Message ID | b22274d1-47d1-483f-8c4b-76dd9e5354ad@gmail.com |
---|---|
State | Accepted |
Headers | show |
Series | kirkstone merge request: Feb 8th | expand |
Merged. thanks Armin. On Thu, Feb 8, 2024 at 5:15 AM akuster808 <akuster808@gmail.com> wrote: > > Changes missed on mailing list. > > The following changes since commit ce9c0d76171ce9d07e4bcb702b750416b265562a: > > strongswan: upgrade 5.9.12 -> 5.9.13 (2024-02-05 07:37:06 -0500) > > are available in the Git repository at: > > https://git.openembedded.org/meta-openembedded kirkstone-next > > for you to fetch changes up to 8609de00952d65bb813a48c535c937324efeb18a: > > Revert "libcroco: Add fix for CVE-2020-12825" (2024-02-07 18:41:41 -0500) > > ---------------------------------------------------------------- > Archana Polampalli (2): > samba: fix CVE-2018-14628 > samba: fix CVE-2023-0922 > > Ashish Sharma (1): > postfix: Backport fix for CVE-2023-51764 > > Changqing Li (1): > linuxptp: fix do_compile error > > Hitendra Prajapati (1): > wireshark: fix CVE-2024-0208 GVCP dissector crash > > Joao Marcos Costa (1): > xscreensaver: Add osuosl backup MIRROR > > Jose Quaresma (1): > layer.conf: Add libdevmapper-native PREFERRED_RPROVIDER > > Li Wang (1): > radvd: add '--shell /sbin/nologin' to /etc/passwd > > Martin Jansa (1): > Revert "libcroco: Add fix for CVE-2020-12825" > > Narpat Mali (1): > python3-aiohttp: upgrade 3.8.5 -> 3.8.6 > > Vijay Anusuri (3): > libssh: Backport fix for CVE-2023-48795 > wireshark: Fix for CVE-2023-4511 > squid: backport Debian patch for CVE-2023-46728 and CVE-2023-46846 > > Vivek Kumbhar (1): > squid: Backport fix for CVE-2023-49285 > > Yogita Urade (1): > zabbix: fix CVE-2023-32726 and CVE-2023-32727 > > Zahir Hussain (1): > p7zip: fix CVE-2018-5996 & CVE-2016-9296 > > virendra thakur (2): > opensc: Fix CVE-2023-40660 > opensc: Fix CVE-2023-40661 > > .../recipes-connectivity/samba/samba/CVE-2018-14628-0001.patch | 147 ++++ > .../recipes-connectivity/samba/samba/CVE-2018-14628-0002.patch | 72 ++ > .../recipes-connectivity/samba/samba/CVE-2018-14628-0003.patch | 106 +++ > .../recipes-connectivity/samba/samba/CVE-2018-14628-0004.patch | 64 ++ > .../recipes-connectivity/samba/samba/CVE-2018-14628-0005.patch | 98 +++ > .../recipes-connectivity/samba/samba/CVE-2018-14628-0006.patch | 51 ++ > .../recipes-connectivity/samba/samba/CVE-2023-0922.patch | 111 +++ > meta-networking/recipes-connectivity/samba/samba_4.14.14.bb | 7 + > .../recipes-daemons/postfix/files/CVE-2023-51764-1.patch | 377 > +++++++++ > .../recipes-daemons/postfix/files/CVE-2023-51764-2.patch | 978 > +++++++++++++++++++++++ > meta-networking/recipes-daemons/postfix/postfix_3.6.7.bb | 2 + > meta-networking/recipes-daemons/radvd/radvd.inc | 2 +- > .../recipes-daemons/squid/files/CVE-2023-46728.patch | 608 > ++++++++++++++ > .../recipes-daemons/squid/files/CVE-2023-46846-pre1.patch | 1154 > +++++++++++++++++++++++++++ > .../recipes-daemons/squid/files/CVE-2023-46846.patch | 169 ++++ > .../recipes-daemons/squid/files/CVE-2023-49285.patch | 37 + > meta-networking/recipes-daemons/squid/squid_4.15.bb | 4 + > .../recipes-support/wireshark/files/CVE-2023-4511.patch | 81 ++ > .../recipes-support/wireshark/files/CVE-2024-0208.patch | 42 + > meta-networking/recipes-support/wireshark/wireshark_3.4.12.bb | 2 + > meta-oe/conf/layer.conf | 1 + > ...1-makefile-use-conditional-assignment-for-KBUILD_OUTPU.patch | 42 + > meta-oe/recipes-connectivity/linuxptp/linuxptp_3.1.1.bb | 1 + > meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2023-32726.patch | 160 ++++ > .../zabbix/zabbix/CVE-2023-32727_0001.patch | 193 > +++++ > .../zabbix/zabbix/CVE-2023-32727_0002.patch | 49 ++ > meta-oe/recipes-connectivity/zabbix/zabbix_5.4.12.bb | 3 + > meta-oe/recipes-extended/p7zip/files/CVE-2016-9296.patch | 30 + > meta-oe/recipes-extended/p7zip/files/CVE-2018-5996.patch | 228 > ++++++ > meta-oe/recipes-extended/p7zip/p7zip_16.02.bb | 2 + > meta-oe/recipes-graphics/xscreensaver/xscreensaver_6.01.bb | 2 + > meta-oe/recipes-support/libssh/libssh/CVE-2023-48795-1.patch | 385 > +++++++++ > meta-oe/recipes-support/libssh/libssh/CVE-2023-48795-2.patch | 126 +++ > meta-oe/recipes-support/libssh/libssh/CVE-2023-48795-3.patch | 47 ++ > meta-oe/recipes-support/libssh/libssh_0.8.9.bb | 3 + > meta-oe/recipes-support/opensc/opensc/CVE-2023-40660.patch | 55 ++ > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-1.patch | 47 ++ > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-2.patch | 32 + > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-3.patch | 31 + > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-4.patch | 28 + > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-5.patch | 30 + > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-6.patch | 30 + > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-7.patch | 40 + > meta-oe/recipes-support/opensc/opensc_0.22.0.bb | 8 + > .../{python3-aiohttp_3.8.5.bb => python3-aiohttp_3.8.6.bb} | 2 +- > meta/recipes-support/libcroco/libcroco/CVE-2020-12825.patch | 190 > ----- > meta/recipes-support/libcroco/libcroco_0.6.13.bb | 22 - > 47 files changed, 5685 insertions(+), 214 deletions(-) > create mode 100644 > meta-networking/recipes-connectivity/samba/samba/CVE-2018-14628-0001.patch > create mode 100644 > meta-networking/recipes-connectivity/samba/samba/CVE-2018-14628-0002.patch > create mode 100644 > meta-networking/recipes-connectivity/samba/samba/CVE-2018-14628-0003.patch > create mode 100644 > meta-networking/recipes-connectivity/samba/samba/CVE-2018-14628-0004.patch > create mode 100644 > meta-networking/recipes-connectivity/samba/samba/CVE-2018-14628-0005.patch > create mode 100644 > meta-networking/recipes-connectivity/samba/samba/CVE-2018-14628-0006.patch > create mode 100644 > meta-networking/recipes-connectivity/samba/samba/CVE-2023-0922.patch > create mode 100644 > meta-networking/recipes-daemons/postfix/files/CVE-2023-51764-1.patch > create mode 100644 > meta-networking/recipes-daemons/postfix/files/CVE-2023-51764-2.patch > create mode 100644 > meta-networking/recipes-daemons/squid/files/CVE-2023-46728.patch > create mode 100644 > meta-networking/recipes-daemons/squid/files/CVE-2023-46846-pre1.patch > create mode 100644 > meta-networking/recipes-daemons/squid/files/CVE-2023-46846.patch > create mode 100644 > meta-networking/recipes-daemons/squid/files/CVE-2023-49285.patch > create mode 100644 > meta-networking/recipes-support/wireshark/files/CVE-2023-4511.patch > create mode 100644 > meta-networking/recipes-support/wireshark/files/CVE-2024-0208.patch > create mode 100644 > meta-oe/recipes-connectivity/linuxptp/linuxptp/0001-makefile-use-conditional-assignment-for-KBUILD_OUTPU.patch > create mode 100644 > meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2023-32726.patch > create mode 100644 > meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2023-32727_0001.patch > create mode 100644 > meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2023-32727_0002.patch > create mode 100644 > meta-oe/recipes-extended/p7zip/files/CVE-2016-9296.patch > create mode 100644 > meta-oe/recipes-extended/p7zip/files/CVE-2018-5996.patch > create mode 100644 > meta-oe/recipes-support/libssh/libssh/CVE-2023-48795-1.patch > create mode 100644 > meta-oe/recipes-support/libssh/libssh/CVE-2023-48795-2.patch > create mode 100644 > meta-oe/recipes-support/libssh/libssh/CVE-2023-48795-3.patch > create mode 100644 > meta-oe/recipes-support/opensc/opensc/CVE-2023-40660.patch > create mode 100644 > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-1.patch > create mode 100644 > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-2.patch > create mode 100644 > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-3.patch > create mode 100644 > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-4.patch > create mode 100644 > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-5.patch > create mode 100644 > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-6.patch > create mode 100644 > meta-oe/recipes-support/opensc/opensc/CVE-2023-40661-7.patch > rename meta-python/recipes-devtools/python/{python3-aiohttp_3.8.5.bb > => python3-aiohttp_3.8.6.bb} (89%) > delete mode 100644 > meta/recipes-support/libcroco/libcroco/CVE-2020-12825.patch > delete mode 100644 meta/recipes-support/libcroco/libcroco_0.6.13.bb >