|
[PATCH 2/2] subversion: upgrade to 1.14.2
This release is primarily to fix two CVEs:
- CVE-2021-28544
- CVE-2022-24070
It also rewrites the macOS autoconf macros to be cross-compile friendly,
so we don't need to delete them
This release is primarily to fix two CVEs:
- CVE-2021-28544
- CVE-2022-24070
It also rewrites the macOS autoconf macros to be cross-compile friendly,
so we don't need to delete them
|
By
Ross Burton
·
#164819
·
|
|
[PATCH 1/2] e2fsprogs: fix CVE-2022-1304
Backport a submitted patch to fix CVE-2022-1304.
Signed-off-by: Ross Burton <ross.burton@...>
---
.../e2fsprogs/e2fsprogs/extents.patch | 56 +++++++++++++++++++
Backport a submitted patch to fix CVE-2022-1304.
Signed-off-by: Ross Burton <ross.burton@...>
---
.../e2fsprogs/e2fsprogs/extents.patch | 56 +++++++++++++++++++
|
By
Ross Burton
·
#164818
·
|
|
Re: [PATCH v2] bluez5: Add fix for startup issues under systemd
Patches to update it very welcome!
Cheers,
Richard
Patches to update it very welcome!
Cheers,
Richard
|
By
Richard Purdie
·
#164817
·
|
|
Re: [yocto] QA notification for completed autobuilder build (yocto-3.3.6.rc1)
Hello everyone,
This is the full report for yocto-3.3.6.rc1:
https://git.yoctoproject.org/cgit/cgit.cgi/yocto-testresults-contrib/tree/?h=intel-yocto-testresults
======= Summary ========
No high
Hello everyone,
This is the full report for yocto-3.3.6.rc1:
https://git.yoctoproject.org/cgit/cgit.cgi/yocto-testresults-contrib/tree/?h=intel-yocto-testresults
======= Summary ========
No high
|
By
Teoh, Jay Shen
·
#164816
·
|
|
[PATCH] e2fsprogs: fix CVE-2022-1304
Backport a submitted patch to fix CVE-2022-1304.
Signed-off-by: Ross Burton <ross.burton@...>
---
.../e2fsprogs/e2fsprogs/extents.patch | 56 +++++++++++++++++++
Backport a submitted patch to fix CVE-2022-1304.
Signed-off-by: Ross Burton <ross.burton@...>
---
.../e2fsprogs/e2fsprogs/extents.patch | 56 +++++++++++++++++++
|
By
Ross Burton
·
#164815
·
|
|
[PATCH] rust: update 1.59.0 -> 1.60.0
Rust has been upgraded to rust-1.60.0 that uses LLVM 14.
Please refer the following link for more detailed
Rust has been upgraded to rust-1.60.0 that uses LLVM 14.
Please refer the following link for more detailed
|
By
Pgowda
·
#164814
·
|
|
Re: [PATCH v2] bluez5: Add fix for startup issues under systemd
Hi Richard,
should I update your patch or only the Upstream-Status or will you prefer to do it yourself?
Regards
Stefan
Am 14.04.2022 um 22:52 schrieb Richard Purdie via lists.openembedded.org:
Hi Richard,
should I update your patch or only the Upstream-Status or will you prefer to do it yourself?
Regards
Stefan
Am 14.04.2022 um 22:52 schrieb Richard Purdie via lists.openembedded.org:
|
By
Stefan Herbrechtsmeier
·
#164813
·
|
|
[hardknott][PATCH] bluez5: Fix CVE-2022-0204
From: Mingli Yu <mingli.yu@...>
Backport patch [1] to fix CVE-2022-0204.
[1]
From: Mingli Yu <mingli.yu@...>
Backport patch [1] to fix CVE-2022-0204.
[1]
|
By
Yu, Mingli
·
#164812
·
|
|
[hardknott][PATCH] bind: Upgrade to 9.16.28
From: Mingli Yu <mingli.yu@...>
* The 9.16 branch will be limited to bug fixes [1] now and upgrade to the
latest 9.16.x release to fix some security fixes.
- CVE-2021-25219
-
From: Mingli Yu <mingli.yu@...>
* The 9.16 branch will be limited to bug fixes [1] now and upgrade to the
latest 9.16.x release to fix some security fixes.
- CVE-2021-25219
-
|
By
Yu, Mingli
·
#164811
·
|
|
Git and pseudo
Recently GIT got updated with a security fix:
https://github.blog/2022-04-12-git-security-vulnerability-announced/
The problem is that this causes all "git" tasks that run within pseudo (most
Recently GIT got updated with a security fix:
https://github.blog/2022-04-12-git-security-vulnerability-announced/
The problem is that this causes all "git" tasks that run within pseudo (most
|
By
Mike Looijmans
·
#164810
·
|
|
Re: [master][kirkstone] lua: fix CVE-2022-28805
Hi Steve,
Can you please cherry-pick this on the dunfell branch as well for this Lua CVE? or should I send a patch for this?
Ranjitsinh Rathod
Hi Steve,
Can you please cherry-pick this on the dunfell branch as well for this Lua CVE? or should I send a patch for this?
Ranjitsinh Rathod
|
By
Ranjitsinh Rathod
·
#164809
·
|
|
[PATCH] busybox: Use base_bindir instead of hardcoding /bin path
This symlink is not valid when using usrmerge and ptest packaging would fail
Exception: FileExistsError: [Errno 17] File exists: '/usr/bin/busybox.suid' ->
This symlink is not valid when using usrmerge and ptest packaging would fail
Exception: FileExistsError: [Errno 17] File exists: '/usr/bin/busybox.suid' ->
|
By
Khem Raj
·
#164808
·
|
|
OE-core CVE metrics for honister on Sun 24 Apr 2022 03:30:01 AM HST
Branch: honister
New this week: 4 CVEs
CVE-2015-20107 (CVSS3: 9.8 CRITICAL): python3:python3-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-20107 *
CVE-2021-28544 (CVSS3: 4.3
Branch: honister
New this week: 4 CVEs
CVE-2015-20107 (CVSS3: 9.8 CRITICAL): python3:python3-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-20107 *
CVE-2021-28544 (CVSS3: 4.3
|
By
Steve Sakoman
·
#164807
·
|
|
OE-core CVE metrics for hardknott on Sun 24 Apr 2022 03:00:01 AM HST
Branch: hardknott
New this week: 4 CVEs
CVE-2015-20107 (CVSS3: 9.8 CRITICAL): python3:python3-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-20107 *
CVE-2021-28544 (CVSS3: 4.3
Branch: hardknott
New this week: 4 CVEs
CVE-2015-20107 (CVSS3: 9.8 CRITICAL): python3:python3-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-20107 *
CVE-2021-28544 (CVSS3: 4.3
|
By
Steve Sakoman
·
#164806
·
|
|
OE-core CVE metrics for dunfell on Sun 24 Apr 2022 02:30:01 AM HST
Branch: dunfell
New this week: 3 CVEs
CVE-2015-20107 (CVSS3: 9.8 CRITICAL): python3:python3-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-20107 *
CVE-2021-28544 (CVSS3: 4.3
Branch: dunfell
New this week: 3 CVEs
CVE-2015-20107 (CVSS3: 9.8 CRITICAL): python3:python3-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-20107 *
CVE-2021-28544 (CVSS3: 4.3
|
By
Steve Sakoman
·
#164805
·
|
|
OE-core CVE metrics for master on Sun 24 Apr 2022 02:00:01 AM HST
Branch: master
New this week: 4 CVEs
CVE-2015-20107 (CVSS3: 9.8 CRITICAL): python3:python3-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-20107 *
CVE-2021-28544 (CVSS3: 4.3 MEDIUM):
Branch: master
New this week: 4 CVEs
CVE-2015-20107 (CVSS3: 9.8 CRITICAL): python3:python3-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-20107 *
CVE-2021-28544 (CVSS3: 4.3 MEDIUM):
|
By
Steve Sakoman
·
#164804
·
|
|
[PATCH] qemu.bbclass: Extend ppc/ppc64 extra options
Some recipes are marked machine specific which need qemu usermode during
build eg. if they use meson build system, which means they wont get
right -cpu settings to run qemu-ppc/qemu-ppc64 and build
Some recipes are marked machine specific which need qemu usermode during
build eg. if they use meson build system, which means they wont get
right -cpu settings to run qemu-ppc/qemu-ppc64 and build
|
By
Khem Raj
·
#164803
·
|
|
[hardknott][PATCH V2] libsdl2: fix CVE-2021-33657
From: Changqing Li <changqing.li@...>
Signed-off-by: Changqing Li <changqing.li@...>
---
.../libsdl2/libsdl2/CVE-2021-33657.patch | 39 +++++++++++++++++++
From: Changqing Li <changqing.li@...>
Signed-off-by: Changqing Li <changqing.li@...>
---
.../libsdl2/libsdl2/CVE-2021-33657.patch | 39 +++++++++++++++++++
|
By
Changqing Li
·
#164802
·
|
|
[PATCH] glibc: Update to latest 2.35 tip
Brings in below changes
* 499a601796 Default to --with-default-link=no (bug 25812)
* 70f1eecdc1 scripts: Add glibcelf.py module
* d3feff2232 m68k: Handle fewer relocations for RTLD_BOOTSTRAP
Brings in below changes
* 499a601796 Default to --with-default-link=no (bug 25812)
* 70f1eecdc1 scripts: Add glibcelf.py module
* d3feff2232 m68k: Handle fewer relocations for RTLD_BOOTSTRAP
|
By
Khem Raj
·
#164801
·
|
|
[dunfell 0/9] Pull request (cover letter only)
The following changes since commit 8fd5133fc7f6bc84193ec6fcbc1746c59bfc8caf:
libxshmfence: Correct LICENSE to HPND (2022-04-18 12:13:17 -1000)
are available in the Git repository at:
The following changes since commit 8fd5133fc7f6bc84193ec6fcbc1746c59bfc8caf:
libxshmfence: Correct LICENSE to HPND (2022-04-18 12:13:17 -1000)
are available in the Git repository at:
|
By
Steve Sakoman
·
#164800
·
|