Please review this set of changes for kirkstone and have comments back by
end of day Friday, December 6

Passed a-full on autobuilder:

https://valkyrie.yoctoproject.org/#/builders/29/builds/581

The following changes since commit 13b13b81b91f618c13cf972067c47bd810de852f:

  gstreamer1.0: improve test reliability (2024-11-27 06:57:56 -0800)

are available in the Git repository at:

  https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
  
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut

Changqing Li (2):
  libsoup: fix CVE-2024-52531
  rxvt-unicode.inc: disable the terminfo installation by setting TIC to
    :

Divya Chellam (1):
  qemu: fix CVE-2024-3446

Hongxu Jia (3):
  ovmf: fix CVE-2024-38796
  ovmf: fix CVE-2024-1298
  python3-zipp: fix CVE-2024-5569

Jiaying Song (1):
  diffoscope: fix CVE-2024-25711

Peter Marko (6):
  cpio: ignore CVE-2023-7216
  gnupg: ignore CVE-2022-3515
  qemu: ignore CVE-2022-36648
  grub: ignore CVE-2024-1048 and CVE-2023-4001
  pixman: ignore CVE-2023-37769
  qemu: patch CVE-2024-6505

Richard Purdie (12):
  do_package/sstate/sstatesig: Change timestamp clamping to hash output
    only
  selftest/reproducible: Drop rawlogs
  selftest/reproducible: Clean up pathnames
  resulttool: Allow store to filter to specific revisions
  resulttool: Use single space indentation in json output
  oeqa/utils/gitarchive: Return tag name and improve exclude handling
  resulttool: Fix passthrough of --all files in store mode
  resulttool: Add --logfile-archive option to store mode
  resulttool: Handle ltp rawlogs as well as ptest
  resulttool: Clean up repoducible build logs
  resulttool: Trim the precision of duration information
  resulttool: Improve repo layout for oeselftest results

Soumya Sambu (11):
  ovmf: Fix CVE-2022-36763
  ovmf: Fix CVE-2022-36764
  ovmf: Fix CVE-2023-45230
  ovmf: Fix CVE-2023-45231
  ovmf: Fix CVE-2023-45232, CVE-2023-45233
  ovmf: Fix CVE-2023-45234
  ovmf: Fix CVE-2023-45235
  ovmf: Fix CVE-2023-45229
  ovmf: Fix CVE-2023-45237
  ovmf: Fix CVE-2023-45236
  ovmf: Fix CVE-2022-36765

Vijay Anusuri (1):
  libsoup-2.4: Backport fix for CVE-2024-52531

Yogita Urade (1):
  qemu: fix CVE-2024-3447

 meta/classes/sstate.bbclass                   |   16 -
 meta/lib/oe/sstatesig.py                      |    7 +-
 meta/lib/oeqa/core/runner.py                  |    2 +-
 meta/lib/oeqa/selftest/cases/reproducible.py  |    8 +-
 meta/lib/oeqa/utils/gitarchive.py             |    4 +-
 meta/recipes-bsp/grub/grub2.inc               |    2 +
 ...ential-UINT32-overflow-in-S3-ResumeC.patch |   51 +
 ...-Fix-overflow-issue-in-BasePeCoffLib.patch |   37 +
 .../ovmf/ovmf/CVE-2022-36763-0001.patch       |  985 ++++++++++
 .../ovmf/ovmf/CVE-2022-36763-0002.patch       |  889 +++++++++
 .../ovmf/ovmf/CVE-2022-36763-0003.patch       |   55 +
 .../ovmf/ovmf/CVE-2022-36764-0001.patch       |  271 +++
 .../ovmf/ovmf/CVE-2022-36764-0002.patch       |  281 +++
 .../ovmf/ovmf/CVE-2022-36764-0003.patch       |   48 +
 .../ovmf/ovmf/CVE-2022-36765-0001.patch       |  179 ++
 .../ovmf/ovmf/CVE-2022-36765-0002.patch       |  157 ++
 .../ovmf/ovmf/CVE-2022-36765-0003.patch       |  135 ++
 .../ovmf/ovmf/CVE-2023-45229-0001.patch       |  604 ++++++
 .../ovmf/ovmf/CVE-2023-45229-0002.patch       |  539 ++++++
 .../ovmf/ovmf/CVE-2023-45229-0003.patch       |  244 +++
 .../ovmf/ovmf/CVE-2023-45229-0004.patch       |  157 ++
 .../ovmf/ovmf/CVE-2023-45230-0001.patch       | 1617 +++++++++++++++++
 .../ovmf/ovmf/CVE-2023-45230-0002.patch       |  604 ++++++
 .../ovmf/ovmf/CVE-2023-45231-0001.patch       |   65 +
 .../ovmf/ovmf/CVE-2023-45231-0002.patch       |  250 +++
 .../CVE-2023-45232-CVE-2023-45233-0001.patch  |  360 ++++
 .../CVE-2023-45232-CVE-2023-45233-0002.patch  |  417 +++++
 .../ovmf/ovmf/CVE-2023-45234-0001.patch       |  154 ++
 .../ovmf/ovmf/CVE-2023-45234-0002.patch       |  485 +++++
 .../ovmf/ovmf/CVE-2023-45235-0001.patch       |  243 +++
 .../ovmf/ovmf/CVE-2023-45235-0002.patch       |  379 ++++
 .../ovmf/ovmf/CVE-2023-45236.patch            |  829 +++++++++
 .../ovmf/ovmf/CVE-2023-45237-0001.patch       |   78 +
 .../ovmf/ovmf/CVE-2023-45237-0002.patch       | 1288 +++++++++++++
 meta/recipes-core/ovmf/ovmf_git.bb            |   28 +
 .../0001-Add-SanitizedNames-mixin.patch       |   89 +
 ...Names-in-CompleteDirs.-Fixes-broken-.patch |   30 +
 .../0003-Removed-SanitizedNames.patch         |   95 +
 ...-loop-when-zipfile-begins-with-more-.patch |   48 +
 ...ath.rstrip-to-consolidate-checks-for.patch |   30 +
 .../python/python3-zipp_3.7.0.bb              |    8 +
 meta/recipes-devtools/qemu/qemu.inc           |   13 +
 .../qemu/qemu/CVE-2024-3446-0001.patch        |  218 +++
 .../qemu/qemu/CVE-2024-3446-0002.patch        |  427 +++++
 .../qemu/qemu/CVE-2024-3446-0003.patch        |   68 +
 .../qemu/qemu/CVE-2024-3446-0004.patch        |  144 ++
 .../qemu/qemu/CVE-2024-3446-0005.patch        |   42 +
 .../qemu/qemu/CVE-2024-3446-0006.patch        |   43 +
 .../qemu/qemu/CVE-2024-3447.patch             |  137 ++
 .../qemu/qemu/CVE-2024-6505.patch             |   40 +
 meta/recipes-extended/cpio/cpio_2.14.bb       |    2 +
 .../xorg-lib/pixman_0.40.0.bb                 |    3 +
 .../rxvt-unicode/rxvt-unicode.inc             |    3 +-
 .../diffoscope/CVE-2024-25711.patch           |  116 ++
 .../diffoscope/diffoscope_208.bb              |    1 +
 meta/recipes-support/gnupg/gnupg_2.3.7.bb     |    2 +
 .../libsoup-2.4/CVE-2024-52531-1.patch        |  131 ++
 .../libsoup-2.4/CVE-2024-52531-2.patch        |   36 +
 .../libsoup/libsoup-2.4_2.74.2.bb             |    2 +
 .../libsoup/libsoup/CVE-2024-52531-1.patch    |  116 ++
 .../libsoup/libsoup/CVE-2024-52531-2.patch    |   40 +
 .../libsoup/libsoup/CVE-2024-52531-3.patch    |  136 ++
 meta/recipes-support/libsoup/libsoup_3.0.7.bb |    3 +
 scripts/lib/resulttool/manualexecution.py     |    2 +-
 scripts/lib/resulttool/report.py              |    2 +-
 scripts/lib/resulttool/resultutils.py         |   76 +-
 scripts/lib/resulttool/store.py               |   26 +-
 67 files changed, 13550 insertions(+), 47 deletions(-)
 create mode 100644 
meta/recipes-core/ovmf/ovmf/0001-MdeModulePkg-Potential-UINT32-overflow-in-S3-ResumeC.patch
 create mode 100644 
meta/recipes-core/ovmf/ovmf/0001-MdePkg-Fix-overflow-issue-in-BasePeCoffLib.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2022-36763-0001.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2022-36763-0002.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2022-36763-0003.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2022-36764-0001.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2022-36764-0002.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2022-36764-0003.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0001.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0002.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0003.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45229-0001.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45229-0002.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45229-0003.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45229-0004.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45230-0001.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45230-0002.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45231-0001.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45231-0002.patch
 create mode 100644 
meta/recipes-core/ovmf/ovmf/CVE-2023-45232-CVE-2023-45233-0001.patch
 create mode 100644 
meta/recipes-core/ovmf/ovmf/CVE-2023-45232-CVE-2023-45233-0002.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45234-0001.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45234-0002.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45235-0001.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45235-0002.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45236.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45237-0001.patch
 create mode 100644 meta/recipes-core/ovmf/ovmf/CVE-2023-45237-0002.patch
 create mode 100644 
meta/recipes-devtools/python/python3-zipp/0001-Add-SanitizedNames-mixin.patch
 create mode 100644 
meta/recipes-devtools/python/python3-zipp/0002-Employ-SanitizedNames-in-CompleteDirs.-Fixes-broken-.patch
 create mode 100644 
meta/recipes-devtools/python/python3-zipp/0003-Removed-SanitizedNames.patch
 create mode 100644 
meta/recipes-devtools/python/python3-zipp/0004-Address-infinite-loop-when-zipfile-begins-with-more-.patch
 create mode 100644 
meta/recipes-devtools/python/python3-zipp/0005-Prefer-simpler-path.rstrip-to-consolidate-checks-for.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-3446-0001.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-3446-0002.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-3446-0003.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-3446-0004.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-3446-0005.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-3446-0006.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-3447.patch
 create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2024-6505.patch
 create mode 100644 
meta/recipes-support/diffoscope/diffoscope/CVE-2024-25711.patch
 create mode 100644 
meta/recipes-support/libsoup/libsoup-2.4/CVE-2024-52531-1.patch
 create mode 100644 
meta/recipes-support/libsoup/libsoup-2.4/CVE-2024-52531-2.patch
 create mode 100644 meta/recipes-support/libsoup/libsoup/CVE-2024-52531-1.patch
 create mode 100644 meta/recipes-support/libsoup/libsoup/CVE-2024-52531-2.patch
 create mode 100644 meta/recipes-support/libsoup/libsoup/CVE-2024-52531-3.patch

-- 
2.34.1

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#208283): 
https://lists.openembedded.org/g/openembedded-core/message/208283
Mute This Topic: https://lists.openembedded.org/mt/109924629/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to