From patchwork Mon Oct 27 14:15:48 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 73090 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 89A0ACCF9E5 for ; Mon, 27 Oct 2025 14:16:05 +0000 (UTC) Received: from mail-wm1-f44.google.com (mail-wm1-f44.google.com [209.85.128.44]) by mx.groups.io with SMTP id smtpd.web10.34151.1761574560778639042 for ; Mon, 27 Oct 2025 07:16:01 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=A+0jvV5n; spf=pass (domain: gmail.com, ip: 209.85.128.44, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f44.google.com with SMTP id 5b1f17b1804b1-4711f3c386eso35668735e9.0 for ; Mon, 27 Oct 2025 07:16:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1761574559; x=1762179359; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:from:to:cc:subject:date:message-id:reply-to; bh=cCexvCMiYoE4BHFcYQO/escaPaQGa8lkrCe7tQ7DbbM=; b=A+0jvV5nArU2iF97N/RuqoRrvVgC+YlnZ7DD7LbIlV6FOv7W0iyCwj1ZL+Kr+nYWhO NmzVLHC0k/j7mCG15Xs0HnG2Xrh98jaQxuP4op3iyfEORGugkOKWhcfZ/wK7QrTTHf1r msnqvXCta0QDbMv6dgJb1K0tI+ti8jVrQvDo239GWhU8A03KI5bwlwNiFKu6feKHW2Yl D5kGzadh1FGlKzsCd/JTQGQSb4k9u88LpB4mFKy/e02q0aU04Zh1IMktRnMR6n4670Ar UeOrlqpAr3pqc5WF0h6WEzuH9xWSScDMVQeSRiNM9gGTbriflHa9PFmU3G/qTo/8ehSj GucQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1761574559; x=1762179359; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=cCexvCMiYoE4BHFcYQO/escaPaQGa8lkrCe7tQ7DbbM=; b=BwUFmD6eiLIfqBaWMsAFdp65N7isBRvFl9DUzAna7R8Qjmu02+YioX3tyIFcWVwo+m 18jh1JQJRDn9E4n1sc7DD/pMa4ogGRQhl7e15e7KWTE5RNykVqff9nwME1QpNkkYYQ7/ LcWIKZ5zWe6+P8lcRU9Op//y+GeG+5FtYPNd/AJsQ2lfcrBPLbk6j40HtH6BFq7tOlMl Mi1t6gdCT1jMLhHzMsAyqb9sEU0fdzZW+SYHmyAwe8PyYgCXO74DWwhRJBBybViXKYd+ nDDbWehkHrNTHqsnlY6o5LCaJOS7p5HMZ3Gxv53W5/HUuwJd44IkgHBlPyo55FlvjXsu jP9w== X-Gm-Message-State: AOJu0YxNqJdXklksqDyfjvGXZBb3LWBsYgR8HlfY3+xybhDMXUxMcXYu J4/L2jHi9dBbURlZ9i/d8dofrC5zRh0DA1KH/3PRkkQXP1bZ0pgaY7bOvX6djQ== X-Gm-Gg: ASbGncumQlWQ5iqTA2HYqxn0sOY4HM5aUoUzgrrntvaW6gQ34pL/Z039O5TVQWJPI3X ++OxVuAb745QIhlF2A8fGDiYTe5zZC1HTuRjwx2DfY3BX7Xzl7hzripZIHpffTGVIL1Stvziy96 bSRqy7KkDvu89Hmf65Q5wVOGWjItT5kkwntk8gec6bdoElR7XEbqJRlFaGCi7GTk/53LH/xiW7Y TSVlTAUNcZIyE10hnBeBuVQp8B9N+5wJHEqhiDjS1C4oA20nXMAwz64Vdw0EVItlYJbQpfxt9ms zzdItbyAH+Twtbnt0UeLBO22ZbmE7bfW2VJPkOb9soJs3ldNSdHIy6+BVHAQxY+apRb9flVP2D3 YCRSqmeWuozrm1yc753bknFHvn98U5KhA1alKVmXosEh9iVWX57W8467pQdnep2ByMiIWqrmvc5 pV0vzLdlZP X-Google-Smtp-Source: AGHT+IFdMfb5PMu+yGwLF0NA5R28ey+ZBbE6mhVmGiQhzJ/ZTIL2WM79h3nKTeJkAdbU+X2dpXuWaQ== X-Received: by 2002:a05:600c:1d20:b0:476:4efc:8ed4 with SMTP id 5b1f17b1804b1-4764efc9b5amr74943075e9.11.1761574558765; Mon, 27 Oct 2025 07:15:58 -0700 (PDT) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-429952db80fsm14164067f8f.31.2025.10.27.07.15.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Oct 2025 07:15:58 -0700 (PDT) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-initramfs][kirkstone][PATCH 01/10] klibc: patch CVE-2021-31870 Date: Mon, 27 Oct 2025 15:15:48 +0100 Message-ID: <20251027141557.1893563-1-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.1 MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 27 Oct 2025 14:16:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121041 Details: https://nvd.nist.gov/vuln/detail/CVE-2021-31870 Pick patch mentioned in the nvd report. Signed-off-by: Gyorgy Sarvari --- .../klibc/files/CVE-2021-31870.patch | 45 +++++++++++++++++++ .../recipes-devtools/klibc/klibc.inc | 1 + 2 files changed, 46 insertions(+) create mode 100644 meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31870.patch diff --git a/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31870.patch b/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31870.patch new file mode 100644 index 0000000000..028b5d395e --- /dev/null +++ b/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31870.patch @@ -0,0 +1,45 @@ +From 15c0e066ac8a75bdb3189dd5d77dc0f3539afefd Mon Sep 17 00:00:00 2001 +From: Ben Hutchings +Date: Wed, 28 Apr 2021 04:29:50 +0200 +Subject: [PATCH] calloc: Fail if multiplication overflows + +calloc() multiplies its 2 arguments together and passes the result to +malloc(). Since the factors and product both have type size_t, this +can result in an integer overflow and subsequent buffer overflow. +Check for this and fail if it happens. + +CVE-2021-31870 + +CVE: CVE-2021-31870 +Upstream-Status: Backport [https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=292650f04c2b5348b4efbad61fb014ed09b4f3f2] + +Signed-off-by: Ben Hutchings +--- + usr/klibc/calloc.c | 11 ++++++++--- + 1 file changed, 8 insertions(+), 3 deletions(-) + +diff --git a/usr/klibc/calloc.c b/usr/klibc/calloc.c +index 53dcc6b..4a81cda 100644 +--- a/usr/klibc/calloc.c ++++ b/usr/klibc/calloc.c +@@ -2,12 +2,17 @@ + * calloc.c + */ + ++#include + #include + #include + +-/* FIXME: This should look for multiplication overflow */ +- + void *calloc(size_t nmemb, size_t size) + { +- return zalloc(nmemb * size); ++ unsigned long prod; ++ ++ if (__builtin_umull_overflow(nmemb, size, &prod)) { ++ errno = ENOMEM; ++ return NULL; ++ } ++ return zalloc(prod); + } diff --git a/meta-initramfs/recipes-devtools/klibc/klibc.inc b/meta-initramfs/recipes-devtools/klibc/klibc.inc index ceb4f5ad3b..dd22282b40 100644 --- a/meta-initramfs/recipes-devtools/klibc/klibc.inc +++ b/meta-initramfs/recipes-devtools/klibc/klibc.inc @@ -21,6 +21,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/libs/klibc/2.0/klibc-${PV}.tar.xz \ file://0001-klibc-Kbuild-Accept-EXTRA_KLIBCAFLAGS.patch \ file://cross-clang.patch \ file://0001-workaround-for-overlapping-sections-in-binary.patch \ + file://CVE-2021-31870.patch \ " ARMPATCHES ?= "" From patchwork Mon Oct 27 14:15:49 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 73092 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 96A5FCCF9EF for ; Mon, 27 Oct 2025 14:16:05 +0000 (UTC) Received: from mail-wm1-f44.google.com (mail-wm1-f44.google.com [209.85.128.44]) by mx.groups.io with SMTP id smtpd.web10.34152.1761574561647183897 for ; Mon, 27 Oct 2025 07:16:01 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=MeEl8DW0; spf=pass (domain: gmail.com, ip: 209.85.128.44, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f44.google.com with SMTP id 5b1f17b1804b1-475dd559a83so12007685e9.1 for ; Mon, 27 Oct 2025 07:16:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1761574560; x=1762179360; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ooKWbr1bBOyzguAg3nkEL7DZ1JHZwsam63gFb9NLvcQ=; b=MeEl8DW0L1k8MnLyObvKnxQRFjQ+jmzu5QzlNLAefoQJOFkN9k2A7Jr5jcwGwpNnhG PmSfYKNXGkh9MdymMb3IsQsFEzuH0hMXa0qNwLf6m5XW7ojpJbfBZf5nqmzK1OZW5Cjx 91VdEo5HBJKkDrt3mdtlkb06MbinlieN3ym6DPmHmkUlcL+Y1Ok3S/0zr0lPgPA6Inbk 9kncNFB00kX7/1dO0V9o5aByCrKS49Vdhu5T6UM3NHAlA0b5VleQyk4eOVQml1y/StSQ Un0KoQi2bsgLNb2AVbl59eOH1ichmDVAB30JvwGKrUKOgV1z1/uKDq3fy7E/qgBdxe7q vqcA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1761574560; x=1762179360; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ooKWbr1bBOyzguAg3nkEL7DZ1JHZwsam63gFb9NLvcQ=; b=ImtFvUde/Xk+0N0EinMoZlJnCnYcde1VkmPlADwkwJrBY+zP/V18WDlSDb+JdT0OZf PhYF5vsjL+7PQmlgOZRsqEm1tE7fE1BykRicZ8RypCqwCYb+TXFHa0ko4a2pdVqUmjUO 4Gk5JRbX+vOl7gAcDqCnTbVLm12nn3ujnTlHhWXJp+6hyOOocW1pTmUUETDqslDnpJrP XTODAHu8M7Q4Wxq9uLFwf/kyEgwOdAplJCSRMlMFLCZVDEH08QFWMA8Qhfw6GHFY5xFM TPQTMAiaZJsOpctw7J57Cd4kbm1VR8KUwVV540OxsqTkwkBGH9qgc5b/WKkQ/BLuWzB1 oXlQ== X-Gm-Message-State: AOJu0Yx1IK8ZGnouMgUE+cb7SrM7QJLCGLOxI9T0tz0K3lF0xwfV2eq6 NH+vMBKfvahgYrjGJqBo6oVQbbMCxUIjoP7sNmRsqTQjmVhionWj5FU7N4mszQ== X-Gm-Gg: ASbGncvS2AM6Q+FiVFLViR1mrzNnEVwMK4KHaf1+N1pT1uPtG7/uQmZ2ABYJCrbkiKy olLODt7pnp5XG+abESyuXYxMWKD5EuOZy3vIZzvVzYDYa96HBH/E13rMhJ52y89IKnsrS3k2tjo bPFvF1whaUrvzIJIzPtBlVKLMwAmr5chicdaWzjbc6JhYmy7HahDX2g2Qxj+V+3JpQ3CSFD6/yv /4RkM3EpM7Obi7iUInOtDETBy7f+H5Ih/izLD/Hjo7LA4k7VB7Nri3PcyCR4tDZ9lXEb96A6WbO u77LYaLo3lyPju7MGWYOvqx/Z7jjsJPnRcLarBkYRu/zOofulBI3xCHYZGr/cN5npNnlfC1twOV LTLyNF87MYh1peLd4nik7riB/fCtcYUqcUN9GKr98qJm8d/GYXBXR05N6Fq21IMIWNT+qtEur3g == X-Google-Smtp-Source: AGHT+IHDkuuwuuzomBCT6oWH0C4cyI35YU1bNNsUil3pjJiI5LLgsmj3DDJhYK9pjFpFo7jjGiO2kQ== X-Received: by 2002:a05:600c:c492:b0:46d:9d28:fb5e with SMTP id 5b1f17b1804b1-475d2e72db1mr90796425e9.5.1761574559947; Mon, 27 Oct 2025 07:15:59 -0700 (PDT) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-429952db80fsm14164067f8f.31.2025.10.27.07.15.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Oct 2025 07:15:59 -0700 (PDT) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-initramfs][kirkstone][PATCH 02/10] klibc: patch CVE-2021-31871 Date: Mon, 27 Oct 2025 15:15:49 +0100 Message-ID: <20251027141557.1893563-2-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251027141557.1893563-1-skandigraun@gmail.com> References: <20251027141557.1893563-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 27 Oct 2025 14:16:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121042 Details: https://nvd.nist.gov/vuln/detail/CVE-2021-31871 Pick the patch mentioned in the nvd report. Signed-off-by: Gyorgy Sarvari --- .../klibc/files/CVE-2021-31871.patch | 34 +++++++++++++++++++ .../recipes-devtools/klibc/klibc.inc | 1 + 2 files changed, 35 insertions(+) create mode 100644 meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31871.patch diff --git a/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31871.patch b/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31871.patch new file mode 100644 index 0000000000..c8c40ec931 --- /dev/null +++ b/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31871.patch @@ -0,0 +1,34 @@ +From db29a01c413fcaaa1095284dfe31582e97d35679 Mon Sep 17 00:00:00 2001 +From: Ben Hutchings +Date: Wed, 28 Apr 2021 19:46:47 +0200 +Subject: [PATCH] cpio: Fix possible crash on 64-bit systems + +copyin_link() tries to allocate (unsigned int)c_filesize + 1 bytes. +If c_filesize == UINT_MAX, this works out as 0 bytes, resulting in a +null pointer and a subsequent SIGSEGV. + +The previous commit made this impossible on 32-bit systems. + +CVE-2021-31871 + +CVE: CVE-2021-31871 +Upstream-Status: Backport [https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5] + +Signed-off-by: Ben Hutchings +--- + usr/utils/cpio.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/usr/utils/cpio.c b/usr/utils/cpio.c +index cb61679..a13c876 100644 +--- a/usr/utils/cpio.c ++++ b/usr/utils/cpio.c +@@ -831,7 +831,7 @@ static void copyin_link(struct new_cpio_header *file_hdr, int in_file_des) + char *link_name = NULL; /* Name of hard and symbolic links. */ + int res; /* Result of various function calls. */ + +- link_name = (char *)xmalloc((unsigned int)file_hdr->c_filesize + 1); ++ link_name = (char *)xmalloc(file_hdr->c_filesize + 1); + link_name[file_hdr->c_filesize] = '\0'; + tape_buffered_read(link_name, in_file_des, file_hdr->c_filesize); + tape_skip_padding(in_file_des, file_hdr->c_filesize); diff --git a/meta-initramfs/recipes-devtools/klibc/klibc.inc b/meta-initramfs/recipes-devtools/klibc/klibc.inc index dd22282b40..ccf4a56953 100644 --- a/meta-initramfs/recipes-devtools/klibc/klibc.inc +++ b/meta-initramfs/recipes-devtools/klibc/klibc.inc @@ -22,6 +22,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/libs/klibc/2.0/klibc-${PV}.tar.xz \ file://cross-clang.patch \ file://0001-workaround-for-overlapping-sections-in-binary.patch \ file://CVE-2021-31870.patch \ + file://CVE-2021-31871.patch \ " ARMPATCHES ?= "" From patchwork Mon Oct 27 14:15:50 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 73093 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 96747CCF9EE for ; Mon, 27 Oct 2025 14:16:05 +0000 (UTC) Received: from mail-wm1-f44.google.com (mail-wm1-f44.google.com [209.85.128.44]) by mx.groups.io with SMTP id smtpd.web10.34154.1761574563509611991 for ; Mon, 27 Oct 2025 07:16:03 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=QDEvUX1v; spf=pass (domain: gmail.com, ip: 209.85.128.44, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f44.google.com with SMTP id 5b1f17b1804b1-4711b95226dso58638825e9.0 for ; Mon, 27 Oct 2025 07:16:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1761574562; x=1762179362; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8vT2TTLpjnE3LuM9czMgLMTrFgZDcCycPUN73j8om70=; b=QDEvUX1vaPFu8IN8wge24EW9E7ovEEF84uddvhibZBtUf0RfLezF2H5Zv81lTUbsR8 zodqb5Q+P5MRdhkvPFO7wj0pgJ7myugidNoVW1PmEY231TknQXdb3UM6N5QQFLUQqJU3 /SRuzb8D9Mp65Z7P5CvfwKZQfNzRzDZJDfBEgsBi7UmNbVztgh5STah//URzNcTfh/gp /ZGd/GFxFuYVKrnOnq7ludc6Dv5im6K79UZqpewKVbXmOjRiOrDgH2837xUCCcSU4QWt XJ3uDpwyyRQJqkLT/1yL5RVFdtpQk6yceX2G0I6bEWT+dsaw0qtZolgQetOA3DGFdZ6t /MVQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1761574562; x=1762179362; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=8vT2TTLpjnE3LuM9czMgLMTrFgZDcCycPUN73j8om70=; b=fRU/D2JO8ieFHupweSGvbNbBYMrl+D8hC6Rk2j/cYzIgZk1yn2ld2NaPnzj3uc/Y5w 9TNE2AZi6P1L5X1Acm07hc4lthbd6tP6Xcj5nRGXl9bk45SuXxkauxHdgrS99pxWrNAR Rjj/SFVdg2PD1nT1YaJeYW7SeGYZZHtzemNgznvNDlTZ813dPhkwjmOi+rCa3NfwUxb5 oWQo4EJcRH7uu1NIQ6G+cKimn6aM85epgKISF0eV5vQfGqqfXA0oJta9BQ2Utnbhxsyd aORjoajc2JkSvXynV52Jpqvp8sTBTA9hAPCzNGMmtxOaVhKvYFoqt7fT9ApNYf+aOUR6 ZMKA== X-Gm-Message-State: AOJu0YwKTwlvZ0xLGUZBUUkDBbHB7iLSj4KWrCnNEhMHfa1lh/T7x1UM DGSy9oOqElsXeQ7suESisPsS/iwo42REGgw4hYra+AvLXWRrwJoS3HfAKR8WaA== X-Gm-Gg: ASbGnctLM/xuhrNuGhtk3wOC9uCE9xSMjdXLmeUss8uh2jdTwthCrXA9zhIfAtUss8R kJ5KmshIpxKOQZBrv1Qvkk5cM1hQcJxd1WTSUsqPITnfISn46l3jywl4Ep0VNw1Ktl8bA77OYHT ayo3/9MUOq6RWKtrLQImkRZZVpV3LbuEa2ZBHSiXb9ADpb/YEdkH9pECbnsynfpwlEZripldGRq HvPXIUgGsfTgPCtDJ1nOmfRNzjEWIY43zdih4jqR5yTQUf+1dR9d+gClPDM7maldn7Mw4EHYYIi yaJo64fIe/W8IQUBVm8y57KXSM7ByHSvwC4L65vWgpczoBlqkoynnzLNl0bC1JyNEPgWQu4tFnK W2LYB2M8kergu8d8JgzxicNvouhu3sJTs5guPOBAjTuR9fVBqPB8/Cnf8mZE4Fr2dtqXqs+PHQd T4R/42pdJi X-Google-Smtp-Source: AGHT+IEwIHgMZJxACAWFJVo992UCzm/DUL6gVuvv3LcuUZ3BhHA4WMgPqi5RuV5ti+3glFuRgZ5Xvw== X-Received: by 2002:a05:600c:870e:b0:46e:37a7:48d1 with SMTP id 5b1f17b1804b1-4711791f94dmr359130835e9.34.1761574560855; Mon, 27 Oct 2025 07:16:00 -0700 (PDT) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-429952db80fsm14164067f8f.31.2025.10.27.07.16.00 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Oct 2025 07:16:00 -0700 (PDT) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-initramfs][kirkstone][PATCH 03/10] klibc: patch CVE-2021-31872 Date: Mon, 27 Oct 2025 15:15:50 +0100 Message-ID: <20251027141557.1893563-3-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251027141557.1893563-1-skandigraun@gmail.com> References: <20251027141557.1893563-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 27 Oct 2025 14:16:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121043 Details: https://nvd.nist.gov/vuln/detail/CVE-2021-31872 Pick the patch mentioned by the nvd report. Signed-off-by: Gyorgy Sarvari --- .../klibc/files/CVE-2021-31872.patch | 70 +++++++++++++++++++ .../recipes-devtools/klibc/klibc.inc | 1 + 2 files changed, 71 insertions(+) create mode 100644 meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31872.patch diff --git a/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31872.patch b/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31872.patch new file mode 100644 index 0000000000..dd9a0f2fcf --- /dev/null +++ b/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31872.patch @@ -0,0 +1,70 @@ +From 5e8b9d0c9cef6194b3588b12f04afd617de3587d Mon Sep 17 00:00:00 2001 +From: Ben Hutchings +Date: Wed, 28 Apr 2021 05:16:34 +0200 +Subject: [PATCH] cpio: Fix possible integer overflow on 32-bit systems + +The maximum name and file sizes in the "new" header format are 32-bit +unsigned values. However, the I/O functions mostly use long for sizes +and offsets, so that sizes >= 2^31 are handled wrongly on 32-bit +systems. + +The current GNU cpio code doesn't seem to have this problem, but the +divergence between this version and that is large enough that I can't +simply cherry-pick a fix for it. + +As a short-term fix, in read_in_new_ascii(), fail if c_namesize or +c_filesize is > LONG_MAX. + +CVE-2021-31872 + +CVE: CVE-2021-31872 +Upstream-Status: Backport [https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=9b1c91577aef7f2e72c3aa11a27749160bd278ff] + +Signed-off-by: Ben Hutchings +--- + usr/utils/cpio.c | 18 ++++++++++++++++++ + 1 file changed, 18 insertions(+) + +diff --git a/usr/utils/cpio.c b/usr/utils/cpio.c +index a13c876..9b0b6ae 100644 +--- a/usr/utils/cpio.c ++++ b/usr/utils/cpio.c +@@ -17,6 +17,7 @@ + + #include + #include ++#include + #include + #include + #include +@@ -904,6 +905,15 @@ static void read_in_new_ascii(struct new_cpio_header *file_hdr, int in_des) + file_hdr->c_hdr[i] = strtoul(hexbuf, NULL, 16); + ah += 8; + } ++ ++ /* Sizes > LONG_MAX can currently result in integer overflow ++ in various places. Fail if name is too large. */ ++ if (file_hdr->c_namesize > LONG_MAX) { ++ fprintf(stderr, "%s: name size out of range\n", ++ progname); ++ exit(1); ++ } ++ + /* Read file name from input. */ + free(file_hdr->c_name); + file_hdr->c_name = (char *)xmalloc(file_hdr->c_namesize); +@@ -914,6 +924,14 @@ static void read_in_new_ascii(struct new_cpio_header *file_hdr, int in_des) + is rounded up to the next long-word, so we might need to drop + 1-3 bytes. */ + tape_skip_padding(in_des, file_hdr->c_namesize + 110); ++ ++ /* Fail if file is too large. We could check this earlier ++ but it's helpful to report the name. */ ++ if (file_hdr->c_filesize > LONG_MAX) { ++ fprintf(stderr, "%s: %s: file size out of range\n", ++ progname, file_hdr->c_name); ++ exit(1); ++ } + } + + /* Return 16-bit integer I with the bytes swapped. */ diff --git a/meta-initramfs/recipes-devtools/klibc/klibc.inc b/meta-initramfs/recipes-devtools/klibc/klibc.inc index ccf4a56953..87ca00b857 100644 --- a/meta-initramfs/recipes-devtools/klibc/klibc.inc +++ b/meta-initramfs/recipes-devtools/klibc/klibc.inc @@ -23,6 +23,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/libs/klibc/2.0/klibc-${PV}.tar.xz \ file://0001-workaround-for-overlapping-sections-in-binary.patch \ file://CVE-2021-31870.patch \ file://CVE-2021-31871.patch \ + file://CVE-2021-31872.patch \ " ARMPATCHES ?= "" From patchwork Mon Oct 27 14:15:51 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 73091 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8AA3ECCF9EC for ; Mon, 27 Oct 2025 14:16:05 +0000 (UTC) Received: from mail-wr1-f52.google.com (mail-wr1-f52.google.com [209.85.221.52]) by mx.groups.io with SMTP id smtpd.web11.33908.1761574564805408676 for ; Mon, 27 Oct 2025 07:16:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=bT61dUId; spf=pass (domain: gmail.com, ip: 209.85.221.52, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f52.google.com with SMTP id ffacd0b85a97d-429a0d1c31aso632102f8f.1 for ; Mon, 27 Oct 2025 07:16:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1761574563; x=1762179363; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Uv/qhVUVz8UNDk7JJ966hZOYvR25y446bd1AgmDQDtM=; b=bT61dUIdz/jS0ArgcHNtNHWeSDnTb/a5XuivNtO/P6fsRIxJ4P8UybucxI/GB8o59g cX4tptUja1wpYwN207u2DTVADT+AtDh8LN2xmMTfxKAHUQD1ErvEMr0u8gAD7jEfBo7S M9L8EIwzy7r+BFSdmyVW/Tar9IFQzc5qWVoI9N0OGIoZ/BcVp+qSRz3Z8UeYvdpyVwFE XOlgHyQVwcEEv/AFezQpkmJF2rHt+nAhE0udoH6A1/SUZOIJczPxaFXb+DY0OZqSNG6A T9U4C6RGmRQmSkGgzdCMaRmoeBJrs97JMWt/VpNAoPyhBgXc3+R00/fjybrxPYl4TLvN +kKw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1761574563; x=1762179363; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Uv/qhVUVz8UNDk7JJ966hZOYvR25y446bd1AgmDQDtM=; b=YNe2DnKAX0uXMqaRg/dpdnC46FUEUWaIKEXV40jvhyRY7AakcshuNSQaU88KoDPklh iH03NrZTC4V7JHpZQcv1fZ/BjNGqw7/p6XdibP7mlO69zVY2WZci79ob+Vrg8q+dWors aYwYsmth+embZvDQSijLHulPWDBprRByif9y3M0tEFc86TmWFQKpYCVPi2x4jBegU7tt eDkavunSTgoB2qsAWKS8ojRhmLkPr4Lrm9i7Gt++XbhsbpwsIAh7bJklNefSwCYpormi 85xFSLQwx3gCtsqjJN8cHfPgtsIQp8yMaOWrxhhUcieousLDF7fEt8GOpXSr0guue291 DK7w== X-Gm-Message-State: AOJu0YzzPE+5BtucBiwMYH/7HDA99pcv/Zz06u+jkXsPy4ua6iatwsqo viruJon6MOM9AOx21d/5LE6GCCFzjvSmT6u56hTaDXtiRSRk5/lorfLYaao1Eg== X-Gm-Gg: ASbGncuc18FUsldwzor5T6iZkwQUaS88pf9A9qrgqhLdWLWSmqd2bFTTSQzHicgGNwP nf2ZBvEHahxiOt29IgaXqDKlY3kq92QoUWbhtlUPIbCaNfzARGFj3MYY9VNLcJQht5qRfbyHXKq hpxq5b2MenzIE718GyAxZQYHzloYkUy/ceJC5ihSlB0umr9sfs4RFRffGe9XdVzYxIk1oxxwvGt 3rh77dI7JsCwAEwhrXL0lPGqm9EhKzkMsakjmF5R1eonEQA0CFP0WKGH0U7+j6wVOGi65ZSpdyk qwTOHvxW3n9Q2GAinREv3ijIdMnJlX/0aMxomVimQYHrS9rnKrwN1bpvLAHfEWM2Kno08sO1+3f h3e9ahdv+NXjz4fLUd+MK/+pBC1qNP819sqkX2SQSJvMELs/+HSHm7OKoe84s0CZ5+PlQ81Hf/A KXUESiAVoJ X-Google-Smtp-Source: AGHT+IGjez9o3u/P3u+lEb/0us5aZeN8xxiIhwa5PsJQ2kHPbRwrvtLLNN4oFVaXCM2GpYwTU5s+xg== X-Received: by 2002:a05:6000:4014:b0:428:3d14:7378 with SMTP id ffacd0b85a97d-4298f594837mr9257734f8f.24.1761574562960; Mon, 27 Oct 2025 07:16:02 -0700 (PDT) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-429952db80fsm14164067f8f.31.2025.10.27.07.16.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Oct 2025 07:16:02 -0700 (PDT) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-initramfs][kirkstone][PATCH 04/10] klibc: patch CVE-2021-31873 Date: Mon, 27 Oct 2025 15:15:51 +0100 Message-ID: <20251027141557.1893563-4-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251027141557.1893563-1-skandigraun@gmail.com> References: <20251027141557.1893563-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 27 Oct 2025 14:16:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121044 Details: https://nvd.nist.gov/vuln/detail/CVE-2021-31873 Pick the patch mentioned by the nvd report. Signed-off-by: Gyorgy Sarvari --- .../klibc/files/CVE-2021-31873.patch | 43 +++++++++++++++++++ .../recipes-devtools/klibc/klibc.inc | 1 + 2 files changed, 44 insertions(+) create mode 100644 meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31873.patch diff --git a/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31873.patch b/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31873.patch new file mode 100644 index 0000000000..4dcad20000 --- /dev/null +++ b/meta-initramfs/recipes-devtools/klibc/files/CVE-2021-31873.patch @@ -0,0 +1,43 @@ +From 34f6170eca948ad221effc79db1f38c51e20329f Mon Sep 17 00:00:00 2001 +From: Ben Hutchings +Date: Wed, 28 Apr 2021 04:03:49 +0200 +Subject: [PATCH] malloc: Fail if requested size > PTRDIFF_MAX + +malloc() adds some overhead to the requested size, which may result in +an integer overflow and subsequent buffer overflow if it is close to +SIZE_MAX. It should fail if size is large enough for this to happen. + +Further, it's not legal for a C object to be larger than +PTRDIFF_MAX (half of SIZE_MAX) as pointer arithmetic within it could +overflow. So return failure immediately if size is greater than that. + +CVE-2021-31873 + +CVE: CVE-2021-31873 +Upstream-Status: Backport [https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=a31ae8c508fc8d1bca4f57e9f9f88127572d5202] + +Signed-off-by: Ben Hutchings +--- + usr/klibc/malloc.c | 9 +++++++++ + 1 file changed, 9 insertions(+) + +diff --git a/usr/klibc/malloc.c b/usr/klibc/malloc.c +index 413b733..14bfa63 100644 +--- a/usr/klibc/malloc.c ++++ b/usr/klibc/malloc.c +@@ -146,6 +146,15 @@ void *malloc(size_t size) + if (size == 0) + return NULL; + ++ /* Various additions below will overflow if size is close to ++ SIZE_MAX. Further, it's not legal for a C object to be ++ larger than PTRDIFF_MAX (half of SIZE_MAX) as pointer ++ arithmetic within it could overflow. */ ++ if (size > PTRDIFF_MAX) { ++ errno = ENOMEM; ++ return NULL; ++ } ++ + /* Add the obligatory arena header, and round up */ + size = (size + 2 * sizeof(struct arena_header) - 1) & ARENA_SIZE_MASK; + diff --git a/meta-initramfs/recipes-devtools/klibc/klibc.inc b/meta-initramfs/recipes-devtools/klibc/klibc.inc index 87ca00b857..8c2f1b8d62 100644 --- a/meta-initramfs/recipes-devtools/klibc/klibc.inc +++ b/meta-initramfs/recipes-devtools/klibc/klibc.inc @@ -24,6 +24,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/libs/klibc/2.0/klibc-${PV}.tar.xz \ file://CVE-2021-31870.patch \ file://CVE-2021-31871.patch \ file://CVE-2021-31872.patch \ + file://CVE-2021-31873.patch \ " ARMPATCHES ?= "" From patchwork Mon Oct 27 14:15:52 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 73094 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9EB00CCF9EC for ; Mon, 27 Oct 2025 14:16:15 +0000 (UTC) Received: from mail-wr1-f49.google.com (mail-wr1-f49.google.com [209.85.221.49]) by mx.groups.io with SMTP id smtpd.web11.33909.1761574566354639043 for ; Mon, 27 Oct 2025 07:16:06 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=BVUUXlUB; spf=pass (domain: gmail.com, ip: 209.85.221.49, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f49.google.com with SMTP id ffacd0b85a97d-42420c7de22so2370275f8f.1 for ; Mon, 27 Oct 2025 07:16:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1761574564; x=1762179364; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=G+Rg0txVYKuHnBj2xyPjzFn/J/2+oLsFdXyCaeknPJY=; b=BVUUXlUBtAL0myl6Mr8//H174Pf3YU911KkSn8QzgGB1FKEpNTMKaFWGFJAF8QuUM3 DUrUIhW3C9P46EVD2bm1yadQh5kXB94ybFzDa+8HpHWGcT7ebTqCZOnZ8lndCVdfV7qw y2oV3ggyyXVRNLqEK4SWXriLLfl/E3nmcamyBrUqz9LppNPYwzzkXB8RXtFFHlSAVcaX NUn38YetgNahTxR4C7yOM53AMd43N4IEewB0sez3d1rx7u7FsoPrBvA+P1PpoTmo2vSr 6rigMGVq7M8wFRjKpRZkQZbG9NEKWRpaRn7SlSzgflxnTB6RMMJq/5Z7MCXx9PFmMT97 GoyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1761574564; x=1762179364; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=G+Rg0txVYKuHnBj2xyPjzFn/J/2+oLsFdXyCaeknPJY=; b=ScmN1NnoDmacRmWu1y45d8yOvW1WfXzywQ0fkRYhvb+0vQxwBuZ/SNusTnViIFrr1U mNlVgPrD9H5LVLvNIiV9ylt+9DGJPMyZi86yNXnXOhQkf9L0qwzD5QM+G5dG4GurEpxa kiAMsjCrByuhhw29rfdiTG0uOBhlZAOfYO+91U+/wQZhMr7F94l9+QXuAcwcw6rbOUMN OPWw7XITuxrwihrcH0ICHqLT2tl2VpLrXlodC1/phgcQNqqc4n3LQjRmYDQw3moIjJdL y75/IVBDs0C2H5nLkexGOu82kAuoPFgZ3jlJwcyr95ZC8731XC4QIGOeOMPUe4fgkLPP 1XeA== X-Gm-Message-State: AOJu0YyOTZOQ9tvBHwvg+9ot6th+cpzXkgDEMnmUEuiW/6W0GUEUwP6y znD0tYK5ksKV3FTXDVVwEbb14go8yEAObxkCwbFSEyehpZM61N2ykGTEuucOzQ== X-Gm-Gg: ASbGnctw+nyx5D6S6ItmG25IWy9RMtQfMBTtY6LD+7JAuUUkost4CpCOAqTG2KatZRR LHImuypfAEwANOc/kExZ8vwr9TXJ1gXZY1sNfsjDHSbY2jPdf1gndaTgQP7/iN/8/SR8zCmWvk8 umH+tu4QRrucj3TWbpDciG08SHN9amyQUgrE2Bx/piX668cQr3tAbww9ilMJzgUkVI+fehsmx6K Jz1LRhuhFy/GJJ6A8nBnMuMc0AjYT4/JUvV4Ey1FMV7PPM1+kRvoB5jQnAZ4LrhzYjOsLXK+oGr WPxu8bzf+3bcMznglgBDwF2ZrIlbF3LuuMmqgIVqV8c3PO2iscu1LZtpeIPRvJszzPTNrbknYVG HtEQQGGVQpmT/3jG/5CLZw3t8wBm7w4bzebTZq4HCwueKHsAYPIMmtzRzGsMYfUsAZiCkGfKplA == X-Google-Smtp-Source: AGHT+IF02rYEbgI+lSHKYWZDENlDSRwy8l2gvFVoMSLtGYuqTT+1ORYrmhztNFReqx+JKq8p81/0pA== X-Received: by 2002:adf:e18d:0:b0:427:6c6:4e31 with SMTP id ffacd0b85a97d-42706c64e42mr30324263f8f.22.1761574564457; Mon, 27 Oct 2025 07:16:04 -0700 (PDT) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-429952db80fsm14164067f8f.31.2025.10.27.07.16.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Oct 2025 07:16:03 -0700 (PDT) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-gnome][kirkstone][PATCH 05/10] evince: Update status for CVE-2011-0433 and CVE-2011-5244 Date: Mon, 27 Oct 2025 15:15:52 +0100 Message-ID: <20251027141557.1893563-5-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251027141557.1893563-1-skandigraun@gmail.com> References: <20251027141557.1893563-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 27 Oct 2025 14:16:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121045 From: Alexandre Truong The current version 46.0 is not affected by the issues. Both issues have been fixed in commit [0]. The fix is in effect since early versions of evince (3.1.2). Thus, both can be safely ignored. [0]: https://gitlab.gnome.org/GNOME/evince/-/commit/efadec4ffcdde3373f6f4ca0eaac98dc963c4fd5 Signed-off-by: Alexandre Truong Reviewed-by: Yoann Congal Signed-off-by: Khem Raj (cherry picked from commit 492b1b1adc1c546efd10b659d220a810736cc04a) Reworked for Kirkstone (CVE_STATUS -> CVE_CHECK_IGNORE) Signed-off-by: Gyorgy Sarvari --- meta-gnome/recipes-gnome/evince/evince_42.3.bb | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/meta-gnome/recipes-gnome/evince/evince_42.3.bb b/meta-gnome/recipes-gnome/evince/evince_42.3.bb index 5f35d5b33b..7b6170a2f8 100644 --- a/meta-gnome/recipes-gnome/evince/evince_42.3.bb +++ b/meta-gnome/recipes-gnome/evince/evince_42.3.bb @@ -51,3 +51,7 @@ FILES:${PN} += "${datadir}/dbus-1 \ ${datadir}/thumbnailers \ " FILES:${PN}-nautilus-extension = "${libdir}/nautilus/*/*so" + +CVE_PRODUCT = "evince" +# fixed-version: No action required. The current version (42.3) is not affected by the CVE which has been patched since version 3.1.2 +CVE_CHECK_IGNORE += "CVE-2021-0433 CVE-2011-5244" From patchwork Mon Oct 27 14:15:53 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 73098 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BBEB5CCF9F1 for ; Mon, 27 Oct 2025 14:16:15 +0000 (UTC) Received: from mail-wr1-f54.google.com (mail-wr1-f54.google.com [209.85.221.54]) by mx.groups.io with SMTP id smtpd.web11.33910.1761574567717422293 for ; Mon, 27 Oct 2025 07:16:08 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=EAxQwodq; spf=pass (domain: gmail.com, ip: 209.85.221.54, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f54.google.com with SMTP id ffacd0b85a97d-42701b29a7eso2459486f8f.0 for ; Mon, 27 Oct 2025 07:16:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1761574566; x=1762179366; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=/JWwN/PtZkYrFMcKrsHSmwkboTe/MpyZvskWm2MU5cA=; b=EAxQwodqwoV2OVD2BIIBJjCv3HDHYGKt5RGDjZeT5UJe48PjcPnO3tnQV0t7cNv0uq 6eH1yTBnOTMlmZAcbGfCR03GXf67aIKQKs1FF9StDadAjtOvQ69mkfYQ2KSdrJ5QIKfx INtXzlD/7Wa71aJFVJVHoa3luoMYBJ9eXAKRSYc0tEcL2uoJ7xrATXaNFhjt7dqb9Qvh Htu8ByXmez5w6nl5OPQUfQ6Jwt9mjuJLQnJayb9rqlWEerLrN8wkWuLe7OBV9L7MvPut FspaS8py9caI6h5G8W8Zv3+QzcJz7oGADvMTaSyqqSy7eAf12MQobqXgxFgHV9yRnqR8 FcvQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1761574566; x=1762179366; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=/JWwN/PtZkYrFMcKrsHSmwkboTe/MpyZvskWm2MU5cA=; b=L8MqY9AQXXBgJWbU6SNbfW+KqlV1i+b56mUJxmlfzid8o8cVoNqUUrffI1MNOj3yeF O3LMvoJxFD1X5tVw9p1s7WCwJ1NyZd9SP5b5O8BLuWYSSWxW2olkqMskEbqFD9W9ABao kXdGw9BmMYt1pGieVjBr0vo6DvCIEcUbBNrKIQ1RSc10uC+65h4nbv/o/FRjessA93zy jTsZlY/rsOSa3JOlebzBYxEGB3lBqSqWC1p5XY8I2D7W7j0DKNSvbA7U/Uji/4GBV/OB B+3S6p8DsqPIDtEKUXu0CUz7vW2s3StwaeOi1LfMueILV/7juGCddvdnce297sQdRaOW jTrg== X-Gm-Message-State: AOJu0Yw3o8Pinc0ublLI3rZv9txYvEsP9e30MjAP+RSHSz/CBDyryMy8 wMsWDhBIOZEFnPOUlKADTJslesYL1rqLUbbmFUOYNnHeTlICKj+mDrxrk5zVLA== X-Gm-Gg: ASbGncvvJYv8roonAPAkwOh/IwdzcuE2HRZjtYhv8RuhcQf22816Pn4dKkxfTS78KZi YpXu/wRUaQuX12PPZqc6SugtgqftB4/Iya4i8NjHln/hfayx3bcW8Ldep/41g2v7qF5sXS9NAi9 /0gG8x/axjddkablg91gjYNJNAvAi8hemQGdLIPHPciPOvsKc++7piQoBswkMNrbn7QlMMCXAbu Ld442Io91S9W1CTO/tKQ6tPca3xipHNSdyiRur+cs6ZU9zLQ4ek3aOLNObfOcvQVSPlGEJo59wV XLmCoRclT2XlB0ol7hBKEnP9HI36m+C9at1bxUzQdeuA7Q2MZsFM33h/UjK8NlTysQRhkRYn8n8 O39Tw7wp1Cn+1fF5kPDw0W8uz8uXiGM3W/Lp0DkYTzERtqnlbcvvuMVXvO+ZdPTubx8Ge0JhIig == X-Google-Smtp-Source: AGHT+IG9WPgFI1MPtLzFbHlJXQuElnj/R0JxDKig2I/eVhMjKPba/qcWrrnzG1kg2i+nEJ2BZwX75A== X-Received: by 2002:a05:6000:2209:b0:427:67b:b385 with SMTP id ffacd0b85a97d-4298f5284e0mr10243462f8f.11.1761574565948; Mon, 27 Oct 2025 07:16:05 -0700 (PDT) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-429952db80fsm14164067f8f.31.2025.10.27.07.16.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Oct 2025 07:16:04 -0700 (PDT) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][kirkstone][PATCH 06/10] gattlib: ignore CVE-2019-6498 Date: Mon, 27 Oct 2025 15:15:53 +0100 Message-ID: <20251027141557.1893563-6-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251027141557.1893563-1-skandigraun@gmail.com> References: <20251027141557.1893563-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 27 Oct 2025 14:16:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121046 Details: https://nvd.nist.gov/vuln/detail/CVE-2019-6498 The used revision already contains the fix. Signed-off-by: Gyorgy Sarvari --- meta-oe/recipes-connectivity/gattlib/gattlib_git.bb | 3 +++ 1 file changed, 3 insertions(+) diff --git a/meta-oe/recipes-connectivity/gattlib/gattlib_git.bb b/meta-oe/recipes-connectivity/gattlib/gattlib_git.bb index 1ba7dd4afc..c6fbf77ca7 100644 --- a/meta-oe/recipes-connectivity/gattlib/gattlib_git.bb +++ b/meta-oe/recipes-connectivity/gattlib/gattlib_git.bb @@ -30,3 +30,6 @@ inherit pkgconfig cmake FILES:${PN} = "${libdir}/*" FILES:${PN}-dev = "${includedir}/* ${libdir}/pkgconfig" + +# The used revision contains the fix +CVE_CHECK_IGNORE += "CVE-2019-6498" From patchwork Mon Oct 27 14:15:54 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 73096 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AFF95CCF9F0 for ; Mon, 27 Oct 2025 14:16:15 +0000 (UTC) Received: from mail-wr1-f41.google.com (mail-wr1-f41.google.com [209.85.221.41]) by mx.groups.io with SMTP id smtpd.web11.33912.1761574569000684282 for ; Mon, 27 Oct 2025 07:16:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=ixtNHRsr; spf=pass (domain: gmail.com, ip: 209.85.221.41, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f41.google.com with SMTP id ffacd0b85a97d-421851bca51so4387458f8f.1 for ; Mon, 27 Oct 2025 07:16:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1761574567; x=1762179367; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=qUAo/0N4sxiXoDVkg9Jj5r0MJYU7Sz/KxCvtdi5Rg2o=; b=ixtNHRsraS1LVzSk9/NE5aUDK2W26K8qGYdZnhe0Zhfx9FrwEbGkl9KwjoMSWpG9Ch CErgNJriYaDK1h7JwhCoiRcx/RE9yjywLD7tUTwLuEHSpM/qYjOSTIsUp8+CQc7jcNyE 49fvkW3x9HKJ82rVv++319nHyk+7mlqljmXkPpMnHJOeRA0/KVq2+uJyZ4MdAmmZEbmd AKEKXWGV3/lwPWbVr8wGs5dqPBBCwIhBUhZhM4XOxw3s6TG1BmE0oKureAotjOcYb7A7 ZIlrt8r9o/TePQcuMPFfbDyr1qyeBad8OAEcSmu8NolJAiKLrizvB5ny/dnQx5K1yWTu o4bA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1761574567; x=1762179367; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=qUAo/0N4sxiXoDVkg9Jj5r0MJYU7Sz/KxCvtdi5Rg2o=; b=m9sYW2tlbnHRTerzY0uY52jcjoa4fvMBJ1l5SP6XEJH8phTgh8+OxBcL/sJvOu3BBZ U4KXB5/nXytSj8CZ3Cd/PMqgaiUwefZ2XB+WSBJr04dYR4Rkluvt5P4HgLlXVZkCPDTv WuI+IJCl5j9lqZixYdrbHHF2606e3o/LWayISxh3Pzg9EfhvC9GZlxnjIzthYDkvrrMy J0QSrAsSG4+ly95B578B2ywIx6CoVF//QV2z597SVqcHmx52XDyqImVqMvgNtBeg8f0x q8qf8KPFs0rySJt1VdfvHQAlYPM8V0AUQlW6mF3bdp82bgbBqw1yl+zrf8i0X3sNcVhx l6nw== X-Gm-Message-State: AOJu0Yw+U+wriNOQ2CAYoZDEUY+9TzQYdPs1QWVPH0YEQM09kCTejpEU WKF4nhgQW6SoCF4TI/JZXYpIJccyQBsuOPooT/cikAKFwhzG5f0Ji3+vh5yaZA== X-Gm-Gg: ASbGncsy8LGaCDzDo7bwnt9Mnvxscq8pr5nb0p7Uvh6FnqZnzq6fki9H/fvqgCBjw7N la79HljLfIiZ6dK2J8qNpH86YPTufRvaITFyVl96GobqBn8zAzRewyB0CldMq1DYrFxIfXt1tBL XgJEAO/C/+SPALUh8IIdNOLoVFidX2DjrNtFSh0VCKP17TUufJ2xHAkg+mIqjgoK13MmdBgvXlx 70i/ojiZpPfBeVDIfFl0waG1CjI+eXkR8sX/AgePEHNbrqWTuNqJ2qP0H7FwrFjF/QT4fu+T3ml GXl3hXVJYBglp6kunb2eADW9JjTUiiWfG/EoJwGahJ8rUNEbhlkvga4njrwHnDPRXiq5Y+cPUQM eTLvAj/zpkYAPtucZ4ShB3pn31+A6Bk41PtE9w7anA+5RponN3R1fxXmoTfhH5FxO/8E6xXSYtg == X-Google-Smtp-Source: AGHT+IG+8PwOWvclU25hsRKTC6YhGRnrDCXwByhsbCqVkqO6j5uXOMH8lFNANNkJrktZ/C3kbEezYQ== X-Received: by 2002:a05:6000:220c:b0:3ec:ce37:3a6d with SMTP id ffacd0b85a97d-42990755939mr9892546f8f.47.1761574567153; Mon, 27 Oct 2025 07:16:07 -0700 (PDT) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-429952db80fsm14164067f8f.31.2025.10.27.07.16.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Oct 2025 07:16:06 -0700 (PDT) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][kirkstone][PATCH 07/10] id3lib: mark CVE-2007-4460 as fixed Date: Mon, 27 Oct 2025 15:15:54 +0100 Message-ID: <20251027141557.1893563-7-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251027141557.1893563-1-skandigraun@gmail.com> References: <20251027141557.1893563-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 27 Oct 2025 14:16:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121047 From: Peter Marko This is fixed in id3lib3.8.3_3.8.3-16.2.debian.tar.xz patch included in SRC_URI. Version 3.8.3-7 contains patch for this CVE, we use 3.8.3-16.2. This can be verified by checking the debian/changelog within this patch or diffing [1] and [2] and verifying that this can be reverse-applied. [1] https://snapshot.debian.org/archive/debian/20070819T000000Z/pool/main/i/id3lib3.8.3/id3lib3.8.3_3.8.3-6.diff.gz [2] https://snapshot.debian.org/archive/debian/20070819T000000Z/pool/main/i/id3lib3.8.3/id3lib3.8.3_3.8.3-7.diff.gz Signed-off-by: Peter Marko Signed-off-by: Khem Raj (cherry picked from commit 9fff0040f1694b09c6c68cf59615f42d801d62f5) Adapted to Kirkstone (CVE_STATUS -> CVE_CHECK_IGNORE) Signed-off-by: Gyorgy Sarvari --- meta-oe/recipes-multimedia/id3lib/id3lib_3.8.3.bb | 3 +++ 1 file changed, 3 insertions(+) diff --git a/meta-oe/recipes-multimedia/id3lib/id3lib_3.8.3.bb b/meta-oe/recipes-multimedia/id3lib/id3lib_3.8.3.bb index a7d645f59f..20a03bdbe0 100644 --- a/meta-oe/recipes-multimedia/id3lib/id3lib_3.8.3.bb +++ b/meta-oe/recipes-multimedia/id3lib/id3lib_3.8.3.bb @@ -15,6 +15,9 @@ SRC_URI[archive.sha256sum] = "2749cc3c0cd7280b299518b1ddf5a5bcfe2d1100614519b687 SRC_URI[patch.md5sum] = "997c764d3be11c9a51779d93facf1118" SRC_URI[patch.sha256sum] = "ac2ee23ec89ba2af51d2c6dd5b1b6bf9f8a9f813de251bc182941439a4053176" +#patched: fix is included in debian patch +CVE_CHECK_IGNORE += "CVE-2007-4460" + inherit autotools # Unlike other Debian packages, id3lib*.diff.gz contains another series of From patchwork Mon Oct 27 14:15:55 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 73097 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AFE56CCF9EE for ; Mon, 27 Oct 2025 14:16:15 +0000 (UTC) Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) by mx.groups.io with SMTP id smtpd.web10.34156.1761574569941264439 for ; Mon, 27 Oct 2025 07:16:10 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=V3b/CY8M; spf=pass (domain: gmail.com, ip: 209.85.221.46, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f46.google.com with SMTP id ffacd0b85a97d-3f0ae439bc3so3050332f8f.1 for ; Mon, 27 Oct 2025 07:16:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1761574568; x=1762179368; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=qfmdsQ5iLmRBYkbqTooOsGKdXUKlvSnZQZYSXclhExM=; b=V3b/CY8Mvq4nWMNr3CG5PuDVHtrwH09L3QqJPcWiD12HFGgWl/elOIH7Q4DvhdQoXA pzFZcoP2fveF4gJ0nInxVVrC1FP5NK5FLkr80BRge1KRI2yxUQRuiNDqn6Lz78PP9KAB 9QEUq54RxaKoe4Er4Mnzs0MIDGXKTPxvrlFjmVIH2dJ87uJ4SA3PwScEOSLdf3W4JJq+ FD0X7xU7ypNrnRSbsgrXlYqw1lsH2KwebXuAwpRSjnw2VTKQcZnEQ2e6EWxA03GfJYgO b3mj79pi+atTMp5qMRtnH9T34CqLqyubTICIyqTu1azWWDcJs5nbvZ69DkiMGvESAo6l dPJQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1761574568; x=1762179368; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=qfmdsQ5iLmRBYkbqTooOsGKdXUKlvSnZQZYSXclhExM=; b=v/rlpjaxaWt3AiLz4NGOMhs/4AyqHUgdb1RtEG/7l/lc58lQR36gv+vNKsbfisulC3 XZ1fdRJpTcAdkENJvqnmXt3MNUt9dtzMals3aoJhv5KTuRgyL+GfXmOK+tS8FJf1HJc+ nzXJahM5qm6YbIvlzZDFqqlzg56aRZiMnJKuknwRODTOKvb2gtZZZhyzmet+HlCjsf6r 3kSM522RKfRTl9CSgJkb74czWgf/RIhvfVxZjYC84VZuWPp8kjP0m5sC7/JVOBK5Hlf+ Ed7g0aDhG7bCSISfoZzRjjnoZ4TatQ8jDJ6gAOG0z/MCMw4hR1M0Fu7rvWwd3GvG9LwF A+Fg== X-Gm-Message-State: AOJu0Yx2g3RS3THi7Hjdi8fGGHCBmLdSH/g/hei71yfa1MFJ7exIga26 7/PJ4A8NC8A1OZO4DvEXDP4QaMsAyushbhW5s4eGpFAtXIwVDH64xMDx3G69Kg== X-Gm-Gg: ASbGnct7/HmSbbpn0b0T+wUYZJk9Dm7VQXhnSU+QaIXaWhNBaCH4gu4X27x7kba3Cyb PMdyAsp+qrpoOAqwOckAAvk6f5qSQPTXpNnzMK97lkGr5dvcfY2DPDn7PLjJTw8+Lb0xQWw9GsG dJ1RGDangIfegymaC1GZBW9PxpOyGJnDQjn/jOUJT0f0eFSNyhfnsZfmODqehMet//tEQ8EQUaL O89CTKMV+eVsDmhQMhITSZ9xXeB9abm1QoNZ+aKAF4JJyDjtoOLIIDDCCt/JgPQpyzrrCAEC7Yk uqdHU38NQTiDrB56xILelgLnpcd6Ilo3kIbQy0RzE1c7vQwoZUEW5yba7t8nM2hC+K+12pfKTe0 mSEwc6TY/lYK1AjtwR5gV08sFy/B1aS8V1e1IHXGPqiOSYBOzuC9vDfXHKp/fWWF9Nz2IgXlawX lrYbL0XGOz X-Google-Smtp-Source: AGHT+IFEJZgTM2gIlBiaMOSyNF9RdHd2yGfhe7kFRmMMxi2BL4dfB1pf4yjePhdhe03dA1omS95slA== X-Received: by 2002:a05:6000:26cf:b0:3ea:e0fd:290a with SMTP id ffacd0b85a97d-42990701991mr8130349f8f.12.1761574568208; Mon, 27 Oct 2025 07:16:08 -0700 (PDT) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-429952db80fsm14164067f8f.31.2025.10.27.07.16.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Oct 2025 07:16:07 -0700 (PDT) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][kirkstone][PATCH 08/10] influxdb: Update CVE status for CVE-2019-10329 Date: Mon, 27 Oct 2025 15:15:55 +0100 Message-ID: <20251027141557.1893563-8-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251027141557.1893563-1-skandigraun@gmail.com> References: <20251027141557.1893563-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 27 Oct 2025 14:16:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121048 From: Ninette Adhikari The version don't match and only the Jenkins plugin is affected. Signed-off-by: Ninette Adhikari Signed-off-by: Khem Raj (cherry picked from commit 524acf0542cafed3f5e82cd94291a653f6cf86e1) Adapted to Kirkstone (CVE_STATUS -> CVE_CHECK_IGNORE)) Signed-off-by: Gyorgy Sarvari --- meta-oe/recipes-dbs/influxdb/influxdb_1.8.10.bb | 3 +++ 1 file changed, 3 insertions(+) diff --git a/meta-oe/recipes-dbs/influxdb/influxdb_1.8.10.bb b/meta-oe/recipes-dbs/influxdb/influxdb_1.8.10.bb index 50995c09b6..b5d6f16abe 100644 --- a/meta-oe/recipes-dbs/influxdb/influxdb_1.8.10.bb +++ b/meta-oe/recipes-dbs/influxdb/influxdb_1.8.10.bb @@ -68,3 +68,6 @@ INITSCRIPT_NAME = "influxdb" INITSCRIPT_PARAMS = "defaults" SYSTEMD_SERVICE:${PN} = "influxdb.service" + +#cpe-incorrect: Version does not match and only the Jenkins plugin is affected. +CVE_CHECK_IGNORE += "CVE-2019-10329" From patchwork Mon Oct 27 14:15:56 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 73099 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A2DDCCCF9EA for ; Mon, 27 Oct 2025 14:16:15 +0000 (UTC) Received: from mail-wr1-f51.google.com (mail-wr1-f51.google.com [209.85.221.51]) by mx.groups.io with SMTP id smtpd.web11.33915.1761574571114715700 for ; Mon, 27 Oct 2025 07:16:11 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=FgEZBmzu; spf=pass (domain: gmail.com, ip: 209.85.221.51, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f51.google.com with SMTP id ffacd0b85a97d-4270491e9easo3885340f8f.2 for ; Mon, 27 Oct 2025 07:16:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1761574569; x=1762179369; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=vKF1erBhVfA9h8fFJqzljTKnGGhm5I0MHdrwphWnCNE=; b=FgEZBmzu1uiS+FXY08a+bswQVUplQlwdT/Hcq1d71iHRKBg/3PC6jyuapeZdKT26eh rQJL0l5LDrnhq/TYvae1MjCDGwSF6jHtS2xsjQTK48MklEe/AUkF/XKtzLl+VHeuzJIz 3MiBSOcC8VhTCB3iKqkZ7pHk7zpGDgm+d74uxCPP3Bpz2t8+S9X/k4tLgMVKXhJyIMSP JSzX6/yBR7djIur3xj/FbnTewZJshao14oEvH+Qo6zlU7k0q/zZQmybz4L4UoIqHhF5L Hm3N3bRzKx2DJ+RPQ+EyqsQKJcfyOFzBTNFAUpPDu0FeaIADagpRJqSvDUvX8OMOnCXR R/7w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1761574569; x=1762179369; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=vKF1erBhVfA9h8fFJqzljTKnGGhm5I0MHdrwphWnCNE=; b=IffU9haq6NIN67izAJH+ewRT/EIJDaoFnrWRXdvQNTQaeV4LyiC7BsgkQmyQVNdTf4 tqCrJKqi1IjNgZN14jlnR3Nu+rXlazc47eYNsOV+648Yzj6wExnioAUKktimxm5moHRY iJDBHtSHcChLByf2US7RLD6zVh8gBRLT0yEt7i16F/LKjjZqnzWw3OYet/dzdAnVGHPz 7PAAmshcH91KIF7wFfSBbl0oGdgC5N3jFZs1/Qc4oIfZdxOOVHXOSLxAG0MhYGwaGYOB lvl4ZekWCrKRNjh/r3OEtcyQ0KDGkSkqAA6Ot/ysSf67qEv/xCeVp4BIuA1lUhEdXW+t uCuA== X-Gm-Message-State: AOJu0Yz8OOhyhAtvO9oCn8vxoKkbolRlBBU+fWokX+Jw3bZriQXA7v3l fsKE6mO24NjCjPDx77MoArPmL/V09Iyw6Gt9TU6h++dFM0pBlT9paSbOPlGYgQ== X-Gm-Gg: ASbGncteHS2GjpIqGVh6L/px8xp5nB+4IInFJ+wgTPmyoAI/bg2sJw3+GewoKl8BKGS lk+BK3Nehqte8zv5HjpxBDQI9FF0B+CuJPo+gdZdq/Lx/RNPQgwaedITOqJS2LqGL5OUPDkd5Nz RCYvGs3PplKy+uqMYtC8eAOl2hHhmoNET8zuTVLBcJdJ2DrJTMdDlJl5WAerrWDjS1MakUc++/J IN3DSCvHZv6AO9Mgg1+yYS8j8p133vGCqNTtwxSTu7TaJ1bjhJjlmkaxniLjvwv1yCRrFGVUUfU MumGAZKlE8Q6KrR6ZBypX8Eq4rJsF60StTzK+yONYLkD3nKYSa3JoxusWqtDMPdoFbjS1qm7FOy DKwBVd5MOsCo1l5V9KizQ9MYF2+RIPthk1Ob6jpxh5y/i+W3x3zhNgQJ2IVy6BO/tU/0HnHf7Rc GTi+/pNm7R X-Google-Smtp-Source: AGHT+IHfmIQEE0WxhgY9lE65OORw/A5Xgsk/qt/fdcIkdnrSpDT6RLV7m9fy8Oio+5CEcrOX1Oft7g== X-Received: by 2002:a05:6000:41f4:b0:427:614:83da with SMTP id ffacd0b85a97d-4270614850bmr25213865f8f.48.1761574569324; Mon, 27 Oct 2025 07:16:09 -0700 (PDT) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-429952db80fsm14164067f8f.31.2025.10.27.07.16.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Oct 2025 07:16:08 -0700 (PDT) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][kirkstone][PATCH 09/10] iptraf-ng: patch CVE-2024-52949 Date: Mon, 27 Oct 2025 15:15:56 +0100 Message-ID: <20251027141557.1893563-9-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251027141557.1893563-1-skandigraun@gmail.com> References: <20251027141557.1893563-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 27 Oct 2025 14:16:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121049 Details: https://nvd.nist.gov/vuln/detail/CVE-2024-52949 Pick the commit that mentions the CVE in its description. Signed-off-by: Gyorgy Sarvari --- .../iptraf/iptraf-ng/CVE-2024-52949.patch | 218 ++++++++++++++++++ .../iptraf/iptraf-ng_1.2.1.bb | 1 + 2 files changed, 219 insertions(+) create mode 100644 meta-oe/recipes-devtools/iptraf/iptraf-ng/CVE-2024-52949.patch diff --git a/meta-oe/recipes-devtools/iptraf/iptraf-ng/CVE-2024-52949.patch b/meta-oe/recipes-devtools/iptraf/iptraf-ng/CVE-2024-52949.patch new file mode 100644 index 0000000000..be6624dcdb --- /dev/null +++ b/meta-oe/recipes-devtools/iptraf/iptraf-ng/CVE-2024-52949.patch @@ -0,0 +1,218 @@ +From 6a35a7f68c2dd946c5092376d71bbf0b925e2c4e Mon Sep 17 00:00:00 2001 +From: Vitezslav Samel +Date: Thu, 21 Nov 2024 08:43:57 +0100 +Subject: [PATCH] interface names: limit length to IFNAMSIZ + +This fixes CVE-2024-52949 (stack based buffer overflow) +when copying user supplied interface name without any +check. + +Problem was reported by Massimiliano Ferraresi and Massimiliano Brolli +from TIM Red team (https://www.gruppotim.it/it/footer/red-team.html) + +CVE: CVE-2024-52949 +Upstream-Status: Backport [https://github.com/iptraf-ng/iptraf-ng/commit/2b623e991115358a57275af8a53feb5ae707b3ae] + +Reported-by: Massimiliano Ferraresi, Massimiliano Brolli +Signed-off-by: Vitezslav Samel +--- + src/ifaces.c | 16 ++++++++-------- + src/ifstats.c | 6 +++--- + src/iptraf-ng-compat.h | 1 + + src/iptraf.c | 9 +++++++++ + src/othptab.c | 2 +- + src/promisc.c | 2 +- + src/tcptable.c | 4 ++-- + src/wrapper.c | 8 ++++++++ + 8 files changed, 33 insertions(+), 15 deletions(-) + +diff --git a/src/ifaces.c b/src/ifaces.c +index aeb1614..4c5a545 100644 +--- a/src/ifaces.c ++++ b/src/ifaces.c +@@ -67,7 +67,7 @@ int dev_up(char *iface) + + fd = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP); + +- strcpy(ifr.ifr_name, iface); ++ ifname_copy(ifr.ifr_name, iface); + ir = ioctl(fd, SIOCGIFFLAGS, &ifr); + + close(fd); +@@ -90,7 +90,7 @@ int dev_get_ifindex(const char *iface) + return fd; + + struct ifreq ifr; +- strcpy(ifr.ifr_name, iface); ++ ifname_copy(ifr.ifr_name, iface); + int ir = ioctl(fd, SIOCGIFINDEX, &ifr); + + /* need to preserve errno across call to close() */ +@@ -114,7 +114,7 @@ int dev_get_mtu(const char *iface) + return fd; + + struct ifreq ifr; +- strcpy(ifr.ifr_name, iface); ++ ifname_copy(ifr.ifr_name, iface); + int ir = ioctl(fd, SIOCGIFMTU, &ifr); + + /* need to preserve errno across call to close() */ +@@ -138,7 +138,7 @@ int dev_get_flags(const char *iface) + return fd; + + struct ifreq ifr; +- strcpy(ifr.ifr_name, iface); ++ ifname_copy(ifr.ifr_name, iface); + int ir = ioctl(fd, SIOCGIFFLAGS, &ifr); + + /* need to preserve errno across call to close() */ +@@ -162,7 +162,7 @@ int dev_set_flags(const char *iface, int flags) + return fd; + + struct ifreq ifr; +- strcpy(ifr.ifr_name, iface); ++ ifname_copy(ifr.ifr_name, iface); + int ir = ioctl(fd, SIOCGIFFLAGS, &ifr); + if (ir == -1) + goto err; +@@ -190,7 +190,7 @@ int dev_clear_flags(const char *iface, int flags) + return fd; + + struct ifreq ifr; +- strcpy(ifr.ifr_name, iface); ++ ifname_copy(ifr.ifr_name, iface); + int ir = ioctl(fd, SIOCGIFFLAGS, &ifr); + if (ir == -1) + goto err; +@@ -233,7 +233,7 @@ int dev_get_ifname(int ifindex, char *ifname) + return ir; + } + +- strncpy(ifname, ifr.ifr_name, IFNAMSIZ); ++ ifname_copy(ifname, ifr.ifr_name); + return ir; + } + +@@ -256,7 +256,7 @@ int dev_bind_ifname(int fd, const char * const ifname) + int ir; + struct ifreq ifr; + +- strcpy(ifr.ifr_name, ifname); ++ ifname_copy(ifr.ifr_name, ifname); + ir = ioctl(fd, SIOCGIFINDEX, &ifr); + if (ir) + return ir; +diff --git a/src/ifstats.c b/src/ifstats.c +index 00a2a3f..1b687b6 100644 +--- a/src/ifstats.c ++++ b/src/ifstats.c +@@ -194,7 +194,7 @@ static void initiflist(struct iflist **list) + + struct iflist *itmp = alloc_iflist_entry(); + itmp->ifindex = ifindex; +- strcpy(itmp->ifname, ifname); ++ ifname_copy(itmp->ifname, ifname); + + /* make the linked list sorted by ifindex */ + struct iflist *cur = *list, *last = NULL; +@@ -714,9 +714,9 @@ void selectiface(char *ifname, int withall, int *aborted) + if (!(*aborted) && (list != NULL)) { + ptmp = (struct iflist *) scrolllist.textptr->nodeptr; + if ((withall) && (ptmp->prev_entry == NULL)) /* All Interfaces */ +- strcpy(ifname, ""); ++ ifname_copy(ifname, ""); + else +- strcpy(ifname, ptmp->ifname); ++ ifname_copy(ifname, ptmp->ifname); + } + + tx_destroy_list(&scrolllist); +diff --git a/src/iptraf-ng-compat.h b/src/iptraf-ng-compat.h +index 5aec185..845f18b 100644 +--- a/src/iptraf-ng-compat.h ++++ b/src/iptraf-ng-compat.h +@@ -112,6 +112,7 @@ extern void *xmallocz(size_t size); + extern char *xstrdup(const char *s); + extern int strtoul_ui(char const *s, int base, unsigned int *result); + extern int strtol_i(char const *s, int base, int *result); ++extern void ifname_copy(char *dst, const char *src); + + extern void die(const char *err, ...) __noreturn __printf(1,2); + extern void die_errno(const char *fmt, ...) __noreturn __printf(1,2); +diff --git a/src/iptraf.c b/src/iptraf.c +index 95f8e53..e5dcb64 100644 +--- a/src/iptraf.c ++++ b/src/iptraf.c +@@ -388,6 +388,15 @@ int main(int argc, char **argv) + if (__builtin_popcount(command) > 1) + die("only one of -i|-d|-s|-z|-l|-g options must be used"); + ++ /* sanity check of passed arguments */ ++ if ((i_opt && strlen(i_opt) >= IFNAMSIZ) || ++ (d_opt && strlen(d_opt) >= IFNAMSIZ) || ++ (s_opt && strlen(s_opt) >= IFNAMSIZ) || ++ (z_opt && strlen(z_opt) >= IFNAMSIZ) || ++ (l_opt && strlen(l_opt) >= IFNAMSIZ)) { ++ die("interface name is too long"); ++ } ++ + strcpy(current_logfile, ""); + + if (f_opt) { +diff --git a/src/othptab.c b/src/othptab.c +index d1d9658..80f3dc8 100644 +--- a/src/othptab.c ++++ b/src/othptab.c +@@ -271,7 +271,7 @@ struct othptabent *add_othp_entry(struct othptable *table, struct pkt_hdr *pkt, + } + + new_entry->protocol = protocol; +- strcpy(new_entry->iface, ifname); ++ ifname_copy(new_entry->iface, ifname); + + new_entry->pkt_length = pkt->pkt_len; + +diff --git a/src/promisc.c b/src/promisc.c +index d94e8bb..4737962 100644 +--- a/src/promisc.c ++++ b/src/promisc.c +@@ -70,7 +70,7 @@ static void promisc_enable_dev(struct list_head *promisc, int sock, const char * + struct promisc_list *new = xmallocz(sizeof(*new)); + + new->ifindex = ifindex; +- strcpy(new->ifname, dev); ++ ifname_copy(new->ifname, dev); + list_add_tail(&new->list, promisc); + } + +diff --git a/src/tcptable.c b/src/tcptable.c +index 159d628..2c4efc1 100644 +--- a/src/tcptable.c ++++ b/src/tcptable.c +@@ -365,8 +365,8 @@ struct tcptableent *addentry(struct tcptable *table, + * Store interface name + */ + +- strcpy(new_entry->ifname, ifname); +- strcpy(new_entry->oth_connection->ifname, ifname); ++ ifname_copy(new_entry->ifname, ifname); ++ ifname_copy(new_entry->oth_connection->ifname, ifname); + + /* + * Zero out MAC address fields +diff --git a/src/wrapper.c b/src/wrapper.c +index 2eb3b59..1d2dc6f 100644 +--- a/src/wrapper.c ++++ b/src/wrapper.c +@@ -78,3 +78,11 @@ int strtol_i(char const *s, int base, int *result) + *result = ul; + return 0; + } ++ ++/* it's up to the caller to ensure there is room for */ ++/* at least IFNAMSIZ bytes in dst */ ++void ifname_copy(char *dst, const char *src) ++{ ++ strncpy(dst, src, IFNAMSIZ - 1); ++ dst[IFNAMSIZ - 1] = '\0'; ++} diff --git a/meta-oe/recipes-devtools/iptraf/iptraf-ng_1.2.1.bb b/meta-oe/recipes-devtools/iptraf/iptraf-ng_1.2.1.bb index 0f6bbb4d54..a622621990 100644 --- a/meta-oe/recipes-devtools/iptraf/iptraf-ng_1.2.1.bb +++ b/meta-oe/recipes-devtools/iptraf/iptraf-ng_1.2.1.bb @@ -28,6 +28,7 @@ SRC_URI = "https://src.fedoraproject.org/repo/pkgs/iptraf-ng/v${PV}.tar.gz/sha51 file://iptraf-ng-tmpfiles.conf \ file://ncurses-config.patch \ file://0001-make-Make-CC-weak-assignment.patch \ + file://CVE-2024-52949.patch \ " SRC_URI[sha256sum] = "9f5cef584065420dea1ba32c86126aede1fa9bd25b0f8362b0f9fd9754f00870" From patchwork Mon Oct 27 14:15:57 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 73095 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9EAC4CCF9E5 for ; Mon, 27 Oct 2025 14:16:15 +0000 (UTC) Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) by mx.groups.io with SMTP id smtpd.web11.33916.1761574572237790990 for ; Mon, 27 Oct 2025 07:16:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=iqaSvcTI; spf=pass (domain: gmail.com, ip: 209.85.221.46, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f46.google.com with SMTP id ffacd0b85a97d-4285169c005so2181439f8f.0 for ; Mon, 27 Oct 2025 07:16:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1761574571; x=1762179371; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=KzFh/2u28uOz+sDlvb4LFYO5V9mkwEzNmUQMDC7uLUQ=; b=iqaSvcTI6/Wi1w9zaceyTKNTRWwh475LjsCIUyRCeaxh+C9rwW+xso2/9f+RH/faQj 5ViktJ+AnqF2I/8MQvL/YBTThr96ESlkrpL3Q4l9wJiFPVY13otTVKBNCsLfTHQjcND3 ZdUBMUP1DLFEx38d+8JTmiK9B5Nxz9NyVffph+sbq1YIEnO1bZASixf/j9KfOY6E3i/H RWcC2rRQRLb1k70gBkBcSPrUSgoZHtW1WNVYE/usw6inirxtLnoS8lgZTo9c9aRO4lu9 pd8IASWAmHBhJfbIEpXPqmBU+GWfBTxX4zvAc3WSFf7oRICjSAf+Vhi9asJ352Jy4J9o CnYQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1761574571; x=1762179371; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=KzFh/2u28uOz+sDlvb4LFYO5V9mkwEzNmUQMDC7uLUQ=; b=iQdNdwIO5RebLaq4mjy/+0AfDsyr3PSoSV2E1O/biFxH63sM74ByPGsL9FYu9NvSaf sy+u4AdHNxAQLyqANUhqGJqF8JxcyXnNXYfdA3b81VZ598mpD2nzVtIorqENB3Rp7ENp vJ2n6jOBILLzwLNUMVT9ReqsM63b8yoRnjs4UbvAHniYCcg+1PUDYTlUOYEWiwaQ+XTB k2rJN9ROpzuDNUt/MoW45ye+bdwB9euHrvGwkIMUbkrTImEDOom0MbBcYY9G+hTf8Irj Pv7DfA/jX9n5HX+xLsLfXiO64pl0nLHJ5MmIfh+9fctXM67YMPWu/AMpIYWKLiQIEZDb lwJQ== X-Gm-Message-State: AOJu0YxLIwiEubxGDmNJyxBJNd/Rie36COQMj0TayNJBD48s8xCCWrW4 +6myCLm+fPBA/F0hhf8gMjP2FIu0feTgVNYnzGkxnr1RdQxYLwCx80ffYzJnJw== X-Gm-Gg: ASbGncsNVcStyBdzkd5QQOTgQTz7yUZs6fcsgbcSKkxITd8fbaA9Fz9rfPUQXfXGF1L YpGLc9NpfOA5n4reH82k7y5w2uNqqHcE7jvaIq8evSxdjFEpec+TSAofRmOrpXU9AH0eFgWfQdj QVr+k6wz4aHZ9c6/sXkIoTcPsmmPV4CoUf7U42d6o5tz0henfjuYiKmZ+0XdALStl5uee3lqlRI +hqx6sqPXKTbiCI0VpCmzc5HERxhRECkuyCeJJ5lZLULx8Z7BF+n7+6DM03fmV2AFiDyxz3zdaJ Hn+oT/YGYwq05RXvRC7jFRnmJSsvxaiRG6SBmcs0LL7cMn8v8NeP0iXy6NXgWpmnPzHktO5zn62 J32LSjLnIo62qhp4KC90/6GFAD5VuHjlxD9/Px3N3JFZpK4+NwV5/DhraufX3icRfgqHksSJpAI Dtxf8iuLsf X-Google-Smtp-Source: AGHT+IEEwzMb81PRxj2jY2lJk51s4qtif4IatELLiiXDtDUrUT1i9MUk0CPaHkLRe8LiPct+1C3DZw== X-Received: by 2002:a05:6000:400d:b0:3ee:1461:1659 with SMTP id ffacd0b85a97d-42704d98980mr26708673f8f.31.1761574570468; Mon, 27 Oct 2025 07:16:10 -0700 (PDT) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-429952db80fsm14164067f8f.31.2025.10.27.07.16.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Oct 2025 07:16:09 -0700 (PDT) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-networking][kirkstone][PATCH 10/10] keepalived: patch CVE-2021-44225 Date: Mon, 27 Oct 2025 15:15:57 +0100 Message-ID: <20251027141557.1893563-10-skandigraun@gmail.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251027141557.1893563-1-skandigraun@gmail.com> References: <20251027141557.1893563-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 27 Oct 2025 14:16:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/121050 Details: https://nvd.nist.gov/vuln/detail/CVE-2021-44225 Pick patch mentioned in the nvd report. Signed-off-by: Gyorgy Sarvari --- .../keepalived/CVE-2021-44225.patch | 41 +++++++++++++++++++ .../keepalived/keepalived_2.2.2.bb | 1 + 2 files changed, 42 insertions(+) create mode 100644 meta-networking/recipes-daemons/keepalived/keepalived/CVE-2021-44225.patch diff --git a/meta-networking/recipes-daemons/keepalived/keepalived/CVE-2021-44225.patch b/meta-networking/recipes-daemons/keepalived/keepalived/CVE-2021-44225.patch new file mode 100644 index 0000000000..01737c5734 --- /dev/null +++ b/meta-networking/recipes-daemons/keepalived/keepalived/CVE-2021-44225.patch @@ -0,0 +1,41 @@ +From 585788ee03bfe204a2a796a5f096a499a02c65db Mon Sep 17 00:00:00 2001 +From: Vincent Bernat +Date: Tue, 23 Nov 2021 06:50:59 +0100 +Subject: [PATCH] dbus: fix policy to not be overly broad + +The DBus policy did not restrict the message destination, allowing any +user to inspect and manipulate any property. + +CVE: CVE-2021-44225 +Upstream-Status: Backport [https://github.com/acassen/keepalived/commit/7977fec0be89ae6fe87405b3f8da2f0b5e415e3d] + +Signed-off-by: Vincent Bernat +--- + keepalived/dbus/org.keepalived.Vrrp1.conf | 13 ++++++++----- + 1 file changed, 8 insertions(+), 5 deletions(-) + +diff --git a/keepalived/dbus/org.keepalived.Vrrp1.conf b/keepalived/dbus/org.keepalived.Vrrp1.conf +index 2b78a57..b5ced60 100644 +--- a/keepalived/dbus/org.keepalived.Vrrp1.conf ++++ b/keepalived/dbus/org.keepalived.Vrrp1.conf +@@ -3,12 +3,15 @@ + "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> + + +- +- ++ ++ + + +- +- +- ++ ++ ++ + + diff --git a/meta-networking/recipes-daemons/keepalived/keepalived_2.2.2.bb b/meta-networking/recipes-daemons/keepalived/keepalived_2.2.2.bb index 204d2fd116..ca476f8605 100644 --- a/meta-networking/recipes-daemons/keepalived/keepalived_2.2.2.bb +++ b/meta-networking/recipes-daemons/keepalived/keepalived_2.2.2.bb @@ -12,6 +12,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" SRC_URI = "http://www.keepalived.org/software/${BP}.tar.gz \ file://0001-layer4-Change-order-of-include-files.patch \ + file://CVE-2021-44225.patch \ " SRC_URI[sha256sum] = "103692bd5345a4ed9f4581632ea636214fdf53e45682e200aab122c4fa674ece" UPSTREAM_CHECK_URI = "https://github.com/acassen/keepalived/releases"