From: Yoann Congal <yoann.congal@smile.fr>
To: openembedded-core@lists.openembedded.org
Cc: Paul Barker <paul@pbarker.dev>
Subject: [OE-core][scarthgap 00/22] Pull request (cover letter only)
Date: Fri, 23 Jan 2026 17:03:34 +0100 [thread overview]
Message-ID: <cover.1769177912.git.yoann.congal@smile.fr> (raw)
Those are the patches from the last patch review:
https://lore.kernel.org/openembedded-core/cover.1768910519.git.yoann.congal@smile.fr/
Note: this PR has patchs related to the whinlatter PR:
https://lore.kernel.org/openembedded-core/CAMSfU+779ANtEvXg9Z4M8a4wZu_Z4-+a1RJvE__OvfR92Oq=ZQ@mail.gmail.com/T/#t
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/?#/builders/29/builds/3113
via https://git.yoctoproject.org/poky-contrib/commit/?h=stable/scarthgap-nut&id=9fd46f5c882971ac222fc661cf0804ee5a458316
oe-core tip is at https://git.yoctoproject.org/poky-contrib/commit/?h=stable/scarthgap-nut&id=a7e7530d8ece2ee31ffcb220264cc9c52616b526
The following changes since commit 6988157ad983978ffd6b12bcefedd4deaffdbbd1:
build-appliance-image: Update to scarthgap head revision (2026-01-02 06:57:59 -0800)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/scarthgap-next
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/scarthgap-next
for you to fetch changes up to 199c6518f5e363a2d8648bdfe14233afd9b0ba6e:
pseudo: Update to pull in 'makewrappers: Fix EFAULT implementation' (2026-01-19 17:44:48 +0100)
----------------------------------------------------------------
Paul Barker (1):
pseudo: Add hard sstate dependencies for pseudo-native
Peter Marko (16):
python3: patch CVE-2025-12084
python3: patch CVE-2025-13836
util-linux: patch CVE-2025-14104
qemu: ignore CVE-2025-54566 and CVE-2025-54567
glib-2.0: patch CVE-2025-13601
glib-2.0: patch CVE-2025-14087
glib-2.0: patch CVE-2025-14512
dropbear: patch CVE-2019-6111
libpcap: patch CVE-2025-11961
libpcap: patch CVE-2025-11964
cups: allow unknown directives in conf files
libarchive: fix CVE-2025-60753 regression
curl: patch CVE-2025-14017
curl: patch CVE-2025-14819
curl: patch CVE-2025-15079
curl: patch CVE-2025-15224
Richard Purdie (4):
pseudo: Upgrade to version 1.9.1
pseudo: Update to pull in memleak fix
pseudo: Update to pull in openat2 and efault return code changes
pseudo: Update to pull in 'makewrappers: Fix EFAULT implementation'
Robert Yang (1):
pseudo: 1.9.0 -> 1.9.2
.../libpcap/libpcap/CVE-2025-11961-01.patch | 38 ++
.../libpcap/libpcap/CVE-2025-11961-02.patch | 433 ++++++++++++++++++
.../libpcap/libpcap/CVE-2025-11964.patch | 33 ++
.../libpcap/libpcap_1.10.4.bb | 3 +
.../dropbear/dropbear/CVE-2019-6111.patch | 157 +++++++
.../recipes-core/dropbear/dropbear_2022.83.bb | 1 +
.../glib-2.0/glib-2.0/CVE-2025-13601-01.patch | 125 +++++
.../glib-2.0/glib-2.0/CVE-2025-13601-02.patch | 128 ++++++
.../glib-2.0/glib-2.0/CVE-2025-14087-01.patch | 69 +++
.../glib-2.0/glib-2.0/CVE-2025-14087-02.patch | 240 ++++++++++
.../glib-2.0/glib-2.0/CVE-2025-14087-03.patch | 150 ++++++
.../glib-2.0/glib-2.0/CVE-2025-14512.patch | 70 +++
meta/recipes-core/glib-2.0/glib-2.0_2.78.6.bb | 6 +
meta/recipes-core/util-linux/util-linux.inc | 2 +
.../util-linux/CVE-2025-14104-01.patch | 33 ++
.../util-linux/CVE-2025-14104-02.patch | 28 ++
.../0001-configure-Prune-PIE-flags.patch | 44 --
.../pseudo/files/glibc238.patch | 65 ---
.../pseudo/files/older-glibc-symbols.patch | 4 +-
meta/recipes-devtools/pseudo/pseudo.inc | 7 +
meta/recipes-devtools/pseudo/pseudo_git.bb | 6 +-
.../python/python3/CVE-2025-12084.patch | 144 ++++++
.../python/python3/CVE-2025-13836.patch | 162 +++++++
.../python/python3_3.12.12.bb | 2 +
meta/recipes-devtools/qemu/qemu.inc | 3 +
meta/recipes-extended/cups/cups.inc | 1 +
...pping-scheduler-on-unknown-directive.patch | 43 ++
...25-60753.patch => CVE-2025-60753-01.patch} | 0
.../libarchive/CVE-2025-60753-02.patch | 46 ++
.../libarchive/libarchive_3.7.9.bb | 3 +-
...st-qual-fix-or-silence-compiler-warn.patch | 85 ++++
.../curl/curl/CVE-2025-14017.patch | 115 +++++
.../curl/curl/CVE-2025-14819.patch | 73 +++
.../curl/curl/CVE-2025-15079.patch | 32 ++
.../curl/curl/CVE-2025-15224.patch | 31 ++
meta/recipes-support/curl/curl_8.7.1.bb | 5 +
36 files changed, 2271 insertions(+), 116 deletions(-)
create mode 100644 meta/recipes-connectivity/libpcap/libpcap/CVE-2025-11961-01.patch
create mode 100644 meta/recipes-connectivity/libpcap/libpcap/CVE-2025-11961-02.patch
create mode 100644 meta/recipes-connectivity/libpcap/libpcap/CVE-2025-11964.patch
create mode 100644 meta/recipes-core/dropbear/dropbear/CVE-2019-6111.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-13601-01.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-13601-02.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-14087-01.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-14087-02.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-14087-03.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-14512.patch
create mode 100644 meta/recipes-core/util-linux/util-linux/CVE-2025-14104-01.patch
create mode 100644 meta/recipes-core/util-linux/util-linux/CVE-2025-14104-02.patch
delete mode 100644 meta/recipes-devtools/pseudo/files/0001-configure-Prune-PIE-flags.patch
delete mode 100644 meta/recipes-devtools/pseudo/files/glibc238.patch
create mode 100644 meta/recipes-devtools/python/python3/CVE-2025-12084.patch
create mode 100644 meta/recipes-devtools/python/python3/CVE-2025-13836.patch
create mode 100644 meta/recipes-extended/cups/cups/0001-conf.c-Fix-stopping-scheduler-on-unknown-directive.patch
rename meta/recipes-extended/libarchive/libarchive/{CVE-2025-60753.patch => CVE-2025-60753-01.patch} (100%)
create mode 100644 meta/recipes-extended/libarchive/libarchive/CVE-2025-60753-02.patch
create mode 100644 meta/recipes-support/curl/curl/0001-build-enable-Wcast-qual-fix-or-silence-compiler-warn.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2025-14017.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2025-14819.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2025-15079.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2025-15224.patch
reply other threads:[~2026-01-23 16:04 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=cover.1769177912.git.yoann.congal@smile.fr \
--to=yoann.congal@smile.fr \
--cc=openembedded-core@lists.openembedded.org \
--cc=paul@pbarker.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox