From patchwork Tue May 19 23:29:38 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88440 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5AC28CD4F54 for ; Tue, 19 May 2026 23:30:29 +0000 (UTC) Received: from mail-wm1-f43.google.com (mail-wm1-f43.google.com [209.85.128.43]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.999.1779233428093895874 for ; Tue, 19 May 2026 16:30:28 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=0F7jIdUn; spf=pass (domain: smile.fr, ip: 209.85.128.43, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f43.google.com with SMTP id 5b1f17b1804b1-488b150559bso32055375e9.1 for ; Tue, 19 May 2026 16:30:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233426; x=1779838226; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ZMV29VW6b84CdmPUx1dcS4TbXLj1HRyAz8Fz3ImjDBc=; b=0F7jIdUnMG4B5knlLCF2P7Xle3k0MO+wOmaQQHUjmzVdzO+uJOO0B2FCFCtACmX5wp /SkAgZVFLRX4zLOH47/7yb3b2mTT29T09MvTn1md3zEx/A86RqCDjz9263TqMbI6bzpG pr0wq0qp2R5LTxSgHZY1oSXPoCDSpdAS6p02w= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233426; x=1779838226; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=ZMV29VW6b84CdmPUx1dcS4TbXLj1HRyAz8Fz3ImjDBc=; b=obENlMjnshcVn31QHQ9B5zMV60+77iSd7x7w6zmYfKOEveuYe0TdBkoSqgELxAibMc qPOOiHUBOC+hfSq7LatDe0mN8iL4fY0O2CHt7NGnER+70BaFZAe6qxHz6NVrQsuhpcq7 X3kSpCbLKRKEFgDrmzkfHlwLeN7K8aW1A2S+/yVJX3BGfcG/LK1T/fa3gbtTBJyeRQqF RDnraqrP80BzIf2hoEW8cXC5YdyTjlmLncp9lnpo46pT/el+EECPcSF2bqpwKA+DOp+s R88YgWryQG8O3A0L8ThIV4WhuajU3vGdF0/VeQz5Gex0p9Xy1kHMUVjkqJBmwV4lLWe/ l4Ug== X-Gm-Message-State: AOJu0YxPlSgNm23bIWlBkYy3Znbg/skFSYnrcq6/nlXdlAvHiU301zYj K6JMSnlazmybFEZro8WcXiGYk+kg9ZoX+dcBNQE+iPENv3UFNJcHFfFPbJ+JVO7JKmhyupwwbW6 yOwCm X-Gm-Gg: Acq92OEet2G5HJ1Ol6hNGdMmo4pjyQ258XUtoW9Pk0KNGdwqTj7cLQeC2GzEFK7zggr FjY9vBD8fc11PCi9xgbhB7qM5Al2+2Ru7DyI0X7fTlJmKzVL3c0WHUUrzEZT4wFR0YHUsXZqh65 TuH0QQtvoXOGuZG8aWr69bZWMTvnPeBmTwbJgb7YQAldsEtJijWJlRI22AHTir3Yqbh54sryvYO cLQ0EnugnF+P1u6OdXNAPy7rEkYsQ3ESIyj+wQg/aFTHxuTgZfX81TCB8FyZgxVCuglyPFFSOGf X/R4Mvx0lgUth1i1aKBPBRWtO/zDP/d6/5fSwOD38SGdgJcpbgRuswGTMcF/+Vm2xSaJ0V/2Ppm /R9p7ScfIWY7nkgWMZicHlrbrrpWiGBL5CVptI3/S4eiBlV9zt1jpKAWhCShGxEq8YtzQ+JOjLt ZSa/Zfyn7ZpGz2h/p5S0M/W6+Ljhnu7pIiwizdz0OgnEW824AjZKJBDOm+FUgxQRrc8DBkuA1sO FrdLc5RZwaUN5E0jStdAzKB3fQ= X-Received: by 2002:a05:600c:3492:b0:48a:52ee:5776 with SMTP id 5b1f17b1804b1-48fe60e79eemr340038615e9.11.1779233426122; Tue, 19 May 2026 16:30:26 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:25 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 01/28] README: Add wrynose subject-prefix to git-send-email suggestion Date: Wed, 20 May 2026 01:29:38 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:29 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237348 From: Yoann Congal That might help new users send correct first stable patches. Signed-off-by: Yoann Congal --- README.OE-Core.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.OE-Core.md b/README.OE-Core.md index 4804e436322..15b0fbec976 100644 --- a/README.OE-Core.md +++ b/README.OE-Core.md @@ -26,7 +26,7 @@ As a quick guide, patches should be sent to openembedded-core@lists.openembedded The git command to do that would be: ``` -git send-email -M -1 --to openembedded-core@lists.openembedded.org +git send-email -M -1 --to openembedded-core@lists.openembedded.org --subject-prefix='wrynose][PATCH' ``` Mailing list: From patchwork Tue May 19 23:29:39 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88455 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E276ECD5BB5 for ; Tue, 19 May 2026 23:30:40 +0000 (UTC) Received: from mail-wr1-f43.google.com (mail-wr1-f43.google.com [209.85.221.43]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.950.1779233428840990688 for ; Tue, 19 May 2026 16:30:29 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=zZLJLKIf; spf=pass (domain: smile.fr, ip: 209.85.221.43, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f43.google.com with SMTP id ffacd0b85a97d-44a5174670eso2339009f8f.1 for ; Tue, 19 May 2026 16:30:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233427; x=1779838227; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Byr2DJiLDcuepDfs8WDKma8Gg647t61r7Tuty5jeuvc=; b=zZLJLKIfom31MwYjWLnLqvuPbO63B6BO3YAXtqwuRD1Tcm/kVaQ+ypQsVAczd7AcQU Q4KSF8jsPwkrl3qqbWexfn6KMQmt5QNNsKwKt6n01NlzLi5UVXKl35PAtHviMTho6ItQ cB8vEi0JP7bJvUc9qgkh5xmHnUWLKKzj0hssQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233427; x=1779838227; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=Byr2DJiLDcuepDfs8WDKma8Gg647t61r7Tuty5jeuvc=; b=AaPIS13WqT4bMjjg71b5yg9v52ZTzqX2Z0liFmhaP0P/NvFReIIVQC0YtJYKGRvrW8 G0WfnyUDpV2ZPj5F8GL7MgaEtL+DRpgPvac2+uCiRQy9HAanmRo2WUEesFg+oLFz1Tng YuMU+DdLn+eg/65n9IuzG0QBx1J/1g69YP2guPbnOCwZtn2CR5BD/nJ+3B1DRH9VoLzB lKj3wPWvT5bNHZ8D5WyU11uFGNi72tEnCMuMuxRXubgCdnXwnsJ5eSgf8idnYAUxagPc cpCkQ5cx+yvSM71/uKCVWadmzFnn75yP8U8sDzXiUoKPUxnW0nsVzZorJyl4XLm1EvUp lGfA== X-Gm-Message-State: AOJu0Yxswt4cRIY2V4WY8qyqi5DpD+IZGmZlq1ELF6BjeeTqjMxho//s dHEQYR2T99SdVyMO8fkOmrKnOj2lnRad+tu0pcm/O0M2C+GeBkOKhKchEg11QsPWgSR7c0B0wCS 47qRL X-Gm-Gg: Acq92OFdNRGdCPuS4GCHgDo2OBccrJzggue6VTI4ARggRb/6d1b1aF5mJd5lbiQZ5Lw /jkEFckLh1gDqluxTfWN9gG19E23+FAbl+8IgBN4HRYTW0yeVwPWKOcUr96MP0E6Fc73oCh66e7 JomHBU9fFohTl3vBfvhKwMTUOk6JgWdb8qIe40PFiQx8wdBvAeLstQ/KV7oyGcvTsIXFXxxTXmo UamjQyIILy3EU7YMbChZ5puPmzuA+aQhU34ZiuJjYwClEF/qIoT2CYGByeQlJKA4bCkojaXkXNH iF2hA1zdOO+UadALUEvc8QIalWACwRTgJ0TL0qGTDluDnEqQIohPEhDS6+bk53cAkKyJefIQUoo VSrTZESIui6WkX9GwdFyx1K2go6efuwPCi1A5q00BTbPk6C43i0D2UVrJzf9ikCyTpX9SMvz7Z3 DJspoQGjGrQq4MvL6eVpGiy2JTIHTJUxtUrYGrH9KJ+T9QirNy3P5wla8tXwShrsxSCNoE63NZa PscDuBG8v7dQ4AryLQgtqlsKKxRpVpLy9KqIA== X-Received: by 2002:a05:600c:8b45:b0:489:1ba8:5bf0 with SMTP id 5b1f17b1804b1-48fe63253f3mr320471915e9.21.1779233427083; Tue, 19 May 2026 16:30:27 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:26 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 02/28] python3-requests: Increase chardet upper limit Date: Wed, 20 May 2026 01:29:39 +0200 Message-ID: <545fadfed8c87d1d7d112eb78d59dfa9e815b1d4.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:40 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237349 From: Daniel McGregor OE Core includes chardet 6.0, while requests warns for any version greater than or equal to 6.0. Not for any real reason, but because it was a higher version than what was released when requests 2.32 was released. Signed-off-by: Daniel McGregor Signed-off-by: Yoann Congal --- ...01-Increase-chardet-upper-limit-to-8.patch | 25 +++++++++++++++++++ .../python/python3-requests_2.32.5.bb | 1 + 2 files changed, 26 insertions(+) create mode 100644 meta/recipes-devtools/python/python3-requests/0001-Increase-chardet-upper-limit-to-8.patch diff --git a/meta/recipes-devtools/python/python3-requests/0001-Increase-chardet-upper-limit-to-8.patch b/meta/recipes-devtools/python/python3-requests/0001-Increase-chardet-upper-limit-to-8.patch new file mode 100644 index 00000000000..662049ef94d --- /dev/null +++ b/meta/recipes-devtools/python/python3-requests/0001-Increase-chardet-upper-limit-to-8.patch @@ -0,0 +1,25 @@ +From c6a303bc6ea1d1d2ee5be86c4eed92cbb325c1fe Mon Sep 17 00:00:00 2001 +From: Dan Blanchard +Date: Mon, 2 Mar 2026 17:49:19 -0500 +Subject: [PATCH] Increase chardet upper limit to 8 + +Co-Authored-By: Claude Opus 4.6 +Signed-off-by: Daniel McGregor +Upstream-Status: Backport [https://github.com/psf/requests/commit/b2a1d33f571518ca9a6148e7da787cc5827f897a] +--- + src/requests/__init__.py | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/src/requests/__init__.py b/src/requests/__init__.py +index 051cda1..f22eb37 100644 +--- a/src/requests/__init__.py ++++ b/src/requests/__init__.py +@@ -76,7 +76,7 @@ def check_compatibility(urllib3_version, chardet_version, charset_normalizer_ver + major, minor, patch = chardet_version.split(".")[:3] + major, minor, patch = int(major), int(minor), int(patch) + # chardet_version >= 3.0.2, < 6.0.0 +- assert (3, 0, 2) <= (major, minor, patch) < (6, 0, 0) ++ assert (3, 0, 2) <= (major, minor, patch) < (8, 0, 0) + elif charset_normalizer_version: + major, minor, patch = charset_normalizer_version.split(".")[:3] + major, minor, patch = int(major), int(minor), int(patch) diff --git a/meta/recipes-devtools/python/python3-requests_2.32.5.bb b/meta/recipes-devtools/python/python3-requests_2.32.5.bb index 3477a5d83e9..4c58436cef4 100644 --- a/meta/recipes-devtools/python/python3-requests_2.32.5.bb +++ b/meta/recipes-devtools/python/python3-requests_2.32.5.bb @@ -8,6 +8,7 @@ inherit pypi python_setuptools_build_meta SRC_URI[sha256sum] = "dbba0bac56e100853db0ea71b82b4dfd5fe2bf6d3754a8893c3af500cec7d7cf" SRC_URI += "file://CVE-2026-25645.patch" +SRC_URI += "file://0001-Increase-chardet-upper-limit-to-8.patch" SRC_URI:append:class-nativesdk = " file://environment.d-python3-requests.sh" do_install:append:class-nativesdk() { From patchwork Tue May 19 23:29:40 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88448 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 30B04CD5BAE for ; Tue, 19 May 2026 23:30:40 +0000 (UTC) Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1000.1779233429687626668 for ; Tue, 19 May 2026 16:30:30 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=KjodVWFr; spf=pass (domain: smile.fr, ip: 209.85.221.46, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f46.google.com with SMTP id ffacd0b85a97d-44e1860558fso2575284f8f.0 for ; Tue, 19 May 2026 16:30:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233428; x=1779838228; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=M4JXqQByZ+Me07AwHDolIqgwY/x5/y5/bEcE24PbIYA=; b=KjodVWFrL5xlpSKFp55MLBlIJxuu1240GgcnSd9Z9djMUyXrXyN3O170gaXZWVat56 pmmuW/042RyhUMpGYziboYoTNka1tipdCLvS13MpM4miJJE+YqsSzF3tEj5KW+SFGqf/ 7NNUxRPgQe7kk2U0xUVkPYPPHqtoqhqEIMxSI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233428; x=1779838228; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=M4JXqQByZ+Me07AwHDolIqgwY/x5/y5/bEcE24PbIYA=; b=V3Y5WE61ena/3+pC0cDwfnF2Nlh9IpMbdg2M8mEayNpEE5K5zDjb7KvbkwJfHv1+xa u9yXjJOISf2zuMGQw5G8FxvUSs5zznsAta54J9F6iOEe9msQUsKFR6SEMOGd5FNz7TZn PB76PJFsiKZxviJ95rfpTqRjpu4AZKhcHlGbn/EEsqFbJVrQe/z5q5CnfPjhu2o+hWBG /B6bAVcebuAKyPH5b8aWwIXylS4iyf2zrI5fPx52SuLNcH/G4kvpp5+q+wIRhGOfTEGQ jYR/dUMAPziAouGNI+q09EX5cx9Iipasx0PmXQrAgE2DuQ/qjU4sINHR5qs2mKpXFCi4 AtcQ== X-Gm-Message-State: AOJu0YxYcnd70Pj0YV/6h9x+c5u4k+ug6yYEtpuW+wcO0MTi9enHovxk 9P+0d8SuPv/JbYMx4cxdatbkKvgzj9DOPTvvyRh+iFWci0qe0xPGcamMSG8z4khp2+bWWIoDrJW Vkq1t X-Gm-Gg: Acq92OF8kiOzX+vhKKg412G4QQCuAhdfeQirqEqrGyXtw76TZRV+xglFNuMBaYk+fUf zTnr/GcHLm9D3HkFLSeN/t4jEQIJYEiF8w9USvBE4jnmRXtyBdYQK/Jav10Chz2LHyKf80LfQ3z UVpmgXGlQJhJflgfvSbY01FWwOxmGdLdaQ+ywAJTf8qvPOge+25Iq/HD2c6ftl9OuvWW5OkdQe8 CcKWGrVR3o3cK/OoobnUaDsXlH815uWbs4uiBt2o3q1Ls13kQbmpRgiitrZpjDjnCS88Fhd1f7l 9jNO8ZYxnzVPYTdw11vd+zvWJYMRQkWpRYR34tYT3/nT8bOxcztO6LC/Ncw3clqZgFFn88vUNdC UJZvas5APgIqUUugkLiHet/Ft3PujSOl+EnuQ9aqsGcty1w+fbC7VRdDQiRl1IeMYYVy78calMA x4BAx/GK7IYvxrzfQNjy+D2qukLp9A4h7GrmXgEzFXzou6bWwOrkLiU8GOb35Sp2BYQzyyKRxGz xcUyNOTkKlUIcx0PoolKZyznr0= X-Received: by 2002:a05:600c:8209:b0:48a:58ae:993b with SMTP id 5b1f17b1804b1-48fe61f2a2fmr339504075e9.16.1779233427758; Tue, 19 May 2026 16:30:27 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:27 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 03/28] tzdata/tzcode-native: upgrade 2026a -> 2026b Date: Wed, 20 May 2026 01:29:40 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:40 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237350 From: Ankur Tyagi The 2026b release contains the following changes: Briefly: British Columbia moved to permanent -07 on 2026-03-09. Some more overflow bugs have been fixed in zic. Changes to future timestamps British Columbia’s 2026-03-08 spring forward was its last foreseeable clock change, as it moved to permanent -07 thereafter. (Thanks to Arthur David Olson.) Although the change to permanent -07 legally took place on 2026-03-09, temporarily model the change to occur on 2026-11-01 at 02:00 instead. This works around a limitation in CLDR v48.2 (2026-03-17). This temporary hack is planned to be removed after CLDR is fixed. Changes to code zic no longer mishandles a last transition to a new time type. zic no longer overflows a buffer when generating a TZ string like "PST-167:59:58PDT-167:59:59,M11.5.6/-167:59:59,M12.5.6/-167:59:59", which can occur with adversarial input. (Thanks to Naveed Khan.) zic no longer generates a longer TZif file than necessary when an earlier time zone abbreviation is a suffix of a later one. As a nice side effect, zic no longer overflows a buffer when given a long series of abbreviations, each a suffix of the next. (Buffer overflow reported by Arthur Chan.) zic no longer overflows an int when processing input like ‘Zone Ouch 2147483648:00:00 - LMT’. The int overflow can lead to buffer overflow in adversarial cases. (Thanks to Naveed Khan.) zic now checks for signals more often. Signed-off-by: Ankur Tyagi (cherry picked from commit dda7d55396e0c5258cba58af7e990ab3813bf108) Signed-off-by: Yoann Congal --- meta/recipes-extended/timezone/timezone.inc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-extended/timezone/timezone.inc b/meta/recipes-extended/timezone/timezone.inc index 00bb704e360..ff02416ed3e 100644 --- a/meta/recipes-extended/timezone/timezone.inc +++ b/meta/recipes-extended/timezone/timezone.inc @@ -6,7 +6,7 @@ SECTION = "base" LICENSE = "PD & BSD-3-Clause" LIC_FILES_CHKSUM = "file://LICENSE;md5=c679c9d6b02bc2757b3eaf8f53c43fba" -PV = "2026a" +PV = "2026b" SRC_URI = "http://www.iana.org/time-zones/repository/releases/tzcode${PV}.tar.gz;name=tzcode;subdir=tz \ http://www.iana.org/time-zones/repository/releases/tzdata${PV}.tar.gz;name=tzdata;subdir=tz \ @@ -16,5 +16,5 @@ S = "${UNPACKDIR}/tz" UPSTREAM_CHECK_URI = "http://www.iana.org/time-zones" -SRC_URI[tzcode.sha256sum] = "f80a17a2eddd2b54041f9c98d75b0aa8038b016d7c5de72892a146d9938740e1" -SRC_URI[tzdata.sha256sum] = "77b541725937bb53bd92bd484c0b43bec8545e2d3431ee01f04ef8f2203ba2b7" +SRC_URI[tzcode.sha256sum] = "37e9ed8427f5d3521c22fc58e293cbfb043d70eedf1003870b33f363f61ca344" +SRC_URI[tzdata.sha256sum] = "114543d9f19a6bfeb5bca43686aea173d38755a3db1f2eec112647ae92c6f544" From patchwork Tue May 19 23:29:41 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88452 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 81408CD5BB1 for ; Tue, 19 May 2026 23:30:40 +0000 (UTC) Received: from mail-wm1-f50.google.com (mail-wm1-f50.google.com [209.85.128.50]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1001.1779233430093726319 for ; Tue, 19 May 2026 16:30:30 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=NuWDVee5; spf=pass (domain: smile.fr, ip: 209.85.128.50, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f50.google.com with SMTP id 5b1f17b1804b1-488a9033b2cso34241545e9.2 for ; Tue, 19 May 2026 16:30:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233428; x=1779838228; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=/4XlJIzQ5ChvhcDMoRDlo67Z6JVWb63GAHO7Dr21kR8=; b=NuWDVee5GgzpXo2iaEt1zZMoM4wZdTMxr5siX3XKIWmlphwycBWEKUNOq0yO/mRmnD Wb46s4O4VZGTSQdh+PZCgEtNtz3Htj8TWIreTrFYERRgIgeI+8SsOfClmzZQeU1STJiW Vytot21dFE5Ky/l7W/iA//+bXNGRY4lDOx1zM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233428; x=1779838228; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=/4XlJIzQ5ChvhcDMoRDlo67Z6JVWb63GAHO7Dr21kR8=; b=kuYz5wDhQxpyDPw5tYc1A4/i9rGjIY1eL3AW2AAzA8kkmsXI3EQRAACqYprKspgo7L 81YH0Lpv765olI3u6gJ4L2m29jLkbgUKBpfwBxIRer8xjMh/kTAsjFAoXHi6uOXDOR8l YGB3BMLw++CRI35+CkFgBuhrigN/j2CtIc6v9omz4OGtMwIHohFHPfY+Qj+HMTvlBfY3 KJNL3IsgODy0KV8WttbqcDMQP61S83oe3eXffnLJ5atQdTqyL3nvuQERbwZjz1d9EeZD sTBVUxi42/Km/dP3BgnJ1Pos/e+bBGq6YAa0bc+feYs4hIJIJuBBPPzUELMxmm5vJ7Tq M3BA== X-Gm-Message-State: AOJu0Yz7bhxAAQiBNktZJ0QHymJyA5KiLdTSP6L5t5wY7fVzXJdnToz4 WC7rMQ6TVkUQYwp9xumknbYBQZx8YBE5XaVZ8y45IA5vky9jaxFUxDUi9DmLsOe1gIiH2/OSCKh +acVw X-Gm-Gg: Acq92OGv+iT5To7xw2nPLp1qqi5dofcH4FiKaI0m+RCaFWsIEvkKp7HnOwO/IN0t0YB uE0vxuD3yEpYuZ6D++Ex7QpjYx6ubhIOfycKYlptUEIklp2cn5EbLgIGSuv8L+kqsCRh1welu9I lD5pt1pq5Aei/gO4r1hDh5j+PLYsg0V2G4fjuAr4Ea7TaWPntuNBDxO3kOj63p/IkEAQihvFg/r t150anyQrUlUdPzHiip338L3ETEEUQ6uYjPSB3cg5iLy+NpKKD8TtxnOQBXLnmfv/Ylg/QFejWs 8AjcEaMLtEAJbZJV1OuG0s+FsP+rUUqniGWa7YiRQOSs3oTfhpgseDTuINNFRNRAMwmd72I3mRe uwaMsc4n7QtJA3tBxsKSe4k4+vkd55tDne3blM3Dm/5MjTKmIHg3gL5I2PLIfR6MM9zRlBFBs+Q yApgx5qw53fSmhSTuohGMXXdGc2ZO3YG6IrjteWgAIbsXdEVXcoQjuUmoD9CdFp6klgSuzBIzry AAMnw9OZNPn/YkebUdqWG7iKt4= X-Received: by 2002:a05:600c:450e:b0:490:778:4fe3 with SMTP id 5b1f17b1804b1-49007785042mr193034205e9.32.1779233428257; Tue, 19 May 2026 16:30:28 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:27 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 04/28] wireless-regdb: upgrade 2026.02.04 -> 2026.03.18 Date: Wed, 20 May 2026 01:29:41 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:40 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237351 From: Ankur Tyagi Signed-off-by: Ankur Tyagi (cherry picked from commit 97a940bfdeaa3f9f4442a6fbb0fabe1ce5eaff69) Signed-off-by: Yoann Congal --- ...ireless-regdb_2026.02.04.bb => wireless-regdb_2026.03.18.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-kernel/wireless-regdb/{wireless-regdb_2026.02.04.bb => wireless-regdb_2026.03.18.bb} (94%) diff --git a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.02.04.bb b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.03.18.bb similarity index 94% rename from meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.02.04.bb rename to meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.03.18.bb index 2f7c8160434..a70e9dd0dae 100644 --- a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.02.04.bb +++ b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.03.18.bb @@ -5,7 +5,7 @@ LICENSE = "ISC" LIC_FILES_CHKSUM = "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c" SRC_URI = "https://www.kernel.org/pub/software/network/${BPN}/${BP}.tar.xz" -SRC_URI[sha256sum] = "0ff48a5cd9e9cfe8e815a24e023734919e9a3b7ad2f039243ad121cf5aabf6c6" +SRC_URI[sha256sum] = "5fc0000475d8c5368ccc5222827c16aef98b1eb6a69c9b5a3e7b7e98528945ac" inherit bin_package allarch From patchwork Tue May 19 23:29:42 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88457 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EF58DCD5BB7 for ; Tue, 19 May 2026 23:30:40 +0000 (UTC) Received: from mail-wm1-f45.google.com (mail-wm1-f45.google.com [209.85.128.45]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.951.1779233430284371021 for ; Tue, 19 May 2026 16:30:30 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=RCe+9KfZ; spf=pass (domain: smile.fr, ip: 209.85.128.45, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f45.google.com with SMTP id 5b1f17b1804b1-488b0e1b870so61880665e9.2 for ; Tue, 19 May 2026 16:30:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233429; x=1779838229; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=UdDcbjtZW60Wr2ec3qnImoJ8Tf6fQAzlWlAChPrpwPE=; b=RCe+9KfZ7i83IQlIhlGgymYmFZnpem3ZxUbOH2yTHJ852s6TBIQousXWYO9ccXevbv OgcrA6RVcIp8bkPzkHmAdOkUqw+/xXznfODN29I8zGH1/RZc6cCHDaRuyXK6c8a0K/Zn SkswaBzZLgXtF/Ezqlh2C3h1kn47l8dbr0bjw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233429; x=1779838229; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=UdDcbjtZW60Wr2ec3qnImoJ8Tf6fQAzlWlAChPrpwPE=; b=HvxiiKf5O/vomOVuFMdyK0YMnHLuK7HYK/FBogGdJdFjeBSWtztlTT/L80bS4/pMeg yH+Qe+U5A1+A0/HmfQ3oOK7BTEU681nlPOjV/QmFH82eQN9R/jkhzv4FHiRTaV4cpGPL 3pJxXASj3UV1jg5zRUtBEk1MGc6Bmgwhm5n2yy8PNsvbwxs9c9OTGZmQtDAPsZ4n0wpT 8ZCFkB2ozzlITHX1wZ8i50PTNnLpWwiNmiYDJuKPEEo2oR6L9B62V5UFbwe6RHjCJLEF juQV2nwVjSuNYTjtcv+mBbn6t7v+5JWsrMtycCn8ehuUQHGlBj9xpQtWxZL9jPNiBckr xM0Q== X-Gm-Message-State: AOJu0Yxm7gICqtD+85fUAiGuaZE11c2+kI3vZ2+t/p6IYWflVJfOpvDV hHcX/oXb/NakHMvUePdWmGTNtKh6t73wA+6wtaOEqkH/4NbCtbe5NQXLSBRfX93CPKh+/t6OT+7 63BrH X-Gm-Gg: Acq92OGUv90X4ZRpH0zw+TtiiYbcqcut2c0dXCzDZtW8VmjcqgVhnIojnMM6KxDJ641 fYMFPQ/wfLDaAM/wjYqqmiNdrp4p8C3iUKqUpPYi5+/X+Pc3rwaoEqImI6TOL65P9LpKkQZLCdA Lk5JH0/q/Tl053jPC37f56KJk4cWKRTmepUWgUgy4tHYjB/oLh6GF+CoLYJJ4Tw+4srcwksz1a3 y13XPYABbCrM24kfJ8HkzdWSKPvtdP6ynEe3M6+pmP1ASwXi3OvKV+d2EiLElN/gGi8p1mE4g7Y 2t2himCPzUosvipTJXMdPm4VdCmdBv9lGad2p5xVq+zsCCfrBMf/Kz+WnTzkBBZQYwV2V49d9d0 LlJtqJJgh3ddsux+Xc8wP4jpfAgt5xGCCgMlzMAfNJv82bWA4dOqwU4jK6gj/YP1crDRm77sQjU Q2PcKKFOL1wl9TETroWD+5y3etkcoBS3W6Dot/U/11j2UyjOohtb1TU7T5z78ys2auFftZmLtcG 1ncK8vVRgCOprLk3+vrhaNBlBA= X-Received: by 2002:a05:600c:3f1b:b0:48a:7965:b943 with SMTP id 5b1f17b1804b1-48fe661db6dmr324476465e9.29.1779233428721; Tue, 19 May 2026 16:30:28 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:28 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 05/28] python3-sbom-cve-check: Update to version 1.3.1 Date: Wed, 20 May 2026 01:29:42 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:40 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237352 From: Benjamin Robin (Schneider Electric) For details on this new release which fixes various bugs, see: https://github.com/bootlin/sbom-cve-check/releases/tag/v1.3.1 Also, update the LICENSE, which is now GPL-2.0-or-later instead of GPL-2.0-only, to be compatible with the licence dependencies. (cherry picked from commit f8bdcebd01a16adb4e5d5a89c6b47c5f0af1f5a4) Signed-off-by: Benjamin Robin (Schneider Electric) Signed-off-by: Yoann Congal --- ...bom-cve-check_1.3.0.bb => python3-sbom-cve-check_1.3.1.bb} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-devtools/sbom-cve-check/{python3-sbom-cve-check_1.3.0.bb => python3-sbom-cve-check_1.3.1.bb} (76%) diff --git a/meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.0.bb b/meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.1.bb similarity index 76% rename from meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.0.bb rename to meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.1.bb index 96fc167ecbc..8120848a667 100644 --- a/meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.0.bb +++ b/meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.1.bb @@ -1,11 +1,11 @@ SUMMARY = "Lightweight SBOM CVE analysis tool" HOMEPAGE = "https://github.com/bootlin/sbom-cve-check" SECTION = "devel/python" -LICENSE = "GPL-2.0-only" +LICENSE = "GPL-2.0-or-later" LIC_FILES_CHKSUM = "file://LICENSE;md5=570a9b3749dd0463a1778803b12a6dce" PYPI_PACKAGE = "sbom_cve_check" -SRC_URI[sha256sum] = "dad6f9df848f6dd7b69922baef0ec187b66ad0847fe0cf62614529e27203e842" +SRC_URI[sha256sum] = "675828b2f02f11620b7a229853a24d09264bf41161be5fbb80a92456f46a14e0" inherit pypi python_hatchling From patchwork Tue May 19 23:29:43 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88453 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B8C56CD5BB4 for ; Tue, 19 May 2026 23:30:40 +0000 (UTC) Received: from mail-wm1-f43.google.com (mail-wm1-f43.google.com [209.85.128.43]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.952.1779233431089656438 for ; Tue, 19 May 2026 16:30:31 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=iabpLA8L; spf=pass (domain: smile.fr, ip: 209.85.128.43, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f43.google.com with SMTP id 5b1f17b1804b1-488b8bc6bc9so24508165e9.3 for ; Tue, 19 May 2026 16:30:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233429; x=1779838229; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=r4QbPNFNlo9az+eFASZc6qC/jQFj97YGYCUZSwuhQxE=; b=iabpLA8L+NGoEvJnxeLJrUcJUY+3rDnsxavXobq+jxkFs56jTnjRe4Z3A87VlGlq8q qsn9+lpKiLZm6asmpi5ikjJtSSQl9aDzZe3PwqcJalAUtuWK+iF6zR6r+O4CtBp2UAhv dEOAWmcwO5oL+fvTHN0tgt9405Aa3adEI6qA0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233429; x=1779838229; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=r4QbPNFNlo9az+eFASZc6qC/jQFj97YGYCUZSwuhQxE=; b=bsyxGs3b9oaVfCDiQO3iqAeYRUySPPHYgGFzE21r2Lh1sBThio0E7+uFsTMBanR8ap CgQ3fROT0cpMw0Ups7op7dvnGRI6UWp9aKh2GzwbscpGuRmzbyj1Ao4sYVOiw2DqkDRF 0thRsdidYbMB8AOL9PDuzQ0hGSDwkoDngp79YefWBrZpEYbGH5HtaJAoCcvXB25iUBUf KWMbF+bHnGSdsWjl3CJuq9M4NhGQEUVvlbtKFA6rek5yc5CAJDSc5yZVnC8Zcz+DhcJw qREgUIz3AuM88oaTXrQOzbjHiESD/yHpESEc/pRkBYtOTgpc/04626BBjG7I9Hwe7jZT WUxw== X-Gm-Message-State: AOJu0YxVEdvFZp3Nt/H2vB136yw4G57VBGLGW5xgtrS2p8t+OAA7HTRc iRDEOLBpsOt7uc/feYjvKKbCjqswoUltFVBasypsyV6qV6D44L6ytsB2iEYH0y6mVhMsNJtpEFE rjRtj X-Gm-Gg: Acq92OGMqeBrf66XKFEo7SZ/eWRuPmLLIoSY8m0UEnAKrsrvID/xHMcOsrd9kHLq8pG LfPijc2S/TICerCyE/JM39IzQmv3MP6PQA9+3KOvPGLKqMKr+EELkeoP3ZIx5hTZcJ6IQzwp2K9 ZhCMC+HrZ01hUr989bzukugEdcNTgg3CPM32Hb8XWVXOZ1OO5EWRs2oLGcekvWT1+stfI/dY4HB 89ny3uVzhSJ9PNheEw2GTchQ43L+CbWboxkSW8kMiXh2+Eih0Ls2YwgllTzWYLdKXWQXhzeX+WG akZabIXTRDOL2QDRYToYTyF2j74PMnNVHcbgqQcblRxikIqC2PyELSzyskqoZRAelkFzMYK/cAA jb/TTOLWH/QlUfM+pUbi/+Ccxni0mP55kFZ9W6MqXfM49T77udA8ebvkCZXTw5bJEGEiM2DqYdb fgzJXbovJcEK+zXhhyjucG+W81/rHUONDWEpfHg+6KmwKGb48eNzzm+zhUwqDggHtzsTzUiFTZa zqLUB1VSW+EpgbRyvH/gT13CHY= X-Received: by 2002:a05:600c:c494:b0:48e:706b:53e8 with SMTP id 5b1f17b1804b1-48fe60ecd88mr311273525e9.11.1779233429250; Tue, 19 May 2026 16:30:29 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:28 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 06/28] sbom-cve-check-update-cvelist-native: Update source revision Date: Wed, 20 May 2026 01:29:43 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:40 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237353 From: Benjamin Robin (Schneider Electric) Update source revision to cve_2026-05-07_1300Z (cherry picked from commit 30b1f91d2a8cb1df5d4a65d2b55a3d26ff76937f) Signed-off-by: Benjamin Robin (Schneider Electric) Signed-off-by: Yoann Congal --- .../sbom-cve-check/sbom-cve-check-update-cvelist-native.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb index 33871221659..3763e7f21f7 100644 --- a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb +++ b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb @@ -6,7 +6,7 @@ HOMEPAGE = "https://github.com/CVEProject/cvelistV5" SRC_URI = "git://github.com/CVEProject/cvelistV5.git;branch=main;protocol=https;destsuffix=" SBOM_CVE_CHECK_DB_NAME = "cvelist" -# 2026-03-19_baseline -SRCREV = "ada54ee3cc8380820aa45e4996910bdc9dcb94e7" +# cve_2026-05-07_1300Z +SRCREV = "dd0e93c75034d0167498174c886a56729edc44de" require sbom-cve-check-update-db.inc From patchwork Tue May 19 23:29:44 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88459 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1933DCD5BB8 for ; Tue, 19 May 2026 23:30:41 +0000 (UTC) Received: from mail-wr1-f51.google.com (mail-wr1-f51.google.com [209.85.221.51]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.954.1779233431897013300 for ; Tue, 19 May 2026 16:30:32 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=RB8RQy28; spf=pass (domain: smile.fr, ip: 209.85.221.51, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f51.google.com with SMTP id ffacd0b85a97d-44ccbd3290aso3938264f8f.2 for ; Tue, 19 May 2026 16:30:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233430; x=1779838230; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=7e3baXU966NXPvqcW/VR37EGm4oDAwNd670im0ikUIY=; b=RB8RQy288IPEPOtJzLp0dGMk12i54Kpjhm4rUTKgjyB4VbX82wUQkCIuNuVq1m7hy8 eRtlRM8QLQfxiNCYjwQ3Z2EuY55ShBl9VBMoKvxyioIGuBUdBG3nIZ1JlxQG1lGO1X4R Flo9+KzYpvieVZyoPnFqvRZotiiaYes9xc8P4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233430; x=1779838230; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=7e3baXU966NXPvqcW/VR37EGm4oDAwNd670im0ikUIY=; b=PaiueKevosXBbrCUTyyNA7wKFexjkE9ecStGFbJuD/Rfarhg+VJW6SdFSXQJkQ9jiw jzGX5zo/2XYe4wMv01tHKoQ2cnsR+Hhp2xt4RJkLzKrOhZZW58IcDH/BLinXhGC3gYkb lkS5XDrAAyePJiuGTjSVF7B+lCr4tGeOWt/VgV2IAGMpSsNU+35bMIkQ3ba8WugTC7eF xWV9eL7E71t1q9oE3GkzqYVFFj+8hVVx7H3HMF7DDCUXvldOGX4A/ePvf9frDgK16QVq 3vSPoeLCcmd65LbNDB/X8zQAonWKshxiKOFbpHv1luDIME35Jur8CJatY2BqlHv+Hm42 VznA== X-Gm-Message-State: AOJu0YxfRa8tv2iMEl4baJn0lfBGrNW5cU1dnkc8JXBg08L32VIXjfx0 6/VmnOcKWQ7QEgxN2N29bIO/AWhMQxC0sXF+RVDSvOxd+RaFkINSp5+yXVnqa2lp3e6j61vMO+W 9Gw+n X-Gm-Gg: Acq92OEkh5tnLZnnnDGp9Eo4EYjod/tK6hm0WNGTeSkgP5wewS9ST6H5WktEq2rEntF UOzDiQwIRGd+RxNryNgReD14MZsLcGEsP+MV0yw9VHZJ2WAJpjagxQRs6Gpq3wAU70a2+hi/nmZ 65Rgqbzq9gceEaJmcYPLnaoTY5BjzD/7Jld/s//z3eEOpb9zxjf+NDUMTEDPmw2fQzx+fanTgTh gaIDzj+8SGN9pXBevDKFzPwccSyQiUMl0QjMAzC4mGecltEFxXmaYZ/Lu/U6gYztZLCEWM4Zg01 sBxE2778KOrPzeRMRYvdbjHMdFD1qZFkk9wDXZPu9H0s2WFWeEss+XxxM/5T1xYZbQwoGtEqE6r h1HBIgKu8Z8QvsWxmiNwsn0+XSMgaX9nLXRSqWD7ImFdJ9DKb0fh220KIJT/NaKHoF4TcXh/SOa gpQcE2dIPqv+urbxzr1eWQsjYbVYjTMxMKZEIjcuLU00o2mbvr3AmScVyYhEUEbIiG2W8+KgmHU NfAiH7be8quH8N1F31lSaw1O7I= X-Received: by 2002:a05:600c:848c:b0:488:b749:8482 with SMTP id 5b1f17b1804b1-48fe60e52c1mr348358325e9.4.1779233430079; Tue, 19 May 2026 16:30:30 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:29 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 07/28] sbom-cve-check-update-nvd-native: Update source revision Date: Wed, 20 May 2026 01:29:44 +0200 Message-ID: <9d3d22ca591c13a84a9210779d03c0c7cc91d062.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:41 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237354 From: Benjamin Robin (Schneider Electric) Update source revision to v2026.05.07-000006 (cherry picked from commit 3724b93538d3acbec9f48d4c524b51d166071708) Signed-off-by: Benjamin Robin (Schneider Electric) Signed-off-by: Yoann Congal --- .../sbom-cve-check/sbom-cve-check-update-nvd-native.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb index c868ba09c18..26a14e6eb16 100644 --- a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb +++ b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb @@ -6,7 +6,7 @@ HOMEPAGE = "https://github.com/fkie-cad/nvd-json-data-feeds" SRC_URI = "git://github.com/fkie-cad/nvd-json-data-feeds.git;branch=main;protocol=https;destsuffix=" SBOM_CVE_CHECK_DB_NAME = "nvd-fkie" -# v2026.03.19-010002 -SRCREV = "49f8bbe1b0b0884e16bdc37ab68db997085570a7" +# v2026.05.07-000006 +SRCREV = "72d8841c8ad9083ebf6723063f275444ea0d76f9" require sbom-cve-check-update-db.inc From patchwork Tue May 19 23:29:45 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88447 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 520F0CD5BA6 for ; Tue, 19 May 2026 23:30:39 +0000 (UTC) Received: from mail-wm1-f46.google.com (mail-wm1-f46.google.com [209.85.128.46]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1004.1779233432349882762 for ; Tue, 19 May 2026 16:30:32 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=KDz2TjMe; spf=pass (domain: smile.fr, ip: 209.85.128.46, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f46.google.com with SMTP id 5b1f17b1804b1-488a9033b2cso34241695e9.2 for ; Tue, 19 May 2026 16:30:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233430; x=1779838230; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=owxyeNTpFLoX7jgSo52BHKsuNG2I2KAe8k4y9f6oelE=; b=KDz2TjMe0dCF4x5SEL3zRTtxpi2vgjyTHxTLCh1ZMzBYe2L4CTZ8mleklgzBRoWTjC dmiQx75/nspTmUSbQfHQz1oL5JkieX1fclIj+dosh/leNKSIU+xMDTWQ1O92LJcebgci lXbuj6l7MHVWC9CH+yoGq2EvBUb9brc5yBhiM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233430; x=1779838230; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=owxyeNTpFLoX7jgSo52BHKsuNG2I2KAe8k4y9f6oelE=; b=LgeYfrasuI6wqQM5zCSAWrWGnG7tnB1GRcISwm+nJnHWmF2v33BoUO7P3D5T5DbD0N Pf/Uy6ayEGnoxTrEnj8vHglce6RFYumvpePxfAc+NdfUbBgL3efiMaUvp2agcBk8QGMd tK2AVD1G/Y+A74Ax1ou+dN5Kf7IgJ0VK5HNZ+ITxHxAnf+gyXc3uePqtLaiME6F/48aW z6aEkO2Yh5u+w/t3vwXXXrjzcr3dou9Up6XvPpVe7QfiSm1muHEg9xcsRXZR5EtJP3ly nF6wdsK1A4J91zW4KeRtIm1yofKqW0EmUQ4VKBHOZ9lwo2ynPecKb7oXTcHdBbU2ro/K 8dnw== X-Gm-Message-State: AOJu0YzSXlj5TZMCRR+uftQLvSY9g6exipXCspl0+3hhfDvib/2CrsRt ENx141P21aZfO2OV0Xp0WuP3g0XuMZzs4Rx/tCL9ToFL23Vv2/QEOJ5dJ6ydkNr98LR3GlZV391 +Ppbs X-Gm-Gg: Acq92OFa0hsydELbEmFOqubYQKjec1ZoGClXlpW5rkXW6pkU79fYO+sJo1WUsBqqrwy RQa6y1vSPw7/QoMyZU0IpqgyrhS3JqD5OTks+xBQwsrKfqQHPEp9mwup6m0Fne2oC8rDeFIh0Vj iq/qABoBHb2gSPA4dvNbbhHHqjOvbwIJG5VMxJCdzhv107Ok3d4XyYHN6jabxn6bCoxKOBdj1T0 5QdnPDOg1RaxzZzLEZppp9JR8mZtDAIceSFFzHWpxHFp554UurverUgTe0EgJ6MovFqIqFsizwG pDndONl2CY9L3F/QZZYRG5NuLqG1llr5L07Fk8zlw9OZQYovvg0VL61SNmBjJmQn3fYri58dOyM ++AxU3+FXt4RbQttROXLFxZQWu897eCDS649x1ak44jxUgxWtt9uWWWAhD0S80ebeJrWgxdilEU +SBox7Egg/nIBNTfOMIfh93e10QSjUhT/ZWravDOBfyTkT8nhLQhlrFEZI/7dkqJ5xKq2aLZnn7 5ocnMXTQqs1cg36f2X/E163/D4= X-Received: by 2002:a05:600c:6d2:b0:48f:f199:4c02 with SMTP id 5b1f17b1804b1-48ff1994c86mr164563255e9.9.1779233430501; Tue, 19 May 2026 16:30:30 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:30 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 08/28] busybox: patch CVE-2024-58251 Date: Wed, 20 May 2026 01:29:45 +0200 Message-ID: <8f344d46b96fb16632501749dc39b97aa3e11836.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237355 From: Peter Marko Pick patch applied by Debian [1]. I did not find any reference on busybox mailing list that this patch was submitted. Submitting patch for someone else would be inappropriate, and busybox is currently known to be very inactive, hence the unwanted Pending Upstream-Status status. Also note that the related busybox bugreport [2] is currently not public, so it is possible that it was submitted there. [1] https://sources.debian.org/patches/busybox/1:1.37.0-10.1/netstat-sanitize-argv0-for-p-CVE-2024-58251.patch/ [2] https://bugs.busybox.net/show_bug.cgi?id=15922 Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie Signed-off-by: Chen Qi (cherry picked from commit 7261144785aa508377c995e52d7e2410a814f00b) Signed-off-by: Yoann Congal --- .../busybox/busybox/CVE-2024-58251.patch | 51 +++++++++++++++++++ meta/recipes-core/busybox/busybox_1.37.0.bb | 1 + 2 files changed, 52 insertions(+) create mode 100644 meta/recipes-core/busybox/busybox/CVE-2024-58251.patch diff --git a/meta/recipes-core/busybox/busybox/CVE-2024-58251.patch b/meta/recipes-core/busybox/busybox/CVE-2024-58251.patch new file mode 100644 index 00000000000..713d345ca83 --- /dev/null +++ b/meta/recipes-core/busybox/busybox/CVE-2024-58251.patch @@ -0,0 +1,51 @@ +From: Valery Ushakov +Date: Thu, 21 Aug 2025 12:31:53 +0000 +Subject: netstat: CVE-2024-58251 - sanitize argv0 for -p +Bug-Debian: https://bugs.debian.org/1104009 + +Signed-off-by: Valery Ushakov + +CVE: CVE-2024-58251 +Upstream-Status: Pending +Signed-off-by: Peter Marko +--- + networking/netstat.c | 7 ++++++- + 1 file changed, 6 insertions(+), 1 deletion(-) + +diff --git a/networking/netstat.c b/networking/netstat.c +index 807800a62..d979f6079 100644 +--- a/networking/netstat.c ++++ b/networking/netstat.c +@@ -41,6 +41,7 @@ + + #include "libbb.h" + #include "inet_common.h" ++#include "unicode.h" + + //usage:#define netstat_trivial_usage + //usage: "[-"IF_ROUTE("r")"al] [-tuwx] [-en"IF_FEATURE_NETSTAT_WIDE("W")IF_FEATURE_NETSTAT_PRG("p")"]" +@@ -314,9 +315,12 @@ static int FAST_FUNC dir_act(struct recursive_state *state, + return FALSE; + cmdline_buf[n] = '\0'; + ++ /* don't write process-controlled argv[0] to the user's terminal as-is */ ++ const char *argv0base = printable_string(bb_basename(cmdline_buf)); ++ + /* go through all files in /proc/PID/fd and check whether they are sockets */ + strcpy(proc_pid_fname + len - (sizeof("cmdline")-1), "fd"); +- pid_slash_progname = concat_path_file(pid, bb_basename(cmdline_buf)); /* "PID/argv0" */ ++ pid_slash_progname = concat_path_file(pid, argv0base); /* "PID/argv0" */ + n = recursive_action(proc_pid_fname, + ACTION_RECURSE | ACTION_QUIET, + add_to_prg_cache_if_socket, +@@ -686,6 +690,7 @@ int netstat_main(int argc UNUSED_PARAM, char **argv) + unsigned opt; + + INIT_G(); ++ init_unicode(); + + /* Option string must match NETSTAT_xxx constants */ + opt = getopt32(argv, NETSTAT_OPTS); +-- +2.34.1 + diff --git a/meta/recipes-core/busybox/busybox_1.37.0.bb b/meta/recipes-core/busybox/busybox_1.37.0.bb index 61ff602be6f..47908996843 100644 --- a/meta/recipes-core/busybox/busybox_1.37.0.bb +++ b/meta/recipes-core/busybox/busybox_1.37.0.bb @@ -63,6 +63,7 @@ SRC_URI = "https://busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \ file://0001-busybox-fix-printf-ptest-failure-with-glibc-2.43.patch \ file://0001-tar-strip-unsafe-hardlink-components-GNU-tar-does-th.patch \ file://0002-tar-only-strip-unsafe-components-from-hardlinks-not-.patch \ + file://CVE-2024-58251.patch \ " SRC_URI:append:libc-musl = " file://musl.cfg" SRC_URI:append:x86-64 = " file://sha_accel.cfg" From patchwork Tue May 19 23:29:46 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88450 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4B5E1CD5BB0 for ; Tue, 19 May 2026 23:30:40 +0000 (UTC) Received: from mail-wm1-f52.google.com (mail-wm1-f52.google.com [209.85.128.52]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.955.1779233433132602355 for ; Tue, 19 May 2026 16:30:33 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=aK+SepI1; spf=pass (domain: smile.fr, ip: 209.85.128.52, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f52.google.com with SMTP id 5b1f17b1804b1-488b3f8fa2bso41463955e9.1 for ; Tue, 19 May 2026 16:30:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233431; x=1779838231; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=u6hu2wjuqy56zgLH39N9IVie1m69ECjfc/u7p/LkM8o=; b=aK+SepI1j9H8puckEmBsIT9ha3mwOWlvO9/l06RQx1YEaKtj1xQxhjLeLuJrxtqkqc YPuDUpdHp7EGw+wDnSDM26VZsh03h8JpPXB48KICF4FskHgjHSAs78HsMKSHvd4JtoBw 28TShpbbxFy+SyQWrIH4vEtXsvINxEcmvunW8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233431; x=1779838231; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=u6hu2wjuqy56zgLH39N9IVie1m69ECjfc/u7p/LkM8o=; b=CStiRKF3lpEzZohaGYufGqohe+PYmok5mwjv819o/Hk/P6Yzfl2HP/vbsy9po18PZW Gnpy/ZImgUZIMgz8m2R+6bxqL52EozreRpzc163FTrjrj6CHtUALj2LDZumWklXhbI57 vyD04va8iL1BS/jREM4AFZJkJDiuFQfExBzZSsGkkrq9BlF7LhbseLxLizuFLOG2tjN6 5OvA/7g1acAqVx7bNwq2cSMMrn1+PHvJFikUV4NIO7iGqbpcIe6MPcq2TLSbHSHDUTWI 7VoiAdrekTaJwkPOnx32yt8qDWU9rc55dOGO+mH6z4ELw58gRR2xnwlAAgPfXyOIhZLS yClQ== X-Gm-Message-State: AOJu0YwnKhTzrQcAuzNyfXX369tGMnHCIcpyDv/96z2a2Z5oD5XQQiDC AK+iIhgMUjYxa9yL5aMXJP0U2QW3qmNBKjMDATbh9bevihIUwnCL9/wctzC6GOlP9bqZAH1Pedg 7JMDJ X-Gm-Gg: Acq92OG+d3mEYct825T1gyelSRsOzuLrmLkEkZLTXBVsSBbf2QSZh2wCCt7/KYCULvN bh5yq/8v9hKskwiW6RljwiSZ5lkIkAV0JkKIxgqCgX/0irnK9WC4+zyWq7BtCckz6SyyWCb0uo2 TX6ewIoQBYBPwAJWlGj3J+Hf8dMFnz8JdkfC9SSaAZsAqb+W1b8DjVvXYXVS1ZoytP/LBJHZ12r ZKJZs0AjyD0f7L17dvH5fyg8rBmUevHjemjxFjVjDbBQ7xmjhaLKDVJV2PODanmhp7fRiC5YDsh SxPLx4/6pfiMbCSdx6rsW9yPVcBBf7QhrREmTNLPUyOTYigKReRATqB5wrxn3bHtctsRo4Q17qL f8ut+aQN272kzj7w+TQ0X5rneK6rFSuiNBGKm08DpahT8kSL7B3ZNXfmUiFfuf7pNTUNjw5VN97 m+nJExbJCvYIWKg6H+HN2nYw91EOmfbhton9+RLP9MWfKYcIyBPQ0gKOIMG+NVmWRumWTZhBm/s 5tiQ3LE3l4rQXj+1iPO3wcZ4Fc= X-Received: by 2002:a05:600c:5010:b0:486:faa8:9e4 with SMTP id 5b1f17b1804b1-48fe5388407mr309009585e9.12.1779233431327; Tue, 19 May 2026 16:30:31 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:30 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 09/28] b4-config: add send-prefixes for wrynose Date: Wed, 20 May 2026 01:29:46 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:40 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237356 From: Yoann Congal That might help new users send correct first stable patches. Cc: Quentin Schulz Signed-off-by: Yoann Congal --- .b4-config | 1 + 1 file changed, 1 insertion(+) diff --git a/.b4-config b/.b4-config index 41094218531..cb3022dcce7 100644 --- a/.b4-config +++ b/.b4-config @@ -1,3 +1,4 @@ [b4] send-series-to = openembedded-core@lists.openembedded.org prep-pre-flight-checks = disable-needs-auto-to-cc, disable-needs-checking + send-prefixes = wrynose From patchwork Tue May 19 23:29:47 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88449 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 73610CD5BAF for ; Tue, 19 May 2026 23:30:40 +0000 (UTC) Received: from mail-wm1-f45.google.com (mail-wm1-f45.google.com [209.85.128.45]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1005.1779233433617266606 for ; Tue, 19 May 2026 16:30:33 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=sA8IouUS; spf=pass (domain: smile.fr, ip: 209.85.128.45, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f45.google.com with SMTP id 5b1f17b1804b1-49021532ebdso11202025e9.2 for ; Tue, 19 May 2026 16:30:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233432; x=1779838232; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=oKAibZaJIyPC5sMXiaobr2pZnJFF43Hci6ox8FMVN7s=; b=sA8IouUS7e2oUjjQW3BDf84iV7K2iubWZ5yUHeNxheCSuG8d1ZOecTAQGSWjNAqxtC EFDcLRw2aiRJPXxQX+vbv2S2qWkKsbJ8144lYCtfI1j/x60i7xFomJQCvBjb9iVbzNnf 8nnYyRWB4kIkve+8+iDZDvmrnja4kbfP+f4mo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233432; x=1779838232; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=oKAibZaJIyPC5sMXiaobr2pZnJFF43Hci6ox8FMVN7s=; b=c8QLqyPvU4WiLZS+t2UjJtsOPOG6Y+hBr1MO5kJdqTlo56TazMNu/f+lLdvHkgbOP9 CZ0Pepf/Vr6AxkM++chMP2bB9wWUQ7Y1xQdH1D3t0IA2YJqWbdNZbLdYhTlG4zcjvX0P l9asuk9uaxI/UOlCEn3GcYTup5130DuCugOPQgER6qQECkwlu9WIC4eNNQo4O4gfhTB5 G5ThkqeumxJLe94/84AlPnl6kf31WklbrZxVQNcXsPac+O6Y+u+Osl2PcaYHZNKzdCE0 Xqagndz/z5ZwteAY4r6evcKRas1C+8uu34C1FvQ5lBrOX2uVbojMm3KkY+sqUARaaeg2 0Row== X-Gm-Message-State: AOJu0Yz/pfUT9HY1GIULG0YFlXM+RnZmiihEcQERiejvnl96hhMfDreO YGKkeSVKRC3eVl45LNqx9gh1namHbGT1niyL+7XSJAvz9e/P3BUOh36cqXZ5BQaYawk8k3FUiJy IT0y8 X-Gm-Gg: Acq92OEcg5kif5PR7jsHd2akK9j7Hetu/xIwSIKSkkDH9v4Pn8896U2k3y9PuqTvGv1 aHGlOEk+Z00Fi5Hok3NoCuFTF0waParP99RmzApww+pBHP2H85YjjWf/uRQR0S5PiVR+ffoT6m1 P6D6dvDVJ+QJOziP0OdyRZi4V+gUo8iSQXLvcvpT8gjlBMSnOcekGl/fIluNz6hljd/QDrwS2Db QvOgrp9NTFoUV3ckTjHu8ETJFcnsfSjKlJJ8rz3zCMirOsk1S9r13KOfm8qEfNd6WB8CrzdAtLs j0Bse1Kkw1uZofa2y/GvYUuc2pviZI0KqpAsGHrVBpqJ0ZAVmM0hsljTESa8zjDseGTfk+vWLau HexmIFLxzWAE+tf7ygP5UxwPCNRQe1kxKkHNSMU9RUWcerfgpT7XEkbSxlCJkRfZkmsZ3MU6GUo lLoNIKdH0roN7nAsv0XXbZCJ53ipLUvhrQeRr3ewnKMO7/J/Ffr5BM0dGPy1vsDM5a9iG6QT5V/ K3mMCoDDE5eu0PmIaGj/cw7DV8= X-Received: by 2002:a05:600c:4685:b0:48e:5d91:cfe3 with SMTP id 5b1f17b1804b1-48fe5fd494dmr326419845e9.1.1779233431736; Tue, 19 May 2026 16:30:31 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:31 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 10/28] libsoup: set status for CVE-2026-2369 Date: Wed, 20 May 2026 01:29:47 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:40 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237357 From: Peter Marko Per [1] this is fixed by commit in version 3.6.6. It is RedHat version-less CVE. [1] https://security-tracker.debian.org/tracker/CVE-2026-2369 Signed-off-by: Peter Marko Signed-off-by: Richard Purdie (cherry picked from commit 14d6ba9a0f4a2813c1dd7554e4eddf93bd2f2b55) Signed-off-by: Yoann Congal --- meta/recipes-support/libsoup/libsoup_3.6.6.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-support/libsoup/libsoup_3.6.6.bb b/meta/recipes-support/libsoup/libsoup_3.6.6.bb index b36976a2be4..792cb26e930 100644 --- a/meta/recipes-support/libsoup/libsoup_3.6.6.bb +++ b/meta/recipes-support/libsoup/libsoup_3.6.6.bb @@ -63,5 +63,6 @@ BBCLASSEXTEND = "native nativesdk" CVE_STATUS[CVE-2026-1467] = "fixed-version: fixed in 3.6.6" CVE_STATUS[CVE-2026-1536] = "fixed-version: fixed in 3.6.6" CVE_STATUS[CVE-2026-1801] = "fixed-version: fixed in 3.6.6" +CVE_STATUS[CVE-2026-2369] = "fixed-version: fixed in 3.6.6" CVE_STATUS[CVE-2026-2436] = "fixed-version: fixed in 3.6.6" CVE_STATUS[CVE-2026-2443] = "fixed-version: fixed in 3.6.6" From patchwork Tue May 19 23:29:48 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88451 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8EB81CD5BB3 for ; Tue, 19 May 2026 23:30:40 +0000 (UTC) Received: from mail-wm1-f54.google.com (mail-wm1-f54.google.com [209.85.128.54]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.956.1779233433812909199 for ; Tue, 19 May 2026 16:30:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=gF/KnLku; spf=pass (domain: smile.fr, ip: 209.85.128.54, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f54.google.com with SMTP id 5b1f17b1804b1-488ff90d6c7so31922205e9.2 for ; Tue, 19 May 2026 16:30:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233432; x=1779838232; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=9/lvlWWciNdkQTmu+FRu1qwbpndXC88XlCU1DVPVxVc=; b=gF/KnLkuXXK6q+7QKW5lAebmxg+874VQ7w+oeQovbFp4s9UNecY9Yfp0bL0iBM3NX0 DUEeYrkHOrjU3RqwdMAJXR95qtgR29R2fAWREPMFG4/7YZZYUCLpFXoYxoIDP2i7t8ks hQFe7l/qiGRSuHANnvWLDJCvrWAFOP8cmSaCQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233432; x=1779838232; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=9/lvlWWciNdkQTmu+FRu1qwbpndXC88XlCU1DVPVxVc=; b=jG7fhLFGwdlXSU+NvbzyFXgcqpFC7h8FyU+RIWXnP+6NE+ZthZ+yVDC41D05nUbD6P BfD5c3ZZEPIT43m3G0bm1vLSPbGVPH4We9FS31S4aZs/LwRa6xDJWcwlK+JeYbdI14Ld xG0mf5TcVSt1AoM0TA3aAOx3NJYZxpZIe+DFpKTMOisrjdQg1XbyzT1PqGPuwREkxKSH pZsU+GHHY3+BNOJ+s8tDua8ETsY1Brt4u5hHROQoWTgvy1sLYmDGsqPkoA+aR9kUwrK0 hgHEH1+v8Ri266mIAAxe+DK5rYUgv3YJZcSXJKXgJQahl9dVh/OoutuZaXSmIkKQ3HXF nHBQ== X-Gm-Message-State: AOJu0YxMNA9pPQ1Pd829uKiMrEWTo96vHoN/yWnySLLPuZ5CjUSYh88U 2Lv7OSTEJ57PntbwwLUpFsP47dGVBykg1sXPAu2lpdyUquD8HVUsf/bnJdcAYrDuFmHhf0fbIjZ Y24o3 X-Gm-Gg: Acq92OHIEs7Hbuiy3ZHIBpQIhqxxQfJye/MMjRuD2O4F5SWukHT2Uh4ND/ZBYrsYr13 +P+Hzi9Vx79X/WSDyN7XgCsXnoEE5dsgz4TLJmMEWIP8ID0WWACWXoewERstnIpDZkVVSm6q2KG nvkTd+dwjbrH+mXYsgC6xMXiFqUw2MHTVuUFvp9HIsAI0q4krdWRQ0Ax570QPDskEy/0MN2Wp/v nzLuKGmAFyf3t+vBawE5zUlzG9zv+f8yJJdhGFhX2qTM3LAahiMlTTAzuCpR/Qj2p3QkPYYttMf phydM09oXp4FvjK1PSSmDot7VSjVH/Rt6AqKHkKM71jIXng/qjc3dHjXhBTvd7eo0NdxPp4kN70 c4OGaUs3K01ecSiJT0Ctb+A/Wq+rQnKzwT4j25VLLpn0DN0a5V3xG6/IXof3Nq00FneKv+Ddh8I rONeDcUXStuUpVKmgHtb28Tha37rCY+liUdNMkJqfWOCcIG6ipm6COUbU7tgBdE/akdFI6Q1RgG NfAbIQ4UScChx6kF4dqxyD7xUw= X-Received: by 2002:a05:600c:3e11:b0:48f:e230:c3fb with SMTP id 5b1f17b1804b1-48fe6626a8emr326471865e9.33.1779233432218; Tue, 19 May 2026 16:30:32 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:31 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 11/28] libsdl2: set status for CVE-2026-35444 Date: Wed, 20 May 2026 01:29:48 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:40 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237358 From: Peter Marko This CVE is for SDL_IMAGE, not SDL. Mapping in sbom-cve-check tool seems to be wrong at [1]. It maps both SDL and SDL_IMAGE to the same CPE. [1] https://github.com/bootlin/sbom-cve-check/blob/v1.3.0/src/sbom_cve_check/products/products.toml#L1608 Signed-off-by: Peter Marko Signed-off-by: Richard Purdie (cherry picked from commit fef169063e49f516ea96e2243869808ba58550d0) Signed-off-by: Yoann Congal --- meta/recipes-graphics/libsdl2/libsdl2_2.32.10.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-graphics/libsdl2/libsdl2_2.32.10.bb b/meta/recipes-graphics/libsdl2/libsdl2_2.32.10.bb index 834cf096b97..2b583448ef5 100644 --- a/meta/recipes-graphics/libsdl2/libsdl2_2.32.10.bb +++ b/meta/recipes-graphics/libsdl2/libsdl2_2.32.10.bb @@ -85,3 +85,5 @@ CFLAGS:append:class-native = " -DNO_SHARED_MEMORY" FILES:${PN} += "${datadir}/licenses/SDL2/LICENSE.txt" BBCLASSEXTEND = "native nativesdk" + +CVE_STATUS[CVE-2026-35444] = "cpe-incorrect: this CVE is for sdl_image" From patchwork Tue May 19 23:29:49 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88444 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2384ACD5BAD for ; Tue, 19 May 2026 23:30:40 +0000 (UTC) Received: from mail-wm1-f47.google.com (mail-wm1-f47.google.com [209.85.128.47]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1006.1779233434569047929 for ; Tue, 19 May 2026 16:30:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=LZdQbIsb; spf=pass (domain: smile.fr, ip: 209.85.128.47, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f47.google.com with SMTP id 5b1f17b1804b1-488a14c31eeso25203015e9.0 for ; Tue, 19 May 2026 16:30:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233433; x=1779838233; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Bhh3wYuHy0dml8Kp9xevSY22vaxc7QO8G5S5+Co4g2Q=; b=LZdQbIsbendh9INpALRo0IEMMArF/cb0YsZW2DJtsbmkRVGR622AccsygEo/qi/qco KSITWGWkzY1AypLDk1Ec81tYBaIvUpZ9vGu+1f3j4P2JPsp5TjveXU+Ror00V8Px0nm7 Gfjuk9EjW8YcdTz7K7jDJ+oC1dyaY+UZ+e/PU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233433; x=1779838233; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=Bhh3wYuHy0dml8Kp9xevSY22vaxc7QO8G5S5+Co4g2Q=; b=NXGpvnttqeeiMXPrDO8eXODwhab5wSWukI9+Jj3H1iLPvmi5HWx4H2WSCYX4zh1p7I rrW12tcHUgkHCLdT0S7QCDMhGEof7IoJeqCX2P4gqXvv8XNth4OgBnv+DTyq6REjYHj+ BVtqlIOwFW483PuTNTpSF302roWO0fcYgAZ6TgrDlevCaJ8v8fqdfTGoTHoFxWrW204e HLdHdFl7U0tIim26oXBpzfGkA2LTkqj/4fe/yrX91SB9fljynE5W3TOuwgcqCSlzvI5D Mk7T2K0iC4l4L5Gkc/cv9w2qq+0cq87ix39bjq7I00cIJuaPaqjRKfCJfP9arWVx0GR9 NqwQ== X-Gm-Message-State: AOJu0YzYIOXIh228QuarEgqnq5mcQ+MKA0q/EWknN0tdUS0jiOY9wy9o dLBLBSfaQoyR+BZYDDV3SVEcbMfwBT/FZi9gVmXlnPVA5sRCN5rXIJp+saf254gayyRzkelcg3V yi++2 X-Gm-Gg: Acq92OFSUy8tBLXfyQ8kVRX/BbJciG0/g6uDOhcBXmmlc4bWkfZrBfq1fp29OlhdXlj uF5EWS+9hqiuF3FPzE4tY6H+c45Th9M4gOQ43YfFRtUbj7BslakRW72wAljz8TrJjVf0N42/LGZ p9Q8/+tseLqYJQlEtn2qVKxdR1oI0lwPkWb+zghvGLSlkxq2+LO7e/92/jpZwj1T7OG+sDIQMyE dZRE52Z7AhCFsyL0emEDA2emlnoT5ptaupqlp0EG13OmsTFysnIq4lQBxf9LvpBH2bbXzXZhmyQ qPDZ9dP1Gn8fpTFDSoyQ1FcUEJ+HlOjy1Aox3zzp7OcFy1Fl752JhS5KlJ1maaus6ySODPZrcBh yB2DtzcXNPcqEbkWn6LDHNp9E8n0em7yAodHiXvrsIB0jXG6xpjwKr6Gisiu5weGhiO5kYpqYH/ mVUJXCuqXaajDXzQRSxrkT/O8yK+RWM7qGygaPXpn41O8pyq4H2f8tcLFkEyv6i+MWSl+Bc7rO6 lZ1SuVOfYKFF93DG9ln6JtJ33I= X-Received: by 2002:a05:600c:2d09:b0:48f:e1ac:c96d with SMTP id 5b1f17b1804b1-48fe61f2bcemr189734665e9.20.1779233432762; Tue, 19 May 2026 16:30:32 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:32 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 12/28] tiff: patch CVE-2026-4775 Date: Wed, 20 May 2026 01:29:49 +0200 Message-ID: <1a9df49cbc022e3531c60927d41456b73eb9f26a.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:40 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237359 From: Peter Marko Pick patch per [1]. [1] https://security-tracker.debian.org/tracker/CVE-2026-4775 Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 091df084505273f5b93595b84eb30e52f4208ff3) Signed-off-by: Yoann Congal --- .../libtiff/tiff/CVE-2026-4775.patch | 55 +++++++++++++++++++ meta/recipes-multimedia/libtiff/tiff_4.7.1.bb | 1 + 2 files changed, 56 insertions(+) create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2026-4775.patch diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2026-4775.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2026-4775.patch new file mode 100644 index 00000000000..1f3c026b281 --- /dev/null +++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2026-4775.patch @@ -0,0 +1,55 @@ +From 782a11d6b5b61c6dc21e714950a4af5bf89f023c Mon Sep 17 00:00:00 2001 +From: Even Rouault +Date: Sun, 22 Feb 2026 23:32:47 +0100 +Subject: [PATCH] TIFFReadRGBAImage(): prevent integer overflow and later heap + overflow on images with huge width in YCbCr tile decoding functions + +Fixes https://gitlab.com/libtiff/libtiff/-/issues/787 + +CVE: CVE-2026-4775 +Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/782a11d6b5b61c6dc21e714950a4af5bf89f023c] +Signed-off-by: Peter Marko +--- + libtiff/tif_getimage.c | 8 ++++---- + 1 file changed, 4 insertions(+), 4 deletions(-) + +diff --git a/libtiff/tif_getimage.c b/libtiff/tif_getimage.c +index 4543ddda..fa82d091 100644 +--- a/libtiff/tif_getimage.c ++++ b/libtiff/tif_getimage.c +@@ -2216,7 +2216,7 @@ DECLAREContigPutFunc(putcontig8bitYCbCr44tile) + uint32_t *cp1 = cp + w + toskew; + uint32_t *cp2 = cp1 + w + toskew; + uint32_t *cp3 = cp2 + w + toskew; +- int32_t incr = 3 * w + 4 * toskew; ++ const tmsize_t incr = 3 * (tmsize_t)w + 4 * (tmsize_t)toskew; + + (void)y; + /* adjust fromskew */ +@@ -2356,7 +2356,7 @@ DECLAREContigPutFunc(putcontig8bitYCbCr44tile) + DECLAREContigPutFunc(putcontig8bitYCbCr42tile) + { + uint32_t *cp1 = cp + w + toskew; +- int32_t incr = 2 * toskew + w; ++ const tmsize_t incr = 2 * (tmsize_t)toskew + w; + + (void)y; + fromskew = (fromskew / 4) * (4 * 2 + 2); +@@ -2512,7 +2512,7 @@ DECLAREContigPutFunc(putcontig8bitYCbCr41tile) + DECLAREContigPutFunc(putcontig8bitYCbCr22tile) + { + uint32_t *cp2; +- int32_t incr = 2 * toskew + w; ++ const tmsize_t incr = 2 * (tmsize_t)toskew + w; + (void)y; + fromskew = (fromskew / 2) * (2 * 2 + 2); + cp2 = cp + w + toskew; +@@ -2615,7 +2615,7 @@ DECLAREContigPutFunc(putcontig8bitYCbCr21tile) + DECLAREContigPutFunc(putcontig8bitYCbCr12tile) + { + uint32_t *cp2; +- int32_t incr = 2 * toskew + w; ++ const tmsize_t incr = 2 * (tmsize_t)toskew + w; + (void)y; + fromskew = (fromskew / 1) * (1 * 2 + 2); + cp2 = cp + w + toskew; diff --git a/meta/recipes-multimedia/libtiff/tiff_4.7.1.bb b/meta/recipes-multimedia/libtiff/tiff_4.7.1.bb index 0d4b3a4abd3..750565e11c1 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.7.1.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.7.1.bb @@ -9,6 +9,7 @@ LIC_FILES_CHKSUM = "file://LICENSE.md;md5=4ab490c3088a0acff254eb2f8c577547" CVE_PRODUCT = "libtiff" SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \ + file://CVE-2026-4775.patch \ " SRC_URI[sha256sum] = "f698d94f3103da8ca7438d84e0344e453fe0ba3b7486e04c5bf7a9a3fabe9b69" From patchwork Tue May 19 23:29:50 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88456 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D2B56CD5BB6 for ; Tue, 19 May 2026 23:30:40 +0000 (UTC) Received: from mail-wm1-f52.google.com (mail-wm1-f52.google.com [209.85.128.52]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.957.1779233435371872621 for ; Tue, 19 May 2026 16:30:35 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=QmUFAwK6; spf=pass (domain: smile.fr, ip: 209.85.128.52, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f52.google.com with SMTP id 5b1f17b1804b1-488a9033b2cso34241925e9.2 for ; Tue, 19 May 2026 16:30:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233433; x=1779838233; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=W5GDhobT8B/EDc4mPlLe1IN5iyLyz/EuGPsSCPb8xFA=; b=QmUFAwK6CI1E7lQOhKrwqfv/G4zsqT6TMlYSZBiBZrl0DaBRPMJVNvZqxLtC42G75N Rc6eclFtiS5lr/gYRK0R+nR24OTlv2w4Iq4yuNx7Azg2+byu+no9N6AkraqFNEWVHI6c VMViPjbKin8xOtFZqj/d5zum909ZYP0jXun9A= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233433; x=1779838233; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=W5GDhobT8B/EDc4mPlLe1IN5iyLyz/EuGPsSCPb8xFA=; b=NK5SPpHCX4vONGjrtHfj/+McHWTVFhIeHQh3exWoS4h6tv+7UvlZeMm+8n3Dcf2mSL qPWOHT5r9jK1PYhhrEeKasUPl2x527GDIRlzJs60V8wNA/ERxPBKV4LjMYWICl+Ec/1f EeRxwkcbE6HN8MuE/Xbo0nEEhu7UNQhQBnantvRhJa920CQL88k3vikysPuIvKqUQJuK VokD90CTGuVz4uwI9KzlvHxt/I+Yu+hpgwvWTZW/i5QRiX3FCd61+HRkOxFnXo90EsXG NLmG3KE+uPVzI56wODDkANPa1930XIRdtk3iirlYpMZOq6ov/E0X/vVwyF8hMPVv2IDF jxDw== X-Gm-Message-State: AOJu0Yyzv0eZTVjPbGkB99FZ7V99mPJ+HDlkNOHFySuEQgOaWAgv7WEm 6obJe5ddCl+tX/HHbgGt9sd6+wqVNLsdVEqudKUjHRYVaZZJSeuZsfoWoaMb7B5DILw+RdH4ECq t7YGr X-Gm-Gg: Acq92OFsJS828M76ks7qmPMaxUk/x+owGqYWJAJotv/XNYCK2sVhfHKBXPKeLgn86Id Vd6x0w/KVpYaOQH1MyJUBvWBevphGFiKPqAfa83OCQEqff2x8zKkS+4JVLk+pKYnSpLhlzXCvI2 wJjXZBzdWAQK5GeyIcq8Z6219mnMukvoSHYjIeE1fy7XHPcKMZRlGyI5BsdxCvsVlELIBn4u1mb JSweOgCdCJIC0n0icX010fO5vHZ79mPymLJbSLLxfODE05vkKIPt5wSOAKLT5P52OkmzMjILU3I MFiwpLEQz26R/Tt3TblaMs0Fz3GeFzUTSjcMgVmKKCg8B+76MJOWXPO3q6C1SNoaHphIF9Jcw1W avUZlfCuu8r8e6D8HWWYNtDxbWqIIAMmmfyXOz9+B5raZraQHm0vT21GwR6pY3U0MSA8qp59NyB cTis68iCF5imn2Y1IVtPOgiYhQE76+Oy/0zH7cj8L65TRVpGHEaVg//kes0w7h1ML6TutwUcjgr LULjQj861RMIERZrC3o252zHZw= X-Received: by 2002:a05:600c:4f8a:b0:489:ad:7b5b with SMTP id 5b1f17b1804b1-48fe62f8c6bmr334048575e9.24.1779233433589; Tue, 19 May 2026 16:30:33 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:32 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 13/28] libssh2: patch CVE-2026-7598 Date: Wed, 20 May 2026 01:29:50 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:40 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237360 From: Peter Marko Pick patch mentioned in both NVD and Debian report. Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 8bc37ca4fd0ad000a85ba738e55c48bff0efaf9f) Signed-off-by: Yoann Congal --- .../libssh2/libssh2/CVE-2026-7598.patch | 56 +++++++++++++++++++ .../recipes-support/libssh2/libssh2_1.11.1.bb | 1 + 2 files changed, 57 insertions(+) create mode 100644 meta/recipes-support/libssh2/libssh2/CVE-2026-7598.patch diff --git a/meta/recipes-support/libssh2/libssh2/CVE-2026-7598.patch b/meta/recipes-support/libssh2/libssh2/CVE-2026-7598.patch new file mode 100644 index 00000000000..314e6af3709 --- /dev/null +++ b/meta/recipes-support/libssh2/libssh2/CVE-2026-7598.patch @@ -0,0 +1,56 @@ +From 256d04b60d80bf1190e96b0ad1e91b2174d744b1 Mon Sep 17 00:00:00 2001 +From: Will Cosgrove +Date: Mon, 13 Apr 2026 11:18:25 -0700 +Subject: [PATCH] userauth.c: username_len bounds checking (#1858) + +Return errors when username_len will exceed bounds, fix existing bounds +check. + +Credit: +[dapickle](https://github.com/dapickle) + +CVE: CVE-2026-7598 +Upstream-Status: Backport [https://github.com/libssh2/libssh2/commit/256d04b60d80bf1190e96b0ad1e91b2174d744b1] +Signed-off-by: Peter Marko +--- + src/userauth.c | 13 ++++++++++++- + 1 file changed, 12 insertions(+), 1 deletion(-) + +diff --git a/src/userauth.c b/src/userauth.c +index f8e02651..43d9ab9b 100644 +--- a/src/userauth.c ++++ b/src/userauth.c +@@ -80,6 +80,12 @@ static char *userauth_list(LIBSSH2_SESSION *session, const char *username, + memset(&session->userauth_list_packet_requirev_state, 0, + sizeof(session->userauth_list_packet_requirev_state)); + ++ if(username_len > UINT32_MAX - 27) { ++ _libssh2_error(session, LIBSSH2_ERROR_PROTO, ++ "username_len out of bounds"); ++ return NULL; ++ } ++ + session->userauth_list_data_len = username_len + 27; + + s = session->userauth_list_data = +@@ -307,6 +313,11 @@ userauth_password(LIBSSH2_SESSION *session, + * 40 = packet_type(1) + username_len(4) + service_len(4) + + * service(14)"ssh-connection" + method_len(4) + method(8)"password" + + * chgpwdbool(1) + password_len(4) */ ++ if(username_len > UINT32_MAX - 40) { ++ return _libssh2_error(session, LIBSSH2_ERROR_PROTO, ++ "username_len out of bounds"); ++ } ++ + session->userauth_pswd_data_len = username_len + 40; + + session->userauth_pswd_data0 = +@@ -447,7 +458,7 @@ password_response: + } + + /* basic data_len + newpw_len(4) */ +- if(username_len + password_len + 44 <= UINT_MAX) { ++ if(username_len <= UINT32_MAX - password_len - 44) { + session->userauth_pswd_data_len = + username_len + password_len + 44; + s = session->userauth_pswd_data = diff --git a/meta/recipes-support/libssh2/libssh2_1.11.1.bb b/meta/recipes-support/libssh2/libssh2_1.11.1.bb index 0d1237852f5..e825c8c5bb8 100644 --- a/meta/recipes-support/libssh2/libssh2_1.11.1.bb +++ b/meta/recipes-support/libssh2/libssh2_1.11.1.bb @@ -10,6 +10,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=2fbf8f834408079bf1fcbadb9814b1bc" SRC_URI = "http://www.libssh2.org/download/${BP}.tar.gz \ file://run-ptest \ file://0001-Return-error-if-user-KEX-methods-are-invalid.patch \ + file://CVE-2026-7598.patch \ " SRC_URI[sha256sum] = "d9ec76cbe34db98eec3539fe2c899d26b0c837cb3eb466a56b0f109cabf658f7" From patchwork Tue May 19 23:29:51 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88445 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AB303CD5BAB for ; Tue, 19 May 2026 23:30:39 +0000 (UTC) Received: from mail-wm1-f43.google.com (mail-wm1-f43.google.com [209.85.128.43]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.960.1779233436245007583 for ; Tue, 19 May 2026 16:30:36 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=y1JKjMVs; spf=pass (domain: smile.fr, ip: 209.85.128.43, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f43.google.com with SMTP id 5b1f17b1804b1-488ab2db91aso44097805e9.3 for ; Tue, 19 May 2026 16:30:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233435; x=1779838235; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ezcXUAgd3yypsXxRU0KXBXVe6zJ0PhpgRv7zqKFAc8s=; b=y1JKjMVsx0l1TNG8n3G041zchpBzfmE32GqwcZZKiMXDoFoyb1G1DS+UW78Sr0jtCe wLFcZqsm1tW2Irn3Ik7Hqjms6/d0BncAnK4CoQqqSmkbolkCYxbW+2pYDusMdmWk8Mi7 jv3uQJ+Xaja1mVKg1bUcPFUVMFtybqNZ8/tQo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233435; x=1779838235; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=ezcXUAgd3yypsXxRU0KXBXVe6zJ0PhpgRv7zqKFAc8s=; b=rKeHxko3ZuOu9iX57wXt1pc3RFKJ5cBGscYoDCaWFzHRouQEuP5LwLExn4Dblyrc1V L4/Y8ucL4IakoR7d9whPllLtC4jquvqfA3+8MjmQ9AwctHGKjfRWGkmZTZZ9b6Em8Cd4 58uSbv47xv8suCEkXRjQ8p6obRXmdtRfoq2SC7sVOmFkfv4VR8OzzH8tY9eXhmYCNqTM 2Uz78jUdfBCqxiYsEn5vOFaX3cBbj1Mpn2rZQwKQb1i+lEj48aXBABDh9RSZmpCRQgkK VCXlRS18zwZRIIprtVgTz/bj26LRQ0wYMrRzhQ+sMo9Gx85lcWGmc4QdYjzjlrLMgjwA MiKQ== X-Gm-Message-State: AOJu0YyJbzhaNxxQDEohMLZ1cDZw/fakM43YRe0+/cc/Z4O0BamVg39M aVqMgCQfaZ1zzaCznGaDB/6hl/VtowxHPqcpr1PW+khHMNrO+9E8fdUwuP+NzOFns6COm5G9uBm 0Ce3Q X-Gm-Gg: Acq92OF4GqSLdnr2Z7L71gVYA0oEXcznp/YHbu0G7eT17xLneFEMhbNv1iZSHdIROOd 2GpO0/wMpDnrlMxc9hhk7EHHtom17G9SA4NhZAG5R0taaA60kEZSKhxTSe8fmDEguww4Zo2hRw1 hWLV6JMf2UWzXO+tWW5qPjgWqnXesamB6X3CqegTa2uVrysaKDZhj1SVKcqfGMBOGAKg3pBxdka USkRD35G/L60n/hlSSRX5oWFlzF+0PAjfwURZ5tck78OkJuXHOsQZ/lJUXFuA6NyE9RcM3fXKM+ dXy/2hwEcxh1rcJ0kB0R51VRxGJ5WSvMUITh0zsiT/AsMN8Qs1QWUuveBdv2mW94pmKdjeuF4+4 v/tfxQ5KD1903seFV2RFqLbeyLZM4rbo5n26LicE4pY7akIUcWjViM/UrPPGV2VXLV+ks5DHMQG ufp3a8L8k7o27tVjiAcFAmVysaT0wKHXDZyDs1fuv22975Jk2znOWhJ+ZX3KrKbiZ5yJ7weDlW3 FUg6G4fQ4EwGvjwrGjU6CapYNM= X-Received: by 2002:a05:600c:c10b:b0:48f:d612:3c59 with SMTP id 5b1f17b1804b1-48fe60eb0f6mr233295985e9.9.1779233434666; Tue, 19 May 2026 16:30:34 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.33 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:33 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 14/28] libarchive: set status of CVE-2026-5745 Date: Wed, 20 May 2026 01:29:51 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237361 From: Peter Marko Debian security tracker [1] links Github issue [2] which points to PR [3] which has been fixed on 3.8 branch with [4]. [1] https://security-tracker.debian.org/tracker/CVE-2026-5745 [2] https://github.com/libarchive/libarchive/issues/2904#issuecomment-4257068822 [3] https://github.com/libarchive/libarchive/pull/2905/changes [4] https://github.com/libarchive/libarchive/commit/8c04ac3c91841cdf75dc9de4a405cd7c69 Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit a3f38d68bd58f2028f8097d2cb11486d8a8f75ad) Signed-off-by: Yoann Congal --- meta/recipes-extended/libarchive/libarchive_3.8.7.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-extended/libarchive/libarchive_3.8.7.bb b/meta/recipes-extended/libarchive/libarchive_3.8.7.bb index 577362ef8b0..e8c3a3bfe3d 100644 --- a/meta/recipes-extended/libarchive/libarchive_3.8.7.bb +++ b/meta/recipes-extended/libarchive/libarchive_3.8.7.bb @@ -91,3 +91,4 @@ RDEPENDS:${PN}-ptest += "bsdtar bsdcpio" CVE_STATUS[CVE-2026-4426] = "fixed-version: fixed since 3.8.7" CVE_STATUS[CVE-2026-5121] = "fixed-version: fixed since 3.8.7" +CVE_STATUS[CVE-2026-5745] = "fixed-version: fixed since 3.8.6" From patchwork Tue May 19 23:29:52 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88446 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6E26DCD5BA4 for ; Tue, 19 May 2026 23:30:39 +0000 (UTC) Received: from mail-wm1-f41.google.com (mail-wm1-f41.google.com [209.85.128.41]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1008.1779233437068027682 for ; Tue, 19 May 2026 16:30:37 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=yc1iudYK; spf=pass (domain: smile.fr, ip: 209.85.128.41, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f41.google.com with SMTP id 5b1f17b1804b1-488e1a8ac40so40025575e9.2 for ; Tue, 19 May 2026 16:30:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233435; x=1779838235; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=a/hvd7GpTWf4/glanBmSWN+COQQ7YAXhtXLTQDDANNY=; b=yc1iudYKEhhr04P1/dxQVv4ovJ0h8nIT41Cbnm8PLOG8zp1sC49BboQyDj4eKVELQx WDjwUq15EQA4Gt1+J80Ysqm3uyUSX/uJLVC69Dx8BCrnfY8suZTzuiVg2fDQBRBgm0Kc PlNRKlAqpZX038t9qxPkLs1Dln7TM3mKVzHN8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233435; x=1779838235; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=a/hvd7GpTWf4/glanBmSWN+COQQ7YAXhtXLTQDDANNY=; b=RNO0NiLZk+Uf9qDgXR0Jcyw+CBB054IxXCKluTUAI81i6eq5cT6yTTO8cnr6fT32uD IW546c0AmTShGRTi296WectbIEcX/ofRc6R8+TVv+Dn/J7PbrdqHMgnrCez5tDSv1Y8X yFeoORDETgZ8P5tOqy/4s9TgEaLTukWOJ+hm+d772sFdeiq2SigYwUv1IAYKHmzqHu3E +t8VbO/Va9ZkTWMb4ZxT/mHMtDKRXWULMP3mkerDwgVuZlnlMBQrGVd6+e+RjyDhTAOR hxHPhh1ZZCrkyYJwFMd8XFKBKaFOrDVXp0VkUDa6ls2tEGvWm0PQM9+VnyZJulcl7+Bi wiZA== X-Gm-Message-State: AOJu0YwrgXqLG674WXPYQwZNltHClH3hUiOdrw/Lf6ez++T408KHCdn1 SjbTdGJMsxpt0J+DA4mSvGSJw0MPbkVMiCoazJQWgTERHrJNcsY7dINMLxdeNAK/CXYeM7MJQlE ieO05 X-Gm-Gg: Acq92OG9HNAcwpLN4H2ejOu7a7YYn+iNTI51GvD20IcMcha8sBDvBhZj75t65GRHzUX oFk2gpKshiVw+IjTt6wCXSs5Z6jFVb+3b3npRBQnG8RO/AC7Fn2Wjjq/3/pfQeEAZ1qxiAJqBTH IPvmMmewGrRreOtfINSsFvXv0uCglDoa/OwV4eX8qZL63hjkdoRyzUCKFOUR7+igVD2g/DeJ4rG rwZT/jn1UMnKc4DFfdEnEi0ixCCW46TlVucMKLurmu2ycKpfyTgd6zHWBmvFOIVBkhT0ygD0uEI kJXGPa2aZnQjIulUW8FUkgLIW/YNo4yt/cQki7HKaKuPip5A2LFRh+NdVrKRcNmDoe0Oyc2abpj z4cNtz5WAXY3ijJltfsZiC2R6pL5irqfKzDZtzfXDoKtvMr7z5Hw7c621UO+W5do6CnEnamNmls CclrcbEwusQq0+rgobeFUZckGLxI+34XjklH24FqUqf4wsogaVIB2qDrhZq5cKx+g+bXEkWX0Qf MdjeyDqV9PuOV2aW4MxDkXDn9k= X-Received: by 2002:a05:600c:a11c:b0:488:9bf8:7f17 with SMTP id 5b1f17b1804b1-48fe61f27famr247081005e9.14.1779233435217; Tue, 19 May 2026 16:30:35 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:34 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 15/28] efivar: Backport patch to fix -march issue for ppc64le Date: Wed, 20 May 2026 01:29:52 +0200 Message-ID: <5d9e1eaefa5360ecfdc5058e25746ac5a58203fd.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237362 From: Andrew Geissler Backport upstream commit 9711b8aa5acc to fix compilation errors on ppc64le architecture. The issue occurs because GCC on ppc64le does not recognize the '-march=native' option and suggests using '-mcpu=native' instead. Upstream commit: https://github.com/rhboot/efivar/commit/9711b8aa5acc63c54a12ba5505fe68b4475c8a13 Signed-off-by: Andrew Geissler Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 683e2531be8ca28ace0ed1ef06b6211056338a35) Signed-off-by: Yoann Congal --- .../0003-fix-march-issue-for-ppc64le.patch | 45 +++++++++++++++++++ meta/recipes-bsp/efivar/efivar_39.bb | 1 + 2 files changed, 46 insertions(+) create mode 100644 meta/recipes-bsp/efivar/efivar/0003-fix-march-issue-for-ppc64le.patch diff --git a/meta/recipes-bsp/efivar/efivar/0003-fix-march-issue-for-ppc64le.patch b/meta/recipes-bsp/efivar/efivar/0003-fix-march-issue-for-ppc64le.patch new file mode 100644 index 00000000000..d27541aeb10 --- /dev/null +++ b/meta/recipes-bsp/efivar/efivar/0003-fix-march-issue-for-ppc64le.patch @@ -0,0 +1,45 @@ +From 9711b8aa5acc63c54a12ba5505fe68b4475c8a13 Mon Sep 17 00:00:00 2001 +From: Andrew Geissler +Date: Tue, 4 Nov 2025 09:58:55 -0600 +Subject: [PATCH] Fix the -march issue for ppc64le + +Similar to the fix in aab4e9b10ac, need to also support the ppc64le +architecture. + +The failure without this fix on a ppc64le machine: + +| cp util.c util-makeguids.c +| gcc: error: unrecognized command-line option '-march=native'; did you mean '-mcpu=native'? + +Signed-off-by: Andrew Geissler + +Upstream-Status: Backport [https://github.com/rhboot/efivar/commit/9711b8aa5acc63c54a12ba5505fe68b4475c8a13] +--- + src/include/defaults.mk | 4 ++++ + 1 file changed, 4 insertions(+) + +diff --git a/src/include/defaults.mk b/src/include/defaults.mk +index 4da0cde3..a21a7aeb 100644 +--- a/src/include/defaults.mk ++++ b/src/include/defaults.mk +@@ -74,6 +74,7 @@ override SOFLAGS = $(_SOFLAGS) \ + HOST_ARCH=$(shell uname -m) + ifneq ($(HOST_ARCH),ia64) + ifneq ($(HOST_ARCH),riscv64) ++ifneq ($(HOST_ARCH),ppc64le) + HOST_MARCH=-march=native + else + HOST_MARCH= +@@ -81,6 +82,9 @@ endif + else + HOST_MARCH= + endif ++else ++ HOST_MARCH= ++endif + HOST_CPPFLAGS ?= $(CPPFLAGS) + override _HOST_CPPFLAGS := $(HOST_CPPFLAGS) + override HOST_CPPFLAGS = $(_HOST_CPPFLAGS) \ +-- +2.34.1 + diff --git a/meta/recipes-bsp/efivar/efivar_39.bb b/meta/recipes-bsp/efivar/efivar_39.bb index c0e8d521819..e5839f7a990 100644 --- a/meta/recipes-bsp/efivar/efivar_39.bb +++ b/meta/recipes-bsp/efivar/efivar_39.bb @@ -10,6 +10,7 @@ COMPATIBLE_HOST = "(i.86|x86_64|arm|aarch64|riscv64).*-linux" SRC_URI = "git://github.com/rhinstaller/efivar.git;branch=main;protocol=https \ file://0001-docs-do-not-build-efisecdb-manpage.patch \ file://0002-efivarfs-backport-patch-to-update-file-variable-store-on-SetVariableRT.patch \ + file://0003-fix-march-issue-for-ppc64le.patch \ " SRCREV = "c47820c37ac26286559ec004de07d48d05f3308c" From patchwork Tue May 19 23:29:53 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88442 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 43A01CD4F54 for ; Tue, 19 May 2026 23:30:39 +0000 (UTC) Received: from mail-wm1-f53.google.com (mail-wm1-f53.google.com [209.85.128.53]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1009.1779233437230900979 for ; Tue, 19 May 2026 16:30:37 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=b6IsNtk2; spf=pass (domain: smile.fr, ip: 209.85.128.53, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f53.google.com with SMTP id 5b1f17b1804b1-488ab2db91aso44097895e9.3 for ; Tue, 19 May 2026 16:30:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233436; x=1779838236; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=6HJKg1tJy9aiC63wH7W7apZNAv2shqC1M9hJbeiBrMg=; b=b6IsNtk2xgdQY6/WmzdTcZYeCGNBFHGL0KcWdmqOZkxVLRmVN99/Ktk1uItnHMmBqm hvki2WIBUy2XfvUFi2CxhEnBQU1h9+DhPJJeFmJHsOCJBSSFMUo+OIW7NOWlhX2XvCm8 1EEUSWToQn7kd+Qs8PoZPABab1oLeu2ZcyIbg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233436; x=1779838236; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=6HJKg1tJy9aiC63wH7W7apZNAv2shqC1M9hJbeiBrMg=; b=KmevKUav855OZoskWqKx8uCI4x/StL46R28x1YLJ/zPuL2aXhkmo2H8kmDXGQSeG/c MEouXwSYx6eacjDjzxhqRU7JtTMdIzl/lsk1rr4Fn3V0wr6RER0fAXfra0xcw6a5nZ6q ydD3kxOnyNGPFp75qANxpzSZaFTOFbR5veHRPgq4wBs+RHX02DhtgX6IKpuUKw9GxH/p IJvnN5aK3+y895ltKIFxyeRsncXQ/p1rXtPwcoySNewIg8T25hHwwgcu2iNdIkPsIl/5 5j1sD+J6yQuAhdXjyscc3EgDh/M6SvvqqBKfQ58a9oir3UTsccWuclKvUWBTtOvK2ON3 F0Ag== X-Gm-Message-State: AOJu0Yw3fh/9Mra5LIrBZ/6fIu8goeUauc1U7copv+rcrM6yJZi5NY2c eMlHEBoLlTCG4g+85RoH7yCJS8HzGpDoYWUDRKWJ32GkC2n1c3Gn1o3olFM39L+JlWbV656I8Go /AfdY X-Gm-Gg: Acq92OHYkn01nXvVHQSOywAse/HR1l+I6OhBNEgEJVdFv4Q2RrJFBXB+aaS70DA/VrN JfM0YesUsuXgt2xQ82EzCPaaMdw0eMXyk0bzJmYlZirCU7Dqas/XHsAG0H8raU0QR3NzXIpOzsJ VxFq8ndG5z19JGg8VNkE+dMGq0LZN6+3HtQmPxJC+MKXdkTYxJjxqISj6mhKgIqsan14IEbr6NC amB9awG18UbWXVgr/B6bbclKVRNIJvwfYIwcpnp4dTyd/M3/ToKSI2oJUf29dKf8O6ptS/4PeNp LDYG/LVVWu+UJCYILiMwfL5hVmQdO92CU0FfvExAaD4s1ekH2EKjUDxpnYuLldElDTza6gBJES6 9/kVq3UWF8ErBScnV1ZupEa8f3DN4k5VlciR06havvVR5XYVAED1brgha5rWjWBi9omfzIHkFkz GPKCkYrP81HdDKaJblQ2JCajofKZEKMN2W8KjHzAtUFszKaL0TFjAmJAzj+8Hy30RPWEndw6xXk aGxCz561yZywrAb18z8xv4yk/4= X-Received: by 2002:a05:600c:2d86:b0:48f:d5b2:7c42 with SMTP id 5b1f17b1804b1-48fe63259camr229961645e9.17.1779233435679; Tue, 19 May 2026 16:30:35 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.35 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:35 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 16/28] oe-pkgdata-util: fix empty runtime-rprovides directory handling Date: Wed, 20 May 2026 01:29:53 +0200 Message-ID: <7da5986c081713370b4bd93e291ef6dab27d64fe.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:39 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237363 From: Sam Kent An empty runtime-provides directory caused lookup-recipe, package-info and list-pkg-files to skip the runtime-reverse fallback. Use os.listdir() to ensure the folder is not empty and use os.path.isdir( to ensure it is not a file. Signed-off-by: Sam Kent Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 678c1c2077316b6b81ba9be000528b50dca19ca6) Signed-off-by: Yoann Congal --- scripts/oe-pkgdata-util | 15 +++++++++------ 1 file changed, 9 insertions(+), 6 deletions(-) diff --git a/scripts/oe-pkgdata-util b/scripts/oe-pkgdata-util index bbfc6a2dddd..904008bd029 100755 --- a/scripts/oe-pkgdata-util +++ b/scripts/oe-pkgdata-util @@ -289,8 +289,9 @@ def lookup_recipe(args): for pkg in pkgs: providepkgpath = os.path.join(args.pkgdata_dir, "runtime-rprovides", pkg) - if os.path.exists(providepkgpath): - for f in os.listdir(providepkgpath): + rprovides = os.listdir(providepkgpath) if os.path.isdir(providepkgpath) else [] + if rprovides: + for f in rprovides: if f != pkg: print("%s is in the RPROVIDES of %s:" % (pkg, f)) pkgdatafile = os.path.join(args.pkgdata_dir, "runtime", f) @@ -355,8 +356,9 @@ def package_info(args): for pkg in packages: providepkgpath = os.path.join(args.pkgdata_dir, "runtime-rprovides", pkg) - if os.path.exists(providepkgpath): - for f in os.listdir(providepkgpath): + rprovides = os.listdir(providepkgpath) if os.path.isdir(providepkgpath) else [] + if rprovides: + for f in rprovides: if f != pkg: print("%s is in the RPROVIDES of %s:" % (pkg, f)) pkgdatafile = os.path.join(args.pkgdata_dir, "runtime", f) @@ -507,8 +509,9 @@ def list_pkg_files(args): else: providepkgpath = os.path.join(args.pkgdata_dir, "runtime-rprovides", pkg) - if os.path.exists(providepkgpath): - for f in os.listdir(providepkgpath): + rprovides = os.listdir(providepkgpath) if os.path.isdir(providepkgpath) else [] + if rprovides: + for f in rprovides: if f != pkg: print("%s is in the RPROVIDES of %s:" % (pkg, f)) pkgdatafile = os.path.join(args.pkgdata_dir, "runtime", f) From patchwork Tue May 19 23:29:54 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88454 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9CC8CCD5BB2 for ; Tue, 19 May 2026 23:30:40 +0000 (UTC) Received: from mail-wm1-f45.google.com (mail-wm1-f45.google.com [209.85.128.45]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.962.1779233437990004811 for ; Tue, 19 May 2026 16:30:38 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=3H+2Fd1t; spf=pass (domain: smile.fr, ip: 209.85.128.45, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f45.google.com with SMTP id 5b1f17b1804b1-4893940bb5eso22955485e9.3 for ; Tue, 19 May 2026 16:30:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233436; x=1779838236; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=FyisB7/NWet7jggIZ/bYjpO3yAC66N/q+/ldLyGbY7I=; b=3H+2Fd1tQ73uLMvqz8eUbQZIhpIzbvJcP1oRFdUgOt+vxAOT9mcMT7NxMyNDT66DGp Ea3y+Wg7ZHFN8oSHxYB8jx4aROyoTY9TYSc1o18yC5TZvftLw7DXdJq999SLH48dNtCa TaN2/Dgi5LQ1yvVPyzPrSg3jtKDUEwB6TiSSk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233436; x=1779838236; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=FyisB7/NWet7jggIZ/bYjpO3yAC66N/q+/ldLyGbY7I=; b=OU/0T7LKv/8z9X0kYVBATeccP/+WJapi99ksVZqGfXFn+/oirLu5I9Bm5pEtuRtfLA OWmzomqYeLdEfkksimKpGQWG3oYSvDmau5rTxS91ew75g00oBXXlbIH5gQNRAZdoNaoT 7LP4YTps1ZOi0fFwX2g1zT1DnFbyRg/s93XOlRsyYuweWNqcYULZPljgMqOKhLMKBfNM zW0BuoHMcP6+QIuvsJhRlviUmcvDLtNJe+9j3aUlaek8tRJpOtnKJBoUUaOIkR2rke5T nzPNux22mCQe7JmLr7XkjLkqaCW2FcYE0rerx+GLdEzcIkpX8nnJlzxM8pzBOEOTNrnt mOsg== X-Gm-Message-State: AOJu0YxrCc5OEWQIHrFS/1mFxcl4GcMJdKB13MaujJlMQAN7eQRdnj7/ 0mZCxslA42Bb9rusRCpRGRx8wPzPuWRPdGAMsSe72wihD+bs/A5Atme/zNbpHJr56VtBKyLRFZO sHSac X-Gm-Gg: Acq92OHiEjeOVsWtm59KWaS8MjlUof7nlfvGp1s6kpFcC/vdP8uYlDEdmeGnglvSEaY LtD6oZTH1frFt7I40220Q8EFtIHQi8qBoYSQPfiGnso3mR94g9yYbHmR1sZ6kK4W5rLmsaPFvsv LbROs2V1gAWkPyKqddFe+EBxhrWlUAmWLpn1UfwbMNFQxOB9lXT9hvo6RO6KTalDzjH4M4O7zKF 5V6ebt+Rpzw7Dblywx1T6sTbjWkPFzZVBEJVMoAu4Qs3zI1tvUcyc3FCcKpodaPhpWYHixYSG0X BNwkRy1Nxx/KyZuEbMSZ4u26ArSqaiPkI635yYKPPi73dUHVr1ZZvcxsPHF4ovVluim9UQUNqAG IAzhud1MCZ09cGRoreQf9EN/UK9sdb7ABxWHs03uiQeOng5fGhYTWB3LCB6keuANNMTn/OTZyZm NWR0QjQ1EGFOBnmjtYcyrevORiifUr/JtmEJcfH/2nKun1ubGW3ck4lSRUUgPEhLXk9pNWS3XLe M2O6wMYoOZRJxygfQgywNpfJeQ= X-Received: by 2002:a05:600c:4e46:b0:48a:75b9:5e07 with SMTP id 5b1f17b1804b1-48fe60d576dmr345171815e9.11.1779233436102; Tue, 19 May 2026 16:30:36 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.35 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:35 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 17/28] oe-pkgdata-util: fix runtime-rprovides handling in lookup_pkg error path Date: Wed, 20 May 2026 01:29:54 +0200 Message-ID: <020a975f71a78a7cc1d38a932a8a8eb33af0d1e7.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:40 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237364 From: Thomas Perrot Commit 678c1c207731 applied os.path.isdir() + non-empty check to three functions, but the error-reporting path in lookup_pkg introduced by commit 46ff3a8d2c18 was left using os.path.exists() + os.listdir(). This is fragile: it raises NotADirectoryError if the path exists but is a file, and silently falls through to the generic error on an empty directory rather than skipping the rprovides block. Apply the same pattern used elsewhere for consistency. Signed-off-by: Thomas Perrot Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit dbca656205a7d9a9a9b0aa25b4ad6562af9c5180) Signed-off-by: Yoann Congal --- scripts/oe-pkgdata-util | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/scripts/oe-pkgdata-util b/scripts/oe-pkgdata-util index 904008bd029..acefae24f3a 100755 --- a/scripts/oe-pkgdata-util +++ b/scripts/oe-pkgdata-util @@ -239,8 +239,8 @@ def lookup_pkg(args): missing = list(set(pkgs) - set(mappings.keys())) for pkg in missing: providepkgpath = os.path.join(args.pkgdata_dir, "runtime-rprovides", pkg) - if os.path.exists(providepkgpath): - providers = os.listdir(providepkgpath) + providers = os.listdir(providepkgpath) if os.path.isdir(providepkgpath) else [] + if providers: for provider in providers: if provider == pkg: continue From patchwork Tue May 19 23:29:55 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88443 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CC362CD4F5B for ; Tue, 19 May 2026 23:30:38 +0000 (UTC) Received: from mail-wm1-f41.google.com (mail-wm1-f41.google.com [209.85.128.41]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.963.1779233438300249260 for ; Tue, 19 May 2026 16:30:38 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=QP1IVxGW; spf=pass (domain: smile.fr, ip: 209.85.128.41, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f41.google.com with SMTP id 5b1f17b1804b1-488b0e1b870so61881835e9.2 for ; Tue, 19 May 2026 16:30:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233437; x=1779838237; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=U1dWAkRMLSu5nmBvj/uNRxhgcQAz50lvshtcA5pA5eg=; b=QP1IVxGWnrGsxt3gXJKDWb223MGzezP95NDs6a3mCph7mmBIEamNizSG395bGMjJGX cYAFNyj6dmt9du1SzswB6h2tGRWE8qk7t0ZpZHfcjXNvEQZAemdHqQhJheLz+miySaSm WOwcAoq/zVnpdxIe0TQIV9JAt0iuw0TCu9k48= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233437; x=1779838237; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=U1dWAkRMLSu5nmBvj/uNRxhgcQAz50lvshtcA5pA5eg=; b=BB+c79xV/XNUJPsHuBR2FNM+rHzMY0iI4cPBMOrAYG0x28xoN0ZsuTfe74mkchna0O I/BFR8GFjiCe+PjH5BsM/rJjuJ5DxBs/dburI3oPQs+1rUV5B00RaA1z9ajJkJMoGJW7 4tu/dNsdTL1vWmdwWrdopvbNdBNBpyvATU0jhu5lUbkiZE8AGBaXx/JEfQuzDVOyc+z7 9Bq5PkpYH4DWM6YAcqcORIcTgTljz7JS/nQC++xrcD7lqpdYNeFQqWPWJKL8fEZZR4Ro PjQMUwPhHKozaoO/MTR3Px0ZXaHLl/pbOJwgucsJeS5hhX2RA5XJ+r1TYg842LBd47w6 5u+Q== X-Gm-Message-State: AOJu0YzmDSVhUmPzooJ5MFJyM1NES7FP4wvWiTDqk/7qngETVK+ibT0F NIRu0Dn92FT/jXow1mk1qWvO7vbGyjws8JblIlM4gMOkUaqFMGA+oM367HsT471cSnbricm8RTa zjNpX X-Gm-Gg: Acq92OGzc9wEsq/g7CKYVd5jmL6KTA5b4rtoh0dwl28vbV+bRBB9fcskLX2JrcuCY3o Y9wU7XoUOUBrQm+JPf6qS8bff43Ia0HGJrZyxHIFdgfpopR289vfTqpxCoDibOQoa60uuxwjZFD i4rdasPPWeTGQzAsJjd6MtGgU6FOBZxbStRxlURBr12LSmnN8Tg7v1CVKUnSX/HtzrGcKVcZQlI lrGkWQLhu5SOWinJNjAnw7PI2DftIx1dFyczHSNKlFrpqk7q2t+DEAOU1zVpMqLB672J8uxCFx+ 7nEcn4KnXrHG1CE2scG+0jo5dKggyze/N2d8DQdpm7qNQR/BlFrhE99Q5LuzrEWrEK1Qi0JRZQC VtATtcuh1iIjHGb107I0ZlpghFjwHir2gBsZjU4TPLJPP8efbvcIGzceRcCFDIv6U4fPY1GOn/Q iXfi1WRL5A1/uoEqgIGILEtRD/Tu47zjIgfEJyEmkSO5nZzQN9mFq2WumevITc4cDQ9QEknqOYO 9wFPrmo0rxC5VRz6yW3lFPjPlY= X-Received: by 2002:a05:600c:3487:b0:48e:7f22:d90 with SMTP id 5b1f17b1804b1-49017d45a80mr137681535e9.4.1779233436609; Tue, 19 May 2026 16:30:36 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:36 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 18/28] libsoup: patch CVE-2026-2708 Date: Wed, 20 May 2026 01:29:55 +0200 Message-ID: <31bda102f23baed9bc82bb37669aac82c3d20ec1.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:38 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237365 From: Peter Marko Pick patch per [1]. [1] https://security-tracker.debian.org/tracker/CVE-2026-2708 Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 7f84f2e79b23546001d8aa1e4f8b36a0097c769e) Signed-off-by: Yoann Congal --- .../libsoup/libsoup/CVE-2026-2708.patch | 218 ++++++++++++++++++ meta/recipes-support/libsoup/libsoup_3.6.6.bb | 1 + 2 files changed, 219 insertions(+) create mode 100644 meta/recipes-support/libsoup/libsoup/CVE-2026-2708.patch diff --git a/meta/recipes-support/libsoup/libsoup/CVE-2026-2708.patch b/meta/recipes-support/libsoup/libsoup/CVE-2026-2708.patch new file mode 100644 index 00000000000..479a53ae212 --- /dev/null +++ b/meta/recipes-support/libsoup/libsoup/CVE-2026-2708.patch @@ -0,0 +1,218 @@ +From e032d3e9b0a27d10597398023532dd8f9b6654cf Mon Sep 17 00:00:00 2001 +From: Carlos Garcia Campos +Date: Tue, 17 Feb 2026 16:39:26 +0100 +Subject: [PATCH] Do not allow adding multiple content length values to headers + +Closes #500 + +CVE: CVE-2026-2708 +Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libsoup/-/commit/e032d3e9b0a27d10597398023532dd8f9b6654cf] +Signed-off-by: Peter Marko +--- + libsoup/soup-message-headers.c | 27 ++++++++++++++ + tests/header-parsing-test.c | 50 +++++++++++++++++++++++++- + tests/server-test.c | 64 ++++++++++++++++++++++++++++++++++ + 3 files changed, 140 insertions(+), 1 deletion(-) + +diff --git a/libsoup/soup-message-headers.c b/libsoup/soup-message-headers.c +index ca7719db..34cd2d8f 100644 +--- a/libsoup/soup-message-headers.c ++++ b/libsoup/soup-message-headers.c +@@ -269,6 +269,33 @@ soup_message_headers_append_common (SoupMessageHeaders *hdrs, + return FALSE; + } + ++ if (name == SOUP_HEADER_CONTENT_LENGTH) { ++ /* RFC 9110 - 7.7. Content-Length ++ * If a message is received that has a Content-Length header field value consisting of ++ * the same decimal value as a comma-separated list (Section 5.7.1) — for example, ++ * "Content-Length: 42, 42" — indicating that duplicate Content-Length header fields have ++ * been generated or combined by an upstream message processor, then the recipient must either ++ * reject the message as invalid or replace the duplicated field values with a single valid ++ * Content-Length field containing that decimal value prior to determining the message body ++ * length or forwarding the message. ++ */ ++ const char *content_length = soup_message_headers_get_one_common (hdrs, SOUP_HEADER_CONTENT_LENGTH); ++ if (content_length) { ++ guint64 decimal_value1, decimal_value2; ++ char *end; ++ ++ decimal_value1 = g_ascii_strtoull (content_length, &end, 10); ++ if (*end) ++ return FALSE; ++ ++ decimal_value2 = g_ascii_strtoull (value, &end, 10); ++ if (*end) ++ return FALSE; ++ ++ return decimal_value1 == decimal_value2; ++ } ++ } ++ + if (trusted_value == SOUP_HEADER_VALUE_UNTRUSTED && !is_valid_header_value (value)) { + g_warning ("soup_message_headers_append: Rejecting bad value '%s'", value); + return FALSE; +diff --git a/tests/header-parsing-test.c b/tests/header-parsing-test.c +index ebdc3246..5a3c92eb 100644 +--- a/tests/header-parsing-test.c ++++ b/tests/header-parsing-test.c +@@ -368,6 +368,22 @@ static struct RequestTest { + }, 0 + }, + ++ { "Duplicate Content-Length with the same value", NULL, ++ "POST / HTTP/1.1\r\nContent-Length: 4\r\nContent-Length: 4\r\n", ++ -1, ++ SOUP_STATUS_OK, ++ "POST", "/", SOUP_HTTP_1_1, ++ { { "Content-Length", "4" } }, 0 ++ }, ++ ++ { "Duplicate Content-Length with the same decimal value", NULL, ++ "POST / HTTP/1.1\r\nContent-Length: 04\r\nContent-Length: 4\r\n", ++ -1, ++ SOUP_STATUS_OK, ++ "POST", "/", SOUP_HTTP_1_1, ++ { { "Content-Length", "04" } }, 0 ++ }, ++ + /************************/ + /*** INVALID REQUESTS ***/ + /************************/ +@@ -507,7 +523,16 @@ static struct RequestTest { + NULL, NULL, -1, + { { NULL } }, + G_LOG_LEVEL_WARNING +- } ++ }, ++ ++ { "Duplicate Content-Length with different value", ++ "https://gitlab.gnome.org/GNOME/libsoup/-/issues/500", ++ "POST / HTTP/1.1\r\nContent-Length: 2\r\nContent-Length: 4\r\n", ++ -1, ++ SOUP_STATUS_BAD_REQUEST, ++ NULL, NULL, -1, ++ { { NULL } }, 0 ++ } + }; + static const int num_reqtests = G_N_ELEMENTS (reqtests); + +@@ -1475,6 +1500,28 @@ do_append_duplicate_host_test (void) + soup_message_headers_unref (hdrs); + } + ++static void ++do_append_duplicate_content_length_test (void) ++{ ++ SoupMessageHeaders *hdrs; ++ const char *list_value; ++ ++ hdrs = soup_message_headers_new (SOUP_MESSAGE_HEADERS_REQUEST); ++ soup_message_headers_append (hdrs, "Content-Length", "42"); ++ ++ /* Inserting the same value doesn't generate a list */ ++ soup_message_headers_append (hdrs, "Content-Length", "42"); ++ list_value = soup_message_headers_get_list (hdrs, "Content-Length"); ++ g_assert_cmpstr (list_value, ==, "42"); ++ ++ /* Inserting a different value does nothing */ ++ soup_message_headers_append (hdrs, "Content-Length", "45"); ++ list_value = soup_message_headers_get_list (hdrs, "Content-Length"); ++ g_assert_cmpstr (list_value, ==, "42"); ++ ++ soup_message_headers_unref (hdrs); ++} ++ + int + main (int argc, char **argv) + { +@@ -1491,6 +1538,7 @@ main (int argc, char **argv) + g_test_add_func ("/header-parsing/append-param", do_append_param_tests); + g_test_add_func ("/header-parsing/bad", do_bad_header_tests); + g_test_add_func ("/header-parsing/append-duplicate-host", do_append_duplicate_host_test); ++ g_test_add_func ("/header-parsing/append-duplicate-content-length", do_append_duplicate_content_length_test); + + ret = g_test_run (); + +diff --git a/tests/server-test.c b/tests/server-test.c +index 09ea03b3..59230444 100644 +--- a/tests/server-test.c ++++ b/tests/server-test.c +@@ -1422,6 +1422,68 @@ do_chunked_test (ServerData *sd, gconstpointer test_data) + } + } + ++static void ++do_multiple_content_length_test (ServerData *sd, gconstpointer test_data) ++{ ++ gint i; ++ struct { ++ const char *description; ++ const char *test; ++ const char *expected_response; ++ } tests[] = { ++ { "Double Content-Length with different value", "POST / HTTP/1.1\r\nHost: 127.0.0.1\r\nContent-Length: 0\r\nContent-Length: 4\r\nConnection: close\r\n\r\n\r\nABCD", "HTTP/1.0 400 Bad Request" }, ++ { "Double Content-Length with the same value", "POST / HTTP/1.1\r\nHost: 127.0.0.1\r\nContent-Length: 4\r\nContent-Length: 4\r\nConnection: close\r\n\r\n\r\nABCD", "HTTP/1.1 200 OK" }, ++ }; ++ ++ sd->server = soup_test_server_new (SOUP_TEST_SERVER_IN_THREAD); ++ sd->base_uri = soup_test_server_get_uri (sd->server, "http", NULL); ++ server_add_handler (sd, NULL, server_callback, NULL, NULL); ++ ++ for (i = 0; i < G_N_ELEMENTS (tests); i++) { ++ GSocketClient *client; ++ GSocketConnection *conn; ++ GInputStream *input; ++ GOutputStream *output; ++ gsize nwritten; ++ char buffer[4096]; ++ gssize nread; ++ GString *response; ++ const char *boundary; ++ GError *error = NULL; ++ ++ debug_printf (1, " %s\n", tests[i].description); ++ ++ client = g_socket_client_new (); ++ conn = g_socket_client_connect_to_host (client, g_uri_get_host (sd->base_uri), g_uri_get_port (sd->base_uri), NULL, &error); ++ g_assert_no_error (error); ++ ++ output = g_io_stream_get_output_stream (G_IO_STREAM (conn)); ++ g_output_stream_write_all (output, tests[i].test, strlen (tests[i].test), &nwritten, NULL, &error); ++ g_assert_no_error (error); ++ g_assert_cmpuint (nwritten, ==, strlen (tests[i].test)); ++ g_output_stream_flush (output, NULL, &error); ++ g_assert_no_error (error); ++ ++ response = g_string_new (NULL); ++ ++ input = g_io_stream_get_input_stream (G_IO_STREAM (conn)); ++ do { ++ nread = g_input_stream_read (input, buffer, sizeof(buffer), NULL, NULL); ++ if (nread >= 0) ++ response = g_string_append_len (response, (const char *)buffer, nread); ++ } while (nread > 0); ++ ++ boundary = strstr (response->str, "\r\n"); ++ g_assert_nonnull (boundary); ++ response = g_string_truncate (response, response->len - strlen (boundary)); ++ g_assert_cmpstr (response->str, ==, tests[i].expected_response); ++ g_string_free (response, TRUE); ++ ++ g_object_unref (conn); ++ g_object_unref (client); ++ } ++} ++ + int + main (int argc, char **argv) + { +@@ -1464,6 +1526,8 @@ main (int argc, char **argv) + server_setup, do_steal_connect_test, server_teardown); + g_test_add ("/server/chunked", ServerData, NULL, + NULL, do_chunked_test, server_teardown); ++ g_test_add ("/server/multiple-content-length", ServerData, NULL, ++ NULL, do_multiple_content_length_test, server_teardown); + + ret = g_test_run (); + diff --git a/meta/recipes-support/libsoup/libsoup_3.6.6.bb b/meta/recipes-support/libsoup/libsoup_3.6.6.bb index 792cb26e930..d18a16379b3 100644 --- a/meta/recipes-support/libsoup/libsoup_3.6.6.bb +++ b/meta/recipes-support/libsoup/libsoup_3.6.6.bb @@ -19,6 +19,7 @@ SRC_URI += "file://CVE-2025-32049-1.patch \ file://CVE-2025-32049-4.patch \ file://CVE-2026-1539.patch \ file://CVE-2026-5119.patch \ + file://CVE-2026-2708.patch \ " PROVIDES = "libsoup-3.0" From patchwork Tue May 19 23:29:56 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88461 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 659B1CD5BBA for ; Tue, 19 May 2026 23:30:41 +0000 (UTC) Received: from mail-wm1-f47.google.com (mail-wm1-f47.google.com [209.85.128.47]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1011.1779233439398461752 for ; Tue, 19 May 2026 16:30:39 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=SA3o+L3y; spf=pass (domain: smile.fr, ip: 209.85.128.47, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f47.google.com with SMTP id 5b1f17b1804b1-488a88aeec9so49773525e9.2 for ; Tue, 19 May 2026 16:30:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233437; x=1779838237; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=v/I2/q9fn66kOpBb5COzs072Bs0IneUk4FRvUTGxYSM=; b=SA3o+L3yYBvlKZf9qp9u/7H7HbwQmJBz8Djjq5R6bVbUcyZO50d2RryNjQsIVEmPH1 yJFxsStkU/jeIrriFbaO2m/F8ZZExRsOzJLnKHTHS/y3JMQYzHU3ozk5dDgh0aSljHZP AXY0bTafN9BvJTJqQvyP99++r88XeT7EFPBsQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233437; x=1779838237; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=v/I2/q9fn66kOpBb5COzs072Bs0IneUk4FRvUTGxYSM=; b=ozaZQjpGpTM5VTvrdSwIqOpSczfBnxyC3oFJkKLc5qAtH3Ira4PDSKSF8DylBG32gw rWXr+plgCk6Uii0jWiJ/U8argGKTpyJrMep4U4rM5nVIdGEx9W4yWuAIXwXzKzk/avp9 EjmrQ40P84RnKHKycmgmS+bZnEMImIcWj+wdSSjTjm5exRJZmwRTNpdluC6Zz3GyVODf zWYI+36oZVmeET6VzwuPm1w5+YAyXoOl+aOo2FaSZv8mngjtk6hlznq90oOmv/fCShDP hwNbt0xPAAkh6eZFCPD9wlx2H/ROf3z71GGzfu3dVcOIStshq/3SsYbQLQVlhlMwY1zE Zl1A== X-Gm-Message-State: AOJu0YyerNOO5uvsL4WwkyUvAfiXTlTDzLmINueoHM2I+lclkKkL2PYx IyuDThs04gvofIs/UOlWxhLd94dwByNsjWl074y6/b1O9D2F4eISToKkdxSHtBWyY5ULiXPF1Dw rqjNK X-Gm-Gg: Acq92OF/SxGR3oSxvedHvpXKn4293OPQTB1xuRUC14GRfee/LtzbRHeHFtgptaBHZEC xYgvnxdfuRNF7xQhe0//cS9AAwoCthpJuIQBpIe72WaN2LfQILCZ7sGnzH6Zsmil77iwY7Otq9F eZns0nZsA+RxHmmiAsZ9h+Ow4diWLxtzP5SsGH3p5GuQx5nko9LmlfMHfyNBpu6gYjucnSfY0ZD td9nZmkastnLJ0rt2LODy/AWLI/Qq1rHoLUE5aA342VgbKag18Zs4597Z1PEbygLkOxY3cu6xEE 1dpdIpf0Ohb2bGIDulDgWEx1b8xhGP1tM3uKUfuBI7FwjRQ2QvGC+N28Lz4t4iL2NlHWPWxpR/O GjNc8GMsYDa6hDMUErcgMaAbTYtezbob3zTleGPExFmmKdT5lsZYoW9ZFqZkg5b26wxiwD6zo7f LDt464qX95jDkYiGIzFj5mibdKPzkx4R8bsKhvUxpjXG4UzxFEW3x841qb/H0WYtIp/nQ5m0QuC VGwQRDHtvfq9iaKVEEUadF1dglTZgveAssfQQ== X-Received: by 2002:a05:600c:4e02:b0:483:2c98:4368 with SMTP id 5b1f17b1804b1-48fe6322416mr349022065e9.18.1779233437278; Tue, 19 May 2026 16:30:37 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:36 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 19/28] utils: Handle unexpanded variables in DISTRO_FEATURES Date: Wed, 20 May 2026 01:29:56 +0200 Message-ID: <10f7474d851fa908b15eea92fd0bb7e571a88d15.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:41 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237366 From: Richard Purdie If you have an unset variable in DISTRO_FEATURES, very strange things appear to happen. Currently, this shows up as seccomp appearing in PACKAGECONFIG for gnutls-native which isn't what the user configured. The issue happens if you have a variable in DISTRO_FEATURES which cannot be expanded. Add some code to detect, warn and work around such a thing. Create a function to allow this to be done in one place. [YOCTO #16275] Signed-off-by: Richard Purdie Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 7782a9bfc4e2ddc67185ac3f5ed14c5268f078b0) Signed-off-by: Yoann Congal --- meta/classes-recipe/crosssdk.bbclass | 3 +-- meta/classes-recipe/native.bbclass | 3 +-- meta/classes-recipe/nativesdk.bbclass | 3 +-- meta/lib/oe/utils.py | 9 +++++++++ 4 files changed, 12 insertions(+), 6 deletions(-) diff --git a/meta/classes-recipe/crosssdk.bbclass b/meta/classes-recipe/crosssdk.bbclass index f7be3a23bf6..6246c09de4b 100644 --- a/meta/classes-recipe/crosssdk.bbclass +++ b/meta/classes-recipe/crosssdk.bbclass @@ -16,8 +16,7 @@ PACKAGE_ARCH = "${SDK_ARCH}" python () { # set TUNE_PKGARCH to SDK_ARCH d.setVar('TUNE_PKGARCH', d.getVar('SDK_ARCH')) - defaults = d.getVar("DISTRO_FEATURES") - d.setVar("DISTRO_FEATURES", '${@oe.utils.class_filter_features("' + defaults + '", "DISTRO_FEATURES_NATIVESDK", "DISTRO_FEATURES_FILTER_NATIVESDK", d)}') + oe.utils.set_class_filter("DISTRO_FEATURES", "DISTRO_FEATURES_NATIVESDK", "DISTRO_FEATURES_FILTER_NATIVESDK", d) } STAGING_BINDIR_TOOLCHAIN = "${STAGING_DIR_NATIVE}${bindir_native}/${TARGET_ARCH}${TARGET_VENDOR}-${TARGET_OS}" diff --git a/meta/classes-recipe/native.bbclass b/meta/classes-recipe/native.bbclass index 89d862eb55a..8aa86f9cb62 100644 --- a/meta/classes-recipe/native.bbclass +++ b/meta/classes-recipe/native.bbclass @@ -126,8 +126,7 @@ python native_virtclass_handler () { return bpn = d.getVar("BPN") - defaults = d.getVar("DISTRO_FEATURES") - d.setVar("DISTRO_FEATURES", '${@oe.utils.class_filter_features("' + defaults + '", "DISTRO_FEATURES_NATIVE", "DISTRO_FEATURES_FILTER_NATIVE", d)}') + oe.utils.set_class_filter("DISTRO_FEATURES", "DISTRO_FEATURES_NATIVE", "DISTRO_FEATURES_FILTER_NATIVE", d) classextend = d.getVar('BBCLASSEXTEND') or "" if "native" not in classextend: diff --git a/meta/classes-recipe/nativesdk.bbclass b/meta/classes-recipe/nativesdk.bbclass index 25fd463ac78..5b49affd537 100644 --- a/meta/classes-recipe/nativesdk.bbclass +++ b/meta/classes-recipe/nativesdk.bbclass @@ -77,8 +77,7 @@ python nativesdk_virtclass_handler () { if not (pn.endswith("-nativesdk") or pn.startswith("nativesdk-")): return - defaults = d.getVar("DISTRO_FEATURES") - d.setVar("DISTRO_FEATURES", '${@oe.utils.class_filter_features("' + defaults + '", "DISTRO_FEATURES_NATIVESDK", "DISTRO_FEATURES_FILTER_NATIVESDK", d)}') + oe.utils.set_class_filter("DISTRO_FEATURES", "DISTRO_FEATURES_NATIVESDK", "DISTRO_FEATURES_FILTER_NATIVESDK", d) e.data.setVar("MLPREFIX", "nativesdk-") e.data.setVar("PN", "nativesdk-" + e.data.getVar("PN").replace("-nativesdk", "").replace("nativesdk-", "")) diff --git a/meta/lib/oe/utils.py b/meta/lib/oe/utils.py index 23f4b639c69..120b6443935 100644 --- a/meta/lib/oe/utils.py +++ b/meta/lib/oe/utils.py @@ -161,6 +161,15 @@ def class_filter_features(defaults, features_var, filter_var, d): filtered = set(bb.utils.filter_string(defaults, d.getVar(filter_var)).split()) return " ".join(sorted(features | filtered)) +def set_class_filter(var, features_var, filter_var, d): + defaults = d.getVar(var) + if "}" in defaults: + issues = [c for c in defaults.split() if "}" in c] + for issue in issues: + defaults = defaults.replace(issue, "") + bb.warn("Unexpanded variable %s in %s is not recommended" % (issue, var)) + d.setVar(var, '${@oe.utils.class_filter_features("' + defaults + '", "' + features_var + '", "' + filter_var + '", d)}') + def all_distro_features(d, features, truevalue="1", falsevalue=""): """ Returns truevalue if *all* given features are set in DISTRO_FEATURES, From patchwork Tue May 19 23:29:57 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88458 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 47F3FCD5BB9 for ; Tue, 19 May 2026 23:30:41 +0000 (UTC) Received: from mail-wm1-f52.google.com (mail-wm1-f52.google.com [209.85.128.52]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.964.1779233439618944028 for ; Tue, 19 May 2026 16:30:39 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=2EG4EuNe; spf=pass (domain: smile.fr, ip: 209.85.128.52, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f52.google.com with SMTP id 5b1f17b1804b1-4893940bb5eso22955545e9.3 for ; Tue, 19 May 2026 16:30:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233438; x=1779838238; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=B1GXrRW342AwGA2SuNA1VeBk7ja6+XtkxSDW1/dFPa8=; b=2EG4EuNe+rNB2p7PyF/pKr3AVZWNJXZ4bxikKHv9HfV6YCOMg9/EvPJ/0fq6/ViJBM qTuh3OHgyHm/1e/j+e6nnjg6WXsRK14At9zSiwhvPsURnyxNh2bFPuOhW9L/a1lIavZz q2kV7w7oq9Wt7mMcj5j5mZrJiyusO/ppAGx1U= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233438; x=1779838238; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=B1GXrRW342AwGA2SuNA1VeBk7ja6+XtkxSDW1/dFPa8=; b=IVLATuOBUM7dEmFH2N+wFfOUf/2JbZDqUpi+s0to12haU0IfFrVghnjCC7AD8HCQDJ uv/7CgGqST2sArGEDb5wWVPz+0rAJK1kuNoijPxqnUCnWIOUPBPqqBV0oQoj27d/WfDl B9HWBiKr+vOJ5qCDzSgGJBiGJC0Ve2rNJqEP2LSNcOvztvMQ9KG67Mn2ZAHzFZHrbFUy eBWvNLP7Rjnki8KFpm766AMGUHmr+NvTQp7B6yOTFq7kGm/glkUHdbP+9lZ1eYXJNuTO 6OzhC0BVylVbOkyj731fIdm2fmkgRA/w8YpRztipWBKsojvRaSB1nD3q51JIXuvSOr0o dgSw== X-Gm-Message-State: AOJu0YzeHGNkF/c+Nai1krFOVBNxGosKAuRpfyVi1H4jDIlu0919AzRB 5dpBzcc0NlbjSbBzt7K3mXPXkziX67ggrPzPpm5VCIvgDjdQPFXGjznOd9UyxG8ttlvbgRcO53g idC+c X-Gm-Gg: Acq92OETBxqG1ulnd2OEqedt+YlbOowxC8wa871W6Cd68ZDRxoBvcxStpVpA53aPHkJ gWt0ghL2BWZr8hdGzzB1cwWJ8r41OyT9NPJbIDheo0vUxq3g0i/k8N3xy46JNAu3qWzh0GFvChm RVAVvdzXvlrxWSVjtill7C4B4BhkBVA+e499rrq4iBJpsQcaT8TYbsQTDMu/a8NTYvp71VebdHO +sUtdo+Q7s7bDa7n4wsArbIFuvpQaG/q3+KhpOodP1yWBu/puwW2R9UIT3Y/LS+2TWln+QDjinf OdmIcTDVSSct7ezTPf90CZ9U0FaJ6tig6CntWVkq0Rd3lRvwG8AXaNU16km1aVzzzgi6OVGuAt2 Au+Lei00iRO3Lcd0RRe2mo2l19sLsBF32mVNKHYw/JHAuZXL2m0oGOKbFTBNhuJ8LL5nIDxFZfx 8Cr/s5b7mYLkXORDmPsLmDSrHHw1ud6w1Q59eMvEruAfYW3osC2aDytEger/pYfb9uzTiXVTjmP nkEzXxKJFbojbMANiScRBav9F8= X-Received: by 2002:a05:600c:a406:b0:48a:6798:52e9 with SMTP id 5b1f17b1804b1-48fe59b06acmr279774245e9.0.1779233437783; Tue, 19 May 2026 16:30:37 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:37 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 20/28] shadow-native: Change upstream status of disable_syslog.patch Date: Wed, 20 May 2026 01:29:57 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:41 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237367 From: Dmitry Sakhonchik Upstream has accepted configure option and merged it into their master branch. https://github.com/shadow-maint/shadow/pull/1618 After they release v4.20 we can remove the patch and rewrite recipe with the configure option. Fixes [YOCTO #15785] Signed-off-by: Dmitry Sakhonchik Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit b0ce3150e43cb6fb0d726cf86725715b8fd06147) Signed-off-by: Yoann Congal --- meta/recipes-extended/shadow/files/disable_syslog.patch | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/meta/recipes-extended/shadow/files/disable_syslog.patch b/meta/recipes-extended/shadow/files/disable_syslog.patch index 7299a8e61cd..9f8ffcd379d 100644 --- a/meta/recipes-extended/shadow/files/disable_syslog.patch +++ b/meta/recipes-extended/shadow/files/disable_syslog.patch @@ -2,8 +2,9 @@ When building images using shadow-native, we shouldn't be spamming the host's log with lots of syslog messages which aren't relavent. Disable syslog use in the native case. -Upstream-Status: Inappropriate [Would upstream accept a configure option?] +Upstream-Status: Inappropriate [upstream has accepted a better patch at https://github.com/shadow-maint/shadow/pull/1618] Signed-off-by: Richard Purdie +Signed-off-by: Dmitry Sakhonchik Index: shadow-4.17.2/lib/defines.h =================================================================== From patchwork Tue May 19 23:29:58 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88460 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 56573CD5BBB for ; Tue, 19 May 2026 23:30:41 +0000 (UTC) Received: from mail-wm1-f53.google.com (mail-wm1-f53.google.com [209.85.128.53]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1012.1779233440444076579 for ; Tue, 19 May 2026 16:30:40 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=UlmJL6Hr; spf=pass (domain: smile.fr, ip: 209.85.128.53, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f53.google.com with SMTP id 5b1f17b1804b1-488af96f6b2so45499775e9.0 for ; Tue, 19 May 2026 16:30:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233439; x=1779838239; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=HJQUh3B3wiA64y2/Myi3VKjPXL7aY2yWce5Bxkt0nNM=; b=UlmJL6Hrzlm2FZBh/23KovQF8ikMz3p3HmXzLqppVH72BylwOGlP0PQobwCB6G6LTb BD9GLY3V1R4iz9MuOdZLWh7hiFrcLDBjdNHFORvW+q4Y0R55kD/pyjmm3N2rCPt+k23W kw0DRtHu1tytFF2VRF8Z2n5pyMZZl83ZpKkFI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233439; x=1779838239; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=HJQUh3B3wiA64y2/Myi3VKjPXL7aY2yWce5Bxkt0nNM=; b=GTqITawDVUe3Avk3eZl0dvxg4zkjKxfa0p9EXg4/No5jtyXnaimEPyron6lYLVsk/m Anwqagg4/b+mS/M11T5Ylp/0wvqUTi0qM5GqqyVD1WIPyUyzsMRFylARDmV3eAtYYQ8K ZBe+zT/jhxdXa99EqQW/99OkQpVvLivuhm8aT+J63SLZ/z03dxwUFu6c8/2cI3TDRb9b JXqcSXKrhBo9rF+EPnmMQJV4/pP8WjZyHYywrU7X7bwXdJJbF4yiwX00p/8KNt49aPnG 3U43j3heOtX7Qu/zX9sb+TA5FOHDBdIrF8Glhmbc5e/YD00/1zia/MnWAJ8icXJmIq0D TO0w== X-Gm-Message-State: AOJu0YznRZ2y41CoO9xTkxBJzdSQlHJHGUSAyVx8vvVI3aSW/ZnnAA3E LDaLYBQlLxKMsG/YlNGgYTqgDsRlDrYS15Z+xmG7ajEU2+Snc7dUusdLQdsplxd7CgQ1q9exwet HofSB X-Gm-Gg: Acq92OHr82inCMagQ61A6lvW5ifxOEWJpTLuriohyAQLM3sqC2It1NiDwx3qs6vvY12 DG0X4LyS6ia3scL2s7UFjukFUqBre9LFTxVad1vMNlB0xY610iNYVMlNKGOr2cjNtKgYA1+7dM+ 5rolFmUi+BbhykpbK9+RDvZPIP2kuJ5W/yaGxT2EOxoqog3H94D8Kh5OYBzYr91IaT7OE0f+1Vx T3DF8YxYngpjKPy3/UKftmbdFud0INm5qgyG3aFIz7b7cembbNw8PnCF1JLHKDdQTPU9w15hS5d JqMVzzNp/Y6dmYivlK0WBVtCq9QURQADLhqRiTLOLWPrdV8Y4mFoTsFrXQbeU5JLlZWoLMKWKLn ti3DA7L7V7CLfyqgibli/bETY04A3DWYHU5vO89L++GPDwfAeY9mKxjNCVkNhq9kStmmlJFpyea GMNdqCzRCcY+aZ2B26+ZFuUx7iJvavq3eGrwdamKsdFeiQmzNc62/jHGFqeEd5BrveI9CcHo9Lo zHFsD3jOqmY3OqvggrVjtNawls= X-Received: by 2002:a05:600c:8184:b0:489:1c1f:35f1 with SMTP id 5b1f17b1804b1-48fe60e1451mr335763805e9.4.1779233438655; Tue, 19 May 2026 16:30:38 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:37 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 21/28] features-check.bbclass: add reference to required TUNE_FEATURES Date: Wed, 20 May 2026 01:29:58 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:41 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237368 From: Robert P. J. Day While commit a8ef7339ecb9eee909224e7cf23ccd48ef105d93 added the string 'TUNE' to add support for checking required TUNE_FEATURES, the comment was not adjusted appropriately. Signed-off-by: Robert P. J. Day Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 66e76b68460d5d7480e686ed2d94090d69fb4b90) Signed-off-by: Yoann Congal --- meta/classes-recipe/features_check.bbclass | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/classes-recipe/features_check.bbclass b/meta/classes-recipe/features_check.bbclass index 46d8243cb6b..d69cfb8309f 100644 --- a/meta/classes-recipe/features_check.bbclass +++ b/meta/classes-recipe/features_check.bbclass @@ -1,6 +1,6 @@ # Allow checking of required and conflicting features # -# xxx = [DISTRO,MACHINE,COMBINED,IMAGE] +# xxx = [DISTRO,MACHINE,COMBINED,IMAGE,TUNE] # # ANY_OF_xxx_FEATURES: ensure at least one item on this list is included # in xxx_FEATURES. From patchwork Tue May 19 23:29:59 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88464 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A043ECD5BAB for ; Tue, 19 May 2026 23:30:51 +0000 (UTC) Received: from mail-wm1-f54.google.com (mail-wm1-f54.google.com [209.85.128.54]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1013.1779233441268257034 for ; Tue, 19 May 2026 16:30:41 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=GPJ6gZj4; spf=pass (domain: smile.fr, ip: 209.85.128.54, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f54.google.com with SMTP id 5b1f17b1804b1-48896199cbaso33640635e9.1 for ; Tue, 19 May 2026 16:30:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233439; x=1779838239; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=anIYBu1zkZjK1cbWlFzdT2gKSQQvZGvTcy0l8NTP14M=; b=GPJ6gZj4HKcYKHomYAl8bnMuvnDsmsbnWT9gH3od4E+X9itHuhLi7/VpOtZou3BkcS /UTJVqLtAF5UxQE+yII8K7ejYbf74UyAC060mP74TYXO9qGbn1qkvP28KEg8i4pn7Am7 aFHvvtWGYCUEF20J7EGsg4NqihCtaEI+NYIew= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233439; x=1779838239; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=anIYBu1zkZjK1cbWlFzdT2gKSQQvZGvTcy0l8NTP14M=; b=m5pJ8zZD2elpIjmdlDtTwKJPyHWVczCy7Y6OnBd3XU5tbPJEGXGdbIkBAN3Dk1xnW2 MKQjkVC4qvoZti43NUYIgdSKf/avfD5AMSsSPgT9iHJhEuinf2vkPUBeADSK02yHWmZ2 WVp1ZVkz5T+ZF1Ag/JyP7xannWqSsJiaF7ivd/IaOCCpBah2yDMw0bcUfjGa+NGoA4rB VhlV0lzl43P7qgroDSKpx1fjVX3lhEoUkIYKvS3zajhw5G5iWN5FHv5Fs8ETPJ79+jKv FxLDADbLQkBjG+/R/JkKfMP2SAFpGX4+1/8AkdKT+vjbveMKml/wLTgOqt5+QE2ouZfB xqiA== X-Gm-Message-State: AOJu0YzUNmj4DiRk7V0JRSVFMxhgRf/mB/jjKSMGqT9jPBR61CYbLHua fVa0TPzP45btWXhi7beS4NrXxLK6hPdphDy8RFJHbA89tf85KBEKMokGr/tzMA29CWNfiixjLIy WxrAm X-Gm-Gg: Acq92OFygIpLapBzao9hF37zdQM+LHBCesSspkP7CinInJH1TdG4NI7TLcYroMQDjqY L0MgrRIM7NL36qxyUSUAzQ5AEKxVwDkFq5K0UiPgaMJg5V0UvKXbvZOfavNHRda29gB7XW74vdy eJy95OpXVY/tqGXk9WUDtshFNeCQ2Xvb1gSa7VoQR0SWCjox6o7AA6f3P0iD/zQY9iiJ78ZbOjo 7GgPOORhxBsEtPMwTLIUFHnnAVDk7u8pZPJlBCMmm4wtLglxc6DnevNwyr+OxZi7/3tDlGiFpOV wNmt8jGOzNuWSTrmlnp0NLOXez41GjYo8VB4Sz3LbHYrxYT/27IRrWPRuBtai0J5WPMxwcYBMTi md1t+tyAmd8sVBCI3Q730bnkp+mbcIZMdXOSM5YP3kW9PF6aVXOi9p75w/pIAPAUmsjYmDQu36o Yy4yDERxW0HndrgVlNBJRtOI1GOjQd4rLKhjgJWMgTyw/DZR3qjduaFmMadWpj9DN2wXech8fta g6qzfeFVUp0HzLTCIj+Wim9UFM= X-Received: by 2002:a05:600c:6098:b0:48f:d1b8:9ab1 with SMTP id 5b1f17b1804b1-48fe60ecc51mr371262455e9.9.1779233439443; Tue, 19 May 2026 16:30:39 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.38 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:38 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 22/28] scripts/makefile-getvar: quote MAKEFILE variable Date: Wed, 20 May 2026 01:29:59 +0200 Message-ID: <023a9f3126936892f0df6ef236dcc4be2bff36b7.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237369 From: Thomas Perrot $MAKEFILE was unquoted in the -f test and the error echo, causing word-splitting on paths that contain spaces. Signed-off-by: Thomas Perrot Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit c98243b8e2a5f1e538024131ca94991c5befc59f) Signed-off-by: Yoann Congal --- scripts/makefile-getvar | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/scripts/makefile-getvar b/scripts/makefile-getvar index e8a98327667..238d9567adc 100755 --- a/scripts/makefile-getvar +++ b/scripts/makefile-getvar @@ -20,8 +20,8 @@ fi MAKEFILE=$1 shift -if [ ! -f $MAKEFILE ]; then - echo $MAKEFILE is not a file +if [ ! -f "$MAKEFILE" ]; then + echo "$MAKEFILE is not a file" exit 1 fi From patchwork Tue May 19 23:30:00 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88463 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7B2A9CD4F54 for ; Tue, 19 May 2026 23:30:51 +0000 (UTC) Received: from mail-wm1-f49.google.com (mail-wm1-f49.google.com [209.85.128.49]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1015.1779233442256394748 for ; Tue, 19 May 2026 16:30:42 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=zVy5igW0; spf=pass (domain: smile.fr, ip: 209.85.128.49, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f49.google.com with SMTP id 5b1f17b1804b1-4896c22fcbaso34844365e9.0 for ; Tue, 19 May 2026 16:30:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233440; x=1779838240; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=YjZZwB88iyXv+Wg8PJsNx6pFv6vITMjqY/t15R+7g6w=; b=zVy5igW0znHRt/9QkBaZE/thReMaBgabNPo2TUuULravklBPW+kYxLp9FcFoWspTXU KqJBj9u4eU04KakEkfpiUqJ8ACgcbvRJpXHUb+fnRt27HsaOEBlAlWjwp5Y/VEAOkdo6 EXaKK7LojRwaLkh2fuNBtPXKYO0TPb8g2/oH8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233440; x=1779838240; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=YjZZwB88iyXv+Wg8PJsNx6pFv6vITMjqY/t15R+7g6w=; b=RzTdhylFCQfppVPoAuoOGXG9zfUGUofOyMX0F5q5WNLkZqQdldh/uvJWUZ//47yFNd zzgoKxp2zHx1S99v0grpW/iAxgRmFXr2aW84B7oJPUpl5QJTvTe//n1tb0lOdsoH4icF vEpZReIjDCsy7y6QsW/bJqa+bCQKkOVzegTTA55xPiKRkfW5Go7ULUzEjkqct4OGxB4+ txPQOnZvQDCbxUOC+7VxZWH3nfpgMxbz+Zwmcwz/uOiGINKIPbKjZQGBl/2VjBg8UgUa 2lYZyFP2Q/xgNf9XN41UE6/oq/wkaOORU20Km1NOjBGKb3qXHcO0ZtO2ScjjGIMJcMue DvfQ== X-Gm-Message-State: AOJu0YydpO/dGKObx5UGEVwKyjqiltIBQa9o7orwGbJh1HGAh7/I2i/u 1dgEvV8QFTh0lU8k7yrXOL/yWDEnD+1ZwqTggP7S2a9OAdNj3y4X+5ZX4A+0XmiK/Zay1R4jxFx 6I4eI X-Gm-Gg: Acq92OELnUB+iNbEJF8tSi/GEV8Caf1biERTUm2Ycgh0acdo4rD8dilOt1khW1cbokp tcoiCh/VRJzsEcbXdB/pj1rnwi4xJCS3g8R5mLOP0B/miFhtZKVurfDQfUVsj8egmQL8omkNv8P JyngrLSpJ+Lvdz5acHq/VXaXZ4dT/rqzLVWXLQ+2evOQvaB8Ay1Otj4iUxkG4t4TYRmvVI33JbK BjAMpEtkLkT9iZzC4djXRIRi/7ME7ap05ipglCk95rcZcaDlQTv6+zCXD2rt+wp/Ch5h+N9BuuA ZtGwMwo94UC/lWVJ2obgbOWbNflmZNkzDdbPuAsfPo+EAe1kjUYDGm3CafHhS+RG9dTZzdY3/Bz SwDUjLYF5as+VZwmf7EM9gvT6/c+3uuydGKKuyYOxfGaexvnefH/yWe82jfTEBUFLMVmQizRHVJ 9+OAqEu5w6zOlMnicQOl/kiMKQiAHModi4XXjCxg/givy5G5xOsi9Yjg0HqgFIsic+OjkxB4biF 1oRCvEwGNWLyv0AQ7nFYOcfQgAz4E3YNCn9k2Qeb/c4Gbkn X-Received: by 2002:a05:600c:a406:b0:48f:e230:1d12 with SMTP id 5b1f17b1804b1-48fe6329913mr262629145e9.31.1779233440326; Tue, 19 May 2026 16:30:40 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:39 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 23/28] qemu: fix iotlb_to_section() for different AddressSpace Date: Wed, 20 May 2026 01:30:00 +0200 Message-ID: <7b71cd58a7e298543ada77564897f42c74ef0fb2.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237370 From: Quan Sun Backport upstream commit 854cd16e318e ("accel/tcg: Fix iotlb_to_section() for different AddressSpace") to qemu 10.2.0. The bug causes incorrect memory load/store when CPU access goes through an IOMMUMemoryRegion that returns a different target AddressSpace, and the fix replaces the section_index lookup with a direct MemoryRegionSection pointer stored in CPUTLBEntryFull. Note that the fix primarily targets ARM/RISC-V, but since it eliminates iotlb_to_section() and performs the lookup based on CPUTLBEntryFull, it may also help address some currently observed QEMU boot issues on x86, e.g. the https://bugzilla.yoctoproject.org/show_bug.cgi?id=16259. AI-Generated: kiro-cli Signed-off-by: Quan Sun Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 1b09f50c4e607bb6f2b120fe3bf0141bac46a078) Signed-off-by: Yoann Congal --- meta/recipes-devtools/qemu/qemu.inc | 1 + ...tlb_to_section-for-different-Address.patch | 274 ++++++++++++++++++ 2 files changed, 275 insertions(+) create mode 100644 meta/recipes-devtools/qemu/qemu/0001-accel-tcg-Fix-iotlb_to_section-for-different-Address.patch diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index 8abe366284e..5f30416a483 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc @@ -33,6 +33,7 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \ file://0010-configure-lookup-meson-exutable-from-PATH.patch \ file://0011-qemu-Ensure-pip-and-the-python-venv-aren-t-used-for-.patch \ file://0001-linux-user-elfload.c-Correction-to-HWCAP2-accessor.patch \ + file://0001-accel-tcg-Fix-iotlb_to_section-for-different-Address.patch \ file://qemu-guest-agent.init \ file://qemu-guest-agent.udev \ " diff --git a/meta/recipes-devtools/qemu/qemu/0001-accel-tcg-Fix-iotlb_to_section-for-different-Address.patch b/meta/recipes-devtools/qemu/qemu/0001-accel-tcg-Fix-iotlb_to_section-for-different-Address.patch new file mode 100644 index 00000000000..d19f872fc3d --- /dev/null +++ b/meta/recipes-devtools/qemu/qemu/0001-accel-tcg-Fix-iotlb_to_section-for-different-Address.patch @@ -0,0 +1,274 @@ +From 858e6bb252e075e09cca6e78299151d3af0bf5fb Mon Sep 17 00:00:00 2001 +From: Quan Sun +Date: Tue, 28 Apr 2026 14:56:36 -0400 +Subject: [PATCH] accel/tcg: Fix iotlb_to_section() for different AddressSpace +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +'CPUTLBEntryFull.xlat_section' stores section_index in last 12 bits to +find the correct section when CPU access the IO region over the IOTLB. +However, section_index is only unique inside single AddressSpace. If +address space translation is over IOMMUMemoryRegion, it could return +section from other AddressSpace. 'iotlb_to_section()' API only finds the +sections from CPU's AddressSpace so that it couldn't find section in +other AddressSpace. Thus, using 'iotlb_to_section()' API will find the +wrong section and QEMU will have wrong load/store access. + +To fix this bug of iotlb_to_section(), store complete MemoryRegionSection +pointer in CPUTLBEntryFull to replace the section_index in xlat_section. +Rename 'xlat_section' to 'xlat_offset' as we remove last 12 bits +section_index inside. Also, since we directly use section pointer in the +CPUTLBEntryFull (full->section), we can remove the unused functions: +iotlb_to_section(), memory_region_section_get_iotlb(). + +This bug occurs only when +(1) IOMMUMemoryRegion is in the path of CPU access. +(2) IOMMUMemoryRegion returns different target_as and the section is in +the IO region. + +This patch incorporates prerequisite changes from upstream commit +94c6e9cf0440 ("accel/tcg: Send the CPUTLBEntryFull struct into +io_prepare()") needed for the fix to apply cleanly. + +Upstream-Status: Backport [https://gitlab.com/qemu-project/qemu/-/commit/854cd16e318eed12de2995014b28d9f374c64bf7] + +Signed-off-by: Jim Shu +Reviewed-by: Philippe Mathieu-Daudé +Tested-by: Mark Burton +Reviewed-by: Pierrick Bouvier +Signed-off-by: Philippe Mathieu-Daudé +Signed-off-by: Quan Sun +--- + accel/tcg/cputlb.c | 32 +++++++++++++++----------------- + include/accel/tcg/iommu.h | 15 --------------- + include/exec/cputlb.h | 4 ++-- + include/hw/core/cpu.h | 17 +++++++++-------- + system/physmem.c | 25 ------------------------- + 5 files changed, 26 insertions(+), 67 deletions(-) + +diff --git a/accel/tcg/cputlb.c b/accel/tcg/cputlb.c +index fd1606c85..fa0f4d8b3 100644 +--- a/accel/tcg/cputlb.c ++++ b/accel/tcg/cputlb.c +@@ -1089,7 +1089,7 @@ void tlb_set_page_full(CPUState *cpu, int mmu_idx, + } + } else { + /* I/O or ROMD */ +- iotlb = memory_region_section_get_iotlb(cpu, section) + xlat; ++ iotlb = xlat; + /* + * Writes to romd devices must go through MMIO to enable write. + * Reads to romd devices go through the ram_ptr found above, +@@ -1140,10 +1140,9 @@ void tlb_set_page_full(CPUState *cpu, int mmu_idx, + /* + * When memory region is ram, iotlb contains a TARGET_PAGE_BITS + * aligned ram_addr_t of the page base of the target RAM. +- * Otherwise, iotlb contains +- * - a physical section number in the lower TARGET_PAGE_BITS +- * - the offset within section->mr of the page base (I/O, ROMD) with the +- * TARGET_PAGE_BITS masked off. ++ * Otherwise, iotlb contains a TARGET_PAGE_BITS aligned ++ * offset within section->mr of the page base (I/O, ROMD) ++ * + * We subtract addr_page (which is page aligned and thus won't + * disturb the low bits) to give an offset which can be added to the + * (non-page-aligned) vaddr of the eventual memory access to get +@@ -1153,7 +1152,8 @@ void tlb_set_page_full(CPUState *cpu, int mmu_idx, + */ + desc->fulltlb[index] = *full; + full = &desc->fulltlb[index]; +- full->xlat_section = iotlb - addr_page; ++ full->xlat_offset = iotlb - addr_page; ++ full->section = section; + full->phys_addr = paddr_page; + + /* Now calculate the new entry */ +@@ -1269,14 +1269,14 @@ static inline void cpu_unaligned_access(CPUState *cpu, vaddr addr, + } + + static MemoryRegionSection * +-io_prepare(hwaddr *out_offset, CPUState *cpu, hwaddr xlat, ++io_prepare(hwaddr *out_offset, CPUState *cpu, CPUTLBEntryFull *full, + MemTxAttrs attrs, vaddr addr, uintptr_t retaddr) + { + MemoryRegionSection *section; + hwaddr mr_offset; + +- section = iotlb_to_section(cpu, xlat, attrs); +- mr_offset = (xlat & TARGET_PAGE_MASK) + addr; ++ section = full->section; ++ mr_offset = full->xlat_offset + addr; + cpu->mem_io_pc = retaddr; + if (!cpu->neg.can_do_io) { + cpu_io_recompile(cpu, retaddr); +@@ -1335,7 +1335,7 @@ static bool victim_tlb_hit(CPUState *cpu, size_t mmu_idx, size_t index, + static void notdirty_write(CPUState *cpu, vaddr mem_vaddr, unsigned size, + CPUTLBEntryFull *full, uintptr_t retaddr) + { +- ram_addr_t ram_addr = mem_vaddr + full->xlat_section; ++ ram_addr_t ram_addr = mem_vaddr + full->xlat_offset; + + trace_memory_notdirty_write_access(mem_vaddr, ram_addr, size); + +@@ -1592,9 +1592,7 @@ bool tlb_plugin_lookup(CPUState *cpu, vaddr addr, int mmu_idx, + + /* We must have an iotlb entry for MMIO */ + if (tlb_addr & TLB_MMIO) { +- MemoryRegionSection *section = +- iotlb_to_section(cpu, full->xlat_section & ~TARGET_PAGE_MASK, +- full->attrs); ++ MemoryRegionSection *section = full->section; + data->is_io = true; + data->mr = section->mr; + } else { +@@ -1980,7 +1978,7 @@ static uint64_t do_ld_mmio_beN(CPUState *cpu, CPUTLBEntryFull *full, + tcg_debug_assert(size > 0 && size <= 8); + + attrs = full->attrs; +- section = io_prepare(&mr_offset, cpu, full->xlat_section, attrs, addr, ra); ++ section = io_prepare(&mr_offset, cpu, full, attrs, addr, ra); + mr = section->mr; + + BQL_LOCK_GUARD(); +@@ -2001,7 +1999,7 @@ static Int128 do_ld16_mmio_beN(CPUState *cpu, CPUTLBEntryFull *full, + tcg_debug_assert(size > 8 && size <= 16); + + attrs = full->attrs; +- section = io_prepare(&mr_offset, cpu, full->xlat_section, attrs, addr, ra); ++ section = io_prepare(&mr_offset, cpu, full, attrs, addr, ra); + mr = section->mr; + + BQL_LOCK_GUARD(); +@@ -2521,7 +2519,7 @@ static uint64_t do_st_mmio_leN(CPUState *cpu, CPUTLBEntryFull *full, + tcg_debug_assert(size > 0 && size <= 8); + + attrs = full->attrs; +- section = io_prepare(&mr_offset, cpu, full->xlat_section, attrs, addr, ra); ++ section = io_prepare(&mr_offset, cpu, full, attrs, addr, ra); + mr = section->mr; + + BQL_LOCK_GUARD(); +@@ -2541,7 +2539,7 @@ static uint64_t do_st16_mmio_leN(CPUState *cpu, CPUTLBEntryFull *full, + tcg_debug_assert(size > 8 && size <= 16); + + attrs = full->attrs; +- section = io_prepare(&mr_offset, cpu, full->xlat_section, attrs, addr, ra); ++ section = io_prepare(&mr_offset, cpu, full, attrs, addr, ra); + mr = section->mr; + + BQL_LOCK_GUARD(); +diff --git a/include/accel/tcg/iommu.h b/include/accel/tcg/iommu.h +index 90cfd6c0e..547f8ea0e 100644 +--- a/include/accel/tcg/iommu.h ++++ b/include/accel/tcg/iommu.h +@@ -14,18 +14,6 @@ + #include "exec/hwaddr.h" + #include "exec/memattrs.h" + +-/** +- * iotlb_to_section: +- * @cpu: CPU performing the access +- * @index: TCG CPU IOTLB entry +- * +- * Given a TCG CPU IOTLB entry, return the MemoryRegionSection that +- * it refers to. @index will have been initially created and returned +- * by memory_region_section_get_iotlb(). +- */ +-MemoryRegionSection *iotlb_to_section(CPUState *cpu, +- hwaddr index, MemTxAttrs attrs); +- + MemoryRegionSection *address_space_translate_for_iotlb(CPUState *cpu, + int asidx, + hwaddr addr, +@@ -34,8 +22,5 @@ MemoryRegionSection *address_space_translate_for_iotlb(CPUState *cpu, + MemTxAttrs attrs, + int *prot); + +-hwaddr memory_region_section_get_iotlb(CPUState *cpu, +- MemoryRegionSection *section); +- + #endif + +diff --git a/include/exec/cputlb.h b/include/exec/cputlb.h +index 9bec0e789..16f866990 100644 +--- a/include/exec/cputlb.h ++++ b/include/exec/cputlb.h +@@ -43,8 +43,8 @@ void tlb_reset_dirty_range_all(ram_addr_t start, ram_addr_t length); + * @full: the details of the tlb entry + * + * Add an entry to @cpu tlb index @mmu_idx. All of the fields of +- * @full must be filled, except for xlat_section, and constitute +- * the complete description of the translated page. ++ * @full must be filled, except for xlat_offset & section, and ++ * constitute the complete description of the translated page. + * + * This is generally called by the target tlb_fill function after + * having performed a successful page table walk to find the physical +diff --git a/include/hw/core/cpu.h b/include/hw/core/cpu.h +index 961505177..a3db3f66f 100644 +--- a/include/hw/core/cpu.h ++++ b/include/hw/core/cpu.h +@@ -214,15 +214,16 @@ typedef uint32_t MMUIdxMap; + */ + struct CPUTLBEntryFull { + /* +- * @xlat_section contains: +- * - in the lower TARGET_PAGE_BITS, a physical section number +- * - with the lower TARGET_PAGE_BITS masked off, an offset which +- * must be added to the virtual address to obtain: +- * + the ram_addr_t of the target RAM (if the physical section +- * number is PHYS_SECTION_NOTDIRTY or PHYS_SECTION_ROM) +- * + the offset within the target MemoryRegion (otherwise) ++ * @xlat_offset: TARGET_PAGE_BITS aligned offset which must be added to ++ * the virtual address to obtain: ++ * + the ram_addr_t of the target RAM (if the physical section ++ * number is PHYS_SECTION_NOTDIRTY or PHYS_SECTION_ROM) ++ * + the offset within the target MemoryRegion (otherwise) + */ +- hwaddr xlat_section; ++ hwaddr xlat_offset; ++ ++ /* @section contains physical section. */ ++ MemoryRegionSection *section; + + /* + * @phys_addr contains the physical address in the address space +diff --git a/system/physmem.c b/system/physmem.c +index c9869e404..a21e7ca64 100644 +--- a/system/physmem.c ++++ b/system/physmem.c +@@ -748,31 +748,6 @@ translate_fail: + return &d->map.sections[PHYS_SECTION_UNASSIGNED]; + } + +-MemoryRegionSection *iotlb_to_section(CPUState *cpu, +- hwaddr index, MemTxAttrs attrs) +-{ +- int asidx = cpu_asidx_from_attrs(cpu, attrs); +- CPUAddressSpace *cpuas = &cpu->cpu_ases[asidx]; +- AddressSpaceDispatch *d = address_space_to_dispatch(cpuas->as); +- int section_index = index & ~TARGET_PAGE_MASK; +- MemoryRegionSection *ret; +- +- assert(section_index < d->map.sections_nb); +- ret = d->map.sections + section_index; +- assert(ret->mr); +- assert(ret->mr->ops); +- +- return ret; +-} +- +-/* Called from RCU critical section */ +-hwaddr memory_region_section_get_iotlb(CPUState *cpu, +- MemoryRegionSection *section) +-{ +- AddressSpaceDispatch *d = flatview_to_dispatch(section->fv); +- return section - d->map.sections; +-} +- + #endif /* CONFIG_TCG */ + + void cpu_address_space_init(CPUState *cpu, int asidx, +-- +2.43.0 From patchwork Tue May 19 23:30:01 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88466 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8C484CD5BA4 for ; Tue, 19 May 2026 23:30:51 +0000 (UTC) Received: from mail-wr1-f48.google.com (mail-wr1-f48.google.com [209.85.221.48]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.967.1779233442688386934 for ; Tue, 19 May 2026 16:30:43 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=wKuhtgIt; spf=pass (domain: smile.fr, ip: 209.85.221.48, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f48.google.com with SMTP id ffacd0b85a97d-43d75312379so3514073f8f.1 for ; Tue, 19 May 2026 16:30:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233441; x=1779838241; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=lAqmdYoD2V9fx5+lSC9pNNKABSsBgz6M2WYY9oXERm0=; b=wKuhtgItnqblpuoWhEmiGnLb2/SxV7MIVB6Vwc+7C+JLpVfgFrGZGQ7iBG9Y5PeUEP c0BWyifpc/ekZycJ3kZ4Xoc+xiQI7/oJZMMDfcu6KbbsuHMvJi53gb/ZBR+BlKrwx1Bq wAtISjIqlsrRxNsxIwFeZPa0Wj7ajUMRwOLD0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233441; x=1779838241; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=lAqmdYoD2V9fx5+lSC9pNNKABSsBgz6M2WYY9oXERm0=; b=Kvfr5vsbkKeZZUVYxScSIoHwmjJbAcHh28ascqDT1GVVieW42xDF0NK5pOZqF1+c38 xhU2Ps2gOJayUajUXOnhGi/C6t8u6AFOqi+qHRv5Oaa1XxN8eGLk0PvWzBTKgXwRWzuI UXEmm3aawlPwyCFYs0RVwG90RN9B25xzV+SsvsIE17I/1InsIDNjuHDAP0/Abh2dIvXj HGJtW3ssZ2LEmag3U1fCJ+DU0ZUKhudnf6cfuAjOecZsWGoACCDqeVy6O+EmazzFOFUq tKzTo+pWVtxTBwASOS2IzVj8Rk0DCXjuf7AXg54CrJTG97100ndq8qo3MSCB7NfcV1O1 IHJw== X-Gm-Message-State: AOJu0YzSHLHVeDx3ZvoGRWokBSPFTE/m6D/fskq/3adNBURk1UScvfiD 4mYSzzwOdkWYt2gwTx2J0tPkC5/UBTVi8FX1YSfgRETrehidjCZEVgZHE1oxuagq6eViQtkgEfG oZXlr X-Gm-Gg: Acq92OFahNG6MvfBy3e6Ej62rkO7ksppphcOxazebC24VygR8yIWYuUdlRO+N7UmesL 1XKgQJptAItnsp2NUuW66r2zNXS7/Wp2Fv9itG2vafHheoT6gI8YSWv9UFtIErzbzsLzswTJmT2 RNxVYrtLLteBAVc/sPfl4PHvwgsxvfl6iqc/hnKSBUfOLayMppHgY6JxWGGIeO0sLB1zpxicH/v kxZ2u6O9wOFKu8Xa0pqwPAsRTiiKqyV8vRKA2D8YdXqPwl78CdZg4ESWo7O59AUOtU1UovsFqgP YaKWP5qYFSsXgd6ynJJcovLVt92crjCM5VuFuAEj+c6F+NB8XSbMSNCDu9+J0FpRn6kVRZAttIS KfcBPePNNxDccddTu9iv7S5nn5NT3Tg88BPCPUtC+VBACJRsPgSUU0hdbf/Y6j4985P6KvPcoDc qdEt0rqd25lfjgVOAArym1f/cO+vsDnOCkaXIfwX2rdSrEqRCfiG34IAnZLZRBe9ciLUYHCVQjX xI9k96s8mzaFGEphlETqQ/P/X8= X-Received: by 2002:a05:600d:8:b0:48f:e044:927d with SMTP id 5b1f17b1804b1-48fe537fa84mr277596695e9.10.1779233440809; Tue, 19 May 2026 16:30:40 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:40 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 24/28] sbom-cve-check: set PV from upstream tags and ensure version checks are correct Date: Wed, 20 May 2026 01:30:01 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237371 From: Alexander Kanavin These recipes didn't set PV, which by default is 1.0. This isn't correct: upstream does provide date-based tags that can be used to perform version upgrades. Signed-off-by: Alexander Kanavin Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit d8d4dee746e86d746295c5b7ab1b880bb427e0a4) Signed-off-by: Yoann Congal --- ...ve.bb => sbom-cve-check-update-cvelist-native_2026-05-07.bb} | 2 +- ...bb => sbom-cve-check-update-nvd-native_2026.05.07-000006.bb} | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-devtools/sbom-cve-check/{sbom-cve-check-update-cvelist-native.bb => sbom-cve-check-update-cvelist-native_2026-05-07.bb} (88%) rename meta/recipes-devtools/sbom-cve-check/{sbom-cve-check-update-nvd-native.bb => sbom-cve-check-update-nvd-native_2026.05.07-000006.bb} (90%) diff --git a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native_2026-05-07.bb similarity index 88% rename from meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb rename to meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native_2026-05-07.bb index 3763e7f21f7..7670172c40b 100644 --- a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb +++ b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native_2026-05-07.bb @@ -6,7 +6,7 @@ HOMEPAGE = "https://github.com/CVEProject/cvelistV5" SRC_URI = "git://github.com/CVEProject/cvelistV5.git;branch=main;protocol=https;destsuffix=" SBOM_CVE_CHECK_DB_NAME = "cvelist" -# cve_2026-05-07_1300Z SRCREV = "dd0e93c75034d0167498174c886a56729edc44de" +UPSTREAM_CHECK_GITTAGREGEX = "(?P.+)_baseline" require sbom-cve-check-update-db.inc diff --git a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native_2026.05.07-000006.bb similarity index 90% rename from meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb rename to meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native_2026.05.07-000006.bb index 26a14e6eb16..02446e30cee 100644 --- a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb +++ b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native_2026.05.07-000006.bb @@ -6,7 +6,7 @@ HOMEPAGE = "https://github.com/fkie-cad/nvd-json-data-feeds" SRC_URI = "git://github.com/fkie-cad/nvd-json-data-feeds.git;branch=main;protocol=https;destsuffix=" SBOM_CVE_CHECK_DB_NAME = "nvd-fkie" -# v2026.05.07-000006 SRCREV = "72d8841c8ad9083ebf6723063f275444ea0d76f9" +UPSTREAM_CHECK_GITTAGREGEX = "v(?P.+)" require sbom-cve-check-update-db.inc From patchwork Tue May 19 23:30:02 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88468 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A5AB0CD5BAE for ; Tue, 19 May 2026 23:30:51 +0000 (UTC) Received: from mail-wr1-f52.google.com (mail-wr1-f52.google.com [209.85.221.52]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1018.1779233443141713734 for ; Tue, 19 May 2026 16:30:43 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=BeZqDxC8; spf=pass (domain: smile.fr, ip: 209.85.221.52, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f52.google.com with SMTP id ffacd0b85a97d-444826c16ffso3690085f8f.1 for ; Tue, 19 May 2026 16:30:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233441; x=1779838241; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8aV4GRZRpdMpkdCgv6z1BTGvWW7cmgc/G+pwWTzGnH0=; b=BeZqDxC8py0usBigFuykFJMomWy4YWGuidvDdSZ5kmE0VGdb4p+gwbQtuztwusNSlS dDhhGABgnVDtyY8ZbGFKlwSt65N3I1ayfpt535a439DC2LLGpZndyPy/b5F82LcXF/P9 VngjRc+XEWyhF3U3XsIAB7PUybRqElFjraowc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233441; x=1779838241; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=8aV4GRZRpdMpkdCgv6z1BTGvWW7cmgc/G+pwWTzGnH0=; b=fvIPIGbZ4odOesR6PjKBcCjB2SbVbrmsRuQoAaeYoWqSbn5U8jBiBq1ybLXUGVAYPb WS2yPefPLwX0OgInd0auVBhVkJSnDlbvG8GlVlBSoc4RExBxtoCXbeomu1VlcHIFA3s8 iRGX2alawsXiKBhW+JcAhUd5bR1JtTPX6/EJ7Ic5CujDe8bXnSsrPq32BouSyReOjLhh y5gV3Awh87iYl4UGteoOd66dA4IabPynD3Cgz0sweNyxEVUfVu6OtT+NdhRvXbtwsNXk Pw7k6iAqr2BmSpIkU4r0diuJtzVEoLC7Bsto//4HRNfZZHwwHfQL8WJj1m6QyQFs4kJc JyXA== X-Gm-Message-State: AOJu0YzaHB1QISL1mlnOOo0VpGZRZFqo6Q0EB+fv1tWeulwUGJKhmjAy YICF0T11VB7WMjVELQMHDL8whlyf/JPBIFV09ntQQ2am24JDomQaHsuRBSAEC449xRHgi/O85mD Bcbeg X-Gm-Gg: Acq92OHOc2LgiLvMlpLBNSBvA1/7LrAK4A929TRFqJboMoMrmEqwNy93ZK/uvM1T9qj yFJgW4iFrk1NG3ooL9XfkkyN+TvU0pod9HFTjxMcDxVoh9eFcSZ6lr4FFWhwvmKjaT7W0cVK9S7 SsqDFCkrznub4L2Baa+AD4Q+YaLH2P1XR4KqA5RSvfZT0KtcaHauIs9tvchETs2BnwPA+zp3ynu e1whf2crNS38rgcUn0DUx/mM8IgReMPhxT4QZk743rFri6B6D1DOTAftCiv0JcZo7UrSwAD+PBM WC49niFQAINC3qZk+r/kJ00zBQJAC2yuLAWVr421Te1AeARAPjbnN70lk1UqLKPOil5xJUbmNby FPRdQOjCPnnswB56AQXtxz5wgGjaUgRt6j29dWyEqLO9q4bVE7BJcRz96YneOs0NBYE4NUdb89E ewjMV0VdjLZsdojY7uRQybeJfXoHRuRcGLQTeHd0qm/gpyEM4Wl1wg1RjLPyizWC/n+Xo+7AyWY SXmM+6nLf3E2iSuMjFRQBRTZa8= X-Received: by 2002:a05:600c:4a1a:b0:48a:592c:e655 with SMTP id 5b1f17b1804b1-48fe6325f25mr201941105e9.17.1779233441282; Tue, 19 May 2026 16:30:41 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:40 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 25/28] bluez5: add patches to fix 8.56 gatt issue Date: Wed, 20 May 2026 01:30:02 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237372 From: Jinwang Li btd_gatt_client_service_removed() can be called reentrantly via bt_gatt_client_unref() after the services queue has already been freed, resulting in a use-after-free. Reset client->ready to false before destroying the services queue to prevent reentrant calls from dereferencing freed memory. Upstream-Status: Backport [bluez/bluez@d01616f] Signed-off-by: Jinwang Li Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 37f8b40d68bdac279d363d946b935716e2843d00) Signed-off-by: Yoann Congal --- meta/recipes-connectivity/bluez5/bluez5.inc | 1 + ...use-after-free-caused-by-reentrant-c.patch | 59 +++++++++++++++++++ 2 files changed, 60 insertions(+) create mode 100644 meta/recipes-connectivity/bluez5/bluez5/0001-gatt-client-Fix-use-after-free-caused-by-reentrant-c.patch diff --git a/meta/recipes-connectivity/bluez5/bluez5.inc b/meta/recipes-connectivity/bluez5/bluez5.inc index 843e36b78de..c792cc9c66c 100644 --- a/meta/recipes-connectivity/bluez5/bluez5.inc +++ b/meta/recipes-connectivity/bluez5/bluez5.inc @@ -70,6 +70,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/bluetooth/bluez-${PV}.tar.xz \ file://0001-tests-add-a-target-for-building-tests-without-runnin.patch \ file://0001-Revert-shared-shell-Don-t-init-input-for-non-interac.patch \ file://0001-tools-Work-around-broken-stdin-handling-in-home-made.patch \ + file://0001-gatt-client-Fix-use-after-free-caused-by-reentrant-c.patch \ " S = "${UNPACKDIR}/bluez-${PV}" diff --git a/meta/recipes-connectivity/bluez5/bluez5/0001-gatt-client-Fix-use-after-free-caused-by-reentrant-c.patch b/meta/recipes-connectivity/bluez5/bluez5/0001-gatt-client-Fix-use-after-free-caused-by-reentrant-c.patch new file mode 100644 index 00000000000..0fcbc0808a2 --- /dev/null +++ b/meta/recipes-connectivity/bluez5/bluez5/0001-gatt-client-Fix-use-after-free-caused-by-reentrant-c.patch @@ -0,0 +1,59 @@ +From 45c167591d04e2dfecf5b4642168e54c23abbd40 Mon Sep 17 00:00:00 2001 +From: Jinwang Li +Date: Sun, 26 Apr 2026 21:25:15 +0800 +Subject: [PATCH 2/2] gatt-client: Fix use-after-free caused by reentrant + client teardown + +btd_gatt_client_service_removed() can be called reentrantly via +bt_gatt_client_unref() after the services queue has already been freed, +resulting in a use-after-free. + +Reset client->ready to false before destroying the services queue to +prevent reentrant calls from dereferencing freed memory. + +This was found with the following backtrace: + + #0 match_service_handle () + #1 queue_remove_if () + #2 queue_remove_all () + #3 btd_gatt_client_service_removed () + #4 gatt_service_removed () + #5 handle_notify () + #6 queue_foreach () + #7 notify_service_changed () + #8 gatt_db_service_destroy () + #9 queue_remove_all () + #10 gatt_db_clear_range () + #11 service_changed_failure () + #12 discovery_op_unref () + #13 bt_gatt_request_unref () + #14 bt_gatt_client_cancel_all () + #15 bt_gatt_client_free () + #16 bt_gatt_client_unref () + #17 bt_gatt_client_free () + #18 bt_gatt_client_unref () + #19 btd_gatt_client_destroy () + #20 device_free () + +Signed-off-by: Jinwang Li +Upstream-Status: Backport [commit d01616f0c276a441dad8afe4e8f7bb261b26ba0a] +--- + src/gatt-client.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/src/gatt-client.c b/src/gatt-client.c +index 374e67c..3baf95c 100644 +--- a/src/gatt-client.c ++++ b/src/gatt-client.c +@@ -2261,6 +2261,8 @@ void btd_gatt_client_destroy(struct btd_gatt_client *client) + if (!client) + return; + ++ client->ready = false; ++ + queue_destroy(client->services, unregister_service); + queue_destroy(client->all_notify_clients, NULL); + queue_destroy(client->ios, NULL); +-- +2.34.1 + From patchwork Tue May 19 23:30:03 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88465 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 815CFCD5BA6 for ; Tue, 19 May 2026 23:30:51 +0000 (UTC) Received: from mail-wm1-f45.google.com (mail-wm1-f45.google.com [209.85.128.45]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1019.1779233443621298853 for ; Tue, 19 May 2026 16:30:43 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=qgZwmynp; spf=pass (domain: smile.fr, ip: 209.85.128.45, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f45.google.com with SMTP id 5b1f17b1804b1-48ff4f8ef0dso47477165e9.3 for ; Tue, 19 May 2026 16:30:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233442; x=1779838242; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=oE3aYSBF52qVbSf0opU/ta0V1vEo1StKEh3KB5OFdW8=; b=qgZwmynpExXUmDXIrhZ0Dy0xsB3RnXYz7A7CjR46ru2FXe15jyltFGmOVCoaPUeJgR DsVLrpwzXRWJdNFSlZ1bvlz8YZvV3gu/Iz+BOf9GG9Uud5YfrNzTtdqVy4n19RdZPsbb wGl4r4LNZMgKij3rYZRpAyc1Xql/VHPP4leBI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233442; x=1779838242; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=oE3aYSBF52qVbSf0opU/ta0V1vEo1StKEh3KB5OFdW8=; b=dbXxw8LqZu2Oltn/O3VgBP8dxynjiTYTwP9ES25AVaKu18kGIOyW0JGaVT2xq9mCQk hOKkhgwLoyJoRgVhwdvhhKy4ph7TnIjKp1o81NjTKj6w2NZRcavH0qjU2coM2KWEopm5 6EsCQO8OoZeM5QPQ2HjEakBlfAWQhqrkNJSdlMHRHf3eKKP4wXxBETManhJ8qdIQligk tfo1MuCAiC/T1zgXxUZo0BbgQuQOy2tldD8QwQf7RT6/VKk3J4R0mfsempg7cdHBhZkA CqIPJDN/h7D+g5HGPvELzlrS1B0YaqD08/rEujaNDV7SITgqvx0FDXrrHBhFrXZk6Jb7 4kMg== X-Gm-Message-State: AOJu0YzH6I+ylkAdndEDLg7e4ikqhsk81aPqigXXdxpLmH6QKA/KQNYB w8UC9L5ogL1hX8M3Vt/Qngsg4gOATV0xsotItFbuWtIW2oqWfdaDNgTh/jGj04pc/alhLO1IIS7 kf3jA X-Gm-Gg: Acq92OEpAAf3z7ORhk0j6fVGzUxIK6VQ7tNAthq/KtZ1UsoWfgdcvb0jN0yQQyk+lau mdGm50e53uabSUf44Wf6YqA9RKKCoHEPvEWzH/5tBGkdgBYCWTGkyk4fHZSG1MCnXlEd0+z+4y+ MHiuslhCWhGccJJJIDPXgFnT+2bHRVaOn44jCEpjoXrKKsiXSzup0JfRuiWIqSJOlJd68RX2M6+ iopIUO7Y/I6t5lhuwsIvcESrs5DWGfMIDGgeTQby5dU2SpoZAufQb5f84YM1rB6+f8KqRrhrBme 237turY3hXLVdundJUhZKtkaPL3eN1LFRBKc/wCELlaPlrj9m1LK5v+sBk2Ei2k0DzftM6Yss/A Tw10eZ+4uQ6BfPEPf+cgmQIB493bT0ntuY/nIuasx19vBhMCU2j6oA4Lex9fJIqTbPTdON49nFJ lJt3rO+kBMvwp4IWzM9KT9BqHrGZ6dri1sFqvR8HTB2IROTP9AhLc75X1c/vJ++ynJ2kMAVMdJt 5b7su14rCaUwoHyemk5PHrGE8lLIgcdYVGqJoYscKwRT80X X-Received: by 2002:a05:600c:6206:b0:489:5022:39a4 with SMTP id 5b1f17b1804b1-48fe60e79fdmr339333075e9.9.1779233441683; Tue, 19 May 2026 16:30:41 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:41 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 26/28] default-distrovars.inc: add missing spaces in append overrides Date: Wed, 20 May 2026 01:30:03 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237373 From: João Marcos Costa DISTRO_FEATURES_OPTED_OUT is a space-separated list, so the missing space leads to: $ bitbake-getvar DISTRO_FEATURES_OPTED_OUT (...) set /src/build/conf/local.conf:277 "x11" (...) :append[loongarch64] /src/openembedded-core/meta/conf/distro/include/default-distrovars.inc:26 "seccomp" (...) DISTRO_FEATURES_OPTED_OUT="x11seccomp" Signed-off-by: João Marcos Costa Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit f1e6a11501224e68a5989cc6cd33cf1b903e542d) Signed-off-by: Yoann Congal --- meta/conf/distro/include/default-distrovars.inc | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/meta/conf/distro/include/default-distrovars.inc b/meta/conf/distro/include/default-distrovars.inc index 4bfe2469e28..69c6db589b7 100644 --- a/meta/conf/distro/include/default-distrovars.inc +++ b/meta/conf/distro/include/default-distrovars.inc @@ -14,16 +14,16 @@ LOCALE_UTF8_IS_DEFAULT ?= "1" LOCALE_UTF8_IS_DEFAULT:class-nativesdk = "0" # seccomp is not yet ported to rv32 -DISTRO_FEATURES_OPTED_OUT:append:riscv32 = "seccomp" +DISTRO_FEATURES_OPTED_OUT:append:riscv32 = " seccomp" # seccomp is not yet ported to ARC -DISTRO_FEATURES_OPTED_OUT:append:arc = "seccomp" +DISTRO_FEATURES_OPTED_OUT:append:arc = " seccomp" # seccomp is not yet ported to microblaze -DISTRO_FEATURES_OPTED_OUT:append:microblaze = "seccomp" +DISTRO_FEATURES_OPTED_OUT:append:microblaze = " seccomp" # seccomp is not yet ported to loongarch64 -DISTRO_FEATURES_OPTED_OUT:append:loongarch64 = "seccomp" +DISTRO_FEATURES_OPTED_OUT:append:loongarch64 = " seccomp" DISTRO_FEATURES_DEFAULTS ?= " \ acl alsa bluetooth debuginfod ext2 ipv4 ipv6 \ From patchwork Tue May 19 23:30:04 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88467 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C89F1CD5BAD for ; Tue, 19 May 2026 23:30:51 +0000 (UTC) Received: from mail-wm1-f49.google.com (mail-wm1-f49.google.com [209.85.128.49]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1020.1779233443874801763 for ; Tue, 19 May 2026 16:30:44 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=DQRsRATG; spf=pass (domain: smile.fr, ip: 209.85.128.49, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f49.google.com with SMTP id 5b1f17b1804b1-488b0e1b870so61882545e9.2 for ; Tue, 19 May 2026 16:30:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233442; x=1779838242; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=QGkzejGpEyOxVF75zURy8a+xDjIbZrrS+ei7tppTCoA=; b=DQRsRATGlV+D8hnYM9F4PR8l6QlX8ieP/4lOZbSPuPlpar6kae4jpqi125IXfURS6X 07+2/Erhg/M/Q5wQPBmkupILXOf3TXigIIeafdjKAQemPnsdEt2cgcEp7Np/NZVSPK2b hUPmXEmsE+I4rA9zhQs0IlkF0sbcps0oAsZyY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233442; x=1779838242; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=QGkzejGpEyOxVF75zURy8a+xDjIbZrrS+ei7tppTCoA=; b=tJJ9/Gr0rHDlKY0tOdcf4qdx+lDraHvxKXVCwwO82A7lTOQz6U6KIzdWWikyAiq8tr kqiHcbGxf/OGiOArOIDj8CGgL9Wb6qpoWcABwtXlhf2fp1HxD1zOOFIBtfpSul8rr8QW pqAY4tIFTPvoF2TVN0roVM0oXzznpyux2E+CYZa1Z8QPZ0yO6VYeRMtSEfmbm5O4uVVb 0GVhamQcbMqv3t9oczQwhgQpmt8+2yecVWRfk+DY0Xy+VcOBXUNQnUwvzXjO2nm1Uz2C O6D6j5H+rEh2tsAmzEcRoi/FO8HnS6yiw4pF5+4VNXEuqOf4JwCN9G1H9TlZ+5ErOlc0 vVkw== X-Gm-Message-State: AOJu0YyDFhwfI33fxDCLAlnlMV0TpJGqjLoix14JErQf6BCx0opaw98o Z0887UQoXDog+JzAYJobMGPrFW5mw3j6Gr6mZSnUwwmXoe8j6XCbfgOfyEM4dDwvKnvLm6BZ1Y5 DBXER X-Gm-Gg: Acq92OGi+l4UThRwszGtiLY4DK4r9bNBo0Z0Z4OJEeXgyNAYeyAGRHTfWLnLhxtEEIe cUanNJ1hlQg1EA2veuokOo8Q8BNTgrxHPmuy42SaeoTEoRFrGqRMRZIz2iosByxk65WHWws5nKc b++NRaoqETs91ZJLIv0habRhxCakL9yNfK9VbTAVinO39/zMXPjgO8i9EjVW3E6wJZhiuF4ktcC V/QqD2jOsXiU4adyuqPgtBsdWm+JJ7ON2fnVxvLXpzYkF9l9ntWE1KESPcyGNZnpPfqPpZvWalw KepY9uxe+bEIh7Ig36sIA7MXvVBgeX0XMuLNsv9pPZrJhbZO1iWsO/puvWXtO7YLEs7LsHP/qVk sL2qTOi/Zfbf4mj907q8WXXwerG6/UYFQ2sk8cv6yyy014foQgoNrYkQ1QZsdR7kzRsnUI983nx 5n4THTO1M5tbxudFCd0Z6yLUQoiQplor/70+crsEvqaTgMDHxRDMvGp256VnlnAid+6+JSQOo0q mw9iFCiEm2oQYtmeruNMXt9nQbbY8sCieVfgg== X-Received: by 2002:a05:600c:8184:b0:488:b187:3c with SMTP id 5b1f17b1804b1-48fe60ee4admr328119915e9.14.1779233442254; Tue, 19 May 2026 16:30:42 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:41 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 27/28] glibc: stable 2.43 branch updates Date: Wed, 20 May 2026 01:30:04 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237374 From: Peter Marko $ git log --oneline ce1013a197eb4a3b8ff2b07e0672f4d0b976ce7c..e9517114acc77c0b8af9da6700107df16882b701 e9517114ac (origin/release/2.43/master) abilist.awk: Handle weak unversioned defined symbols 1634cc11a5 Linux: Only define OPEN_TREE_* macros in if undefined (bug 33921) d1d8d27164 include: isolate __O_CLOEXEC flag for sys/mount.h and fcntl.h 8362e8ce10 Use pending character state in IBM1390, IBM1399 character sets (CVE-2026-4046) Testing Results: +--------------+--------+--------+------+ | Result | Before | After | Diff | +--------------+--------+--------+------+ | PASS | 6629 | 6632 | +3 | | XPASS | 4 | 4 | 0 | | FAIL | 105 | 103 | -2 | | XFAIL | 16 | 16 | 0 | | UNSUPPORTED | 559 | 559 | 0 | +--------------+--------+--------+------+ Changes in failed testcases: malloc/tst-malloc-fork-deadlock-malloc-check FAIL PASS malloc/tst-malloc-too-large-malloc-check PASS FAIL nptl/tst-getpid3 FAIL PASS stdlib/tst-qsort3 FAIL PASS Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 8999a94dd8acd98a0f96b09d20e5b47cf2f7076b) Signed-off-by: Yoann Congal --- meta/recipes-core/glibc/glibc-version.inc | 2 +- meta/recipes-core/glibc/glibc_2.43.bb | 4 +++- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc index 015e7943c55..af3db54cee5 100644 --- a/meta/recipes-core/glibc/glibc-version.inc +++ b/meta/recipes-core/glibc/glibc-version.inc @@ -1,6 +1,6 @@ SRCBRANCH ?= "release/2.43/master" PV = "2.43+git" -SRCREV_glibc ?= "ce1013a197eb4a3b8ff2b07e0672f4d0b976ce7c" +SRCREV_glibc ?= "e9517114acc77c0b8af9da6700107df16882b701" SRCREV_localedef ?= "cba02c503d7c853a38ccfb83c57e343ca5ecd7e5" GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https" diff --git a/meta/recipes-core/glibc/glibc_2.43.bb b/meta/recipes-core/glibc/glibc_2.43.bb index ffc17eb0720..b84c55ca170 100644 --- a/meta/recipes-core/glibc/glibc_2.43.bb +++ b/meta/recipes-core/glibc/glibc_2.43.bb @@ -17,7 +17,9 @@ Allows for ASLR bypass so can bypass some hardening, not an exploit in itself, m easier access for another. 'ASLR bypass itself is not a vulnerability.'" CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS" -CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915 CVE-2026-4437 CVE-2026-4438" +CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915 CVE-2026-4437 CVE-2026-4438 \ + CVE-2026-4046 \ +" CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix available in used git hash" DEPENDS += "gperf-native bison-native" From patchwork Tue May 19 23:30:05 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88462 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 72865CD4F5B for ; Tue, 19 May 2026 23:30:51 +0000 (UTC) Received: from mail-wm1-f46.google.com (mail-wm1-f46.google.com [209.85.128.46]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.1021.1779233444572736263 for ; Tue, 19 May 2026 16:30:44 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=nZ/Kbbrc; spf=pass (domain: smile.fr, ip: 209.85.128.46, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f46.google.com with SMTP id 5b1f17b1804b1-490229aa522so9065455e9.3 for ; Tue, 19 May 2026 16:30:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779233443; x=1779838243; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=2SQutjT6Kj1LbQ1z6XYvFMbgjD09nVFJ0GOZONM7QU4=; b=nZ/KbbrcgjOqSt7stxA0VK2jxtzcxjAH8ARhlfMEfcF22VCvvlcaYJ0325khwhmtjG o+LP0kIi22u8RIyHdXeLYLa9WZ29l1Eg6kTJm+84qSYUTOfy46HW9LPRrgVVZTo1EFKG o10jJHLaAkvmvjZmkHIJ5XcVgBoq5RZfjdys4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779233443; x=1779838243; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=2SQutjT6Kj1LbQ1z6XYvFMbgjD09nVFJ0GOZONM7QU4=; b=qUNkbnHes646KbT4MDqbNMU4EfacDN64WXJVoFZCXZbLYCLaxI9cgOae/2eA8Eiw9J jvWoytp0dz/dY+yIW+d5sqU72TKU8Andl6T3Y9VyPc0lGFmlSj5dn7zJulXKqpJ3dtz0 32fEpv/V9dH50S3/4/RB+LqiFziLz2q0sNobdZKF/P3zh7Uyzmur9cKduGH/uSlojAOb 4Q7gnysyZwTF3eRtP7aQGzOY0UXiAXGtYqWmpXN3Ye43Tk3wJi3XnsFBApNjww0Pgqoz H1xO4wMguUjbyQgEaGccBEeS0Y648RX+LFfprtaNQp3ZSkXOZt4Jnz+JCVBOUIzDRtke ttgA== X-Gm-Message-State: AOJu0YwlSbiJLRBBKDlzvhdD80uNYEszyuCjjNgKi/xEeBKPCvgv+7dM EtSMnID66vE6aHnsYxtgNUAYyLhLTaLf2JSmnbyz19pC//2tEBsXK4EI9q4jzyP8o7BUOpZTElH ChsSU X-Gm-Gg: Acq92OG8Q9FjXVuos0MI07HK0xRIlZ3w9sLF3Tm8ss5prQ6SsnfZ6Uu0hHmqpXEzI06 GrRDzYIoDVmvNz2wmKshu2GyliiWBDzNzbu5O1qx14u8vSPbjZJMLl4VEYHe9JL1R33Zn41LhcQ hmK+Ns74wtWR2Vw8UeOHybnmTrIh2pHV47oHtogNeQzkbupX7rQ1D1dcIyVPlSouvzzuEuk6c6h 47JVOuXDZjk44SPSz9SKCDPmF7CJRMljcOpMouZu6zevKqWkjAvW4Dtf01nno11l/Q4hFxY1eGZ 1c6MLiEB5JpwfXQyiaX87x33kMjant2TsHVny0tk1JJVORHEr04ZIerP3PAXj9lXQpVVf4hQtvy f1uRVrxpd3dYpMK6rgOORXrek7v3Z7oU/oRKj9M3IAXlw8XXkx1nDPpTlOER9JG3IfDNSRIRbBD NZyi/F0xLfs20M7wu22Q7Gq6es26FsBrJOo5064AGqSNZyS2vXbhr+KcKdSDt8lg35HwU2Dz2Gd TWqK1YZbLLgBYIdYw0qr9T0IvgdQ3OCYJMopw== X-Received: by 2002:a05:600c:a11c:b0:48f:a75e:c21 with SMTP id 5b1f17b1804b1-48fe5fcdee9mr248507315e9.6.1779233442803; Tue, 19 May 2026 16:30:42 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48febe5bc94sm224705795e9.4.2026.05.19.16.30.42 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 May 2026 16:30:42 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose 28/28] pseudo: Upgrade 1.9.6 -> 1.9.7 Date: Wed, 20 May 2026 01:30:05 +0200 Message-ID: <410768131f4a95394f91cfe32808f56c99c660eb.1779232800.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 19 May 2026 23:30:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237375 From: Richard Purdie Pulls in fixes to rename/renameat/renameat2: Changqing Li (1): renameat2/renameat: only ignore when both old and new path are not in PSEUDO_INCLUDE_PATHS Mark Hatle (4): run_tests.sh: Allow the user to specify specific tests to run tests: Add mv then hardlink testing rename: only ignore when both old and new path are not in PSEUDO_INCLUDE_PATHS Makefile.in: Bump version to 1.9.7 Signed-off-by: Richard Purdie (cherry picked from commit 17567738711d525d9f2b85e54ace2048901e4c34) Signed-off-by: Yoann Congal --- meta/recipes-devtools/pseudo/pseudo_git.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-devtools/pseudo/pseudo_git.bb b/meta/recipes-devtools/pseudo/pseudo_git.bb index b118f436db8..22bb938cd1d 100644 --- a/meta/recipes-devtools/pseudo/pseudo_git.bb +++ b/meta/recipes-devtools/pseudo/pseudo_git.bb @@ -12,8 +12,8 @@ SRC_URI:append:class-nativesdk = " \ file://older-glibc-symbols.patch" SRC_URI[prebuilt.sha256sum] = "ed9f456856e9d86359f169f46a70ad7be4190d6040282b84c8d97b99072485aa" -SRCREV = "7109ac1b417cd31e0100f6e1c4f3e5743541b9ed" -PV = "1.9.6" +SRCREV = "5b7c4b59e7e198aab54b35ea194aeb6d99794f96" +PV = "1.9.7" # largefile and 64bit time_t support adds these macros via compiler flags globally # remove them for pseudo since pseudo intercepts some of the functions which will be