From patchwork Fri Feb 4 14:12:26 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Mittal, Anuj" X-Patchwork-Id: 3291 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 67256C433F5 for ; Fri, 4 Feb 2022 14:12:54 +0000 (UTC) Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mx.groups.io with SMTP id smtpd.web08.9481.1643983972820228964 for ; Fri, 04 Feb 2022 06:12:53 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=PgZ17m6t; spf=pass (domain: intel.com, ip: 134.134.136.65, mailfrom: anuj.mittal@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1643983972; x=1675519972; h=from:to:subject:date:message-id:mime-version: content-transfer-encoding; bh=72Ls0GTTEgBFUOvwloWoajktOMWzU7C89DfxXSsIpdc=; b=PgZ17m6tAUe3ILoGDQCon5vrIOOuBXhGuPe1GKXqYn3VZWd/ncuqBQQG HmW6NNVQf4ljeYiJDYRD4ZFxt2weEVJH15seJdfZhHXCDyrCGqctK6iCr PJggahjzqbHeiP6vEP+DKH9IyajNFfl2xtAAfSiXGm99cZDOrvmgwKbC3 15bwyj4oZA47B4I+1O8ruMEtJENWkrCfTJuNNdqXDVWluKknBTN6wXaCz Q4ZfsMvGxhBe9d99mfXfMQVgf1vAqg88GmByga5a89c3QCUIgyTijSeLI 4nazkT76R+KCUpmmn0wfZarfpi6FsYuyGzccCDweOe97Q9qaGCiKc1yxk w==; X-IronPort-AV: E=McAfee;i="6200,9189,10247"; a="248321583" X-IronPort-AV: E=Sophos;i="5.88,342,1635231600"; d="scan'208";a="248321583" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Feb 2022 06:12:51 -0800 X-IronPort-AV: E=Sophos;i="5.88,342,1635231600"; d="scan'208";a="566749983" Received: from raajloka-mobl.gar.corp.intel.com (HELO anmitta2-mobl3.intel.com) ([10.215.235.116]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Feb 2022 06:12:50 -0800 From: Anuj Mittal To: openembedded-core@lists.openembedded.org Subject: [honister][PATCH 00/17] Patch review Date: Fri, 4 Feb 2022 22:12:26 +0800 Message-Id: X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 04 Feb 2022 14:12:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/161347 Next set of changes for honister. Please review. No problems seen while testing. https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/3185 Thanks, Anuj The following changes since commit 2d3c5b078feb34cb729902292d2805c9288ebc4c: glibc : Fix CVE-2022-23219 (2022-01-25 11:11:18 +0800) are available in the Git repository at: git://push.openembedded.org/openembedded-core-contrib anujm/honister Alexander Kanavin (1): libusb1: correct SRC_URI Bruce Ashfield (3): kernel: introduce python3-dtschema-wrapper linux-yocto/5.10: update to v5.10.92 linux-yocto/5.10: update to v5.10.93 Carlos Rafael Giani (1): libxml2: Backport python3-lxml workaround patch Kory Maincent (1): icu: fix make_icudata dependencies Peter Kjellerstedt (2): sstate: A third fix for for touching files inside pseudo insane.bbclass: Correct package_qa_check_empty_dirs() Pgowda (2): glibc : Fix CVE-2021-3998 glibc : Fix CVE-2021-3999 Richard Purdie (1): sstate: Improve failure to obtain archive message/handling Ross Burton (5): tiff: backport fix for CVE-2022-22844 yocto-check-layer: add debug output for the layers that were found expat: upgrade to 2.4.4 vim: upgrade to patch 4269 core-image-sato-sdk: allocate more memory when in qemu Rudolf J Streif (1): linux-firmware: Add CLM blob to linux-firmware-bcm4373 package meta/classes/insane.bbclass | 2 +- meta/classes/sstate.bbclass | 18 +- meta/conf/distro/include/maintainers.inc | 1 + .../expat/{expat_2.4.3.bb => expat_2.4.4.bb} | 2 +- .../glibc/glibc/0001-CVE-2021-3998.patch | 282 ++++++++++++++ .../glibc/glibc/0001-CVE-2021-3999.patch | 36 ++ .../glibc/glibc/0002-CVE-2021-3998.patch | 138 +++++++ .../glibc/glibc/0002-CVE-2021-3999.patch | 357 ++++++++++++++++++ meta/recipes-core/glibc/glibc_2.34.bb | 4 + .../0002-Work-around-lxml-API-abuse.patch | 213 +++++++++++ meta/recipes-core/libxml/libxml2_2.9.12.bb | 1 + .../python3-dtschema-wrapper/dt-doc-validate | 20 + .../dtc/python3-dtschema-wrapper/dt-mk-schema | 20 + .../dtc/python3-dtschema-wrapper/dt-validate | 20 + .../dtc/python3-dtschema-wrapper_2021.10.bb | 17 + .../linux-firmware/linux-firmware_20211216.bb | 1 + .../linux/linux-yocto-rt_5.10.bb | 6 +- .../linux/linux-yocto-tiny_5.10.bb | 8 +- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +- ...al-buffer-overflow-for-ASCII-tags-wh.patch | 43 +++ meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 3 +- .../images/core-image-sato-sdk.bb | 3 + meta/recipes-support/icu/icu_69.1.bb | 2 +- meta/recipes-support/libusb/libusb1_1.0.24.bb | 6 +- meta/recipes-support/vim/vim.inc | 4 +- scripts/yocto-check-layer | 13 + 26 files changed, 1211 insertions(+), 33 deletions(-) rename meta/recipes-core/expat/{expat_2.4.3.bb => expat_2.4.4.bb} (91%) create mode 100644 meta/recipes-core/glibc/glibc/0001-CVE-2021-3998.patch create mode 100644 meta/recipes-core/glibc/glibc/0001-CVE-2021-3999.patch create mode 100644 meta/recipes-core/glibc/glibc/0002-CVE-2021-3998.patch create mode 100644 meta/recipes-core/glibc/glibc/0002-CVE-2021-3999.patch create mode 100644 meta/recipes-core/libxml/libxml2/0002-Work-around-lxml-API-abuse.patch create mode 100644 meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-doc-validate create mode 100644 meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-mk-schema create mode 100644 meta/recipes-kernel/dtc/python3-dtschema-wrapper/dt-validate create mode 100644 meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb create mode 100644 meta/recipes-multimedia/libtiff/files/0001-tiffset-fix-global-buffer-overflow-for-ASCII-tags-wh.patch