adreno-a530 Enrico Jörns (1): sstatesig: emit more helpful error message when not finding sstate manifest Martin Jansa (2): tiff: refresh with devtool tiff: add CVE tag to b258ed69a485a9cfb299d9f060eb2a46c54e5903.patch Polampalli, Archana (1): libpam: fix CVE-2022-28321 Qiu, Zheng (1): tiff: Security fix for CVE-2022-3970 Ross Burton (1): tiff: fix a number of CVEs Tim Orling (1): mirrors.bbclass: update CPAN_MIRROR Xiangyu Chen (2): grub2: backport patch to fix CVE-2022-2601 CVE-2022-3775 dbus: upgrade 1.14.0 -> 1.14.4 meta/classes/kernel.bbclass | 8 + meta/classes/mirrors.bbclass | 3 +- meta/lib/oe/sstatesig.py | 6 +- ...erflow-in-grub_font_get_glyph_intern.patch | 115 ++++ .../grub/files/CVE-2022-2601.patch | 85 +++ .../grub/files/CVE-2022-3775.patch | 95 +++ meta/recipes-bsp/grub/grub2.inc | 3 + .../dhcpcd/dhcpcd_9.4.1.bb | 1 + ...mprove-the-sitation-of-working-with-.patch | 82 +++ ...01-avoid-using-m-option-for-readlink.patch | 37 + .../resolvconf/resolvconf_1.91.bb | 9 +- ...eswap-Byte-swap-Unix-fd-indexes-if-n.patch | 76 --- ...idate-Check-brackets-in-signature-ne.patch | 119 ---- ...idate-Validate-length-of-arrays-of-f.patch | 61 -- .../dbus/{dbus_1.14.0.bb => dbus_1.14.4.bb} | 10 +- meta/recipes-core/dropbear/dropbear.inc | 4 +- .../dropbear/dropbear/CVE-2021-36369.patch | 145 ++++ .../pam/libpam/CVE-2022-28321-0002.patch | 205 ++++++ meta/recipes-extended/pam/libpam_1.5.2.bb | 1 + .../kern-tools/kern-tools-native_git.bb | 2 +- ...20221012.bb => linux-firmware_20221109.bb} | 6 +- .../linux/linux-yocto-rt_5.15.bb | 6 +- .../linux/linux-yocto-tiny_5.15.bb | 6 +- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +- ...-of-TIFFTAG_INKNAMES-and-related-TIF.patch | 266 ++++++++ ...-the-FPE-in-tiffcrop-415-427-and-428.patch | 2 +- ...rash-when-reading-a-file-with-multip.patch | 14 +- ...ue-330-and-some-more-from-320-to-349.patch | 86 ++- ...fcrop-S-option-Make-decision-simpler.patch | 36 + ...-incompatibility-of-Z-X-Y-z-options-.patch | 59 ++ ...ines-require-a-larger-buffer-fixes-2.patch | 640 ++++++++++++++++++ ...al-buffer-overflow-for-ASCII-tags-wh.patch | 13 +- ...ue-380-and-382-heap-buffer-overflow-.patch | 14 +- ...-for-return-value-of-limitMalloc-392.patch | 15 +- ...ag-avoid-calling-memcpy-with-a-null-.patch | 16 +- .../0005-fix-the-FPE-in-tiffcrop-393.patch | 15 +- ...x-heap-buffer-overflow-in-tiffcp-278.patch | 15 +- ...99c99f987dc32ae110370cfdd7df7975586b.patch | 9 +- .../libtiff/tiff/CVE-2022-1354.patch | 8 +- .../libtiff/tiff/CVE-2022-1355.patch | 8 +- .../libtiff/tiff/CVE-2022-2867.patch | 2 +- .../libtiff/tiff/CVE-2022-2869.patch | 2 +- .../libtiff/tiff/CVE-2022-2953.patch | 30 +- .../libtiff/tiff/CVE-2022-34526.patch | 6 +- .../libtiff/tiff/CVE-2022-3970.patch | 38 ++ ...ed69a485a9cfb299d9f060eb2a46c54e5903.patch | 7 +- ...0712f4c3a5b449f70c57988260a667ddbdef.patch | 9 +- meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 6 +- .../curl/curl/CVE-2022-32221.patch | 28 + .../curl/curl/CVE-2022-42915.patch | 53 ++ .../curl/curl/CVE-2022-42916.patch | 136 ++++ meta/recipes-support/curl/curl_7.82.0.bb | 3 + 52 files changed, 2203 insertions(+), 444 deletions(-) create mode 100644 meta/recipes-bsp/grub/files/0001-font-Fix-size-overflow-in-grub_font_get_glyph_intern.patch create mode 100644 meta/recipes-bsp/grub/files/CVE-2022-2601.patch create mode 100644 meta/recipes-bsp/grub/files/CVE-2022-3775.patch create mode 100644 meta/recipes-connectivity/dhcpcd/files/0001-20-resolv.conf-improve-the-sitation-of-working-with-.patch create mode 100644 meta/recipes-connectivity/resolvconf/resolvconf/0001-avoid-using-m-option-for-readlink.patch delete mode 100644 meta/recipes-core/dbus/dbus/0001-dbus-marshal-byteswap-Byte-swap-Unix-fd-indexes-if-n.patch delete mode 100644 meta/recipes-core/dbus/dbus/0001-dbus-marshal-validate-Check-brackets-in-signature-ne.patch delete mode 100644 meta/recipes-core/dbus/dbus/0001-dbus-marshal-validate-Validate-length-of-arrays-of-f.patch rename meta/recipes-core/dbus/{dbus_1.14.0.bb => dbus_1.14.4.bb} (93%) create mode 100644 meta/recipes-core/dropbear/dropbear/CVE-2021-36369.patch create mode 100644 meta/recipes-extended/pam/libpam/CVE-2022-28321-0002.patch rename meta/recipes-kernel/linux-firmware/{linux-firmware_20221012.bb => linux-firmware_20221109.bb} (99%) create mode 100644 meta/recipes-multimedia/libtiff/tiff/0001-Revised-handling-of-TIFFTAG_INKNAMES-and-related-TIF.patch create mode 100644 meta/recipes-multimedia/libtiff/tiff/0001-tiffcrop-S-option-Make-decision-simpler.patch create mode 100644 meta/recipes-multimedia/libtiff/tiff/0001-tiffcrop-disable-incompatibility-of-Z-X-Y-z-options-.patch create mode 100644 meta/recipes-multimedia/libtiff/tiff/0001-tiffcrop-subroutines-require-a-larger-buffer-fixes-2.patch create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2022-3970.patch create mode 100644 meta/recipes-support/curl/curl/CVE-2022-32221.patch create mode 100644 meta/recipes-support/curl/curl/CVE-2022-42915.patch create mode 100644 meta/recipes-support/curl/curl/CVE-2022-42916.patch