[oe-commits] [openembedded-core] branch morty updated (c79b479 -> 5bf1ce3)
git at git.openembedded.org
git at git.openembedded.org
Tue Nov 21 14:44:21 UTC 2017
This is an automated email from the git hooks/post-receive script.
rpurdie pushed a change to branch morty
in repository openembedded-core.
from c79b479 wpa_supplicant: fix WPA2 key replay security bug
new b9de98c ruby: fix build of ruby-native with gcc7
new d26ea3b libtiff: Security Advisory - libtiff - CVE-2017-5225
new dc7573c tiff: Security fixes
new 8fb9a14 tiff: Security fix for CVE-2016-10271
new 6e39b24 tiff: Secruity fix CVE-2016-10093
new 24b62c8 tiff: Security fix CVE-2016-10268
new 3a604aa tiff: Security fix CVE-2016-10266
new 87aebc2 tiff: Security fix CVE-2016-10267
new 46504a2 tiff: Security fix for CVE-2016-10269
new eeb7197 tiff: Security fix for CVE-2016-10270
new 75e9533 tiff: Security fix for CVE-2017-7592
new 7bdb52d tiff: Security fix for CVE-2017-7594
new 6536bfe tiff: Security fix for CVE-2017-7595
new 94daee0 tiff: Security fix for CVE-2017-7596
new 7e36779 tiff: Security fix for CVE-2017-7598
new ade8551 tiff: Security fix for CVE-2017-7601
new 12325a8 tiff: Security fix for CVE-2017-7602
new ff3904d tiff: Security fix for CVE-2017-7593
new b754be8 curl: Security fix for CVE-2016-8615
new 1fc1c9a curl: Security fix for CVE-2016-8618
new 3b97fc7 curl: Security fix for CVE-2016-8619
new daeb0f5 curl: Security fix for CVE-2016-8620
new d664a13 curl: Security fix for CVE-2016-8621
new 2da99dc curl: Security fix for CVE-2016-8623
new 3b73976 curl: Security fix for CVE-2016-8617
new 26e4647 curl: Security fix for CVE-2016-8624
new 559ccc2 curl: Security fix for CVE-2016-9586
new 2ad0d34 curl: Security fix for CVE-2017-1000100
new 3cd67ae curl: Security fix for CVE-2017-1000101
new 6af2319 ruby: Security fix for CVE-2016-7798
new d83f189 ruby: Security fix for CVE-2017-9227
new cdfb60a ruby: Security fix for CVE-2017-9228
new 0c1eec0 ruby: Secruity fix for CVE-2017-9226
new a636bf8 ruby: Security fix for CVE-2017-9229
new 6033983 ruby: Security fix for CVE-2017-14033
new 8d53b03 ruby: Security fix for CVE-2017-14064
new 9dc52a9 libevdev: add libcheck dependency
new 93af40a gmp_4.2.1: prevent calls to mpn_add_nc() if HAVE_NATIVE_mpn_sub_nc is false
new a70dc7d coreutils_6.9: Disable broken man pages
new a0cb33b coreutils_6.9: fix musl compilation
new c32bca8 opkg: fix conffile errors in 'opkg status' calls
new f3c9d85 tcf-agent: kill with USR2 in systemd stop
new 1e6235d tcf-agent: Fix daemon termination
new c34064c zlib: Fix CVE-2016-9840
new aa650d4 zlib: Fix CVE-2016-9841
new 715645a zlib: Fix CVE-2016-9842
new 32db742 zlib: Fix CVE-2016-9843
new 8ef5c05 python-3.3-multilib.patch: Fixes getpath on multilib configurations
new 49dea77 linux-yocto/4.8: update to v4.8.26
new 6e50f31 ppp: include netinet/in.h before linux/in.h in pppoe.h
new dfab5f8 mesa: fix SRC_URI
new 0861820 byacc: Fix fetch error
new 5bf1ce3 neon: fix fetch error
The 53 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "add" were already present in the repository and have only
been added to this reference.
Summary of changes:
...oe-include-netinet-in.h-before-linux-in.h.patch | 54 ++++
.../ppp/ppp/ppp-fix-building-with-linux-4.8.patch | 44 ---
meta/recipes-connectivity/ppp/ppp_2.4.7.bb | 2 +-
...-need-charset.alias-when-building-for-mus.patch | 46 +++
.../coreutils/coreutils-6.9/no-man.patch | 21 ++
meta/recipes-core/coreutils/coreutils_6.9.bb | 2 +
.../zlib/zlib-1.2.8/CVE-2016-9840.patch | 77 ++++++
.../zlib/zlib-1.2.8/CVE-2016-9841.patch | 230 +++++++++++++++
.../zlib/zlib-1.2.8/CVE-2016-9842.patch | 35 +++
.../zlib/zlib-1.2.8/CVE-2016-9843.patch | 55 ++++
meta/recipes-core/zlib/zlib_1.2.8.bb | 4 +
.../opkg/opkg/status-conffile.patch | 69 +++++
meta/recipes-devtools/opkg/opkg_0.3.3.bb | 1 +
.../python/python3/python-3.3-multilib.patch | 17 +-
.../recipes-devtools/ruby/ruby/CVE-2016-7798.patch | 164 +++++++++++
.../ruby/ruby/CVE-2017-14033.patch | 89 ++++++
.../ruby/ruby/CVE-2017-14064.patch | 79 ++++++
.../recipes-devtools/ruby/ruby/CVE-2017-9226.patch | 33 +++
.../recipes-devtools/ruby/ruby/CVE-2017-9227.patch | 24 ++
.../recipes-devtools/ruby/ruby/CVE-2017-9228.patch | 26 ++
.../recipes-devtools/ruby/ruby/CVE-2017-9229.patch | 36 +++
meta/recipes-devtools/ruby/ruby/prevent-gc.patch | 32 +++
meta/recipes-devtools/ruby/ruby_2.2.5.bb | 10 +
.../tcf-agent/tcf-agent/tcf-agent.init | 12 +-
.../tcf-agent/tcf-agent/tcf-agent.service | 2 +
meta/recipes-extended/byacc/byacc.inc | 2 +-
meta/recipes-graphics/mesa/mesa_12.0.1.bb | 2 +-
meta/recipes-kernel/linux/linux-yocto-rt_4.8.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto-tiny_4.8.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto_4.8.bb | 20 +-
.../libtiff/files/CVE-2016-10093.patch | 47 ++++
.../libtiff/files/CVE-2016-10266.patch | 60 ++++
.../libtiff/files/CVE-2016-10267.patch | 70 +++++
.../libtiff/files/CVE-2016-10268.patch | 30 ++
.../libtiff/files/CVE-2016-10269.patch | 131 +++++++++
.../libtiff/files/CVE-2016-10270.patch | 134 +++++++++
.../libtiff/files/CVE-2016-10271.patch | 30 ++
.../libtiff/files/CVE-2017-10688.patch | 88 ++++++
.../libtiff/files/CVE-2017-11335.patch | 54 ++++
.../libtiff/files/CVE-2017-7592.patch | 40 +++
.../libtiff/files/CVE-2017-7593.patch | 98 +++++++
.../libtiff/files/CVE-2017-7594-p1.patch | 43 +++
.../libtiff/files/CVE-2017-7594-p2.patch | 50 ++++
.../libtiff/files/CVE-2017-7595.patch | 48 ++++
.../libtiff/files/CVE-2017-7596.patch | 308 +++++++++++++++++++++
.../libtiff/files/CVE-2017-7598.patch | 65 +++++
.../libtiff/files/CVE-2017-7601.patch | 52 ++++
.../libtiff/files/CVE-2017-7602.patch | 69 +++++
.../libtiff/files/CVE-2017-9147.patch | 203 ++++++++++++++
.../libtiff/files/CVE-2017-9936.patch | 46 +++
.../libtiff/files/libtiff-CVE-2017-5225.patch | 92 ++++++
meta/recipes-multimedia/libtiff/tiff_4.0.7.bb | 23 +-
meta/recipes-support/curl/curl/CVE-2016-8615.patch | 71 +++++
meta/recipes-support/curl/curl/CVE-2016-8617.patch | 30 ++
meta/recipes-support/curl/curl/CVE-2016-8618.patch | 49 ++++
meta/recipes-support/curl/curl/CVE-2016-8619.patch | 56 ++++
meta/recipes-support/curl/curl/CVE-2016-8620.patch | 146 ++++++++++
meta/recipes-support/curl/curl/CVE-2016-8621.patch | 104 +++++++
meta/recipes-support/curl/curl/CVE-2016-8623.patch | 174 ++++++++++++
meta/recipes-support/curl/curl/CVE-2016-8624.patch | 68 +++++
meta/recipes-support/curl/curl/CVE-2016-9586.patch | 66 +++++
.../curl/curl/CVE-2017-1000100.patch | 47 ++++
.../curl/curl/CVE-2017-1000101.patch | 94 +++++++
meta/recipes-support/curl/curl_7.50.1.bb | 14 +-
...ls-to-mpn_add_nc-if-HAVE_NATIVE_mpn_sub_n.patch | 78 ++++++
meta/recipes-support/gmp/gmp_4.2.1.bb | 1 +
meta/recipes-support/libevdev/libevdev_1.5.2.bb | 2 +
meta/recipes-support/neon/neon_0.30.1.bb | 2 +-
68 files changed, 3902 insertions(+), 81 deletions(-)
create mode 100644 meta/recipes-connectivity/ppp/ppp/0001-pppoe-include-netinet-in.h-before-linux-in.h.patch
delete mode 100644 meta/recipes-connectivity/ppp/ppp/ppp-fix-building-with-linux-4.8.patch
create mode 100644 meta/recipes-core/coreutils/coreutils-6.9/build-don-t-need-charset.alias-when-building-for-mus.patch
create mode 100644 meta/recipes-core/coreutils/coreutils-6.9/no-man.patch
create mode 100644 meta/recipes-core/zlib/zlib-1.2.8/CVE-2016-9840.patch
create mode 100644 meta/recipes-core/zlib/zlib-1.2.8/CVE-2016-9841.patch
create mode 100644 meta/recipes-core/zlib/zlib-1.2.8/CVE-2016-9842.patch
create mode 100644 meta/recipes-core/zlib/zlib-1.2.8/CVE-2016-9843.patch
create mode 100644 meta/recipes-devtools/opkg/opkg/status-conffile.patch
create mode 100644 meta/recipes-devtools/ruby/ruby/CVE-2016-7798.patch
create mode 100644 meta/recipes-devtools/ruby/ruby/CVE-2017-14033.patch
create mode 100644 meta/recipes-devtools/ruby/ruby/CVE-2017-14064.patch
create mode 100644 meta/recipes-devtools/ruby/ruby/CVE-2017-9226.patch
create mode 100644 meta/recipes-devtools/ruby/ruby/CVE-2017-9227.patch
create mode 100644 meta/recipes-devtools/ruby/ruby/CVE-2017-9228.patch
create mode 100644 meta/recipes-devtools/ruby/ruby/CVE-2017-9229.patch
create mode 100644 meta/recipes-devtools/ruby/ruby/prevent-gc.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2016-10093.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2016-10266.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2016-10267.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2016-10268.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2016-10269.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2016-10270.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2016-10271.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-10688.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-11335.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-7592.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-7593.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-7594-p1.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-7594-p2.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-7595.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-7596.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-7598.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-7601.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-7602.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-9147.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/CVE-2017-9936.patch
create mode 100644 meta/recipes-multimedia/libtiff/files/libtiff-CVE-2017-5225.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2016-8615.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2016-8617.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2016-8618.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2016-8619.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2016-8620.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2016-8621.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2016-8623.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2016-8624.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2016-9586.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2017-1000100.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2017-1000101.patch
create mode 100644 meta/recipes-support/gmp/gmp-4.2.1/prevent-calls-to-mpn_add_nc-if-HAVE_NATIVE_mpn_sub_n.patch
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
More information about the Openembedded-commits
mailing list