* [OE-core][kirkstone 0/4] Patch review
@ 2023-12-29 16:07 Steve Sakoman
0 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2023-12-29 16:07 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Wednesday, January 3
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/6384
The following changes since commit 2afd9a6002cba2a23dd62a1805b4be04083c041b:
testimage: Exclude wtmp from target-dumper commands (2023-12-20 11:40:13 -1000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Archana Polampalli (2):
openssh: fix CVE-2023-51384
openssh: fix CVE-2023-51385
Khem Raj (1):
elfutils: Disable stringop-overflow warning for build host
Steve Sakoman (1):
testimage: drop target_dumper, host_dumper, and monitor_dumper
meta/classes/testimage.bbclass | 24 ---
.../openssh/openssh/CVE-2023-51384.patch | 171 ++++++++++++++++++
.../openssh/openssh/CVE-2023-51385.patch | 97 ++++++++++
.../openssh/openssh_8.9p1.bb | 2 +
.../elfutils/elfutils_0.186.bb | 2 +
5 files changed, 272 insertions(+), 24 deletions(-)
create mode 100644 meta/recipes-connectivity/openssh/openssh/CVE-2023-51384.patch
create mode 100644 meta/recipes-connectivity/openssh/openssh/CVE-2023-51385.patch
--
2.34.1
^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review
@ 2024-02-01 19:37 Steve Sakoman
0 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2024-02-01 19:37 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Monday, February 5
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/6513
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/6513
The following changes since commit a744a897f0ea7d34c31c024c13031221f9a85f24:
build-appliance-image: Update to kirkstone head revision (2024-01-25 04:06:50 -1000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Alexander Kanavin (1):
python3-jinja2: upgrade 3.1.1 -> 3.1.2
Lee Chee Yang (1):
xwayland: Fix CVE-2023-6377 CVE-2023-6478
Ludovic Jozeau (1):
image-live.bbclass: LIVE_ROOTFS_TYPE support compression
Wang Mingyu (1):
python3-jinja2: upgrade 3.1.2 -> 3.1.3
meta/classes/image-live.bbclass | 2 +-
...inja2_3.1.1.bb => python3-jinja2_3.1.3.bb} | 2 +-
.../xwayland/xwayland/CVE-2023-6377.patch | 82 +++++++++++++++++++
.../xwayland/xwayland/CVE-2023-6478.patch | 66 +++++++++++++++
.../xwayland/xwayland_22.1.8.bb | 2 +
5 files changed, 152 insertions(+), 2 deletions(-)
rename meta/recipes-devtools/python/{python3-jinja2_3.1.1.bb => python3-jinja2_3.1.3.bb} (92%)
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2023-6377.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2023-6478.patch
--
2.34.1
^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review
@ 2024-03-07 18:38 Steve Sakoman
0 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2024-03-07 18:38 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Monday, March 11
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/6658
The following changes since commit d63af11e92094487d6e358f27283e5385937e7a8:
kernel.bbclass: Set pkg-config variables for building modules (2024-03-03 11:56:20 -1000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Chen Qi (1):
useradd-example: do not use unsupported clear text password
Fabio Estevam (1):
u-boot: Move UBOOT_INITIAL_ENV back to u-boot.inc
Hitendra Prajapati (1):
golang: Fix CVE-2023-45289 & CVE-2023-45290
Steve Sakoman (1):
selftest: skip virgl gtk/sdl test on ubuntu 18.04
.../useradd/useradd-example.bb | 4 +-
meta/classes/uboot-config.bbclass | 4 -
meta/lib/oeqa/selftest/cases/runtime_test.py | 2 +
meta/recipes-bsp/u-boot/u-boot.inc | 4 +
meta/recipes-devtools/go/go-1.17.13.inc | 2 +
.../go/go-1.21/CVE-2023-45289.patch | 121 ++++++++
.../go/go-1.21/CVE-2023-45290.patch | 270 ++++++++++++++++++
7 files changed, 401 insertions(+), 6 deletions(-)
create mode 100644 meta/recipes-devtools/go/go-1.21/CVE-2023-45289.patch
create mode 100644 meta/recipes-devtools/go/go-1.21/CVE-2023-45290.patch
--
2.34.1
^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review
@ 2025-01-31 14:15 Steve Sakoman
0 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-01-31 14:15 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Tuesday, February 3
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/911
The following changes since commit 077aab43f2c928eb8da71934405c62327010f552:
classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package architecture (2025-01-20 06:06:07 -0800)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Deepesh Varatharajan (1):
glibc: stable 2.35 branch updates
Peter Marko (1):
openssl: patch CVE-2024-13176
Yash Shinde (2):
binutils: internal gdb: Fix CVE-2024-53589
gdb: Fix CVE-2024-53589
.../openssl/openssl/CVE-2024-13176.patch | 125 ++++++++++++++++++
.../openssl/openssl_3.0.15.bb | 1 +
meta/recipes-core/glibc/glibc-version.inc | 2 +-
.../binutils/binutils-2.38.inc | 1 +
.../binutils/0037-CVE-2024-53589.patch | 92 +++++++++++++
meta/recipes-devtools/gdb/gdb.inc | 1 +
.../gdb/gdb/0014-CVE-2024-53589.patch | 92 +++++++++++++
7 files changed, 313 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-13176.patch
create mode 100644 meta/recipes-devtools/binutils/binutils/0037-CVE-2024-53589.patch
create mode 100644 meta/recipes-devtools/gdb/gdb/0014-CVE-2024-53589.patch
--
2.43.0
^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review
@ 2025-03-27 14:43 Steve Sakoman
0 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-03-27 14:43 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirktone and have comments back by
end of day Monday, March 31
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/1277
The following changes since commit 1172a71f2104454a13e64886adbdb381aa8d6e0e:
libxcrypt-compat: Remove libcrypt.so to fix conflict with libcrypt (2025-03-21 06:48:11 -0700)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Bruce Ashfield (2):
linux-yocto/5.15: update to v5.15.179
linux-yocto/5.10: update to v5.10.234
Peter Marko (1):
python3: patch CVE-2025-0938
Vijay Anusuri (1):
vim: Upgrade 9.1.1115 -> 9.1.1198
.../python/python3/CVE-2025-0938.patch | 131 ++++++++++++++++++
.../python/python3_3.10.16.bb | 1 +
.../linux/linux-yocto-rt_5.10.bb | 6 +-
.../linux/linux-yocto-rt_5.15.bb | 6 +-
.../linux/linux-yocto-tiny_5.10.bb | 8 +-
.../linux/linux-yocto-tiny_5.15.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 ++--
meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 ++--
meta/recipes-support/vim/vim.inc | 4 +-
9 files changed, 172 insertions(+), 40 deletions(-)
create mode 100644 meta/recipes-devtools/python/python3/CVE-2025-0938.patch
--
2.43.0
^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review
@ 2025-04-15 20:52 Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 1/4] cve-update-nvd2-native: add workaround for json5 style list Steve Sakoman
` (3 more replies)
0 siblings, 4 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-04-15 20:52 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Thursday, April 17
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/1401
The following changes since commit 7399cf17590204f8289f356cce4575592d6e3536:
ghostscript: Fix CVE-2025-27836 (2025-04-08 08:36:03 -0700)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Divya Chellam (1):
ruby: fix CVE-2024-43398
Hitendra Prajapati (1):
go: fix CVE-2025-22871
Peter Marko (2):
cve-update-nvd2-native: add workaround for json5 style list
systemd: ignore CVEs which reappeared after upgrade to 250.14
.../meta/cve-update-nvd2-native.bb | 5 +
meta/recipes-core/systemd/systemd.inc | 3 +
meta/recipes-devtools/go/go-1.17.13.inc | 1 +
.../go/go-1.21/CVE-2025-22871.patch | 172 ++++++++++++++++++
.../ruby/ruby/CVE-2024-43398.patch | 81 +++++++++
meta/recipes-devtools/ruby/ruby_3.1.3.bb | 1 +
6 files changed, 263 insertions(+)
create mode 100644 meta/recipes-devtools/go/go-1.21/CVE-2025-22871.patch
create mode 100644 meta/recipes-devtools/ruby/ruby/CVE-2024-43398.patch
--
2.43.0
^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 1/4] cve-update-nvd2-native: add workaround for json5 style list
2025-04-15 20:52 [OE-core][kirkstone 0/4] Patch review Steve Sakoman
@ 2025-04-15 20:52 ` Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 2/4] systemd: ignore CVEs which reappeared after upgrade to 250.14 Steve Sakoman
` (2 subsequent siblings)
3 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-04-15 20:52 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
NVD responses changed to an invalid json between:
* April 5, 2025 at 3:03:44 AM GMT+2
* April 5, 2025 at 4:19:48 AM GMT+2
The last response is since then in format
{
"resultsPerPage": 625,
"startIndex": 288000,
"totalResults": 288625,
"format": "NVD_CVE",
"version": "2.0",
"timestamp": "2025-04-07T07:17:17.534",
"vulnerabilities": [
{...},
...
{...},
]
}
Json does not allow trailing , in responses, that is json5 format.
So cve-update-nvd2-native do_Fetch task fails with log backtrace ending:
...
File: '/builds/ccp/meta-siemens/projects/ccp/../../poky/meta/recipes-core/meta/cve-update-nvd2-native.bb', lineno: 234, function: update_db_file
0230: if raw_data is None:
0231: # We haven't managed to download data
0232: return False
0233:
*** 0234: data = json.loads(raw_data)
0235:
0236: index = data["startIndex"]
0237: total = data["totalResults"]
0238: per_page = data["resultsPerPage"]
...
File: '/usr/lib/python3.11/json/decoder.py', lineno: 355, function: raw_decode
0351: """
0352: try:
0353: obj, end = self.scan_once(s, idx)
0354: except StopIteration as err:
*** 0355: raise JSONDecodeError("Expecting value", s, err.value) from None
0356: return obj, end
Exception: json.decoder.JSONDecodeError: Expecting value: line 1 column 1442633 (char 1442632)
...
There was no announcement about json format of API v2.0 by nvd.
Also this happens only if whole database is queried (database update is
fine, even when multiple pages as queried).
And lastly it's only the cve list, all other lists inside are fine.
So this looks like a bug in NVD 2.0 introduced with some update.
Patch this with simple character deletion for now and let's monitor the
situation and possibly switch to json5 in the future.
Note that there is no native json5 support in python, we'd have to use
one of external libraries for it.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 6e526327f5c9e739ac7981e4a43a4ce53a908945)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-core/meta/cve-update-nvd2-native.bb | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/meta/recipes-core/meta/cve-update-nvd2-native.bb b/meta/recipes-core/meta/cve-update-nvd2-native.bb
index b8faee68d6..9808120cab 100644
--- a/meta/recipes-core/meta/cve-update-nvd2-native.bb
+++ b/meta/recipes-core/meta/cve-update-nvd2-native.bb
@@ -226,6 +226,11 @@ def update_db_file(db_tmp_file, d, database_time):
# We haven't managed to download data
return False
+ # hack for json5 style responses
+ if raw_data[-3:] == ',]}':
+ bb.note("Removing trailing ',' from nvd response")
+ raw_data = raw_data[:-3] + ']}'
+
data = json.loads(raw_data)
index = data["startIndex"]
--
2.43.0
^ permalink raw reply related [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 2/4] systemd: ignore CVEs which reappeared after upgrade to 250.14
2025-04-15 20:52 [OE-core][kirkstone 0/4] Patch review Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 1/4] cve-update-nvd2-native: add workaround for json5 style list Steve Sakoman
@ 2025-04-15 20:52 ` Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 3/4] go: fix CVE-2025-22871 Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 4/4] ruby: fix CVE-2024-43398 Steve Sakoman
3 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-04-15 20:52 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
Upgrade from 250.5 to 250.14 removed patches for these CVEs because they
were interated in the new version.
However NVD DB does not contain information about these backports to
v250 branch, so they need to be ignored.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-core/systemd/systemd.inc | 3 +++
1 file changed, 3 insertions(+)
diff --git a/meta/recipes-core/systemd/systemd.inc b/meta/recipes-core/systemd/systemd.inc
index 86ae4793c3..70ba1d1f77 100644
--- a/meta/recipes-core/systemd/systemd.inc
+++ b/meta/recipes-core/systemd/systemd.inc
@@ -19,3 +19,6 @@ SRCBRANCH = "v250-stable"
SRC_URI = "git://github.com/systemd/systemd-stable.git;protocol=https;branch=${SRCBRANCH}"
S = "${WORKDIR}/git"
+
+# cpe-stable-backport: patches were backported to v250 stable branch
+CVE_CHECK_IGNORE += "CVE-2022-3821 CVE-2022-4415 CVE-2022-45873"
--
2.43.0
^ permalink raw reply related [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 3/4] go: fix CVE-2025-22871
2025-04-15 20:52 [OE-core][kirkstone 0/4] Patch review Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 1/4] cve-update-nvd2-native: add workaround for json5 style list Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 2/4] systemd: ignore CVEs which reappeared after upgrade to 250.14 Steve Sakoman
