* [OE-core][kirkstone 0/4] Patch review
@ 2025-01-31 14:15 Steve Sakoman
2025-01-31 14:15 ` [OE-core][kirkstone 1/4] openssl: patch CVE-2024-13176 Steve Sakoman
` (3 more replies)
0 siblings, 4 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-01-31 14:15 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Tuesday, February 3
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/911
The following changes since commit 077aab43f2c928eb8da71934405c62327010f552:
classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package architecture (2025-01-20 06:06:07 -0800)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Deepesh Varatharajan (1):
glibc: stable 2.35 branch updates
Peter Marko (1):
openssl: patch CVE-2024-13176
Yash Shinde (2):
binutils: internal gdb: Fix CVE-2024-53589
gdb: Fix CVE-2024-53589
.../openssl/openssl/CVE-2024-13176.patch | 125 ++++++++++++++++++
.../openssl/openssl_3.0.15.bb | 1 +
meta/recipes-core/glibc/glibc-version.inc | 2 +-
.../binutils/binutils-2.38.inc | 1 +
.../binutils/0037-CVE-2024-53589.patch | 92 +++++++++++++
meta/recipes-devtools/gdb/gdb.inc | 1 +
.../gdb/gdb/0014-CVE-2024-53589.patch | 92 +++++++++++++
7 files changed, 313 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-13176.patch
create mode 100644 meta/recipes-devtools/binutils/binutils/0037-CVE-2024-53589.patch
create mode 100644 meta/recipes-devtools/gdb/gdb/0014-CVE-2024-53589.patch
--
2.43.0
^ permalink raw reply [flat|nested] 14+ messages in thread* [OE-core][kirkstone 1/4] openssl: patch CVE-2024-13176 2025-01-31 14:15 [OE-core][kirkstone 0/4] Patch review Steve Sakoman @ 2025-01-31 14:15 ` Steve Sakoman 2025-01-31 14:15 ` [OE-core][kirkstone 2/4] binutils: internal gdb: Fix CVE-2024-53589 Steve Sakoman ` (2 subsequent siblings) 3 siblings, 0 replies; 14+ messages in thread From: Steve Sakoman @ 2025-01-31 14:15 UTC (permalink / raw) To: openembedded-core From: Peter Marko <peter.marko@siemens.com> Picked [1] per link in [2]. [1] https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844 [2] https://nvd.nist.gov/vuln/detail/CVE-2024-13176 Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> --- .../openssl/openssl/CVE-2024-13176.patch | 125 ++++++++++++++++++ .../openssl/openssl_3.0.15.bb | 1 + 2 files changed, 126 insertions(+) create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-13176.patch diff --git a/meta/recipes-connectivity/openssl/openssl/CVE-2024-13176.patch b/meta/recipes-connectivity/openssl/openssl/CVE-2024-13176.patch new file mode 100644 index 0000000000..0076003db1 --- /dev/null +++ b/meta/recipes-connectivity/openssl/openssl/CVE-2024-13176.patch @@ -0,0 +1,125 @@ +From 07272b05b04836a762b4baa874958af51d513844 Mon Sep 17 00:00:00 2001 +From: Tomas Mraz <tomas@openssl.org> +Date: Wed, 15 Jan 2025 18:27:02 +0100 +Subject: [PATCH] Fix timing side-channel in ECDSA signature computation + +There is a timing signal of around 300 nanoseconds when the top word of +the inverted ECDSA nonce value is zero. This can happen with significant +probability only for some of the supported elliptic curves. In particular +the NIST P-521 curve is affected. To be able to measure this leak, the +attacker process must either be located in the same physical computer or +must have a very fast network connection with low latency. + +Attacks on ECDSA nonce are also known as Minerva attack. + +Fixes CVE-2024-13176 + +Reviewed-by: Tim Hudson <tjh@openssl.org> +Reviewed-by: Neil Horman <nhorman@openssl.org> +Reviewed-by: Paul Dale <ppzgs1@gmail.com> +(Merged from https://github.com/openssl/openssl/pull/26429) + +(cherry picked from commit 63c40a66c5dc287485705d06122d3a6e74a6a203) + +CVE: CVE-2024-13176 +Upstream-Status: Backport [https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844] +Signed-off-by: Peter Marko <peter.marko@siemens.com> +--- + crypto/bn/bn_exp.c | 21 +++++++++++++++------ + crypto/ec/ec_lib.c | 7 ++++--- + include/crypto/bn.h | 3 +++ + 3 files changed, 22 insertions(+), 9 deletions(-) + +diff --git a/crypto/bn/bn_exp.c b/crypto/bn/bn_exp.c +index 598a592ca1397..d84c7de18a6b6 100644 +--- a/crypto/bn/bn_exp.c ++++ b/crypto/bn/bn_exp.c +@@ -606,7 +606,7 @@ static int MOD_EXP_CTIME_COPY_FROM_PREBUF(BIGNUM *b, int top, + * out by Colin Percival, + * http://www.daemonology.net/hyperthreading-considered-harmful/) + */ +-int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, ++int bn_mod_exp_mont_fixed_top(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, + const BIGNUM *m, BN_CTX *ctx, + BN_MONT_CTX *in_mont) + { +@@ -623,10 +623,6 @@ int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, + unsigned int t4 = 0; + #endif + +- bn_check_top(a); +- bn_check_top(p); +- bn_check_top(m); +- + if (!BN_is_odd(m)) { + ERR_raise(ERR_LIB_BN, BN_R_CALLED_WITH_EVEN_MODULUS); + return 0; +@@ -1146,7 +1142,7 @@ int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, + goto err; + } else + #endif +- if (!BN_from_montgomery(rr, &tmp, mont, ctx)) ++ if (!bn_from_mont_fixed_top(rr, &tmp, mont, ctx)) + goto err; + ret = 1; + err: +@@ -1160,6 +1156,19 @@ int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, + return ret; + } + ++int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, ++ const BIGNUM *m, BN_CTX *ctx, ++ BN_MONT_CTX *in_mont) ++{ ++ bn_check_top(a); ++ bn_check_top(p); ++ bn_check_top(m); ++ if (!bn_mod_exp_mont_fixed_top(rr, a, p, m, ctx, in_mont)) ++ return 0; ++ bn_correct_top(rr); ++ return 1; ++} ++ + int BN_mod_exp_mont_word(BIGNUM *rr, BN_ULONG a, const BIGNUM *p, + const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) + { +diff --git a/crypto/ec/ec_lib.c b/crypto/ec/ec_lib.c +index b1696d93bd6dd..1f0bf1ec795fa 100644 +--- a/crypto/ec/ec_lib.c ++++ b/crypto/ec/ec_lib.c +@@ -20,6 +20,7 @@ + #include <openssl/err.h> + #include <openssl/opensslv.h> + #include "crypto/ec.h" ++#include "crypto/bn.h" + #include "internal/nelem.h" + #include "ec_local.h" + +@@ -1262,10 +1263,10 @@ static int ec_field_inverse_mod_ord(const EC_GROUP *group, BIGNUM *r, + if (!BN_sub(e, group->order, e)) + goto err; + /*- +- * Exponent e is public. +- * No need for scatter-gather or BN_FLG_CONSTTIME. ++ * Although the exponent is public we want the result to be ++ * fixed top. + */ +- if (!BN_mod_exp_mont(r, x, e, group->order, ctx, group->mont_data)) ++ if (!bn_mod_exp_mont_fixed_top(r, x, e, group->order, ctx, group->mont_data)) + goto err; + + ret = 1; +diff --git a/include/crypto/bn.h b/include/crypto/bn.h +index c5f328156d3a9..59a629b9f6288 100644 +--- a/include/crypto/bn.h ++++ b/include/crypto/bn.h +@@ -73,6 +73,9 @@ int bn_set_words(BIGNUM *a, const BN_ULONG *words, int num_words); + */ + int bn_mul_mont_fixed_top(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, + BN_MONT_CTX *mont, BN_CTX *ctx); ++int bn_mod_exp_mont_fixed_top(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, ++ const BIGNUM *m, BN_CTX *ctx, ++ BN_MONT_CTX *in_mont); + int bn_to_mont_fixed_top(BIGNUM *r, const BIGNUM *a, BN_MONT_CTX *mont, + BN_CTX *ctx); + int bn_from_mont_fixed_top(BIGNUM *r, const BIGNUM *a, BN_MONT_CTX *mont, diff --git a/meta/recipes-connectivity/openssl/openssl_3.0.15.bb b/meta/recipes-connectivity/openssl/openssl_3.0.15.bb index 5f7e7c0000..295f05729f 100644 --- a/meta/recipes-connectivity/openssl/openssl_3.0.15.bb +++ b/meta/recipes-connectivity/openssl/openssl_3.0.15.bb @@ -13,6 +13,7 @@ SRC_URI = "https://github.com/openssl/openssl/releases/download/openssl-${PV}/op file://afalg.patch \ file://0001-Configure-do-not-tweak-mips-cflags.patch \ file://CVE-2024-9143.patch \ + file://CVE-2024-13176.patch \ " SRC_URI:append:class-nativesdk = " \ -- 2.43.0 ^ permalink raw reply related [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 2/4] binutils: internal gdb: Fix CVE-2024-53589 2025-01-31 14:15 [OE-core][kirkstone 0/4] Patch review Steve Sakoman 2025-01-31 14:15 ` [OE-core][kirkstone 1/4] openssl: patch CVE-2024-13176 Steve Sakoman @ 2025-01-31 14:15 ` Steve Sakoman 2025-01-31 14:15 ` [OE-core][kirkstone 3/4] " Steve Sakoman 2025-01-31 14:15 ` [OE-core][kirkstone 4/4] glibc: stable 2.35 branch updates Steve Sakoman 3 siblings, 0 replies; 14+ messages in thread From: Steve Sakoman @ 2025-01-31 14:15 UTC (permalink / raw) To: openembedded-core From: Yash Shinde <Yash.Shinde@windriver.com> CVE: CVE-2024-53589 Signed-off-by: Yash Shinde <Yash.Shinde@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> --- .../binutils/binutils-2.38.inc | 1 + .../binutils/0037-CVE-2024-53589.patch | 92 +++++++++++++++++++ 2 files changed, 93 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/0037-CVE-2024-53589.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.38.inc b/meta/recipes-devtools/binutils/binutils-2.38.inc index 032e67a213..e577a10cb8 100644 --- a/meta/recipes-devtools/binutils/binutils-2.38.inc +++ b/meta/recipes-devtools/binutils/binutils-2.38.inc @@ -71,5 +71,6 @@ SRC_URI = "\ file://0034-CVE-2022-48064.patch \ file://0035-CVE-2023-39129.patch \ file://0036-CVE-2023-39130.patch \ + file://0037-CVE-2024-53589.patch \ " S = "${WORKDIR}/git" diff --git a/meta/recipes-devtools/binutils/binutils/0037-CVE-2024-53589.patch b/meta/recipes-devtools/binutils/binutils/0037-CVE-2024-53589.patch new file mode 100644 index 0000000000..380112a3ba --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/0037-CVE-2024-53589.patch @@ -0,0 +1,92 @@ +Author: Alan Modra <amodra@gmail.com> +Date: Mon Nov 11 10:24:09 2024 +1030 + + Re: tekhex object file output fixes + + Commit 8b5a212495 supported *ABS* symbols by allowing "section" to be + bfd_abs_section, but bfd_abs_section needs to be treated specially. + In particular, bfd_get_next_section_by_name (.., bfd_abs_section_ptr) + is invalid. + + PR 32347 + * tekhex.c (first_phase): Guard against modification of + _bfd_std_section[] entries. + +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=e0323071916878e0634a6e24d8250e4faff67e88] +CVE: CVE-2024-53589 + +Signed-off-by: Yash Shinde <Yash.Shinde@windriver.com> + +diff --git a/bfd/tekhex.c b/bfd/tekhex.c +index aea2ebb23df..b305c1f96f1 100644 +--- a/bfd/tekhex.c ++++ b/bfd/tekhex.c +@@ -361,6 +361,7 @@ first_phase (bfd *abfd, int type, char *src, char * src_end) + { + asection *section, *alt_section; + unsigned int len; ++ bfd_vma addr; + bfd_vma val; + char sym[17]; /* A symbol can only be 16chars long. */ + +@@ -368,20 +369,16 @@ first_phase (bfd *abfd, int type, char *src, char * src_end) + { + case '6': + /* Data record - read it and store it. */ +- { +- bfd_vma addr; +- +- if (!getvalue (&src, &addr, src_end)) +- return false; +- +- while (*src && src < src_end - 1) +- { +- insert_byte (abfd, HEX (src), addr); +- src += 2; +- addr++; +- } +- return true; +- } ++ if (!getvalue (&src, &addr, src_end)) ++ return false; ++ ++ while (*src && src < src_end - 1) ++ { ++ insert_byte (abfd, HEX (src), addr); ++ src += 2; ++ addr++; ++ } ++ return true; + + case '3': + /* Symbol record, read the segment. */ +@@ -406,13 +403,16 @@ first_phase (bfd *abfd, int type, char *src, char * src_end) + { + case '1': /* Section range. */ + src++; +- if (!getvalue (&src, §ion->vma, src_end)) ++ if (!getvalue (&src, &addr, src_end)) + return false; + if (!getvalue (&src, &val, src_end)) + return false; +- if (val < section->vma) +- val = section->vma; +- section->size = val - section->vma; ++ if (bfd_is_const_section (section)) ++ break; ++ section->vma = addr; ++ if (val < addr) ++ val = addr; ++ section->size = val - addr; + /* PR 17512: file: objdump-s-endless-loop.tekhex. + Check for overlarge section sizes. */ + if (section->size & 0x80000000) +@@ -455,6 +455,8 @@ first_phase (bfd *abfd, int type, char *src, char * src_end) + new_symbol->symbol.flags = BSF_LOCAL; + if (stype == '2' || stype == '6') + new_symbol->symbol.section = bfd_abs_section_ptr; ++ else if (bfd_is_const_section (section)) ++ ; + else if (stype == '3' || stype == '7') + { + if ((section->flags & SEC_DATA) == 0) -- 2.43.0 ^ permalink raw reply related [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 3/4] gdb: Fix CVE-2024-53589 2025-01-31 14:15 [OE-core][kirkstone 0/4] Patch review Steve Sakoman 2025-01-31 14:15 ` [OE-core][kirkstone 1/4] openssl: patch CVE-2024-13176 Steve Sakoman 2025-01-31 14:15 ` [OE-core][kirkstone 2/4] binutils: internal gdb: Fix CVE-2024-53589 Steve Sakoman @ 2025-01-31 14:15 ` Steve Sakoman 2025-01-31 14:15 ` [OE-core][kirkstone 4/4] glibc: stable 2.35 branch updates Steve Sakoman 3 siblings, 0 replies; 14+ messages in thread From: Steve Sakoman @ 2025-01-31 14:15 UTC (permalink / raw) To: openembedded-core From: Yash Shinde <Yash.Shinde@windriver.com> CVE: CVE-2024-53589 Signed-off-by: Yash Shinde <Yash.Shinde@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> --- meta/recipes-devtools/gdb/gdb.inc | 1 + .../gdb/gdb/0014-CVE-2024-53589.patch | 92 +++++++++++++++++++ 2 files changed, 93 insertions(+) create mode 100644 meta/recipes-devtools/gdb/gdb/0014-CVE-2024-53589.patch diff --git a/meta/recipes-devtools/gdb/gdb.inc b/meta/recipes-devtools/gdb/gdb.inc index 6c9fe60cab..84cc65f79b 100644 --- a/meta/recipes-devtools/gdb/gdb.inc +++ b/meta/recipes-devtools/gdb/gdb.inc @@ -17,5 +17,6 @@ SRC_URI = "${GNU_MIRROR}/gdb/gdb-${PV}.tar.xz \ file://0011-CVE-2023-39128.patch \ file://0012-CVE-2023-39129.patch \ file://0013-CVE-2023-39130.patch \ + file://0014-CVE-2024-53589.patch \ " SRC_URI[sha256sum] = "1497c36a71881b8671a9a84a0ee40faab788ca30d7ba19d8463c3cc787152e32" diff --git a/meta/recipes-devtools/gdb/gdb/0014-CVE-2024-53589.patch b/meta/recipes-devtools/gdb/gdb/0014-CVE-2024-53589.patch new file mode 100644 index 0000000000..380112a3ba --- /dev/null +++ b/meta/recipes-devtools/gdb/gdb/0014-CVE-2024-53589.patch @@ -0,0 +1,92 @@ +Author: Alan Modra <amodra@gmail.com> +Date: Mon Nov 11 10:24:09 2024 +1030 + + Re: tekhex object file output fixes + + Commit 8b5a212495 supported *ABS* symbols by allowing "section" to be + bfd_abs_section, but bfd_abs_section needs to be treated specially. + In particular, bfd_get_next_section_by_name (.., bfd_abs_section_ptr) + is invalid. + + PR 32347 + * tekhex.c (first_phase): Guard against modification of + _bfd_std_section[] entries. + +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=e0323071916878e0634a6e24d8250e4faff67e88] +CVE: CVE-2024-53589 + +Signed-off-by: Yash Shinde <Yash.Shinde@windriver.com> + +diff --git a/bfd/tekhex.c b/bfd/tekhex.c +index aea2ebb23df..b305c1f96f1 100644 +--- a/bfd/tekhex.c ++++ b/bfd/tekhex.c +@@ -361,6 +361,7 @@ first_phase (bfd *abfd, int type, char *src, char * src_end) + { + asection *section, *alt_section; + unsigned int len; ++ bfd_vma addr; + bfd_vma val; + char sym[17]; /* A symbol can only be 16chars long. */ + +@@ -368,20 +369,16 @@ first_phase (bfd *abfd, int type, char *src, char * src_end) + { + case '6': + /* Data record - read it and store it. */ +- { +- bfd_vma addr; +- +- if (!getvalue (&src, &addr, src_end)) +- return false; +- +- while (*src && src < src_end - 1) +- { +- insert_byte (abfd, HEX (src), addr); +- src += 2; +- addr++; +- } +- return true; +- } ++ if (!getvalue (&src, &addr, src_end)) ++ return false; ++ ++ while (*src && src < src_end - 1) ++ { ++ insert_byte (abfd, HEX (src), addr); ++ src += 2; ++ addr++; ++ } ++ return true; + + case '3': + /* Symbol record, read the segment. */ +@@ -406,13 +403,16 @@ first_phase (bfd *abfd, int type, char *src, char * src_end) + { + case '1': /* Section range. */ + src++; +- if (!getvalue (&src, §ion->vma, src_end)) ++ if (!getvalue (&src, &addr, src_end)) + return false; + if (!getvalue (&src, &val, src_end)) + return false; +- if (val < section->vma) +- val = section->vma; +- section->size = val - section->vma; ++ if (bfd_is_const_section (section)) ++ break; ++ section->vma = addr; ++ if (val < addr) ++ val = addr; ++ section->size = val - addr; + /* PR 17512: file: objdump-s-endless-loop.tekhex. + Check for overlarge section sizes. */ + if (section->size & 0x80000000) +@@ -455,6 +455,8 @@ first_phase (bfd *abfd, int type, char *src, char * src_end) + new_symbol->symbol.flags = BSF_LOCAL; + if (stype == '2' || stype == '6') + new_symbol->symbol.section = bfd_abs_section_ptr; ++ else if (bfd_is_const_section (section)) ++ ; + else if (stype == '3' || stype == '7') + { + if ((section->flags & SEC_DATA) == 0) -- 2.43.0 ^ permalink raw reply related [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 4/4] glibc: stable 2.35 branch updates 2025-01-31 14:15 [OE-core][kirkstone 0/4] Patch review Steve Sakoman ` (2 preceding siblings ...) 2025-01-31 14:15 ` [OE-core][kirkstone 3/4] " Steve Sakoman @ 2025-01-31 14:15 ` Steve Sakoman 3 siblings, 0 replies; 14+ messages in thread From: Steve Sakoman @ 2025-01-31 14:15 UTC (permalink / raw) To: openembedded-core From: Deepesh Varatharajan <Deepesh.Varatharajan@windriver.com> 549d831579 stdlib: Test using setenv with updated environ [BZ #32588] 8b5d4be762 Fix underallocation of abort_msg_s struct (CVE-2025-0395) 525e5f13de stdlib: Simplify buffer management in canonicalize 5eae275400 realpath: Bring back GNU extension on ENOENT and EACCES [BZ #28996] 8a82a76a42 realpath: Do not copy result on failure (BZ #28815) e369114462 misc: Add support for Linux uio.h RWF_NOAPPEND flag 3f1ab0ed66 nptl: Convert tst-setuid2 to test-driver 76adee6e0f support: Add xpthread_cond_signal wrapper c3beedeb70 elf: Support recursive use of dynamic TLS in interposed malloc f48d763ab8 elf: Avoid some free (NULL) calls in _dl_update_slotinfo 710057676d sysdeps/x86/Makefile: Split and sort tests a4207d4e83 x86: Only align destination to 1x VEC_SIZE in memset 4x loop 889f99c149 elf: Fix slow tls access after dlopen [BZ #19924] 543efedcb3 x86: Check the lower byte of EAX of CPUID leaf 2 [BZ #30643] 41a3e51233 x86_64: Add log1p with FMA 0d1c70aa4c x86_64: Add expm1 with FMA 516180d399 x86_64: Add log2 with FMA 30384b91ad x86_64: Sort fpu/multiarch/Makefile d626c31ce5 x86: Avoid integer truncation with large cache sizes (bug 32470) 7ea35e28b4 nptl: initialize cpu_id_start prior to rseq registration 47d70ca8d9 nptl: initialize rseq area prior to registration Signed-off-by: Deepesh Varatharajan <Deepesh.Varatharajan@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> --- meta/recipes-core/glibc/glibc-version.inc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc index dc18d20dd8..d98b6a4911 100644 --- a/meta/recipes-core/glibc/glibc-version.inc +++ b/meta/recipes-core/glibc/glibc-version.inc @@ -1,6 +1,6 @@ SRCBRANCH ?= "release/2.35/master" PV = "2.35" -SRCREV_glibc ?= "37214df5f103f4075cf0a79a227e70f3e064701c" +SRCREV_glibc ?= "549d8315791aa8176ff1537db3e09c185c6e602f" SRCREV_localedef ?= "794da69788cbf9bf57b59a852f9f11307663fa87" GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git" -- 2.43.0 ^ permalink raw reply related [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review
@ 2025-12-29 23:03 Steve Sakoman
0 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-12-29 23:03 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Wednesday, December 31
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/2953
The following changes since commit c15faee8854e85e02693a041d88326f30b24ee92:
cross.bbclass: Propagate dependencies to outhash (2025-12-29 08:40:22 -0800)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Jiaying Song (1):
grub: fix CVE-2025-61661 CVE-2025-61662 CVE-2025-61663 CVE-2025-61664
Vijay Anusuri (3):
go: Update CVE-2025-58187
go: Fix CVE-2025-61727
go: Fix CVE-2025-61729
.../grub/files/CVE-2025-61661.patch | 40 ++
.../grub/files/CVE-2025-61662.patch | 72 +++
.../grub/files/CVE-2025-61663_61664.patch | 64 +++
meta/recipes-bsp/grub/grub2.inc | 3 +
meta/recipes-devtools/go/go-1.17.13.inc | 5 +-
...025-58187.patch => CVE-2025-58187-1.patch} | 0
.../go/go-1.18/CVE-2025-58187-2.patch | 516 ++++++++++++++++++
.../go/go-1.18/CVE-2025-61727.patch | 229 ++++++++
.../go/go-1.18/CVE-2025-61729.patch | 172 ++++++
9 files changed, 1100 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-bsp/grub/files/CVE-2025-61661.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2025-61662.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2025-61663_61664.patch
rename meta/recipes-devtools/go/go-1.18/{CVE-2025-58187.patch => CVE-2025-58187-1.patch} (100%)
create mode 100644 meta/recipes-devtools/go/go-1.18/CVE-2025-58187-2.patch
create mode 100644 meta/recipes-devtools/go/go-1.18/CVE-2025-61727.patch
create mode 100644 meta/recipes-devtools/go/go-1.18/CVE-2025-61729.patch
--
2.43.0
^ permalink raw reply [flat|nested] 14+ messages in thread* [OE-core][kirkstone 0/4] Patch review @ 2025-12-09 21:53 Steve Sakoman 0 siblings, 0 replies; 14+ messages in thread From: Steve Sakoman @ 2025-12-09 21:53 UTC (permalink / raw) To: openembedded-core Please review this set of changes for kirkstone and have comments back by end of day Thursday, December 11 Passed a-full on autobuilder: https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/2836 The following changes since commit 80c7fd87fd95a79c6eb5f41b95cf70ccc70d9615: systemd-bootchart: update SRC_URI branch (2025-12-01 07:13:56 -0800) are available in the Git repository at: https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut Hitendra Prajapati (2): libxml2: Security fix for CVE-2025-7425 openssh: fix CVE-2025-61984 Peter Marko (2): libpng: patch CVE-2025-66293 libmicrohttpd: disable experimental code by default .../openssh/openssh/CVE-2025-61984.patch | 98 +++ .../openssh/openssh_8.9p1.bb | 1 + .../libxml/libxml2/CVE-2025-7425.patch | 802 ++++++++++++++++++ meta/recipes-core/libxml/libxml2_2.9.14.bb | 1 + .../libpng/files/CVE-2025-66293-01.patch | 60 ++ .../libpng/files/CVE-2025-66293-02.patch | 125 +++ .../libpng/libpng_1.6.39.bb | 2 + .../libmicrohttpd/libmicrohttpd_0.9.76.bb | 3 + 8 files changed, 1092 insertions(+) create mode 100644 meta/recipes-connectivity/openssh/openssh/CVE-2025-61984.patch create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2025-7425.patch create mode 100644 meta/recipes-multimedia/libpng/files/CVE-2025-66293-01.patch create mode 100644 meta/recipes-multimedia/libpng/files/CVE-2025-66293-02.patch -- 2.43.0 ^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review @ 2025-10-29 2:54 Steve Sakoman 0 siblings, 0 replies; 14+ messages in thread From: Steve Sakoman @ 2025-10-29 2:54 UTC (permalink / raw) To: openembedded-core Please review this set of changes for kirkstone and have comments back by end of day Thursday, October 30 Passed a-full on the autobuilder: https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/2650 The following changes since commit 9b3dbd691f6ebdbdfe88cef3d3a676ddd1399c63: python3: upgrade 3.10.18 -> 3.10.19 (2025-10-17 07:39:27 -0700) are available in the Git repository at: https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut Hitendra Prajapati (1): git: fix CVE-2025-48386 Peter Marko (1): lz4: patch CVE-2025-62813 Yash Shinde (2): binutils: fix CVE-2025-11081 binutils: fix CVE-2025-8225 .../binutils/binutils-2.38.inc | 2 + .../binutils/0046-CVE-2025-11081.patch | 84 ++++++++++++++++ .../binutils/0047-CVE-2025-8225.patch | 47 +++++++++ .../git/git/CVE-2025-48386.patch | 97 +++++++++++++++++++ meta/recipes-devtools/git/git_2.35.7.bb | 1 + .../lz4/files/CVE-2025-62813.patch | 69 +++++++++++++ meta/recipes-support/lz4/lz4_1.9.4.bb | 4 +- 7 files changed, 303 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-devtools/binutils/binutils/0046-CVE-2025-11081.patch create mode 100644 meta/recipes-devtools/binutils/binutils/0047-CVE-2025-8225.patch create mode 100644 meta/recipes-devtools/git/git/CVE-2025-48386.patch create mode 100644 meta/recipes-support/lz4/files/CVE-2025-62813.patch -- 2.43.0 ^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review @ 2025-08-05 16:43 Steve Sakoman 0 siblings, 0 replies; 14+ messages in thread From: Steve Sakoman @ 2025-08-05 16:43 UTC (permalink / raw) To: openembedded-core Please review this set of changes for kirkstone and have comments back by end of day Thursday, August 7 Passed a-full on autobuilder: https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/2150 The following changes since commit b4a2f74ba0b40abcdf56c4b58cae5f7ce145d511: sqlite3: Fix CVE-2025-6965 (2025-07-29 06:39:06 -0700) are available in the Git repository at: https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut Peter Marko (3): sqlite3: patch CVE-2025-7458 sqlite3: ignore CVE-2025-3277 glibc: stable 2.35 branch updates Zhang Peng (1): avahi: fix CVE-2024-52615 meta/recipes-connectivity/avahi/avahi_0.8.bb | 1 + .../avahi/files/CVE-2024-52615.patch | 228 ++++++++++++++++ meta/recipes-core/glibc/glibc-version.inc | 2 +- .../glibc/glibc/0025-CVE-2025-4802.patch | 250 ------------------ meta/recipes-core/glibc/glibc_2.35.bb | 2 +- ...mpts-to-improve-the-detection-of-cov.patch | 91 +++++++ .../sqlite/files/CVE-2025-7458.patch | 32 +++ meta/recipes-support/sqlite/sqlite3_3.38.5.bb | 4 + 8 files changed, 358 insertions(+), 252 deletions(-) create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2024-52615.patch delete mode 100644 meta/recipes-core/glibc/glibc/0025-CVE-2025-4802.patch create mode 100644 meta/recipes-support/sqlite/files/0001-This-branch-attempts-to-improve-the-detection-of-cov.patch create mode 100644 meta/recipes-support/sqlite/files/CVE-2025-7458.patch -- 2.43.0 ^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review @ 2025-04-15 20:52 Steve Sakoman 0 siblings, 0 replies; 14+ messages in thread From: Steve Sakoman @ 2025-04-15 20:52 UTC (permalink / raw) To: openembedded-core Please review this set of changes for kirkstone and have comments back by end of day Thursday, April 17 Passed a-full on autobuilder: https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/1401 The following changes since commit 7399cf17590204f8289f356cce4575592d6e3536: ghostscript: Fix CVE-2025-27836 (2025-04-08 08:36:03 -0700) are available in the Git repository at: https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut Divya Chellam (1): ruby: fix CVE-2024-43398 Hitendra Prajapati (1): go: fix CVE-2025-22871 Peter Marko (2): cve-update-nvd2-native: add workaround for json5 style list systemd: ignore CVEs which reappeared after upgrade to 250.14 .../meta/cve-update-nvd2-native.bb | 5 + meta/recipes-core/systemd/systemd.inc | 3 + meta/recipes-devtools/go/go-1.17.13.inc | 1 + .../go/go-1.21/CVE-2025-22871.patch | 172 ++++++++++++++++++ .../ruby/ruby/CVE-2024-43398.patch | 81 +++++++++ meta/recipes-devtools/ruby/ruby_3.1.3.bb | 1 + 6 files changed, 263 insertions(+) create mode 100644 meta/recipes-devtools/go/go-1.21/CVE-2025-22871.patch create mode 100644 meta/recipes-devtools/ruby/ruby/CVE-2024-43398.patch -- 2.43.0 ^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review @ 2025-03-27 14:43 Steve Sakoman 0 siblings, 0 replies; 14+ messages in thread From: Steve Sakoman @ 2025-03-27 14:43 UTC (permalink / raw) To: openembedded-core Please review this set of changes for kirktone and have comments back by end of day Monday, March 31 Passed a-full on autobuilder: https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/1277 The following changes since commit 1172a71f2104454a13e64886adbdb381aa8d6e0e: libxcrypt-compat: Remove libcrypt.so to fix conflict with libcrypt (2025-03-21 06:48:11 -0700) are available in the Git repository at: https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut Bruce Ashfield (2): linux-yocto/5.15: update to v5.15.179 linux-yocto/5.10: update to v5.10.234 Peter Marko (1): python3: patch CVE-2025-0938 Vijay Anusuri (1): vim: Upgrade 9.1.1115 -> 9.1.1198 .../python/python3/CVE-2025-0938.patch | 131 ++++++++++++++++++ .../python/python3_3.10.16.bb | 1 + .../linux/linux-yocto-rt_5.10.bb | 6 +- .../linux/linux-yocto-rt_5.15.bb | 6 +- .../linux/linux-yocto-tiny_5.10.bb | 8 +- .../linux/linux-yocto-tiny_5.15.bb | 6 +- meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 ++-- meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 ++-- meta/recipes-support/vim/vim.inc | 4 +- 9 files changed, 172 insertions(+), 40 deletions(-) create mode 100644 meta/recipes-devtools/python/python3/CVE-2025-0938.patch -- 2.43.0 ^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review @ 2024-03-07 18:38 Steve Sakoman 0 siblings, 0 replies; 14+ messages in thread From: Steve Sakoman @ 2024-03-07 18:38 UTC (permalink / raw) To: openembedded-core Please review this set of changes for kirkstone and have comments back by end of day Monday, March 11 Passed a-full on autobuilder: https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/6658 The following changes since commit d63af11e92094487d6e358f27283e5385937e7a8: kernel.bbclass: Set pkg-config variables for building modules (2024-03-03 11:56:20 -1000) are available in the Git repository at: https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut Chen Qi (1): useradd-example: do not use unsupported clear text password Fabio Estevam (1): u-boot: Move UBOOT_INITIAL_ENV back to u-boot.inc Hitendra Prajapati (1): golang: Fix CVE-2023-45289 & CVE-2023-45290 Steve Sakoman (1): selftest: skip virgl gtk/sdl test on ubuntu 18.04 .../useradd/useradd-example.bb | 4 +- meta/classes/uboot-config.bbclass | 4 - meta/lib/oeqa/selftest/cases/runtime_test.py | 2 + meta/recipes-bsp/u-boot/u-boot.inc | 4 + meta/recipes-devtools/go/go-1.17.13.inc | 2 + .../go/go-1.21/CVE-2023-45289.patch | 121 ++++++++ .../go/go-1.21/CVE-2023-45290.patch | 270 ++++++++++++++++++ 7 files changed, 401 insertions(+), 6 deletions(-) create mode 100644 meta/recipes-devtools/go/go-1.21/CVE-2023-45289.patch create mode 100644 meta/recipes-devtools/go/go-1.21/CVE-2023-45290.patch -- 2.34.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review
@ 2024-02-01 19:37 Steve Sakoman
0 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2024-02-01 19:37 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Monday, February 5
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/6513
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/6513
The following changes since commit a744a897f0ea7d34c31c024c13031221f9a85f24:
build-appliance-image: Update to kirkstone head revision (2024-01-25 04:06:50 -1000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Alexander Kanavin (1):
python3-jinja2: upgrade 3.1.1 -> 3.1.2
Lee Chee Yang (1):
xwayland: Fix CVE-2023-6377 CVE-2023-6478
Ludovic Jozeau (1):
image-live.bbclass: LIVE_ROOTFS_TYPE support compression
Wang Mingyu (1):
python3-jinja2: upgrade 3.1.2 -> 3.1.3
meta/classes/image-live.bbclass | 2 +-
...inja2_3.1.1.bb => python3-jinja2_3.1.3.bb} | 2 +-
.../xwayland/xwayland/CVE-2023-6377.patch | 82 +++++++++++++++++++
.../xwayland/xwayland/CVE-2023-6478.patch | 66 +++++++++++++++
.../xwayland/xwayland_22.1.8.bb | 2 +
5 files changed, 152 insertions(+), 2 deletions(-)
rename meta/recipes-devtools/python/{python3-jinja2_3.1.1.bb => python3-jinja2_3.1.3.bb} (92%)
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2023-6377.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2023-6478.patch
--
2.34.1
^ permalink raw reply [flat|nested] 14+ messages in thread* [OE-core][kirkstone 0/4] Patch review @ 2023-12-29 16:07 Steve Sakoman 0 siblings, 0 replies; 14+ messages in thread From: Steve Sakoman @ 2023-12-29 16:07 UTC (permalink / raw) To: openembedded-core Please review this set of changes for kirkstone and have comments back by end of day Wednesday, January 3 Passed a-full on autobuilder: https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/6384 The following changes since commit 2afd9a6002cba2a23dd62a1805b4be04083c041b: testimage: Exclude wtmp from target-dumper commands (2023-12-20 11:40:13 -1000) are available in the Git repository at: https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut Archana Polampalli (2): openssh: fix CVE-2023-51384 openssh: fix CVE-2023-51385 Khem Raj (1): elfutils: Disable stringop-overflow warning for build host Steve Sakoman (1): testimage: drop target_dumper, host_dumper, and monitor_dumper meta/classes/testimage.bbclass | 24 --- .../openssh/openssh/CVE-2023-51384.patch | 171 ++++++++++++++++++ .../openssh/openssh/CVE-2023-51385.patch | 97 ++++++++++ .../openssh/openssh_8.9p1.bb | 2 + .../elfutils/elfutils_0.186.bb | 2 + 5 files changed, 272 insertions(+), 24 deletions(-) create mode 100644 meta/recipes-connectivity/openssh/openssh/CVE-2023-51384.patch create mode 100644 meta/recipes-connectivity/openssh/openssh/CVE-2023-51385.patch -- 2.34.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2025-12-29 23:03 UTC | newest] Thread overview: 14+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2025-01-31 14:15 [OE-core][kirkstone 0/4] Patch review Steve Sakoman 2025-01-31 14:15 ` [OE-core][kirkstone 1/4] openssl: patch CVE-2024-13176 Steve Sakoman 2025-01-31 14:15 ` [OE-core][kirkstone 2/4] binutils: internal gdb: Fix CVE-2024-53589 Steve Sakoman 2025-01-31 14:15 ` [OE-core][kirkstone 3/4] " Steve Sakoman 2025-01-31 14:15 ` [OE-core][kirkstone 4/4] glibc: stable 2.35 branch updates Steve Sakoman -- strict thread matches above, loose matches on Subject: below -- 2025-12-29 23:03 [OE-core][kirkstone 0/4] Patch review Steve Sakoman 2025-12-09 21:53 Steve Sakoman 2025-10-29 2:54 Steve Sakoman 2025-08-05 16:43 Steve Sakoman 2025-04-15 20:52 Steve Sakoman 2025-03-27 14:43 Steve Sakoman 2024-03-07 18:38 Steve Sakoman 2024-02-01 19:37 Steve Sakoman 2023-12-29 16:07 Steve Sakoman
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox