From patchwork Wed Jul 30 21:08:20 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 67771 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 529EBC87FCB for ; Wed, 30 Jul 2025 21:08:44 +0000 (UTC) Received: from mail-pf1-f173.google.com (mail-pf1-f173.google.com [209.85.210.173]) by mx.groups.io with SMTP id smtpd.web11.46611.1753909714270123510 for ; Wed, 30 Jul 2025 14:08:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=rXqtuLPQ; spf=softfail (domain: sakoman.com, ip: 209.85.210.173, mailfrom: steve@sakoman.com) Received: by mail-pf1-f173.google.com with SMTP id d2e1a72fcca58-748e378ba4fso368433b3a.1 for ; Wed, 30 Jul 2025 14:08:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1753909713; x=1754514513; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=HkZ4kjQSN0sxYg/MaC2MXp0GELhztnadJj/U8/RVztk=; b=rXqtuLPQIlJj6t/U4iBw0D7sP5tH1RdOt49I26dxhqMqnP7HeT/Pf/No0GiFjFpC7E oHHCI0WyxHAXaxHaLCK67T+i9oW2GBOYulmGS9Jy2dA+yZRxpMJtvCG2ZrIOWyYjWKrT 8lNIFJhH/soJTM+LmMOn7LRk2xkGWoX8DGxhZkWhr29SIFff6ZWiN6k/m5j9DdWXd2RI fqKD/PvGuZqiUyZdLYlbs7N6JDLVxuydv+Mr+A/Qnv5JzVyNELeMVh7XqBIiltf8T41O iwt29jOLS0ya6bhA+dckA2bsvtiqsAJIXDwwtSMWk6OJ7AfdXxx3xLwH4cU51JYMArTV AqLw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753909713; x=1754514513; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=HkZ4kjQSN0sxYg/MaC2MXp0GELhztnadJj/U8/RVztk=; b=lUQp0xpb/giUdqKgI3YBLBTmdr0iN1Fhq1bOF1WUCUd0g0zOIa93Ddfe0sgWCIKo1v DKoHf+PJgpFtDgmF4dDLTDaQX3/L6NPfpAiKTPahQncw7MMRtCp0ZdTvg2NDWvwYz2QE /raiLpkjjXoNdTX8rPikZuN01cQiceCRzJk869aD0TIbdDFTdlOtJw1o/B+mlpK/IOEA bQ8XxJtHHu1cbg+SMbJ6w44amnMiB6kmtF6KS0gUVJGw5dGkrUej1z2vRktdAUKOfdKC 1dfOBv2ms2zllnkp1pE50hAC96mFI1gdPudPWq7RSGNhfcU40/y5QGkiHPMXipXRFDVT E7Tg== X-Gm-Message-State: AOJu0Yy/A2PwGvPkgecC1Wm7MHZbFW18E99+9NCt5Lo3RZF6HwI4ZMIy u9RLAL/lgLiNX7zBTa1haCk22OobQBE/gEnEr+deVkXMy6i3y6PSnBSRfJ6H4jH+3mjkv0KjzrZ H7WNO X-Gm-Gg: ASbGncuaTkmGzvHsOVWPAuFDfVFXO5Uzm9iKQb8FThwVd7EcJcwXzS1U3zelKRHDGh9 Nr1dF1GL77L8SWUXGwTDIVbMLdGHuGK4jpE9ebfnvnjm+kfQHJM3EHfSOUR9U86d2jqB3DqH4Sa UpBMJTdYjvVFNagECTqEiIuENPHX1kOBS+/xEZ+rYrI55uZ+IPdPf/mBH21sBs5URn14e4mp6de VaSt1N2+jHum5ouuocRxUvrbeh8kBBxAGCdjMVVrgpK6nycJAZJnM0CLsUZpTPtSMdHc8NRMqql jk1HrJkKWkacwXVMR4VlJoKuANIViYv4dfdnspiHpHeUDjT8dUQxVy9N6F6HA6DXyI1i2JJ3sDb 2iHVIg4O/XVYqLaKW1LYYfVc= X-Google-Smtp-Source: AGHT+IG2P/kRIZBCITxQWtUfLZOYiFUJ8CVzKaPtxlwOGyihljbyxr+qhzLChHZ9y1MP5tWwVzUGjw== X-Received: by 2002:a05:6a00:14d1:b0:76a:7b13:e6e3 with SMTP id d2e1a72fcca58-76ab33001c6mr6437406b3a.23.1753909713434; Wed, 30 Jul 2025 14:08:33 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:58fd:da9:30d5:829a]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-769ee9ef1casm4929456b3a.3.2025.07.30.14.08.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 30 Jul 2025 14:08:33 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][walnascar 1/8] ncurses: patch CVE-2025-6141 Date: Wed, 30 Jul 2025 14:08:20 -0700 Message-ID: <408f1d820616d2bf73cbd319b911885d79d3ca9d.1753909581.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 30 Jul 2025 21:08:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221151 From: Peter Marko Pick relevant part of snapshot commit 20250329, see [1]. That has: add a buffer-limit check in postprocess_termcap (report/testcase by Yifan Zhang). [1] https://invisible-island.net/ncurses/NEWS.html#index-t20250329 Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- .../ncurses/files/CVE-2025-6141.patch | 25 +++++++++++++++++++ meta/recipes-core/ncurses/ncurses_6.5.bb | 1 + 2 files changed, 26 insertions(+) create mode 100644 meta/recipes-core/ncurses/files/CVE-2025-6141.patch diff --git a/meta/recipes-core/ncurses/files/CVE-2025-6141.patch b/meta/recipes-core/ncurses/files/CVE-2025-6141.patch new file mode 100644 index 0000000000..ec7e8a94e4 --- /dev/null +++ b/meta/recipes-core/ncurses/files/CVE-2025-6141.patch @@ -0,0 +1,25 @@ +From 27d1493340d714e7be6e08c0a8f43e48276149c4 Mon Sep 17 00:00:00 2001 +From: "Thomas E. Dickey" +Date: Sat, 29 Mar 2025 22:52:37 +0000 +Subject: [PATCH] snapshot of project "ncurses", label v6_5_20250329 + +CVE: CVE-2025-6141 +Upstream-Status: Backport [https://github.com/ThomasDickey/ncurses-snapshots/commit/27d1493340d714e7be6e08c0a8f43e48276149c4] +Signed-off-by: Peter Marko +--- + ncurses/tinfo/parse_entry.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/ncurses/tinfo/parse_entry.c b/ncurses/tinfo/parse_entry.c +index a2278c07..c551c780 100644 +--- a/ncurses/tinfo/parse_entry.c ++++ b/ncurses/tinfo/parse_entry.c +@@ -985,6 +985,8 @@ postprocess_termcap(TERMTYPE2 *tp, bool has_base) + bp = tp->Strings[from_ptr->nte_index]; + if (VALID_STRING(bp)) { + for (dp = buf2; *bp; bp++) { ++ if ((size_t) (dp - buf2) >= (sizeof(buf2) - sizeof(TERMTYPE2))) ++ break; + if (bp[0] == '$' && bp[1] == '<') { + while (*bp && *bp != '>') { + ++bp; diff --git a/meta/recipes-core/ncurses/ncurses_6.5.bb b/meta/recipes-core/ncurses/ncurses_6.5.bb index 2e3ee337ea..83de792d89 100644 --- a/meta/recipes-core/ncurses/ncurses_6.5.bb +++ b/meta/recipes-core/ncurses/ncurses_6.5.bb @@ -4,6 +4,7 @@ SRC_URI += "file://0001-tic-hang.patch \ file://0002-configure-reproducible.patch \ file://0003-gen-pkgconfig.in-Do-not-include-LDFLAGS-in-generated.patch \ file://exit_prototype.patch \ + file://CVE-2025-6141.patch \ " # commit id corresponds to the revision in package version SRCREV = "1c55d64d9d3e00399a21f04e9cac1e472ab5f70a" From patchwork Wed Jul 30 21:08:21 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 67777 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7AB70C87FD3 for ; Wed, 30 Jul 2025 21:08:44 +0000 (UTC) Received: from mail-pf1-f181.google.com (mail-pf1-f181.google.com [209.85.210.181]) by mx.groups.io with SMTP id smtpd.web10.46726.1753909715754407694 for ; Wed, 30 Jul 2025 14:08:35 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=bB7xW6aT; spf=softfail (domain: sakoman.com, ip: 209.85.210.181, mailfrom: steve@sakoman.com) Received: by mail-pf1-f181.google.com with SMTP id d2e1a72fcca58-76b77a97a04so254093b3a.1 for ; Wed, 30 Jul 2025 14:08:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1753909715; x=1754514515; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=vGgcG1Bw0MvRyse5p2H1oXwKh090JjwjpoOo5LQxWZ0=; b=bB7xW6aTfKwRiKLxoiGD1dhA/SXNUAHDiwvMFnDtoYpYNokhVmgeTZmhRSZ03eFdvW MO1/zSOjq7NsTOY4h/+Oxq8KDcVzKiZeJQd7h1TYv0LcbuQW9GeHMajrfaV8Q+p5Y4QI ktM8y5n6VWGHgSpubrBe4zgpqCRNQo9zYb6rBdqTdRmsDAaoK07y/DGGZLVUMMuxNCum IBoUOUi9RyqZX4KwZ1d56gPy0V45Dq93dUBYqb4amer+cH4SFzHPXST+g12yb3kaqytT PlnODK/W0fktT9RHlUUYwlkoVbvmgEkh9fyaUEetzN1JG8q/e3uj+jNXSJMHFBYyAcSj xP0Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753909715; x=1754514515; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=vGgcG1Bw0MvRyse5p2H1oXwKh090JjwjpoOo5LQxWZ0=; b=xD1jGXO2/CeJuWLK3QRj7L0yh7fYPZDyMV5DxJAV+sQ9Fti92grspUPM47qpfQi6s/ h8bVw7w2aNoz72u3VRTXrasq6d1Rv9sKDKzHy+vLRqrJi2c+xgAybIkTIjl/j8EdetVy JJWalaxfPrMC1fWXoZBUPLFlTUuE3QnBIyW8GPsdt71rZL9CHRJWrXkyNWtPzpZw/e3I a8YBptrcUQkixV3Kl+SAAhC/Zw6hFGOh5w1A6JYsf4HlApf2NIWLoepJFcc3A0zyQLZ5 0GHve7xzCcTJ4dauAiZUOI2MfvdJ/bYiARu12z4n3GjNEAby7WPCzZmu77eEiNfpOeB7 qePA== X-Gm-Message-State: AOJu0YzINMewCon+vvyr3frpWL/MDD9gqGMHOjuRMbdJgRDifiDou29P dv2AUbRAS8JdAMMm7Yj6HGr3IMBxNxqOuqni3pT4RtqLgw6/TO9GxZcEICrYhdDd2QbYH3TbonO H/3tN X-Gm-Gg: ASbGncuXboxtqAgnJmMOWsaCZrqBhTqoXrR/ttgJfWbk0gkWPak2N2BlpEx9xUdKxJM DsSMnIzaIzxfpKqRkpoSwagR7BdgGWyrIbDUrD4rapQAs66ky/b5fVaKFhZQscbp9MbCP49i+Le u2Vq+DiBpXcq2GzbS77OicgKqeLUHfW3sCCaTHQ6HbC61tMd7nIZeT0HCkeE1ZvU6OfgDpYhxcr JacEjaO530uVHXjxpgVs+Ft7zqyzZJ1BbCyvSer5eWv6b6wde0Qsmjrkd5J6wqjmdECf9xzjGuw +SxcOxm+M+Ws3VwTly3ilfWX8mHjQcs9EIglsW3LDo+a/PIuu2MzNhsnu0pYiK4CYlATSpJeO1X /IN1CQRO1W03J X-Google-Smtp-Source: AGHT+IFh8UZCf1lMM0AB5Pl5QyhxlYjlEx54LD614psHxxU9tJBBvIc/xm98REQqJdqUTr/h/Jfdsw== X-Received: by 2002:a05:6a00:4601:b0:75e:bd57:59c4 with SMTP id d2e1a72fcca58-76ab101f18fmr6526327b3a.9.1753909714951; Wed, 30 Jul 2025 14:08:34 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:58fd:da9:30d5:829a]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-769ee9ef1casm4929456b3a.3.2025.07.30.14.08.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 30 Jul 2025 14:08:34 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][walnascar 2/8] coreutils: fix CVE-2025-5278 Date: Wed, 30 Jul 2025 14:08:21 -0700 Message-ID: <239cadfd4642e7f7ad4c76df2eb70f16021c3164.1753909581.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 30 Jul 2025 21:08:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221152 From: Chen Qi Backport patch to fix CVE-2025-5278. Signed-off-by: Chen Qi Signed-off-by: Steve Sakoman --- .../coreutils/coreutils/CVE-2025-5278.patch | 112 ++++++++++++++++++ meta/recipes-core/coreutils/coreutils_9.6.bb | 1 + 2 files changed, 113 insertions(+) create mode 100644 meta/recipes-core/coreutils/coreutils/CVE-2025-5278.patch diff --git a/meta/recipes-core/coreutils/coreutils/CVE-2025-5278.patch b/meta/recipes-core/coreutils/coreutils/CVE-2025-5278.patch new file mode 100644 index 0000000000..41be1635b5 --- /dev/null +++ b/meta/recipes-core/coreutils/coreutils/CVE-2025-5278.patch @@ -0,0 +1,112 @@ +From 8763c305c29d0abb7e2be4695212b42917d054b2 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?P=C3=A1draig=20Brady?= +Date: Tue, 20 May 2025 16:03:44 +0100 +Subject: [PATCH] sort: fix buffer under-read (CWE-127) + +* src/sort.c (begfield): Check pointer adjustment +to avoid Out-of-range pointer offset (CWE-823). +(limfield): Likewise. +* tests/sort/sort-field-limit.sh: Add a new test, +which triggers with ASAN or Valgrind. +* tests/local.mk: Reference the new test. +* NEWS: Mention bug fix introduced in v7.2 (2009). +Fixes https://bugs.gnu.org/78507 + +CVE: CVE-2025-5278 + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633] + +Signed-off-by: Chen Qi +--- + src/sort.c | 12 ++++++++++-- + tests/local.mk | 1 + + tests/sort/sort-field-limit.sh | 35 ++++++++++++++++++++++++++++++++++ + 3 files changed, 46 insertions(+), 2 deletions(-) + create mode 100755 tests/sort/sort-field-limit.sh + +diff --git a/src/sort.c b/src/sort.c +index b10183b6f..7af1a2512 100644 +--- a/src/sort.c ++++ b/src/sort.c +@@ -1644,7 +1644,11 @@ begfield (struct line const *line, struct keyfield const *key) + ++ptr; + + /* Advance PTR by SCHAR (if possible), but no further than LIM. */ +- ptr = MIN (lim, ptr + schar); ++ size_t remaining_bytes = lim - ptr; ++ if (schar < remaining_bytes) ++ ptr += schar; ++ else ++ ptr = lim; + + return ptr; + } +@@ -1746,7 +1750,11 @@ limfield (struct line const *line, struct keyfield const *key) + ++ptr; + + /* Advance PTR by ECHAR (if possible), but no further than LIM. */ +- ptr = MIN (lim, ptr + echar); ++ size_t remaining_bytes = lim - ptr; ++ if (echar < remaining_bytes) ++ ptr += echar; ++ else ++ ptr = lim; + } + + return ptr; +diff --git a/tests/local.mk b/tests/local.mk +index 4da6756ac..642d225fa 100644 +--- a/tests/local.mk ++++ b/tests/local.mk +@@ -388,6 +388,7 @@ all_tests = \ + tests/sort/sort-debug-keys.sh \ + tests/sort/sort-debug-warn.sh \ + tests/sort/sort-discrim.sh \ ++ tests/sort/sort-field-limit.sh \ + tests/sort/sort-files0-from.pl \ + tests/sort/sort-float.sh \ + tests/sort/sort-h-thousands-sep.sh \ +diff --git a/tests/sort/sort-field-limit.sh b/tests/sort/sort-field-limit.sh +new file mode 100755 +index 000000000..52d8e1d17 +--- /dev/null ++++ b/tests/sort/sort-field-limit.sh +@@ -0,0 +1,35 @@ ++#!/bin/sh ++# From 7.2-9.7, this would trigger an out of bounds mem read ++ ++# Copyright (C) 2025 Free Software Foundation, Inc. ++ ++# This program is free software: you can redistribute it and/or modify ++# it under the terms of the GNU General Public License as published by ++# the Free Software Foundation, either version 3 of the License, or ++# (at your option) any later version. ++ ++# This program is distributed in the hope that it will be useful, ++# but WITHOUT ANY WARRANTY; without even the implied warranty of ++# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ++# GNU General Public License for more details. ++ ++# You should have received a copy of the GNU General Public License ++# along with this program. If not, see . ++ ++. "${srcdir=.}/tests/init.sh"; path_prepend_ ./src ++print_ver_ sort ++getlimits_ ++ ++# This issue triggers with valgrind or ASAN ++valgrind --error-exitcode=1 sort --version 2>/dev/null && ++ VALGRIND='valgrind --error-exitcode=1' ++ ++{ printf '%s\n' aa bb; } > in || framework_failure_ ++ ++_POSIX2_VERSION=200809 $VALGRIND sort +0.${SIZE_MAX}R in > out || fail=1 ++compare in out || fail=1 ++ ++_POSIX2_VERSION=200809 $VALGRIND sort +1 -1.${SIZE_MAX}R in > out || fail=1 ++compare in out || fail=1 ++ ++Exit $fail +-- +2.34.1 + diff --git a/meta/recipes-core/coreutils/coreutils_9.6.bb b/meta/recipes-core/coreutils/coreutils_9.6.bb index b876a8fdd0..34c6246ed3 100644 --- a/meta/recipes-core/coreutils/coreutils_9.6.bb +++ b/meta/recipes-core/coreutils/coreutils_9.6.bb @@ -19,6 +19,7 @@ SRC_URI = "${GNU_MIRROR}/coreutils/${BP}.tar.xz \ file://intermittent-testfailure.patch \ file://0001-ls-fix-crash-with-context.patch \ file://0001-cksum-port-to-32-bit-uint_fast32_t.patch \ + file://CVE-2025-5278.patch \ file://run-ptest \ " SRC_URI[sha256sum] = "7a0124327b398fd9eb1a6abde583389821422c744ffa10734b24f557610d3283" From patchwork Wed Jul 30 21:08:22 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 67776 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 80B93C87FD5 for ; Wed, 30 Jul 2025 21:08:44 +0000 (UTC) Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by mx.groups.io with SMTP id smtpd.web10.46727.1753909717441758221 for ; Wed, 30 Jul 2025 14:08:37 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=X7uGrckS; spf=softfail (domain: sakoman.com, ip: 209.85.210.169, mailfrom: steve@sakoman.com) Received: by mail-pf1-f169.google.com with SMTP id d2e1a72fcca58-74931666cbcso227130b3a.0 for ; Wed, 30 Jul 2025 14:08:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1753909716; x=1754514516; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Ew3B2EWu4afk6hZVcH3uXntRJiaytOKC436fHOs55kY=; b=X7uGrckS1I228l3/V9kt7vbuBvr2MDzL43zEEqUaC5K9UMAG1mdE5VdsILC3a1/R7j UpIoY9WFI0oIa7ZhA8/OmzfuKGclAmTmz2WvRPBEHWL3J9I7tbv25/6JxNN1f/VtG339 Buh8ZYw+pTsI3CenkTXPUo5kdLdNK+d0e6jf8zEvx0vsEYkSqflycG8MlfWbMp+ErK9r 19MB0cuqWh/F6hMEQgkNV2x+6Yy5rWNu+szLit3O4FZppxQEcbBzuFPYsk4zBWLr2nAP N+z1k5UsYU0HjWUf2TPxUP4QOQkG74BC+cp4DKmQSyNnjXVVK2pKvjfI31oydvzS8sth eLhQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753909716; x=1754514516; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Ew3B2EWu4afk6hZVcH3uXntRJiaytOKC436fHOs55kY=; b=n7aUHirlgIHBpVQpJWR2jx/1ke+E4YFOs2K7m39Nawtz5DJOgW7TxVcZxGMK1cgdBn KlYkcLyW89NHSINzzCpmIaAtZNZSSUn+ayuik2PXGqvL91pNlD80bnC9YeNQCXzwXxRv +7NKliQO7pzmNIAwPgNpHMzkMhnjoS06PJ8CkZ/OOWwaDUYxXOh2YR9A+qboBkE0ex+z lECyXml/IisPvjLwyF62aDti0PJ5N1pjGyJUN9hwWKr1i3Kgna/YWpx95nzwfkbTEVaS fzuboNiqKBTyEgkVPmc8WNZAwkejH74V+08OS4UQNRRF1XHoZHnlHxR789T7LyN3768F jejQ== X-Gm-Message-State: AOJu0YxbRXsCUlk7GXBGCKAoV3IOdBjeo3SqSMJqHJLBHE4ahiqBEtWy TkPFK9JALSDBBEjdRkgrxNaXd8rh6Dt6Yb9KWFUAXybcKW4LvR7CE5qI3LDJPDvONuHJdy3DKX+ T4YCp X-Gm-Gg: ASbGnctLsdhD0DQM3HuWl5IUdeXtsH2gPvksfOdbqgQzN2BnEqmOBdAmb9/T/3A74Mq yA0XbZ4oWE3WRSqdNhBK/HnrTbiEkZviWhPL0I8/iJHUJ7u2+tyH/mckFoSO2s6+j6kY/fjkupJ qoL0QOKdVaaLHCo7T5Ll2j39KoDAtxUJ1Or57tXY+Djd1lzDG47g66jSCVC0tWx0iwk5wqtTOrA a8QD7rzedin5R7JDf07+/cSBL1qEzUH7EkcSqjO1jH7Ni1JBpnNAj9y1hTIUUBS3BJqYKEynFWi 58NgXfVgQkI3UnqdaffndhVpl23KOEUq7o554Urtd+wtEm9E+/4GvjUUvxldrwinJNR1IatfZ/h gJC1UwZnGkrEV X-Google-Smtp-Source: AGHT+IG9GpYwtsIvHMtqqvVo3c1XbiI/EjofDSsef489TMyyrxnZt4zfcXNgOFC683B//28QBgbiYw== X-Received: by 2002:a05:6a00:ad6:b0:749:ad1:ac8a with SMTP id d2e1a72fcca58-76ab2b55c8dmr6766129b3a.11.1753909716416; Wed, 30 Jul 2025 14:08:36 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:58fd:da9:30d5:829a]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-769ee9ef1casm4929456b3a.3.2025.07.30.14.08.35 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 30 Jul 2025 14:08:36 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][walnascar 3/8] libxml2: patch CVE-2025-6170 Date: Wed, 30 Jul 2025 14:08:22 -0700 Message-ID: <1dab0ba31fd09911d4fa707c1318bb0e83f46cdd.1753909581.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 30 Jul 2025 21:08:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221153 From: Peter Marko Pick commit referencing this CVE from 2.13 branch. Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- .../libxml/libxml2/CVE-2025-6170.patch | 103 ++++++++++++++++++ meta/recipes-core/libxml/libxml2_2.13.8.bb | 1 + 2 files changed, 104 insertions(+) create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2025-6170.patch diff --git a/meta/recipes-core/libxml/libxml2/CVE-2025-6170.patch b/meta/recipes-core/libxml/libxml2/CVE-2025-6170.patch new file mode 100644 index 0000000000..29c82f8baf --- /dev/null +++ b/meta/recipes-core/libxml/libxml2/CVE-2025-6170.patch @@ -0,0 +1,103 @@ +From 5e9ec5c107d3f5b5179c3dbc19df43df041cd55b Mon Sep 17 00:00:00 2001 +From: Michael Mann +Date: Fri, 20 Jun 2025 23:05:00 -0400 +Subject: [PATCH] [CVE-2025-6170] Fix potential buffer overflows of interactive + shell + +Fixes #941 + +CVE: CVE-2025-6170 +Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/5e9ec5c107d3f5b5179c3dbc19df43df041cd55b] +Signed-off-by: Peter Marko +--- + debugXML.c | 15 ++++++++++----- + result/scripts/long_command | 8 ++++++++ + test/scripts/long_command.script | 6 ++++++ + test/scripts/long_command.xml | 1 + + 4 files changed, 25 insertions(+), 5 deletions(-) + create mode 100644 result/scripts/long_command + create mode 100644 test/scripts/long_command.script + create mode 100644 test/scripts/long_command.xml + +diff --git a/debugXML.c b/debugXML.c +index ed56b0f8..452b9573 100644 +--- a/debugXML.c ++++ b/debugXML.c +@@ -1033,6 +1033,10 @@ xmlCtxtDumpOneNode(xmlDebugCtxtPtr ctxt, xmlNodePtr node) + xmlCtxtGenericNodeCheck(ctxt, node); + } + ++#define MAX_PROMPT_SIZE 500 ++#define MAX_ARG_SIZE 400 ++#define MAX_COMMAND_SIZE 100 ++ + /** + * xmlCtxtDumpNode: + * @output: the FILE * for the output +@@ -2795,10 +2799,10 @@ void + xmlShell(xmlDocPtr doc, const char *filename, xmlShellReadlineFunc input, + FILE * output) + { +- char prompt[500] = "/ > "; ++ char prompt[MAX_PROMPT_SIZE] = "/ > "; + char *cmdline = NULL, *cur; +- char command[100]; +- char arg[400]; ++ char command[MAX_COMMAND_SIZE]; ++ char arg[MAX_ARG_SIZE]; + int i; + xmlShellCtxtPtr ctxt; + xmlXPathObjectPtr list; +@@ -2856,7 +2860,8 @@ xmlShell(xmlDocPtr doc, const char *filename, xmlShellReadlineFunc input, + cur++; + i = 0; + while ((*cur != ' ') && (*cur != '\t') && +- (*cur != '\n') && (*cur != '\r')) { ++ (*cur != '\n') && (*cur != '\r') && ++ (i < (MAX_COMMAND_SIZE - 1))) { + if (*cur == 0) + break; + command[i++] = *cur++; +@@ -2871,7 +2876,7 @@ xmlShell(xmlDocPtr doc, const char *filename, xmlShellReadlineFunc input, + while ((*cur == ' ') || (*cur == '\t')) + cur++; + i = 0; +- while ((*cur != '\n') && (*cur != '\r') && (*cur != 0)) { ++ while ((*cur != '\n') && (*cur != '\r') && (*cur != 0) && (i < (MAX_ARG_SIZE-1))) { + if (*cur == 0) + break; + arg[i++] = *cur++; +diff --git a/result/scripts/long_command b/result/scripts/long_command +new file mode 100644 +index 00000000..e6f00708 +--- /dev/null ++++ b/result/scripts/long_command +@@ -0,0 +1,8 @@ ++/ > b > b > Object is a Node Set : ++Set contains 1 nodes: ++1 ELEMENT a:c ++b > Unknown command This_is_a_really_long_command_string_designed_to_test_the_limits_of_the_memory_that_stores_the_comm ++b > b > Unknown command ess_currents_of_time_and_existence ++b > ++Navigating_the_labyrinthine_corridors_of_human_cognition_one_often_encounters_the_perplexing_paradox_that_the_more_we_delve_into_the_intricate_dance_of_neural_pathways_and_synaptic_firings_the_further_we_seem_to_stray_from_a_truly_holistic_understanding_of_consciousness_a_phenomenon_that_remains_as_elusive_as_a_moonbeam_caught_in_a_spiderweb_yet_undeniably_shapes_every_fleeting_thought_every_prof ++b > +\ No newline at end of file +diff --git a/test/scripts/long_command.script b/test/scripts/long_command.script +new file mode 100644 +index 00000000..00f6df09 +--- /dev/null ++++ b/test/scripts/long_command.script +@@ -0,0 +1,6 @@ ++cd a/b ++set ++xpath //*[namespace-uri()="foo"] ++This_is_a_really_long_command_string_designed_to_test_the_limits_of_the_memory_that_stores_the_command_please_dont_crash foo ++set Navigating_the_labyrinthine_corridors_of_human_cognition_one_often_encounters_the_perplexing_paradox_that_the_more_we_delve_into_the_intricate_dance_of_neural_pathways_and_synaptic_firings_the_further_we_seem_to_stray_from_a_truly_holistic_understanding_of_consciousness_a_phenomenon_that_remains_as_elusive_as_a_moonbeam_caught_in_a_spiderweb_yet_undeniably_shapes_every_fleeting_thought_every_profound_emotion_and_every_grand_aspiration_that_propels_our_species_ever_onward_through_the_relentless_currents_of_time_and_existence ++save - +diff --git a/test/scripts/long_command.xml b/test/scripts/long_command.xml +new file mode 100644 +index 00000000..1ba44016 +--- /dev/null ++++ b/test/scripts/long_command.xml +@@ -0,0 +1 @@ ++ diff --git a/meta/recipes-core/libxml/libxml2_2.13.8.bb b/meta/recipes-core/libxml/libxml2_2.13.8.bb index fd042c311d..4bd2a0d38f 100644 --- a/meta/recipes-core/libxml/libxml2_2.13.8.bb +++ b/meta/recipes-core/libxml/libxml2_2.13.8.bb @@ -20,6 +20,7 @@ SRC_URI += "http://www.w3.org/XML/Test/xmlts20130923.tar;subdir=${BP};name=testt file://CVE-2025-6021.patch \ file://CVE-2025-49794_CVE-2025-49796.patch \ file://CVE-2025-49795.patch \ + file://CVE-2025-6170.patch \ " SRC_URI[archive.sha256sum] = "277294cb33119ab71b2bc81f2f445e9bc9435b893ad15bb2cd2b0e859a0ee84a" From patchwork Wed Jul 30 21:08:23 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 67772 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 54B29C87FCC for ; Wed, 30 Jul 2025 21:08:44 +0000 (UTC) Received: from mail-pf1-f177.google.com (mail-pf1-f177.google.com [209.85.210.177]) by mx.groups.io with SMTP id smtpd.web11.46612.1753909719044596794 for ; Wed, 30 Jul 2025 14:08:39 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=QPKlDOIS; spf=softfail (domain: sakoman.com, ip: 209.85.210.177, mailfrom: steve@sakoman.com) Received: by mail-pf1-f177.google.com with SMTP id d2e1a72fcca58-76b6422756fso350317b3a.2 for ; Wed, 30 Jul 2025 14:08:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1753909718; x=1754514518; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=KEI8MjL87gtl6xuR9TNW2CXxsIbbu3aRbpq5JGGaQDw=; b=QPKlDOIS4VDMdvwTRY1nW/qj57E3qWBdCuhxt67qdWpW0ozFN5dUccmmt+oVYVsJVd znoR7F2WTQZcNKbS5wFM/ORnrHQLj57ZwKlkZuOSlgNpcpNNWjJOBN3PSEnhEUBvMYwP QU/Kt7oVChWXTg0abhQSvmn0lVaaShED2iQHwkpd8+eCitwFVWn2k6uBYsTywnMjaL6x jgq/nIfkxrqLCQo0JiqlnDe1qE52FXA6s4o+ZB7VFdtvN4YHKYglo6Z6lZrT2KXJQMRc eHguR92lcDLxgrWhOQWkqMhWiCs/SKAHgk+M36Pp5F/nm5Bg+qOvq53L2a5V0cGWTJx2 jeew== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753909718; x=1754514518; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=KEI8MjL87gtl6xuR9TNW2CXxsIbbu3aRbpq5JGGaQDw=; b=bbbzOvN6dZRTDbiQrtqJDhr/UJPXroBMI+iBC1vrfORztyOiPB4sSyY/9anXcEQ/8N xdjeBhAgm9+/LXsCHeUJxMv2/Wf5xBL2aTQRaChXIOgIqpcegIQq6bolAAiRdOzGkObX Fnheu6JfrKf/nfi+J9JCxINffnjtIzqoP7238u5uE0lNr9MfV3egX+0La7vBQgKOx9G4 wqdfXUnYUAScrm1Y3Pn4r/dYayKFosgZ2rqnkYXgT01WGqUdWWOgcVbTJZ1Zum9n2Ms6 kLwKKpjPNK7zd3T2a9C5ALocDGDY4DGyfPu3+TKekRAvMvI1Xv0Ulj2vGux3JNG3X1Eh eBAQ== X-Gm-Message-State: AOJu0YybI05q2KVnfOMIIvWcfRnzHYVY86OrZQrwdCaDhJl7kAISDMCm tITkkZxfasM2ArN8W/DNOyXiwdLwib6/6tQ5aU+aXy2otFM/e7t1LWDQd1NU99xnYxKJ6ysp+KT gPw+G X-Gm-Gg: ASbGncvSYG1WEEDCrlWVlah0phreqwKwkkJ+hmnaEqqzT34RmlR6T7ZYIbTvkPa89Dj wlZm4aVQXH7LSeYgmfJhi05kN3NBfzA7C9KU/7f3l4uH1xh7AxhtYd8clLu3pA3N7IlBFekZ8Q0 1CHwqx6GOg8XPFq6gzBr7iL33NbfmcdeMhAvypxlu7yRg3ykh8ERoCkD+O6f0UHdpa9Cwf5180+ gCytXQcWNBfjlCyKD40wUow235CJyrmE2tlwWkxlhdg9fNf8W6qBk1DYMf5mgsJ1bvWXth1Xzo6 ckRr5dNyk36bTRy/GlrScgttPX5Ru7qy6Gfv24jz9XRQePv8SjYGgYwAj+h5NwfM+DBZnOZzSFa h9kKc0CMoax3S X-Google-Smtp-Source: AGHT+IGTd9TsrvPvAPVJye+IFZ0ek/jNRGz8NDCPS+ka74xSRv3svG9RxmLIMdHYDEBulfNVHdU6Lg== X-Received: by 2002:a05:6a20:1590:b0:230:f847:6586 with SMTP id adf61e73a8af0-23dc0e92791mr7373937637.29.1753909718111; Wed, 30 Jul 2025 14:08:38 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:58fd:da9:30d5:829a]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-769ee9ef1casm4929456b3a.3.2025.07.30.14.08.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 30 Jul 2025 14:08:37 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][walnascar 4/8] dpkg: fix CVE-2025-6297 Date: Wed, 30 Jul 2025 14:08:23 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 30 Jul 2025 21:08:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221154 From: Hongxu Jia Backport a patch from upstream to fix CVE-2025-6297 [1] [1] https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=98c623c8d6814ae46a3b30ca22e584c77d47d86b Signed-off-by: Hongxu Jia Signed-off-by: Steve Sakoman --- .../dpkg/dpkg/CVE-2025-6297.patch | 130 ++++++++++++++++++ meta/recipes-devtools/dpkg/dpkg_1.22.11.bb | 1 + 2 files changed, 131 insertions(+) create mode 100644 meta/recipes-devtools/dpkg/dpkg/CVE-2025-6297.patch diff --git a/meta/recipes-devtools/dpkg/dpkg/CVE-2025-6297.patch b/meta/recipes-devtools/dpkg/dpkg/CVE-2025-6297.patch new file mode 100644 index 0000000000..69f65d8077 --- /dev/null +++ b/meta/recipes-devtools/dpkg/dpkg/CVE-2025-6297.patch @@ -0,0 +1,130 @@ +From 04cde8cbda7044d950488dd47321eebef4edd99f Mon Sep 17 00:00:00 2001 +From: Guillem Jover +Date: Sat, 7 Jun 2025 14:17:07 +0200 +Subject: [PATCH] dpkg-deb: Fix cleanup for control member with restricted + directories +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +When extracting a control member into a temporary directory, which is +documented as being a safe operation even on untrusted data, the code +in charge of the temporary directory cleanup does not sanitize the +directory permissions, which is then unable to perform the «rm -rf» +when running as a non-root user, leaving temporary files behind. + +Given automated and repeated execution of dpkg-deb commands on +adversarial .deb packages or with well compressible files, placed +inside a directory with permissions not allowing removal by a non-root +user, this can end up with a DoS scenario due to causing disk quota +exhaustion or disk full conditions. + +This is considered a minor issue, given the required conditions to +trigger a problem with it, but an issue non the less given the +documented security guarantees of the command. This has been an +issue since the initial commit introducing dpkg-deb in C. + +We use an existing string for the error message to avoid new strings +needing translation for stable branches, which make the error message +less descriptive than what would be ideal. This will be improved in +git HEAD. + +Reported-by: zhutyra on HackerOne +Fixes: CVE-2025-6297 +Stable-Candidate: 1.20.x 1.21.x 1.22.x +(cherry picked from commit ed6bbd445dd8800308c67236ba35d08004c98e82) +(cherry picked from commit 02ad0532bd490cbc95b344f670e622a38eecfbf6) +(cherry picked from commit d8a76551e22abe76eefd7fef5c7f51f4118eb40e) + +Signed-off-by: Guillem Jover + +CVE: CVE-2025-6297 +Upstream-Status: Backport [https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=98c623c8d6814ae46a3b30ca22e584c77d47d86b] +Signed-off-by: Hongxu Jia +--- + src/at/deb-content.at | 32 ++++++++++++++++++++++++++++++++ + src/deb/info.c | 20 ++++++++++++++++++++ + 2 files changed, 52 insertions(+) + +diff --git a/src/at/deb-content.at b/src/at/deb-content.at +index f475603f9..aa5582992 100644 +--- a/src/at/deb-content.at ++++ b/src/at/deb-content.at +@@ -127,3 +127,35 @@ newline' + ]) + + AT_CLEANUP ++ ++AT_SETUP([dpkg-deb .deb extraction cleanup]) ++AT_KEYWORDS([dpkg-deb deb extraction]) ++ ++DPKG_GEN_CONTROL([pkg-ctrl-dir-perms]) ++AT_CHECK([ ++dpkg-deb --root-owner-group -Znone -b pkg-ctrl-dir-perms ++DPKG_AR_EXTRACT([pkg-ctrl-dir-perms.deb]) ++dpkg-deb -R pkg-ctrl-dir-perms.deb pkg-ctrl-dir-perms-bad ++mkdir -p pkg-ctrl-dir-perms-bad/DEBIAN/rx-subdir/inner ++touch pkg-ctrl-dir-perms-bad/DEBIAN/rx-subdir/inner/file ++chmod 0555 pkg-ctrl-dir-perms-bad/DEBIAN ++chmod 0555 pkg-ctrl-dir-perms-bad/DEBIAN/rx-subdir ++chmod 0555 pkg-ctrl-dir-perms-bad/DEBIAN/rx-subdir/inner ++$TAR cf control.tar --format=gnu --sort=name --mtime @0 --clamp-mtime --owner root:0 --group root:0 -C pkg-ctrl-dir-perms-bad/DEBIAN . ++DPKG_AR_GEN([pkg-ctrl-dir-perms.deb], [debian-binary control.tar data.tar]) ++], [0], [dpkg-deb: building package 'pkg-ctrl-dir-perms' in 'pkg-ctrl-dir-perms.deb'. ++]) ++AT_CHECK([ ++dpkg-deb --ctrl-tarfile pkg-ctrl-dir-perms.deb | $TAR tvf - ++], [0], [dr-xr-xr-x root/root 0 1970-01-01 00:00 ./ ++-rw-r--r-- root/root 176 1970-01-01 00:00 ./control ++dr-xr-xr-x root/root 0 1970-01-01 00:00 ./rx-subdir/ ++dr-xr-xr-x root/root 0 1970-01-01 00:00 ./rx-subdir/inner/ ++-rw-r--r-- root/root 0 1970-01-01 00:00 ./rx-subdir/inner/file ++]) ++# Check that we can cleanup the temporarily extracted control.tar member. ++AT_CHECK([ ++dpkg-deb -I pkg-ctrl-dir-perms.deb ++], [0], [ignore]) ++ ++AT_CLEANUP +diff --git a/src/deb/info.c b/src/deb/info.c +index afe79011f..a3d566379 100644 +--- a/src/deb/info.c ++++ b/src/deb/info.c +@@ -45,14 +45,34 @@ + #include + #include + #include ++#include + #include + + #include "dpkg-deb.h" + ++static int ++cu_info_treewalk_fixup_dir(struct treenode *node) ++{ ++ const char *nodename; ++ ++ if (!S_ISDIR(treenode_get_mode(node))) ++ return 0; ++ ++ nodename = treenode_get_pathname(node); ++ if (chmod(nodename, 0755) < 0) ++ ohshite(_("error setting permissions of '%.255s'"), nodename); ++ ++ return 0; ++} ++ + static void cu_info_prepare(int argc, void **argv) { + char *dir; ++ struct treewalk_funcs cu_info_treewalk_funcs = { ++ .visit = cu_info_treewalk_fixup_dir, ++ }; + + dir = argv[0]; ++ treewalk(dir, TREEWALK_NONE, &cu_info_treewalk_funcs); + path_remove_tree(dir); + free(dir); + } +-- +2.49.0 + diff --git a/meta/recipes-devtools/dpkg/dpkg_1.22.11.bb b/meta/recipes-devtools/dpkg/dpkg_1.22.11.bb index 47a8d5d5ea..4992c14074 100644 --- a/meta/recipes-devtools/dpkg/dpkg_1.22.11.bb +++ b/meta/recipes-devtools/dpkg/dpkg_1.22.11.bb @@ -13,6 +13,7 @@ SRC_URI = "git://salsa.debian.org/dpkg-team/dpkg.git;protocol=https;branch=main file://0007-dpkg-deb-build.c-Remove-usage-of-clamp-mtime-in-tar.patch \ file://0001-dpkg-Support-muslx32-build.patch \ file://0001-Add-support-for-riscv32-CPU.patch \ + file://CVE-2025-6297.patch \ " SRC_URI:append:class-native = " file://0001-build.c-ignore-return-of-1-from-tar-cf.patch" From patchwork Wed Jul 30 21:08:24 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 67774 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5AB6DC87FCE for ; Wed, 30 Jul 2025 21:08:44 +0000 (UTC) Received: from mail-pf1-f178.google.com (mail-pf1-f178.google.com [209.85.210.178]) by mx.groups.io with SMTP id smtpd.web10.46729.1753909720310761896 for ; Wed, 30 Jul 2025 14:08:40 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=TcKJgub8; spf=softfail (domain: sakoman.com, ip: 209.85.210.178, mailfrom: steve@sakoman.com) Received: by mail-pf1-f178.google.com with SMTP id d2e1a72fcca58-748e378ba4fso368532b3a.1 for ; Wed, 30 Jul 2025 14:08:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1753909719; x=1754514519; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Sf1BSoZ7hJZULGq14Uonrd6eFSfI9NM2f9OUYR/UiQs=; b=TcKJgub85scCnzTdqLx0E1FmQV8DAEGkev1Q9xWgjupKICZ3UyrcMmM8SCpi53wtmM KvB/0yPtrtsfOtYWavd3CwLTrwpZkunFhxhENDThiu/7PSa3FOpqDGfcNG8PJSaUa6la Fj7CU7pqSo1mv/T6TVQsozJQWJXc3D+UjEJTxIu3WTomr3GDFzL2AvXRVBPHRw/HsR6Q eXW2DMK674KADl4HX0PZD4RSLAL15270T7ANaqM0oLkOW1itnZ1lpBfgKVE6+N2YAEUL R4myI3KikxCR1Pu3DVeDblf92lZs6OtgA2kKz60JuPsluOHqVApckk2fberlNdrXNb+U z6ig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753909719; x=1754514519; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Sf1BSoZ7hJZULGq14Uonrd6eFSfI9NM2f9OUYR/UiQs=; b=Tjo73fPKWOwqe3ldVpLY/vEWfxifn3BTsZkdR6Tgh/2zh7p/p9jQvzgfMTSrBPgRou dDiPQCmWEYG5BBvPfu3XxYJoJ20gM/J9VVmpnNL32MRJGeU/i7NLSGeGaq34vuHg6+oK EdV3+PikPkXge/1AnBf7gNCnQH3yPXxADCYZanPVcksfvkVAB0TqDfUXXPZSA0ap4aah HPkMlj+BSPiP5tjP8LSxBwT4B/+GbKO2MjyPSH9sNw2G2GKZPIGUiX3Ojwm2yY4ckzXl iBrjSAXRsVPhcKye/CGjEg86W7SkAWwlwXFKSPtkImzkAZZUnzwsaVlsZ7loJeqpU0je xdPw== X-Gm-Message-State: AOJu0Yy/+Gg/wP963s/VxVDkcEYKq+gUrzfKbyNeNrQp4GqBfbuPZxE1 QCHbVMdlYKUDFCN4F0hWcmf28FYPMfFNaMfGMRteezDnGnSMdP/Ncs7/Omlk8ITYkGloBUkHGBN dqon0 X-Gm-Gg: ASbGncvl2Op0FTh48zp3E96/1s429gll3LyPH7VrGks91MvdgigohF43Teac0/pZk6T 2N/jQfFGzb4/5GC5JjgNh2oBfcLBeAnruCALNfBREPtk26e5ok5k3lPZ57lkUSHxzWjNJLf0fqR rMtIiSipFQnpHM0P7QIXn0bQc0DW3XehM9h4rT1DqmrLQtdiy3kXZ9Up5CP5UtJ2Y2L2p5h2PeM zwe9HceSc4M8Z5aQGZ5OcgvVETOvacqxw0+OEc7OT4nhQkCvsnyRYSsi1hKbf4jKIT8YiNy9UVW L5vKtsiwVjpJKxiKQpyUu7M3EWf0JrdlBUxU7PwBCNTEN6E2MEpEInicnZXeHKa04d7/cj0sKav +ghVvgFu9050v X-Google-Smtp-Source: AGHT+IH7LVOMhEPjn69dxIRtz85tRRTUCjtx6AKw465kVz6dYTXTgmq5ivhjctwUbA76AD2M4hji9w== X-Received: by 2002:a05:6a20:7f9c:b0:232:7628:9959 with SMTP id adf61e73a8af0-23dc0d6980bmr8117064637.8.1753909719511; Wed, 30 Jul 2025 14:08:39 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:58fd:da9:30d5:829a]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-769ee9ef1casm4929456b3a.3.2025.07.30.14.08.38 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 30 Jul 2025 14:08:39 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][walnascar 5/8] scripts/install-buildtools: Update to 5.2.2 Date: Wed, 30 Jul 2025 14:08:24 -0700 Message-ID: <9574617a89be544a855c3309e4fcedf34d689eaf.1753909581.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 30 Jul 2025 21:08:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221155 From: Aleksandar Nikolic Update to the 5.2.2 release of the 5.2 series for buildtools Signed-off-by: Aleksandar Nikolic Signed-off-by: Steve Sakoman --- scripts/install-buildtools | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/scripts/install-buildtools b/scripts/install-buildtools index aa23942858..50b5487eb8 100755 --- a/scripts/install-buildtools +++ b/scripts/install-buildtools @@ -57,8 +57,8 @@ logger = scriptutils.logger_create(PROGNAME, stream=sys.stdout) DEFAULT_INSTALL_DIR = os.path.join(os.path.split(scripts_path)[0],'buildtools') DEFAULT_BASE_URL = 'https://downloads.yoctoproject.org/releases/yocto' -DEFAULT_RELEASE = 'yocto-5.2.1' -DEFAULT_INSTALLER_VERSION = '5.2.1' +DEFAULT_RELEASE = 'yocto-5.2.2' +DEFAULT_INSTALLER_VERSION = '5.2.2' DEFAULT_BUILDDATE = '202110XX' # Python version sanity check From patchwork Wed Jul 30 21:08:25 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 67773 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6523BC83F26 for ; Wed, 30 Jul 2025 21:08:44 +0000 (UTC) Received: from mail-pf1-f174.google.com (mail-pf1-f174.google.com [209.85.210.174]) by mx.groups.io with SMTP id smtpd.web11.46613.1753909721831456952 for ; Wed, 30 Jul 2025 14:08:41 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=OD0/0CDU; spf=softfail (domain: sakoman.com, ip: 209.85.210.174, mailfrom: steve@sakoman.com) Received: by mail-pf1-f174.google.com with SMTP id d2e1a72fcca58-76bc61152d8so240960b3a.2 for ; Wed, 30 Jul 2025 14:08:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1753909721; x=1754514521; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=sbLpP0PVmz8a3yJaLvyEK6s6J7/VD8dv5XMCRJ2MeaY=; b=OD0/0CDUvsTi9pBviX6l7feCMh4tcUdnsi1doljgQC4xVDBmpg+LzP5lJMaYnEdskq jsAxNoxdXpAqcWrxMgoUsOMEVE8ucqEJnYyT9B3FyPPZzvRPYoTMatydaRN/Av3iX5IO 5QDCJrHZ7eC8c1iQ/oSwKZCJXic6qel+KlyVEjhDWM9QKT6e0jzagdCdHhkH12YOi4AW 7AIIZPJ3j/9tooQ5U1USCB/9NujsPP7woGudynUiPjJzwjSfVWx0NZjIg9lVvvm0ejY0 zcYcQVD1UuYUN6UxnXnBwcimOifGrR0/ASwuj1Q0Nb3EcJe33qOEOXgDdScme0b/tHX4 iwMw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753909721; x=1754514521; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=sbLpP0PVmz8a3yJaLvyEK6s6J7/VD8dv5XMCRJ2MeaY=; b=Cw9iPJyMnfMW51a9RyCNMj7nquJbjHrjM4bYEVBSz3Cmpeu6p//qH35WscIRKhhp80 g74wqG1KAPvo2S+Z0t6FTX2qxKIr7Xqtgo38xpuneUyJQFMlLLB4knS3qr8n4ToXDEg5 eVa5xeXHBiENHwvrcx9ZD0aGV28l36W5iL9ofqqSDjcEmodVhvGeB4eJxHSgtTcEFu9u DO4Rz2RHPFXUe/UYVvab3R4goec89TagYfevsvRyJ8b1bqyEEBxeFsdhe2vOItqzAwLp 1ILi64NRlCZs1LRJZ4lS6efU70TuyDllMkIqDoxY1uMzZ1DHDul7Muo3f50C+A0FzMdY SF+Q== X-Gm-Message-State: AOJu0Yyzvz8Gyen0bLXYeqasNak048QyX+odWU2W6CGnqOqB7e6uH+SM 5E1H0iLG2Y5yFiueMTxqP/UqQC+WA0DZCGc4ExJyhNxlnBejUeKX8sRGXDElvuHEvYa9Y4JDJxR sEJ51 X-Gm-Gg: ASbGncsdfXKZ7mKuSPGwvzOKlgVXd6iQtkc3fhZjlCYTxUiAlcBnFdLphjOZK9PSBNR dMXSu/PG9Zc6xmTS34voHtPVDxxR1r6JvFA3+h9bUd57Nb20i5pwixDxflKO7wyk2YNG3JEjERE Nb3Uuoxm5UkyDFHMywErckk2Y4TKN6EYDRwozEFwtCeazXX3v7sF3+ZO4QdCFsPadDz0TSyKDVN NGocgzxXJHEjkQtEkjf7NIl5+1wYv6U5/GULC5jVTqadvqNBg43M42gIZVhHQk3AEP82bS+yoBm aPbbGmNqJEJkALo9kDgmXAf5VztQWEvYKS8tqVGwnkVlzBqiwXCAxAHfVI0LpquZR0ktYssFdRA AufClK4xVjJJKLnYpZv0sUeU= X-Google-Smtp-Source: AGHT+IEcp0TAEiQDBdoJsf//4GT2GY97Faxm8/L+cQVAb2RnXwBPEqX9XDj7Ub37WHI1FrlI2w4OKA== X-Received: by 2002:a05:6a20:729a:b0:21f:ed74:7068 with SMTP id adf61e73a8af0-23dc0e13068mr7237836637.23.1753909721022; Wed, 30 Jul 2025 14:08:41 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:58fd:da9:30d5:829a]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-769ee9ef1casm4929456b3a.3.2025.07.30.14.08.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 30 Jul 2025 14:08:40 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][walnascar 6/8] git: upgrade 2.49.0 -> 2.49.1 Date: Wed, 30 Jul 2025 14:08:25 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 30 Jul 2025 21:08:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221156 From: Praveen Kumar Git v2.49.1 Release Notes ========================= This release merges up the fixes that appear in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, and v2.48.2 to address the following CVEs: CVE-2025-27613, CVE-2025-27614, CVE-2025-46334, CVE-2025-46835, CVE-2025-48384, CVE-2025-48385, and CVE-2025-48386. See the release notes for v2.43.7 for details. It also contains some updates to various CI bits to work around and/or to adjust to the deprecation of use of Ubuntu 20.04 GitHub Actions CI, updates to to Fedora base image. Signed-off-by: Praveen Kumar Signed-off-by: Steve Sakoman --- meta/recipes-devtools/git/{git_2.49.0.bb => git_2.49.1.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-devtools/git/{git_2.49.0.bb => git_2.49.1.bb} (98%) diff --git a/meta/recipes-devtools/git/git_2.49.0.bb b/meta/recipes-devtools/git/git_2.49.1.bb similarity index 98% rename from meta/recipes-devtools/git/git_2.49.0.bb rename to meta/recipes-devtools/git/git_2.49.1.bb index 3538170d08..2b310ded7a 100644 --- a/meta/recipes-devtools/git/git_2.49.0.bb +++ b/meta/recipes-devtools/git/git_2.49.1.bb @@ -170,4 +170,4 @@ EXTRA_OECONF += "ac_cv_snprintf_returns_bogus=no \ " EXTRA_OEMAKE += "NO_GETTEXT=1" -SRC_URI[tarball.sha256sum] = "f8047f572f665bebeb637fd5f14678f31b3ca5d2ff9a18f20bd925bd48f75d3c" +SRC_URI[tarball.sha256sum] = "84a8383ffc77146133bc128a544450cf8ce5166cbea5056c98033d2f0c454794" From patchwork Wed Jul 30 21:08:26 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 67775 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 77C5FC87FD2 for ; Wed, 30 Jul 2025 21:08:44 +0000 (UTC) Received: from mail-pf1-f171.google.com (mail-pf1-f171.google.com [209.85.210.171]) by mx.groups.io with SMTP id smtpd.web11.46615.1753909723192044224 for ; Wed, 30 Jul 2025 14:08:43 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=j3/gKt07; spf=softfail (domain: sakoman.com, ip: 209.85.210.171, mailfrom: steve@sakoman.com) Received: by mail-pf1-f171.google.com with SMTP id d2e1a72fcca58-76858e9e48aso232434b3a.2 for ; Wed, 30 Jul 2025 14:08:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1753909722; x=1754514522; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=4pZ/G80W4japwGCjlP70+jlGgalgzNC++LvVw+CeWBQ=; b=j3/gKt07VBkGqzJvUOeEYkLggXywb69HSSbMIdmmqkWisMyTsJjxXrMoP3EipJQktu W2e4QSu8kPGHVVx85K7nJ7Vhba9yPIkRezrg5EdZIyHBMGrWIagQqmj0lWhEua6BrhQ4 xYj4YPyI+CzqzwIoFzSn1gxB6T6NNbqiSyvS/ek3ze5CGTMWPCNdlggnclYlOAPC+zgn sBi0VwoTB8DRB5CJ1X75XQcIx3KfawqCprcJgA1HZr9WsXXdh0E725El3rCBnA46NUbf 9WSbRICGUVEZbcy/VBjTur0tp3p2YHO7/TyNPOZaPjmI5kFgb2CVOqeUq1LJcROCET02 FrqQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753909722; x=1754514522; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=4pZ/G80W4japwGCjlP70+jlGgalgzNC++LvVw+CeWBQ=; b=oQjIydwU45C6TVPUjGwWBTAV6FqDPpj4DZuqB9M0JIg+MjQIcAIcidak5ciQzCLqMo agyhKb0BIqeDJkrQYdQ/koE5sygUB2HSSIxt5AZZgd4DZvr76HFZl4nis70rz+ANk1pZ oz79m2g4TjtyBTSGPDosdrpJKS/FMxceu4QAmQgfUwk/esklJdsPuX3zXUVefIAh1u8d Qb3DyVfAipiB/7Lt/d3TiCUsnXBNgPY+15I8cJJvr7ZbpLcQY/AgGWb0IBzVlJ5VvMxk npNem/xSV3bIxKOULEY6fAPv/ftOVodfG5ddYah+g6Gi4kZYe/RTQ+SMK9UhyDCMKWLF u0ZQ== X-Gm-Message-State: AOJu0YxfD68T4+fbosx0lzel+79OGVCypdw/CTBt+X+Tw5UtR5H9G/aN 0ez9nTNuKCqpYMLUGYhlrfNgxriJIxW65uFKIjFUHHP3AQIHbZOHpWtiipjCeOHzeOEDfNjBxNa Fae2y X-Gm-Gg: ASbGncuvyEr0CuQrCFKkatPVwvQjIPGabW89ogdnQFCT5k8FeL1NohSHhHhp8WmBY6y N1GxJGjk4rz8C/6eOrpxw8MfdVvkP/Vkd4CqLreru7Iox0JrX0VPggBkmkTkcl76LkiqVao9hlk 1/Gmxy76ln//qeqZ4bxq/9pJqnj8nW5/Y+rlcOoY20O88Omwpaq3rCdgA8fLCCf3H8W6lcXYKTM q5rs6kHN2o5WUMLlevkk7eRDRhPm6C2Eh6uMytidrAUF2e7jjd6xqEBOeeoz9lfzZQH08EMoD/F 3oOeP7Slo2D9Rwv+1XIlmeoWD0wcWexNKd5qNWKca+PISf8p9oMkZECG1Ei9WUPCRcYkN/5MfyY ZZSKNBkuB1hWs X-Google-Smtp-Source: AGHT+IH1cw0gKMniqf9uS1pbx0X73+Ry8VgkKpq3GaJMkodQTzmEpecNGWIN2A7VoyRJvp4USvpDcw== X-Received: by 2002:a05:6a00:14cb:b0:740:6f69:8d94 with SMTP id d2e1a72fcca58-76aae05b1d9mr7411114b3a.0.1753909722355; Wed, 30 Jul 2025 14:08:42 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:58fd:da9:30d5:829a]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-769ee9ef1casm4929456b3a.3.2025.07.30.14.08.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 30 Jul 2025 14:08:42 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][walnascar 7/8] bind: upgrade 9.20.9 -> 9.20.11 Date: Wed, 30 Jul 2025 14:08:26 -0700 Message-ID: <32920c292d96d3f66e50e5cd55bb05bd3adc01e8.1753909581.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 30 Jul 2025 21:08:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221157 From: Praveen Kumar Overview of changes in bind 9.20.11 ================================== Security Fixes: 1. Fix a possible assertion failure when stale-answer-client-timeout is set to 0. 2. In specific circumstances the named resolver process could exit with an assertion failure when stale answers were enabled and the stale-answer-client-timeout configuration option was set to 0. This has been fixed. (CVE-2025-40777) [GL #5372] For additional feature changes and bug fixes, please see: https://downloads.isc.org/isc/bind9/9.20.11/doc/arm/html/notes.html#notes-for-bind-9-20-11 Signed-off-by: Praveen Kumar Signed-off-by: Steve Sakoman --- .../bind/{bind_9.20.9.bb => bind_9.20.11.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-connectivity/bind/{bind_9.20.9.bb => bind_9.20.11.bb} (97%) diff --git a/meta/recipes-connectivity/bind/bind_9.20.9.bb b/meta/recipes-connectivity/bind/bind_9.20.11.bb similarity index 97% rename from meta/recipes-connectivity/bind/bind_9.20.9.bb rename to meta/recipes-connectivity/bind/bind_9.20.11.bb index 93ff957fc5..8d230f6e95 100644 --- a/meta/recipes-connectivity/bind/bind_9.20.9.bb +++ b/meta/recipes-connectivity/bind/bind_9.20.11.bb @@ -20,7 +20,7 @@ SRC_URI = "https://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.xz \ file://0001-avoid-start-failure-with-bind-user.patch \ " -SRC_URI[sha256sum] = "3d26900ed9c9a859073ffea9b97e292c1248dad18279b17b05fcb23c3091f86d" +SRC_URI[sha256sum] = "4da2d532e668bc21e883f6e6d9d3d81794d9ec60b181530385649a56f46ee17a" UPSTREAM_CHECK_URI = "https://ftp.isc.org/isc/bind9/" # follow the ESV versions divisible by 2 From patchwork Wed Jul 30 21:08:27 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 67778 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7FCD7C87FCB for ; Wed, 30 Jul 2025 21:08:54 +0000 (UTC) Received: from mail-pf1-f177.google.com (mail-pf1-f177.google.com [209.85.210.177]) by mx.groups.io with SMTP id smtpd.web10.46731.1753909724637496159 for ; Wed, 30 Jul 2025 14:08:44 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=xOrncB5g; spf=softfail (domain: sakoman.com, ip: 209.85.210.177, mailfrom: steve@sakoman.com) Received: by mail-pf1-f177.google.com with SMTP id d2e1a72fcca58-76b0724d64bso243090b3a.1 for ; Wed, 30 Jul 2025 14:08:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1753909724; x=1754514524; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=RfoyJoWJQRTfINq2xygh5ZV8EpdhR0/WYaM2XptxEAw=; b=xOrncB5g3kt/d4MFoC/NhjgxCEdxsyJm5dTNSnkod7HOkthsbOSE4tyvc2cKKY7prk HceGDkeT5M6aL7JjRvVKRAoKTTgiBRgccw4OXnKatD5B0Gt0VIYSUAwWOyzbXBkrkaQv wso5jm8yI0+EbhAo0+K2pg6GAJ/bGbVMZfzupa8cO5eGNFeZKTuBsHYR+6HHwNo8DohC 1yw9ACY8edrFUcmiwqsydDR8DXkD769lIjXvusS0o6Xldzv6SlNO0pCRA9tEs2SlEbfI Ow5kH1QmeJNJdWjqgSx6M6xl82vSnaadAnCmxg6z5GSROByqc33eaFcx9j866t1TugBh PlKQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1753909724; x=1754514524; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=RfoyJoWJQRTfINq2xygh5ZV8EpdhR0/WYaM2XptxEAw=; b=XGcIZ6FndKM5+5J12mFyUiDib4NSdaIF4q9B6u/QNyTTG5QskZjA4MOr/I4rLV6TFS 7oiHEAWHzAkWeHxmLzd+lM+o+ZyuMuOCEfiJR5KH0OK+TYZ+kQYHh36aE401Ssk0dDKw DhnXBX8pF8UXLtw+9hbf2MoBZtRKbPbuIuSAKx/4B15z05ivAAAXbFvNh+HIRJOkKj45 o8xAEEbsWOp7eP/STYnN2hnG1+o9Ln3vLNTdFEE5SnHExobhHgONiA0H1Ox13L4/zQRp +/zi98EzkHtChBJJHFTdxO1DxbJBSyL6tO1BJII/LN8BgAz6zeczUQvm7oyQswDz+X2U DfmQ== X-Gm-Message-State: AOJu0YwWcG44iIiJifx5V+g25F/TLnsOyf0JhX+EnuLAqtpsgQl5IpvS KtCpyofkigeWhHwjxRpHHWuhRuPUbymfn8H8rZw4RAQLXymmoSGyBZlWaNlDSq4vOVZrtP9+fcv eZ1ZK X-Gm-Gg: ASbGncvNDsZiOUN4aKQYdtJ+4EdgDnWf/8AbYGZ0NcUJlhQKArBw6D924P8wZHLHjVc sT/uS/KRWvN8kJHcc4NsrFZM1woJUYB5ski/5+TUCjZrQ99n9Ov/ziGKak3k5dxk0u+0fjS8zlY vodXuJyZOj9GxocCSEWDdM/rkS9kVyP1AoHv844s1hgejnulQE8z4FAAIFzdMTtjZZdlE8VqqIg BJFgni3UuGQCbN3h+dFmJq7C4jVTrTVBinOMUzM/3TPIvSJFjwYz+FdtFsCwLGep47PzaoVha67 zcwhbptZIKOrBe/fA+QP61hOVyvR6LJA6tYo49gRmn5zbGUOZLWMZrcWLACvyYTCEs8JfCBs41I XSe/nkzSdPvPt X-Google-Smtp-Source: AGHT+IGQePLj+0Djsp0u4R5zR1junWvfHNZ+k/ffohOqJ2liV+ij+wuWSNTntblYfXlIW0q5fIW/4A== X-Received: by 2002:a05:6a00:b88:b0:747:b043:41e5 with SMTP id d2e1a72fcca58-76ab3067df1mr6005727b3a.16.1753909723843; Wed, 30 Jul 2025 14:08:43 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:58fd:da9:30d5:829a]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-769ee9ef1casm4929456b3a.3.2025.07.30.14.08.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 30 Jul 2025 14:08:43 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][walnascar 8/8] ltp: Skip semctl08 when __USE_TIME64_REDIRECTS is defined Date: Wed, 30 Jul 2025 14:08:27 -0700 Message-ID: <8bea495b4945e24b43398f40d634d7fdb73e981a.1753909581.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 30 Jul 2025 21:08:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/221158 From: Jiaying Song When __USE_TIME64_REDIRECTS is defined, glibc redirects struct semid_ds to a 64-bit time-safe version that omits the sem_otime_high and sem_ctime_high fields. As a result, the case becomes invalid, leading to incorrect behavior. This patch adds a check to skip the test when __USE_TIME64_REDIRECTS is defined, ensuring the test only runs when the semid_ds structurally matches semid64_ds and the *_high fields are accessible. Signed-off-by: Jiaying Song Signed-off-by: Steve Sakoman --- ...8-Skip-semctl08-when-__USE_TIME64_RE.patch | 48 +++++++++++++++++++ meta/recipes-extended/ltp/ltp_20250130.bb | 3 +- 2 files changed, 50 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-extended/ltp/ltp/0001-syscalls-semctl08-Skip-semctl08-when-__USE_TIME64_RE.patch diff --git a/meta/recipes-extended/ltp/ltp/0001-syscalls-semctl08-Skip-semctl08-when-__USE_TIME64_RE.patch b/meta/recipes-extended/ltp/ltp/0001-syscalls-semctl08-Skip-semctl08-when-__USE_TIME64_RE.patch new file mode 100644 index 0000000000..b4859a6f0a --- /dev/null +++ b/meta/recipes-extended/ltp/ltp/0001-syscalls-semctl08-Skip-semctl08-when-__USE_TIME64_RE.patch @@ -0,0 +1,48 @@ +From 55b48d66857a43c2609fc351293b5601e2eb955d Mon Sep 17 00:00:00 2001 +From: Jiaying Song +Date: Fri, 23 May 2025 15:17:49 +0800 +Subject: [PATCH] syscalls/semctl08: Skip semctl08 when __USE_TIME64_REDIRECTS + is defined + +When __USE_TIME64_REDIRECTS is defined, glibc redirects struct semid_ds to a +64-bit time-safe version that omits the sem_otime_high and sem_ctime_high +fields. As a result, the case becomes invalid and leads to incorrect behavior. + +This patch adds a check to skip the test when __USE_TIME64_REDIRECTS is +defined, ensuring the test only runs when semid_ds structurally matches +semid64_ds and the *_high fields are accessible. + +Upstream-Status: Submitted [https://lists.linux.it/pipermail/ltp/2025-May/043647.html] + +Signed-off-by: Jiaying Song +--- + testcases/kernel/syscalls/ipc/semctl/semctl08.c | 8 +++++--- + 1 file changed, 5 insertions(+), 3 deletions(-) + +diff --git a/testcases/kernel/syscalls/ipc/semctl/semctl08.c b/testcases/kernel/syscalls/ipc/semctl/semctl08.c +index 1878bd4..3b799fa 100644 +--- a/testcases/kernel/syscalls/ipc/semctl/semctl08.c ++++ b/testcases/kernel/syscalls/ipc/semctl/semctl08.c +@@ -10,7 +10,11 @@ + #include "tst_test.h" + #include "libnewipc.h" + +-#ifdef HAVE_SEMID64_DS_TIME_HIGH ++#if !defined(HAVE_SEMID64_DS_TIME_HIGH) ++TST_TEST_TCONF("test requires struct semid64_ds to have the time_high fields"); ++#elif defined(__USE_TIME64_REDIRECTS) ++TST_TEST_TCONF("test requires __USE_TIME64_REDIRECTS to be undefined"); ++#else + + static void run(void) + { +@@ -47,6 +51,4 @@ static struct tst_test test = { + .test_all = run, + .needs_tmpdir = 1, + }; +-#else +-TST_TEST_TCONF("test requires struct semid64_ds to have the time_high fields"); + #endif +-- +2.34.1 + diff --git a/meta/recipes-extended/ltp/ltp_20250130.bb b/meta/recipes-extended/ltp/ltp_20250130.bb index f9521acbc6..4c03b583fa 100644 --- a/meta/recipes-extended/ltp/ltp_20250130.bb +++ b/meta/recipes-extended/ltp/ltp_20250130.bb @@ -31,7 +31,8 @@ SRC_URI = "git://github.com/linux-test-project/ltp.git;branch=master;protocol=ht file://0001-Add-__clear_cache-declaration-for-clang.patch \ file://0001-kernel-kvm-don-t-hardcode-objcopy.patch \ file://0001-cve-2015-3290-Disable-AVX-for-x86_64.patch \ - " + file://0001-syscalls-semctl08-Skip-semctl08-when-__USE_TIME64_RE.patch \ + " S = "${WORKDIR}/git"