* [OE-core][kirkstone 00/18] Patch review
@ 2022-10-04 15:50 Steve Sakoman
0 siblings, 0 replies; 26+ messages in thread
From: Steve Sakoman @ 2022-10-04 15:50 UTC (permalink / raw)
To: openembedded-core
Please review this set of patches for kirkstone and have comments back by
end of day Wednesday.
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/4294
The following changes since commit d19cd09b43a7009d660b28ac9dcb21b8038e399f:
busybox: add devmem 128-bit support (2022-09-24 04:03:56 -1000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Alexander Kanavin (2):
rpm: update 4.17.0 -> 4.17.1
tzdata: update to 2022d
Daniel McGregor (1):
coreutils: add openssl PACKAGECONFIG
Denys Dmytriyenko (1):
glibc-locale: explicitly remove empty dirs in ${libdir}
Florin Diaconescu (2):
rsync: update 3.2.3 -> 3.2.4
rsync: update 3.2.4 -> 3.2.5
He Zhe (3):
lttng-tools: Disable on qemuriscv32
stress-cpu: disable float128 math on powerpc64 to avoid SIGILL
lttng-tools: Disable on riscv32
Khem Raj (3):
webkitgtk: Upgrade to 2.36.6 minor update
webkitgtk: Update to 2.36.7
rpm: Remove -Wimplicit-function-declaration warnings
Martin Jansa (1):
create-pull-request: don't switch the git remote protocol to git://
Richard Purdie (2):
vim: Upgrade 9.0.0541 -> 9.0.0598
go: Fix reproducibility failures
Teoh Jay Shen (1):
bind: upgrade 9.18.6 -> 9.18.7
pgowda (1):
binutils : Fix CVE-2022-38127
wangmy (1):
bind: upgrade 9.18.5 -> 9.18.6
...1-avoid-start-failure-with-bind-user.patch | 0
...d-V-and-start-log-hide-build-options.patch | 0
...ching-for-json-headers-searches-sysr.patch | 0
.../bind/{bind-9.18.5 => bind-9.18.7}/bind9 | 0
.../{bind-9.18.5 => bind-9.18.7}/conf.patch | 0
.../generate-rndc-key.sh | 0
...t.d-add-support-for-read-only-rootfs.patch | 0
.../make-etc-initd-bind-stop-work.patch | 0
.../named.service | 0
.../bind/{bind_9.18.5.bb => bind_9.18.7.bb} | 2 +-
meta/recipes-core/coreutils/coreutils_9.0.bb | 1 +
meta/recipes-core/glibc/glibc-locale.inc | 5 +-
.../binutils/binutils-2.38.inc | 4 +
.../binutils/0017-CVE-2022-38127-1.patch | 1224 +++++++++++++++++
.../binutils/0017-CVE-2022-38127-2.patch | 188 +++
.../binutils/0017-CVE-2022-38127-3.patch | 211 +++
.../binutils/0017-CVE-2022-38127-4.patch | 43 +
meta/recipes-devtools/go/go-runtime.inc | 2 +
.../rpm/files/0001-CVE-2021-3521.patch | 57 -
...lib-rpm-as-the-installation-path-for.patch | 14 +-
...lling-execute-package-scriptlets-wit.patch | 18 +-
...-linux-gnux32-variant-to-triplet-han.patch | 31 +
.../rpm/files/0002-CVE-2021-3521.patch | 64 -
.../rpm/files/0003-CVE-2021-3521.patch | 329 -----
.../rpm/{rpm_4.17.0.bb => rpm_4.17.1.bb} | 6 +-
...-the-hostname-in-the-certificate-whe.patch | 31 -
.../rsync/files/makefile-no-rebuild.patch | 12 +-
.../rsync/{rsync_3.2.3.bb => rsync_3.2.5.bb} | 17 +-
...le-float128-math-on-powerpc64-to-avo.patch | 43 +
.../stress-ng/stress-ng_0.13.12.bb | 4 +-
meta/recipes-extended/timezone/timezone.inc | 6 +-
meta/recipes-kernel/lttng/lttng-platforms.inc | 4 +
...ebkitgtk_2.36.5.bb => webkitgtk_2.36.7.bb} | 3 +-
meta/recipes-support/vim/vim.inc | 4 +-
scripts/create-pull-request | 2 +-
35 files changed, 1803 insertions(+), 522 deletions(-)
rename meta/recipes-connectivity/bind/{bind-9.18.5 => bind-9.18.7}/0001-avoid-start-failure-with-bind-user.patch (100%)
rename meta/recipes-connectivity/bind/{bind-9.18.5 => bind-9.18.7}/0001-named-lwresd-V-and-start-log-hide-build-options.patch (100%)
rename meta/recipes-connectivity/bind/{bind-9.18.5 => bind-9.18.7}/bind-ensure-searching-for-json-headers-searches-sysr.patch (100%)
rename meta/recipes-connectivity/bind/{bind-9.18.5 => bind-9.18.7}/bind9 (100%)
rename meta/recipes-connectivity/bind/{bind-9.18.5 => bind-9.18.7}/conf.patch (100%)
rename meta/recipes-connectivity/bind/{bind-9.18.5 => bind-9.18.7}/generate-rndc-key.sh (100%)
rename meta/recipes-connectivity/bind/{bind-9.18.5 => bind-9.18.7}/init.d-add-support-for-read-only-rootfs.patch (100%)
rename meta/recipes-connectivity/bind/{bind-9.18.5 => bind-9.18.7}/make-etc-initd-bind-stop-work.patch (100%)
rename meta/recipes-connectivity/bind/{bind-9.18.5 => bind-9.18.7}/named.service (100%)
rename meta/recipes-connectivity/bind/{bind_9.18.5.bb => bind_9.18.7.bb} (97%)
create mode 100644 meta/recipes-devtools/binutils/binutils/0017-CVE-2022-38127-1.patch
create mode 100644 meta/recipes-devtools/binutils/binutils/0017-CVE-2022-38127-2.patch
create mode 100644 meta/recipes-devtools/binutils/binutils/0017-CVE-2022-38127-3.patch
create mode 100644 meta/recipes-devtools/binutils/binutils/0017-CVE-2022-38127-4.patch
delete mode 100644 meta/recipes-devtools/rpm/files/0001-CVE-2021-3521.patch
create mode 100644 meta/recipes-devtools/rpm/files/0001-configure.ac-add-linux-gnux32-variant-to-triplet-han.patch
delete mode 100644 meta/recipes-devtools/rpm/files/0002-CVE-2021-3521.patch
delete mode 100644 meta/recipes-devtools/rpm/files/0003-CVE-2021-3521.patch
rename meta/recipes-devtools/rpm/{rpm_4.17.0.bb => rpm_4.17.1.bb} (97%)
delete mode 100644 meta/recipes-devtools/rsync/files/0001-rsync-ssl-Verify-the-hostname-in-the-certificate-whe.patch
rename meta/recipes-devtools/rsync/{rsync_3.2.3.bb => rsync_3.2.5.bb} (67%)
create mode 100644 meta/recipes-extended/stress-ng/stress-ng-0.13.12/0001-stress-cpu-disable-float128-math-on-powerpc64-to-avo.patch
rename meta/recipes-sato/webkit/{webkitgtk_2.36.5.bb => webkitgtk_2.36.7.bb} (98%)
--
2.25.1
^ permalink raw reply [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 00/18] Patch review
@ 2023-06-19 2:55 Steve Sakoman
2023-08-02 12:04 ` Marta Rybczynska
0 siblings, 1 reply; 26+ messages in thread
From: Steve Sakoman @ 2023-06-19 2:55 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Tuesday.
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/5481
The following changes since commit 6e0d694ea1eb5d478dc7508d181c3a820098ee5f:
uninative: Upgrade to 4.0 to include latest gcc 13.1.1 (2023-06-09 06:04:24 -1000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Andrew Jeffery (1):
Revert "ipk: Decode byte data to string in manifest handling"
Bruce Ashfield (5):
linux-yocto/5.15: update to v5.15.109
linux-yocto/5.15: update to v5.15.110
linux-yocto/5.15: update to v5.15.111
linux-yocto/5.15: update to v5.15.112
linux-yocto/5.15: update to v5.15.113
Chen Qi (1):
openssh: fix CVE-2023-28531
Deepthi Hemraj (1):
glibc: stable 2.35 branch updates
Ian Ray (1):
systemd-systemctl: support instance expansion in WantedBy
Jan Vermaete (1):
cve-update-nvd2-native: added the missing http import
Marta Rybczynska (1):
cve-update-nvd2-native: new CVE database fetcher
Qiu Tingting (1):
e2fsprogs: fix ptest bug for second running
Randy MacLeod (1):
vim: upgrade 9.0.1429 -> 9.0.1527
Sanjay Chitroda (1):
cups: Fix CVE-2023-32324
Yogita Urade (4):
webkitgtk: fix CVE-2022-46691
webkitgtk: fix CVE-2022-46699
webkitgtk: fix CVE-2022-42867
webkitgtk: fix CVE-2022-46700
meta/classes/cve-check.bbclass | 4 +-
meta/lib/oe/package_manager/ipk/manifest.py | 2 +-
...-destination-constraints-for-smartca.patch | 35 ++
.../openssh/openssh_8.9p1.bb | 1 +
meta/recipes-core/glibc/glibc-version.inc | 2 +-
.../glibc/glibc/CVE-2023-0687.patch | 82 -----
meta/recipes-core/glibc/glibc_2.35.bb | 1 -
.../meta/cve-update-nvd2-native.bb | 334 ++++++++++++++++++
.../systemd/systemd-systemctl/systemctl | 9 +-
.../e2fsprogs/e2fsprogs/run-ptest | 1 +
.../e2fsprogs/e2fsprogs_1.46.5.bb | 3 +
meta/recipes-extended/cups/cups.inc | 1 +
.../cups/cups/CVE-2023-32324.patch | 36 ++
.../linux/linux-yocto-rt_5.15.bb | 6 +-
.../linux/linux-yocto-tiny_5.15.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +-
.../webkit/webkitgtk/CVE-2022-42867.patch | 104 ++++++
.../webkit/webkitgtk/CVE-2022-46691.patch | 43 +++
.../webkit/webkitgtk/CVE-2022-46699.patch | 136 +++++++
.../webkit/webkitgtk/CVE-2022-46700.patch | 67 ++++
meta/recipes-sato/webkit/webkitgtk_2.36.8.bb | 4 +
meta/recipes-support/vim/vim.inc | 4 +-
22 files changed, 792 insertions(+), 115 deletions(-)
create mode 100644 meta/recipes-connectivity/openssh/openssh/0001-upstream-include-destination-constraints-for-smartca.patch
delete mode 100644 meta/recipes-core/glibc/glibc/CVE-2023-0687.patch
create mode 100644 meta/recipes-core/meta/cve-update-nvd2-native.bb
create mode 100644 meta/recipes-extended/cups/cups/CVE-2023-32324.patch
create mode 100644 meta/recipes-sato/webkit/webkitgtk/CVE-2022-42867.patch
create mode 100644 meta/recipes-sato/webkit/webkitgtk/CVE-2022-46691.patch
create mode 100644 meta/recipes-sato/webkit/webkitgtk/CVE-2022-46699.patch
create mode 100644 meta/recipes-sato/webkit/webkitgtk/CVE-2022-46700.patch
--
2.34.1
^ permalink raw reply [flat|nested] 26+ messages in thread
* Re: [OE-core][kirkstone 00/18] Patch review
2023-06-19 2:55 [OE-core][kirkstone 00/18] Patch review Steve Sakoman
@ 2023-08-02 12:04 ` Marta Rybczynska
0 siblings, 0 replies; 26+ messages in thread
From: Marta Rybczynska @ 2023-08-02 12:04 UTC (permalink / raw)
To: Steve Sakoman; +Cc: openembedded-core
[-- Attachment #1: Type: text/plain, Size: 3913 bytes --]
On Mon, Jun 19, 2023 at 4:55 AM Steve Sakoman <steve@sakoman.com> wrote:
> Please review this set of changes for kirkstone and have comments back by
> end of day Tuesday.
>
> Passed a-full on autobuilder:
>
> https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/5481
>
> The following changes since commit
> 6e0d694ea1eb5d478dc7508d181c3a820098ee5f:
>
> uninative: Upgrade to 4.0 to include latest gcc 13.1.1 (2023-06-09
> 06:04:24 -1000)
>
> are available in the Git repository at:
>
> https://git.openembedded.org/openembedded-core-contrib
> stable/kirkstone-nut
>
> http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
>
> Andrew Jeffery (1):
> Revert "ipk: Decode byte data to string in manifest handling"
>
> Bruce Ashfield (5):
> linux-yocto/5.15: update to v5.15.109
> linux-yocto/5.15: update to v5.15.110
> linux-yocto/5.15: update to v5.15.111
> linux-yocto/5.15: update to v5.15.112
> linux-yocto/5.15: update to v5.15.113
>
> Chen Qi (1):
> openssh: fix CVE-2023-28531
>
> Deepthi Hemraj (1):
> glibc: stable 2.35 branch updates
>
> Ian Ray (1):
> systemd-systemctl: support instance expansion in WantedBy
>
> Jan Vermaete (1):
> cve-update-nvd2-native: added the missing http import
>
> Marta Rybczynska (1):
> cve-update-nvd2-native: new CVE database fetcher
>
> Qiu Tingting (1):
> e2fsprogs: fix ptest bug for second running
>
> Randy MacLeod (1):
> vim: upgrade 9.0.1429 -> 9.0.1527
>
> Sanjay Chitroda (1):
> cups: Fix CVE-2023-32324
>
> Yogita Urade (4):
> webkitgtk: fix CVE-2022-46691
> webkitgtk: fix CVE-2022-46699
> webkitgtk: fix CVE-2022-42867
> webkitgtk: fix CVE-2022-46700
>
> meta/classes/cve-check.bbclass | 4 +-
> meta/lib/oe/package_manager/ipk/manifest.py | 2 +-
> ...-destination-constraints-for-smartca.patch | 35 ++
> .../openssh/openssh_8.9p1.bb | 1 +
> meta/recipes-core/glibc/glibc-version.inc | 2 +-
> .../glibc/glibc/CVE-2023-0687.patch | 82 -----
> meta/recipes-core/glibc/glibc_2.35.bb | 1 -
> .../meta/cve-update-nvd2-native.bb | 334 ++++++++++++++++++
> .../systemd/systemd-systemctl/systemctl | 9 +-
> .../e2fsprogs/e2fsprogs/run-ptest | 1 +
> .../e2fsprogs/e2fsprogs_1.46.5.bb | 3 +
> meta/recipes-extended/cups/cups.inc | 1 +
> .../cups/cups/CVE-2023-32324.patch | 36 ++
> .../linux/linux-yocto-rt_5.15.bb | 6 +-
> .../linux/linux-yocto-tiny_5.15.bb | 6 +-
> meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +-
> .../webkit/webkitgtk/CVE-2022-42867.patch | 104 ++++++
> .../webkit/webkitgtk/CVE-2022-46691.patch | 43 +++
> .../webkit/webkitgtk/CVE-2022-46699.patch | 136 +++++++
> .../webkit/webkitgtk/CVE-2022-46700.patch | 67 ++++
> meta/recipes-sato/webkit/webkitgtk_2.36.8.bb | 4 +
> meta/recipes-support/vim/vim.inc | 4 +-
> 22 files changed, 792 insertions(+), 115 deletions(-)
> create mode 100644
> meta/recipes-connectivity/openssh/openssh/0001-upstream-include-destination-constraints-for-smartca.patch
> delete mode 100644 meta/recipes-core/glibc/glibc/CVE-2023-0687.patch
> create mode 100644 meta/recipes-core/meta/cve-update-nvd2-native.bb
> create mode 100644 meta/recipes-extended/cups/cups/CVE-2023-32324.patch
> create mode 100644 meta/recipes-sato/webkit/webkitgtk/CVE-2022-42867.patch
> create mode 100644 meta/recipes-sato/webkit/webkitgtk/CVE-2022-46691.patch
> create mode 100644 meta/recipes-sato/webkit/webkitgtk/CVE-2022-46699.patch
> create mode 100644 meta/recipes-sato/webkit/webkitgtk/CVE-2022-46700.patch
>
>
>
Tested for the CVE fetcher backport to kirkstone, no unexpected issues seen.
Kind regards,
Marta
[-- Attachment #2: Type: text/html, Size: 5679 bytes --]
^ permalink raw reply [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 00/18] Patch review
@ 2026-04-06 6:26 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 01/18] linux-yocto/5.15: update to v5.15.200 Yoann Congal
` (17 more replies)
0 siblings, 18 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Wednesday, April 8.
Please note:
- This will be the last review cycle for kirkstone.
- If you expect a patch to get merged and it is not in this series ping
me as soon as possible.
- Some patches look OK to me and are included here but will only be
merged if some patches are sent/fixed in more recent branches:
- Pending a fix for the scarthgap branch:
- curl: patch CVE-2026-3784
- curl: patch CVE-2026-3783
- curl: patch CVE-2026-1965
- Pending an equivalement patch sent for whinlatter:
- vim: Fix CVE-2026-33412
- libarchive: Fix CVE-2026-4111
- Pending an equivalement patch sent for whinlatter and scarthgap
- python3: Fix CVE-2025-15282
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/3603
The following changes since commit c4194cadb1180da37514c55cd97827eb0269c8e2:
build-appliance-image: Update to kirkstone head revision (2026-03-20 09:58:53 +0000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
for you to fetch changes up to 38444a1a8eb2575e2ad273a922d9793e10c3858c:
scripts/install-buildtools: Update to 4.0.34 (2026-04-06 00:08:58 +0200)
----------------------------------------------------------------
Bruce Ashfield (2):
linux-yocto/5.15: update to v5.15.200
linux-yocto/5.15: update to v5.15.201
Fabien Thomas (1):
README.OE-Core: update contributor links and add kirkstone prefix
Hitendra Prajapati (1):
vim: Fix CVE-2026-33412
Jinfeng Wang (1):
tzdata/tzcode-native: upgrade 2025c -> 2026a
Paul Barker (1):
create-pull-request: Keep commit hash to be pulled in cover email
Peter Marko (1):
libtheora: mark CVE-2024-56431 as not vulnerable yet
Vijay Anusuri (10):
tzdata,tzcode-native: Upgrade 2025b -> 2025c
python3: Fix CVE-2025-15282
python3-pyopenssl: Fix CVE-2026-27448
python3-pyopenssl: Fix CVE-2026-27459
libarchive: Fix CVE-2026-4111
sqlite3: Fix CVE-2025-70873
curl: patch CVE-2025-14524
curl: patch CVE-2026-1965
curl: patch CVE-2026-3783
curl: patch CVE-2026-3784
Yoann Congal (1):
scripts/install-buildtools: Update to 4.0.34
README.OE-Core.md | 10 +-
.../python3-pyopenssl/CVE-2026-27448.patch | 125 +++++++
.../python3-pyopenssl/CVE-2026-27459.patch | 106 ++++++
.../python/python3-pyopenssl_22.0.0.bb | 5 +
.../python/python3/CVE-2025-15282.patch | 68 ++++
.../python/python3_3.10.19.bb | 1 +
.../libarchive/CVE-2026-4111-1.patch | 32 ++
.../libarchive/CVE-2026-4111-2.patch | 308 ++++++++++++++++++
.../libarchive/libarchive_3.6.2.bb | 2 +
meta/recipes-extended/timezone/timezone.inc | 6 +-
.../linux/linux-yocto-rt_5.15.bb | 6 +-
.../linux/linux-yocto-tiny_5.15.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +-
.../libtheora/libtheora_1.1.1.bb | 3 +
.../curl/curl/CVE-2025-14524.patch | 42 +++
.../curl/curl/CVE-2026-1965-1.patch | 98 ++++++
.../curl/curl/CVE-2026-1965-2.patch | 29 ++
.../curl/curl/CVE-2026-3783-pre1.patch | 66 ++++
.../curl/curl/CVE-2026-3783.patch | 157 +++++++++
.../curl/curl/CVE-2026-3784.patch | 73 +++++
meta/recipes-support/curl/curl_7.82.0.bb | 6 +
.../sqlite/files/CVE-2025-70873.patch | 33 ++
meta/recipes-support/sqlite/sqlite3_3.38.5.bb | 1 +
.../vim/files/CVE-2026-33412.patch | 61 ++++
meta/recipes-support/vim/vim.inc | 1 +
scripts/create-pull-request | 2 +-
scripts/install-buildtools | 4 +-
27 files changed, 1249 insertions(+), 28 deletions(-)
create mode 100644 meta/recipes-devtools/python/python3-pyopenssl/CVE-2026-27448.patch
create mode 100644 meta/recipes-devtools/python/python3-pyopenssl/CVE-2026-27459.patch
create mode 100644 meta/recipes-devtools/python/python3/CVE-2025-15282.patch
create mode 100644 meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch
create mode 100644 meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2025-14524.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-1965-1.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-1965-2.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-3783-pre1.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-3783.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-3784.patch
create mode 100644 meta/recipes-support/sqlite/files/CVE-2025-70873.patch
create mode 100644 meta/recipes-support/vim/files/CVE-2026-33412.patch
^ permalink raw reply [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 01/18] linux-yocto/5.15: update to v5.15.200
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 02/18] linux-yocto/5.15: update to v5.15.201 Yoann Congal
` (16 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/5.15 to the latest korg -stable release that comprises
the following commits:
e45d5d41c1343 Linux 5.15.200
7ca5540ba6239 riscv: Replace function-like macro by static inline function
cbae610ca9e27 nvmet-tcp: pass iov_len instead of sg->length to bvec_set_page()
6a04dc650cef8 spi: tegra: Fix a memory leak in tegra_slink_probe()
c7a02a814dc51 spi: tegra210-quad: Protect curr_xfer clearing in tegra_qspi_non_combined_seq_xfer
9fa4262a80f75 spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer
55dfe2687a496 spi: tegra210-quad: Protect curr_xfer assignment in tegra_qspi_setup_transfer_one
eebd79beb268c spi: tegra210-quad: Move curr_xfer read inside spinlock
4f9e7de7a6b8f spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed transfer
b34289505180a iommu: disable SVA when CONFIG_X86 is set
1ecf6dc2676ea Bluetooth: hci_event: call disconnect callback before deleting conn
214b85b9b7187 gve: Correct ethtool rx_dropped calculation
9d93332397405 gve: Fix stats report corruption on queue count change
8aa1b0bc65967 tracing: Fix ftrace event field alignments
c3c5cfa3170c0 gfs2: Fix NULL pointer dereference in gfs2_log_flush
343fe375a8dd6 hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
be6d98766ac95 riscv: uprobes: Add missing fence.i after building the XOL buffer
d7ead65126504 ASoC: amd: fix memory leak in acp3x pdm dma ops
42afe8ed8ad2d nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec
4c09184f08ce6 nvmet-tcp: don't map pages which can't come from HIGHMEM
15e329ce1a957 nvmet-tcp: fix regression in data_digest calculation
1a5c3c99efa11 nvmet-tcp: fix memory leak when performing a controller reset
367fd132df419 nvmet-tcp: add an helper to free the cmd buffers
8c760ba4e36c7 netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()
166f29d4af575 hwmon: (occ) Mark occ_init_attribute() as __printf
3f531122a5801 tipc: use kfree_sensitive() for session key material
5dae6b36a7cb7 macvlan: fix error recovery in macvlan_common_newlink()
77611cab5bdff dpaa2-switch: add bounds check for if_id in IRQ handler
01fbca1e93ec3 net: liquidio: Fix off-by-one error in VF setup_nic_devices() cleanup
d86c58eb005eb net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup
c81a8515fb8c8 net: liquidio: Initialize netdev pointer before queue setup
2fcccca88456b dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero
c01cc6fe06cf2 platform/x86: intel_telemetry: Fix PSS event register mask
5bce10f0f9435 platform/x86: toshiba_haps: Fix memory leaks in add/remove routines
193f087207ad8 wifi: mac80211: don't increment crypto_tx_tailroom_needed_cnt twice
8518f072fc929 scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()
fd8b090017330 scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()
c85c9de39cd5d wifi: cfg80211: Fix bitrate calculation overflow for HE rates
15e9607df7925 ASoC: tlv320adcx140: Propagate error codes during probe
1525f1068295f ASoC: davinci-evm: Fix reference leak in davinci_evm_probe
536238ba39829 wifi: mac80211: collect station statistics earlier when disconnect
6e4cc9e399952 ring-buffer: Avoid softlockup in ring_buffer_resize() during memory free
16c2ca35257ed HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101)
04485e691d8ca HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list
67e06e8a77c1a netfilter: replace -EEXIST with -EBUSY
e9aefab3b7eb4 ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk
2d8af4db1f209 HID: playstation: Center initial joystick axes to prevent spurious events
d21497331b967 HID: intel-ish-hid: Reset enum_devices_done before enumeration
d5cce2ec0e985 HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL
a2c68e256fb7a smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe()
e5dd6a58a52d5 block,bfq: fix aux stat accumulation destination
64240689acff8 net: usb: sr9700: support devices with virtual driver CD
cd89a4656c03f wifi: wlcore: ensure skb headroom before skb_push
b04c75366a547 wifi: mac80211: ocb: skip rx_no_sta when interface is not joined
9a6cdfd7b6aaa binderfs: fix ida_alloc_max() upper bound
ba43ac025c431 timers: Fix NULL function pointer race in timer_shutdown_sync()
f24f9ea7d69ef Bluetooth: hci_qca: Fix the teardown problem for real
e7f1ca8ea41ab timers: Update the documentation to reflect on the new timer_shutdown() API
36bdfa51a1ad7 timers: Provide timer_shutdown[_sync]()
debbcf812d735 timers: Add shutdown mechanism to the internal functions
21ca3ee3f6faa timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode
a7035e7d720f8 timers: Silently ignore timers with a NULL function
e45a52685b335 Documentation: Replace del_timer/del_timer_sync()
29d5751350cdf timers: Rename del_timer() to timer_delete()
a431c4c27ee05 timers: Replace BUG_ON()s
d2736470196f2 timers: Get rid of del_singleshot_timer_sync()
9b78a3b948bb6 clocksource/drivers/sp804: Do not use timer namespace for timer_shutdown() function
a97b47fed39d9 clocksource/drivers/arm_arch_timer: Do not use timer namespace for timer_shutdown() function
b03eb334c42ea ARM: spear: Do not use timer namespace for timer_shutdown() function
7bcf91585f3b1 Documentation: Remove bogus claim about del_timer_sync()
4abccfb61f422 netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX
d6ae339f18099 mm/kfence: randomize the freelist on initialization
2284bc168b148 KVM: Don't clobber irqfd routing type when deassigning irqfd
a550cc2564cab ARM: 9468/1: fix memset64() on big-endian
5928ca551e361 rbd: check for EOD after exclusive lock is ensured to be held
446d7283cffa5 platform/x86: intel_telemetry: Fix swapped arrays in PSS output
674ebe2d6fe59 x86/kfence: fix booting on 32bit non-PAE systems
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../linux/linux-yocto-rt_5.15.bb | 6 ++---
.../linux/linux-yocto-tiny_5.15.bb | 6 ++---
meta/recipes-kernel/linux/linux-yocto_5.15.bb | 26 +++++++++----------
3 files changed, 19 insertions(+), 19 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb
index e23c8bf88ab..526f3c64b7d 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb
@@ -11,13 +11,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "27c8048897d9d7ff1ed6d2643cbc024eb13ae342"
-SRCREV_meta ?= "78eca082b68ad521c3bb9a1f9f0325e044045f18"
+SRCREV_machine ?= "671f06e26c741b7d55d8afcc30e64f1480cec166"
+SRCREV_meta ?= "b75d71b7f2455467f2260d514040ccb44d4bdda5"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}"
-LINUX_VERSION ?= "5.15.199"
+LINUX_VERSION ?= "5.15.200"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb
index 21233285b57..1eeda2e22ca 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb
@@ -5,7 +5,7 @@ KCONFIG_MODE = "--allnoconfig"
require recipes-kernel/linux/linux-yocto.inc
-LINUX_VERSION ?= "5.15.199"
+LINUX_VERSION ?= "5.15.200"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -14,8 +14,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "7b20eb2129d25bb2a1cb963d30c2f3adb1e144b3"
-SRCREV_meta ?= "78eca082b68ad521c3bb9a1f9f0325e044045f18"
+SRCREV_machine ?= "0d4112b87ce7dd038dc712ef616c0b6dd333c786"
+SRCREV_meta ?= "b75d71b7f2455467f2260d514040ccb44d4bdda5"
PV = "${LINUX_VERSION}+git${SRCPV}"
diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb
index 861af0041af..5f8bfba396e 100644
--- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb
@@ -14,24 +14,24 @@ KBRANCH:qemux86 ?= "v5.15/standard/base"
KBRANCH:qemux86-64 ?= "v5.15/standard/base"
KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "0ea8d4a7d24642475c1d1e0d8be44976600eb630"
-SRCREV_machine:qemuarm64 ?= "33aae9ebda82736fc0246e4d2bd7967bb7ef492a"
-SRCREV_machine:qemumips ?= "0d159686c17443503bc7b59f25b5129c8543193d"
-SRCREV_machine:qemuppc ?= "c8e213f83bae4792c1042bdcedd46fa60963c69b"
-SRCREV_machine:qemuriscv64 ?= "e7bbf58a0f6828ffb92109eb423eb3d1327f091a"
-SRCREV_machine:qemuriscv32 ?= "e7bbf58a0f6828ffb92109eb423eb3d1327f091a"
-SRCREV_machine:qemux86 ?= "e7bbf58a0f6828ffb92109eb423eb3d1327f091a"
-SRCREV_machine:qemux86-64 ?= "e7bbf58a0f6828ffb92109eb423eb3d1327f091a"
-SRCREV_machine:qemumips64 ?= "58c96e47bbd784e078e265426b9276bad2bb7e22"
-SRCREV_machine ?= "e7bbf58a0f6828ffb92109eb423eb3d1327f091a"
-SRCREV_meta ?= "78eca082b68ad521c3bb9a1f9f0325e044045f18"
+SRCREV_machine:qemuarm ?= "44b7b6bdfaab20ab51f175aeb0df8c27791cc40d"
+SRCREV_machine:qemuarm64 ?= "d67ad97cb5d6a51184bd61853e3af7e044c7f1d4"
+SRCREV_machine:qemumips ?= "94fe5264de5b6ba6a5fab53b3f2283e36033e373"
+SRCREV_machine:qemuppc ?= "a065262f1076ca606ea8229f84b23c10be2680e7"
+SRCREV_machine:qemuriscv64 ?= "af4baa923d4f04a259e3199e9e63d9415bdf3e3a"
+SRCREV_machine:qemuriscv32 ?= "af4baa923d4f04a259e3199e9e63d9415bdf3e3a"
+SRCREV_machine:qemux86 ?= "af4baa923d4f04a259e3199e9e63d9415bdf3e3a"
+SRCREV_machine:qemux86-64 ?= "af4baa923d4f04a259e3199e9e63d9415bdf3e3a"
+SRCREV_machine:qemumips64 ?= "00831bab13b4320ee27e4ddc72b55542bfe75ec8"
+SRCREV_machine ?= "af4baa923d4f04a259e3199e9e63d9415bdf3e3a"
+SRCREV_meta ?= "b75d71b7f2455467f2260d514040ccb44d4bdda5"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "7b232985052fcf6a78bf0f965aa4241c0678c2ba"
+SRCREV_machine:class-devupstream ?= "e45d5d41c1343aad8c7587a5b15d58e99aff4c8a"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v5.15/base"
@@ -39,7 +39,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "5.15.199"
+LINUX_VERSION ?= "5.15.200"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
DEPENDS += "openssl-native util-linux-native"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 02/18] linux-yocto/5.15: update to v5.15.201
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 01/18] linux-yocto/5.15: update to v5.15.200 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 03/18] create-pull-request: Keep commit hash to be pulled in cover email Yoann Congal
` (15 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/5.15 to the latest korg -stable release that comprises
the following commits:
3330a8d33e08 Linux 5.15.201
cfd5eadd051a USB: serial: option: add Telit FN920C04 RNDIS compositions
438a405fbad6 f2fs: fix out-of-bounds access in sysfs attribute read/write
2f67ff1e15a8 f2fs: fix to avoid UAF in f2fs_write_end_io()
6167af934f95 fbdev: smscufx: properly copy ioctl memory to kernelspace
52916878db2b fbdev: rivafb: fix divide error in nv3_arb()
fa9fb38f5fe9 PCI: endpoint: Avoid creating sub-groups asynchronously
7036aff5a5e8 PCI: endpoint: Remove unused field in struct pci_epf_group
8055827352b7 PCI: endpoint: Automatically create a function specific attributes group
b74408de1f22 scsi: qla2xxx: Free sp in error path to fix system crash
794563147038 scsi: qla2xxx: Reduce fabric scan duplicate code
23507a811081 scsi: qla2xxx: Remove dead code (GNN ID)
da9939b1ed8b scsi: qla2xxx: Use named initializers for port_[d]state_str
f2bbb4db0e4a scsi: qla2xxx: Fix bsg_done() causing double free
c71dfb7833db bus: fsl-mc: fix use-after-free in driver_override_show()
38770e103e4e bus: fsl-mc: Replace snprintf and sprintf with sysfs_emit in sysfs show functions
6dd2645cf080 smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()
dc5f09466448 crypto: virtio - Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req
338d40bab283 mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()
ec7b6a042414 selftests: mptcp: pm: ensure unknown flags are ignored
51df5513cca6 net: dsa: free routing table on probe failure
4a6e4c56721a smb: client: set correct id, uid and cruid for multiuser automounts
b0bb67385480 btrfs: fix racy bitfield write in btrfs_clear_space_info_full()
cfdb22762f90 Revert "wireguard: device: enable threaded NAPI"
20c83788eafe gpiolib: acpi: Fix gpio count with string references
612ffe1f4f04 ASoC: fsl_xcvr: fix missing lock in fsl_xcvr_mode_put()
ff96318c22fa platform/x86: panasonic-laptop: Fix sysfs group leak in error path
af673209d43b platform/x86: classmate-laptop: Add missing NULL pointer checks
72f97ee4950d drm/tegra: hdmi: sor: Fix error: variable ‘j’ set but not used
f2521ab1f63a romfs: check sb_set_blocksize() return value
f14e997a372a gpio: sprd: Change sprd_gpio lock to raw_spin_lock
1fe2603fb171 ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU
86588916e188 gpio: omap: do not register driver in probe()
7e0b2cdbe660 scsi: qla2xxx: Query FW again before proceeding with login
891f9969a29e scsi: qla2xxx: Delay module unload while fabric scan in progress
a46f81c1e627 scsi: qla2xxx: Validate sp before freeing associated memory
ba18e5f22f26 nilfs2: Fix potential block overflow that cause system hang
8ee8ccfd60bf crypto: virtio - Add spinlock protection with virtqueue notification
31aff96a41ae crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly
a60b17cedb44 crypto: octeontx - Fix length check to avoid truncation in ucode_load_store
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../linux/linux-yocto-rt_5.15.bb | 4 ++--
.../linux/linux-yocto-tiny_5.15.bb | 4 ++--
meta/recipes-kernel/linux/linux-yocto_5.15.bb | 24 +++++++++----------
3 files changed, 16 insertions(+), 16 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb
index 526f3c64b7d..ea763ce9aa1 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_5.15.bb
@@ -11,13 +11,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "671f06e26c741b7d55d8afcc30e64f1480cec166"
+SRCREV_machine ?= "46e4e1200a4fa889438a2cc62151bb7f1057421a"
SRCREV_meta ?= "b75d71b7f2455467f2260d514040ccb44d4bdda5"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}"
-LINUX_VERSION ?= "5.15.200"
+LINUX_VERSION ?= "5.15.201"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb
index 1eeda2e22ca..56853f481fa 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_5.15.bb
@@ -5,7 +5,7 @@ KCONFIG_MODE = "--allnoconfig"
require recipes-kernel/linux/linux-yocto.inc
-LINUX_VERSION ?= "5.15.200"
+LINUX_VERSION ?= "5.15.201"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -14,7 +14,7 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "0d4112b87ce7dd038dc712ef616c0b6dd333c786"
+SRCREV_machine ?= "5ae014d6b48449ae38584cc174ef362f6582a8fc"
SRCREV_meta ?= "b75d71b7f2455467f2260d514040ccb44d4bdda5"
PV = "${LINUX_VERSION}+git${SRCPV}"
diff --git a/meta/recipes-kernel/linux/linux-yocto_5.15.bb b/meta/recipes-kernel/linux/linux-yocto_5.15.bb
index 5f8bfba396e..176d17e5736 100644
--- a/meta/recipes-kernel/linux/linux-yocto_5.15.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_5.15.bb
@@ -14,16 +14,16 @@ KBRANCH:qemux86 ?= "v5.15/standard/base"
KBRANCH:qemux86-64 ?= "v5.15/standard/base"
KBRANCH:qemumips64 ?= "v5.15/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "44b7b6bdfaab20ab51f175aeb0df8c27791cc40d"
-SRCREV_machine:qemuarm64 ?= "d67ad97cb5d6a51184bd61853e3af7e044c7f1d4"
-SRCREV_machine:qemumips ?= "94fe5264de5b6ba6a5fab53b3f2283e36033e373"
-SRCREV_machine:qemuppc ?= "a065262f1076ca606ea8229f84b23c10be2680e7"
-SRCREV_machine:qemuriscv64 ?= "af4baa923d4f04a259e3199e9e63d9415bdf3e3a"
-SRCREV_machine:qemuriscv32 ?= "af4baa923d4f04a259e3199e9e63d9415bdf3e3a"
-SRCREV_machine:qemux86 ?= "af4baa923d4f04a259e3199e9e63d9415bdf3e3a"
-SRCREV_machine:qemux86-64 ?= "af4baa923d4f04a259e3199e9e63d9415bdf3e3a"
-SRCREV_machine:qemumips64 ?= "00831bab13b4320ee27e4ddc72b55542bfe75ec8"
-SRCREV_machine ?= "af4baa923d4f04a259e3199e9e63d9415bdf3e3a"
+SRCREV_machine:qemuarm ?= "9750e854c9e92d55a2cb042c5ce72e712b24217d"
+SRCREV_machine:qemuarm64 ?= "8634ca1dd87be9b55bd383dc8636b73b82a28051"
+SRCREV_machine:qemumips ?= "54eca1788efd507120c9dc08681a6a31038513a1"
+SRCREV_machine:qemuppc ?= "3a3a4ecdcebb4d3deaa8b5c4ec3e167d5f31305c"
+SRCREV_machine:qemuriscv64 ?= "b5ccd2e275c9b68e5dc564b6febeaae8dda42bc5"
+SRCREV_machine:qemuriscv32 ?= "b5ccd2e275c9b68e5dc564b6febeaae8dda42bc5"
+SRCREV_machine:qemux86 ?= "b5ccd2e275c9b68e5dc564b6febeaae8dda42bc5"
+SRCREV_machine:qemux86-64 ?= "b5ccd2e275c9b68e5dc564b6febeaae8dda42bc5"
+SRCREV_machine:qemumips64 ?= "e643e82fef4b4352b8f6ddf802181526edc806ca"
+SRCREV_machine ?= "b5ccd2e275c9b68e5dc564b6febeaae8dda42bc5"
SRCREV_meta ?= "b75d71b7f2455467f2260d514040ccb44d4bdda5"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
@@ -31,7 +31,7 @@ SRCREV_meta ?= "b75d71b7f2455467f2260d514040ccb44d4bdda5"
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "e45d5d41c1343aad8c7587a5b15d58e99aff4c8a"
+SRCREV_machine:class-devupstream ?= "3330a8d33e086f76608bb4e80a3dc569d04a8814"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v5.15/base"
@@ -39,7 +39,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-5.15;destsuffix=${KMETA}"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "5.15.200"
+LINUX_VERSION ?= "5.15.201"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
DEPENDS += "openssl-native util-linux-native"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 03/18] create-pull-request: Keep commit hash to be pulled in cover email
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 01/18] linux-yocto/5.15: update to v5.15.200 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 02/18] linux-yocto/5.15: update to v5.15.201 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 04/18] README.OE-Core: update contributor links and add kirkstone prefix Yoann Congal
` (14 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Paul Barker <paul@pbarker.dev>
The cover email mangling in create-pull-request was cutting off the
actual commit hash to be pulled, making it difficult to verify that the
changes a maintainer merges exactly match those intended by the pull
request author.
The extra lines we want to include are, for example from a recent
whinlatter stable branch PR:
for you to fetch changes up to 6c4c6d39ea3202d756acc13f8ce81b114a468541:
cups: upgrade from 2.4.14 to 2.4.15 (2025-12-29 09:49:31 -0800)
Signed-off-by: Paul Barker <paul@pbarker.dev>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit c78f5ae4a5ba3675b78cc226feb7b9fbbfd8da19)
Signed-off-by: Fabien Thomas <fabien.thomas@smile.fr>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
scripts/create-pull-request | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/scripts/create-pull-request b/scripts/create-pull-request
index 885105fab3d..5c4414ecd5f 100755
--- a/scripts/create-pull-request
+++ b/scripts/create-pull-request
@@ -219,7 +219,7 @@ fi
# The cover letter already has a diffstat, remove it from the pull-msg
# before inserting it.
-sed -n "0,\#$REMOTE_URL# p" "$PM" | sed -i "/BLURB HERE/ r /dev/stdin" "$CL"
+sed -n "0,\#^----------------------------------------------------------------# p" "$PM" | sed -i "/BLURB HERE/ r /dev/stdin" "$CL"
rm "$PM"
# If this is an RFC, make that clear in the cover letter
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 04/18] README.OE-Core: update contributor links and add kirkstone prefix
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (2 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 03/18] create-pull-request: Keep commit hash to be pulled in cover email Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 05/18] libtheora: mark CVE-2024-56431 as not vulnerable yet Yoann Congal
` (13 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Fabien Thomas <fabien.thomas@smile.fr>
The current README points to an old Wiki page. Update this to the
Yocto documentation.
Additionally, add a helper command for git-send-email that includes
the 'kirkstone' subject prefix to ensure patches are correctly
identified by the maintainers and CI.
Suggested-by: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Fabien Thomas <fabien.thomas@smile.fr>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
README.OE-Core.md | 10 +++++++---
1 file changed, 7 insertions(+), 3 deletions(-)
diff --git a/README.OE-Core.md b/README.OE-Core.md
index 2f2127fb03a..8a724dd6d0a 100644
--- a/README.OE-Core.md
+++ b/README.OE-Core.md
@@ -16,9 +16,13 @@ which can be found at:
Contributing
------------
-Please refer to
-https://www.openembedded.org/wiki/How_to_submit_a_patch_to_OpenEmbedded
-for guidelines on how to submit patches.
+Please refer to our contributor guide here: https://docs.yoctoproject.org/dev/contributor-guide/
+for full details on how to submit changes.
+
+As a quick guide, patches should be sent to openembedded-core@lists.openembedded.org
+The git command to do that would be:
+
+ git send-email -M -1 --to openembedded-core@lists.openembedded.org --subject-prefix='kirkstone][PATCH'
Mailing list:
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 05/18] libtheora: mark CVE-2024-56431 as not vulnerable yet
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (3 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 04/18] README.OE-Core: update contributor links and add kirkstone prefix Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 06/18] tzdata,tzcode-native: Upgrade 2025b -> 2025c Yoann Congal
` (12 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
CVE patch [1] aplies only on main branch which is base for 1.2.x.
Branch 1.1 has a different initial commit and does not contain
vulnerable code where the CVE patch applies.
Also Debian [2] marked 1.1 as not vulnerable.
[1] https://gitlab.xiph.org/xiph/theora/-/commit/5665f86b8fd8345bb09469990e79221562ac204b
[2] https://security-tracker.debian.org/tracker/CVE-2024-56431
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Paul Barker <paul@pbarker.dev>
Picked from scarthgap commit 07f35d022b88ab4d297d0252f9909e252b7e4cfe
Reworked from CVE_STATUS to CVE_CHECK_IGNORE
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-multimedia/libtheora/libtheora_1.1.1.bb | 3 +++
1 file changed, 3 insertions(+)
diff --git a/meta/recipes-multimedia/libtheora/libtheora_1.1.1.bb b/meta/recipes-multimedia/libtheora/libtheora_1.1.1.bb
index ad0be85559b..4066bb1513b 100644
--- a/meta/recipes-multimedia/libtheora/libtheora_1.1.1.bb
+++ b/meta/recipes-multimedia/libtheora/libtheora_1.1.1.bb
@@ -22,3 +22,6 @@ CVE_PRODUCT = "theora"
inherit autotools pkgconfig
EXTRA_OECONF = "--disable-examples"
+
+# fixed-version:branch 1.1 is not affected, vulnerable code is not present yet
+CVE_CHECK_IGNORE += "CVE-2024-56431"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 06/18] tzdata,tzcode-native: Upgrade 2025b -> 2025c
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (4 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 05/18] libtheora: mark CVE-2024-56431 as not vulnerable yet Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 07/18] tzdata/tzcode-native: upgrade 2025c -> 2026a Yoann Congal
` (11 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
This release mostly changes code and commentary. The only changed data
are leap second table expiration and pre-1976 time in Baja California.
Full release notes:
https://lists.iana.org/hyperkitty/list/tz-announce@iana.org/thread/TAGXKYLMAQRZRFTERQ33CEKOW7KRJVAK/
Signed-off-by: Paul Barker <paul@pbarker.dev>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 452334219309793ad74abd6ff390dcb06cab929b)
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-extended/timezone/timezone.inc | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/meta/recipes-extended/timezone/timezone.inc b/meta/recipes-extended/timezone/timezone.inc
index bb81d77ccc5..1c08d4b1023 100644
--- a/meta/recipes-extended/timezone/timezone.inc
+++ b/meta/recipes-extended/timezone/timezone.inc
@@ -6,7 +6,7 @@ SECTION = "base"
LICENSE = "PD & BSD-3-Clause"
LIC_FILES_CHKSUM = "file://LICENSE;md5=c679c9d6b02bc2757b3eaf8f53c43fba"
-PV = "2025b"
+PV = "2025c"
SRC_URI =" https://www.iana.org/time-zones/repository/releases/tzcode${PV}.tar.gz;name=tzcode;subdir=tz \
https://www.iana.org/time-zones/repository/releases/tzdata${PV}.tar.gz;name=tzdata;subdir=tz \
@@ -16,5 +16,5 @@ S = "${WORKDIR}/tz"
UPSTREAM_CHECK_URI = "https://www.iana.org/time-zones"
-SRC_URI[tzcode.sha256sum] = "05f8fedb3525ee70d49c87d3fae78a8a0dbae4fe87aa565c65cda9948ae135ec"
-SRC_URI[tzdata.sha256sum] = "11810413345fc7805017e27ea9fa4885fd74cd61b2911711ad038f5d28d71474"
+SRC_URI[tzcode.sha256sum] = "697ebe6625444aef5080f58e49d03424bbb52e08bf483d3ddb5acf10cbd15740"
+SRC_URI[tzdata.sha256sum] = "4aa79e4effee53fc4029ffe5f6ebe97937282ebcdf386d5d2da91ce84142f957"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 07/18] tzdata/tzcode-native: upgrade 2025c -> 2026a
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (5 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 06/18] tzdata,tzcode-native: Upgrade 2025b -> 2025c Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 08/18] python3: Fix CVE-2025-15282 Yoann Congal
` (10 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Jinfeng Wang <jinfeng.wang.cn@windriver.com>
Signed-off-by: Jinfeng Wang <jinfeng.wang.cn@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 217ede26d64901d9a38fc119efa684487714c08a)
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-extended/timezone/timezone.inc | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/meta/recipes-extended/timezone/timezone.inc b/meta/recipes-extended/timezone/timezone.inc
index 1c08d4b1023..c498c0c9ffa 100644
--- a/meta/recipes-extended/timezone/timezone.inc
+++ b/meta/recipes-extended/timezone/timezone.inc
@@ -6,7 +6,7 @@ SECTION = "base"
LICENSE = "PD & BSD-3-Clause"
LIC_FILES_CHKSUM = "file://LICENSE;md5=c679c9d6b02bc2757b3eaf8f53c43fba"
-PV = "2025c"
+PV = "2026a"
SRC_URI =" https://www.iana.org/time-zones/repository/releases/tzcode${PV}.tar.gz;name=tzcode;subdir=tz \
https://www.iana.org/time-zones/repository/releases/tzdata${PV}.tar.gz;name=tzdata;subdir=tz \
@@ -16,5 +16,5 @@ S = "${WORKDIR}/tz"
UPSTREAM_CHECK_URI = "https://www.iana.org/time-zones"
-SRC_URI[tzcode.sha256sum] = "697ebe6625444aef5080f58e49d03424bbb52e08bf483d3ddb5acf10cbd15740"
-SRC_URI[tzdata.sha256sum] = "4aa79e4effee53fc4029ffe5f6ebe97937282ebcdf386d5d2da91ce84142f957"
+SRC_URI[tzcode.sha256sum] = "f80a17a2eddd2b54041f9c98d75b0aa8038b016d7c5de72892a146d9938740e1"
+SRC_URI[tzdata.sha256sum] = "77b541725937bb53bd92bd484c0b43bec8545e2d3431ee01f04ef8f2203ba2b7"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 08/18] python3: Fix CVE-2025-15282
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (6 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 07/18] tzdata/tzcode-native: upgrade 2025c -> 2026a Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 9:09 ` Paul Barker
2026-04-06 6:26 ` [OE-core][kirkstone 09/18] python3-pyopenssl: Fix CVE-2026-27448 Yoann Congal
` (9 subsequent siblings)
17 siblings, 1 reply; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Pick patch from 3.10 branch
[1] https://nvd.nist.gov/vuln/detail/CVE-2025-15282
[2] https://security-tracker.debian.org/tracker/CVE-2025-15282
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../python/python3/CVE-2025-15282.patch | 68 +++++++++++++++++++
.../python/python3_3.10.19.bb | 1 +
2 files changed, 69 insertions(+)
create mode 100644 meta/recipes-devtools/python/python3/CVE-2025-15282.patch
diff --git a/meta/recipes-devtools/python/python3/CVE-2025-15282.patch b/meta/recipes-devtools/python/python3/CVE-2025-15282.patch
new file mode 100644
index 00000000000..80ef2fcde8b
--- /dev/null
+++ b/meta/recipes-devtools/python/python3/CVE-2025-15282.patch
@@ -0,0 +1,68 @@
+From 34d76b00dabde81a793bd06dd8ecb057838c4b38 Mon Sep 17 00:00:00 2001
+From: Seth Michael Larson <seth@python.org>
+Date: Sun, 25 Jan 2026 11:05:15 -0600
+Subject: [PATCH] [3.10] gh-143925: Reject control characters in data: URL
+ mediatypes (#144115)
+
+(cherry picked from commit f25509e78e8be6ea73c811ac2b8c928c28841b9f)
+(cherry picked from commit 2c9c746077d8119b5bcf5142316992e464594946)
+
+Upstream-Status: Backport [https://github.com/python/cpython/commit/34d76b00dabde81a793bd06dd8ecb057838c4b38]
+CVE: CVE-2025-15282
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ Lib/test/test_urllib.py | 8 ++++++++
+ Lib/urllib/request.py | 5 +++++
+ .../2026-01-16-11-51-19.gh-issue-143925.mrtcHW.rst | 1 +
+ 3 files changed, 14 insertions(+)
+ create mode 100644 Misc/NEWS.d/next/Security/2026-01-16-11-51-19.gh-issue-143925.mrtcHW.rst
+
+diff --git a/Lib/test/test_urllib.py b/Lib/test/test_urllib.py
+index 82f1d9dc2e7bb3..b08fc8f2b19463 100644
+--- a/Lib/test/test_urllib.py
++++ b/Lib/test/test_urllib.py
+@@ -11,6 +11,7 @@
+ from test import support
+ from test.support import os_helper
+ from test.support import warnings_helper
++from test.support import control_characters_c0
+ import os
+ try:
+ import ssl
+@@ -683,6 +684,13 @@ def test_invalid_base64_data(self):
+ # missing padding character
+ self.assertRaises(ValueError,urllib.request.urlopen,'data:;base64,Cg=')
+
++ def test_invalid_mediatype(self):
++ for c0 in control_characters_c0():
++ self.assertRaises(ValueError,urllib.request.urlopen,
++ f'data:text/html;{c0},data')
++ for c0 in control_characters_c0():
++ self.assertRaises(ValueError,urllib.request.urlopen,
++ f'data:text/html{c0};base64,ZGF0YQ==')
+
+ class urlretrieve_FileTests(unittest.TestCase):
+ """Test urllib.urlretrieve() on local files"""
+diff --git a/Lib/urllib/request.py b/Lib/urllib/request.py
+index 6edde1f73189b1..c378a86a70cbeb 100644
+--- a/Lib/urllib/request.py
++++ b/Lib/urllib/request.py
+@@ -1654,6 +1654,11 @@ def data_open(self, req):
+ scheme, data = url.split(":",1)
+ mediatype, data = data.split(",",1)
+
++ # Disallow control characters within mediatype.
++ if re.search(r"[\x00-\x1F\x7F]", mediatype):
++ raise ValueError(
++ "Control characters not allowed in data: mediatype")
++
+ # even base64 encoded data URLs might be quoted so unquote in any case:
+ data = unquote_to_bytes(data)
+ if mediatype.endswith(";base64"):
+diff --git a/Misc/NEWS.d/next/Security/2026-01-16-11-51-19.gh-issue-143925.mrtcHW.rst b/Misc/NEWS.d/next/Security/2026-01-16-11-51-19.gh-issue-143925.mrtcHW.rst
+new file mode 100644
+index 00000000000000..46109dfbef3ee7
+--- /dev/null
++++ b/Misc/NEWS.d/next/Security/2026-01-16-11-51-19.gh-issue-143925.mrtcHW.rst
+@@ -0,0 +1 @@
++Reject control characters in ``data:`` URL media types.
diff --git a/meta/recipes-devtools/python/python3_3.10.19.bb b/meta/recipes-devtools/python/python3_3.10.19.bb
index fbb2f80886b..e2a0ae9fe77 100644
--- a/meta/recipes-devtools/python/python3_3.10.19.bb
+++ b/meta/recipes-devtools/python/python3_3.10.19.bb
@@ -41,6 +41,7 @@ SRC_URI = "http://www.python.org/ftp/python/${PV}/Python-${PV}.tar.xz \
file://CVE-2025-13836.patch \
file://CVE-2025-13837.patch \
file://CVE-2025-12084.patch \
+ file://CVE-2025-15282.patch \
"
SRC_URI:append:class-native = " \
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 09/18] python3-pyopenssl: Fix CVE-2026-27448
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (7 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 08/18] python3: Fix CVE-2025-15282 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 10/18] python3-pyopenssl: Fix CVE-2026-27459 Yoann Congal
` (8 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Pick patch mentioned in NVD
[1] https://nvd.nist.gov/vuln/detail/CVE-2026-27448
[2] https://ubuntu.com/security/CVE-2026-27448
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../python3-pyopenssl/CVE-2026-27448.patch | 125 ++++++++++++++++++
.../python/python3-pyopenssl_22.0.0.bb | 4 +
2 files changed, 129 insertions(+)
create mode 100644 meta/recipes-devtools/python/python3-pyopenssl/CVE-2026-27448.patch
diff --git a/meta/recipes-devtools/python/python3-pyopenssl/CVE-2026-27448.patch b/meta/recipes-devtools/python/python3-pyopenssl/CVE-2026-27448.patch
new file mode 100644
index 00000000000..4a06e2c0201
--- /dev/null
+++ b/meta/recipes-devtools/python/python3-pyopenssl/CVE-2026-27448.patch
@@ -0,0 +1,125 @@
+From d41a814759a9fb49584ca8ab3f7295de49a85aa0 Mon Sep 17 00:00:00 2001
+From: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Mon, 16 Feb 2026 21:04:37 -0500
+Subject: [PATCH] Handle exceptions in set_tlsext_servername_callback callbacks
+ (#1478)
+
+When the servername callback raises an exception, call sys.excepthook
+with the exception info and return SSL_TLSEXT_ERR_ALERT_FATAL to abort
+the handshake. Previously, exceptions would propagate uncaught through
+the CFFI callback boundary.
+
+https://claude.ai/code/session_01P7y1XmWkdtC5UcmZwGDvGi
+
+Co-authored-by: Claude <noreply@anthropic.com>
+
+Upstream-Status: Backport [https://github.com/pyca/pyopenssl/commit/d41a814759a9fb49584ca8ab3f7295de49a85aa0]
+CVE: CVE-2026-27448
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ CHANGELOG.rst | 2 ++
+ src/OpenSSL/SSL.py | 7 ++++++-
+ tests/test_ssl.py | 50 ++++++++++++++++++++++++++++++++++++++++++++++
+ 3 files changed, 58 insertions(+), 1 deletion(-)
+
+diff --git a/CHANGELOG.rst b/CHANGELOG.rst
+index c84b30a..5b6d523 100644
+--- a/CHANGELOG.rst
++++ b/CHANGELOG.rst
+@@ -20,6 +20,8 @@ Deprecations:
+ Changes:
+ ^^^^^^^^
+
++- ``Context.set_tlsext_servername_callback`` now handles exceptions raised in the callback by calling ``sys.excepthook`` and returning a fatal TLS alert. Previously, exceptions were silently swallowed and the handshake would proceed as if the callback had succeeded.
++
+ - Expose wrappers for some `DTLS
+ <https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Security>`_
+ primitives. `#1026 <https://github.com/pyca/pyopenssl/pull/1026>`_
+diff --git a/src/OpenSSL/SSL.py b/src/OpenSSL/SSL.py
+index 12374b7..6ef44d4 100644
+--- a/src/OpenSSL/SSL.py
++++ b/src/OpenSSL/SSL.py
+@@ -1,5 +1,6 @@
+ import os
+ import socket
++import sys
+ from sys import platform
+ from functools import wraps, partial
+ from itertools import count, chain
+@@ -1431,7 +1432,11 @@ class Context(object):
+
+ @wraps(callback)
+ def wrapper(ssl, alert, arg):
+- callback(Connection._reverse_mapping[ssl])
++ try:
++ callback(Connection._reverse_mapping[ssl])
++ except Exception:
++ sys.excepthook(*sys.exc_info())
++ return _lib.SSL_TLSEXT_ERR_ALERT_FATAL
+ return 0
+
+ self._tlsext_servername_callback = _ffi.callback(
+diff --git a/tests/test_ssl.py b/tests/test_ssl.py
+index ccc8a38..77e1876 100644
+--- a/tests/test_ssl.py
++++ b/tests/test_ssl.py
+@@ -1884,6 +1884,56 @@ class TestServerNameCallback(object):
+
+ assert args == [(server, b"foo1.example.com")]
+
++ def test_servername_callback_exception(
++ self, monkeypatch: pytest.MonkeyPatch
++ ) -> None:
++ """
++ When the callback passed to `Context.set_tlsext_servername_callback`
++ raises an exception, ``sys.excepthook`` is called with the exception
++ and the handshake fails with an ``Error``.
++ """
++ exc = TypeError("server name callback failed")
++
++ def servername(conn: Connection) -> None:
++ raise exc
++
++ excepthook_calls: list[
++ tuple[type[BaseException], BaseException, object]
++ ] = []
++
++ def custom_excepthook(
++ exc_type: type[BaseException],
++ exc_value: BaseException,
++ exc_tb: object,
++ ) -> None:
++ excepthook_calls.append((exc_type, exc_value, exc_tb))
++
++ context = Context(SSLv23_METHOD)
++ context.set_tlsext_servername_callback(servername)
++
++ # Necessary to actually accept the connection
++ context.use_privatekey(load_privatekey(FILETYPE_PEM, server_key_pem))
++ context.use_certificate(
++ load_certificate(FILETYPE_PEM, server_cert_pem)
++ )
++
++ # Do a little connection to trigger the logic
++ server = Connection(context, None)
++ server.set_accept_state()
++
++ client = Connection(Context(SSLv23_METHOD), None)
++ client.set_connect_state()
++ client.set_tlsext_host_name(b"foo1.example.com")
++
++ monkeypatch.setattr(sys, "excepthook", custom_excepthook)
++ with pytest.raises(Error):
++ interact_in_memory(server, client)
++
++ assert len(excepthook_calls) == 1
++ assert excepthook_calls[0][0] is TypeError
++ assert excepthook_calls[0][1] is exc
++ assert excepthook_calls[0][2] is not None
++
+
+ class TestApplicationLayerProtoNegotiation(object):
+ """
+--
+2.25.1
+
diff --git a/meta/recipes-devtools/python/python3-pyopenssl_22.0.0.bb b/meta/recipes-devtools/python/python3-pyopenssl_22.0.0.bb
index db0e809ef54..13d87939b62 100644
--- a/meta/recipes-devtools/python/python3-pyopenssl_22.0.0.bb
+++ b/meta/recipes-devtools/python/python3-pyopenssl_22.0.0.bb
@@ -10,6 +10,10 @@ SRC_URI[sha256sum] = "660b1b1425aac4a1bea1d94168a85d99f0b3144c869dd4390d27629d00
PYPI_PACKAGE = "pyOpenSSL"
inherit pypi setuptools3
+SRC_URI += " \
+ file://CVE-2026-27448.patch \
+"
+
PACKAGES =+ "${PN}-tests"
FILES:${PN}-tests = "${libdir}/${PYTHON_DIR}/site-packages/OpenSSL/test"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 10/18] python3-pyopenssl: Fix CVE-2026-27459
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (8 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 09/18] python3-pyopenssl: Fix CVE-2026-27448 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 11/18] libarchive: Fix CVE-2026-4111 Yoann Congal
` (7 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Pick patch mentioned in NVD
[1] https://nvd.nist.gov/vuln/detail/CVE-2026-27459
[2] https://ubuntu.com/security/CVE-2026-27459
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../python3-pyopenssl/CVE-2026-27459.patch | 106 ++++++++++++++++++
.../python/python3-pyopenssl_22.0.0.bb | 1 +
2 files changed, 107 insertions(+)
create mode 100644 meta/recipes-devtools/python/python3-pyopenssl/CVE-2026-27459.patch
diff --git a/meta/recipes-devtools/python/python3-pyopenssl/CVE-2026-27459.patch b/meta/recipes-devtools/python/python3-pyopenssl/CVE-2026-27459.patch
new file mode 100644
index 00000000000..b5e37a6900d
--- /dev/null
+++ b/meta/recipes-devtools/python/python3-pyopenssl/CVE-2026-27459.patch
@@ -0,0 +1,106 @@
+From 57f09bb4bb051d3bc2a1abd36e9525313d5cd408 Mon Sep 17 00:00:00 2001
+From: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Wed, 18 Feb 2026 07:46:15 -0500
+Subject: [PATCH] Fix buffer overflow in DTLS cookie generation callback
+ (#1479)
+
+The cookie generate callback copied user-returned bytes into a
+fixed-size native buffer without enforcing a maximum length. A
+callback returning more than DTLS1_COOKIE_LENGTH bytes would overflow
+the OpenSSL-provided buffer, corrupting adjacent memory.
+
+Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
+
+Upstream-Status: Backport [https://github.com/pyca/pyopenssl/commit/57f09bb4bb051d3bc2a1abd36e9525313d5cd408]
+CVE: CVE-2026-27459
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ CHANGELOG.rst | 1 +
+ src/OpenSSL/SSL.py | 7 +++++++
+ tests/test_ssl.py | 38 ++++++++++++++++++++++++++++++++++++++
+ 3 files changed, 46 insertions(+)
+
+diff --git a/CHANGELOG.rst b/CHANGELOG.rst
+index 5b6d523..13d8abd 100644
+--- a/CHANGELOG.rst
++++ b/CHANGELOG.rst
+@@ -20,6 +20,7 @@ Deprecations:
+ Changes:
+ ^^^^^^^^
+
++- Properly raise an error if a DTLS cookie callback returned a cookie longer than ``DTLS1_COOKIE_LENGTH`` bytes. Previously this would result in a buffer-overflow.
+ - ``Context.set_tlsext_servername_callback`` now handles exceptions raised in the callback by calling ``sys.excepthook`` and returning a fatal TLS alert. Previously, exceptions were silently swallowed and the handshake would proceed as if the callback had succeeded.
+
+ - Expose wrappers for some `DTLS
+diff --git a/src/OpenSSL/SSL.py b/src/OpenSSL/SSL.py
+index 6ef44d4..fa1b556 100644
+--- a/src/OpenSSL/SSL.py
++++ b/src/OpenSSL/SSL.py
+@@ -556,11 +556,18 @@ class _CookieGenerateCallbackHelper(_CallbackExceptionHelper):
+ def __init__(self, callback):
+ _CallbackExceptionHelper.__init__(self)
+
++ max_cookie_len = getattr(_lib, "DTLS1_COOKIE_LENGTH", 255)
++
+ @wraps(callback)
+ def wrapper(ssl, out, outlen):
+ try:
+ conn = Connection._reverse_mapping[ssl]
+ cookie = callback(conn)
++ if len(cookie) > max_cookie_len:
++ raise ValueError(
++ f"Cookie too long (got {len(cookie)} bytes, "
++ f"max {max_cookie_len})"
++ )
+ out[0 : len(cookie)] = cookie
+ outlen[0] = len(cookie)
+ return 1
+diff --git a/tests/test_ssl.py b/tests/test_ssl.py
+index 77e1876..fb77b75 100644
+--- a/tests/test_ssl.py
++++ b/tests/test_ssl.py
+@@ -4455,3 +4455,41 @@ class TestDTLS(object):
+ assert 0 < c.get_cleartext_mtu() < 500
+ except NotImplementedError: # OpenSSL 1.1.0 and earlier
+ pass
++
++ def test_cookie_generate_too_long(self) -> None:
++ s_ctx = Context(DTLS_METHOD)
++
++ def generate_cookie(ssl: Connection) -> bytes:
++ return b"\x00" * 256
++
++ def verify_cookie(ssl: Connection, cookie: bytes) -> bool:
++ return True
++
++ s_ctx.set_cookie_generate_callback(generate_cookie)
++ s_ctx.set_cookie_verify_callback(verify_cookie)
++ s_ctx.use_privatekey(load_privatekey(FILETYPE_PEM, server_key_pem))
++ s_ctx.use_certificate(load_certificate(FILETYPE_PEM, server_cert_pem))
++ s_ctx.set_options(OP_NO_QUERY_MTU)
++ s = Connection(s_ctx)
++ s.set_accept_state()
++
++ c_ctx = Context(DTLS_METHOD)
++ c_ctx.set_options(OP_NO_QUERY_MTU)
++ c = Connection(c_ctx)
++ c.set_connect_state()
++
++ c.set_ciphertext_mtu(1500)
++ s.set_ciphertext_mtu(1500)
++
++ # Client sends ClientHello
++ try:
++ c.do_handshake()
++ except SSL.WantReadError:
++ pass
++ chunk = c.bio_read(self.LARGE_BUFFER)
++ s.bio_write(chunk)
++
++ # Server tries DTLSv1_listen, which triggers cookie generation.
++ # The oversized cookie should raise ValueError.
++ with pytest.raises(ValueError, match="Cookie too long"):
++ s.DTLSv1_listen()
+--
+2.25.1
+
diff --git a/meta/recipes-devtools/python/python3-pyopenssl_22.0.0.bb b/meta/recipes-devtools/python/python3-pyopenssl_22.0.0.bb
index 13d87939b62..42de3207b46 100644
--- a/meta/recipes-devtools/python/python3-pyopenssl_22.0.0.bb
+++ b/meta/recipes-devtools/python/python3-pyopenssl_22.0.0.bb
@@ -12,6 +12,7 @@ inherit pypi setuptools3
SRC_URI += " \
file://CVE-2026-27448.patch \
+ file://CVE-2026-27459.patch \
"
PACKAGES =+ "${PN}-tests"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 11/18] libarchive: Fix CVE-2026-4111
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (9 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 10/18] python3-pyopenssl: Fix CVE-2026-27459 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 12/18] vim: Fix CVE-2026-33412 Yoann Congal
` (6 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Pick patch according to [1]
[1] https://security-tracker.debian.org/tracker/CVE-2026-4111
[2] https://github.com/libarchive/libarchive/pull/2877
[3] https://access.redhat.com/errata/RHSA-2026:5080
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../libarchive/CVE-2026-4111-1.patch | 32 ++
.../libarchive/CVE-2026-4111-2.patch | 308 ++++++++++++++++++
.../libarchive/libarchive_3.6.2.bb | 2 +
3 files changed, 342 insertions(+)
create mode 100644 meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch
create mode 100644 meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch
diff --git a/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch
new file mode 100644
index 00000000000..1f065b13648
--- /dev/null
+++ b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch
@@ -0,0 +1,32 @@
+From 7273d04803a1e5a482f26d8d0fbaf2b204a72168 Mon Sep 17 00:00:00 2001
+From: Tim Kientzle <kientzle@acm.org>
+Date: Sun, 1 Mar 2026 20:24:56 -0800
+Subject: [PATCH] Reject filters when the block length is nonsensical
+
+Credit: Grzegorz Antoniak @antekone
+
+Upstream-Status: Backport [https://github.com/libarchive/libarchive/commit/7273d04803a1e5a482f26d8d0fbaf2b204a72168]
+CVE: CVE-2026-4111
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ libarchive/archive_read_support_format_rar5.c | 4 +++-
+ 1 file changed, 3 insertions(+), 1 deletion(-)
+
+diff --git a/libarchive/archive_read_support_format_rar5.c b/libarchive/archive_read_support_format_rar5.c
+index 38979cb..867f0a8 100644
+--- a/libarchive/archive_read_support_format_rar5.c
++++ b/libarchive/archive_read_support_format_rar5.c
+@@ -2914,7 +2914,9 @@ static int parse_filter(struct archive_read* ar, const uint8_t* p) {
+ if(block_length < 4 ||
+ block_length > 0x400000 ||
+ filter_type > FILTER_ARM ||
+- !is_valid_filter_block_start(rar, block_start))
++ !is_valid_filter_block_start(rar, block_start) ||
++ (rar->cstate.window_size > 0 &&
++ (ssize_t)block_length > rar->cstate.window_size >> 1))
+ {
+ archive_set_error(&ar->archive, ARCHIVE_ERRNO_FILE_FORMAT,
+ "Invalid filter encountered");
+--
+2.25.1
+
diff --git a/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch
new file mode 100644
index 00000000000..243a03a8e5d
--- /dev/null
+++ b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch
@@ -0,0 +1,308 @@
+From ef53e2023d75a205cf7cbddb5d01c4cc592e9ce4 Mon Sep 17 00:00:00 2001
+From: Tim Kientzle <kientzle@acm.org>
+Date: Sun, 1 Mar 2026 10:04:01 -0800
+Subject: [PATCH] Infinite loop in Rar5 decompression
+
+Found by: Elhanan Haenel
+
+Upstream-Status: Backport [https://github.com/libarchive/libarchive/commit/ef53e2023d75a205cf7cbddb5d01c4cc592e9ce4]
+CVE: CVE-2026-4111
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ Makefile.am | 2 +
+ libarchive/test/CMakeLists.txt | 1 +
+ .../test/test_read_format_rar5_loop_bug.c | 53 +++++
+ .../test_read_format_rar5_loop_bug.rar.uu | 189 ++++++++++++++++++
+ 4 files changed, 245 insertions(+)
+ create mode 100644 libarchive/test/test_read_format_rar5_loop_bug.c
+ create mode 100644 libarchive/test/test_read_format_rar5_loop_bug.rar.uu
+
+diff --git a/Makefile.am b/Makefile.am
+index dd1620d..14edb2a 100644
+--- a/Makefile.am
++++ b/Makefile.am
+@@ -507,6 +507,7 @@ libarchive_test_SOURCES= \
+ libarchive/test/test_read_format_rar_invalid1.c \
+ libarchive/test/test_read_format_rar_overflow.c \
+ libarchive/test/test_read_format_rar5.c \
++ libarchive/test/test_read_format_rar5_loop_bug.c \
+ libarchive/test/test_read_format_raw.c \
+ libarchive/test/test_read_format_tar.c \
+ libarchive/test/test_read_format_tar_concatenated.c \
+@@ -869,6 +870,7 @@ libarchive_test_EXTRA_DIST=\
+ libarchive/test/test_read_format_rar5_invalid_dict_reference.rar.uu \
+ libarchive/test/test_read_format_rar5_leftshift1.rar.uu \
+ libarchive/test/test_read_format_rar5_leftshift2.rar.uu \
++ libarchive/test/test_read_format_rar5_loop_bug.rar.uu \
+ libarchive/test/test_read_format_rar5_multiarchive.part01.rar.uu \
+ libarchive/test/test_read_format_rar5_multiarchive.part02.rar.uu \
+ libarchive/test/test_read_format_rar5_multiarchive.part03.rar.uu \
+diff --git a/libarchive/test/CMakeLists.txt b/libarchive/test/CMakeLists.txt
+index 05c6fd7..c8f2e90 100644
+--- a/libarchive/test/CMakeLists.txt
++++ b/libarchive/test/CMakeLists.txt
+@@ -156,6 +156,7 @@ IF(ENABLE_TEST)
+ test_read_format_rar_filter.c
+ test_read_format_rar_overflow.c
+ test_read_format_rar5.c
++ test_read_format_rar5_loop_bug.c
+ test_read_format_raw.c
+ test_read_format_tar.c
+ test_read_format_tar_concatenated.c
+diff --git a/libarchive/test/test_read_format_rar5_loop_bug.c b/libarchive/test/test_read_format_rar5_loop_bug.c
+new file mode 100644
+index 0000000..77dd78c
+--- /dev/null
++++ b/libarchive/test/test_read_format_rar5_loop_bug.c
+@@ -0,0 +1,53 @@
++/*-
++ * Copyright (c) 2026 Tim Kientzle
++ * All rights reserved.
++ *
++ * Redistribution and use in source and binary forms, with or without
++ * modification, are permitted provided that the following conditions
++ * are met:
++ * 1. Redistributions of source code must retain the above copyright
++ * notice, this list of conditions and the following disclaimer.
++ * 2. Redistributions in binary form must reproduce the above copyright
++ * notice, this list of conditions and the following disclaimer in the
++ * documentation and/or other materials provided with the distribution.
