From patchwork Wed Sep 3 16:14:51 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 69595 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7C5E5CA0FF2 for ; Wed, 3 Sep 2025 16:15:13 +0000 (UTC) Received: from mail-pf1-f170.google.com (mail-pf1-f170.google.com [209.85.210.170]) by mx.groups.io with SMTP id smtpd.web11.16913.1756916108928903820 for ; Wed, 03 Sep 2025 09:15:08 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=XOIB/gyn; spf=softfail (domain: sakoman.com, ip: 209.85.210.170, mailfrom: steve@sakoman.com) Received: by mail-pf1-f170.google.com with SMTP id d2e1a72fcca58-7725147ec88so17209b3a.0 for ; Wed, 03 Sep 2025 09:15:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1756916108; x=1757520908; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=1BVMBGKWWWvyQfU/SSIrep2QondFVWsD7cXXjTGupss=; b=XOIB/gynSGljx6HQTygPvaxLXDvWjQxQPsNZF2lDWvMem9fOg7qkIhoesey7MG2vau l0Ejj1r6a4cMwK5gk4gowQBXqJk6DIcbUAbxQTFxvjgUKbFHCgrgyFjaR9xvWAjZr3TB GRwQtdesimufOcf2vVIKnNKARRt0p/rExb1B1+LlajxfW60kitDr9lRR3TwYDZDICH3W RYC3mDkpsSaP/Uqp2/dtngpWswzZ3DKmLV84TkrMxjHM0DGo+UbGePLW2CxF0n1Tk+pS 7D9w9oT3DpiN55e4SoJN5kQ5LVewaQsFYS8wu9cOzUs9vjljn+HWYDCeSQLYd6ak4rlR FngA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756916108; x=1757520908; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=1BVMBGKWWWvyQfU/SSIrep2QondFVWsD7cXXjTGupss=; b=sZSECJ5YCoVyBqgb0lQLoEZ1xT1GdDJEVLfYKy8n7Ku5xtyUmC6wGp4f1leYIbJhRs J0mcQs+R+TTrPPD16u/xulC4jxAIkuyjkfdgFDHRXWiVHgEFmvW7/0XWEzfveYQFbbRW bTnYeEowfHHs/p5rIsz8jpw15QzhI2uXnwqQQ3EX7UwgMRZvg4rpys7KtcDJxH2mLGcD fnBS3wFM1ZWtNSpSeg5tgGTUjCx723DMqLl+vGKz7DpnZyJzU4xumRWYTbPZNkenpU35 /Jq4v0+/O1kuuQcFYRWWWpQCwEyLmBJEZaBSh7zviQ+O+CdNTNznw4qEEtwDPTYdIqK4 T6uA== X-Gm-Message-State: AOJu0YwXMeLc0B29jrtZ9aMXuHPRFfaB7TX2bNYQyo5CM+tb1cJV3F3t nNyYP07HhxO/v/ZAVyHow9LwGgCmU91sNsragMQH+a1tFsMqJkeQvQSKQx5xEX9Btr+JQ7rf1pP AJ7YS X-Gm-Gg: ASbGncviiPdpgkpmDKPOiU9i2i10Ut1vTBWTnSf2HLkeh1ZxdOJkUu1jVzc2/NqrFPV 8wXd7miWHfb7pjy3tWmJbEZdR85aS5TQ/+LnVtykPch3nj522ziZya1jt9hdwFpZquBOrK5u6rB 8g+S75rt2Wj4bo0YVjfQilvHrfhcHUMAtkO6GDpcwu6XltgAXadJUjM65kQFeqw6lOR8vNbDWJG 4+tZjqigFYwOxBk3i/uS7gvDoMQPYW0dssRNVI7QunYrovEQPZf+sf8R6odpDSU7d8n1Q9Bepxt s29bxVk5FJxAO1rlNWgCyAXoC2TazRE27W7/L4SXmemAQnM5FpIqmPsO5+XFnd0xd1UI31IAvTy rJIkuoaJyJ3kO0dEZhIJhIhO/ X-Google-Smtp-Source: AGHT+IFHZvh+gpRJ7n2gyAE2NW5+edh80KVOdeqnWBjafCV4BFvjzUVMXL00mfqsjQvFYsr55qLTXA== X-Received: by 2002:a05:6a00:2e08:b0:73b:ac3d:9d6b with SMTP id d2e1a72fcca58-7723e24fe9emr18211955b3a.4.1756916107681; Wed, 03 Sep 2025 09:15:07 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:9ffe:4bb4:e2b3:4b1c]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7724f079b88sm11027602b3a.40.2025.09.03.09.15.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Sep 2025 09:15:07 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 1/9] tiff: fix CVE-2024-13978 Date: Wed, 3 Sep 2025 09:14:51 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 03 Sep 2025 16:15:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/222866 From: Yogita Urade A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue. Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-13978 Upstream patch: https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4 Signed-off-by: Yogita Urade Signed-off-by: Steve Sakoman --- .../libtiff/tiff/CVE-2024-13978.patch | 47 +++++++++++++++++++ meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 1 + 2 files changed, 48 insertions(+) create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch new file mode 100644 index 0000000000..3a4845d415 --- /dev/null +++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2024-13978.patch @@ -0,0 +1,47 @@ +From 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4 Mon Sep 17 00:00:00 2001 +From: Lee Howard +Date: Sat, 5 Oct 2024 09:45:30 -0700 +Subject: [PATCH] Check TIFFTAG_TILELENGTH and TIFFTAGTILEWIDTH for valid + input, addresses issue #650 + +CVE: CVE-2024-13978 +Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4] + +Signed-off-by: Yogita Urade +--- + tools/tiff2pdf.c | 16 ++++++++++++++++ + 1 file changed, 16 insertions(+) + +diff --git a/tools/tiff2pdf.c b/tools/tiff2pdf.c +index 63751f1..fef28d1 100644 +--- a/tools/tiff2pdf.c ++++ b/tools/tiff2pdf.c +@@ -1255,9 +1255,25 @@ void t2p_read_tiff_init(T2P* t2p, TIFF* input){ + TIFFGetField(input, + TIFFTAG_TILEWIDTH, + &( t2p->tiff_tiles[i].tiles_tilewidth) ); ++ if (t2p->tiff_tiles[i].tiles_tilewidth < 1) ++ { ++ TIFFError(TIFF2PDF_MODULE, "Invalid tile width (%d), %s", ++ t2p->tiff_tiles[i].tiles_tilewidth, ++ TIFFFileName(input)); ++ t2p->t2p_error = T2P_ERR_ERROR; ++ return; ++ } + TIFFGetField(input, + TIFFTAG_TILELENGTH, + &( t2p->tiff_tiles[i].tiles_tilelength) ); ++ if (t2p->tiff_tiles[i].tiles_tilelength < 1) ++ { ++ TIFFError(TIFF2PDF_MODULE, "Invalid tile length (%d), %s", ++ t2p->tiff_tiles[i].tiles_tilelength, ++ TIFFFileName(input)); ++ t2p->t2p_error = T2P_ERR_ERROR; ++ return; ++ } + t2p->tiff_tiles[i].tiles_tiles = + (T2P_TILE*) _TIFFmalloc(TIFFSafeMultiply(tmsize_t,t2p->tiff_tiles[i].tiles_tilecount, + sizeof(T2P_TILE)) ); +-- +2.40.0 + diff --git a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb index 4c9c212312..d5ae82bc7c 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb @@ -59,6 +59,7 @@ SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \ file://CVE-2025-8176-0002.patch \ file://CVE-2025-8176-0003.patch \ file://CVE-2025-8177.patch \ + file://CVE-2024-13978.patch \ " SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8" From patchwork Wed Sep 3 16:14:52 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 69597 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7D791CA1012 for ; Wed, 3 Sep 2025 16:15:13 +0000 (UTC) Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by mx.groups.io with SMTP id smtpd.web11.16915.1756916110346197606 for ; Wed, 03 Sep 2025 09:15:10 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=vs+LPQVw; spf=softfail (domain: sakoman.com, ip: 209.85.210.169, mailfrom: steve@sakoman.com) Received: by mail-pf1-f169.google.com with SMTP id d2e1a72fcca58-7726c7ff7e5so82297b3a.3 for ; Wed, 03 Sep 2025 09:15:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1756916110; x=1757520910; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=wih1XiJi2E8k6INEAIHaHmq84g1FWptYU7kj7MxynSM=; b=vs+LPQVwXMf6TCoSHVAPPGZ2IuPzBj+H+kHrytAgwNQkRPun4kmJqY6fNy9BKK9dm9 F/xLUg+X/T9cC6IXx0Xpb/nw49NIkoh7UnNAs741gjTrXFfz5LcRNhCCe7sgiDuGY4gE frQAI+xO5OB8D1kt56/mqk+D+hNZ5GVVCZI5SAnv2KhUFl+TfYd4JfqBKVYaBhVO2A+7 IYJWfLn0yfNZICfga7GdJbN+c46EyGf0SMkzjfHuetW2amfMGM/reivySvsejkdrz67P FwRdUGqmma/uycsqAAX9mef9D9d5mLFj6sQ2pUgseM2PL4j+u1ULmEpg2493wsG7QWaj tiUg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756916110; x=1757520910; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=wih1XiJi2E8k6INEAIHaHmq84g1FWptYU7kj7MxynSM=; b=ISzX2PXTRhAJrlFrmAO1cC+WRdNQcnleay3j/VZ/4HP8T6dTp+5ebSG8FkSq7keqUZ CZsjyqT/cpMlwEg2o/4vEXVA2cY2kgcDPX9uqSEARiLH0EIx3NKMLPM1L+iAOSptLHux faxv+M1L9I4/THG8J0VnujwlY1/DDFuMcg2BRqq3XyWdC0WCE3IAdtHUflgKE+QiCxTB nvlUBGJ+PEoJL179Y+J6+juq8f7x3JmP6vd82v+B1qLGXaAlKbEoaqI+sApfZLP6a2+D Qsro90OVYnTvYEUi6X2BZycOxz4nRAUaEMdFwgWwODDNgv1xqHLcDPJNfNYB9vAU80cV VBOg== X-Gm-Message-State: AOJu0YyJfgwNaGu1yyex+BNMvnQSpB3fK6CcF1mAd/RfL8O7ds5dvd5z 17aO3LhLyFb6sUINYJ4tcgmqrr1NXPQFhEQyErsSjOde61653/yvlR4Jyl6qtb/Iof+74ETQ+bG g1o4Z X-Gm-Gg: ASbGnctT5m/oF7j1wMPX7jmagPCSdM2AcqPybCAHrGcZgKPaXhZRNMghsio6xrgXi46 pUUQaJ8eCzc136yDpSfh80C/J0aNndfwmBFn5WmYSDj4jdwl97Xlr/XZHOxGxwY0TaGUJX0amFU LuEO3Y96+jVMtj8wzgp3jqViX4vsxWhwncp91eApqLcw8sTJdvoTnX3z0cBQ/81FoNJ2PSemaNw r2G08erbeLNPTRwPvzZ6w8sRXRjU95fRp487vaZh7+GHy/SycqBj8OYoiGDTIfcWcbbuDZF8mus xOYQHdQ1y3hiwVkJm1DZ5tTHKUAOtzqoIezSswLAVJaif70/AGIXLfuFYlnvCwu6efa7TUugrKO ZbqXBHssjtFMJig== X-Google-Smtp-Source: AGHT+IEH0/7AzUkueH+AdWM9cd09iqyz04T4I61bsi4ZkcyLPa1LFweUJf8g2tM6S458gpU4c/Qt/Q== X-Received: by 2002:a05:6a00:7496:b0:772:4319:e7ed with SMTP id d2e1a72fcca58-7724319ece8mr17612075b3a.29.1756916109438; Wed, 03 Sep 2025 09:15:09 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:9ffe:4bb4:e2b3:4b1c]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7724f079b88sm11027602b3a.40.2025.09.03.09.15.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Sep 2025 09:15:09 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 2/9] tiff: fix CVE-2025-8534 Date: Wed, 3 Sep 2025 09:14:52 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 03 Sep 2025 16:15:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/222867 From: Yogita Urade A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used." Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-8534 Upstream patch: https://gitlab.com/libtiff/libtiff/-/commit/6ba36f159fd396ad11bf6b7874554197736ecc8b Signed-off-by: Yogita Urade Signed-off-by: Steve Sakoman --- .../libtiff/tiff/CVE-2025-8534.patch | 60 +++++++++++++++++++ meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 1 + 2 files changed, 61 insertions(+) create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2025-8534.patch diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8534.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8534.patch new file mode 100644 index 0000000000..59c14e2703 --- /dev/null +++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8534.patch @@ -0,0 +1,60 @@ +From 6ba36f159fd396ad11bf6b7874554197736ecc8b Mon Sep 17 00:00:00 2001 +From: Su_Laus +Date: Sat, 2 Aug 2025 18:55:54 +0200 +Subject: [PATCH] tiff2ps: check return of TIFFGetFiled() for + TIFFTAG_STRIPBYTECOUNTS and TIFFTAG_TILEBYTECOUNTS to avoid NULL pointer + dereference. + +Closes #718 + +CVE: CVE-2025-8534 +Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/6ba36f159fd396ad11bf6b7874554197736ecc8b] + +Signed-off-by: Yogita Urade +--- + tools/tiff2ps.c | 20 +++++++++++++++++--- + 1 file changed, 17 insertions(+), 3 deletions(-) + +diff --git a/tools/tiff2ps.c b/tools/tiff2ps.c +index a598ede..05a346a 100644 +--- a/tools/tiff2ps.c ++++ b/tools/tiff2ps.c +@@ -2193,10 +2193,20 @@ PS_Lvl2page(FILE* fd, TIFF* tif, uint32_t w, uint32_t h) + tiled_image = TIFFIsTiled(tif); + if (tiled_image) { + num_chunks = TIFFNumberOfTiles(tif); +- TIFFGetField(tif, TIFFTAG_TILEBYTECOUNTS, &bc); ++ if (!TIFFGetField(tif, TIFFTAG_TILEBYTECOUNTS, &bc)) ++ { ++ TIFFError(filename, ++ "Can't read bytecounts of tiles at PS_Lvl2page()"); ++ return (FALSE); ++ } + } else { + num_chunks = TIFFNumberOfStrips(tif); +- TIFFGetField(tif, TIFFTAG_STRIPBYTECOUNTS, &bc); ++ if (!TIFFGetField(tif, TIFFTAG_STRIPBYTECOUNTS, &bc)) ++ { ++ TIFFError(filename, ++ "Can't read bytecounts of strips at PS_Lvl2page()"); ++ return (FALSE); ++ } + } + + if (use_rawdata) { +@@ -2791,7 +2801,11 @@ PSRawDataBW(FILE* fd, TIFF* tif, uint32_t w, uint32_t h) + + (void) w; (void) h; + TIFFGetFieldDefaulted(tif, TIFFTAG_FILLORDER, &fillorder); +- TIFFGetField(tif, TIFFTAG_STRIPBYTECOUNTS, &bc); ++ if (!TIFFGetField(tif, TIFFTAG_STRIPBYTECOUNTS, &bc)) ++ { ++ TIFFError(filename, "Can't read bytecounts of strips at PSRawDataBW()"); ++ return; ++ } + + /* + * Find largest strip: +-- +2.40.0 + diff --git a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb index d5ae82bc7c..137dc7f478 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb @@ -60,6 +60,7 @@ SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \ file://CVE-2025-8176-0003.patch \ file://CVE-2025-8177.patch \ file://CVE-2024-13978.patch \ + file://CVE-2025-8534.patch \ " SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8" From patchwork Wed Sep 3 16:14:53 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 69598 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8CBC7CA1015 for ; Wed, 3 Sep 2025 16:15:13 +0000 (UTC) Received: from mail-pf1-f181.google.com (mail-pf1-f181.google.com [209.85.210.181]) by mx.groups.io with SMTP id smtpd.web10.17051.1756916111842782633 for ; Wed, 03 Sep 2025 09:15:11 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=DTAj5UkW; spf=softfail (domain: sakoman.com, ip: 209.85.210.181, mailfrom: steve@sakoman.com) Received: by mail-pf1-f181.google.com with SMTP id d2e1a72fcca58-77238cb3cbbso109622b3a.0 for ; Wed, 03 Sep 2025 09:15:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1756916111; x=1757520911; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=mzusLF5KRzOIiSICLfMotGe5/zppbSFgG8QRO3SZZEI=; b=DTAj5UkWm9rnU28YQHKDstdIQW6DgcoGKDZlJLnLF0QGu4EKIE4uN+n3tsBmkd+wP8 3gi2kWR+IG7JKvKAUPzMM3BlRYcB/11T+7nVSsBZuq3PGEBEOniG6/+7vKpbZ669J1FU 1Sj1k8DjXLqTUdcQVQ9vimte7aVd1aW+fMXySdE78SDbsP2HpDbjbmbliwQhKKTn1w2D ymgywSz97B4bBGIjR/goQTCnToTx+pgXQEglQPrkyv0mO6/zG7lr65lvzMVCSA7lBl3R DlJ9uHc5HLPwJBQXJOExPH/GRQKVqW52Ld0vlNuz8CcD3QoEkqjq920CtQgJk2Tk8eUm fc3w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756916111; x=1757520911; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=mzusLF5KRzOIiSICLfMotGe5/zppbSFgG8QRO3SZZEI=; b=bWNyFMyYs4DPkrEwiG01Gu4CUaxkrIq5vV281PJIAVTVpf5WwT17Op0Zri6x49m4US MhnFhTpAbi1swSzWgqv8cUdXSFKcL7REtmfUYNP6r3H12JFLSqts/955AREaGTSk1Dvs 3pI9bdbHpFb7zUbnxzV/cBxusaOJNQ33LLaBSLmokfXFcq/CbvG2swdaSfqDLX0gXqfI LyARP58M4qnUolvWIcOGCkjcc4y0pIuRioDAwz1eE8HJ5fvIPNbv9GdV/c30dXAkKiRW L0rSI+1PdSEl3XVlB9tjN029nIauE8XZFbEKHODgcP0ewKBTa5NkXtlsYknjRyeyF7JC Aixw== X-Gm-Message-State: AOJu0Yx7lnZ5LMG6StrxN8giTjNBxwQf1luM2Sva+WfdY1cC+Akcuky7 Hn+YJsWTOhKUsG7J5z5P51HLmaK3YYjHjhCaqGMjKBPg8UUJ5zoWz9bU1adu4Pt9Sx1E2934FKL CSasG X-Gm-Gg: ASbGncsLxmSG/WQRGk+728Yr6KiKRSGh1vtEBP6pT5momTHpHh6rwxLtpSVdPDY3DYg z/oEZ7yMo8frtbuHWgfoFhaWWAWx69gvX7vdGsfJPgWKwYBkMfNCGinGvkSZS6QumcB/m2aqGGq 73Psi6807bnHk07S8CJlPcaJjpkN5how4zs8lo8NPIS7PezoBhQ+kLwHv6NR+gzc+4oOQHjij/S Hrz4Di8enHgX+i+h6yWwJpjUUVx3SyJBJ3RRVWecP/bRfTKWQ1xZpkADA68Cv6VVCc7MtLpgfAx LUpbpgJsUg0Cb//jtq6eIRNZIUsvxPWeTokbJWPmUFahj8Jej5n+Qnh2lo2veTDIu8tqz1xvphm PMGxtsp/LYB/uGVXfqtkR7o4E X-Google-Smtp-Source: AGHT+IG9FpWyPZJeXFvKrX0pmkfYeNlZydywuKHSc1KEE6lpS9eSG0vqQKpZtgZ7pvvxaYfo11UYnQ== X-Received: by 2002:a05:6a00:1810:b0:771:ef79:9338 with SMTP id d2e1a72fcca58-7723e376dacmr18879509b3a.21.1756916110945; Wed, 03 Sep 2025 09:15:10 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:9ffe:4bb4:e2b3:4b1c]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7724f079b88sm11027602b3a.40.2025.09.03.09.15.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Sep 2025 09:15:10 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 3/9] tiff: fix CVE-2025-8851 Date: Wed, 3 Sep 2025 09:14:53 -0700 Message-ID: <1ced84bbd4ab15f0f16176e367744b496a0ea97c.1756915922.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 03 Sep 2025 16:15:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/222868 From: Yogita Urade A vulnerability was determined in LibTIFF up to 4.5.1. Affected by this issue is the function readSeparateStripsetoBuffer of the file tools/tiffcrop.c of the component tiffcrop. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The patch is identified as 8a7a48d7a645992ca83062b3a1873c951661e2b3. It is recommended to apply a patch to fix this issue. Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-8851 Upstream patch: https://gitlab.com/libtiff/libtiff/-/commit/8a7a48d7a645992ca83062b3a1873c951661e2b3 Signed-off-by: Yogita Urade Signed-off-by: Steve Sakoman --- .../libtiff/tiff/CVE-2025-8851.patch | 71 +++++++++++++++++++ meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 1 + 2 files changed, 72 insertions(+) create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2025-8851.patch diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8851.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8851.patch new file mode 100644 index 0000000000..29089ab833 --- /dev/null +++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8851.patch @@ -0,0 +1,71 @@ +From 8a7a48d7a645992ca83062b3a1873c951661e2b3 Mon Sep 17 00:00:00 2001 +From: Lee Howard +Date: Sun, 11 Aug 2024 16:01:07 +0000 +Subject: [PATCH] Attempt to address tiffcrop Coverity scan issues 1605444, + 1605445, and 1605449. + +CVE: CVE-2025-8851 +Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/8a7a48d7a645992ca83062b3a1873c951661e2b3] + +Signed-off-by: Yogita Urade +--- + tools/tiffcrop.c | 17 ++++++++++++----- + 1 file changed, 12 insertions(+), 5 deletions(-) + +diff --git a/tools/tiffcrop.c b/tools/tiffcrop.c +index 1b072d4..e16bc2d 100644 +--- a/tools/tiffcrop.c ++++ b/tools/tiffcrop.c +@@ -5024,7 +5024,14 @@ static int readSeparateStripsIntoBuffer (TIFF *in, uint8_t *obuf, uint32_t lengt + buff = srcbuffs[s]; + strip = (s * strips_per_sample) + j; + bytes_read = TIFFReadEncodedStrip (in, strip, buff, stripsize); +- rows_this_strip = (uint32_t)(bytes_read / src_rowsize); ++ if (bytes_read < 0) ++ { ++ rows_this_strip = 0; ++ } ++ else ++ { ++ rows_this_strip = (uint32_t)(bytes_read / src_rowsize); ++ } + if (bytes_read < 0 && !ignore) + { + TIFFError(TIFFFileName(in), +@@ -5434,14 +5441,14 @@ computeInputPixelOffsets(struct crop_mask *crop, struct image_data *image, + rmargin = _TIFFClampDoubleToUInt32(crop->margins[3] * scale * xres); + } + +- if ((lmargin + rmargin) > image->width) ++ if (lmargin == 0xFFFFFFFFU || rmargin == 0xFFFFFFFFU || (lmargin + rmargin) > image->width) + { + TIFFError("computeInputPixelOffsets", "Combined left and right margins exceed image width"); + lmargin = (uint32_t) 0; + rmargin = (uint32_t) 0; + return (-1); + } +- if ((tmargin + bmargin) > image->length) ++ if (tmargin == 0xFFFFFFFFU || bmargin == 0xFFFFFFFFU || (tmargin + bmargin) > image->length) + { + TIFFError("computeInputPixelOffsets", "Combined top and bottom margins exceed image length"); + tmargin = (uint32_t) 0; +@@ -5977,14 +5984,14 @@ computeOutputPixelOffsets (struct crop_mask *crop, struct image_data *image, + vmargin = _TIFFClampDoubleToUInt32(page->vmargin * scale * ((image->bps + 7) / 8)); + } + +- if ((hmargin * 2.0) > (pwidth * page->hres)) ++ if (hmargin == 0xFFFFFFFFU || (hmargin * 2.0) > (pwidth * page->hres)) + { + TIFFError("computeOutputPixelOffsets", + "Combined left and right margins exceed page width"); + hmargin = (uint32_t) 0; + return (-1); + } +- if ((vmargin * 2.0) > (plength * page->vres)) ++ if (vmargin == 0xFFFFFFFFU || (vmargin * 2.0) > (plength * page->vres)) + { + TIFFError("computeOutputPixelOffsets", + "Combined top and bottom margins exceed page length"); +-- +2.40.0 + diff --git a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb index 137dc7f478..6db4d80cdf 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb @@ -61,6 +61,7 @@ SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \ file://CVE-2025-8177.patch \ file://CVE-2024-13978.patch \ file://CVE-2025-8534.patch \ + file://CVE-2025-8851.patch \ " SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8" From patchwork Wed Sep 3 16:14:54 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 69600 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 78554CA1012 for ; Wed, 3 Sep 2025 16:15:23 +0000 (UTC) Received: from mail-pf1-f180.google.com (mail-pf1-f180.google.com [209.85.210.180]) by mx.groups.io with SMTP id smtpd.web11.16917.1756916113651177615 for ; Wed, 03 Sep 2025 09:15:13 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=CbhqA7ed; spf=softfail (domain: sakoman.com, ip: 209.85.210.180, mailfrom: steve@sakoman.com) Received: by mail-pf1-f180.google.com with SMTP id d2e1a72fcca58-7722c8d2694so67351b3a.3 for ; Wed, 03 Sep 2025 09:15:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1756916113; x=1757520913; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=jPANE6bFlQwt9AbjIJSs1v+hC2sum4MsW/AqS0PKUd8=; b=CbhqA7eddizfZHFv2IpD+XrKuRp/+zEWze3Uo3Mepe/ysAJu7hm2zMNd8xvExARuYC pPWYgm3SZTBa048lmKFE+s+1H6Q/PveZbzkssDbV2bKDmdT+F7EXEVBYcpeIRvHxIMiG rvKI64xpnWAK7Za2VbFp6KmYUvP1XVl9lpT7Ylpvc7nCHl2se4JrO/4UZlLY6KiTV2eK CgGpHZ6vH36r8Khrs//s7puOLhv78innv+nsM4cOG95D/ctoVSM0nRYeQ49hjBJsJr7m UbDxA8bS97MLteM1F1DYRxjqSPbtuS3yozaXzNfQNprQRglwyZ33VwBZfAV93m+S1grr 10Bg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756916113; x=1757520913; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=jPANE6bFlQwt9AbjIJSs1v+hC2sum4MsW/AqS0PKUd8=; b=b4lkGlCuH/x5H36veBimWMUDXyrI/QmhRw8IABgKin28c3XPCA2mQIj+SXNZyElfBR zsWcHbClBcZiadWQp5ispXm/Lbm/J28zAgtUiloOxaxTRfvGkn7YMFpT5VW21uHFhXJW UMyMCLCv4M/ZdPul9Yv0/lEtvJ/lCR90AVK2LxAAcEB+4l1Uw9nYV7vh0DUb3NTRKl2g hJqrjxbvJ4YsXeilxQqKQmYJkmDje7is5rcYLu/GBf/Cezr94Pt3kKGczZ7Xw7WWPvUz G50w0azfrEVHK/SgoNVK2n/P/OoVTkWyA2KKt5B9Ej2+FKufcAe88tKUAS7NDl73WiKa I9nA== X-Gm-Message-State: AOJu0YyIJBQleRV9j8bNda2gx2Ih2yVKoMj8MpLTjf+nnahYM7RGb7BA ITRpZak3+e4AT79rm3GvfMSxrsZCWuvNQL7hIAOj0EoCN2hcXbCObvwKa8sY/B8qa3lIKZkhx1v jKIw+ X-Gm-Gg: ASbGncvJzK/mlKRdhAye21QwePSt8kCVoZEOLN9+VcUPeRNDSL7oGMQqAv3W8YMAax7 9CDTTjkKGGJd+uFg8IT1rIU9eb8QmLfGhZd/FyvnXNGYSjYz2Mjo2uFX4iJhE4/gmus1sM9NyBE IPdaR+Wg4pxHD8nuPFhoadgm48962qJZsjt7mzDde7Ww8fLm3N9VRZG6ah7423RTmxzamZ5OPJ7 NgzjagLGylDrKl7lbWWpFz0ooLZgGW5+w+2VyQPeF+OTOq50KIICiRzaOZgnF2WVcwFCKOhXEJZ miaVfSoLxvfHJGU6WRv0jmflnTRMYRU33k7DP4zKymBC2O1rdwthB+D3YPujzy05hnosgS6m6Av fHJ1ZIHxtAfY9dyXLuDjk61vC X-Google-Smtp-Source: AGHT+IHso0ULd8n67vwSCv138FyAMt4Op6oYAMAd7iOZ2lkwKsesSJKma2NuHqtoj81+vEe6imHIbQ== X-Received: by 2002:a05:6a20:958f:b0:243:ce0f:e809 with SMTP id adf61e73a8af0-243d6e06ae5mr20992768637.23.1756916112626; Wed, 03 Sep 2025 09:15:12 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:9ffe:4bb4:e2b3:4b1c]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7724f079b88sm11027602b3a.40.2025.09.03.09.15.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Sep 2025 09:15:12 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 4/9] git: fix CVE-2025-48384 Date: Wed, 3 Sep 2025 09:14:54 -0700 Message-ID: <34cb9674a5ce337a75af0dc415706d0323c427a6.1756915922.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 03 Sep 2025 16:15:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/222869 From: Praveen Kumar Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1. Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-48384 Upstream-patch: https://github.com/git/git/commit/05e9cd64ee23bbadcea6bcffd6660ed02b8eab89 Signed-off-by: Praveen Kumar Signed-off-by: Steve Sakoman --- .../git/git/CVE-2025-48384.patch | 85 +++++++++++++++++++ meta/recipes-devtools/git/git_2.35.7.bb | 1 + 2 files changed, 86 insertions(+) create mode 100644 meta/recipes-devtools/git/git/CVE-2025-48384.patch diff --git a/meta/recipes-devtools/git/git/CVE-2025-48384.patch b/meta/recipes-devtools/git/git/CVE-2025-48384.patch new file mode 100644 index 0000000000..6c21a3c352 --- /dev/null +++ b/meta/recipes-devtools/git/git/CVE-2025-48384.patch @@ -0,0 +1,85 @@ +From 05e9cd64ee23bbadcea6bcffd6660ed02b8eab89 Mon Sep 17 00:00:00 2001 +From: Justin Tobler +Date: Mon, 19 May 2025 21:26:04 -0500 +Subject: [PATCH] config: quote values containing CR character + +When reading the config, values that contain a trailing CRLF are +stripped. If the value itself has a trailing CR, the normal LF that +follows results in the CR being unintentionally stripped. This may lead +to unintended behavior due to the config value written being different +when it gets read. + +One such issue involves a repository with a submodule path containing a +trailing CR. When the submodule gets initialized, the submodule is +cloned without being checked out and has "core.worktree" set to the +submodule path. The git-checkout(1) that gets spawned later reads the +"core.worktree" config value, but without the trailing CR, and +consequently attempts to checkout to a different path than intended. + +If the repository contains a matching path that is a symlink, it is +possible for the submodule repository to be checked out in arbitrary +locations. This is extra bad when the symlink points to the submodule +hooks directory and the submodule repository contains an executable +"post-checkout" hook. Once the submodule repository checkout completes, +the "post-checkout" hook immediately executes. + +To prevent mismatched config state due to misinterpreting a trailing CR, +wrap config values containing CR in double quotes when writing the +entry. This ensures a trailing CR is always separated for an LF and thus +prevented from getting stripped. + +Note that this problem cannot be addressed by just quoting each CR with +"\r". The reading side of the config interprets only a few backslash +escapes, and "\r" is not among them. This fix is sufficient though +because it only affects the CR at the end of a line and any literal CR +in the interior is already preserved. + +Co-authored-by: David Leadbeater +Signed-off-by: Justin Tobler +Signed-off-by: Taylor Blau + +CVE: CVE-2025-48384 + +Upstream-Status: Backport [https://github.com/git/git/commit/05e9cd64ee23bbadcea6bcffd6660ed02b8eab89] + +Signed-off-by: Praveen Kumar +--- + config.c | 2 +- + t/t1300-config.sh | 10 ++++++++++ + 2 files changed, 11 insertions(+), 1 deletion(-) + +diff --git a/config.c b/config.c +index 6a01938..4fbff51 100644 +--- a/config.c ++++ b/config.c +@@ -2756,7 +2756,7 @@ static ssize_t write_pair(int fd, const char *key, const char *value, + if (value[0] == ' ') + quote = "\""; + for (i = 0; value[i]; i++) +- if (value[i] == ';' || value[i] == '#') ++ if (value[i] == ';' || value[i] == '#' || value[i] == '\r') + quote = "\""; + if (i && value[i - 1] == ' ') + quote = "\""; +diff --git a/t/t1300-config.sh b/t/t1300-config.sh +index b07feb1..49f4971 100755 +--- a/t/t1300-config.sh ++++ b/t/t1300-config.sh +@@ -2417,5 +2417,15 @@ test_expect_success '--get and --get-all with --fixed-value' ' + git config --file=config --get-regexp --fixed-value fixed+ "$META" && + test_must_fail git config --file=config --get-regexp --fixed-value fixed+ non-existent + ' ++test_expect_success 'writing value with trailing CR not stripped on read' ' ++ test_when_finished "rm -rf cr-test" && ++ ++ printf "bar\r\n" >expect && ++ git init cr-test && ++ git -C cr-test config set core.foo $(printf "bar\r") && ++ git -C cr-test config get core.foo >actual && ++ ++ test_cmp expect actual ++' + + test_done +-- +2.40.0 diff --git a/meta/recipes-devtools/git/git_2.35.7.bb b/meta/recipes-devtools/git/git_2.35.7.bb index 3520b4db90..2079c3ddc8 100644 --- a/meta/recipes-devtools/git/git_2.35.7.bb +++ b/meta/recipes-devtools/git/git_2.35.7.bb @@ -27,6 +27,7 @@ SRC_URI = "${KERNELORG_MIRROR}/software/scm/git/git-${PV}.tar.gz;name=tarball \ file://CVE-2024-50349-0002.patch \ file://CVE-2024-52006.patch \ file://CVE-2025-27614-CVE-2025-27613-CVE-2025-46334-CVE-2025-46835.patch \ + file://CVE-2025-48384.patch \ " S = "${WORKDIR}/git-${PV}" From patchwork Wed Sep 3 16:14:55 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 69601 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8A2F7CA1014 for ; Wed, 3 Sep 2025 16:15:23 +0000 (UTC) Received: from mail-pf1-f171.google.com (mail-pf1-f171.google.com [209.85.210.171]) by mx.groups.io with SMTP id smtpd.web10.17053.1756916114821171217 for ; Wed, 03 Sep 2025 09:15:14 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=bR1+KTe9; spf=softfail (domain: sakoman.com, ip: 209.85.210.171, mailfrom: steve@sakoman.com) Received: by mail-pf1-f171.google.com with SMTP id d2e1a72fcca58-772679eb358so83625b3a.1 for ; Wed, 03 Sep 2025 09:15:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1756916114; x=1757520914; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=oCfUA4Oq0F1irqTzSl3arSJ5g4+hMRJLQrYnEyptRVI=; b=bR1+KTe9ePATenFWUvUEpOOB5h5oGDEhiBzaztcaXJ7ireSkaC5uwQcBzDV4jISIEG 8Lyn5ngFH3Mr0wm7h/vMNvhjvYrkz0nH/G2jaLmDBXjIlh2VK610EmUKOt8V0C6m4mnT 3+6GAC+Augi0ldB4RMtfB+gqA2Y3sY1LvfQmws1A9l2b2ftnzCzATxXidU5to7EqcH8e vJTZhb1kYRwmx2uN8nV0cRB8wDGBBI5pZ/joN7ml+jvXzlgQd+tEVZ9Pwg4XtlMJtQr2 bPuAGhpsayFdl27Xjg+GhVxBd2tiWs6mtohurmQYWgFK4DBhGM6HQxU2gMBd8uEHFNT/ Kebg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756916114; x=1757520914; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=oCfUA4Oq0F1irqTzSl3arSJ5g4+hMRJLQrYnEyptRVI=; b=DJB0DO1ZtB/HE/pVIpxet4DZtu36syl5ItirYBi2bzRzqPAk8iQnTvAkQRm0BG7WfY z/rcNfxCi9+uBdM7ERY9BabIaCJDktYx248eXNSs0kkkUrroNUHc+l/zCEL5f6Dx5GfZ b58VGme7okKnFTgCDLUfDjpK6gAK9bQ7i0Y8U0bDSZqyTS3GVAI+WdEhI4xnUvO/XCQd eEgc4WD6uJkoJ+uLrk4rDQ5JwVda72zLIVTh61AozsZhbBVXp2WPSQ008gnYxS76gjnp IrNtYuhte0sgDMJ9F518FHmrF4gXsXCIFzVf8dAnszpDann9RhG3XF58TOh57ysmeMax Q01Q== X-Gm-Message-State: AOJu0Yxqau1zMbhFnawa4J+KfNGw9Nr4b52h6cc/idH73qlt6dhyAqUB 6TSwh179h6+76+syo3BOaqopEtPWPTjmb/z9U2K3/NdlK75pC+7ZoxB7kteBvwN5/HNTZj3Ibuh 0zTGO X-Gm-Gg: ASbGncsK1ZgROf4HRk1wtukLvA218PTEEMXI97RNbWkFVLbD2+810QF+iLV2IKR0qcj P/xzaJvNO5j+BO/XC47yLMZD1tdOEmesuDT/TXRiQh2KQ63Iya/YhdhT2dGHeclkPicn0RVzg5T b0hrE8wSuZ8L6jdg0lhtjv/ktG0l0xjE0we4BImV2PYalosoqSgHmfzk8RLAfjcMF1t0sSRqRxX vWaFrr7pmtwp7UOQxdH+rV5+PCyvtyVJi+8QecGP3o/P524ejBJwnjQ8T3vFS8MxqnRZCFm/Cto W1rLkX3GxFfSzHh+6hO7vnT8GixKh0qhxvsi8Bj0M7Gd+sRO8f5UJvpXqgTzvlKEg4/CLopEeYQ WGLzzj388Z8qhuxqHPLUowmZq X-Google-Smtp-Source: AGHT+IHMA+DISUNdlewX0BlZ3dJNQiZVh/DzAycM8Zj0E57ofCJWu/+MaFSUEJX8wsKQ5T/VCgVx8g== X-Received: by 2002:a17:902:e750:b0:24b:12ce:48bd with SMTP id d9443c01a7336-24b12ce4946mr84578115ad.17.1756916113946; Wed, 03 Sep 2025 09:15:13 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:9ffe:4bb4:e2b3:4b1c]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7724f079b88sm11027602b3a.40.2025.09.03.09.15.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Sep 2025 09:15:13 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 5/9] vim: not adjust script pathnames for native scripts either Date: Wed, 3 Sep 2025 09:14:55 -0700 Message-ID: <671f8cec8ef463d75e9393c5fc03cf913ef9edf6.1756915922.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 03 Sep 2025 16:15:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/222870 From: Mingli Yu After the below commit introduced, the shebang size of native scripts is also checked, so rework the patch to fix the gap. 377fe11bc0 insane.bbclass: Make do_qa_staging check shebangs Fixes: ERROR: QA Issue: : /work/x86_64-linux/vim-native/9.0.0005-r0/sysroot-destdir/work/x86_64-linux/vim-native/9.0.0005-r0/recipe-sysroot-native/usr/share/vim/vim90/tools/mve.awk maximum shebang size exceeded, the maximum size is 128. [shebang-size] ERROR: QA Issue: : /work/x86_64-linux/vim-native/9.0.0005-r0/sysroot-destdir/work/x86_64-linux/vim-native/9.0.0005-r0/recipe-sysroot-native/usr/share/vim/vim90/tools/efm_perl.pl maximum shebang size exceeded, the maximum size is 128. [shebang-size] (From OE-Core rev: 79232458b9cdc741a2049d83839af73f58a5554c) Signed-off-by: Mingli Yu Signed-off-by: Richard Purdie Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- .../vim/files/no-path-adjust.patch | 35 +++++++++++-------- 1 file changed, 21 insertions(+), 14 deletions(-) diff --git a/meta/recipes-support/vim/files/no-path-adjust.patch b/meta/recipes-support/vim/files/no-path-adjust.patch index 9d6da80913..908459a95e 100644 --- a/meta/recipes-support/vim/files/no-path-adjust.patch +++ b/meta/recipes-support/vim/files/no-path-adjust.patch @@ -1,4 +1,7 @@ -vim: do not adjust script pathnames +From 4125a1ccb82fd53d003acdc34e462f238f0c4f0d Mon Sep 17 00:00:00 2001 +From: Joe Slater +Date: Fri, 8 Jul 2022 11:03:22 +0800 +Subject: [PATCH] vim: do not adjust script pathnames When cross-compiling, we do not want to reference the host versions of things like perl and awk. @@ -6,24 +9,28 @@ things like perl and awk. Upstream-Status: Pending Signed-off-by: Joe Slater +Signed-off-by: Mingli Yu +--- + src/Makefile | 6 +----- + 1 file changed, 1 insertion(+), 5 deletions(-) -Index: git/src/Makefile -=================================================================== ---- git.orig/src/Makefile -+++ git/src/Makefile -@@ -2565,11 +2565,14 @@ installtools: $(TOOLS) $(DESTDIR)$(exec_ +diff --git a/src/Makefile b/src/Makefile +index c9513a632..7a7cbdc43 100644 +--- a/src/Makefile ++++ b/src/Makefile +@@ -2534,11 +2534,7 @@ installtools: $(TOOLS) $(DESTDIR)$(exec_prefix) $(DEST_BIN) \ rm -rf $$cvs; \ fi -chmod $(FILEMOD) $(DEST_TOOLS)/* -# replace the path in some tools -+ -+# replace the path in some tools, but not when cross-compiling -+ifneq ($(CROSS_COMPILING),1) - perlpath=`./which.sh perl` && sed -e "s+/usr/bin/perl+$$perlpath+" $(TOOLSSOURCE)/efm_perl.pl >$(DEST_TOOLS)/efm_perl.pl - awkpath=`./which.sh nawk` && sed -e "s+/usr/bin/nawk+$$awkpath+" $(TOOLSSOURCE)/mve.awk >$(DEST_TOOLS)/mve.awk; if test -z "$$awkpath"; then \ - awkpath=`./which.sh gawk` && sed -e "s+/usr/bin/nawk+$$awkpath+" $(TOOLSSOURCE)/mve.awk >$(DEST_TOOLS)/mve.awk; if test -z "$$awkpath"; then \ - awkpath=`./which.sh awk` && sed -e "s+/usr/bin/nawk+$$awkpath+" $(TOOLSSOURCE)/mve.awk >$(DEST_TOOLS)/mve.awk; fi; fi -+endif +- perlpath=`./which.sh perl` && sed -e "s+/usr/bin/perl+$$perlpath+" $(TOOLSSOURCE)/efm_perl.pl >$(DEST_TOOLS)/efm_perl.pl +- awkpath=`./which.sh nawk` && sed -e "s+/usr/bin/nawk+$$awkpath+" $(TOOLSSOURCE)/mve.awk >$(DEST_TOOLS)/mve.awk; if test -z "$$awkpath"; then \ +- awkpath=`./which.sh gawk` && sed -e "s+/usr/bin/nawk+$$awkpath+" $(TOOLSSOURCE)/mve.awk >$(DEST_TOOLS)/mve.awk; if test -z "$$awkpath"; then \ +- awkpath=`./which.sh awk` && sed -e "s+/usr/bin/nawk+$$awkpath+" $(TOOLSSOURCE)/mve.awk >$(DEST_TOOLS)/mve.awk; fi; fi ++# not replace the path in some tools -chmod $(SCRIPTMOD) `grep -l "^#!" $(DEST_TOOLS)/*` # install the language specific files for tools, if they were unpacked +-- +2.25.1 + From patchwork Wed Sep 3 16:14:56 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 69604 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 92FF7CA1015 for ; Wed, 3 Sep 2025 16:15:23 +0000 (UTC) Received: from mail-pg1-f180.google.com (mail-pg1-f180.google.com [209.85.215.180]) by mx.groups.io with SMTP id smtpd.web10.17055.1756916117074101320 for ; Wed, 03 Sep 2025 09:15:17 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=xbGQH82g; spf=softfail (domain: sakoman.com, ip: 209.85.215.180, mailfrom: steve@sakoman.com) Received: by mail-pg1-f180.google.com with SMTP id 41be03b00d2f7-b4c29d2ea05so887511a12.0 for ; Wed, 03 Sep 2025 09:15:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1756916116; x=1757520916; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=FaNPdGywvn6ijFgg0y4iRAF9cSHw986QheYSU6n/Bqs=; b=xbGQH82gKUfTRKpWCVNRUsqeAPkb9xq6wIr9g2OmdOZa2X8tpS3PLEAlTZDtfol1Y1 gLEQwrPsgWtWMXqwfgNshN/4+KBnpIpYdT7kK4bLxxFDY0guKr3RrOU99LvKesAJcwqr 37lvj6SuOC/RYZ/0bulCV0G8zkWyMuzvt08Q400Ewss/nTyBt9QpaDu+iqdHFMo3Iik6 btIC5k2TTZWTaaxZhmZ/uCmVe1eidr76WrFdL6zO8vx/jyjrafoLsjRka91StgptHZIv Co2oW48PHt4NYLvB+LIZiXm0TPWbHq6MG+Svv1TcXYLaQBbiH3yOR6jJzfVDsc3O07c/ KWxQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756916116; x=1757520916; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=FaNPdGywvn6ijFgg0y4iRAF9cSHw986QheYSU6n/Bqs=; b=c+TD/05SnnR/nQVKVaZNFeR8FPvjGN6Yu4hgg4ooogOnIYGW5VxsfEp8ZIPQ3UVF/t qHG3JMPcUv21OgsFo0oMXGpi6P9PL2JBrfq2VvlIHX+PcwODRLLKmbQY1DUQBKUM81+Q 3mjCLLkUEnsbJZ9lFO/Ns1iuj9EPDpNqHJgqLA3a7glCSCuMoBlbfPLECUnqWFgGWVaa mQJZU/jRLdbWHPNfBXUaRHv1WemPM/AEIyMyGulshwulu40q1002AJiE2tcj93bbVBXt i+P8nlNu+sq1hrUzCPoEfw9C6NJxJwlxNFl8PbuiZGnoFYIcds0lH4PeVR6R7n3zTDHe SAYg== X-Gm-Message-State: AOJu0YyYkjuLhjsQYqa1JnBCtXLqVxQ6mCjgAFa/lx+y/ORCq0cubO78 x4W5UUpRvLHx7ESPSVLCIJ5gOl96HbPDVU35aoi6RaURjYZUV6xwLAR3lcIZcWJ/PmsF3nxXwVC HXxgI X-Gm-Gg: ASbGncuoz30D7jd/3LW0rPJLP288YvARuHU8OWMnWKcllu2FnI23RAeH5zK0i3WWIh0 aiqp3cxRsCOyUR4JWrEUAxrvdxWO285i7/W2zG/p7gM97g4Y7nnZQvf7HiU9BHir0rlCiEYQB3w 5M/Er0zlaPSduGhljr/3UtXD47YMHHVMWRUMgIIu7hrOmPzKemEr8BpCs8vy/QVX1maj67NY4Ou na4+SFqe32V6wyvyJehYT+A/BUy57JMvq/re6OQc8y7AKCOlrZlLSMHM7c92+6mXqczy+AMnmjs P+DUjXtWgte9ccSPVld1ulWkl7wSWv7rnMeitT+oNENhd1XngSIcmEH2S8Tq8TbKBbP3FdHTz/D TRnTy7up3axTrASwam8mp6UdhIDX8Ems7ofw= X-Google-Smtp-Source: AGHT+IFz0lilEJTstQcvqOhpe9pGE601g8V8bhT0+pjFnXBSzg/FVzvkVNB2IDGdnyKIwf2uDG+w3A== X-Received: by 2002:a17:90b:2d8c:b0:32b:6132:5f99 with SMTP id 98e67ed59e1d1-32b61326264mr3470797a91.15.1756916115843; Wed, 03 Sep 2025 09:15:15 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:9ffe:4bb4:e2b3:4b1c]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7724f079b88sm11027602b3a.40.2025.09.03.09.15.15 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Sep 2025 09:15:15 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 6/9] vim: upgrade 9.1.1198 -> 9.1.1652 Date: Wed, 3 Sep 2025 09:14:56 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 03 Sep 2025 16:15:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/222871 From: Peter Marko Handles CVE-2025-53905, CVE-2025-53906, CVE-2025-55157, CVE-2025-55158. Changes between 9.1.1198 -> 9.1.1652 ==================================== https://github.com/vim/vim/compare/v9.1.1198...v9.1.1652 Refresh patches. Disable newly introduced wayland support (in patch version 1485). To this belongs also adding recursion in delete command for dir auto which was newly failing as there is wayland directory inside now. If someone is interested, this can be probably enabled, but without additional work it results in compilation error due to function redefinition conflicts. (From OE-Core rev: e87d427d928234ef0441f9ce1fe8631fbe471094) Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie Signed-off-by: Steve Sakoman --- .../0001-src-Makefile-improve-reproducibility.patch | 10 +++++----- .../vim/files/disable_acl_header_check.patch | 12 ++++++------ meta/recipes-support/vim/files/no-path-adjust.patch | 2 +- meta/recipes-support/vim/vim.inc | 7 ++++--- 4 files changed, 16 insertions(+), 15 deletions(-) diff --git a/meta/recipes-support/vim/files/0001-src-Makefile-improve-reproducibility.patch b/meta/recipes-support/vim/files/0001-src-Makefile-improve-reproducibility.patch index 2fc11dbdc2..0741745adc 100644 --- a/meta/recipes-support/vim/files/0001-src-Makefile-improve-reproducibility.patch +++ b/meta/recipes-support/vim/files/0001-src-Makefile-improve-reproducibility.patch @@ -16,11 +16,11 @@ Signed-off-by: Mingli Yu src/Makefile | 14 ++++---------- 1 file changed, 4 insertions(+), 10 deletions(-) -Index: git/src/Makefile -=================================================================== ---- git.orig/src/Makefile -+++ git/src/Makefile -@@ -3101,16 +3101,10 @@ auto/pathdef.c: Makefile auto/config.mk +diff --git a/src/Makefile b/src/Makefile +index 32c0d97d1..97c754673 100644 +--- a/src/Makefile ++++ b/src/Makefile +@@ -3138,16 +3138,10 @@ auto/pathdef.c: Makefile auto/config.mk -@echo '#include "vim.h"' >> $@ -@echo 'char_u *default_vim_dir = (char_u *)"$(VIMRCLOC)";' | $(QUOTESED) >> $@ -@echo 'char_u *default_vimruntime_dir = (char_u *)"$(VIMRUNTIMEDIR)";' | $(QUOTESED) >> $@ diff --git a/meta/recipes-support/vim/files/disable_acl_header_check.patch b/meta/recipes-support/vim/files/disable_acl_header_check.patch index ee1ea0f390..2a5487e685 100644 --- a/meta/recipes-support/vim/files/disable_acl_header_check.patch +++ b/meta/recipes-support/vim/files/disable_acl_header_check.patch @@ -13,11 +13,11 @@ Signed-off-by: Changqing Li src/configure.ac | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) -Index: git/src/configure.ac -=================================================================== ---- git.orig/src/configure.ac -+++ git/src/configure.ac -@@ -3292,7 +3292,7 @@ AC_CHECK_HEADERS(stdint.h stdlib.h strin +diff --git a/src/configure.ac b/src/configure.ac +index cdb818519..dafb7d6ce 100644 +--- a/src/configure.ac ++++ b/src/configure.ac +@@ -3400,7 +3400,7 @@ AC_CHECK_HEADERS(stdint.h stdlib.h string.h \ sys/systeminfo.h locale.h sys/stream.h termios.h \ libc.h sys/statfs.h poll.h sys/poll.h pwd.h \ utime.h sys/param.h sys/ptms.h libintl.h libgen.h \ @@ -26,7 +26,7 @@ Index: git/src/configure.ac sys/access.h sys/sysinfo.h wchar.h wctype.h) dnl sys/ptem.h depends on sys/stream.h on Solaris -@@ -3974,6 +3974,7 @@ AC_ARG_ENABLE(acl, +@@ -4137,6 +4137,7 @@ AC_ARG_ENABLE(acl, , [enable_acl="yes"]) if test "$enable_acl" = "yes"; then AC_MSG_RESULT(no) diff --git a/meta/recipes-support/vim/files/no-path-adjust.patch b/meta/recipes-support/vim/files/no-path-adjust.patch index 908459a95e..1b380393d8 100644 --- a/meta/recipes-support/vim/files/no-path-adjust.patch +++ b/meta/recipes-support/vim/files/no-path-adjust.patch @@ -18,7 +18,7 @@ diff --git a/src/Makefile b/src/Makefile index c9513a632..7a7cbdc43 100644 --- a/src/Makefile +++ b/src/Makefile -@@ -2534,11 +2534,7 @@ installtools: $(TOOLS) $(DESTDIR)$(exec_prefix) $(DEST_BIN) \ +@@ -2552,11 +2552,7 @@ installtools: $(TOOLS) $(DESTDIR)$(exec_prefix) $(DEST_BIN) \ rm -rf $$cvs; \ fi -chmod $(FILEMOD) $(DEST_TOOLS)/* diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index c7f3987134..2a9fda5376 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -18,8 +18,8 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \ file://no-path-adjust.patch \ " -PV .= ".1198" -SRCREV = "f209dcd3defb95bae21b2740910e6aa7bb940531" +PV .= ".1652" +SRCREV = "3e152c76adb9542af86760786d42a0beffe5354b" # Do not consider .z in x.y.z, as that is updated with every commit UPSTREAM_CHECK_GITTAGREGEX = "(?P\d+\.\d+)\.0" @@ -37,7 +37,7 @@ CLEANBROKEN = "1" # vim configure.in contains functions which got 'dropped' by autotools.bbclass do_configure () { cd src - rm -f auto/* + rm -rf auto/* touch auto/config.mk # git timestamps aren't reliable, so touch the shipped .po files so they aren't regenerated touch -c po/cs.cp1250.po po/ja.euc-jp.po po/ja.sjis.po po/ko.po po/pl.UTF-8.po po/pl.cp1250.po po/ru.cp1251.po po/sk.cp1250.po po/uk.cp1251.po po/zh_CN.po po/zh_CN.cp936.po po/zh_TW.po @@ -76,6 +76,7 @@ EXTRA_OECONF = " \ --disable-desktop-database-update \ --with-tlib=ncurses \ --with-modified-by='${MAINTAINER}' \ + --with-wayland=no \ ac_cv_small_wchar_t=no \ ac_cv_path_GLIB_COMPILE_RESOURCES=no \ vim_cv_getcwd_broken=no \ From patchwork Wed Sep 3 16:14:57 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 69602 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9D406CA1017 for ; Wed, 3 Sep 2025 16:15:23 +0000 (UTC) Received: from mail-pf1-f174.google.com (mail-pf1-f174.google.com [209.85.210.174]) by mx.groups.io with SMTP id smtpd.web11.16922.1756916118713667928 for ; Wed, 03 Sep 2025 09:15:18 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=WIiOFcGU; spf=softfail (domain: sakoman.com, ip: 209.85.210.174, mailfrom: steve@sakoman.com) Received: by mail-pf1-f174.google.com with SMTP id d2e1a72fcca58-77287fb79d3so93080b3a.1 for ; Wed, 03 Sep 2025 09:15:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1756916118; x=1757520918; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=65g7QfRwoMNeoDR7USXzYAqii/ACTYRfwBvXmqNjqrA=; b=WIiOFcGU/jTtNiVQ33roncJaCMxnCCAgrJKS0HGLjPXJoFxHcEFKo1Y4PfFqYWJJxk 3JwuQUqqPBkrQCyHFJ/uxTHZyR46x2BEC4yQYsbNHNJ8lJjloKtO/+UiJRq8oOgTxxmR ebAJLO8TTolObA/YvB185wXhlam69WHllOiI8a2ocz/fOCPYHsRXSS/7XMhSJ0/JmY3o 4HlR1J6C0OuH4zI24aeD7btTbtnRf86jMknI4kWqnamkAiY2NKQPp6UM51pW4y7xwOb/ nSqSs+krzzfjRx0H1MtL1/1EY6nu8W6qx0uziiyNcLdMoj6ERf3RjQIZapgHyVcgvRIK 4HgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756916118; x=1757520918; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=65g7QfRwoMNeoDR7USXzYAqii/ACTYRfwBvXmqNjqrA=; b=wSCZdGWi7Ou4QrMy2zWFzZuauAoMEWtqJ/VjJneTAy42sCNsb05Xbs6qnxxgv0noSN voJWn9sVcPIGL1lOEcEi1eYiHckK5DFk2by9jmLFVKoAbHBtiio3afdV5QLXDZwaLpCD I5LWPHt5U91R+ojNPLTeaZ32Q2qjmbVCy6FRi+DhlkYm8MJ+pnmwl+sFLOuWaAhaVhk9 NDO9SvT+EyMnVOOANffRIFCDODv2RGPNrM4wyXznzpvQ7w8PJX6+8OB0y50jg1mL0QIU EnMk4afUVODB40aLyZ9+Gs0mBM3mxXCIY9V5dlecgVBwPeBaLm8zUIHFg7ZHNzFJVMWR 12Fw== X-Gm-Message-State: AOJu0YzU7NX6sqqhWKmyutj+B/DM1VwgyzlFeJ3rzDFiHBEoK7A3XrLY DQQF11ALzfunfI7YnPquY3qdmDWvf+A34/6DxblsIOGXTUstnta4vVeTK+Y4zrMNuMnPVhPhDSQ gO8Wl X-Gm-Gg: ASbGncvFjUDa9nzO7P4HmYOdfzTBXngpCiFmBka95rWO6GZmx6zn0M2EF+9eLUTmYso StwP+QTKk+2msj98ynaMWHkFaSW4y8sRiK5QrD/2gIF8oOVjAxvMe5040vRrLx3rtzE7nAa1XWq 1YVnHqVQY8e8ZV/Nf3WW8PgNsWJdmrulMuOQTw7KKZq8NEC6wLL8LLgXCwatT1wjyhsrv5Wcs+N C38OT/9jXJ38o/gZ9yD9lrOEJL5Miih0WHJovEykS7BmEJcJ+qvTB3Md7VQXbWdxRlUHJy80SaR 6CCoAeWbwfzETiO+zWPnEBQCd6O1gB3fFKqFt7mhFhV65Hh4UIBVVk45SxO8Gc7pwtd0oHPOhtc 8Y3dpTFCa68ePiQ== X-Google-Smtp-Source: AGHT+IGvNAUPrsJGUcU7rfP//qR8NTSdUMmCsyKMbghQ44ho7qT3Jk+c8w7XuWOqwAfoS+XHEWIJ7w== X-Received: by 2002:a05:6a20:a89a:b0:244:d3d0:962a with SMTP id adf61e73a8af0-244d3d099a4mr7074249637.22.1756916117724; Wed, 03 Sep 2025 09:15:17 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:9ffe:4bb4:e2b3:4b1c]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7724f079b88sm11027602b3a.40.2025.09.03.09.15.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Sep 2025 09:15:17 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 7/9] sudo: remove devtool FIXME comment Date: Wed, 3 Sep 2025 09:14:57 -0700 Message-ID: <652986a4c67fc5d1c69cd3c2cb0d7f197b960be6.1756915922.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 03 Sep 2025 16:15:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/222872 From: Peter Marko This comment should not have been merged. It shows that the license did not change. Signed-off-by: Peter Marko Signed-off-by: Steve Sakoman --- meta/recipes-extended/sudo/sudo_1.9.17p1.bb | 52 --------------------- 1 file changed, 52 deletions(-) diff --git a/meta/recipes-extended/sudo/sudo_1.9.17p1.bb b/meta/recipes-extended/sudo/sudo_1.9.17p1.bb index c5d57da9f0..5b9d73b33b 100644 --- a/meta/recipes-extended/sudo/sudo_1.9.17p1.bb +++ b/meta/recipes-extended/sudo/sudo_1.9.17p1.bb @@ -1,55 +1,3 @@ -# FIXME: the LIC_FILES_CHKSUM values have been updated by 'devtool upgrade'. -# The following is the difference between the old and the new license text. -# Please update the LICENSE value if needed, and summarize the changes in -# the commit message via 'License-Update:' tag. -# (example: 'License-Update: copyright years updated.') -# -# The changes: -# -# --- LICENSE.md -# +++ LICENSE.md -# @@ -1,6 +1,6 @@ -# Sudo is distributed under the following license: -# -# - Copyright (c) 1994-1996, 1998-2023 -# + Copyright (c) 1994-1996, 1998-2025 -# Todd C. Miller -# -# Permission to use, copy, modify, and distribute this software for any -# @@ -247,9 +247,9 @@ -# -# The file arc4random.c bears the following license: -# -# - Copyright (c) 1996, David Mazieres -# - Copyright (c) 2008, Damien Miller -# - Copyright (c) 2013, Markus Friedl -# + Copyright (c) 1996, David Mazieres -# + Copyright (c) 2008, Damien Miller -# + Copyright (c) 2013, Markus Friedl -# Copyright (c) 2014, Theo de Raadt -# -# Permission to use, copy, modify, and distribute this software for any -# @@ -282,7 +282,7 @@ -# -# The file getentropy.c bears the following license: -# -# - Copyright (c) 2014 Theo de Raadt -# + Copyright (c) 2014 Theo de Raadt -# Copyright (c) 2014 Bob Beck -# -# Permission to use, copy, modify, and distribute this software for any -# @@ -299,7 +299,7 @@ -# -# The embedded copy of zlib bears the following license: -# -# - Copyright (C) 1995-2022 Jean-loup Gailly and Mark Adler -# + Copyright (C) 1995-2024 Jean-loup Gailly and Mark Adler -# -# This software is provided 'as-is', without any express or implied -# warranty. In no event will the authors be held liable for any damages -# -# - require sudo.inc SRC_URI = "https://www.sudo.ws/dist/sudo-${PV}.tar.gz \ From patchwork Wed Sep 3 16:14:58 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 69603 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 85AF9CA1009 for ; Wed, 3 Sep 2025 16:15:23 +0000 (UTC) Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by mx.groups.io with SMTP id smtpd.web11.16924.1756916120407353018 for ; Wed, 03 Sep 2025 09:15:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=VhU9gEcw; spf=softfail (domain: sakoman.com, ip: 209.85.210.169, mailfrom: steve@sakoman.com) Received: by mail-pf1-f169.google.com with SMTP id d2e1a72fcca58-7704f3c46ceso67700b3a.2 for ; Wed, 03 Sep 2025 09:15:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1756916119; x=1757520919; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=QeWFiCXvEPXDU0nRu4Zk+xhSzk8R2KZpEMUEeo15u7U=; b=VhU9gEcwW5bEmTjscibBtPz8mEcpQwV4NJ2bcx7jGx2TuMRAvhsZj8y3PipvTnsJye kIusYTzivFbkw6lx3hqKv4xOMKJbbh+E2N1N5gOOsMGkutSQ907FKdy/NSSM1Yb7Vsmn LYX0feB2lo3YeVw+tEPeMat+IL5SEbKrt5/RVEQDY5W5IJjXdh0/AcigrfkQPQWT/DUi bvT7WYPTl4GaQE/R8j3C6elJhawsIumttYYflTytgsyp1DdoVmFuG5Gnpf21s6cBHy0v YEgt+1aMyszD1ldm+4poE9U4gj8U7+/pMzVSALLklCV0Zj8iuFFaF67pEsiTBeeUi06m PqTQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756916119; x=1757520919; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=QeWFiCXvEPXDU0nRu4Zk+xhSzk8R2KZpEMUEeo15u7U=; b=ElhYQsq5XLcFJaV7cwjnf4qI+WfpHrFPJT3dYLvfX2Ygx5LlVVIRMTUWW8ybBc5Zq3 2UbUxC1gAeE2m6dV9isQWtd5CJDYuS2P8XtJxIWxM/cjbBPAx5QTvYYAZtPVyVh+j8S3 KM1EQN+sGNIPe5mUjr1pmXlsOZ1KPceje5rciODp2fhLVGAcP/qWKJsPzAAjQaFigeQO 55ylif2i6Da5cVb+YTAwDGRihSsLjrEITLyx7z3K1Fa4/ezTFzASs6AOoYACpA8HyyjC /fG9jXu5zVy6M1Vt0qF0EAgLRThtmixqaAwjZ8Ufp8eQga+CdkgocJjtvtC33Ukvsk6g ay5Q== X-Gm-Message-State: AOJu0YzEgocsd4jFSg4lAvj+FqWZzop9qyfTwvbzObWfeDQB6JCSnwaZ KEmUu9GyTEjUwZMWo8g1GXCxVOP7YhvPz0H5HXslGCRZxOOoFOcQJSrXX0ZgwQfnXXpCTBKznu2 2dWL7 X-Gm-Gg: ASbGncuzb1FPlcwpmWap+rinnVpSGnBgaBveD5X9c02Fa4OIy8UTvxFu5MjJnOBkdoh 9CG5IdhxK9f2tkKjNzh2mP+Idg7iqJF0Lp5M6LTsKq5HEa1VMe80QrUAz18DWuRunuNmlXQoK59 bEeIhIYMIrUKUZypZwN/91RR9iDH0MlSAE5O+u76ba1+nHTCaax8qqsdvJJhoNdwoZYmUm0zkQz jtIYb+WCcEgs4yrImbasKptpJOgX1RofZImpiIYXuaGk+WbpruiHZ23RNAXNZaiQCXiwgEi6AH6 z8UMnfHAAaFdo9ciENxNtMn+ENANK4De0S3FB6+aXGXqmqYnkuCsTsIREZ6MPAJ5Y82auJjf7EQ FoLgL0GvCZQXfiRTzeFTWYWE4 X-Google-Smtp-Source: AGHT+IGMsu9AWKnmdTmdMiIOvf4bCqQSnGA9YVRN87+ZMmnhAkX71/AJpiOx36SXHpazimCOOpMZ4Q== X-Received: by 2002:a05:6a20:94c8:b0:243:a4de:d7f with SMTP id adf61e73a8af0-243d6dd5387mr20128517637.11.1756916119302; Wed, 03 Sep 2025 09:15:19 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:9ffe:4bb4:e2b3:4b1c]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7724f079b88sm11027602b3a.40.2025.09.03.09.15.18 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Sep 2025 09:15:18 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 8/9] default-distrovars.inc: Fix CONNECTIVITY_CHECK_URIS redirect issue Date: Wed, 3 Sep 2025 09:14:58 -0700 Message-ID: X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 03 Sep 2025 16:15:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/222873 From: Deepak Rathore The default CONNECTIVITY_CHECK_URIS uses "https://yoctoproject.org/connectivity.html" which redirect to "https://www.yoctoproject.org/connectivity.html". Some network configurations with proxies or restricted internet access don't handle HTTP redirects properly during the sanity check phase, causing build failures with: ERROR: OE-core's config sanity checker detected a potential misconfiguration. Either fix the cause of this error or at your own risk disable the checker (see sanity.conf). Following is the list of potential problems / advisories: Fetcher failure for URL: 'https://yoctoproject.org/connectivity.html'. URL doesn't work. Updated the default URL to use the final destination directly to avoid redirect-related connectivity check failures. Also updated SDK test cases in https.py to use the corrected URL for consistency. Signed-off-by: Deepak Rathore Signed-off-by: Richard Purdie (cherry picked from commit 60cdf960a3560f391babd559737f1afb31fb2c5c) Signed-off-by: Deepak Rathore Signed-off-by: Steve Sakoman --- meta/conf/distro/include/default-distrovars.inc | 2 +- meta/lib/oeqa/sdk/buildtools-cases/https.py | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/conf/distro/include/default-distrovars.inc b/meta/conf/distro/include/default-distrovars.inc index 3edba1b6d0..4ed2121b04 100644 --- a/meta/conf/distro/include/default-distrovars.inc +++ b/meta/conf/distro/include/default-distrovars.inc @@ -52,4 +52,4 @@ KERNEL_IMAGETYPES ??= "${KERNEL_IMAGETYPE}" # fetch from the network (and warn you if not). To disable the test set # the variable to be empty. # Git example url: git://git.yoctoproject.org/yocto-firewall-test;protocol=git;rev=master;branch=master -CONNECTIVITY_CHECK_URIS ?= "https://yoctoproject.org/connectivity.html" +CONNECTIVITY_CHECK_URIS ?= "https://www.yoctoproject.org/connectivity.html" diff --git a/meta/lib/oeqa/sdk/buildtools-cases/https.py b/meta/lib/oeqa/sdk/buildtools-cases/https.py index 35e549eb40..828aaea55b 100644 --- a/meta/lib/oeqa/sdk/buildtools-cases/https.py +++ b/meta/lib/oeqa/sdk/buildtools-cases/https.py @@ -13,8 +13,8 @@ class HTTPTests(OESDKTestCase): """ def test_wget(self): - self._run('env -i wget --debug --output-document /dev/null https://yoctoproject.org/connectivity.html') + self._run('env -i wget --debug --output-document /dev/null https://www.yoctoproject.org/connectivity.html') def test_python(self): # urlopen() returns a file-like object on success and throws an exception otherwise - self._run('python3 -c \'import urllib.request; urllib.request.urlopen("https://yoctoproject.org/connectivity.html")\'') + self._run('python3 -c \'import urllib.request; urllib.request.urlopen("https://www.yoctoproject.org/connectivity.html")\'') From patchwork Wed Sep 3 16:14:59 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 69599 X-Patchwork-Delegate: steve@sakoman.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 784FDCA0FF2 for ; Wed, 3 Sep 2025 16:15:23 +0000 (UTC) Received: from mail-pf1-f178.google.com (mail-pf1-f178.google.com [209.85.210.178]) by mx.groups.io with SMTP id smtpd.web10.17062.1756916121890818552 for ; Wed, 03 Sep 2025 09:15:21 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=U1mQwp1D; spf=softfail (domain: sakoman.com, ip: 209.85.210.178, mailfrom: steve@sakoman.com) Received: by mail-pf1-f178.google.com with SMTP id d2e1a72fcca58-7722f8cf9adso100529b3a.0 for ; Wed, 03 Sep 2025 09:15:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1756916121; x=1757520921; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=g9ciXWgEG/JpY9Nuz1t+XKcAN2VoyNl7XNhCC9zhJDs=; b=U1mQwp1DbEOxXWgYaWEGerQe/99h/UCy6tQ8aUPL8hmW6FnkgC/gZLhDGjSNHp1LXV 84r7O0Jqdw2ALT2rEzmVDrJVy15a2V2qEL2piEeh7pGM6Y+mNYJxuT9sVv2Ow7eg2vMd A0pk3Uaeo1eo2mGckqDczlF2ddyt51ZNB/D2ebPfgdL6yX3KuGKYRCmp65ghZE9a8r+H mETs3vOEyuJKC30ZqfPW/zPeB1njd05GUaVCgoat9iCOipbSgKrQQ6TW6Veh4YBVsvAE T0Lefb9DmbBCncWkp2WudGM3AVA7ICNjVYkOg3KDb+sPKNs4W3ChPbiowKpPMn3beoYl Uphw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756916121; x=1757520921; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=g9ciXWgEG/JpY9Nuz1t+XKcAN2VoyNl7XNhCC9zhJDs=; b=D1FtxICo8QNspz3uCpYRi9p8/YEhfKyHb1/X8LDTFJh/oVTsxXFWus84/Nj1oB7LP6 Hpp9oAKZi+koG9nUNHNlBi4IJbuQVVcdlJniZIkJKbxeVm5nkD1Eg3uZqeXYPYnWUkMm 0zhOLMV8R8WJvjL4fYMweAdQ+bhcV9hp/FtcpqbmYHDvObzrVoASkfmkes7psfTIYp1s Ec98vP3IBWRQpx+aS09y86t4AvM+IA59nBWHcV3xLOZkKB06h0nr/3QICUFgEUHYUPoa gHPgKT5xoNC+Gy1KH6u0saDsB44l14/xiu9L5HQuWjQbLnUCXbwMx2uQT/RNx45HCQf2 wnAQ== X-Gm-Message-State: AOJu0YweFu+RXBbL69oXwn/4WLtiykDlFC2ZwizA1MSIlnn6OpAPiuoj kD/dPRj/ypov8AYyAr3bYNzCoM6GPgjionRHwRsdzLKFLXun/vVsf7D7Wsp4m0tXW3F/zHytYIA 7dyKZ X-Gm-Gg: ASbGncs26JMb7NMGLqtbto00nxslrWICoAa9SzDMsBjgkZTetS3wXAiV2IHQYR4QBJB S53nK0CdeNVacY2WHyhPUUL2Gi8iLnhjfOTb7xWVkFzrvtUELAcvcWIStj9MC27380un/iyMQRs zzp1hh9rTowCKDK8efnW8UPpJ7XdfpPv3xKAby/GofwZOoK00M11OZc11GYSsaEt0dnuLAWYpyX NfFE3Jzh5J+sWnTwBlQwgqXv6lgsLEOUWBbVfD+7Bk78tmnQTcKMq2QB2tg0eEicM/p2O/vNNSj 4svgx4M+3uPvGhNbKYmIDqpX3tlSGoGjBdqAKyu8D7jieiacQY4QUW6HuDsf28whN/b+XVo1mU8 BfExhyQ1yA3eJ4g== X-Google-Smtp-Source: AGHT+IEl+n+cPjgEndiiJOGPDbIFgc81+9ewzN64AOQXieQMWZWeb6xnQUyiSmuQLYEy+9tvnDVDrw== X-Received: by 2002:a05:6a00:2381:b0:771:f69a:c426 with SMTP id d2e1a72fcca58-7723e276e5dmr22451556b3a.14.1756916120894; Wed, 03 Sep 2025 09:15:20 -0700 (PDT) Received: from hexa.. ([2602:feb4:3b:2100:9ffe:4bb4:e2b3:4b1c]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7724f079b88sm11027602b3a.40.2025.09.03.09.15.20 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Sep 2025 09:15:20 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 9/9] pulseaudio: Add audio group explicitly Date: Wed, 3 Sep 2025 09:14:59 -0700 Message-ID: <71ed9d8394f7e625270ee66f9c2816bba4aa2016.1756915922.git.steve@sakoman.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 03 Sep 2025 16:15:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/222874 From: Kyungjik Min Since pulseaudio-server requires the audio group, we explicitly add it. When use useradd-staticids or do not use the default group in base-passwd, an error will occur because the audio group is not defined. NOTE: pulseaudio: Performing useradd with [--root TOPDIR/tmp/work/cortexa72-poky-linux/pulseaudio/17.0/recipe-sysroot --home-dir /var/run/pulse --gid 998 --groups audio,pulse --no-create-home --system --shell /bin/false --uid 998 pulse] useradd: group 'audio' does not exist ERROR: pulseaudio: useradd command did not succeed. Signed-off-by: Kyungjik Min Signed-off-by: Steve Sakoman --- meta-selftest/files/static-group | 1 + meta/recipes-multimedia/pulseaudio/pulseaudio.inc | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/meta-selftest/files/static-group b/meta-selftest/files/static-group index cbec6f1377..1744da6aad 100644 --- a/meta-selftest/files/static-group +++ b/meta-selftest/files/static-group @@ -25,3 +25,4 @@ weston:x:525: wayland:x:526: render:x:527: sgx:x:528: +audio:x:529: diff --git a/meta/recipes-multimedia/pulseaudio/pulseaudio.inc b/meta/recipes-multimedia/pulseaudio/pulseaudio.inc index 61d5bb00ba..7b9d245c07 100644 --- a/meta/recipes-multimedia/pulseaudio/pulseaudio.inc +++ b/meta/recipes-multimedia/pulseaudio/pulseaudio.inc @@ -147,7 +147,7 @@ do_install:append() { } USERADD_PACKAGES = "pulseaudio-server" -GROUPADD_PARAM:pulseaudio-server = "--system pulse" +GROUPADD_PARAM:pulseaudio-server = "--system audio; --system pulse" USERADD_PARAM:pulseaudio-server = "--system --home /var/run/pulse \ --no-create-home --shell /bin/false \ --groups audio,pulse --gid pulse pulse"