From patchwork Wed May 13 05:04:42 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ankur Tyagi X-Patchwork-Id: 87989 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 04947CD484C for ; Wed, 13 May 2026 05:04:59 +0000 (UTC) Received: from mail-pj1-f44.google.com (mail-pj1-f44.google.com [209.85.216.44]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.720.1778648697713925633 for ; Tue, 12 May 2026 22:04:57 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=cuX5wUp5; spf=pass (domain: gmail.com, ip: 209.85.216.44, mailfrom: ankur.tyagi85@gmail.com) Received: by mail-pj1-f44.google.com with SMTP id 98e67ed59e1d1-3680540a6efso2235284a91.2 for ; Tue, 12 May 2026 22:04:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778648697; x=1779253497; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=v+AiOGT6zXno5jQrFizVIJSv+1R78pGHR1+/sN2UJyE=; b=cuX5wUp5vlMe88y6E3Mj3y0NEWjclO9eaeRVcPooclqjkVSs6J5lTVIqOT3NUdj8P+ f5Zbit88eUIkdXQZ+R8Yc6m/FvwNF0W472IcLF42gqat8QvtwaL6ApcX7buFdnCY73Fh b+9B85w7mDfLNdaUR683vST1XZl3Glf1vyZxrPWZRR+OgFxvymIcaGA03kzzpaBxPt4B RI41iUmtYnp4pJvWoanIubz6oi9YoA2vmdDIWQX4nBWjURNL1FehfUlphbf3qLz+y2hj 1lWnMVtuXV24xUcpNff7StRRpZYlKgoz0WERDRF6f39KQHXyyP/srP6D8lgPKXGvAtqs foHQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778648697; x=1779253497; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=v+AiOGT6zXno5jQrFizVIJSv+1R78pGHR1+/sN2UJyE=; b=JDqMH/adDgGgIqpwjOnRUbbhqZaqrqyeUyQHHbauXYLv6ro7bZKJPolHQkawlNp3kp NX11sjmBvzKuCWgXYeB8IfSKynDYLluIyzSgrGvFX3NRRdJwjxYfaBlOPSb3b669E18Y eYbtv4mxp9RNvVg+xsMAIJzrzCZJn3XQ/oNuDGt1kF2V86SVeAoerBcMlxO1+H5P0Qz7 Yn5Cj4CF5k6eWGBjCdZvFqzrsxmGG+FFixq2NV0VQeqRCfhBKCG2YOrYlr1zKMqdT0Iy BoaVHzJFjs8cthf5yEV969E0CeTGSXc0IEll+Ae8L3B/IV+IGPDAIUQpWIX8KJRS9hgq OiZw== X-Gm-Message-State: AOJu0Yy4SHwWjmSz7ZeA8Vimy4cuLQ3tfn/JvDO8ezdsgTJjjoaUlmTq L1jSr5ag7GvxsDG56/AZig3r3UNCIeZP5BuccNqXAFE/0s+zzOydsEGZ+sfXM6A/ X-Gm-Gg: Acq92OFSWWpp0Nf5cp529b0PWoXNQ52Vpt/vRpzFSrfOIlPI7GqqLnhQr8hggbSWo2U Q8OZQFZEpKOfaCBHgtCOM/Vfl+78Z2i+eD1XhDHO5SgmU9nFlBDmY/4k3GIbsFedMQYSbfez+pg LYyTvjLwZSKwpSmwC8hlUWxCDbO4xqw1vLOhmJaWDoavYd6sr7sm7zWv+slmajPGVV7hXBkRkl0 lZIRFOYbhVBKzzzaKjKR3UNMmR1bmo0O0A25Z63b1yIuzHWxfz4xPOMT0dbQWvugTy16Dv8AFWg MIERpEMH4vGzXBs+MNgq5aGVAdY/TcZ9eVgMP9vbz5Gqu719daGAMg4lwZDF4cJPYmOMAEl5e6U XHrN0P0NQBMHseT3JVKy13s4hrexCEc070GNiu0klydUwZPVO2zI0K2Y8b/BFjr6CLg+tqCf16m qc+xybqKrSyoG3XZDHOiNtoOtWzAJK4QMFtppatvF1wrR2x3o= X-Received: by 2002:a17:90b:58e4:b0:367:c442:3f24 with SMTP id 98e67ed59e1d1-368f79b61bemr1343637a91.19.1778648696903; Tue, 12 May 2026 22:04:56 -0700 (PDT) Received: from NVAPF55DW0D-IPD.. ([203.211.108.128]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-368eddf5c58sm1696900a91.1.2026.05.12.22.04.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 May 2026 22:04:56 -0700 (PDT) From: ankur.tyagi85@gmail.com To: openembedded-devel@lists.openembedded.org Cc: Ankur Tyagi Subject: [oe][meta-oe][scarthgap][PATCH 1/8] exiftool: ignore CVE-2026-7580 Date: Wed, 13 May 2026 17:04:42 +1200 Message-ID: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 May 2026 05:04:59 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/126944 From: Ankur Tyagi The impacted function mentioned in the nvd[1] was introduced in v12.82[2], hence we can ignore this CVE. [1]https://nvd.nist.gov/vuln/detail/CVE-2026-7580 [2]https://github.com/exiftool/exiftool/commit/280a7f0db71b5887be492d57723723cb196ad2f9 Signed-off-by: Ankur Tyagi --- meta-oe/recipes-devtools/perl/exiftool_12.72.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta-oe/recipes-devtools/perl/exiftool_12.72.bb b/meta-oe/recipes-devtools/perl/exiftool_12.72.bb index f1d17a6799..68e7a79436 100644 --- a/meta-oe/recipes-devtools/perl/exiftool_12.72.bb +++ b/meta-oe/recipes-devtools/perl/exiftool_12.72.bb @@ -22,3 +22,4 @@ RDEPENDS:${PN} = " \ " CVE_STATUS[CVE-2026-3102] = "not-applicable-platform: affects only MacOS" +CVE_STATUS[CVE-2026-7580] = "cpe-incorrect: The current version (12.72) is not affected." From patchwork Wed May 13 05:04:43 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ankur Tyagi X-Patchwork-Id: 87990 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DB88ACD484C for ; Wed, 13 May 2026 05:05:08 +0000 (UTC) Received: from mail-pj1-f41.google.com (mail-pj1-f41.google.com [209.85.216.41]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.730.1778648700591675525 for ; Tue, 12 May 2026 22:05:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=o0fWqh/Y; spf=pass (domain: gmail.com, ip: 209.85.216.41, mailfrom: ankur.tyagi85@gmail.com) Received: by mail-pj1-f41.google.com with SMTP id 98e67ed59e1d1-365cae89bf5so2764409a91.3 for ; Tue, 12 May 2026 22:05:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778648700; x=1779253500; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=FqI9LZ00tC3+zj2ZRVhCo3fn8gFbuzAcPV7/r8TKxmU=; b=o0fWqh/Ya3KpyPZQFVhS3kCIhBLDFa5fWqgHUrQQDKqK8PM9B0BQCFxFJAuxMGtUmB yLfiV8FArbtCdHcstxBGRAuMvU5MGs/8dmGc3834P4LVi8qjwA5SVO7nzaaZ5d+EIHn6 G3Ib+FENuY7OqMk+pxnDVUSDHJHoxJYNGPSl55h7w6kwyf6BWlfEBbYyR2z0lxDF+eL+ WQ3JhQHWsjz1Rn0NrrI4pcIXRzKkfG7/sVndheB2itC9EnoJh7JQgJVle+g70L6+Qh8s Yl7AQAp6b6gihcyaiKZhf1f1NjJSWOaeWrQ7ScewURneUsYRWnAJVD/LTLD+h6v/QGEd 6dJQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778648700; x=1779253500; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=FqI9LZ00tC3+zj2ZRVhCo3fn8gFbuzAcPV7/r8TKxmU=; b=d7TPdrJ7ToD80exvNe/oGb6zWbxdKRBjh3bjQFbFJWR6dAP3XKwEbA/T1mpBfYF/oN szlwB2T+w50cFIFHTWGkm48TPrBgh0BLHuEgcm9+D9ncp9yycoxBuJq6z6PIo245FT9W GrRmJbVQCxr/oWn903qoBfYkuvRzzGqTQQBbtD4sYpGSaMMi6mCzRf2pUl0ygp282cJP ycAfetU9JoRzjvzojcD4cEuzYboQ8M16WRjn/UISV6e6DcUe8Znq7QwGgGdZ0CALZmxH BEj4cr621EYNMHtIwRHIYsNbrx4k99bEeSl/m96jDeNPn48LLeFT99gJ1wzWS5Rx2ONz 6WfQ== X-Gm-Message-State: AOJu0YyRNjuO0q0hk3CWlGMMDR4Q1BHoZFyNSi5uux2L1/Q/Py5/lFzP swc4y5ZhYW3Z4tfE9/4mZaz/TwDeb0p7qrSOYlL9dHbMzhD58eydbTOO7HHNXWIw X-Gm-Gg: Acq92OHarYOkadLAJvxuCM2ENcIZMsuFLO00g7ts9k6MT0t+uyphXzd4W5+CbNrAvDR qzPFOGlLyAb5PQPRIRb67IrsZaON+QgHHJ4Wr8T/Q3RQn1HLIrnT03cAJhvrPaBEx0KxYDIMQ/m /nCfNc1QPu/2pW8c40FuXYy+hItI8s405KBUsdWrumyofn0Wp78ZYHFUdm1nG/vvbVjJZSfIf70 fZYUWKjTFI97xrZ1LVqr8nqUwF/NJcUwLQ0NSUMcqd/tBNJIJD0eRS78ajJcxy33OuajrVQ6YVC +IOjmWI5nFX//qjMKKpFM5gQwuedeUjQNfuTtgbR6acZi2zXPK0VItg+rMplPi4WRQqPoJxjpTA DKN3keK+r36gZa24dpBHzmsmlie4U9rrDXRQs79bjCMfUyIZ0gmulrRozrNUnOdRFGpLgivdyNW 9bitwZQc9lEUpyRH4r+QULIq1G3s9e4y4rxabD X-Received: by 2002:a17:90b:574e:b0:365:3154:7b1 with SMTP id 98e67ed59e1d1-368f3e5d0a0mr2038967a91.26.1778648699720; Tue, 12 May 2026 22:04:59 -0700 (PDT) Received: from NVAPF55DW0D-IPD.. ([203.211.108.128]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-368eddf5c58sm1696900a91.1.2026.05.12.22.04.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 May 2026 22:04:59 -0700 (PDT) From: ankur.tyagi85@gmail.com To: openembedded-devel@lists.openembedded.org Cc: Liyin Zhang , Ankur Tyagi Subject: [oe][meta-webserver][scarthgap][PATCH 2/8] apache2: upgrade 2.4.66 -> 2.4.67 Date: Wed, 13 May 2026 17:04:43 +1200 Message-ID: <20260513050450.3515182-2-ankur.tyagi85@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> References: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 May 2026 05:05:08 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/126945 From: Liyin Zhang Security fixes: - CVE-2026-34059 - CVE-2026-34032 - CVE-2026-33857 - CVE-2026-33523 - CVE-2026-33007 - CVE-2026-33006 - CVE-2026-29169 - CVE-2026-29168 - CVE-2026-28780 - CVE-2026-24072 - CVE-2026-23918 See: https://archive.apache.org/dist/httpd/CHANGES_2.4.67 Signed-off-by: Liyin Zhang Signed-off-by: Ankur Tyagi --- .../apache2/{apache2_2.4.66.bb => apache2_2.4.67.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta-webserver/recipes-httpd/apache2/{apache2_2.4.66.bb => apache2_2.4.67.bb} (99%) diff --git a/meta-webserver/recipes-httpd/apache2/apache2_2.4.66.bb b/meta-webserver/recipes-httpd/apache2/apache2_2.4.67.bb similarity index 99% rename from meta-webserver/recipes-httpd/apache2/apache2_2.4.66.bb rename to meta-webserver/recipes-httpd/apache2/apache2_2.4.67.bb index 0e96643fc3..1a091d7eff 100644 --- a/meta-webserver/recipes-httpd/apache2/apache2_2.4.66.bb +++ b/meta-webserver/recipes-httpd/apache2/apache2_2.4.67.bb @@ -27,7 +27,7 @@ SRC_URI:append:class-target = " \ " LIC_FILES_CHKSUM = "file://LICENSE;md5=bddeddfac80b2c9a882241d008bb41c3" -SRC_URI[sha256sum] = "94d7ff2b42acbb828e870ba29e4cbad48e558a79c623ad3596e4116efcfea25a" +SRC_URI[sha256sum] = "66cd206637b0d5c446fa7dabe75fe03525da8fb55855876c46288cd88b136aa4" S = "${WORKDIR}/httpd-${PV}" From patchwork Wed May 13 05:04:44 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ankur Tyagi X-Patchwork-Id: 87991 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D4133CD484C for ; Wed, 13 May 2026 05:05:58 +0000 (UTC) Received: from mail-pj1-f47.google.com (mail-pj1-f47.google.com [209.85.216.47]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.731.1778648702951761476 for ; Tue, 12 May 2026 22:05:03 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=CiYGpYHY; spf=pass (domain: gmail.com, ip: 209.85.216.47, mailfrom: ankur.tyagi85@gmail.com) Received: by mail-pj1-f47.google.com with SMTP id 98e67ed59e1d1-366070f71adso5686931a91.2 for ; Tue, 12 May 2026 22:05:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778648702; x=1779253502; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=xLOAbUYCdBuC5KnFxYUSBXf3lqa4QTQLDkn4mkK7pzU=; b=CiYGpYHY3GjoS2W+rVgoVm9M7WiQOhinT3+vOvOjPA0rJwk6Q5th/QIYKQGftawH3S 0AFofM5PtWpGY9wgwk3evc6I5liKfKJjJ1yqs4yZrlluqaVbX1xIDebM9OBjsg3IACtB ACyPQ9X9LPnyWXdKcP03k+j4PYEsCzWKKKn1a89Sq2PPPOlQlH2tD+1OUEgeKBevzZkC l/gPhuTdxOZN/ckyIvwzCejWLTyNasr3/CapM0uh7pQOJVJqgEXuzqmKZWDp/qhTYvsZ +gwlvc6sCkg8SVJHXcbp95herycUBdjngaYEXFA6uTg3v/nQfedegIU086K85uindP2G cr0Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778648702; x=1779253502; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=xLOAbUYCdBuC5KnFxYUSBXf3lqa4QTQLDkn4mkK7pzU=; b=copJDaBO/23ZmSrvUQ2nQnxPrDRe/TTcO0+aXywv8GvKBQDioIoUHR4axatTZy1+nA zuvDC/qwaUzf+FVK1X00GYmnsYtCoRipeVHGT5gcHqmHGS3lgJHFLEMjnK7v/wvhCxGB AEMkg4WMQFKtND96gFDcWBSxo+32qFvPRfBuP6fKHs0llEfWtPVwqL8YcO6llviEuOWC ZnY+pbJ6dIiIn9s5I4Umc1g5J4w1Opl6/Savxep8NyFAySwCFXOguYc2cM7HE2isZvI+ +VsFk9B1NPH88BaS9sCczHnuYtvn7pT8JunqaQygdUz8x9FwX7o+L4emG7p8cmVY+Sxi HFDw== X-Gm-Message-State: AOJu0YwW+jCEgTSczHPrGp/sHDyYJduqMBfc8U4G5Q6IHu2ii9Dcx8Lh jpulMKbPrVLsJs3Ma7/2p6ya5nkKC/9Zftr8zjZl5OfcUQ4/8DBCj0FoMaHFAyFC X-Gm-Gg: Acq92OHe0x2bR9ejYmAtoQkSaAIxBg4z/+jxvSoGR27X6/J2D4sf9lu0rZkOhgtKmj6 QllxLEnm7MViWnOKMlNxT+FSwlQE+Lc6g4mUd01wqnliRifBfEJOdVirAdxRlUEReDazfyXVUtj LLcpfm9GNeL/Rezwt713eOUbXsqp2Rt+7t8sH+wYW20eZwf8y03en+AXwjCEVm7jbwMopbf6M8z TBXc+ufP7WXjmVv7SdiSlCuMZHdXJAHn/Kwb4xLN5AMgaBHBZakpeyDoLZkVNJrl6mHvXVwbWBR OtVsrER25+bFCp5AgugEX/Xbp6nwXUiQJYt/GXthJHjiQMTBUKLKlRfYQIIr122mr0Lu1CVk6ha e+yp1sGdfeM89sHgJlzT0zDnRUzdXb1iQIt9p6NqpX9cySGDEy2CATScHaaiIJ2sHVbus+TNBwb 6dTzrhXp5QiS7OJOZwTlE7mMgb5xRtbxK9ZClr X-Received: by 2002:a17:90b:5345:b0:366:479c:59e7 with SMTP id 98e67ed59e1d1-368f77f08demr1542641a91.4.1778648702110; Tue, 12 May 2026 22:05:02 -0700 (PDT) Received: from NVAPF55DW0D-IPD.. ([203.211.108.128]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-368eddf5c58sm1696900a91.1.2026.05.12.22.05.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 May 2026 22:05:01 -0700 (PDT) From: ankur.tyagi85@gmail.com To: openembedded-devel@lists.openembedded.org Cc: Ankur Tyagi Subject: [oe][meta-networking][scarthgap][PATCH 3/8] firewalld: upgrade 1.3.2 -> 1.3.4 Date: Wed, 13 May 2026 17:04:44 +1200 Message-ID: <20260513050450.3515182-3-ankur.tyagi85@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> References: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 May 2026 05:05:58 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/126946 From: Ankur Tyagi https://github.com/firewalld/firewalld/releases/tag/v1.3.3 https://github.com/firewalld/firewalld/releases/tag/v1.3.4 Signed-off-by: Ankur Tyagi --- .../firewalld/{firewalld_1.3.2.bb => firewalld_1.3.4.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta-networking/dynamic-layers/meta-python/recipes-connectivity/firewalld/{firewalld_1.3.2.bb => firewalld_1.3.4.bb} (99%) diff --git a/meta-networking/dynamic-layers/meta-python/recipes-connectivity/firewalld/firewalld_1.3.2.bb b/meta-networking/dynamic-layers/meta-python/recipes-connectivity/firewalld/firewalld_1.3.4.bb similarity index 99% rename from meta-networking/dynamic-layers/meta-python/recipes-connectivity/firewalld/firewalld_1.3.2.bb rename to meta-networking/dynamic-layers/meta-python/recipes-connectivity/firewalld/firewalld_1.3.4.bb index 52157cf9a8..bc61a4ad32 100644 --- a/meta-networking/dynamic-layers/meta-python/recipes-connectivity/firewalld/firewalld_1.3.2.bb +++ b/meta-networking/dynamic-layers/meta-python/recipes-connectivity/firewalld/firewalld_1.3.4.bb @@ -10,7 +10,7 @@ SRC_URI = "\ file://firewalld.init \ file://run-ptest \ " -SRC_URI[sha256sum] = "aba0d8ce9617b906ea4866bf0bdfb2c2d5312f53b8e9e8e9e4d49bf330da5b5e" +SRC_URI[sha256sum] = "d33ddcc3b78fb66aea23c880deaa85a2352ae4b54af9ef796a9cd16ddc1771e5" # glib-2.0-native is needed for GSETTINGS_RULES autoconf macro from gsettings.m4 DEPENDS = "intltool-native glib-2.0-native nftables" From patchwork Wed May 13 05:04:45 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ankur Tyagi X-Patchwork-Id: 87993 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0A117CD37B6 for ; Wed, 13 May 2026 05:06:09 +0000 (UTC) Received: from mail-pj1-f41.google.com (mail-pj1-f41.google.com [209.85.216.41]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.723.1778648705174014071 for ; Tue, 12 May 2026 22:05:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=UgCfF5J9; spf=pass (domain: gmail.com, ip: 209.85.216.41, mailfrom: ankur.tyagi85@gmail.com) Received: by mail-pj1-f41.google.com with SMTP id 98e67ed59e1d1-367c26471f5so3001555a91.1 for ; Tue, 12 May 2026 22:05:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778648704; x=1779253504; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=qYb7oOUhp5pdVPzLrI3Wt7BH4MssxcXIRedqxSVD+C4=; b=UgCfF5J9BxkJK6Lelvzy1L+XIsetrshdOgiD4qm9imi/f7BZxaKnWyBipVT9OXBUxV zW8IGOmslQhTEIF9sVhv1JxV9Wj6ibxi6XS8uJq0rx9bZwxxVmWchrL+WzUQjAFzuzlK QW8PVsYNQc1Qd5H/d1HjQRoacETQhjJM9LQyQX2CsOeLZ4m7Ct1rzoFQkC+K6b4D3ji/ nGEOeCle6XzihRSt8Zf/HESzKicPT3J84/TmsQwN7jQQu1vrXSKSe877q2pjiddY8KL7 rPciMtwrVihuIE2YwtV+fIKvfyIVWBeHthqIPpzJ192FtmWGV8RfNMyueB8ijrfLL9S3 ICpw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778648704; x=1779253504; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=qYb7oOUhp5pdVPzLrI3Wt7BH4MssxcXIRedqxSVD+C4=; b=s0Autf4GN3rinL0qO61wyVaNzby05JKIXiL2CcY0fDggCIMqahGgClroDMPaptuXGp L5D/9ZB+uTLRez6nPBBI0sjx27Z4C5tUtNCTUyYVsTgmmDstNVXTetIJeqesIVFhefLP CgAV4ftKFPg3BoiwFQCFEw8L22v+x92gZ5IIL1QejLD9LEAvxQWL/RKYYDlnKhqtoDia GtSny9Pn0bPl7CAN7HYnLq5SJHiTXQSq6BnHLVCPL4QZS98bGCWN2GAGG/3nyoUr5dxJ kNOV6QV+Kz7xvKasXnc2IWKggyjPKS7vWpmWI2+D1qv7srD3BiOmIrtQ6qtkDAzvLmo+ H/ww== X-Gm-Message-State: AOJu0YwfAoRPZO7IA8m/JPG9lCKu2lcWVSQeHRC9OuYuJziLmkqDvEsr Ve90E35RAsUPUZrnXDQbi9YQxNi0TWG65GzTXuIEtnvR8A5gYz0buisDKeDUovc6 X-Gm-Gg: Acq92OEFKfskZQQwgH4r6R8QLRPRpDMrN3Ds4WFYnWxrx1RuTE42bnONt3pDO/f4GXG 8Tju8g3GGrRDHUOxq83BZvLmHmnnZUF9FnSKqRac6wmdFTu4PoKjFsNSEs9NrUoXaEKRTp0G8Qc 4vi8OCHEkl749UYze5sFZKHmnYmUX5iEVw6pZ2/DJY2yefWSDhpfcom1KT0zaAhzang1op5hOVE /IyLlwEM5e0p3dh3gLCbmjpRbKNG6rcAx2Pdyr+bJNwr89Um5a7B2VFJk+sc0EIznDkq06NAGQf m/fIsR79v2AYUtTfMpn1YxcA32/v17MuRZlJQSl9XjFb3JM0hwGRel4JZpaA5KN6qgtN1IiQiKN YMp1E+aR1S9ed6WOMlVvocEoZKdv01JA7rYss91hRKjS3piAU/dSKNsNd9aE1Sz23xKaKAwG94K 0aAlw5ZjOz9sm4wudxCbj4LYB3qG9vg+oY7CQe X-Received: by 2002:a17:90a:51a1:b0:369:971:4888 with SMTP id 98e67ed59e1d1-36909714b3bmr33119a91.15.1778648704458; Tue, 12 May 2026 22:05:04 -0700 (PDT) Received: from NVAPF55DW0D-IPD.. ([203.211.108.128]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-368eddf5c58sm1696900a91.1.2026.05.12.22.05.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 May 2026 22:05:04 -0700 (PDT) From: ankur.tyagi85@gmail.com To: openembedded-devel@lists.openembedded.org Cc: Ankur Tyagi Subject: [oe][meta-networking][scarthgap][PATCH 4/8] frr: patch CVE-2026-28532 Date: Wed, 13 May 2026 17:04:45 +1200 Message-ID: <20260513050450.3515182-4-ankur.tyagi85@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> References: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 May 2026 05:06:09 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/126947 From: Ankur Tyagi Details: https://nvd.nist.gov/vuln/detail/CVE-2026-28532 Signed-off-by: Ankur Tyagi --- .../frr/frr/CVE-2026-28532.patch | 309 ++++++++++++++++++ .../recipes-protocols/frr/frr_9.1.3.bb | 1 + 2 files changed, 310 insertions(+) create mode 100644 meta-networking/recipes-protocols/frr/frr/CVE-2026-28532.patch diff --git a/meta-networking/recipes-protocols/frr/frr/CVE-2026-28532.patch b/meta-networking/recipes-protocols/frr/frr/CVE-2026-28532.patch new file mode 100644 index 0000000000..39f5f569de --- /dev/null +++ b/meta-networking/recipes-protocols/frr/frr/CVE-2026-28532.patch @@ -0,0 +1,309 @@ +From ea6982fe2ae7db40b0ea0ec42c283eb3b3178798 Mon Sep 17 00:00:00 2001 +From: Jafar Al-Gharaibeh +Date: Wed, 4 Mar 2026 12:38:46 -0600 +Subject: [PATCH] ospfd: harden TE/SR TLV iteration against malformed lengths + +Use 32-bit counters and per-iteration TLV size bounds checks +in OSPF TE/SR TLV parsers so malformed opaque LSAs cannot wrap +loop accounting and advance pointers beyond the LSA buffer. + +- Change loop accumulators from 16-bit to 32-bit (uint32_t) to + prevent wraparound +- Rework TLV iteration so pointer advancement is controlled in-loop +- Add per-iteration guard before advancing: + - `tlv_size <= (len - sum)` (or `length - sum`) +- On malformed size, parser now logs and exits/breaks the loop + safely instead of stepping past buffer limits + +Signed-off-by: Jafar Al-Gharaibeh +(cherry picked from commit d3e8aedb87671f38db59b0df908e25e1d4af027d) + +CVE: CVE-2026-28532 +Upstream-Status: Backport [https://github.com/FRRouting/frr/commit/d3e8aedb87671f38db59b0df908e25e1d4af027d] +Signed-off-by: Ankur Tyagi +--- + ospfd/ospf_sr.c | 50 ++++++++++++++++++++++++++++++-------- + ospfd/ospf_te.c | 64 +++++++++++++++++++++++++++++++++++++++---------- + 2 files changed, 91 insertions(+), 23 deletions(-) + +diff --git a/ospfd/ospf_sr.c b/ospfd/ospf_sr.c +index e26fe6f53a..11ca362a1b 100644 +--- a/ospfd/ospf_sr.c ++++ b/ospfd/ospf_sr.c +@@ -985,7 +985,8 @@ static struct sr_link *get_ext_link_sid(struct tlv_header *tlvh, size_t size) + struct ext_subtlv_rmt_itf_addr *rmt_itf; + + struct tlv_header *sub_tlvh; +- uint16_t length = 0, sum = 0, i = 0; ++ uint32_t length = 0, sum = 0; ++ uint16_t i = 0; + + /* Check TLV size */ + if ((ntohs(tlvh->length) > size) +@@ -1000,7 +1001,15 @@ static struct sr_link *get_ext_link_sid(struct tlv_header *tlvh, size_t size) + length = ntohs(tlvh->length) - EXT_TLV_LINK_SIZE; + sub_tlvh = (struct tlv_header *)((char *)(tlvh) + TLV_HDR_SIZE + + EXT_TLV_LINK_SIZE); +- for (; sum < length && sub_tlvh; sub_tlvh = TLV_HDR_NEXT(sub_tlvh)) { ++ for (; sum < length && sub_tlvh;) { ++ uint32_t tlv_size = TLV_SIZE(sub_tlvh); ++ ++ if (tlv_size > length - sum) { ++ zlog_warn("Malformed Extended Link sub-TLV size %u (remaining %u)", ++ tlv_size, length - sum); ++ break; ++ } ++ + switch (ntohs(sub_tlvh->type)) { + case EXT_SUBTLV_ADJ_SID: + adj_sid = (struct ext_subtlv_adj_sid *)sub_tlvh; +@@ -1041,7 +1050,9 @@ static struct sr_link *get_ext_link_sid(struct tlv_header *tlvh, size_t size) + default: + break; + } +- sum += TLV_SIZE(sub_tlvh); ++ sum += tlv_size; ++ if (sum < length) ++ sub_tlvh = TLV_HDR_NEXT(sub_tlvh); + } + + IPV4_ADDR_COPY(&srl->itf_addr, &link->link_data); +@@ -1062,7 +1073,7 @@ static struct sr_prefix *get_ext_prefix_sid(struct tlv_header *tlvh, + struct ext_subtlv_prefix_sid *psid; + + struct tlv_header *sub_tlvh; +- uint16_t length = 0, sum = 0; ++ uint32_t length = 0, sum = 0; + + /* Check TLV size */ + if ((ntohs(tlvh->length) > size) +@@ -1077,7 +1088,15 @@ static struct sr_prefix *get_ext_prefix_sid(struct tlv_header *tlvh, + length = ntohs(tlvh->length) - EXT_TLV_PREFIX_SIZE; + sub_tlvh = (struct tlv_header *)((char *)(tlvh) + TLV_HDR_SIZE + + EXT_TLV_PREFIX_SIZE); +- for (; sum < length && sub_tlvh; sub_tlvh = TLV_HDR_NEXT(sub_tlvh)) { ++ for (; sum < length && sub_tlvh;) { ++ uint32_t tlv_size = TLV_SIZE(sub_tlvh); ++ ++ if (tlv_size > length - sum) { ++ zlog_warn("Malformed Extended Prefix sub-TLV size %u (remaining %u)", ++ tlv_size, length - sum); ++ break; ++ } ++ + switch (ntohs(sub_tlvh->type)) { + case EXT_SUBTLV_PREFIX_SID: + psid = (struct ext_subtlv_prefix_sid *)sub_tlvh; +@@ -1102,7 +1121,9 @@ static struct sr_prefix *get_ext_prefix_sid(struct tlv_header *tlvh, + default: + break; + } +- sum += TLV_SIZE(sub_tlvh); ++ sum += tlv_size; ++ if (sum < length) ++ sub_tlvh = TLV_HDR_NEXT(sub_tlvh); + } + + osr_debug(" |- Found SID %u for prefix %pFX", srp->sid, +@@ -1364,7 +1385,7 @@ void ospf_sr_ri_lsa_update(struct ospf_lsa *lsa) + struct ri_sr_tlv_sid_label_range *ri_srlb = NULL; + struct ri_sr_tlv_sr_algorithm *algo = NULL; + struct sr_block srgb; +- uint16_t length = 0, sum = 0; ++ uint32_t length = 0, sum = 0; + uint8_t msd = 0; + + osr_debug("SR (%s): Process Router Information LSA 4.0.0.%u from %pI4", +@@ -1392,8 +1413,15 @@ void ospf_sr_ri_lsa_update(struct ospf_lsa *lsa) + srgb.range_size = 0; + srgb.lower_bound = 0; + +- for (tlvh = TLV_HDR_TOP(lsah); (sum < length) && (tlvh != NULL); +- tlvh = TLV_HDR_NEXT(tlvh)) { ++ for (tlvh = TLV_HDR_TOP(lsah); (sum < length) && (tlvh != NULL);) { ++ uint32_t tlv_size = TLV_SIZE(tlvh); ++ ++ if (tlv_size > length - sum) { ++ zlog_warn("Malformed RI TLV size %u (remaining %u)", tlv_size, ++ length - sum); ++ break; ++ } ++ + switch (ntohs(tlvh->type)) { + case RI_SR_TLV_SR_ALGORITHM: + algo = (struct ri_sr_tlv_sr_algorithm *)tlvh; +@@ -1410,7 +1438,9 @@ void ospf_sr_ri_lsa_update(struct ospf_lsa *lsa) + default: + break; + } +- sum += TLV_SIZE(tlvh); ++ sum += tlv_size; ++ if (sum < length) ++ tlvh = TLV_HDR_NEXT(tlvh); + } + + /* Check if Segment Routing Capabilities has been found */ +diff --git a/ospfd/ospf_te.c b/ospfd/ospf_te.c +index 1bddf97bde..8d01e4fd1d 100644 +--- a/ospfd/ospf_te.c ++++ b/ospfd/ospf_te.c +@@ -2121,7 +2121,7 @@ static int ospf_te_parse_te(struct ls_ted *ted, struct ospf_lsa *lsa) + struct ls_attributes *old, attr = {}; + struct tlv_header *tlvh; + void *value; +- uint16_t len, sum; ++ uint32_t len, sum; + uint8_t lsa_id; + + /* Initialize Attribute */ +@@ -2151,11 +2151,19 @@ static int ospf_te_parse_te(struct ls_ted *ted, struct ospf_lsa *lsa) + + sum = sizeof(struct tlv_header); + /* Browse sub-TLV and fulfill Link State Attributes */ +- for (tlvh = TLV_DATA(tlvh); sum < len; tlvh = TLV_HDR_NEXT(tlvh)) { ++ tlvh = TLV_DATA(tlvh); ++ while (sum < len) { ++ uint32_t tlv_size = TLV_SIZE(tlvh); + uint32_t val32, tab32[2]; + float valf, tabf[8]; + struct in_addr addr; + ++ if (tlv_size > len - sum) { ++ zlog_warn("Malformed TE sub-TLV size %u (remaining %u)", tlv_size, ++ len - sum); ++ break; ++ } ++ + value = TLV_DATA(tlvh); + switch (ntohs(tlvh->type)) { + case TE_LINK_SUBTLV_LCLIF_IPADDR: +@@ -2250,7 +2258,9 @@ static int ospf_te_parse_te(struct ls_ted *ted, struct ospf_lsa *lsa) + default: + break; + } +- sum += TLV_SIZE(tlvh); ++ sum += tlv_size; ++ if (sum < len) ++ tlvh = TLV_HDR_NEXT(tlvh); + } + + /* Get corresponding Edge from Link State Data Base */ +@@ -2350,7 +2360,7 @@ static int ospf_te_delete_te(struct ls_ted *ted, struct ospf_lsa *lsa) + struct tlv_header *tlvh; + struct in_addr addr; + struct ls_edge_key key = {.family = AF_UNSPEC}; +- uint16_t len, sum; ++ uint32_t len, sum; + uint8_t lsa_id; + + /* Initialize TLV browsing */ +@@ -2362,14 +2372,25 @@ static int ospf_te_delete_te(struct ls_ted *ted, struct ospf_lsa *lsa) + sum = sizeof(struct tlv_header); + + /* Browse sub-TLV to find Link ID */ +- for (tlvh = TLV_DATA(tlvh); sum < len; tlvh = TLV_HDR_NEXT(tlvh)) { ++ tlvh = TLV_DATA(tlvh); ++ while (sum < len) { ++ uint32_t tlv_size = TLV_SIZE(tlvh); ++ ++ if (tlv_size > len - sum) { ++ zlog_warn("Malformed TE sub-TLV size %u (remaining %u)", tlv_size, ++ len - sum); ++ break; ++ } ++ + if (ntohs(tlvh->type) == TE_LINK_SUBTLV_LCLIF_IPADDR) { + memcpy(&addr, TLV_DATA(tlvh), TE_LINK_SUBTLV_DEF_SIZE); + key.family = AF_INET; + IPV4_ADDR_COPY(&key.k.addr, &addr); + break; + } +- sum += TLV_SIZE(tlvh); ++ sum += tlv_size; ++ if (sum < len) ++ tlvh = TLV_HDR_NEXT(tlvh); + } + if (key.family == AF_UNSPEC) + return 0; +@@ -2444,7 +2465,7 @@ static int ospf_te_parse_ri(struct ls_ted *ted, struct ospf_lsa *lsa) + struct ls_node *node; + struct lsa_header *lsah = lsa->data; + struct tlv_header *tlvh; +- uint16_t len = 0, sum = 0; ++ uint32_t len = 0, sum = 0; + + /* Get vertex / Node from LSA Advertised Router ID */ + vertex = get_vertex(ted, lsa); +@@ -2455,13 +2476,18 @@ static int ospf_te_parse_ri(struct ls_ted *ted, struct ospf_lsa *lsa) + + /* Initialize TLV browsing */ + len = lsa->size - OSPF_LSA_HEADER_SIZE; +- for (tlvh = TLV_HDR_TOP(lsah); sum < len && tlvh; +- tlvh = TLV_HDR_NEXT(tlvh)) { ++ for (tlvh = TLV_HDR_TOP(lsah); sum < len && tlvh;) { ++ uint32_t tlv_size = TLV_SIZE(tlvh); + struct ri_sr_tlv_sr_algorithm *algo; + struct ri_sr_tlv_sid_label_range *range; + struct ri_sr_tlv_node_msd *msd; + uint32_t size, lower; + ++ if (tlv_size > len - sum) { ++ zlog_warn("Malformed RI TLV size %u (remaining %u)", tlv_size, len - sum); ++ break; ++ } ++ + switch (ntohs(tlvh->type)) { + case RI_SR_TLV_SR_ALGORITHM: + if (TLV_BODY_SIZE(tlvh) < 1 || +@@ -2546,7 +2572,9 @@ static int ospf_te_parse_ri(struct ls_ted *ted, struct ospf_lsa *lsa) + default: + break; + } +- sum += TLV_SIZE(tlvh); ++ sum += tlv_size; ++ if (sum < len) ++ tlvh = TLV_HDR_NEXT(tlvh); + } + + /* Vertex has been created or updated: export it */ +@@ -2758,7 +2786,8 @@ static int ospf_te_parse_ext_link(struct ls_ted *ted, struct ospf_lsa *lsa) + struct ext_tlv_link *ext; + struct ls_edge *edge; + struct ls_attributes *atr; +- uint16_t len = 0, sum = 0, i; ++ uint32_t len = 0, sum = 0; ++ uint16_t i; + uint32_t label; + + /* Get corresponding Edge from Link State Data Base */ +@@ -2792,11 +2821,18 @@ static int ospf_te_parse_ext_link(struct ls_ted *ted, struct ospf_lsa *lsa) + len -= EXT_TLV_LINK_SIZE; + tlvh = (struct tlv_header *)((char *)(ext) + TLV_HDR_SIZE + + EXT_TLV_LINK_SIZE); +- for (; sum < len; tlvh = TLV_HDR_NEXT(tlvh)) { ++ for (; sum < len;) { ++ uint32_t tlv_size = TLV_SIZE(tlvh); + struct ext_subtlv_adj_sid *adj; + struct ext_subtlv_lan_adj_sid *ladj; + struct ext_subtlv_rmt_itf_addr *rmt; + ++ if (tlv_size > len - sum) { ++ zlog_warn("Malformed Extended Link sub-TLV size %u (remaining %u)", ++ tlv_size, len - sum); ++ break; ++ } ++ + switch (ntohs(tlvh->type)) { + case EXT_SUBTLV_ADJ_SID: + if (TLV_BODY_SIZE(tlvh) != EXT_SUBTLV_ADJ_SID_SIZE) +@@ -2875,7 +2911,9 @@ static int ospf_te_parse_ext_link(struct ls_ted *ted, struct ospf_lsa *lsa) + default: + break; + } +- sum += TLV_SIZE(tlvh); ++ sum += tlv_size; ++ if (sum < len) ++ tlvh = TLV_HDR_NEXT(tlvh); + } + + /* Export Link State Edge if needed */ diff --git a/meta-networking/recipes-protocols/frr/frr_9.1.3.bb b/meta-networking/recipes-protocols/frr/frr_9.1.3.bb index 0287a6fb69..20a224b7d7 100644 --- a/meta-networking/recipes-protocols/frr/frr_9.1.3.bb +++ b/meta-networking/recipes-protocols/frr/frr_9.1.3.bb @@ -18,6 +18,7 @@ SRC_URI = "git://github.com/FRRouting/frr.git;protocol=https;branch=stable/9.1 \ file://CVE-2025-61099-61100-61101-61102-61103-61104-61105-61106-61107_2.patch \ file://CVE-2025-61099-61100-61101-61102-61103-61104-61105-61106-61107_3.patch \ file://CVE-2025-61099-61100-61101-61102-61103-61104-61105-61106-61107_4.patch \ + file://CVE-2026-28532.patch \ " SRCREV = "ad1766d17be022587fe05ebe1a7bf10e1b7dce19" From patchwork Wed May 13 05:04:46 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ankur Tyagi X-Patchwork-Id: 87992 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2E39ECD484C for ; Wed, 13 May 2026 05:06:09 +0000 (UTC) Received: from mail-pj1-f46.google.com (mail-pj1-f46.google.com [209.85.216.46]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.733.1778648707490720291 for ; Tue, 12 May 2026 22:05:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=bmeLuV//; spf=pass (domain: gmail.com, ip: 209.85.216.46, mailfrom: ankur.tyagi85@gmail.com) Received: by mail-pj1-f46.google.com with SMTP id 98e67ed59e1d1-3567e2b4159so3891938a91.0 for ; Tue, 12 May 2026 22:05:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778648707; x=1779253507; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=LqpEK3IDu8ExxcMIK6EkbBP8K8GG72sBYfUfxTPCGnU=; b=bmeLuV//KPooxr645wB8g32XCqoYbUyNMzK4MaNBwYprLXwhs7L+827zVVv7H0f3eB FC80uLe1WrPO9JfSdzJvt0xMS4hmAV+cMNEdsg23I2T+yZa7YNcDUt9qFTgr3thdHcRs zBgDiSkEbY2tn1aN9nohFqdnXzVXvnFwpBlTBS8oS5BseYsOj+0kkP1bRVkRZjCUYhcU jVnkrNXW/Se7FuUlJ8t/rM66J7WB9yfxrJSddGjw08Mp6FAF7LfIwZaBS42ZM8C69n9c nFh6pP9NPZ5BjIKQpkQtHFpKbmt7s8WwBTluX477V8mkVqidQmIWL8vzKeYESbtNdveF JqaA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778648707; x=1779253507; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=LqpEK3IDu8ExxcMIK6EkbBP8K8GG72sBYfUfxTPCGnU=; b=HxVd2c6ywcdC9hZXKyfgeEl/5hahhN2UR0jI+LYiwaJKFC+ADVCAqViq9dxEUzqsOF EK/HYb8ydPuxDhSeT00B9Hi0KPzon0JXHoo5A1Guxq6AOdXNqyIsFctLHH4vtYAQVLN2 jqms1X2rOCuWVr+IdkoZ41HIjtdEPq4DVGDzE5/llY4NFc4PkgHsCo1zIoBli3sfGjHm O5rBOAg2dfSYxQovU6iE7Mqt5jFteAQ/alUhBux+gvf/5bUa4f4pZFAJv8kVzHJhY2h3 JoMZWIsLtlz5+MffW/1jMiqBTyINJ3tLUpCqEQnp7DyW5ovllhRYdvYW/un/1XzyEpvZ TPFw== X-Gm-Message-State: AOJu0Yy23yZ9Iy0mu+monMu0lalajMUNN+6cX5gXEuha6U4BKGtYZJPN cy67Fd3sFm7fAVFSGq4UFhqplrjzehxGFaxPT1Ydzj2opyhXGmVVEomR++nO6Ma/ X-Gm-Gg: Acq92OFcpSCVp2IOLsq2wDzgy1RKY5CvoPHGOwpSQNN6AGbZ9JuoHGk/ccR+y+JQCHq xWCJGnfQqM8YVQ18HFFN5ekpYErkexp0/DZxPwWsVCt5ALGhJmP/Nz7U3qNf1H2NLJ7d/FbQVME 4DD6RdCu5oQfAJ/RM2gzQh20Zg1c8dngXWuLxVBzZLdhWBrDDr+Dy0fM0ASUqOgdV6aiGHdEfs6 4I/XKSM/Qih5CrO9YzmScl4noFkwcJzYQZkBrV2/HrL9sZFFEht5qy4e9vo3Bk7WJn3PeJkBPu1 gpoeSv6rjF8VDS7bPAphIBIpxQvj9nxFimeKF0EEjAd4VdRNdYoSqwff6GLJRMKDwhXz9n2Q/Ip Z3/rZYM08NORYOl/R6JaFoNIxbbPs5ZRT/Hcfga3hPqZiQ1KIiLzQNieT+hVEUo+JXURXBn8WnE g7STCy1VTGWrOFH774wQNgEtEQopJFoNfMSa7a X-Received: by 2002:a17:90b:1b0d:b0:35f:b5df:453 with SMTP id 98e67ed59e1d1-368f79cd1dfmr1258351a91.22.1778648706749; Tue, 12 May 2026 22:05:06 -0700 (PDT) Received: from NVAPF55DW0D-IPD.. ([203.211.108.128]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-368eddf5c58sm1696900a91.1.2026.05.12.22.05.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 May 2026 22:05:06 -0700 (PDT) From: ankur.tyagi85@gmail.com To: openembedded-devel@lists.openembedded.org Cc: Ankur Tyagi Subject: [oe][meta-oe][scarthgap][PATCH 5/8] lcms: patch CVE-2026-41254 Date: Wed, 13 May 2026 17:04:46 +1200 Message-ID: <20260513050450.3515182-5-ankur.tyagi85@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> References: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 May 2026 05:06:09 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/126948 From: Ankur Tyagi Details: https://nvd.nist.gov/vuln/detail/CVE-2026-41254 Backport the patches referenced by the NVD advisory. Signed-off-by: Ankur Tyagi --- .../lcms/lcms/CVE-2026-41254_1.patch | 30 ++++++++++++++++ .../lcms/lcms/CVE-2026-41254_2.patch | 36 +++++++++++++++++++ meta-oe/recipes-support/lcms/lcms_2.16.bb | 5 ++- 3 files changed, 70 insertions(+), 1 deletion(-) create mode 100644 meta-oe/recipes-support/lcms/lcms/CVE-2026-41254_1.patch create mode 100644 meta-oe/recipes-support/lcms/lcms/CVE-2026-41254_2.patch diff --git a/meta-oe/recipes-support/lcms/lcms/CVE-2026-41254_1.patch b/meta-oe/recipes-support/lcms/lcms/CVE-2026-41254_1.patch new file mode 100644 index 0000000000..7bf46706e5 --- /dev/null +++ b/meta-oe/recipes-support/lcms/lcms/CVE-2026-41254_1.patch @@ -0,0 +1,30 @@ +From 524f3df7511b49543a65a7de2a08640777c1b29c Mon Sep 17 00:00:00 2001 +From: Marti Maria +Date: Thu, 19 Feb 2026 09:07:20 +0100 +Subject: [PATCH] Fix integer overflow in CubeSize() + +Thanks to @zerojackyi for reporting + +(cherry picked from commit da6110b1d14abc394633a388209abd5ebedd7ab0) + +CVE: CVE-2026-41254 +Upstream-Status: Backport [https://github.com/mm2/Little-CMS/commit/da6110b1d14abc394633a388209abd5ebedd7ab0] +Signed-off-by: Ankur Tyagi +--- + src/cmslut.c | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/src/cmslut.c b/src/cmslut.c +index 1ea61a8..3488d0c 100644 +--- a/src/cmslut.c ++++ b/src/cmslut.c +@@ -460,7 +460,8 @@ void EvaluateCLUTfloatIn16(const cmsFloat32Number In[], cmsFloat32Number Out[], + static + cmsUInt32Number CubeSize(const cmsUInt32Number Dims[], cmsUInt32Number b) + { +- cmsUInt32Number rv, dim; ++ cmsUInt32Number dim; ++ cmsUInt64Number rv; + + _cmsAssert(Dims != NULL); + diff --git a/meta-oe/recipes-support/lcms/lcms/CVE-2026-41254_2.patch b/meta-oe/recipes-support/lcms/lcms/CVE-2026-41254_2.patch new file mode 100644 index 0000000000..0602258ef5 --- /dev/null +++ b/meta-oe/recipes-support/lcms/lcms/CVE-2026-41254_2.patch @@ -0,0 +1,36 @@ +From 73ffd45705d368c159bb819ab0b1a033638c3ffe Mon Sep 17 00:00:00 2001 +From: Marti Maria +Date: Thu, 12 Mar 2026 22:57:35 +0100 +Subject: [PATCH] check for overflow + +Thanks to Guanni Qu for detecting & reporting the issue + +(cherry picked from commit e0641b1828d0a1af5ecb1b11fe22f24fceefd4bc) + +CVE: CVE-2026-41254 +Upstream-Status: Backport [https://github.com/mm2/Little-CMS/commit/e0641b1828d0a1af5ecb1b11fe22f24fceefd4bc] +Signed-off-by: Ankur Tyagi +--- + src/cmslut.c | 6 +++--- + 1 file changed, 3 insertions(+), 3 deletions(-) + +diff --git a/src/cmslut.c b/src/cmslut.c +index 3488d0c..f2d0ec4 100644 +--- a/src/cmslut.c ++++ b/src/cmslut.c +@@ -468,12 +468,12 @@ cmsUInt32Number CubeSize(const cmsUInt32Number Dims[], cmsUInt32Number b) + for (rv = 1; b > 0; b--) { + + dim = Dims[b-1]; +- if (dim <= 1) return 0; // Error +- +- rv *= dim; ++ if (dim <= 1) return 0; + + // Check for overflow + if (rv > UINT_MAX / dim) return 0; ++ ++ rv *= dim; + } + + // Again, prevent overflow diff --git a/meta-oe/recipes-support/lcms/lcms_2.16.bb b/meta-oe/recipes-support/lcms/lcms_2.16.bb index 8135f83a05..8a70572907 100644 --- a/meta-oe/recipes-support/lcms/lcms_2.16.bb +++ b/meta-oe/recipes-support/lcms/lcms_2.16.bb @@ -3,7 +3,10 @@ SECTION = "libs" LICENSE = "MIT" LIC_FILES_CHKSUM = "file://LICENSE;md5=e9ce323c4b71c943a785db90142b228a" -SRC_URI = "${SOURCEFORGE_MIRROR}/lcms/lcms2-${PV}.tar.gz" +SRC_URI = "${SOURCEFORGE_MIRROR}/lcms/lcms2-${PV}.tar.gz \ + file://CVE-2026-41254_1.patch \ + file://CVE-2026-41254_2.patch \ +" SRC_URI[sha256sum] = "d873d34ad8b9b4cea010631f1a6228d2087475e4dc5e763eb81acc23d9d45a51" DEPENDS = "tiff" From patchwork Wed May 13 05:04:47 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Ankur Tyagi X-Patchwork-Id: 87994 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4CD47CD4851 for ; Wed, 13 May 2026 05:06:10 +0000 (UTC) Received: from mail-pj1-f53.google.com (mail-pj1-f53.google.com [209.85.216.53]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.734.1778648709868652184 for ; Tue, 12 May 2026 22:05:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=hbUgAgH3; spf=pass (domain: gmail.com, ip: 209.85.216.53, mailfrom: ankur.tyagi85@gmail.com) Received: by mail-pj1-f53.google.com with SMTP id 98e67ed59e1d1-366330b6751so4198265a91.1 for ; Tue, 12 May 2026 22:05:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778648709; x=1779253509; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=WdEL8WXj2Dg8AqWMCxLxiONzsPqeWvqn1YusvonTc4I=; b=hbUgAgH3pjLcJ5YiisNYzZxxVEgD/yV3TUjngxsKPrHzBXGSPhetCDMpk+Gfnca49C xXd5sluUdc8f9ryU2cTP8njpWD288504+4mXhkag/4/lqwQup7TdO3Z8qrIGn2J5ZC9b HzG/tu85AVsa1Gyypd8EP6tbGr/rwY7caoxR07pBP/gwkPExO3jIJOTAwW6+SIV7WA05 ADbEBE5glmoZYc9qYMT2aTm1RUn7oQX16EUnNVF7pvGrLQXfYDA7CmZTDRkYHl9g+Jj4 PFey9rvuUadDY99GCuJMr7mQD3in5JKjMB/NqTQsot2LXrI4g9zhqpbqkTD+0w4qnTly SIDg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778648709; x=1779253509; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=WdEL8WXj2Dg8AqWMCxLxiONzsPqeWvqn1YusvonTc4I=; b=IYXZJjbGyiYslCX/pN3I6VUaG2+0B3rXdaab4WfO4Ck6ObO2WKGusoH+I4g38543Yf CcstPbWEuscI3KQ6m4QRmD2eYuWIBzEKitBDhFeMqQjAxDBSksRhsgDXjsR8IQrv/7cQ wlSF7OOOe7FXbWrH4Ww/bpK3MELXHl+y4xf5gY7FmCDPVIC6ibF1RKffO8CrH3bxHVIT dntQxPORw0lNrolzaOwYgmiyOodOo8FaU41l6Q7F7BrCo5MgLrSfmsZeqMA9v9cPRKcX HjuEdy5QvnGXEsK9wkWPQymnAyRYgbih0hGSaqW6KE+sBVZSFvQQmBuYURKkJoS/ftMM wbsw== X-Gm-Message-State: AOJu0Yz8d1AN3ektduWa4xJdmP8fnLKFm9682gM4ghGluWa9jmjKKdmq X+F6hCdaIrStZW4oZhKeCaKvRCZEzheor6Ha8ujSAhSfkVOrdWCmChV8aDWEpBgN X-Gm-Gg: Acq92OFkhOma+pBvSDMotuoTJTwnLKnKZP1eW5f77IbnLAspKWNS2chDQ8c0NiZhdap ra9stHphdDiMVsZQd22pkZ8Keb0jBxh8bcpZqezwTv5OmHhFvII0pyXHwf1J8OAJFrJTPc+FZGc PLCKtz+s6aV1WL8OQcA1/+254fpBM+dnBZ1Ngg1Pirqg8DTxHSXvhiAEJ5Wbu9fIZlcLpaVwpzi OBXzzfVaGxrBhiJRjxtOaVC71cb47mH9wwhBoSoejZlquC9fg4/58CXhvahIbpmz9wcvHeENwIa 0o3BBJlN/7cNd3kIXvdA9fai3Aa90B0a1D82g4sHQbFX5nv1EbGPomIfg4oq9dDaHdiDvk/hG7A Hq5+W3+EfoEnsRUGqhVQQRm3CvcEP9LOIYxlYziSNnwUtrFKjibGIKDYPNSCTZRO7d2cHuvxQYn G0Vo9u8XXWBiwksFT44bIQGUzXx/Or3lIq5r/aQlPL6i7I9lY= X-Received: by 2002:a17:90b:54cc:b0:368:ea0c:1b75 with SMTP id 98e67ed59e1d1-368f77f0effmr1352133a91.6.1778648709047; Tue, 12 May 2026 22:05:09 -0700 (PDT) Received: from NVAPF55DW0D-IPD.. ([203.211.108.128]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-368eddf5c58sm1696900a91.1.2026.05.12.22.05.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 May 2026 22:05:08 -0700 (PDT) From: ankur.tyagi85@gmail.com To: openembedded-devel@lists.openembedded.org Cc: Ankur Tyagi Subject: [oe][meta-oe][scarthgap][PATCH 6/8] lcms: patch CVE-2026-42798 Date: Wed, 13 May 2026 17:04:47 +1200 Message-ID: <20260513050450.3515182-6-ankur.tyagi85@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> References: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 May 2026 05:06:10 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/126949 From: Ankur Tyagi Details: https://nvd.nist.gov/vuln/detail/CVE-2026-42798 Signed-off-by: Ankur Tyagi --- .../lcms/lcms/CVE-2026-42798.patch | 38 +++++++++++++++++++ meta-oe/recipes-support/lcms/lcms_2.16.bb | 1 + 2 files changed, 39 insertions(+) create mode 100644 meta-oe/recipes-support/lcms/lcms/CVE-2026-42798.patch diff --git a/meta-oe/recipes-support/lcms/lcms/CVE-2026-42798.patch b/meta-oe/recipes-support/lcms/lcms/CVE-2026-42798.patch new file mode 100644 index 0000000000..1fc3b0ca6d --- /dev/null +++ b/meta-oe/recipes-support/lcms/lcms/CVE-2026-42798.patch @@ -0,0 +1,38 @@ +From e5638450eafbe2e79b4dbbf9fcbc47998cf35427 Mon Sep 17 00:00:00 2001 +From: Marti Maria +Date: Thu, 19 Feb 2026 08:48:50 +0100 +Subject: [PATCH] Fix for ParseCube integer overflow in LUT allocation + +thanks to @zerojackyi for reporting + +(cherry picked from commit 6a686019825a89b715d16671f18d049523354176) + +CVE: CVE-2026-42798 +Upstream-Status: Backport [https://github.com/mm2/Little-CMS/commit/6a686019825a89b715d16671f18d049523354176] +Signed-off-by: Ankur Tyagi +--- + src/cmscgats.c | 11 ++++++++++- + 1 file changed, 10 insertions(+), 1 deletion(-) + +diff --git a/src/cmscgats.c b/src/cmscgats.c +index bccbf58..b099331 100644 +--- a/src/cmscgats.c ++++ b/src/cmscgats.c +@@ -3128,7 +3128,16 @@ cmsBool ParseCube(cmsIT8* cube, cmsStage** Shaper, cmsStage** CLUT, char title[] + + if (lut_size > 0) { + +- int nodes = lut_size * lut_size * lut_size; ++ int nodes; ++ ++ /** ++ * Professional LUT‑generation tools (e.g., Nobe LutBake) list 65×65×65 as their highest supported size. ++ */ ++ if (lut_size > 65) ++ return SynError(cube, "LUT size '%d' is over maximum of 65", lut_size); ++ ++ nodes = lut_size * lut_size * lut_size; ++ + + cmsFloat32Number* lut_table = _cmsMalloc(cube->ContextID, nodes * 3 * sizeof(cmsFloat32Number)); + if (lut_table == NULL) return FALSE; diff --git a/meta-oe/recipes-support/lcms/lcms_2.16.bb b/meta-oe/recipes-support/lcms/lcms_2.16.bb index 8a70572907..7544e83578 100644 --- a/meta-oe/recipes-support/lcms/lcms_2.16.bb +++ b/meta-oe/recipes-support/lcms/lcms_2.16.bb @@ -6,6 +6,7 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=e9ce323c4b71c943a785db90142b228a" SRC_URI = "${SOURCEFORGE_MIRROR}/lcms/lcms2-${PV}.tar.gz \ file://CVE-2026-41254_1.patch \ file://CVE-2026-41254_2.patch \ + file://CVE-2026-42798.patch \ " SRC_URI[sha256sum] = "d873d34ad8b9b4cea010631f1a6228d2087475e4dc5e763eb81acc23d9d45a51" From patchwork Wed May 13 05:04:48 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ankur Tyagi X-Patchwork-Id: 87995 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 56B40CD484C for ; Wed, 13 May 2026 05:07:09 +0000 (UTC) Received: from mail-pj1-f43.google.com (mail-pj1-f43.google.com [209.85.216.43]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.735.1778648712226934108 for ; Tue, 12 May 2026 22:05:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=f5APp1sE; spf=pass (domain: gmail.com, ip: 209.85.216.43, mailfrom: ankur.tyagi85@gmail.com) Received: by mail-pj1-f43.google.com with SMTP id 98e67ed59e1d1-36900945df5so62311a91.0 for ; Tue, 12 May 2026 22:05:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778648711; x=1779253511; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=fSm1YmoHNRD9ju//CUZf5Xrvbt6eYvZxeEW+zs7Zh2U=; b=f5APp1sEI+/YjlhqLZEXo+zeq5P1IyUkjFqjJbRz9yG6ZjlhGyH+zSNazt6MvyEdMv /bHCvXzIRp1vSJPVJqFc1fSbctEf43wlRQLb3j0MTDEMGeu6ry9w/9+PxK+n1XCiQ8g/ u0M1yU2vrSMMADSiKz99itPiC65R82QDRVFy8m5z4dOo3b6/NknMCccUNkZu2FSdxGBk cI7HgbP4bwTjOTP31Y8PywVmscLWfTgT+xQvFSuTr5ftuDxC/tuHg0qGkhwo7+rddFkg aobWScDJs9X1okwOLCx4td7KvCgZXgntyT2jml67ttz/Prg+xQeWUOAW6LLl/idpRX1l 8e+g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778648711; x=1779253511; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=fSm1YmoHNRD9ju//CUZf5Xrvbt6eYvZxeEW+zs7Zh2U=; b=apY9oIz8HXP16FPTcm3DkV8AT0WTeCPsW/2+Zf1BK0t81HZWvyB+GJeh75600G/Ci/ NC1zm7jyHUW/Z0o4gytHjon9ivwXqTt5wNjFBee7DjDYccl17b/b4V04/Tbhfp+lUvX6 hdwfN5pRmHZFZtuGYvZl2xs3ujlIfN7O/YRtluJOGxrm2Vlifkne2U3m4/vsu7xNkQ1A H8TQOOYcehuhtjtzkFjCKipPdsojd8XLRXVI9B8z+0l/FwTHruaundNI+pJEU/UgjZLE GdHJku/b70HL5IHTtoHdbDrsecogCVeidGF37FxTX0RW1ON5YrFB/tU8l8vpnV9sA4so ADOg== X-Gm-Message-State: AOJu0Yw35mHOIt4RxzhXEfnljvva17tZFLk9TsxhgD/UJlHITbCVFjPH 6UYEJwzAkWoG+xZcdpzoknOnmoXWxA9tRn8Xi+qQC32Ju3xEta2bZr+Yh/OCsiKT X-Gm-Gg: Acq92OF0G2ZL5B9U11qeqYIhCRP9McX6wdywlb4npmOrte06f1q20UZ+siOSkk828I1 1RfCaA03xW6Q4L7V/gJ0HrWHLKTqHvvCkDV0aDaX97HUTrKThgmq87dQJXmtSCPyY0qYV9yY9CB gmovqsupHZGPohw0kbqxTG5BgEyWx/VGOoJ0lYGOO9fT8FVjczQmtcysyI+borM9u3yizhFCaXa erFMg0mnsiEZf11h/meIAi+WqeEBToFKqUQN4+waDVAzxKSAsI2lQAycRj8xhEx3KBm52xN2ZTm oXZ60Sxjbkd9IR/4gwj8Mhn7BFvx/qSvcTvjIUMmFFVShdqKgYGXQmMgt9RbJMM4Bhf9pAuFJYd sZBu8lJ1dMngZrywEnIw3zuoTIMsp4TUp7fagqLohcSlrWqUFprjiWwT0L5x3WfzKG26LWjLWw2 +bsAlb60q1PfpZA6fLn77goVDurdfqoJu2CsSxIbaZ46c4/4E= X-Received: by 2002:a17:90b:3a44:b0:366:2e1f:393 with SMTP id 98e67ed59e1d1-368f79beb13mr1428618a91.21.1778648711395; Tue, 12 May 2026 22:05:11 -0700 (PDT) Received: from NVAPF55DW0D-IPD.. ([203.211.108.128]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-368eddf5c58sm1696900a91.1.2026.05.12.22.05.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 May 2026 22:05:11 -0700 (PDT) From: ankur.tyagi85@gmail.com To: openembedded-devel@lists.openembedded.org Cc: Ankur Tyagi Subject: [oe][meta-networking][scarthgap][PATCH 7/8] postfix: upgrade 3.8.12 -> 3.8.16 Date: Wed, 13 May 2026 17:04:48 +1200 Message-ID: <20260513050450.3515182-7-ankur.tyagi85@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> References: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 May 2026 05:07:09 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/126950 From: Ankur Tyagi 3.8.13 http://www.postfix.org/announcements/postfix-3.10.6.html 3.8.14 http://www.postfix.org/announcements/postfix-3.10.7.html 3.8.15 http://www.postfix.org/announcements/postfix-3.10.8.html 3.8.16 http://www.postfix.org/announcements/postfix-3.11.2.html Signed-off-by: Ankur Tyagi --- .../postfix/{postfix_3.8.12.bb => postfix_3.8.16.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta-networking/recipes-daemons/postfix/{postfix_3.8.12.bb => postfix_3.8.16.bb} (99%) diff --git a/meta-networking/recipes-daemons/postfix/postfix_3.8.12.bb b/meta-networking/recipes-daemons/postfix/postfix_3.8.16.bb similarity index 99% rename from meta-networking/recipes-daemons/postfix/postfix_3.8.12.bb rename to meta-networking/recipes-daemons/postfix/postfix_3.8.16.bb index d3c91782e7..1c31130c04 100644 --- a/meta-networking/recipes-daemons/postfix/postfix_3.8.12.bb +++ b/meta-networking/recipes-daemons/postfix/postfix_3.8.16.bb @@ -28,7 +28,7 @@ SRC_URI = "http://ftp.porcupine.org/mirrors/postfix-release/official/postfix-${P file://0005-makedefs-add-lnsl-and-lresolv-to-SYSLIBS-by-default.patch \ " -SRC_URI[sha256sum] = "0fdabc9f272ee6c85781750dbd2642920701795f948f2fd3abe7b46a1f5160a9" +SRC_URI[sha256sum] = "54244c05f71cfa22adc70506b8ef7e17cb55e18ac2595332ec629d8ea0f0e5f4" UPSTREAM_CHECK_REGEX = "postfix\-(?P3\.8(\.\d+)+).tar.gz" From patchwork Wed May 13 05:04:49 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ankur Tyagi X-Patchwork-Id: 87996 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 736C6CD37B6 for ; Wed, 13 May 2026 05:07:10 +0000 (UTC) Received: from mail-pj1-f52.google.com (mail-pj1-f52.google.com [209.85.216.52]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.724.1778648714938161614 for ; Tue, 12 May 2026 22:05:14 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=GtPRa1ai; spf=pass (domain: gmail.com, ip: 209.85.216.52, mailfrom: ankur.tyagi85@gmail.com) Received: by mail-pj1-f52.google.com with SMTP id 98e67ed59e1d1-3660daea6a5so3427277a91.1 for ; Tue, 12 May 2026 22:05:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778648714; x=1779253514; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=SXWEPdMXIKrI+3EX58k2FLXzDEkjzOYpnqF+XVpnlEk=; b=GtPRa1aiF+2WhLpPfjTh0B6KVSk/ikEOYfkiH1NdFOyg1F9rlbcrDsVq5YBM00pyVQ Nsq99s7m7ETApZ9hxLakUdZcpCJeSE2DFuyTQpzG66x5O/SBwp6W/sMJaVSLzLCA3iZK HBtDQkqMHVE2N2HHXvjZH2IldrmiK39WxZuvl1ex3ur8r2KzosAxPvyQ4jLUPcM4DAC/ VS5CyBaNFwQwkNimu9wPrV2ZjdwPm6l2l/tDM3C9+/O8m1FushfaqzdhL8gcI0Uzasb+ E8ZKMi9HpX4XuNkGmv10EzJ6AUlVGi9BApRPsfkyFL3wrNrxW5rcO+MQ6KYITjrTCyWX 2OTw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778648714; x=1779253514; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=SXWEPdMXIKrI+3EX58k2FLXzDEkjzOYpnqF+XVpnlEk=; b=AS7yAhg5UUUpkz40FS/7VYrUqBdFvxZ1mt17KgjC8QIvi6uPVtAaoHcE28kBwGbzn8 pX3xXVWzeOCJpUB2/pmkRKdD8yRBL2FARrRqjpYaINjyoYWPUD7X7nE2nnTZi8ZzUEjZ AaD6neS4dzdwu8vJs2His1L4a0ZQzFXxvT0Jbl8RkGvCNlFQDRRHST0HYDFXBWfNPO3t xI0DjrIuVujPem6XDleMAprC7yaAaB1rH57bH3FAYydEMk0vk1JzrIWLsZOUEWYpD0K4 z8q8G77LllK5n68fTCK0+as7b9isXpSWqazu28wqc8v2Lus8GbBxH8Qm59BsqkDSYT6O P3Iw== X-Gm-Message-State: AOJu0YwNlm3J9obr/V9F2gt7EuEBLJ7g+q+TksXrl7OGrWNM373TJ/aw UhMMJbiXWgUgbhZiYLtnFFO3dIMbQibnGZQuVwjw/J9dzug9QN2gVXb/GNnkaSSP X-Gm-Gg: Acq92OEu+2THCja9cZR7JM9AKesFkjXPOOQ4ZpPbS0U5l+rBsLx6+qWk/SmQHDEQDVG nc9CS5WyBnLhmBt+MqWr9DQ9fu8duQfamPj4JTVT0JT5E4btldN17/LGajSiIrbHmwo4jvHrCX0 yaRLJk20FHSOYrEALaSUZC+s1X6eKxnvU8IL2vA0C4DA66RCxIX7snNYWTm4osDpgKySD2cFelg TlUCe1hNZ3buOzDlp/vQ79wv6N0aCylezq75eexWRgRPAA+YcN7BAu45FaUg+G0UyWDirhPPMFL 3UG3D2QCO6i7QYw6/UD+EN+DqQqeOk2byZ5AEtRjIanD3okjMcLSlkGa/r/rJ+j3yo+knlxbjTC VFngiDds5yXtvm6EovlGQ9eSDzHIAXDVNs/f8khPDVY6Yuc9jrT+CiXnBn/55CDRPLOYp+i3+5p bSfmQe6VaX+5Xsu0nfBWxjXpcLIaMnHKf8kXeD X-Received: by 2002:a17:90b:5590:b0:35f:b288:8e4c with SMTP id 98e67ed59e1d1-368f7990c63mr1254407a91.15.1778648714045; Tue, 12 May 2026 22:05:14 -0700 (PDT) Received: from NVAPF55DW0D-IPD.. ([203.211.108.128]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-368eddf5c58sm1696900a91.1.2026.05.12.22.05.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 May 2026 22:05:13 -0700 (PDT) From: ankur.tyagi85@gmail.com To: openembedded-devel@lists.openembedded.org Cc: Ankur Tyagi Subject: [oe][meta-networking][scarthgap][PATCH 8/8] nanomsg: upgrade 1.2.1 -> 1.2.2 Date: Wed, 13 May 2026 17:04:49 +1200 Message-ID: <20260513050450.3515182-8-ankur.tyagi85@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> References: <20260513050450.3515182-1-ankur.tyagi85@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 13 May 2026 05:07:10 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/126951 From: Ankur Tyagi Changelog: https://github.com/nanomsg/nanomsg/releases/tag/1.2.2 Signed-off-by: Ankur Tyagi --- .../nanomsg/{nanomsg_1.2.1.bb => nanomsg_1.2.2.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta-networking/recipes-connectivity/nanomsg/{nanomsg_1.2.1.bb => nanomsg_1.2.2.bb} (94%) diff --git a/meta-networking/recipes-connectivity/nanomsg/nanomsg_1.2.1.bb b/meta-networking/recipes-connectivity/nanomsg/nanomsg_1.2.2.bb similarity index 94% rename from meta-networking/recipes-connectivity/nanomsg/nanomsg_1.2.1.bb rename to meta-networking/recipes-connectivity/nanomsg/nanomsg_1.2.2.bb index c250ea8779..04cffe8791 100644 --- a/meta-networking/recipes-connectivity/nanomsg/nanomsg_1.2.1.bb +++ b/meta-networking/recipes-connectivity/nanomsg/nanomsg_1.2.2.bb @@ -10,7 +10,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=587b3fd7fd291e418ff4d2b8f3904755" SECTION = "libs/networking" SRC_URI = "git://github.com/nanomsg/nanomsg.git;protocol=https;branch=master" -SRCREV = "fc3f684a80151a3319446fc96083a9ff384ee4fe" +SRCREV = "ccd7f20c1b756f7041598383baffcdc326246db7" S = "${WORKDIR}/git"