@ 2025-04-15 20:52 ` Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 4/4] ruby: fix CVE-2024-43398 Steve Sakoman
3 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-04-15 20:52 UTC (permalink / raw)
To: openembedded-core
From: Hitendra Prajapati <hprajapati@mvista.com>
Upstream-Status: Backport from https://github.com/golang/go/commit/15e01a2e43ecb8c7e15ff7e9d62fe3f10dcac931
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-devtools/go/go-1.17.13.inc | 1 +
.../go/go-1.21/CVE-2025-22871.patch | 172 ++++++++++++++++++
2 files changed, 173 insertions(+)
create mode 100644 meta/recipes-devtools/go/go-1.21/CVE-2025-22871.patch
diff --git a/meta/recipes-devtools/go/go-1.17.13.inc b/meta/recipes-devtools/go/go-1.17.13.inc
index 34ad70572f..e54205d48c 100644
--- a/meta/recipes-devtools/go/go-1.17.13.inc
+++ b/meta/recipes-devtools/go/go-1.17.13.inc
@@ -62,6 +62,7 @@ SRC_URI += "\
file://CVE-2024-34156.patch \
file://CVE-2024-34158.patch \
file://CVE-2024-45336.patch \
+ file://CVE-2025-22871.patch \
"
SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd"
diff --git a/meta/recipes-devtools/go/go-1.21/CVE-2025-22871.patch b/meta/recipes-devtools/go/go-1.21/CVE-2025-22871.patch
new file mode 100644
index 0000000000..06e0fa77de
--- /dev/null
+++ b/meta/recipes-devtools/go/go-1.21/CVE-2025-22871.patch
@@ -0,0 +1,172 @@
+From 15e01a2e43ecb8c7e15ff7e9d62fe3f10dcac931 Mon Sep 17 00:00:00 2001
+From: Damien Neil <dneil@google.com>
+Date: Wed, 26 Feb 2025 13:40:00 -0800
+Subject: [PATCH] [release-branch.go1.23] net/http: reject newlines in
+ chunk-size lines
+
+Unlike request headers, where we are allowed to leniently accept
+a bare LF in place of a CRLF, chunked bodies must always use CRLF
+line terminators. We were already enforcing this for chunk-data lines;
+do so for chunk-size lines as well. Also reject bare CRs anywhere
+other than as part of the CRLF terminator.
+
+Fixes CVE-2025-22871
+Fixes #72010
+For #71988
+
+Change-Id: Ib0e21af5a8ba28c2a1ca52b72af8e2265ec79e4a
+Reviewed-on: https://go-review.googlesource.com/c/go/+/652998
+Reviewed-by: Jonathan Amsterdam <jba@google.com>
+LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
+(cherry picked from commit d31c805535f3fde95646ee4d87636aaaea66847b)
+Reviewed-on: https://go-review.googlesource.com/c/go/+/657216
+
+Upstream-Status: Backport [https://github.com/golang/go/commit/15e01a2e43ecb8c7e15ff7e9d62fe3f10dcac931]
+CVE: CVE-2025-22871
+Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
+---
+ src/net/http/internal/chunked.go | 19 +++++++++--
+ src/net/http/internal/chunked_test.go | 27 +++++++++++++++
+ src/net/http/serve_test.go | 49 +++++++++++++++++++++++++++
+ 3 files changed, 92 insertions(+), 3 deletions(-)
+
+diff --git a/src/net/http/internal/chunked.go b/src/net/http/internal/chunked.go
+index ddbaacb..dd79afc 100644
+--- a/src/net/http/internal/chunked.go
++++ b/src/net/http/internal/chunked.go
+@@ -159,6 +159,19 @@ func readChunkLine(b *bufio.Reader) ([]byte, error) {
+ }
+ return nil, err
+ }
++
++ // RFC 9112 permits parsers to accept a bare \n as a line ending in headers,
++ // but not in chunked encoding lines. See https://www.rfc-editor.org/errata/eid7633,
++ // which explicitly rejects a clarification permitting \n as a chunk terminator.
++ //
++ // Verify that the line ends in a CRLF, and that no CRs appear before the end.
++ if idx := bytes.IndexByte(p, '\r'); idx == -1 {
++ return nil, errors.New("chunked line ends with bare LF")
++ } else if idx != len(p)-2 {
++ return nil, errors.New("invalid CR in chunked line")
++ }
++ p = p[:len(p)-2] // trim CRLF
++
+ if len(p) >= maxLineLength {
+ return nil, ErrLineTooLong
+ }
+@@ -166,14 +179,14 @@ func readChunkLine(b *bufio.Reader) ([]byte, error) {
+ }
+
+ func trimTrailingWhitespace(b []byte) []byte {
+- for len(b) > 0 && isASCIISpace(b[len(b)-1]) {
++ for len(b) > 0 && isOWS(b[len(b)-1]) {
+ b = b[:len(b)-1]
+ }
+ return b
+ }
+
+-func isASCIISpace(b byte) bool {
+- return b == ' ' || b == '\t' || b == '\n' || b == '\r'
++func isOWS(b byte) bool {
++ return b == ' ' || b == '\t'
+ }
+
+ // removeChunkExtension removes any chunk-extension from p.
+diff --git a/src/net/http/internal/chunked_test.go b/src/net/http/internal/chunked_test.go
+index 5fbeb08..51ecd62 100644
+--- a/src/net/http/internal/chunked_test.go
++++ b/src/net/http/internal/chunked_test.go
+@@ -251,6 +251,33 @@ func TestChunkReaderByteAtATime(t *testing.T) {
+ }
+ }
+
++func TestChunkInvalidInputs(t *testing.T) {
++ for _, test := range []struct {
++ name string
++ b string
++ }{{
++ name: "bare LF in chunk size",
++ b: "1\na\r\n0\r\n",
++ }, {
++ name: "extra LF in chunk size",
++ b: "1\r\r\na\r\n0\r\n",
++ }, {
++ name: "bare LF in chunk data",
++ b: "1\r\na\n0\r\n",
++ }, {
++ name: "bare LF in chunk extension",
++ b: "1;\na\r\n0\r\n",
++ }} {
++ t.Run(test.name, func(t *testing.T) {
++ r := NewChunkedReader(strings.NewReader(test.b))
++ got, err := io.ReadAll(r)
++ if err == nil {
++ t.Fatalf("unexpectedly parsed invalid chunked data:\n%q", got)
++ }
++ })
++ }
++}
++
+ type funcReader struct {
+ f func(iteration int) ([]byte, error)
+ i int
+diff --git a/src/net/http/serve_test.go b/src/net/http/serve_test.go
+index bfac783..944cd46 100644
+--- a/src/net/http/serve_test.go
++++ b/src/net/http/serve_test.go
+@@ -6610,3 +6610,52 @@ func testQuerySemicolon(t *testing.T, query string, wantX string, allowSemicolon
+ }
+ }
+ }
++
++func TestInvalidChunkedBodies(t *testing.T) {
++ for _, test := range []struct {
++ name string
++ b string
++ }{{
++ name: "bare LF in chunk size",
++ b: "1\na\r\n0\r\n\r\n",
++ }, {
++ name: "bare LF at body end",
++ b: "1\r\na\r\n0\r\n\n",
++ }} {
++ t.Run(test.name, func(t *testing.T) {
++ reqc := make(chan error)
++ ts := newClientServerTest(t, http1Mode, HandlerFunc(func(w ResponseWriter, r *Request) {
++ got, err := io.ReadAll(r.Body)
++ if err == nil {
++ t.Logf("read body: %q", got)
++ }
++ reqc <- err
++ })).ts
++
++ serverURL, err := url.Parse(ts.URL)
++ if err != nil {
++ t.Fatal(err)
++ }
++
++ conn, err := net.Dial("tcp", serverURL.Host)
++ if err != nil {
++ t.Fatal(err)
++ }
++
++ if _, err := conn.Write([]byte(
++ "POST / HTTP/1.1\r\n" +
++ "Host: localhost\r\n" +
++ "Transfer-Encoding: chunked\r\n" +
++ "Connection: close\r\n" +
++ "\r\n" +
++ test.b)); err != nil {
++ t.Fatal(err)
++ }
++ conn.(*net.TCPConn).CloseWrite()
++
++ if err := <-reqc; err == nil {
++ t.Errorf("server handler: io.ReadAll(r.Body) succeeded, want error")
++ }
++ })
++ }
++}
+--
+2.25.1
+
--
2.43.0
^ permalink raw reply related [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 4/4] ruby: fix CVE-2024-43398
2025-04-15 20:52 [OE-core][kirkstone 0/4] Patch review Steve Sakoman
` (2 preceding siblings ...)
2025-04-15 20:52 ` [OE-core][kirkstone 3/4] go: fix CVE-2025-22871 Steve Sakoman
@ 2025-04-15 20:52 ` Steve Sakoman
3 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-04-15 20:52 UTC (permalink / raw)
To: openembedded-core
From: Divya Chellam <divya.chellam@windriver.com>
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS
vulnerability when it parses an XML that has many deep elements that have
same local name attributes. If you need to parse untrusted XMLs with tree
parser API like REXML::Document.new, you may be impacted to this vulnerability.
If you use other parser APIs such as stream parser API and SAX2 parser API,
this vulnerability is not affected. The REXML gem 3.3.6 or later include the
patch to fix the vulnerability.
Reference:
https://security-tracker.debian.org/tracker/CVE-2024-43398
Upstream-patch:
https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../ruby/ruby/CVE-2024-43398.patch | 81 +++++++++++++++++++
meta/recipes-devtools/ruby/ruby_3.1.3.bb | 1 +
2 files changed, 82 insertions(+)
create mode 100644 meta/recipes-devtools/ruby/ruby/CVE-2024-43398.patch
diff --git a/meta/recipes-devtools/ruby/ruby/CVE-2024-43398.patch b/meta/recipes-devtools/ruby/ruby/CVE-2024-43398.patch
new file mode 100644
index 0000000000..02dc0a20be
--- /dev/null
+++ b/meta/recipes-devtools/ruby/ruby/CVE-2024-43398.patch
@@ -0,0 +1,81 @@
+From 7cb5eaeb221c322b9912f724183294d8ce96bae3 Mon Sep 17 00:00:00 2001
+From: Sutou Kouhei <kou@clear-code.com>
+Date: Sat, 17 Aug 2024 17:45:52 +0900
+Subject: [PATCH] parser tree: improve namespace conflicted attribute check
+ performance
+
+It was slow for deep element.
+
+Reported by l33thaxor. Thanks!!!
+
+The changes to the test folder files are not included in this patch
+because the test folder was not generated during the devtool source build.
+
+CVE: CVE-2024-43398
+
+Upstream-Status: Backport [https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3]
+
+Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
+---
+ .bundle/gems/rexml-3.2.5/lib/rexml/element.rb | 11 -----------
+ .../rexml-3.2.5/lib/rexml/parsers/baseparser.rb | 15 +++++++++++++++
+ 2 files changed, 15 insertions(+), 11 deletions(-)
+
+diff --git a/.bundle/gems/rexml-3.2.5/lib/rexml/element.rb b/.bundle/gems/rexml-3.2.5/lib/rexml/element.rb
+index 4c21dbd..78e78c2 100644
+--- a/.bundle/gems/rexml-3.2.5/lib/rexml/element.rb
++++ b/.bundle/gems/rexml-3.2.5/lib/rexml/element.rb
+@@ -2388,17 +2388,6 @@ module REXML
+ elsif old_attr.kind_of? Hash
+ old_attr[value.prefix] = value
+ elsif old_attr.prefix != value.prefix
+- # Check for conflicting namespaces
+- if value.prefix != "xmlns" and old_attr.prefix != "xmlns"
+- old_namespace = old_attr.namespace
+- new_namespace = value.namespace
+- if old_namespace == new_namespace
+- raise ParseException.new(
+- "Namespace conflict in adding attribute \"#{value.name}\": "+
+- "Prefix \"#{old_attr.prefix}\" = \"#{old_namespace}\" and "+
+- "prefix \"#{value.prefix}\" = \"#{new_namespace}\"")
+- end
+- end
+ store value.name, {old_attr.prefix => old_attr,
+ value.prefix => value}
+ else
+diff --git a/.bundle/gems/rexml-3.2.5/lib/rexml/parsers/baseparser.rb b/.bundle/gems/rexml-3.2.5/lib/rexml/parsers/baseparser.rb
+index e32c7f4..154f2ac 100644
+--- a/.bundle/gems/rexml-3.2.5/lib/rexml/parsers/baseparser.rb
++++ b/.bundle/gems/rexml-3.2.5/lib/rexml/parsers/baseparser.rb
+@@ -634,6 +634,7 @@ module REXML
+
+ def parse_attributes(prefixes, curr_ns)
+ attributes = {}
++ expanded_names = {}
+ closed = false
+ match_data = @source.match(/^(.*?)(\/)?>/um, true)
+ if match_data.nil?
+@@ -641,6 +642,20 @@ module REXML
+ raise REXML::ParseException.new(message, @source)
+ end
+
++ unless prefix == "xmlns"
++ uri = @namespaces[prefix]
++ expanded_name = [uri, local_part]
++ existing_prefix = expanded_names[expanded_name]
++ if existing_prefix
++ message = "Namespace conflict in adding attribute " +
++ "\"#{local_part}\": " +
++ "Prefix \"#{existing_prefix}\" = \"#{uri}\" and " +
++ "prefix \"#{prefix}\" = \"#{uri}\""
++ raise REXML::ParseException.new(message, @source, self)
++ end
++ expanded_names[expanded_name] = prefix
++ end
++
+ raw_attributes = match_data[1]
+ closed = !match_data[2].nil?
+ return attributes, closed if raw_attributes.nil?
+--
+2.40.0
+
diff --git a/meta/recipes-devtools/ruby/ruby_3.1.3.bb b/meta/recipes-devtools/ruby/ruby_3.1.3.bb
index 76e5ac81ed..ca061e7f70 100644
--- a/meta/recipes-devtools/ruby/ruby_3.1.3.bb
+++ b/meta/recipes-devtools/ruby/ruby_3.1.3.bb
@@ -48,6 +48,7 @@ SRC_URI = "http://cache.ruby-lang.org/pub/ruby/${SHRT_VER}/ruby-${PV}.tar.gz \
file://CVE-2024-41946.patch \
file://CVE-2025-27220.patch \
file://CVE-2025-27219.patch \
+ file://CVE-2024-43398.patch \
"
UPSTREAM_CHECK_URI = "https://www.ruby-lang.org/en/downloads/"
--
2.43.0
^ permalink raw reply related [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review
@ 2025-08-05 16:43 Steve Sakoman
0 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-08-05 16:43 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Thursday, August 7
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/2150
The following changes since commit b4a2f74ba0b40abcdf56c4b58cae5f7ce145d511:
sqlite3: Fix CVE-2025-6965 (2025-07-29 06:39:06 -0700)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Peter Marko (3):
sqlite3: patch CVE-2025-7458
sqlite3: ignore CVE-2025-3277
glibc: stable 2.35 branch updates
Zhang Peng (1):
avahi: fix CVE-2024-52615
meta/recipes-connectivity/avahi/avahi_0.8.bb | 1 +
.../avahi/files/CVE-2024-52615.patch | 228 ++++++++++++++++
meta/recipes-core/glibc/glibc-version.inc | 2 +-
.../glibc/glibc/0025-CVE-2025-4802.patch | 250 ------------------
meta/recipes-core/glibc/glibc_2.35.bb | 2 +-
...mpts-to-improve-the-detection-of-cov.patch | 91 +++++++
.../sqlite/files/CVE-2025-7458.patch | 32 +++
meta/recipes-support/sqlite/sqlite3_3.38.5.bb | 4 +
8 files changed, 358 insertions(+), 252 deletions(-)
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2024-52615.patch
delete mode 100644 meta/recipes-core/glibc/glibc/0025-CVE-2025-4802.patch
create mode 100644 meta/recipes-support/sqlite/files/0001-This-branch-attempts-to-improve-the-detection-of-cov.patch
create mode 100644 meta/recipes-support/sqlite/files/CVE-2025-7458.patch
--
2.43.0
^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review
@ 2025-10-29 2:54 Steve Sakoman
0 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-10-29 2:54 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Thursday, October 30
Passed a-full on the autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/2650
The following changes since commit 9b3dbd691f6ebdbdfe88cef3d3a676ddd1399c63:
python3: upgrade 3.10.18 -> 3.10.19 (2025-10-17 07:39:27 -0700)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Hitendra Prajapati (1):
git: fix CVE-2025-48386
Peter Marko (1):
lz4: patch CVE-2025-62813
Yash Shinde (2):
binutils: fix CVE-2025-11081
binutils: fix CVE-2025-8225
.../binutils/binutils-2.38.inc | 2 +
.../binutils/0046-CVE-2025-11081.patch | 84 ++++++++++++++++
.../binutils/0047-CVE-2025-8225.patch | 47 +++++++++
.../git/git/CVE-2025-48386.patch | 97 +++++++++++++++++++
meta/recipes-devtools/git/git_2.35.7.bb | 1 +
.../lz4/files/CVE-2025-62813.patch | 69 +++++++++++++
meta/recipes-support/lz4/lz4_1.9.4.bb | 4 +-
7 files changed, 303 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-devtools/binutils/binutils/0046-CVE-2025-11081.patch
create mode 100644 meta/recipes-devtools/binutils/binutils/0047-CVE-2025-8225.patch
create mode 100644 meta/recipes-devtools/git/git/CVE-2025-48386.patch
create mode 100644 meta/recipes-support/lz4/files/CVE-2025-62813.patch
--
2.43.0
^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review
@ 2025-12-09 21:53 Steve Sakoman
0 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-12-09 21:53 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Thursday, December 11
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/2836
The following changes since commit 80c7fd87fd95a79c6eb5f41b95cf70ccc70d9615:
systemd-bootchart: update SRC_URI branch (2025-12-01 07:13:56 -0800)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Hitendra Prajapati (2):
libxml2: Security fix for CVE-2025-7425
openssh: fix CVE-2025-61984
Peter Marko (2):
libpng: patch CVE-2025-66293
libmicrohttpd: disable experimental code by default
.../openssh/openssh/CVE-2025-61984.patch | 98 +++
.../openssh/openssh_8.9p1.bb | 1 +
.../libxml/libxml2/CVE-2025-7425.patch | 802 ++++++++++++++++++
meta/recipes-core/libxml/libxml2_2.9.14.bb | 1 +
.../libpng/files/CVE-2025-66293-01.patch | 60 ++
.../libpng/files/CVE-2025-66293-02.patch | 125 +++
.../libpng/libpng_1.6.39.bb | 2 +
.../libmicrohttpd/libmicrohttpd_0.9.76.bb | 3 +
8 files changed, 1092 insertions(+)
create mode 100644 meta/recipes-connectivity/openssh/openssh/CVE-2025-61984.patch
create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2025-7425.patch
create mode 100644 meta/recipes-multimedia/libpng/files/CVE-2025-66293-01.patch
create mode 100644 meta/recipes-multimedia/libpng/files/CVE-2025-66293-02.patch
--
2.43.0
^ permalink raw reply [flat|nested] 14+ messages in thread
* [OE-core][kirkstone 0/4] Patch review
@ 2025-12-29 23:03 Steve Sakoman
0 siblings, 0 replies; 14+ messages in thread
From: Steve Sakoman @ 2025-12-29 23:03 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Wednesday, December 31
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/2953
The following changes since commit c15faee8854e85e02693a041d88326f30b24ee92:
cross.bbclass: Propagate dependencies to outhash (2025-12-29 08:40:22 -0800)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Jiaying Song (1):
grub: fix CVE-2025-61661 CVE-2025-61662 CVE-2025-61663 CVE-2025-61664
Vijay Anusuri (3):
go: Update CVE-2025-58187
go: Fix CVE-2025-61727
go: Fix CVE-2025-61729
.../grub/files/CVE-2025-61661.patch | 40 ++
.../grub/files/CVE-2025-61662.patch | 72 +++
.../grub/files/CVE-2025-61663_61664.patch | 64 +++
meta/recipes-bsp/grub/grub2.inc | 3 +
meta/recipes-devtools/go/go-1.17.13.inc | 5 +-
...025-58187.patch => CVE-2025-58187-1.patch} | 0
.../go/go-1.18/CVE-2025-58187-2.patch | 516 ++++++++++++++++++
.../go/go-1.18/CVE-2025-61727.patch | 229 ++++++++
.../go/go-1.18/CVE-2025-61729.patch | 172 ++++++
9 files changed, 1100 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-bsp/grub/files/CVE-2025-61661.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2025-61662.patch
create mode 100644 meta/recipes-bsp/grub/files/CVE-2025-61663_61664.patch
rename meta/recipes-devtools/go/go-1.18/{CVE-2025-58187.patch => CVE-2025-58187-1.patch} (100%)
create mode 100644 meta/recipes-devtools/go/go-1.18/CVE-2025-58187-2.patch
create mode 100644 meta/recipes-devtools/go/go-1.18/CVE-2025-61727.patch
create mode 100644 meta/recipes-devtools/go/go-1.18/CVE-2025-61729.patch
--
2.43.0
^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2025-12-29 23:03 UTC | newest]
Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-04-15 20:52 [OE-core][kirkstone 0/4] Patch review Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 1/4] cve-update-nvd2-native: add workaround for json5 style list Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 2/4] systemd: ignore CVEs which reappeared after upgrade to 250.14 Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 3/4] go: fix CVE-2025-22871 Steve Sakoman
2025-04-15 20:52 ` [OE-core][kirkstone 4/4] ruby: fix CVE-2024-43398 Steve Sakoman
-- strict thread matches above, loose matches on Subject: below --
2025-12-29 23:03 [OE-core][kirkstone 0/4] Patch review Steve Sakoman
2025-12-09 21:53 Steve Sakoman
2025-10-29 2:54 Steve Sakoman
2025-08-05 16:43 Steve Sakoman
2025-03-27 14:43 Steve Sakoman
2025-01-31 14:15 Steve Sakoman
2024-03-07 18:38 Steve Sakoman
2024-02-01 19:37 Steve Sakoman
2023-12-29 16:07 Steve Sakoman
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox