From patchwork Tue Apr 14 15:56:47 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ross Burton X-Patchwork-Id: 86017 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 960FCF9D0DA for ; Tue, 14 Apr 2026 15:57:07 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.61.1776182216938003210 for ; Tue, 14 Apr 2026 08:56:57 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@arm.com header.s=foss header.b=X7KcVAyp; spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: ross.burton@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9DCFE2D95 for ; Tue, 14 Apr 2026 08:56:50 -0700 (PDT) Received: from cesw-amp-gbt-1s-m12830-04.lab.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id E9D6A3F7B4 for ; Tue, 14 Apr 2026 08:56:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=arm.com; s=foss; t=1776182216; bh=aPWTfXyUy3uCWh8CXuTTfEZOxkNbc5jjRw+yvIcQdQY=; h=From:To:Subject:Date:From; b=X7KcVAypqWS0rTwDHU4CXJCVUgtZmkNnyvTqNa1AYDNDlTCqxAj6OuXrlGH8i/szV gDNtxSpNT6cH+yzONWRAcmfqV7sxq/H/mItP45beANP/KsG2qCAW/pHbsS+nXkajg6 20yWI6wiSH1le2n74EsU8ywkBgejLEZPAXba3gws= From: Ross Burton To: openembedded-core@lists.openembedded.org Subject: [PATCH 1/6] graphene: ignore CVE-2024-1984 Date: Tue, 14 Apr 2026 16:56:47 +0100 Message-ID: <20260414155652.1214302-1-ross.burton@arm.com> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 14 Apr 2026 15:57:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235161 This CVE is for a WordPress theme called Graphene. It's likely that the CPE for this graphene will be gnome:graphene but this hasn't been formally documented, so exclude this one CVE for now. Signed-off-by: Ross Burton --- meta/recipes-graphics/graphene/graphene_1.10.8.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-graphics/graphene/graphene_1.10.8.bb b/meta/recipes-graphics/graphene/graphene_1.10.8.bb index d14a6403ff4..7aa72b4a78f 100644 --- a/meta/recipes-graphics/graphene/graphene_1.10.8.bb +++ b/meta/recipes-graphics/graphene/graphene_1.10.8.bb @@ -26,3 +26,5 @@ EXTRA_OEMESON = "-Dinstalled_tests=false" FILES:${PN} += "${libdir}/graphene-1.0" BBCLASSEXTEND = "native nativesdk" + +CVE_STATUS[CVE-2024-1984] = "cpe-incorrect: issue in a WordPress theme" From patchwork Tue Apr 14 15:56:48 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ross Burton X-Patchwork-Id: 86019 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D7309F9D0E0 for ; Tue, 14 Apr 2026 15:57:07 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.56.1776182217280640348 for ; Tue, 14 Apr 2026 08:56:57 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@arm.com header.s=foss header.b=V+cwWzoT; spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: ross.burton@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 350674403 for ; Tue, 14 Apr 2026 08:56:51 -0700 (PDT) Received: from cesw-amp-gbt-1s-m12830-04.lab.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 8AF083F7B4 for ; Tue, 14 Apr 2026 08:56:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=arm.com; s=foss; t=1776182216; bh=K76XiFFBvssEtTIoXM0tHxtMT7abJHjQtmW2apc/XAI=; h=From:To:Subject:Date:In-Reply-To:References:From; b=V+cwWzoTRKOP9pRHuKkJutxeTqFbASkiOcIxBuHLaU63G2z4iALweD0dD4PqwtjYM PluQVW3DFWgYZKQGffzTyr1rsjVKfDdz/edJwU22l8f834Ve3oaCOLUWHGjc5Gmlwy +ndDacEy+qSRpv/2k/pu64ci3FJSadtF2AmMGDHM= From: Ross Burton To: openembedded-core@lists.openembedded.org Subject: [PATCH 2/6] re2c: backport fix for CVE-2026-2903 Date: Tue, 14 Apr 2026 16:56:48 +0100 Message-ID: <20260414155652.1214302-2-ross.burton@arm.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260414155652.1214302-1-ross.burton@arm.com> References: <20260414155652.1214302-1-ross.burton@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 14 Apr 2026 15:57:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235162 Backport a patch from upstream to fix CVE-2026-2903. Signed-off-by: Ross Burton --- .../re2c/re2c/CVE-2026-2903.patch | 68 +++++++++++++++++++ meta/recipes-support/re2c/re2c_4.4.bb | 4 +- 2 files changed, 71 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-support/re2c/re2c/CVE-2026-2903.patch diff --git a/meta/recipes-support/re2c/re2c/CVE-2026-2903.patch b/meta/recipes-support/re2c/re2c/CVE-2026-2903.patch new file mode 100644 index 00000000000..266891fa494 --- /dev/null +++ b/meta/recipes-support/re2c/re2c/CVE-2026-2903.patch @@ -0,0 +1,68 @@ +From febeb977936f9519a25d9fbd10ff8256358cdb97 Mon Sep 17 00:00:00 2001 +From: Ulya Trofimovich +Date: Tue, 3 Feb 2026 21:33:11 +0000 +Subject: [PATCH] Fix null pointer dereference when actions are used without + rules. + +Null pointer dereference happened because the root TNFA state was null: +there were no rules for a block, but determinization still happened. + +In this case re2c should emit an error and never even attempt +determinization. It was properly handled for blocks with start +conditions, but not for normal blocks. + +This addresses #571 "[Bug] Segmentation Fault (NULL Dereference) in +re2c::closure_leftmost_dfs during determinization". + +CVE: CVE-2026-2903 +Upstream-Status: Backport +Signed-off-by: Ross Burton +--- + src/parse/ast.cc | 19 +++++++++++++++---- + test/conditions/cond_error_10.c | 2 +- + 2 files changed, 16 insertions(+), 5 deletions(-) + +diff --git a/src/parse/ast.cc b/src/parse/ast.cc +index 91865e801..986cfb7da 100644 +--- a/src/parse/ast.cc ++++ b/src/parse/ast.cc +@@ -332,10 +332,6 @@ Ret check_and_merge_special_rules(AstGrams& grams, const opt_t* opts, Msg& msg, + all_conds_have_it = false; \ + } else if (g.name == STAR_COND) { \ + star_action = g.action[0]; \ +- } else if (g.rules.empty()) { \ +- RET_FAIL(msg.error(g.action[0]->loc, \ +- "%s action for non-existing condition `%s` found", \ +- str, g.name.c_str())); \ + } \ + } \ + if (star_action && all_conds_have_it) { \ +@@ -422,6 +418,21 @@ Ret check_and_merge_special_rules(AstGrams& grams, const opt_t* opts, Msg& msg, + } + } + ++ for (const AstGram& g : grams) { ++ if (g.rules.empty()) { ++#define CHECK_ACTION(action, str) do { \ ++ if (!g.action.empty()) { \ ++ RET_FAIL(msg.error(g.action[0]->loc, \ ++ "%s action %sbut no rules found", str, incond(g.name).c_str())); \ ++ } \ ++} while(0) ++ CHECK_ACTION(entry, "entry"); ++ CHECK_ACTION(pre_rule, "pre-rule"); ++ CHECK_ACTION(post_rule, "post-rule"); ++#undef CHECK_ACTION ++ } ++ } ++ + // zero condition must be the first one. + auto zero = std::find_if( + grams.begin(), grams.end(), [](const AstGram& g) { return g.name == ZERO_COND; }); +diff --git a/test/conditions/cond_error_10.c b/test/conditions/cond_error_10.c +index 571028a22..3bfde301b 100644 +--- a/test/conditions/cond_error_10.c ++++ b/test/conditions/cond_error_10.c +@@ -1 +1 @@ +-conditions/cond_error_10.re:7:5: error: pre-rule action for non-existing condition `c` found ++conditions/cond_error_10.re:7:5: error: pre-rule action in condition 'c' but no rules found diff --git a/meta/recipes-support/re2c/re2c_4.4.bb b/meta/recipes-support/re2c/re2c_4.4.bb index 3be66d13884..ea9364c483d 100644 --- a/meta/recipes-support/re2c/re2c_4.4.bb +++ b/meta/recipes-support/re2c/re2c_4.4.bb @@ -6,7 +6,9 @@ SECTION = "devel" LICENSE = "PD" LIC_FILES_CHKSUM = "file://LICENSE;md5=64eca4d8a3b67f9dc7656094731a2c8d" -SRC_URI = "${GITHUB_BASE_URI}/download/${PV}/${BPN}-${PV}.tar.xz" +SRC_URI = "${GITHUB_BASE_URI}/download/${PV}/${BPN}-${PV}.tar.xz \ + file://CVE-2026-2903.patch" + SRC_URI[sha256sum] = "6b6b865924447ef992d5db4e52fb9307e5f65f26edd43efa91395da810f4280a" GITHUB_BASE_URI = "https://github.com/skvadrik/re2c/releases" From patchwork Tue Apr 14 15:56:49 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ross Burton X-Patchwork-Id: 86021 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E99B0F9D0E2 for ; Tue, 14 Apr 2026 15:57:07 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.62.1776182217958796945 for ; Tue, 14 Apr 2026 08:56:58 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@arm.com header.s=foss header.b=X4pLoC8k; spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: ross.burton@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C08482D95 for ; Tue, 14 Apr 2026 08:56:51 -0700 (PDT) Received: from cesw-amp-gbt-1s-m12830-04.lab.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 2234B3F7B4 for ; Tue, 14 Apr 2026 08:56:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=arm.com; s=foss; t=1776182217; bh=sl0pe5BeWECyyq78qRfkTopQ/DIW0AlE+odzv4OiZyo=; h=From:To:Subject:Date:In-Reply-To:References:From; b=X4pLoC8kzwAsWV52/GiNRpJFsesBQRRxNuBKWIDkfffM+9eG4s6mdtyJEJNem2xaM MnJQKrUDJIjuLcs8ZSu4PQqBHM6G3UcBzREj2Dlx+NOCEeStSPKA+qwrZu+BnCXTB6 5RjpJZXcpXLAsfwSrGYr+it6xxLe0QN9mv/ppxAQ= From: Ross Burton To: openembedded-core@lists.openembedded.org Subject: [PATCH 3/6] python3-requests: backport fix for CVE-2026-25645 Date: Tue, 14 Apr 2026 16:56:49 +0100 Message-ID: <20260414155652.1214302-3-ross.burton@arm.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260414155652.1214302-1-ross.burton@arm.com> References: <20260414155652.1214302-1-ross.burton@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 14 Apr 2026 15:57:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235163 When unpacking zip files requests uses predictable paths. Backport a fix to use randomly generated pathnames to mitigate injection attacks. Signed-off-by: Ross Burton --- .../python3-requests/CVE-2026-25645.patch | 46 +++++++++++++++++++ .../python/python3-requests_2.32.5.bb | 1 + 2 files changed, 47 insertions(+) create mode 100644 meta/recipes-devtools/python/python3-requests/CVE-2026-25645.patch diff --git a/meta/recipes-devtools/python/python3-requests/CVE-2026-25645.patch b/meta/recipes-devtools/python/python3-requests/CVE-2026-25645.patch new file mode 100644 index 00000000000..c3eedf005f2 --- /dev/null +++ b/meta/recipes-devtools/python/python3-requests/CVE-2026-25645.patch @@ -0,0 +1,46 @@ +From 66d21cb07bd6255b1280291c4fafb71803cdb3b7 Mon Sep 17 00:00:00 2001 +From: Nate Prewitt +Date: Wed, 25 Mar 2026 08:57:56 -0600 +Subject: [PATCH] Merge commit from fork + +Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function +uses a predictable filename when extracting files from zip archives into the system +temporary directory. If the target file already exists, it is reused without validation. +A local attacker with write access to the temp directory could pre-create a malicious +file that would be loaded in place of the legitimate one. Standard usage of the Requests +library is not affected by this vulnerability. Only applications that call +`extract_zipped_paths()` directly are impacted. Starting in version 2.33.0, the library +extracts files to a non-deterministic location. If developers are unable to upgrade, +they can set `TMPDIR` in their environment to a directory with restricted write access. + +CVE: CVE-2026-25645 +Upstream-Status: Backport +Signed-off-by: Ross Burton +--- + src/requests/utils.py | 13 +++++++------ + 1 file changed, 7 insertions(+), 6 deletions(-) + +diff --git a/src/requests/utils.py b/src/requests/utils.py +index d8803e6e91..54959bb8ab 100644 +--- a/src/requests/utils.py ++++ b/src/requests/utils.py +@@ -282,12 +282,13 @@ def extract_zipped_paths(path): + return path + + # we have a valid zip archive and a valid member of that archive +- tmp = tempfile.gettempdir() +- extracted_path = os.path.join(tmp, member.split("/")[-1]) +- if not os.path.exists(extracted_path): +- # use read + write to avoid the creating nested folders, we only want the file, avoids mkdir racing condition +- with atomic_open(extracted_path) as file_handler: +- file_handler.write(zip_file.read(member)) ++ suffix = os.path.splitext(member.split("/")[-1])[-1] ++ fd, extracted_path = tempfile.mkstemp(suffix=suffix) ++ try: ++ os.write(fd, zip_file.read(member)) ++ finally: ++ os.close(fd) ++ + return extracted_path + + diff --git a/meta/recipes-devtools/python/python3-requests_2.32.5.bb b/meta/recipes-devtools/python/python3-requests_2.32.5.bb index 43b63e32b1f..273c92d180a 100644 --- a/meta/recipes-devtools/python/python3-requests_2.32.5.bb +++ b/meta/recipes-devtools/python/python3-requests_2.32.5.bb @@ -5,6 +5,7 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=34400b68072d710fecd0a2940a0d1658" SRC_URI:append:class-nativesdk = " \ file://environment.d-python3-requests.sh \ + file://CVE-2026-25645.patch \ " SRC_URI[sha256sum] = "dbba0bac56e100853db0ea71b82b4dfd5fe2bf6d3754a8893c3af500cec7d7cf" From patchwork Tue Apr 14 15:56:50 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ross Burton X-Patchwork-Id: 86022 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CF84AF9D0DE for ; Tue, 14 Apr 2026 15:57:07 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.62.1776182217958796945 for ; Tue, 14 Apr 2026 08:56:58 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@arm.com header.s=foss header.b=DyYDGvoi; spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: ross.burton@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 585784403 for ; Tue, 14 Apr 2026 08:56:52 -0700 (PDT) Received: from cesw-amp-gbt-1s-m12830-04.lab.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id AE5133F7B4 for ; Tue, 14 Apr 2026 08:56:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=arm.com; s=foss; t=1776182218; bh=z6r8JEJywEZC2HEhUV/qv70fjie4g30+HDLZFIlRH+0=; h=From:To:Subject:Date:In-Reply-To:References:From; b=DyYDGvoi6KYahLrsySIGPArvMNY7GN6k0frU01Q+XuBpEufqJcHi6i2rWyaYEXvdS BFNXPp+q67IpEP3xMv5H0ZKgsqr0KRSXwmpjz2QbI/mz3ZQkqX61twin29YFSMI7UW HhOVwL68Uz1/7/x48S0A5cVCOWja4YGBxlTtcg8g= From: Ross Burton To: openembedded-core@lists.openembedded.org Subject: [PATCH 4/6] libexif: backport fixes for CVE-2026-40385/CVE-2026-40386/CVE-2026-32775 Date: Tue, 14 Apr 2026 16:56:50 +0100 Message-ID: <20260414155652.1214302-4-ross.burton@arm.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260414155652.1214302-1-ross.burton@arm.com> References: <20260414155652.1214302-1-ross.burton@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 14 Apr 2026 15:57:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235164 Backport the fixes for these three CVEs from upstream. Signed-off-by: Ross Burton --- .../0001-check-maxlen-to-be-at-least-1.patch | 74 +++++++++++++++++++ ...-fixed-2-unsigned-integer-underflows.patch | 46 ++++++++++++ ...n-32bit-system-when-reading-Nikon-Ma.patch | 36 +++++++++ .../recipes-support/libexif/libexif_0.6.25.bb | 3 + 4 files changed, 159 insertions(+) create mode 100644 meta/recipes-support/libexif/libexif/0001-check-maxlen-to-be-at-least-1.patch create mode 100644 meta/recipes-support/libexif/libexif/0002-fixed-2-unsigned-integer-underflows.patch create mode 100644 meta/recipes-support/libexif/libexif/0003-Avoid-overflow-on-32bit-system-when-reading-Nikon-Ma.patch diff --git a/meta/recipes-support/libexif/libexif/0001-check-maxlen-to-be-at-least-1.patch b/meta/recipes-support/libexif/libexif/0001-check-maxlen-to-be-at-least-1.patch new file mode 100644 index 00000000000..e5b7eb14b5b --- /dev/null +++ b/meta/recipes-support/libexif/libexif/0001-check-maxlen-to-be-at-least-1.patch @@ -0,0 +1,74 @@ +From 2d12cc141c4d799cea2b42639645db5142940ff7 Mon Sep 17 00:00:00 2001 +From: Marcus Meissner +Date: Mon, 9 Mar 2026 10:02:53 +0100 +Subject: [PATCH 1/3] check maxlen to be at least 1 + +maxlen-- on 0 will become a high value. + +(likely found by AI) + +Fixes https://github.com/libexif/libexif/issues/247 + +CVE: CVE-2026-32775 +Upstream-Status: Backport +Signed-off-by: Ross Burton +--- + libexif/canon/mnote-canon-entry.c | 2 ++ + libexif/fuji/mnote-fuji-entry.c | 1 + + libexif/olympus/mnote-olympus-entry.c | 2 ++ + libexif/pentax/mnote-pentax-entry.c | 1 + + 5 files changed, 8 insertions(+) + +diff --git a/libexif/canon/mnote-canon-entry.c b/libexif/canon/mnote-canon-entry.c +index de0fac4..2849d5b 100644 +--- a/libexif/canon/mnote-canon-entry.c ++++ b/libexif/canon/mnote-canon-entry.c +@@ -561,6 +561,8 @@ mnote_canon_entry_get_value (const MnoteCanonEntry *entry, unsigned int t, char + + if (!entry) + return NULL; ++ if (maxlen < 1) ++ return NULL; + + data = entry->data; + size = entry->size; +diff --git a/libexif/fuji/mnote-fuji-entry.c b/libexif/fuji/mnote-fuji-entry.c +index 47e01ed..5d9f16f 100644 +--- a/libexif/fuji/mnote-fuji-entry.c ++++ b/libexif/fuji/mnote-fuji-entry.c +@@ -201,6 +201,7 @@ mnote_fuji_entry_get_value (MnoteFujiEntry *entry, + int i, j; + + if (!entry) return (NULL); ++ if (maxlen < 1) return NULL; + + memset (val, 0, maxlen); + maxlen--; +diff --git a/libexif/olympus/mnote-olympus-entry.c b/libexif/olympus/mnote-olympus-entry.c +index e5200be..f938d40 100644 +--- a/libexif/olympus/mnote-olympus-entry.c ++++ b/libexif/olympus/mnote-olympus-entry.c +@@ -286,6 +286,8 @@ mnote_olympus_entry_get_value (MnoteOlympusEntry *entry, char *v, unsigned int m + + if (!entry) + return (NULL); ++ if (maxlen < 1) ++ return NULL; + + memset (v, 0, maxlen); + maxlen--; +diff --git a/libexif/pentax/mnote-pentax-entry.c b/libexif/pentax/mnote-pentax-entry.c +index 46900c3..0a6f87a 100644 +--- a/libexif/pentax/mnote-pentax-entry.c ++++ b/libexif/pentax/mnote-pentax-entry.c +@@ -317,6 +317,7 @@ mnote_pentax_entry_get_value (MnotePentaxEntry *entry, + int i = 0, j = 0; + + if (!entry) return (NULL); ++ if (maxlen < 1) return (NULL); + + memset (val, 0, maxlen); + maxlen--; +-- +2.43.0 + diff --git a/meta/recipes-support/libexif/libexif/0002-fixed-2-unsigned-integer-underflows.patch b/meta/recipes-support/libexif/libexif/0002-fixed-2-unsigned-integer-underflows.patch new file mode 100644 index 00000000000..2879d488f61 --- /dev/null +++ b/meta/recipes-support/libexif/libexif/0002-fixed-2-unsigned-integer-underflows.patch @@ -0,0 +1,46 @@ +From ef8d6041d567bcf2b7f466b1bad470689fb4d159 Mon Sep 17 00:00:00 2001 +From: Marcus Meissner +Date: Thu, 2 Apr 2026 13:26:31 +0200 +Subject: [PATCH 2/3] fixed 2 unsigned integer underflows + +this could cause crashes or data leaks. + +Reported-by: Kerwin + +CVE: CVE-2026-40386 +Upstream-Status: Backport +Signed-off-by: Ross Burton +--- + libexif/fuji/exif-mnote-data-fuji.c | 2 +- + libexif/olympus/exif-mnote-data-olympus.c | 2 +- + 2 files changed, 2 insertions(+), 2 deletions(-) + +diff --git a/libexif/fuji/exif-mnote-data-fuji.c b/libexif/fuji/exif-mnote-data-fuji.c +index c28c541..2dcb877 100644 +--- a/libexif/fuji/exif-mnote-data-fuji.c ++++ b/libexif/fuji/exif-mnote-data-fuji.c +@@ -70,7 +70,7 @@ exif_mnote_data_fuji_get_value (ExifMnoteData *d, unsigned int i, char *val, uns + ExifMnoteDataFuji *n = (ExifMnoteDataFuji *) d; + + if (!d || !val) return NULL; +- if (i > n->count -1) return NULL; ++ if (i >= n->count) return NULL; + /* + exif_log (d->log, EXIF_LOG_CODE_DEBUG, "ExifMnoteDataFuji", + "Querying value for tag '%s'...", +diff --git a/libexif/olympus/exif-mnote-data-olympus.c b/libexif/olympus/exif-mnote-data-olympus.c +index a57af17..428f365 100644 +--- a/libexif/olympus/exif-mnote-data-olympus.c ++++ b/libexif/olympus/exif-mnote-data-olympus.c +@@ -78,7 +78,7 @@ exif_mnote_data_olympus_get_value (ExifMnoteData *d, unsigned int i, char *val, + ExifMnoteDataOlympus *n = (ExifMnoteDataOlympus *) d; + + if (!d || !val) return NULL; +- if (i > n->count -1) return NULL; ++ if (i >= n->count) return NULL; + /* + exif_log (d->log, EXIF_LOG_CODE_DEBUG, "ExifMnoteDataOlympus", + "Querying value for tag '%s'...", +-- +2.43.0 + diff --git a/meta/recipes-support/libexif/libexif/0003-Avoid-overflow-on-32bit-system-when-reading-Nikon-Ma.patch b/meta/recipes-support/libexif/libexif/0003-Avoid-overflow-on-32bit-system-when-reading-Nikon-Ma.patch new file mode 100644 index 00000000000..e1f9d12a7cc --- /dev/null +++ b/meta/recipes-support/libexif/libexif/0003-Avoid-overflow-on-32bit-system-when-reading-Nikon-Ma.patch @@ -0,0 +1,36 @@ +From 62f657ab2b01ede7ab85adbdec333c81176518e9 Mon Sep 17 00:00:00 2001 +From: Marcus Meissner +Date: Fri, 3 Apr 2026 11:18:47 +0200 +Subject: [PATCH 3/3] Avoid overflow on 32bit system when reading Nikon + MakerNotes + +The addition o2 = datao + exif_get_long(buf + o2, n->order) +could have overflowed on systems with 32bit unsigned int size_t. + +This could have caused out of bound reads of data, leading to +misparsing of exif / crashes. + +Reported-By: Kerwin + +CVE: CVE-2026-40385 +Upstream-Status: Backport +Signed-off-by: Ross Burton +--- + libexif/olympus/exif-mnote-data-olympus.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/libexif/olympus/exif-mnote-data-olympus.c b/libexif/olympus/exif-mnote-data-olympus.c +index 428f365..37f08ff 100644 +--- a/libexif/olympus/exif-mnote-data-olympus.c ++++ b/libexif/olympus/exif-mnote-data-olympus.c +@@ -386,6 +386,7 @@ exif_mnote_data_olympus_load (ExifMnoteData *en, + o2 += 2; + + /* Go to where the number of entries is. */ ++ if (CHECKOVERFLOW(o2,buf_size,exif_get_long (buf + o2, n->order))) return; + o2 = datao + exif_get_long (buf + o2, n->order); + break; + +-- +2.43.0 + diff --git a/meta/recipes-support/libexif/libexif_0.6.25.bb b/meta/recipes-support/libexif/libexif_0.6.25.bb index c57855303f4..d869f8c6c3b 100644 --- a/meta/recipes-support/libexif/libexif_0.6.25.bb +++ b/meta/recipes-support/libexif/libexif_0.6.25.bb @@ -9,6 +9,9 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=243b725d71bb5df4a1e5920b344b86ad" SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/libexif-${PV}.tar.bz2 \ file://0001-Add-serial-tests-config-needed-by-ptest.patch \ + file://0001-check-maxlen-to-be-at-least-1.patch \ + file://0002-fixed-2-unsigned-integer-underflows.patch \ + file://0003-Avoid-overflow-on-32bit-system-when-reading-Nikon-Ma.patch \ file://run-ptest \ " From patchwork Tue Apr 14 15:56:51 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ross Burton X-Patchwork-Id: 86020 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 78BDDF9D0E4 for ; Tue, 14 Apr 2026 15:57:08 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.58.1776182219273189345 for ; Tue, 14 Apr 2026 08:56:59 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@arm.com header.s=foss header.b=UMv/2L/m; spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: ross.burton@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id E9F3B2D95 for ; Tue, 14 Apr 2026 08:56:52 -0700 (PDT) Received: from cesw-amp-gbt-1s-m12830-04.lab.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 464D33F7B4 for ; Tue, 14 Apr 2026 08:56:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=arm.com; s=foss; t=1776182218; bh=teTUuOjkk1XeWn8B0Y+XvdRTkHf5LCAAS3YqHK31vlM=; h=From:To:Subject:Date:In-Reply-To:References:From; b=UMv/2L/mrl2o+LHzp1QNothNEFaQMEQLdcuRxvk6a0gYFlqNFSabPPFO6G8cx6Og7 DKADQknXzz2+TV+tEaN+edTF15Ny6AI/vggMQzxgTKS424gD+RgDlK/1FC/hpYn7HO LrJfXAgbgGNvcjPP8AGDJ/sMdD/UT5uruDncA2jc= From: Ross Burton To: openembedded-core@lists.openembedded.org Subject: [PATCH 5/6] perl: link to the system zlib instead of a vendored copy Date: Tue, 14 Apr 2026 16:56:51 +0100 Message-ID: <20260414155652.1214302-5-ross.burton@arm.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260414155652.1214302-1-ross.burton@arm.com> References: <20260414155652.1214302-1-ross.burton@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 14 Apr 2026 15:57:08 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235165 The perl module Compress-Raw-Zlib defaults to using a vendored copy of the zlib sources which has a number of CVEs. A newer version of perl updates this to zlib 1.3.2 to resolve them, but we should be linking to our zlib recipe instead of the vendored code. This mitigates CVE-2026-4176 so mark it as not appropriate. Signed-off-by: Ross Burton --- meta/recipes-devtools/perl/perl_5.42.0.bb | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/meta/recipes-devtools/perl/perl_5.42.0.bb b/meta/recipes-devtools/perl/perl_5.42.0.bb index a154bbc0a9b..5992ac2d927 100644 --- a/meta/recipes-devtools/perl/perl_5.42.0.bb +++ b/meta/recipes-devtools/perl/perl_5.42.0.bb @@ -59,6 +59,11 @@ CFLAGS:append:toolchain-clang = " -fno-strict-aliasing" # Needed with -march=x86-64-v3 CFLAGS:append:toolchain-gcc:class-target:x86-64 = " -fno-builtin-memcpy -D__NO_STRING_INLINES -U_FORTIFY_SOURCE" +# Link Compress-Raw-Zlib to the system zlib instead of a vendored copy +EXTRA_OEMAKE += "BUILD_ZLIB=False ZLIB_INCLUDE=${STAGING_INCDIR} ZLIB_LIB=${STAGING_LIBDIR}" + +CVE_STATUS[CVE-2026-4176] = "not-applicable-config: we do not use the vendorered zlib" + do_configure:prepend() { rm -rf ${B} cp -rfp ${S} ${B} From patchwork Tue Apr 14 15:56:52 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ross Burton X-Patchwork-Id: 86018 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BCB15F9D0DC for ; Tue, 14 Apr 2026 15:57:07 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.59.1776182219715850949 for ; Tue, 14 Apr 2026 08:56:59 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@arm.com header.s=foss header.b=CJTuOLyD; spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: ross.burton@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 81C8F4403 for ; Tue, 14 Apr 2026 08:56:53 -0700 (PDT) Received: from cesw-amp-gbt-1s-m12830-04.lab.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id DB0793F7B4 for ; Tue, 14 Apr 2026 08:56:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=arm.com; s=foss; t=1776182219; bh=WXOh5Z2G43yPIDCzGGxizZjqPErdNZN5Z22GSwCgNAw=; h=From:To:Subject:Date:In-Reply-To:References:From; b=CJTuOLyDItKde1rOUJpFCjxvad4le2I3tXpOBVQ3TTnxh4bFgDu2frW5J4aROrvby nKDe4krJBs7aFPt9gEXHI54T1lh2aNm3DAiSkrvcR+1KO8dnfjH2p/b6kJNQ+AUT1e PNh6PKXY4MKY8wZ6u3SuplGx1MZYn0orOoD7j5rw= From: Ross Burton To: openembedded-core@lists.openembedded.org Subject: [PATCH 6/6] perl: link to the system bzip2 instead of a vendored copy Date: Tue, 14 Apr 2026 16:56:52 +0100 Message-ID: <20260414155652.1214302-6-ross.burton@arm.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260414155652.1214302-1-ross.burton@arm.com> References: <20260414155652.1214302-1-ross.burton@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 14 Apr 2026 15:57:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235166 The perl module Compress-Raw-Bzip2 defaults to using a vendored copy of the bzip2 sources. We should be building perl against the system bzip2 recipe to avoid potential security issues. This is a little fiddly in the DEPENDS as bzip2-native is assume-provided so we need to depend on bzip2-replacement-native for the native build. Signed-off-by: Ross Burton --- meta/recipes-devtools/perl/perl_5.42.0.bb | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/meta/recipes-devtools/perl/perl_5.42.0.bb b/meta/recipes-devtools/perl/perl_5.42.0.bb index 5992ac2d927..cf28067bab8 100644 --- a/meta/recipes-devtools/perl/perl_5.42.0.bb +++ b/meta/recipes-devtools/perl/perl_5.42.0.bb @@ -30,7 +30,9 @@ B = "${WORKDIR}/perl-${PV}-build" inherit upstream-version-is-even update-alternatives -DEPENDS += "perlcross-native zlib virtual/crypt" +DEPENDS += "perlcross-native bzip2 zlib virtual/crypt" +DEPENDS:append:class-native = " bzip2-replacement-native" + # make 4.1 has race issues with the double-colon usage of MakeMaker, see #14096 DEPENDS += "make-native" @@ -59,8 +61,10 @@ CFLAGS:append:toolchain-clang = " -fno-strict-aliasing" # Needed with -march=x86-64-v3 CFLAGS:append:toolchain-gcc:class-target:x86-64 = " -fno-builtin-memcpy -D__NO_STRING_INLINES -U_FORTIFY_SOURCE" -# Link Compress-Raw-Zlib to the system zlib instead of a vendored copy +# Link Compress-Raw-Zlib to the system libraries instead of a vendored copy EXTRA_OEMAKE += "BUILD_ZLIB=False ZLIB_INCLUDE=${STAGING_INCDIR} ZLIB_LIB=${STAGING_LIBDIR}" +# Link Compress-Raw-Bzip2 to the system libraries instead of a vendored copy +EXTRA_OEMAKE += "BUILD_BZIP2=False BZIP2_INCLUDE=${STAGING_INCDIR} BZIP2_LIB=${STAGING_LIBDIR}" CVE_STATUS[CVE-2026-4176] = "not-applicable-config: we do not use the vendorered zlib"