diff mbox series

[walnascar,4/6] glibc: stable 2.41 branch updates

Message ID af3e5e432d9bf1e5811ea92f3e29c0874b6b9405.1754750560.git.steve@sakoman.com
State New
Headers show
Series [walnascar,1/6] avahi: fix CVE-2024-52615 | expand

Commit Message

Steve Sakoman Aug. 9, 2025, 2:44 p.m. UTC
From: Peter Marko <peter.marko@siemens.com>

$ git log --oneline 6e489c17f827317bcf8544efefa65f13b5a079dc..e7c419a2957590fb657900fc92a89708f41abd9d
e7c419a295 (origin/release/2.41/master, release/2.41/master) iconv: iconv -o should not create executable files (bug 33164)
1e16d0096d posix: Fix double-free after allocation failure in regcomp (bug 33185)

Add CVE-2025-8058 to CVE ignore list as this is (bug 33185) commit.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
 meta/recipes-core/glibc/glibc-version.inc | 2 +-
 meta/recipes-core/glibc/glibc_2.41.bb     | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

Comments

Khem Raj Aug. 9, 2025, 3:45 p.m. UTC | #1
On Sat, Aug 9, 2025 at 7:44 AM Steve Sakoman via
lists.openembedded.org <steve=sakoman.com@lists.openembedded.org>
wrote:
>
> From: Peter Marko <peter.marko@siemens.com>
>
> $ git log --oneline 6e489c17f827317bcf8544efefa65f13b5a079dc..e7c419a2957590fb657900fc92a89708f41abd9d
> e7c419a295 (origin/release/2.41/master, release/2.41/master) iconv: iconv -o should not create executable files (bug 33164)
> 1e16d0096d posix: Fix double-free after allocation failure in regcomp (bug 33185)
>
> Add CVE-2025-8058 to CVE ignore list as this is (bug 33185) commit.
>

Hi Steve

Should we wait for WRT to report back on glibc regression test results ?

> Signed-off-by: Peter Marko <peter.marko@siemens.com>
> Signed-off-by: Steve Sakoman <steve@sakoman.com>
> ---
>  meta/recipes-core/glibc/glibc-version.inc | 2 +-
>  meta/recipes-core/glibc/glibc_2.41.bb     | 2 +-
>  2 files changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc
> index a2cfd0f308..881a9cce2c 100644
> --- a/meta/recipes-core/glibc/glibc-version.inc
> +++ b/meta/recipes-core/glibc/glibc-version.inc
> @@ -1,6 +1,6 @@
>  SRCBRANCH ?= "release/2.41/master"
>  PV = "2.41+git"
> -SRCREV_glibc ?= "6e489c17f827317bcf8544efefa65f13b5a079dc"
> +SRCREV_glibc ?= "e7c419a2957590fb657900fc92a89708f41abd9d"
>  SRCREV_localedef ?= "fab74f31b3811df543e24b6de47efdf45b538abc"
>
>  GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https"
> diff --git a/meta/recipes-core/glibc/glibc_2.41.bb b/meta/recipes-core/glibc/glibc_2.41.bb
> index 7ddf7f9127..8a65e8ce9f 100644
> --- a/meta/recipes-core/glibc/glibc_2.41.bb
> +++ b/meta/recipes-core/glibc/glibc_2.41.bb
> @@ -17,7 +17,7 @@ Allows for ASLR bypass so can bypass some hardening, not an exploit in itself, m
>  easier access for another. 'ASLR bypass itself is not a vulnerability.'"
>
>  CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS"
> -CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-4802 CVE-2025-5702 CVE-2025-5745"
> +CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-4802 CVE-2025-5702 CVE-2025-5745 CVE-2025-8058"
>  CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix available in used git hash"
>
>  DEPENDS += "gperf-native bison-native"
> --
> 2.43.0
>
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#221679): https://lists.openembedded.org/g/openembedded-core/message/221679
> Mute This Topic: https://lists.openembedded.org/mt/114616374/1997914
> Group Owner: openembedded-core+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [raj.khem@gmail.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
Peter Marko Aug. 9, 2025, 10:23 p.m. UTC | #2
> -----Original Message-----
> From: openembedded-core@lists.openembedded.org <openembedded-
> core@lists.openembedded.org> On Behalf Of Khem Raj via
> lists.openembedded.org
> Sent: Saturday, August 9, 2025 17:45
> To: steve@sakoman.com
> Cc: openembedded-core@lists.openembedded.org
> Subject: Re: [OE-core][walnascar 4/6] glibc: stable 2.41 branch updates
> 
> On Sat, Aug 9, 2025 at 7:44 AM Steve Sakoman via
> lists.openembedded.org <steve=sakoman.com@lists.openembedded.org>
> wrote:
> >
> > From: Peter Marko <peter.marko@siemens.com>
> >
> > $ git log --oneline
> 6e489c17f827317bcf8544efefa65f13b5a079dc..e7c419a2957590fb657900fc92a897
> 08f41abd9d
> > e7c419a295 (origin/release/2.41/master, release/2.41/master) iconv: iconv -o
> should not create executable files (bug 33164)
> > 1e16d0096d posix: Fix double-free after allocation failure in regcomp (bug
> 33185)
> >
> > Add CVE-2025-8058 to CVE ignore list as this is (bug 33185) commit.
> >
> 
> Hi Steve
> 
> Should we wait for WRT to report back on glibc regression test results ?

Testresults on my setup:
       Before     After   Diff
PASS         5843      5847     +4
XPASS        4         4         0
FAIL         145       142      -3
XFAIL        16        16        0
UNSUPPORTED  243       243      0

Diff of testcase status:
malloc/tst-free-errno-malloc-hugetlb1 FAIL -> PASS
malloc/tst-free-errno-mcheck FAIL-> PASS
nptl/tst-getpid3 FAIL -> PASS
nptl/tst-mutexpi8 FAIL -> PASS
nptl/tst-mutexpi8-static PASS -> FAIL
tst-regcomp-bracket-free N/A -> PASS (new testcase)

Peter

> 
> > Signed-off-by: Peter Marko <peter.marko@siemens.com>
> > Signed-off-by: Steve Sakoman <steve@sakoman.com>
> > ---
> >  meta/recipes-core/glibc/glibc-version.inc | 2 +-
> >  meta/recipes-core/glibc/glibc_2.41.bb     | 2 +-
> >  2 files changed, 2 insertions(+), 2 deletions(-)
> >
> > diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-
> core/glibc/glibc-version.inc
> > index a2cfd0f308..881a9cce2c 100644
> > --- a/meta/recipes-core/glibc/glibc-version.inc
> > +++ b/meta/recipes-core/glibc/glibc-version.inc
> > @@ -1,6 +1,6 @@
> >  SRCBRANCH ?= "release/2.41/master"
> >  PV = "2.41+git"
> > -SRCREV_glibc ?= "6e489c17f827317bcf8544efefa65f13b5a079dc"
> > +SRCREV_glibc ?= "e7c419a2957590fb657900fc92a89708f41abd9d"
> >  SRCREV_localedef ?= "fab74f31b3811df543e24b6de47efdf45b538abc"
> >
> >  GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https"
> > diff --git a/meta/recipes-core/glibc/glibc_2.41.bb b/meta/recipes-
> core/glibc/glibc_2.41.bb
> > index 7ddf7f9127..8a65e8ce9f 100644
> > --- a/meta/recipes-core/glibc/glibc_2.41.bb
> > +++ b/meta/recipes-core/glibc/glibc_2.41.bb
> > @@ -17,7 +17,7 @@ Allows for ASLR bypass so can bypass some hardening,
> not an exploit in itself, m
> >  easier access for another. 'ASLR bypass itself is not a vulnerability.'"
> >
> >  CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS"
> > -CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-4802 CVE-2025-5702
> CVE-2025-5745"
> > +CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-4802 CVE-2025-5702
> CVE-2025-5745 CVE-2025-8058"
> >  CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix
> available in used git hash"
> >
> >  DEPENDS += "gperf-native bison-native"
> > --
> > 2.43.0
> >
> >
> >
> >
Khem Raj Aug. 10, 2025, 12:37 a.m. UTC | #3
On Sat, Aug 9, 2025 at 3:23 PM Marko, Peter <Peter.Marko@siemens.com> wrote:

>
> > -----Original Message-----
> > From: openembedded-core@lists.openembedded.org <openembedded-
> > core@lists.openembedded.org> On Behalf Of Khem Raj via
> > lists.openembedded.org
> > Sent: Saturday, August 9, 2025 17:45
> > To: steve@sakoman.com
> > Cc: openembedded-core@lists.openembedded.org
> > Subject: Re: [OE-core][walnascar 4/6] glibc: stable 2.41 branch updates
> >
> > On Sat, Aug 9, 2025 at 7:44 AM Steve Sakoman via
> > lists.openembedded.org <steve=sakoman.com@lists.openembedded.org>
> > wrote:
> > >
> > > From: Peter Marko <peter.marko@siemens.com>
> > >
> > > $ git log --oneline
> > 6e489c17f827317bcf8544efefa65f13b5a079dc..e7c419a2957590fb657900fc92a897
> > 08f41abd9d
> > > e7c419a295 (origin/release/2.41/master, release/2.41/master) iconv:
> iconv -o
> > should not create executable files (bug 33164)
> > > 1e16d0096d posix: Fix double-free after allocation failure in regcomp
> (bug
> > 33185)
> > >
> > > Add CVE-2025-8058 to CVE ignore list as this is (bug 33185) commit.
> > >
> >
> > Hi Steve
> >
> > Should we wait for WRT to report back on glibc regression test results ?
>
> Testresults on my setup:
>        Before     After   Diff
> PASS         5843      5847     +4
> XPASS        4         4         0
> FAIL         145       142      -3
> XFAIL        16        16        0
> UNSUPPORTED  243       243      0
>
> Diff of testcase status:
> malloc/tst-free-errno-malloc-hugetlb1 FAIL -> PASS
> malloc/tst-free-errno-mcheck FAIL-> PASS
> nptl/tst-getpid3 FAIL -> PASS
> nptl/tst-mutexpi8 FAIL -> PASS
> nptl/tst-mutexpi8-static PASS -> FAIL
> tst-regcomp-bracket-free N/A -> PASS (new testcase)


Thanks Peter I think this looks good


> Peter
>
> >
> > > Signed-off-by: Peter Marko <peter.marko@siemens.com>
> > > Signed-off-by: Steve Sakoman <steve@sakoman.com>
> > > ---
> > >  meta/recipes-core/glibc/glibc-version.inc | 2 +-
> > >  meta/recipes-core/glibc/glibc_2.41.bb     | 2 +-
> > >  2 files changed, 2 insertions(+), 2 deletions(-)
> > >
> > > diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-
> > core/glibc/glibc-version.inc
> > > index a2cfd0f308..881a9cce2c 100644
> > > --- a/meta/recipes-core/glibc/glibc-version.inc
> > > +++ b/meta/recipes-core/glibc/glibc-version.inc
> > > @@ -1,6 +1,6 @@
> > >  SRCBRANCH ?= "release/2.41/master"
> > >  PV = "2.41+git"
> > > -SRCREV_glibc ?= "6e489c17f827317bcf8544efefa65f13b5a079dc"
> > > +SRCREV_glibc ?= "e7c419a2957590fb657900fc92a89708f41abd9d"
> > >  SRCREV_localedef ?= "fab74f31b3811df543e24b6de47efdf45b538abc"
> > >
> > >  GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https"
> > > diff --git a/meta/recipes-core/glibc/glibc_2.41.bb b/meta/recipes-
> > core/glibc/glibc_2.41.bb
> > > index 7ddf7f9127..8a65e8ce9f 100644
> > > --- a/meta/recipes-core/glibc/glibc_2.41.bb
> > > +++ b/meta/recipes-core/glibc/glibc_2.41.bb
> > > @@ -17,7 +17,7 @@ Allows for ASLR bypass so can bypass some hardening,
> > not an exploit in itself, m
> > >  easier access for another. 'ASLR bypass itself is not a
> vulnerability.'"
> > >
> > >  CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS"
> > > -CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-4802 CVE-2025-5702
> > CVE-2025-5745"
> > > +CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-4802 CVE-2025-5702
> > CVE-2025-5745 CVE-2025-8058"
> > >  CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix
> > available in used git hash"
> > >
> > >  DEPENDS += "gperf-native bison-native"
> > > --
> > > 2.43.0
> > >
> > >
> > >
> > >
>
diff mbox series

Patch

diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc
index a2cfd0f308..881a9cce2c 100644
--- a/meta/recipes-core/glibc/glibc-version.inc
+++ b/meta/recipes-core/glibc/glibc-version.inc
@@ -1,6 +1,6 @@ 
 SRCBRANCH ?= "release/2.41/master"
 PV = "2.41+git"
-SRCREV_glibc ?= "6e489c17f827317bcf8544efefa65f13b5a079dc"
+SRCREV_glibc ?= "e7c419a2957590fb657900fc92a89708f41abd9d"
 SRCREV_localedef ?= "fab74f31b3811df543e24b6de47efdf45b538abc"
 
 GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https"
diff --git a/meta/recipes-core/glibc/glibc_2.41.bb b/meta/recipes-core/glibc/glibc_2.41.bb
index 7ddf7f9127..8a65e8ce9f 100644
--- a/meta/recipes-core/glibc/glibc_2.41.bb
+++ b/meta/recipes-core/glibc/glibc_2.41.bb
@@ -17,7 +17,7 @@  Allows for ASLR bypass so can bypass some hardening, not an exploit in itself, m
 easier access for another. 'ASLR bypass itself is not a vulnerability.'"
 
 CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS"
-CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-4802 CVE-2025-5702 CVE-2025-5745"
+CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-4802 CVE-2025-5702 CVE-2025-5745 CVE-2025-8058"
 CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix available in used git hash"
 
 DEPENDS += "gperf-native bison-native"