Handle some CVEs from kirkstone cve metrics Peter Marko (5): ghostscript: ignore CVE-2024-46954 tiff: ignore CVE-2023-2731 tiff: patch CVE-2023-3164 gstreame1.0: ignore CVEs from gstreamer1.0-plugins-bad xwayland: patch CVE-2023-5380 CVE-2024-0229
.../ghostscript/ghostscript_9.55.0.bb | 2 +- .../xwayland/xwayland/CVE-2023-5380.patch | 103 ++++++++ .../xwayland/xwayland/CVE-2024-0229-1.patch | 88 +++++++ .../xwayland/xwayland/CVE-2024-0229-2.patch | 222 ++++++++++++++++++ .../xwayland/xwayland/CVE-2024-0229-3.patch | 42 ++++ .../xwayland/xwayland/CVE-2024-0229-4.patch | 46 ++++ .../xwayland/xwayland_22.1.8.bb | 5 + .../gstreamer/gstreamer1.0_1.20.7.bb | 4 +- .../libtiff/tiff/CVE-2023-3164.patch | 114 +++++++++ meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 5 +- 10 files changed, 626 insertions(+), 5 deletions(-) create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2023-5380.patch create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-0229-1.patch create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-0229-2.patch create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-0229-3.patch create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-0229-4.patch create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2023-3164.patch -- 2.30.2
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#209185): https://lists.openembedded.org/g/openembedded-core/message/209185 Mute This Topic: https://lists.openembedded.org/mt/110364652/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-