* [OE-core][kirkstone 00/24] Patch review
@ 2022-08-27 18:25 Steve Sakoman
0 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2022-08-27 18:25 UTC (permalink / raw)
To: openembedded-core
Please review this set of patches for kirkstone and have comments back by
end of day Tuesday.
Pass a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/4141
The following changes since commit 7709a8c1c1b2dcf05678f1a2a1fd579a95e492f2:
packagegroup-self-hosted: update for strace (2022-08-23 04:23:01 -1000)
are available in the Git repository at:
git://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Alexander Kanavin (10):
tzdata: upgrade 2022a -> 2022b
xz: update 5.2.5 -> 5.2.6
gdk-pixbuf: upgrade 2.42.6 -> 2.42.8
gdk-pixbuf: update 2.42.8 -> 2.42.9
epiphany: upgrade 42.3 -> 42.4
glib-networking: upgrade 2.72.1 -> 2.72.2
libjpeg-turbo: upgrade 2.1.3 -> 2.1.4
libwebp: upgrade 1.2.3 -> 1.2.4
wireless-regdb: upgrade 2022.06.06 -> 2022.08.12
wpebackend-fdo: upgrade 1.12.0 -> 1.12.1
Awais Belal (1):
kernel-fitimage.bbclass: only package unique DTBs
Bertrand Marquis (1):
sysvinit-inittab/start_getty: Fix respawn too fast
Hitendra Prajapati (1):
Revert "gdk-pixbuf: CVE-2021-46829 a heap-based buffer overflow"
Jon Mason (1):
oeqa/parselogs: add qemuarmv5 arm-charlcd masking
Pavel Zhukov (1):
package_rpm: Do not replace square brackets in %files
Richard Purdie (1):
vim: Upgrade 9.0.0115 -> 9.0.0242
Ross Burton (7):
oeqa/qemurunner: add run_serial() comment
oeqa/selftest: rename git.py to intercept.py
oeqa/gotoolchain: put writable files in the Go module cache
oeqa/gotoolchain: set CGO_ENABLED=1
wic: add target tools to PATH when executing native commands
wic/bootimg-efi: use cross objcopy when building unified kernel image
wic: depend on cross-binutils
Shubham Kulkarni (1):
sanity: add a comment to ensure CONNECTIVITY_CHECK_URIS is correct
meta/classes/image_types_wic.bbclass | 2 +
meta/classes/kernel-fitimage.bbclass | 8 ++
meta/classes/package_rpm.bbclass | 6 --
meta/classes/sanity.bbclass | 1 +
meta/lib/oeqa/runtime/cases/parselogs.py | 1 +
meta/lib/oeqa/selftest/cases/gotoolchain.py | 8 +-
.../selftest/cases/{git.py => intercept.py} | 0
.../oeqa/selftest/cases/oelib/buildhistory.py | 6 +-
meta/lib/oeqa/utils/qemurunner.py | 2 +
...ng_2.72.1.bb => glib-networking_2.72.2.bb} | 2 +-
meta/recipes-core/meta/wic-tools.bb | 3 +-
.../sysvinit/sysvinit-inittab/start_getty | 3 +
meta/recipes-extended/timezone/timezone.inc | 6 +-
.../xz/xz/CVE-2022-1271.patch | 96 -------------------
.../xz/{xz_5.2.5.bb => xz_5.2.6.bb} | 7 +-
.../{epiphany_42.3.bb => epiphany_42.4.bb} | 2 +-
.../0001-Add-use_prebuilt_tools-option.patch | 18 ++--
.../gdk-pixbuf/CVE-2021-46829.patch | 61 ------------
.../gdk-pixbuf/gdk-pixbuf/fatal-loader.patch | 20 ++--
...-pixbuf_2.42.6.bb => gdk-pixbuf_2.42.9.bb} | 19 ++--
...-turbo_2.1.3.bb => libjpeg-turbo_2.1.4.bb} | 2 +-
....06.06.bb => wireless-regdb_2022.08.12.bb} | 2 +-
.../{libwebp_1.2.3.bb => libwebp_1.2.4.bb} | 2 +-
...fdo_1.12.0.bb => wpebackend-fdo_1.12.1.bb} | 2 +-
meta/recipes-support/vim/vim.inc | 4 +-
scripts/lib/wic/misc.py | 7 +-
scripts/lib/wic/plugins/source/bootimg-efi.py | 25 +++--
27 files changed, 84 insertions(+), 231 deletions(-)
rename meta/lib/oeqa/selftest/cases/{git.py => intercept.py} (100%)
rename meta/recipes-core/glib-networking/{glib-networking_2.72.1.bb => glib-networking_2.72.2.bb} (93%)
delete mode 100644 meta/recipes-extended/xz/xz/CVE-2022-1271.patch
rename meta/recipes-extended/xz/{xz_5.2.5.bb => xz_5.2.6.bb} (88%)
rename meta/recipes-gnome/epiphany/{epiphany_42.3.bb => epiphany_42.4.bb} (94%)
delete mode 100644 meta/recipes-gnome/gdk-pixbuf/gdk-pixbuf/CVE-2021-46829.patch
rename meta/recipes-gnome/gdk-pixbuf/{gdk-pixbuf_2.42.6.bb => gdk-pixbuf_2.42.9.bb} (87%)
rename meta/recipes-graphics/jpeg/{libjpeg-turbo_2.1.3.bb => libjpeg-turbo_2.1.4.bb} (97%)
rename meta/recipes-kernel/wireless-regdb/{wireless-regdb_2022.06.06.bb => wireless-regdb_2022.08.12.bb} (94%)
rename meta/recipes-multimedia/webp/{libwebp_1.2.3.bb => libwebp_1.2.4.bb} (95%)
rename meta/recipes-sato/webkit/{wpebackend-fdo_1.12.0.bb => wpebackend-fdo_1.12.1.bb} (90%)
--
2.25.1
^ permalink raw reply [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 00/24] Patch review
@ 2022-09-07 14:20 Steve Sakoman
0 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2022-09-07 14:20 UTC (permalink / raw)
To: openembedded-core
Please review this set of patches for kirkstone and have comments back by
end of day Friday.
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/4192
The following changes since commit 2363d69d687fc8e53a7c97bf5300e59c9a04f22e:
gcr: Define _GNU_SOURCE (2022-09-03 13:09:42 +0100)
are available in the Git repository at:
git://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Alex Stewart (1):
maintainers: update opkg maintainer
Chee Yang Lee (1):
sqlite: add CVE-2022-35737 patch to SRC_URI
Enrico Scholz (5):
npm: replace 'npm pack' call by 'tar czf'
npm: return content of 'package.json' in 'npm_pack'
npm: take 'version' directly from 'package.json'
lib:npm_registry: initial checkin
npm: use npm_registry to cache package
Joshua Watt (1):
classes: cve-check: Get shared database lock
Khem Raj (1):
apr: Cache configure tests which use AC_TRY_RUN
LUIS ENRIQUEZ (1):
kernel-fitimage.bbclass: add padding algorithm property in config
nodes
Ming Liu (1):
meta: introduce UBOOT_MKIMAGE_KERNEL_TYPE
Rasmus Villemoes (1):
bitbake.conf: set BB_DEFAULT_UMASK using ??=
Richard Purdie (2):
vim: Upgrade 9.0.0242 -> 9.0.0341
pseudo: Update to include recent upstream minor fixes
Robert Joslyn (1):
curl: Backport patch for CVE-2022-35252
Ross Burton (1):
cve-check: close cursors as soon as possible
Ulrich Ölmann (1):
scripts/runqemu.README: fix typos and trailing whitespaces
Yang Xu (1):
insane.bbclass: Skip patches not in oe-core by full path
pgowda (1):
binutils : CVE-2022-38533
wangmy (5):
libtasn1: upgrade 4.18.0 -> 4.19.0
liburcu: upgrade 0.13.1 -> 0.13.2
libwpe: upgrade 1.12.2 -> 1.12.3
libatomic-ops: upgrade 7.6.12 -> 7.6.14
lz4: upgrade 1.9.3 -> 1.9.4
meta/classes/cve-check.bbclass | 36 ++--
meta/classes/insane.bbclass | 3 +-
meta/classes/kernel-fitimage.bbclass | 4 +-
meta/classes/kernel-uboot.bbclass | 3 +
meta/classes/kernel-uimage.bbclass | 2 +-
meta/classes/npm.bbclass | 63 ++++---
meta/classes/uboot-sign.bbclass | 3 +
meta/conf/bitbake.conf | 2 +-
meta/conf/distro/include/maintainers.inc | 8 +-
meta/lib/oe/npm_registry.py | 169 ++++++++++++++++++
meta/lib/oeqa/selftest/cases/fitimage.py | 4 +-
.../recipes-core/meta/cve-update-db-native.bb | 51 +++---
.../binutils/binutils-2.38.inc | 1 +
.../binutils/0015-CVE-2022-38533.patch | 36 ++++
meta/recipes-devtools/pseudo/pseudo_git.bb | 2 +-
...ure-due-to-libc-using-libc-functions.patch | 42 -----
.../{libwpe_1.12.2.bb => libwpe_1.12.3.bb} | 6 +-
...-runtime-test-for-mmap-that-can-map-.patch | 62 +++++++
meta/recipes-support/apr/apr_1.7.0.bb | 15 +-
.../curl/curl/CVE-2022-35252.patch | 72 ++++++++
meta/recipes-support/curl/curl_7.82.0.bb | 1 +
...{libtasn1_4.18.0.bb => libtasn1_4.19.0.bb} | 2 +-
...-ops_7.6.12.bb => libatomic-ops_7.6.14.bb} | 4 +-
.../{liburcu_0.13.1.bb => liburcu_0.13.2.bb} | 2 +-
.../lz4/files/CVE-2021-3520.patch | 27 ---
.../lz4/{lz4_1.9.3.bb => lz4_1.9.4.bb} | 10 +-
meta/recipes-support/sqlite/sqlite3_3.38.5.bb | 4 +-
meta/recipes-support/vim/vim.inc | 4 +-
scripts/runqemu.README | 16 +-
29 files changed, 489 insertions(+), 165 deletions(-)
create mode 100644 meta/lib/oe/npm_registry.py
create mode 100644 meta/recipes-devtools/binutils/binutils/0015-CVE-2022-38533.patch
delete mode 100644 meta/recipes-sato/webkit/libwpe/0001-Fix-build-failure-due-to-libc-using-libc-functions.patch
rename meta/recipes-sato/webkit/{libwpe_1.12.2.bb => libwpe_1.12.3.bb} (72%)
create mode 100644 meta/recipes-support/apr/apr/0001-configure-Remove-runtime-test-for-mmap-that-can-map-.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2022-35252.patch
rename meta/recipes-support/gnutls/{libtasn1_4.18.0.bb => libtasn1_4.19.0.bb} (90%)
rename meta/recipes-support/libatomic-ops/{libatomic-ops_7.6.12.bb => libatomic-ops_7.6.14.bb} (80%)
rename meta/recipes-support/liburcu/{liburcu_0.13.1.bb => liburcu_0.13.2.bb} (91%)
delete mode 100644 meta/recipes-support/lz4/files/CVE-2021-3520.patch
rename meta/recipes-support/lz4/{lz4_1.9.3.bb => lz4_1.9.4.bb} (78%)
--
2.25.1
^ permalink raw reply [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 00/24] Patch review
@ 2025-10-09 19:30 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 01/24] libxml2: fix CVE-2025-9714 Steve Sakoman
` (23 more replies)
0 siblings, 24 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Monday, October 13
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/2552
The following changes since commit 2285f30e643f52511c328e4f6e1f0c042bea4110:
libhandy: update git branch name (2025-09-30 06:42:16 -0700)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Aleksandar Nikolic (1):
scripts/install-buildtools: Update to 4.0.30
Archana Polampalli (2):
go: fix CVE-2025-47906
openssl: upgrade 3.0.17 -> 3.0.18
AshishKumar Mishra (2):
systemd: backport fix for handle USE_NLS from master
p11-kit: backport fix for handle USE_NLS from master
Deepesh Varatharajan (1):
glibc: stable 2.35 branch updates
Gyorgy Sarvari (1):
conf/bitbake.conf: use gnu mirror instead of main server
Peter Marko (10):
busybox: patch CVE-2025-46394
gstreamer1.0: ignore CVEs fixed in plugins
gstreamer1.0: ignore CVE-2025-2759
grub: ignore CVE-2024-2312
ghostscript: patch CVE-2025-59798
ghostscript: patch CVE-2025-59799
ghostscript: patch CVE-2025-59800
pulseaudio: ignore CVE-2024-11586
ffmpeg: ignore CVE-2023-6603
ffmpeg: mark CVE-2023-6601 as patched
Steve Sakoman (2):
selftest/cases/meta_ide.py: use use gnu mirror instead of main server
oeqa/sdk/cases/buildcpio.py: use gnu mirror instead of main server
Theo GAIGE (1):
libxml2: fix CVE-2025-9714
Vijay Anusuri (4):
gstreamer1.0-plugins-bad: Fix CVE-2025-3887
libxslt: Patch for CVE-2025-7424
tiff: Fix CVE-2025-8961
tiff: Fix CVE-2025-9165
meta/conf/bitbake.conf | 2 +-
meta/lib/oeqa/sdk/cases/buildcpio.py | 2 +-
meta/lib/oeqa/selftest/cases/meta_ide.py | 2 +-
meta/recipes-bsp/grub/grub2.inc | 2 +
.../{openssl_3.0.17.bb => openssl_3.0.18.bb} | 2 +-
.../busybox/busybox/CVE-2025-46394-01.patch | 57 ++++++
.../busybox/busybox/CVE-2025-46394-02.patch | 32 ++++
meta/recipes-core/busybox/busybox_1.35.0.bb | 2 +
meta/recipes-core/glibc/glibc-version.inc | 2 +-
.../libxml/libxml2/CVE-2025-9714.patch | 117 ++++++++++++
meta/recipes-core/libxml/libxml2_2.9.14.bb | 1 +
meta/recipes-core/systemd/systemd_250.14.bb | 1 +
meta/recipes-devtools/go/go-1.17.13.inc | 1 +
.../go/go-1.21/CVE-2025-47906.patch | 171 ++++++++++++++++++
.../ghostscript/CVE-2025-59798.patch | 134 ++++++++++++++
.../ghostscript/CVE-2025-59799.patch | 41 +++++
.../ghostscript/CVE-2025-59800.patch | 36 ++++
.../ghostscript/ghostscript_9.55.0.bb | 3 +
...602-CVE-2023-6604-CVE-2023-6605-0002.patch | 2 +-
.../recipes-multimedia/ffmpeg/ffmpeg_5.0.3.bb | 4 +
.../CVE-2025-3887-1.patch | 50 +++++
.../CVE-2025-3887-2.patch | 93 ++++++++++
.../gstreamer1.0-plugins-bad_1.20.7.bb | 2 +
.../gstreamer/gstreamer1.0_1.20.7.bb | 15 +-
.../libtiff/tiff/CVE-2025-8961.patch | 74 ++++++++
.../libtiff/tiff/CVE-2025-9165.patch | 32 ++++
meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 2 +
.../pulseaudio/pulseaudio.inc | 3 +
.../libxslt/libxslt/CVE-2025-7424.patch | 105 +++++++++++
.../recipes-support/libxslt/libxslt_1.1.35.bb | 1 +
.../recipes-support/p11-kit/p11-kit_0.24.1.bb | 1 +
scripts/install-buildtools | 4 +-
32 files changed, 985 insertions(+), 11 deletions(-)
rename meta/recipes-connectivity/openssl/{openssl_3.0.17.bb => openssl_3.0.18.bb} (99%)
create mode 100644 meta/recipes-core/busybox/busybox/CVE-2025-46394-01.patch
create mode 100644 meta/recipes-core/busybox/busybox/CVE-2025-46394-02.patch
create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2025-9714.patch
create mode 100644 meta/recipes-devtools/go/go-1.21/CVE-2025-47906.patch
create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59798.patch
create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59799.patch
create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59800.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad/CVE-2025-3887-1.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad/CVE-2025-3887-2.patch
create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2025-8961.patch
create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2025-9165.patch
create mode 100644 meta/recipes-support/libxslt/libxslt/CVE-2025-7424.patch
--
2.43.0
^ permalink raw reply [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 01/24] libxml2: fix CVE-2025-9714
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 02/24] gstreamer1.0-plugins-bad: Fix CVE-2025-3887 Steve Sakoman
` (22 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Theo GAIGE <tgaige.opensource@witekio.com>
Upstream-Status: Backport from https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21
Signed-off-by: Theo GAIGE <tgaige.opensource@witekio.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../libxml/libxml2/CVE-2025-9714.patch | 117 ++++++++++++++++++
meta/recipes-core/libxml/libxml2_2.9.14.bb | 1 +
2 files changed, 118 insertions(+)
create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2025-9714.patch
diff --git a/meta/recipes-core/libxml/libxml2/CVE-2025-9714.patch b/meta/recipes-core/libxml/libxml2/CVE-2025-9714.patch
new file mode 100644
index 0000000000..24d1a8348c
--- /dev/null
+++ b/meta/recipes-core/libxml/libxml2/CVE-2025-9714.patch
@@ -0,0 +1,117 @@
+From 6ef8b9f05cc21d3fc28156fe5d1251834c29c7d7 Mon Sep 17 00:00:00 2001
+From: Nick Wellnhofer <wellnhofer@aevum.de>
+Date: Thu, 28 Jul 2022 20:21:24 +0200
+Subject: [PATCH] Make XPath depth check work with recursive invocations
+
+EXSLT functions like dyn:map or dyn:evaluate invoke xmlXPathRunEval
+recursively. Don't set depth to zero but keep and restore the original
+value to avoid stack overflows when abusing these functions.
+
+Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21]
+CVE: CVE-2025-9714
+
+Signed-off-by: Theo GAIGE <tgaige.opensource@witekio.com>
+---
+ xpath.c | 23 +++++++++++++++++------
+ 1 file changed, 17 insertions(+), 6 deletions(-)
+
+diff --git a/xpath.c b/xpath.c
+index c2d845888..028471d53 100644
+--- a/xpath.c
++++ b/xpath.c
+@@ -13883,12 +13883,11 @@ static int
+ xmlXPathRunEval(xmlXPathParserContextPtr ctxt, int toBool)
+ {
+ xmlXPathCompExprPtr comp;
++ int oldDepth;
+
+ if ((ctxt == NULL) || (ctxt->comp == NULL))
+ return(-1);
+
+- ctxt->context->depth = 0;
+-
+ if (ctxt->valueTab == NULL) {
+ /* Allocate the value stack */
+ ctxt->valueTab = (xmlXPathObjectPtr *)
+@@ -13942,11 +13941,13 @@ xmlXPathRunEval(xmlXPathParserContextPtr ctxt, int toBool)
+ "xmlXPathRunEval: last is less than zero\n");
+ return(-1);
+ }
++ oldDepth = ctxt->context->depth;
+ if (toBool)
+ return(xmlXPathCompOpEvalToBoolean(ctxt,
+ &comp->steps[comp->last], 0));
+ else
+ xmlXPathCompOpEval(ctxt, &comp->steps[comp->last]);
++ ctxt->context->depth = oldDepth;
+
+ return(0);
+ }
+@@ -14217,6 +14218,7 @@ xmlXPathCompExprPtr
+ xmlXPathCtxtCompile(xmlXPathContextPtr ctxt, const xmlChar *str) {
+ xmlXPathParserContextPtr pctxt;
+ xmlXPathCompExprPtr comp;
++ int oldDepth = 0;
+
+ #ifdef XPATH_STREAMING
+ comp = xmlXPathTryStreamCompile(ctxt, str);
+@@ -14230,8 +14232,10 @@ xmlXPathCtxtCompile(xmlXPathContextPtr ctxt, const xmlChar *str) {
+ if (pctxt == NULL)
+ return NULL;
+ if (ctxt != NULL)
+- ctxt->depth = 0;
++ oldDepth = ctxt->depth;
+ xmlXPathCompileExpr(pctxt, 1);
++ if (ctxt != NULL)
++ ctxt->depth = oldDepth;
+
+ if( pctxt->error != XPATH_EXPRESSION_OK )
+ {
+@@ -14252,8 +14256,10 @@ xmlXPathCtxtCompile(xmlXPathContextPtr ctxt, const xmlChar *str) {
+ comp = pctxt->comp;
+ if ((comp->nbStep > 1) && (comp->last >= 0)) {
+ if (ctxt != NULL)
+- ctxt->depth = 0;
++ oldDepth = ctxt->depth;
+ xmlXPathOptimizeExpression(pctxt, &comp->steps[comp->last]);
++ if (ctxt != NULL)
++ ctxt->depth = oldDepth;
+ }
+ pctxt->comp = NULL;
+ }
+@@ -14409,6 +14415,7 @@ xmlXPathEvalExpr(xmlXPathParserContextPtr ctxt) {
+ #ifdef XPATH_STREAMING
+ xmlXPathCompExprPtr comp;
+ #endif
++ int oldDepth = 0;
+
+ if (ctxt == NULL) return;
+
+@@ -14422,8 +14429,10 @@ xmlXPathEvalExpr(xmlXPathParserContextPtr ctxt) {
+ #endif
+ {
+ if (ctxt->context != NULL)
+- ctxt->context->depth = 0;
++ oldDepth = ctxt->context->depth;
+ xmlXPathCompileExpr(ctxt, 1);
++ if (ctxt->context != NULL)
++ ctxt->context->depth = oldDepth;
+ CHECK_ERROR;
+
+ /* Check for trailing characters. */
+@@ -14432,9 +14441,11 @@ xmlXPathEvalExpr(xmlXPathParserContextPtr ctxt) {
+
+ if ((ctxt->comp->nbStep > 1) && (ctxt->comp->last >= 0)) {
+ if (ctxt->context != NULL)
+- ctxt->context->depth = 0;
++ oldDepth = ctxt->context->depth;
+ xmlXPathOptimizeExpression(ctxt,
+ &ctxt->comp->steps[ctxt->comp->last]);
++ if (ctxt->context != NULL)
++ ctxt->context->depth = oldDepth;
+ }
+ }
+
+--
+2.43.0
+
diff --git a/meta/recipes-core/libxml/libxml2_2.9.14.bb b/meta/recipes-core/libxml/libxml2_2.9.14.bb
index f34b0c25ca..932251da98 100644
--- a/meta/recipes-core/libxml/libxml2_2.9.14.bb
+++ b/meta/recipes-core/libxml/libxml2_2.9.14.bb
@@ -42,6 +42,7 @@ SRC_URI += "http://www.w3.org/XML/Test/xmlts20080827.tar;subdir=${BP};name=testt
file://CVE-2025-6021.patch \
file://CVE-2025-49794-CVE-2025-49796.patch \
file://CVE-2025-6170.patch \
+ file://CVE-2025-9714.patch \
"
SRC_URI[archive.sha256sum] = "60d74a257d1ccec0475e749cba2f21559e48139efba6ff28224357c7c798dfee"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 02/24] gstreamer1.0-plugins-bad: Fix CVE-2025-3887
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 01/24] libxml2: fix CVE-2025-9714 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 03/24] busybox: patch CVE-2025-46394 Steve Sakoman
` (21 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Upstream-Status: Backport from
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/5463f0e09768ca90aa8c58357c1f4c645db580db
& https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/bcaab3609805ea10fb3d9ac0c9d947b4c3563948
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../CVE-2025-3887-1.patch | 50 ++++++++++
.../CVE-2025-3887-2.patch | 93 +++++++++++++++++++
.../gstreamer1.0-plugins-bad_1.20.7.bb | 2 +
3 files changed, 145 insertions(+)
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad/CVE-2025-3887-1.patch
create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad/CVE-2025-3887-2.patch
diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad/CVE-2025-3887-1.patch b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad/CVE-2025-3887-1.patch
new file mode 100644
index 0000000000..8f4922a4ab
--- /dev/null
+++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad/CVE-2025-3887-1.patch
@@ -0,0 +1,50 @@
+From 5463f0e09768ca90aa8c58357c1f4c645db580db Mon Sep 17 00:00:00 2001
+From: Seungha Yang <seungha@centricular.com>
+Date: Sat, 15 Mar 2025 22:39:44 +0900
+Subject: [PATCH 1/2] h265parser: Fix max_dec_pic_buffering_minus1 bound check
+
+Allowed max value is MaxDpbSize - 1
+
+Part-of: <https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8885>
+
+Upstream-Status: Backport [https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/5463f0e09768ca90aa8c58357c1f4c645db580db]
+CVE: CVE-2025-3887
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ gst-libs/gst/codecparsers/gsth265parser.c | 6 ++++--
+ 1 file changed, 4 insertions(+), 2 deletions(-)
+
+diff --git a/gst-libs/gst/codecparsers/gsth265parser.c b/gst-libs/gst/codecparsers/gsth265parser.c
+index 3db1c38..d02e32d 100644
+--- a/gst-libs/gst/codecparsers/gsth265parser.c
++++ b/gst-libs/gst/codecparsers/gsth265parser.c
+@@ -72,6 +72,8 @@
+ #include <string.h>
+ #include <math.h>
+
++#define MAX_DPB_SIZE 16
++
+ #ifndef GST_DISABLE_GST_DEBUG
+ #define GST_CAT_DEFAULT gst_h265_debug_category_get()
+ static GstDebugCategory *
+@@ -1686,7 +1688,7 @@ gst_h265_parse_vps (GstH265NalUnit * nalu, GstH265VPS * vps)
+ for (i =
+ (vps->sub_layer_ordering_info_present_flag ? 0 :
+ vps->max_sub_layers_minus1); i <= vps->max_sub_layers_minus1; i++) {
+- READ_UE_MAX (&nr, vps->max_dec_pic_buffering_minus1[i], G_MAXUINT32 - 1);
++ READ_UE_MAX (&nr, vps->max_dec_pic_buffering_minus1[i], MAX_DPB_SIZE - 1);
+ READ_UE_MAX (&nr, vps->max_num_reorder_pics[i],
+ vps->max_dec_pic_buffering_minus1[i]);
+ READ_UE_MAX (&nr, vps->max_latency_increase_plus1[i], G_MAXUINT32 - 1);
+@@ -1882,7 +1884,7 @@ gst_h265_parse_sps (GstH265Parser * parser, GstH265NalUnit * nalu,
+ for (i =
+ (sps->sub_layer_ordering_info_present_flag ? 0 :
+ sps->max_sub_layers_minus1); i <= sps->max_sub_layers_minus1; i++) {
+- READ_UE_MAX (&nr, sps->max_dec_pic_buffering_minus1[i], 16);
++ READ_UE_MAX (&nr, sps->max_dec_pic_buffering_minus1[i], MAX_DPB_SIZE - 1);
+ READ_UE_MAX (&nr, sps->max_num_reorder_pics[i],
+ sps->max_dec_pic_buffering_minus1[i]);
+ READ_UE_MAX (&nr, sps->max_latency_increase_plus1[i], G_MAXUINT32 - 1);
+--
+2.25.1
+
diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad/CVE-2025-3887-2.patch b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad/CVE-2025-3887-2.patch
new file mode 100644
index 0000000000..3f156f274d
--- /dev/null
+++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad/CVE-2025-3887-2.patch
@@ -0,0 +1,93 @@
+From bcaab3609805ea10fb3d9ac0c9d947b4c3563948 Mon Sep 17 00:00:00 2001
+From: Seungha Yang <seungha@centricular.com>
+Date: Sat, 15 Mar 2025 23:48:52 +0900
+Subject: [PATCH 2/2] h265parser: Fix num_long_term_pics bound check
+
+As defined in the spec 7.4.7.1, calculates allowed maximum
+value of num_long_term_pics
+
+Fixes ZDI-CAN-26596
+
+Fixes: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/4285
+Part-of: <https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8885>
+
+Upstream-Status: Backport [https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/bcaab3609805ea10fb3d9ac0c9d947b4c3563948]
+CVE: CVE-2025-3887
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ gst-libs/gst/codecparsers/gsth265parser.c | 40 +++++++++++++++++++++--
+ 1 file changed, 37 insertions(+), 3 deletions(-)
+
+diff --git a/gst-libs/gst/codecparsers/gsth265parser.c b/gst-libs/gst/codecparsers/gsth265parser.c
+index d02e32d..ad9751f 100644
+--- a/gst-libs/gst/codecparsers/gsth265parser.c
++++ b/gst-libs/gst/codecparsers/gsth265parser.c
+@@ -2513,6 +2513,8 @@ gst_h265_parser_parse_slice_hdr (GstH265Parser * parser,
+ READ_UINT8 (&nr, slice->colour_plane_id, 2);
+
+ if (!GST_H265_IS_NAL_TYPE_IDR (nalu->type)) {
++ const GstH265ShortTermRefPicSet *ref_pic_sets = NULL;
++
+ READ_UINT16 (&nr, slice->pic_order_cnt_lsb,
+ (sps->log2_max_pic_order_cnt_lsb_minus4 + 4));
+
+@@ -2525,21 +2527,53 @@ gst_h265_parser_parse_slice_hdr (GstH265Parser * parser,
+ goto error;
+
+ slice->short_term_ref_pic_set_size = nal_reader_get_pos (&nr) - pos;
++
++ ref_pic_sets = &slice->short_term_ref_pic_sets;
+ } else if (sps->num_short_term_ref_pic_sets > 1) {
+ const guint n = ceil_log2 (sps->num_short_term_ref_pic_sets);
+ READ_UINT8 (&nr, slice->short_term_ref_pic_set_idx, n);
+ CHECK_ALLOWED_MAX (slice->short_term_ref_pic_set_idx,
+ sps->num_short_term_ref_pic_sets - 1);
++ ref_pic_sets =
++ &sps->short_term_ref_pic_set[slice->short_term_ref_pic_set_idx];
++ } else {
++ ref_pic_sets = &sps->short_term_ref_pic_set[0];
+ }
+
+ if (sps->long_term_ref_pics_present_flag) {
+ guint32 limit;
++ gint max_num_long_term_pics = 0;
++ gint TwoVersionsOfCurrDecPicFlag = 0;
+
+- if (sps->num_long_term_ref_pics_sps > 0)
++ if (sps->num_long_term_ref_pics_sps > 0) {
+ READ_UE_MAX (&nr, slice->num_long_term_sps,
+ sps->num_long_term_ref_pics_sps);
+-
+- READ_UE_MAX (&nr, slice->num_long_term_pics, 16);
++ }
++
++ /* 7.4.3.3.3 */
++ if (pps->pps_scc_extension_flag &&
++ pps->pps_scc_extension_params.pps_curr_pic_ref_enabled_flag &&
++ (sps->sample_adaptive_offset_enabled_flag ||
++ !pps->deblocking_filter_disabled_flag ||
++ pps->deblocking_filter_override_enabled_flag)) {
++ TwoVersionsOfCurrDecPicFlag = 1;
++ }
++
++ /* Calculated upper bound num_long_term_pics can have. 7.4.7.1 */
++ max_num_long_term_pics =
++ /* sps_max_dec_pic_buffering_minus1[TemporalId], allowed max is
++ * MaxDpbSize - 1 */
++ MAX_DPB_SIZE - 1
++ - (gint) slice->num_long_term_sps
++ - (gint) ref_pic_sets->NumNegativePics
++ - (gint) ref_pic_sets->NumPositivePics -
++ TwoVersionsOfCurrDecPicFlag;
++ if (max_num_long_term_pics < 0) {
++ GST_WARNING ("Invalid stream, too many reference pictures");
++ goto error;
++ }
++
++ READ_UE_MAX (&nr, slice->num_long_term_pics, max_num_long_term_pics);
+ limit = slice->num_long_term_sps + slice->num_long_term_pics;
+ for (i = 0; i < limit; i++) {
+ if (i < slice->num_long_term_sps) {
+--
+2.25.1
+
diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad_1.20.7.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad_1.20.7.bb
index dbe2b64c32..80f6929c16 100644
--- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad_1.20.7.bb
+++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-bad_1.20.7.bb
@@ -17,6 +17,8 @@ SRC_URI = "https://gstreamer.freedesktop.org/src/gst-plugins-bad/gst-plugins-bad
file://CVE-2024-0444.patch \
file://CVE-2023-44446.patch \
file://CVE-2023-50186.patch \
+ file://CVE-2025-3887-1.patch \
+ file://CVE-2025-3887-2.patch \
"
SRC_URI[sha256sum] = "87251beebfd1325e5118cc67774061f6e8971761ca65a9e5957919610080d195"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 03/24] busybox: patch CVE-2025-46394
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 01/24] libxml2: fix CVE-2025-9714 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 02/24] gstreamer1.0-plugins-bad: Fix CVE-2025-3887 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 04/24] libxslt: Patch for CVE-2025-7424 Steve Sakoman
` (20 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
Pick commit mentioning this CVE.
Additionally fix test broken by the CVE fix.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../busybox/busybox/CVE-2025-46394-01.patch | 57 +++++++++++++++++++
.../busybox/busybox/CVE-2025-46394-02.patch | 32 +++++++++++
meta/recipes-core/busybox/busybox_1.35.0.bb | 2 +
3 files changed, 91 insertions(+)
create mode 100644 meta/recipes-core/busybox/busybox/CVE-2025-46394-01.patch
create mode 100644 meta/recipes-core/busybox/busybox/CVE-2025-46394-02.patch
diff --git a/meta/recipes-core/busybox/busybox/CVE-2025-46394-01.patch b/meta/recipes-core/busybox/busybox/CVE-2025-46394-01.patch
new file mode 100644
index 0000000000..c95cba3c33
--- /dev/null
+++ b/meta/recipes-core/busybox/busybox/CVE-2025-46394-01.patch
@@ -0,0 +1,57 @@
+From f5e1bf966b19ea1821f00a8c9ecd7774598689b4 Mon Sep 17 00:00:00 2001
+From: Denys Vlasenko <vda.linux@googlemail.com>
+Date: Wed, 24 Sep 2025 03:28:47 +0200
+Subject: [PATCH] archival/libarchive: sanitize filenames on output (prevent
+ control sequence attacks
+
+This fixes CVE-2025-46394 (terminal escape sequence injection)
+
+Original credit: Ian.Norton at entrust.com
+
+function old new delta
+header_list 9 15 +6
+header_verbose_list 239 244 +5
+------------------------------------------------------------------------------
+(add/remove: 0/0 grow/shrink: 2/0 up/down: 11/0) Total: 11 bytes
+
+Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
+
+CVE: CVE-2025-46394
+Upstream-Status: Backport [https://git.busybox.net/busybox/commit/?id=f5e1bf966b19ea1821f00a8c9ecd7774598689b4]
+Signed-off-by: Peter Marko <peter.marko@siemens.com>
+---
+ archival/libarchive/header_list.c | 2 +-
+ archival/libarchive/header_verbose_list.c | 4 ++--
+ 2 files changed, 3 insertions(+), 3 deletions(-)
+
+diff --git a/archival/libarchive/header_list.c b/archival/libarchive/header_list.c
+index 0621aa406..9490b3635 100644
+--- a/archival/libarchive/header_list.c
++++ b/archival/libarchive/header_list.c
+@@ -8,5 +8,5 @@
+ void FAST_FUNC header_list(const file_header_t *file_header)
+ {
+ //TODO: cpio -vp DIR should output "DIR/NAME", not just "NAME" */
+- puts(file_header->name);
++ puts(printable_string(file_header->name));
+ }
+diff --git a/archival/libarchive/header_verbose_list.c b/archival/libarchive/header_verbose_list.c
+index a575a08a0..e7a09430d 100644
+--- a/archival/libarchive/header_verbose_list.c
++++ b/archival/libarchive/header_verbose_list.c
+@@ -57,13 +57,13 @@ void FAST_FUNC header_verbose_list(const file_header_t *file_header)
+ ptm->tm_hour,
+ ptm->tm_min,
+ ptm->tm_sec,
+- file_header->name);
++ printable_string(file_header->name));
+
+ #endif /* FEATURE_TAR_UNAME_GNAME */
+
+ /* NB: GNU tar shows "->" for symlinks and "link to" for hardlinks */
+ if (file_header->link_target) {
+- printf(" -> %s", file_header->link_target);
++ printf(" -> %s", printable_string(file_header->link_target));
+ }
+ bb_putchar('\n');
+ }
diff --git a/meta/recipes-core/busybox/busybox/CVE-2025-46394-02.patch b/meta/recipes-core/busybox/busybox/CVE-2025-46394-02.patch
new file mode 100644
index 0000000000..ec17b9285a
--- /dev/null
+++ b/meta/recipes-core/busybox/busybox/CVE-2025-46394-02.patch
@@ -0,0 +1,32 @@
+From 7378db981d87b4a2264e14d60340a7fb5c67ae59 Mon Sep 17 00:00:00 2001
+From: Peter Marko <peter.marko@siemens.com>
+Date: Fri, 3 Oct 2025 16:12:56 +0200
+Subject: [PATCH] testsuite/tar.tests: fix test after CVE-2025-46394
+
+tar now sanitizes output and this test needs to expect that.
+
+Signed-off-by: Peter Marko <peter.marko@siemens.com>
+
+CVE: CVE-2025-46394
+Upstream-Status: Submitted [https://lists.busybox.net/pipermail/busybox/2025-October/091743.html]
+Signed-off-by: Peter Marko <peter.marko@siemens.com>
+---
+ testsuite/tar.tests | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/testsuite/tar.tests b/testsuite/tar.tests
+index 0f2e89112..48fc38114 100755
+--- a/testsuite/tar.tests
++++ b/testsuite/tar.tests
+@@ -325,9 +325,9 @@ unset LANG
+ rm -rf etc usr
+ ' "\
+ etc/ssl/certs/3b2716e5.0
+-etc/ssl/certs/EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.pem
++etc/ssl/certs/EBG_Elektronik_Sertifika_Hizmet_Sa??lay??c??s??.pem
+ etc/ssl/certs/f80cc7f6.0
+-usr/share/ca-certificates/mozilla/EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.crt
++usr/share/ca-certificates/mozilla/EBG_Elektronik_Sertifika_Hizmet_Sa??lay??c??s??.crt
+ 0
+ etc/ssl/certs/3b2716e5.0 -> EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.pem
+ etc/ssl/certs/EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.pem -> /usr/share/ca-certificates/mozilla/EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı.crt
diff --git a/meta/recipes-core/busybox/busybox_1.35.0.bb b/meta/recipes-core/busybox/busybox_1.35.0.bb
index 1886410dd2..57a5747a48 100644
--- a/meta/recipes-core/busybox/busybox_1.35.0.bb
+++ b/meta/recipes-core/busybox/busybox_1.35.0.bb
@@ -59,6 +59,8 @@ SRC_URI = "https://busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \
file://CVE-2023-42366.patch \
file://0001-cut-Fix-s-flag-to-omit-blank-lines.patch \
file://CVE-2023-39810.patch \
+ file://CVE-2025-46394-01.patch \
+ file://CVE-2025-46394-02.patch \
"
SRC_URI:append:libc-musl = " file://musl.cfg "
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 04/24] libxslt: Patch for CVE-2025-7424
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (2 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 03/24] busybox: patch CVE-2025-46394 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 05/24] tiff: Fix CVE-2025-8961 Steve Sakoman
` (19 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
This patch is taken from the upstream bug, and is used by Apple in their
build of WebKit.
Origin: https://gitlab.gnome.org/-/project/1762/uploads/627ae84cb0643d9adf6e5c86947f6be6/gnome-libxslt-bug-139-apple-fix.diff
Ref: https://gitlab.gnome.org/GNOME/libxslt/-/issues/139
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../libxslt/libxslt/CVE-2025-7424.patch | 105 ++++++++++++++++++
.../recipes-support/libxslt/libxslt_1.1.35.bb | 1 +
2 files changed, 106 insertions(+)
create mode 100644 meta/recipes-support/libxslt/libxslt/CVE-2025-7424.patch
diff --git a/meta/recipes-support/libxslt/libxslt/CVE-2025-7424.patch b/meta/recipes-support/libxslt/libxslt/CVE-2025-7424.patch
new file mode 100644
index 0000000000..c6b234a818
--- /dev/null
+++ b/meta/recipes-support/libxslt/libxslt/CVE-2025-7424.patch
@@ -0,0 +1,105 @@
+From 345d6826d0eae6f0a962456b8ed6f6a1bad0877d Mon Sep 17 00:00:00 2001
+From: David Kilzer <ddkilzer@apple.com>
+Date: Sat, 24 May 2025 15:06:42 -0700
+Subject: [PATCH] libxslt: Type confusion in xmlNode.psvi between stylesheet
+ and source nodes
+
+* libxslt/functions.c:
+(xsltDocumentFunctionLoadDocument):
+- Implement fix suggested by Ivan Fratric. This copies the xmlDoc,
+ calls xsltCleanupSourceDoc() to remove pvsi fields, then adds the
+ xmlDoc to tctxt->docList.
+- Add error handling for functions that may return NULL.
+* libxslt/transform.c:
+- Remove static keyword so this can be called from
+ xsltDocumentFunctionLoadDocument().
+* libxslt/transformInternals.h: Add.
+(xsltCleanupSourceDoc): Add declaration.
+
+Fixes #139.
+
+Origin: https://gitlab.gnome.org/-/project/1762/uploads/627ae84cb0643d9adf6e5c86947f6be6/gnome-libxslt-bug-139-apple-fix.diff
+
+Upstream-Status: Submitted [https://gitlab.gnome.org/GNOME/libxslt/-/issues/139]
+CVE: CVE-2025-7424
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ libxslt/functions.c | 16 +++++++++++++++-
+ libxslt/transform.c | 3 ++-
+ libxslt/transformInternals.h | 9 +++++++++
+ 3 files changed, 26 insertions(+), 2 deletions(-)
+ create mode 100644 libxslt/transformInternals.h
+
+diff --git a/libxslt/functions.c b/libxslt/functions.c
+index da25c24..8a9bdc2 100644
+--- a/libxslt/functions.c
++++ b/libxslt/functions.c
+@@ -41,6 +41,7 @@
+ #include "numbersInternals.h"
+ #include "keys.h"
+ #include "documents.h"
++#include "transformInternals.h"
+
+ #ifdef WITH_XSLT_DEBUG
+ #define WITH_XSLT_DEBUG_FUNCTION
+@@ -152,7 +153,20 @@ xsltDocumentFunctionLoadDocument(xmlXPathParserContextPtr ctxt, xmlChar* URI)
+ /*
+ * This selects the stylesheet's doc itself.
+ */
+- doc = tctxt->style->doc;
++ doc = xmlCopyDoc(tctxt->style->doc, 1);
++ if (doc == NULL) {
++ xsltTransformError(tctxt, NULL, NULL,
++ "document() : failed to copy style doc\n");
++ goto out_fragment;
++ }
++ xsltCleanupSourceDoc(doc); /* Remove psvi fields. */
++ idoc = xsltNewDocument(tctxt, doc);
++ if (idoc == NULL) {
++ xsltTransformError(tctxt, NULL, NULL,
++ "document() : failed to create xsltDocument\n");
++ xmlFreeDoc(doc);
++ goto out_fragment;
++ }
+ } else {
+ valuePush(ctxt, xmlXPathNewNodeSet(NULL));
+
+diff --git a/libxslt/transform.c b/libxslt/transform.c
+index 7299eb5..6976a04 100644
+--- a/libxslt/transform.c
++++ b/libxslt/transform.c
+@@ -42,6 +42,7 @@
+ #include "xsltutils.h"
+ #include "pattern.h"
+ #include "transform.h"
++#include "transformInternals.h"
+ #include "variables.h"
+ #include "numbersInternals.h"
+ #include "namespaces.h"
+@@ -5753,7 +5754,7 @@ xsltCountKeys(xsltTransformContextPtr ctxt)
+ *
+ * Resets source node flags and ids stored in 'psvi' member.
+ */
+-static void
++void
+ xsltCleanupSourceDoc(xmlDocPtr doc) {
+ xmlNodePtr cur = (xmlNodePtr) doc;
+ void **psviPtr;
+diff --git a/libxslt/transformInternals.h b/libxslt/transformInternals.h
+new file mode 100644
+index 0000000..d0f4282
+--- /dev/null
++++ b/libxslt/transformInternals.h
+@@ -0,0 +1,9 @@
++/*
++ * Summary: set of internal interfaces for the XSLT engine transformation part.
++ *
++ * Copy: See Copyright for the status of this software.
++ *
++ * Author: David Kilzer <ddkilzer@apple.com>
++ */
++
++void xsltCleanupSourceDoc(xmlDocPtr doc);
+--
+2.25.1
+
diff --git a/meta/recipes-support/libxslt/libxslt_1.1.35.bb b/meta/recipes-support/libxslt/libxslt_1.1.35.bb
index 2291ed2cad..f1532a05c1 100644
--- a/meta/recipes-support/libxslt/libxslt_1.1.35.bb
+++ b/meta/recipes-support/libxslt/libxslt_1.1.35.bb
@@ -21,6 +21,7 @@ SRC_URI = "https://download.gnome.org/sources/libxslt/1.1/libxslt-${PV}.tar.xz \
file://CVE-2023-40403-003.patch \
file://CVE-2023-40403-004.patch \
file://CVE-2023-40403-005.patch \
+ file://CVE-2025-7424.patch \
"
SRC_URI[sha256sum] = "8247f33e9a872c6ac859aa45018bc4c4d00b97e2feac9eebc10c93ce1f34dd79"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 05/24] tiff: Fix CVE-2025-8961
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (3 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 04/24] libxslt: Patch for CVE-2025-7424 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 06/24] tiff: Fix CVE-2025-9165 Steve Sakoman
` (18 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Upstream-Status: Backport from https://gitlab.com/libtiff/libtiff/-/commit/0ac97aa7a5bffddd88f7cdbe517264e9db3f5bd5
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../libtiff/tiff/CVE-2025-8961.patch | 74 +++++++++++++++++++
meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 1 +
2 files changed, 75 insertions(+)
create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2025-8961.patch
diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8961.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8961.patch
new file mode 100644
index 0000000000..05b11a866e
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-8961.patch
@@ -0,0 +1,74 @@
+From 0ac97aa7a5bffddd88f7cdbe517264e9db3f5bd5 Mon Sep 17 00:00:00 2001
+From: Lee Howard <faxguy@howardsilvan.com>
+Date: Fri, 5 Sep 2025 21:42:35 +0000
+Subject: [PATCH] tiffcrop: fix double-free and memory leak exposed by issue
+ #721
+
+Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/0ac97aa7a5bffddd88f7cdbe517264e9db3f5bd5]
+CVE: CVE-2025-8961
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ tools/tiffcrop.c | 8 +++++++-
+ 1 file changed, 7 insertions(+), 1 deletion(-)
+
+diff --git a/tools/tiffcrop.c b/tools/tiffcrop.c
+index e16bc2d..c7d2553 100644
+--- a/tools/tiffcrop.c
++++ b/tools/tiffcrop.c
+@@ -929,6 +929,7 @@ static int readContigTilesIntoBuffer (TIFF* in, uint8_t* buf,
+ TIFFError("readContigTilesIntoBuffer",
+ "Unable to extract row %"PRIu32" from tile %"PRIu32,
+ row, TIFFCurrentTile(in));
++ _TIFFfree(tilebuf);
+ return 1;
+ }
+ break;
+@@ -943,6 +944,7 @@ static int readContigTilesIntoBuffer (TIFF* in, uint8_t* buf,
+ TIFFError("readContigTilesIntoBuffer",
+ "Unable to extract row %"PRIu32" from tile %"PRIu32,
+ row, TIFFCurrentTile(in));
++ _TIFFfree(tilebuf);
+ return 1;
+ }
+ break;
+@@ -957,6 +959,7 @@ static int readContigTilesIntoBuffer (TIFF* in, uint8_t* buf,
+ TIFFError("readContigTilesIntoBuffer",
+ "Unable to extract row %"PRIu32" from tile %"PRIu32,
+ row, TIFFCurrentTile(in));
++ _TIFFfree(tilebuf);
+ return 1;
+ }
+ break;
+@@ -969,6 +972,7 @@ static int readContigTilesIntoBuffer (TIFF* in, uint8_t* buf,
+ TIFFError("readContigTilesIntoBuffer",
+ "Unable to extract row %"PRIu32" from tile %"PRIu32,
+ row, TIFFCurrentTile(in));
++ _TIFFfree(tilebuf);
+ return 1;
+ }
+ break;
+@@ -983,10 +987,12 @@ static int readContigTilesIntoBuffer (TIFF* in, uint8_t* buf,
+ TIFFError("readContigTilesIntoBuffer",
+ "Unable to extract row %"PRIu32" from tile %"PRIu32,
+ row, TIFFCurrentTile(in));
++ _TIFFfree(tilebuf);
+ return 1;
+ }
+ break;
+ default: TIFFError("readContigTilesIntoBuffer", "Unsupported bit depth %"PRIu16, bps);
++ _TIFFfree(tilebuf);
+ return 1;
+ }
+ }
+@@ -2535,7 +2541,7 @@ main(int argc, char* argv[])
+ }
+
+ /* If we did not use the read buffer as the crop buffer */
+- if (read_buff)
++ if (read_buff && read_buff != crop_buff)
+ _TIFFfree(read_buff);
+
+ if (crop_buff)
+--
+2.25.1
+
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
index 0b4bef4c41..2ee6cdef73 100644
--- a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
+++ b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
@@ -63,6 +63,7 @@ SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \
file://CVE-2025-8534.patch \
file://CVE-2025-8851.patch \
file://CVE-2025-9900.patch \
+ file://CVE-2025-8961.patch \
"
SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 06/24] tiff: Fix CVE-2025-9165
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (4 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 05/24] tiff: Fix CVE-2025-8961 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 07/24] gstreamer1.0: ignore CVEs fixed in plugins Steve Sakoman
` (17 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Upstream-Commit: https://gitlab.com/libtiff/libtiff/-/commit/ed141286a37f6e5ddafb5069347ff5d587e7a4e0
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../libtiff/tiff/CVE-2025-9165.patch | 32 +++++++++++++++++++
meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 1 +
2 files changed, 33 insertions(+)
create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2025-9165.patch
diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2025-9165.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-9165.patch
new file mode 100644
index 0000000000..3694b11c67
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2025-9165.patch
@@ -0,0 +1,32 @@
+From ed141286a37f6e5ddafb5069347ff5d587e7a4e0 Mon Sep 17 00:00:00 2001
+From: Su_Laus <sulau@freenet.de>
+Date: Fri, 8 Aug 2025 21:35:30 +0200
+Subject: [PATCH] tiffcmp: fix memory leak when second file cannot be opened.
+
+Closes #728, #729
+
+Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/ed141286a37f6e5ddafb5069347ff5d587e7a4e0]
+CVE: CVE-2025-9165
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ tools/tiffcmp.c | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/tools/tiffcmp.c b/tools/tiffcmp.c
+index 2a35fe6..f812c7d 100644
+--- a/tools/tiffcmp.c
++++ b/tools/tiffcmp.c
+@@ -103,7 +103,10 @@ main(int argc, char* argv[])
+ return (2);
+ tif2 = TIFFOpen(argv[optind+1], "r");
+ if (tif2 == NULL)
++ {
++ TIFFClose(tif1);
+ return (2);
++ }
+ dirnum = 0;
+ while (tiffcmp(tif1, tif2)) {
+ if (!TIFFReadDirectory(tif1)) {
+--
+2.25.1
+
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
index 2ee6cdef73..84c3028b45 100644
--- a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
+++ b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
@@ -64,6 +64,7 @@ SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \
file://CVE-2025-8851.patch \
file://CVE-2025-9900.patch \
file://CVE-2025-8961.patch \
+ file://CVE-2025-9165.patch \
"
SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 07/24] gstreamer1.0: ignore CVEs fixed in plugins
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (5 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 06/24] tiff: Fix CVE-2025-9165 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 08/24] gstreamer1.0: ignore CVE-2025-2759 Steve Sakoman
` (16 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
All these CVEs were fixed in recent commits.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../gstreamer/gstreamer1.0_1.20.7.bb | 12 +++++++++---
1 file changed, 9 insertions(+), 3 deletions(-)
diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.20.7.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.20.7.bb
index 697c6e8b49..b9b9551bc3 100644
--- a/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.20.7.bb
+++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.20.7.bb
@@ -71,15 +71,21 @@ FILES:${PN}-dbg += "${datadir}/gdb ${datadir}/gstreamer-1.0/gdb"
CVE_PRODUCT = "gstreamer"
# these CVEs are patched in gstreamer1.0-plugins-bad
-CVE_CHECK_IGNORE += "CVE-2023-40474 CVE-2023-40475 CVE-2023-40476 CVE-2023-44429 CVE-2023-44446 CVE-2023-50186 CVE-2024-0444"
+CVE_CHECK_IGNORE += "\
+ CVE-2023-40474 CVE-2023-40475 CVE-2023-40476 CVE-2023-44429 CVE-2023-44446 CVE-2023-50186 CVE-2024-0444 \
+ CVE-2025-3887 \
+"
# these CVEs are patched in gstreamer1.0-plugins-base
-CVE_CHECK_IGNORE += "CVE-2024-47538 CVE-2024-47541 CVE-2024-47542 CVE-2024-47600 CVE-2024-47607 CVE-2024-47615 CVE-2024-47835"
+CVE_CHECK_IGNORE += " \
+ CVE-2024-47538 CVE-2024-47541 CVE-2024-47542 CVE-2024-47600 CVE-2024-47607 CVE-2024-47615 CVE-2024-47835 \
+ CVE-2025-47806 CVE-2025-47807 CVE-2025-47808 \
+"
# these CVEs are patched in gstreamer1.0-plugins-good
CVE_CHECK_IGNORE += " \
CVE-2024-47537 CVE-2024-47539 CVE-2024-47540 CVE-2024-47543 CVE-2024-47544 CVE-2024-47545 \
CVE-2024-47546 CVE-2024-47596 CVE-2024-47597 CVE-2024-47598 CVE-2024-47599 CVE-2024-47601 \
CVE-2024-47602 CVE-2024-47603 CVE-2024-47613 CVE-2024-47774 CVE-2024-47775 CVE-2024-47776 \
- CVE-2024-47777 CVE-2024-47778 CVE-2024-47834 \
+ CVE-2024-47777 CVE-2024-47778 CVE-2024-47834 CVE-2025-47183 CVE-2025-47219 \
"
PTEST_BUILD_HOST_FILES = ""
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 08/24] gstreamer1.0: ignore CVE-2025-2759
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (6 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 07/24] gstreamer1.0: ignore CVEs fixed in plugins Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 09/24] grub: ignore CVE-2024-2312 Steve Sakoman
` (15 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
Copy statement from [1] that it is problem of installers (non-Linux).
Also [2] linked in NVD says "Fixed in 1.25.1 Gstreamer Installer".
Since Yocto builds from sources into our own packages, ignore it.
[1] https://security-tracker.debian.org/tracker/CVE-2025-2759
[2] https://www.zerodayinitiative.com/advisories/ZDI-25-268/
(From OE-Core rev: 99ee1df6bde2ffd4fa2ddea44c0a9b94d9d77bae)
Reworked to CVE_CHECK_IGNORE format.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-multimedia/gstreamer/gstreamer1.0_1.20.7.bb | 3 +++
1 file changed, 3 insertions(+)
diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.20.7.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.20.7.bb
index b9b9551bc3..3b37503608 100644
--- a/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.20.7.bb
+++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0_1.20.7.bb
@@ -88,4 +88,7 @@ CVE_CHECK_IGNORE += " \
CVE-2024-47777 CVE-2024-47778 CVE-2024-47834 CVE-2025-47183 CVE-2025-47219 \
"
+# not-applicable-platform: affects installation packages for non Linux OSes
+CVE_CHECK_IGNORE += "CVE-2025-2759"
+
PTEST_BUILD_HOST_FILES = ""
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 09/24] grub: ignore CVE-2024-2312
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (7 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 08/24] gstreamer1.0: ignore CVE-2025-2759 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 10/24] ghostscript: patch CVE-2025-59798 Steve Sakoman
` (14 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
This CVE is specific to Ubuntu [1].
[1] https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2054127
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-bsp/grub/grub2.inc | 2 ++
1 file changed, 2 insertions(+)
diff --git a/meta/recipes-bsp/grub/grub2.inc b/meta/recipes-bsp/grub/grub2.inc
index 1b019752b7..94eeadfb99 100644
--- a/meta/recipes-bsp/grub/grub2.inc
+++ b/meta/recipes-bsp/grub/grub2.inc
@@ -70,6 +70,8 @@ CVE_CHECK_IGNORE += "CVE-2019-14865"
CVE_CHECK_IGNORE += "CVE-2021-46705"
# not-applicable-platform: Applies only to RHEL/Fedora
CVE_CHECK_IGNORE += "CVE-2024-1048 CVE-2023-4001"
+# not-applicable-platform: Applies only to Ubuntu
+CVE_CHECK_IGNORE += "CVE-2024-2312"
DEPENDS = "flex-native bison-native gettext-native"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 10/24] ghostscript: patch CVE-2025-59798
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (8 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 09/24] grub: ignore CVE-2024-2312 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 11/24] ghostscript: patch CVE-2025-59799 Steve Sakoman
` (13 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
Pick commit mentioned in the NVD report.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../ghostscript/CVE-2025-59798.patch | 134 ++++++++++++++++++
.../ghostscript/ghostscript_9.55.0.bb | 1 +
2 files changed, 135 insertions(+)
create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59798.patch
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59798.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59798.patch
new file mode 100644
index 0000000000..2520e698b5
--- /dev/null
+++ b/meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59798.patch
@@ -0,0 +1,134 @@
+From 0cae41b23a9669e801211dd4cf97b6dadd6dbdd7 Mon Sep 17 00:00:00 2001
+From: Ken Sharp <Ken.Sharp@artifex.com>
+Date: Thu, 22 May 2025 12:25:41 +0100
+Subject: [PATCH] pdfwrite - avoid buffer overrun
+
+Bug #708539 "Buffer overflow in pdf_write_cmap"
+
+The proposed fix in the report solves the buffer overrun, but does not
+tackle a number of other problems.
+
+This commit checks the result of stream_puts() in
+pdf_write_cid_system_info_to_stream() and correctly signals an error to
+the caller if that fails.
+
+In pdf_write_cid_system_info we replace a (rather small!) fixed size
+buffer with a dynamically allocated one using the lengths of the strings
+which pdf_write_cid_system_info_to_stream() will write, and a small
+fixed overhead to deal with the keys and initial byte '/'.
+
+Because 'buf' is used in the stream 's', if it is too small to hold all
+the CIDSystemInfo then we would get an error which was simply discarded
+previously.
+
+We now should avoid the potential error by ensuring the buffer is large
+enough for all the information, and if we do get an error we no longer
+silently ignore it, which would write an invalid PDF file.
+
+CVE: CVE-2025-59798
+Upstream-Status: Backport [https://github.com/ArtifexSoftware/ghostpdl/commit/0cae41b23a9669e801211dd4cf97b6dadd6dbdd7]
+Signed-off-by: Peter Marko <peter.marko@siemens.com>
+---
+ devices/vector/gdevpdtw.c | 52 ++++++++++++++++++++++++++++++---------
+ 1 file changed, 41 insertions(+), 11 deletions(-)
+
+diff --git a/devices/vector/gdevpdtw.c b/devices/vector/gdevpdtw.c
+index ced15c9b2..fe24dd73a 100644
+--- a/devices/vector/gdevpdtw.c
++++ b/devices/vector/gdevpdtw.c
+@@ -694,7 +694,8 @@ static int
+ pdf_write_cid_system_info_to_stream(gx_device_pdf *pdev, stream *s,
+ const gs_cid_system_info_t *pcidsi, gs_id object_id)
+ {
+- byte *Registry, *Ordering;
++ byte *Registry = NULL, *Ordering = NULL;
++ int code = 0;
+
+ Registry = gs_alloc_bytes(pdev->pdf_memory, pcidsi->Registry.size, "temporary buffer for Registry");
+ if (!Registry)
+@@ -725,14 +726,19 @@ pdf_write_cid_system_info_to_stream(gx_device_pdf *pdev, stream *s,
+ }
+ s_arcfour_process_buffer(&sarc4, Ordering, pcidsi->Ordering.size);
+ }
+- stream_puts(s, "<<\n/Registry");
++ code = stream_puts(s, "<<\n/Registry");
++ if (code < 0)
++ goto error;
+ s_write_ps_string(s, Registry, pcidsi->Registry.size, PRINT_HEX_NOT_OK);
+- stream_puts(s, "\n/Ordering");
++ code = stream_puts(s, "\n/Ordering");
++ if(code < 0)
++ goto error;
+ s_write_ps_string(s, Ordering, pcidsi->Ordering.size, PRINT_HEX_NOT_OK);
++error:
+ pprintd1(s, "\n/Supplement %d\n>>\n", pcidsi->Supplement);
+ gs_free_object(pdev->pdf_memory, Registry, "free temporary Registry buffer");
+ gs_free_object(pdev->pdf_memory, Ordering, "free temporary Ordering buffer");
+- return 0;
++ return code;
+ }
+
+ int
+@@ -777,31 +783,55 @@ pdf_write_cmap(gx_device_pdf *pdev, const gs_cmap_t *pcmap,
+ *ppres = writer.pres;
+ writer.pres->where_used = 0; /* CMap isn't a PDF resource. */
+ if (!pcmap->ToUnicode) {
+- byte buf[200];
++ byte *buf = NULL;
++ uint64_t buflen = 0;
+ cos_dict_t *pcd = (cos_dict_t *)writer.pres->object;
+ stream s;
+
++ /* We use 'buf' for the stream 's' below and that needs to have some extra
++ * space for the CIDSystemInfo. We also need an extra byte for the leading '/'
++ * 100 bytes is ample for the overhead.
++ */
++ buflen = pcmap->CIDSystemInfo->Registry.size + pcmap->CIDSystemInfo->Ordering.size + pcmap->CMapName.size + 100;
++ if (buflen > max_uint)
++ return_error(gs_error_limitcheck);
++
++ buf = gs_alloc_bytes(pdev->memory, buflen, "pdf_write_cmap");
++ if (buf == NULL)
++ return_error(gs_error_VMerror);
++
+ code = cos_dict_put_c_key_int(pcd, "/WMode", pcmap->WMode);
+- if (code < 0)
++ if (code < 0) {
++ gs_free_object(pdev->memory, buf, "pdf_write_cmap");
+ return code;
++ }
+ buf[0] = '/';
+ memcpy(buf + 1, pcmap->CMapName.data, pcmap->CMapName.size);
+ code = cos_dict_put_c_key_string(pcd, "/CMapName",
+ buf, pcmap->CMapName.size + 1);
+- if (code < 0)
++ if (code < 0) {
++ gs_free_object(pdev->memory, buf, "pdf_write_cmap");
+ return code;
++ }
+ s_init(&s, pdev->memory);
+- swrite_string(&s, buf, sizeof(buf));
++ swrite_string(&s, buf, buflen);
+ code = pdf_write_cid_system_info_to_stream(pdev, &s, pcmap->CIDSystemInfo, 0);
+- if (code < 0)
++ if (code < 0) {
++ gs_free_object(pdev->memory, buf, "pdf_write_cmap");
+ return code;
++ }
+ code = cos_dict_put_c_key_string(pcd, "/CIDSystemInfo",
+ buf, stell(&s));
+- if (code < 0)
++ if (code < 0) {
++ gs_free_object(pdev->memory, buf, "pdf_write_cmap");
+ return code;
++ }
+ code = cos_dict_put_string_copy(pcd, "/Type", "/CMap");
+- if (code < 0)
++ if (code < 0) {
++ gs_free_object(pdev->memory, buf, "pdf_write_cmap");
+ return code;
++ }
++ gs_free_object(pdev->memory, buf, "pdf_write_cmap");
+ }
+ if (pcmap->CMapName.size == 0) {
+ /* Create an arbitrary name (for ToUnicode CMap). */
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
index 4d696159e0..c9fcaa7a16 100644
--- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
+++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
@@ -76,6 +76,7 @@ SRC_URI_BASE = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/d
file://CVE-2025-27836-1.patch \
file://CVE-2025-27836-2.patch \
file://CVE-2025-48708.patch \
+ file://CVE-2025-59798.patch \
"
SRC_URI = "${SRC_URI_BASE} \
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 11/24] ghostscript: patch CVE-2025-59799
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (9 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 10/24] ghostscript: patch CVE-2025-59798 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 12/24] ghostscript: patch CVE-2025-59800 Steve Sakoman
` (12 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
Pick commit mentioned in the NVD report.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../ghostscript/CVE-2025-59799.patch | 41 +++++++++++++++++++
.../ghostscript/ghostscript_9.55.0.bb | 1 +
2 files changed, 42 insertions(+)
create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59799.patch
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59799.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59799.patch
new file mode 100644
index 0000000000..3badd82f22
--- /dev/null
+++ b/meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59799.patch
@@ -0,0 +1,41 @@
+From 6dab38fb211f15226c242ab7a83fa53e4b0ff781 Mon Sep 17 00:00:00 2001
+From: Piotr Kajda <petermasterperfect@gmail.com>
+Date: Thu, 8 May 2025 11:37:09 +0100
+Subject: [PATCH] pdfwrite - bounds check some strings
+
+Bug #708517
+
+This differs very slightly from the proposed patch in the bug report, I
+had a quick scout through the C file and found another similar case.
+
+Both fixed here.
+
+CVE: CVE-2025-59799
+Upstream-Status: Backport [https://github.com/ArtifexSoftware/ghostpdl/commit/6dab38fb211f15226c242ab7a83fa53e4b0ff781]
+Signed-off-by: Peter Marko <peter.marko@siemens.com>
+---
+ devices/vector/gdevpdfm.c | 4 ++++
+ 1 file changed, 4 insertions(+)
+
+diff --git a/devices/vector/gdevpdfm.c b/devices/vector/gdevpdfm.c
+index 5aa3644e2..4b1d7d89c 100644
+--- a/devices/vector/gdevpdfm.c
++++ b/devices/vector/gdevpdfm.c
+@@ -199,6 +199,8 @@ pdfmark_coerce_dest(gs_param_string *dstr, char dest[MAX_DEST_STRING])
+ {
+ const byte *data = dstr->data;
+ uint size = dstr->size;
++ if (size > MAX_DEST_STRING)
++ return_error(gs_error_limitcheck);
+ if (size == 0 || data[0] != '(')
+ return 0;
+ /****** HANDLE ESCAPES ******/
+@@ -848,6 +850,8 @@ pdfmark_put_ao_pairs(gx_device_pdf * pdev, cos_dict_t *pcd,
+ char buf[30];
+ int d0, d1;
+
++ if (Action[1].size > 29)
++ return_error(gs_error_rangecheck);
+ memcpy(buf, Action[1].data, Action[1].size);
+ buf[Action[1].size] = 0;
+ if (sscanf(buf, "%d %d R", &d0, &d1) == 2)
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
index c9fcaa7a16..349c007e94 100644
--- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
+++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
@@ -77,6 +77,7 @@ SRC_URI_BASE = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/d
file://CVE-2025-27836-2.patch \
file://CVE-2025-48708.patch \
file://CVE-2025-59798.patch \
+ file://CVE-2025-59799.patch \
"
SRC_URI = "${SRC_URI_BASE} \
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 12/24] ghostscript: patch CVE-2025-59800
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (10 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 11/24] ghostscript: patch CVE-2025-59799 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 13/24] pulseaudio: ignore CVE-2024-11586 Steve Sakoman
` (11 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
Pick commit mentioned in the NVD report.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../ghostscript/CVE-2025-59800.patch | 36 +++++++++++++++++++
.../ghostscript/ghostscript_9.55.0.bb | 1 +
2 files changed, 37 insertions(+)
create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59800.patch
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59800.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59800.patch
new file mode 100644
index 0000000000..5d50865271
--- /dev/null
+++ b/meta/recipes-extended/ghostscript/ghostscript/CVE-2025-59800.patch
@@ -0,0 +1,36 @@
+From 176cf0188a2294bc307b8caec876f39412e58350 Mon Sep 17 00:00:00 2001
+From: Ken Sharp <Ken.Sharp@artifex.com>
+Date: Tue, 1 Jul 2025 10:31:17 +0100
+Subject: [PATCH] PDF OCR 8 bit device - avoid overflow
+
+Bug 708602 "Heap overflow in ocr_line8"
+
+Make sure the calculation of the required raster size does not overflow
+an int.
+
+CVE: CVE-2025-59800
+Upstream-Status: Backport [https://github.com/ArtifexSoftware/ghostpdl/commit/176cf0188a2294bc307b8caec876f39412e58350]
+Signed-off-by: Peter Marko <peter.marko@siemens.com>
+---
+ devices/gdevpdfocr.c | 7 +++++--
+ 1 file changed, 5 insertions(+), 2 deletions(-)
+
+diff --git a/devices/gdevpdfocr.c b/devices/gdevpdfocr.c
+index f27dc11db..6362f4104 100644
+--- a/devices/gdevpdfocr.c
++++ b/devices/gdevpdfocr.c
+@@ -521,9 +521,12 @@ ocr_line32(gx_device_pdf_image *dev, void *row)
+ static int
+ ocr_begin_page(gx_device_pdf_image *dev, int w, int h, int bpp)
+ {
+- int raster = (w+3)&~3;
++ int64_t raster = (w + 3) & ~3;
+
+- dev->ocr.data = gs_alloc_bytes(dev->memory, raster * h, "ocr_begin_page");
++ raster = raster * (int64_t)h;
++ if (raster < 0 || raster > max_size_t)
++ return gs_note_error(gs_error_VMerror);
++ dev->ocr.data = gs_alloc_bytes(dev->memory, raster, "ocr_begin_page");
+ if (dev->ocr.data == NULL)
+ return_error(gs_error_VMerror);
+ dev->ocr.w = w;
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
index 349c007e94..b8195e3eff 100644
--- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
+++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
@@ -78,6 +78,7 @@ SRC_URI_BASE = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/d
file://CVE-2025-48708.patch \
file://CVE-2025-59798.patch \
file://CVE-2025-59799.patch \
+ file://CVE-2025-59800.patch \
"
SRC_URI = "${SRC_URI_BASE} \
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 13/24] pulseaudio: ignore CVE-2024-11586
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (11 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 12/24] ghostscript: patch CVE-2025-59800 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 14/24] ffmpeg: ignore CVE-2023-6603 Steve Sakoman
` (10 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
As per the linked ticket, this issue is related to an Ubuntu-specific
patch that we don't have.
(From OE-Core rev: dc81fdc6bdf8ab39b7f2fd994d50256430c36558)
(From OE-Core rev: 72e63e44a0c6ad5a408c4dc59a24288c36463439)
Rewritten CVE_STATUS to CVE_CHECK_IGNORE.
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-multimedia/pulseaudio/pulseaudio.inc | 3 +++
1 file changed, 3 insertions(+)
diff --git a/meta/recipes-multimedia/pulseaudio/pulseaudio.inc b/meta/recipes-multimedia/pulseaudio/pulseaudio.inc
index 7b9d245c07..58d0040459 100644
--- a/meta/recipes-multimedia/pulseaudio/pulseaudio.inc
+++ b/meta/recipes-multimedia/pulseaudio/pulseaudio.inc
@@ -281,3 +281,6 @@ RDEPENDS:pulseaudio-server += "\
RDEPENDS:pulseaudio-server += "${@bb.utils.contains('DISTRO_FEATURES', 'x11', \
bb.utils.contains('DISTRO_FEATURES', 'systemd', 'pulseaudio-module-systemd-login', 'pulseaudio-module-console-kit', d), \
'', d)}"
+
+# not-applicable-platform: specific to Ubuntu 16.04
+CVE_CHECK_IGNORE += "CVE-2024-11586"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 14/24] ffmpeg: ignore CVE-2023-6603
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (12 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 13/24] pulseaudio: ignore CVE-2024-11586 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 15/24] ffmpeg: mark CVE-2023-6601 as patched Steve Sakoman
` (9 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
Per [1] this CVE is fixed by [2] which is available in version 5.0, so
version 5.0.3 is not vulnerable anymore.
[1] https://security-tracker.debian.org/tracker/CVE-2023-6603
[2] https://github.com/FFmpeg/FFmpeg/commit/28c83584e8f3cd747c1476a74cc2841d3d1fa7f3
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-multimedia/ffmpeg/ffmpeg_5.0.3.bb | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg_5.0.3.bb b/meta/recipes-multimedia/ffmpeg/ffmpeg_5.0.3.bb
index a46cb3480a..d64b97e787 100644
--- a/meta/recipes-multimedia/ffmpeg/ffmpeg_5.0.3.bb
+++ b/meta/recipes-multimedia/ffmpeg/ffmpeg_5.0.3.bb
@@ -101,6 +101,10 @@ CVE_CHECK_IGNORE += "CVE-2022-3109"
# bugfix: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/481e81be1271ac9a0124ee615700390c2371bd89
CVE_CHECK_IGNORE += "CVE-2022-3341"
+# This vulnerability was fixed in 5.0
+# bugfix: https://github.com/FFmpeg/FFmpeg/commit/28c83584e8f3cd747c1476a74cc2841d3d1fa7f3
+CVE_CHECK_IGNORE += "CVE-2023-6603"
+
# Build fails when thumb is enabled: https://bugzilla.yoctoproject.org/show_bug.cgi?id=7717
ARM_INSTRUCTION_SET:armv4 = "arm"
ARM_INSTRUCTION_SET:armv5 = "arm"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 15/24] ffmpeg: mark CVE-2023-6601 as patched
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (13 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 14/24] ffmpeg: ignore CVE-2023-6603 Steve Sakoman
@ 2025-10-09 19:30 ` Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 16/24] go: fix CVE-2025-47906 Steve Sakoman
` (8 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:30 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
Per [1] this CVE is fixed by the same commits as the other 3 CVEs.
[1] https://security-tracker.debian.org/tracker/CVE-2023-6601
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../ffmpeg/CVE-2023-6602-CVE-2023-6604-CVE-2023-6605-0002.patch | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2023-6602-CVE-2023-6604-CVE-2023-6605-0002.patch b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2023-6602-CVE-2023-6604-CVE-2023-6605-0002.patch
index 1ba1006197..d90fd20160 100644
--- a/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2023-6602-CVE-2023-6604-CVE-2023-6605-0002.patch
+++ b/meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2023-6602-CVE-2023-6604-CVE-2023-6605-0002.patch
@@ -21,7 +21,7 @@ Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
(cherry picked from commit 91d96dc8ddaebe0b6cb393f672085e6bfaf15a31)
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
-CVE: CVE-2023-6602 CVE-2023-6604 CVE-2023-6605
+CVE: CVE-2023-6601 CVE-2023-6602 CVE-2023-6604 CVE-2023-6605
Upstream-Status: Backport [https://github.com/FFmpeg/FFmpeg/commit/9803800e0e8cd8e1e7695f77cfbf4e0db0abfe57]
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 16/24] go: fix CVE-2025-47906
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (14 preceding siblings ...)
2025-10-09 19:30 ` [OE-core][kirkstone 15/24] ffmpeg: mark CVE-2023-6601 as patched Steve Sakoman
@ 2025-10-09 19:31 ` Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 17/24] scripts/install-buildtools: Update to 4.0.30 Steve Sakoman
` (7 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:31 UTC (permalink / raw)
To: openembedded-core
From: Archana Polampalli <archana.polampalli@windriver.com>
If the PATH environment variable contains paths which are executables
(rather than just directories), passing certain strings to LookPath
("", ".", and ".."), can result in the binaries listed in the PATH
being unexpectedly returned.
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-devtools/go/go-1.17.13.inc | 1 +
.../go/go-1.21/CVE-2025-47906.patch | 171 ++++++++++++++++++
2 files changed, 172 insertions(+)
create mode 100644 meta/recipes-devtools/go/go-1.21/CVE-2025-47906.patch
diff --git a/meta/recipes-devtools/go/go-1.17.13.inc b/meta/recipes-devtools/go/go-1.17.13.inc
index 2052f4adbc..aab8e85c22 100644
--- a/meta/recipes-devtools/go/go-1.17.13.inc
+++ b/meta/recipes-devtools/go/go-1.17.13.inc
@@ -67,6 +67,7 @@ SRC_URI = "https://golang.org/dl/go${PV}.src.tar.gz;name=main \
file://CVE-2025-47907-pre-0001.patch \
file://CVE-2025-47907-pre-0002.patch \
file://CVE-2025-47907.patch \
+ file://CVE-2025-47906.patch \
"
SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd"
diff --git a/meta/recipes-devtools/go/go-1.21/CVE-2025-47906.patch b/meta/recipes-devtools/go/go-1.21/CVE-2025-47906.patch
new file mode 100644
index 0000000000..272d1ed985
--- /dev/null
+++ b/meta/recipes-devtools/go/go-1.21/CVE-2025-47906.patch
@@ -0,0 +1,171 @@
+From 8fa31a2d7d9e60c50a3a94080c097b6e65773f4b Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Olivier=20Mengu=C3=A9?= <olivier.mengue@gmail.com>
+Date: Mon, 30 Jun 2025 16:58:59 +0200
+Subject: [PATCH] [release-branch.go1.23] os/exec: fix incorrect expansion of
+ "", "." and ".." in LookPath Fix incorrect expansion of "" and "." when $PATH
+ contains an executable file or, on Windows, a parent directory of a %PATH%
+ element contains an file with the same name as the %PATH% element but with
+ one of the %PATHEXT% extension (ex: C:\utils\bin is in PATH, and
+ C:\utils\bin.exe exists).
+
+Fix incorrect expansion of ".." when $PATH contains an element which is
+an the concatenation of the path to an executable file (or on Windows
+a path that can be expanded to an executable by appending a %PATHEXT%
+extension), a path separator and a name.
+
+"", "." and ".." are now rejected early with ErrNotFound.
+
+Fixes CVE-2025-47906
+Fixes #74803
+
+Change-Id: Ie50cc0a660fce8fbdc952a7f2e05c36062dcb50e
+Reviewed-on: https://go-review.googlesource.com/c/go/+/685755
+LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
+Auto-Submit: Damien Neil <dneil@google.com>
+Reviewed-by: Roland Shoemaker <roland@golang.org>
+Reviewed-by: Damien Neil <dneil@google.com>
+(cherry picked from commit e0b07dc)
+Reviewed-on: https://go-review.googlesource.com/c/go/+/691855
+Reviewed-by: Michael Knyszek <mknyszek@google.com>
+
+CVE: CVE-2025-47906
+
+Upstream-Status: Backport [https://github.com/golang/go/commit/8fa31a2d7d9e60c50a3a94080c097b6e65773f4b]
+
+Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
+---
+ src/internal/execabs/execabs_test.go | 55 ++++++++++++++++++++++++++++
+ src/os/exec/exec.go | 9 +++++
+ src/os/exec/lp_plan9.go | 4 ++
+ src/os/exec/lp_unix.go | 4 ++
+ src/os/exec/lp_windows.go | 4 ++
+ 5 files changed, 76 insertions(+)
+
+diff --git a/src/internal/execabs/execabs_test.go b/src/internal/execabs/execabs_test.go
+index 97a3f39..99fd64b 100644
+--- a/src/internal/execabs/execabs_test.go
++++ b/src/internal/execabs/execabs_test.go
+@@ -100,4 +100,59 @@ func TestLookPath(t *testing.T) {
+ } else if err.Error() != expectedErr {
+ t.Errorf("LookPath returned unexpected error: want %q, got %q", expectedErr, err.Error())
+ }
++ checker := func(test string) func(t *testing.T) {
++ return func(t *testing.T) {
++ t.Helper()
++ t.Logf("PATH=%s", os.Getenv("PATH"))
++ p, err := LookPath(test)
++ if err == nil {
++ t.Errorf("%q: error expected, got nil", test)
++ }
++ if p != "" {
++ t.Errorf("%q: path returned should be \"\". Got %q", test, p)
++ }
++ }
++ }
++
++ // Reference behavior for the next test
++ t.Run(pathVar+"=$OTHER2", func(t *testing.T) {
++ t.Run("empty", checker(""))
++ t.Run("dot", checker("."))
++ t.Run("dotdot1", checker("abc/.."))
++ t.Run("dotdot2", checker(".."))
++ })
++
++ // Test the behavior when PATH contains an executable file which is not a directory
++ t.Run(pathVar+"=exe", func(t *testing.T) {
++ // Inject an executable file (not a directory) in PATH.
++ // Use our own binary os.Args[0].
++ testenv.MustHaveExec(t)
++ exe, err := os.Executable()
++ if err != nil {
++ t.Fatal(err)
++ }
++
++ t.Setenv(pathVar, exe)
++ t.Run("empty", checker(""))
++ t.Run("dot", checker("."))
++ t.Run("dotdot1", checker("abc/.."))
++ t.Run("dotdot2", checker(".."))
++ })
++
++ // Test the behavior when PATH contains an executable file which is not a directory
++ t.Run(pathVar+"=exe/xx", func(t *testing.T) {
++ // Inject an executable file (not a directory) in PATH.
++ // Use our own binary os.Args[0].
++ testenv.MustHaveExec(t)
++ exe, err := os.Executable()
++ if err != nil {
++ t.Fatal(err)
++ }
++
++ t.Setenv(pathVar, filepath.Join(exe, "xx"))
++ t.Run("empty", checker(""))
++ t.Run("dot", checker("."))
++ t.Run("dotdot1", checker("abc/.."))
++ t.Run("dotdot2", checker(".."))
++ })
+ }
+diff --git a/src/os/exec/exec.go b/src/os/exec/exec.go
+index 505de58..84fd82f 100644
+--- a/src/os/exec/exec.go
++++ b/src/os/exec/exec.go
+@@ -790,3 +790,12 @@ func addCriticalEnv(env []string) []string {
+ }
+ return append(env, "SYSTEMROOT="+os.Getenv("SYSTEMROOT"))
+ }
++// validateLookPath excludes paths that can't be valid
++// executable names. See issue #74466 and CVE-2025-47906.
++func validateLookPath(s string) error {
++ switch s {
++ case "", ".", "..":
++ return ErrNotFound
++ }
++ return nil
++}
+diff --git a/src/os/exec/lp_plan9.go b/src/os/exec/lp_plan9.go
+index e8826a5..ed9f6e3 100644
+--- a/src/os/exec/lp_plan9.go
++++ b/src/os/exec/lp_plan9.go
+@@ -33,6 +33,10 @@ func findExecutable(file string) error {
+ // The result may be an absolute path or a path relative to the current directory.
+ func LookPath(file string) (string, error) {
+ // skip the path lookup for these prefixes
++ if err := validateLookPath(file); err != nil {
++ return "", &Error{file, err}
++ }
++
+ skip := []string{"/", "#", "./", "../"}
+
+ for _, p := range skip {
+diff --git a/src/os/exec/lp_unix.go b/src/os/exec/lp_unix.go
+index d1d246a..1b27f2b 100644
+--- a/src/os/exec/lp_unix.go
++++ b/src/os/exec/lp_unix.go
+@@ -38,6 +38,10 @@ func LookPath(file string) (string, error) {
+ // (only bypass the path if file begins with / or ./ or ../)
+ // but that would not match all the Unix shells.
+
++ if err := validateLookPath(file); err != nil {
++ return "", &Error{file, err}
++ }
++
+ if strings.Contains(file, "/") {
+ err := findExecutable(file)
+ if err == nil {
+diff --git a/src/os/exec/lp_windows.go b/src/os/exec/lp_windows.go
+index e7a2cdf..7a1d6fb 100644
+--- a/src/os/exec/lp_windows.go
++++ b/src/os/exec/lp_windows.go
+@@ -58,6 +58,10 @@ func findExecutable(file string, exts []string) (string, error) {
+ // a suitable candidate.
+ // The result may be an absolute path or a path relative to the current directory.
+ func LookPath(file string) (string, error) {
++ if err := validateLookPath(file); err != nil {
++ return "", &Error{file, err}
++ }
++
+ var exts []string
+ x := os.Getenv(`PATHEXT`)
+ if x != "" {
+--
+2.40.0
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 17/24] scripts/install-buildtools: Update to 4.0.30
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (15 preceding siblings ...)
2025-10-09 19:31 ` [OE-core][kirkstone 16/24] go: fix CVE-2025-47906 Steve Sakoman
@ 2025-10-09 19:31 ` Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 18/24] openssl: upgrade 3.0.17 -> 3.0.18 Steve Sakoman
` (6 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:31 UTC (permalink / raw)
To: openembedded-core
From: Aleksandar Nikolic <aleksandar.nikolic@zeiss.com>
Update to the 4.0.30 release of the 4.0 series for buildtools
Signed-off-by: Aleksandar Nikolic <aleksandar.nikolic@zeiss.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
scripts/install-buildtools | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/scripts/install-buildtools b/scripts/install-buildtools
index 3c86a087e8..5c990b1f8e 100755
--- a/scripts/install-buildtools
+++ b/scripts/install-buildtools
@@ -57,8 +57,8 @@ logger = scriptutils.logger_create(PROGNAME, stream=sys.stdout)
DEFAULT_INSTALL_DIR = os.path.join(os.path.split(scripts_path)[0],'buildtools')
DEFAULT_BASE_URL = 'https://downloads.yoctoproject.org/releases/yocto'
-DEFAULT_RELEASE = 'yocto-4.0.28'
-DEFAULT_INSTALLER_VERSION = '4.0.28'
+DEFAULT_RELEASE = 'yocto-4.0.30'
+DEFAULT_INSTALLER_VERSION = '4.0.30'
DEFAULT_BUILDDATE = '202110XX'
# Python version sanity check
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 18/24] openssl: upgrade 3.0.17 -> 3.0.18
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (16 preceding siblings ...)
2025-10-09 19:31 ` [OE-core][kirkstone 17/24] scripts/install-buildtools: Update to 4.0.30 Steve Sakoman
@ 2025-10-09 19:31 ` Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 19/24] glibc: stable 2.35 branch updates Steve Sakoman
` (5 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:31 UTC (permalink / raw)
To: openembedded-core
From: Archana Polampalli <archana.polampalli@windriver.com>
This release incorporates the following bug fixes and mitigations:
Fix Out-of-bounds read & write in RFC 3211 KEK Unwrap. (CVE-2025-9230)
Fix Out-of-bounds read in HTTP client no_proxy handling. (CVE-2025-9232)
Changelog:
https://github.com/openssl/openssl/blob/openssl-3.0.18/NEWS.md#openssl-30
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../openssl/{openssl_3.0.17.bb => openssl_3.0.18.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-connectivity/openssl/{openssl_3.0.17.bb => openssl_3.0.18.bb} (99%)
diff --git a/meta/recipes-connectivity/openssl/openssl_3.0.17.bb b/meta/recipes-connectivity/openssl/openssl_3.0.18.bb
similarity index 99%
rename from meta/recipes-connectivity/openssl/openssl_3.0.17.bb
rename to meta/recipes-connectivity/openssl/openssl_3.0.18.bb
index a50bd2edbf..a8dd338327 100644
--- a/meta/recipes-connectivity/openssl/openssl_3.0.17.bb
+++ b/meta/recipes-connectivity/openssl/openssl_3.0.18.bb
@@ -25,7 +25,7 @@ SRC_URI:append:class-nativesdk = " \
file://environment.d-openssl.sh \
"
-SRC_URI[sha256sum] = "dfdd77e4ea1b57ff3a6dbde6b0bdc3f31db5ac99e7fdd4eaf9e1fbb6ec2db8ce"
+SRC_URI[sha256sum] = "d80c34f5cf902dccf1f1b5df5ebb86d0392e37049e5d73df1b3abae72e4ffe8b"
inherit lib_package multilib_header multilib_script ptest perlnative
MULTILIB_SCRIPTS = "${PN}-bin:${bindir}/c_rehash"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 19/24] glibc: stable 2.35 branch updates
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (17 preceding siblings ...)
2025-10-09 19:31 ` [OE-core][kirkstone 18/24] openssl: upgrade 3.0.17 -> 3.0.18 Steve Sakoman
@ 2025-10-09 19:31 ` Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 20/24] systemd: backport fix for handle USE_NLS from master Steve Sakoman
` (4 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:31 UTC (permalink / raw)
To: openembedded-core
From: Deepesh Varatharajan <Deepesh.Varatharajan@windriver.com>
git log --oneline a66bc3941ff298e474d5f02d0c3303401951141f..4e50046821f05ada5f14c76803845125ddb3ed7d
4e50046821 (HEAD, origin/release/2.35/master) x86-64: Add GLIBC_ABI_DT_X86_64_PLT [BZ #33212]
c97735cfde elf: Handle ld.so with LOAD segment gaps in _dl_find_object (bug 31943)
96cc65a28a elf: Extract rtld_setup_phdr function from dl_main
e3f04f64fa elf: Do not add a copy of _dl_find_object to libc.so
bfae8bf49c arm: Use _dl_find_object on __gnu_Unwind_Find_exidx (BZ 31405)
Testing Results:
Before After Diff
PASS 4605 4609 +4
XPASS 6 6 0
FAIL 358 356 -2
XFAIL 16 16 0
UNRESOLVED 0 1 +1
UNSUPPORTED 197 197 0
Testcases changes
testcase-name before after
elf/tst-link-map-contiguous-libc(new) - PASS
elf/tst-link-map-contiguous-ldso(new) - FAIL
elf/check-dt-x86-64-plt(new) - UNRESOLVED
misc/tst-tsearch FAIL PASS
posix/bug-regex24 FAIL PASS
string/tst-cmp FAIL PASS
Signed-off-by: Deepesh Varatharajan <Deepesh.Varatharajan@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-core/glibc/glibc-version.inc | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc
index 0b06005b25..b9f5e8fb8f 100644
--- a/meta/recipes-core/glibc/glibc-version.inc
+++ b/meta/recipes-core/glibc/glibc-version.inc
@@ -1,6 +1,6 @@
SRCBRANCH ?= "release/2.35/master"
PV = "2.35"
-SRCREV_glibc ?= "a66bc3941ff298e474d5f02d0c3303401951141f"
+SRCREV_glibc ?= "4e50046821f05ada5f14c76803845125ddb3ed7d"
SRCREV_localedef ?= "794da69788cbf9bf57b59a852f9f11307663fa87"
GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 20/24] systemd: backport fix for handle USE_NLS from master
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (18 preceding siblings ...)
2025-10-09 19:31 ` [OE-core][kirkstone 19/24] glibc: stable 2.35 branch updates Steve Sakoman
@ 2025-10-09 19:31 ` Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 21/24] p11-kit: " Steve Sakoman
` (3 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:31 UTC (permalink / raw)
To: openembedded-core
From: AshishKumar Mishra <emailaddress.ashish@gmail.com>
Do not build translations when NLS is disabled.
(From OE-Core rev: 83795ef6c3fa12a863cd20b7ec1a2607606987b6)
This change corresponds to upstream d848b454e64ffbd642590b4bbc378619e1547ad3
from master .
Since the systemd version are different between master & kirkstone
applied the patch manually
Signed-off-by: Philip Lorenz <philip.lorenz@bmw.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: AshishKumar Mishra <emailaddress.ashish@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-core/systemd/systemd_250.14.bb | 1 +
1 file changed, 1 insertion(+)
diff --git a/meta/recipes-core/systemd/systemd_250.14.bb b/meta/recipes-core/systemd/systemd_250.14.bb
index 66d20a46fd..087c0035eb 100644
--- a/meta/recipes-core/systemd/systemd_250.14.bb
+++ b/meta/recipes-core/systemd/systemd_250.14.bb
@@ -235,6 +235,7 @@ EXTRA_OEMESON += "-Dnobody-user=nobody \
-Dmode=release \
-Dsystem-alloc-uid-min=101 \
-Dsystem-uid-max=999 \
+ -Dtranslations=${@'false' if d.getVar('USE_NLS') == 'no' else 'true'} \
-Dsystem-alloc-gid-min=101 \
-Dsystem-gid-max=999 \
"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 21/24] p11-kit: backport fix for handle USE_NLS from master
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (19 preceding siblings ...)
2025-10-09 19:31 ` [OE-core][kirkstone 20/24] systemd: backport fix for handle USE_NLS from master Steve Sakoman
@ 2025-10-09 19:31 ` Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 22/24] conf/bitbake.conf: use gnu mirror instead of main server Steve Sakoman
` (2 subsequent siblings)
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:31 UTC (permalink / raw)
To: openembedded-core
From: AshishKumar Mishra <emailaddress.ashish@gmail.com>
Disable NLS in the build when USE_NLS is off.
(From OE-Core rev: b94798ecd535956ef4565663710ea9a701ff21ed)
This change corresponds to upstream eeb3974472429a99a724f324dc8a63e435741f68
from master .
Since the p11-kit version are different between master & kirkstone
applied the patch manually
Signed-off-by: Philip Lorenz <philip.lorenz@bmw.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: AshishKumar Mishra <emailaddress.ashish@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-support/p11-kit/p11-kit_0.24.1.bb | 1 +
1 file changed, 1 insertion(+)
diff --git a/meta/recipes-support/p11-kit/p11-kit_0.24.1.bb b/meta/recipes-support/p11-kit/p11-kit_0.24.1.bb
index 72b446204a..62aca0cfee 100644
--- a/meta/recipes-support/p11-kit/p11-kit_0.24.1.bb
+++ b/meta/recipes-support/p11-kit/p11-kit_0.24.1.bb
@@ -18,6 +18,7 @@ PACKAGECONFIG ??= ""
PACKAGECONFIG[manpages] = "-Dman=true,-Dman=false,libxslt-native"
PACKAGECONFIG[trust-paths] = "-Dtrust_paths=/etc/ssl/certs/ca-certificates.crt,,,ca-certificates"
+EXTRA_OEMESON:append = " -Dnls=${@'false' if d.getVar('USE_NLS') == 'no' else 'true'}"
GTKDOC_MESON_OPTION = 'gtk_doc'
FILES:${PN} += " \
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 22/24] conf/bitbake.conf: use gnu mirror instead of main server
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (20 preceding siblings ...)
2025-10-09 19:31 ` [OE-core][kirkstone 21/24] p11-kit: " Steve Sakoman
@ 2025-10-09 19:31 ` Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 23/24] selftest/cases/meta_ide.py: use " Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 24/24] oeqa/sdk/cases/buildcpio.py: " Steve Sakoman
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:31 UTC (permalink / raw)
To: openembedded-core
From: Gyorgy Sarvari <skandigraun@gmail.com>
ftp.gnu.org is the main server of the GNU project, however download speed
can vary greatly based on one's location.
Using ftpmirror.gnu.org should redirect the request to the closest up-to-date mirror,
which should result sometimes in significantly faster download speed, depending
on one's location. This should also distribute the traffic more across the mirrors.
This information was sourced from https://www.gnu.org/prep/ftp.html .
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit d8c6f01d7467e018aa0ed27a87850d9e4434a47a)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/conf/bitbake.conf | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/conf/bitbake.conf b/meta/conf/bitbake.conf
index 290dfda6c8..01baccec41 100644
--- a/meta/conf/bitbake.conf
+++ b/meta/conf/bitbake.conf
@@ -690,7 +690,7 @@ DEBIAN_MIRROR = "http://ftp.debian.org/debian/pool"
GENTOO_MIRROR = "http://distfiles.gentoo.org/distfiles"
GNOME_GIT = "git://gitlab.gnome.org/GNOME"
GNOME_MIRROR = "https://download.gnome.org/sources/"
-GNU_MIRROR = "https://ftp.gnu.org/gnu"
+GNU_MIRROR = "https://ftpmirror.gnu.org/gnu"
GNUPG_MIRROR = "https://www.gnupg.org/ftp/gcrypt"
GPE_MIRROR = "http://gpe.linuxtogo.org/download/source"
KERNELORG_MIRROR = "https://cdn.kernel.org/pub"
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 23/24] selftest/cases/meta_ide.py: use use gnu mirror instead of main server
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (21 preceding siblings ...)
2025-10-09 19:31 ` [OE-core][kirkstone 22/24] conf/bitbake.conf: use gnu mirror instead of main server Steve Sakoman
@ 2025-10-09 19:31 ` Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 24/24] oeqa/sdk/cases/buildcpio.py: " Steve Sakoman
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:31 UTC (permalink / raw)
To: openembedded-core
ftp.gnu.org is the main server of the GNU project, however download speed
can vary greatly based on one's location.
Using ftpmirror.gnu.org should redirect the request to the closest up-to-date mirror,
which should result sometimes in significantly faster download speed, depending
on one's location. This should also distribute the traffic more across the mirrors.
This information was sourced from https://www.gnu.org/prep/ftp.html
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/lib/oeqa/selftest/cases/meta_ide.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/lib/oeqa/selftest/cases/meta_ide.py b/meta/lib/oeqa/selftest/cases/meta_ide.py
index 6f10d30dc9..3dc81b20a7 100644
--- a/meta/lib/oeqa/selftest/cases/meta_ide.py
+++ b/meta/lib/oeqa/selftest/cases/meta_ide.py
@@ -40,7 +40,7 @@ class MetaIDE(OESelftestTestCase):
def test_meta_ide_can_build_cpio_project(self):
dl_dir = self.td.get('DL_DIR', None)
self.project = SDKBuildProject(self.tmpdir_metaideQA + "/cpio/", self.environment_script_path,
- "https://ftp.gnu.org/gnu/cpio/cpio-2.13.tar.gz",
+ "https://ftpmirror.gnu.org/gnu/cpio/cpio-2.13.tar.gz",
self.tmpdir_metaideQA, self.td['DATETIME'], dl_dir=dl_dir)
self.project.download_archive()
self.assertEqual(self.project.run_configure('$CONFIGURE_FLAGS --disable-maintainer-mode','sed -i -e "/char \*program_name/d" src/global.c;'), 0,
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
* [OE-core][kirkstone 24/24] oeqa/sdk/cases/buildcpio.py: use gnu mirror instead of main server
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
` (22 preceding siblings ...)
2025-10-09 19:31 ` [OE-core][kirkstone 23/24] selftest/cases/meta_ide.py: use " Steve Sakoman
@ 2025-10-09 19:31 ` Steve Sakoman
23 siblings, 0 replies; 27+ messages in thread
From: Steve Sakoman @ 2025-10-09 19:31 UTC (permalink / raw)
To: openembedded-core
ftp.gnu.org is the main server of the GNU project, however download speed
can vary greatly based on one's location.
Using ftpmirror.gnu.org should redirect the request to the closest up-to-date mirror,
which should result sometimes in significantly faster download speed, depending
on one's location. This should also distribute the traffic more across the mirrors.
This information was sourced from https://www.gnu.org/prep/ftp.html
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/lib/oeqa/sdk/cases/buildcpio.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/lib/oeqa/sdk/cases/buildcpio.py b/meta/lib/oeqa/sdk/cases/buildcpio.py
index e7fc211a47..00088d0ea0 100644
--- a/meta/lib/oeqa/sdk/cases/buildcpio.py
+++ b/meta/lib/oeqa/sdk/cases/buildcpio.py
@@ -17,7 +17,7 @@ class BuildCpioTest(OESDKTestCase):
"""
def test_cpio(self):
with tempfile.TemporaryDirectory(prefix="cpio-", dir=self.tc.sdk_dir) as testdir:
- tarball = self.fetch(testdir, self.td["DL_DIR"], "https://ftp.gnu.org/gnu/cpio/cpio-2.13.tar.gz")
+ tarball = self.fetch(testdir, self.td["DL_DIR"], "https://ftpmirror.gnu.org/gnu/cpio/cpio-2.13.tar.gz")
dirs = {}
dirs["source"] = os.path.join(testdir, "cpio-2.13")
--
2.43.0
^ permalink raw reply related [flat|nested] 27+ messages in thread
end of thread, other threads:[~2025-10-09 19:31 UTC | newest]
Thread overview: 27+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-10-09 19:30 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 01/24] libxml2: fix CVE-2025-9714 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 02/24] gstreamer1.0-plugins-bad: Fix CVE-2025-3887 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 03/24] busybox: patch CVE-2025-46394 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 04/24] libxslt: Patch for CVE-2025-7424 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 05/24] tiff: Fix CVE-2025-8961 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 06/24] tiff: Fix CVE-2025-9165 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 07/24] gstreamer1.0: ignore CVEs fixed in plugins Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 08/24] gstreamer1.0: ignore CVE-2025-2759 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 09/24] grub: ignore CVE-2024-2312 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 10/24] ghostscript: patch CVE-2025-59798 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 11/24] ghostscript: patch CVE-2025-59799 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 12/24] ghostscript: patch CVE-2025-59800 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 13/24] pulseaudio: ignore CVE-2024-11586 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 14/24] ffmpeg: ignore CVE-2023-6603 Steve Sakoman
2025-10-09 19:30 ` [OE-core][kirkstone 15/24] ffmpeg: mark CVE-2023-6601 as patched Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 16/24] go: fix CVE-2025-47906 Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 17/24] scripts/install-buildtools: Update to 4.0.30 Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 18/24] openssl: upgrade 3.0.17 -> 3.0.18 Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 19/24] glibc: stable 2.35 branch updates Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 20/24] systemd: backport fix for handle USE_NLS from master Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 21/24] p11-kit: " Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 22/24] conf/bitbake.conf: use gnu mirror instead of main server Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 23/24] selftest/cases/meta_ide.py: use " Steve Sakoman
2025-10-09 19:31 ` [OE-core][kirkstone 24/24] oeqa/sdk/cases/buildcpio.py: " Steve Sakoman
-- strict thread matches above, loose matches on Subject: below --
2022-09-07 14:20 [OE-core][kirkstone 00/24] Patch review Steve Sakoman
2022-08-27 18:25 Steve Sakoman
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox