mbox series

kirkstone merge request: Dec 13th

Message ID 70658be6-8b04-4cfa-9682-ab87086c274e@gmail.com
State Accepted, archived
Headers show
Series kirkstone merge request: Dec 13th | expand

Pull-request

https://git.openembedded.org/meta-openembedded kirkstone-next

Message

akuster808 Dec. 13, 2023, 6:40 p.m. UTC
The following changes since commit 8a75c61cce2aa1d6e5a3597ab8fc5a7e6aeae1e4:

   nginx: upgrade to 1.24.0 release (2023-11-18 10:03:19 -0500)

are available in the Git repository at:

   https://git.openembedded.org/meta-openembedded kirkstone-next

for you to fetch changes up to 402affcc073db39f782c1ebfd718edd5f11eed4c:

   squid: fix CVE-2023-46847 Denial of Service in HTTP Digest 
Authentication (2023-12-13 13:35:51 -0500)

----------------------------------------------------------------
Archana Polampalli (1):
       samba: fix CVE-2023-4091

Christian Eggers (1):
       python3-gcovr: switch to main branch

Jasper Orschulko (1):
       nginx: Mitigate HTTP/2 Stream Resets Flood impact

Narpat Mali (1):
       frr: Fix for multiple CVE's

Poonam Jadhav (1):
       sdbus-c++: Update ptest path

Yogita Urade (1):
       postgresql: fix CVE-2023-5868 CVE-2023-5869 CVE-2023-5870

vkumbhar (1):
       squid: fix CVE-2023-46847 Denial of Service in HTTP Digest 
Authentication

  .../recipes-connectivity/samba/samba/CVE-2023-4091-0001.patch   | 193 
++++++++++++++++++
  .../recipes-connectivity/samba/samba/CVE-2023-4091-0002.patch   | 59 
++++++
  meta-networking/recipes-connectivity/samba/samba_4.14.14.bb     | 2 +
  .../recipes-daemons/squid/files/CVE-2023-46847.patch            | 47 +++++
  meta-networking/recipes-daemons/squid/squid_4.15.bb             | 1 +
  meta-networking/recipes-protocols/frr/frr/CVE-2023-38406.patch  | 42 ++++
  meta-networking/recipes-protocols/frr/frr/CVE-2023-38407.patch  | 63 
++++++
  meta-networking/recipes-protocols/frr/frr/CVE-2023-46752.patch  | 127 
++++++++++++
  meta-networking/recipes-protocols/frr/frr/CVE-2023-46753.patch  | 119 
+++++++++++
  meta-networking/recipes-protocols/frr/frr/CVE-2023-47234.patch  | 98 
++++++++++
  meta-networking/recipes-protocols/frr/frr/CVE-2023-47235.patch  | 114 
+++++++++++
  meta-networking/recipes-protocols/frr/frr_8.2.2.bb              | 6 +
  meta-oe/recipes-core/sdbus-c++/sdbus-c++_1.0.0.bb               | 7 +-
  meta-oe/recipes-dbs/postgresql/files/CVE-2023-5868.patch        | 125 
++++++++++++
  meta-oe/recipes-dbs/postgresql/files/CVE-2023-5869.patch        | 294 
++++++++++++++++++++++++++++
  meta-oe/recipes-dbs/postgresql/files/CVE-2023-5870.patch        | 108 
++++++++++
  meta-oe/recipes-dbs/postgresql/postgresql_14.9.bb               | 3 +
  meta-python/recipes-devtools/python/python3-gcovr_5.1.bb        | 2 +-
  .../files/0001-HTTP-2-per-iteration-stream-handling-limit.patch | 92 
+++++++++
  meta-webserver/recipes-httpd/nginx/nginx_1.20.1.bb              | 1 +
  meta-webserver/recipes-httpd/nginx/nginx_1.21.1.bb              | 2 +
  21 files changed, 1503 insertions(+), 2 deletions(-)
  create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2023-4091-0001.patch
  create mode 100644 
meta-networking/recipes-connectivity/samba/samba/CVE-2023-4091-0002.patch
  create mode 100644 
meta-networking/recipes-daemons/squid/files/CVE-2023-46847.patch
  create mode 100644 
meta-networking/recipes-protocols/frr/frr/CVE-2023-38406.patch
  create mode 100644 
meta-networking/recipes-protocols/frr/frr/CVE-2023-38407.patch
  create mode 100644 
meta-networking/recipes-protocols/frr/frr/CVE-2023-46752.patch
  create mode 100644 
meta-networking/recipes-protocols/frr/frr/CVE-2023-46753.patch
  create mode 100644 
meta-networking/recipes-protocols/frr/frr/CVE-2023-47234.patch
  create mode 100644 
meta-networking/recipes-protocols/frr/frr/CVE-2023-47235.patch
  create mode 100644 
meta-oe/recipes-dbs/postgresql/files/CVE-2023-5868.patch
  create mode 100644 
meta-oe/recipes-dbs/postgresql/files/CVE-2023-5869.patch
  create mode 100644 
meta-oe/recipes-dbs/postgresql/files/CVE-2023-5870.patch
  create mode 100644 
meta-webserver/recipes-httpd/nginx/files/0001-HTTP-2-per-iteration-stream-handling-limit.patch

Comments

Khem Raj Dec. 13, 2023, 6:49 p.m. UTC | #1
Applied
Thanks Armin.

On Wed, Dec 13, 2023 at 10:40 AM akuster808 <akuster808@gmail.com> wrote:
>
> The following changes since commit 8a75c61cce2aa1d6e5a3597ab8fc5a7e6aeae1e4:
>
>    nginx: upgrade to 1.24.0 release (2023-11-18 10:03:19 -0500)
>
> are available in the Git repository at:
>
>    https://git.openembedded.org/meta-openembedded kirkstone-next
>
> for you to fetch changes up to 402affcc073db39f782c1ebfd718edd5f11eed4c:
>
>    squid: fix CVE-2023-46847 Denial of Service in HTTP Digest
> Authentication (2023-12-13 13:35:51 -0500)
>
> ----------------------------------------------------------------
> Archana Polampalli (1):
>        samba: fix CVE-2023-4091
>
> Christian Eggers (1):
>        python3-gcovr: switch to main branch
>
> Jasper Orschulko (1):
>        nginx: Mitigate HTTP/2 Stream Resets Flood impact
>
> Narpat Mali (1):
>        frr: Fix for multiple CVE's
>
> Poonam Jadhav (1):
>        sdbus-c++: Update ptest path
>
> Yogita Urade (1):
>        postgresql: fix CVE-2023-5868 CVE-2023-5869 CVE-2023-5870
>
> vkumbhar (1):
>        squid: fix CVE-2023-46847 Denial of Service in HTTP Digest
> Authentication
>
>   .../recipes-connectivity/samba/samba/CVE-2023-4091-0001.patch   | 193
> ++++++++++++++++++
>   .../recipes-connectivity/samba/samba/CVE-2023-4091-0002.patch   | 59
> ++++++
>   meta-networking/recipes-connectivity/samba/samba_4.14.14.bb     | 2 +
>   .../recipes-daemons/squid/files/CVE-2023-46847.patch            | 47 +++++
>   meta-networking/recipes-daemons/squid/squid_4.15.bb             | 1 +
>   meta-networking/recipes-protocols/frr/frr/CVE-2023-38406.patch  | 42 ++++
>   meta-networking/recipes-protocols/frr/frr/CVE-2023-38407.patch  | 63
> ++++++
>   meta-networking/recipes-protocols/frr/frr/CVE-2023-46752.patch  | 127
> ++++++++++++
>   meta-networking/recipes-protocols/frr/frr/CVE-2023-46753.patch  | 119
> +++++++++++
>   meta-networking/recipes-protocols/frr/frr/CVE-2023-47234.patch  | 98
> ++++++++++
>   meta-networking/recipes-protocols/frr/frr/CVE-2023-47235.patch  | 114
> +++++++++++
>   meta-networking/recipes-protocols/frr/frr_8.2.2.bb              | 6 +
>   meta-oe/recipes-core/sdbus-c++/sdbus-c++_1.0.0.bb               | 7 +-
>   meta-oe/recipes-dbs/postgresql/files/CVE-2023-5868.patch        | 125
> ++++++++++++
>   meta-oe/recipes-dbs/postgresql/files/CVE-2023-5869.patch        | 294
> ++++++++++++++++++++++++++++
>   meta-oe/recipes-dbs/postgresql/files/CVE-2023-5870.patch        | 108
> ++++++++++
>   meta-oe/recipes-dbs/postgresql/postgresql_14.9.bb               | 3 +
>   meta-python/recipes-devtools/python/python3-gcovr_5.1.bb        | 2 +-
>   .../files/0001-HTTP-2-per-iteration-stream-handling-limit.patch | 92
> +++++++++
>   meta-webserver/recipes-httpd/nginx/nginx_1.20.1.bb              | 1 +
>   meta-webserver/recipes-httpd/nginx/nginx_1.21.1.bb              | 2 +
>   21 files changed, 1503 insertions(+), 2 deletions(-)
>   create mode 100644
> meta-networking/recipes-connectivity/samba/samba/CVE-2023-4091-0001.patch
>   create mode 100644
> meta-networking/recipes-connectivity/samba/samba/CVE-2023-4091-0002.patch
>   create mode 100644
> meta-networking/recipes-daemons/squid/files/CVE-2023-46847.patch
>   create mode 100644
> meta-networking/recipes-protocols/frr/frr/CVE-2023-38406.patch
>   create mode 100644
> meta-networking/recipes-protocols/frr/frr/CVE-2023-38407.patch
>   create mode 100644
> meta-networking/recipes-protocols/frr/frr/CVE-2023-46752.patch
>   create mode 100644
> meta-networking/recipes-protocols/frr/frr/CVE-2023-46753.patch
>   create mode 100644
> meta-networking/recipes-protocols/frr/frr/CVE-2023-47234.patch
>   create mode 100644
> meta-networking/recipes-protocols/frr/frr/CVE-2023-47235.patch
>   create mode 100644
> meta-oe/recipes-dbs/postgresql/files/CVE-2023-5868.patch
>   create mode 100644
> meta-oe/recipes-dbs/postgresql/files/CVE-2023-5869.patch
>   create mode 100644
> meta-oe/recipes-dbs/postgresql/files/CVE-2023-5870.patch
>   create mode 100644
> meta-webserver/recipes-httpd/nginx/files/0001-HTTP-2-per-iteration-stream-handling-limit.patch
>