From patchwork Thu Jan 13 15:04:19 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 2391 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D79E4C433EF for ; Thu, 13 Jan 2022 15:05:17 +0000 (UTC) Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by mx.groups.io with SMTP id smtpd.web09.9947.1642086316003212986 for ; Thu, 13 Jan 2022 07:05:16 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=JYRElN/x; spf=pass (domain: intel.com, ip: 134.134.136.24, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642086316; x=1673622316; h=from:to:subject:date:message-id:mime-version: content-transfer-encoding; bh=EkxaRWZC7tusdMkdUaNpEhqqnAVxaufDd8yFtau80uM=; b=JYRElN/xrSnDjhXHu1gNa48rlHNPb0kPYjhRjyvRWVHWXPRyLyOht4K6 u/xfhYEVjdYlzb+5Szps7lE007qlQahc7XDq7Ecdjoy22ZvhsZ1FixDai eCjl3Wnl3FbLR6ZMD4gTyI4Qnhzclk/Xoeo+SuhAvS4rJIJ/ax87hLNxP ugs+tmKuoZQSwxJ4HXU+vKRDfzbUFr1gDUoSZ2hlvVwbzIQoyDz2lMO1I kDA3SN63vg8bI00LAUVWy4evsadOBqGb9aJOijsll0ayVn2xdyPUhahit pyxzX3I84S8Pn49FEk7Nn2XRSsZ/pB4N4hCYMqfK3aANLQsb3rnqXA7gQ g==; X-IronPort-AV: E=McAfee;i="6200,9189,10225"; a="243822795" X-IronPort-AV: E=Sophos;i="5.88,286,1635231600"; d="scan'208";a="243822795" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Jan 2022 07:04:27 -0800 X-IronPort-AV: E=Sophos;i="5.88,286,1635231600"; d="scan'208";a="515956288" Received: from siewchin-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.213.140.90]) by orsmga007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Jan 2022 07:04:26 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [hardknott][PATCH 0/9] Pull request (cover letter only) Date: Thu, 13 Jan 2022 23:04:19 +0800 Message-Id: X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 13 Jan 2022 15:05:17 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/160523 The following changes since commit b90dab2c8634c052c101cebb38fcd3d869f3b1bb: linux-yocto: add libmpc-native to DEPENDS (2022-01-10 11:57:23 +0000) are available in the Git repository at: git://push.openembedded.org/openembedded-core-contrib stable/hardknott-next Alexander Kanavin (1): lib/oe/reproducible: correctly set .git location when recursively looking for git repos Anuj Mittal (1): python3-pyelftools: fix the override syntax Chen Qi (1): busybox: backport patches to fix CVEs Kai Kang (1): webkitgtk: fix fix CVE-2021-42762 Pgowda (2): glibc: Backport fix for CVE-2021-43396 gcc: add support for Neoverse N2 CPU Yongxin Liu (1): grub2: fix CVE-2021-3981 pgowda (2): gcc: add aarch64 support for Arm's Neoverse N2 CPU gcc: Fix CVE-2021-42574 meta/lib/oe/reproducible.py | 2 +- ...onfig-Restore-umask-for-the-grub.cfg.patch | 49 + meta/recipes-bsp/grub/grub2.inc | 1 + .../busybox/busybox/0001-awk-fix-CVEs.patch | 3266 +++++++++++++++++ .../0002-man-fix-segfault-in-man-1.patch | 30 + meta/recipes-core/busybox/busybox_1.33.2.bb | 2 + .../glibc/glibc/0031-CVE-2021-43396.patch | 182 + meta/recipes-core/glibc/glibc_2.33.bb | 1 + meta/recipes-devtools/gcc/gcc-10.2.inc | 7 + .../gcc/gcc/0001-CVE-2021-42574.patch | 2906 +++++++++++++++ .../gcc/gcc/0002-CVE-2021-42574.patch | 2270 ++++++++++++ .../gcc/gcc/0003-CVE-2021-42574.patch | 1724 +++++++++ .../gcc/gcc/0004-CVE-2021-42574.patch | 138 + .../gcc/gcc/0005-CVE-2021-42574.patch | 575 +++ .../gcc/0038-arm-neoverse-n2-support.patch | 88 + .../gcc/0039-arm64-neoverse-n2-support.patch | 60 + .../python/python3-pyelftools_0.27.bb | 2 +- .../webkit/webkitgtk/CVE-2021-42762.patch | 468 +++ meta/recipes-sato/webkit/webkitgtk_2.30.5.bb | 1 + 19 files changed, 11770 insertions(+), 2 deletions(-) create mode 100644 meta/recipes-bsp/grub/files/CVE-2021-3981-grub-mkconfig-Restore-umask-for-the-grub.cfg.patch create mode 100644 meta/recipes-core/busybox/busybox/0001-awk-fix-CVEs.patch create mode 100644 meta/recipes-core/busybox/busybox/0002-man-fix-segfault-in-man-1.patch create mode 100644 meta/recipes-core/glibc/glibc/0031-CVE-2021-43396.patch create mode 100644 meta/recipes-devtools/gcc/gcc/0001-CVE-2021-42574.patch create mode 100644 meta/recipes-devtools/gcc/gcc/0002-CVE-2021-42574.patch create mode 100644 meta/recipes-devtools/gcc/gcc/0003-CVE-2021-42574.patch create mode 100644 meta/recipes-devtools/gcc/gcc/0004-CVE-2021-42574.patch create mode 100644 meta/recipes-devtools/gcc/gcc/0005-CVE-2021-42574.patch create mode 100644 meta/recipes-devtools/gcc/gcc/0038-arm-neoverse-n2-support.patch create mode 100644 meta/recipes-devtools/gcc/gcc/0039-arm64-neoverse-n2-support.patch create mode 100644 meta/recipes-sato/webkit/webkitgtk/CVE-2021-42762.patch