Message ID | f2a94bfe-2971-b281-e06c-cfe2303b846c@gmail.com |
---|---|
State | New |
Headers | show |
Series | Dunfell merge request: Dec 26th | expand |
merged thanks On Mon, Dec 26, 2022 at 11:01 AM akuster808 <akuster808@gmail.com> wrote: > > The following changes since commit 7203130ed8b58c0df75cb72222ac2bcf546bce44: > > [dunfell] wireguard: Upgrade to 1.0.20220627 (module) and > 1.0.20210914 (tools) (2022-10-30 14:47:43 -0400) > > are available in the Git repository at: > > https://git.openembedded.org/meta-openembedded dunfell-next > > for you to fetch changes up to 7952135f650b4a754e2255f5aa03973a32344123: > > postgresql: Fix CVE-2022-2625 (2022-12-11 16:01:15 -0500) > > ---------------------------------------------------------------- > Hitendra Prajapati (2): > nginx: CVE-2022-41741, CVE-2022-41742 Memory corruption in the > ngx_http_mp4_module > postgresql: Fix CVE-2022-2625 > > Ivan Stepic (1): > flatbuffers: adapt for cross-compilation environments > > Omkar Patil (1): > ntfs-3g-ntfsprogs: Upgrade 2022.5.17 to 2022.10.3 > > Ranjitsinh Rathod (1): > strongswan: Fix CVE-2022-40617 > > ...3g-ntfsprogs_2022.5.17.bb => ntfs-3g-ntfsprogs_2022.10.3.bb} | 2 +- > .../recipes-support/strongswan/files/CVE-2022-40617.patch | 210 > +++++++ > meta-networking/recipes-support/strongswan/strongswan_5.8.4.bb | 1 + > meta-oe/recipes-dbs/postgresql/files/CVE-2022-2625.patch | 904 > ++++++++++++++++++++++++++++ > meta-oe/recipes-dbs/postgresql/postgresql_12.9.bb | 1 + > meta-oe/recipes-devtools/flatbuffers/flatbuffers_1.12.0.bb | 7 +- > .../nginx/files/CVE-2022-41741-CVE-2022-41742.patch | 319 > ++++++++++ > meta-webserver/recipes-httpd/nginx/nginx_1.16.1.bb | 4 +- > 8 files changed, 1445 insertions(+), 3 deletions(-) > rename > meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/{ntfs-3g-ntfsprogs_2022.5.17.bb > => ntfs-3g-ntfsprogs_2022.10.3.bb} (95%) > create mode 100644 > meta-networking/recipes-support/strongswan/files/CVE-2022-40617.patch > create mode 100644 > meta-oe/recipes-dbs/postgresql/files/CVE-2022-2625.patch > create mode 100644 > meta-webserver/recipes-httpd/nginx/files/CVE-2022-41741-CVE-2022-41742.patch >