From: Anuj Mittal <anuj.mittal@intel.com>
To: openembedded-core@lists.openembedded.org
Subject: [hardknott][PATCH 00/17] Patch review
Date: Thu, 27 Jan 2022 13:09:53 +0800 [thread overview]
Message-ID: <cover.1643259953.git.anuj.mittal@intel.com> (raw)
Next set of changes for hardknott. Please review. No problems seen while
testing on autobuilder except for an intermittent ptest failure in
lttng-tools.
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/3160
Thanks,
Anuj
The following changes since commit 155c238d340fdc82420ba9f367cb23014c78b705:
cve-check: add lockfile to task (2022-01-17 10:37:09 +0800)
are available in the Git repository at:
git://push.openembedded.org/openembedded-core-contrib anujm/hardknott
Bruce Ashfield (4):
linux-yocto/5.4: update to v5.4.169
linux-yocto/5.4: update to v5.4.170
linux-yocto/5.4: update to v5.4.171
linux-yocto/5.4: update to v5.4.172
Changqing Li (1):
pigz: fix one failure of command "unpigz -l"
Jagadeesh Krishnanjanappa (1):
tune-cortexa72: remove crypto for the default cortex-a72
Kai Kang (1):
speex: fix CVE-2020-23903
Kevin Hao (2):
tune-cortexa72: Enable the crc extension by default for cortexa72
tune-cortexa72: Drop the redundant cortexa72-crc tune
Mingli Yu (1):
socat: update SRC_URI
Pgowda (2):
binutils: upgrade binutils-2.36 to latest version
gcc: upgrade to gcc-10.3 version
Ross Burton (1):
lighttpd: backport a fix for CVE-2022-22707
Steve Sakoman (3):
expat fix CVE-2022-22822 through CVE-2022-22827
expat: fix CVE-2021-45960
expat: fix CVE-2021-46143
pgowda (1):
glibc: upgrade glibc-2.33 to latest version
meta/conf/distro/include/maintainers.inc | 2 +-
meta/conf/machine/include/tune-cortexa72.inc | 12 +-
.../socat/socat_1.7.4.1.bb | 2 +-
.../expat/expat/CVE-2021-45960.patch | 65 ++
.../expat/expat/CVE-2021-46143.patch | 43 ++
.../expat/expat/CVE-2022-22822-27.patch | 257 +++++++
meta/recipes-core/expat/expat_2.2.10.bb | 3 +
meta/recipes-core/glibc/glibc-version.inc | 2 +-
.../glibc/glibc/0031-CVE-2021-43396.patch | 182 -----
meta/recipes-core/glibc/glibc_2.33.bb | 1 -
.../binutils/binutils-2.36.inc | 5 +-
.../binutils/0001-CVE-2021-20197.patch | 201 ------
.../binutils/0001-CVE-2021-42574.patch | 4 +-
.../binutils/0002-CVE-2021-20197.patch | 170 -----
.../binutils/0003-CVE-2021-20197.patch | 171 -----
.../gcc/{gcc-10.2.inc => gcc-10.3.inc} | 12 +-
...ian_10.2.bb => gcc-cross-canadian_10.3.bb} | 0
.../{gcc-cross_10.2.bb => gcc-cross_10.3.bb} | 0
...-crosssdk_10.2.bb => gcc-crosssdk_10.3.bb} | 0
...cc-runtime_10.2.bb => gcc-runtime_10.3.bb} | 0
...itizers_10.2.bb => gcc-sanitizers_10.3.bb} | 0
...{gcc-source_10.2.bb => gcc-source_10.3.bb} | 0
.../gcc/gcc/0001-CVE-2021-35465.patch | 22 +-
...-up-__aarch64_cas16_acq_rel-fallback.patch | 66 --
...ight-Line-Speculation-SLS-mitigation.patch | 202 ------
...e-SLS-mitigation-for-RET-and-BR-inst.patch | 607 ----------------
...h64-Mitigate-SLS-for-BLR-instruction.patch | 658 ------------------
...gcc-Fix-argument-list-too-long-error.patch | 5 +-
...Re-introduce-spe-commandline-options.patch | 2 +-
...ngw32-Enable-operation_not_supported.patch | 4 +-
.../gcc/0038-arm-neoverse-n2-support.patch | 88 ---
.../gcc/0039-arm64-neoverse-n2-support.patch | 60 --
.../gcc/{gcc_10.2.bb => gcc_10.3.bb} | 0
...initial_10.2.bb => libgcc-initial_10.3.bb} | 0
.../gcc/{libgcc_10.2.bb => libgcc_10.3.bb} | 0
...ibgfortran_10.2.bb => libgfortran_10.3.bb} | 0
...ix-out-of-bounds-OOB-write-fixes-313.patch | 97 +++
.../lighttpd/lighttpd_1.4.59.bb | 1 +
...0001-Fix-bug-when-combining-l-with-d.patch | 50 ++
meta/recipes-extended/pigz/pigz_2.6.bb | 3 +-
.../linux/linux-yocto-rt_5.4.bb | 6 +-
.../linux/linux-yocto-tiny_5.4.bb | 8 +-
meta/recipes-kernel/linux/linux-yocto_5.4.bb | 22 +-
.../speex/speex/CVE-2020-23903.patch | 30 +
meta/recipes-multimedia/speex/speex_1.2.0.bb | 4 +-
45 files changed, 602 insertions(+), 2465 deletions(-)
create mode 100644 meta/recipes-core/expat/expat/CVE-2021-45960.patch
create mode 100644 meta/recipes-core/expat/expat/CVE-2021-46143.patch
create mode 100644 meta/recipes-core/expat/expat/CVE-2022-22822-27.patch
delete mode 100644 meta/recipes-core/glibc/glibc/0031-CVE-2021-43396.patch
delete mode 100644 meta/recipes-devtools/binutils/binutils/0001-CVE-2021-20197.patch
delete mode 100644 meta/recipes-devtools/binutils/binutils/0002-CVE-2021-20197.patch
delete mode 100644 meta/recipes-devtools/binutils/binutils/0003-CVE-2021-20197.patch
rename meta/recipes-devtools/gcc/{gcc-10.2.inc => gcc-10.3.inc} (90%)
rename meta/recipes-devtools/gcc/{gcc-cross-canadian_10.2.bb => gcc-cross-canadian_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-cross_10.2.bb => gcc-cross_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-crosssdk_10.2.bb => gcc-crosssdk_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-runtime_10.2.bb => gcc-runtime_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-sanitizers_10.2.bb => gcc-sanitizers_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-source_10.2.bb => gcc-source_10.3.bb} (100%)
delete mode 100644 meta/recipes-devtools/gcc/gcc/0001-aarch64-Fix-up-__aarch64_cas16_acq_rel-fallback.patch
delete mode 100644 meta/recipes-devtools/gcc/gcc/0001-aarch64-New-Straight-Line-Speculation-SLS-mitigation.patch
delete mode 100644 meta/recipes-devtools/gcc/gcc/0002-aarch64-Introduce-SLS-mitigation-for-RET-and-BR-inst.patch
delete mode 100644 meta/recipes-devtools/gcc/gcc/0003-aarch64-Mitigate-SLS-for-BLR-instruction.patch
delete mode 100644 meta/recipes-devtools/gcc/gcc/0038-arm-neoverse-n2-support.patch
delete mode 100644 meta/recipes-devtools/gcc/gcc/0039-arm64-neoverse-n2-support.patch
rename meta/recipes-devtools/gcc/{gcc_10.2.bb => gcc_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{libgcc-initial_10.2.bb => libgcc-initial_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{libgcc_10.2.bb => libgcc_10.3.bb} (100%)
rename meta/recipes-devtools/gcc/{libgfortran_10.2.bb => libgfortran_10.3.bb} (100%)
create mode 100644 meta/recipes-extended/lighttpd/lighttpd/0001-mod_extforward-fix-out-of-bounds-OOB-write-fixes-313.patch
create mode 100644 meta/recipes-extended/pigz/files/0001-Fix-bug-when-combining-l-with-d.patch
create mode 100644 meta/recipes-multimedia/speex/speex/CVE-2020-23903.patch
--
2.34.1
next reply other threads:[~2022-01-27 5:10 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-01-27 5:09 Anuj Mittal [this message]
2022-01-27 5:09 ` [hardknott][PATCH 01/17] tune-cortexa72: remove crypto for the default cortex-a72 Anuj Mittal
2022-01-27 5:09 ` [hardknott][PATCH 02/17] tune-cortexa72: Enable the crc extension by default for cortexa72 Anuj Mittal
2022-01-27 5:09 ` [hardknott][PATCH 03/17] tune-cortexa72: Drop the redundant cortexa72-crc tune Anuj Mittal
2022-01-27 5:09 ` [hardknott][PATCH 04/17] socat: update SRC_URI Anuj Mittal
2022-01-27 5:09 ` [hardknott][PATCH 05/17] pigz: fix one failure of command "unpigz -l" Anuj Mittal
2022-01-27 5:09 ` [hardknott][PATCH 06/17] binutils: upgrade binutils-2.36 to latest version Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 07/17] gcc: upgrade to gcc-10.3 version Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 08/17] glibc: upgrade glibc-2.33 to latest version Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 09/17] linux-yocto/5.4: update to v5.4.169 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 10/17] linux-yocto/5.4: update to v5.4.170 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 11/17] linux-yocto/5.4: update to v5.4.171 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 12/17] linux-yocto/5.4: update to v5.4.172 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 13/17] expat fix CVE-2022-22822 through CVE-2022-22827 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 14/17] expat: fix CVE-2021-45960 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 15/17] expat: fix CVE-2021-46143 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 16/17] speex: fix CVE-2020-23903 Anuj Mittal
2022-01-27 5:10 ` [hardknott][PATCH 17/17] lighttpd: backport a fix for CVE-2022-22707 Anuj Mittal
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1643259953.git.anuj.mittal@intel.com \
--to=anuj.mittal@intel.com \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.