++ *
++ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
++ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
++ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
++ * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
++ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
++ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
++ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
++ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
++ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
++ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
++ */
++#include "test.h"
++
++DEFINE_TEST(test_read_format_rar5_loop_bug)
++{
++ const char *reffile = "test_read_format_rar5_loop_bug.rar";
++ struct archive_entry *ae;
++ struct archive *a;
++ const void *buf;
++ size_t size;
++ la_int64_t offset;
++
++ extract_reference_file(reffile);
++ assert((a = archive_read_new()) != NULL);
++ assertEqualIntA(a, ARCHIVE_OK, archive_read_support_filter_all(a));
++ assertEqualIntA(a, ARCHIVE_OK, archive_read_support_format_all(a));
++ assertEqualIntA(a, ARCHIVE_OK, archive_read_open_filename(a, reffile, 10240));
++
++ // This has just one entry
++ assertEqualIntA(a, ARCHIVE_OK, archive_read_next_header(a, &ae));
++
++ // Read blocks until the end of the entry
++ while (ARCHIVE_OK == archive_read_data_block(a, &buf, &size, &offset)) {
++ }
++
++ assertEqualIntA(a, ARCHIVE_EOF, archive_read_next_header(a, &ae));
++
++ assertEqualIntA(a, ARCHIVE_OK, archive_read_close(a));
++ assertEqualInt(ARCHIVE_OK, archive_free(a));
++}
+diff --git a/libarchive/test/test_read_format_rar5_loop_bug.rar.uu b/libarchive/test/test_read_format_rar5_loop_bug.rar.uu
+new file mode 100644
+index 0000000..3e47004
+--- /dev/null
++++ b/libarchive/test/test_read_format_rar5_loop_bug.rar.uu
+@@ -0,0 +1,189 @@
++begin 644 test_read_format_rar5_loop_bug.rar
++M4F%R(1H'`0#%&C,R`P$``)T-9%L.`@+P0`"`@`P`@`,``6'(WFP@`?\7_U/^
++M8@!.`B`H````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++5```````````````````Y^;*!`@4`
++`
++end
+--
+2.25.1
+
diff --git a/meta/recipes-extended/libarchive/libarchive_3.6.2.bb b/meta/recipes-extended/libarchive/libarchive_3.6.2.bb
index e74326b40fd..85fe6e5baa2 100644
--- a/meta/recipes-extended/libarchive/libarchive_3.6.2.bb
+++ b/meta/recipes-extended/libarchive/libarchive_3.6.2.bb
@@ -50,6 +50,8 @@ SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz \
file://0001-Merge-pull-request-2768-from-Commandoss-master.patch \
file://CVE-2025-60753-01.patch \
file://CVE-2025-60753-02.patch \
+ file://CVE-2026-4111-1.patch \
+ file://CVE-2026-4111-2.patch \
"
UPSTREAM_CHECK_URI = "http://libarchive.org/"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 12/18] vim: Fix CVE-2026-33412
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (10 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 11/18] libarchive: Fix CVE-2026-4111 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 13/18] sqlite3: Fix CVE-2025-70873 Yoann Congal
` (5 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Hitendra Prajapati <hprajapati@mvista.com>
Pick patch from [1] also mentioned in NVD report with [2]
[1] https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a
[2] https://nvd.nist.gov/vuln/detail/CVE-2026-33412
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../vim/files/CVE-2026-33412.patch | 61 +++++++++++++++++++
meta/recipes-support/vim/vim.inc | 1 +
2 files changed, 62 insertions(+)
create mode 100644 meta/recipes-support/vim/files/CVE-2026-33412.patch
diff --git a/meta/recipes-support/vim/files/CVE-2026-33412.patch b/meta/recipes-support/vim/files/CVE-2026-33412.patch
new file mode 100644
index 00000000000..62daa308b58
--- /dev/null
+++ b/meta/recipes-support/vim/files/CVE-2026-33412.patch
@@ -0,0 +1,61 @@
+From 645ed6597d1ea896c712cd7ddbb6edee79577e9a Mon Sep 17 00:00:00 2001
+From: pyllyukko <pyllyukko@maimed.org>
+Date: Thu, 19 Mar 2026 19:58:05 +0000
+Subject: [PATCH] patch 9.2.0202: [security]: command injection via newline in
+ glob()
+
+Problem: The glob() function on Unix-like systems does not escape
+ newline characters when expanding wildcards. A maliciously
+ crafted string containing '\n' can be used as a command
+ separator to execute arbitrary shell commands via
+ mch_expand_wildcards(). This depends on the user's 'shell'
+ setting.
+Solution: Add the newline character ('\n') to the SHELL_SPECIAL
+ definition to ensure it is properly escaped before being
+ passed to the shell (pyllyukko).
+
+closes: #19746
+
+Github Advisory:
+https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c
+
+Signed-off-by: pyllyukko <pyllyukko@maimed.org>
+Signed-off-by: Christian Brabandt <cb@256bit.org>
+
+CVE: CVE-2026-33412
+Upstream-Status: Backport [https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a]
+Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
+---
+ src/os_unix.c | 2 +-
+ src/version.c | 2 ++
+ 2 files changed, 3 insertions(+), 1 deletion(-)
+
+diff --git a/src/os_unix.c b/src/os_unix.c
+index cf195e62e1..d767956b1a 100644
+--- a/src/os_unix.c
++++ b/src/os_unix.c
+@@ -7106,7 +7106,7 @@ mch_expandpath(
+ # define SEEK_END 2
+ #endif
+
+-#define SHELL_SPECIAL (char_u *)"\t \"&'$;<>()\\|"
++# define SHELL_SPECIAL (char_u *)"\t \"&'$;<>()\\|\n"
+
+ int
+ mch_expand_wildcards(
+diff --git a/src/version.c b/src/version.c
+index 4f3912aedd..712a3e637c 100644
+--- a/src/version.c
++++ b/src/version.c
+@@ -724,6 +724,8 @@ static char *(features[]) =
+
+ static int included_patches[] =
+ { /* Add new patch number below this line */
++/**/
++ 1684,
+ /**/
+ 1683,
+ /**/
+--
+2.50.1
+
diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc
index 289f31be707..fc9b4db055a 100644
--- a/meta/recipes-support/vim/vim.inc
+++ b/meta/recipes-support/vim/vim.inc
@@ -16,6 +16,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \
file://disable_acl_header_check.patch \
file://0001-src-Makefile-improve-reproducibility.patch \
file://no-path-adjust.patch \
+ file://CVE-2026-33412.patch \
"
PV .= ".1683"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 13/18] sqlite3: Fix CVE-2025-70873
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (11 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 12/18] vim: Fix CVE-2026-33412 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 14/18] curl: patch CVE-2025-14524 Yoann Congal
` (4 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Pick patch as per [1]
[1] https://sqlite.org/src/info/3d459f1fb1bd1b5e
[2] https://sqlite.org/forum/forumpost/761eac3c82
[3] https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../sqlite/files/CVE-2025-70873.patch | 33 +++++++++++++++++++
meta/recipes-support/sqlite/sqlite3_3.38.5.bb | 1 +
2 files changed, 34 insertions(+)
create mode 100644 meta/recipes-support/sqlite/files/CVE-2025-70873.patch
diff --git a/meta/recipes-support/sqlite/files/CVE-2025-70873.patch b/meta/recipes-support/sqlite/files/CVE-2025-70873.patch
new file mode 100644
index 00000000000..86004c0b741
--- /dev/null
+++ b/meta/recipes-support/sqlite/files/CVE-2025-70873.patch
@@ -0,0 +1,33 @@
+From 5a05c59d4d75c03f23d5fb70feac9f789954bf8a Mon Sep 17 00:00:00 2001
+From: drh <>
+Date: Sat, 6 Dec 2025 20:41:24 +0000
+Subject: [PATCH] In the zipfile extension, only return as many bytes as
+ Inflate actually generated. [forum:/forumpost/761eac3c82|Forum post
+ 761eac3c82]. Adjust ./configure so that it builds zipfile into testfixture if
+ ZLIB is available, so that tests get run on unix platforms.
+
+FossilOrigin-Name: 3d459f1fb1bd1b5e723629c463ab392af7b206ece3388bda216c6a4c26160909
+
+Upstream-Status: Backport [https://github.com/sqlite/sqlite/commit/5a05c59d4d75c03f23d5fb70feac9f789954bf8a]
+CVE: CVE-2025-70873
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ shell.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/shell.c b/shell.c
+index fa45d40..3c4902c 100644
+--- a/shell.c
++++ b/shell.c
+@@ -7668,7 +7668,7 @@ static void zipfileInflate(
+ if( err!=Z_STREAM_END ){
+ zipfileCtxErrorMsg(pCtx, "inflate() failed (%d)", err);
+ }else{
+- sqlite3_result_blob(pCtx, aRes, nOut, zipfileFree);
++ sqlite3_result_blob(pCtx, aRes, (int)str.total_out, zipfileFree);
+ aRes = 0;
+ }
+ }
+--
+2.25.1
+
diff --git a/meta/recipes-support/sqlite/sqlite3_3.38.5.bb b/meta/recipes-support/sqlite/sqlite3_3.38.5.bb
index acdd80022e1..9e10caa399a 100644
--- a/meta/recipes-support/sqlite/sqlite3_3.38.5.bb
+++ b/meta/recipes-support/sqlite/sqlite3_3.38.5.bb
@@ -10,6 +10,7 @@ SRC_URI = "http://www.sqlite.org/2022/sqlite-autoconf-${SQLITE_PV}.tar.gz \
file://CVE-2023-7104.patch \
file://CVE-2025-29088.patch \
file://CVE-2025-6965.patch \
+ file://CVE-2025-70873.patch \
"
SRC_URI[sha256sum] = "5af07de982ba658fd91a03170c945f99c971f6955bc79df3266544373e39869c"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 14/18] curl: patch CVE-2025-14524
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (12 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 13/18] sqlite3: Fix CVE-2025-70873 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 15/18] curl: patch CVE-2026-1965 Yoann Congal
` (3 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Pick commit per [1].
[1] https://curl.se/docs/CVE-2025-14524.html
[2] https://security-tracker.debian.org/tracker/CVE-2025-14524
Signed-off-by: Amaury Couderc <amaury.couderc@est.tech>
Signed-off-by: Paul Barker <paul@pbarker.dev>
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
[YC: cherry-picked from scarthgap commit 951113a6e8185969444b5e28292f23434dba1f6c]
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../curl/curl/CVE-2025-14524.patch | 42 +++++++++++++++++++
meta/recipes-support/curl/curl_7.82.0.bb | 1 +
2 files changed, 43 insertions(+)
create mode 100644 meta/recipes-support/curl/curl/CVE-2025-14524.patch
diff --git a/meta/recipes-support/curl/curl/CVE-2025-14524.patch b/meta/recipes-support/curl/curl/CVE-2025-14524.patch
new file mode 100644
index 00000000000..0ab77ade9d5
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2025-14524.patch
@@ -0,0 +1,42 @@
+From b3e2318ff3cbe4a9babe5b6875916a429bd584be Mon Sep 17 00:00:00 2001
+From: Daniel Stenberg <daniel@haxx.se>
+Date: Wed, 10 Dec 2025 11:40:47 +0100
+Subject: [PATCH] curl_sasl: if redirected, require permission to use bearer
+
+Closes #19933
+
+CVE: CVE-2025-14524
+Upstream-Status: Backport [https://github.com/curl/curl/commit/1a822275d333dc6da6043497160fd04c8fa48640]
+
+Signed-off-by: Amaury Couderc <amaury.couderc@est.tech>
+
+---
+ lib/curl_sasl.c | 8 ++++++--
+ 1 file changed, 6 insertions(+), 2 deletions(-)
+
+diff --git a/lib/curl_sasl.c b/lib/curl_sasl.c
+index 7e28c92..f0b0341 100644
+--- a/lib/curl_sasl.c
++++ b/lib/curl_sasl.c
+@@ -345,7 +345,9 @@ CURLcode Curl_sasl_start(struct SASL *sasl, struct Curl_easy *data,
+ data->set.str[STRING_SERVICE_NAME] :
+ sasl->params->service;
+ #endif
+- const char *oauth_bearer = data->set.str[STRING_BEARER];
++ const char *oauth_bearer =
++ (!data->state.this_is_a_follow || data->set.allow_auth_to_other_hosts) ?
++ data->set.str[STRING_BEARER] : NULL;
+ struct bufref nullmsg;
+
+ Curl_bufref_init(&nullmsg);
+@@ -531,7 +533,9 @@ CURLcode Curl_sasl_continue(struct SASL *sasl, struct Curl_easy *data,
+ data->set.str[STRING_SERVICE_NAME] :
+ sasl->params->service;
+ #endif
+- const char *oauth_bearer = data->set.str[STRING_BEARER];
++ const char *oauth_bearer =
++ (!data->state.this_is_a_follow || data->set.allow_auth_to_other_hosts) ?
++ data->set.str[STRING_BEARER] : NULL;
+ struct bufref serverdata;
+
+ Curl_bufref_init(&serverdata);
diff --git a/meta/recipes-support/curl/curl_7.82.0.bb b/meta/recipes-support/curl/curl_7.82.0.bb
index 72bd1a20881..b8fa8b5266a 100644
--- a/meta/recipes-support/curl/curl_7.82.0.bb
+++ b/meta/recipes-support/curl/curl_7.82.0.bb
@@ -70,6 +70,7 @@ SRC_URI = "https://curl.se/download/${BP}.tar.xz \
file://CVE-2025-14017.patch \
file://CVE-2025-15079.patch \
file://CVE-2025-15224.patch \
+ file://CVE-2025-14524.patch \
"
SRC_URI[sha256sum] = "0aaa12d7bd04b0966254f2703ce80dd5c38dbbd76af0297d3d690cdce58a583c"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 15/18] curl: patch CVE-2026-1965
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (13 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 14/18] curl: patch CVE-2025-14524 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 16/18] curl: patch CVE-2026-3783 Yoann Congal
` (2 subsequent siblings)
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
pick patches from ubuntu per [1]
[1] https://launchpad.net/ubuntu/+archive/primary/+sourcefiles/curl/7.81.0-1ubuntu1.23/curl_7.81.0-1ubuntu1.23.debian.tar.xz
[2] https://ubuntu.com/security/CVE-2026-1965
[3] https://curl.se/docs/CVE-2026-1965.html
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../curl/curl/CVE-2026-1965-1.patch | 98 +++++++++++++++++++
.../curl/curl/CVE-2026-1965-2.patch | 29 ++++++
meta/recipes-support/curl/curl_7.82.0.bb | 2 +
3 files changed, 129 insertions(+)
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-1965-1.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-1965-2.patch
diff --git a/meta/recipes-support/curl/curl/CVE-2026-1965-1.patch b/meta/recipes-support/curl/curl/CVE-2026-1965-1.patch
new file mode 100644
index 00000000000..1d0f5c59e8d
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2026-1965-1.patch
@@ -0,0 +1,98 @@
+From 34fa034d9a390c4bd65e2d05262755ec8646ac12 Mon Sep 17 00:00:00 2001
+From: Daniel Stenberg <daniel@haxx.se>
+Date: Thu, 5 Feb 2026 08:34:21 +0100
+Subject: [PATCH] url: fix reuse of connections using HTTP Negotiate
+
+Assume Negotiate means connection-based
+
+Reported-by: Zhicheng Chen
+Closes #20534
+
+Upstream-Status: Backport [https://github.com/curl/curl/commit/34fa034d9a390c4bd6]
+Backported by Ubuntu team https://launchpad.net/ubuntu/+archive/primary/+sourcefiles/curl/7.81.0-1ubuntu1.23/curl_7.81.0-1ubuntu1.23.debian.tar.xz
+
+CVE: CVE-2026-1965
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ lib/url.c | 87 +++++++++++++++++++++++++++++++++++++++++++++++++++----
+ 1 file changed, 82 insertions(+), 5 deletions(-)
+
+--- a/lib/url.c
++++ b/lib/url.c
+@@ -1145,6 +1145,18 @@ ConnectionExists(struct Curl_easy *data,
+ #endif
+ #endif
+
++#if !defined(CURL_DISABLE_HTTP) && defined(USE_SPNEGO)
++ bool wantNegohttp =
++ (data->state.authhost.want & CURLAUTH_NEGOTIATE) &&
++ (needle->handler->protocol & PROTO_FAMILY_HTTP);
++#ifndef CURL_DISABLE_PROXY
++ bool wantProxyNegohttp =
++ needle->bits.proxy_user_passwd &&
++ (data->state.authproxy.want & CURLAUTH_NEGOTIATE) &&
++ (needle->handler->protocol & PROTO_FAMILY_HTTP);
++#endif
++#endif
++
+ *force_reuse = FALSE;
+ *waitpipe = FALSE;
+
+@@ -1496,6 +1508,57 @@ ConnectionExists(struct Curl_easy *data,
+ continue;
+ }
+ #endif
++
++#ifdef USE_SPNEGO
++ /* If we are looking for an HTTP+Negotiate connection, check if this is
++ already authenticating with the right credentials. If not, keep looking
++ so that we can reuse Negotiate connections if possible. */
++ if(wantNegohttp) {
++ if(Curl_timestrcmp(needle->user, check->user) ||
++ Curl_timestrcmp(needle->passwd, check->passwd))
++ continue;
++ }
++ else if(check->http_negotiate_state != GSS_AUTHNONE) {
++ /* Connection is using Negotiate auth but we do not want Negotiate */
++ continue;
++ }
++
++#ifndef CURL_DISABLE_PROXY
++ /* Same for Proxy Negotiate authentication */
++ if(wantProxyNegohttp) {
++ /* Both check->http_proxy.user and check->http_proxy.passwd can be
++ * NULL */
++ if(!check->http_proxy.user || !check->http_proxy.passwd)
++ continue;
++
++ if(Curl_timestrcmp(needle->http_proxy.user,
++ check->http_proxy.user) ||
++ Curl_timestrcmp(needle->http_proxy.passwd,
++ check->http_proxy.passwd))
++ continue;
++ }
++ else if(check->proxy_negotiate_state != GSS_AUTHNONE) {
++ /* Proxy connection is using Negotiate auth but we do not want Negotiate */
++ continue;
++ }
++#endif
++ if(wantNTLMhttp || wantProxyNTLMhttp) {
++ /* Credentials are already checked, we may use this connection. We MUST
++ * use a connection where it has already been fully negotiated. If it has
++ * not, we keep on looking for a better one. */
++ chosen = check;
++ if((wantNegohttp &&
++ (check->http_negotiate_state != GSS_AUTHNONE)) ||
++ (wantProxyNegohttp &&
++ (check->proxy_negotiate_state != GSS_AUTHNONE))) {
++ /* We must use this connection, no other */
++ *force_reuse = TRUE;
++ break;
++ }
++ continue; /* get another */
++ }
++#endif
++
+ if(canmultiplex) {
+ /* We can multiplex if we want to. Let's continue looking for
+ the optimal connection to use. */
diff --git a/meta/recipes-support/curl/curl/CVE-2026-1965-2.patch b/meta/recipes-support/curl/curl/CVE-2026-1965-2.patch
new file mode 100644
index 00000000000..fa5fefd2517
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2026-1965-2.patch
@@ -0,0 +1,29 @@
+From f1a39f221d57354990e3eeeddc3404aede2aff70 Mon Sep 17 00:00:00 2001
+From: Daniel Stenberg <daniel@haxx.se>
+Date: Sat, 21 Feb 2026 18:11:41 +0100
+Subject: [PATCH] url: fix copy and paste url_match_auth_nego mistake
+
+Follow-up to 34fa034
+Reported-by: dahmono on github
+Closes #20662
+
+Upstream-Status: Backport [https://github.com/curl/curl/commit/f1a39f221d57354990]
+Backported by Ubuntu team https://launchpad.net/ubuntu/+archive/primary/+sourcefiles/curl/7.81.0-1ubuntu1.23/curl_7.81.0-1ubuntu1.23.debian.tar.xz
+
+CVE: CVE-2026-1965
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ lib/url.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/lib/url.c
++++ b/lib/url.c
+@@ -1542,7 +1542,7 @@ ConnectionExists(struct Curl_easy *data,
+ continue;
+ }
+ #endif
+- if(wantNTLMhttp || wantProxyNTLMhttp) {
++ if(wantNegohttp || wantProxyNegohttp) {
+ /* Credentials are already checked, we may use this connection. We MUST
+ * use a connection where it has already been fully negotiated. If it has
+ * not, we keep on looking for a better one. */
diff --git a/meta/recipes-support/curl/curl_7.82.0.bb b/meta/recipes-support/curl/curl_7.82.0.bb
index b8fa8b5266a..0e107f1e753 100644
--- a/meta/recipes-support/curl/curl_7.82.0.bb
+++ b/meta/recipes-support/curl/curl_7.82.0.bb
@@ -71,6 +71,8 @@ SRC_URI = "https://curl.se/download/${BP}.tar.xz \
file://CVE-2025-15079.patch \
file://CVE-2025-15224.patch \
file://CVE-2025-14524.patch \
+ file://CVE-2026-1965-1.patch \
+ file://CVE-2026-1965-2.patch \
"
SRC_URI[sha256sum] = "0aaa12d7bd04b0966254f2703ce80dd5c38dbbd76af0297d3d690cdce58a583c"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 16/18] curl: patch CVE-2026-3783
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (14 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 15/18] curl: patch CVE-2026-1965 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 17/18] curl: patch CVE-2026-3784 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 18/18] scripts/install-buildtools: Update to 4.0.34 Yoann Congal
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
CVE-2026-3783-pre1.patch is dependency patch for CVE-2026-3783.patch
cherry picked from upstream commit:
https://github.com/curl/curl/commit/d7b970e46ba29a7e558e21d19f485977ffed6266
https://github.com/curl/curl/commit/e3d7401a32a46516c9e5ee877
Reference: https://curl.se/docs/CVE-2026-3783.html
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../curl/curl/CVE-2026-3783-pre1.patch | 66 ++++++++
.../curl/curl/CVE-2026-3783.patch | 157 ++++++++++++++++++
meta/recipes-support/curl/curl_7.82.0.bb | 2 +
3 files changed, 225 insertions(+)
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-3783-pre1.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-3783.patch
diff --git a/meta/recipes-support/curl/curl/CVE-2026-3783-pre1.patch b/meta/recipes-support/curl/curl/CVE-2026-3783-pre1.patch
new file mode 100644
index 00000000000..746e5d9ab6c
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2026-3783-pre1.patch
@@ -0,0 +1,66 @@
+From d7b970e46ba29a7e558e21d19f485977ffed6266 Mon Sep 17 00:00:00 2001
+From: Daniel Stenberg <daniel@haxx.se>
+Date: Fri, 29 Apr 2022 22:56:47 +0200
+Subject: [PATCH] http: move Curl_allow_auth_to_host()
+
+It was mistakenly put within the CURL_DISABLE_HTTP_AUTH #ifdef
+
+Reported-by: Michael Olbrich
+Fixes #8772
+Closes #8775
+
+Upstream-Status: Backport [https://github.com/curl/curl/commit/d7b970e46ba29a7e558e21d19f485977ffed6266]
+CVE: CVE-2026-3783 #Dependency Patch
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ lib/http.c | 30 +++++++++++++++---------------
+ 1 file changed, 15 insertions(+), 15 deletions(-)
+
+diff --git a/lib/http.c b/lib/http.c
+index 0d5c449bc72a..b215307dcaaa 100644
+--- a/lib/http.c
++++ b/lib/http.c
+@@ -651,6 +651,21 @@ CURLcode Curl_http_auth_act(struct Curl_easy *data)
+ return result;
+ }
+
++/*
++ * Curl_allow_auth_to_host() tells if authentication, cookies or other
++ * "sensitive data" can (still) be sent to this host.
++ */
++bool Curl_allow_auth_to_host(struct Curl_easy *data)
++{
++ struct connectdata *conn = data->conn;
++ return (!data->state.this_is_a_follow ||
++ data->set.allow_auth_to_other_hosts ||
++ (data->state.first_host &&
++ strcasecompare(data->state.first_host, conn->host.name) &&
++ (data->state.first_remote_port == conn->remote_port) &&
++ (data->state.first_remote_protocol == conn->handler->protocol)));
++}
++
+ #ifndef CURL_DISABLE_HTTP_AUTH
+ /*
+ * Output the correct authentication header depending on the auth type
+@@ -775,21 +790,6 @@ output_auth_headers(struct Curl_easy *data,
+ return CURLE_OK;
+ }
+
+-/*
+- * Curl_allow_auth_to_host() tells if authentication, cookies or other
+- * "sensitive data" can (still) be sent to this host.
+- */
+-bool Curl_allow_auth_to_host(struct Curl_easy *data)
+-{
+- struct connectdata *conn = data->conn;
+- return (!data->state.this_is_a_follow ||
+- data->set.allow_auth_to_other_hosts ||
+- (data->state.first_host &&
+- strcasecompare(data->state.first_host, conn->host.name) &&
+- (data->state.first_remote_port == conn->remote_port) &&
+- (data->state.first_remote_protocol == conn->handler->protocol)));
+-}
+-
+ /**
+ * Curl_http_output_auth() setups the authentication headers for the
+ * host/proxy and the correct authentication
diff --git a/meta/recipes-support/curl/curl/CVE-2026-3783.patch b/meta/recipes-support/curl/curl/CVE-2026-3783.patch
new file mode 100644
index 00000000000..769198d6883
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2026-3783.patch
@@ -0,0 +1,157 @@
+From e3d7401a32a46516c9e5ee877e613e62ed35bddc Mon Sep 17 00:00:00 2001
+From: Daniel Stenberg <daniel@haxx.se>
+Date: Fri, 6 Mar 2026 23:13:07 +0100
+Subject: [PATCH] http: only send bearer if auth is allowed
+
+Verify with test 2006
+
+Closes #20843
+
+Curl_auth_allowed_to_host() function got renamed from
+Curl_allow_auth_to_host() by the commit
+https://github.com/curl/curl/commit/72652c0613d37ce18e99cca17a42887f12ad43da
+
+Current curl version 7.82.0 has function Curl_allow_auth_to_host()
+
+Upstream-Status: Backport [https://github.com/curl/curl/commit/e3d7401a32a46516c9e5ee877]
+CVE: CVE-2026-3783
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ lib/http.c | 1 +
+ tests/data/Makefile.inc | 2 +-
+ tests/data/test2006 | 98 +++++++++++++++++++++++++++++++++++++++++
+ 3 files changed, 100 insertions(+), 1 deletion(-)
+ create mode 100644 tests/data/test2006
+
+diff --git a/lib/http.c b/lib/http.c
+index 691091b..6acd537 100644
+--- a/lib/http.c
++++ b/lib/http.c
+@@ -757,6 +757,7 @@ output_auth_headers(struct Curl_easy *data,
+ if(authstatus->picked == CURLAUTH_BEARER) {
+ /* Bearer */
+ if((!proxy && data->set.str[STRING_BEARER] &&
++ Curl_allow_auth_to_host(data) &&
+ !Curl_checkheaders(data, STRCONST("Authorization")))) {
+ auth = "Bearer";
+ result = http_output_bearer(data);
+diff --git a/tests/data/Makefile.inc b/tests/data/Makefile.inc
+index ad41a5e..e641cb8 100644
+--- a/tests/data/Makefile.inc
++++ b/tests/data/Makefile.inc
+@@ -221,7 +221,7 @@ test1916 test1917 test1918 \
+ \
+ test1933 test1934 test1935 test1936 test1937 test1938 test1939 \
+ \
+-test2000 test2001 test2002 test2003 test2004 \
++test2000 test2001 test2002 test2003 test2004 test2006 \
+ \
+ test2023 \
+ test2024 test2025 test2026 test2027 test2028 test2029 test2030 test2031 \
+diff --git a/tests/data/test2006 b/tests/data/test2006
+new file mode 100644
+index 0000000..200d30a
+--- /dev/null
++++ b/tests/data/test2006
+@@ -0,0 +1,98 @@
++<?xml version="1.0" encoding="US-ASCII"?>
++<testcase>
++<info>
++<keywords>
++netrc
++HTTP
++</keywords>
++</info>
++# Server-side
++<reply>
++<data crlf="headers">
++HTTP/1.1 301 Follow this you fool
++Date: Tue, 09 Nov 2010 14:49:00 GMT
++Server: test-server/fake
++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
++ETag: "21025-dc7-39462498"
++Accept-Ranges: bytes
++Content-Length: 6
++Connection: close
++Location: http://b.com/%TESTNUMBER0002
++
++-foo-
++</data>
++
++<data2 crlf="headers">
++HTTP/1.1 200 OK
++Date: Tue, 09 Nov 2010 14:49:00 GMT
++Server: test-server/fake
++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
++ETag: "21025-dc7-39462498"
++Accept-Ranges: bytes
++Content-Length: 7
++Connection: close
++
++target
++</data2>
++
++<datacheck crlf="headers">
++HTTP/1.1 301 Follow this you fool
++Date: Tue, 09 Nov 2010 14:49:00 GMT
++Server: test-server/fake
++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
++ETag: "21025-dc7-39462498"
++Accept-Ranges: bytes
++Content-Length: 6
++Connection: close
++Location: http://b.com/%TESTNUMBER0002
++
++HTTP/1.1 200 OK
++Date: Tue, 09 Nov 2010 14:49:00 GMT
++Server: test-server/fake
++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
++ETag: "21025-dc7-39462498"
++Accept-Ranges: bytes
++Content-Length: 7
++Connection: close
++
++target
++</datacheck>
++</reply>
++
++# Client-side
++<client>
++<server>
++http
++</server>
++<features>
++proxy
++</features>
++<name>
++.netrc default with redirect plus oauth2-bearer
++</name>
++<command>
++--netrc --netrc-file %LOGDIR/netrc%TESTNUMBER --oauth2-bearer SECRET_TOKEN -L -x http://%HOSTIP:%HTTPPORT/ http://a.com/
++</command>
++<file name="%LOGDIR/netrc%TESTNUMBER" >
++default login testuser password testpass
++</file>
++</client>
++
++<verify>
++<protocol crlf="headers">
++GET http://a.com/ HTTP/1.1
++Host: a.com
++Authorization: Bearer SECRET_TOKEN
++User-Agent: curl/%VERSION
++Accept: */*
++Proxy-Connection: Keep-Alive
++
++GET http://b.com/%TESTNUMBER0002 HTTP/1.1
++Host: b.com
++User-Agent: curl/%VERSION
++Accept: */*
++Proxy-Connection: Keep-Alive
++
++</protocol>
++</verify>
++</testcase>
+--
+2.25.1
+
diff --git a/meta/recipes-support/curl/curl_7.82.0.bb b/meta/recipes-support/curl/curl_7.82.0.bb
index 0e107f1e753..f50af1d4722 100644
--- a/meta/recipes-support/curl/curl_7.82.0.bb
+++ b/meta/recipes-support/curl/curl_7.82.0.bb
@@ -73,6 +73,8 @@ SRC_URI = "https://curl.se/download/${BP}.tar.xz \
file://CVE-2025-14524.patch \
file://CVE-2026-1965-1.patch \
file://CVE-2026-1965-2.patch \
+ file://CVE-2026-3783-pre1.patch \
+ file://CVE-2026-3783.patch \
"
SRC_URI[sha256sum] = "0aaa12d7bd04b0966254f2703ce80dd5c38dbbd76af0297d3d690cdce58a583c"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 17/18] curl: patch CVE-2026-3784
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (15 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 16/18] curl: patch CVE-2026-3783 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 18/18] scripts/install-buildtools: Update to 4.0.34 Yoann Congal
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
pick patch from ubuntu per [1]
[1] https://launchpad.net/ubuntu/+archive/primary/+sourcefiles/curl/7.81.0-1ubuntu1.23/curl_7.81.0-1ubuntu1.23.debian.tar.xz
[2] https://ubuntu.com/security/CVE-2026-3784
[3] https://curl.se/docs/CVE-2026-3784.html
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../curl/curl/CVE-2026-3784.patch | 73 +++++++++++++++++++
meta/recipes-support/curl/curl_7.82.0.bb | 1 +
2 files changed, 74 insertions(+)
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-3784.patch
diff --git a/meta/recipes-support/curl/curl/CVE-2026-3784.patch b/meta/recipes-support/curl/curl/CVE-2026-3784.patch
new file mode 100644
index 00000000000..95784e47637
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2026-3784.patch
@@ -0,0 +1,73 @@
+From 5f13a7645e565c5c1a06f3ef86e97afb856fb364 Mon Sep 17 00:00:00 2001
+From: Stefan Eissing <stefan@eissing.org>
+Date: Fri, 6 Mar 2026 14:54:09 +0100
+Subject: [PATCH] proxy-auth: additional tests
+
+Also eliminate the special handling for socks proxy match.
+
+Closes #20837
+
+Upstream-Status: Backport [https://github.com/curl/curl/commit/5f13a7645e565c5c1a06f3]
+Backported by Ubuntu team https://launchpad.net/ubuntu/+archive/primary/+sourcefiles/curl/7.81.0-1ubuntu1.23/curl_7.81.0-1ubuntu1.23.debian.tar.xz
+
+CVE: CVE-2026-3784
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ lib/url.c | 28 +++++++---------------------
+ tests/http/test_13_proxy_auth.py | 20 ++++++++++++++++++++
+ tests/http/testenv/curl.py | 18 +++++++++++++++---
+ 3 files changed, 42 insertions(+), 24 deletions(-)
+
+--- a/lib/url.c
++++ b/lib/url.c
+@@ -930,33 +930,15 @@ proxy_info_matches(const struct proxy_in
+ {
+ if((data->proxytype == needle->proxytype) &&
+ (data->port == needle->port) &&
+- Curl_safe_strcasecompare(data->host.name, needle->host.name))
+- return TRUE;
++ curl_strequal(data->host.name, needle->host.name)) {
+
++ if(Curl_timestrcmp(data->user, needle->user) ||
++ Curl_timestrcmp(data->passwd, needle->passwd))
++ return FALSE;
++ return TRUE;
++ }
+ return FALSE;
+ }
+-
+-static bool
+-socks_proxy_info_matches(const struct proxy_info *data,
+- const struct proxy_info *needle)
+-{
+- if(!proxy_info_matches(data, needle))
+- return FALSE;
+-
+- /* the user information is case-sensitive
+- or at least it is not defined as case-insensitive
+- see https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.1 */
+-
+- /* curl_strequal does a case insentive comparison, so do not use it here! */
+- if(Curl_timestrcmp(data->user, needle->user) ||
+- Curl_timestrcmp(data->passwd, needle->passwd))
+- return FALSE;
+- return TRUE;
+-}
+-#else
+-/* disabled, won't get called */
+-#define proxy_info_matches(x,y) FALSE
+-#define socks_proxy_info_matches(x,y) FALSE
+ #endif
+
+ /* A connection has to have been idle for a shorter time than 'maxage_conn'
+@@ -1282,8 +1264,8 @@ ConnectionExists(struct Curl_easy *data,
+ continue;
+
+ if(needle->bits.socksproxy &&
+- !socks_proxy_info_matches(&needle->socks_proxy,
+- &check->socks_proxy))
++ !proxy_info_matches(&needle->socks_proxy,
++ &check->socks_proxy))
+ continue;
+ #endif
+ if(needle->bits.conn_to_host != check->bits.conn_to_host)
diff --git a/meta/recipes-support/curl/curl_7.82.0.bb b/meta/recipes-support/curl/curl_7.82.0.bb
index f50af1d4722..a2ee5736810 100644
--- a/meta/recipes-support/curl/curl_7.82.0.bb
+++ b/meta/recipes-support/curl/curl_7.82.0.bb
@@ -75,6 +75,7 @@ SRC_URI = "https://curl.se/download/${BP}.tar.xz \
file://CVE-2026-1965-2.patch \
file://CVE-2026-3783-pre1.patch \
file://CVE-2026-3783.patch \
+ file://CVE-2026-3784.patch \
"
SRC_URI[sha256sum] = "0aaa12d7bd04b0966254f2703ce80dd5c38dbbd76af0297d3d690cdce58a583c"
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [OE-core][kirkstone 18/18] scripts/install-buildtools: Update to 4.0.34
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
` (16 preceding siblings ...)
2026-04-06 6:26 ` [OE-core][kirkstone 17/18] curl: patch CVE-2026-3784 Yoann Congal
@ 2026-04-06 6:26 ` Yoann Congal
17 siblings, 0 replies; 26+ messages in thread
From: Yoann Congal @ 2026-04-06 6:26 UTC (permalink / raw)
To: openembedded-core
From: Yoann Congal <yoann.congal@smile.fr>
Update to the 4.0.34 release of the 4.0 series for buildtools
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
scripts/install-buildtools | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/scripts/install-buildtools b/scripts/install-buildtools
index 6a1762c14b3..8754f2d773e 100755
--- a/scripts/install-buildtools
+++ b/scripts/install-buildtools
@@ -57,8 +57,8 @@ logger = scriptutils.logger_create(PROGNAME, stream=sys.stdout)
DEFAULT_INSTALL_DIR = os.path.join(os.path.split(scripts_path)[0],'buildtools')
DEFAULT_BASE_URL = 'https://downloads.yoctoproject.org/releases/yocto'
-DEFAULT_RELEASE = 'yocto-4.0.33'
-DEFAULT_INSTALLER_VERSION = '4.0.33'
+DEFAULT_RELEASE = 'yocto-4.0.34'
+DEFAULT_INSTALLER_VERSION = '4.0.34'
DEFAULT_BUILDDATE = '202110XX'
# Python version sanity check
^ permalink raw reply related [flat|nested] 26+ messages in thread
* Re: [OE-core][kirkstone 08/18] python3: Fix CVE-2025-15282
2026-04-06 6:26 ` [OE-core][kirkstone 08/18] python3: Fix CVE-2025-15282 Yoann Congal
@ 2026-04-06 9:09 ` Paul Barker
2026-04-06 11:44 ` Vijay Anusuri
0 siblings, 1 reply; 26+ messages in thread
From: Paul Barker @ 2026-04-06 9:09 UTC (permalink / raw)
To: yoann.congal, openembedded-core
[-- Attachment #1: Type: text/plain, Size: 675 bytes --]
On Mon, 2026-04-06 at 08:26 +0200, Yoann Congal via
lists.openembedded.org wrote:
> From: Vijay Anusuri <vanusuri@mvista.com>
>
> Pick patch from 3.10 branch
>
> [1] https://nvd.nist.gov/vuln/detail/CVE-2025-15282
> [2] https://security-tracker.debian.org/tracker/CVE-2025-15282
>
> Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
> Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
The fix for this issue (referred to as gh-143925 upstream) looks to be
part of Python 3.10.20 [1]. Should we take a final Python stable update
instead of this patch?
[1]: https://www.python.org/downloads/release/python-31020/
Best regards,
--
Paul Barker
[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 252 bytes --]
^ permalink raw reply [flat|nested] 26+ messages in thread
* Re: [OE-core][kirkstone 08/18] python3: Fix CVE-2025-15282
2026-04-06 9:09 ` Paul Barker
@ 2026-04-06 11:44 ` Vijay Anusuri
2026-04-06 11:59 ` Paul Barker
0 siblings, 1 reply; 26+ messages in thread
From: Vijay Anusuri @ 2026-04-06 11:44 UTC (permalink / raw)
To: paul; +Cc: yoann.congal, openembedded-core
[-- Attachment #1: Type: text/plain, Size: 1540 bytes --]
On Mon, Apr 6, 2026 at 2:39 PM Paul Barker via lists.openembedded.org <paul=
pbarker.dev@lists.openembedded.org> wrote:
> On Mon, 2026-04-06 at 08:26 +0200, Yoann Congal via
> lists.openembedded.org wrote:
> > From: Vijay Anusuri <vanusuri@mvista.com>
> >
> > Pick patch from 3.10 branch
> >
> > [1] https://nvd.nist.gov/vuln/detail/CVE-2025-15282
> > [2] https://security-tracker.debian.org/tracker/CVE-2025-15282
> >
> > Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
> > Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
>
> The fix for this issue (referred to as gh-143925 upstream) looks to be
> part of Python 3.10.20 [1]. Should we take a final Python stable update
> instead of this patch?
>
> [1]: https://www.python.org/downloads/release/python-31020/
>
>
--> Along with this CVE, Python 3.10.20 includes multiple security bug
fixes. I think it's good to go with Python stable update to 3.10.20 .
> Best regards,
>
> --
> Paul Barker
>
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#234671):
> https://lists.openembedded.org/g/openembedded-core/message/234671
> Mute This Topic: https://lists.openembedded.org/mt/118686707/7301997
> Group Owner: openembedded-core+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [
> vanusuri@mvista.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
>
> Hi Yoann,
>
> Can i send upgrade patch on top of this commit ?
>
> Thanks & Regards,
> Vijay
[-- Attachment #2: Type: text/html, Size: 3257 bytes --]
^ permalink raw reply [flat|nested] 26+ messages in thread
* Re: [OE-core][kirkstone 08/18] python3: Fix CVE-2025-15282
2026-04-06 11:44 ` Vijay Anusuri
@ 2026-04-06 11:59 ` Paul Barker
2026-04-06 12:27 ` Vijay Anusuri
0 siblings, 1 reply; 26+ messages in thread
From: Paul Barker @ 2026-04-06 11:59 UTC (permalink / raw)
To: vanusuri; +Cc: yoann.congal, openembedded-core
[-- Attachment #1: Type: text/plain, Size: 1206 bytes --]
On Mon, 2026-04-06 at 17:14 +0530, Vijay Anusuri via
lists.openembedded.org wrote:
> On Mon, Apr 6, 2026 at 2:39 PM Paul Barker via lists.openembedded.org <paul=
> pbarker.dev@lists.openembedded.org> wrote:
>
> > On Mon, 2026-04-06 at 08:26 +0200, Yoann Congal via
> > lists.openembedded.org wrote:
> > > From: Vijay Anusuri <vanusuri@mvista.com>
> > >
> > > Pick patch from 3.10 branch
> > >
> > > [1] https://nvd.nist.gov/vuln/detail/CVE-2025-15282
> > > [2] https://security-tracker.debian.org/tracker/CVE-2025-15282
> > >
> > > Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
> > > Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
> >
> > The fix for this issue (referred to as gh-143925 upstream) looks to be
> > part of Python 3.10.20 [1]. Should we take a final Python stable update
> > instead of this patch?
> >
> > [1]: https://www.python.org/downloads/release/python-31020/
> >
> >
> --> Along with this CVE, Python 3.10.20 includes multiple security bug
> fixes. I think it's good to go with Python stable update to 3.10.20 .
Hi Vijay,
Are you able to send a patch to update to Python 3.10.20 on kirkstone?
Best regards,
--
Paul Barker
[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 252 bytes --]
^ permalink raw reply [flat|nested] 26+ messages in thread
* Re: [OE-core][kirkstone 08/18] python3: Fix CVE-2025-15282
2026-04-06 11:59 ` Paul Barker
@ 2026-04-06 12:27 ` Vijay Anusuri
0 siblings, 0 replies; 26+ messages in thread
From: Vijay Anusuri @ 2026-04-06 12:27 UTC (permalink / raw)
To: Paul Barker; +Cc: yoann.congal, openembedded-core
[-- Attachment #1: Type: text/plain, Size: 1374 bytes --]
On Mon, Apr 6, 2026 at 5:29 PM Paul Barker <paul@pbarker.dev> wrote:
> On Mon, 2026-04-06 at 17:14 +0530, Vijay Anusuri via
> lists.openembedded.org wrote:
> > On Mon, Apr 6, 2026 at 2:39 PM Paul Barker via lists.openembedded.org
> <paul=
> > pbarker.dev@lists.openembedded.org> wrote:
> >
> > > On Mon, 2026-04-06 at 08:26 +0200, Yoann Congal via
> > > lists.openembedded.org wrote:
> > > > From: Vijay Anusuri <vanusuri@mvista.com>
> > > >
> > > > Pick patch from 3.10 branch
> > > >
> > > > [1] https://nvd.nist.gov/vuln/detail/CVE-2025-15282
> > > > [2] https://security-tracker.debian.org/tracker/CVE-2025-15282
> > > >
> > > > Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
> > > > Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
> > >
> > > The fix for this issue (referred to as gh-143925 upstream) looks to be
> > > part of Python 3.10.20 [1]. Should we take a final Python stable update
> > > instead of this patch?
> > >
> > > [1]: https://www.python.org/downloads/release/python-31020/
> > >
> > >
> > --> Along with this CVE, Python 3.10.20 includes multiple security bug
> > fixes. I think it's good to go with Python stable update to 3.10.20 .
>
> Hi Vijay,
>
> Are you able to send a patch to update to Python 3.10.20 on kirkstone?
>
> -- I will send it soon.
>
> Best regards,
>
> --
> Paul Barker
>
>
[-- Attachment #2: Type: text/html, Size: 2762 bytes --]
^ permalink raw reply [flat|nested] 26+ messages in thread
end of thread, other threads:[~2026-04-06 12:27 UTC | newest]
Thread overview: 26+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-04-06 6:26 [OE-core][kirkstone 00/18] Patch review Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 01/18] linux-yocto/5.15: update to v5.15.200 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 02/18] linux-yocto/5.15: update to v5.15.201 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 03/18] create-pull-request: Keep commit hash to be pulled in cover email Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 04/18] README.OE-Core: update contributor links and add kirkstone prefix Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 05/18] libtheora: mark CVE-2024-56431 as not vulnerable yet Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 06/18] tzdata,tzcode-native: Upgrade 2025b -> 2025c Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 07/18] tzdata/tzcode-native: upgrade 2025c -> 2026a Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 08/18] python3: Fix CVE-2025-15282 Yoann Congal
2026-04-06 9:09 ` Paul Barker
2026-04-06 11:44 ` Vijay Anusuri
2026-04-06 11:59 ` Paul Barker
2026-04-06 12:27 ` Vijay Anusuri
2026-04-06 6:26 ` [OE-core][kirkstone 09/18] python3-pyopenssl: Fix CVE-2026-27448 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 10/18] python3-pyopenssl: Fix CVE-2026-27459 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 11/18] libarchive: Fix CVE-2026-4111 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 12/18] vim: Fix CVE-2026-33412 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 13/18] sqlite3: Fix CVE-2025-70873 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 14/18] curl: patch CVE-2025-14524 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 15/18] curl: patch CVE-2026-1965 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 16/18] curl: patch CVE-2026-3783 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 17/18] curl: patch CVE-2026-3784 Yoann Congal
2026-04-06 6:26 ` [OE-core][kirkstone 18/18] scripts/install-buildtools: Update to 4.0.34 Yoann Congal
-- strict thread matches above, loose matches on Subject: below --
2023-06-19 2:55 [OE-core][kirkstone 00/18] Patch review Steve Sakoman
2023-08-02 12:04 ` Marta Rybczynska
2022-10-04 15:50 Steve Sakoman
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox