[OE-core] [warrior] 0/8] Patch review
Martin Jansa
martin.jansa at gmail.com
Sun Oct 6 16:38:31 UTC 2019
Can you please add:
http://git.openembedded.org/openembedded-core/commit/?id=f7a470531d4bcc2888cbb9a7b197b86174f3aba2
it does apply cleanly in warrior.
Thanks
On Sun, Oct 6, 2019 at 5:24 PM Armin Kuster <akuster808 at gmail.com> wrote:
> Next series to review.
>
> Please comment by Monday.
> All these have already been sent to the list so short review period.
>
>
> The following changes since commit
> acc0f4a6a99fe9367e57a5c2a4f995b6f4db4a9f:
>
> runqemu: Add support for kvm on aarch64 (2019-10-01 10:48:46 +0100)
>
> are available in the git repository at:
>
> git://git.openembedded.org/openembedded-core-contrib stable/warrior-nmut
> http://cgit.openembedded.org//log/?h=stable/warrior-nmut
>
> Adrian Bunk (1):
> json-c: Don't --enable-rdrand
>
> Alexander Kanavin (1):
> python: update to 3.7.3
>
> Andrii Bordunov via Openembedded-core (1):
> classes/image-live.bbclass: Don't hardcode cpio.gz
>
> Anuj Mittal (1):
> python3: upgrade 3.7.3 -> 3.7.4
>
> Armin Kuster (2):
> qemu: Fix CVE-2019-8934
> qemu: fix build issue on new hosts with glibc 2.30
>
> Dan Tran (1):
> unzip: Fix CVE-2019-13232
>
> Jan Klare (1):
> systemd: update SRCREV for systemd v241-stable
>
> meta/classes/image-live.bbclass | 2 +-
> meta/recipes-core/systemd/systemd.inc | 2 +-
> meta/recipes-devtools/json-c/json-c_0.13.1.bb | 2 -
> ...ysconfig-append-STAGING_LIBDIR-python-sys.patch | 2 +-
> ...2-distutils-prefix-is-inside-staging-area.patch | 2 +-
> .../python/python3/CVE-2018-20852.patch | 124 -------
> .../python/python3/CVE-2019-9636.patch | 154 ---------
> .../python/python3/CVE-2019-9740.patch | 151 ---------
> .../python/{python3_3.7.2.bb => python3_3.7.4.bb} | 9 +-
> meta/recipes-devtools/qemu/qemu.inc | 3 +
> ...nux-user-assume-__NR_gettid-always-exists.patch | 49 +++
> ...rename-gettid-to-sys_gettid-to-avoid-clas.patch | 95 ++++++
> .../recipes-devtools/qemu/qemu/CVE-2019-8934.patch | 215 +++++++++++++
> .../unzip/unzip/CVE-2019-13232_p1.patch | 33 ++
> .../unzip/unzip/CVE-2019-13232_p2.patch | 356
> +++++++++++++++++++++
> .../unzip/unzip/CVE-2019-13232_p3.patch | 121 +++++++
> meta/recipes-extended/unzip/unzip_6.0.bb | 3 +
> 17 files changed, 882 insertions(+), 441 deletions(-)
> delete mode 100644
> meta/recipes-devtools/python/python3/CVE-2018-20852.patch
> delete mode 100644
> meta/recipes-devtools/python/python3/CVE-2019-9636.patch
> delete mode 100644
> meta/recipes-devtools/python/python3/CVE-2019-9740.patch
> rename meta/recipes-devtools/python/{python3_3.7.2.bb => python3_3.7.4.bb}
> (97%)
> create mode 100644
> meta/recipes-devtools/qemu/qemu/0001-linux-user-assume-__NR_gettid-always-exists.patch
> create mode 100644
> meta/recipes-devtools/qemu/qemu/0001-linux-user-rename-gettid-to-sys_gettid-to-avoid-clas.patch
> create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2019-8934.patch
> create mode 100644
> meta/recipes-extended/unzip/unzip/CVE-2019-13232_p1.patch
> create mode 100644
> meta/recipes-extended/unzip/unzip/CVE-2019-13232_p2.patch
> create mode 100644
> meta/recipes-extended/unzip/unzip/CVE-2019-13232_p3.patch
>
> --
> 2.7.4
>
> --
> _______________________________________________
> Openembedded-core mailing list
> Openembedded-core at lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openembedded.org/pipermail/openembedded-core/attachments/20191006/227b55af/attachment-0001.html>
More information about the Openembedded-core
mailing list