* [OE-core][scarthgap 00/15] Patch review
@ 2024-12-04 20:36 Steve Sakoman
0 siblings, 0 replies; 23+ messages in thread
From: Steve Sakoman @ 2024-12-04 20:36 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for scarthgap and have comments back by
end of day Friday, December 6
Passed a-full on autobuilder:
https://valkyrie.yoctoproject.org/#/builders/29/builds/582
The following changes since commit e0c4f2f69723f64a29ba35c4de5fb1a7c79ef718:
rootfs: Ensure run-postinsts is not uninstalled for read-only-rootfs-delayed-postinsts (2024-12-02 10:18:14 -0800)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/scarthgap-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/scarthgap-nut
Changqing Li (1):
rxvt-unicode.inc: disable the terminfo installation by setting TIC to
:
Hongxu Jia (2):
ovmf: fix CVE-2024-38796
ovmf: fix CVE-2024-1298
Richard Purdie (12):
do_package/sstate/sstatesig: Change timestamp clamping to hash output
only
selftest/reproducible: Drop rawlogs
selftest/reproducible: Clean up pathnames
resulttool: Allow store to filter to specific revisions
resulttool: Use single space indentation in json output
oeqa/utils/gitarchive: Return tag name and improve exclude handling
resulttool: Fix passthrough of --all files in store mode
resulttool: Add --logfile-archive option to store mode
resulttool: Handle ltp rawlogs as well as ptest
resulttool: Clean up repoducible build logs
resulttool: Trim the precision of duration information
resulttool: Improve repo layout for oeselftest results
meta/classes-global/sstate.bbclass | 16 ----
meta/lib/oe/sstatesig.py | 7 +-
meta/lib/oeqa/core/runner.py | 2 +-
meta/lib/oeqa/selftest/cases/reproducible.py | 8 +-
meta/lib/oeqa/utils/gitarchive.py | 4 +-
...ential-UINT32-overflow-in-S3-ResumeC.patch | 51 +++++++++++++
...-Fix-overflow-issue-in-BasePeCoffLib.patch | 36 +++++++++
meta/recipes-core/ovmf/ovmf_git.bb | 2 +
.../rxvt-unicode/rxvt-unicode.inc | 3 +-
scripts/lib/resulttool/manualexecution.py | 2 +-
scripts/lib/resulttool/report.py | 2 +-
scripts/lib/resulttool/resultutils.py | 76 +++++++++++++++----
scripts/lib/resulttool/store.py | 26 ++++++-
13 files changed, 188 insertions(+), 47 deletions(-)
create mode 100644 meta/recipes-core/ovmf/ovmf/0001-MdeModulePkg-Potential-UINT32-overflow-in-S3-ResumeC.patch
create mode 100644 meta/recipes-core/ovmf/ovmf/0001-MdePkg-Fix-overflow-issue-in-BasePeCoffLib.patch
--
2.34.1
^ permalink raw reply [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 00/15] Patch review
@ 2025-01-13 20:46 Steve Sakoman
2025-01-13 22:32 ` [scarthgap " Adrian Freihofer
0 siblings, 1 reply; 23+ messages in thread
From: Steve Sakoman @ 2025-01-13 20:46 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for scarthgap and have comments back by
end of day Wednesday, January 15
Passed a-full on autobuilder:
https://valkyrie.yoctoproject.org/#/builders/29/builds/802
The following changes since commit c3e0666dd2624c20c5f32657846d6f044046205b:
sanity.bbclass: skip check_userns for non-local uid (2025-01-03 06:05:29 -0800)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/scarthgap-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/scarthgap-nut
Bruce Ashfield (11):
linux-yocto/6.6: update to v6.6.56
linux-yocto/6.6: update to v6.6.58
linux-yocto/6.6: genericarm64.cfg: enable CONFIG_DMA_CMA
linux-yocto/6.6: update to v6.6.59
linux-yocto/6.6: update to v6.6.60
linux-yocto/6.6: update to v6.6.62
linux-yocto/6.6: bsp/genericarm64: disable ARM64_SME
linux-yocto/6.6: update to v6.6.63
linux-yocto/6.6: update to v6.6.64
linux-yocto/6.6: update to v6.6.66
linux-yocto/6.6: update to v6.6.69
Changqing Li (1):
systemd: enable create-log-dirs
Hiago De Franco (1):
bluez5: backport patch to fix address type when loading keys
Mark Hatle (1):
cve-update-nvd2-native: Handle BB_NO_NETWORK and missing db
Robert Yang (1):
groff: Fix race issues for parallel build
meta/recipes-connectivity/bluez5/bluez5.inc | 1 +
...ix-up-address-type-when-loading-keys.patch | 52 +++++++++++++++++++
.../meta/cve-update-nvd2-native.bb | 5 ++
meta/recipes-core/systemd/systemd_255.13.bb | 5 +-
...tbl.am-Fix-race-issues-for-parallel-.patch | 31 +++++++++++
meta/recipes-extended/groff/groff_1.23.0.bb | 1 +
.../linux/linux-yocto-rt_6.6.bb | 6 +--
.../linux/linux-yocto-tiny_6.6.bb | 6 +--
meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++-----
9 files changed, 114 insertions(+), 21 deletions(-)
create mode 100644 meta/recipes-connectivity/bluez5/bluez5/0001-adapter-Fix-up-address-type-when-loading-keys.patch
create mode 100644 meta/recipes-extended/groff/files/0001-contrib-hdtbl-hdtbl.am-Fix-race-issues-for-parallel-.patch
--
2.43.0
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [OE-core] [scarthgap 00/15] Patch review
2025-01-13 22:32 ` [scarthgap " Adrian Freihofer
@ 2025-01-14 15:56 ` Steve Sakoman
2025-01-14 16:31 ` Adrian Freihofer
0 siblings, 1 reply; 23+ messages in thread
From: Steve Sakoman @ 2025-01-14 15:56 UTC (permalink / raw)
To: adrian.freihofer; +Cc: openembedded-core
Hi Adrian,
Will these changes break any existing workflows or require
documentation changes?
Thanks,
Steve
On Mon, Jan 13, 2025 at 2:32 PM Adrian Freihofer via
lists.openembedded.org
<adrian.freihofer=siemens.com@lists.openembedded.org> wrote:
>
> Hi Steve
>
> Would it be possible to cherry-pick also these poky commits:
>
> a3c51794144 oe-selftest: devtool ide-sdk use modify debug-build
> 92a4abac54a devtool: ide-sdk recommend DEBUG_BUILD
> 71acb3b781d devtool: ide-sdk sort cmake preset
> 1f7eb26c947 devtool: modify support debug-builds
>
> respectively these OE-core commits:
>
> fc17808799d2b667afbe4ea9837b66af70d47007
> b886c26bf893878ba8eb6bee80dd0507e5cb0d2d
> 65950eb601c6c8aac0e4bc8683e544305346229d
> a3c5179414410ba8ccf40c7ec168ffbbf73a9096
>
> These patches fix some bugs. They also restore compatibility with the latest version 2.8.0 of https://marketplace.visualstudio.com/items/yocto-project.yocto-bitbake/changelog. Without these patches, the user has to configure the bitbake.disableDevtoolDebugBuild setting, which is not intuitive at all.
>
> Thank you anyway.
> Adrian
>
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#209765): https://lists.openembedded.org/g/openembedded-core/message/209765
> Mute This Topic: https://lists.openembedded.org/mt/110595467/3620601
> Group Owner: openembedded-core+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [steve@sakoman.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [OE-core] [scarthgap 00/15] Patch review
2025-01-14 15:56 ` [OE-core] " Steve Sakoman
@ 2025-01-14 16:31 ` Adrian Freihofer
0 siblings, 0 replies; 23+ messages in thread
From: Adrian Freihofer @ 2025-01-14 16:31 UTC (permalink / raw)
To: steve; +Cc: adrian.freihofer, openembedded-core
[-- Attachment #1: Type: text/plain, Size: 2075 bytes --]
Hi Steve
This patch is still looking for its way into the master branch:
https://patchwork.yoctoproject.org/project/docs/patch/20250113233736.4181201-3-adrian.freihofer@siemens.com/
I hope this will happen soon.
Thank you and regards,
Adrian
Am Di., 14. Jan. 2025 um 16:57 Uhr schrieb Steve Sakoman via
lists.openembedded.org <steve=sakoman.com@lists.openembedded.org>:
> Hi Adrian,
>
> Will these changes break any existing workflows or require
> documentation changes?
>
> Thanks,
>
> Steve
>
> On Mon, Jan 13, 2025 at 2:32 PM Adrian Freihofer via
> lists.openembedded.org
> <adrian.freihofer=siemens.com@lists.openembedded.org> wrote:
> >
> > Hi Steve
> >
> > Would it be possible to cherry-pick also these poky commits:
> >
> > a3c51794144 oe-selftest: devtool ide-sdk use modify debug-build
> > 92a4abac54a devtool: ide-sdk recommend DEBUG_BUILD
> > 71acb3b781d devtool: ide-sdk sort cmake preset
> > 1f7eb26c947 devtool: modify support debug-builds
> >
> > respectively these OE-core commits:
> >
> > fc17808799d2b667afbe4ea9837b66af70d47007
> > b886c26bf893878ba8eb6bee80dd0507e5cb0d2d
> > 65950eb601c6c8aac0e4bc8683e544305346229d
> > a3c5179414410ba8ccf40c7ec168ffbbf73a9096
> >
> > These patches fix some bugs. They also restore compatibility with the
> latest version 2.8.0 of
> https://marketplace.visualstudio.com/items/yocto-project.yocto-bitbake/changelog.
> Without these patches, the user has to configure the
> bitbake.disableDevtoolDebugBuild setting, which is not intuitive at all.
> >
> > Thank you anyway.
> > Adrian
> >
> >
> >
> >
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#209808):
> https://lists.openembedded.org/g/openembedded-core/message/209808
> Mute This Topic: https://lists.openembedded.org/mt/110595467/4454582
> Group Owner: openembedded-core+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [
> adrian.freihofer@gmail.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
>
[-- Attachment #2: Type: text/html, Size: 3544 bytes --]
^ permalink raw reply [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 00/15] Patch review
@ 2025-04-30 2:59 Steve Sakoman
0 siblings, 0 replies; 23+ messages in thread
From: Steve Sakoman @ 2025-04-30 2:59 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for scarthgap and have comments back by
end of day Thursday, May 1
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/1498
The following changes since commit 87cadf62ba0d6b0fc3dc0151a5d320919b7eb1ab:
bluez5: add missing tools to noinst-tools package (2025-04-22 10:32:27 -0700)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/scarthgap-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/scarthgap-nut
Alexander Kanavin (1):
perlcross: update 1.5.2 -> 1.6
Archana Polampalli (2):
perlcross: 1.6 -> 1.6.2
perl: upgrade 5.38.2 -> 5.38.4
Changqing Li (4):
initscripts: add function
log_success_msg/log_failure_msg/log_warning_msg
buildtools-tarball: move setting of envvars to respective envfile
buildtools-tarball: add envvars into BB_ENV_PASSTHROUGH_ADDITIONS
buildtools-tarball: Make buildtools respects host CA certificates
Peter Marko (5):
ppp: patch CVE-2024-58250
libxml2: patch CVE-2025-32414
libxml2: patch CVE-2025-32415
glib-2.0: patch CVE-2025-3360
Revert "cve-update-nvd2-native: Tweak to work better with NFS DL_DIR"
Priyal Doshi (1):
tzdata/tzcode-native: upgrade 2025a -> 2025b
Shubham Kulkarni (1):
libpam: Update fix for CVE-2024-10041
Soumya Sambu (1):
git: Upgrade 2.44.1 -> 2.44.3
.../openssl/files/environment.d-openssl.sh | 22 +-
.../ppp/ppp/CVE-2024-58250.patch | 194 ++++++++++++++++++
meta/recipes-connectivity/ppp/ppp_2.5.0.bb | 2 +-
.../glib-2.0/glib-2.0/CVE-2025-3360-01.patch | 57 +++++
.../glib-2.0/glib-2.0/CVE-2025-3360-02.patch | 53 +++++
.../glib-2.0/glib-2.0/CVE-2025-3360-03.patch | 36 ++++
.../glib-2.0/glib-2.0/CVE-2025-3360-04.patch | 76 +++++++
.../glib-2.0/glib-2.0/CVE-2025-3360-05.patch | 57 +++++
.../glib-2.0/glib-2.0/CVE-2025-3360-06.patch | 50 +++++
meta/recipes-core/glib-2.0/glib-2.0_2.78.6.bb | 8 +-
.../initscripts/initscripts-1.0/functions | 21 ++
.../initscripts/initscripts_1.0.bb | 1 -
.../libxml/libxml2/CVE-2025-32414.patch | 74 +++++++
.../libxml/libxml2/CVE-2025-32415.patch | 39 ++++
meta/recipes-core/libxml/libxml2_2.12.10.bb | 2 +
meta/recipes-core/meta/buildtools-tarball.bb | 29 ++-
.../meta/cve-update-nvd2-native.bb | 2 -
.../git/git/environment.d-git.sh | 19 ++
.../git/{git_2.44.1.bb => git_2.44.3.bb} | 10 +-
...ile-check-the-file-if-patched-or-not.patch | 3 +-
...oss-add-LDFLAGS-when-linking-libperl.patch | 9 +-
.../perl-cross/files/determinism.patch | 41 ++--
...{perlcross_1.5.2.bb => perlcross_1.6.2.bb} | 2 +-
.../perl/{perl_5.38.2.bb => perl_5.38.4.bb} | 2 +-
.../environment.d-python3-requests.sh | 11 +
.../python/python3-requests_2.32.3.bb | 11 +
...024-10041.patch => CVE-2024-10041-1.patch} | 0
.../pam/libpam/CVE-2024-10041-2.patch | 77 +++++++
meta/recipes-extended/pam/libpam_1.5.3.bb | 3 +-
meta/recipes-extended/timezone/timezone.inc | 6 +-
.../curl/curl/environment.d-curl.sh | 19 ++
meta/recipes-support/curl/curl_8.7.1.bb | 9 +
32 files changed, 899 insertions(+), 46 deletions(-)
create mode 100644 meta/recipes-connectivity/ppp/ppp/CVE-2024-58250.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-3360-01.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-3360-02.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-3360-03.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-3360-04.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-3360-05.patch
create mode 100644 meta/recipes-core/glib-2.0/glib-2.0/CVE-2025-3360-06.patch
create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2025-32414.patch
create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2025-32415.patch
create mode 100644 meta/recipes-devtools/git/git/environment.d-git.sh
rename meta/recipes-devtools/git/{git_2.44.1.bb => git_2.44.3.bb} (93%)
rename meta/recipes-devtools/perl-cross/{perlcross_1.5.2.bb => perlcross_1.6.2.bb} (92%)
rename meta/recipes-devtools/perl/{perl_5.38.2.bb => perl_5.38.4.bb} (99%)
create mode 100644 meta/recipes-devtools/python/python3-requests/environment.d-python3-requests.sh
rename meta/recipes-extended/pam/libpam/{CVE-2024-10041.patch => CVE-2024-10041-1.patch} (100%)
create mode 100644 meta/recipes-extended/pam/libpam/CVE-2024-10041-2.patch
create mode 100644 meta/recipes-support/curl/curl/environment.d-curl.sh
--
2.43.0
^ permalink raw reply [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 00/15] Patch review
@ 2026-03-20 0:28 Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 01/15] inetutils: patch CVE-2026-28372 Yoann Congal
` (14 more replies)
0 siblings, 15 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for scarthgap and have comments back by
end of day Monday, March 23.
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/3457
The following changes since commit 077f258eb2125359ffe3982c58433ee14cb21f09:
busybox: Fixes CVE-2025-60876 (2026-03-16 09:21:34 +0000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/scarthgap-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/scarthgap-nut
for you to fetch changes up to a6eecf76e21469a96979cf426f54de08d39118dc:
python3-pip: drop unused Windows distlib launcher templates (2026-03-19 00:05:33 +0100)
----------------------------------------------------------------
Ankur Tyagi (2):
wireless-regdb: upgrade 2025.10.07 -> 2026.02.04
tiff: ignore CVE-2025-61143, CVE-2025-61144 and CVE-2025-61145
Daniel Turull (3):
improve_kernel_cve_report: do not override backported-patch
improve_kernel_cve_report: do not use custom version
improve_kernel_cve_report: add option to read debugsources.zstd
Eduardo Ferreira (1):
go: Fix CVE-2025-61726.patch variable ordering
Krupal Ka Patel (2):
python3-setuptools: drop Windows launcher executables on non-mingw
builds
python3-pip: drop unused Windows distlib launcher templates
Martin Jansa (1):
lsb.py: strip ' from os-release file
Peter Marko (1):
inetutils: patch CVE-2026-28372
Ryan Eatmon (1):
oe-setup-build: Fix typo
Trent Piepho (1):
systemd-systemctl: Fix instance name parsing with escapes or periods
Vijay Anusuri (3):
freetype: Fix CVE-2026-23865
python3-pip: Fix CVE-2026-1703
inetutils: Fix CVE-2026-32746
meta/lib/oe/lsb.py | 2 +-
.../inetutils/inetutils/CVE-2026-28372.patch | 86 +++++++++++++++++++
.../inetutils/inetutils/CVE-2026-32746.patch | 40 +++++++++
.../inetutils/inetutils_2.5.bb | 2 +
.../systemd/systemd-systemctl/systemctl | 7 +-
.../go/go/CVE-2025-61726.patch | 21 ++---
.../python/python3-pip/CVE-2026-1703.patch | 37 ++++++++
.../python/python3-pip_24.0.bb | 13 ++-
.../python/python3-setuptools_69.1.1.bb | 9 ++
.../freetype/freetype/CVE-2026-23865.patch | 54 ++++++++++++
.../freetype/freetype_2.13.2.bb | 1 +
....10.07.bb => wireless-regdb_2026.02.04.bb} | 2 +-
meta/recipes-multimedia/libtiff/tiff_4.6.0.bb | 2 +-
scripts/contrib/improve_kernel_cve_report.py | 37 +++++++-
scripts/oe-setup-build | 2 +-
15 files changed, 295 insertions(+), 20 deletions(-)
create mode 100644 meta/recipes-connectivity/inetutils/inetutils/CVE-2026-28372.patch
create mode 100644 meta/recipes-connectivity/inetutils/inetutils/CVE-2026-32746.patch
create mode 100644 meta/recipes-devtools/python/python3-pip/CVE-2026-1703.patch
create mode 100644 meta/recipes-graphics/freetype/freetype/CVE-2026-23865.patch
rename meta/recipes-kernel/wireless-regdb/{wireless-regdb_2025.10.07.bb => wireless-regdb_2026.02.04.bb} (94%)
^ permalink raw reply [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 01/15] inetutils: patch CVE-2026-28372
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 8:44 ` Paul Barker
2026-03-20 0:28 ` [OE-core][scarthgap 02/15] wireless-regdb: upgrade 2025.10.07 -> 2026.02.04 Yoann Congal
` (13 subsequent siblings)
14 siblings, 1 reply; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
Pick patch according to [1] (equivalent to patch from [2]).
This CVE is needed if util-linux >= 2.40 is used which is not the case
in Yocto kirkstone, however it's always possible that users update
packages in their layers.
[1] https://security-tracker.debian.org/tracker/CVE-2026-28372
[2] https://nvd.nist.gov/vuln/detail/CVE-2026-28372
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../inetutils/inetutils/CVE-2026-28372.patch | 86 +++++++++++++++++++
.../inetutils/inetutils_2.5.bb | 1 +
2 files changed, 87 insertions(+)
create mode 100644 meta/recipes-connectivity/inetutils/inetutils/CVE-2026-28372.patch
diff --git a/meta/recipes-connectivity/inetutils/inetutils/CVE-2026-28372.patch b/meta/recipes-connectivity/inetutils/inetutils/CVE-2026-28372.patch
new file mode 100644
index 00000000000..4e6bf0c87ca
--- /dev/null
+++ b/meta/recipes-connectivity/inetutils/inetutils/CVE-2026-28372.patch
@@ -0,0 +1,86 @@
+From 4db2f19f4caac03c7f4da6363c140bd70df31386 Mon Sep 17 00:00:00 2001
+From: Erik Auerswald <auerswal@unix-ag.uni-kl.de>
+Date: Sun, 15 Feb 2026 15:38:50 +0100
+Subject: [PATCH] telnetd: don't allow systemd service credentials
+
+The login(1) implementation of util-linux added support for
+systemd service credentials in release 2.40. This allows to
+bypass authentication by specifying a directory name in the
+environment variable CREDENTIALS_DIRECTORY. If this directory
+contains a file named 'login.noauth' with the content of 'yes',
+login(1) skips authentication.
+
+GNU Inetutils telnetd supports to set arbitrary environment
+variables using the 'Environment' and 'New Environment'
+Telnet options. This allows specifying a directory containing
+'login.noauth'. A local user can create such a directory
+and file, and, e.g., specify the user name 'root' to escalate
+privileges.
+
+This problem was reported by Ron Ben Yizhak in
+<https://lists.gnu.org/archive/html/bug-inetutils/2026-02/msg00000.html>.
+
+This commit clears CREDENTIALS_DIRECTORY from the environment
+before executing login(1) to implement a simple fix that can
+be backported easily.
+
+* NEWS.md: Mention fix.
+* THANKS: Mention Ron Ben Yizhak.
+* telnetd/pty.c: Clear CREDENTIALS_DIRECTORY from the environment
+before executing 'login'.
+
+CVE: CVE-2026-28372
+Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/inetutils.git/commit/?id=4db2f19f4caac03c7f4da6363c140bd70df31386]
+Signed-off-by: Peter Marko <peter.marko@siemens.com>
+---
+ NEWS | 5 +++++
+ THANKS | 1 +
+ telnetd/pty.c | 8 ++++++++
+ 3 files changed, 14 insertions(+)
+
+diff --git a/NEWS b/NEWS
+index 877ca53b..f5172a71 100644
+--- a/NEWS
++++ b/NEWS
+@@ -1,5 +1,10 @@
+ GNU inetutils NEWS -- history of user-visible changes.
+
++** Prevent privilege escalation via telnetd abusing systemd service
++credentials support added to the login(1) implementation of util-linux
++in release 2.40. Reported by Ron Ben Yizhak in
++<https://lists.gnu.org/archive/html/bug-inetutils/2026-02/msg00000.html>.
++
+ * Noteworthy changes in release 2.5 (2023-12-29) [stable]
+
+ ** ftpd, rcp, rlogin, rsh, rshd, uucpd
+diff --git a/THANKS b/THANKS
+index 8d1d3dbb..ef5f6063 100644
+--- a/THANKS
++++ b/THANKS
+@@ -9,6 +9,7 @@ In particular:
+ NIIBE Yutaka (Security fixes & making talk finally work)
+ Nathan Neulinger (tftpd)
+ Thomas Bushnell (sockaddr sin_len field)
++ Ron Ben Yizhak (reported privilege escalation via telnetd)
+
+ Please see version control logs and ChangeLog.? for full credits.
+
+diff --git a/telnetd/pty.c b/telnetd/pty.c
+index c727e7be..f3518049 100644
+--- a/telnetd/pty.c
++++ b/telnetd/pty.c
+@@ -130,6 +130,14 @@ start_login (char *host, int autologin, char *name)
+ if (!cmd)
+ fatal (net, "can't expand login command line");
+ argcv_get (cmd, "", &argc, &argv);
++
++ /* util-linux's "login" introduced an authentication bypass method
++ * via environment variable "CREDENTIALS_DIRECTORY" in version 2.40.
++ * Clear it from the environment before executing "login" to prevent
++ * abuse via Telnet.
++ */
++ unsetenv ("CREDENTIALS_DIRECTORY");
++
+ execv (argv[0], argv);
+ syslog (LOG_ERR, "%s: %m\n", cmd);
+ fatalperror (net, cmd);
diff --git a/meta/recipes-connectivity/inetutils/inetutils_2.5.bb b/meta/recipes-connectivity/inetutils/inetutils_2.5.bb
index 486878022f0..6c53902356f 100644
--- a/meta/recipes-connectivity/inetutils/inetutils_2.5.bb
+++ b/meta/recipes-connectivity/inetutils/inetutils_2.5.bb
@@ -20,6 +20,7 @@ SRC_URI = "${GNU_MIRROR}/inetutils/inetutils-${PV}.tar.xz \
file://tftpd.xinetd.inetutils \
file://CVE-2026-24061-1.patch \
file://CVE-2026-24061-2.patch \
+ file://CVE-2026-28372.patch \
"
inherit autotools gettext update-alternatives texinfo
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 02/15] wireless-regdb: upgrade 2025.10.07 -> 2026.02.04
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 01/15] inetutils: patch CVE-2026-28372 Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 03/15] lsb.py: strip ' from os-release file Yoann Congal
` (12 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Ankur Tyagi <ankur.tyagi85@gmail.com>
Signed-off-by: Ankur Tyagi <ankur.tyagi85@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit f86c38b13121788fe6a654df04800d24b2b28b61)
Signed-off-by: Ankur Tyagi <ankur.tyagi85@gmail.com>
[YC: logs: https://git.kernel.org/pub/scm/linux/kernel/git/wens/wireless-regdb.git/log/?h=master-2026-02-04]
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
...ireless-regdb_2025.10.07.bb => wireless-regdb_2026.02.04.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-kernel/wireless-regdb/{wireless-regdb_2025.10.07.bb => wireless-regdb_2026.02.04.bb} (94%)
diff --git a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2025.10.07.bb b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.02.04.bb
similarity index 94%
rename from meta/recipes-kernel/wireless-regdb/wireless-regdb_2025.10.07.bb
rename to meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.02.04.bb
index 68ae3b0464c..2f7c8160434 100644
--- a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2025.10.07.bb
+++ b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2026.02.04.bb
@@ -5,7 +5,7 @@ LICENSE = "ISC"
LIC_FILES_CHKSUM = "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c"
SRC_URI = "https://www.kernel.org/pub/software/network/${BPN}/${BP}.tar.xz"
-SRC_URI[sha256sum] = "d4c872a44154604c869f5851f7d21d818d492835d370af7f58de8847973801c3"
+SRC_URI[sha256sum] = "0ff48a5cd9e9cfe8e815a24e023734919e9a3b7ad2f039243ad121cf5aabf6c6"
inherit bin_package allarch
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 03/15] lsb.py: strip ' from os-release file
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 01/15] inetutils: patch CVE-2026-28372 Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 02/15] wireless-regdb: upgrade 2025.10.07 -> 2026.02.04 Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 04/15] tiff: ignore CVE-2025-61143, CVE-2025-61144 and CVE-2025-61145 Yoann Congal
` (11 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Martin Jansa <martin.jansa@gmail.com>
In gentoo the file looks like this:
NAME='Gentoo'
ID='gentoo'
PRETTY_NAME='Gentoo Linux'
VERSION='2.18'
VERSION_ID='2.18'
HOME_URL='https://www.gentoo.org/'
SUPPORT_URL='https://www.gentoo.org/support/'
BUG_REPORT_URL='https://bugs.gentoo.org/'
ANSI_COLOR='1;32'
' were added with:
https://github.com/gentoo/gentoo/commit/2f590e35c9d3d13d5673163527120b2de97fdc80
before that the os-release file looked like this:
NAME=Gentoo
ID=gentoo
PRETTY_NAME="Gentoo Linux"
ANSI_COLOR="1;32"
HOME_URL="https://www.gentoo.org/"
SUPPORT_URL="https://www.gentoo.org/support/"
BUG_REPORT_URL="https://bugs.gentoo.org/"
VERSION_ID="2.18"
The ' is stripped from the ID later in distro_identifier with:
# Filter out any non-alphanumerics and convert to lowercase
distro_id = re.sub(r'\W', '', distro_id).lower()
but not from version which results in a weird NATIVELSBSTRING like:
NATIVELSBSTRING = "gentoo-'2.18'"
And similarly the directory name in sstate-cache:
oe-core $ ls -d sstate-cache/gentoo-*
"sstate-cache/gentoo-'2.18'" sstate-cache/gentoo-2.18
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 55f82653deb1ea8f1304fcba4d588bd55695b616)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/lib/oe/lsb.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/lib/oe/lsb.py b/meta/lib/oe/lsb.py
index 3ec03e5042b..1fc3b968a0a 100644
--- a/meta/lib/oe/lsb.py
+++ b/meta/lib/oe/lsb.py
@@ -16,7 +16,7 @@ def get_os_release():
key, val = line.rstrip().split('=', 1)
except ValueError:
continue
- data[key.strip()] = val.strip('"')
+ data[key.strip()] = val.strip('"\'')
return data
def release_dict_osr():
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 04/15] tiff: ignore CVE-2025-61143, CVE-2025-61144 and CVE-2025-61145
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (2 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 03/15] lsb.py: strip ' from os-release file Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 05/15] improve_kernel_cve_report: do not override backported-patch Yoann Congal
` (10 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Ankur Tyagi <ankur.tyagi85@gmail.com>
These CVEs are for tools which were removed in v4.6.0[1]
[1]https://gitlab.com/libtiff/libtiff/-/commit/eab89a627f0a65e9a1a47c4b30b4802c80b1ac45
Details:
https://nvd.nist.gov/vuln/detail/CVE-2025-61143
https://nvd.nist.gov/vuln/detail/CVE-2025-61144
https://nvd.nist.gov/vuln/detail/CVE-2025-61145
Signed-off-by: Ankur Tyagi <ankur.tyagi85@gmail.com>
[YC: NVD patches for these CVEs only modify the tools which are not in
the tarball we use]
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-multimedia/libtiff/tiff_4.6.0.bb | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.6.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.6.0.bb
index 777783d7ccd..07540692fcf 100644
--- a/meta/recipes-multimedia/libtiff/tiff_4.6.0.bb
+++ b/meta/recipes-multimedia/libtiff/tiff_4.6.0.bb
@@ -29,7 +29,7 @@ CVE_STATUS[CVE-2015-7313] = "fixed-version: Tested with check from https://secur
CVE_STATUS[CVE-2023-3164] = "cpe-incorrect: Issue only affects the tiffcrop tool not compiled by default since 4.6.0"
CVE_STATUS_GROUPS += "CVE_STATUS_REMOVED_TOOLS"
-CVE_STATUS_REMOVED_TOOLS = "CVE-2024-13978 CVE-2025-8176 CVE-2025-8177 CVE-2025-8534 CVE-2025-8851 CVE-2025-8961"
+CVE_STATUS_REMOVED_TOOLS = "CVE-2024-13978 CVE-2025-8176 CVE-2025-8177 CVE-2025-8534 CVE-2025-8851 CVE-2025-8961 CVE-2025-61143 CVE-2025-61144 CVE-2025-61145"
CVE_STATUS_REMOVED_TOOLS[status] = "cpe-incorrect: tools affected by these CVEs are not present in this release"
inherit autotools multilib_header
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 05/15] improve_kernel_cve_report: do not override backported-patch
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (3 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 04/15] tiff: ignore CVE-2025-61143, CVE-2025-61144 and CVE-2025-61145 Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 06/15] improve_kernel_cve_report: do not use custom version Yoann Congal
` (9 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Daniel Turull <daniel.turull@ericsson.com>
If the user has a CVE_STATUS for their own backported patch,
the backport takes priority over upstream vulnerable versions.
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 0beef05be119ea465ba06553a42edea03dfc9fd3)
Signed-off-by: Himanshu Jadon <hjadon@cisco.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
scripts/contrib/improve_kernel_cve_report.py | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/scripts/contrib/improve_kernel_cve_report.py b/scripts/contrib/improve_kernel_cve_report.py
index 829cc4cd30e..a81aa0ff943 100755
--- a/scripts/contrib/improve_kernel_cve_report.py
+++ b/scripts/contrib/improve_kernel_cve_report.py
@@ -340,6 +340,10 @@ def cve_update(cve_data, cve, entry):
if cve_data[cve]['status'] == entry['status']:
return
if entry['status'] == "Unpatched" and cve_data[cve]['status'] == "Patched":
+ # Backported-patch (e.g. vendor kernel repo with cherry-picked CVE patch)
+ # has priority over unpatch from CNA
+ if cve_data[cve]['detail'] == "backported-patch":
+ return
logging.warning("CVE entry %s update from Patched to Unpatched from the scan result", cve)
cve_data[cve] = copy_data(cve_data[cve], entry)
return
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 06/15] improve_kernel_cve_report: do not use custom version
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (4 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 05/15] improve_kernel_cve_report: do not override backported-patch Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 07/15] improve_kernel_cve_report: add option to read debugsources.zstd Yoann Congal
` (8 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Daniel Turull <daniel.turull@ericsson.com>
When using the version specified in cve-summary.json, we need to
remove the suffix containing the custom version to match the
versions from the CVEs.
This patch truncates the version from cve-summary.json to use only
the base version of the kernel.
This is only applicable for kernels where the user has added their
own version.
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 3942d40e96989268e8d1030f9d8c3859044d9635)
Signed-off-by: Himanshu Jadon <hjadon@cisco.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
scripts/contrib/improve_kernel_cve_report.py | 6 ++++--
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/scripts/contrib/improve_kernel_cve_report.py b/scripts/contrib/improve_kernel_cve_report.py
index a81aa0ff943..5c39df05a5a 100755
--- a/scripts/contrib/improve_kernel_cve_report.py
+++ b/scripts/contrib/improve_kernel_cve_report.py
@@ -445,10 +445,12 @@ def main():
is_kernel=True
if not is_kernel:
continue
-
+ # We remove custom versions after -
+ upstream_version = Version(pkg["version"].split("-")[0])
+ logging.info("Checking kernel %s", upstream_version)
kernel_cves = get_kernel_cves(args.datadir,
compiled_files,
- Version(pkg["version"]))
+ upstream_version)
logging.info("Total kernel cves from kernel CNA: %s", len(kernel_cves))
cves = {issue["id"]: issue for issue in pkg["issue"]}
logging.info("Total kernel before processing cves: %s", len(cves))
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 07/15] improve_kernel_cve_report: add option to read debugsources.zstd
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (5 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 06/15] improve_kernel_cve_report: do not use custom version Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 08/15] freetype: Fix CVE-2026-23865 Yoann Congal
` (7 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Daniel Turull <daniel.turull@ericsson.com>
Adding option to be able to import debugsources.zstd directly.
The linux-yocto-debugsources.zstd is generated in every build and
does not require any additional configuration.
In contrast, SPDX_INCLUDE_COMPILED_SOURCES needs to be explicitly
added and increases build time.
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
(cherry picked from commit c84a8958f30bbb982656ddcbe7476f6f81e1a6fb)
Signed-off-by: Himanshu Jadon <hjadon@cisco.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
scripts/contrib/improve_kernel_cve_report.py | 27 ++++++++++++++++++++
1 file changed, 27 insertions(+)
diff --git a/scripts/contrib/improve_kernel_cve_report.py b/scripts/contrib/improve_kernel_cve_report.py
index 5c39df05a5a..3a15b1ed26e 100755
--- a/scripts/contrib/improve_kernel_cve_report.py
+++ b/scripts/contrib/improve_kernel_cve_report.py
@@ -236,6 +236,26 @@ def read_spdx3(spdx):
cfiles.add(filename)
return cfiles
+def read_debugsources(file_path):
+ '''
+ Read zstd file from pkgdata to extract sources
+ '''
+ import zstandard as zstd
+ import itertools
+ # Decompress the .zst file
+ cfiles = set()
+ with open(file_path, 'rb') as fh:
+ dctx = zstd.ZstdDecompressor()
+ with dctx.stream_reader(fh) as reader:
+ decompressed_bytes = reader.read()
+ json_data = json.loads(decompressed_bytes)
+ # We need to remove one level from the debug sources
+ for source_list in json_data.values():
+ for source in source_list:
+ src = source.split("/",1)[1]
+ cfiles.add(src)
+ return cfiles
+
def check_kernel_compiled_files(compiled_files, cve_info):
"""
Return if a CVE affected us depending on compiled files
@@ -372,6 +392,10 @@ def main():
"--spdx",
help="SPDX2/3 for the kernel. Needs to include compiled sources",
)
+ parser.add_argument(
+ "--debug-sources-file",
+ help="Debug sources zstd file generated from Yocto",
+ )
parser.add_argument(
"--datadir",
type=pathlib.Path,
@@ -415,6 +439,9 @@ def main():
if args.spdx:
compiled_files = read_spdx(args.spdx)
logging.info("Total compiled files %d", len(compiled_files))
+ if args.debug_sources_file:
+ compiled_files = read_debugsources(args.debug_sources_file)
+ logging.info("Total compiled files %d", len(compiled_files))
if args.old_cve_report:
with open(args.old_cve_report, encoding='ISO-8859-1') as f:
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 08/15] freetype: Fix CVE-2026-23865
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (6 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 07/15] improve_kernel_cve_report: add option to read debugsources.zstd Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 09/15] go: Fix CVE-2025-61726.patch variable ordering Yoann Congal
` (6 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Reference: https://nvd.nist.gov/vuln/detail/CVE-2026-23865
https://security-tracker.debian.org/tracker/CVE-2026-23865
Picked patch mentioned in NVD
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../freetype/freetype/CVE-2026-23865.patch | 54 +++++++++++++++++++
.../freetype/freetype_2.13.2.bb | 1 +
2 files changed, 55 insertions(+)
create mode 100644 meta/recipes-graphics/freetype/freetype/CVE-2026-23865.patch
diff --git a/meta/recipes-graphics/freetype/freetype/CVE-2026-23865.patch b/meta/recipes-graphics/freetype/freetype/CVE-2026-23865.patch
new file mode 100644
index 00000000000..aa0d4326f83
--- /dev/null
+++ b/meta/recipes-graphics/freetype/freetype/CVE-2026-23865.patch
@@ -0,0 +1,54 @@
+From fc85a255849229c024c8e65f536fe1875d84841c Mon Sep 17 00:00:00 2001
+From: Werner Lemberg <wl@gnu.org>
+Date: Sat, 3 Jan 2026 08:07:57 +0100
+Subject: [PATCH] [ttgxvar] Check for overflow in array size computation.
+
+Problem reported and analyzed by povcfe <povcfe2sec@gmail.com>.
+
+Fixes issue #1382.
+
+* src/truetype/ttgxvar.c (tt_var_load_item_variation_store): Do it.
+
+Upstream-Status: Backport [https://gitlab.com/freetype/freetype/-/commit/fc85a255849229c024c8e65f536fe1875d84841c]
+CVE: CVE-2026-23865
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ src/truetype/ttgxvar.c | 15 ++++++++++++++-
+ 1 file changed, 14 insertions(+), 1 deletion(-)
+
+diff --git a/src/truetype/ttgxvar.c b/src/truetype/ttgxvar.c
+index 2ff40c9e8..96ddc04c8 100644
+--- a/src/truetype/ttgxvar.c
++++ b/src/truetype/ttgxvar.c
+@@ -628,6 +628,7 @@
+ FT_UShort word_delta_count;
+ FT_UInt region_idx_count;
+ FT_UInt per_region_size;
++ FT_UInt delta_set_size;
+
+
+ if ( FT_STREAM_SEEK( offset + dataOffsetArray[i] ) )
+@@ -697,7 +698,19 @@
+ if ( long_words )
+ per_region_size *= 2;
+
+- if ( FT_NEW_ARRAY( varData->deltaSet, per_region_size * item_count ) )
++ /* Check for overflow (we actually test whether the */
++ /* multiplication of two unsigned values wraps around). */
++ delta_set_size = per_region_size * item_count;
++ if ( per_region_size &&
++ delta_set_size / per_region_size != item_count )
++ {
++ FT_TRACE2(( "tt_var_load_item_variation_store:"
++ " bad delta set array size\n" ));
++ error = FT_THROW( Array_Too_Large );
++ goto Exit;
++ }
++
++ if ( FT_NEW_ARRAY( varData->deltaSet, delta_set_size ) )
+ goto Exit;
+ if ( FT_Stream_Read( stream,
+ varData->deltaSet,
+--
+GitLab
+
diff --git a/meta/recipes-graphics/freetype/freetype_2.13.2.bb b/meta/recipes-graphics/freetype/freetype_2.13.2.bb
index ce7a615a3c8..e053fef3b51 100644
--- a/meta/recipes-graphics/freetype/freetype_2.13.2.bb
+++ b/meta/recipes-graphics/freetype/freetype_2.13.2.bb
@@ -15,6 +15,7 @@ LIC_FILES_CHKSUM = "file://LICENSE.TXT;md5=843b6efc16f6b1652ec97f89d5a516c0 \
SRC_URI = "${SAVANNAH_NONGNU_MIRROR}/${BPN}/${BP}.tar.xz \
file://CVE-2025-27363.patch \
+ file://CVE-2026-23865.patch \
"
SRC_URI[sha256sum] = "12991c4e55c506dd7f9b765933e62fd2be2e06d421505d7950a132e4f1bb484d"
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 09/15] go: Fix CVE-2025-61726.patch variable ordering
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (7 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 08/15] freetype: Fix CVE-2026-23865 Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 10/15] python3-pip: Fix CVE-2026-1703 Yoann Congal
` (5 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Eduardo Ferreira <eduardo.barbosa@toradex.com>
Commit 6a1ae4e792 (go 1.22.12: Fix CVE-2025-61726, 2026-02-11)
introduced a patch backporting a fix for CVE-2025-61726, but
this patch also introduced a bug.
From Go's source code[1], they say that the 'All' table from 'godebugs'
should be populated alphabetically by Name. And 'Lookup'[2] function uses
binary search to try and find the variable.
Here's the trace:
Mar 06 11:33:33 toradex-smarc-imx95-12594035 systemd[1]: Started Docker Application Container Engine.
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: 2026/03/06 11:34:53 http: panic serving @: godebug: Value of name not listed in godeb
ugs.All: urlmaxqueryparams
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: goroutine 78 [running]:
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: net/http.(*conn).serve.func1()
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: net/http/server.go:1903 +0xb0
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: panic({0x55743e8740?, 0x4000b526c0?})
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: runtime/panic.go:770 +0x124
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: go.opentelemetry.io/otel/sdk/trace.(*recordingSpan).End.deferwrap1()
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: go.opentelemetry.io/otel/sdk@v1.19.0/trace/span.go:383 +0x2c
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: go.opentelemetry.io/otel/sdk/trace.(*recordingSpan).End(0x40011b4a80, {0x0, 0x0, 0x40
006441c0?})
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: go.opentelemetry.io/otel/sdk@v1.19.0/trace/span.go:421 +0x898
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: panic({0x55743e8740?, 0x4000b526c0?})
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: runtime/panic.go:770 +0x124
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: internal/godebug.(*Setting).Value.func1()
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: internal/godebug/godebug.go:141 +0xd8
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: sync.(*Once).doSlow(0x22?, 0x55748a9b60?)
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: sync/once.go:74 +0x100
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: sync.(*Once).Do(...)
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: sync/once.go:65
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: internal/godebug.(*Setting).Value(0x5575b21be0)
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: internal/godebug/godebug.go:138 +0x50
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: net/url.urlParamsWithinMax(0x1)
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: net/url/url.go:968 +0x3c
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: net/url.parseQuery(0x400069a630, {0x0, 0x0})
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: net/url/url.go:985 +0xdc
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: net/url.ParseQuery(...)
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: net/url/url.go:958
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: net/http.(*Request).ParseForm(0x4000bdab40)
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: net/http/request.go:1317 +0x33c
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: github.com/docker/docker/api/server/httputils.ParseForm(0x0?)
Mar 06 11:34:53 toradex-smarc-imx95-12594035 dockerd[839]: github.com/docker/docker/api/server/httputils/httputils.go:104 +0x20
The 'Lookup' function was failing due to the wrong ordering and returning 'nil',
which was not being checked properly and caused this issue.
The fix was to just reorder the line where 'urlmaxqueryparams' is being
added to respect the alphabetical ordering. And for that the whole CVE
patch was generated again.
This change was validated with docker-moby (original issue), where a container
run successfully and no traces in the logs.
[1] https://github.com/golang/go/blob/master/src/internal/godebugs/table.go#L20
[2] https://github.com/golang/go/blob/master/src/internal/godebugs/table.go#L100
Signed-off-by: Eduardo Ferreira <eduardo.barbosa@toradex.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../go/go/CVE-2025-61726.patch | 21 ++++++++++---------
1 file changed, 11 insertions(+), 10 deletions(-)
diff --git a/meta/recipes-devtools/go/go/CVE-2025-61726.patch b/meta/recipes-devtools/go/go/CVE-2025-61726.patch
index ab053ff55c9..bdd10bc9331 100644
--- a/meta/recipes-devtools/go/go/CVE-2025-61726.patch
+++ b/meta/recipes-devtools/go/go/CVE-2025-61726.patch
@@ -1,4 +1,4 @@
-From 85050ca6146f3edb50ded0a352ab9edbd635effc Mon Sep 17 00:00:00 2001
+From bf06767a9ac737387eee77c7eedd67c65e853ac2 Mon Sep 17 00:00:00 2001
From: Damien Neil <dneil@google.com>
Date: Mon, 3 Nov 2025 14:28:47 -0800
Subject: [PATCH] [release-branch.go1.24] net/url: add urlmaxqueryparams
@@ -36,6 +36,7 @@ Reviewed-by: Junyang Shao <shaojunyang@google.com>
TryBot-Bypass: Michael Pratt <mpratt@google.com>
(cherry picked from commit 85c794ddce26a092b0ea68d0fca79028b5069d5a)
Signed-off-by: Deepak Rathore <deeratho@cisco.com>
+Signed-off-by: Eduardo Ferreira <eduardo.barbosa@toradex.com>
---
doc/godebug.md | 7 +++++
src/internal/godebugs/table.go | 1 +
@@ -45,7 +46,7 @@ Signed-off-by: Deepak Rathore <deeratho@cisco.com>
5 files changed, 85 insertions(+)
diff --git a/doc/godebug.md b/doc/godebug.md
-index ae4f0576b4..635597ea42 100644
+index ae4f057..635597e 100644
--- a/doc/godebug.md
+++ b/doc/godebug.md
@@ -126,6 +126,13 @@ for example,
@@ -63,19 +64,19 @@ index ae4f0576b4..635597ea42 100644
to concerns around VCS injection attacks. This behavior can be renabled with the
setting `allowmultiplevcs=1`.
diff --git a/src/internal/godebugs/table.go b/src/internal/godebugs/table.go
-index 33dcd81fc3..4ae043053c 100644
+index 33dcd81..7178df6 100644
--- a/src/internal/godebugs/table.go
+++ b/src/internal/godebugs/table.go
-@@ -52,6 +52,7 @@ var All = []Info{
+@@ -51,6 +51,7 @@ var All = []Info{
+ {Name: "tlsmaxrsasize", Package: "crypto/tls"},
{Name: "tlsrsakex", Package: "crypto/tls", Changed: 22, Old: "1"},
{Name: "tlsunsafeekm", Package: "crypto/tls", Changed: 22, Old: "1"},
- {Name: "x509sha1", Package: "crypto/x509"},
+ {Name: "urlmaxqueryparams", Package: "net/url", Changed: 24, Old: "0"},
+ {Name: "x509sha1", Package: "crypto/x509"},
{Name: "x509usefallbackroots", Package: "crypto/x509"},
{Name: "x509usepolicies", Package: "crypto/x509"},
- {Name: "zipinsecurepath", Package: "archive/zip"},
diff --git a/src/net/url/url.go b/src/net/url/url.go
-index d2ae03232f..5219e3c130 100644
+index d2ae032..cdca468 100644
--- a/src/net/url/url.go
+++ b/src/net/url/url.go
@@ -13,6 +13,7 @@ package url
@@ -118,7 +119,7 @@ index d2ae03232f..5219e3c130 100644
var key string
key, query, _ = strings.Cut(query, "&")
diff --git a/src/net/url/url_test.go b/src/net/url/url_test.go
-index fef236e40a..b2f8bd95fc 100644
+index fef236e..b2f8bd9 100644
--- a/src/net/url/url_test.go
+++ b/src/net/url/url_test.go
@@ -1488,6 +1488,54 @@ func TestParseQuery(t *testing.T) {
@@ -177,7 +178,7 @@ index fef236e40a..b2f8bd95fc 100644
url *URL
out string
diff --git a/src/runtime/metrics/doc.go b/src/runtime/metrics/doc.go
-index 517ec0e0a4..335f7873b3 100644
+index 517ec0e..88d6d8c 100644
--- a/src/runtime/metrics/doc.go
+++ b/src/runtime/metrics/doc.go
@@ -328,6 +328,11 @@ Below is the full list of supported metrics, ordered lexicographically.
@@ -193,4 +194,4 @@ index 517ec0e0a4..335f7873b3 100644
The number of non-default behaviors executed by the crypto/x509
package due to a non-default GODEBUG=x509sha1=... setting.
--
-2.35.6
+2.34.1
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 10/15] python3-pip: Fix CVE-2026-1703
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (8 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 09/15] go: Fix CVE-2025-61726.patch variable ordering Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 11/15] oe-setup-build: Fix typo Yoann Congal
` (4 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Pick patch according to [1]
[1] https://security-tracker.debian.org/tracker/CVE-2026-1703
[2] https://nvd.nist.gov/vuln/detail/CVE-2026-1703
[3] https://github.com/pypa/pip/pull/13777
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../python/python3-pip/CVE-2026-1703.patch | 37 +++++++++++++++++++
.../python/python3-pip_24.0.bb | 4 +-
2 files changed, 40 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-devtools/python/python3-pip/CVE-2026-1703.patch
diff --git a/meta/recipes-devtools/python/python3-pip/CVE-2026-1703.patch b/meta/recipes-devtools/python/python3-pip/CVE-2026-1703.patch
new file mode 100644
index 00000000000..1470b7c541f
--- /dev/null
+++ b/meta/recipes-devtools/python/python3-pip/CVE-2026-1703.patch
@@ -0,0 +1,37 @@
+From 4c651b70d60ed91b13663bcda9b3ed41748d0124 Mon Sep 17 00:00:00 2001
+From: Seth Michael Larson <seth@python.org>
+Date: Fri, 30 Jan 2026 09:49:11 -0600
+Subject: [PATCH] Use os.path.commonpath() instead of commonprefix()
+
+Upstream-Status: Backport [https://github.com/pypa/pip/commit/4c651b70d60ed91b13663bcda9b3ed41748d0124]
+CVE: CVE-2026-1703
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ news/+1ee322a1.bugfix.rst | 1 +
+ src/pip/_internal/utils/unpacking.py | 2 +-
+ 2 files changed, 2 insertions(+), 1 deletion(-)
+ create mode 100644 news/+1ee322a1.bugfix.rst
+
+diff --git a/news/+1ee322a1.bugfix.rst b/news/+1ee322a1.bugfix.rst
+new file mode 100644
+index 0000000..edb1b32
+--- /dev/null
++++ b/news/+1ee322a1.bugfix.rst
+@@ -0,0 +1 @@
++Use a path-segment prefix comparison, not char-by-char.
+diff --git a/src/pip/_internal/utils/unpacking.py b/src/pip/_internal/utils/unpacking.py
+index 78b5c13..0b26525 100644
+--- a/src/pip/_internal/utils/unpacking.py
++++ b/src/pip/_internal/utils/unpacking.py
+@@ -81,7 +81,7 @@ def is_within_directory(directory: str, target: str) -> bool:
+ abs_directory = os.path.abspath(directory)
+ abs_target = os.path.abspath(target)
+
+- prefix = os.path.commonprefix([abs_directory, abs_target])
++ prefix = os.path.commonpath([abs_directory, abs_target])
+ return prefix == abs_directory
+
+
+--
+2.43.0
+
diff --git a/meta/recipes-devtools/python/python3-pip_24.0.bb b/meta/recipes-devtools/python/python3-pip_24.0.bb
index be4a29500a5..12a5e1cc3cf 100644
--- a/meta/recipes-devtools/python/python3-pip_24.0.bb
+++ b/meta/recipes-devtools/python/python3-pip_24.0.bb
@@ -31,7 +31,9 @@ LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=63ec52baf95163b597008bb46db68030 \
inherit pypi python_setuptools_build_meta
-SRC_URI += "file://no_shebang_mangling.patch"
+SRC_URI += "file://no_shebang_mangling.patch \
+ file://CVE-2026-1703.patch \
+ "
SRC_URI[sha256sum] = "ea9bd1a847e8c5774a5777bb398c19e80bcd4e2aa16a4b301b718fe6f593aba2"
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 11/15] oe-setup-build: Fix typo
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (9 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 10/15] python3-pip: Fix CVE-2026-1703 Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 12/15] systemd-systemctl: Fix instance name parsing with escapes or periods Yoann Congal
` (3 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Ryan Eatmon <reatmon@ti.com>
A variable was mistyped in an error message resulting in this error:
NameError: name 'tempalte_name' is not defined. Did you mean: 'template_name'?
Signed-off-by: Ryan Eatmon <reatmon@ti.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 275a3c015d37729c3b0c9cc4395d50ea2f210f02)
Signed-off-by: Clayton Casciato <majortomtosourcecontrol@gmail.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
scripts/oe-setup-build | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/scripts/oe-setup-build b/scripts/oe-setup-build
index c0476992a2a..1cb06b3b793 100755
--- a/scripts/oe-setup-build
+++ b/scripts/oe-setup-build
@@ -77,7 +77,7 @@ def find_template(template_name, templates):
for t in templates:
if t["templatename"] == template_name:
return t
- print("Configuration {} is not one of {}, please try again.".format(tempalte_name, [t["templatename"] for t in templates]))
+ print("Configuration {} is not one of {}, please try again.".format(template_name, [t["templatename"] for t in templates]))
return None
def setup_build_env(args):
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 12/15] systemd-systemctl: Fix instance name parsing with escapes or periods
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (10 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 11/15] oe-setup-build: Fix typo Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 13/15] inetutils: Fix CVE-2026-32746 Yoann Congal
` (2 subsequent siblings)
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Trent Piepho <trent.piepho@igorinstitute.com>
Fixes [YOCTO #16130]
When extracting the instance name from a template instances such as
'example@host.domain.com.service', the systemctl replacement script will
split the instance on the first period, producing an instance argument of
'host' and a template of 'example@.domain.com.service'. This is incorrect,
as systemd will split on the last period, producing an instance argument of
'host.domain.com' and a template of 'example@.service'.
When constructing the template name, the script will also pass the string
as is to re.sub(), which will try to process any backslash escapes in the
string. These are legal in systemd unit names and should be preserved.
They also are not valid Python escape sequences. Use re.escape() to
preserve anything in the unit name that might be considered a regex
exscape.
Signed-off-by: Trent Piepho <trent.piepho@igorinstitute.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-core/systemd/systemd-systemctl/systemctl | 7 ++++---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/meta/recipes-core/systemd/systemd-systemctl/systemctl b/meta/recipes-core/systemd/systemd-systemctl/systemctl
index 2229bc7b6d2..b9e04a90707 100755
--- a/meta/recipes-core/systemd/systemd-systemctl/systemctl
+++ b/meta/recipes-core/systemd/systemd-systemctl/systemctl
@@ -202,7 +202,8 @@ class SystemdUnit():
try:
for dependent in config.get('Install', prop):
# expand any %i to instance (ignoring escape sequence %%)
- dependent = re.sub("([^%](%%)*)%i", "\\g<1>{}".format(instance), dependent)
+ if instance is not None:
+ dependent = re.sub("([^%](%%)*)%i", "\\g<1>{}".format(re.escape(instance)), dependent)
wants = systemdir / "{}.{}".format(dependent, dirstem) / service
add_link(wants, target)
@@ -212,13 +213,13 @@ class SystemdUnit():
def enable(self, units_enabled=[]):
# if we're enabling an instance, first extract the actual instance
# then figure out what the template unit is
- template = re.match(r"[^@]+@(?P<instance>[^\.]*)\.", self.unit)
+ template = re.match(r"[^@]+@(?P<instance>.*)\.", self.unit)
instance_unit_name = None
if template:
instance = template.group('instance')
if instance != "":
instance_unit_name = self.unit
- unit = re.sub(r"@[^\.]*\.", "@.", self.unit, 1)
+ unit = re.sub(r"@{}\.".format(re.escape(instance)), "@.", self.unit, 1)
else:
instance = None
unit = self.unit
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 13/15] inetutils: Fix CVE-2026-32746
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (11 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 12/15] systemd-systemctl: Fix instance name parsing with escapes or periods Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 14/15] python3-setuptools: drop Windows launcher executables on non-mingw builds Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 15/15] python3-pip: drop unused Windows distlib launcher templates Yoann Congal
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Pick patch according to [1]
[1] https://security-tracker.debian.org/tracker/CVE-2026-32746
[2] https://lists.gnu.org/archive/html/bug-inetutils/2026-03/msg00031.html
[3] https://codeberg.org/inetutils/inetutils/pulls/17/files
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../inetutils/inetutils/CVE-2026-32746.patch | 40 +++++++++++++++++++
.../inetutils/inetutils_2.5.bb | 1 +
2 files changed, 41 insertions(+)
create mode 100644 meta/recipes-connectivity/inetutils/inetutils/CVE-2026-32746.patch
diff --git a/meta/recipes-connectivity/inetutils/inetutils/CVE-2026-32746.patch b/meta/recipes-connectivity/inetutils/inetutils/CVE-2026-32746.patch
new file mode 100644
index 00000000000..0e55f3f0a4e
--- /dev/null
+++ b/meta/recipes-connectivity/inetutils/inetutils/CVE-2026-32746.patch
@@ -0,0 +1,40 @@
+From 6864598a29b652a6b69a958f5cd1318aa2b258af Mon Sep 17 00:00:00 2001
+From: Collin Funk <collin.funk1@gmail.com>
+Date: Wed, 11 Mar 2026 23:06:46 -0700
+Subject: [PATCH] telnetd: fix stack buffer overflow processing SLC suboption triplets
+
+Previously a client could write past the end of an internal buffer using
+an SLC suboption with many triplets using function octets greater than
+18, possibly leading to remote code execution. Reported by Adiel Sol,
+Arad Inbar, Erez Cohen, Nir Somech, Ben Grinberg, Daniel Lubel at DREAM
+Security Research Team at:
+<https://lists.gnu.org/r/bug-inetutils/2026-03/msg00031.html>.
+
+* telnetd/slc.c (add_slc): Return early if writing the tuple would lead
+us to writing past the end of the buffer.
+* NEWS.md: Mention the fix.
+
+Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/inetutils.git/commit/?id=6864598a29b652a6b69a958f5cd1318aa2b258af]
+CVE: CVE-2026-32746
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ telnetd/slc.c | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/telnetd/slc.c b/telnetd/slc.c
+index b3cc117..9d6bad1 100644
+--- a/telnetd/slc.c
++++ b/telnetd/slc.c
+@@ -162,6 +162,9 @@ get_slc_defaults (void)
+ void
+ add_slc (register char func, register char flag, register cc_t val)
+ {
++ /* Do nothing if the entire triplet cannot fit in the buffer. */
++ if (slcbuf + sizeof slcbuf - slcptr <= 6)
++ return;
+
+ if ((*slcptr++ = (unsigned char) func) == 0xff)
+ *slcptr++ = 0xff;
+--
+2.43.0
+
diff --git a/meta/recipes-connectivity/inetutils/inetutils_2.5.bb b/meta/recipes-connectivity/inetutils/inetutils_2.5.bb
index 6c53902356f..29ff62379d3 100644
--- a/meta/recipes-connectivity/inetutils/inetutils_2.5.bb
+++ b/meta/recipes-connectivity/inetutils/inetutils_2.5.bb
@@ -21,6 +21,7 @@ SRC_URI = "${GNU_MIRROR}/inetutils/inetutils-${PV}.tar.xz \
file://CVE-2026-24061-1.patch \
file://CVE-2026-24061-2.patch \
file://CVE-2026-28372.patch \
+ file://CVE-2026-32746.patch \
"
inherit autotools gettext update-alternatives texinfo
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 14/15] python3-setuptools: drop Windows launcher executables on non-mingw builds
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (12 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 13/15] inetutils: Fix CVE-2026-32746 Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 15/15] python3-pip: drop unused Windows distlib launcher templates Yoann Congal
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Krupal Ka Patel <krkapate@cisco.com>
setuptools installs Windows launcher executables (cli*.exe, gui*.exe)
into site-packages. These binaries are only used on Windows platforms
but are packaged for target, native, and nativesdk builds.
Remove the Windows launcher executables when not building for a mingw
(mingw32/mingw64) host to avoid shipping unused Windows binaries.
Signed-off-by: Krupal Ka Patel <krkapate@cisco.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit cf7c79f3962f2be99cfda47e8cc730091e6a18cb)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../recipes-devtools/python/python3-setuptools_69.1.1.bb | 9 +++++++++
1 file changed, 9 insertions(+)
diff --git a/meta/recipes-devtools/python/python3-setuptools_69.1.1.bb b/meta/recipes-devtools/python/python3-setuptools_69.1.1.bb
index 46b2f0ab008..00f83056dbf 100644
--- a/meta/recipes-devtools/python/python3-setuptools_69.1.1.bb
+++ b/meta/recipes-devtools/python/python3-setuptools_69.1.1.bb
@@ -19,6 +19,15 @@ SRC_URI += " \
SRC_URI[sha256sum] = "5c0806c7d9af348e6dd3777b4f4dbb42c7ad85b190104837488eab9a7c945cf8"
+do_install:append() {
+ # setuptools ships Windows launcher executables (cli*.exe, gui*.exe).
+ # Keep them only when building for a Windows (mingw) host.
+ case "${HOST_OS}" in
+ mingw32|mingw64) ;;
+ *) rm -f ${D}${PYTHON_SITEPACKAGES_DIR}/setuptools/*.exe ;;
+ esac
+}
+
DEPENDS += "python3"
RDEPENDS:${PN} = "\
^ permalink raw reply related [flat|nested] 23+ messages in thread
* [OE-core][scarthgap 15/15] python3-pip: drop unused Windows distlib launcher templates
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
` (13 preceding siblings ...)
2026-03-20 0:28 ` [OE-core][scarthgap 14/15] python3-setuptools: drop Windows launcher executables on non-mingw builds Yoann Congal
@ 2026-03-20 0:28 ` Yoann Congal
14 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 0:28 UTC (permalink / raw)
To: openembedded-core
From: Krupal Ka Patel <krkapate@cisco.com>
pip vendors distlib which ships Windows launcher template binaries
(*.exe) under pip/_vendor/distlib. These files are only used on
Windows systems but are installed and packaged for target, native,
and nativesdk builds.
Remove the distlib *.exe templates when not building for a mingw
(mingw32/mingw64) host to avoid shipping unused Windows binaries and
reduce package noise.
Signed-off-by: Krupal Ka Patel <krkapate@cisco.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 90d208fbb06b6e6b5aaddb0048fd6e2e1d46c8bd)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-devtools/python/python3-pip_24.0.bb | 9 +++++++++
1 file changed, 9 insertions(+)
diff --git a/meta/recipes-devtools/python/python3-pip_24.0.bb b/meta/recipes-devtools/python/python3-pip_24.0.bb
index 12a5e1cc3cf..cf123a5d230 100644
--- a/meta/recipes-devtools/python/python3-pip_24.0.bb
+++ b/meta/recipes-devtools/python/python3-pip_24.0.bb
@@ -41,6 +41,15 @@ do_install:append() {
rm -f ${D}/${bindir}/pip
}
+do_install:append(){
+ # pip vendors distlib which ships Windows launcher templates (*.exe).
+ # Keep them only when building for a Windows (mingw) host.
+ case "${HOST_OS}" in
+ mingw32|mingw64) ;;
+ *) rm -f ${D}${PYTHON_SITEPACKAGES_DIR}/pip/_vendor/distlib/*.exe ;;
+ esac
+}
+
RDEPENDS:${PN} = "\
python3-compile \
python3-io \
^ permalink raw reply related [flat|nested] 23+ messages in thread
* Re: [OE-core][scarthgap 01/15] inetutils: patch CVE-2026-28372
2026-03-20 0:28 ` [OE-core][scarthgap 01/15] inetutils: patch CVE-2026-28372 Yoann Congal
@ 2026-03-20 8:44 ` Paul Barker
2026-03-20 10:13 ` Yoann Congal
0 siblings, 1 reply; 23+ messages in thread
From: Paul Barker @ 2026-03-20 8:44 UTC (permalink / raw)
To: yoann.congal, openembedded-core
[-- Attachment #1: Type: text/plain, Size: 460 bytes --]
On Fri, 2026-03-20 at 01:28 +0100, Yoann Congal via
lists.openembedded.org wrote:
> From: Peter Marko <peter.marko@siemens.com>
>
> Pick patch according to [1] (equivalent to patch from [2]).
>
> This CVE is needed if util-linux >= 2.40 is used which is not the case
> in Yocto kirkstone, however it's always possible that users update
> packages in their layers.
s/kirkstone/scarthgap/
Otherwise, LGTM.
Best regards,
--
Paul Barker
[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 252 bytes --]
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [OE-core][scarthgap 01/15] inetutils: patch CVE-2026-28372
2026-03-20 8:44 ` Paul Barker
@ 2026-03-20 10:13 ` Yoann Congal
0 siblings, 0 replies; 23+ messages in thread
From: Yoann Congal @ 2026-03-20 10:13 UTC (permalink / raw)
To: Paul Barker, openembedded-core
On Fri Mar 20, 2026 at 9:44 AM CET, Paul Barker wrote:
> On Fri, 2026-03-20 at 01:28 +0100, Yoann Congal via
> lists.openembedded.org wrote:
>> From: Peter Marko <peter.marko@siemens.com>
>>
>> Pick patch according to [1] (equivalent to patch from [2]).
>>
>> This CVE is needed if util-linux >= 2.40 is used which is not the case
>> in Yocto kirkstone, however it's always possible that users update
>> packages in their layers.
>
> s/kirkstone/scarthgap/
I updated my -nut branch and created a temporary
"stable/scarthgap-nut-review-2026W12" at its previous position to keep
the commits around during review.
Thanks!
>
> Otherwise, LGTM.
>
> Best regards,
--
Yoann Congal
Smile ECS
^ permalink raw reply [flat|nested] 23+ messages in thread
end of thread, other threads:[~2026-03-20 10:13 UTC | newest]
Thread overview: 23+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-03-20 0:28 [OE-core][scarthgap 00/15] Patch review Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 01/15] inetutils: patch CVE-2026-28372 Yoann Congal
2026-03-20 8:44 ` Paul Barker
2026-03-20 10:13 ` Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 02/15] wireless-regdb: upgrade 2025.10.07 -> 2026.02.04 Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 03/15] lsb.py: strip ' from os-release file Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 04/15] tiff: ignore CVE-2025-61143, CVE-2025-61144 and CVE-2025-61145 Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 05/15] improve_kernel_cve_report: do not override backported-patch Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 06/15] improve_kernel_cve_report: do not use custom version Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 07/15] improve_kernel_cve_report: add option to read debugsources.zstd Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 08/15] freetype: Fix CVE-2026-23865 Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 09/15] go: Fix CVE-2025-61726.patch variable ordering Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 10/15] python3-pip: Fix CVE-2026-1703 Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 11/15] oe-setup-build: Fix typo Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 12/15] systemd-systemctl: Fix instance name parsing with escapes or periods Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 13/15] inetutils: Fix CVE-2026-32746 Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 14/15] python3-setuptools: drop Windows launcher executables on non-mingw builds Yoann Congal
2026-03-20 0:28 ` [OE-core][scarthgap 15/15] python3-pip: drop unused Windows distlib launcher templates Yoann Congal
-- strict thread matches above, loose matches on Subject: below --
2025-04-30 2:59 [OE-core][scarthgap 00/15] Patch review Steve Sakoman
2025-01-13 20:46 Steve Sakoman
2025-01-13 22:32 ` [scarthgap " Adrian Freihofer
2025-01-14 15:56 ` [OE-core] " Steve Sakoman
2025-01-14 16:31 ` Adrian Freihofer
2024-12-04 20:36 [OE-core][scarthgap " Steve Sakoman
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox