From patchwork Mon Apr 4 02:30:22 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 6201 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 32346C54EFD for ; Mon, 4 Apr 2022 18:46:44 +0000 (UTC) Received: from mail-pj1-f43.google.com (mail-pj1-f43.google.com [209.85.216.43]) by mx.groups.io with SMTP id smtpd.web12.30426.1649039458865713705 for ; Sun, 03 Apr 2022 19:30:59 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=fr/zDWdu; spf=softfail (domain: sakoman.com, ip: 209.85.216.43, mailfrom: steve@sakoman.com) Received: by mail-pj1-f43.google.com with SMTP id kw18so1233622pjb.5 for ; Sun, 03 Apr 2022 19:30:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=ikzyBsJOOjNAtzjtq5iQ+YRNYJrN0iYvWaKE/oLGcmg=; b=fr/zDWduI9Ho1sSYZSN2CSKE394TPCFlLpk8rLMnvW6G5HJ2aaAEmG8Cc3/nt5ckix AMJUihvZ2lhQheeKorQM40l/h1/kYeGYRXUe4nno3OfAc52A9dXDE06YqiU+TiS921xq m+6VnZ5TgZGj70hf1HL5TNtn8gVOSMnGEZzNjs+GVk/8a1UrQUY8Nmh4xDPZJopuZBaF Z7D2F0OWv5xTA+G5vRanqIDJGXwbTcDpgdcGf2EgmvbuQ3uGqIv/j7mNU5756Tbompdf tNNKqRsKyrZa+q+EfRg9NyaGYazOAnNNL+C66mbizvuEjPWNfgOpNqzXyqPQ3S4fq9Mp rBSQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=ikzyBsJOOjNAtzjtq5iQ+YRNYJrN0iYvWaKE/oLGcmg=; b=ZRqG4E6PgEWCTPI93hkUn4cjrJgBl7BsYPZkJV2GlGlp27mJfDOCCgIjZe1DOVKPuK FLUKnskZUoMXT2Kw7+jqLGWIIdvnMcmhLP6TmraP1QIzO9lsxRlJnpblacl229z27CnY oYeoTn5DJJ7H5ct1btLAxRYlphzuqrv5Sf9M60fIbC2ElyHNPJvnjVn9h56CaaSliytt t8xmE4s6nrBYR4w6HbeC4/ssFckThwE4Z/m4/bFHLuUOMKgUJdMcXkOrxCX+V/8DdN4C 6epy99mSalQXBpopl1UeqOy92vxeb2lthbXpm1aoVyoJuQAIqIbSpPzUFFDsZinFo5Tu nRiw== X-Gm-Message-State: AOAM531V+hcdEqxCdITjtoOiOj6CW4A3jsLum7wTG5joVDVBI9qboR3J Jjc8BK4ehUNL9WRHJSOY5mAtgh1wyO2qH6Tk+IQ= X-Google-Smtp-Source: ABdhPJxg1bIDO19DCjgFKGZt9cMyh4NFT7229oM0AIcBJRKbY9yuWG7/z/fWIExhp3lk7aLzyBPC2Q== X-Received: by 2002:a17:90b:38c9:b0:1c7:1ffb:533b with SMTP id nn9-20020a17090b38c900b001c71ffb533bmr24278805pjb.220.1649039457917; Sun, 03 Apr 2022 19:30:57 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-6-214.hawaiiantel.net. [72.253.6.214]) by smtp.gmail.com with ESMTPSA id p26-20020a63951a000000b003826aff3e41sm8471117pgd.33.2022.04.03.19.30.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Apr 2022 19:30:57 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 1/8] grub: ignore CVE-2021-46705 Date: Sun, 3 Apr 2022 16:30:22 -1000 Message-Id: <10e12faf6172f399da7b3d73a33bd908aa8f32b3.1649026624.git.steve@sakoman.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Apr 2022 18:46:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/163973 From: Ross Burton This is specific to SUSE Linux. Signed-off-by: Ross Burton Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 594baef3b08d40fbbf1899f4cadeb9931c035c1a) Signed-off-by: Steve Sakoman --- meta/recipes-bsp/grub/grub2.inc | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-bsp/grub/grub2.inc b/meta/recipes-bsp/grub/grub2.inc index 75ef31f249..0d3f6d05da 100644 --- a/meta/recipes-bsp/grub/grub2.inc +++ b/meta/recipes-bsp/grub/grub2.inc @@ -15,6 +15,8 @@ CVE_PRODUCT = "grub2" # Applies only to RHEL CVE_CHECK_WHITELIST += "CVE-2019-14865" +# Applies only to SUSE +CVE_CHECK_WHITELIST += "CVE-2021-46705" SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \ file://0001-Disable-mfpmath-sse-as-well-when-SSE-is-disabled.patch \ From patchwork Mon Apr 4 02:30:23 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 6195 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 16313C48BCF for ; Mon, 4 Apr 2022 18:46:43 +0000 (UTC) Received: from mail-pf1-f182.google.com (mail-pf1-f182.google.com [209.85.210.182]) by mx.groups.io with SMTP id smtpd.web08.30489.1649039462508241743 for ; Sun, 03 Apr 2022 19:31:02 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=kzwZDogy; spf=softfail (domain: sakoman.com, ip: 209.85.210.182, mailfrom: steve@sakoman.com) Received: by mail-pf1-f182.google.com with SMTP id x16so2315139pfa.10 for ; Sun, 03 Apr 2022 19:31:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=Gj+c+onQn8ZnJDGJhTuQ5iILMveMRkUNmzl/G3T/+LI=; b=kzwZDogy9m+6OgfHusDGJ4xKhLB0npHV7sFQ7eX+ek4b4MX/GcFsOwLQN3CZ5ZXK+W Ud/ybtk+snKd4208bZxoFemjyV+Zq5k2O5jO3kapk8yKETGlEpFDqsAHhEuwElK9yxU5 tFY/O19XMhZ5EobgiL7lzW+iz4VumHXoXkeRC6e1zInewc53C9pO8OJ2IDvA2unuHO1S 6IslwzFCO+TaMopdplSZ/dIqjJjTShhvo+DSM+Uc+ZhhdElvjy05jJgBYTHBI0Y/K34V mNxPcyxoh2jpBxInTDTkJM4+12PkDuo+f8xqjSaTGnqY8VjKE39VjwQi+dtafwLXBw/0 v5XQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Gj+c+onQn8ZnJDGJhTuQ5iILMveMRkUNmzl/G3T/+LI=; b=0o5ezfxJE9Vw9A/60x40Gz7ayhtfN+PiZ0eoOC08iTL/h43ZQwSvZfzq/dbD6NoJkd Q64VcKQr7IaUxPgHNbhK5Ki/K+VRs+VX2wYxt00MAQDlfgmkDzMNGSsNCel/M8z4gWt7 vt+hGApzm3pL83vpyiGQXMMqQUTwAtRAcZyEzMejbyY4pQebPgi1YBh6S6fMPTumNId8 YYm4fktTl/qtj4XNd65AGv9cSasEV9uLlJfu6KgVBuygh43HbUWOUQ3h3vCv/nHiD40x MifrGyQ1pnkvlvv/p4GB2RRap4t5XSCbWxZGbzQsVeJVyb9E8txBpZ9GUTn9a16hBkNL +C0g== X-Gm-Message-State: AOAM531WKlfwUHzsFY/ZjBJ4r2HXlp4d0Bp3GfuhEzQLQOXGw4QYpaGX hN5Mq4beNkkstKTHgYHvZhX8Qv+tuJLhI/2kPQ8= X-Google-Smtp-Source: ABdhPJypcMsb6TUl+x2L/Itep7GJ1wET94ThdbYwr70SQS9eTKOsZSRhE9io3P0AZZxfkNRstPMOVA== X-Received: by 2002:a63:2a0e:0:b0:380:aeb3:d46c with SMTP id q14-20020a632a0e000000b00380aeb3d46cmr23880597pgq.404.1649039461322; Sun, 03 Apr 2022 19:31:01 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-6-214.hawaiiantel.net. [72.253.6.214]) by smtp.gmail.com with ESMTPSA id p26-20020a63951a000000b003826aff3e41sm8471117pgd.33.2022.04.03.19.30.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Apr 2022 19:30:59 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 2/8] go: backport patch fix for CVE-2021-38297 Date: Sun, 3 Apr 2022 16:30:23 -1000 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Apr 2022 18:46:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/163974 From: Davide Gardenal Patch taken from https://github.com/golang/go/commit/4548fcc8dfd933c237f29bba6f90040a85922564 from the following issue https://github.com/golang/go/issues/48797 Original repo https://go.googlesource.com/go/+/77f2750f4398990eed972186706f160631d7dae4 Signed-off-by: Davide Gardenal Signed-off-by: Steve Sakoman --- meta/recipes-devtools/go/go-1.14.inc | 4 + .../go/go-1.14/CVE-2021-38297.patch | 97 +++++++++++++++++++ 2 files changed, 101 insertions(+) create mode 100644 meta/recipes-devtools/go/go-1.14/CVE-2021-38297.patch diff --git a/meta/recipes-devtools/go/go-1.14.inc b/meta/recipes-devtools/go/go-1.14.inc index 9b3c3b30a8..f98757d10d 100644 --- a/meta/recipes-devtools/go/go-1.14.inc +++ b/meta/recipes-devtools/go/go-1.14.inc @@ -19,9 +19,13 @@ SRC_URI += "\ file://CVE-2021-34558.patch \ file://CVE-2021-33196.patch \ file://CVE-2021-33197.patch \ + file://CVE-2021-38297.patch \ file://CVE-2022-23806.patch \ file://CVE-2022-23772.patch \ " + +# file://CVE-2021-38297.patch + SRC_URI_append_libc-musl = " file://0009-ld-replace-glibc-dynamic-linker-with-musl.patch" SRC_URI[main.sha256sum] = "7ed13b2209e54a451835997f78035530b331c5b6943cdcd68a3d815fdc009149" diff --git a/meta/recipes-devtools/go/go-1.14/CVE-2021-38297.patch b/meta/recipes-devtools/go/go-1.14/CVE-2021-38297.patch new file mode 100644 index 0000000000..24ceabf808 --- /dev/null +++ b/meta/recipes-devtools/go/go-1.14/CVE-2021-38297.patch @@ -0,0 +1,97 @@ +From 4548fcc8dfd933c237f29bba6f90040a85922564 Mon Sep 17 00:00:00 2001 +From: Michael Knyszek +Date: Thu, 2 Sep 2021 16:51:59 -0400 +Subject: [PATCH] [release-branch.go1.16] misc/wasm, cmd/link: do not let + command line args overwrite global data + +On Wasm, wasm_exec.js puts command line arguments at the beginning +of the linear memory (following the "zero page"). Currently there +is no limit for this, and a very long command line can overwrite +the program's data section. Prevent this by limiting the command +line to 4096 bytes, and in the linker ensuring the data section +starts at a high enough address (8192). + +(Arguably our address assignment on Wasm is a bit confusing. This +is the minimum fix I can come up with.) + +Thanks to Ben Lubar for reporting this issue. + +Change by Cherry Mui . + +For #48797 +Fixes #48799 +Fixes CVE-2021-38297 + +Change-Id: I0f50fbb2a5b6d0d047e3c134a88988d9133e4ab3 +Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1205933 +Reviewed-by: Roland Shoemaker +Reviewed-by: Than McIntosh +Reviewed-on: https://go-review.googlesource.com/c/go/+/354591 +Trust: Michael Knyszek +Reviewed-by: Heschi Kreinick + +CVE: CVE-2021-38297 + +Upstream-Status: Backport: +https://github.com/golang/go/commit/4548fcc8dfd933c237f29bba6f90040a85922564 + +Inline of ctxt.isWAsm followin this implemetation: +https://github.com/golang/go/blob/4548fcc8dfd933c237f29bba6f90040a85922564/src/cmd/link/internal/ld/target.go#L127 + +Signed-off-by: Davide Gardenal +--- + misc/wasm/wasm_exec.js | 7 +++++++ + src/cmd/link/internal/ld/data.go | 11 ++++++++++- + 2 files changed, 17 insertions(+), 1 deletion(-) + +diff --git a/misc/wasm/wasm_exec.js b/misc/wasm/wasm_exec.js +index 82041e6bb901..a0a264278b1b 100644 +--- a/misc/wasm/wasm_exec.js ++++ b/misc/wasm/wasm_exec.js +@@ -564,6 +564,13 @@ + offset += 8; + }); + ++ // The linker guarantees global data starts from at least wasmMinDataAddr. ++ // Keep in sync with cmd/link/internal/ld/data.go:wasmMinDataAddr. ++ const wasmMinDataAddr = 4096 + 4096; ++ if (offset >= wasmMinDataAddr) { ++ throw new Error("command line too long"); ++ } ++ + this._inst.exports.run(argc, argv); + if (this.exited) { + this._resolveExitPromise(); +diff --git a/src/cmd/link/internal/ld/data.go b/src/cmd/link/internal/ld/data.go +index 52035e96301c..54a1d188cdb9 100644 +--- a/src/cmd/link/internal/ld/data.go ++++ b/src/cmd/link/internal/ld/data.go +@@ -2330,6 +2330,11 @@ func assignAddress(ctxt *Link, sect *sym.Section, n int, s loader.Sym, va uint64 + return sect, n, va + } + ++// On Wasm, we reserve 4096 bytes for zero page, then 4096 bytes for wasm_exec.js ++// to store command line args. Data sections starts from at least address 8192. ++// Keep in sync with wasm_exec.js. ++const wasmMinDataAddr = 4096 + 4096 ++ + // address assigns virtual addresses to all segments and sections and + // returns all segments in file order. + func (ctxt *Link) address() []*sym.Segment { +@@ -2339,10 +2344,14 @@ func (ctxt *Link) address() []*sym.Segment { + order = append(order, &Segtext) + Segtext.Rwx = 05 + Segtext.Vaddr = va +- for _, s := range Segtext.Sections { ++ for i, s := range Segtext.Sections { + va = uint64(Rnd(int64(va), int64(s.Align))) + s.Vaddr = va + va += s.Length ++ ++ if ctxt.Arch.Family == sys.Wasm && i == 0 && va < wasmMinDataAddr { ++ va = wasmMinDataAddr ++ } + } + + Segtext.Length = va - uint64(*FlagTextAddr) + \ No newline at end of file From patchwork Mon Apr 4 02:30:24 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 6194 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2E02AC48BE5 for ; Mon, 4 Apr 2022 18:46:43 +0000 (UTC) Received: from mail-pj1-f48.google.com (mail-pj1-f48.google.com [209.85.216.48]) by mx.groups.io with SMTP id smtpd.web09.30306.1649039465539727160 for ; Sun, 03 Apr 2022 19:31:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=x4StOIJH; spf=softfail (domain: sakoman.com, ip: 209.85.216.48, mailfrom: steve@sakoman.com) Received: by mail-pj1-f48.google.com with SMTP id a16-20020a17090a6d9000b001c7d6c1bb13so7695432pjk.4 for ; Sun, 03 Apr 2022 19:31:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=K9mm3IrQj24FH6lS+k5mGuT+NSj/Ogd5s/v1ZDUeVTI=; b=x4StOIJHSKxMPf0tXucl3+CvpyyG09J3sCVpXxK9Hdj3M/TCx901jSvRwqA7yG7v2K B3RsqA2pEK+mezt9r1ujynha41EEAahzEbn/pm8/d4zJzYaI9Cjqk4CnUkiC2J7YqGhV jGO/1azToxtSAKjqROAwRWA8eLKAUBz4oFWbaCtGsF1HkQrqyzCVGBsj9ZdXCMkDlyrW yZ6/2cafe+aFryoKjbx4adCpMnCTnm1mwzCqLV1JRAMA+IQoxWj6MxTZbuBBWtToAlAy 63BIArQ3W6A9U8Qb/EZn5YZuvf/QtrP7g/29jyNYIFsNcITPKCvm1ByvHtDfBMhQisDc nXLQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=K9mm3IrQj24FH6lS+k5mGuT+NSj/Ogd5s/v1ZDUeVTI=; b=BIgmoJtPDKv+YXE93BaXJ/1qTP+OSjnS6V67lBMXxh/xy3g6/N+iuAuOZAAceQkXrL rEMBBY9LMOQ8aeiwwYmx3Lmp4kG/h33H1INS4egiOzE+dSaT6xZPyTp6r097RvxkMahs w3KTfuJAToStYQmwfhVeiOd7cVl8ZDpTvnlSCrIZIwOpG3ELu9MFNOyWs2FwzOQAQDfc ufGTQ229Ay6hX2NIDJAo3Hd7IgmJk7agsqvseertpBfwKdMaL4DaWGxKFGHL243TJ8Yq rod2jqjczAdN4RPy1iMafJ9SOTQptMEheEU5M3Hx1vBq0UgYUVShi2bZltd5jV7192Ky f+DA== X-Gm-Message-State: AOAM5332JENKmem5w+y7uveWAYLqyZ7qytx4XmkgUWcFCHulrvTCqhQl 9oG9f3yNLzjTfohwo5uFJo44Tya3l67p58uwJt0= X-Google-Smtp-Source: ABdhPJxkMaHniuHew23HIYanYYNUMHWeqhEtH9H4RqW1VA2cLkPt54s+0zdAv1jAqGnaMV9R4m9+wQ== X-Received: by 2002:a17:902:7ec1:b0:156:17a4:a2f8 with SMTP id p1-20020a1709027ec100b0015617a4a2f8mr21481098plb.155.1649039464691; Sun, 03 Apr 2022 19:31:04 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-6-214.hawaiiantel.net. [72.253.6.214]) by smtp.gmail.com with ESMTPSA id p26-20020a63951a000000b003826aff3e41sm8471117pgd.33.2022.04.03.19.31.02 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Apr 2022 19:31:03 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 3/8] bluez5: fix CVE-2022-0204 Date: Sun, 3 Apr 2022 16:30:24 -1000 Message-Id: <7ee504b8381a1f2b385aa4e0ed7b99ea662d6535.1649026624.git.steve@sakoman.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Apr 2022 18:46:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/163975 From: Ralph Siemsen Fix heap overflow when appending prepare writes The code shall check if the prepare writes would append more the allowed maximum attribute length. Upstream-Status: Backport [https://github.com/bluez/bluez/commit/591c546c536b42bef696d027f64aa22434f8c3f0] CVE: CVE-2022-0204 Signed-off-by: Ralph Siemsen Signed-off-by: Steve Sakoman --- meta/recipes-connectivity/bluez5/bluez5.inc | 1 + .../bluez5/bluez5/CVE-2022-0204.patch | 66 +++++++++++++++++++ 2 files changed, 67 insertions(+) create mode 100644 meta/recipes-connectivity/bluez5/bluez5/CVE-2022-0204.patch diff --git a/meta/recipes-connectivity/bluez5/bluez5.inc b/meta/recipes-connectivity/bluez5/bluez5.inc index 7cf061dcf6..4d4348898a 100644 --- a/meta/recipes-connectivity/bluez5/bluez5.inc +++ b/meta/recipes-connectivity/bluez5/bluez5.inc @@ -55,6 +55,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/bluetooth/bluez-${PV}.tar.xz \ file://CVE-2021-0129.patch \ file://CVE-2021-3588.patch \ file://CVE-2021-3658.patch \ + file://CVE-2022-0204.patch \ " S = "${WORKDIR}/bluez-${PV}" diff --git a/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-0204.patch b/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-0204.patch new file mode 100644 index 0000000000..646b5ddfc8 --- /dev/null +++ b/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-0204.patch @@ -0,0 +1,66 @@ +From 0d328fdf6564b67fc2ec3533e3da201ebabcc9e3 Mon Sep 17 00:00:00 2001 +From: Luiz Augusto von Dentz +Date: Tue, 8 Jun 2021 16:46:49 -0700 +Subject: [PATCH] shared/gatt-server: Fix heap overflow when appending prepare + writes + +The code shall check if the prepare writes would append more the +allowed maximum attribute length. + +Fixes https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q + +Upstream-Status: Backport [https://github.com/bluez/bluez/commit/591c546c536b42bef696d027f64aa22434f8c3f0] +Signed-off-by: Ralph Siemsen +CVE: CVE-2022-0204 + +--- + src/shared/gatt-server.c | 22 ++++++++++++++++++++++ + 1 file changed, 22 insertions(+) + +diff --git a/src/shared/gatt-server.c b/src/shared/gatt-server.c +index 0c25a97..20e14bc 100644 +--- a/src/shared/gatt-server.c ++++ b/src/shared/gatt-server.c +@@ -816,6 +816,20 @@ static uint8_t authorize_req(struct bt_gatt_server *server, + server->authorize_data); + } + ++static uint8_t check_length(uint16_t length, uint16_t offset) ++{ ++ if (length > BT_ATT_MAX_VALUE_LEN) ++ return BT_ATT_ERROR_INVALID_ATTRIBUTE_VALUE_LEN; ++ ++ if (offset > BT_ATT_MAX_VALUE_LEN) ++ return BT_ATT_ERROR_INVALID_OFFSET; ++ ++ if (length + offset > BT_ATT_MAX_VALUE_LEN) ++ return BT_ATT_ERROR_INVALID_ATTRIBUTE_VALUE_LEN; ++ ++ return 0; ++} ++ + static void write_cb(struct bt_att_chan *chan, uint8_t opcode, const void *pdu, + uint16_t length, void *user_data) + { +@@ -846,6 +860,10 @@ static void write_cb(struct bt_att_chan *chan, uint8_t opcode, const void *pdu, + (opcode == BT_ATT_OP_WRITE_REQ) ? "Req" : "Cmd", + handle); + ++ ecode = check_length(length, 0); ++ if (ecode) ++ goto error; ++ + ecode = check_permissions(server, attr, BT_ATT_PERM_WRITE_MASK); + if (ecode) + goto error; +@@ -1353,6 +1371,10 @@ static void prep_write_cb(struct bt_att_chan *chan, uint8_t opcode, + util_debug(server->debug_callback, server->debug_data, + "Prep Write Req - handle: 0x%04x", handle); + ++ ecode = check_length(length, offset); ++ if (ecode) ++ goto error; ++ + ecode = check_permissions(server, attr, BT_ATT_PERM_WRITE_MASK); + if (ecode) + goto error; From patchwork Mon Apr 4 02:30:25 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 6193 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0810BC4743E for ; Mon, 4 Apr 2022 18:46:43 +0000 (UTC) Received: from mail-pj1-f44.google.com (mail-pj1-f44.google.com [209.85.216.44]) by mx.groups.io with SMTP id smtpd.web09.30307.1649039467988728370 for ; Sun, 03 Apr 2022 19:31:08 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=y2tZh+Xd; spf=softfail (domain: sakoman.com, ip: 209.85.216.44, mailfrom: steve@sakoman.com) Received: by mail-pj1-f44.google.com with SMTP id j20-20020a17090ae61400b001ca9553d073so1613517pjy.5 for ; Sun, 03 Apr 2022 19:31:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=ahMAEDuVkppQFkSE2nbGQVYa4pMa765sC8DOs+YHoFY=; b=y2tZh+Xdwdm/yb6Ymund9UzeIcUDp1fGm4ZJxkoN8I5SUQ6PtDCYWhfgzMzMRdlWbd k28D0nb1TrAoJrjJ6CGOxX8m0JNm/uA2xnBbkHcJD0tHD/ScLy2VqcukOKvoZG7KYnho BHql40ISsmZLhNDFFb2+2tc0zyTXNoETXUyoEJ8ylEgqOQ9BLy6q+5mgXT1XPMbLwM/M ubloDKOa+bpBW0DqVQhF1aBoAbBGChbfXKHr5XLPQwUq2RXEsUbFi6rHbaWjtUBiZdpN laobHFVmx1pWoU+R+qR017bCn+vKChsMmEn0oqhB72/cZWPlfk80fNWDEo7MSU0C2LDj M92w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=ahMAEDuVkppQFkSE2nbGQVYa4pMa765sC8DOs+YHoFY=; b=qG1YDYPEPH5sYGMyYiGFHncDFytvowBnCPG6qhc/TpF4thu69AQ9tDnubyBU3J4CGO wO8RCx7JVqG18m6G3R6qJimVDnNttXp+NYdTMiQmXoh3frkF2oArx5mnOY47AhTMymcA IdNRQSM4J9pF6P5G6efPMow6NXNf4LDskiOjC6ENKyPcBXgt0JDqenb+PJdoBNLQDfIT UxeS9riBXkeaeN2OT0RCHt3RKMX5SaTovsOhE3FWu+0O3jF5O8dw7CkvVM/deES2G12b +j6eulF1G471LUan42YhmaNSi9k0hoDUYQJFmALLT7kncjI/YRM+8iV1ZyYZ+e0GUjU2 wL6A== X-Gm-Message-State: AOAM531MWbTGryckApu6Z441zZLTG6aYn4+/DKXYjlSi16rYdnLrKLFJ QJJlA1iKYPqaGI7fIHMhzmN7r08vbmUPQ7lxzMc= X-Google-Smtp-Source: ABdhPJxsr6Kj8rnU+4KkFzAkb8/Gbewqwomsenz73ZH3MsBYaV4mXJAIy36deJuyQtfwjl33poDS4A== X-Received: by 2002:a17:902:ba8c:b0:14f:d9b7:ab4 with SMTP id k12-20020a170902ba8c00b0014fd9b70ab4mr21433089pls.23.1649039467115; Sun, 03 Apr 2022 19:31:07 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-6-214.hawaiiantel.net. [72.253.6.214]) by smtp.gmail.com with ESMTPSA id p26-20020a63951a000000b003826aff3e41sm8471117pgd.33.2022.04.03.19.31.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Apr 2022 19:31:06 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 4/8] bind: update to 9.11.37 Date: Sun, 3 Apr 2022 16:30:25 -1000 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Apr 2022 18:46:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/163976 From: Ralph Siemsen Security Fixes The rules for acceptance of records into the cache have been tightened to prevent the possibility of poisoning if forwarders send records outside the configured bailiwick. (CVE-2021-25220) License-Update: copyright years Signed-off-by: Ralph Siemsen Signed-off-by: Steve Sakoman --- .../bind/{bind_9.11.36.bb => bind_9.11.37.bb} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-connectivity/bind/{bind_9.11.36.bb => bind_9.11.37.bb} (97%) diff --git a/meta/recipes-connectivity/bind/bind_9.11.36.bb b/meta/recipes-connectivity/bind/bind_9.11.37.bb similarity index 97% rename from meta/recipes-connectivity/bind/bind_9.11.36.bb rename to meta/recipes-connectivity/bind/bind_9.11.37.bb index 872baf6d2f..afc8cf0b3b 100644 --- a/meta/recipes-connectivity/bind/bind_9.11.36.bb +++ b/meta/recipes-connectivity/bind/bind_9.11.37.bb @@ -4,7 +4,7 @@ DESCRIPTION = "BIND 9 provides a full-featured Domain Name Server system" SECTION = "console/network" LICENSE = "ISC & BSD" -LIC_FILES_CHKSUM = "file://COPYRIGHT;md5=b88e7ca5f21908e1b2720169f6807cf6" +LIC_FILES_CHKSUM = "file://COPYRIGHT;md5=89a97ebbf713f7125fe5c02223d3ae95" DEPENDS = "openssl libcap zlib" @@ -21,7 +21,7 @@ SRC_URI = "https://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \ file://0001-avoid-start-failure-with-bind-user.patch \ " -SRC_URI[sha256sum] = "c953fcb6703b395aaa53e65ff8b2869b69a5303dd60507cba2201305e1811681" +SRC_URI[sha256sum] = "0d8efbe7ec166ada90e46add4267b7e7c934790cba9bd5af6b8380a4fbfb5aff" UPSTREAM_CHECK_URI = "https://ftp.isc.org/isc/bind9/" # stay at 9.11 until 9.16, from 9.16 follow the ESV versions divisible by 4 From patchwork Mon Apr 4 02:30:26 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 6191 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F41EEC4743C for ; Mon, 4 Apr 2022 18:46:42 +0000 (UTC) Received: from mail-pf1-f182.google.com (mail-pf1-f182.google.com [209.85.210.182]) by mx.groups.io with SMTP id smtpd.web12.30429.1649039470167183069 for ; Sun, 03 Apr 2022 19:31:10 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=Nl44MUHL; spf=softfail (domain: sakoman.com, ip: 209.85.210.182, mailfrom: steve@sakoman.com) Received: by mail-pf1-f182.google.com with SMTP id p8so7665324pfh.8 for ; Sun, 03 Apr 2022 19:31:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=psq9zy2icCwHzspKsLWFYciFRiPmInU8Yw6ow7ipUjQ=; b=Nl44MUHLWSQM1n9/oOXdxobjpzYJgC2I4Lyp5UyVd1GYllp/LF/sDuaZ+wi13UZ/rs HtbO5CHY79Hsouw1+CEGEMvtKrp5J57GpxF6ZOUQefC62JjLZ/3iljT1Wbwbfpd4dDxN XbL/IFRURjfBypQfRW6D16qv9qbE96DAA2EbSLvCcJskw2n+c9uYxrT7bF3FSVu7PlQC amxlBRShxKrxCHsq0NgxUDpkHfDaHNFbyx0rCp8hII5H+g1bHOjCpv58CM6ar1sW6IAN LU/oE13HaykKGiRS9iOME9W4p7SJ6DV/vYjoD6jR1ynR3NPN/5eWoAu6OX802GAXknu6 rkAQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=psq9zy2icCwHzspKsLWFYciFRiPmInU8Yw6ow7ipUjQ=; b=Eqy2LKJRw7LnhxARwsGFwjiYuobZR47Q28zEJtpVPYzTeyiTFL2lub8qhVPnDYE5Ak DiiGjP8GS2rkJFtvRxfKJWQc7uReTZPAqGUwZe6OhCS/e2jCA+wgdluSDY2KHcA1aFZU YrDqFZkbCcKjuV9QG1guBpcWansM62JbXw/ejB4Vld3c8COLGO0y9p0EC/KLnGqnhI4T kSizDD5OhvbEkc/P3MwBWU/1OlNCZYnYPnWhFM2jG1F4rAJB7JWMOhOaE0c/GLlJv4Gw JEkDWKWy2GGaWK1euthyFn/Cui99x2thvARZ0VhUMgmzzne2La2OkTC5NdYM99rew0qb 1ftQ== X-Gm-Message-State: AOAM533Z0rljys0tM4dqW3is+NlLzNGD5aMKNFKGbKOFMDCDvK9AzJnN A0EOTwZTK3GAYtl2/mdLQKOKRz7k7tfzCpQlGaM= X-Google-Smtp-Source: ABdhPJwcWxe00E2fSgNZaY8JzeKq3US2+p0p7ABCbHF6aRSXMIb3E9MK0Bz45oQKGWTjI71gwPzVEg== X-Received: by 2002:a63:3e47:0:b0:382:366:64ea with SMTP id l68-20020a633e47000000b00382036664eamr23782112pga.210.1649039469237; Sun, 03 Apr 2022 19:31:09 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-6-214.hawaiiantel.net. [72.253.6.214]) by smtp.gmail.com with ESMTPSA id p26-20020a63951a000000b003826aff3e41sm8471117pgd.33.2022.04.03.19.31.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Apr 2022 19:31:08 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 5/8] mirrors: Add missing gitsm entries for yocto/oe mirrors Date: Sun, 3 Apr 2022 16:30:26 -1000 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Apr 2022 18:46:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/163977 From: Richard Purdie The missing gitsm:// mappings looks like an oversight, add them. Signed-off-by: Richard Purdie (cherry picked from commit 6600b9fca7888fb41647cd000b9efb7f0762dfde) Signed-off-by: Steve Sakoman --- meta/classes/mirrors.bbclass | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/classes/mirrors.bbclass b/meta/classes/mirrors.bbclass index a36236df9f..669d0cc8ff 100644 --- a/meta/classes/mirrors.bbclass +++ b/meta/classes/mirrors.bbclass @@ -42,6 +42,7 @@ ftp://sourceware.org/pub http://ftp.gwdg.de/pub/linux/sources.redhat.com/sourcew cvs://.*/.* http://downloads.yoctoproject.org/mirror/sources/ \n \ svn://.*/.* http://downloads.yoctoproject.org/mirror/sources/ \n \ git://.*/.* http://downloads.yoctoproject.org/mirror/sources/ \n \ +gitsm://.*/.* http://downloads.yoctoproject.org/mirror/sources/ \n \ hg://.*/.* http://downloads.yoctoproject.org/mirror/sources/ \n \ bzr://.*/.* http://downloads.yoctoproject.org/mirror/sources/ \n \ p4://.*/.* http://downloads.yoctoproject.org/mirror/sources/ \n \ @@ -52,6 +53,7 @@ npm://.*/?.* http://downloads.yoctoproject.org/mirror/sources/ \n \ cvs://.*/.* http://sources.openembedded.org/ \n \ svn://.*/.* http://sources.openembedded.org/ \n \ git://.*/.* http://sources.openembedded.org/ \n \ +gitsm://.*/.* http://sources.openembedded.org/ \n \ hg://.*/.* http://sources.openembedded.org/ \n \ bzr://.*/.* http://sources.openembedded.org/ \n \ p4://.*/.* http://sources.openembedded.org/ \n \ From patchwork Mon Apr 4 02:30:27 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 6196 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 19E63C48BCD for ; Mon, 4 Apr 2022 18:46:43 +0000 (UTC) Received: from mail-pj1-f54.google.com (mail-pj1-f54.google.com [209.85.216.54]) by mx.groups.io with SMTP id smtpd.web09.30311.1649039472290587585 for ; Sun, 03 Apr 2022 19:31:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=JopyTidX; spf=softfail (domain: sakoman.com, ip: 209.85.216.54, mailfrom: steve@sakoman.com) Received: by mail-pj1-f54.google.com with SMTP id l4-20020a17090a49c400b001c6840df4a3so7763478pjm.0 for ; Sun, 03 Apr 2022 19:31:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=9ddgZXpEx+PhdyruPKxulsLcAp52PhOWE1Mr0ecfwNo=; b=JopyTidXnP6pgy/ri+9xOpWQXbxH1A9SXoI2La2rDpmng4Ps/6Qixp3rF0d+PwuIR6 7BdRJsVYuSgLrNPsRpl8DGJuQtaG+J4NDQARzt7YFUy8nTYGE/qbdeYJ+G3J7+Ey8iZ1 Y2lgXISZv17T4JoMep3ZirH9doasqVyzNeGvdjX0VtcTnFUZE0R7AP2OehDbbX+rqMhh XVG75Zyh/T3M6uKXRXGsDIPX6U//RtrO82uWRa64FGQ2yTxxdC49qD0JgnhaW/Fc9O1P om6sLIU+7asm0U5Fxx+eiVW+WF1QBRdiWUo5ljGAxbZM8LDjrfA+bibAbo/4Eqc7mJ1c ZqZw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=9ddgZXpEx+PhdyruPKxulsLcAp52PhOWE1Mr0ecfwNo=; b=y1HP1CFVYwyJuLAnsMqeSCISZUoTH0yUx5TSlazlGOua9AKpxq1KyF3TRe20wtGAeN dkXo7oMNjN9NP+Pzo20a+l5YWZYDm26jGOrUtu13ryHGSJrdsWsbk33Jd1lWU4teAmav +BPoLnzFTY5LKqTdmDZQ4k/2Ewe9oldgaRY7xKeaCmN8bHSMFrGoM7YVQLVK0u3ODn5A qR3/tXUHlVYSt/8fa8XefHbvdFBgBx8bwyEfVE2OTzMlKJOJub5HuuOJh86q5Dh+6tHZ EtVXzg75yUIGuRtFYM9C4MSxSRs7ZRrjfQ8LO7w/BTQazGAdw3NepA0JzsCNZy0Tet1u 6C9Q== X-Gm-Message-State: AOAM532P6+NRarKxonh8lQ8TtlK8D1aiY2lH6r9h/+Zll+m6UuED4njZ X/x3DzwhbVPwFJBfJ1uIyCocZOhEOKNEIQ/nyYA= X-Google-Smtp-Source: ABdhPJyyXyQKbrj+MYo13UDrQ7VGTuar2CehlnDQODqFo3ayyH/KpJAXZ2xPZxfWMAZ1cx8qRTghAg== X-Received: by 2002:a17:903:18e:b0:156:b0e1:63d7 with SMTP id z14-20020a170903018e00b00156b0e163d7mr1234133plg.126.1649039471358; Sun, 03 Apr 2022 19:31:11 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-6-214.hawaiiantel.net. [72.253.6.214]) by smtp.gmail.com with ESMTPSA id p26-20020a63951a000000b003826aff3e41sm8471117pgd.33.2022.04.03.19.31.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Apr 2022 19:31:10 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 6/8] boost: fix native build with glibc-2.34 Date: Sun, 3 Apr 2022 16:30:27 -1000 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Apr 2022 18:46:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/163978 From: Martin Jansa Signed-off-by: Martin Jansa Signed-off-by: Steve Sakoman --- ...e-warning-with-glibc-2.34-on-Linux-p.patch | 32 +++++++++++++++++++ ...-elide-a-warning-that-caused-Solaris.patch | 24 ++++++++++++++ meta/recipes-support/boost/boost_1.72.0.bb | 2 ++ 3 files changed, 58 insertions(+) create mode 100644 meta/recipes-support/boost/boost/0001-Fix-Wsign-compare-warning-with-glibc-2.34-on-Linux-p.patch create mode 100644 meta/recipes-support/boost/boost/0001-Revert-change-to-elide-a-warning-that-caused-Solaris.patch diff --git a/meta/recipes-support/boost/boost/0001-Fix-Wsign-compare-warning-with-glibc-2.34-on-Linux-p.patch b/meta/recipes-support/boost/boost/0001-Fix-Wsign-compare-warning-with-glibc-2.34-on-Linux-p.patch new file mode 100644 index 0000000000..46c706931b --- /dev/null +++ b/meta/recipes-support/boost/boost/0001-Fix-Wsign-compare-warning-with-glibc-2.34-on-Linux-p.patch @@ -0,0 +1,32 @@ +From f9d0e594d43afcb4ab0043117249feb266ba4515 Mon Sep 17 00:00:00 2001 +From: Romain Geissler +Date: Tue, 10 Aug 2021 14:22:28 +0000 +Subject: [PATCH] Fix -Wsign-compare warning with glibc 2.34 on Linux + platforms. + +In file included from /data/mwrep/res/osp/Boost/21-0-0-0/include/boost/thread/thread_only.hpp:17, + from /data/mwrep/res/osp/Boost/21-0-0-0/include/boost/thread/thread.hpp:12, + from src/GetTest.cpp:12: +/data/mwrep/res/osp/Boost/21-0-0-0/include/boost/thread/pthread/thread_data.hpp: In member function 'void boost::thread_attributes::set_stack_size(std::size_t)': +/data/mwrep/res/osp/Boost/21-0-0-0/include/boost/thread/pthread/thread_data.hpp:61:19: error: comparison of integer expressions of different signedness: 'std::size_t' {aka 'long unsigned int'} and 'long int' [-Werror=sign-compare] + 61 | if (size(PTHREAD_STACK_MIN)) size=PTHREAD_STACK_MIN; + #endif + size = ((size+page_size-1)/page_size)*page_size; + int res = pthread_attr_setstacksize(&val_, size); diff --git a/meta/recipes-support/boost/boost/0001-Revert-change-to-elide-a-warning-that-caused-Solaris.patch b/meta/recipes-support/boost/boost/0001-Revert-change-to-elide-a-warning-that-caused-Solaris.patch new file mode 100644 index 0000000000..3784cf9165 --- /dev/null +++ b/meta/recipes-support/boost/boost/0001-Revert-change-to-elide-a-warning-that-caused-Solaris.patch @@ -0,0 +1,24 @@ +From 74fb0a26099bc51d717f5f154b37231ce7df3e98 Mon Sep 17 00:00:00 2001 +From: Rob Boehne +Date: Wed, 20 Nov 2019 11:25:20 -0600 +Subject: [PATCH] Revert change to elide a warning that caused Solaris builds + to fail. + +Upstream-Status: Backport [1.73.0 https://github.com/boostorg/thread/commit/74fb0a26099bc51d717f5f154b37231ce7df3e98] +--- + boost/thread/pthread/thread_data.hpp | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/boost/thread/pthread/thread_data.hpp b/boost/thread/pthread/thread_data.hpp +index aefbeb43..bc9b1367 100644 +--- a/boost/thread/pthread/thread_data.hpp ++++ b/boost/thread/pthread/thread_data.hpp +@@ -57,7 +57,7 @@ namespace boost + #else + std::size_t page_size = ::sysconf( _SC_PAGESIZE); + #endif +-#if PTHREAD_STACK_MIN > 0 ++#ifdef PTHREAD_STACK_MIN + if (size X-Patchwork-Id: 6199 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 000DFC4743F for ; Mon, 4 Apr 2022 18:46:42 +0000 (UTC) Received: from mail-pg1-f181.google.com (mail-pg1-f181.google.com [209.85.215.181]) by mx.groups.io with SMTP id smtpd.web08.30491.1649039474529559565 for ; Sun, 03 Apr 2022 19:31:14 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=JdD6KeAe; spf=softfail (domain: sakoman.com, ip: 209.85.215.181, mailfrom: steve@sakoman.com) Received: by mail-pg1-f181.google.com with SMTP id t13so7147526pgn.8 for ; Sun, 03 Apr 2022 19:31:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=LQtXBVvl3NPmX2JKzQL0Q9OXlMCnmzs3Z/8+8EHUdCw=; b=JdD6KeAeVtdg3blantKrUaqSU7JeYWRcrM1fB8TM00TMvo49PCHcs7z0NVgelaYdzo keDYIuBf8UFVHkBCS+PI8DOedYkF7Ue4d5aTIlJa4/4Kra+pI0EcXYcfHKSTUKa7yEN9 5UeoJcYpomH61Ofzw6+ReiG6v+n8XPQ6ZY2Zpb/U/7oBKJ8pSosURzXHV6Ls4p2Mc1dY rpAy6Gcqc4suLSOr2H6Fly0b63VFALJDhvDo5gK8LXiiBKGUYbFwYYbCwiffJWXD6NMQ 646CJpNgsylITT12078q556z/qptW2ZYTtnB/bGn14UTTMVtnapedKVTOoBudiFwkO2D 9b1Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=LQtXBVvl3NPmX2JKzQL0Q9OXlMCnmzs3Z/8+8EHUdCw=; b=g9BfEBd4eCXKRyelyCObZHLULmBcjVCb1uBvqkLgYtiS/Yq7AvQAjU4ESKwT49ExAn Aqu7bNe/MfpLuuSBNmXqWBtYeBi+rELjIED2hQc/bpIhg4Zr5E+gH4Aax7JH9hiQooX7 xQYwRZYBRZSt0FJVyneRAhCBX5lJc5vuURJA0m9y5EdL9sm5ubFfPUglahPz7sWI6sM8 dPPpNQYjwFFk96azzwxOafJHvLLobOKMujx/VnTR0fvtJXNtOtcF1kCP5iN4iUL7LNdh 25aKAbGpeRX+Fde/FHRtKMxio/DD/2eQTeGCTkw9fSxr19VyZ6uS6OnNjQShFw0G6cmb H+PA== X-Gm-Message-State: AOAM531u76su0UrYJjHDw9KXP2tKETxmrrQ8A9fU2KsaGJDzV0/dl0AC +SLELS+I6q1D/Qk4Z7WxD33Vnu3bDFgZjaGMmjA= X-Google-Smtp-Source: ABdhPJywS6klqQyS9SunQogrCVwJk/6QgAGovMhOarXQ24qpUsm+GEJenQ5dh7l5CQ7ssvmDTSWSxQ== X-Received: by 2002:a63:2b0d:0:b0:386:322:f05c with SMTP id r13-20020a632b0d000000b003860322f05cmr24482730pgr.11.1649039473606; Sun, 03 Apr 2022 19:31:13 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-6-214.hawaiiantel.net. [72.253.6.214]) by smtp.gmail.com with ESMTPSA id p26-20020a63951a000000b003826aff3e41sm8471117pgd.33.2022.04.03.19.31.12 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Apr 2022 19:31:12 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 7/8] python3-jinja2: Correct HOMEPAGE Date: Sun, 3 Apr 2022 16:30:28 -1000 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Apr 2022 18:46:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/163979 From: Peter Kjellerstedt Signed-off-by: Peter Kjellerstedt Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie (cherry picked from commit 261778c1e3665b34c0d4e49bda63b520d5335587) Signed-off-by: Steve Sakoman --- meta/recipes-devtools/python/python3-jinja2_2.11.3.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-devtools/python/python3-jinja2_2.11.3.bb b/meta/recipes-devtools/python/python3-jinja2_2.11.3.bb index dbdf563f87..9f054c6024 100644 --- a/meta/recipes-devtools/python/python3-jinja2_2.11.3.bb +++ b/meta/recipes-devtools/python/python3-jinja2_2.11.3.bb @@ -1,5 +1,5 @@ DESCRIPTION = "Python Jinja2: A small but fast and easy to use stand-alone template engine written in pure python." -HOMEPAGE = "https://pypi.org/project/Jinja/" +HOMEPAGE = "https://pypi.org/project/Jinja2/" LICENSE = "BSD-3-Clause" LIC_FILES_CHKSUM = "file://LICENSE.rst;md5=5dc88300786f1c214c1e9827a5229462" From patchwork Mon Apr 4 02:30:29 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 6202 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 842F1C4332F for ; Mon, 4 Apr 2022 18:46:44 +0000 (UTC) Received: from mail-pj1-f41.google.com (mail-pj1-f41.google.com [209.85.216.41]) by mx.groups.io with SMTP id smtpd.web11.30379.1649039476655103755 for ; Sun, 03 Apr 2022 19:31:16 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20210112.gappssmtp.com header.s=20210112 header.b=wzz8BcMG; spf=softfail (domain: sakoman.com, ip: 209.85.216.41, mailfrom: steve@sakoman.com) Received: by mail-pj1-f41.google.com with SMTP id nt14-20020a17090b248e00b001ca601046a4so3688611pjb.0 for ; Sun, 03 Apr 2022 19:31:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20210112.gappssmtp.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=Nzqb/30ef+ssptPMRDxRFkv8jNTkp7PxxWQuMJIvks0=; b=wzz8BcMGIGETCiWsTS5LTSnDn7Y8UA5IJip/z63qCB47tT5Dbcz2QzVvsyYQcsoUb3 U7l3MWyG59R6rNfI+KnkDipQ9hWZh85EplhncOS/8UbIXJS/Ic03IRDBz6RIbF3Kejj8 k21+5hVB8yonFZg1Cz3sgBxrzF/QXVeyQn+2fn6VJIWPIZFichnmpUn8Yu/369U/G3FL HSeexs+oxZqrHz9zbMUujpDhr1m8nctyQ8oAtSR4C8Y4Fopb80zXJgiNFiQ7OhL99ZR4 sCXxyVWHG8EEs4JT5YB63LNV0rkJjkt2yU+ysUAsiczOASjcILukB0GFnLmuwA7WJnJ4 ypow== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Nzqb/30ef+ssptPMRDxRFkv8jNTkp7PxxWQuMJIvks0=; b=F/kAt036LRuSwotlEhiPYfhIPhauVaPQlBDnUhAjSQ1ZoRuRKgY3nlA6P2qzjXI/cj cmBKg3REqiU+ZGzitsgfuzeqMmLsN6SSdIQqjvlWYb3uU4hrWYKmuedyqFgzAvAya6rJ APk4NDF8wrNUwTji5F9CCaGhaHGJhZrGVGDysvSgcryWPGhpAwHKlBBjlO0wzQhb6uZ1 uJ9u4hYbyXO/N8IdVt9Zk4K103F5Lb9v35FeebyXAHcir2ZK0tHGvu0Xlt7hthfLCaeX suBx+xeD88e72nyuBNvaesUvIxC5crmLV0DEr/LWfKM9s84/mPrcG8RXuOtARkX/TTDh GQcg== X-Gm-Message-State: AOAM531Ve4D2Lgt6yCVhpmTLtMe0RL9QHCx/FqpJmqHV+svM6pAFI36R dv8AfOdgNF/c6XqY79aprMefo5KVHaoxpXSMlDw= X-Google-Smtp-Source: ABdhPJxZ/+hJ8TsFEb2W2A5vZjbhRYmsXGuroqzl9V3IklnDX2/bcwtuv04FfRBVStAAPzJ5GRVbTg== X-Received: by 2002:a17:90b:2246:b0:1c6:5781:7193 with SMTP id hk6-20020a17090b224600b001c657817193mr24419048pjb.48.1649039475795; Sun, 03 Apr 2022 19:31:15 -0700 (PDT) Received: from hexa.router0800d9.com (dhcp-72-253-6-214.hawaiiantel.net. [72.253.6.214]) by smtp.gmail.com with ESMTPSA id p26-20020a63951a000000b003826aff3e41sm8471117pgd.33.2022.04.03.19.31.14 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Apr 2022 19:31:15 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][dunfell 8/8] tzdata: update to 2022a Date: Sun, 3 Apr 2022 16:30:29 -1000 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 04 Apr 2022 18:46:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/163980 From: Oleksandr Kravchuk Signed-off-by: Richard Purdie (cherry picked from commit b280aecd79e95811f8baec6c4479c5752c54d9e5) Signed-off-by: Steve Sakoman --- meta/recipes-extended/timezone/timezone.inc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-extended/timezone/timezone.inc b/meta/recipes-extended/timezone/timezone.inc index 43d14d7f12..cdd1a2ac3c 100644 --- a/meta/recipes-extended/timezone/timezone.inc +++ b/meta/recipes-extended/timezone/timezone.inc @@ -6,7 +6,7 @@ SECTION = "base" LICENSE = "PD & BSD-3-Clause" LIC_FILES_CHKSUM = "file://LICENSE;md5=c679c9d6b02bc2757b3eaf8f53c43fba" -PV = "2021e" +PV = "2022a" SRC_URI =" http://www.iana.org/time-zones/repository/releases/tzcode${PV}.tar.gz;name=tzcode \ http://www.iana.org/time-zones/repository/releases/tzdata${PV}.tar.gz;name=tzdata \ @@ -14,6 +14,6 @@ SRC_URI =" http://www.iana.org/time-zones/repository/releases/tzcode${PV}.tar.gz UPSTREAM_CHECK_URI = "http://www.iana.org/time-zones" -SRC_URI[tzcode.sha256sum] = "584666393a5424d13d27ec01183da17703273664742e049d4f62f62dab631775" -SRC_URI[tzdata.sha256sum] = "07ec42b737d0d3c6be9c337f8abb5f00554a0f9cc4fcf01a703d69403b6bb2b1" +SRC_URI[tzcode.sha256sum] = "f8575e7e33be9ee265df2081092526b81c80abac3f4a04399ae9d4d91cdadac7" +SRC_URI[tzdata.sha256sum] = "ef7fffd9f4f50f4f58328b35022a32a5a056b245c5cb3d6791dddb342f871664"