[meta-filesystems][dunfell][PATCH 0/8] Multiple CVE Fixes


Ranjitsinh Rathod
 

There are following unpatched CVEs that fixing them individually
would be a much bigger problem than just doing the update.

Fixed CVE's:
CVE-2021-33285
CVE-2021-33289
CVE-2021-33286
CVE-2021-35266
CVE-2021-33287
CVE-2021-35267
CVE-2021-35268
CVE-2021-35269
CVE-2021-39251
CVE-2021-39252
CVE-2021-39253
CVE-2021-39254
CVE-2021-39255
CVE-2021-39256
CVE-2021-39257
CVE-2021-39258
CVE-2021-39259
CVE-2021-39260
CVE-2021-39261
CVE-2021-39262
CVE-2021-39263

CVE-2022-30783
CVE-2022-30784
CVE-2022-30785
CVE-2022-30786
CVE-2022-30787
CVE-2022-30788
CVE-2022-30789

Chen Qi (1):
ntfs-3g-ntfsprogs: upgrade to 2021.8.22

Omkar Patil (7):
ntfs-3g-ntfsprogs: Fix CVE-2021-46790
ntfs-3g-ntfsprogs: Fix CVE-2022-30783
ntfs-3g-ntfsprogs: Fix CVE-2022-30784
ntfs-3g-ntfsprogs: Add Patch For Multiple CVE
ntfs-3g-ntfsprogs: Fix CVE-2022-30786
ntfs-3g-ntfsprogs: Fix CVE-2022-30788
ntfs-3g-ntfsprogs: Fix CVE-2022-30789

.../ntfs-3g-ntfsprogs/CVE-2021-46790.patch | 31 ++++++++
.../ntfs-3g-ntfsprogs/CVE-2022-30783.patch | 75 +++++++++++++++++++
.../ntfs-3g-ntfsprogs/CVE-2022-30784.patch | 74 ++++++++++++++++++
.../CVE-2022-30785_30787.patch | 32 ++++++++
.../ntfs-3g-ntfsprogs/CVE-2022-30786-1.patch | 36 +++++++++
.../ntfs-3g-ntfsprogs/CVE-2022-30786-2.patch | 45 +++++++++++
.../ntfs-3g-ntfsprogs/CVE-2022-30788-1.patch | 51 +++++++++++++
.../ntfs-3g-ntfsprogs/CVE-2022-30788-2.patch | 30 ++++++++
.../ntfs-3g-ntfsprogs/CVE-2022-30789.patch | 68 +++++++++++++++++
...3.23.bb => ntfs-3g-ntfsprogs_2021.8.22.bb} | 16 +++-
10 files changed, 455 insertions(+), 3 deletions(-)
create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2021-46790.patch
create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30783.patch
create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30784.patch
create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30785_30787.patch
create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30786-1.patch
create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30786-2.patch
create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30788-1.patch
create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30788-2.patch
create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30789.patch
rename meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/{ntfs-3g-ntfsprogs_2017.3.23.bb => ntfs-3g-ntfsprogs_2021.8.22.bb} (77%)

--
2.17.1

This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails.

Join openembedded-devel@lists.openembedded.org to automatically receive all group messages.