integ/base/systemd/centos/meta_patches
Jim Somerville 0231aba5cd Uprev systemd to version 219-67.el7
This solves:
systemd: line splitting via fgets() allows for state injection
during daemon-reexec (CVE-2018-15686)

along with some other less critical issues.  See the security
announcement link:

https://lists.centos.org/pipermail/centos-cr-announce/2019-August/006149.html

for more details.

Here we rebase the patches, and fix the atrocious crime of "name of patch file
doesn't match what git format-patch generates".  We also squash down the
meta patches which add the patches to the spec file as part of
good housekeeping.

Change-Id: I01a3fa329bbad541a063cb604d1756892139967f
Closes-Bug: 1849200
Depends-On: https://review.opendev.org/#/c/695560
Signed-off-by: Jim Somerville <Jim.Somerville@windriver.com>
2019-11-21 16:48:47 -05:00
..
Add-STX-patches.patch Uprev systemd to version 219-67.el7 2019-11-21 16:48:47 -05:00
PATCH_ORDER Uprev systemd to version 219-67.el7 2019-11-21 16:48:47 -05:00
Protect-sections-of-systemd-post-from-running-on-pat.patch Uprev systemd to version 219-67.el7 2019-11-21 16:48:47 -05:00
update-package-versioning-for-STX.patch Uprev systemd to version 219-67.el7 2019-11-21 16:48:47 -05:00