From patchwork Wed May 20 08:20:02 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88489 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 94A28CD5BA4 for ; Wed, 20 May 2026 08:21:01 +0000 (UTC) Received: from mail-wr1-f44.google.com (mail-wr1-f44.google.com [209.85.221.44]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7371.1779265255935690172 for ; Wed, 20 May 2026 01:20:56 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=2Zs4ZwyO; spf=pass (domain: smile.fr, ip: 209.85.221.44, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f44.google.com with SMTP id ffacd0b85a97d-44a74032ff8so3224711f8f.1 for ; Wed, 20 May 2026 01:20:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265254; x=1779870054; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ZMV29VW6b84CdmPUx1dcS4TbXLj1HRyAz8Fz3ImjDBc=; b=2Zs4ZwyOuo1EtvigfElmis2kzr7oopckzBEXODATUrcjl7X8gEpM/aTIlP3RFHramL aOGAvrdETlU5loSAW2nVzzt9jAsBzYTQUwiq9pzAXlNyBy2oFWElE5JJgfjaJG+etsOW /XIuzw3Y/H2EFPgmiwg48/qRX+8Y6mmaHYprM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265254; x=1779870054; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=ZMV29VW6b84CdmPUx1dcS4TbXLj1HRyAz8Fz3ImjDBc=; b=k56NdYHMivt7aUGZ5Pdn3peurj1WRJQrZOdIGE7S6nPmKdfXzz44Grz2CW26bQGO6w lvgr846NG+HPvrEvJ9dubB6DbHeZAuj1YysJc2Ceu19nWnyziHixsqEga8+VGtQqn4yo 2sJN84yDyKNuQuOHLKR2l3hOYV4KUcPGoB4PSPCeWR1lz4naYPZ2i4eU51+qnpVp9OSH Ajv5oHVPzULRLNN5orVv+dSJlWNPksvLNApJEhLVRrbAWRu4+wMGd880AQhbXKUwJ7XA aI1nS6ae7RdtAlhKH3La168IkiJ6SrxBI6MnSHfbPWqRtLNXdE4vqLoZBW3yvtxlOc/7 RGWg== X-Gm-Message-State: AOJu0Yzl51864wLqF57EJ/G9s+anmEWtN0yXE7ymHcZtPs0zdk+OteuR sCM+4e86UP2lPZDW3fpAeRid4dwcgNvVw2/D1Q41jWcfaJTTV9+T1YDiA6Tdspl1mIAv7zi07qJ R2hE2 X-Gm-Gg: Acq92OGzDaJGs+fyVo+Cjlw+fpVb+hbz4Q727bkNsNq0IZNVjlHEh6q8wtSNKsgjYq1 l02ajtbg/I2Koxe/QdC649iL6frcJkuPGTn7y7xGvhA6EKJdOcAzB+Jm1TwCDTM8A7QAXUch525 Ud2E5/9QU1D/PhtTasrxB0gr7/Y8Y3vrdiDsgLOiN2FhlwJV4xD9TZyhvTfj+0R+Ked5xBevwbG VesrFoVb2V5f5WUUaBBHuco6Yu0hfFbUAgNDQ9q2OrpjIYTkJWYb6OKTGptBkm3y+3r5VSkoQYn 2kYQ+2uOmVHFdJQ50ZAoRrD5M0+AcxG6LOronNfYbgjflCPmwS2GvPjHC88eNUzpF/NU+FvnYW6 GAw3kij4wOOv/zoWA5xrLrMms29bfPm0B+LM/a61vIrJc2WyDlMdbGTZI+uDY+CbiicMQAVADN+ m9bGsoSZkFHOBMBoj66IOSSipqn+IhwoKxUZPOokL3aEXWmP1hWmQ+vAD++reXNd9LgkdOprc1U Jq7QDv9iM+1cSFyZTv27/fYxaYFecf5NFKZGzg= X-Received: by 2002:a05:6000:2289:b0:43d:7c1b:b8c7 with SMTP id ffacd0b85a97d-45e5c5bebe2mr37132062f8f.21.1779265254352; Wed, 20 May 2026 01:20:54 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.20.53 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:20:54 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 01/28] README: Add wrynose subject-prefix to git-send-email suggestion Date: Wed, 20 May 2026 10:20:02 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:01 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237400 From: Yoann Congal That might help new users send correct first stable patches. Signed-off-by: Yoann Congal --- README.OE-Core.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.OE-Core.md b/README.OE-Core.md index 4804e436322..15b0fbec976 100644 --- a/README.OE-Core.md +++ b/README.OE-Core.md @@ -26,7 +26,7 @@ As a quick guide, patches should be sent to openembedded-core@lists.openembedded The git command to do that would be: ``` -git send-email -M -1 --to openembedded-core@lists.openembedded.org +git send-email -M -1 --to openembedded-core@lists.openembedded.org --subject-prefix='wrynose][PATCH' ``` Mailing list: From patchwork Wed May 20 08:20:03 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88493 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DECC5CD5BAB for ; Wed, 20 May 2026 08:21:01 +0000 (UTC) Received: from mail-wm1-f53.google.com (mail-wm1-f53.google.com [209.85.128.53]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7372.1779265257061644031 for ; Wed, 20 May 2026 01:20:57 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=KyO97jiu; spf=pass (domain: smile.fr, ip: 209.85.128.53, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f53.google.com with SMTP id 5b1f17b1804b1-48e8132c6d0so29918935e9.1 for ; Wed, 20 May 2026 01:20:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265255; x=1779870055; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Byr2DJiLDcuepDfs8WDKma8Gg647t61r7Tuty5jeuvc=; b=KyO97jiug55d2K36dU/FZLt1mfhtRxd8D4c4NqBs5pKMU6kbj1L5Sc+ZwG4q2u1NOq gOjZ8SUzQ4ao82YUfdR3K1zpY7SKK+RmGKp9RXXc4FxGRi0WAtSQDzKkLFX+kegpJTJ1 Brk5uHwpk98YWCagcDxUPmgLmBaDkr4e/8lGI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265255; x=1779870055; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=Byr2DJiLDcuepDfs8WDKma8Gg647t61r7Tuty5jeuvc=; b=TH8lBglnXswb1O9J0kYQfh/1/4U2FRwTvP6JppksyEeRYnUzmdR1C6IaYOthMhTYN3 TabtihdI/jhQc320ULvPG0w10nhIR43yXq9Cul0lrQfqxL+LKu0whheB6vfX/nok0Tun PhCI2oSKG17KyOhrPSms4rdqVvHJFiT7WgnGwlTF5ObOj+PdILrdstyxexNA9YR3/hVi Q6RVXXefldKn1Cyt9pQ0r9D+cQVE1F6J9kAdVQUR8GCTag9b5KSFgGHPGE76yHuBE0Ll b2MMjjmi1VHrFyai2/KTZ/xx5cXFilaB+mViXpRCo8+vk6ilzN3ifi0YQBfZYqj+Gbql sSwg== X-Gm-Message-State: AOJu0YxBnBoRJnhpHTTd7QUf18+WSTQ9IVr5F4B6dx9JWi5E8ngoFy73 pet9AfvSfnSKrO0Ggk2CW60I5dmovI3DSxSxkYkzqrDV0eexLEmJjCpF36swSTt/NWWILKfKRKc M7iI1 X-Gm-Gg: Acq92OGvJqJHtFhd6M7nnvMkDKaG6XWgd7PY88CJlZHDEwxujbI9TaRNq/ignK+2lHV nQx/ZoYhNibru1P06yER5CvcNTz+vvBqJaZ67zEStzP4/2D5NLn+SaJS7fonXMWVAtdXY3CgzRO MOX3V+SwbRglamMr+XyjHvpW+ES0m5HtJn31GvkdfiCtYRdbYPS5wDvABTN/1kZW57PLGYb8CoQ O34nlSiCveeoF1yuYxf+PtdIxzH13KfwUPrZeWuAtE+7UEikqLRourekRZb2NXo9DtnHLc7QQZ0 L4WJlZWADTDNSsFU1FBCYxkea1anKiZrIMJuXzf4mDPJdASDmjFgkGyZ7mYq+JEhhQXrTqtkIkn tylciPys5Ar7h9ZD9kLVXeMwmVaZkA2Z6qNlD7VDZp7WZpZUG42wqHORtt84NyxVg0S3GmlRu2F pOaCPBLyWZThXQ+m3S6fzxJWs6JsnMYVpLBpHftD2Wui5yvxpK1oydrD4Y6DmqcuiJO4UbjtnSP 8niPGf/EM6QqpU1yYo4PUSrmogXQVp8/M+8Uaw= X-Received: by 2002:a05:600c:470e:b0:48d:361:4df6 with SMTP id 5b1f17b1804b1-48fe60eabbcmr337537115e9.9.1779265255102; Wed, 20 May 2026 01:20:55 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.20.54 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:20:54 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 02/28] python3-requests: Increase chardet upper limit Date: Wed, 20 May 2026 10:20:03 +0200 Message-ID: <545fadfed8c87d1d7d112eb78d59dfa9e815b1d4.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:01 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237401 From: Daniel McGregor OE Core includes chardet 6.0, while requests warns for any version greater than or equal to 6.0. Not for any real reason, but because it was a higher version than what was released when requests 2.32 was released. Signed-off-by: Daniel McGregor Signed-off-by: Yoann Congal --- ...01-Increase-chardet-upper-limit-to-8.patch | 25 +++++++++++++++++++ .../python/python3-requests_2.32.5.bb | 1 + 2 files changed, 26 insertions(+) create mode 100644 meta/recipes-devtools/python/python3-requests/0001-Increase-chardet-upper-limit-to-8.patch diff --git a/meta/recipes-devtools/python/python3-requests/0001-Increase-chardet-upper-limit-to-8.patch b/meta/recipes-devtools/python/python3-requests/0001-Increase-chardet-upper-limit-to-8.patch new file mode 100644 index 00000000000..662049ef94d --- /dev/null +++ b/meta/recipes-devtools/python/python3-requests/0001-Increase-chardet-upper-limit-to-8.patch @@ -0,0 +1,25 @@ +From c6a303bc6ea1d1d2ee5be86c4eed92cbb325c1fe Mon Sep 17 00:00:00 2001 +From: Dan Blanchard +Date: Mon, 2 Mar 2026 17:49:19 -0500 +Subject: [PATCH] Increase chardet upper limit to 8 + +Co-Authored-By: Claude Opus 4.6 +Signed-off-by: Daniel McGregor +Upstream-Status: Backport [https://github.com/psf/requests/commit/b2a1d33f571518ca9a6148e7da787cc5827f897a] +--- + src/requests/__init__.py | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/src/requests/__init__.py b/src/requests/__init__.py +index 051cda1..f22eb37 100644 +--- a/src/requests/__init__.py ++++ b/src/requests/__init__.py +@@ -76,7 +76,7 @@ def check_compatibility(urllib3_version, chardet_version, charset_normalizer_ver + major, minor, patch = chardet_version.split(".")[:3] + major, minor, patch = int(major), int(minor), int(patch) + # chardet_version >= 3.0.2, < 6.0.0 +- assert (3, 0, 2) <= (major, minor, patch) < (6, 0, 0) ++ assert (3, 0, 2) <= (major, minor, patch) < (8, 0, 0) + elif charset_normalizer_version: + major, minor, patch = charset_normalizer_version.split(".")[:3] + major, minor, patch = int(major), int(minor), int(patch) diff --git a/meta/recipes-devtools/python/python3-requests_2.32.5.bb b/meta/recipes-devtools/python/python3-requests_2.32.5.bb index 3477a5d83e9..4c58436cef4 100644 --- a/meta/recipes-devtools/python/python3-requests_2.32.5.bb +++ b/meta/recipes-devtools/python/python3-requests_2.32.5.bb @@ -8,6 +8,7 @@ inherit pypi python_setuptools_build_meta SRC_URI[sha256sum] = "dbba0bac56e100853db0ea71b82b4dfd5fe2bf6d3754a8893c3af500cec7d7cf" SRC_URI += "file://CVE-2026-25645.patch" +SRC_URI += "file://0001-Increase-chardet-upper-limit-to-8.patch" SRC_URI:append:class-nativesdk = " file://environment.d-python3-requests.sh" do_install:append:class-nativesdk() { From patchwork Wed May 20 08:20:04 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88490 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EB8EDCD4F54 for ; Wed, 20 May 2026 08:21:01 +0000 (UTC) Received: from mail-wr1-f52.google.com (mail-wr1-f52.google.com [209.85.221.52]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7274.1779265257980519861 for ; Wed, 20 May 2026 01:20:58 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=dOT0wDW3; spf=pass (domain: smile.fr, ip: 209.85.221.52, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f52.google.com with SMTP id ffacd0b85a97d-44ccbd3290aso4253006f8f.2 for ; Wed, 20 May 2026 01:20:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265256; x=1779870056; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=M4JXqQByZ+Me07AwHDolIqgwY/x5/y5/bEcE24PbIYA=; b=dOT0wDW3deJ2pH4R8hxljiRweKIMxXXOGkPGYxp52ooiyJZGC+RNjA+OZkYKuUU3pi BnsKFR3joSEjdcjfpPq1sula9i0rg3lE+reTflmPHBtIhrIDhTGEdJBBllqHb3sfcKlB CZYPQt4ENY3K/860/nZ5oLqZ7fVIxO8LD9FY4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265256; x=1779870056; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=M4JXqQByZ+Me07AwHDolIqgwY/x5/y5/bEcE24PbIYA=; b=PLiFg8cP9IHug3uBxLzdtcbtWonQXRncmjANCvrQXKYnMOk1RYn51WLc8w+bER2+w6 bvgxyh08qtFXBBe3mpAAyidFcJ4gHv6JFWYwz9GI1sJQRnhp2igNsDeyzhp3sbD1DzsY SH7w8UOpF3za7Q9T0vB7weEt3xFLoz4VqL0qRj9qLVGrsRTp6dLh0RR5clkcYpYx3iMF syErGHMWEbJZuB+HhuksCXFj4br37UfjRHMaY6dF3AdDa8Sq7oYgwDBhNBHEazqnK2N/ Rn75vIIz2uKvXVHy+CBHPxmDxrd/+8z9kMAM7AaxN+otegwo6Zut6PIzZ/N+JGs0fOGl 4Fyw== X-Gm-Message-State: AOJu0YxqULEmenQ3i0B/U/zqT0bWHup6T1+5krVBplp8fqmh38URSQ7U 2I8+RtU28cTjQfFQTlbRLA/a2gngNzdHtrPuqaB7jp77KAvRtCbJqIlAW8NUui801rm0Wg0URc/ k5IBM X-Gm-Gg: Acq92OHlarlONITQMnE9n2KuFNk6fDRIyEM0bYsURU2NBnAogEMC8P9cDDbljEpg6oM 8ZoTIVS6+lnzHnDZfRtQ/2KBT32VC4d1fcK2KSZIBeJdiHmnUrkoF5ZL5BuJIp7DVZLRLUPudtL y3oYj79KVF3jJR9J3n1QqHbzLroHJavBUgZMKOFY36a2YVmZy2PKfH0lSxKzm5tJd2+nKKQJpR4 xUKZ1We5r/CzzX7/CwUexqVkSZ+1bhxOsIZ2k1FB8e/o41Ib8CIN5olMW2RyHW0+9zjMD5mTWjA eKKrXU9Vx8orLL9SFDRbLv+kLzpOoGbSsjJIJL5xCvxZn4WdkF4n0gWnCxvn4UwpkhrmnnwAKWZ OAUvqU7dQ0uxxlavTjvd6KDHwqYp+ps/Yv2U/+b9zM/nSoruFDQPk4IDyiqactgtQ3ynx19NZlY 2dt3Ro1rDax/a2PwmPnS/YgxEZ1Mg3CCs+AtIe/safmK+xpi7zfDqlxMW4/ECtb5fiXIb0vedrj CPSCzUjjb1ieoKqsHWGllMIBU7QDHR/V0nTkgQ= X-Received: by 2002:a05:6000:2489:b0:44f:da26:cbb4 with SMTP id ffacd0b85a97d-45e5c58d51cmr34763139f8f.21.1779265255874; Wed, 20 May 2026 01:20:55 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.20.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:20:55 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 03/28] tzdata/tzcode-native: upgrade 2026a -> 2026b Date: Wed, 20 May 2026 10:20:04 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:01 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237402 From: Ankur Tyagi The 2026b release contains the following changes: Briefly: British Columbia moved to permanent -07 on 2026-03-09. Some more overflow bugs have been fixed in zic. Changes to future timestamps British Columbia’s 2026-03-08 spring forward was its last foreseeable clock change, as it moved to permanent -07 thereafter. (Thanks to Arthur David Olson.) Although the change to permanent -07 legally took place on 2026-03-09, temporarily model the change to occur on 2026-11-01 at 02:00 instead. This works around a limitation in CLDR v48.2 (2026-03-17). This temporary hack is planned to be removed after CLDR is fixed. Changes to code zic no longer mishandles a last transition to a new time type. zic no longer overflows a buffer when generating a TZ string like "PST-167:59:58PDT-167:59:59,M11.5.6/-167:59:59,M12.5.6/-167:59:59", which can occur with adversarial input. (Thanks to Naveed Khan.) zic no longer generates a longer TZif file than necessary when an earlier time zone abbreviation is a suffix of a later one. As a nice side effect, zic no longer overflows a buffer when given a long series of abbreviations, each a suffix of the next. (Buffer overflow reported by Arthur Chan.) zic no longer overflows an int when processing input like ‘Zone Ouch 2147483648:00:00 - LMT’. The int overflow can lead to buffer overflow in adversarial cases. (Thanks to Naveed Khan.) zic now checks for signals more often. Signed-off-by: Ankur Tyagi (cherry picked from commit dda7d55396e0c5258cba58af7e990ab3813bf108) Signed-off-by: Yoann Congal --- meta/recipes-extended/timezone/timezone.inc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-extended/timezone/timezone.inc b/meta/recipes-extended/timezone/timezone.inc index 00bb704e360..ff02416ed3e 100644 --- a/meta/recipes-extended/timezone/timezone.inc +++ b/meta/recipes-extended/timezone/timezone.inc @@ -6,7 +6,7 @@ SECTION = "base" LICENSE = "PD & BSD-3-Clause" LIC_FILES_CHKSUM = "file://LICENSE;md5=c679c9d6b02bc2757b3eaf8f53c43fba" -PV = "2026a" +PV = "2026b" SRC_URI = "http://www.iana.org/time-zones/repository/releases/tzcode${PV}.tar.gz;name=tzcode;subdir=tz \ http://www.iana.org/time-zones/repository/releases/tzdata${PV}.tar.gz;name=tzdata;subdir=tz \ @@ -16,5 +16,5 @@ S = "${UNPACKDIR}/tz" UPSTREAM_CHECK_URI = "http://www.iana.org/time-zones" -SRC_URI[tzcode.sha256sum] = "f80a17a2eddd2b54041f9c98d75b0aa8038b016d7c5de72892a146d9938740e1" -SRC_URI[tzdata.sha256sum] = "77b541725937bb53bd92bd484c0b43bec8545e2d3431ee01f04ef8f2203ba2b7" +SRC_URI[tzcode.sha256sum] = "37e9ed8427f5d3521c22fc58e293cbfb043d70eedf1003870b33f363f61ca344" +SRC_URI[tzdata.sha256sum] = "114543d9f19a6bfeb5bca43686aea173d38755a3db1f2eec112647ae92c6f544" From patchwork Wed May 20 08:20:05 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88494 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1398FCD5BAC for ; Wed, 20 May 2026 08:21:02 +0000 (UTC) Received: from mail-wr1-f47.google.com (mail-wr1-f47.google.com [209.85.221.47]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7373.1779265259205730946 for ; Wed, 20 May 2026 01:20:59 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=uwyYATS8; spf=pass (domain: smile.fr, ip: 209.85.221.47, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f47.google.com with SMTP id ffacd0b85a97d-448528f4e69so3064720f8f.3 for ; Wed, 20 May 2026 01:20:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265257; x=1779870057; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=/4XlJIzQ5ChvhcDMoRDlo67Z6JVWb63GAHO7Dr21kR8=; b=uwyYATS8xpz9dncZ4BmYRqCS574VoGhMdrlE053olRSE9gpUqn3Xthe8xPkMswZeQ5 rJkG47xPTvgQZLR86cckx6gNNqBIhg3CO0/+Nv/6nWqZY/Ft3j9+E6/IRQhOVZJCCFSE q4PiBgOe/SLg+AQSc573uYqqlLBpXaRm00d1I= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265257; x=1779870057; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=/4XlJIzQ5ChvhcDMoRDlo67Z6JVWb63GAHO7Dr21kR8=; b=DVO7UW0/eeNuON6utEa2M5olML9f8zHQU0hxS+SnFjTcb98TIJGxzmqXxRbxURh8FD 2R2GKULPSo28dXC3MrPyemwT8Apx1vW74gtMH4pt324CWnInZdJkSkoUWlakUTdxQXDb phH3RSl5hDrMLYm8iE5bH3tJeTEoYi8tA+FCWVE+RNutxP8rFPCjWYcqcx2q1XVRtdFQ KN2nSUZZARMaKjcV8YFV38CQy9iyqZTduDDgMv/mAZ0U+ODRepMVm3YcBvSZ6IEsg8wz 3ANa50qaS3OCz+I65p32J5ekkDBX7MBzd1rtsWwySmnAWyx7oeoAb+AVPN5eIbk7A4Ls oe/A== X-Gm-Message-State: AOJu0Yw4rvkpzkQX5uYMHqO2W8rFL97m8WxJ5myxlhX6NwMAsiPlw4Dp VW42AhSAQkOqIyL9sCvIyCn7Ky+ld/kReFUFniei9fCXFUJJf8dddRi3BFDKH4hcdtPlU6piTmP GGOyG X-Gm-Gg: Acq92OGITwGP5NhQOGh+hI8Sl8FlG/wuoEpbrxWOHQQiUKP/IRF+Cs0WB09+jU0I3vo pJB0XTL6VBnu4GBxNK7yaChyJRgh5fJm1+XAw5Um9PB4EOeSIBo/6HE9GITpXHKGnK3yiVsFgBd 28FmP6W7aBNqq+P6+eHyOAZhsH6B2MUOBGgNzH8Mk2W+c4vqbzLSuicwsER3ESsXwvTlV/t6Dec +aNclZLVZgolsIGvwsIxbFiMpyZ1Hfr4FXRXcFTU4TRfYl5r2MGS4exi80vW4JjOewjEXmwmnW6 YfFvxiIohVNLrMxE9QfNC3PXZAAp8fbk/wOa/Jf6d5pqwkOp/ttHz7f7eF2mimb6nSOfThDesfw jYUp+kr9XIsDmL7RtR8fqYICcI+0yT+tjYX0TJ+sdYv+CEIKo7nsFEDugFEYgZSbMAJNffyVkv9 wvf7zvXU0ENz10cJNsGesmwD4MDFIIslaP9xqNcSf/sqsT8YLuu+XLOBFw1wEMl8nel+Sjx6lOO 4QZIkFe4ciASNSoBZSoXX5g6VIV X-Received: by 2002:a05:6000:1ace:b0:43d:775b:c9bd with SMTP id ffacd0b85a97d-45e5c58906amr35895794f8f.10.1779265257122; Wed, 20 May 2026 01:20:57 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.20.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:20:56 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 04/28] wireless-regdb: upgrade 2026.02.04 -> 2026.03.18 Date: Wed, 20 May 2026 10:20:05 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237403 From: Ankur Tyagi Signed-off-by: Ankur Tyagi (cherry picked from commit 97a940bfdeaa3f9f4442a6fbb0fabe1ce5eaff69) Signed-off-by: Yoann Congal --- ...ireless-regdb_2026.02.04.bb => wireless-regdb_2026.03.18.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-kernel/wireless-regdb/{wireless-regdb_2026.02.04.bb => wireless-regdb_2026.03.18.bb} (94%) diff --git a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.02.04.bb b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.03.18.bb similarity index 94% rename from meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.02.04.bb rename to meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.03.18.bb index 2f7c8160434..a70e9dd0dae 100644 --- a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.02.04.bb +++ b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.03.18.bb @@ -5,7 +5,7 @@ LICENSE = "ISC" LIC_FILES_CHKSUM = "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c" SRC_URI = "https://www.kernel.org/pub/software/network/${BPN}/${BP}.tar.xz" -SRC_URI[sha256sum] = "0ff48a5cd9e9cfe8e815a24e023734919e9a3b7ad2f039243ad121cf5aabf6c6" +SRC_URI[sha256sum] = "5fc0000475d8c5368ccc5222827c16aef98b1eb6a69c9b5a3e7b7e98528945ac" inherit bin_package allarch From patchwork Wed May 20 08:20:06 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88488 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7F70CCD4F3C for ; Wed, 20 May 2026 08:21:01 +0000 (UTC) Received: from mail-wr1-f52.google.com (mail-wr1-f52.google.com [209.85.221.52]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7276.1779265260219818151 for ; Wed, 20 May 2026 01:21:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=JUSTJ05w; spf=pass (domain: smile.fr, ip: 209.85.221.52, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f52.google.com with SMTP id ffacd0b85a97d-441209fb77eso2776916f8f.1 for ; Wed, 20 May 2026 01:21:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265258; x=1779870058; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=UdDcbjtZW60Wr2ec3qnImoJ8Tf6fQAzlWlAChPrpwPE=; b=JUSTJ05wG1GZSMCSM09cgjyVL5cmQo6Kr1feRMJ0pTMw7tiIkzXRFNB70bhUsvaKFE E2Liky1ammhYTpLiEugUm44j1xq6aCfmBnTLG/BWSoKieFSTtWr1z3XuWfbBkNJRAirQ HZdD/n0I59HyNEyj28bcRpXb2Z925cM2b+Vw8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265258; x=1779870058; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=UdDcbjtZW60Wr2ec3qnImoJ8Tf6fQAzlWlAChPrpwPE=; b=nKmyn3rKTfvgt8F7WQ1OoYAMxAi4sVumjk+j3JrjDS0UOniRO0SDF0KmhSMfafLpVv yzqiuuXthIm00z8bU2aOhx9uDHHZ3BezelqhHw+1SC3rbqhDPDlhvCMrL2RmsOWLCR0V b1zSSRaZWPABsS1KZdvpNYOfpLdV98hLn2UGERtw582ib0wFKN4tESmOKAywmFm9keM4 u9nBAI/Pkwoaq+2C5mHxPmbGWv8ThXEL+hpkqr4PB3CQycDmBkzWVS6ShNdAQ6T1YGuF Ay/BMerSmje8MASDDC00XK64deWuipvEWm2CxnCMOs41tKfhLa5XELOhEFj0YmWNat1n PwlQ== X-Gm-Message-State: AOJu0YwEsyaxD8kXIdgabAQSwPtQwAkEUqj4M3CLZZCxuxfCxeiGFTkH oug0sjHlXMnw/l8qZqGd//EVtXCtkhpdUTtf9+TDiBY51V/y2Pvk4PJKha/dmKI0OOtgPoiOb8q mrCH/ X-Gm-Gg: Acq92OHRd0im7X97fpPj1TufveEy6/D13Y0IrWHB8idDW7P7h/JNvFbKdfRPWasia1n pGRh31lTbcdqrJQ0GOBlsOFyQAxenCVolS+rJlQL79EV8amfscTJeoHGYwj1uKSZUR82zx3QzmJ cwxjm6RVJaq9+T1eoCFNP9QHRUk3X7hKdulIzLedqWDy92NPn+rCYqJmFwwD21A8Fxtku5EtAke 6UpFgqH4M+eswlcSo3pxfsC5RkYzlvQBpFw7pg1gW5C/xfDl/K9JTDMeZb1/Gj6ypmVTukeNbPM kCInplv1aOxw88szxXKlVzoJYu8X/ggcWJwb6Am5gg3s9ifK4/W9Kpm9DWXIQy6hkOMr51LzedY w+GX+Kp3LcjGbONzUUULiZ08IsTjn1SA7O95uvV0PW/vok9i3nxWJlKk2ddy+WDNd0iEUUymPel YfJbrDb/pHpMxJgcyzVcSmyxJz6dGywSaFqCEMtNJfXgTdRXR0hY3LAG5OOloczEwd0fGaY+91r 1QUpMZ1S+BMomh7BoVpCynwYuUh X-Received: by 2002:a05:6000:1624:b0:45e:89e9:348b with SMTP id ffacd0b85a97d-45e89e9354cmr7027874f8f.7.1779265258316; Wed, 20 May 2026 01:20:58 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.20.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:20:57 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 05/28] python3-sbom-cve-check: Update to version 1.3.1 Date: Wed, 20 May 2026 10:20:06 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:01 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237404 From: Benjamin Robin (Schneider Electric) For details on this new release which fixes various bugs, see: https://github.com/bootlin/sbom-cve-check/releases/tag/v1.3.1 Also, update the LICENSE, which is now GPL-2.0-or-later instead of GPL-2.0-only, to be compatible with the licence dependencies. (cherry picked from commit f8bdcebd01a16adb4e5d5a89c6b47c5f0af1f5a4) Signed-off-by: Benjamin Robin (Schneider Electric) Signed-off-by: Yoann Congal --- ...bom-cve-check_1.3.0.bb => python3-sbom-cve-check_1.3.1.bb} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-devtools/sbom-cve-check/{python3-sbom-cve-check_1.3.0.bb => python3-sbom-cve-check_1.3.1.bb} (76%) diff --git a/meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.0.bb b/meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.1.bb similarity index 76% rename from meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.0.bb rename to meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.1.bb index 96fc167ecbc..8120848a667 100644 --- a/meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.0.bb +++ b/meta/recipes-devtools/sbom-cve-check/python3-sbom-cve-check_1.3.1.bb @@ -1,11 +1,11 @@ SUMMARY = "Lightweight SBOM CVE analysis tool" HOMEPAGE = "https://github.com/bootlin/sbom-cve-check" SECTION = "devel/python" -LICENSE = "GPL-2.0-only" +LICENSE = "GPL-2.0-or-later" LIC_FILES_CHKSUM = "file://LICENSE;md5=570a9b3749dd0463a1778803b12a6dce" PYPI_PACKAGE = "sbom_cve_check" -SRC_URI[sha256sum] = "dad6f9df848f6dd7b69922baef0ec187b66ad0847fe0cf62614529e27203e842" +SRC_URI[sha256sum] = "675828b2f02f11620b7a229853a24d09264bf41161be5fbb80a92456f46a14e0" inherit pypi python_hatchling From patchwork Wed May 20 08:20:07 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88491 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6198DCD5BAF for ; Wed, 20 May 2026 08:21:02 +0000 (UTC) Received: from mail-wr1-f44.google.com (mail-wr1-f44.google.com [209.85.221.44]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7277.1779265261245762663 for ; Wed, 20 May 2026 01:21:01 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=0hgIF6Jh; spf=pass (domain: smile.fr, ip: 209.85.221.44, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f44.google.com with SMTP id ffacd0b85a97d-453903ee4adso1635804f8f.3 for ; Wed, 20 May 2026 01:21:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265259; x=1779870059; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=r4QbPNFNlo9az+eFASZc6qC/jQFj97YGYCUZSwuhQxE=; b=0hgIF6JhMUsk2J2rFRogecNj5nfs7uii7w7t5XL8F/lhWkEH175T/CG9er++FuFhaU LsKIkaQgU2FtCGyVrUA/ulqXACAkamPWwQZjy3jjkIggIzbB9s9CbKz64YH7+RvQlCVD CD2G0Fr3jRRMmJpS4wpQiWZzFSWpRnbdDFAfE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265259; x=1779870059; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=r4QbPNFNlo9az+eFASZc6qC/jQFj97YGYCUZSwuhQxE=; b=eiMqP+xyLDSOkbA66foPJvTBsq6yXgztxzCeafagjEHqL1IOmCXxbhfZt8HAKtlDVA fxbvETI6cHtFD1/50iRh0MnQidOZtNHfmsZZ0XcsX133W4uPBeX5LtgmPaHIUx33Jc4/ GV4nszIOFmOH8QeKL4jshj8MdiDYJZ/w+ghGh5lhhFSWVQ3kYSetiXdOLay69B6au9Ny c+WcGxvHxgaFaeoDAXEMh7l8jZ/Q2kCHGXmuZeA0VoUuVWDJpFmIP/Ofx+rI9guw+zk9 jJM1uMR9W2S6gwlhfJdZRGo8/DFfUcGfzaHn7MNlQpZdsosPtuulBZ/62eWz6WoMTV+v GQbg== X-Gm-Message-State: AOJu0YxOVfmio2Izo9krTvFWyb49BXLoCxu/Bgk6XbAARRVJv1eby56c 1juA7vsfAcJeFvfkdF082nVCN0ChhKVcvYheeHZjbPCuNfdymAEIeYMkJ2P24mY3yrrV5JigqlN BKI/2 X-Gm-Gg: Acq92OF6O4Ec+BeKWS+qpzeDUdIX5TBqpV614lkQuE0gAsAziOGQzlXY6O9f0FPebtv P/rEWweLR1SsaKhFa9c3iq3bA6xhuDyjh5vOMFG+iagHri4hcTnqwFDzKDwCkDWIBCZHBKCDhut 5FWk+y2FAzPPm2FOrob0BOHG6E8sVVIvz0fYGGZFWT3d+l9AzrLweTydSeUjR35AgbqT7+C4Ixj yA+RBj5A/pXEABBlSVenpD2K+Fd5PyNamCzHI0S9/JVbRiROnv1XrLdH8doO1wK63o6fC3vGOFp XJMSxcuE3BqCu9x29Bg5EIb4txGSP+YfPNvQPNyEHeLfQJphnE+cLf2cRm3Aq1gt5BxvK913+Aa /WRu7IzcrkrDzIUwTs7Vzfk3eJNLxAa/rfe1V6ms49dG7vWx/REJ42LY9sc6Ko4bg6IHUD2ryYe gCVnNoYTkzAcdFhNZ2FEbv/hPughnsHT5AYOfWyzFl0yyIl4UCTyP+g0PiA7BtSrRsC+Uo89tU5 il0jSSt5611zhktCl386GcMwzm9 X-Received: by 2002:a05:6000:268a:b0:43d:1bf6:927 with SMTP id ffacd0b85a97d-45e5c367482mr36781556f8f.14.1779265259285; Wed, 20 May 2026 01:20:59 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.20.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:20:58 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 06/28] sbom-cve-check-update-cvelist-native: Update source revision Date: Wed, 20 May 2026 10:20:07 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237405 From: Benjamin Robin (Schneider Electric) Update source revision to cve_2026-05-07_1300Z (cherry picked from commit 30b1f91d2a8cb1df5d4a65d2b55a3d26ff76937f) Signed-off-by: Benjamin Robin (Schneider Electric) Signed-off-by: Yoann Congal --- .../sbom-cve-check/sbom-cve-check-update-cvelist-native.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb index 33871221659..3763e7f21f7 100644 --- a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb +++ b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb @@ -6,7 +6,7 @@ HOMEPAGE = "https://github.com/CVEProject/cvelistV5" SRC_URI = "git://github.com/CVEProject/cvelistV5.git;branch=main;protocol=https;destsuffix=" SBOM_CVE_CHECK_DB_NAME = "cvelist" -# 2026-03-19_baseline -SRCREV = "ada54ee3cc8380820aa45e4996910bdc9dcb94e7" +# cve_2026-05-07_1300Z +SRCREV = "dd0e93c75034d0167498174c886a56729edc44de" require sbom-cve-check-update-db.inc From patchwork Wed May 20 08:20:08 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88502 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C5E8DCD5BB1 for ; Wed, 20 May 2026 08:21:12 +0000 (UTC) Received: from mail-wm1-f46.google.com (mail-wm1-f46.google.com [209.85.128.46]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7278.1779265262240810877 for ; Wed, 20 May 2026 01:21:02 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=o6H/q+GJ; spf=pass (domain: smile.fr, ip: 209.85.128.46, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f46.google.com with SMTP id 5b1f17b1804b1-4891e86fabeso60267725e9.1 for ; Wed, 20 May 2026 01:21:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265261; x=1779870061; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=7e3baXU966NXPvqcW/VR37EGm4oDAwNd670im0ikUIY=; b=o6H/q+GJ7gC0q4hipRTO2XUm8NeN1on1fggrJCqXDf0JbVhWBT5RynruCfz/gIOFTs 7SC/sDaiWPCAYk7O6f8dU9bTyh57dCDF1l+X4c83oeEz7+zv1xmijrhIL5AYbLt8mpTY YWIxFAHP6N5La62iW69OcoLZwk66wkMUZyM+Q= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265261; x=1779870061; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=7e3baXU966NXPvqcW/VR37EGm4oDAwNd670im0ikUIY=; b=oUynqXNwae/uiXKpkKeydjwLDGadNoG6+YzMC0obTCIakvfOHQiulJ4JjePEsFvBQ1 gEDDuXDorDYDyeGUu3HYba+NabRtED9mf4Iksfg0/XDuo5Y123uxV/5HcN/aJsI9vxQE zofDQyM6ik1WZpdQ8m9g1RVm/QSZdRGmi4D0JHCNXYQam8BspDOO0i4j/bFo6hUKOrHO rsJKNtX6Enh5MyqA1qM9m8Di04XW7gqP+m4F2m/YY94aNnZhuD0d5b6Xv/GWvfqaalRS jL/glGLa5lDJTVvfO822kLqwAZ82M9fdUx0McqxDdk4THJ9NxoD+UuJyjlS8zHrrzxPS TloQ== X-Gm-Message-State: AOJu0YwVdPZ1g0AlxNkMapDL88gb/JahKP8cLUG69cG6CxuDCoGCDOL7 yDy+CAeS2eCryBZ0DfePrXAY0l/x9rdnnyHuTgOYM4e+q1PM4sWywK8n98u6q9OgtRRbxpJdSE8 bMSg/ X-Gm-Gg: Acq92OF7XsTsM+xkfOBvIAmAmC0Ni90/tMa+/JpS1bF//ji122zMYlI08MSEiYzr9qA XQzTGu9PgmlmUnvbKDNUYW+CH30c2vJli5ESKoOgz0xgQQB6xw61NuS92+b7MfQUIe0xpvIiNuX a0toVIRdnd5xNfyp6nKyTgj/OUxs47v8bUlwI9O8O3F5nu28xwlNXa2OLMutqnNwJFJ6F6k8lnX KjBmIczfr+b7eRgZ9jrxHoEMUq65S54oEiaUTC+AzgdDJ9C85ARBA8JdacbjbRiCU53/utQWXBH iGe6WyO61FHngjEGWx0NQcP4Pw9/e/QojYRXg2GVLDLJgdkKDbRbxskuOHwa0oKFwja5SaiLq7T rNwpbv+BKIvYgXfT4sXBTA5D1nDXjinn4HZbUGGYd7MOYb676va52+4aHMmwRr4ifr6KA/S2Min 0+UbvIqnL4VVnurxmY4OzFP/jIjCVonrF4RONiS5hYNpTAoUDVLka5uJJrn13r6GmzBkoBkjCO7 DiF0KnLNDJywLps2B9xhJCzjsVtg8CumnUNAHES6IK5KttOaw== X-Received: by 2002:a05:600c:3104:b0:48d:35e:82cb with SMTP id 5b1f17b1804b1-48fe651b2a9mr336564775e9.28.1779265260604; Wed, 20 May 2026 01:21:00 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.20.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:00 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 07/28] sbom-cve-check-update-nvd-native: Update source revision Date: Wed, 20 May 2026 10:20:08 +0200 Message-ID: <9d3d22ca591c13a84a9210779d03c0c7cc91d062.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:12 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237406 From: Benjamin Robin (Schneider Electric) Update source revision to v2026.05.07-000006 (cherry picked from commit 3724b93538d3acbec9f48d4c524b51d166071708) Signed-off-by: Benjamin Robin (Schneider Electric) Signed-off-by: Yoann Congal --- .../sbom-cve-check/sbom-cve-check-update-nvd-native.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb index c868ba09c18..26a14e6eb16 100644 --- a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb +++ b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb @@ -6,7 +6,7 @@ HOMEPAGE = "https://github.com/fkie-cad/nvd-json-data-feeds" SRC_URI = "git://github.com/fkie-cad/nvd-json-data-feeds.git;branch=main;protocol=https;destsuffix=" SBOM_CVE_CHECK_DB_NAME = "nvd-fkie" -# v2026.03.19-010002 -SRCREV = "49f8bbe1b0b0884e16bdc37ab68db997085570a7" +# v2026.05.07-000006 +SRCREV = "72d8841c8ad9083ebf6723063f275444ea0d76f9" require sbom-cve-check-update-db.inc From patchwork Wed May 20 08:20:09 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88496 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4C85FCD5BA4 for ; Wed, 20 May 2026 08:21:12 +0000 (UTC) Received: from mail-wm1-f44.google.com (mail-wm1-f44.google.com [209.85.128.44]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7374.1779265263310739611 for ; Wed, 20 May 2026 01:21:03 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=WBiWVjXQ; spf=pass (domain: smile.fr, ip: 209.85.128.44, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f44.google.com with SMTP id 5b1f17b1804b1-48984d29fe3so50431005e9.0 for ; Wed, 20 May 2026 01:21:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265261; x=1779870061; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=owxyeNTpFLoX7jgSo52BHKsuNG2I2KAe8k4y9f6oelE=; b=WBiWVjXQ+ZkhJ4MCMM8gSwnrEjWexgUk+lLKYmVCprWVtVQLQ7HknVTDInCrVWgXX3 UAlqbnm/Xk9VLeBgc/+jzaJIiypFh4u9wJ9KQHoCuUb3HssUTrdTB1daQyWdlMQtL0An 79BvfUR75aulwD8lZe/88yWwjwPdk/5WXoMwM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265261; x=1779870061; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=owxyeNTpFLoX7jgSo52BHKsuNG2I2KAe8k4y9f6oelE=; b=QQoeaA3V3BOH1dBZEVMW8zzX91YI7OovEFZ3EVelbjMwGjfQBV2c4CEYKifQryvHg4 8z9xHK2ekYSPTMw/q19PnB8hegH3Cx1yoruslQ/nfFZ9uQ22QNSYPnknVlIOThEpbdok +aumYdkichwSY0qIt+ArBd1csrspThlQvTsfPoJrBhzw90YKBq9rIEUnOw13582Os0v3 KBqYw8GAz+x6HG1pJ45nYMr7fx3ZXpuucJ9PJx8bAzTnBIpJgbWC3gUeUaR0rer07PEF vh8lMh5DdRtDiaSy2a4EofCIk0lbS28iAu70TbKeQW/0WlUNHxW1mwQYTfDirvjNYN/D oKZA== X-Gm-Message-State: AOJu0Yw2IYrE7o1M2lEdUoJCEUYhKsRNA7Nfug7f+kd2848OsktyBtON /ZXvJdrz6oub/kpOyA4qjVX99PZ4Lfn579SCe2X2KU2U+gRBin8BZIBlfgnUuU4XeNcuLQc4RyS Samk2 X-Gm-Gg: Acq92OH9kWmNxxTr/B86N9W0tgabW8juve1lNwt8YEUdSV9xslI2fnDYtkzAbe4rX4D P1mhReonreK5/tzwAaGZlReEXt4xFthLUFB4oFMh9qcnrr1Z9fsMLSOeeCnAfPbJqe+iBE/zVLt ucn9r+P0l7iOSkiwZddc6SEcTm4l9uPZ68MUu/jbOutOWe9BTYBR8z9zbIfHXZcke7bCTUEy/9q bIjC2opzEKxMzDkBYACpVQdjMxOyP7ASuYh7PmNHsTWXgcFIF7kW4O9KzGkUIn0nz9qMa8EOIFa X5WVmU3Y98kOQsXi0eDoxI8xQjSw5yZ9iWpFYQRyNPpU4Quu7Iq8LLKSxtSh7OAhBmgczNFMP0w Vm4VRTOAtLghxubO1Vg32qz73ijsBMfO+TaBScPrDe2PQAGw9x+Z5eF9yGePQFLycBxxM10Trzm YIuhjQvuB0wC27rq1QoFcydTfXWeZd1o7R6A5gOuaPl1zE9iMVhqPOK/7VPMsbMybma4FOxl34+ QrM/3pf1XGs6S3jXoUbV7FMhlVr X-Received: by 2002:a05:600c:8b01:b0:48a:53ea:13eb with SMTP id 5b1f17b1804b1-48ff3345725mr290800855e9.5.1779265261383; Wed, 20 May 2026 01:21:01 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.00 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:01 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 08/28] busybox: patch CVE-2024-58251 Date: Wed, 20 May 2026 10:20:09 +0200 Message-ID: <8f344d46b96fb16632501749dc39b97aa3e11836.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:12 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237407 From: Peter Marko Pick patch applied by Debian [1]. I did not find any reference on busybox mailing list that this patch was submitted. Submitting patch for someone else would be inappropriate, and busybox is currently known to be very inactive, hence the unwanted Pending Upstream-Status status. Also note that the related busybox bugreport [2] is currently not public, so it is possible that it was submitted there. [1] https://sources.debian.org/patches/busybox/1:1.37.0-10.1/netstat-sanitize-argv0-for-p-CVE-2024-58251.patch/ [2] https://bugs.busybox.net/show_bug.cgi?id=15922 Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie Signed-off-by: Chen Qi (cherry picked from commit 7261144785aa508377c995e52d7e2410a814f00b) Signed-off-by: Yoann Congal --- .../busybox/busybox/CVE-2024-58251.patch | 51 +++++++++++++++++++ meta/recipes-core/busybox/busybox_1.37.0.bb | 1 + 2 files changed, 52 insertions(+) create mode 100644 meta/recipes-core/busybox/busybox/CVE-2024-58251.patch diff --git a/meta/recipes-core/busybox/busybox/CVE-2024-58251.patch b/meta/recipes-core/busybox/busybox/CVE-2024-58251.patch new file mode 100644 index 00000000000..713d345ca83 --- /dev/null +++ b/meta/recipes-core/busybox/busybox/CVE-2024-58251.patch @@ -0,0 +1,51 @@ +From: Valery Ushakov +Date: Thu, 21 Aug 2025 12:31:53 +0000 +Subject: netstat: CVE-2024-58251 - sanitize argv0 for -p +Bug-Debian: https://bugs.debian.org/1104009 + +Signed-off-by: Valery Ushakov + +CVE: CVE-2024-58251 +Upstream-Status: Pending +Signed-off-by: Peter Marko +--- + networking/netstat.c | 7 ++++++- + 1 file changed, 6 insertions(+), 1 deletion(-) + +diff --git a/networking/netstat.c b/networking/netstat.c +index 807800a62..d979f6079 100644 +--- a/networking/netstat.c ++++ b/networking/netstat.c +@@ -41,6 +41,7 @@ + + #include "libbb.h" + #include "inet_common.h" ++#include "unicode.h" + + //usage:#define netstat_trivial_usage + //usage: "[-"IF_ROUTE("r")"al] [-tuwx] [-en"IF_FEATURE_NETSTAT_WIDE("W")IF_FEATURE_NETSTAT_PRG("p")"]" +@@ -314,9 +315,12 @@ static int FAST_FUNC dir_act(struct recursive_state *state, + return FALSE; + cmdline_buf[n] = '\0'; + ++ /* don't write process-controlled argv[0] to the user's terminal as-is */ ++ const char *argv0base = printable_string(bb_basename(cmdline_buf)); ++ + /* go through all files in /proc/PID/fd and check whether they are sockets */ + strcpy(proc_pid_fname + len - (sizeof("cmdline")-1), "fd"); +- pid_slash_progname = concat_path_file(pid, bb_basename(cmdline_buf)); /* "PID/argv0" */ ++ pid_slash_progname = concat_path_file(pid, argv0base); /* "PID/argv0" */ + n = recursive_action(proc_pid_fname, + ACTION_RECURSE | ACTION_QUIET, + add_to_prg_cache_if_socket, +@@ -686,6 +690,7 @@ int netstat_main(int argc UNUSED_PARAM, char **argv) + unsigned opt; + + INIT_G(); ++ init_unicode(); + + /* Option string must match NETSTAT_xxx constants */ + opt = getopt32(argv, NETSTAT_OPTS); +-- +2.34.1 + diff --git a/meta/recipes-core/busybox/busybox_1.37.0.bb b/meta/recipes-core/busybox/busybox_1.37.0.bb index 61ff602be6f..47908996843 100644 --- a/meta/recipes-core/busybox/busybox_1.37.0.bb +++ b/meta/recipes-core/busybox/busybox_1.37.0.bb @@ -63,6 +63,7 @@ SRC_URI = "https://busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \ file://0001-busybox-fix-printf-ptest-failure-with-glibc-2.43.patch \ file://0001-tar-strip-unsafe-hardlink-components-GNU-tar-does-th.patch \ file://0002-tar-only-strip-unsafe-components-from-hardlinks-not-.patch \ + file://CVE-2024-58251.patch \ " SRC_URI:append:libc-musl = " file://musl.cfg" SRC_URI:append:x86-64 = " file://sha_accel.cfg" From patchwork Wed May 20 08:20:10 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88500 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A5B08CD5BB0 for ; Wed, 20 May 2026 08:21:12 +0000 (UTC) Received: from mail-wm1-f54.google.com (mail-wm1-f54.google.com [209.85.128.54]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7376.1779265264550334687 for ; Wed, 20 May 2026 01:21:04 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=ek0iWVcc; spf=pass (domain: smile.fr, ip: 209.85.128.54, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f54.google.com with SMTP id 5b1f17b1804b1-48d146705b4so50172395e9.3 for ; Wed, 20 May 2026 01:21:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265262; x=1779870062; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Ia8IB6RhZk851K4c3evKW/zVI9exDn8lRffxNwGdUmM=; b=ek0iWVccZncPYuDx/zMpBug78R7sBb11QHTJhk/wutkgfV5h5e69/jZO1sWoCFHeTf j06kUg1gBmhUwIvc+cOkkelF29Xe4PtwqFfcekIbng/8o/tmxY/uELG5MCPcDuhn5xGv jjRg/y13XG6A8BoZdkr2YozoAH1Ku0hq7o0vM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265262; x=1779870062; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=Ia8IB6RhZk851K4c3evKW/zVI9exDn8lRffxNwGdUmM=; b=d3zFxiAW7sUOgqG7/nGCs+ksBJ+KwPLDrQKm7nDsIU3W8XISsYHcMlXRsdamBglIhW NyeqLuoCWGT2mn46aPuqPRJpvIbsEfXzan24Hvwyg14rwApKmb7cmu3/9cny4ud5k0r2 CNBcP8oDqUhl7A7p1fI2QwD6fxaFiSvibLSiOe4/RoDyTb4kP0z4Q5hfnRkTQVtnCmiZ zp3HE9pOYCQpavx+z05VDMHCEGDaJ/Q7cAlfc9AhUrJ7B7ff125SfiYQiw32c1acpn1N +D7s+2nxY0GddXyGKO5aAbTgkf7OFjWj6VyiFD83LYQrW54fEZ4Aax1RYUJT3gPBZiHT cGJg== X-Gm-Message-State: AOJu0YyT2SCfnvGNI349NhhDkkmVpFfKTlpwvX2OfhJLwuvDFtKKQCZr +OYKJoS4cuDqDm14qRrmJ/cYpdqTSBOaP7bWImqpLCPUj/bN/V0ZmTw2R3QYbOznjhaDgFRaZQZ quS5+ X-Gm-Gg: Acq92OEHwDgRCcRBU6QArgIfCxAjQvfFeJWwFkMFy/+Rdfb+fWP1w/wnfCTO30Vpb4J 0rQqd3MQZ7ZHIu49O4srYDUP7sC8XOhFueHnq+CsL36oDAQfbofsqxeGibiDrxCdJME0FoCDt5U vwdLUHSokqjA+DlCdGukg7bt8ihiq5bmjCHLN8Rjn4N6AC463XnosVIQC5LcfQrRPukGZEQxBOi 0dFPJt6JBlCfBpGcv/DNlFgyRpXVtx0YEoqLZ6Uk7x+R59QaT/I5Y/1zJSaORix3Cpsx6CojTXF pId8PFPvQtrZhhnQcWKCYbmbjFZKCvrD7O6navz5QnGNAWEud2IAg42irSRs2LwkSftWXfm3fEY mfhy1rAAHVhk4V0ujAKTdKtmpyUYKL18/Zk8NVmHhrZPNbV0u9XZi7o/8dC7Jyv/VasDhY0uMOT mAwm9pCradD7pjrsCqMKSAnrUO3tTGvrsuIosEw/1KmRSWI5NK388/KCk4zAHs/bpSDp0gmn+rU FZ5FFTIAM73kUixFlELZqZ52ftJ X-Received: by 2002:a05:600d:b:b0:48e:8741:fd42 with SMTP id 5b1f17b1804b1-48fe60ee64amr270380325e9.12.1779265262346; Wed, 20 May 2026 01:21:02 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:01 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 09/28] busybox: fix CVE-2026-29004 Date: Wed, 20 May 2026 10:20:10 +0200 Message-ID: <1de69f93fd9e3473119d65fb4ea72a308fb0f92f.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:12 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237408 From: Chen Qi Backport two patches to fix CVE-2026-29004. Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-29004 Signed-off-by: Chen Qi Signed-off-by: Yoann Congal --- .../busybox/busybox/CVE-2026-29004-01.patch | 42 +++++++++++++++++ .../busybox/busybox/CVE-2026-29004-02.patch | 47 +++++++++++++++++++ meta/recipes-core/busybox/busybox_1.37.0.bb | 2 + 3 files changed, 91 insertions(+) create mode 100644 meta/recipes-core/busybox/busybox/CVE-2026-29004-01.patch create mode 100644 meta/recipes-core/busybox/busybox/CVE-2026-29004-02.patch diff --git a/meta/recipes-core/busybox/busybox/CVE-2026-29004-01.patch b/meta/recipes-core/busybox/busybox/CVE-2026-29004-01.patch new file mode 100644 index 00000000000..8ce4858adc0 --- /dev/null +++ b/meta/recipes-core/busybox/busybox/CVE-2026-29004-01.patch @@ -0,0 +1,42 @@ +From d9a718cc17535c31d38f31fccb904a30e823166d Mon Sep 17 00:00:00 2001 +From: Denys Vlasenko +Date: Thu, 12 Mar 2026 07:25:38 +0100 +Subject: [PATCH 1/2] udhcpc6: fix buffer overflow + +Signed-off-by: Denys Vlasenko + +CVE: CVE-2026-29004 + +Upstream-Status: Backport [https://github.com/vda-linux/busybox_mirror/commit/42202bfb1e6ac51fa995beda8be4d7b654aeee2a] + +Signed-off-by: Chen Qi +--- + networking/udhcp/d6_dhcpc.c | 6 +++--- + 1 file changed, 3 insertions(+), 3 deletions(-) + +diff --git a/networking/udhcp/d6_dhcpc.c b/networking/udhcp/d6_dhcpc.c +index 79cef1999..d13b05829 100644 +--- a/networking/udhcp/d6_dhcpc.c ++++ b/networking/udhcp/d6_dhcpc.c +@@ -351,15 +351,15 @@ static void option_to_env(const uint8_t *option, const uint8_t *option_end) + addrs = option[3] >> 4; + + /* Setup environment variable */ +- *new_env() = dlist = xmalloc(4 + addrs * 40 - 1); ++ *new_env() = dlist = xmalloc(4 + addrs * 40 + 1); + dlist = stpcpy(dlist, "dns="); + option_offset = 0; + +- while (addrs--) { ++ while (addrs-- != 0) { + sprint_nip6(dlist, option + 4 + option_offset); + dlist += 39; + option_offset += 16; +- if (addrs) ++ if (addrs != 0) + *dlist++ = ' '; + } + +-- +2.34.1 + diff --git a/meta/recipes-core/busybox/busybox/CVE-2026-29004-02.patch b/meta/recipes-core/busybox/busybox/CVE-2026-29004-02.patch new file mode 100644 index 00000000000..734f0bbbdba --- /dev/null +++ b/meta/recipes-core/busybox/busybox/CVE-2026-29004-02.patch @@ -0,0 +1,47 @@ +From 1e14c5c577a7bd46f42315e9bc445419770041a7 Mon Sep 17 00:00:00 2001 +From: Denys Vlasenko +Date: Thu, 12 Mar 2026 13:23:48 +0100 +Subject: [PATCH 2/2] udhcpc6: check the size of D6_OPT_IAPREFIX option + +function old new delta +option_to_env 694 711 +17 + +Signed-off-by: Denys Vlasenko + +CVE: CVE-2026-29004 + +Upstream-Status: Backport [https://github.com/vda-linux/busybox_mirror/commit/d368f3f7836d1c2484c8f839316e5c93e76d4409] + +Signed-off-by: Chen Qi +--- + networking/udhcp/d6_dhcpc.c | 7 +++++-- + 1 file changed, 5 insertions(+), 2 deletions(-) + +diff --git a/networking/udhcp/d6_dhcpc.c b/networking/udhcp/d6_dhcpc.c +index d13b05829..1851cee2a 100644 +--- a/networking/udhcp/d6_dhcpc.c ++++ b/networking/udhcp/d6_dhcpc.c +@@ -287,8 +287,8 @@ static void option_to_env(const uint8_t *option, const uint8_t *option_end) + * | valid-lifetime | + * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + */ +- /* Make sure payload contains an address */ +- if (option[3] < 24) ++ /* Make sure payload exists */ ++ if (option[3] < (16 + 4 + 4)) + break; + + sprint_nip6(ipv6str, option + 4); +@@ -332,6 +332,9 @@ static void option_to_env(const uint8_t *option, const uint8_t *option_end) + * | | + * +-+-+-+-+-+-+-+-+ + */ ++ /* Make sure payload exists */ ++ if (option[3] < (4 + 4 + 1 + 16)) ++ break; + move_from_unaligned32(v32, option + 4 + 4); + v32 = ntohl(v32); + *new_env() = xasprintf("ipv6prefix_lease=%u", (unsigned)v32); +-- +2.34.1 + diff --git a/meta/recipes-core/busybox/busybox_1.37.0.bb b/meta/recipes-core/busybox/busybox_1.37.0.bb index 47908996843..a6abfa25984 100644 --- a/meta/recipes-core/busybox/busybox_1.37.0.bb +++ b/meta/recipes-core/busybox/busybox_1.37.0.bb @@ -64,6 +64,8 @@ SRC_URI = "https://busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \ file://0001-tar-strip-unsafe-hardlink-components-GNU-tar-does-th.patch \ file://0002-tar-only-strip-unsafe-components-from-hardlinks-not-.patch \ file://CVE-2024-58251.patch \ + file://CVE-2026-29004-01.patch \ + file://CVE-2026-29004-02.patch \ " SRC_URI:append:libc-musl = " file://musl.cfg" SRC_URI:append:x86-64 = " file://sha_accel.cfg" From patchwork Wed May 20 08:20:11 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88503 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BFCE7CD5BAF for ; Wed, 20 May 2026 08:21:12 +0000 (UTC) Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7377.1779265264740600761 for ; Wed, 20 May 2026 01:21:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=LTU5sbDY; spf=pass (domain: smile.fr, ip: 209.85.221.46, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f46.google.com with SMTP id ffacd0b85a97d-44509921fbcso2817262f8f.3 for ; Wed, 20 May 2026 01:21:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265263; x=1779870063; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=u6hu2wjuqy56zgLH39N9IVie1m69ECjfc/u7p/LkM8o=; b=LTU5sbDY7zvC+SuKipLeBRLp/rJwyX54whtf9G2WQ19pYc6KHQX/kk4+2jekBADnn/ Hk6VouUimq1ihFN8gkEO1LrVaDOlEDEnx4W5NDw3kk9syMGMKWLuU8YqtrwJQe9R1rPR fTQ/f3ZEkUGU1l95cvrSu0rQn3MjYyyp6HIug= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265263; x=1779870063; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=u6hu2wjuqy56zgLH39N9IVie1m69ECjfc/u7p/LkM8o=; b=rTfjrCYZEissNvk7iET+mPfXoDyIXN7lsc4Aa1rrFHhtk61YVxlYP678jzLnlX2Zfp FRxCh7yScRxG10c8tcyil8er1b1UYD2tE6VT5cfxdNwE+kaZ/IAqNRIFhNlHdWlR5xUe ebcqAmAfX/F47mw2uiCBme5gRmO1PsXNpBIz6MfyD3oAEDEJ5eZArX+NIZ56F1SEEgb0 Ryf8JtdQkV7o7oGBZ0vS9wxVuTpReQAwW45rxH7pEGZ4Hg2rQ4fhpxKdSpLtbD05U6CT 6947XCT7nWxnKD5tk1LlWkalMRUZewSgzikOUKXw+XC85zIModJMk87xL6aAZrwhi2QD 1S/A== X-Gm-Message-State: AOJu0YxQujgnzP2f2puek5RDf6JoBWAXPrVnkYYGA73M6Me/WBdo0990 7yuhQ7ZIpgH6La5quLXRldk/oQjHff11WVZnn0mYAC1AF8UZRTdzte/Q5byLSdF6g/AQJT76TnY IZ4Pm X-Gm-Gg: Acq92OE8yOQ8zGFNOYPc1+Wfs+N4mQ6K1eUqN20H51068bhDShpePUbUIVNABDZkFYh TjqACwUJQAwC8iOvKAeKr41ORcUV/S6BO691dHSXkIYCaR/awFDWFQ0dswsGj5OZxgF8R6apR8V kGqWTS8U7VasLL10V2aenEtoDFIGrX2lgdDmTETOULze3SFGKGK3JqVJedbybmyhXer8+lohA1x Qimo47vDcbB07MKLKmuaV4JClDQwGt+Mv8/9nr/qZ+Vjti3I8bz/xsdR7FVEIecTPH44z7PYyio 56CX8WxnOze7dVzmLcpvdhXe40FN5rW7XzSwLbGZxpVE14AzL0nW+C35+n/2dXIUzBHd6gCJqqv 65AqZjiNJ/Nxityn/6aGXoI0fRDNIggRD7ZI2g1h4Vj5PYspNedx8eivRXWw5NYclAaIaU47lLX qcJx/+ImQF8n91PdpxIW5ai5Fpfe14n0G3piJ632X1LR4tFiTJkaTDwX7GIBLW3nOa+3lag/Lh6 iad1nlxZ7AbWH/6Jc0rJxLZ8yVz6A80Jy5eCEo= X-Received: by 2002:a05:6000:26c4:b0:43e:a69b:d810 with SMTP id ffacd0b85a97d-45e5c5e6096mr38322343f8f.38.1779265263160; Wed, 20 May 2026 01:21:03 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.02 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:02 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 10/28] b4-config: add send-prefixes for wrynose Date: Wed, 20 May 2026 10:20:11 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:12 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237409 From: Yoann Congal That might help new users send correct first stable patches. Cc: Quentin Schulz Signed-off-by: Yoann Congal --- .b4-config | 1 + 1 file changed, 1 insertion(+) diff --git a/.b4-config b/.b4-config index 41094218531..cb3022dcce7 100644 --- a/.b4-config +++ b/.b4-config @@ -1,3 +1,4 @@ [b4] send-series-to = openembedded-core@lists.openembedded.org prep-pre-flight-checks = disable-needs-auto-to-cc, disable-needs-checking + send-prefixes = wrynose From patchwork Wed May 20 08:20:12 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88504 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D1C9ECD5BB3 for ; Wed, 20 May 2026 08:21:12 +0000 (UTC) Received: from mail-wm1-f53.google.com (mail-wm1-f53.google.com [209.85.128.53]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7281.1779265266020113921 for ; Wed, 20 May 2026 01:21:06 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=yQKHUQMp; spf=pass (domain: smile.fr, ip: 209.85.128.53, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f53.google.com with SMTP id 5b1f17b1804b1-48d146705b4so50172675e9.3 for ; Wed, 20 May 2026 01:21:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265264; x=1779870064; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=oKAibZaJIyPC5sMXiaobr2pZnJFF43Hci6ox8FMVN7s=; b=yQKHUQMpRd5M0QMBqE8xdRObix1pZBJoGqdGjrGeE/2qvgZYfH5U6PELs1vsxHf12U emFn5CTarL2X9y7f+tpDGtcRtY6tH0AVuRyJnRqwkBV1Gk2TGnbCQPVU7JrB4trenBBy Z3OzP7e0XxFj9xvbOKcoCTw9vjpMsvnoC+J90= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265264; x=1779870064; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=oKAibZaJIyPC5sMXiaobr2pZnJFF43Hci6ox8FMVN7s=; b=b4U0X1xFBqDvc5pz3ikjyzKGFmEc+Ez60RTUQ4jvn3AdtCors8zTzb3knly0BnehhC FCT5w1McHUIyVDrG8JrT77H6ngruK5BBm5dmXNVpeFbchiAZIdvpW19U4NyakT3yfm5V 8om7yYCHyIBgROpm0pK/bVrnNSa16irDndILi9ygg9+cfadAjN2fji+0cmeamKG6h0h9 TakFNV9BUXShC5d9QQYuiPh+6S8YAxZDj3+Q1QramY7nVXTCsjIQZBz8vDU7dfgLjeJi inei2AeMQ8SKluXGDQ/EoQqvm2k3fZikq3BcNXLRk3cdSty6rimlqvyTVW0/nXCvbGRR ub3w== X-Gm-Message-State: AOJu0Yyse/kIGN2ouogkFQGN7ycPgr1ayLAf6Y8DAnnOV624Y9mVo7K/ NUjHaRqcMIhzYQ1362lOQQGFIdnoNS9gqLh3VDqMQ/WZdsCFHsKbuCKo00ElgVQgbs0qqboVFVv OlLuu X-Gm-Gg: Acq92OH4ZWB0a1d844+YspuTShyj4Xbl6joUZ9P7aIfvWzpwV523HlGMlPTKHTZV5xv 3hgiZAxCfOiurv5vW3e4H2bva8qTEsJXIBiwWe5+Z2w0qH1opEwsBOkVnaYg0uY7/h4Vh04+FA1 LyMfs8X4BkSLUSpw/76B+/gNSB4q8W3DbKWfMkKL5AZx6r3gvW4Qs9fxM6YY2kPO7ELW7Irwa3f cT4IwxYWkt6Nl/OClV/q8JhA/tgNzCq20BgAeo1vQxp9gRn+F8X7EyXAUY1L0lgO0AYNzgle/RJ QXt9TJaL47Bp3S7xeuffpdm8MQuXsWCArrUiwsmAKWxbHw/HHfZSsIeW6RKuWXC1bPDm2jiocfE pSvzT/IjCLz9Iw6TqS7awJDbYGGZXGy+50oTEJbpXrg2bS9+CI1ttpEdXtNo67aWKdnayOfoZP3 AvlDrYgwcxkZW1tM814ViC2y6IWDBBxTw2Y460waH4yMbBSfxe6cC/Fdp8fpbjkWCm36H8l7VbQ Uve4kKOhXy3oM9gGSWW6+VMC/gg X-Received: by 2002:a05:600c:8184:b0:48f:d1b8:9aa5 with SMTP id 5b1f17b1804b1-48fe60ecd7dmr347858565e9.8.1779265264042; Wed, 20 May 2026 01:21:04 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:03 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 11/28] libsoup: set status for CVE-2026-2369 Date: Wed, 20 May 2026 10:20:12 +0200 Message-ID: <89d30abf282d593766f4e8362fc595a73488bbc6.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:12 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237410 From: Peter Marko Per [1] this is fixed by commit in version 3.6.6. It is RedHat version-less CVE. [1] https://security-tracker.debian.org/tracker/CVE-2026-2369 Signed-off-by: Peter Marko Signed-off-by: Richard Purdie (cherry picked from commit 14d6ba9a0f4a2813c1dd7554e4eddf93bd2f2b55) Signed-off-by: Yoann Congal --- meta/recipes-support/libsoup/libsoup_3.6.6.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-support/libsoup/libsoup_3.6.6.bb b/meta/recipes-support/libsoup/libsoup_3.6.6.bb index b36976a2be4..792cb26e930 100644 --- a/meta/recipes-support/libsoup/libsoup_3.6.6.bb +++ b/meta/recipes-support/libsoup/libsoup_3.6.6.bb @@ -63,5 +63,6 @@ BBCLASSEXTEND = "native nativesdk" CVE_STATUS[CVE-2026-1467] = "fixed-version: fixed in 3.6.6" CVE_STATUS[CVE-2026-1536] = "fixed-version: fixed in 3.6.6" CVE_STATUS[CVE-2026-1801] = "fixed-version: fixed in 3.6.6" +CVE_STATUS[CVE-2026-2369] = "fixed-version: fixed in 3.6.6" CVE_STATUS[CVE-2026-2436] = "fixed-version: fixed in 3.6.6" CVE_STATUS[CVE-2026-2443] = "fixed-version: fixed in 3.6.6" From patchwork Wed May 20 08:20:13 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88501 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 98B0CCD5BAE for ; Wed, 20 May 2026 08:21:12 +0000 (UTC) Received: from mail-wr1-f54.google.com (mail-wr1-f54.google.com [209.85.221.54]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7379.1779265267659396509 for ; Wed, 20 May 2026 01:21:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=zSyRzb9z; spf=pass (domain: smile.fr, ip: 209.85.221.54, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f54.google.com with SMTP id ffacd0b85a97d-44ccbd3290aso4253224f8f.2 for ; Wed, 20 May 2026 01:21:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265266; x=1779870066; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Bhh3wYuHy0dml8Kp9xevSY22vaxc7QO8G5S5+Co4g2Q=; b=zSyRzb9zKI2oqJq2NVLpzVn+TL9gNMyqlFdIAg3pFMDkyauYi9wDxKNX3ov/c42jIR Ng68uii38nPZVQ7NZUvCmIWWpFAwbrZ0y2nBdMDXljwXv10XZSp8erbsccGlI1RrWxvZ 3QWXvSz8rgEw8dsUY8LN0Pd7m2InnMgKmlKVQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265266; x=1779870066; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=Bhh3wYuHy0dml8Kp9xevSY22vaxc7QO8G5S5+Co4g2Q=; b=ac57PXSbhKqjyfGWZzLS4RlgCN/T5c9tAndhCEddAZiIjKRWK/1V96Vw7JKDfXrhdk iVQwlxVtKSwqw9K/0G1O/fQjAB2Zf8bnkWUUUj0KLumKvVfmr+O3yM3G0EnVsYth1gw/ bG9BhnldO2GqeBiZrUY82DdtfO0YVxgCBiqjutHuOFrDyqRfGL3YA33NEVdA01ySKrWq q+YnCCiTRblKPgZXbc9EVcy0eq642+0sXtUtXgcFR6Bvx235M5p8XKyxeg3CyDJ7pEYl XBrUpAH+20E4IzIHfdiAXIa8ZbHqlVtnzkCU4mZ2ZwgGNLUdX30A7IMdV0oimI7x7Bib TLcw== X-Gm-Message-State: AOJu0Yz7uwQ3mMyGBEdaIwejDCjOPDpppmUP8UNhoRQjn44JM+M6DfCM T0cxoLjG4HcsQ3t1Jc37k/leV40suA0Ku+pQeJGGk8Wsvfq/I7y5TS9oTxBKFlr7Kq7DI9DrdwX CLG54 X-Gm-Gg: Acq92OHTXS+9Pzq2rYJIcUaRkH6KPwJTi5SojLZm0yZSRvbkRlEAV0LqUBM0xdgXfPc EOAj6byjF8Z2hQ61aQXLa34s567svjo6+VMJ3t3YXDsuPparejqnT3cn1c6c99I9evLvCApVJRh Vq3k/iTgwpT9GCWyjPd2o7U0NBApUfsS3cSpcYANjXPq8QI2eCaHMwEuG3ML1BVGTutSraTNDce 7LeDlCWALEyR9GaPF3ljzuFfR68KOLYa/dS1U0epflm91L8jMNiwTq1QmUyIdOexHN2h1OsDgyT XTl8C1IUQom5r95pdr9MbP/ybwWLtyv8222Hzc1auHfscxSBK0ZV+8hH0cV7vjpmOVL/ff+6dbr OwptbTe5yn2c/ZHnj/KQ3zb3wy6udJd4JYhsxTEZALU/1aCf43XCZXhB9WvZN3GvHlgLrPXGuMO GhnendWrKGdv4Dey6DJiErSXz26Q3QJM2TwA82no/b20RHFc3QjGX1x52z4Eg29J+zrTm5F+pPt gHMlha902KQXCvqvOheuSprOrSuFFs3gT9GbhI= X-Received: by 2002:a05:6000:25c4:b0:449:e8c0:fd58 with SMTP id ffacd0b85a97d-45e5c58d95dmr36900272f8f.27.1779265265784; Wed, 20 May 2026 01:21:05 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:05 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 12/28] tiff: patch CVE-2026-4775 Date: Wed, 20 May 2026 10:20:13 +0200 Message-ID: <5a0d5350f62c1267995f736d9a90b9951a3718da.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:12 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237411 From: Peter Marko Pick patch per [1]. [1] https://security-tracker.debian.org/tracker/CVE-2026-4775 Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 091df084505273f5b93595b84eb30e52f4208ff3) Signed-off-by: Yoann Congal --- .../libtiff/tiff/CVE-2026-4775.patch | 55 +++++++++++++++++++ meta/recipes-multimedia/libtiff/tiff_4.7.1.bb | 1 + 2 files changed, 56 insertions(+) create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2026-4775.patch diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2026-4775.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2026-4775.patch new file mode 100644 index 00000000000..1f3c026b281 --- /dev/null +++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2026-4775.patch @@ -0,0 +1,55 @@ +From 782a11d6b5b61c6dc21e714950a4af5bf89f023c Mon Sep 17 00:00:00 2001 +From: Even Rouault +Date: Sun, 22 Feb 2026 23:32:47 +0100 +Subject: [PATCH] TIFFReadRGBAImage(): prevent integer overflow and later heap + overflow on images with huge width in YCbCr tile decoding functions + +Fixes https://gitlab.com/libtiff/libtiff/-/issues/787 + +CVE: CVE-2026-4775 +Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/782a11d6b5b61c6dc21e714950a4af5bf89f023c] +Signed-off-by: Peter Marko +--- + libtiff/tif_getimage.c | 8 ++++---- + 1 file changed, 4 insertions(+), 4 deletions(-) + +diff --git a/libtiff/tif_getimage.c b/libtiff/tif_getimage.c +index 4543ddda..fa82d091 100644 +--- a/libtiff/tif_getimage.c ++++ b/libtiff/tif_getimage.c +@@ -2216,7 +2216,7 @@ DECLAREContigPutFunc(putcontig8bitYCbCr44tile) + uint32_t *cp1 = cp + w + toskew; + uint32_t *cp2 = cp1 + w + toskew; + uint32_t *cp3 = cp2 + w + toskew; +- int32_t incr = 3 * w + 4 * toskew; ++ const tmsize_t incr = 3 * (tmsize_t)w + 4 * (tmsize_t)toskew; + + (void)y; + /* adjust fromskew */ +@@ -2356,7 +2356,7 @@ DECLAREContigPutFunc(putcontig8bitYCbCr44tile) + DECLAREContigPutFunc(putcontig8bitYCbCr42tile) + { + uint32_t *cp1 = cp + w + toskew; +- int32_t incr = 2 * toskew + w; ++ const tmsize_t incr = 2 * (tmsize_t)toskew + w; + + (void)y; + fromskew = (fromskew / 4) * (4 * 2 + 2); +@@ -2512,7 +2512,7 @@ DECLAREContigPutFunc(putcontig8bitYCbCr41tile) + DECLAREContigPutFunc(putcontig8bitYCbCr22tile) + { + uint32_t *cp2; +- int32_t incr = 2 * toskew + w; ++ const tmsize_t incr = 2 * (tmsize_t)toskew + w; + (void)y; + fromskew = (fromskew / 2) * (2 * 2 + 2); + cp2 = cp + w + toskew; +@@ -2615,7 +2615,7 @@ DECLAREContigPutFunc(putcontig8bitYCbCr21tile) + DECLAREContigPutFunc(putcontig8bitYCbCr12tile) + { + uint32_t *cp2; +- int32_t incr = 2 * toskew + w; ++ const tmsize_t incr = 2 * (tmsize_t)toskew + w; + (void)y; + fromskew = (fromskew / 1) * (1 * 2 + 2); + cp2 = cp + w + toskew; diff --git a/meta/recipes-multimedia/libtiff/tiff_4.7.1.bb b/meta/recipes-multimedia/libtiff/tiff_4.7.1.bb index 0d4b3a4abd3..750565e11c1 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.7.1.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.7.1.bb @@ -9,6 +9,7 @@ LIC_FILES_CHKSUM = "file://LICENSE.md;md5=4ab490c3088a0acff254eb2f8c577547" CVE_PRODUCT = "libtiff" SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \ + file://CVE-2026-4775.patch \ " SRC_URI[sha256sum] = "f698d94f3103da8ca7438d84e0344e453fe0ba3b7486e04c5bf7a9a3fabe9b69" From patchwork Wed May 20 08:20:14 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88499 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 65494CD5BAB for ; Wed, 20 May 2026 08:21:12 +0000 (UTC) Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7282.1779265268820972790 for ; Wed, 20 May 2026 01:21:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=tL+Cdl4y; spf=pass (domain: smile.fr, ip: 209.85.221.46, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f46.google.com with SMTP id ffacd0b85a97d-459bf19e87bso2695390f8f.1 for ; Wed, 20 May 2026 01:21:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265267; x=1779870067; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=W5GDhobT8B/EDc4mPlLe1IN5iyLyz/EuGPsSCPb8xFA=; b=tL+Cdl4yEln3EyyRdEufuWdIZK0B8OPBO1ZabXv2lsiZylOvWj+/RBycxrMD98GUAH Rk+Tbf6i2JYrKx4+leB3kR3fDO2XbIHKRYFJTOoZpvheUBRY/3mbuXurtGZ5mQM/RTev Qzy3QNZH5B+m3//3DjRvwBh5jYz1LJEdlRrOM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265267; x=1779870067; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=W5GDhobT8B/EDc4mPlLe1IN5iyLyz/EuGPsSCPb8xFA=; b=o5mKziu+jGRXlsUd3atrQGCAQwYqQB8N5pqWsD6kVWilK4wJ6M2hPikNF4d6IUYpn8 17Na/kV/9OyLYkwcHz7q57r/9eC/R2R2TCCIRNJ+NfDj4CQP9anzO6VpsWmeeniXn+De k2QIEdbRyRk4ZR5tYcwL0o7aWqAIZ/C3A3szIfGqXPxNNvXjFpNo5xtXhB/R4CRxqE/6 krb1LubN5B1Sfi8UPg/mabTiIMf2qb6hmN3zi89vKC/R36ls9CsrA6RDIqdGy4uuOBoK 9vd7gI6fzOnzsLitdu59hnF93K6hkKNEKLSnbsvwkdy4vDGMMiURPhqiHN2yFflFoXjD Rnyw== X-Gm-Message-State: AOJu0YycMF4hmAG0Jt8WyzbIX8NEMWUhQZT+PXyS72PtZm1/a+UON1o4 9zf7uPhQD0dPEeY0hQxklzp3L06vvFqEqh2VGL+mOuEdXPDPqqpd+Dk5QvRQuvpxM/eo57IBfQG letVy X-Gm-Gg: Acq92OH8iiFhAVm6nPfP9M/TnGRJJKOllhNupv8oq5Pv1WlfBFJnqOknhqRYEoJ7W0/ 2onMdQBSDCyM12sj0H4knhYHCqcHQ2Y2rXTWIB7MBlPx+iwT7GdGTTGWTvyywyZvO6uaL5/7/8u q1uEjChWlRE9745kkU/KtvXVnf0hkcGYR7aqBd3ZrV53mkWaQA9RzQ5IBPJepftFCrcD+LO/DSP FQibqzGiYRqeLp1wc+mcsxAslQgn8fahkfoqOEVo7UHbBOjAPKOeeBHeHHwHLSPD58VZ3X/DZLO wbkc6lea1XKqfumntMCJIeDcsFR8AcqOr+aHnCN0DxCNZpGNWrH0rl944O1QTX1CswMZMZwajVl juVzzs1EKBMwg+/AIzQi6Rn1KVHvOvtydDy0AS2chxbzb8buyDvGglCY4u8AGY+J4V3p0o+5zhx ILEPlJCHNdYYAZFPEBfPwjJugGiydhlHcl66n7ZXN7ak5b8BXkHkBwz+ju76KxsvJ8W5ieYeRPe 5YHC/+QRDDQnuxRx/BP8dxDWRR1 X-Received: by 2002:a05:6000:1086:b0:45e:653a:40df with SMTP id ffacd0b85a97d-45e653a413bmr24940741f8f.41.1779265266895; Wed, 20 May 2026 01:21:06 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:06 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 13/28] libssh2: patch CVE-2026-7598 Date: Wed, 20 May 2026 10:20:14 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:12 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237412 From: Peter Marko Pick patch mentioned in both NVD and Debian report. Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 8bc37ca4fd0ad000a85ba738e55c48bff0efaf9f) Signed-off-by: Yoann Congal --- .../libssh2/libssh2/CVE-2026-7598.patch | 56 +++++++++++++++++++ .../recipes-support/libssh2/libssh2_1.11.1.bb | 1 + 2 files changed, 57 insertions(+) create mode 100644 meta/recipes-support/libssh2/libssh2/CVE-2026-7598.patch diff --git a/meta/recipes-support/libssh2/libssh2/CVE-2026-7598.patch b/meta/recipes-support/libssh2/libssh2/CVE-2026-7598.patch new file mode 100644 index 00000000000..314e6af3709 --- /dev/null +++ b/meta/recipes-support/libssh2/libssh2/CVE-2026-7598.patch @@ -0,0 +1,56 @@ +From 256d04b60d80bf1190e96b0ad1e91b2174d744b1 Mon Sep 17 00:00:00 2001 +From: Will Cosgrove +Date: Mon, 13 Apr 2026 11:18:25 -0700 +Subject: [PATCH] userauth.c: username_len bounds checking (#1858) + +Return errors when username_len will exceed bounds, fix existing bounds +check. + +Credit: +[dapickle](https://github.com/dapickle) + +CVE: CVE-2026-7598 +Upstream-Status: Backport [https://github.com/libssh2/libssh2/commit/256d04b60d80bf1190e96b0ad1e91b2174d744b1] +Signed-off-by: Peter Marko +--- + src/userauth.c | 13 ++++++++++++- + 1 file changed, 12 insertions(+), 1 deletion(-) + +diff --git a/src/userauth.c b/src/userauth.c +index f8e02651..43d9ab9b 100644 +--- a/src/userauth.c ++++ b/src/userauth.c +@@ -80,6 +80,12 @@ static char *userauth_list(LIBSSH2_SESSION *session, const char *username, + memset(&session->userauth_list_packet_requirev_state, 0, + sizeof(session->userauth_list_packet_requirev_state)); + ++ if(username_len > UINT32_MAX - 27) { ++ _libssh2_error(session, LIBSSH2_ERROR_PROTO, ++ "username_len out of bounds"); ++ return NULL; ++ } ++ + session->userauth_list_data_len = username_len + 27; + + s = session->userauth_list_data = +@@ -307,6 +313,11 @@ userauth_password(LIBSSH2_SESSION *session, + * 40 = packet_type(1) + username_len(4) + service_len(4) + + * service(14)"ssh-connection" + method_len(4) + method(8)"password" + + * chgpwdbool(1) + password_len(4) */ ++ if(username_len > UINT32_MAX - 40) { ++ return _libssh2_error(session, LIBSSH2_ERROR_PROTO, ++ "username_len out of bounds"); ++ } ++ + session->userauth_pswd_data_len = username_len + 40; + + session->userauth_pswd_data0 = +@@ -447,7 +458,7 @@ password_response: + } + + /* basic data_len + newpw_len(4) */ +- if(username_len + password_len + 44 <= UINT_MAX) { ++ if(username_len <= UINT32_MAX - password_len - 44) { + session->userauth_pswd_data_len = + username_len + password_len + 44; + s = session->userauth_pswd_data = diff --git a/meta/recipes-support/libssh2/libssh2_1.11.1.bb b/meta/recipes-support/libssh2/libssh2_1.11.1.bb index 0d1237852f5..e825c8c5bb8 100644 --- a/meta/recipes-support/libssh2/libssh2_1.11.1.bb +++ b/meta/recipes-support/libssh2/libssh2_1.11.1.bb @@ -10,6 +10,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=2fbf8f834408079bf1fcbadb9814b1bc" SRC_URI = "http://www.libssh2.org/download/${BP}.tar.gz \ file://run-ptest \ file://0001-Return-error-if-user-KEX-methods-are-invalid.patch \ + file://CVE-2026-7598.patch \ " SRC_URI[sha256sum] = "d9ec76cbe34db98eec3539fe2c899d26b0c837cb3eb466a56b0f109cabf658f7" From patchwork Wed May 20 08:20:15 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88498 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7718FCD5BAC for ; Wed, 20 May 2026 08:21:12 +0000 (UTC) Received: from mail-wm1-f48.google.com (mail-wm1-f48.google.com [209.85.128.48]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7283.1779265269507646396 for ; Wed, 20 May 2026 01:21:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=pS9bzN3S; spf=pass (domain: smile.fr, ip: 209.85.128.48, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f48.google.com with SMTP id 5b1f17b1804b1-488d2079582so44045025e9.2 for ; Wed, 20 May 2026 01:21:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265268; x=1779870068; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ezcXUAgd3yypsXxRU0KXBXVe6zJ0PhpgRv7zqKFAc8s=; b=pS9bzN3SCfqd1tmLWGmuBK0jE3KAIseGTOVDFsFs7f7vU/IXIgR+GV/gv3YHbBg8OS 385LmIUQ+0rPZHh3BzzWCvFTNV2Cv028pkRKT7OOhBmdiWV24jsoOcwX5PsSo0tWm9Ip Ngv+ry7tsWXOX87OSsn/4m7e90LSDJFl4ei24= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265268; x=1779870068; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=ezcXUAgd3yypsXxRU0KXBXVe6zJ0PhpgRv7zqKFAc8s=; b=BvpCIWfMTW8SQUupVxoysqBzYBCE6bNjOAX88To3NwLnKf0U7WRDa+hCD0e1r8hImA p5saYqq7ycpAsYcDs0ieE9ARO6pG7KJYiGTKZ9VAnUvKLk2AQ8VHdB3VDieCcgL78PMG 8q/ixMNeJjYc++rdtML1Mf1m26yylFeplbA5JnW0S4gP0bAgUsWDtc1fHk3XgI4UV4VV Pde0rib9uMzWMFDwHD4w9AQvjdciBrkGlLJuTtpY0zeeMDJr73RhUqYzTi6g5+GlcC0Y j5lrVbwD93oO6xymgndE9XId7e7YDMXID9ssW7InFJJ3K2hc6I+qaSNCahERFGkeBiH8 dTLQ== X-Gm-Message-State: AOJu0Yw0M+qyHLOgGMkNSxR3faSnqZ0JiIuec4GIz2SghOG26Hznm+wN X8ij25zxdYMMQ//Dp0n4xjbFA7Sxqxs5tJaOiwpj1+KwfYW0lnRHDS4tPI6kHL4OvhtU3QLGgCF FixWm X-Gm-Gg: Acq92OGRSreEeSqTVN/ncBuZrFoPdM0JV8I+b2yY2j8hUg5KOIPEybEvAtw+qHvFwN7 mL+mXqLevtiG+YnEd8GblsGUEExXp1mKHExXzi5k9VRnauDKKKmKxX+pCnF8ppq0H+7iS5B/v4O aiC8NAbaOXl9/RVfhDc6JEdTbLkWK48b/XR98Y5kXPiSiLs/OuGovq8R7FD8CM6c80/f9F55i/n HDkm13AdRLYu6Vci49duvtVNtdoCj2gxNg6Egif4VrcErugVGZwnNB1COejCl/YeaxTPoXByZ2V laRy1eKHvs1bxeaNnU2QWu2huzxAXa9Y48lgdlzak2S/y5pew5X38KiZDH4tiZZ6jCR0UoKynRK f6FyazlcXTReDw7u4KQVSxsuOYdKhRV/Sn1IUiR3Tmya3phep3mxbLwEHgyY5dgMWV6NQSPp5N5 lrrJEodlggWIIWsdHBw2HWD0jvF/OSgZu910NlG8bPWQ1YliG4+xZLZ0HJe3ukIg5n/BJSpi5gi 7MzWrXO0oH+YMplZb1XX6rcsE5C X-Received: by 2002:a05:600c:a11c:b0:48f:e468:1761 with SMTP id 5b1f17b1804b1-48fe60e47afmr260947745e9.2.1779265267877; Wed, 20 May 2026 01:21:07 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:07 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 14/28] libarchive: set status of CVE-2026-5745 Date: Wed, 20 May 2026 10:20:15 +0200 Message-ID: <0dc232f55182667d7d45a5895d770c9aea95dbb7.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:12 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237413 From: Peter Marko Debian security tracker [1] links Github issue [2] which points to PR [3] which has been fixed on 3.8 branch with [4]. [1] https://security-tracker.debian.org/tracker/CVE-2026-5745 [2] https://github.com/libarchive/libarchive/issues/2904#issuecomment-4257068822 [3] https://github.com/libarchive/libarchive/pull/2905/changes [4] https://github.com/libarchive/libarchive/commit/8c04ac3c91841cdf75dc9de4a405cd7c69 Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit a3f38d68bd58f2028f8097d2cb11486d8a8f75ad) Signed-off-by: Yoann Congal --- meta/recipes-extended/libarchive/libarchive_3.8.7.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-extended/libarchive/libarchive_3.8.7.bb b/meta/recipes-extended/libarchive/libarchive_3.8.7.bb index 577362ef8b0..e8c3a3bfe3d 100644 --- a/meta/recipes-extended/libarchive/libarchive_3.8.7.bb +++ b/meta/recipes-extended/libarchive/libarchive_3.8.7.bb @@ -91,3 +91,4 @@ RDEPENDS:${PN}-ptest += "bsdtar bsdcpio" CVE_STATUS[CVE-2026-4426] = "fixed-version: fixed since 3.8.7" CVE_STATUS[CVE-2026-5121] = "fixed-version: fixed since 3.8.7" +CVE_STATUS[CVE-2026-5745] = "fixed-version: fixed since 3.8.6" From patchwork Wed May 20 08:20:16 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88497 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 58BF1CD4F3C for ; Wed, 20 May 2026 08:21:12 +0000 (UTC) Received: from mail-wr1-f54.google.com (mail-wr1-f54.google.com [209.85.221.54]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7380.1779265270379829001 for ; Wed, 20 May 2026 01:21:10 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=F81ALsd5; spf=pass (domain: smile.fr, ip: 209.85.221.54, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f54.google.com with SMTP id ffacd0b85a97d-44a14580111so3308970f8f.0 for ; Wed, 20 May 2026 01:21:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265269; x=1779870069; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=a/hvd7GpTWf4/glanBmSWN+COQQ7YAXhtXLTQDDANNY=; b=F81ALsd56HbM7lqWDDoGXjBZp8Fr9GJ4QRAtoWb/tkNxNYcgXLtM6m02n38Xz0airh iVEb/BP5kYIgAbTqsTI3FQEw0VDm/sPnmCAwK846WMWSBV7kdwFu0o5266IMuOe2KjN+ 7tnfvCojvv0b2barWUrmVu3TAXMXAYRxnG0xg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265269; x=1779870069; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=a/hvd7GpTWf4/glanBmSWN+COQQ7YAXhtXLTQDDANNY=; b=MToLUjJmoZfoMlUIYIwy+67YA/3iL9tmyF/2CQztQ1MVdgwsZX0qcnWqZocww7zTAG LcmyjithnjkE6FyDGtNn7PzEEZC+MkTZXzceHFt8LsL6Q824I3u1fIntGZeyFDAz3jQw kQRp7fQxA+kudpSYwcal3VYSLPiGoaS7+H4v4Rp7wvUvmGhB2YKPGnj+SA5T92VTX6gd AhU5+LTZ7Vrr36hdT0NQ7i3GI+Lf3SM7qmHer+J1QViugjNuMw/Imn52+xnjeVVDKu8x 80Tn7+hgidU/1N01Upuf9zoAs1Y1rkXKYtldfiAiQYNX+QkIeA9SV0DUI8w3vFcHShos hmgQ== X-Gm-Message-State: AOJu0YyMlUQAh8udURCHLmRtpukFDlrgDmawu6aLs7Ufnq1azsso30vy +n/o/2ZJwJCFzwsLFmMHlvDNLcxcpLHdSY2IOlsPHnpwhxAn1/LA3qZFgOyQBvEl+WfSYC30++7 8h0uq X-Gm-Gg: Acq92OHIgRz4nGgqSide6Rtg5VAtHYKHJ7sjtYKltTu7o3pDikCr1Df+Ms08tOoWz5o wxipPE+4M/gUI+Bch8DWPGF6KQQUCYwGYQCldeFrZuf0ua3CSqVDGsL/2GKVHJWNqOmKThJ86Al AgXp5h5VchC7j6NQDvqWIU12f9h1EnvqRw2wGul/yY6x7BOhpoq87lvV9lobzYhKBcT+mAM2SOA 2qF7WyCCUSSWczFNyCbeU2LZwgYcMBDoCLL5oVQImYdyzC+Xs6WOUtGygKcaeat7zx9sv8MdgUi U1CHM/SrxkNUq0xQ+X1UMr6OkmSXl7S6tMYkXwACWNADJYT7f654y5UqHlnXeKHowkhGCGynqa8 6k6P3V2SjLEZ7rYI31EfvZUynjKm9KmJJ8n6eBmESxuUfVRVH+lRF+xuWaZ1SKUfFsvedu60uRk 6sx1bVgrStsyQdJ7xyGbpX1/A0OgLiKEumby9wR8TlRk0TC5WfrtX0egcZn0wG2nYJ3uTyL6Ugr x4GpH9dEouaebsbRhC2LawLZiwO X-Received: by 2002:a5d:6e59:0:b0:452:c246:ab69 with SMTP id ffacd0b85a97d-45e5c5c8c03mr28646626f8f.13.1779265268705; Wed, 20 May 2026 01:21:08 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:08 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 15/28] efivar: Backport patch to fix -march issue for ppc64le Date: Wed, 20 May 2026 10:20:16 +0200 Message-ID: <7a8d7df9d4295ce43b681bb2123944fa334c684a.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:12 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237414 From: Andrew Geissler Backport upstream commit 9711b8aa5acc to fix compilation errors on ppc64le architecture. The issue occurs because GCC on ppc64le does not recognize the '-march=native' option and suggests using '-mcpu=native' instead. Upstream commit: https://github.com/rhboot/efivar/commit/9711b8aa5acc63c54a12ba5505fe68b4475c8a13 Signed-off-by: Andrew Geissler Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 683e2531be8ca28ace0ed1ef06b6211056338a35) Signed-off-by: Yoann Congal --- .../0003-fix-march-issue-for-ppc64le.patch | 45 +++++++++++++++++++ meta/recipes-bsp/efivar/efivar_39.bb | 1 + 2 files changed, 46 insertions(+) create mode 100644 meta/recipes-bsp/efivar/efivar/0003-fix-march-issue-for-ppc64le.patch diff --git a/meta/recipes-bsp/efivar/efivar/0003-fix-march-issue-for-ppc64le.patch b/meta/recipes-bsp/efivar/efivar/0003-fix-march-issue-for-ppc64le.patch new file mode 100644 index 00000000000..d27541aeb10 --- /dev/null +++ b/meta/recipes-bsp/efivar/efivar/0003-fix-march-issue-for-ppc64le.patch @@ -0,0 +1,45 @@ +From 9711b8aa5acc63c54a12ba5505fe68b4475c8a13 Mon Sep 17 00:00:00 2001 +From: Andrew Geissler +Date: Tue, 4 Nov 2025 09:58:55 -0600 +Subject: [PATCH] Fix the -march issue for ppc64le + +Similar to the fix in aab4e9b10ac, need to also support the ppc64le +architecture. + +The failure without this fix on a ppc64le machine: + +| cp util.c util-makeguids.c +| gcc: error: unrecognized command-line option '-march=native'; did you mean '-mcpu=native'? + +Signed-off-by: Andrew Geissler + +Upstream-Status: Backport [https://github.com/rhboot/efivar/commit/9711b8aa5acc63c54a12ba5505fe68b4475c8a13] +--- + src/include/defaults.mk | 4 ++++ + 1 file changed, 4 insertions(+) + +diff --git a/src/include/defaults.mk b/src/include/defaults.mk +index 4da0cde3..a21a7aeb 100644 +--- a/src/include/defaults.mk ++++ b/src/include/defaults.mk +@@ -74,6 +74,7 @@ override SOFLAGS = $(_SOFLAGS) \ + HOST_ARCH=$(shell uname -m) + ifneq ($(HOST_ARCH),ia64) + ifneq ($(HOST_ARCH),riscv64) ++ifneq ($(HOST_ARCH),ppc64le) + HOST_MARCH=-march=native + else + HOST_MARCH= +@@ -81,6 +82,9 @@ endif + else + HOST_MARCH= + endif ++else ++ HOST_MARCH= ++endif + HOST_CPPFLAGS ?= $(CPPFLAGS) + override _HOST_CPPFLAGS := $(HOST_CPPFLAGS) + override HOST_CPPFLAGS = $(_HOST_CPPFLAGS) \ +-- +2.34.1 + diff --git a/meta/recipes-bsp/efivar/efivar_39.bb b/meta/recipes-bsp/efivar/efivar_39.bb index c0e8d521819..e5839f7a990 100644 --- a/meta/recipes-bsp/efivar/efivar_39.bb +++ b/meta/recipes-bsp/efivar/efivar_39.bb @@ -10,6 +10,7 @@ COMPATIBLE_HOST = "(i.86|x86_64|arm|aarch64|riscv64).*-linux" SRC_URI = "git://github.com/rhinstaller/efivar.git;branch=main;protocol=https \ file://0001-docs-do-not-build-efisecdb-manpage.patch \ file://0002-efivarfs-backport-patch-to-update-file-variable-store-on-SetVariableRT.patch \ + file://0003-fix-march-issue-for-ppc64le.patch \ " SRCREV = "c47820c37ac26286559ec004de07d48d05f3308c" From patchwork Wed May 20 08:20:17 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88495 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 462C2CD4F54 for ; Wed, 20 May 2026 08:21:12 +0000 (UTC) Received: from mail-wr1-f47.google.com (mail-wr1-f47.google.com [209.85.221.47]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7284.1779265271577980698 for ; Wed, 20 May 2026 01:21:11 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=s1csIvcU; spf=pass (domain: smile.fr, ip: 209.85.221.47, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f47.google.com with SMTP id ffacd0b85a97d-449de065cb3so4187553f8f.2 for ; Wed, 20 May 2026 01:21:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265270; x=1779870070; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=6HJKg1tJy9aiC63wH7W7apZNAv2shqC1M9hJbeiBrMg=; b=s1csIvcU3qn5eY/bZK7UM6YdU8nWAJs/SXkmcFA/WGp+qjA8Y1xnbi7uuVAnjsMDV4 bQYcbPL4oQBfcb/lCdNyROYHxLNH+K9HJ+d7j3fHsGtQV+QGUSWFOZ4K6uppOPFTANvk GwOGTPtRYmOjAJM3N4IcGAnH4+Cn46OboAf24= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265270; x=1779870070; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=6HJKg1tJy9aiC63wH7W7apZNAv2shqC1M9hJbeiBrMg=; b=R+ohz2gTHQGfuMUcebMemEcMn9GCnhheilsntJxl/cVjpVLnFyNmnHkYgSS/LBa8R6 rQxIeEWEkKD8jaPtJcbabxyXqMIKPgaKNGp8zFZsklv9odopxRxDXk5545rOSWs48Izf N/GGKv9fbB2b8uL+Kk+/kShCYNcSyhgoC0LZLOzKf0H7ZQnlwJeekMSxcpu8NHixigbd dErTeNya9d99HZ2Sydd+JnowEVKu3RxyYozIVgwpPD1eX+i4xrVXEX5nr3ZQrijW3Ld9 WOwkubQWueBS6s0Q7l1dkjrWSkcVjDFszd2sbrqOXQ9lY10xDwNyY3oJM6d/0fLpS98B Bhiw== X-Gm-Message-State: AOJu0Yy9Bsf83e9NQCLbO8aFrDAgMMvMDokiclv/v5A/qw3zTTg6f/Gy pmjMCe17uxlk7EFo3z6al9zpqS5BiaWpDKYn02Aa8Olhnf45Na2U6Y7PObKcemcgK9CZBPOLLim oeZzm X-Gm-Gg: Acq92OE9GSHg08o+ZsGAmX0XMP5yqnZtS/N0oQ9FcKVuallVT8Le7Cd/EpszzuJ/mnQ 65fRwc68YuU9gPkqA6D2y5oiWA2HwNvpEIlMAf3CG8sHfe1a7/TaV7qwZwa49xxCf9VrRNFfePk m3z+b3FXKyYfLhIooWBY85cf4eqiGnvjNqv8hAbUjT+njPhQEFzScaprYOcSvhw2r8pE0JrHMRB 8njH+fD7Kcd7+CUAR3eTqtLpVJR4ITYZUhNtfBiZo1Hv9YWinhIotZwK6lW/qj8nApmio6735Rg 7266SIaP9IToZ6AMfUwIrR7/BIbb4lZim6mROvEHktxzgSYlHOUimkwYzzSvRBVLDW3SnNIPAlz eVjpm86vnd3Ds9oRGHCsk/r04gDPMZHpiklgt+M9dSMKqMj0k9PhU1+Px7L1WLID2A+6GG1SIUe Eb7k6WtPNYa9663Cmv7KnSMZgodsRJ6fSZq6CKrEDuZa4lMm52+TbiLzbnWS1NEv/sX3lTM/XOu t5PUemdbJrQT2FEW84U/1O9kCuf X-Received: by 2002:adf:ecd1:0:b0:45e:73a5:e1ed with SMTP id ffacd0b85a97d-45e73a5e543mr19043076f8f.27.1779265269809; Wed, 20 May 2026 01:21:09 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:09 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 16/28] oe-pkgdata-util: fix empty runtime-rprovides directory handling Date: Wed, 20 May 2026 10:20:17 +0200 Message-ID: <941cc0a8f8bf88fa9a66e26debb518bc664e418f.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:12 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237415 From: Sam Kent An empty runtime-provides directory caused lookup-recipe, package-info and list-pkg-files to skip the runtime-reverse fallback. Use os.listdir() to ensure the folder is not empty and use os.path.isdir( to ensure it is not a file. Signed-off-by: Sam Kent Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 678c1c2077316b6b81ba9be000528b50dca19ca6) Signed-off-by: Yoann Congal --- scripts/oe-pkgdata-util | 15 +++++++++------ 1 file changed, 9 insertions(+), 6 deletions(-) diff --git a/scripts/oe-pkgdata-util b/scripts/oe-pkgdata-util index bbfc6a2dddd..904008bd029 100755 --- a/scripts/oe-pkgdata-util +++ b/scripts/oe-pkgdata-util @@ -289,8 +289,9 @@ def lookup_recipe(args): for pkg in pkgs: providepkgpath = os.path.join(args.pkgdata_dir, "runtime-rprovides", pkg) - if os.path.exists(providepkgpath): - for f in os.listdir(providepkgpath): + rprovides = os.listdir(providepkgpath) if os.path.isdir(providepkgpath) else [] + if rprovides: + for f in rprovides: if f != pkg: print("%s is in the RPROVIDES of %s:" % (pkg, f)) pkgdatafile = os.path.join(args.pkgdata_dir, "runtime", f) @@ -355,8 +356,9 @@ def package_info(args): for pkg in packages: providepkgpath = os.path.join(args.pkgdata_dir, "runtime-rprovides", pkg) - if os.path.exists(providepkgpath): - for f in os.listdir(providepkgpath): + rprovides = os.listdir(providepkgpath) if os.path.isdir(providepkgpath) else [] + if rprovides: + for f in rprovides: if f != pkg: print("%s is in the RPROVIDES of %s:" % (pkg, f)) pkgdatafile = os.path.join(args.pkgdata_dir, "runtime", f) @@ -507,8 +509,9 @@ def list_pkg_files(args): else: providepkgpath = os.path.join(args.pkgdata_dir, "runtime-rprovides", pkg) - if os.path.exists(providepkgpath): - for f in os.listdir(providepkgpath): + rprovides = os.listdir(providepkgpath) if os.path.isdir(providepkgpath) else [] + if rprovides: + for f in rprovides: if f != pkg: print("%s is in the RPROVIDES of %s:" % (pkg, f)) pkgdatafile = os.path.join(args.pkgdata_dir, "runtime", f) From patchwork Wed May 20 08:20:18 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88513 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 52BE1CD5BAC for ; Wed, 20 May 2026 08:21:23 +0000 (UTC) Received: from mail-wr1-f50.google.com (mail-wr1-f50.google.com [209.85.221.50]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7382.1779265272559084860 for ; Wed, 20 May 2026 01:21:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=hiO7ElT+; spf=pass (domain: smile.fr, ip: 209.85.221.50, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f50.google.com with SMTP id ffacd0b85a97d-45e7c636e74so2188919f8f.0 for ; Wed, 20 May 2026 01:21:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265271; x=1779870071; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=FyisB7/NWet7jggIZ/bYjpO3yAC66N/q+/ldLyGbY7I=; b=hiO7ElT+x+6ltG3EO7n4mrKtVa+gE2gFcZzvvmVJbfU5Zo6ixDna3mq5NuxX064BCV e7oPPqpwGbrStxpHoSmVkMXOwjVwTylvnap4B3NJckMeUequdogTUh4xS+KOh2FuCRcY NYeKV2hCXEedNb500VSc7Gw871tzVpyA8Y0mc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265271; x=1779870071; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=FyisB7/NWet7jggIZ/bYjpO3yAC66N/q+/ldLyGbY7I=; b=equ5nzu0aj/IPcABCZ9OtB6lN+DcCPlI/JXAN1VA4T5Dz2fl87AvPh7rY7PUAw1yaB u2/LgH4sbBFr16Ae/6K1LzqDe5yu+YH1uIvCGLJn+X7tWWzIW10bE53QuX4lGuvfw1to 0DoUeHzMWQZuVgmLMszb+xUm/sGVvxFwQMDzv22qgcVlNU+VUXN0tfqZHSEYVc1rc7lU bUb71iII+yQrmmde/l+WsJ2ZoSQugx1vnsc4+l7IKt0SGlssKrGVzN1QNjShDLzpEVXv EjqlAqck8+K0J/o0VZH3OVCrQg7tAtVgUnod74DXG0Agf+ojVkriamLjwUMGT4qRUh4U xkSA== X-Gm-Message-State: AOJu0Yw5GAC73aswDkPUMrJ917orRu+fppNQjnTEevYLVMDoKvp8usf8 uEZbh9yzyB+fhpMEC4YoWMgHm2nOyCfvqRQVwkW+n5uIH+WikWL3g5lfdtoJXbw/L7pDWQNMein R7/Wi X-Gm-Gg: Acq92OHFwgDz606GacezsQyXZlSKJi6P/OFG/Sq3gDDOQVP4KAthuZj4GLkGpC1yboi MhrHMAH3E9qUWiJz+XahLBvhBdt86O7NfhR9ucRpu7WG4eVr5UlQDcMs8lJMY1wnkPBGLcAgPmq E2S4SPKhr3tlmh8wDBGZMXa6ofNqHfT3P3isGJnB7lUt1Pj/U0AjRART4ETcvi5EKIi+1mpWu11 tQUXJCGQ9xC9oSqQeOaAILn0Qv7xIYy1xkpJCswGZcOJP7P5r4ZX2SXwf2+ur5f4jn2xf0dkPIy 6igzspr8U/j2OPGyXjWoFLq3Awe1165kFKUGilovG8a3WxV3Lyu3tbtkHr1Do94z9izRas1xOhW qStq4kdOAZmOhAvKpbSpRxlgICu5IFVdtHn5oI+lD9wgs6N8YAgDXfS4N46lsNsL7XvO8ZoIdk/ tTPG7Ym0CqVFIKOt4BLSNPma9VbHjU6acyndR7KkGygwga6tP4fGFITqcXiwwPkb4mI6a2l/dNf c7U8rY6hjxnCyFW8QK1wZGCqFY9So2dd/+bkZQRs1Jes7bAeQ== X-Received: by 2002:a05:6000:18c6:b0:45e:73a1:8db5 with SMTP id ffacd0b85a97d-45e73a18e91mr16992063f8f.40.1779265270674; Wed, 20 May 2026 01:21:10 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:10 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 17/28] oe-pkgdata-util: fix runtime-rprovides handling in lookup_pkg error path Date: Wed, 20 May 2026 10:20:18 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237416 From: Thomas Perrot Commit 678c1c207731 applied os.path.isdir() + non-empty check to three functions, but the error-reporting path in lookup_pkg introduced by commit 46ff3a8d2c18 was left using os.path.exists() + os.listdir(). This is fragile: it raises NotADirectoryError if the path exists but is a file, and silently falls through to the generic error on an empty directory rather than skipping the rprovides block. Apply the same pattern used elsewhere for consistency. Signed-off-by: Thomas Perrot Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit dbca656205a7d9a9a9b0aa25b4ad6562af9c5180) Signed-off-by: Yoann Congal --- scripts/oe-pkgdata-util | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/scripts/oe-pkgdata-util b/scripts/oe-pkgdata-util index 904008bd029..acefae24f3a 100755 --- a/scripts/oe-pkgdata-util +++ b/scripts/oe-pkgdata-util @@ -239,8 +239,8 @@ def lookup_pkg(args): missing = list(set(pkgs) - set(mappings.keys())) for pkg in missing: providepkgpath = os.path.join(args.pkgdata_dir, "runtime-rprovides", pkg) - if os.path.exists(providepkgpath): - providers = os.listdir(providepkgpath) + providers = os.listdir(providepkgpath) if os.path.isdir(providepkgpath) else [] + if providers: for provider in providers: if provider == pkg: continue From patchwork Wed May 20 08:20:19 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88509 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 01B76CD4F54 for ; Wed, 20 May 2026 08:21:23 +0000 (UTC) Received: from mail-wr1-f44.google.com (mail-wr1-f44.google.com [209.85.221.44]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7285.1779265273434684805 for ; Wed, 20 May 2026 01:21:13 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=UeC4kD0h; spf=pass (domain: smile.fr, ip: 209.85.221.44, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f44.google.com with SMTP id ffacd0b85a97d-44e1ebb3122so2658832f8f.2 for ; Wed, 20 May 2026 01:21:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265272; x=1779870072; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=U1dWAkRMLSu5nmBvj/uNRxhgcQAz50lvshtcA5pA5eg=; b=UeC4kD0h24BDKy12Ifvv9uvpZY/HJGY80EdqBdD4km8qpDMm3frxM+q+UxxaEudCQD fGWYqvjdsUlwRa8CvGQOc9cn3Cz2pm7b5CwQUZEmnRpe/tjJdmXyicomJkL1l9qaIx/U Dt3i9O0oBIZExcuRM/6R5pyMBZRsEUHI/pKWM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265272; x=1779870072; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=U1dWAkRMLSu5nmBvj/uNRxhgcQAz50lvshtcA5pA5eg=; b=lHUMepq2s7Bjx2Bp+E67+aLNhcRH8URPi9u0sXvo4enkzgiEE2YQxpSaLsWOU803vX p1WIvm6UdBuQWEB616VfAaZ14M+fXJCHi0GmSwtty5U1hSSsxQSFPfioGJhQbUPhgxE6 ju2g6B/Sr2TsKPO9FwVJ5s51Tgl7rk+wmSwoRNI1mUZeNX+rJ+vzgi1x2sBQ5p7KlK6n fuG5bfl4l+24ZLWQ3L/3SDuC9Z0qm5/mk9RSZ6wLN5C4f2PN9c1M0Or2KEemAgV/Ootb VhDeCTI/UDfissJNT4hrl4eoZqY43I0YPDfKuX6KKZCqM3pJCnHU3rirVU6Cmm7UI6JS JSGA== X-Gm-Message-State: AOJu0YykQDfqKRyngLM7Np3hNDaNJvTd2AWhY+6g/fYey7nm7zplmNVZ y+aaAS7ciuY8a3fs/sTe/PL9EOTtXmHKsS/DoFo9iJomrJerkRajYAG/OnMQ2A6t10gYk9mPGXa yXTFo X-Gm-Gg: Acq92OHIq/gNhdZXqb61oWb/3XO9aCqu9PJYsbTzSATU9a0pyErFNBf/Gx+VxT6Ykni CKXwxVVhUF3i8nnQsakui5T91TypKY9TjtDF+A9J5GHg/jWicvQ3ek6PGwHNENVPYXg/X/3dgnU 6iOgjwaJFtZHsSD5/5EY8fSIVn+vpkw8qVHcnV7LuRWhAy41hf8TWMeQOdaNBrW8zNuqlVlo4/W +jp4T+YDxP55PZ1uXltY64cSeeQYW6Hgvdo20fMDTS3mV2IaeoJD6G23M04ZT5MqUek1HiZFr2f ziqwn3ydA+ooxqD8zBQ1XBg8Bl+kbnMjIx8DJa9dZjI5G+FPR3+lKJDeRz/Q3wF1pdT7p1k7WPk dJGQhjP/svWikLhH8rclAVswKU8N7NgREvSAm4znz97EZNiX9N/ZxKVGGRhqO4dna/ioAhi8EYZ G5JlW/4gq3E5znk4mWefWQ4TJGaJDzLVJz+rBANuzwhdqHtK5+QzWG2tKNB1t9I8lpt8NCKOjNM +J00CkCa9cfbo+S5+GNKb5GONg4 X-Received: by 2002:a05:6000:2288:b0:43d:781d:37b9 with SMTP id ffacd0b85a97d-45e5c5ae8f2mr35071942f8f.42.1779265271640; Wed, 20 May 2026 01:21:11 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:11 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 18/28] libsoup: patch CVE-2026-2708 Date: Wed, 20 May 2026 10:20:19 +0200 Message-ID: <65e972685daf8cd1e962df9db94ccff98905aa12.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237417 From: Peter Marko Pick patch per [1]. [1] https://security-tracker.debian.org/tracker/CVE-2026-2708 Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 7f84f2e79b23546001d8aa1e4f8b36a0097c769e) Signed-off-by: Yoann Congal --- .../libsoup/libsoup/CVE-2026-2708.patch | 218 ++++++++++++++++++ meta/recipes-support/libsoup/libsoup_3.6.6.bb | 1 + 2 files changed, 219 insertions(+) create mode 100644 meta/recipes-support/libsoup/libsoup/CVE-2026-2708.patch diff --git a/meta/recipes-support/libsoup/libsoup/CVE-2026-2708.patch b/meta/recipes-support/libsoup/libsoup/CVE-2026-2708.patch new file mode 100644 index 00000000000..479a53ae212 --- /dev/null +++ b/meta/recipes-support/libsoup/libsoup/CVE-2026-2708.patch @@ -0,0 +1,218 @@ +From e032d3e9b0a27d10597398023532dd8f9b6654cf Mon Sep 17 00:00:00 2001 +From: Carlos Garcia Campos +Date: Tue, 17 Feb 2026 16:39:26 +0100 +Subject: [PATCH] Do not allow adding multiple content length values to headers + +Closes #500 + +CVE: CVE-2026-2708 +Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libsoup/-/commit/e032d3e9b0a27d10597398023532dd8f9b6654cf] +Signed-off-by: Peter Marko +--- + libsoup/soup-message-headers.c | 27 ++++++++++++++ + tests/header-parsing-test.c | 50 +++++++++++++++++++++++++- + tests/server-test.c | 64 ++++++++++++++++++++++++++++++++++ + 3 files changed, 140 insertions(+), 1 deletion(-) + +diff --git a/libsoup/soup-message-headers.c b/libsoup/soup-message-headers.c +index ca7719db..34cd2d8f 100644 +--- a/libsoup/soup-message-headers.c ++++ b/libsoup/soup-message-headers.c +@@ -269,6 +269,33 @@ soup_message_headers_append_common (SoupMessageHeaders *hdrs, + return FALSE; + } + ++ if (name == SOUP_HEADER_CONTENT_LENGTH) { ++ /* RFC 9110 - 7.7. Content-Length ++ * If a message is received that has a Content-Length header field value consisting of ++ * the same decimal value as a comma-separated list (Section 5.7.1) — for example, ++ * "Content-Length: 42, 42" — indicating that duplicate Content-Length header fields have ++ * been generated or combined by an upstream message processor, then the recipient must either ++ * reject the message as invalid or replace the duplicated field values with a single valid ++ * Content-Length field containing that decimal value prior to determining the message body ++ * length or forwarding the message. ++ */ ++ const char *content_length = soup_message_headers_get_one_common (hdrs, SOUP_HEADER_CONTENT_LENGTH); ++ if (content_length) { ++ guint64 decimal_value1, decimal_value2; ++ char *end; ++ ++ decimal_value1 = g_ascii_strtoull (content_length, &end, 10); ++ if (*end) ++ return FALSE; ++ ++ decimal_value2 = g_ascii_strtoull (value, &end, 10); ++ if (*end) ++ return FALSE; ++ ++ return decimal_value1 == decimal_value2; ++ } ++ } ++ + if (trusted_value == SOUP_HEADER_VALUE_UNTRUSTED && !is_valid_header_value (value)) { + g_warning ("soup_message_headers_append: Rejecting bad value '%s'", value); + return FALSE; +diff --git a/tests/header-parsing-test.c b/tests/header-parsing-test.c +index ebdc3246..5a3c92eb 100644 +--- a/tests/header-parsing-test.c ++++ b/tests/header-parsing-test.c +@@ -368,6 +368,22 @@ static struct RequestTest { + }, 0 + }, + ++ { "Duplicate Content-Length with the same value", NULL, ++ "POST / HTTP/1.1\r\nContent-Length: 4\r\nContent-Length: 4\r\n", ++ -1, ++ SOUP_STATUS_OK, ++ "POST", "/", SOUP_HTTP_1_1, ++ { { "Content-Length", "4" } }, 0 ++ }, ++ ++ { "Duplicate Content-Length with the same decimal value", NULL, ++ "POST / HTTP/1.1\r\nContent-Length: 04\r\nContent-Length: 4\r\n", ++ -1, ++ SOUP_STATUS_OK, ++ "POST", "/", SOUP_HTTP_1_1, ++ { { "Content-Length", "04" } }, 0 ++ }, ++ + /************************/ + /*** INVALID REQUESTS ***/ + /************************/ +@@ -507,7 +523,16 @@ static struct RequestTest { + NULL, NULL, -1, + { { NULL } }, + G_LOG_LEVEL_WARNING +- } ++ }, ++ ++ { "Duplicate Content-Length with different value", ++ "https://gitlab.gnome.org/GNOME/libsoup/-/issues/500", ++ "POST / HTTP/1.1\r\nContent-Length: 2\r\nContent-Length: 4\r\n", ++ -1, ++ SOUP_STATUS_BAD_REQUEST, ++ NULL, NULL, -1, ++ { { NULL } }, 0 ++ } + }; + static const int num_reqtests = G_N_ELEMENTS (reqtests); + +@@ -1475,6 +1500,28 @@ do_append_duplicate_host_test (void) + soup_message_headers_unref (hdrs); + } + ++static void ++do_append_duplicate_content_length_test (void) ++{ ++ SoupMessageHeaders *hdrs; ++ const char *list_value; ++ ++ hdrs = soup_message_headers_new (SOUP_MESSAGE_HEADERS_REQUEST); ++ soup_message_headers_append (hdrs, "Content-Length", "42"); ++ ++ /* Inserting the same value doesn't generate a list */ ++ soup_message_headers_append (hdrs, "Content-Length", "42"); ++ list_value = soup_message_headers_get_list (hdrs, "Content-Length"); ++ g_assert_cmpstr (list_value, ==, "42"); ++ ++ /* Inserting a different value does nothing */ ++ soup_message_headers_append (hdrs, "Content-Length", "45"); ++ list_value = soup_message_headers_get_list (hdrs, "Content-Length"); ++ g_assert_cmpstr (list_value, ==, "42"); ++ ++ soup_message_headers_unref (hdrs); ++} ++ + int + main (int argc, char **argv) + { +@@ -1491,6 +1538,7 @@ main (int argc, char **argv) + g_test_add_func ("/header-parsing/append-param", do_append_param_tests); + g_test_add_func ("/header-parsing/bad", do_bad_header_tests); + g_test_add_func ("/header-parsing/append-duplicate-host", do_append_duplicate_host_test); ++ g_test_add_func ("/header-parsing/append-duplicate-content-length", do_append_duplicate_content_length_test); + + ret = g_test_run (); + +diff --git a/tests/server-test.c b/tests/server-test.c +index 09ea03b3..59230444 100644 +--- a/tests/server-test.c ++++ b/tests/server-test.c +@@ -1422,6 +1422,68 @@ do_chunked_test (ServerData *sd, gconstpointer test_data) + } + } + ++static void ++do_multiple_content_length_test (ServerData *sd, gconstpointer test_data) ++{ ++ gint i; ++ struct { ++ const char *description; ++ const char *test; ++ const char *expected_response; ++ } tests[] = { ++ { "Double Content-Length with different value", "POST / HTTP/1.1\r\nHost: 127.0.0.1\r\nContent-Length: 0\r\nContent-Length: 4\r\nConnection: close\r\n\r\n\r\nABCD", "HTTP/1.0 400 Bad Request" }, ++ { "Double Content-Length with the same value", "POST / HTTP/1.1\r\nHost: 127.0.0.1\r\nContent-Length: 4\r\nContent-Length: 4\r\nConnection: close\r\n\r\n\r\nABCD", "HTTP/1.1 200 OK" }, ++ }; ++ ++ sd->server = soup_test_server_new (SOUP_TEST_SERVER_IN_THREAD); ++ sd->base_uri = soup_test_server_get_uri (sd->server, "http", NULL); ++ server_add_handler (sd, NULL, server_callback, NULL, NULL); ++ ++ for (i = 0; i < G_N_ELEMENTS (tests); i++) { ++ GSocketClient *client; ++ GSocketConnection *conn; ++ GInputStream *input; ++ GOutputStream *output; ++ gsize nwritten; ++ char buffer[4096]; ++ gssize nread; ++ GString *response; ++ const char *boundary; ++ GError *error = NULL; ++ ++ debug_printf (1, " %s\n", tests[i].description); ++ ++ client = g_socket_client_new (); ++ conn = g_socket_client_connect_to_host (client, g_uri_get_host (sd->base_uri), g_uri_get_port (sd->base_uri), NULL, &error); ++ g_assert_no_error (error); ++ ++ output = g_io_stream_get_output_stream (G_IO_STREAM (conn)); ++ g_output_stream_write_all (output, tests[i].test, strlen (tests[i].test), &nwritten, NULL, &error); ++ g_assert_no_error (error); ++ g_assert_cmpuint (nwritten, ==, strlen (tests[i].test)); ++ g_output_stream_flush (output, NULL, &error); ++ g_assert_no_error (error); ++ ++ response = g_string_new (NULL); ++ ++ input = g_io_stream_get_input_stream (G_IO_STREAM (conn)); ++ do { ++ nread = g_input_stream_read (input, buffer, sizeof(buffer), NULL, NULL); ++ if (nread >= 0) ++ response = g_string_append_len (response, (const char *)buffer, nread); ++ } while (nread > 0); ++ ++ boundary = strstr (response->str, "\r\n"); ++ g_assert_nonnull (boundary); ++ response = g_string_truncate (response, response->len - strlen (boundary)); ++ g_assert_cmpstr (response->str, ==, tests[i].expected_response); ++ g_string_free (response, TRUE); ++ ++ g_object_unref (conn); ++ g_object_unref (client); ++ } ++} ++ + int + main (int argc, char **argv) + { +@@ -1464,6 +1526,8 @@ main (int argc, char **argv) + server_setup, do_steal_connect_test, server_teardown); + g_test_add ("/server/chunked", ServerData, NULL, + NULL, do_chunked_test, server_teardown); ++ g_test_add ("/server/multiple-content-length", ServerData, NULL, ++ NULL, do_multiple_content_length_test, server_teardown); + + ret = g_test_run (); + diff --git a/meta/recipes-support/libsoup/libsoup_3.6.6.bb b/meta/recipes-support/libsoup/libsoup_3.6.6.bb index 792cb26e930..d18a16379b3 100644 --- a/meta/recipes-support/libsoup/libsoup_3.6.6.bb +++ b/meta/recipes-support/libsoup/libsoup_3.6.6.bb @@ -19,6 +19,7 @@ SRC_URI += "file://CVE-2025-32049-1.patch \ file://CVE-2025-32049-4.patch \ file://CVE-2026-1539.patch \ file://CVE-2026-5119.patch \ + file://CVE-2026-2708.patch \ " PROVIDES = "libsoup-3.0" From patchwork Wed May 20 08:20:20 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88511 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 39742CD5BAF for ; Wed, 20 May 2026 08:21:23 +0000 (UTC) Received: from mail-wr1-f52.google.com (mail-wr1-f52.google.com [209.85.221.52]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7383.1779265274562237746 for ; Wed, 20 May 2026 01:21:14 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=tH5ntaFq; spf=pass (domain: smile.fr, ip: 209.85.221.52, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f52.google.com with SMTP id ffacd0b85a97d-43d77f6092eso2512234f8f.2 for ; Wed, 20 May 2026 01:21:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265273; x=1779870073; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=v/I2/q9fn66kOpBb5COzs072Bs0IneUk4FRvUTGxYSM=; b=tH5ntaFq1Ft+qa97UuXoQDoDC0roJKCOHyyQiwInrx+m3Dkg8BPdauXUL5Ghvh125M ANooPqqlO/9WpIMpzxgjl7UrqMs+kV8VXSUDJZcNJ0t8KKl4EkmZavGFHJ2rgjDdjs/L HvthdvcAJ+UO0SgeAczzV4cpNG4eCO+5wvf0Y= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265273; x=1779870073; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=v/I2/q9fn66kOpBb5COzs072Bs0IneUk4FRvUTGxYSM=; b=oG3r7oEjdSDDS5zuG8A+hjmBM6vOSmKU+oLX+xZvLLlJ8v1TbaSBUzVEy8GiuffvjG BI9nySjnF/9Tgkq4dgiGANq2GVzRseAStl5vAtTIigKToNWDEDk9pNy8HIea5p7ZJm+4 08hMoWgKtA3iEuhKMdZFx3Ch6faMOQAEj9OMZy5+dYd8Ln5PVUu3V4IgD40tJxHDzV20 +8IdFcxI84XW8hFkJHIT/pk1J9rJetq4BbMZXB7/LvtmB84AS9Ij183xZr5Lud73kAt/ RUYFle8xkvP07BK4E+5jW/lIK2L0RMFtZgdg7XZXqwhXiiFJAFPs3byLOnF6CcV2CaMH yJAQ== X-Gm-Message-State: AOJu0YwciaCRHK/GiZ58Qd2/mmNrUV1fMvYx5DWnb7F2MeilHBl983sq fKOPxO3J4XV5xqmyP0XwLl10Woe1b2adn0TSeFJnGFTLdJTcGEOEJsSvnu5oODGp0jmV73fD6Fl m6KMP X-Gm-Gg: Acq92OFrMex/5MhakcODnjxrsrcaXdmM8RCMj/pmZTzSujHbCtZ02cFJLlc/fGNlGw+ uDZlmUseQpzcTK/CnmKkoqn6FQFwUn5/bMwXSh91gOodNcDfCv7dHQVWQHLvMHt34jdA9O6jc1X cgRUdFYbfl2A6B3701/y7FeHEBxubHSg8B1txKvFCsBLvpVJ0RWb0/4vTM/2JyBsqwgnJv3iMRb sG6E1sqAKxPeAZubvkNkdSTq9XMEb4nL7IRQ+QAYf9c99vD9+htNTrUiDP6GiIlbwS5UsN+BB+f WwcJO0Y46k+n573H/i7b0iQ8lCm5sgHYdDjBMe4qBhk2bqeKmmN9mrLY3PIaC9kuK87GT05oOuZ 7gUDTKgsv+nd0jaALlyDO7BmNzRDkGKBw2QAMmw8L4Gx/lucAWyb+n+x64JRp04BxR7Dn61ybKk hfqqIc7ryGmDeaWR7JAwWv3TBycHM2VaUs20aCnTn1XxR8ho5sPCVK82qTxaAorbjpRRYpCBOaI ucz2uG93Qm8L7IHJHC6Yyfb1j1ht24wDwC08Us= X-Received: by 2002:a5d:5f90:0:b0:45d:3cb0:5ab1 with SMTP id ffacd0b85a97d-45e5c5f8424mr35952085f8f.38.1779265272607; Wed, 20 May 2026 01:21:12 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:12 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 19/28] utils: Handle unexpanded variables in DISTRO_FEATURES Date: Wed, 20 May 2026 10:20:20 +0200 Message-ID: <342ef5250240575471a915e1145088c723a025c2.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237418 From: Richard Purdie If you have an unset variable in DISTRO_FEATURES, very strange things appear to happen. Currently, this shows up as seccomp appearing in PACKAGECONFIG for gnutls-native which isn't what the user configured. The issue happens if you have a variable in DISTRO_FEATURES which cannot be expanded. Add some code to detect, warn and work around such a thing. Create a function to allow this to be done in one place. [YOCTO #16275] Signed-off-by: Richard Purdie Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 7782a9bfc4e2ddc67185ac3f5ed14c5268f078b0) Signed-off-by: Yoann Congal --- meta/classes-recipe/crosssdk.bbclass | 3 +-- meta/classes-recipe/native.bbclass | 3 +-- meta/classes-recipe/nativesdk.bbclass | 3 +-- meta/lib/oe/utils.py | 9 +++++++++ 4 files changed, 12 insertions(+), 6 deletions(-) diff --git a/meta/classes-recipe/crosssdk.bbclass b/meta/classes-recipe/crosssdk.bbclass index f7be3a23bf6..6246c09de4b 100644 --- a/meta/classes-recipe/crosssdk.bbclass +++ b/meta/classes-recipe/crosssdk.bbclass @@ -16,8 +16,7 @@ PACKAGE_ARCH = "${SDK_ARCH}" python () { # set TUNE_PKGARCH to SDK_ARCH d.setVar('TUNE_PKGARCH', d.getVar('SDK_ARCH')) - defaults = d.getVar("DISTRO_FEATURES") - d.setVar("DISTRO_FEATURES", '${@oe.utils.class_filter_features("' + defaults + '", "DISTRO_FEATURES_NATIVESDK", "DISTRO_FEATURES_FILTER_NATIVESDK", d)}') + oe.utils.set_class_filter("DISTRO_FEATURES", "DISTRO_FEATURES_NATIVESDK", "DISTRO_FEATURES_FILTER_NATIVESDK", d) } STAGING_BINDIR_TOOLCHAIN = "${STAGING_DIR_NATIVE}${bindir_native}/${TARGET_ARCH}${TARGET_VENDOR}-${TARGET_OS}" diff --git a/meta/classes-recipe/native.bbclass b/meta/classes-recipe/native.bbclass index 89d862eb55a..8aa86f9cb62 100644 --- a/meta/classes-recipe/native.bbclass +++ b/meta/classes-recipe/native.bbclass @@ -126,8 +126,7 @@ python native_virtclass_handler () { return bpn = d.getVar("BPN") - defaults = d.getVar("DISTRO_FEATURES") - d.setVar("DISTRO_FEATURES", '${@oe.utils.class_filter_features("' + defaults + '", "DISTRO_FEATURES_NATIVE", "DISTRO_FEATURES_FILTER_NATIVE", d)}') + oe.utils.set_class_filter("DISTRO_FEATURES", "DISTRO_FEATURES_NATIVE", "DISTRO_FEATURES_FILTER_NATIVE", d) classextend = d.getVar('BBCLASSEXTEND') or "" if "native" not in classextend: diff --git a/meta/classes-recipe/nativesdk.bbclass b/meta/classes-recipe/nativesdk.bbclass index 25fd463ac78..5b49affd537 100644 --- a/meta/classes-recipe/nativesdk.bbclass +++ b/meta/classes-recipe/nativesdk.bbclass @@ -77,8 +77,7 @@ python nativesdk_virtclass_handler () { if not (pn.endswith("-nativesdk") or pn.startswith("nativesdk-")): return - defaults = d.getVar("DISTRO_FEATURES") - d.setVar("DISTRO_FEATURES", '${@oe.utils.class_filter_features("' + defaults + '", "DISTRO_FEATURES_NATIVESDK", "DISTRO_FEATURES_FILTER_NATIVESDK", d)}') + oe.utils.set_class_filter("DISTRO_FEATURES", "DISTRO_FEATURES_NATIVESDK", "DISTRO_FEATURES_FILTER_NATIVESDK", d) e.data.setVar("MLPREFIX", "nativesdk-") e.data.setVar("PN", "nativesdk-" + e.data.getVar("PN").replace("-nativesdk", "").replace("nativesdk-", "")) diff --git a/meta/lib/oe/utils.py b/meta/lib/oe/utils.py index 23f4b639c69..120b6443935 100644 --- a/meta/lib/oe/utils.py +++ b/meta/lib/oe/utils.py @@ -161,6 +161,15 @@ def class_filter_features(defaults, features_var, filter_var, d): filtered = set(bb.utils.filter_string(defaults, d.getVar(filter_var)).split()) return " ".join(sorted(features | filtered)) +def set_class_filter(var, features_var, filter_var, d): + defaults = d.getVar(var) + if "}" in defaults: + issues = [c for c in defaults.split() if "}" in c] + for issue in issues: + defaults = defaults.replace(issue, "") + bb.warn("Unexpanded variable %s in %s is not recommended" % (issue, var)) + d.setVar(var, '${@oe.utils.class_filter_features("' + defaults + '", "' + features_var + '", "' + filter_var + '", d)}') + def all_distro_features(d, features, truevalue="1", falsevalue=""): """ Returns truevalue if *all* given features are set in DISTRO_FEATURES, From patchwork Wed May 20 08:20:21 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88508 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 464B4CD5BB0 for ; Wed, 20 May 2026 08:21:23 +0000 (UTC) Received: from mail-wr1-f44.google.com (mail-wr1-f44.google.com [209.85.221.44]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7286.1779265275433365107 for ; Wed, 20 May 2026 01:21:15 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=J9kGH9QF; spf=pass (domain: smile.fr, ip: 209.85.221.44, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f44.google.com with SMTP id ffacd0b85a97d-44985f4ab0fso2361019f8f.0 for ; Wed, 20 May 2026 01:21:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265274; x=1779870074; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=B1GXrRW342AwGA2SuNA1VeBk7ja6+XtkxSDW1/dFPa8=; b=J9kGH9QF2UkRWe0sDPZRdDT68rEvYR5ihSD7ql0KYhlLKkPLse8VXNxPxiAnGRuz5r dYViHyMV2+RGZpK4fqgSPo2HxfL1qu95eT1aW2/4yv4bmmBHyh8o8rEbGQbT3gGjWWPR RzsRP/GjBRbYxSBX6SDUuvucNIPdfQiFSzWWQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265274; x=1779870074; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=B1GXrRW342AwGA2SuNA1VeBk7ja6+XtkxSDW1/dFPa8=; b=NHWm5Pq4KYEUUm1IRwVs/biHORfRbCFs4b0qBadyiEYFl9TpjRmdFHrp62yM52c+57 3kZgp65N//DoerX0/gi42nfqoHR79tDIw4aqRBJIqCLayqX8FWTNs+ek59EhYF7gGK+F Z6Lu0IDsLWVY0yIgnhlps7YZzf2/avb/I5obbI2i2EUZAFWR0WMgfJlKUFIhPjmXic/M OvU/AK/eOaGW2gs6FG/Q+6Q90aD/lypvfcg1/sUYjakS1XMZ/hB/NBggk+ttEY++OFIK /lu2yO+khUVKdM6hXnHBVKnLAI6jsJ6gz6gMovB4XRF8CMxHafYBkZh6aoLd90M0Z9ZW 9FXg== X-Gm-Message-State: AOJu0Yy1dG0dfnxi3wtWotl+xYjgHMRjr0ym4O2CvXJ9HEpDyUloczlr aibkQuttprOp1UITsiF2dcHk0VVjSblwaHnrIOPgVHhQeRrzrFTPKDqQodBLwUTBV0NjrMyHZa+ VMpg6 X-Gm-Gg: Acq92OHN83X7foug5yp+PZ7AoEzpTRrlzdv+2BYU8wWNsbVonTvE/7OFSHfSLdc99Yl hGfQPboCJC+q8y3uYbGlB72nisEDFDhbP8ApwbHWD1RYbJWl+OhS0y9eiAr9LtP0PD8jVMFObP6 +bi92fYBbVSIhDp07o0+tDnJLIrQbAoG9JjFZAUJYGNIioYoHp9RPTNWjDyXPDoxlLzX01k9JE8 VCUNFORuOQKge4eWsTIDvM9pfKPOKHnYsmoH9Zh0JJp1I8jkR6KCBuZ0WWzhTIAYloFfQlfec+j TmG3TeEmqGrHe9LteOxanYo+JLWJvDXE0KmXQF79K19yLcWJGX8bSd6kN8ZE9Wfp21pXzomAem/ YnX7TN4CG3BKyru54I/3+UkjIPH+RD1VqXPWV3dCZvw84Z79fSQLgQXnqvskNVRWvatA/tNclwR 50FhB5RrFeKvRJd4hkVSDpc5z8CBwPYbcg/yYR3hk9TGayEBapY+Wgk1by8UdYBZgkpNDWSMuVx ahDWYNqMPtdJuSI3aOenv4Br4MG X-Received: by 2002:a05:600c:6992:b0:48e:6f39:f7be with SMTP id 5b1f17b1804b1-48fe60ea533mr341072195e9.10.1779265273750; Wed, 20 May 2026 01:21:13 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.12 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:13 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 20/28] shadow-native: Change upstream status of disable_syslog.patch Date: Wed, 20 May 2026 10:20:21 +0200 Message-ID: <1348a20d64b400db893ceda947255c68ac3ccc45.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237419 From: Dmitry Sakhonchik Upstream has accepted configure option and merged it into their master branch. https://github.com/shadow-maint/shadow/pull/1618 After they release v4.20 we can remove the patch and rewrite recipe with the configure option. Fixes [YOCTO #15785] Signed-off-by: Dmitry Sakhonchik Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit b0ce3150e43cb6fb0d726cf86725715b8fd06147) Signed-off-by: Yoann Congal --- meta/recipes-extended/shadow/files/disable_syslog.patch | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/meta/recipes-extended/shadow/files/disable_syslog.patch b/meta/recipes-extended/shadow/files/disable_syslog.patch index 7299a8e61cd..9f8ffcd379d 100644 --- a/meta/recipes-extended/shadow/files/disable_syslog.patch +++ b/meta/recipes-extended/shadow/files/disable_syslog.patch @@ -2,8 +2,9 @@ When building images using shadow-native, we shouldn't be spamming the host's log with lots of syslog messages which aren't relavent. Disable syslog use in the native case. -Upstream-Status: Inappropriate [Would upstream accept a configure option?] +Upstream-Status: Inappropriate [upstream has accepted a better patch at https://github.com/shadow-maint/shadow/pull/1618] Signed-off-by: Richard Purdie +Signed-off-by: Dmitry Sakhonchik Index: shadow-4.17.2/lib/defines.h =================================================================== From patchwork Wed May 20 08:20:22 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88510 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6A9FECD5BB1 for ; Wed, 20 May 2026 08:21:23 +0000 (UTC) Received: from mail-wm1-f51.google.com (mail-wm1-f51.google.com [209.85.128.51]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7385.1779265277170903026 for ; Wed, 20 May 2026 01:21:17 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=XJ5RWhE9; spf=pass (domain: smile.fr, ip: 209.85.128.51, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f51.google.com with SMTP id 5b1f17b1804b1-488b0046078so40492275e9.1 for ; Wed, 20 May 2026 01:21:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265275; x=1779870075; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=HJQUh3B3wiA64y2/Myi3VKjPXL7aY2yWce5Bxkt0nNM=; b=XJ5RWhE9E5hY1EAiSH1QEb7cL5f4Yqco+Cwu6Cw10lweJXehIdEMKpfvkM+eIzue2M xZtv6YQGxHHUDIaf9g9XvGOSQ1G5Jd9YHsdsvV7U1bg3qeWUBdtGerFyU7Yn4BgS5SYy 1T6wIsa+5J05ME8VnRPCOh79erdWsNu2jrQso= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265275; x=1779870075; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=HJQUh3B3wiA64y2/Myi3VKjPXL7aY2yWce5Bxkt0nNM=; b=tNRgJ38XQ2giynIiDAN0tBNBooV/JWJTNm/8dQlG6/+Pp4nKBUzDBowb+G0Jpwox7u GOj/orPcuEETFXOVNYwwhQc0THC8jycNrrjKhNsKfupDjOPxltq5giBgAbIn/Er466hB hIpTho/C8q7AFSMmthzpDbqSB0CYIOLrpkZEmNhfg9xb2+Bz8eLE1+xWO3re7xmEXNDr zsB3ElHvHZNCNFF49LCgZ7PWsw790z0kqdsAcKXuWA97AolnDJkQJbD6sNuRB7UNj95d VWASOscHnUQno9ivWNYU9/ac7jwTPoykTyKOvCe2LRhiL4DIP/EmhPwSVAiNonIVcbHt X5Fg== X-Gm-Message-State: AOJu0Ywb8jW9bObnukk0ruwwKAL1ibOhAhqLUhOpGfxuW1Z9+enoOZZO TezKMmiOiQgqMpMm+BiKLYjNrVrBxTJNNMB3aJp94EdEWEvf7oMM7zbrNfJhbQ0NHgg2DS/sEHT VJa6d X-Gm-Gg: Acq92OHkebah0sqm9R/rirNJTk13KwrowSai77YKYBow0AOUE/B20xbiwqF3nMv4s5v Kue9lHuZCNgdB0byO/Eebp3D2SKq60B3yldmtCWZeP5KFahHjEtnU7r8ihovjpLe0jTv/+lxY8f bbv4zoZsHAr3Wo43AxJznEyr9FP0xme1bf64oqLfi2tV15TavqMjvlJAv9OepA/a+yIv4Zn6jnR yWQaL5IthLSCC3CJbClVKt/WmYmhxPHzxIVv1HLR5a4iUoQG+o4aDzVDowyZb+HM6aCPOk/EEwL TJE2CLlAytg6OCv4wG/NJ1oUTSp0ODL0HoNHlEUexgfENxbz9DjX+F02v6q8kQojxpuwanBqBwq u5bTuh3mwKQCtFD8wk3QIv8/PQRUFY5IXeSopjoUEiuSLu3QJ5mlCqAb1NbPUY2sEdFkLdJjz6V lhhlrcxdGsFJv5zKREl8kZl/zllKmKq15cDgZrMfh+hl7oJyyGkkINyVf7TC4+I2gbixTJFsR/Z jvmkW+PoYeMoBTVohTZic3Rlpqc20YaL5c2lMU= X-Received: by 2002:a05:600c:3096:b0:48a:5339:ef0e with SMTP id 5b1f17b1804b1-48fe5fcdf39mr233954205e9.3.1779265275189; Wed, 20 May 2026 01:21:15 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.14 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:14 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 21/28] features-check.bbclass: add reference to required TUNE_FEATURES Date: Wed, 20 May 2026 10:20:22 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237420 From: Robert P. J. Day While commit a8ef7339ecb9eee909224e7cf23ccd48ef105d93 added the string 'TUNE' to add support for checking required TUNE_FEATURES, the comment was not adjusted appropriately. Signed-off-by: Robert P. J. Day Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 66e76b68460d5d7480e686ed2d94090d69fb4b90) Signed-off-by: Yoann Congal --- meta/classes-recipe/features_check.bbclass | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/classes-recipe/features_check.bbclass b/meta/classes-recipe/features_check.bbclass index 46d8243cb6b..d69cfb8309f 100644 --- a/meta/classes-recipe/features_check.bbclass +++ b/meta/classes-recipe/features_check.bbclass @@ -1,6 +1,6 @@ # Allow checking of required and conflicting features # -# xxx = [DISTRO,MACHINE,COMBINED,IMAGE] +# xxx = [DISTRO,MACHINE,COMBINED,IMAGE,TUNE] # # ANY_OF_xxx_FEATURES: ensure at least one item on this list is included # in xxx_FEATURES. From patchwork Wed May 20 08:20:23 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88507 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 17C9FCD5BAE for ; Wed, 20 May 2026 08:21:23 +0000 (UTC) Received: from mail-wr1-f41.google.com (mail-wr1-f41.google.com [209.85.221.41]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7288.1779265278216757831 for ; Wed, 20 May 2026 01:21:18 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=YCi1Qw9Q; spf=pass (domain: smile.fr, ip: 209.85.221.41, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f41.google.com with SMTP id ffacd0b85a97d-43fe608cb92so2801214f8f.2 for ; Wed, 20 May 2026 01:21:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265276; x=1779870076; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=anIYBu1zkZjK1cbWlFzdT2gKSQQvZGvTcy0l8NTP14M=; b=YCi1Qw9QGazeZYA9VhwY6GVi4G4x2lQE3r467daZjvYfxZ0F71owh6nUu23+qsSLbg fpBHWHz7jmHHjVBuy3/Y7GGB++TJFJirQRAkeYP340bfrHNKLuTOMx2k3+s1YL0KYjeU 0Rb0v2ONI9mpR0xkVfWeVUv3itF8IL8H/VraM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265276; x=1779870076; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=anIYBu1zkZjK1cbWlFzdT2gKSQQvZGvTcy0l8NTP14M=; b=mM6Ddo89Fc3jF5PwmLzOoEhSoriGzn3XqXi3pK0mmNCikGy+OiZzWP8qUutZm1lijT 2ngCsHA2Y8AfkuK7IMerheaGY7DIRxC8MHmeGMZVE3lg/ORq0YSlAC7BEuULvBBQlbd5 BNFOee5IZfVGmOkso8d8iumjHD7bRg6sQTo8FWb/0kt5eAevfTzJf4HTg9s05hfwDSwY VS8FLq7eN5YYcD/g02R98OnvTxiWfWrQTPX3yCLN6CVPNBvYppTqDrqvJWn2wSzZJ8Xy FilO06YylbcZQsNri+bvxLT77cTPI4OD4d9fKNc5mDpqa8KPfXioqlZxwXA5ijRRk2hD u2Ug== X-Gm-Message-State: AOJu0YxFdZ3BSu/3YeNKtfKHhf5x6vI+iloMr9CyK0EqKb5pO/gIRgr7 LUk7ctGwXrY9fm5pBjth+R2p49ixyI9rSXllNN41LrgM2gbJoiVRSkDi+JG+HqwuO9AUn4kXlWg cIGSr X-Gm-Gg: Acq92OHevW44SE17cr2RfeRUUVu0f4n2XmBT4jLCjZRE7TAIqPl8KE/rpfr7rgerKMp CrURuqQCicgflPyfBe5SmfvCl294aAQkyfEZX7guz3dM6rKpI0tnAc6F7X5cyp06SgDbMjyTroY ZWfHkGTM9ZVnH0vR1hCQJD63oyVPXJIZJGK3dM9/YZsflxSR1Xbi5F3aG3NXYdt5j85zvXFg8wm 7/YP2+e/MFNSL+226pRmQFSDtrt2fgJzsZUJ161iShqq3Ro89erNE5O/30ootO7BUgKqferdXYC e+K+UDLQAtqSeEi0wXkO/Hk1Z+5MREriZ0kF0TdQlfPRWZX6gFxzWQKx25KgBao+fVo5ulcDcRA IlRM7mplb0fqluQ1gBdCNamuLOknntu+HetSE1Xro/hwb1ZHgtd5ixPb7zxQEzs9gPo7h1tyuBX 6BqTeCDfhW1Pq6NOBmSBaiEg0jfc8HaAfjdmNq5RtOdPPdkI71ZiOOcfAPD+axJERj27e1Laq+F dobXAdGhxX29IH1FeTsrui6b4YW X-Received: by 2002:a05:6000:4205:b0:44f:9b70:2996 with SMTP id ffacd0b85a97d-45e5c5bfba8mr36151726f8f.21.1779265276397; Wed, 20 May 2026 01:21:16 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.15 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:15 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 22/28] scripts/makefile-getvar: quote MAKEFILE variable Date: Wed, 20 May 2026 10:20:23 +0200 Message-ID: <0582dfa5c472dc646e629a5b9a54c8505cf1c463.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237421 From: Thomas Perrot $MAKEFILE was unquoted in the -f test and the error echo, causing word-splitting on paths that contain spaces. Signed-off-by: Thomas Perrot Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit c98243b8e2a5f1e538024131ca94991c5befc59f) Signed-off-by: Yoann Congal --- scripts/makefile-getvar | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/scripts/makefile-getvar b/scripts/makefile-getvar index e8a98327667..238d9567adc 100755 --- a/scripts/makefile-getvar +++ b/scripts/makefile-getvar @@ -20,8 +20,8 @@ fi MAKEFILE=$1 shift -if [ ! -f $MAKEFILE ]; then - echo $MAKEFILE is not a file +if [ ! -f "$MAKEFILE" ]; then + echo "$MAKEFILE is not a file" exit 1 fi From patchwork Wed May 20 08:20:24 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88512 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 09749CD5BAB for ; Wed, 20 May 2026 08:21:23 +0000 (UTC) Received: from mail-wr1-f41.google.com (mail-wr1-f41.google.com [209.85.221.41]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7386.1779265279622986865 for ; Wed, 20 May 2026 01:21:19 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=0GOcdd26; spf=pass (domain: smile.fr, ip: 209.85.221.41, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f41.google.com with SMTP id ffacd0b85a97d-448528f4e69so3065027f8f.3 for ; Wed, 20 May 2026 01:21:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265278; x=1779870078; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=YjZZwB88iyXv+Wg8PJsNx6pFv6vITMjqY/t15R+7g6w=; b=0GOcdd26bLJETYFM2PQM6mPshvRU5Rn+rlViG8MNYEednoaH5Uey76/7lHt6egLKMP RxaOuPuAcOgIwUbwCx6IWsRfsyhkW8C+mOnIvUB/cuYCqe48FSO+HVZxphASQnb6XWk/ jU55w9piIcVjMMc3gVa+1qolLdxsiSR/ZW+NU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265278; x=1779870078; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=YjZZwB88iyXv+Wg8PJsNx6pFv6vITMjqY/t15R+7g6w=; b=FopjN3YwA2Xu49anTe7x/EnOkkMZ9VAHeVQwp5pJhqiQlr7nmbQKkZ6TxwX/izRLdq Arl90IJbK5mTD17dP/NDBL/uHZ897EDKCO5xT/IRDS8OUUdApW9Z05/LpMaNOYjFwOun cvYjqkep70bEr9DVkCgrQMOUnRjJVeFIZGfkGD3lj5HA8dW2OGVZeXBCzKc5vaVdtBjd Dzz5rKINBZLCgI4YcUWtdqRyRJL/OkXb9hpwjklPHchiy/u9x9N22Nn9j0miFjzGEnuT qVV106KrDL1tWMQKCkeFZ86oAhD5RQeG7D0mDeq5eRG0VoQ41vc57YPGQY8HFXwiUy23 /NCw== X-Gm-Message-State: AOJu0YwyTiv7IkA5FO7liRbx1vBwR9w72+icd9CTMvaRn2NOshP0LcPW Xz37Mqq7jY7r9DFxzIXbgKpCtvpp0Ql4rRDUYJ999KHdJXX068/CaXVB/Xu+qXCIh0xwNef4HFx X6ypN X-Gm-Gg: Acq92OGdTC0CWBbiuUXFCaVkc22yjCtucwcVXzu/LwHQ8GvMx9kdh0zNPzJSRoEGLpi Fk1/7BLrkEIMLd0IlscXdsj/tAJv4iaoiNVbxF7GFIKrpZ1XW/QNIC+MTF6maX4O4va211LcTwE 4Qmu3MGyQS/KA+ZW6SpphYz+nWE+s0uDiemeuULWHN1i6In58DG9PLv38w2/OgRIbyT/IY/haf3 xFy9RzQpC14aIKotIFoTBSlce1o0YFcg5guRCGSt3TeV22Rznm4Xnf81H0LVn0dtbuymUSz2eUs ltlNrojcatN5syfGzNLlIN+O2025UWEWW1RRWHdr42sehR1W8NYTuYrKPDaLGUCmWN6XAEWNaEH W/UVJGtunqkIBrAjxALmpDUehUHvjW2G1nGK7awocuGQhyEhEUULaDS1Y5IeCxzsc6rIEzu58Kr i4bLHHTUy8/zy7GOolXposXjdxjrad5Gv1MqgXR28n/KWvX8KhlVhGs+bCWzo4A0Vsj3aSEGFGp wLH7WsmCUUjFl4lmdj2DI/Lpx9fS4+tqmr1FhQ= X-Received: by 2002:a5d:5d13:0:b0:448:659b:abec with SMTP id ffacd0b85a97d-45e5c57d6b1mr36683661f8f.8.1779265277704; Wed, 20 May 2026 01:21:17 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:17 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 23/28] qemu: fix iotlb_to_section() for different AddressSpace Date: Wed, 20 May 2026 10:20:24 +0200 Message-ID: <7f88fba567a19791e51a8d89dde542c72b11acff.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237422 From: Quan Sun Backport upstream commit 854cd16e318e ("accel/tcg: Fix iotlb_to_section() for different AddressSpace") to qemu 10.2.0. The bug causes incorrect memory load/store when CPU access goes through an IOMMUMemoryRegion that returns a different target AddressSpace, and the fix replaces the section_index lookup with a direct MemoryRegionSection pointer stored in CPUTLBEntryFull. Note that the fix primarily targets ARM/RISC-V, but since it eliminates iotlb_to_section() and performs the lookup based on CPUTLBEntryFull, it may also help address some currently observed QEMU boot issues on x86, e.g. the https://bugzilla.yoctoproject.org/show_bug.cgi?id=16259. AI-Generated: kiro-cli Signed-off-by: Quan Sun Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 1b09f50c4e607bb6f2b120fe3bf0141bac46a078) Signed-off-by: Yoann Congal --- meta/recipes-devtools/qemu/qemu.inc | 1 + ...tlb_to_section-for-different-Address.patch | 274 ++++++++++++++++++ 2 files changed, 275 insertions(+) create mode 100644 meta/recipes-devtools/qemu/qemu/0001-accel-tcg-Fix-iotlb_to_section-for-different-Address.patch diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index 8abe366284e..5f30416a483 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc @@ -33,6 +33,7 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \ file://0010-configure-lookup-meson-exutable-from-PATH.patch \ file://0011-qemu-Ensure-pip-and-the-python-venv-aren-t-used-for-.patch \ file://0001-linux-user-elfload.c-Correction-to-HWCAP2-accessor.patch \ + file://0001-accel-tcg-Fix-iotlb_to_section-for-different-Address.patch \ file://qemu-guest-agent.init \ file://qemu-guest-agent.udev \ " diff --git a/meta/recipes-devtools/qemu/qemu/0001-accel-tcg-Fix-iotlb_to_section-for-different-Address.patch b/meta/recipes-devtools/qemu/qemu/0001-accel-tcg-Fix-iotlb_to_section-for-different-Address.patch new file mode 100644 index 00000000000..d19f872fc3d --- /dev/null +++ b/meta/recipes-devtools/qemu/qemu/0001-accel-tcg-Fix-iotlb_to_section-for-different-Address.patch @@ -0,0 +1,274 @@ +From 858e6bb252e075e09cca6e78299151d3af0bf5fb Mon Sep 17 00:00:00 2001 +From: Quan Sun +Date: Tue, 28 Apr 2026 14:56:36 -0400 +Subject: [PATCH] accel/tcg: Fix iotlb_to_section() for different AddressSpace +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +'CPUTLBEntryFull.xlat_section' stores section_index in last 12 bits to +find the correct section when CPU access the IO region over the IOTLB. +However, section_index is only unique inside single AddressSpace. If +address space translation is over IOMMUMemoryRegion, it could return +section from other AddressSpace. 'iotlb_to_section()' API only finds the +sections from CPU's AddressSpace so that it couldn't find section in +other AddressSpace. Thus, using 'iotlb_to_section()' API will find the +wrong section and QEMU will have wrong load/store access. + +To fix this bug of iotlb_to_section(), store complete MemoryRegionSection +pointer in CPUTLBEntryFull to replace the section_index in xlat_section. +Rename 'xlat_section' to 'xlat_offset' as we remove last 12 bits +section_index inside. Also, since we directly use section pointer in the +CPUTLBEntryFull (full->section), we can remove the unused functions: +iotlb_to_section(), memory_region_section_get_iotlb(). + +This bug occurs only when +(1) IOMMUMemoryRegion is in the path of CPU access. +(2) IOMMUMemoryRegion returns different target_as and the section is in +the IO region. + +This patch incorporates prerequisite changes from upstream commit +94c6e9cf0440 ("accel/tcg: Send the CPUTLBEntryFull struct into +io_prepare()") needed for the fix to apply cleanly. + +Upstream-Status: Backport [https://gitlab.com/qemu-project/qemu/-/commit/854cd16e318eed12de2995014b28d9f374c64bf7] + +Signed-off-by: Jim Shu +Reviewed-by: Philippe Mathieu-Daudé +Tested-by: Mark Burton +Reviewed-by: Pierrick Bouvier +Signed-off-by: Philippe Mathieu-Daudé +Signed-off-by: Quan Sun +--- + accel/tcg/cputlb.c | 32 +++++++++++++++----------------- + include/accel/tcg/iommu.h | 15 --------------- + include/exec/cputlb.h | 4 ++-- + include/hw/core/cpu.h | 17 +++++++++-------- + system/physmem.c | 25 ------------------------- + 5 files changed, 26 insertions(+), 67 deletions(-) + +diff --git a/accel/tcg/cputlb.c b/accel/tcg/cputlb.c +index fd1606c85..fa0f4d8b3 100644 +--- a/accel/tcg/cputlb.c ++++ b/accel/tcg/cputlb.c +@@ -1089,7 +1089,7 @@ void tlb_set_page_full(CPUState *cpu, int mmu_idx, + } + } else { + /* I/O or ROMD */ +- iotlb = memory_region_section_get_iotlb(cpu, section) + xlat; ++ iotlb = xlat; + /* + * Writes to romd devices must go through MMIO to enable write. + * Reads to romd devices go through the ram_ptr found above, +@@ -1140,10 +1140,9 @@ void tlb_set_page_full(CPUState *cpu, int mmu_idx, + /* + * When memory region is ram, iotlb contains a TARGET_PAGE_BITS + * aligned ram_addr_t of the page base of the target RAM. +- * Otherwise, iotlb contains +- * - a physical section number in the lower TARGET_PAGE_BITS +- * - the offset within section->mr of the page base (I/O, ROMD) with the +- * TARGET_PAGE_BITS masked off. ++ * Otherwise, iotlb contains a TARGET_PAGE_BITS aligned ++ * offset within section->mr of the page base (I/O, ROMD) ++ * + * We subtract addr_page (which is page aligned and thus won't + * disturb the low bits) to give an offset which can be added to the + * (non-page-aligned) vaddr of the eventual memory access to get +@@ -1153,7 +1152,8 @@ void tlb_set_page_full(CPUState *cpu, int mmu_idx, + */ + desc->fulltlb[index] = *full; + full = &desc->fulltlb[index]; +- full->xlat_section = iotlb - addr_page; ++ full->xlat_offset = iotlb - addr_page; ++ full->section = section; + full->phys_addr = paddr_page; + + /* Now calculate the new entry */ +@@ -1269,14 +1269,14 @@ static inline void cpu_unaligned_access(CPUState *cpu, vaddr addr, + } + + static MemoryRegionSection * +-io_prepare(hwaddr *out_offset, CPUState *cpu, hwaddr xlat, ++io_prepare(hwaddr *out_offset, CPUState *cpu, CPUTLBEntryFull *full, + MemTxAttrs attrs, vaddr addr, uintptr_t retaddr) + { + MemoryRegionSection *section; + hwaddr mr_offset; + +- section = iotlb_to_section(cpu, xlat, attrs); +- mr_offset = (xlat & TARGET_PAGE_MASK) + addr; ++ section = full->section; ++ mr_offset = full->xlat_offset + addr; + cpu->mem_io_pc = retaddr; + if (!cpu->neg.can_do_io) { + cpu_io_recompile(cpu, retaddr); +@@ -1335,7 +1335,7 @@ static bool victim_tlb_hit(CPUState *cpu, size_t mmu_idx, size_t index, + static void notdirty_write(CPUState *cpu, vaddr mem_vaddr, unsigned size, + CPUTLBEntryFull *full, uintptr_t retaddr) + { +- ram_addr_t ram_addr = mem_vaddr + full->xlat_section; ++ ram_addr_t ram_addr = mem_vaddr + full->xlat_offset; + + trace_memory_notdirty_write_access(mem_vaddr, ram_addr, size); + +@@ -1592,9 +1592,7 @@ bool tlb_plugin_lookup(CPUState *cpu, vaddr addr, int mmu_idx, + + /* We must have an iotlb entry for MMIO */ + if (tlb_addr & TLB_MMIO) { +- MemoryRegionSection *section = +- iotlb_to_section(cpu, full->xlat_section & ~TARGET_PAGE_MASK, +- full->attrs); ++ MemoryRegionSection *section = full->section; + data->is_io = true; + data->mr = section->mr; + } else { +@@ -1980,7 +1978,7 @@ static uint64_t do_ld_mmio_beN(CPUState *cpu, CPUTLBEntryFull *full, + tcg_debug_assert(size > 0 && size <= 8); + + attrs = full->attrs; +- section = io_prepare(&mr_offset, cpu, full->xlat_section, attrs, addr, ra); ++ section = io_prepare(&mr_offset, cpu, full, attrs, addr, ra); + mr = section->mr; + + BQL_LOCK_GUARD(); +@@ -2001,7 +1999,7 @@ static Int128 do_ld16_mmio_beN(CPUState *cpu, CPUTLBEntryFull *full, + tcg_debug_assert(size > 8 && size <= 16); + + attrs = full->attrs; +- section = io_prepare(&mr_offset, cpu, full->xlat_section, attrs, addr, ra); ++ section = io_prepare(&mr_offset, cpu, full, attrs, addr, ra); + mr = section->mr; + + BQL_LOCK_GUARD(); +@@ -2521,7 +2519,7 @@ static uint64_t do_st_mmio_leN(CPUState *cpu, CPUTLBEntryFull *full, + tcg_debug_assert(size > 0 && size <= 8); + + attrs = full->attrs; +- section = io_prepare(&mr_offset, cpu, full->xlat_section, attrs, addr, ra); ++ section = io_prepare(&mr_offset, cpu, full, attrs, addr, ra); + mr = section->mr; + + BQL_LOCK_GUARD(); +@@ -2541,7 +2539,7 @@ static uint64_t do_st16_mmio_leN(CPUState *cpu, CPUTLBEntryFull *full, + tcg_debug_assert(size > 8 && size <= 16); + + attrs = full->attrs; +- section = io_prepare(&mr_offset, cpu, full->xlat_section, attrs, addr, ra); ++ section = io_prepare(&mr_offset, cpu, full, attrs, addr, ra); + mr = section->mr; + + BQL_LOCK_GUARD(); +diff --git a/include/accel/tcg/iommu.h b/include/accel/tcg/iommu.h +index 90cfd6c0e..547f8ea0e 100644 +--- a/include/accel/tcg/iommu.h ++++ b/include/accel/tcg/iommu.h +@@ -14,18 +14,6 @@ + #include "exec/hwaddr.h" + #include "exec/memattrs.h" + +-/** +- * iotlb_to_section: +- * @cpu: CPU performing the access +- * @index: TCG CPU IOTLB entry +- * +- * Given a TCG CPU IOTLB entry, return the MemoryRegionSection that +- * it refers to. @index will have been initially created and returned +- * by memory_region_section_get_iotlb(). +- */ +-MemoryRegionSection *iotlb_to_section(CPUState *cpu, +- hwaddr index, MemTxAttrs attrs); +- + MemoryRegionSection *address_space_translate_for_iotlb(CPUState *cpu, + int asidx, + hwaddr addr, +@@ -34,8 +22,5 @@ MemoryRegionSection *address_space_translate_for_iotlb(CPUState *cpu, + MemTxAttrs attrs, + int *prot); + +-hwaddr memory_region_section_get_iotlb(CPUState *cpu, +- MemoryRegionSection *section); +- + #endif + +diff --git a/include/exec/cputlb.h b/include/exec/cputlb.h +index 9bec0e789..16f866990 100644 +--- a/include/exec/cputlb.h ++++ b/include/exec/cputlb.h +@@ -43,8 +43,8 @@ void tlb_reset_dirty_range_all(ram_addr_t start, ram_addr_t length); + * @full: the details of the tlb entry + * + * Add an entry to @cpu tlb index @mmu_idx. All of the fields of +- * @full must be filled, except for xlat_section, and constitute +- * the complete description of the translated page. ++ * @full must be filled, except for xlat_offset & section, and ++ * constitute the complete description of the translated page. + * + * This is generally called by the target tlb_fill function after + * having performed a successful page table walk to find the physical +diff --git a/include/hw/core/cpu.h b/include/hw/core/cpu.h +index 961505177..a3db3f66f 100644 +--- a/include/hw/core/cpu.h ++++ b/include/hw/core/cpu.h +@@ -214,15 +214,16 @@ typedef uint32_t MMUIdxMap; + */ + struct CPUTLBEntryFull { + /* +- * @xlat_section contains: +- * - in the lower TARGET_PAGE_BITS, a physical section number +- * - with the lower TARGET_PAGE_BITS masked off, an offset which +- * must be added to the virtual address to obtain: +- * + the ram_addr_t of the target RAM (if the physical section +- * number is PHYS_SECTION_NOTDIRTY or PHYS_SECTION_ROM) +- * + the offset within the target MemoryRegion (otherwise) ++ * @xlat_offset: TARGET_PAGE_BITS aligned offset which must be added to ++ * the virtual address to obtain: ++ * + the ram_addr_t of the target RAM (if the physical section ++ * number is PHYS_SECTION_NOTDIRTY or PHYS_SECTION_ROM) ++ * + the offset within the target MemoryRegion (otherwise) + */ +- hwaddr xlat_section; ++ hwaddr xlat_offset; ++ ++ /* @section contains physical section. */ ++ MemoryRegionSection *section; + + /* + * @phys_addr contains the physical address in the address space +diff --git a/system/physmem.c b/system/physmem.c +index c9869e404..a21e7ca64 100644 +--- a/system/physmem.c ++++ b/system/physmem.c +@@ -748,31 +748,6 @@ translate_fail: + return &d->map.sections[PHYS_SECTION_UNASSIGNED]; + } + +-MemoryRegionSection *iotlb_to_section(CPUState *cpu, +- hwaddr index, MemTxAttrs attrs) +-{ +- int asidx = cpu_asidx_from_attrs(cpu, attrs); +- CPUAddressSpace *cpuas = &cpu->cpu_ases[asidx]; +- AddressSpaceDispatch *d = address_space_to_dispatch(cpuas->as); +- int section_index = index & ~TARGET_PAGE_MASK; +- MemoryRegionSection *ret; +- +- assert(section_index < d->map.sections_nb); +- ret = d->map.sections + section_index; +- assert(ret->mr); +- assert(ret->mr->ops); +- +- return ret; +-} +- +-/* Called from RCU critical section */ +-hwaddr memory_region_section_get_iotlb(CPUState *cpu, +- MemoryRegionSection *section) +-{ +- AddressSpaceDispatch *d = flatview_to_dispatch(section->fv); +- return section - d->map.sections; +-} +- + #endif /* CONFIG_TCG */ + + void cpu_address_space_init(CPUState *cpu, int asidx, +-- +2.43.0 From patchwork Wed May 20 08:20:25 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88506 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EAF7ECD5BA4 for ; Wed, 20 May 2026 08:21:22 +0000 (UTC) Received: from mail-wr1-f54.google.com (mail-wr1-f54.google.com [209.85.221.54]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7289.1779265280572740410 for ; Wed, 20 May 2026 01:21:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=kyrLn/c6; spf=pass (domain: smile.fr, ip: 209.85.221.54, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f54.google.com with SMTP id ffacd0b85a97d-44dd5cb0f81so3701533f8f.0 for ; Wed, 20 May 2026 01:21:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265279; x=1779870079; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=lAqmdYoD2V9fx5+lSC9pNNKABSsBgz6M2WYY9oXERm0=; b=kyrLn/c6vHNE39xYvpukwIFf3EraPSXaJDVMiYsw3G93dLdrOxYxhJI8L6V0A0w/Sz CNu7yQTwHZ3RVhvlj7f5uV1Q4gpCr+5A7qi2XI1W9rHT15djfuH1jlzsXeSHaKkwDv7P 5T2VmUZDpdcy/0Jz0dBjOiILVVZxyY/N2C/EI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265279; x=1779870079; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=lAqmdYoD2V9fx5+lSC9pNNKABSsBgz6M2WYY9oXERm0=; b=ed8ZaKmddLEeYUYIRowMK7i13FE2Jz8a4ymBQcGZf/nzHw0of6/GJE6x+WW6CG7tZY L5+LhBRIJ4DLmIMkL1ASuy4EIX/lu+GegZFSjRCqQ9VgGShTiwP/QVa3W6KMC0Cb2N3L LpgiltTWh0Lk62ImGQnMfxHjY56yGOpt3+QkMUm8Cp9iNINtpwnCL47TEl/z5Sxrk91V WO/EvZEQuO8/i6Y04k86NjEA8C98sNigKOAxDtzaGpoXdMrSKM9i5qg4rnTPQAoYNcVS fQ6el32eRu+HyBLBOCFY5xtYIhg1ltzpKxCyh846YTz1PuUs5LUPyV8PClDfCrOsLCD9 vdeg== X-Gm-Message-State: AOJu0Yx6i9EGWdDToSXYEpG4BMGM9hpG3TVo4rm2EjsRX6KxURRUrGNW ovbts5cm8qeUIqZufS2cEKej7yDl3t9x+N0JzX6tK0vCVLuVb8Gz02z5t5XGb5UAP0Rg6ayNx2E KR2eQ X-Gm-Gg: Acq92OGcmSHmL4dNZQoc870o/2GpO2pu41ScVa4tBtZEjJ5dnBxSADyo58GK2i6IMu+ 83wLKPyHZYATr4gO91E83BP8LOQkowNjMnrSgkaQO2Md8mbNFzgQKLgN1AEPz0/jwOSczOXFc2E B2dBd8CVwpLnB/PEWGjFzJUtHx6vK+HWFXGt352G7GkvryCqnlxsoIJJEwTM5dP8jl5PrqiI5fK BISAmj4Pj/PtBIeaaSh/eeGiF0d0or+26GsERHV6JXgZ0OkXdpkZuPcM7cM0rqoH37z2U49zRuE sy5af4aMJo9G6yDhypLSC6tJheIMbaA87YMx4mXjArWu0TI2gkERO8UMKff/Xx9P8Sb7dVYUnIy n8Cxo5xZ+L1YUgJwtwWAVKby91RbEFYx8ilWC8emjLj8aBx57UTLYXuPEpVx1ZTTWfOqOR7ayfO 5mv0x3z6Czr+rHMFzDqzdlA43XvRyyZRU1KpPkuKLkowEKTRZ/pdGPX+uh8ES8TSGWX9nX7ypny KPeSVasSmU7pGPs8D50sQ6vRITy X-Received: by 2002:a05:600c:570a:b0:48f:c649:e6fa with SMTP id 5b1f17b1804b1-48fd636a2f4mr269143835e9.15.1779265278696; Wed, 20 May 2026 01:21:18 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:18 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 24/28] sbom-cve-check: set PV from upstream tags and ensure version checks are correct Date: Wed, 20 May 2026 10:20:25 +0200 Message-ID: <61189f25d1e9bef1c1e28ad69493862292682035.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:22 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237423 From: Alexander Kanavin These recipes didn't set PV, which by default is 1.0. This isn't correct: upstream does provide date-based tags that can be used to perform version upgrades. Signed-off-by: Alexander Kanavin Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit d8d4dee746e86d746295c5b7ab1b880bb427e0a4) Signed-off-by: Yoann Congal --- ...ve.bb => sbom-cve-check-update-cvelist-native_2026-05-07.bb} | 2 +- ...bb => sbom-cve-check-update-nvd-native_2026.05.07-000006.bb} | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-devtools/sbom-cve-check/{sbom-cve-check-update-cvelist-native.bb => sbom-cve-check-update-cvelist-native_2026-05-07.bb} (88%) rename meta/recipes-devtools/sbom-cve-check/{sbom-cve-check-update-nvd-native.bb => sbom-cve-check-update-nvd-native_2026.05.07-000006.bb} (90%) diff --git a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native_2026-05-07.bb similarity index 88% rename from meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb rename to meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native_2026-05-07.bb index 3763e7f21f7..7670172c40b 100644 --- a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native.bb +++ b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-cvelist-native_2026-05-07.bb @@ -6,7 +6,7 @@ HOMEPAGE = "https://github.com/CVEProject/cvelistV5" SRC_URI = "git://github.com/CVEProject/cvelistV5.git;branch=main;protocol=https;destsuffix=" SBOM_CVE_CHECK_DB_NAME = "cvelist" -# cve_2026-05-07_1300Z SRCREV = "dd0e93c75034d0167498174c886a56729edc44de" +UPSTREAM_CHECK_GITTAGREGEX = "(?P.+)_baseline" require sbom-cve-check-update-db.inc diff --git a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native_2026.05.07-000006.bb similarity index 90% rename from meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb rename to meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native_2026.05.07-000006.bb index 26a14e6eb16..02446e30cee 100644 --- a/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native.bb +++ b/meta/recipes-devtools/sbom-cve-check/sbom-cve-check-update-nvd-native_2026.05.07-000006.bb @@ -6,7 +6,7 @@ HOMEPAGE = "https://github.com/fkie-cad/nvd-json-data-feeds" SRC_URI = "git://github.com/fkie-cad/nvd-json-data-feeds.git;branch=main;protocol=https;destsuffix=" SBOM_CVE_CHECK_DB_NAME = "nvd-fkie" -# v2026.05.07-000006 SRCREV = "72d8841c8ad9083ebf6723063f275444ea0d76f9" +UPSTREAM_CHECK_GITTAGREGEX = "v(?P.+)" require sbom-cve-check-update-db.inc From patchwork Wed May 20 08:20:26 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88505 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D8D60CD4F3C for ; Wed, 20 May 2026 08:21:22 +0000 (UTC) Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7388.1779265282186048763 for ; Wed, 20 May 2026 01:21:22 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=TOBOXj+i; spf=pass (domain: smile.fr, ip: 209.85.221.46, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f46.google.com with SMTP id ffacd0b85a97d-43d75312379so3759679f8f.1 for ; Wed, 20 May 2026 01:21:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265280; x=1779870080; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8aV4GRZRpdMpkdCgv6z1BTGvWW7cmgc/G+pwWTzGnH0=; b=TOBOXj+iH8ftFbuvzFHW75Z0/TglEQOsuLkAxuKxLRi+W/8BzqMI9a4DwLv+dF8BXh KEDYZPjJ98Fld2TYf1hvH6NUbmzXR09Zjf8q/S3smykxLD+FsUKAsBCfrP422X3fL3EY vX9CZdcpgpfS504qleghjfvDjYlN5zDRzKXVQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265280; x=1779870080; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=8aV4GRZRpdMpkdCgv6z1BTGvWW7cmgc/G+pwWTzGnH0=; b=MMdp6kvOcFpi4gFyP2Ll3wVt0wtjBGkhWTvOnkvqRIsBMAVk3efbHrCqpXtBlBL0Dt ZML43BYMP2/9tlB6sME3DFSN8Rw7H1x36lo8F/mZGcrbRAyUgSdpDq534+YQJ4H03ZDw UI4UiHXRFWybQH+xEmcWvU6sqSqt2oT9O/evo5DTWUVKNmxaw0IUN1qh1OlJXCVAoqtf KnKuWiWbpX1f0LjIdtCczWH1LVuYQVHCXJE2SQMBnPZYSvzkNeITHvvJY7mOuhloEVLY 5pbs5eNcJVu6805FvRi0u6LvGnrprTaZcwE9d6t3lm4PfxJpnLX7fmLCfH247h5aB5Ac /gpA== X-Gm-Message-State: AOJu0YxMVjUC6S9p3TdvZrr6N8gyYcia6yodWsJ+qZMBtqziZKpl1bWj RHlLXHVYy0XWjti/SfTPzxsVPCFyKjQTQ/AT+XMimJ3L1oM9Tq1TaixzKHctUEt+WLl8sLag6Kt QImWo X-Gm-Gg: Acq92OEQZJs8njdTPVORRczJsqcHCjUC8eM3kDseElCrWtJPFcc7/eKD06ly9JyX0p6 gLSp6YIbFOxiHLcUsYEzls2k6ODTVaJxIKeWPspASsmsJNdDiLw1wPRS9Lvw7QpUrLiOLG8ws8Y guPhn+lCvRVlO3CVRASXQKtFqIMpypYwm9amm+mFDIDZF1A3SbPXL30siCR/VfGYEdFL5yoEST+ ENGbtGzF2iEOJb/6U5ntiQuC/cAxqPKDrDrEuIpm+UCILsTM6OcHLoDq3jnG92475ZATKd1KPRc nBWZzyUzHQoMvJsoh16tFA4YRKzz4RLezZnlUlCpdVnPkZyPz1TiT9aFSJGyXADU/fg/MpDw7Dh klV8NjocX1JTz3PwAXArK+4G71EsmGj3ftZtpHzF1KhQIPONCbiD6BAXcKWmUR0Gbc0ifRScmMw TZAzopTBHJrjE4Pyl3DVQ426tmJbesNVaHNYeQ54ya1uPRPnsEK7W0qKaSNWdJBKmJBr0/eGY8z BlvNiyuez11sA+N8eGfvESf4lYxbzwmKLjNvbQ= X-Received: by 2002:a05:600c:8905:b0:48e:89fa:9811 with SMTP id 5b1f17b1804b1-48fd6361dc2mr345075455e9.13.1779265280281; Wed, 20 May 2026 01:21:20 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.18 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:19 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 25/28] bluez5: add patches to fix 8.56 gatt issue Date: Wed, 20 May 2026 10:20:26 +0200 Message-ID: <6a3d8f5a481a54bbf4859e5a2d3968b103a15a4e.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:22 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237424 From: Jinwang Li btd_gatt_client_service_removed() can be called reentrantly via bt_gatt_client_unref() after the services queue has already been freed, resulting in a use-after-free. Reset client->ready to false before destroying the services queue to prevent reentrant calls from dereferencing freed memory. Upstream-Status: Backport [bluez/bluez@d01616f] Signed-off-by: Jinwang Li Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 37f8b40d68bdac279d363d946b935716e2843d00) Signed-off-by: Yoann Congal --- meta/recipes-connectivity/bluez5/bluez5.inc | 1 + ...use-after-free-caused-by-reentrant-c.patch | 59 +++++++++++++++++++ 2 files changed, 60 insertions(+) create mode 100644 meta/recipes-connectivity/bluez5/bluez5/0001-gatt-client-Fix-use-after-free-caused-by-reentrant-c.patch diff --git a/meta/recipes-connectivity/bluez5/bluez5.inc b/meta/recipes-connectivity/bluez5/bluez5.inc index 843e36b78de..c792cc9c66c 100644 --- a/meta/recipes-connectivity/bluez5/bluez5.inc +++ b/meta/recipes-connectivity/bluez5/bluez5.inc @@ -70,6 +70,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/bluetooth/bluez-${PV}.tar.xz \ file://0001-tests-add-a-target-for-building-tests-without-runnin.patch \ file://0001-Revert-shared-shell-Don-t-init-input-for-non-interac.patch \ file://0001-tools-Work-around-broken-stdin-handling-in-home-made.patch \ + file://0001-gatt-client-Fix-use-after-free-caused-by-reentrant-c.patch \ " S = "${UNPACKDIR}/bluez-${PV}" diff --git a/meta/recipes-connectivity/bluez5/bluez5/0001-gatt-client-Fix-use-after-free-caused-by-reentrant-c.patch b/meta/recipes-connectivity/bluez5/bluez5/0001-gatt-client-Fix-use-after-free-caused-by-reentrant-c.patch new file mode 100644 index 00000000000..0fcbc0808a2 --- /dev/null +++ b/meta/recipes-connectivity/bluez5/bluez5/0001-gatt-client-Fix-use-after-free-caused-by-reentrant-c.patch @@ -0,0 +1,59 @@ +From 45c167591d04e2dfecf5b4642168e54c23abbd40 Mon Sep 17 00:00:00 2001 +From: Jinwang Li +Date: Sun, 26 Apr 2026 21:25:15 +0800 +Subject: [PATCH 2/2] gatt-client: Fix use-after-free caused by reentrant + client teardown + +btd_gatt_client_service_removed() can be called reentrantly via +bt_gatt_client_unref() after the services queue has already been freed, +resulting in a use-after-free. + +Reset client->ready to false before destroying the services queue to +prevent reentrant calls from dereferencing freed memory. + +This was found with the following backtrace: + + #0 match_service_handle () + #1 queue_remove_if () + #2 queue_remove_all () + #3 btd_gatt_client_service_removed () + #4 gatt_service_removed () + #5 handle_notify () + #6 queue_foreach () + #7 notify_service_changed () + #8 gatt_db_service_destroy () + #9 queue_remove_all () + #10 gatt_db_clear_range () + #11 service_changed_failure () + #12 discovery_op_unref () + #13 bt_gatt_request_unref () + #14 bt_gatt_client_cancel_all () + #15 bt_gatt_client_free () + #16 bt_gatt_client_unref () + #17 bt_gatt_client_free () + #18 bt_gatt_client_unref () + #19 btd_gatt_client_destroy () + #20 device_free () + +Signed-off-by: Jinwang Li +Upstream-Status: Backport [commit d01616f0c276a441dad8afe4e8f7bb261b26ba0a] +--- + src/gatt-client.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/src/gatt-client.c b/src/gatt-client.c +index 374e67c..3baf95c 100644 +--- a/src/gatt-client.c ++++ b/src/gatt-client.c +@@ -2261,6 +2261,8 @@ void btd_gatt_client_destroy(struct btd_gatt_client *client) + if (!client) + return; + ++ client->ready = false; ++ + queue_destroy(client->services, unregister_service); + queue_destroy(client->all_notify_clients, NULL); + queue_destroy(client->ios, NULL); +-- +2.34.1 + From patchwork Wed May 20 08:20:27 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88516 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9240BCD5BAB for ; Wed, 20 May 2026 08:21:33 +0000 (UTC) Received: from mail-wr1-f42.google.com (mail-wr1-f42.google.com [209.85.221.42]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7292.1779265283154793141 for ; Wed, 20 May 2026 01:21:23 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=azx4bD3D; spf=pass (domain: smile.fr, ip: 209.85.221.42, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f42.google.com with SMTP id ffacd0b85a97d-44ce78ab5feso3819956f8f.0 for ; Wed, 20 May 2026 01:21:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265281; x=1779870081; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=oE3aYSBF52qVbSf0opU/ta0V1vEo1StKEh3KB5OFdW8=; b=azx4bD3DV/R76ZnN9v2gtE2tycw+sJwDoMsihM7/ioV0bqWPozSAtu/g5bNbyo1htW Kyvav6rG2ihjpPJMnXcUa7uuI8zc91ENQUran91TFBbqtLublHTPbjPw5tsWT0MunIbC SIiAsox0s5BLSqrCiTgh91RoTyMWSmMeLVFDY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265281; x=1779870081; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=oE3aYSBF52qVbSf0opU/ta0V1vEo1StKEh3KB5OFdW8=; b=g1HczY7nZv+UPADJpctk5tSqbkbx8ylESuNmNRMXhynTZJV/xG92hSQm/Dd2fcIx+t IkA0Q3Qt3QFuDEOhuFV2hIVx+95SC5g31c2SW2h/CGa1/maY8m3e5cqz+Mb0MfgtkK0Y 0szUIpW7cSfpoef9XsDAcMP9yDnPvvVPKHFVJ2DlktgvkKeUyxq0Mpq5JQ5VBcU7jOkx THlMxPF/sq8+GAfwnijLgEvM6rzIpRfEN8d8ARpC6tu96fmP4yoTfRHGv5RUr09d+C4x JSEAROU6ld3zPapJs8UPre7iKxRgWmgVaq+9veR5x5e9iK57ojEAcUyw4el7XoHj8FTy TKvw== X-Gm-Message-State: AOJu0Yz96ESXeo/zj1fJFFYEWhnqPmuER6Qct4KiURM3LHj72bf+ClQ0 7vowEkaeiD/FIACn/HRXM6m0f0cpIZXobviaMJcWtEZ3t/rsTtDrBR58ur99WUP6EqQiKyOeLH6 9mv3+ X-Gm-Gg: Acq92OF5/cxRaqfA85n+eE30DtmTxe6r4xtho6My0g4dzMlOY/3mvJQF12rcp/VxreS QrDs+ipDzYkPWGjHB5eTZG7STYXG+aP47ZbtAP4D/Ya4bQ6QQZrULjuHtH5JgIRxMHztUZFRi0G Z8Q8dRRLBNd9r16WC2JcTH19HI4jVBHXcVRvOpfvHHsAdO9OuvJhv0t0HE/x3vNpIbvSy4iOPtQ 2UCwbFEmNVHBYtCl6q7oDHk6INUZMP1kyJ7OA5b5RKX95FMsNVkNsdG8cXY2Vw0DZiyRl8Sd9oO udFBDm8iUPAopfoSgOK6YNbJT/TcmvMN4ccq4WlBNT7gSNIr6wCq9hPDbtIEtsTYiI/VmwOmdKh kny9G+EfQwcDgP5TQOhzj9ZXOhSdXb9L7R5vtQCYOylh0paRzCiL9MmnaVuZBRdAu34X/CRPt30 1r13AmoKT9XGAXvs4Ubs7/a1WTsvohv14LK9KMQMmuRphaZwmD5k5J+3h0eZjhcXJL1yxUhmEVg 7amstWkBSkbJ/AS4DbGYAieh79D X-Received: by 2002:a05:6000:4210:b0:446:ef9a:8f41 with SMTP id ffacd0b85a97d-45e5c5a8a00mr35534553f8f.40.1779265281243; Wed, 20 May 2026 01:21:21 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.20 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:20 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 26/28] default-distrovars.inc: add missing spaces in append overrides Date: Wed, 20 May 2026 10:20:27 +0200 Message-ID: <1e86f2d053fec8408c6974b4f45772c43a456cb5.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237425 From: João Marcos Costa DISTRO_FEATURES_OPTED_OUT is a space-separated list, so the missing space leads to: $ bitbake-getvar DISTRO_FEATURES_OPTED_OUT (...) set /src/build/conf/local.conf:277 "x11" (...) :append[loongarch64] /src/openembedded-core/meta/conf/distro/include/default-distrovars.inc:26 "seccomp" (...) DISTRO_FEATURES_OPTED_OUT="x11seccomp" Signed-off-by: João Marcos Costa Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit f1e6a11501224e68a5989cc6cd33cf1b903e542d) Signed-off-by: Yoann Congal --- meta/conf/distro/include/default-distrovars.inc | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/meta/conf/distro/include/default-distrovars.inc b/meta/conf/distro/include/default-distrovars.inc index 4bfe2469e28..69c6db589b7 100644 --- a/meta/conf/distro/include/default-distrovars.inc +++ b/meta/conf/distro/include/default-distrovars.inc @@ -14,16 +14,16 @@ LOCALE_UTF8_IS_DEFAULT ?= "1" LOCALE_UTF8_IS_DEFAULT:class-nativesdk = "0" # seccomp is not yet ported to rv32 -DISTRO_FEATURES_OPTED_OUT:append:riscv32 = "seccomp" +DISTRO_FEATURES_OPTED_OUT:append:riscv32 = " seccomp" # seccomp is not yet ported to ARC -DISTRO_FEATURES_OPTED_OUT:append:arc = "seccomp" +DISTRO_FEATURES_OPTED_OUT:append:arc = " seccomp" # seccomp is not yet ported to microblaze -DISTRO_FEATURES_OPTED_OUT:append:microblaze = "seccomp" +DISTRO_FEATURES_OPTED_OUT:append:microblaze = " seccomp" # seccomp is not yet ported to loongarch64 -DISTRO_FEATURES_OPTED_OUT:append:loongarch64 = "seccomp" +DISTRO_FEATURES_OPTED_OUT:append:loongarch64 = " seccomp" DISTRO_FEATURES_DEFAULTS ?= " \ acl alsa bluetooth debuginfod ext2 ipv4 ipv6 \ From patchwork Wed May 20 08:20:28 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88515 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 71E6ACD4F54 for ; Wed, 20 May 2026 08:21:33 +0000 (UTC) Received: from mail-wr1-f53.google.com (mail-wr1-f53.google.com [209.85.221.53]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7294.1779265284213677946 for ; Wed, 20 May 2026 01:21:24 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=nsrOaO3c; spf=pass (domain: smile.fr, ip: 209.85.221.53, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f53.google.com with SMTP id ffacd0b85a97d-441209fb77eso2777287f8f.1 for ; Wed, 20 May 2026 01:21:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265282; x=1779870082; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=QGkzejGpEyOxVF75zURy8a+xDjIbZrrS+ei7tppTCoA=; b=nsrOaO3cGiJXLGN4SJrbYZ5Xr3qq0yJyII2UDq9P8rm4UE+y1Ol7s/gLRZ3GM9KKgs iz4dDnLX22FRzCNIxjBn++eOMiwxSB76ehaBpN8CT7yFFQbFgFXJ7rdL3VzzGbNWe5G3 OS7ifPPzN20f96c9Md/conSze5eBTaQRXjATI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265282; x=1779870082; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=QGkzejGpEyOxVF75zURy8a+xDjIbZrrS+ei7tppTCoA=; b=ANge2GNL1c1XINt1dxcjf7xMjtl5e6J6/1+3hZ/16Ev4jGV7MDg77iCxvag7XgOrno LBUMf/ZH+sr3HY3Gt/5u2SoRzA83wDBc9sxxFmssA5Ia4pXG2XtQ7B3DGf/t/okjn0R0 sH6Y5r/lPu5SoKjYQIWYOyqMpDEMGbwLGLBWbV7Udtd1l2NRXpOitq5ev5LjbWJJbd7Q /DxE0tHpSDsCU17CZoICGRKWeCEvFB8D72/pmOXmo6HvYfzlVOnartfbblQp5Nz/R04n CLwrIMX5UNf9dRBiR9alItU6foDvCSTJKI2JZRdWldRhwSRk8QMGhXHHs7jK5yd34HFF Ix7g== X-Gm-Message-State: AOJu0YzYhtaxyEViweFoD3N3Ae9c2mQguRxllzolPUrNW4wcM4pAf7l+ XQsWAIjXpumcWxpSbE8qqFnWDOj3grJm8NVeYTjqIj2LGm5I2xN5VyfHYfgOZyDCu8akh6Md2sf +uxAy X-Gm-Gg: Acq92OEKmdHmcIGtEMaVk7phGAah+G9rQujweY8DxQf6cL1CeMfxsrIqo0dK4o3Dvt8 NhqVkNDxwBoSUZefyOvXW2JtEC+/IScImXyIKwqmx6lUfUCnsxiBIKt0dT/o371nn2BrD4p+dFa zq5JrFCZhCG+mrQKLNRC66QQF/6kPjaqKYRofzyN5/PZQNHHha68jn2uoelPGwLYHIkEqrKxuV1 9fZn+eQpADcCW4+QaOuh61pboaxs2WuPTMMdAlzT+EIwYgQrLGcMulGJXX/1TyfhSJyZ4CGFl6z k6AHZ2EZxIoRyJmgT5g+75m6ygTNp/viDSwd88PpoYynG0fpUXIzjnxQ8uKIsStGgjE9bhtMBJI xGKr3x02WLUgwe8h0o553l2serxTRVxBvbB36BZ3wzN2dcqMrkaX/nR9a7gerYkvZPmtJTMFMhN isHShW6xg7KYCGUGhdqJGlZK/quSOsF2D0Z1hncQWxyw6R6vAdbWfDGnJ9Admrix6kTzPJqeJOW 2xOU+6aoztSfQBOBFKzSHnxI7hT X-Received: by 2002:a5d:5d89:0:b0:45e:9520:d729 with SMTP id ffacd0b85a97d-45e9520d974mr2772751f8f.0.1779265282226; Wed, 20 May 2026 01:21:22 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.21 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:21 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 27/28] glibc: stable 2.43 branch updates Date: Wed, 20 May 2026 10:20:28 +0200 Message-ID: <438660e2972d154637e58b1c7d3bf0618ddc4781.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237426 From: Peter Marko $ git log --oneline ce1013a197eb4a3b8ff2b07e0672f4d0b976ce7c..e9517114acc77c0b8af9da6700107df16882b701 e9517114ac (origin/release/2.43/master) abilist.awk: Handle weak unversioned defined symbols 1634cc11a5 Linux: Only define OPEN_TREE_* macros in if undefined (bug 33921) d1d8d27164 include: isolate __O_CLOEXEC flag for sys/mount.h and fcntl.h 8362e8ce10 Use pending character state in IBM1390, IBM1399 character sets (CVE-2026-4046) Testing Results: +--------------+--------+--------+------+ | Result | Before | After | Diff | +--------------+--------+--------+------+ | PASS | 6629 | 6632 | +3 | | XPASS | 4 | 4 | 0 | | FAIL | 105 | 103 | -2 | | XFAIL | 16 | 16 | 0 | | UNSUPPORTED | 559 | 559 | 0 | +--------------+--------+--------+------+ Changes in failed testcases: malloc/tst-malloc-fork-deadlock-malloc-check FAIL PASS malloc/tst-malloc-too-large-malloc-check PASS FAIL nptl/tst-getpid3 FAIL PASS stdlib/tst-qsort3 FAIL PASS Signed-off-by: Peter Marko Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 8999a94dd8acd98a0f96b09d20e5b47cf2f7076b) Signed-off-by: Yoann Congal --- meta/recipes-core/glibc/glibc-version.inc | 2 +- meta/recipes-core/glibc/glibc_2.43.bb | 4 +++- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc index 015e7943c55..af3db54cee5 100644 --- a/meta/recipes-core/glibc/glibc-version.inc +++ b/meta/recipes-core/glibc/glibc-version.inc @@ -1,6 +1,6 @@ SRCBRANCH ?= "release/2.43/master" PV = "2.43+git" -SRCREV_glibc ?= "ce1013a197eb4a3b8ff2b07e0672f4d0b976ce7c" +SRCREV_glibc ?= "e9517114acc77c0b8af9da6700107df16882b701" SRCREV_localedef ?= "cba02c503d7c853a38ccfb83c57e343ca5ecd7e5" GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https" diff --git a/meta/recipes-core/glibc/glibc_2.43.bb b/meta/recipes-core/glibc/glibc_2.43.bb index ffc17eb0720..b84c55ca170 100644 --- a/meta/recipes-core/glibc/glibc_2.43.bb +++ b/meta/recipes-core/glibc/glibc_2.43.bb @@ -17,7 +17,9 @@ Allows for ASLR bypass so can bypass some hardening, not an exploit in itself, m easier access for another. 'ASLR bypass itself is not a vulnerability.'" CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS" -CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915 CVE-2026-4437 CVE-2026-4438" +CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915 CVE-2026-4437 CVE-2026-4438 \ + CVE-2026-4046 \ +" CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix available in used git hash" DEPENDS += "gperf-native bison-native" From patchwork Wed May 20 08:20:29 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 88514 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 85859CD4F3C for ; Wed, 20 May 2026 08:21:33 +0000 (UTC) Received: from mail-wr1-f47.google.com (mail-wr1-f47.google.com [209.85.221.47]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7389.1779265285129619272 for ; Wed, 20 May 2026 01:21:25 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=M6C8bj48; spf=pass (domain: smile.fr, ip: 209.85.221.47, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f47.google.com with SMTP id ffacd0b85a97d-44dd5cb0f81so3701609f8f.0 for ; Wed, 20 May 2026 01:21:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1779265283; x=1779870083; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=2SQutjT6Kj1LbQ1z6XYvFMbgjD09nVFJ0GOZONM7QU4=; b=M6C8bj48hJccJ2IeJwi3Irso6coJSPL5kvgCX1tCMRqkD5yptkBJaDxFtJigyNjZ/X lYGKkhv2KGvxxWb227iGMvLsYjG5n0qDwuXXckUnNExfcXrjqP+frfVMP0P28XE5Rzce vP1wJsOcw5SfhDu1v8ns1rzNn6DrbCAEfBnPQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779265283; x=1779870083; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=2SQutjT6Kj1LbQ1z6XYvFMbgjD09nVFJ0GOZONM7QU4=; b=PJj+NyHvK32rKI9k854P+Vb/tNwt5RloKKHVtFs6WNn+Hm+BvYqiMq6hsgxXXlkerC LtBzqn6Plnho+bRpMfZsUPQ0189fUfIa47v4Y5yZCRE9K/P3h5Z8GCa2ily7p1YLmLfD BIegxrJONswB7AQy3nhCotQekBJlpoZXsNGR3BPFRB4geXUFv86ytYCaeQC2Dv99CEa6 9+MZ2Tsq98paAPBBdY5khQW8qRsc9kNwl7LyRgQzrwzvcpepxsJfN3Wrc2TAuE9WNAM6 A0WdEGjy0Qch++4GjW2DfasqT5Idz/NW5dgCbKGtI7IsFp4pHnff/87Bey8b35ggsl/M MTKg== X-Gm-Message-State: AOJu0YxOQ0sbj4twtnISpweyMyXjm8oDfvH0HWnrQrPrdv2n6k84bMuA vaCOat5d2/gPFCL8yZ/6Fr0gBNNvHTKqUQd11idKHjPtoMQJLcyn4py5Fmc0nZauP2FqhzPYiRx MFOkI X-Gm-Gg: Acq92OHHwx0qp9F79yj42Gehy6MWZMVwDtsvQdvukXWnVZFD8o7aRtbPYPNHNoeoYqU WEoHInqg3qiuov1Qhp3KSiIEHEi8eIuO/wbVW1a9c++HquKOa5VyYpUBsbxYgCAN8PhzYm/9dPV jbdJCjWPDSZnLBMUCjX0fpCahoNl8/ntFihDSkepEnYtD1A9sli/y7RnsaSubmdc8LE/73ANueU l38FsiV3TKWA/JWjjoBpQPOBts0eHRH8GvaqxjAvgFlTQWGId5QvVt6DLtftH0qMcEkEp6wd3+i Uy7V8pQ2dIItkpkVtyRamr3F/wBLj330riY5JJIxuNbX8uw3NWawkL2fAvMpO9MNyxiasY09vGc ear6vaTvPyxPRQ7WdYDBcV2vtfeVkn8oTdtNYowmE3u17Nh2fmTf0Ugxxx2S4h1tnT6Y31lsxiv UDb3411DSooqoH488D0mL4Q5Ap7/NXKjB+a2YueEkmlUNJk3VkXuph1hgJK2oHqBCyJdGGHamqP GmiIebQ3/rzcPSPVXzT3+VKgp8K X-Received: by 2002:a05:6000:4308:b0:45e:8ad3:86a9 with SMTP id ffacd0b85a97d-45e8ad388bemr10045930f8f.8.1779265283259; Wed, 20 May 2026 01:21:23 -0700 (PDT) Received: from localhost.localdomain (2a02-8440-250c-63aa-0256-2b9f-d16e-d784.rev.sfr.net. [2a02:8440:250c:63aa:256:2b9f:d16e:d784]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-45d9ec39ff1sm56350642f8f.10.2026.05.20.01.21.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 01:21:22 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][wrynose v2 28/28] pseudo: Upgrade 1.9.6 -> 1.9.7 Date: Wed, 20 May 2026 10:20:29 +0200 Message-ID: <42adcd87a15f5921f0cc95424efd930876743824.1779264709.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 May 2026 08:21:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/237427 From: Richard Purdie Pulls in fixes to rename/renameat/renameat2: Changqing Li (1): renameat2/renameat: only ignore when both old and new path are not in PSEUDO_INCLUDE_PATHS Mark Hatle (4): run_tests.sh: Allow the user to specify specific tests to run tests: Add mv then hardlink testing rename: only ignore when both old and new path are not in PSEUDO_INCLUDE_PATHS Makefile.in: Bump version to 1.9.7 Signed-off-by: Richard Purdie (cherry picked from commit 17567738711d525d9f2b85e54ace2048901e4c34) Signed-off-by: Yoann Congal --- meta/recipes-devtools/pseudo/pseudo_git.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-devtools/pseudo/pseudo_git.bb b/meta/recipes-devtools/pseudo/pseudo_git.bb index b118f436db8..22bb938cd1d 100644 --- a/meta/recipes-devtools/pseudo/pseudo_git.bb +++ b/meta/recipes-devtools/pseudo/pseudo_git.bb @@ -12,8 +12,8 @@ SRC_URI:append:class-nativesdk = " \ file://older-glibc-symbols.patch" SRC_URI[prebuilt.sha256sum] = "ed9f456856e9d86359f169f46a70ad7be4190d6040282b84c8d97b99072485aa" -SRCREV = "7109ac1b417cd31e0100f6e1c4f3e5743541b9ed" -PV = "1.9.6" +SRCREV = "5b7c4b59e7e198aab54b35ea194aeb6d99794f96" +PV = "1.9.7" # largefile and 64bit time_t support adds these macros via compiler flags globally # remove them for pseudo since pseudo intercepts some of the functions which will be