mbox

[kirkstone,00/22] Patch review

Message ID cover.1726096839.git.steve@sakoman.com
State Not Applicable
Delegated to: Steve Sakoman
Headers show

Pull-request

https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut

Message

Steve Sakoman Sept. 11, 2024, 11:22 p.m. UTC
Please review this set of changes for kirkstone and have comments back by
end of day Friday, September 13

Passed a-full on autobuilder:

https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/7324

The following changes since commit c40a3fec49942ac6d25ba33e57e801a550e252c9:

  build-appliance-image: Update to kirkstone head revision (2024-09-07 05:39:34 -0700)

are available in the Git repository at:

  https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
  https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut

Alexandre Belloni (1):
  cve-exclusion: Drop the version comparision/warning

Archana Polampalli (3):
  expat: fix CVE-2024-45490
  expat: fix CVE-2024-45491
  expat: fix CVE-2024-45492

Bruce Ashfield (6):
  linux-yocto/5.10: update to v5.10.216
  linux-yocto/5.10: remove obsolete options
  linux-yocto/5.10: update to v5.10.223
  linux-yocto/5.10: fix NFSV3 config warning
  linux-yocto/5.15: update to v5.15.165
  linux-yocto/5.15: update to v5.15.166

Hitendra Prajapati (1):
  python3: fix CVE-2023-27043

Hugo SIMELIERE (1):
  python3: CVE-2024-6232 CVE-2024-7592 fixes

Niko Mauno (6):
  iw: Fix LICENSE
  dejagnu: Fix LICENSE
  unzip: Fix LICENSE
  zip: Fix LICENSE
  tiff: Fix LICENSE
  gcr: Fix LICENSE

Richard Purdie (2):
  ruby: Make docs generation deterministic
  libedit: Make docs generation deterministic

Siddharth Doshi (1):
  openssl: Upgrade 3.0.14 -> 3.0.15

Vijay Anusuri (1):
  qemu: Backport fix for CVE-2024-4467

 meta/recipes-connectivity/iw/iw_5.16.bb       |    2 +-
 .../openssl/openssl/CVE-2024-5535_1.patch     |  115 --
 .../openssl/openssl/CVE-2024-5535_2.patch     |   44 -
 .../openssl/openssl/CVE-2024-5535_3.patch     |   84 --
 .../openssl/openssl/CVE-2024-5535_4.patch     |  178 ---
 .../openssl/openssl/CVE-2024-5535_5.patch     | 1175 -----------------
 .../openssl/openssl/CVE-2024-5535_6.patch     |   45 -
 .../openssl/openssl/CVE-2024-5535_7.patch     |   68 -
 .../openssl/openssl/CVE-2024-5535_8.patch     |  273 ----
 .../openssl/openssl/CVE-2024-5535_9.patch     |  205 ---
 .../{openssl_3.0.14.bb => openssl_3.0.15.bb}  |   13 +-
 .../expat/expat/CVE-2024-45490-0001.patch     |   35 +
 .../expat/expat/CVE-2024-45490-0002.patch     |  250 ++++
 .../expat/expat/CVE-2024-45490-0003.patch     |   91 ++
 .../expat/expat/CVE-2024-45490-0004.patch     |   49 +
 .../expat/expat/CVE-2024-45491.patch          |   39 +
 .../expat/expat/CVE-2024-45492.patch          |   38 +
 meta/recipes-core/expat/expat_2.5.0.bb        |    6 +
 .../recipes-devtools/dejagnu/dejagnu_1.6.3.bb |    2 +-
 .../libedit/libedit_20210910-3.1.bb           |    7 +
 .../python/python3/CVE-2023-27043.patch       |  510 +++++++
 .../python/python3/CVE-2024-6232.patch        |  251 ++++
 .../python/python3/CVE-2024-7592.patch        |  140 ++
 .../python/python3_3.10.14.bb                 |    3 +
 meta/recipes-devtools/qemu/qemu.inc           |    5 +
 .../qemu/qemu/CVE-2024-4467-0001.patch        |  214 +++
 .../qemu/qemu/CVE-2024-4467-0002.patch        |   73 +
 .../qemu/qemu/CVE-2024-4467-0003.patch        |   76 ++
 .../qemu/qemu/CVE-2024-4467-0004.patch        |  571 ++++++++
 .../qemu/qemu/CVE-2024-4467-0005.patch        |  265 ++++
 meta/recipes-devtools/ruby/ruby_3.1.3.bb      |    1 +
 meta/recipes-extended/unzip/unzip_6.0.bb      |    2 +-
 meta/recipes-extended/zip/zip_3.0.bb          |    2 +-
 meta/recipes-gnome/gcr/gcr_3.40.0.bb          |    2 +-
 .../linux/cve-exclusion_5.10.inc              |   14 +-
 .../linux/cve-exclusion_5.15.inc              |   14 +-
 .../linux/linux-yocto-rt_5.10.bb              |    6 +-
 .../linux/linux-yocto-rt_5.15.bb              |    6 +-
 .../linux/linux-yocto-tiny_5.10.bb            |    8 +-
 .../linux/linux-yocto-tiny_5.15.bb            |    6 +-
 meta/recipes-kernel/linux/linux-yocto_5.10.bb |   24 +-
 meta/recipes-kernel/linux/linux-yocto_5.15.bb |   26 +-
 meta/recipes-multimedia/libtiff/tiff_4.3.0.bb |    2 +-
 43 files changed, 2684 insertions(+), 2256 deletions(-)
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_1.patch
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_2.patch
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_3.patch
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_4.patch
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_5.patch
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_6.patch
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_7.patch
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_8.patch
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-5535_9.patch
 rename meta/recipes-connectivity/openssl/{openssl_3.0.14.bb => openssl_3.0.15.bb} (94%)
 create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45490-0001.patch
 create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45490-0002.patch
 create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45490-0003.patch
 create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45490-0004.patch
 create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45491.patch
 create mode 100644 meta/recipes-core/expat/expat/CVE-2024-45492.patch
 create mode 100644 meta/recipes-devtools/python/python3/CVE-2023-27043.patch
 create mode 100644 meta/recipes-devtools/python/python3/CVE-2024-6232.patch
 create mode 100644 meta/recipes-devtools/python/python3/CVE-2024-7592.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-4467-0001.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-4467-0002.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-4467-0003.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-4467-0004.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-4467-0005.patch