Compare commits

...

157 Commits

Author SHA1 Message Date
Steve Sakoman
d70d287a77 build-appliance-image: Update to kirkstone head revision
(From OE-Core rev: 1efbe1004bc82e7c14c1e8bd4ce644f5015c3346)

Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-04 08:47:08 -07:00
Steve Sakoman
91484dd593 poky.conf: bump version for 4.0.26
(From meta-yocto rev: 3dd438c749099f2a5e808c4690d7ea767263e5b5)

Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-04 08:42:48 -07:00
Guocai He
a406bd6d53 mesa: Update SRC_URI
Update SRC_URI for mesa.
The the tarball of mesa has been changed
from:
https://mesa.freedesktop.org/archive/
to:
https://archive.mesa3d.org/

(From OE-Core rev: 6397cd1ad55927c312051cbd42d5825fa8ed969b)

Signed-off-by: Guocai He <guocai.he.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-04 08:42:48 -07:00
Michael Halstead
c22220055b yocto-uninative: Update to 4.7 for glibc 2.41
(From OE-Core rev: eb89509bfb976cfb62369b05f55534615afaf886)

Signed-off-by: Michael Halstead <mhalstead@linuxfoundation.org>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-04 08:42:48 -07:00
Deepesh Varatharajan
c5f4a2b228 llvm : Fix CVE-2024-0151
Backport a patch from upstream to fix CVE-2024-0151
Upstream-Status: Backport [78ff617d3f]

(From OE-Core rev: 883754a84accdc8f8418e83d3c54aa763bcdff87)

Signed-off-by: Deepesh Varatharajan <Deepesh.Varatharajan@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-04 08:42:48 -07:00
Peter Marko
47efe3545e freetype: patch CVE-2025-27363
From [1]:
An out of bounds write exists in FreeType versions 2.13.0 and below
(newer versions of FreeType are not vulnerable) when attempting to
parse font subglyph structures related to TrueType GX and variable font
files. The vulnerable code assigns a signed short value to an unsigned
long and then adds a static value causing it to wrap around and
allocate too small of a heap buffer. The code then writes up to 6
signed long integers out of bounds relative to this buffer. This may
result in arbitrary code execution. This vulnerability may have been
exploited in the wild.

Per [2] patches [3] and [4] are needed.
Unfortunately, the code changed since 2.11.1 and it's not possible to do
backport without significant changes. Since Debian and Ubuntu have
already patched this CVE, take the patch from them - [5]/[6].
The patch is a combination of patch originally proposed in [7] and
follow-up patch [4].

[1] https://nvd.nist.gov/vuln/detail/CVE-2025-27363
[2] https://gitlab.freedesktop.org/freetype/freetype/-/issues/1322
[3] ef63669652
[4] 73720c7c99
[5] https://git.launchpad.net/ubuntu/+source/freetype/commit/?h=applied/ubuntu/jammy-devel&id=fc406fb02653852dfa5979672e3d8d56ed329186
[6] 13295227b5
[7] https://www.openwall.com/lists/oss-security/2025/03/14/3

(From OE-Core rev: 5a8d4c7a9a0e099da0294141cf5590b55f0503cd)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-04 08:42:48 -07:00
Peter Marko
d7e6e73ba1 perl: ignore CVE-2023-47038
Fix for this CVE was backported to 5.34.2 in
12c313ce49

This commit is listed in
https://security-tracker.debian.org/tracker/CVE-2023-47038

(From OE-Core rev: 46fd9acd6b0e418009f4cec747ae82af60acbc6b)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-04 08:42:47 -07:00
Peter Marko
717a181fd2 libarchive: ignore CVE-2025-1632
As already mentioned in [1] when backporting commit including fix for
this CVE, this vulnerability applies only from libarchive 3.7.0 commit
[2] which introduced bsdunzip which contains this vulnerability.

[1] https://git.openembedded.org/openembedded-core/commit/?h=kirkstone&id=ec837d3b21b4f8b98abac53e2833f1490ba6bf1e
[2] c157e4ce8e

(From OE-Core rev: bf7654877ba99f0b18a1cf6f83032af5ecabd01f)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-04 08:42:47 -07:00
Divya Chellam
68c9f9f449 zlib: fix CVE-2014-9485
Directory traversal vulnerability in the do_extract_currentfile
function in miniunz.c in miniunzip in minizip before 1.1-5 might
allow remote attackers to write to arbitrary files via a crafted
entry in a ZIP archive.

Reference:
https://security-tracker.debian.org/tracker/CVE-2014-9485

Upstream-patch:
14a5f8f266

(From OE-Core rev: 32c4b28fc06e39ab8ef86aebc5e1e1ae19934495)

Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-04 08:42:47 -07:00
Peter Marko
ccd6eee7fc cve-update-nvd2-native: handle missing vulnStatus
There is a new CVE which is missing vulnStatus field:
https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-2682

This leads to:
File: '<snip>/poky/meta/recipes-core/meta/cve-update-nvd2-native.bb', lineno: 336, function: update_db
     0332:
     0333:    accessVector = None
     0334:    vectorString = None
     0335:    cveId = elt['cve']['id']
 *** 0336:    if elt['cve']['vulnStatus'] ==  "Rejected":
     0337:        c = conn.cursor()
     0338:        c.execute("delete from PRODUCTS where ID = ?;", [cveId])
     0339:        c.execute("delete from NVD where ID = ?;", [cveId])
     0340:        c.close()
Exception: KeyError: 'vulnStatus'

(From OE-Core rev: 453c5c8d9031be2b3a25e2a04e0f5f6325ef7298)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-01 09:02:41 -07:00
Bruce Ashfield
0e7a9c67b9 linux-yocto/5.10: update to v5.10.234
Updating linux-yocto/5.10 to the latest korg -stable release that comprises
the following commits:

    0ef80b084295 Revert "x86/mm: Randomize per-cpu entry area"
    bcd2efd15975 mt76: mt7915: fix txrate reporting
    e1e411e59308 x86/mm: Randomize per-cpu entry area
    ba824e697315 mm: fix mmap kernel hang
    f0a53361993a Linux 5.10.234
    c762b76981fc Partial revert of xhci: use pm_ptr() instead #ifdef for CONFIG_PM conditionals
    664760c49d98 xhci: use pm_ptr() instead of #ifdef for CONFIG_PM conditionals
    1f66a3a1a516 drm/v3d: Assign job pointer to NULL before signaling the fence
    d2b550208155 Input: xpad - add support for wooting two he (arm)
    098b8808e2e6 Input: xpad - add unofficial Xbox 360 wireless receiver clone
    5e9fed31adc8 Input: atkbd - map F23 key to support default copilot shortcut
    99c866bea85e Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null"
    94770cf7c512 USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
    354aef2ec80a wifi: iwlwifi: add a few rate index validity checks
    31bd7378c6fe ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
    d072ea247481 Bluetooth: RFCOMM: Fix not validating setsockopt user input
    d19a8650fd3d vfio/platform: check the bounds of read/write syscalls
    553df82a8c73 signal/m68k: Use force_sigsegv(SIGSEGV) in fpsp040_die
    f70103a4355c m68k: Update ->thread.esp0 before calling syscall_trace() in ret_from_signal
    03c56665dab1 net: sched: fix ets qdisc OOB Indexing
    8c41abc11aa8 gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
    09f698656628 ASoC: samsung: Add missing depends on I2C
    20019b1f0040 irqchip/sunxi-nmi: Add missing SKIP_WAKE flag
    3ff6ce057622 scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request
    d5bd48f16d4a seccomp: Stub for !CONFIG_SECCOMP
    c269af144a79 ASoC: samsung: Add missing selects for MFD_WM8994
    771f8a8a6995 ASoC: wm8994: Add depends on MFD core
    fe2c0bd6d1e2 net: fix data-races around sk->sk_forward_alloc
    285ce1f89f8d scsi: sg: Fix slab-use-after-free read in sg_release()
    7ffaf1a16f65 x86/xen: fix SLS mitigation in xen_hypercall_iret()
    daeac89cdb03 vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
    18a7fc371d1d vsock/virtio: discard packets if the transport changes
    a925a200299a fou: remove warn in gue_gro_receive on unsupported protocol
    f9f76ff74dae nfsd: add list_head nf_gc to struct nfsd_file
    8a8b83016f06 ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
    83f5a87ee8ca blk-cgroup: Fix UAF in blkcg_unpin_online()
    605889754ee6 RDMA/hns: Fix deadlock on SRQ async events.
    461091c27f55 vmalloc: fix accounting with i915
    e8d3c53c6f1c drm/radeon: check bo_va->bo is non-NULL before using it
    85a9c98a5e0f iio: adc: rockchip_saradc: fix information leak in triggered buffer
    031538ff9c32 iio: imu: inv_icm42600: fix timestamps after suspend if sensor is on
    641b4041cb4e iio: imu: inv_icm42600: fix spi burst write not supported
    da55e7622580 Revert "PCI: Use preserve_config in place of pci_flags"
    14984139f1f2 hrtimers: Handle CPU state correctly on hotplug
    d1099ad23596 irqchip/gic-v3: Handle CPU_PM_ENTER_FAILED correctly
    2dfbb920a89b gpiolib: cdev: Fix use after free in lineinfo_changed_notify
    80da29deb88a fs/proc: fix softlockup in __read_vmcore (part 2)
    ae527bd2b537 vsock: reset socket state when de-assigning the transport
    3cde51df39c3 vsock/virtio: cancel close work in the destructor
    f9710a5cbd99 net: ethernet: xgbe: re-add aneg to supported features in PHY quirks
    17dcfc0f54b7 x86/asm: Make serialize() always_inline
    a722df501ba3 nvmet: propagate npwg topology
    3f8b360ce0e0 poll_wait: add mb() to fix theoretical race between waitqueue_active() and .poll()
    99db426762e1 kheaders: Ignore silly-rename files
    95597be4806d fs: fix missing declaration of init_files
    2cf7601e1295 hfs: Sanity check the root record
    98ea165a2ac2 mac802154: check local interfaces before deleting sdata list
    3eb329978997 i2c: rcar: fix NACK handling when being a target
    8d037f34385a i2c: mux: demux-pinctrl: check initial mux selection, too
    a34050f70e79 drm/v3d: Ensure job pointer is set to NULL after job completion
    72dc13457e67 net/mlx5: Fix RDMA TX steering prio
    47166d31e531 net/mlx5: Refactor mlx5_get_flow_namespace
    9f07d9fd6181 net/mlx5: Add priorities for counters in RDMA namespaces
    faf64fe8915d nfp: bpf: prevent integer overflow in nfp_bpf_event_output()
    5f1678346109 gtp: Destroy device along with udp socket's netns dismantle.
    66f1864cd0b1 gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp().
    320a0dea3b28 gtp: use exit_batch_rtnl() method
    fae8bd0b07f9 net: add exit_batch_rtnl() method
    37fdbeb0e293 net: net_namespace: Optimize the code
    bb36838dac7b bpf: Fix bpf_sk_select_reuseport() memory leak
    9f7ad4eb839d net: ethernet: ti: cpsw_ale: Fix cpsw_ale_get_field()
    a13d640d8c8e phy: usb: Fix clock imbalance for suspend/resume
    3bc29a491192 phy: usb: Use slow clock for wake enabled suspend
    246428bfb9e7 sctp: sysctl: rto_min/max: avoid using current->nsproxy
    acec80d9f126 drm: adv7511: Fix use-after-free in adv7533_attach_dsi()
    49881fcef3d4 drm: bridge: adv7511: use dev_err_probe in probe function
    3747465c5da7 drm: bridge: adv7511: unregister cec i2c device after cec adapter
    09a817549036 drm/bridge: adv7533: Switch to devm MIPI-DSI helpers
    2c0106fdd35c drm/mipi-dsi: Create devm device attachment
    5ad24956a20e drm/mipi-dsi: Create devm device registration
    cb3a64b6b449 drm: bridge: adv7511: Remove redundant null check before clk_disable_unprepare
    8ff6f635a08c ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
    af45819b29bf ocfs2: correct return value of ocfs2_local_free_info()
    a8d08d9f5e12 phy: usb: Toggle the PHY power during init
    5917962b5196 phy: usb: Add "wake on" functionality for newer Synopsis XHCI controllers
    5330de58f70d block: remove the update_bdev parameter to set_capacity_revalidate_and_notify
    afa920d411e9 sd: update the bdev size in sd_revalidate_disk
    72224a75c5f6 nvme: let set_capacity_revalidate_and_notify update the bdev size
    dddf71505857 loop: let set_capacity_revalidate_and_notify update the bdev size
    5601c261bbc5 arm64: dts: rockchip: add hevc power domain clock to rk3328
    00360f3f3962 arm64: dts: rockchip: add #power-domain-cells to power domain nodes
    3528099673ba iio: inkern: call iio_device_put() only on mapped devices
    ac8d932e3214 iio: adc: at91: call input_free_device() on allocated iio_dev
    1b7b9084fad8 iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep()
    2d72fc4a1ca6 iio: gyro: fxas21002c: Fix missing data update in trigger handler
    3bf8d1e87939 iio: adc: ti-ads8688: fix information leak in triggered buffer
    a386d9d2dc66 iio: imu: kmx61: fix information leak in triggered buffer
    b0e9c11c762e iio: light: vcnl4035: fix information leak in triggered buffer
    e1c1e8c05010 iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
    d25f1fc27367 iio: pressure: zpa2326: fix information leak in triggered buffer
    3e4d32cc1459 usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
    209b72d3c4e1 usb: fix reference leak in usb_new_device()
    d9f78c900648 USB: core: Disable LPM only for non-suspended ports
    ee63cb2262e3 USB: usblp: return error when setting unsupported protocol
    1062b648bff6 usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null
    4c51407cb8a4 usb: dwc3: gadget: fix writing NYET threshold
    258b3530cfdf USB: serial: cp210x: add Phoenix Contact UPS Device
    09d4072aabee usb-storage: Add max sectors quirk for Nokia 208
    717b7360ccc1 staging: iio: ad9832: Correct phase range check
    38da4bab433c staging: iio: ad9834: Correct phase range check
    e764b4e18789 USB: serial: option: add Neoway N723-EA support
    dad372177818 USB: serial: option: add MeiG Smart SRM815
    66de7a2541d8 md/raid5: fix atomicity violation in raid5_cache_count
    08765d4e44d4 scripts/sorttable: fix orc_sort_cmp() to maintain symmetry and transitivity
    88136f799f33 drm/amd/display: increase MAX_SURFACES to the value supported by hw
    2f8067b3425c ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[]
    522ddfb1fb62 ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[]
    8c38baa03ac8 riscv: Fix sleeping in invalid context in die()
    497471baf53b drm/amd/display: Add check for granularity in dml ceil/floor helpers
    dc583e7e5f85 sctp: sysctl: auth_enable: avoid using current->nsproxy
    03ca51faba2b sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
    2c1a42fbd98e dm-ebs: don't set the flag DM_TARGET_PASSES_INTEGRITY
    cd30a3960433 dm thin: make get_first_thin use rcu-safe list first function
    9340385468d0 afs: Fix the maximum cell name length
    a965f7f0ea3a netfilter: conntrack: clamp maximum hashtable size to INT_MAX
    208929266386 netfilter: nf_tables: imbalance in flowtable binding
    72e6ca38ca66 tls: Fix tls_sw_sendmsg error handling
    53b7a6762483 cxgb4: Avoid removal of uninserted tid
    43658e4a5f27 net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
    22e3f5ee7317 tcp/dccp: allow a connection when sk_max_ack_backlog is zero
    9261b8252473 tcp/dccp: complete lockless accesses to sk->sk_max_ack_backlog
    c9c0471e29f0 net: 802: LLC+SNAP OID:PID lookup on start of skb data
    c2da454712f2 ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe()
    4a6167ae75ad netfilter: nft_dynset: honor stateful expressions in set definition
    01c4e22c260d ASoC: mediatek: disable buffer pre-allocation
    d8cfbb8723bd exfat: fix the infinite loop in exfat_readdir()
    5c10baed458e dm array: fix cursor index when skipping across block boundaries
    cb223d9606a3 dm array: fix unreleased btree blocks on closing a faulty array cursor
    fc1ef07c3522 dm array: fix releasing a faulty array block twice in dm_array_cursor_end
    359abf6ca962 jbd2: flush filesystem device before updating tail sequence
    0f2b2d9e881c ceph: give up on paths longer than PATH_MAX
    70a41e4b4d83 smb: client: fix potential OOB in smb2_dump_detail()
    e1109eace22a scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine
    14c02f4e6920 Linux 5.10.233
    d675fefbaec3 mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()
    17c3f7988f32 drm: adv7511: Drop dsi single lane support
    081bdb3a3167 net/sctp: Prevent autoclose integer overflow in sctp_association_init()
    5a1dd20a9d86 sky2: Add device ID 11ab:4373 for Marvell 88E8075
    c55d186376a8 pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking
    42a6eb4ed7a9 RDMA/uverbs: Prevent integer overflow issue
    50804bd95f00 modpost: fix the missed iteration for the max bit in do_input()
    0cd78baf4dd2 modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host
    d5a30a6117ea btrfs: don't set lock_owner when locking extent buffer for reading
    51b03b7473a0 btrfs: locking: remove the recursion handling code
    20d96aa61607 ARC: build: Try to guess GCC variant of cross compiler
    58713417015b irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base
    af37dc1f017b net: usb: qmi_wwan: add Telit FE910C04 compositions
    e529b4686038 bpf: fix potential error return
    6f3ce0ee5c3c sound: usb: format: don't warn that raw DSD is unsupported
    a2718ed1eb8c btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount
    12a6e304325d wifi: mac80211: wake the queues in case of failure in resume
    2558d753df06 tracing: Prevent bad count for tracing_cpumask_write
    1bf53a2145fa kernel: Initialize cpumask before parsing
    ba5120a2fb5f btrfs: fix use-after-free when COWing tree bock and tracing is enabled
    bf267f2f81bc btrfs: rename and export __btrfs_cow_block()
    1817e3e849f6 btrfs: locking: remove all the blocking helpers
    4da6be8eb618 btrfs: switch extent buffer tree lock to rw_semaphore
    42d7147c9c21 dmaengine: dw: Select only supported masters for ACPI devices
    d3017895e393 ila: serialize calls to nf_register_net_hooks()
    0d3fa6c3c9ca af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK
    fa57f07ba062 af_packet: fix vlan_get_tci() vs MSG_PEEK
    7eaa71f56a6f RDMA/rtrs: Ensure 'ib_sge list' is accessible
    925f2be402f9 eth: bcmsysport: fix call balance of priv->clk handling routines
    9c76fb573889 ALSA: usb-audio: US16x08: Initialize array before use
    0f67a980f2ae net: llc: reset skb->transport_header
    6a14b46052ee netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext
    cf6befa7c569 netrom: check buffer length before accessing it
    60e64b6261d1 drm/bridge: adv7511_audio: Update Audio InfoFrame properly
    bbcbb83a7f1f RDMA/bnxt_re: Fix the locking while accessing the QP table
    070d214c0183 RDMA/bnxt_re: Fix max_qp_wrs reported
    cff07807f693 RDMA/bnxt_re: Fix reporting hw_ver in query_device
    5684c11d3aec RDMA/bnxt_re: Add check for path mtu in modify_qp
    aea89a85bc74 RDMA/mlx5: Enforce same type port association for multiport RoCE
    af3626302040 net/mlx5: Make API mlx5_core_is_ecpf accept const pointer
    6531f9c7e518 thunderbolt: Add support for Intel Panther Lake-M/P
    f8b8c8c83528 thunderbolt: Add support for Intel Lunar Lake
    e7cca35083b8 thunderbolt: Add Intel Barlow Ridge PCI ID
    a534e5d47e4f thunderbolt: Add support for Intel Meteor Lake
    aeb4a70248f5 thunderbolt: Add support for Intel Raptor Lake
    21347105ded3 thunderbolt: Add support for Intel Alder Lake
    712137b177b4 selinux: ignore unknown extended permissions
    36c569dfa724 x86/hyperv: Fix hv tsc page based sched_clock for hibernation
    c47e02201171 ipv6: prevent possible UAF in ip6_xmit()
    3cb8e49178e1 skb_expand_head() adjust skb->truesize incorrectly
    f67138dd338c nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
    a1c3a19446a4 btrfs: avoid monopolizing a core when activating a swap file
    b29c7783ac1f power: supply: gpio-charger: Fix set charge current limits
    5c4a141ff09e tracing: Constify string literal data member in struct trace_event_call
    e3b89e6a6422 arm64: Ensure bits ASID[15:8] are masked out when the kernel uses 8-bit ASIDs
    de29cb3bdfb2 arm64: mm: Rename asid2idx() to ctxid2asid()
    109f91d8b933 drm/dp_mst: Fix MST sideband message body length check
    221109ba2127 bpf: fix recursive lock when verdict program return SK_PASS
    79f87a6ec39f bpf: Check validity of link->type in bpf_link_show_fdinfo()
    1504108cb602 ipv6: fix possible UAF in ip6_finish_output2()
    ee6b1db17f82 ipv6: use skb_expand_head in ip6_xmit
    4132c4ad00dd ipv6: use skb_expand_head in ip6_finish_output2
    23f95bbe7250 skbuff: introduce skb_expand_head()
    3754c15b9348 MIPS: Probe toolchain support of -msym32
    9ca428c6397a virtio-blk: don't keep queue frozen during system suspend
    bbb55d1cb0b0 scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error
    f37f301d84ea scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time
    3cc9e1a56692 platform/x86: asus-nb-wmi: Ignore unknown event 0xCF
    c06a5b7f12a4 regmap: Use correct format specifier for logging range errors
    1c58d374ca44 ALSA: hda/conexant: fix Z60MR100 startup pop issue
    f36d024bd15e scsi: megaraid_sas: Fix for a potential deadlock
    c1d93e7100e5 scsi: qla1280: Fix hw revision numbering for ISP1020/1040
    7911ca06b674 watchdog: it87_wdt: add PWRGD enable quirk for Qotom QCML04
    7fca949e30c3 tracing/kprobe: Make trace_kprobe's module callback called after jump_label update
    1562871ef613 mtd: rawnand: fix double free in atmel_pmecc_create_user()
    ed1a8aaa3445 dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset
    e87dbcfdf1c0 dmaengine: mv_xor: fix child node refcount handling in early exit
    619a5aeb0f0d phy: core: Fix that API devm_phy_destroy() fails to destroy the phy
    8826abb0ae2d phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider
    574e5cfae2d8 phy: core: Fix that API devm_phy_put() fails to release the phy
    9e21f671b9a9 phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup()
    722ece95fcce phy: core: Fix an OF node refcount leakage in _of_phy_get()
    36a6523d097d mtd: diskonchip: Cast an operand to prevent potential overflow
    9ad478986fd1 nfsd: restore callback functionality for NFSv4.0
    d814eeb7faa4 bpf: Check negative offsets in __bpf_skb_min_len()
    1b63193b150c tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress()
    4e5aab3e4115 mm/vmstat: fix a W=1 clang compiler warning
    e11778189513 media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg
    4e2e9adaea7d epoll: Add synchronous wakeup support for ep_poll_callback
    6e1e991c4017 ceph: validate snapdirname option length when mounting
    b7f89856c5fc of: Fix refcount leakage for OF node returned by __of_get_dma_parent()
    c86a40c26857 of: Fix error path in of_parse_phandle_with_args_map()
    9416f17809a1 udmabuf: also check for F_SEAL_FUTURE_WRITE
    5d4ed71327b0 nilfs2: prevent use of deleted inode
    8d42147c83ee of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one()
    64ee07cfd50f NFS/pnfs: Fix a live lock between recalled layouts and layoutget
    d81f4e73aff9 Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet
    8b53be082fc6 btrfs: tree-checker: reject inline extent items with 0 ref count
    98f31cf96f47 zram: refuse to use zero sized block device as backing device
    df56b6f9b430 sh: clk: Fix clk_enable() to return 0 on NULL clk
    6742afdf6171 hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers
    525c3d0595b0 USB: serial: option: add Telit FE910C04 rmnet compositions
    b38b9456621d USB: serial: option: add MediaTek T7XX compositions
    25a5f80417b2 USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready
    452c1654c3cd USB: serial: option: add MeiG Smart SLM770A
    daf09316ddc2 USB: serial: option: add TCL IK512 MBIM & ECM
    0e8098cc2538 efivarfs: Fix error on non-existent file
    de4359fa4f81 i2c: riic: Always round-up when calculating bus period
    8eb181aee760 chelsio/chtls: prevent potential integer overflow on 32bit
    ddfb709c2895 mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk
    ad26612c2af9 netfilter: ipset: Fix for recursive locking warning
    a24ce83a2de1 net: ethernet: bgmac-platform: fix an OF node reference leak
    1942218bf95f net: hinic: Fix cleanup in create_rxqs/txqs()
    64f3f7388b90 ionic: use ee->offset when returning sprom data
    81bdfcd6e6a9 netdevsim: prevent bad user input in nsim_dev_health_break_write()
    2fb425f27ee6 netdevsim: switch to memdup_user_nul()
    82c7ad9ca099 net/smc: check return value of sock_recvmsg when draining clc data
    846bada23bfc net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg
    e18830b7c498 net/smc: check sndbuf_space again after NOSPACE flag is set in smc_poll
    7678451d66b8 erofs: fix incorrect symlink detection in fast symlink
    0ab621fcdff1 erofs: fix order >= MAX_ORDER warning due to crafted negative i_size
    0f851f8c62d0 i2c: pnx: Fix timeout in wait functions
    e430962901c7 usb: dwc2: gadget: Don't write invalid mapped sg entries into dma_desc with iommu enabled
    4ba1ee910938 usb: cdns3: Add quirk flag to enable suspend residency
    9339c91863de PCI: Add ACS quirk for Broadcom BCM5760X NIC
    dab416edff9d ALSA: usb: Fix UBSAN warning in parse_audio_unit()
    f9869f6772e3 MIPS: Loongson64: DTS: Fix msi node for ls7a
    0dde3ae52a0d PCI: Use preserve_config in place of pci_flags
    6c7731ad179a PCI/AER: Disable AER service on suspend
    5e473f462a16 net: sched: fix ordering of qlen adjustment
    aaccf3924c7a scsi: dpt_i2o: Remove obsolete driver
    0c8ac16c1e2f usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core
    bfdadc630e33 firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier()
    abc9475430fd Linux 5.10.232
    20ad30bed789 x86/static-call: fix 32-bit build
    e7c1fcdda47b ALSA: usb-audio: Fix a DMA to stack memory bug
    b751972c26f6 x86/xen: remove hypercall page
    b09001da8227 x86/xen: use new hypercall functions instead of hypercall page
    76b42b1340ca x86/xen: add central hypercall functions
    05df6e6cd9a7 x86/xen: don't do PV iret hypercall through hypercall page
    bed5b6a6f207 x86/static-call: provide a way to do very early static-call updates
    4099bcd87390 objtool/x86: allow syscall instruction
    e74011db5179 x86: make get_cpu_vendor() accessible from Xen code
    1d5354a9182b xen/netfront: fix crash when removing device
    dac3f7ba392c Revert "clkdev: remove CONFIG_CLKDEV_LOOKUP"
    8b7e0d915689 Revert "clocksource/drivers:sp804: Make user selectable"
    7f4e1fee0a74 drm/i915: Fix memory leak by correcting cache object name in error handler
    47b341f714e6 tracing/kprobes: Skip symbol counting logic for module symbols in create_local_trace_kprobe()
    dadf82c1b260 bpf: sync_linked_regs() must preserve subreg_def
    6fd69b2f2991 blk-iocost: Avoid using clamp() on inuse in __propagate_weights()
    32a849c676ea ACPICA: events/evxfregn: don't release the ContextMutex that was never acquired
    45af429f76e7 team: Fix feature propagation of NETIF_F_GSO_ENCAP_ALL
    a1a97584334c bonding: Fix feature propagation of NETIF_F_GSO_ENCAP_ALL
    49cb8083c8df net: bonding, dummy, ifb, team: advertise NETIF_F_GSO_SOFTWARE
    216509dda290 net/sched: netem: account for backlog updates from child qdisc
    0fd8c3179b08 qca_spi: Make driver probing reliable
    ab891aeb28d1 qca_spi: Fix clock speed for multiple QCA7000
    68e6a5f0cdd8 cxgb4: use port number to set mac addr
    cf604286b70d ACPI: resource: Fix memory resource type union access
    76d856f03d02 net: lapb: increase LAPB_HEADER_LEN
    4d2b56e2fb1e selftests: mlxsw: sharedbuffer: Remove duplicate test cases
    938742593a57 selftests: mlxsw: sharedbuffer: Remove h1 ingress test case
    a771f349c95d tipc: fix NULL deref in cleanup_bearer()
    784fc6707949 batman-adv: Do not let TT changes list grows indefinitely
    48e63887c01f batman-adv: Remove uninitialized data in full table TT response
    4fb09749f266 batman-adv: Do not send uninitialized TT changes
    616aa5f3c86e acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
    632fb232b6bb exfat: fix potential deadlock on __exfat_get_dentry_set
    e26fa236758e virtio/vsock: Fix accept_queue memory leak
    7b2e41b2d251 bpf, sockmap: Fix update element with same
    7ba7e748bd71 xfs: fix scrub tracepoints when inode-rooted btrees are involved
    4e33aedc3026 xfs: don't drop errno values when we fail to ficlone the entire range
    28b3c03a6790 usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer
    922142bcff97 usb: ehci-hcd: fix call balance of clocks handling routines
    0f6184603ba8 usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature
    1e05b5b36aea ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys()
    ff6f8a29e2a7 usb: host: max3421-hcd: Correctly abort a USB request.
    bd92492a960c tcp: check space before adding MPTCP SYN options
    df8d35efada4 Linux 5.10.231
    af442dd3e3fc octeontx2-pf: Fix otx2_get_fecparam()
    ddeef5079c6b octeontx2: Fix condition.
    bde4e7c15271 media: uvcvideo: Require entities to have a non-zero unique ID
    45a92cbc88e4 ALSA: usb-audio: Fix out of bounds reads when finding clock sources
    3fc53e46fdc8 scsi: core: Fix scsi_mode_select() buffer length handling
    a0777b45095f scsi: sd: Fix sd_do_mode_sense() buffer length handling
    38283b035c9d PCI: rockchip-ep: Fix address translation unit programming
    43c48ad24c03 Revert "drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()"
    f5e45e9464c7 modpost: Add .irqentry.text to OTHER_SECTIONS
    969ee61aa117 ocfs2: Revert "ocfs2: fix the la space leak when unmounting an ocfs2 volume"
    4fcd903a5d9e drm/amd/display: Check BIOS images before it is used
    7d5f99db8b15 xhci: dbc: Fix STALL transfer event handling
    99f0fe6d0191 jffs2: Fix rtime decompressor
    f6fc251baefc jffs2: Prevent rtime decompress memory corruption
    dbedf8ddde53 KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE
    c329033f1b72 KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device
    f4dbf393bfb4 KVM: arm64: vgic-its: Add a data length check in vgic_its_save_*
    c3cded0ff622 Revert "unicode: Don't special case ignorable code points"
    7522e61c5350 btrfs: fix missing snapshot drew unlock when root is dead during swap activation
    354f24382480 sched/core: Prevent wakeup of ksoftirqd during idle load balance
    a676dbc8af8c sched/fair: Check idle_cpu() before need_resched() to detect ilb CPU turning busy
    4aaaf22aa193 sched/fair: Add NOHZ balancer flag for nohz.next_balance updates
    f8d61ae46cf4 sched/fair: Trigger the update of blocked load on newly idle cpu
    0669c671ab36 sched/fair: Merge for each idle cpu loop of ILB
    88136224a8f1 sched/fair: Remove unused parameter of update_nohz_stats
    1940ddbeb9af sched/fair: Remove update of blocked load from newidle_balance
    f3794dbff0ed sched/core: Remove the unnecessary need_resched() check in nohz_csd_func()
    44624fbc019f misc: eeprom: eeprom_93cx6: Add quirk for extra read clock cycle
    a79a7e3c03ae powerpc/prom_init: Fixup missing powermac #size-cells
    5a2eaa3ad2b8 MIPS: Loongson64: DTS: Really fix PCIe port nodes for ls7a
    19bc36c8d4ec usb: chipidea: udc: handle USB Error Interrupt if IOC not set
    5ac1dd51aaa0 i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock
    e5f0e94f95b8 PCI: Add ACS quirk for Wangxun FF5xxx NICs
    1af3a54dcea4 PCI: Add 'reset_subordinate' to reset hierarchy below bridge
    dff561e4060d f2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode.
    22169b367563 nvdimm: rectify the illogical code within nd_dax_probe()
    38953b4419d1 pinctrl: qcom-pmic-gpio: add support for PM8937
    5d552000fe9f scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset
    910f9d22095d scsi: st: Don't modify unknown block number in MTIOCGET
    ddcfc5708da9 leds: class: Protect brightness_show() with led_cdev->led_access mutex
    3dd2c5cb2c69 scsi: hisi_sas: Add cond_resched() for no forced preemption model
    dd72b3ac2fc0 tracing: Use atomic64_inc_return() in trace_clock_counter()
    170b0323b032 pinctrl: freescale: fix COMPILE_TEST error with PINCTRL_IMX_SCU
    18347e7e0404 netpoll: Use rcu_access_pointer() in __netpoll_setup
    78b13b562206 net/neighbor: clear error in case strict check is not set
    f795bdf9dbe2 rocker: fix link status detection in rocker_carrier_init()
    042da326b0a3 ASoC: hdmi-codec: reorder channel allocation list
    e07b54b67e9c Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables
    7522d7d745d1 wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw()
    856b24b5d92c wifi: ipw2x00: libipw_rx_any(): fix bad alignment
    13c3a54f48a6 drm/amdgpu: set the right AMDGPU sg segment limitation
    03c4c3e02cf9 drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov
    368a53315222 jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
    97e693593162 jfs: fix array-index-out-of-bounds in jfs_readdir
    df7c76636952 jfs: fix shift-out-of-bounds in dbSplit
    8c97a4d5463a jfs: array-index-out-of-bounds fix in dtReadFirst
    3ccce34a5c3f dma-debug: fix a possible deadlock on radix_lock
    064149161c37 drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr
    d28d22728b85 wifi: ath5k: add PCI ID for Arcadyan devices
    9400aeb5cd02 wifi: ath5k: add PCI ID for SX76X
    35360255ca30 net: inet6: do not leave a dangling sk pointer in inet6_create()
    2bc34d8c8898 net: inet: do not leave a dangling sk pointer in inet_create()
    14959fd7538b net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
    ce39b5576785 net: af_can: do not leave a dangling sk pointer in can_create()
    daa13175a6de Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
    1dc1e1db9270 af_packet: avoid erroring out after sock_init_data() in packet_create()
    50a90e5af499 net/sched: cbs: Fix integer overflow in cbs_set_port_rate()
    a75fe481c42c net: ethernet: fs_enet: Use %pa to format resource_size_t
    fbc8d9665322 net: fec_mpc52xx_phy: Use %pa to format resource_size_t
    00c9f6e82591 samples/bpf: Fix a resource leak
    86b66b8091c9 r8169: don't apply UDP padding quirk on RTL8126A
    823f4dff6cbd drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check()
    418cf1b2c399 drm/mcde: Enable module autoloading
    a3c885165d7c drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model
    c04d1dc54b11 drm/vc4: hvs: Set AXI panic modes for the HVS
    c5623d7f9f90 media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108
    7850ca9a6695 media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera
    f4f2ef66d288 kcsan: Turn report_filterlist_lock into a raw_spinlock
    34cd4ec08b89 kselftest/arm64: Don't leak pipe fds in pac.exec_sign_all()
    8f855689c164 btrfs: avoid unnecessary device path update for the same device
    99192c735ed4 s390/cpum_sf: Handle CPU hotplug remove during sampling
    c2527d07c7e9 iommu/arm-smmu: Defer probe of clients after smmu device bound
    24328b776fb2 ocfs2: update seq_file index in ocfs2_dlm_seq_next
    d3aeb50fcb12 mmc: core: Further prevent card detect during shutdown
    af940c0d623d mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet
    287e4952d77b regmap: detach regmap from dev on regmap_exit
    7175728f6b2d dma-buf: fix dma_fence_array_signaled v4
    70f3de869865 bpf: fix OOB devmap writes when deleting elements
    336e30f32ae7 bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again
    e3732102a9d6 nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
    df43d8da6bac scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt
    12f04fc8580e scsi: qla2xxx: Fix use after free on unload
    c87add0d819b scsi: qla2xxx: Supported speed displayed incorrectly for VPorts
    406e57325daa scsi: qla2xxx: Fix NVMe and NPIV connect issue
    d7fd14dd866f ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG)
    a59d39e4770f ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8
    b3ebf8cbd886 ALSA: usb-audio: add mixer mapping for Corsair HS80
    1152dd13845e arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
    4a6f053af119 tracing: Fix cmp_entries_dup() to respect sort() comparison rules
    4cbc202f28a5 watchdog: rti: of: honor timeout-sec property
    5912a921289e HID: wacom: fix when get product name maybe null pointer
    43c6d763569f bpf: Fix exact match conditions in trie_get_next_key()
    adb4a970bfa9 bpf: Handle BPF_EXIST and BPF_NOEXIST for LPM trie
    9c19ea59965e ocfs2: free inode when ocfs2_get_init_inode() fails
    e0c6ce842409 spi: mpc52xx: Add cancel_work_sync before module remove
    dbedc7e142df tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg
    8cd416aaac68 drm/sti: Add __iomem for mixer_dbg_mxn's parameter
    7fd09abc4bdd i3c: master: Fix dynamic address leak when 'assigned-address' is present
    b70ba15c66d5 i3c: master: Extend address status bit to 4 and add I3C_ADDR_SLOT_EXT_DESIRED
    1c47272e535d i3c: master: Replace hard code 2 with macro I3C_ADDR_SLOT_STATUS_BITS
    3aecd6fd55cf i3c: fix incorrect address slot lookup on 64-bit
    fbb3aa94fc8d dt-bindings: serial: rs485: Fix rs485-rts-delay property
    0da0be3b1d17 dt_bindings: rs485: Correct delay values
    4733f68e59bb gpio: grgpio: Add NULL check in grgpio_probe
    c8e3aa367e71 gpio: grgpio: use a helper variable to store the address of ofdev->dev
    d9fa09ca004b geneve: do not assume mac header is set in geneve_xmit_skb()
    d93efe18b49a ethtool: Fix wrong mod state in case of verbose and no_mask bitset
    e21855091f11 netfilter: nft_set_hash: skip duplicated elements pending gc run
    6099b5d3e371 netfilter: ipset: Hold module reference while requesting a module
    98ea587a4048 net: sched: fix erspan_opt settings in cls_flower
    e0155b1b1509 igb: Fix potential invalid memory access in igb_init_module()
    9da327f2e6b7 net/qed: allow old cards not supporting "num_images" to work
    650ee9a22d7a tipc: Fix use-after-free of kernel socket in cleanup_bearer().
    c99507fff94b dccp: Fix memory leak in dccp_feat_change_recv
    b90d061345bb net/ipv6: release expired exception dst cached in socket
    b3282c2bebee can: j1939: j1939_session_new(): fix skb reference counting
    aa632691c722 net: hsr: avoid potential out-of-bound access in fill_frame_info()
    f9653b00bef2 net/sched: tbf: correct backlog statistic for GSO packets
    7f5eda0e315b ptp: Add error handling for adjfine callback in ptp_clock_adjtime
    ad28612ebae1 netfilter: x_tables: fix LED ID check in led_tg_check()
    0b2cbed82b7c ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()
    273cab979da1 can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics
    265f8341470f can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
    601ec0003c17 watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart()
    05bed96e4cb0 iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call
    4715e23b3a7f drm/etnaviv: flush shader L1 cache after user commandstream
    c1406d8329f5 btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()
    2d505a801e57 nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur
    7fd29d284b55 nfsd: make sure exp active before svc_export_show
    1f53e8400b13 dm thin: Add missing destroy_work_on_stack()
    c6ac663c92c8 PCI: keystone: Add link up check to ks_pcie_other_map_bus()
    093ecc6d82ff i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()
    aa10c746e79a scsi: ufs: exynos: Fix hibern8 notify callbacks
    a1f2aff064ef util_macros.h: fix/rework find_closest() macros
    afc1e3c00b3f ad7780: fix division by zero in ad7780_write_raw()
    6fd018aa168e btrfs: ref-verify: fix use-after-free after invalid ref action
    6f3821acd7c3 quota: flush quota_release_work upon quota writeback
    366e55e91fe9 octeontx2-pf: Fix out-of-bounds read in otx2_get_fecparam()
    442dadf32d1c ASoC: fsl_micfil: fix the naming style for mask definition
    971b48934577 sh: intc: Fix use-after-free bug in register_intc_controller()
    86a1f9fa2480 sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport
    8c06a00a9be6 SUNRPC: Replace internal use of SOCKWQ_ASYNC_NOSPACE
    a4b153bdaad5 sunrpc: remove unnecessary test in rpc_task_set_client()
    3ccfa8269fae SUNRPC: Convert rpc_client refcount to use refcount_t
    e2730edfff6b SUNRPC: correct error code comment in xs_tcp_setup_socket()
    f69fb61c69a0 nfs: ignore SB_RDONLY when mounting nfs
    bd4624d73373 modpost: remove incorrect code in do_eisa_entry()
    b0660da68491 rtc: ab-eoz9: don't fail temperature reads on undervoltage notification
    7f5a2ed5c181 9p/xen: fix release of IRQ
    fa365f688014 9p/xen: fix init sequence
    57ee79e9c94c block: return unsigned int from bdev_io_min
    25ec6cd751c9 jffs2: fix use of uninitialized variable
    8d8b3f5f4cbf ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
    04c0b0f37617 ubi: fastmap: Fix duplicate slab cache names while attaching
    36b25baf96b8 ubifs: Correct the total block count by deducting journal reservation
    0d68e8514d90 rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
    cd154812858d rtc: abx80x: Fix WDT bit position of the status register
    c48db3147c14 rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq()
    5237a297ffd3 NFSv4.0: Fix a use-after-free problem in the asynchronous open()
    2365f57820c0 um: Always dump trace for specified task in show_stack
    634b3c3d0b5c um: Fix the return value of elf_core_copy_task_fpregs
    e6102b72edc4 um: Fix potential integer overflow during physmem setup
    52ee41452527 rpmsg: glink: Propagate TX failures in intentless mode as well
    02999e135b01 SUNRPC: make sure cache entry active before cache_show
    3c5f545c9a1f NFSD: Prevent a potential integer overflow
    a44a4260a28c lib: string_helpers: silence snprintf() output truncation warning
    8ceb21d76426 usb: dwc3: gadget: Fix looping of queued SG entries
    a98340265f28 usb: dwc3: gadget: Fix checking for number of TRBs left
    3591fe07aa53 ALSA: hda/realtek: Apply quirk for Medion E15433
    99af54eb0c96 ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max
    820bc3f297e8 ALSA: hda/realtek: Set PCBeep to default value for ALC274
    ee68e7bd8022 ALSA: hda/realtek: Update ALC225 depop procedure
    03a469024f67 media: v4l2-core: v4l2-dv-timings: check cvt/gtf result
    d7408a052aa1 media: wl128x: Fix atomicity violation in fmc_send_cmd()
    f74b360a012a HID: wacom: Interpret tilt data from Intuos Pro BT as signed values
    2d2192fd2e6b block: fix ordering between checking BLK_MQ_S_STOPPED request adding
    dad458e77540 arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled
    77755dc95ff2 sh: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
    35f8f72b4579 um: vector: Do not use drvdata in release
    3997d11fd996 serial: 8250: omap: Move pm_runtime_get_sync
    6be99d4c117b um: net: Do not use drvdata in release
    509ba8746f81 um: ubd: Do not use drvdata in release
    0f6737cad88b ubi: wl: Put source PEB into correct list if trying locking LEB failed
    fb6d3c6c1218 platform/chrome: cros_ec_typec: fix missing fwnode reference decrement
    11b414ff9ab4 spi: Fix acpi deferred irq probe
    2e151b8ca316 netfilter: ipset: add missing range check in bitmap_ip_uadt
    fa0e202e23ff Revert "serial: sh-sci: Clean sci_ports[0] after at earlycon exit"
    0ff91b3bf53e serial: sh-sci: Clean sci_ports[0] after at earlycon exit
    b12869cab514 Revert "usb: gadget: composite: fix OS descriptors w_value logic"
    5be4bc1c73ca driver core: bus: Fix double free in driver API bus_register()
    e844bccad7ee Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}()
    a26842e4683f exfat: fix uninit-value in __exfat_get_dentry_set
    7fc42f249daf locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass()
    0b9622163926 tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler
    f856246ff6da apparmor: test: Fix memory leak for aa_unpack_strdup()
    b9322408d83a comedi: Flush partial mappings in error case
    a4236cc4f952 fsnotify: fix sending inotify event with unexpected filename
    da6e6ff1f6c5 PCI: Fix use-after-free of slot->bus on hot remove
    5442dbd3342a KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status
    1a89ef73b510 crypto: x86/aegis128 - access 32-bit arguments as 32-bit
    e8f728442dd5 perf/x86/intel/pt: Fix buffer full but size is 0 case
    626a8b956719 ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
    bbf3f1fd8a0a jfs: xattr: check invalid xattr size more strictly
    ea0527d5cc61 ext4: fix FS_IOC_GETFSMAP handling
    442c6f05d94e ext4: supress data-race warnings in ext4_free_inodes_{count,set}()
    62dc01c83fa7 ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
    03d68e2d244c soc: qcom: socinfo: fix revision check in qcom_socinfo_probe()
    4c9fded47888 usb: ehci-spear: fix call balance of sehci clk handling routines
    0aa9e30b5b4a xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
    e47f0e95441b apparmor: fix 'Do simple duplicate message elimination'
    f89f677adc78 ALSA: hda/realtek: Update ALC256 depop procedure
    6e99925d8548 ALSA: hda/realtek - Add type for ALC287
    9f26a607d846 staging: greybus: uart: clean up TIOCGSERIAL
    7bf3e45ea60b misc: apds990x: Fix missing pm_runtime_disable()
    8a960584638f USB: chaoskey: Fix possible deadlock chaoskey_list_lock
    bb37389d14f4 USB: chaoskey: fail open after removal
    2e72f53f740a usb: yurex: make waiting on yurex_write interruptible
    30b9a7786c48 usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
    653903e36ca2 iio: light: al3010: Fix an error handling path in al3010_probe()
    75e6dc33f16a ipmr: fix tables suspicious RCU usage
    e5dffbd159ef ipmr: convert /proc handlers to rcu_read_lock()
    a9615376a999 bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down
    6b41c5627117 net: hsr: fix hsr_init_sk() vs network/transport headers.
    1564c7ed9d29 net: introduce a netdev feature for UDP GRO forwarding
    4654bcb686ac spi: atmel-quadspi: Fix register name in verbose logging function
    b58678e3f243 net: stmmac: dwmac-socfpga: Set RX watchdog interrupt as broken
    3dbdb3f85b74 marvell: pxa168_eth: fix call balance of pep->clk handling routines
    882ea20ce07c net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration
    b18ab1198587 tg3: Set coherent DMA mask bits to 31 for BCM57766 chipsets
    6728375984cb net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
    c399dd6e7042 power: supply: bq27xxx: Fix registers of bq27426
    c5351bfba7b9 power: supply: bq27xxx: Support CHARGE_NOW for bq27z561/bq28z610/bq34z100
    da4008a289e1 power: supply: core: Remove might_sleep() from power_supply_put()
    70f1bad32127 fs_parser: update mount_api doc to match function signature
    0918f5643fc6 vfio/pci: Properly hide first-in-list PCIe extended capability
    145482f4c894 vdpa/mlx5: Fix suboptimal range on iotlb iteration
    eb681998c889 NFSD: Fix nfsd4_shutdown_copy()
    9d4f174342a7 NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir()
    752a75811f27 NFSD: Prevent NULL dereference in nfsd4_process_cb_update()
    9df83cc000ed remoteproc: qcom_q6v5_mss: Re-order writes to the IMEM region
    b5ba1b37142f rpmsg: glink: use only lower 16-bits of param2 for CMD_OPEN name length
    295cb2524309 rpmsg: glink: Fix GLINK command prefix
    9761e51e1d43 rpmsg: glink: Send READ_NOTIFY command in FIFO full case
    3dd661b963a3 rpmsg: glink: Add TX_DATA_CONT command while sending
    e72735fcce17 perf trace: Avoid garbage when not printing a syscall's arguments
    10eb66d4f295 perf trace: Do not lose last events in a race
    68ccc1830e9d m68k: coldfire/device.c: only build FEC when HW macros are defined
    2255a994d6f1 m68k: mcfgpio: Fix incorrect register offset for CONFIG_M5441x
    10f14161e830 perf trace: avoid garbage when not printing a trace event's arguments
    af87c2069952 f2fs: check curseg->inited before write_sum_page in change_curseg
    c6d54485cf81 f2fs: remove the unused flush argument to change_curseg
    5bb54d3b377e f2fs: open code allocate_segment_by_default
    c6ad7333e530 f2fs: remove struct segment_allocation default_salloc_ops
    a7e306f7c32d f2fs: avoid using native allocate_segment_by_default()
    6e5de38f605c f2fs: fix the wrong f2fs_bug_on condition in f2fs_do_replace_block
    43b2e068aef4 PCI: cpqphp: Fix PCIBIOS_* return value confusion
    1fe390f27875 PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads
    edb4833a3838 perf probe: Correct demangled symbols in C++ program
    0b04b48e4cc2 perf probe: Fix libdw memory leak
    26db806fa23e perf cs-etm: Don't flush when packet_queue fills up
    c751d28b403f clk: clk-axi-clkgen: make sure to enable the AXI bus clock
    a68e4f76ee85 clk: axi-clkgen: use devm_platform_ioremap_resource() short-hand
    43afa76e6efe dt-bindings: clock: axi-clkgen: include AXI clk
    fc7ef5873472 dt-bindings: clock: adi,axi-clkgen: convert old binding to yaml format
    29216bb390e3 fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem()
    d161e5ea0ca7 fbdev/sh7760fb: Alloc DMA memory from hardware device
    6f1fabc9e331 powerpc/kexec: Fix return of uninitialized variable
    fd57d992f371 powerpc/sstep: make emulate_vsx_load and emulate_vsx_store static
    66b7ddd1804e ocfs2: fix uninitialized value in ocfs2_file_read_iter()
    bd715e191d44 RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg()
    a4d2011cbe03 scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()
    a56777a3ef5b scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb()
    e3b9ba55c18f scsi: fusion: Remove unused variable 'rc'
    ef2c2580189e scsi: bfa: Fix use-after-free in bfad_im_module_exit()
    cc30125eb6b6 mfd: rt5033: Fix missing regmap_del_irq_chip()
    896927b0157a RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey
    6956c0e7346c powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore
    54cb5fa850f9 mtd: rawnand: atmel: Fix possible memory leak
    c912aae5363a cpufreq: loongson2: Unregister platform_driver on failure
    61d590d7076b mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices
    c472b55cc0bc mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device
    0b648968bfa4 mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device
    48d3964f2bcd mfd: intel_soc_pmic_bxtwc: Use dev_err_probe()
    2630b18bed7d mfd: da9052-spi: Change read-mask to write-mask
    b86340df10b1 mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race
    a85e5215609d powerpc/vdso: Flag VDSO64 entry points as functions
    62a8d90e3221 trace/trace_event_perf: remove duplicate samples on the first tracepoint event
    49e8a0e07b02 wireguard: selftests: load nf_conntrack if not present
    63bc9a42a02e netpoll: Use rcu_access_pointer() in netpoll_poll_lock
    fb91ce37dc9a Bluetooth: fix use-after-free in device_for_each_child()
    49de4ac80427 driver core: Introduce device_find_any_child() helper
    f2d06d4e129e ALSA: 6fire: Release resources at card release
    4dd821dcbfce ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
    bf0aa35a7cb8 ALSA: us122l: Use snd_card_free_when_closed() at disconnection
    24fe9f7ca83e ALSA: usx2y: Use snd_card_free_when_closed() at disconnection
    d5a733ee2624 ALSA: usx2y: Cleanup probe and disconnect callbacks
    cfb1f6bc2eed ALSA: usx2y: Coding style fixes
    9a70db03857a ALSA: usx2y: Fix spaces
    5674ae441c89 net: rfkill: gpio: Add check for clk_enable()
    b751f3423fbd drm/amdkfd: Fix wrong usage of INIT_WORK()
    6543a34f34a1 selftests: net: really check for bg process completion
    1df5d631ba9e bpf, sockmap: Fix sk_msg_reset_curr
    d26d977633d1 bpf, sockmap: Several fixes to bpf_msg_pop_data
    2b4530ecc018 bpf, sockmap: Several fixes to bpf_msg_push_data
    5a0ae8e4f79c selftests/bpf: Add push/pop checking for msg_verify_data in test_sockmap
    78eb4af79e8a selftests/bpf: Fix total_bytes in msg_loop_rx in test_sockmap
    74d2b00f488f selftests, bpf: Add one test for sockmap with strparser
    3e35560e80a9 selftests/bpf: Fix SENDPAGE data logic in test_sockmap
    a9fa0d2ce890 selftests/bpf: Add txmsg_pass to pull/push/pop in test_sockmap
    224b9bc4977c netlink: typographical error in nlmsg_type constants definition
    59362f51f4c2 drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
    3fd17a47ee72 wifi: wfx: Fix error handling in wfx_core_init()
    67d32d63c058 drm/etnaviv: hold GPU lock across perfmon sampling
    02aac657c48e drm/etnaviv: fix power register offset on GC300
    17551e3d94b7 drm/etnaviv: dump: fix sparse warnings
    04c0cd65a844 drm/etnaviv: Request pages from DMA32 zone on addressing_limited
    54163a35fe44 drm/etnaviv: rework linear window offset calculation
    e5e10c00610d drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq()
    e44d23fa0dc6 drm/panfrost: Remove unused id_mask from struct panfrost_model
    5ff9de1f2712 octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c
    2d1648603752 octeontx2-pf: ethtool fec mode support
    8cafe71ad0fb octeontx2-af: Add new CGX_CMD to get PHY FEC statistics
    9bb714350200 octeontx2-af: forward error correction configuration
    a5f3aebadcb7 octeontx2-pf: Calculate LBK link instead of hardcoding
    4dce1962411f octeontx2-af: Mbox changes for 98xx
    50c56b0f5fe3 drm: fsl-dcu: enable PIXCLK on LS1021A
    b773f406b6de drm/fsl-dcu: Convert to Linux IRQ interfaces
    5fa329c44e1e wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan()
    4496d25157c9 selftests/bpf: Fix txmsg_redir of test_txmsg_pull in test_sockmap
    addabcb1bd37 selftests/bpf: Fix msg_verify_data in test_sockmap
    d4f54c609d28 drm/bridge: tc358767: Fix link properties discovery
    e4decf4c8b56 netdevsim: copy addresses for both in and out paths
    7fd24ee949bd netdevsim: rely on XFRM state direction instead of flags
    76ff31c0113d xfrm: store and rely on direction to construct offload flags
    837f37f0cf39 xfrm: rename xfrm_state_offload struct to allow reuse
    bfdad9de02a3 bpf: Fix the xdp_adjust_tail sample prog issue
    7706afc21304 ASoC: dt-bindings: mt6359: Update generic node name and dmic-mode
    5e3385bca11a ASoC: fsl_micfil: fix regmap_write_bits usage
    b2a72a772ef0 ASoC: fsl_micfil: use GENMASK to define register bit fields
    226fc91c860b ASoC: fsl_micfil: do not define SHIFT/MASK for single bits
    fa55ed175c7b ASoC: fsl_micfil: Drop unnecessary register read
    78a71b056c2c dt-bindings: vendor-prefixes: Add NeoFidelity, Inc
    54550eeb8f86 wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
    f3749bc13cb3 wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
    145f3ac8c92e drm/v3d: Address race-condition in MMU flush
    c992e517c8a6 drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq()
    0bde5b6e230a drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq()
    d1ae370b82e9 wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq()
    29ee7d6fa18f wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq()
    1d602e4b6dcb drm/omap: Fix locking in omap_gem_new_dmabuf()
    c941af142200 wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
    ba35d3b212fb drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused
    0c24b82bc4d1 media: atomisp: Add check for rgby_data memory allocation failure
    4478f599a283 media: atomisp: remove #ifdef HAS_NO_HMEM
    380c0e1d96f3 firmware: arm_scpi: Check the DVFS OPP count returned by the firmware
    02dff60d0c99 selftests/resctrl: Protect against array overrun during iMC config parsing
    5f0e91a5f4ed regmap: irq: Set lockdep class for hierarchical IRQ domains
    409b1e428cf9 pmdomain: ti-sci: Add missing of_node_put() for args.np
    dd1985f9752f ARM: dts: cubieboard4: Fix DCDC5 regulator constraints
    9db3ef898a6e pwm: imx27: Workaround of the pwm output bug when decrease the duty cycle
    e8174fb173cc cgroup/bpf: only cgroup v2 can be attached by bpf programs
    067d0c56630d Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
    2295468c0c20 arm64: dts: mediatek: mt8173-elm-hana: Add vdd-supply to second source trackpad
    1b07333bbc3a arm64: dts: mt8183: krane: Fix the address of eeprom at i2c4
    839e76cea2ab tpm: fix signed/unsigned bug when checking event logs
    dad86eb91cf9 mmc: mmc_spi: drop buggy snprintf()
    748557ca7dc9 soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
    c9c6a62c91e9 soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq()
    f9dc2ae5a2cd spi: spi-fsl-lpspi: Use IRQF_NO_AUTOEN flag in request_irq()
    85cf7a3c6f7d spi: spi-fsl-lpspi: downgrade log level for pio mode
    ef1db3d1d2bf clocksource/drivers:sp804: Make user selectable
    d08932bb6e38 clkdev: remove CONFIG_CLKDEV_LOOKUP
    e48e204f364a kcsan, seqlock: Fix incorrect assumption in read_seqbegin()
    dc684d966f48 time: Fix references to _msecs_to_jiffies() handling of values
    069601e4b657 crypto: cavium - Fix an error handling path in cpt_ucode_load_fw()
    28f8ffa945f7 crypto: bcm - add error check in the ahash_hmac_init function
    dead96e1c748 crypto: caam - add error check to caam_rsa_set_priv_key_form
    a56860294ccd crypto: cavium - Fix the if condition to exit loop after timeout
    a92ccd3618e4 crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY
    99ec5eb5bbf3 EDAC/fsl_ddr: Fix bad bit shift operations
    e0269ea7a628 EDAC/bluefield: Fix potential integer overflow
    29551174590e firmware: google: Unregister driver_info on failure
    cc386170b331 crypto: caam - Fix the pointer passed to caam_qi_shutdown()
    e8a2b1c1c2ea hfsplus: don't query the device logical block size multiple times
    3cab4bbc6691 s390/syscalls: Avoid creation of arch/arch/ directory
    cf9efea8c092 acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block()
    6c772871c2e5 arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG
    ff01ac3e766c m68k: mvme147: Reinstate early console
    f65ca93b859d m68k: mvme16x: Add and use "mvme16x.h"
    21f46b07c20b m68k: mvme147: Fix SCSI controller IRQ numbers
    452f9ddd12be nvme-pci: fix freeing of the HMB descriptor table
    d3df9f26cff9 initramfs: avoid filename buffer overrun
    17f35a6c9391 mips: asm: fix warning when disabling MIPS_FP_SUPPORT
    72d6dd978f1d x86/xen/pvh: Annotate indirect branch as safe
    8ce88918e4d8 kselftest/arm64: mte: fix printf type warnings about longs
    8025d65d6242 x86/barrier: Do not serialize MSR accesses on AMD
    67be3cd92aa0 nvme: fix metadata handling in nvme-passthrough
    73b078e3314d cifs: Fix buffer overflow when parsing NFS reparse points
    36741bfcfbff rcu-tasks: Idle tasks on offline CPUs are in quiescent states
    e01ff1251c77 ipmr: Fix access to mfc_cache_list without lock held
    e8529cfd7086 ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry
    e05e8f54d23f proc/softirqs: replace seq_printf with seq_put_decimal_ull_width
    444c9d41210c ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div()
    ddd61392263d ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate()
    a8ebe0a22527 can: j1939: fix error in J1939 documentation.
    f6b4294a0249 regulator: rk808: Add apply_bit for BUCK3 on RK809
    b070a9e0dbf3 soc: qcom: Add check devm_kasprintf() returned value
    6df3ee9073cd net: usb: qmi_wwan: add Quectel RG650V
    bc014d8d6561 x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB
    f61da9401963 ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13
    501ac2d1aae6 selftests/watchdog-test: Fix system accidentally reset after watchdog-test
    6b5737b14af1 mac80211: fix user-power when emulating chanctx
    9347d7c552c8 ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet
    43323a4e5b3f mm: resolve faulty mmap_region() error path behaviour
    a32712d54c61 mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling
    7a450540c82f mm: unconditionally close VMAs on error
    f68a0236337e mm: avoid unsafe VMA hook invocation when error arises on mmap hook
    57cc8d253099 mm: revert "mm: shmem: fix data-race in shmem_getattr()"
    ed98d26021db NFSD: Never decrement pending_async_copies on error
    059434d23c45 NFSD: Initialize struct nfsd4_copy earlier
    9e52ff544e0b NFSD: Limit the number of concurrent async COPY operations
    4fcb25459430 NFSD: Async COPY result needs to return a write verifier
    7f9b91ed15df NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point
    2e7ce4e50d14 media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set
    c29a44d9a402 mmc: core: fix return value check in devm_mmc_alloc_host()
    b22ddca004d3 drm/bridge: tc358768: Fix DSI command tx
    938c13740f8b Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"
    0a5014ad37c7 nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
    344558d81c7c ocfs2: fix UBSAN warning in ocfs2_verify_volume()
    b017697a517f nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
    d4b42f926adc KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
    c96f90911dd1 vdpa/mlx5: Fix PA offset with unaligned starting iotlb map
    28d4ed71ae0b ocfs2: uncache inode which has failed entering the group
    5fe8bcc82f1d x86/mm: Fix a kdump kernel failure on SME system when CONFIG_IMA_KEXEC=y
    ffad2ac8c859 net/mlx5e: kTLS, Fix incorrect page refcounting
    a508c74ceae2 net/mlx5: fs, lock FTE when checking if active
    6e3f2c512d2b netlink: terminate outstanding dump on socket close
    b5214ca796fb clk: qcom: gcc-qcs404: fix initial rate of GPLL3
    3e7f845614ee leds: lp55xx: Remove redundant test for invalid channel number
    5dabb7af57bc ftrace: Fix regression with module command in stack_trace_filter
    5f86e79c0b22 ovl: Filter invalid inodes with missing lookup function
    2cc30545dd3a media: uvcvideo: Stop stream during unregister
    74a65313578b media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal()
    da56bb858954 media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate()
    580d1e5cf2cd media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled
    5a53f97cd597 media: ts2020: fix null-ptr-deref in ts2020_probe()
    5c9ab34c87af media: i2c: tc358743: Fix crash in the probe error path when using polling
    b240a0472f8e arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer
    711d99f845cd Linux 5.10.230
    918326996932 9p: fix slab cache name creation for real
    d02492863023 mm: krealloc: Fix MTE false alarm in __do_krealloc
    b17397a0a5c5 io_uring: fix possible deadlock in io_register_iowq_max_workers()
    dd7a728d5c0d md/raid10: improve code of mrdev in raid10_sync_request
    8ea0b8e32bed net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition
    9db25c2b41c3 fs: Fix uninitialized value issue in from_kuid and from_kgid
    35b4795a7ebf vDPA/ifcvf: Fix pci_read_config_byte() return code handling
    7e222d2c7f9a powerpc/powernv: Free name on error in opal_event_init()
    b718f71747b7 sound: Make CONFIG_SND depend on INDIRECT_IOMEM instead of UML
    dc834af641d7 crypto: marvell/cesa - Disable hash algorithms
    4d8f6679b03a bpf: use kvzmalloc to allocate BPF verifier environment
    0bf6971b7d1e HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad
    2bc339b00fbd 9p: Avoid creating multiple slab caches with the same name
    2f4bfcc4c5fa net: phy: ti: take into account all possible interrupt sources
    16a8ebc88fe2 ALSA: usb-audio: Add endianness annotations
    eb1bdcb7dfc3 vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
    414476c4fb11 hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
    0d71863c19be ALSA: usb-audio: Add quirks for Dell WD19 dock
    4dc9c1e83aeb ALSA: usb-audio: Support jack detection on Dell dock
    6a7e6dcf90fe ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()
    e068a87cf25e irqchip/gic-v3: Force propagation of the active state with a read-back
    bb17f42135f5 USB: serial: option: add Quectel RG650V
    6d5bd4bc14d7 USB: serial: option: add Fibocom FG132 0x0112 composition
    c5748d95608c USB: serial: qcserial: add support for Sierra Wireless EM86xx
    e567fc8f7a44 USB: serial: io_edgeport: fix use after free in debug printk
    d76923164705 usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
    6e2848d1c8c0 usb: musb: sunxi: Fix accessing an released usb phy
    5dd3f5a9244a fs/proc: fix compile warning about variable 'vmcore_mmap_ops'
    faff5bbb2762 media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
    547087307bc1 net: do not delay dst_entries_add() in dst_release()
    83aa0c996417 perf session: Add missing evlist__delete when deleting a session
    2297d80a13a6 Revert "perf hist: Add missing puts to hist__account_cycles"
    82090f94c723 net: bridge: xmit: make sure we have at least eth header len bytes
    11eab327a2a8 spi: fix use-after-free of the add_lock mutex
    c8dce228db6f spi: Fix deadlock when adding SPI controllers on SPI buses
    982a2757e725 splice: don't generate zero-len segement bvecs
    bf0b0c6d1597 btrfs: reinitialize delayed ref list after deleting it from the list
    8fc5ea9231af nfs: Fix KMSAN warning in decode_getfattr_attrs()
    485d9232112b io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
    f336622838e5 io_uring: use kiocb_{start,end}_write() helpers
    f83a32351efd fs: create kiocb_{start,end}_write() helpers
    955089c2403c io_uring: rename kiocb_end_write() local helper
    6f383f653d03 dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow
    483b7261b35a dm cache: fix potential out-of-bounds access on the first resume
    f136d8d3f26f dm cache: optimize dirty bit checking with find_next_bit when resizing
    ee1f74925717 dm cache: fix out-of-bounds access to the dirty bitset when resizing
    5b975f146d82 dm cache: correct the number of origin blocks to match the target length
    2ac7f253dead drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
    17f5f18085ac drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
    1829c36f9329 pwm: imx-tpm: Use correct MODULO value for EPWM mode
    054931ca3cfc media: v4l2-tpg: prevent the risk of a division by zero
    5a9bd375bf88 media: pulse8-cec: fix data timestamp at pulse8_setup()
    828047c70f47 media: cx24116: prevent overflows on SNR calculus
    f54e8e1e39da media: s5p-jpeg: prevent buffer overflows
    3a977b554f66 ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove
    ac40b9dff274 ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init()
    c1eba9f0e235 scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer
    8e823ce93cc8 media: adv7604: prevent underflow condition when reporting colorspace
    e351002b3a7a media: dvb_frontend: don't play tricks with underflow values
    a4a17210c03a media: dvbdev: prevent the risk of out of memory access
    ae6fd157eae4 media: stb0899_algo: initialize cfr before using it
    63b122f53793 Revert "ALSA: hda/conexant: Mute speakers at suspend / shutdown"
    30606ea3fae5 net: arc: fix the device for dma_map_single/dma_unmap_single
    71d08334c2cb net: phy: ti: add PHY_RST_AFTER_CLK_EN flag
    d3f517f904df net: phy: ti: implement generic .handle_interrupt() callback
    f398d0a5b783 net: phy: export phy_error and phy_trigger_machine
    590a4b2d4e0b net: hns3: fix kernel crash when uninstalling driver
    cf6bae33c5aa can: c_can: fix {rx,tx}_errors statistics
    40b283ba7666 sctp: properly validate chunk size in sctp_sf_ootb()
    22f4e2f86ad8 net: enetc: set MAC address to the VF net_device
    1e4332581cd4 security/keys: fix slab-out-of-bounds in key_task_permission
    d7dc68d82ab3 HID: core: zero-initialize the report buffer
    7830bfc3e7e7 ARM: dts: rockchip: Fix the realtek audio codec on rk3036-kylin
    92f5b6978293 ARM: dts: rockchip: Fix the spi controller on rk3036
    c34f7b904748 ARM: dts: rockchip: drop grf reference from rk3036 hdmi
    db87a9fb6a58 ARM: dts: rockchip: fix rk3036 acodec node
    7ddbc813ba64 arm64: dts: imx8mp: correct sdhc ipg clk
    e38f91b78388 arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc
    fbccf9647f0f arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma lion
    752c5bfb600f arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards
    ebb427d5f270 arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328
    9d0d15f26b86 arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-sapphire-excavator
    b874a7e65b4f Linux 5.10.229
    7948c22cc70b mac80211: always have ieee80211_sta_restart()
    1e5a17dc77d8 vt: prevent kernel-infoleak in con_font_get()
    a508a102edf8 drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)
    1d0d406bfc6b Revert "drm/mipi-dsi: Set the fwnode for mipi_dsi_device"
    bda1a99a0dd6 mm: shmem: fix data-race in shmem_getattr()
    aa0cee46c5d3 nilfs2: fix kernel bug due to missing clearing of checked flag
    bfd1d223d80c x86/bugs: Use code segment selector for VERW operand
    70767689ec6e ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow
    d592b2e9212f riscv: Remove duplicated GET_RM
    170ad7e7a662 riscv: Remove unused GENERATING_ASM_OFFSETS
    7e6bb3443185 riscv: Use '%u' to format the output of 'cpu'
    1e617230b783 riscv: efi: Set NX compat flag in PE/COFF header
    c345728678df riscv: vdso: Prevent the compiler from inserting calls to memset()
    35770ca6180c mm: avoid leaving partial pfn mappings around in error case
    69d4e1ce9087 mm: add remap_pfn_range_notrack
    c72e0df0b56c nilfs2: fix potential deadlock with newly created symlinks
    edc84c1c1a85 iio: light: veml6030: fix microlux value calculation
    442f786c5bff staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg()
    d0231f43df47 wifi: iwlegacy: Clear stale interrupts before resuming device
    4112450da7d6 wifi: ath10k: Fix memory leak in management tx
    c21efba8b5a8 wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
    1cfc32930461 Revert "driver core: Fix uevent_show() vs driver detach race"
    796df8d64caa xhci: Use pm_runtime_get to prevent RPM on unsupported systems
    065789892e37 xhci: Fix Link TRB DMA in command ring stopped completion event
    efefde4d1b7c usb: phy: Fix API devm_usb_put_phy() can not release the phy
    2d4650d2b297 usbip: tools: Fix detach_port() invalid port error path
    603342ab037d misc: sgi-gru: Don't disable preemption in GRU driver
    aae9c5b472d6 NFS: remove revoked delegation from server's delegation list
    8395b6096959 net: amd: mvme147: Fix probe banner message
    0cac4a2718b2 firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state()
    422f1b66b149 kasan: Fix Software Tag-Based KASAN with GCC
    8e99d41858eb compiler-gcc: remove attribute support check for `__no_sanitize_address__`
    4336f120937d compiler-gcc: be consistent with underscores use for `no_sanitize`
    e3e608cbad37 netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
    a27a5c40ee4c net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension
    b88262c950c3 net: support ip generic csum processing in skb_csum_hwoffload_help
    590976f92172 bpf: Fix out-of-bounds write in trie_get_next_key()
    ce691c814bc7 net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
    9cab53f03263 gtp: allow -1 to be specified as file description from userspace
    e2742758c9c8 ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()
    465d3a8eca3f ASoC: cs42l51: Fix some error handling paths in cs42l51_probe()
    45a628911d3c wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
    66e35e42f51e wifi: iwlwifi: mvm: disconnect station vifs if recovery failed
    02b121beda58 mac80211: Add support to trigger sta disconnect on hardware restart
    89e25a2ec2a2 mac80211: do drv_reconfig_complete() before restarting all
    1ac988c6b8ff RDMA/bnxt_re: synchronize the qp-handle table array
    8256f6166d02 RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down
    f121dee2f907 RDMA/cxgb4: Dump vendor specific QP details
    935ca968019f wifi: brcm80211: BRCM_TRACING should depend on TRACING
    fd3b368769ae wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys
    e38ccb226de5 mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING
    ffbb1f15bae7 cgroup: Fix potential overflow issue when checking max_depth
    5b1e461fefb0 selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test
    8df5cd51fd70 xfrm: validate new SA's prefixlen using SA family when sel.family is unset
    4abbba710583 arm64/uprobes: change the uprobe_opcode_t typedef to fix the sparse warning
    03c9c2c2d2d0 ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
    f4b6a6493eb5 net: phy: dp83822: Fix reset pin definitions
    2fe399bb8efd serial: protect uart_port_dtr_rts() in uart_shutdown() too
    066314b0b76f selinux: improve error checking in sel_write_load()
    3eb6aa870057 hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event
    631330f5a635 ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593
    76ce386feb14 KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
    0f0374d09c82 openat2: explicitly return -E2BIG for (usize > PAGE_SIZE)
    9f2ab98371c2 nilfs2: fix kernel bug due to missing clearing of buffer delay flag
    1f440403be1f ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue
    59a1b38d3a5f ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[]
    234682910971 drm/amd: Guard against bad data for ATIF ACPI method
    c9085e2401b8 ALSA: hda/realtek: Update default depop procedure
    5e431f85c87b ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
    c7fcfdba35ab posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()
    0da93d67da90 r8169: avoid unsolicited interrupts
    8a283a19026a net: sched: fix use-after-free in taprio_change()
    95b3f3ed5ac6 net: usb: usbnet: fix name regression
    77bc881d370e be2net: fix potential memory leak in be_xmit()
    db755e553490 net/sun3_82586: fix potential memory leak in sun3_82586_send_packet()
    9f95de15904a xfrm: respect ip protocols rules criteria when performing dst lookups
    6ba07c4a9eac xfrm: extract dst lookup parameters into a struct
    02874ca52df2 tracing: Consider the NULL character when validating the event length
    df848523d6b4 jfs: Fix sanity check in dbMount
    8605ca4bd0f4 arm64: Force position-independent veneers
    0329056e0730 ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit
    75f828e944da drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA
    649d64650623 iomap: update ki_pos a little later in iomap_dio_complete
    c9b77438077d exec: don't WARN for racy path_noexec check
    20e27c773945 block, bfq: fix procress reference leakage for bfqq in merge chain
    bf83ba3c55d4 KVM: s390: gaccess: Check if guest address is in memslot
    6e1659b674b6 KVM: s390: gaccess: Cleanup access to guest pages
    472088ffb1cc KVM: s390: gaccess: Refactor access address range check
    511ca935092a KVM: s390: gaccess: Refactor gpa and length calculation
    cf9ddf9ed94c arm64: probes: Fix uprobes for big-endian kernels
    7f1ef59185d2 arm64:uprobe fix the uprobe SWBP_INSN in big-endian
    6c151aeb6dc4 Bluetooth: bnep: fix wild-memory-access in proto_unregister
    5c345c47e884 s390: Initialize psw mask in perf_arch_fetch_caller_regs()
    6af43ec3bf40 usb: typec: altmode should keep reference to parent
    ed31aba8ce93 smb: client: fix OOBs when building SMB2_IOCTL request
    8c1e6717f60d scsi: target: core: Fix null-ptr-deref in target_alloc_device()
    4af714e82379 genetlink: hold RCU in genlmsg_mcast()
    b6321146773d net: systemport: fix potential memory leak in bcm_sysport_xmit()
    f48eaf4e88c3 net/smc: Fix searching in list of known pnetids in smc_pnet_add_pnetid
    aacf6e28aeda net: ethernet: aeroflex: fix potential memory leak in greth_start_xmit_gbit()
    56dbb74b6a4b macsec: don't increment counters for an unrelated SA
    2c7dd3ca6be9 drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation
    df6fed0a2a1a RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
    78aaf54ad5d7 RDMA/bnxt_re: Return more meaningful error
    718609f51866 ipv4: give an IPv4 dev to blackhole_netdev
    59df170bdec9 RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP
    9076d449e77b ARM: dts: bcm2837-rpi-cm3-io3: Fix HDMI hpd-gpio pin
    dbe51dd516e6 RDMA/bnxt_re: Add a check for memory allocation
    c17e5cbbb180 RDMA/bnxt_re: Fix incorrect AVID type in WQE structure
    f141044cc6d3 net: bridge: mcast: wait for previous gc cycles when removing port
    7640df3a194c net: atlantic: eliminate double free in error handling logic
    3cbcd4752671 RDMA/hns: Fix UAF for cq async event
    5a8fa04b2a4d Linux 5.10.228
    2abe57d62a45 ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2
    25e86fb0aeec powerpc/mm: Always update max/min_low_pfn in mem_topology_setup()
    c1d0476885d7 nilfs2: propagate directory read errors from nilfs_find_entry()
    c38add9ac0e4 tcp: fix mptcp DSS corruption due to large pmtu xmit
    fde99e972b8f mptcp: handle consistently DSS corruption
    609937aa962a mptcp: track and update contiguous data status
    b7d7b7fc876f irqchip/gic-v4: Don't allow a VMOVP on a dying VPE
    6f44a5fc15b5 x86/entry_32: Clear CPU buffers after register restore in NMI return
    9ab38a1cdb66 x86/entry_32: Do not clobber user EFLAGS.ZF
    846280578855 x86/apic: Always explicitly disarm TSC-deadline timer
    e475220d64be x86/resctrl: Annotate get_mem_config() functions as __init
    1826b6d69bbb parport: Proper fix for array out-of-bounds access
    9f8ddf14fa79 USB: serial: option: add Telit FN920C04 MBIM compositions
    0fc55ec9fcac USB: serial: option: add support for Quectel EG916Q-GL
    608b626f710d xhci: Fix incorrect stream context type macro
    fc2cb5e3af53 Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001
    63d6a3b07838 Bluetooth: Remove debugfs directory on module init failure
    516655749a01 iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
    f80375f275fb iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
    dc99dfa2ba66 iio: light: opt3001: add missing full-scale range value
    bf3ab8e1c28f iio: light: veml6030: fix IIO device retrieval from embedded device
    2d06787b70d8 iio: light: veml6030: fix ALS sensor resolution
    ffc4174309a9 iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency()
    9504153a480f iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
    c27133637aba iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig
    c4c2211b1202 iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig
    3abc1ebea3fb iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig
    0782809c019b drm/vmwgfx: Handle surface check failure correctly
    df75c78bfeff drm/radeon: Fix encoder->possible_clones
    6ddcaee244ff io_uring/sqpoll: close race on waiting for sqring entries
    3bc6d0f8b70a blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
    eca3edf87679 x86/bugs: Do not use UNTRAIN_RET with IBPB on entry
    e7c0f8ca3bdd x86/bugs: Skip RSB fill at VMEXIT
    0ab77a47e3ff x86/entry: Have entry_ibpb() invalidate return predictions
    c5e57863d790 x86/cpufeatures: Add a IBPB_NO_RET BUG flag
    77fa26062032 x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
    dfa4b5d4ba1c KVM: s390: Change virtual to physical address access in diag 0x258 handler
    d04709509594 s390/sclp_vt220: Convert newlines to CRLF instead of LFCR
    b12ef2d4dfee io_uring/sqpoll: do not put cpumask on stack
    66b98c4f18b0 io_uring/sqpoll: retain test for whether the CPU is valid
    54a987b41db3 io_uring/sqpoll: do not allow pinning outside of cpuset
    71fbc3af3dac KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()
    e8e599a63506 wifi: mac80211: fix potential key use-after-free
    417d5838ca73 mm/swapfile: skip HugeTLB pages for unuse_vma
    043f05526163 fat: fix uninitialized variable
    bf1a0222229d irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1
    cafa5942bd2d net: macb: Avoid 20s boot delay by skipping MDIO bus registration for fixed-link PHY
    ce43c48cdc4d arm64: probes: Fix simulate_ldr*_literal()
    3728b4eb2791 arm64: probes: Remove broken LDR (literal) uprobe support
    673a1c5a2998 posix-clock: Fix missing timespec64 check in pc_clock_settime()
    dbe055567af8 net: enetc: add missing static descriptor and inline keyword
    5f47cdeeefd9 ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2
    6c8784a6662b watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
    3b24ef662ec6 gfs2: Fix potential glock use-after-free on unmount
    03a85a51f33a fix vfsub build error
    12594a0e7118 sock_map: avoid race between sock_map_close and sk_psock_put
    7a346798c1e1 sock_map: Fix a potential use-after-free in sock_map_close()
    843556a46e16 bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself
    4af417c06d37 of: module: add buffer overflow check in of_modalias()
    b29e4b50c556 scripts/gdb: fix SB_* constants parsing
    02fd398f5e2b bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
    2bba1cb1487b loop: Select I/O scheduler 'none' from inside add_disk()
    027f4dd7c993 blk-mq: Introduce the BLK_MQ_F_NO_SCHED_BY_DEFAULT flag
    2214ded26c86 tpm: tis_i2c: Limit write bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
    44494049e815 tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
    0d7c23009d82 tpm: Add flag to use default cancellation policy
    07914bef4e16 tpm: tis_i2c: Fix sanity check interrupt enable mask
    35f85f04bd69 tpm: Add tpm_tis_i2c backend for tpm_tis_core
    7b04c6c08107 tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
    4790cb2d1283 tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
    50f74deaf308 hwmon: Add driver for Texas Instruments TMP464 and TMP468
    a4e6e4b7bb08 dt-bindings: hwmon: add tmp464.yaml
    e0ed2149d7b5 drm/amdkfd: Check for null pointer after calling kmemdup
    c6ddded89322 ARM: renumber bits related to _TIF_WORK_MASK
    35b96a325c1e arm64: make _TIF_WORK_MASK bits contiguous
    f5a8f06aa595 arm64: uaccess: remove vestigal UAO support
    3a330b569301 arm64: uaccess: remove redundant PAN toggling
    9cbbb016d6e7 arm64: uaccess: remove addr_limit_user_check()
    fd83411f5e08 arm64: uaccess: remove set_fs()
    15a6dc2f4b53 arm64: uaccess cleanup macro naming
    912a6ab683a4 arm64: uaccess: split user/kernel routines
    d004ab02dae2 arm64: uaccess: refactor __{get,put}_user
    e1941a8b459e arm64: uaccess: simplify __copy_user_flushcache()
    dfae822b4c59 arm64: uaccess: rename privileged uaccess routines
    1efdb8f0a0c7 arm64: sdei: explicitly simulate PAN/UAO entry
    b35fec69554c arm64: sdei: move uaccess logic to arch/arm64/
    b5a28033fe7b arm64: head.S: always initialize PSTATE
    243eb8553513 arm64: head.S: cleanup SCTLR_ELx initialization
    74a00405d97f arm64: head.S: rename el2_setup -> init_kernel_el
    73c5f386d175 arm64: add C wrappers for SET_PSTATE_*()
    e17fb7543df1 arm64: ensure ERET from kthread is illegal
    eff6289cc53b ixgbevf: add disable link state
    262595681381 ixgbe: add improvement for MDD response functionality
    b9d78b06dea8 ixgbe: add the ability for the PF to disable VF link state
    d829911485da Documentation: arm64: Document PMU counters access from userspace
    fe5d29bfce20 arm64: perf: Enable PMU counter userspace access for perf event
    15ce6d04ed6a arm64: perf: Add userspace counter access disable switch
    4f288acbeed8 perf: Add a counter for number of user access events in context
    354ba4a8c4b8 x86: perf: Move RDPMC event flag to a common definition
    d29cec94c49b libperf xyarray: Add bounds checks to xyarray__entry()
    8264d2b91841 libperf: Add support for user space counter access
    7fd81b678b5f libperf tests: Add support for verbose printing
    6029ff53a48f libperf: Add evsel mmap support
    28b0c8956369 tools include: Add an initial math64.h
    492e532d20f1 perf record: Improve 'Workload failed' message printing events + what was exec'ed
    d0a1fc61733e perf evlist: Add a method to return the list of evsels as a string
    81a77b39be0a perf annotate: Fix sample events lost in stdio mode
    2883e69e202d pnmtologo: use relocatable file name
    80f5207b5abd tools: use basename to identify file in gen-mach-types
    4d201ec392f1 vt/conmakehash: improve reproducibility
    ae24d013888f lib/build_OID_registry: fix reproducibility issues
    5d72da88dbb4 x86/boot: Wrap literal addresses in absolute_pointer()
    dc0bd7aa2319 ACPI: thermal: drop an always true check
    0c4288cceef5 xfs: Fix -Werror=dangling-pointer work-around for older GCC
    5509050b3392 xfs: Work around GCC 12 -Werror=dangling-pointer for xfs_attr_remote.o
    669827c6e293 virtio-pci: Remove wrong address verification in vp_del_vqs()
    1c80d994d3db regulator: consumer: Add missing stubs to regulator/consumer.h
    3303d0e2aeff ipv6: Fix stats accounting in ip6_pkt_drop
    c56e60f665e7 memcg: enable accounting of ipc resources
    e6c8ebd210a2 tick/nohz: WARN_ON --> WARN_ON_ONCE to prevent console saturation
    1655ee30e684 sched/isolation: really align nohz_full with rcu_nocbs
    253c752ed120 pstore/ftrace: Add and use ftrace_test_recursion_trylock_safe
    356e8a12bd66 pstore/ftrace: Add recursion protection to the ftrace callback
    334706a1e873 ftrace: Add ftrace_test_recursion_trylock() helper function
    78c260d7f60b ftrace: Move the recursion testing into global headers
    c0b313d988a1 powerpc/mm: Switch obsolete dssall to .long
    1bd813fe8d0e riscv: fix build with binutils 2.38
    835a2d1b24c6 powerpc/lib/sstep: fix 'ptesync' build error
    fd84b99a8ccb drm/amd/display: Don't allow partial copy_from_user
    024f4ff63d55 drm/amdgpu: Fix even more out of bound writes from debugfs
    0c0ad634e899 e1000e: Serialize TGP e1000e PM ops
    add88b0536fa e1000e: Make mei_me active when e1000e is in use
    a8f317c1a17e yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL
    c8400a2cbe1f iommu/arm-smmu-v3: Ratelimit event dump
    b8ec7e43e95e regmap: teach regmap to use raw spinlocks if requested in the config
    4b7fa7684be7 OF: DT-Overlay configfs interface (v7)
    d515a5c0e9a9 net: xilinx_emaclite: Do not print real IOMEM pointer
    11329e49959b drivers: net: xilinx_emaclite: remove arch limitation
    29dc69bf2a07 drivers: net: xilinx_emaclite: Add COMPILE_TEST support
    ff106eff01f6 drivers: net: xilinx_emaclite: Fix -Wpointer-to-int-cast warnings with W=1
    c27462391070 serial: 8250: 8250_omap: Fix possible array out of bounds access
    16976d8e307f perf intel-pt: Use aux_watermark
    d421a2346946 perf: Cap allocation order at aux_watermark
    6da8d5f29481 timers: Fix get_next_timer_interrupt() with no timers pending
    af141841735a eventfd: Enlarge recursion limit to allow vhost to work
    a125a6102808 iwlwifi: select MAC80211_LEDS conditionally
    139fe7d68413 rcu: Fix stall-warning deadlock due to non-release of rcu_node ->lock
    8d0c79931235 console: Fix build when CONFIG_BLK_DEV_INITRD is disabled.
    ea777841e8ea yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name
    ab49d2db98bd cgroup1: fix leaked context root causing sporadic NULL deref in LTP
    bdda1b6cf99b aufs5: aufs-core
    2fa276071d07 aufs5: aufs-standalone
    06ed4d532456 aufs5: aufs-mmap
    372857834999 aufs5: aufs-kbuild
    fd68c9840693 aufs5: aufs-base
    a673c127156c Revert "aufs5: core"
    cf62bfcde384 Revert "aufs5: aufs5-base"
    a644419ec785 Revert "aufs5: aufs5-mmap"
    b893f9a999bb Revert "aufs5: aufs5-standalone"
    c60db0819480 Revert "aufs: initial port to v5.10"
    c66a5900f139 Revert "Revert "aufs: initial port to v5.10""
    1320cf58f5dd Revert "aufs: linux-v5.10-rc1, no more set_fs()"
    02349d7738ff Revert "for aufs: linux-v5.10-rc1, no more vfs_(read|write)f_t"
    f01dab74750c Revert "aufs: linux-v5.10-rc1, no more f_op->read() and ->write()"
    3d5de709b676 Revert "aufs5: aufs5-kbuild"
    a97f1329edf7 tracing/arm: Have max stack tracer handle the case of return address after data
    5c54112a05ab net: Treat __napi_schedule_irqoff() as __napi_schedule() on PREEMPT_RT
    ddac76981cb3 sched/isolation: reconcile rcu_nocbs= and nohz_full=
    56fd8c36614e net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119)
    a8808e541750 aufs: linux-v5.10-rc1, no more f_op->read() and ->write()
    cb1c41dac775 for aufs: linux-v5.10-rc1, no more vfs_(read|write)f_t
    a5805df6583f aufs: linux-v5.10-rc1, no more set_fs()
    64e145dcca8c Revert "aufs: initial port to v5.10"
    d6e20b2257ec defconfig: add dependency for CONFIG_ACPI_APEI_PCIEAER
    b237d48208d0 arm64/mm: Drop THP conditionality from FORCE_MAX_ZONEORDER
    1209195ed0f7 driver: adc: ltc2497: return directly after reading the adc conversion value
    a60fe3fcf113 Revert "mfd: syscon: Don't free allocated name for regmap_config"
    13d68767aa4a rcutorture: Use "all" and "N" in "nohz_full" and "rcu_nocbs"
    54e69571a97d rcu: deprecate "all" option to rcu_nocbs=
    a605b9d20447 lib: test_bitmap: add tests for "N" alias
    8c22517f444e lib: bitmap: support "N" as an alias for size of bitmap
    88187167e63a lib: bitmap: move ERANGE check from set_region to check_region
    ca5429633613 lib: bitmap: fold nbits into region struct
    9381134cea8a lib: test_bitmap: add more start-end:offset/len tests
    c825800730ab lib: test_bitmap: add tests to trigger ERANGE case.
    8cc8264dca3f lib: test_bitmap: clearly separate ERANGE from EINVAL tests.
    470da7b7f2ff Revert "cpumask: Un-inline cpulist_parse for SMP; prepare for ascii helpers"
    28dc1d37602d Revert "cpumask: Make "all" alias global and not just RCU"
    dbfe0b183fca Revert "cpumask: Add a "none" alias to complement "all""
    a57711fcff30 Revert "cpumask: Add "last" alias for cpu list specifications"
    34523d7c8476 qemux86: add configuration symbol to select values
    cdca78778415 objtool: Fix seg fault with Clang non-section symbols
    d3287798bd88 x86/entry: Emit a symbol for register restoring thunk
    2ad99ddaac78 cpumask: Add "last" alias for cpu list specifications
    c10e9481810b cpumask: Add a "none" alias to complement "all"
    b00ceed9d388 cpumask: Make "all" alias global and not just RCU
    8b215206e797 cpumask: Un-inline cpulist_parse for SMP; prepare for ascii helpers
    1b5024caeda8 clear_warn_once: add a clear_warn_once= boot parameter
    fc0dd76cce0e clear_warn_once: bind a timer to written reset value
    d64fc2d2b14a clear_warn_once: expand debugfs to include read support
    77592e956cc9 perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel.
    6e022759f727 perf: x86-32: explicitly include <errno.h>
    22d6bbb947d4 perf: mips64: Convert __u64 to unsigned long long
    c35f9150001c perf: fix bench numa compilation
    c4caef513eb1 perf: add SLANG_INC for slang.h
    07dfbf9405dd perf: add sgidefs.h to for mips builds
    42c5431ad2cf perf: change --root to --prefix for python install
    af79bfe90143 perf: add 'libperl not found' warning
    ddfbd9e75f08 perf: force include of <stdbool.h>
    0f34e6305176 fat: don't use obsolete random32 call in namei_vfat
    b5b55eaad1df FAT: Added FAT_NO_83NAME
    756b13bfab6e FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option
    fabad71cb2b5 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option
    06fd68d75bd1 aufs: initial port to v5.10
    c9126877d1f5 aufs5: core
    f5150173c643 aufs5: aufs5-standalone
    b57d26b072d9 aufs5: aufs5-mmap
    78f128c4b8e5 aufs5: aufs5-base
    47aa35171d08 aufs5: aufs5-kbuild
    35c480a23c66 yaffs: include blkdev.h
    2c64c43540a5 yaffs: fix misplaced variable declaration
    bde410ee9f59 yaffs2: v5.6 build fixups
    414c8e866931 yaffs2: fix memory leak when /proc/yaffs is read
    c99c1990cf7c yaffs: add strict check when call yaffs_internal_read_super
    498f5fafe50a yaffs: repair yaffs_get_mtd_device
    7ca3c08ebbf9 yaffs: Fix build failure by handling inode i_version with proper atomic API
    0ba47e881bb8 yaffs2: fix memory leak in mount/umount
    39a5406665dd yaffs: Avoid setting any ACL releated xattr
    ca5b43ddc6fd Yaffs:check oob size before auto selecting Yaffs1
    c2619c05a53e fs: yaffs2: replace CURRENT_TIME by other appropriate apis
    5e08fb7b8ee0 yaffs2: adjust to proper location of MS_RDONLY
    5f1a1a9678a8 yaffs2: import git revision b4ce1bb (jan, 2020)
    fc21f09ae369 initramfs: allow an optional wrapper script around initramfs generation
    73887fca03be arm64/perf: Fix wrong cast that may cause wrong truncation
    a267cafaac44 defconfigs: drop obselete options
    eb5d1bc00c3f arm64/perf: fix backtrace for AAPCS with FP enabled
    062b2c98c087 linux-yocto: Handle /bin/awk issues
    d3beb253ae71 uvesafb: provide option to specify timeout for task completion
    75ccbf377a51 uvesafb: print error message when task timeout occurs
    18ffa2e88024 compiler.h: Undef before redefining __attribute_const__
    3ed931201746 vmware: include jiffies.h
    938942859596 Resolve jiffies wrapping about arp
    069a883d837c nfs: Allow default io size to be configured.
    3b568edcd3e9 check console device file on fs when booting
    77ec93228920 mount_root: clarify error messages for when no rootfs found
    17a15e0f7536 menuconfig,mconf-cfg: Allow specification of ncurses location
    8f13b1349a74 modpost: mask trivial warnings
    b6c9e0fa24e8 kbuild: exclude meta directory from distclean processing
    62dbbdbec60a powerpc: serialize image targets
    27b8dec5dbb3 arm: serialize build targets
    fc365512e4c4 Revert "platform/x86: wmi: Destroy on cleanup rather than unregister"
    9a6e91d2e691 crtsavres: fixups for 5.4+
    7dbc3cd0398f powerpc/ptrace: Disable array-bounds warning with gcc8
    ebe3bcb89cb0 powerpc: Disable attribute-alias warnings from gcc8
    65ba0e7de081 powerpc: add crtsavres.o to archprepare for kbuild
    6bd3efdce5a9 powerpc: kexec fix for powerpc64
    41671522c159 powerpc: Add unwind information for SPE registers of E500 core
    8851006b0109 mips: vdso: fix 'jalr $t9' crash in vdso code
    ed5db62477e8 mips: Kconfig: add QEMUMIPS64 option
    2a7ca094fc42 4kc cache tlb hazard: tlbp cache coherency
    b742d60d3f70 malta uhci quirks: make allowance for slow 4k(e)c
    8a160fc86eb6 arm/Makefile: Fix systemtap
    b9805882353c vexpress: Pass LOADADDR to Makefile
    332e618aa7ae arm: ARM EABI socketcall
    1ec682cb85f8 ARM: LPAE: Invalidate the TLB for module addresses during translation fault

(From OE-Core rev: f95f69b878c9d4e50e1728b300dd00329850f5f8)

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-01 09:02:41 -07:00
Bruce Ashfield
b76c447dbd linux-yocto/5.15: update to v5.15.179
Updating linux-yocto/5.15 to the latest korg -stable release that comprises
the following commits:

    0c935c049b5c Linux 5.15.179
    bf500b0d0cfe net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels
    02e43735932d kbuild: userprogs: use correct lld when linking through clang
    bb0245fa72b7 sched: sch_cake: add bounds checks to host bulk flow fairness counts
    bab61f41c942 vsock: Orphan socket after transport release
    e48fcb403c2d vsock: Keep the binding until socket destruction
    857428f4acc1 bpf, vsock: Invoke proto::close on close()
    117f7a2975ba media: uvcvideo: Remove dangling pointers
    0fdd7cc59338 media: uvcvideo: Fix crash during unbind if gpio unit is in use
    607dc724b162 nilfs2: handle errors that nilfs_prepare_chunk() may return
    e5606b783307 nilfs2: eliminate staggered calls to kunmap in nilfs_rename
    1fa500f494f1 nilfs2: move page release outside of nilfs_delete_entry and nilfs_set_link
    1cd7fd082c78 spi-mxs: Fix chipselect glitch
    cd0938805875 mtd: rawnand: cadence: fix unchecked dereference
    3e9899c12d5a md: select BLOCK_LEGACY_AUTOLOAD
    1a7c8039d2ee media: uvcvideo: Avoid returning invalid controls
    69b06b05ff94 media: uvcvideo: Avoid invalid memory access
    4e15cf870d2c drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl
    ade9362dec18 eeprom: digsy_mtc: Make GPIO lookup table match the device
    7746f3bb8917 bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock
    09d34c4cbc38 slimbus: messaging: Free transaction ID in delayed interrupt scenario
    1437d13ca83e intel_th: pci: Add Panther Lake-P/U support
    cebbd798ff25 intel_th: pci: Add Panther Lake-H support
    8875af55b825 intel_th: pci: Add Arrow Lake support
    e1651332291e mei: me: add panther lake P DID
    cf46f88b92cf Squashfs: check the inode number is not the invalid value of zero
    ac9a7d4c9007 usb: xhci: Enable the TRB overfetch quirk on VIA VL805
    41eae5d6e308 xhci: pci: Fix indentation in the PCI device ID definitions
    c3a772540220 usb: gadget: Check bmAttributes only if configuration is valid
    7e6b36d92dce usb: gadget: Fix setting self-powered state on suspend
    2b229d7b8a59 usb: gadget: Set self-powered based on MaxPower and bmAttributes
    a0dc4a3bdede usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality
    3d8b87be73e9 usb: typec: ucsi: increase timeout for PPM reset operations
    00ac1ea9c0cd usb: dwc3: gadget: Prevent irq storm when TH re-executes
    78669d6f45a5 usb: dwc3: Set SUSPENDENABLE soon after phy init
    bf4409f84023 usb: atm: cxacru: fix a flaw in existing endpoint checks
    3248c1f833f9 usb: renesas_usbhs: Flush the notify_hotplug_work
    a1ad97347a45 usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader
    894b4c75eadf usb: hub: lack of clearing xHC resources
    ec4b6f492ea1 usb: renesas_usbhs: Use devm_usb_get_phy()
    50b9010da101 usb: renesas_usbhs: Call clk_put()
    30e37db26120 Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection"
    329393a0325b gpio: rcar: Fix missing of_node_put() call
    f185b6d0aeea net: ipv6: fix missing dst ref drop in ila lwtunnel
    82043c99801e net: ipv6: fix dst ref loop in ila lwtunnel
    5cb300dcdd27 sched/fair: Fix potential memory corruption in child_cfs_rq_on_list
    49bf31477184 net-timestamp: support TCP GSO case for a few missing flags
    413e908f13ce exfat: fix soft lockup in exfat_clear_bitmap
    6d099f3f7b27 x86/sgx: Fix size overflows in sgx_encl_create()
    a2d112a3b408 x86/sgx: Support VA page allocation without reclaiming
    51e5bc6d39d1 x86/sgx: Export sgx_encl_{grow,shrink}()
    48fa260f15b6 x86/sgx: Move PTE zap code to new sgx_zap_enclave_ptes()
    110a40c51415 x86/sgx: Support loading enclave page without VMA permissions check
    0fb7aa04c19e vlan: enforce underlying device type
    4e2191b0fd0c ppp: Fix KMSAN uninit-value warning with bpf
    b7d8d4529984 net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error
    671aaa17bd31 be2net: fix sleeping while atomic bugs in be_ndo_bridge_getlink
    3f9e7298053c drm/sched: Fix preprocessor guard
    e9813e0887fe hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe()
    9b6f083db141 llc: do not use skb_get() before dev_queue_xmit()
    e2eebbb52d15 ALSA: usx2y: validate nrpacks module parameter on probe
    afa9cd90e765 hwmon: (ad7314) Validate leading zero bits and return error
    996340f3db89 hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table
    13de3056e38c hwmon: (pmbus) Initialise page count in pmbus_identify()
    8e4e08ca4cc6 caif_virtio: fix wrong pointer check in cfv_probe()
    455217ac9db0 net: gso: fix ownership in __udp_gso_segment
    17451b795002 nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch
    01b18a330cda HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
    4283afde4f8d HID: google: fix unused variable warning under !CONFIG_ACPI
    47616b82f2d4 wifi: iwlwifi: limit printed string from FW file
    b4739de37538 mm: don't skip arch_sync_kernel_mappings() in error paths
    955c5a1ddd6e mm/page_alloc: fix uninitialized variable
    51e0101ab9e9 block: fix conversion of GPT partition name to 7-bit
    03f075d56063 s390/traps: Fix test_monitor_call() inline assembly
    cdd9f58f7fe4 rapidio: fix an API misues when rio_add_net() fails
    181d4daaefb3 rapidio: add check for rio_add_net() in rio_scan_alloc_net()
    cd1bdcb77fdc wifi: nl80211: reject cooked mode if it is set along with other flags
    6a5e3b23054c wifi: cfg80211: regulatory: improve invalid hints checking
    d8786dfa9f45 x86/cpu: Properly parse CPUID leaf 0x2 TLB descriptor 0x63
    61104ea20840 x86/cpu: Validate CPUID leaf 0x2 EDX output
    dafc649de271 x86/cacheinfo: Validate CPUID leaf 0x2 EDX output
    421c91ba9099 platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e
    63c2c523f5ca drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M
    ffcc3f070263 ALSA: hda/realtek: update ALC222 depop optimize
    6ea0f0a47640 ALSA: hda: intel: Add Dell ALC3271 to power_save denylist
    807789018186 gpio: aggregator: protect driver attr handlers against module unload
    7c1f36f9c9ac gpio: rcar: Use raw_spinlock to protect register access
    b1d95d733cd6 HID: appleir: Fix potential NULL dereference at raw event handle
    a3325fdbee9b Revert "of: reserved-memory: Fix using wrong number of cells to get property 'alignment'"
    6486abfcf891 drm/amdgpu: disable BAR resize on Dell G5 SE
    4be891399cdc drm/amdgpu: Check extended configuration space register when system uses large bar
    f618aeb6cad2 smb: client: Add check for next_buffer in receive_encrypted_standard()
    a56a6e8589a9 pfifo_tail_enqueue: Drop new packet when sch->limit == 0
    e38f9d761b34 intel_idle: Handle older CPUs, which stop the TSC in deeper C states, correctly
    288fdb8dcb71 sched/core: Prevent rescheduling when interrupts are disabled
    3d67976d304e vmlinux.lds: Ensure that const vars with relocations are mapped R/O
    7cca31035c05 mptcp: always handle address removal under msk socket lock
    b66eb3f54ac3 phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk
    f07c325f54c4 phy: tegra: xusb: reset VBUS & ID OVERRIDE
    d20b23a5412c net: enetc: correct the xdp_tx statistics
    ccce797d9052 net: enetc: update UDP checksum when updating originTimestamp field
    b68d88b79975 net: enetc: fix the off-by-one issue in enetc_map_tx_buffs()
    9bcb8cbc3e5d usbnet: gl620a: fix endpoint checking in genelink_bind()
    e3aea1dba97d i2c: npcm: disable interrupt enable bit before devm_request_irq
    c327a355a4ff drm/amd/display: Fix HPD after gpu reset
    922e18d67bc0 perf/core: Fix low freq setting via IOC_PERIOD
    fca3b89abc92 ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2
    3d738b53ed6c ftrace: Avoid potential division by zero in function_stat_show()
    7163da88c07b x86/CPU: Fix warm boot hang regression on AMD SC1100 SoC systems
    2daabaa55c7c net: ipv6: fix dst ref loop on input in rpl lwt
    c0b11dc50590 net: ipv6: rpl_iptunnel: mitigate 2-realloc issue
    dbd4f89a4a58 net: ipv6: fix dst ref loop on input in seg6 lwt
    634710a372ba net: ipv6: seg6_iptunnel: mitigate 2-realloc issue
    8513e56e31fc include: net: add static inline dst_dev_overhead() to dst.h
    3e97606c954f seg6: add support for SRv6 H.L2Encaps.Red behavior
    86df97f030be seg6: add support for SRv6 H.Encaps.Red behavior
    bf5801cc24cc net/mlx5: IRQ, Fix null string in debug print
    b8e0dd7ff319 net: mvpp2: cls: Fixed Non IP flow, with vlan tag flow defination.
    0e70cec1839f tcp: Defer ts_recent changes until req is owned
    a3c25f8374c2 ipvs: Always clear ipvs_property flag in skb_scrub_packet()
    eba344580acb ASoC: es8328: fix route from DAC to output
    39a26120ad99 net: cadence: macb: Synchronize stats calculations
    718725496191 net: loopback: Avoid sending IP packets without an Ethernet header
    806fcc99e4c0 afs: Fix the server_list to unuse a displaced server rather than putting it
    9055fb0bb4f4 afs: Make it possible to find the volumes that are using a server
    ba335b157a6a afs: remove variable nr_servers
    1154e50e53e4 Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response
    a340768d7311 ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports
    a8f4ceb21f65 sunrpc: suppress warnings for unused procfs functions
    f36cf97e4978 RDMA/mlx5: Fix bind QP error cleanup flow
    66fee638e4dd scsi: core: Clear driver private data when retrying request
    668ef6c54ca7 scsi: core: Don't memset() the entire scsi_cmnd in scsi_init_command()
    4b49d939b5a7 ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up
    802d342bf8bc ovl: pass ofs to creation operations
    be2343e08165 ovl: use wrappers to all vfs_*xattr() calls
    1cd7f84c88ae IB/mlx5: Set and get correct qp_num for a DCT QP
    9a7fc5641c6f x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit
    b0c7cda8d636 mtd: rawnand: cadence: fix incorrect device in dma_unmap_single
    099a31651850 mtd: rawnand: cadence: use dma_map_resource for sdma address
    0301f9b44877 mtd: rawnand: cadence: fix error code in cadence_nand_init()
    29853440da38 acct: block access to kernel internal filesystems
    5d5b936cfa4b acct: perform last write from workqueue
    d97d560f7d36 ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED
    924b239f9704 nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
    872c7c7e57a7 drop_monitor: fix incorrect initialization order
    c0a9a9481591 tee: optee: Fix supplicant wait loop
    a3feeb1b4cb2 bpf: skip non exist keys in generic_map_lookup_batch
    3bb2204ec30f nvme/ioctl: add missing space in err message
    9f3891867e8e power: supply: da9150-fg: fix potential overflow
    ef305447885e arp: switch to dev_getbyhwaddr() in arp_req_set_public()
    e860d5103591 net: Add non-RCU dev_getbyhwaddr() helper
    2af45b1f2962 flow_dissector: Fix port range key handling in BPF conversion
    fbb727e4934a flow_dissector: Fix handling of mixed port and port-range keys
    65196ee66ec2 net: extract port range fields from fl_flow_key
    a94e59db1d89 geneve: Suppress list corruption splat in geneve_destroy_tunnels().
    cb15bb1bde0b gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl().
    f74f65601467 geneve: Fix use-after-free in geneve_find_dev().
    6847b3e40bb9 powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC
    718d0480ca3a ALSA: hda/realtek: Fixup ALC225 depop procedure
    71f427413d2d powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline
    61a45806db46 powerpc/64s/mm: Move __real_pte stubs into hash-4k.h
    b09957657d77 USB: gadget: f_midi: f_midi_complete to call queue_work
    006a4e9069a1 usb: dwc3: Fix timeout issue during controller enter/exit from halt state
    47cc53c3ebe3 usb: dwc3: Increase DWC3 controller halt timeout
    3c0e0aecb78c batman-adv: Drop unmanaged ELP metric worker
    6ad063461332 batman-adv: Drop initialization of flexible ethtool_link_ksettings
    d775f9e9e663 media: uvcvideo: Only save async fh if success
    e0360e009904 media: uvcvideo: Refactor iterators
    972f412da53b media: uvcvideo: Set error_idx during ctrl_commit errors
    c113bccf1f87 soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove
    c3fa28e6cac8 soc/mediatek: mtk-devapc: Convert to platform remove callback returning void
    4dd78251db13 soc: mediatek: mtk-devapc: Fix leaking IO map on error paths
    10185d020c8f soc: mediatek: mtk-devapc: Switch to devm_clk_get_enabled()
    f03ad378249f kfence: skip __GFP_THISNODE allocations on NUMA systems
    8e19db074ab3 kfence: enable check kfence canary on panic via boot param
    b7792fe79fbe kfence: allow use of a deferrable timer
    0621d2599d6e tpm: Change to kvalloc() in eventlog/acpi.c
    906ac470b16c tpm: Use managed allocation for bios event log
    5e8bee0e4914 arm64: dts: mediatek: mt8183: Disable DSI display output by default
    4a06ed6b962b ASoC: renesas: rz-ssi: Add a check for negative sample_space
    8c4b9b0c3950 drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event()
    5211d75e2cb7 drm/probe-helper: Create a HPD IRQ event helper for a single connector
    f3b9fb276459 ksmbd: fix integer overflows on 32 bit systems
    a9042dbc1ed4 memcg: fix soft lockup in the OOM process
    4edae3ff6d4e mm: update mark_victim tracepoints fields
    a32ba399a030 media: imx-jpeg: Fix potential error pointer dereference in detach_pm()
    e290d1fe37f7 crypto: testmgr - some more fixes to RSA test vectors
    add54f963938 crypto: testmgr - populate RSA CRT parameters in RSA test vectors
    40689219a28b crypto: testmgr - fix version number of RSA tests
    bd258be9a8be crypto: testmgr - Fix wrong test case of RSA
    8fbf27a746c3 crypto: testmgr - fix wrong key length for pkcs1pad
    4969dcc05bc3 arm64: mte: Do not allow PROT_MTE on MAP_HUGETLB user mappings
    c4041b6b0a7a pps: Fix a use-after-free
    26f2fdc47fea btrfs: avoid monopolizing a core when activating a swap file
    dc550af962b7 Revert "btrfs: avoid monopolizing a core when activating a swap file"
    caae54426402 x86/i8253: Disable PIT timer 0 when not in use
    3aa5254d8096 f2fs: fix to wait dio completion
    234549fb3db3 ARM: dts: dra7: Add bus_dma_limit for l4 cfg bus
    c97306464928 selftests: rtnetlink: update netdevsim ipsec output format
    28435f5d9d08 netdevsim: print human readable IP address
    810109436b28 parport_pc: add support for ASIX AX99100
    79cf08014ef3 serial: 8250_pci: add support for ASIX AX99100
    1840fb92baf4 can: ems_pci: move ASIX AX99100 ids to pci_ids.h
    d8ff250e085a nilfs2: protect access to buffers with no active references
    f51ff43c4c5a nilfs2: do not force clear folio if buffer is referenced
    1bf43414ccff nilfs2: do not output warnings when clearing dirty buffers
    c6ddb3848599 alpha: replace hardcoded stack offsets with autogenerated ones
    5fb8cda2fcea x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0
    9c0a3aab4b8d kdb: Do not assume write() callback available
    22e19c8c5f6b drm/v3d: Stop active perfmon if it is being destroyed
    37054243cf5d drm/tidss: Clear the interrupt status for interrupts being disabled
    2b7db8abf84f drm/tidss: Fix issue in irq handling causing irq-flood issue
    29fa42197f26 ipv6: mcast: add RCU protection to mld_newpack()
    e24d225e4cb8 ndisc: extend RCU protection in ndisc_send_skb()
    a884f57600e4 openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
    d9366ac2f956 arp: use RCU protection in arp_xmit()
    40d8f2f2a373 neighbour: use RCU protection in __neigh_notify()
    44e359552378 neighbour: delete redundant judgment statements
    b870256dd2a5 ndisc: use RCU protection in ndisc_alloc_skb()
    28de355b63ad ipv6: use RCU protection in ip6_default_advmss()
    ce3c6165fce0 ipv4: use RCU protection in __ip_rt_update_pmtu()
    fc07a232326a net: ipv4: Cache pmtu for all packet paths if multipath enabled
    a7246d3949c2 selftest: net: Test IPv4 PMTU exceptions with DSCP and ECN
    7385291def47 Namespaceify mtu_expires sysctl
    686792179f20 Namespaceify min_pmtu sysctl
    4561343d2b6c ipv4: use RCU protection in inet_select_addr()
    50d356db0542 ipv4: use RCU protection in rt_is_expired()
    6e0d21491686 net: add dev_net_rcu() helper
    c22b8d77816e net: treat possible_net_t net pointer as an RCU one and add read_pnet_rcu()
    0e5ea98edc3b ipv4: add RCU protection to ip4_dst_hoplimit()
    60f54f0d4ea5 clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context
    a02540d4401f clocksource: Use pr_info() for "Checking clocksource synchronization" message
    4ae5e361537d clocksource: Replace cpumask_weight() with cpumask_empty()
    acfebfb2abf3 btrfs: fix hole expansion when writing at an offset beyond EOF
    e4291f26c501 mlxsw: Add return value check for mlxsw_sp_port_get_stats_raw()
    9abfb2c8693d arm64: Handle .ARM.attributes section in linker scripts
    78be8f779b20 regmap-irq: Add missing kfree()
    40a35d14f3c0 partitions: mac: fix handling of bogus partition table
    4647cb4e0013 gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock
    ede3fa7b0cb6 alpha: align stack for page fault and user unaligned trap handlers
    bf3f395b9c37 serial: 8250: Fix fifo underflow on flush
    19f3e16bc9f7 cgroup: fix race between fork and cgroup.kill
    4d832459170d efi: Avoid cold plugged memory for placing the kernel
    b737d6439113 alpha: make stack 16-byte aligned (most cases)
    f1767d255807 can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero
    f7a43d1563ac can: c_can: fix unbalanced runtime PM disable in error path
    9fccb6b65510 USB: serial: option: drop MeiG Smart defines
    412458d7e92b USB: serial: option: fix Telit Cinterion FN990A name
    60f0765d673b USB: serial: option: add Telit Cinterion FN990B compositions
    95fcacb5b9a9 USB: serial: option: add MeiG Smart SLM828
    6878c61a3880 usb: cdc-acm: Fix handling of oversized fragments
    871619c2b78f usb: cdc-acm: Check control transfer buffer size before access
    9ee5bb1938f3 USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk
    d3a67adb365c USB: hub: Ignore non-compliant devices with too many configs or interfaces
    d8e86700c8a8 usb: gadget: f_midi: fix MIDI Streaming descriptor lengths
    aeda961736f3 USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone
    6afdad04f6c1 USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist
    b605fd13b832 usb: core: fix pipe creation for get_bMaxPacketSize0
    1af4043ec5bc USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI
    ef5e915db375 usb: dwc2: gadget: remove of_node reference upon udc_stop
    626ab15ddc4b usb: gadget: udc: renesas_usb3: Fix compiler warning
    6a902573f2ca usb: roles: set switch registered flag early on
    f4ca0cf536b1 perf/x86/intel: Ensure LBRs are disabled when a CPU is starting
    45fa526b0f5a KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel
    2e8f0f0e0097 batman-adv: Ignore neighbor throughput metrics in error case
    f0a16c6c7976 batman-adv: fix panic during interface removal
    6b7d69806c42 ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V
    8725882b0f69 orangefs: fix a oob in orangefs_debug_write
    848b58151775 x86/mm/tlb: Only trim the mm_cpumask once a second
    cd8de1f521d5 Grab mm lock before grabbing pt lock
    69b812149b8b vfio/pci: Enable iowrite64 and ioread64 for vfio pci
    20b7d9675437 PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P
    59a707ad952e media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread
    d485a8b22794 media: cxd2841er: fix 64-bit division on gcc-9
    ba842a609ff8 x86/xen: allow larger contiguous memory regions in PV guests
    5b750e76dfd5 xen: remove a confusing comment on auto-translated guest I/O
    d340047cf29b gpio: bcm-kona: Add missing newline to dev_err format string
    f66a5da15f14 gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ
    54b0de7b6abe gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0
    092dc83b9a3c drm/i915/selftests: avoid using uninitialized context
    88a3e6afaf00 arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array
    f443687ad20c team: better TEAM_OPTION_TYPE_STRING validation
    5bb4228c3226 vrf: use RCU protection in l3mdev_l3_out()
    80f70686857e ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu()
    2052b44cd0a6 HID: multitouch: Add NULL check in mt_input_configured
    efa8a261c575 NFSD: fix hang in nfsd4_shutdown_callback
    6f7cfee1a316 nfsd: clear acl_access/acl_default after releasing them
    e22a97700901 tty: xilinx_uartps: split sysrq handling
    59cf03ddf127 mptcp: prevent excessive coalescing on receive
    03b605ac1e5b ocfs2: check dir i_size in ocfs2_find_entry
    ad73b43e6908 memory: tegra20-emc: Correct memory device mask
    12a1cf9db178 gpio: xilinx: remove excess kernel doc
    9772e2e15482 net/ncsi: use dev_set_mac_address() for Get MC MAC Address handling
    3fec5d194fc9 MIPS: ftrace: Declare ftrace_get_parent_ra_addr() as static
    1334c64a5d1d ptp: Ensure info->enable callback is always set
    0eda6b12a108 net: phy: c45-tjaxx: add delay between MDIO write and read in soft_reset
    83db3d545d39 net/ncsi: wait for the last response to Deselect Package before configuring channel
    2ed6d46f8037 misc: fastrpc: Fix registered buffer page address
    820603335006 mtd: onenand: Fix uninitialized retlen in do_otp_read()
    10b3f947b609 NFC: nci: Add bounds checking in nci_hci_create_pipe()
    8f41df5fd4c1 nilfs2: fix possible int overflows in nilfs_fiemap()
    8aee4184c5b7 ocfs2: handle a symlink read error correctly
    5a1c86066f1b ocfs2: fix incorrect CPU endianness conversion causing mount failure
    c00e53672d7d pnfs/flexfiles: retry getting layout segment for reads
    f65ce06387f8 vfio/platform: check the bounds of read/write syscalls
    66325de71801 nvmem: core: improve range check for nvmem_cell_write()
    c897de3d1f4d nvmem: qcom-spmi-sdam: Set size in struct nvmem_config
    f52f00efd8c0 crypto: qce - unregister previously registered algos in error path
    efae52c61150 crypto: qce - fix goto jump in error path
    14810fb99091 media: uvcvideo: Remove redundant NULL assignment
    74512c021525 media: uvcvideo: Fix event flags in uvc_ctrl_send_events
    1662c5812b84 media: ccs: Fix cleanup order in ccs_probe()
    66a2c461703e media: ccs: Fix CCS static data parsing for large block sizes
    d6fae50f5eb7 media: ov5640: fix get_light_freq on auto
    9a6c627f3fe4 media: mc: fix endpoint iteration
    9e6cd5f99496 soc: qcom: smem_state: fix missing of_node_put in error path
    1880c45ebe14 iio: light: as73211: fix channel handling in only-color triggered buffer
    22d1dcd0b053 media: ccs: Clean up parsed CCS static data on parse failure
    6bdbb75ffc6c xfs: Add error handling for xfs_reflink_cancel_cow_range
    4e9af1ddbc98 crypto: qce - fix priority to be less than ARMv8 CE
    231dfd6bb61e arm64: dts: qcom: sm8350: Fix MPSS memory length
    e7e06872144e x86/boot: Use '-std=gnu11' to fix build with GCC 15
    81a3a0c1a68f kbuild: Move -Wenum-enum-conversion to W=2
    2bce0a6a4433 scsi: storvsc: Set correct data length for sending SCSI command without payload
    73d3d3c66f10 scsi: qla2xxx: Move FCE Trace buffer allocation to user control
    ad88fd9ee93a nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk
    662964484f8a nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk
    d88422ccb97f PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf()
    abe03cd5d5b7 ALSA: hda/realtek: Enable headset mic on Positivo C6400
    94e418935e1d Revert "media: uvcvideo: Require entities to have a non-zero unique ID"
    d24476777e8b mips/math-emu: fix emulation of the prefx instruction
    63b759c9680e dm-crypt: track tag_offset in convert_context
    84d6db1a7327 dm-crypt: don't update io->sector after kcryptd_crypt_write_io_submit()
    453a0a22ceb8 powerpc/pseries/eeh: Fix get PE state translation
    a3d92e7af72a MIPS: Loongson64: remove ROM Size unit in boardinfo
    48a6a4dfa5c8 serial: sh-sci: Do not probe the serial port if its slot in sci_ports[] is in use
    6b7947990681 serial: sh-sci: Drop __initdata macro for port_cfg
    2d09d3c9afa2 soc: qcom: socinfo: Avoid out of bounds read of serial number
    5fa25ae6484b usb: gadget: f_tcm: Don't prepare BOT write request twice
    d5e48551866e usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint
    45956a34f9a8 usb: gadget: f_tcm: Decrement command ref count on cleanup
    93facdc47dc6 usb: gadget: f_tcm: Translate error to sense
    61541d9b5a23 wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()
    7f44aa9d3960 wifi: rtlwifi: rtl8821ae: Fix media status report
    e27d77db198a HID: hid-sensor-hub: don't use stale platform-data on remove
    c0a158e7634a of: reserved-memory: Fix using wrong number of cells to get property 'alignment'
    4f7c0deea1b3 of: Fix of_find_node_opts_by_path() handling of alias+path+options
    87141db6d148 of: Correct child specifier used as input of the 2nd nexus node
    a0d751d2d8ec perf bench: Fix undefined behavior in cmpworker()
    be042a185cc5 efi: libstub: Use '-std=gnu11' to fix build with GCC 15
    38287f779b34 blk-cgroup: Fix class @block_class's subsystem refcount leakage
    44bd016cbaa3 clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate
    4e2996526679 clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg
    175af15551ed clk: qcom: gcc-sm6350: Add missing parent_map for two clocks
    4d8d1f443a6c clk: qcom: clk-alpha-pll: fix alpha mode configuration
    45d563356db6 clk: sunxi-ng: a100: enable MMC clock reparenting
    f26831839566 Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection
    cf601a24120c Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc
    250164081da0 drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes
    5098970ecc1d drm/komeda: Add check for komeda_get_layer_fourcc_list()
    e89f74ef6bee drm/amd/pm: Mark MM activity as unsupported
    224fa21f00fc KVM: s390: vsie: fix some corner-cases when grabbing vsie pages
    7c4899239d0f KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
    b0e8b635a331 arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma
    bc8ca18b8ef4 binfmt_flat: Fix integer overflow bug on 32 bit systems
    20ecbadad51a m68k: vga: Fix I/O defines
    592ffb238132 s390/futex: Fix FUTEX_OP_ANDN implementation
    61b4e072b7e8 drm/modeset: Handle tiled displays in pan_display_atomic.
    4e2de62318b9 leds: lp8860: Write full EEPROM, not only half of it
    fc7da1095247 cpufreq: s3c64xx: Fix compilation warning
    4defa9ebef14 tun: revert fix group permission check
    98a2c685293a netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
    d85d721f3225 x86/xen: add FRAME_END to xen_hypercall_hvm()
    aaa15fc4291b x86/xen: fix xen_hypercall_hvm() to not clobber %rbx
    d308661a0f4e net: rose: lock the socket in rose_bind()
    5bb48702e946 net: atlantic: fix warning during hot unplug
    a6f3981d04d1 gpio: pca953x: Improve interrupt support
    61e7e18fa64c udp: gso: do not drop small packets when PMTU reduces
    540ffff7925b tg3: Disable tg3 PCIe AER on system reboot
    712e6ed39e5c gpu: drm_dp_cec: fix broken CEC adapter properties check
    256768b17e62 firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry
    51df156e04e5 nvme: handle connectivity loss in nvme_set_queue_count
    cf30300a216a usb: xhci: Fix NULL pointer dereference on certain command aborts
    b27f10764d80 usb: xhci: Add timeout argument in address_device USB HCD callback
    d31d3dc92775 xfs: don't over-report free space or inodes in statvfs
    bd015e2e7f26 xfs: report realtime block quota limits on realtime directories
    d25041d4a3b2 gpio: xilinx: Convert gpio_lock to raw spinlock
    4489cce8e4e7 net/ncsi: fix locking in Get MAC Address handling
    8930834d1525 net/ncsi: Add NC-SI 1.2 Get MC MAC Address command
    3f46fefab962 usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove() and in the error path of .probe()
    998b1fa6c218 usb: chipidea/ci_hdrc_imx: Convert to platform remove callback returning void
    9794ea40979b usb: chipidea: ci_hdrc_imx: use dev_err_probe()
    af431197516a x86/mm: Don't disable PCID when INVLPG has been fixed by microcode
    c56ea30db33d platform/x86: acer-wmi: Ignore AC events
    78a88a1690bc Input: allocate keycode for phone linking
    b191b2b3b5ad selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack()
    f213bb330fc6 tipc: re-order conditions in tipc_crypto_key_rcv()
    c9b80829b001 mmc: sdhci-msm: Correctly set the load for the regulator
    4dddb00d0397 net: wwan: iosm: Fix hibernation by re-binding the driver around it
    5c60cdcff102 APEI: GHES: Have GHES honor the panic= setting
    3fa04850ddac i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz
    0bae6625cabc wifi: iwlwifi: avoid memory leak
    578845229c4e net/mlx5: use do_aux_work for PHC overflow checks
    463f5f6402b9 HID: Wacom: Add PCI Wacom device support
    c16b96035c48 mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id
    b2bd5857a0d6 tomoyo: don't emit warning in tomoyo_write_control()
    d280a12e9b87 wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()
    bafaee99fc23 mmc: core: Respect quirk_max_rate for non-UHS SDIO card
    9b560350aa7b tun: fix group permission check
    ecf6a4a55809 safesetid: check size of policy writes
    bb8ff054e19f printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX
    99795e62e7a5 x86/amd_nb: Restrict init function to AMD-based systems
    23434fcf90b9 lockdep: Fix upper limit for LOCKDEP_*_BITS configs
    56135262c1f9 sched: Don't try to catch up excess steal time.
    13dae4fa17be btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling
    367b72fa18b0 btrfs: fix data race when accessing the inode's disk_i_size at btrfs_drop_extents()
    7e954b6bb95d btrfs: fix use-after-free when attempting to join an aborted transaction
    51bcf530c6dc btrfs: output the reason for open_ctree() failure
    bbb7f49839b5 usb: gadget: f_tcm: Don't free command immediately
    3ba8884a56a3 media: uvcvideo: Fix double free in error path
    3a7fda57b0f9 mptcp: consolidate suboption status
    83a3a5aeb1b1 usb: typec: tcpci: Prevent Sink disconnection before vPpsShutdown in SPR PPS
    bb52bce4c91c usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to PD_T_SENDER_RESPONSE
    16d5669ff07f usb: dwc3: core: Defer the probe until USB power supply ready
    2cfbf53baeaf usb: gadget: f_tcm: Fix Get/SetInterface return value
    3c1f8dfa01b3 drivers/card_reader/rtsx_usb: Restore interrupt based detection
    d42168f109f9 net: usb: rtl8150: enable basic endpoint checking
    10eff770fd16 ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro
    deec230cb835 ktest.pl: Check kernelrelease return in get_version
    5083a7ae4500 netfilter: nf_tables: reject mismatching sum of field_len with set key length
    d712ca4807ce NFSD: Reset cb_seq_status after NFS4ERR_DELAY
    b0938ffd39ae f2fs: Introduce linear search for dentries
    679bb865c881 hexagon: Fix unbalanced spinlock in die()
    8e83dbe9ff32 hexagon: fix using plain integer as NULL pointer warning in cmpxchg
    4bd72d9fe11d kconfig: fix memory leak in sym_warn_unmet_dep()
    5f45a419bdd1 kconfig: WERROR unmet symbol dependency
    ccc1287a02ea kconfig: deduplicate code in conf_read_simple()
    3e31777acf2d kconfig: remove unused code for S_DEF_AUTO in conf_read_simple()
    131f1604fa6b kconfig: require a space after '#' for valid input
    6bdf078908c3 kconfig: add warn-unknown-symbols sanity check
    4780a614f013 kconfig: fix file name in warnings when loading KCONFIG_DEFCONFIG_LIST
    c48b8fc7f0a8 genksyms: fix memory leak when the same symbol is read from *.symref file
    bb28d02726ab genksyms: fix memory leak when the same symbol is added from source
    13310513f549 net: hsr: fix fill_frame_info() regression vs VLAN packets
    df3398504b97 net: sh_eth: Fix missing rtnl lock in suspend/resume path
    3ce32a9fb1d2 bgmac: reduce max frame size to support just MTU 1500
    ab2df791b1d4 vsock: Allow retrying on connect() failure
    a48ebcd853a4 perf trace: Fix runtime error of index out of bounds
    0dd6c67f6cfe ptp: Properly handle compat ioctls
    7d7d201eb3b7 net: davicom: fix UAF in dm9000_drv_remove
    cfb17f637562 net: netdevsim: try to close UDP port harness races
    1409b45d4690 net: rose: fix timer races against user threads
    c499bd77ca2a PM: hibernate: Add error handling for syscore_suspend()
    547ef7e8cbb9 ipmr: do not call mr_mfc_uses_dev() for unres entries
    6468f3a9842f net: fec: implement TSO descriptor cleanup
    5934bfaeaffe gpio: mxc: remove dead code after switch to DT-only
    8c640dd3d900 net: hns3: fix oops when unload drivers paralleling
    1787cd67bb94 ubifs: skip dumping tnc tree when zroot is null
    e5536677da80 rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
    2943af7d72d7 dmaengine: ti: edma: fix OF node reference leaks in edma_driver
    c9cc70bca158 xfrm: replay: Fix the update of replay_esn->oseq_hi for GSO
    6be3ea508111 tools/bootconfig: Fix the wrong format specifier
    26e5c3c8d780 NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE
    edcaf4156ced NFSv4.2: fix COPY_NOTIFY xdr buf size calculation
    f6bae8cc42ab module: Extend the preempt disabled section in dereference_symbol_descriptor().
    2e2bb52b8e58 ocfs2: mark dquot as inactive if failed to start trans while releasing dquot
    fe761befd845 scsi: ufs: bsg: Delete bsg_dev when setting up bsg fails
    13186db840b9 scsi: mpt3sas: Set ioc->manu_pg11.EEDPTagMode directly to 1
    6987e021b64c PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region()
    68ee578e6e31 staging: media: imx: fix OF node leak in imx_media_add_of_subdevs()
    6f3c167de057 mtd: hyperbus: hbmc-am654: fix an OF node reference leak
    784a7f4a9efb mtd: hyperbus: hbmc-am654: Convert to platform remove callback returning void
    c1aea4faa984 mtd: hyperbus: Make hyperbus_unregister_device() return void
    3b86841430a6 media: uvcvideo: Propagate buf->error to userspace
    235ab2be3572 media: camif-core: Add check for clk_enable()
    cc0d04ae127d media: mipi-csis: Add check for clk_enable()
    5bdd8b64153d media: i2c: ov9282: Correct the exposure offset
    8ab5c3af1406 media: i2c: imx412: Add missing newline to prints
    333f8f9b6667 media: marvell: Add check for clk_enable()
    a61cd3df84b3 PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy()
    55c326068f6b media: lmedm04: Handle errors for lme2510_int_read
    8bea20f4d630 media: rc: iguanair: handle timeouts
    0486d65804cc efi: sysfb_efi: fix W=1 warnings when EFI is not set
    8049a0845bfc of: reserved-memory: Do not make kmemleak ignore freed address
    ca36f0848eb8 memblock: drop memblock_free_early_nid() and memblock_free_early()
    d26e179d2cac xen/x86: free_p2m_page: use memblock_free_ptr() to free a virtual pointer
    708ce479ff3c RDMA/mlx5: Fix indirect mkey ODP page count
    95b4474c93a0 RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults
    fe090e183d26 RDMA/mlx5: Remove iova from struct mlx5_core_mkey
    b9c5f50926e3 fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device()
    96cd8661f225 ARM: dts: mediatek: mt7623: fix IR nodename
    311afb2be167 arm64: dts: qcom: sdm845: Fix interrupt types of camss interrupts
    eb3e76baaf1b arm64: dts: qcom: sm8150-microsoft-surface-duo: fix typos in da7280 properties
    312e11fc5060 arm64: dts: qcom: sm8350: correct sleep clock frequency
    8fbb052b3bd3 arm64: dts: qcom: sm8250: correct sleep clock frequency
    c990f5e0b2cb arm64: dts: qcom: sm6125: correct sleep clock frequency
    88c84e743d4c arm64: dts: qcom: sc7280: correct sleep clock frequency
    afc66a233ad9 arm64: dts: qcom: msm8994: correct sleep clock frequency
    9cc46ab94b61 arm64: dts: qcom: msm8916: correct sleep clock frequency
    09153a482e90 arm64: dts: qcom: msm8994: Describe USB interrupts
    31952ff5833c arm64: dts: qcom: msm8996: Fix up USB3 interrupts
    ea7232a05e10 arm64: dts: mediatek: mt8183-kukui-jacuzzi: Drop pp3300_panel voltage settings
    c3def10c610a memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code()
    d9f36f957bb2 memory: tegra20-emc: Support matching timings by LPDDR2 configuration
    0f3c0d94c815 memory: Add LPDDR2-info helpers
    4274acb5b996 arm64: dts: mediatek: mt8183: willow: Support second source touchscreen
    cba8c5daa9d8 arm64: dts: mediatek: mt8183: kenzo: Support second source touchscreen
    d098183961e0 arm64: dts: mediatek: mt8173-evb: Fix MT6397 PMIC sub-node names
    b9a5544dbad5 arm64: dts: mediatek: mt8173-elm: Fix MT6397 PMIC sub-node names
    032c92e01aaa arm64: dts: mediatek: mt8173-elm: Drop regulator-compatible property
    2a28a21a925f arm64: dts: mediatek: mt8173-evb: Drop regulator-compatible property
    e53ca458f543 rdma/cxgb4: Prevent potential integer overflow on 32bit
    160450e4908b RDMA/mlx4: Avoid false error about access to uninitialized gids array
    f92f10cdb7fa arm64: dts: mediatek: mt8516: reserve 192 KiB for TF-A
    52a976a83dda arm64: dts: mediatek: mt8516: add i2c clock-div property
    6047c27de667 arm64: dts: mediatek: mt8516: remove 2 invalid i2c clocks
    bcc6c817e2ad arm64: dts: mediatek: mt8516: fix wdt irq type
    3ad0e4e15581 arm64: dts: mediatek: mt8516: fix GICv2 range
    9792f0c9880a arm64: dts: mt8183: set DMIC one-wire mode on Damu
    abbb15f54a35 ARM: at91: pm: change BU Power Switch to automatic mode
    4c6209efea22 padata: avoid UAF for reorder_work
    035ed9577b48 padata: add pd get/put refcnt helper
    f3e0b9f790f8 padata: fix UAF in padata_reorder
    e306eaaa3d78 bpf: Send signals asynchronously if !preemptible
    d6becd34dc65 perf report: Fix misleading help message about --demangle
    54b587874a7c perf top: Don't complain about lack of vmlinux when not resolving some kernel samples
    ca0b62b2dc9a padata: fix sysfs store callback check
    b467ed29b586 crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto()
    778a73f8d38d crypto: hisilicon/sec2 - fix for aead invalid authsize
    37e032978e55 crypto: hisilicon/sec2 - fix for aead icv error
    017b2680816b crypto: hisilicon/sec2 - optimize the error return process
    8f268c476c83 crypto: hisilicon/sec - delete redundant blank lines
    0db426905cb4 crypto: hisilicon/sec - add some comments for soft fallback
    4086792b8883 ktest.pl: Remove unused declarations in run_bisect_test function
    4c45f82e101a ASoC: renesas: rz-ssi: Use only the proper amount of dividers
    49c5d851a2bf perf bpf: Fix two memory leakages when calling perf_env__insert_bpf_prog_info()
    ac026a0ba486 perf header: Fix one memory leakage in process_bpf_prog_info()
    11491bb26fd9 perf header: Fix one memory leakage in process_bpf_btf()
    d79fc69eda73 ASoC: sun4i-spdif: Add clock multiplier settings
    6a5d02ae6ff8 libbpf: Fix segfault due to libelf functions not setting errno
    3c99e59404f3 tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind
    b8583b54455c net/rose: prevent integer overflows in rose_setsockopt()
    3cfabbb18810 tcp_cubic: fix incorrect HyStart round start detection
    ed8c0300f302 net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns()
    920f736e6c64 netfilter: nft_flow_offload: update tcp state flags under lock
    38646749d6e1 net: sched: Disallow replacing of child qdisc from one parent to another
    26bc6076798a net: avoid race between device unregistration and ethnl ops
    f023bf675814 net/mlxfw: Drop hard coded max FW flash image size
    0e2f1d93d287 net: let net.core.dev_weight always be non-zero
    0cc8fc34df84 selftests/landlock: Fix error message
    78eadb30f5ce clk: analogbits: Fix incorrect calculation of vco rate delta
    7d07de96990e wifi: cfg80211: adjust allocation of colocated AP data
    7427e4afbd16 wifi: cfg80211: Handle specific BSSID in 6GHz scanning
    23b54d193a90 selftests: harness: fix printing of mismatch values in __EXPECT()
    28063f72460d cpufreq: ACPI: Fix max-frequency computation
    965e41a93fce wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO
    a1fccf6b72b5 landlock: Handle weird files
    b32a42383c26 landlock: Move filesystem helpers and add a new one
    ba079f94cb0a net/smc: fix data error when recvmsg with MSG_PEEK flag
    9394c1163c20 wifi: wlcore: fix unbalanced pm_runtime calls
    a7e98a85990a samples/landlock: Fix possible NULL dereference in parse_path()
    332ee5fc52e1 regulator: of: Implement the unwind path of of_regulator_match()
    bd099a2fa9be team: prevent adding a device which is already a team device lower
    f5072f5c806f clk: imx8mp: Fix clkout1/2 support
    68fb4aafe3bb cpufreq: schedutil: Fix superfluous updates caused by need_freq_update
    0e833dc042b9 leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata()
    4efb30e564f2 dt-bindings: mfd: bd71815: Fix rsense and typos
    725d01fdde59 cpupower: fix TSC MHz calculation
    fc1750250f85 ACPI: fan: cleanup resources in the error path of .probe()
    f575806ef1da regulator: dt-bindings: mt6315: Drop regulator-compatible property
    a57bce750a52 HID: multitouch: fix support for Goodix PID 0x01e9
    25c30f902438 Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad"
    8c52d33d88ef HID: multitouch: Add support for lenovo Y9000P Touchpad
    4c436e8bd326 wifi: rtlwifi: pci: wait for firmware loading before releasing memory
    b96371339fd9 wifi: rtlwifi: fix memory leaks and invalid access at probe error path
    0eea81f30c6e wifi: rtlwifi: destroy workqueue at rtl_deinit_core
    8e2fcc68fbaa wifi: rtlwifi: remove unused check_buddy_priv
    ed3d742c2204 wifi: rtlwifi: remove unused dualmac control leftovers
    c8951a13d626 wifi: rtlwifi: remove unused timer and related code
    5f945d2595cd rtlwifi: replace usage of found with dedicated list iterator variable
    94b4c15bca53 dt-bindings: leds: class-multicolor: Fix path to color definitions
    f045124251f5 dt-bindings: leds: class-multicolor: reference class directly in multi-led node
    594cb8eeac49 dt-bindings: leds: Add multicolor PWM LED bindings
    7c09f7ba7ad3 dt-bindings: leds: Optional multi-led unit address
    e547ede9d118 dt-bindings: leds: Add Qualcomm Light Pulse Generator binding
    621600ed2ce5 dt-bindings: Another pass removing cases of 'allOf' containing a '$ref'
    b220d6b97a8b spi: dt-bindings: add schema listing peripheral-specific properties
    efb8b60b7990 dt-bindings: mmc: controller: clarify the address-cells description
    4960235d6662 spi: zynq-qspi: Add check for clk_enable()
    5a80bbc5df58 wifi: rtlwifi: usb: fix workqueue leak when probe fails
    643c584528ce wifi: rtlwifi: fix init_sw_vars leak when probe fails
    284a6f64f4cf wifi: rtlwifi: wait for firmware loading before releasing memory
    949845dfdb9b wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step
    56e84ffaf3d8 wifi: rtlwifi: do not complete firmware loading needlessly
    eb288ab33fd8 ipmi: ipmb: Add check devm_kasprintf() returned value
    62f14b506f5b genirq: Make handle_enforce_irqctx() unconditionally available
    2396bc91935c drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table
    a32ea3f982b3 HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections
    c589074b64dd drm/etnaviv: Fix page property being used for non writecombine buffers
    c7971fc03a06 sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat
    b3a5ff8c4b6e sched/psi: Use task->psi_flags to clear in CPU migration
    105ff3024397 afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call
    0a60270ee48c select: Fix unbalanced user_access_end()
    b9ca509e5b7f partitions: ldm: remove the initial kernel-doc notation
    8714ecb8fa55 nvme: Add error check for xa_store in nvme_get_effects_log
    113563188f22 pstore/blk: trivial typo fixes
    e3be8862d73c nbd: don't allow reconnect after disconnect
    2d43a6fcea0e block: retry call probe after request_module in blk_request_module
    6327dacfe6d6 block: deprecate autoloading based on dev_t
    effcbfb1e5ea fs: fix proc_handler for sysctl_nr_open
    a3eff27900d0 fs: move fs stat sysctls to file_table.c
    ca5d118b213e fs: move inode sysctls to its own file
    548fae8fb904 sysctl: share unsigned long const values
    7584027c80dc sysctl: use const for typically used max/min proc sysctls
    d96a8f8e86d1 hung_task: move hung_task sysctl interface to hung_task.c
    f3cfafcdb5bb afs: Fix directory format encoding struct
    ef5f2706364d afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY
    e0bb89c44b56 efi: libstub: Use '-std=gnu11' to fix build with GCC 15
    b5d500042eb3 usb: hcd-pci: remove the action of faking interrupt request
    6f0605db50e2 clk: imx: Add check for kcalloc
    5b837b9e1543 bpf: Fix the indention issue in grow_stack_state()
    42b62697634d cifs: Fix the calling of smb_version_operations::calc_smb_size()
    b14acf729e9d f2fs: Add inline to f2fs_build_fault_attr() stub
    7c317bec311f f2fs: check validation of fault attrs in f2fs_build_fault_attr()
    81c12119c23f bpf: Fix accesses to uninit stack slots [ Upstream commit 6b4a64bafd107e521c01eec3453ce94a3fb38529 ]
    c4fa05422d87 smb: client: fix potential OOB in smb2_dump_detail()
    299ef3b5b00b of: module: add buffer overflow check in of_modalias()
    b8086c3c1548 reiserfs: Avoid touching renamed directory if parent does not change
    ea091017ef62 ipv6: Fix data races around sk->sk_prot.
    ff8710da80ee ipv6: annotate some data-races around sk->sk_prot
    e8c2eafaaa6a tcp: Fix data races around icsk->icsk_af_ops.
    8d1bab770956 locking/rwsem: Disable preemption while trying for rwsem lock
    7c82dac02886 block, loop: support partitions without scanning
    45f504f301d4 bpftool: Fix pretty print dump for maps without BTF loaded
    1f24338cb789 jbd2: Drop the merge conflicted hunk
    e1d0e3c51bde tpm: tis_i2c: Limit write bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
    1abe841fe331 tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
    6224acfc1d56 tpm: Add flag to use default cancellation policy
    1cd19d48fb90 tpm: tis_i2c: Fix sanity check interrupt enable mask
    a883da132fa8 tpm: Add tpm_tis_i2c backend for tpm_tis_core
    a742ac8a1c51 tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
    ef495c5f45f2 tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
    1f3be2e23aa6 gcc-plugins: Reorganize gimple includes for GCC 13
    24615a3b932a ata: ahci: fix enum constants for gcc-13
    5d6cb145541a net: stmmac: Enable mac_managed_pm phylink config
    fd93aabb4287 tools/resolve_btfids: Use pkg-config to locate libelf
    130f9da78406 tools/resolve_btfids: Build with host flags
    00f2f1a782f9 tools/resolve_btfids: Support cross-building the kernel with clang
    17776a4ba9c2 tools/resolve_btfids: Install libbpf headers when building
    7c9808380d70 libbpf: Make libbpf_version.h non-auto-generated
    37ae1ba791ac libbpf: Add LIBBPF_DEPRECATED_SINCE macro for scheduling API deprecations
    a2667e6d7314 drm/radeon: free iio for atombios when driver shutdown
    f100c753aa1f powerpc: Fix reschedule bug in KUAP-unlocked user copy
    da5513f30187 libbpf: Fix build warning on ref_ctr_off
    4c5a089621a8 perf python: Account for multiple words in CC
    1c5699ee85d4 fs: move S_ISGID stripping into the vfs_*() helpers
    838f5d0701d8 fs: add mode_strip_sgid() helper
    d97172683641 squashfs: provide backing_dev_info in order to disable read-ahead
    ed037d7be40c irq_work: use kasan_record_aux_stack_noalloc() record callstack
    1363bd7dbde3 ixgbevf: add disable link state
    e5601ae2bd24 ixgbe: add improvement for MDD response functionality
    caa57cd80575 ixgbe: add the ability for the PF to disable VF link state
    16a77bfcc7df Check /dev/console using init_stat()
    04574fd5579a tracing/arm: Have max stack tracer handle the case of return address after data
    0e51e5717018 gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully
    1e6b7da6ddba drivers/base: Fix unsigned comparison to -1 in CPUMAP_FILE_MAX_BYTES
    493160901320 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition
    04224f725aa3 irqchip/gic-v3-its: Skip HP notifier when no ITS is registered
    6f6c2996a81c irqchip/gic-v3-its: Postpone LPI pending table freeing and memreserve
    1fa94473423f irqchip/gic-v3-its: Give the percpu rdist struct its own flags field
    6013d1ae5feb cert host tools: Stop complaining about deprecated OpenSSL functions
    efe20512212b init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash
    a40d2daf2795 pnmtologo: use relocatable file name
    3b40d5b41155 of: configfs: remove unused variable overlay_lock
    6c085baf1838 tools: use basename to identify file in gen-mach-types
    2fca0fd71981 lib/build_OID_registry: fix reproducibility issues
    0f586f4ee8ad vt/conmakehash: improve reproducibility
    a75774679f28 OF: DT-Overlay configfs interface (v8)
    d179c639b30b x86/boot: Wrap literal addresses in absolute_pointer()
    856ec356cf91 ACPI: thermal: drop an always true check
    7614af249993 xfs: Fix -Werror=dangling-pointer work-around for older GCC
    41470215f97e xfs: Work around GCC 12 -Werror=dangling-pointer for xfs_attr_remote.o
    44a445c1922d virtio-pci: Remove wrong address verification in vp_del_vqs()
    77aa9e489eaf bpf: Disallow unprivileged bpf by default
    ebfb1822e9f9 fs/aufs: fixup 5.15.36 fixups
    4eba9348d3e2 Revert "Revert "fbdev: Hot-unplug firmware fb devices on forced removal""
    5df6d1b00f95 jbd2: fix use-after-free of transaction_t race
    2d83e8196487 jbd2: refactor wait logic for transaction updates into a common function
    07a63f760793 netfilter: conntrack: avoid useless indirection during conntrack destruction
    4e7122625996 Revert "fbdev: Hot-unplug firmware fb devices on forced removal"
    7ba4cb36fd4f rcu: Avoid alloc_pages() when recording stack
    f78574dee71e kasan: test: silence intentional read overflow warnings
    d313cb89b6b1 kasan: arm64: fix pcpu_page_first_chunk crash with KASAN_VMALLOC
    5e279d5647cc arm64: support page mapping percpu first chunk allocator
    e5bf16752dca vmalloc: choose a better start address in vm_area_register_early()
    660b3d21b46f kasan: test: bypass __alloc_size checks
    00aa7573e53a kasan: test: add memcpy test that avoids out-of-bounds write
    67becf0b1bd4 kasan: fix tag for large allocations when using CONFIG_SLAB
    bedf1e033213 workqueue, kasan: avoid alloc_pages() when recording stack
    7195b67ce69b kasan: generic: introduce kasan_record_aux_stack_noalloc()
    bdff763f0e29 kasan: common: provide can_alloc in kasan_save_stack()
    51423ebb36ad lib/stackdepot: introduce __stack_depot_save()
    85373e66d847 lib/stackdepot: remove unused function argument
    5b6cc9b251f3 lib/stackdepot: include gfp.h
    c9f3902d8069 aufs: reduce overhead for "code present but disabled" use case.
    b98d189df02c aufs: bugfix, umount passes NULL to ->parse_monolithic()
    13b883cbbbd9 aufs standalone: cosmetic, missing copyright sentence
    21f8b0d81898 aufs: 5.15.5-20220117 ---> 5.15.5-20220221
    6199fd896645 aufs: tiny, headers after fs_context
    8ddb40e31c29 aufs: fs_context 7/7, finally remount
    69035f71c6fd aufs: fs_context 6/7, now mount
    bc841b970697 aufs: fs_context 5/7, parse all other mount options
    435188053da2 aufs: fs_context 4/7, parse xino options
    9af1f1825cbd aufs: fs_context 3/7, parse the branch-management options
    1c05eb767f8c aufs: fs_context 2/7, parse "br" mount option
    a8488f603134 aufs: fs_context 1/7, skelton of the new shceme
    8e32e0015564 aufs: pre fs_context, convert a static flag to a macro
    f90cb4144aec aufs: pre fs_context, support the incomplete sb and sbinfo case
    948762ef859c aufs: pre fs_context, convert the type of alloc_sbinfo()
    77151a08776b aufs: 5.15.5-20211129 ---> 5.15.5-20220117
    2539adbbbe1e aufs: 5.14-20211018 ---> 5.15.5-20211129
    7d32b25193c4 aufs: for v5.15-rc1, sync_inode() is gone
    66ec0c509225 aufs: for v5.15-rc1, new param 'rcu' for ->get_acl()
    69709dc518cd aufs: for v5.15-rc1, no mand-lock anymore
    ada8fe9543e5 aufs: 5.14-20210906  ---> 5.14-20211018
    b77f7f3f394a Revert "aufs: adjust to v5.15 fs changes"
    81bdce5b5876 tick/nohz: WARN_ON --> WARN_ON_ONCE to prevent console saturation
    97c963889222 sched/isolation: really align nohz_full with rcu_nocbs
    871f23ad3627 Revert "ARM: defconfig: Enable ax88796c driver for Exynos boards"
    ffad0783dd5b ARM: config: multi v7: Regenerate defconifg
    5c1e1a1ff2d3 ARM: config: multi v7: Add renamed symbols
    badaf96564fe ARM: config: multi v7: Clean up enabled by default options
    34996040fc9b ARM: config: multi v7: Drop unavailable options
    7f685244afb3 powerpc/mm: Switch obsolete dssall to .long
    20301aeb1a64 riscv: fix build with binutils 2.38
    9df58d070506 powerpc/lib/sstep: fix 'ptesync' build error
    720b61fc400b x86_64_defconfig: Fix warnings
    02bf23d26bc4 arm64: defconfig: cleanup config options
    05914e2c87e5 arm: defconfig: drop unused POWER_AVS option
    ffb532fa19b9 aufs5: fix build against v5.15.3+
    a4b3abf4d96d qemux86: add configuration symbol to select values
    fee94ee09154 clear_warn_once: add a clear_warn_once= boot parameter
    3d8762d900d9 clear_warn_once: bind a timer to written reset value
    95faacac47e8 clear_warn_once: expand debugfs to include read support
    de20c4240018 perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel.
    0e4aacead9c1 perf: x86-32: explicitly include <errno.h>
    9ad92c11468e perf: mips64: Convert __u64 to unsigned long long
    09e7efe3e68a perf: fix bench numa compilation
    e79becc44fa6 perf: add SLANG_INC for slang.h
    b1033b588681 perf: add sgidefs.h to for mips builds
    cf9db484ac0b perf: change --root to --prefix for python install
    7fd052c2c562 perf: add 'libperl not found' warning
    27a437cdd469 perf: force include of <stdbool.h>
    3b99d21bec2f fat: don't use obsolete random32 call in namei_vfat
    a7e9293b506b FAT: Added FAT_NO_83NAME
    6fd0e71d9e5c FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option
    c379b0d324ae FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option
    538be0fdb124 aufs: adjust to v5.15 fs changes
    f45da75c8759 aufs5: core
    047f57e07e01 aufs5: standalone
    029fc15574c8 aufs5: mmap
    610d0192ee94 aufs5: base
    d4e428d0ec5f aufs5: kbuild
    eb067eca251a yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL
    286af18d0875 yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name
    24d59a4e26a6 yaffs2: v5.12+ build fixups (not runtime tested)
    22c73536d5d7 yaffs: include blkdev.h
    506b7251bfb8 yaffs: fix misplaced variable declaration
    a0e26ff364dc yaffs2: v5.6 build fixups
    b10b1b2d169e yaffs2: fix memory leak when /proc/yaffs is read
    ad9adccbb214 yaffs: add strict check when call yaffs_internal_read_super
    2e3c3aec8279 yaffs: repair yaffs_get_mtd_device
    d662538516a7 yaffs: Fix build failure by handling inode i_version with proper atomic API
    70a6113ee2c7 yaffs2: fix memory leak in mount/umount
    3378e4a9e404 yaffs: Avoid setting any ACL releated xattr
    ec2284edddef Yaffs:check oob size before auto selecting Yaffs1
    c2a49874051c fs: yaffs2: replace CURRENT_TIME by other appropriate apis
    e9a5105a3e73 yaffs2: adjust to proper location of MS_RDONLY
    608807406f13 yaffs2: import git revision b4ce1bb (jan, 2020)
    89e660ece42c initramfs: allow an optional wrapper script around initramfs generation
    b179dbc9aa10 iwlwifi: select MAC80211_LEDS conditionally
    3fd5ca3673d0 net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119)
    d1f6edbf0188 arm64/perf: Fix wrong cast that may cause wrong truncation
    d202fb2caf33 defconfigs: drop obselete options
    9a27e3b5f4e7 arm64/perf: fix backtrace for AAPCS with FP enabled
    e20d8cf019b4 linux-yocto: Handle /bin/awk issues
    b6d2a3dbbd3a uvesafb: provide option to specify timeout for task completion
    adb40f1e6a1a uvesafb: print error message when task timeout occurs
    f280a1ed0962 compiler.h: Undef before redefining __attribute_const__
    4352732f268c vmware: include jiffies.h
    7954a677968d Resolve jiffies wrapping about arp
    5f28a1035d95 nfs: Allow default io size to be configured.
    0d7260ad7106 check console device file on fs when booting
    900a12e37e0a mount_root: clarify error messages for when no rootfs found
    7b878cbea726 menuconfig,mconf-cfg: Allow specification of ncurses location
    6604fc1763b3 modpost: mask trivial warnings
    0d294adb09cb kbuild: exclude meta directory from distclean processing
    a097cdd95a9e powerpc: serialize image targets
    5db6ec39a0a3 arm: serialize build targets
    cbabca27905e crtsavres: fixups for 5.4+
    7fc7656ed403 powerpc/ptrace: Disable array-bounds warning with gcc8
    a5faac5a19a2 powerpc: Disable attribute-alias warnings from gcc8
    186c54665b67 powerpc: add crtsavres.o to archprepare for kbuild
    d1ea862964ca powerpc: kexec fix for powerpc64
    2ac35b89a0f9 powerpc: Add unwind information for SPE registers of E500 core
    2e1c348a28bb mips: vdso: fix 'jalr $t9' crash in vdso code
    ec57870b303a mips: Kconfig: add QEMUMIPS64 option
    6a81b3c08107 4kc cache tlb hazard: tlbp cache coherency
    74e3b2a21e54 malta uhci quirks: make allowance for slow 4k(e)c
    22e65b63d3b4 arm/Makefile: Fix systemtap
    b7f1ab59f19e vexpress: Pass LOADADDR to Makefile
    ce2800c73bf7 arm: ARM EABI socketcall
    019d142fd956 ARM: LPAE: Invalidate the TLB for module addresses during translation fault

(From OE-Core rev: 8d6940f6a2c5fb81d3ed8dafb95b52a013174a57)

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-01 09:02:41 -07:00
Vijay Anusuri
e4721dd506 vim: Upgrade 9.1.1115 -> 9.1.1198
This includes CVE-fix for CVE-2025-27423 and CVE-2025-29768

Changes between 9.1.1115 -> 9.1.1198
====================================
https://github.com/vim/vim/compare/v9.1.1115...v9.1.1198

(From OE-Core rev: 0ace90f2918496ceae32aebea05bb826d1e3dad6)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 8e540bd287fd56e3a714f81395b59dd508a6d957)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-01 09:02:41 -07:00
Peter Marko
d4bb2231fa python3: patch CVE-2025-0938
Pick commit mentioned in NDV CVE report
b8b4b713c5
which is on 3.10 branch.

(From OE-Core rev: 70036b4ea0ab968adab82fc632bb967f95203de2)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-01 09:02:41 -07:00
Steve Sakoman
d4411e521d poky.conf: add ubuntu2404 to SANITY_TESTED_DISTROS
(From meta-yocto rev: af63d6abd596da87881485fcfcfb21e6847f1801)

Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-27 08:16:30 -07:00
Robert Yang
27d7ee7bf6 libxcrypt-compat: Remove libcrypt.so to fix conflict with libcrypt
Fixed:
IMAGE_INSTALL:append = " libxcrypt-compat"

$ bitbake <image> -cpopulate_sdk
file /usr/lib/libcrypt.so from install of libxcrypt-compat-dev-4.4.33-r0.0.aarch64 conflicts with file from package libcrypt-dev-4.4.33-r0.2.aarch64

Remove libcrypt.so like other files to fix the error.

(From OE-Core rev: dc0c7a8c3d1d4f02869b7f0d42f704fd24bf0dde)

(From OE-Core rev: 1172a71f2104454a13e64886adbdb381aa8d6e0e)

Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-27 08:16:30 -07:00
Yogita Urade
9da4f8dc2b xwayland: fix CVE-2022-49737
In X.Org X server 20.11 through 21.1.16, when a client application
uses easystroke for mouse gestures, the main thread modifies various
data structures used by the input thread without acquiring a lock,
aka a race condition. In particular, AttachDevice in dix/devices.c
does not acquire an input lock.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-49737

Upstream patch:
dc7cb45482

(From OE-Core rev: 740ea9019cf5cf309c5a4ef380eac17d21078ac8)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-27 08:16:30 -07:00
Yogita Urade
5076bd268c xserver-xorg: fix CVE-2022-49737
In X.Org X server 20.11 through 21.1.16, when a client application
uses easystroke for mouse gestures, the main thread modifies various
data structures used by the input thread without acquiring a lock,
aka a race condition. In particular, AttachDevice in dix/devices.c
does not acquire an input lock.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-49737

Upstream patch:
dc7cb45482

(From OE-Core rev: c6a8ad45174a416c4129deb210eab9b7721ce01d)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-27 08:16:30 -07:00
Vijay Anusuri
4df4248036 libxslt: Fix for CVE-2025-24855
Upstream-Commit: c7c7f1f78d

(From OE-Core rev: eced74ca3be7d6c47e7c50152a36e0b1e8eba74a)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-27 08:16:30 -07:00
Vijay Anusuri
0490768a25 libxslt: Fix for CVE-2024-55549
Upstream-Commit: 46041b65f2

(From OE-Core rev: eae0c33539f302124544373b74bd6883467ff549)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-27 08:16:30 -07:00
Peter Marko
88aec329b8 tiff: mark CVE-2023-30774 as patched
[1] points tu issue [2] which was fixed by [3] together with lot of
other issues.
We already have this patch, so mark CVE-2023-30774 in it.

Also split CVE tag to separate entries.

[1] https://nvd.nist.gov/vuln/detail/CVE-2023-30774
[2] https://gitlab.com/libtiff/libtiff/-/issues/463
[3] https://gitlab.com/libtiff/libtiff/-/merge_requests/385

(From OE-Core rev: 87893c72efbba029c5f2a9e8e3fff126b2a0cb71)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-27 08:16:30 -07:00
Steve Sakoman
8660c1bd8d bitbake: cache: bump cache version
Version bump is needed after "siggen.py: Improve taskhash reproducibility"
otherwise there will be taskhash mismatch errors

(Bitbake rev: 046871d9fd76efdca7b72718b328d8f545523f7e)

Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-27 08:16:30 -07:00
Divya Chellam
b210ed67de vim: Upgrade 9.1.1043 -> 9.1.1115
This includes CVE-fix for CVE-2025-26603 and CVE-2025-1215

Changes between 9.1.1043 -> 9.1.1115
====================================
https://github.com/vim/vim/compare/v9.1.1043...v9.1.1115

(From OE-Core rev: acb88b244e89bc1300a24f60d0a44c21e0ab1af6)

Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-19 07:13:17 -07:00
Zhang Peng
52209c5a2b mpg123: fix CVE-2024-10573
CVE-2024-10573:
An out-of-bounds write flaw was found in mpg123 when handling crafted streams.
When decoding PCM, the libmpg123 may write past the end of a heap-located buffer.
Consequently, heap corruption may happen, and arbitrary code execution is not
discarded. The complexity required to exploit this flaw is considered high as
the payload must be validated by the MPEG decoder and the PCM synth before execution.
Additionally, to successfully execute the attack, the user must scan through the
stream, making web live stream content (such as web radios) a very unlikely attack vector.

Reference: [https://nvd.nist.gov/vuln/detail/CVE-2024-10573]

Upstream patches: [svn://scm.orgis.org/mpg123/branches/1.31-fixes@5442]

(From OE-Core rev: a227b80e29c5ba5d963acaa4ddb4b9ad45483bd5)

Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-19 07:13:17 -07:00
Ashish Sharma
ef3aca9b21 ruby: Fix CVE-2025-27219
Upstream-Status: Backport [9907b76dad]

(From OE-Core rev: 31d67739490ec2abf92328b3f0ceff22ce5d4974)

Signed-off-by: Ashish Sharma <asharma@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-19 07:13:17 -07:00
Hitendra Prajapati
d249d932ad grub: Fix multiple CVEs
Backport fixes for :

* CVE-2025-0622 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=2123c5bca7e21fbeb0263df4597ddd7054700726 && https://git.savannah.gnu.org/cgit/grub.git/commit/?id=9c16197734ada8d0838407eebe081117799bfe67 && https://git.savannah.gnu.org/cgit/grub.git/commit/?id=7580addfc8c94cedb0cdfd7a1fd65b539215e637
* CVE-2025-0624 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=5eef88152833062a3f7e017535372d64ac8ef7e1
* CVE-2025-0677_CVE-2025-0684_CVE-2025-0685_CVE-2025-0686_CVE-2025-0689 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=47b2dfc7953f70f98ddf35dfdd6e7f4f20283b10
* CVE-2025-0678_CVE-2025-1125 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=84bc0a9a68835952ae69165c11709811dae7634e
* CVE-2025-0690 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=dad8f502974ed9ad0a70ae6820d17b4b142558fc
* CVE-2025-1118 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=34824806ac6302f91e8cabaa41308eaced25725f

(From OE-Core rev: 5c4ee702f93f9bb4fcb557fd067242da16d63da2)

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-19 07:13:17 -07:00
Hitendra Prajapati
7b99a13f6f grub: Fix multiple CVEs
Backport fixes for:

* CVE-2024-45774 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=2c34af908ebf4856051ed29e46d88abd2b20387f
* CVE-2024-45775 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=05be856a8c3aae41f5df90cab7796ab7ee34b872
* CVE-2024-45776 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=09bd6eb58b0f71ec273916070fa1e2de16897a91
* CVE-2024-45777 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=b970a5ed967816bbca8225994cd0ee2557bad515
* CVE-2024-45778_CVE-2024-45779 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=26db6605036bd9e5b16d9068a8cc75be63b8b630
* CVE-2024-45780 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=0087bc6902182fe5cedce2d034c75a79cf6dd4f3
* CVE-2024-45781 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=c1a291b01f4f1dcd6a22b61f1c81a45a966d16ba
* CVE-2024-45782_CVE-2024-56737 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=417547c10410b714e43f08f74137c24015f8f4c3
* CVE-2024-45783 - Upstream-Status: Backport from https://git.savannah.gnu.org/cgit/grub.git/commit/?id=f7c070a2e28dfab7137db0739fb8db1dc02d8898

(From OE-Core rev: 1bf2e89c932167b677051234d4e0cc4c52b0ee0c)

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-19 07:13:17 -07:00
Peter Marko
12da3c7d02 libarchive: patch CVE-2025-25724
Pick commit referencing this MR which was merged to master.
Note that this commit also patched CVE-2025-1632 in bsdunzip, however
that utility was introduced only in 3.7.0, so that part is not
applicable in kirkstone.

(From OE-Core rev: ec837d3b21b4f8b98abac53e2833f1490ba6bf1e)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-19 07:13:17 -07:00
Peter Marko
fcbb7d1cc7 puzzles: ignore three new CVEs for a different puzzles
As we just match on product by default, ignore three CVEs which are
for the "Puzzles" WordPress theme by ThemeREX (CPE themerex:puzzles).

(From OE-Core rev: 87326573c82ac1e8dc335319442236ef2341501e)

(From OE-Core rev: 48791ba2329ee930285e5ed8eff0f2535c70bec7)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>

Adapted to different kirkstone CVE_STATUS format.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-19 07:13:17 -07:00
Paulo Neves
8bfb7dabb7 bitbake: siggen.py: Improve taskhash reproducibility
file checksums are part of the data checksummed
to generate the task hash. The list of file checksums
was not ordered.

In this commit we make sure the task hash checksum takes
a list of checksum data that is ordered by unique file name
thus guaranteeing reproducibility.

(Bitbake rev: da5f41996687e18b78d9c9845e621d832115aa1e)

Signed-off-by: Paulo Neves <paulo@myneves.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-19 07:13:17 -07:00
Alessio Cascone
dcbf2ff5dc tzcode-native: Fix compiler setting from 2023d version
Starting from 2023d version, tzcode makefile does not use anymore "cc"
variable for C compiler, due to Makefile refactoring.
Replacing "cc" with "CC" fixes the issue.

(From OE-Core rev: 0216c229d5c60d0023b0a7d6e8ee41bdfa16f8ef)

Signed-off-by: Alessio Cascone <alessio.cascone@vimar.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit b3cdfca5ef84ed2054faef9abddef3aeed930e17)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-13 08:50:03 -07:00
Priyal Doshi
9d5661c616 tzdata/tzcode-native: upgrade 2024b -> 2025a
(From OE-Core rev: 4dc7731d350eab8952330f01beb5acdba7d88bb9)

Signed-off-by: Priyal Doshi <pdoshi@mvista.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit a15c4e6793c55c8084a61298ef3695e1db2f60cd)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-13 08:50:03 -07:00
Vijay Anusuri
3cd40cac2b libtasn1: upgrade 4.19.0 -> 4.20.0
* Noteworthy changes in release 4.20.0 (2025-02-01) [stable]
- The release tarball is now reproducible.
- We publish a minimal source-only tarball generated by 'git archive'.
- Update gnulib files and various build/maintenance fixes.
- Fix CVE-2024-12133: Potential DoS in handling of numerous SEQUENCE OF or SET
OF elements

License-Update: file COPYING.LESSER renamed to COPYING.LESSERv2 & Copyright year updated to 2025

(From OE-Core rev: 0ff5d08053d92eeae5b2a23f8e0d7a280488723c)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-13 08:50:03 -07:00
Hitendra Prajapati
fd0eb2db0e ruby: Fix CVE-2025-27220
Upstream-Status: Backport from cd1eb08076

(From OE-Core rev: 44665939783cb2b32f5ade1772e0ceef47f9a853)

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-13 08:50:03 -07:00
Deepesh Varatharajan
e9f1ad6922 binutils: Fix CVE-2025-0840
PR32560 stack-buffer-overflow at objdump disassemble_bytes

Backport a patch from upstream to fix CVE-2025-0840
Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=baac6c221e9d69335bf41366a1c7d87d8ab2f893]

(From OE-Core rev: e12ee4b1713aa25465aa3f866d345d84e9eb948a)

Signed-off-by: Deepesh Varatharajan <Deepesh.Varatharajan@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-13 08:50:03 -07:00
Vijay Anusuri
079c58a500 openssh: Fix CVE-2025-26465
Upstream-Status: Backport from 0832aac795

(From OE-Core rev: 934c212859e12235599835e8cfd8857e4be44ff8)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-13 08:50:03 -07:00
Ross Burton
d103d2df50 ref-manual: don't refer to poky-lsb
This was removed in 2019, so swap it for poky-altcfg.

(From yocto-docs rev: 9b4c36f7b02dd4bedfec90206744a1e90e37733c)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Reviewed-by: Quentin Schulz <quentin.schulz@cherry.de>
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
(cherry picked from commit 7f7f6570befdda280c174a5f9776b20f53f3ea0d)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Ross Burton
bbb26ab250 Remove all mention of core-image-lsb
core-image-lsb was removed in 2019[1], so remove all of the  incredibly
obsolete references in the documentation.

[1] oe-core fb064356af615d67d85b65942103bf943d84d290

(From yocto-docs rev: 6001f1baa513566639abee86376dc72748f3cd34)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Reviewed-by: Quentin Schulz <quentin.schulz@cherry.de>
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
(cherry picked from commit 062445a49919eff117b5478c1fb18d125c1f895c)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Lee Chee Yang
ea1e84e8c1 migration-guides: add release notes for 4.0.25
(From yocto-docs rev: da811a5e6cf298bc63157814d57befdc125d9d32)

Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
(cherry picked from commit 4649514cdfae496f43711d6b830a0a835c3a1534)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Johannes Kauffmann
a3dc9e0f84 mesa: Fix missing GLES3 headers in SDK sysroot
Building weston with core-image-weston SDK fails:
```
../libweston/renderer-gl/gl-shader-config-color-transformation.c:29:10: fatal error: GLES3/gl3.h: No such file or directory
   29 | #include <GLES3/gl3.h>
      |          ^~~~~~~~~~~~~
```

Both GLES2 and GLES3 implementations are contained in libGLESv2.so.2,
which is packaged in libgles2-mesa. However, the headers are split
between libgles2-mesa-dev and libgles3-mesa-dev, which is why the
GLES3 headers end up missing in the SDK sysroot.

Add a dependency so the GLES3 headers are properly associated with
the GLES3 implementation.

(From OE-Core rev: 7e1308ec413e69a8427ac5998431005d9e4b8033)

(From OE-Core rev: 0d9f2fcc2058407eb138297d9f8f12595851b963)

Signed-off-by: Tom Hochstein <tom.hochstein@oss.nxp.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Johannes Kauffmann <johanneskauffmann@hotmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
cb4d8ec033 xwayland: Fix CVE-2025-26601
The patches are copied from xserver-xorg recipe.
CVE reported for both and patches apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/16a1242d &
https://gitlab.freedesktop.org/xorg/xserver/-/commit/f52cea2f &
https://gitlab.freedesktop.org/xorg/xserver/-/commit/8cbc90c8 & https://gitlab.freedesktop.org/xorg/xserver/-/commit/c2857989

(From OE-Core rev: 58f5a6a28d353f14c672bb99820608ec82f05e6e)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
fb3ba2fa42 xwayland: Fix CVE-2025-26600
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/6e0f332b

(From OE-Core rev: b02bf5f9abb4d2a514f9ea883cd1fe6057367c92)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
b589fab5bb xwayland: Fix CVE-2025-26599
The patches are copied from xserver-xorg recipe.
CVE reported for both and patches apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/c1ff84be & https://gitlab.freedesktop.org/xorg/xserver/-/commit/b07192a8

(From OE-Core rev: d79cd91d2abc1b0e9e1e47d18af140d351dce298)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
d828f38a4e xwayland: Fix CVE-2025-26598
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/bba9df1a

(From OE-Core rev: f01c281b94ff137003ef108e33a8c3230c541c46)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
d99c2b9b65 xwayland: Fix CVE-2025-26597
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/0e4ed949

(From OE-Core rev: a7f4c6b1946e7215d8df561340d7a1cd0b2d5c27)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
775d602327 xwayland: Fix CVE-2025-26596
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/80d69f01

(From OE-Core rev: 45738e56aaf5dac1a471cb37088d3cd24764156d)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
b48431c424 xwayland: Fix CVE-2025-26595
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/11fcda87

(From OE-Core rev: e0768162f0ece29392d4f387d263d62dd4083836)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
3cc6f0bb5c xwayland: Fix CVE-2025-26594
The patches are copied from xserver-xorg recipe.
CVE reported for both and patches apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/01642f26 & https://gitlab.freedesktop.org/xorg/xserver/-/commit/b0a09ba6

(From OE-Core rev: 2d8bf72c892a3a6422e2a294fb6528ff67971e6d)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
0f565d1c27 xwayland: Fix CVE-2024-9632
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: ba1d14f8ef

(From OE-Core rev: 2158a34839068b878344d214d3fc9feeb17e504a)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
46014acb66 xwayland: Fix CVE-2024-31083
The patches are copied from xserver-xorg recipe.
CVE reported for both and patches apply on both.

Upstream-Commit:
https://gitlab.freedesktop.org/xorg/xserver/-/commit/bdca6c3d1f5057ee & https://gitlab.freedesktop.org/xorg/xserver/-/commit/337d8d48b618d4fc

(From OE-Core rev: 1c4b1e7877210243707a91d6a9d37ed4546bc8a7)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
57a80e447e xwayland: Fix CVE-2024-31081
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: 3e77295f88

(From OE-Core rev: 3575ad718c8ea7d808247842df19982f00725187)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
4a8c873ccf xwayland: Fix CVE-2024-31080
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: 96798fc196

(From OE-Core rev: 4e41b1c8cccd3b2f359ee949cad402b9418f5983)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
3bbaf11178 xwayland: Fix CVE-2024-21886
The patches are copied from xserver-xorg recipe.
CVE reported for both and patches apply on both.

Upstream-Commit:
bc1fdbe465
& 26769aa71f

(From OE-Core rev: 77487fb0756951e29628f41ff00db12a5f9d7c27)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
b442e01822 xwayland: Fix CVE-2024-21885
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: 4a5e9b1895

(From OE-Core rev: 4b0f6aaa994eeab5d18211ace8034ec8b92b7419)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Peter Marko
2159b5f8ae libxml2: mark patch as fixing CVE-2025-27113
This vulnerability has now a CVE assigned.

(From OE-Core rev: 204ff9dd9c62a8a346e89880b2e15a4c0e9ad6e0)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Hitendra Prajapati
9c934f60ce elfutils: Fix multiple CVEs
Backport fixes for:

* CVE-2025-1352 - Upstream-Status: Backport from https://sourceware.org/git/?p=elfutils.git;a=commit;h=2636426a091bd6c6f7f02e49ab20d4cdc6bfc753
* CVE-2025-1372 - Upstream-Status: Backport from https://sourceware.org/git/?p=elfutils.git;a=commit;h=73db9d2021cab9e23fd734b0a76a612d52a6f1db

(From OE-Core rev: 8ea258ad9c83be5d9548a796f7dda4ac820fc435)

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Guocai He
4e4cac541d xz: Update SRC_URI
Update SRC_URI for xz.
The the tarball of xz-.tar.gz has been changed from
https://tukaani.org/xz/xz-.tar.gz to
https://sourceforge.net/projects/lzmautils/files/xz-.tar.gz

(From OE-Core rev: 3f0803557ffa0fae557895f955ab2dcac38d7262)

Signed-off-by: Guocai He <guocai.he.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Guocai He
9f6c004cc7 tzcode: Update SRC_URI
Update SRC_URI for tzcode.
Update the http to https in SRC_URI to fix the do_fetch issue.

(From OE-Core rev: b663540d143b0e5fcb9ceeec45cde7fe3e68f9bb)

Signed-off-by: Guocai He <guocai.he.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Moritz Haase
7c77eacfa7 meta: Enable '-o pipefail' for the SDK installer
When testing a Yocto SDK installer on Alpine 3.21, we recently ended up with a
broken SDK. One of the commands the relocation script calls in a piped
multi-command chain failed (see [0]), but the installer did not realize that -
since it doesn't use 'set -o pipefail'. Thus, the error was never reported to
the user and the installer claimed to have set up the SDK correctly - which
wasn't the case.

Given that the SDK installer is a POSIX-compliant shell script and that the
'pipefail' option used to be missing from the standard, it's not surprising that
it isn't used. Thankfully however, in June of 2024, a new version of POSIX
(POSIX.1-2024) was released - and that one finally includes the 'pipefail'
option (see [1]). A number of shells already support it, so let's enable it if
available to make the SDK installer more robust.

The change has been tested locally using SDK installers for internal projects,
based on both Kirkstone and Scarthgap.

[0]: https://gitlab.alpinelinux.org/alpine/aports/-/issues/16797
[1]: https://pubs.opengroup.org/onlinepubs/9799919799.2024edition/utilities/V3_chap02.html#set

(From OE-Core rev: 1cb4b41c7faf77fcc347b1276d86d4288968c926)

(From OE-Core rev: 1de469f1ffb1680e3a75da2c3895fb1e4f43859f)

Signed-off-by: Moritz Haase <Moritz.Haase@bmw.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 10dce263f0)
Signed-off-by: Akash Hadke <akash.hadke27@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Libo Chen
c1e070df6b virglrenderer: fix do_fetch error
Update SRC_URI to fix the following error:
WARNING: virglrenderer-native-0.9.1-r0 do_fetch: Failed to fetch URL
git://anongit.freedesktop.org/git/virglrenderer;branch=branch-0.9.1,
attempting MIRRORS if available

(From OE-Core rev: 72450859dd5ee5395b64917516f185a2eed52775)

Signed-off-by: Libo Chen <libo.chen.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Jiaying Song
a84c9d6623 boost: fix do_fetch error
Change the SRC_URI to the correct value due to the following error:
WARNING: boost-native-1.86.0-r0 do_fetch: Checksum failure encountered with download of https://boostorg.jfrog.io/artifactory/main/release/1.86.0/source/boost_1_86_0.tar.bz2 - will attempt other sources if available

(From OE-Core rev: 3b4c5ce6b89477307f3a2c30c7e275473b0c9f00)

Signed-off-by: Jiaying Song <jsong-cn@ala-lpggp7.wrs.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>

backport to kirkstone.
Signed-off-by: Libo Chen <libo.chen.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Narpat Mali
aaf405efd5 systemd: upgrade 250.5 -> 250.14
Latest stable branch update which includes 396 commits and the full
list of changes can be found at:
https://github.com/systemd/systemd-stable/compare/v250.5...v250.14

All the patches were refreshed with devtool.

Backported this upstreamed patch to resolve the compile error while
building systemd with qemumips machine.
- 0001-core-fix-build-when-seccomp-is-off.patch

These 2 below patches were modified to resolve the merge conflicts
introduced by systemd v250.14 version:
1. 0001-Move-sysusers.d-sysctl.d-binfmt.d-modules-load.d-to-.patch
- This patch was just adjusted based on the systemd v250.14 version.

2. 0001-pass-correct-parameters-to-getdents64.patch
- For this patch, there was a commit reverted as part of the v250.8 tag:
51089e007f

These below 6 patches were dropped as systemd v250.14 already has
the changes:
- 0001-shared-json-allow-json_variant_dump-to-return-an-err.patch
- CVE-2022-3821.patch
- CVE-2022-4415-1.patch
- CVE-2022-4415-2.patch
- CVE-2022-45873.patch
- CVE-2023-7008.patch

(From OE-Core rev: 371d030a665e3c963a586ab02d10f1f36b225435)

Signed-off-by: Narpat Mali <narpat.falna@gmail.com>
Signed-off-by: Randy Macleod <randy.macleod@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
e62a43d19c bind: Upgrade 9.18.28 -> 9.18.33
Includes security fixes for CVE-2024-12705 CVE-2024-11187 and other bug
fixes

Release Notes:
https://downloads.isc.org/isc/bind9/9.18.33/doc/arm/html/notes.html#notes-for-bind-9-18-33
https://downloads.isc.org/isc/bind9/9.18.33/doc/arm/html/notes.html#notes-for-bind-9-18-32
https://downloads.isc.org/isc/bind9/9.18.33/doc/arm/html/notes.html#notes-for-bind-9-18-31
https://downloads.isc.org/isc/bind9/9.18.33/doc/arm/html/notes.html#notes-for-bind-9-18-30
https://downloads.isc.org/isc/bind9/9.18.33/doc/arm/html/notes.html#notes-for-bind-9-18-29

(From OE-Core rev: 3488171fb594a28f8e9ed110e94c6a191f8f390e)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
181051aa56 xserver-xorg: Fix for CVE-2025-26601
Upstream-Status: Backport from
https://gitlab.freedesktop.org/xorg/xserver/-/commit/16a1242d &
https://gitlab.freedesktop.org/xorg/xserver/-/commit/f52cea2f &
https://gitlab.freedesktop.org/xorg/xserver/-/commit/8cbc90c8 & https://gitlab.freedesktop.org/xorg/xserver/-/commit/c2857989

(From OE-Core rev: edc4a85c1aa5a137d4f5d8fbc74135c6805511db)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
7c9d09d47c xserver-xorg: Fix for CVE-2025-26600
Upstream-Status: Backport from https://gitlab.freedesktop.org/xorg/xserver/-/commit/6e0f332b

(From OE-Core rev: 4227ae54a29ca8b454e56ffd27de2bbce00b6b89)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
b4512e5691 xserver-xorg: Fix for CVE-2025-26599
Upstream-Status: Backport from
https://gitlab.freedesktop.org/xorg/xserver/-/commit/c1ff84be & https://gitlab.freedesktop.org/xorg/xserver/-/commit/b07192a8

(From OE-Core rev: c013fec3e5dd86544366308f53a031b080b140c6)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
a671186986 xserver-xorg: Fix for CVE-2025-26598
Upstream-Status: Backport from https://gitlab.freedesktop.org/xorg/xserver/-/commit/bba9df1a

(From OE-Core rev: 645ad1bcf8675873a7ab4778ffd2dd59dbb7b037)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
8e5a4d12ba xserver-xorg: Fix for CVE-2025-26597
Upstream-Status: Backport from https://gitlab.freedesktop.org/xorg/xserver/-/commit/0e4ed949

(From OE-Core rev: 9d095e34da2adde63358a878cfac45ea28727bdf)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
ed888d5c11 xserver-xorg: Fix for CVE-2025-26596
Upstream-Status: Backport from https://gitlab.freedesktop.org/xorg/xserver/-/commit/80d69f01

(From OE-Core rev: d510d87d9bb3e3489a4482dd0ce66e4bc7622ca0)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
ee975a7100 xserver-xorg: Fix for CVE-2025-26595
Upstream-Status: Backport from https://gitlab.freedesktop.org/xorg/xserver/-/commit/11fcda87

(From OE-Core rev: 78d718f0a683f9fb81aa24b39f148d2acf2e1fc6)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
7a3fba1587 xserver-xorg: Fix for CVE-2025-26594
Upstream-Status: Backport from
https://gitlab.freedesktop.org/xorg/xserver/-/commit/01642f26 & https://gitlab.freedesktop.org/xorg/xserver/-/commit/b0a09ba6

(From OE-Core rev: f45b068860b1be1b3dadd58f8f787953a2951405)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Marta Rybczynska
47cb7bfa66 vulnerabilities/classes: remove references to cve-check text format
The text format has been removed, so also remove references and examples
using this format. Replace with examples with the JSON format.

(From yocto-docs rev: 9798689e4f4b74163c2e8594f3d1ce082d295aa1)

Signed-off-by: Marta Rybczynska <marta.rybczynska@ygreky.com>
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
(cherry picked from commit a52cd7bcadccc53e982f90d6e170d00798322597)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Divya Chellam
3a36dce7e5 vim: Upgrade 9.1.0764 -> 9.1.1043
This includes CVE-fix for CVE-2025-22134 and CVE-2025-24014

Changes between 9.1.0764 -> 9.1.1043
====================================
https://github.com/vim/vim/compare/v9.1.0764...v9.1.1043

(From OE-Core rev: 73b5570a16708d1e749b1ec525299d10557cbf56)

Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Archana Polampalli
8167a4a932 ffmpeg: fix CVE-2025-25473
FFmpeg git master before commit c08d30 was discovered to contain a NULL pointer
dereference via the component libavformat/mov.c.

(From OE-Core rev: 599ee3f195bc66d57797c121fa0b73a901d6edfa)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Archana Polampalli
89037ea118 ffmpeg: fix CVE-2024-35369
In FFmpeg version n6.1.1, specifically within the avcodec/speexdec.c module,
a potential security vulnerability exists due to insufficient validation of
certain parameters when parsing Speex codec extradata. This vulnerability
could lead to integer overflow conditions, potentially resulting in undefined
behavior or crashes during the decoding process.

(From OE-Core rev: 3efef582892a5a9286041837098b80aa59d1b688)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Archana Polampalli
7b6ce37e5d ffmpeg: fix CVE-2024-28661
(From OE-Core rev: cbe8929662f8ea873a3686517516bc5754a3cd18)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Archana Polampalli
5356d3a7e5 ffmpeg: fix CVE-2024-36618
FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavformat library
which allows for an integer overflow, potentially resulting in a denial-of-service (DoS) condition.

(From OE-Core rev: 46680bed23ef6f529c7e554b5611a7c098fce8a9)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Archana Polampalli
ec48edde27 gstreamer1.0-rtsp-server: fix CVE-2024-44331
Incorrect Access Control in GStreamer RTSP server 1.25.0 in gst-rtsp-server/rtsp-media.c
allows remote attackers to cause a denial of service via a series of specially crafted
hexstream requests.

(From OE-Core rev: ce328462a12eeaa59994e2236071aa17a083c263)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Peter Marko
b52d1a1317 ffmpeg: ignore CVE-2024-7272
This vulnerability was introduced in 5.1, so 5.0.1 is not affected.

(From OE-Core rev: ea6e581067cafd5f367c68871bc312d3ba11b4da)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Peter Marko
3a97af18b1 ffmpeg: ignore 5 CVEs
There is no release which is vulnerable to these CVEs.
These vulnerabilities are in new features being developed and were fixed
before release.

NVD most likely does not accept CVE rejection from a non-maintainer and
non-reporter, so ignoring this CVE should be acceptable solution.

(From OE-Core rev: 220a05e27913bf838881c3f22a17d0409c5154a9)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Hitendra Prajapati
be7617de69 libcap: fix CVE-2025-1390
Upstream-Status: Backport from https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/?id=1ad42b66c3567481cc5fa22fc1ba1556a316d878

(From OE-Core rev: 142715b83fb2c5f4dfeeab2c6e7feccecd1ca46f)

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Peter Marko
ccfa191e39 libxml2: patch CVE-2025-24928
Pick commit fomr 2.12 branch.

(From OE-Core rev: 3ccd936adb928612c9721768708534350aeee351)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Peter Marko
f765c28fb3 libxml2: patch CVE-2024-56171
Pick commit from 2.12 branch.

(From OE-Core rev: ab804cd27ecf7ee65a9feea477140502ecbc0d73)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Peter Marko
533c0f62e1 libxml2: fix compilation of explicit child axis in pattern
This was reported as sucurity fix in
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.10
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.6

(From OE-Core rev: 0dc99e25c16a1e74aa80ca20132609990bb9dff7)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Kai Kang
a2f2b93129 Revert "ovmf: Fix CVE-2023-45236"
This reverts commit a9cd3321558e95f61ed4c5eca0dcf5a3f4704925.

The fix for CVE-2023-45237 has been reverted. And the fix for
CVE-2023-45236 depends on it. So revert it too.

(From OE-Core rev: c61e31f192837b05bc309a05aef95c3be5b44997)

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Kai Kang
4b020e6514 Revert "ovmf: Fix CVE-2023-45237"
This reverts commit 6f8bdaad9d22e65108f859a695277ce1b20ef7c6.

his reverts commit 4c2d3e3730.

The fix for CVE-2023-45237 causes ovmf firmware not support pxe boot
any more and no boot item in OVMF menu such as

    UEFI PXEv4 (MAC address)

It has not been fixed by ovmf upstream and an issue has been created on

https://github.com/tianocore/tianocore.github.io/issues/82

Revert the fixes for now.

(From OE-Core rev: d3f399f54042efc6f4ca2092dd11819ae1f7c51f)

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Hongxu Jia
ecd87254c8 u-boot: fix CVE-2024-57259
sqfs_search_dir in Das U-Boot before 2025.01-rc1 exhibits an off-by-one error
and resultant heap memory corruption for squashfs directory listing because the
path separator is not considered in a size calculation.

https://nvd.nist.gov/vuln/detail/CVE-2024-57259

(From OE-Core rev: e4b713ff07695487cc9307ffc3576a11775cde4d)

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Hongxu Jia
644ddcb993 u-boot: fix CVE-2024-57258
Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1
occur for a crafted squashfs filesystem via sbrk, via request2size,
or because ptrdiff_t is mishandled on x86_64.

https://nvd.nist.gov/vuln/detail/CVE-2024-57258

(From OE-Core rev: b4bf3ba66052db7a311ac696563a8a0f9c585600)

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Hongxu Jia
86f0ab4d07 u-boot: fix CVE-2024-57257
A stack consumption issue in sqfs_size in Das U-Boot before 2025.01-rc1
occurs via a crafted squashfs filesystem with deep symlink nesting.

https://nvd.nist.gov/vuln/detail/CVE-2024-57257

(From OE-Core rev: 5ed8ad78bcce836aa8894de7a1d7fdf719e5bbca)

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Hongxu Jia
c54a2f894e u-boot: fix CVE-2024-57256
An integer overflow in ext4fs_read_symlink in Das U-Boot before 2025.01-rc1
occurs for zalloc (adding one to an le32 variable) via a crafted ext4
filesystem with an inode size of 0xffffffff, resulting in a malloc of
zero and resultant memory overwrite.

https://nvd.nist.gov/vuln/detail/CVE-2024-57256

(From OE-Core rev: 534aa63726f31241e3a9d4aa70d4005fa0300133)

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Hongxu Jia
7e46bdecf4 u-boot: fix CVE-2024-57255
An integer overflow in sqfs_resolve_symlink in Das U-Boot before 2025.01-rc1
occurs via a crafted squashfs filesystem with an inode size of 0xffffffff,
resulting in a malloc of zero and resultant memory overwrite.

https://nvd.nist.gov/vuln/detail/CVE-2024-57255

(From OE-Core rev: 687b6e0a166d7dc999b7d226a9bd68155f59a03a)

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Hongxu Jia
fcaac44489 u-boot: fix CVE-2024-57254
An integer overflow in sqfs_inode_size in Das U-Boot before
2025.01-rc1 occurs in the symlink size calculation via a
crafted squashfs filesystem.

https://nvd.nist.gov/vuln/detail/CVE-2024-57254

(From OE-Core rev: 956836ab347e9112be0f8892b1b82c4bcb17990c)

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Sakib Sajal
83e5ad004a u-boot: fix CVE-2022-2347 and CVE-2022-30790
Backport appropriate patches to fix CVE-2022-2347 and CVE-2022-30790.

(From OE-Core rev: 7a5220a4877cd4d3766728e8a3525c157b6167fb)

Signed-off-by: Sakib Sajal <sakib.sajal@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Carlos Dominguez
d552f85037 u-boot: Fix CVE-2022-30767
This patch mitigates the vulnerability identified via CVE-2019-14196.
The previous patch was bypassed/ineffective, and now the vulnerability
is identified via CVE-2022-30767. The patch removes the sanity check
introduced to mitigate CVE-2019-14196 since it's ineffective.
filefh3_length is changed to unsigned type integer, preventing negative
numbers from being used during comparison with positive values during
size sanity checks.

(From OE-Core rev: b7072637ba110718714745a01d67e1b6b0096165)

Signed-off-by: Carlos Dominguez <carlos.dominguez@windriver.com>

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-28 06:51:35 -08:00
Antonin Godard
975fa48315 Add favicon for the documentation html
Import the favicon from https://www.yoctoproject.org/, convert it to
16x16 (as per the Sphinx documentation) to make a 1291B image of the
Yocto logo.

(From yocto-docs rev: 73119a723b48a4038479591f0443c5acb3d21337)

Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
(cherry picked from commit e3ee43e6d70685a2404aae2d60557a42879b0bb1)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:54 -08:00
Antonin Godard
2b7619fe2b contributor-guide/submit-changes: add policy on AI generated code
Based on message by Richard Purdie on the yocto-docs list:
https://lists.yoctoproject.org/g/docs/message/6300

Re-formatted for the Yocto Project documentation syntax.

(From yocto-docs rev: 50eae3ab433ada5c3863d880f11e2b2bcbd46b94)

Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
(cherry picked from commit a72dd13e6841b621c9e8f904dfaa440c186d2959)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:54 -08:00
Mingli Yu
59e04621c9 procps: replaced one use of fputs(3) with a write(2) call
This patch is ported from a merge request shown below,
and the following represents the original commit text.

------------------------------------------------------
top: In the bye_bye function, replace fputs with the write interface.

When top calls malloc, if a signal is received, it will
call sig_endpgm to process the signal. In the bye_bye function, if the
-b option is enable, the Batch variable is set, the fputs function
will calls malloc at the same time. The malloc function is not reentrant, so
it will cause the program to crash.

(From OE-Core rev: 573f5b2d8fec9f8a4ed17e836ef3feeb6de62e5a)

Signed-off-by: Shaohua Zhan <shaohua.zhan@windriver.com>
------------------------------------------------------

Reference(s):
https://gitlab.com/procps-ng/procps/-/merge_requests/127

Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:54 -08:00
Richard Purdie
73aef33dfa scritps/runqemu: Ensure we only have two serial ports
I have a theory that some of the console boot issues we're seeing are due to
starting images with three serial ports yet only starting gettys on two of them.

This means that occasionally, depending on the port numbering we may not get
a login prompt on the console we expect it on.

To fix this, change the runqemu code so that if serial ports are passed in on
the commandline (as is the case in automated testing), we don't add any other
GUI serial consoles.

We do need to make sure we do have at least two serial ports since we don't want
getty timeout warnings.

(From OE-Core rev: 44e1279970d306b0da4fcc11f9e780915f481819)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 1b0348535dce3b776efbcf26406b94730a51eb85)
Signed-off-by: Ming Liu <liu.ming50@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:53 -08:00
Aleksandar Nikolic
3b0b758d2e scripts/install-buildtools: Update to 4.0.24
Update to the 4.0.24 release of the 4.0 series for buildtools.

(From OE-Core rev: 93b1e2cbee96bd8731a5d5d0fe5462c2518fe8a7)

Signed-off-by: Aleksandar Nikolic <aleksandar.nikolic@zeiss.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:53 -08:00
Archana Polampalli
0fb074b621 ffmpeg: fix CVE-2024-36617
FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF decoder.

(From OE-Core rev: aec2ad743893d72d46c79701a0dac982931e3171)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:53 -08:00
Archana Polampalli
2133671f72 ffmpeg: fix CVE-2024-36616
An integer overflow in the component /libavformat/westwood_vqa.c of FFmpeg n6.1.1
allows attackers to cause a denial of service in the application via a crafted VQA file.

(From OE-Core rev: 93a1e2fd2bb42977339510ef7d71288a88a34ab8)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:53 -08:00
Archana Polampalli
945621f3ce ffmpeg: fix CVE-2024-36613
FFmpeg n6.1.1 has a vulnerability in the DXA demuxer of the libavformat library
allowing for an integer overflow, potentially resulting in a denial-of-service (DoS)
condition or other undefined behavior.

(From OE-Core rev: 1af53c8dd20662e720ac4dad31833a9d776b795a)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:53 -08:00
Archana Polampalli
f2a425625c ffmpeg: CVE-2025-0518
Unchecked Return Value, Out-of-bounds Read vulnerability in FFmpeg allows Read
Sensitive Constants Within an Executable. This vulnerability is associated with
program files https://github.Com/FFmpeg/FFmpeg/blob/master/libavfilter/af_pan.C .
This issue affects FFmpeg: 7.1. Issue was
fixed:  b5b6391d64
b5b6391d64
This issue was discovered by: Simcha Kosman

(From OE-Core rev: 52cbeaa086d2cc0c0aae46deb4193ccb5427ecdc)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:53 -08:00
Archana Polampalli
0730523542 gnutls: fix CVE-2024-12243
A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing.
Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate
data can take excessive time, leading to increased resource consumption.
This flaw allows a remote attacker to send a specially crafted certificate, causing
GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.

(From OE-Core rev: 5fbe46de6d2e3862316cf486503f18e616c3c0a7)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:53 -08:00
Divya Chellam
138ab1c7df ruby: fix CVE-2024-41946
REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS
vulnerability when it parses an XML that has many entity expansions
with SAX2 or pull parser API. The REXML gem 3.3.3 or later include
the patch to fix the vulnerability.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-41946

Upstream-patch:
033d1909a8

(From OE-Core rev: b0e74fd8922bba8e954a223ec46de5c33d2ff743)

Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:53 -08:00
Vijay Anusuri
553a8e2ab3 libxml2: Fix for CVE-2022-49043
Upstream-Status: Backport [5a19e21605]

Reference:
https://access.redhat.com/security/cve/cve-2022-49043

(From OE-Core rev: 82b6c943bb6435171d1924cbebe794b901eb3705)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:53 -08:00
Peter Marko
0160cb7751 libpcre2: ignore CVE-2022-1586
This CVE is fixed in 10.40
NVD wrongly changed <10.40 to =10.40 when adding debian_linux=10.0

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-1586#VulnChangeHistorySection

(From OE-Core rev: 63cbfcd0262d65c66762aa6a8b17b8e8b809737f)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:53 -08:00
Peter Marko
6f864dc117 subversion: ignore CVE-2024-45720
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-45720

This CVE is relevant only for subversion running on Windows.

(From OE-Core rev: 52cbf6b96952896b16dad34d9eb215fcab88ded2)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Reviewed-by: Sofiane Hamam <sofiane.hamam@smile.fr>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-24 07:00:53 -08:00
Steve Sakoman
b5aa03f336 build-appliance-image: Update to kirkstone head revision
(From OE-Core rev: 5a794fd244f7fdeb426bd5e3def6b4effc0e8c62)

Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:08:13 -08:00
Steve Sakoman
285e878650 poky.conf: bump version for 4.0.25
(From meta-yocto rev: 2999fecd926976a1ea517c14e5dee996649dc80a)

Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Lee Chee Yang
f93a02c236 migration-guides: add release notes for 4.0.24
(From yocto-docs rev: c6dce0c77481dee7b0a0fcdc803f755ceccef234)

Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
(cherry picked from commit 1c848b4104ee0ba9b07cdb424bb829d14f9982d7)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Simon A. Eugster
c00faeeb6e documentation: Fix typo in standards.md
(From yocto-docs rev: cdcc30d9afad319c1a073a3bdffd439b6cd999c7)

Signed-off-by: "Simon A. Eugster" <simon.eu@gmail.com>
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
(cherry picked from commit e6745669cc26de8f61d5d1ccdd5a95b552eece97)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Joshua Watt
2492bf8803 classes-global/insane: Look up all runtime providers for file-rdeps
Uses the new foreach_runtime_provider_pkgdata() API to look up all
possible runtime providers of a given dependency when resolving
file-rdeps. This allows the check to correctly handle RPROVIDES for
non-virtual dependencies

(From OE-Core rev: 018fa1b7cb5e6a362ebb45b93e52b0909a782ac9)

(From OE-Core rev: 0ff31972b60dda5d8bada2ffb428cc54bb49e8cf)

Signed-off-by: Joshua Watt <JPEWhacker@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Joshua Watt
6f26093d14 lib/packagedata.py: Add API to iterate over rprovides
Adds an API that makes it easier to iterate over the package data for a
all providers of a runtime dependency.

(From OE-Core rev: 68bdc219a4a819e83217f5b54c463624af8d3b9e)

(From OE-Core rev: 579717212ba2892e32315788ccd65320556d32a3)

Signed-off-by: Joshua Watt <JPEWhacker@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Peter Marko
3d029078fe openssl: upgrade 3.0.15 -> 3.0.16
Release information:
https://github.com/openssl/openssl/blob/openssl-3.0/NEWS.md#major-changes-between-openssl-3015-and-openssl-3016-11-feb-2025

All CVEs were already patched, so this upgrade fixes only minor bugs.

Remove CVE patches included in the new version.

(From OE-Core rev: 68c01710e3522af317f8fe09465b56e6aca01615)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Peter Marko
d49f124652 cmake: apply parallel build settings to ptest tasks
ptest compile and install tasks do not have parallel build settings for
cmake. On powerful build machines this can cause overload situations
and oomkills.
Observed when building qtgrpc with ptest generally enabled in distro.

Having this in ptest class is suboptimal, but creating ptest-cmake class
just for these two variables is probably overkill.

(From OE-Core rev: 3c311fbf0c2090268e9b83123d762b05b61b4074)

(From OE-Core rev: bd12abeff6ee14385fba63fa5ba15d9fadec4d0e)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Khem Raj
bd51ce99cb python3: Treat UID/GID overflow as failure
This fixes ptest failures on 32bit architectures

AssertionError:
Failed ptests:
{'python3': ['test_extractall_none_gid',
             'test_extractall_none_gname',
             'test_extractall_none_mode',
             'test_extractall_none_mtime',
             'test_extractall_none_uid',
             'test_extractall_none_uname',
             'setUpClass',
             'python3']}

(From OE-Core rev: 838f3cff2a123fb7d5833b6760772ded6efb60bd)

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 43104b547cb79693c83df0882773ae8dd74b1d35)
Signed-off-by: Haixiao Yan <haixiao.yan.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Pedro Ferreira
70b5e37d0d rust-common.bbclass: soft assignment for RUSTLIB path
As a user i want to override `RUSTLIB` path on a bbclass, lets
call it `XYZ.bbclass`.

If a certain recipe inherits `cargo.bbclass` and `XYZ.bbclass` the
value of `RUSTLIB` is dependent on the order of the inherit.

If `cargo.bbclass` is inherit before `XYZ.bbclass` this will reflect
the desired value of `RUSTLIB`, on the oposite, if the `XYZ.bbclass`
is inherit before `cargo.bbclass` then the `RUSTLIB` defined on
`rust-common.bbclass` will prevail.

Changed definition of `RUSTLIB` to soft assignment to make it overridable.

(From OE-Core rev: d8ccc3ad338a8020c998566249af2019baaa6e44)

Signed-off-by: Pedro Silva Ferreira <Pedro.Silva.Ferreira@criticaltechworks.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
(cherry picked from commit 6eeb832f73ffb48f5f05dc47191f60e4599e640f)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Nikhil R
70349820ed glibc: Suppress GCC -Os warning on user2netname for sunrpc
When building with GCC -Os, a warning is triggered indicating that sprintf might overflow.

Error:
  netname.c: In function 'user2netname':
  netname.c:51:28: error: '%s' directive writing up to 255 bytes into a
  region of size between 239 and 249 [-Werror=format-overflow=]
     51 |   sprintf (netname, "%s.%d@%s", OPSYS, uid, dfltdom);
        |                            ^~               ~~~~~~~
  netname.c:51:3: note: 'sprintf' output between 8 and 273 bytes into a
  destination of size 256
     51 |   sprintf (netname, "%s.%d@%s", OPSYS, uid, dfltdom);
        |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  cc1: all warnings being treated as errors

However the code does test prior the sprintf call that dfltdom plus
the required extra space for OPSYS, uid, and extra character will not
overflow and return 0 instead.

Upstream-patch: 6128e82ebe

Reviewed-by: Carlos O'Donell <carlos@redhat.com>
Tested-by: Carlos O'Donell <carlos@redhat.com>
(From OE-Core rev: 78fac0f623e01bd52b2ea3a597d056726deca8a4)

Signed-off-by: Nikhil R <nikhilr5@kpit.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Bruce Ashfield
2e79f42006 linux-yocto/5.15: update to v5.15.178
Updating linux-yocto/5.15 to the latest korg -stable release that comprises
the following commits:

    c16c81c81336 Linux 5.15.178
    6cfafcad46e9 drm/v3d: Assign job pointer to NULL before signaling the fence
    8b74aa1e1c08 Input: xpad - add support for wooting two he (arm)
    c9d4d5785f2d Input: xpad - add unofficial Xbox 360 wireless receiver clone
    1475c07bf30f Input: atkbd - map F23 key to support default copilot shortcut
    66453ea6ed0a ALSA: usb-audio: Add delay quirk for USB Audio Device
    20ce02f2f73a Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null"
    6068dcff7f19 USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
    091a023cf2ae wifi: iwlwifi: add a few rate index validity checks
    81d4dd05c412 scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
    6ac5dfa57513 ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
    84adb88c8027 platform/chrome: cros_ec_typec: Check for EC driver
    542532afe249 fs/ntfs3: Additional check in ntfs_file_release
    00767fbd67af Bluetooth: RFCOMM: Fix not validating setsockopt user input
    2c2dc87cdebe Bluetooth: SCO: Fix not validating setsockopt user input
    92340e6c5122 vfio/platform: check the bounds of read/write syscalls
    bcf0d815e728 net: sched: fix ets qdisc OOB Indexing
    4e3ded34f3f3 gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
    322948a57582 mptcp: don't always assume copied data in mptcp_cleanup_rbuf()
    2c3524a308b2 regmap: detach regmap from dev on regmap_exit
    df560e90a4d6 ASoC: samsung: Add missing depends on I2C
    72370a2bc2e6 irqchip/sunxi-nmi: Add missing SKIP_WAKE flag
    46bdd737a16b scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request
    318ebf851143 seccomp: Stub for !CONFIG_SECCOMP
    42b4b670bd23 ASoC: samsung: Add missing selects for MFD_WM8994
    0783cd485b4a ASoC: wm8994: Add depends on MFD core
    003148680b79 Linux 5.15.177
    448fe5a1a4b5 Partial revert of xhci: use pm_ptr() instead #ifdef for CONFIG_PM conditionals
    0bd4efe3226d xhci: use pm_ptr() instead of #ifdef for CONFIG_PM conditionals
    c3d052cae566 net: fix data-races around sk->sk_forward_alloc
    198b89dd5a59 scsi: sg: Fix slab-use-after-free read in sg_release()
    9a4d196e8a5e x86/xen: fix SLS mitigation in xen_hypercall_iret()
    167cbd3e5268 nfsd: add list_head nf_gc to struct nfsd_file
    e43dd28405e6 ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
    6486915fa661 vsock/virtio: discard packets if the transport changes
    8a07350fe070 blk-cgroup: Fix UAF in blkcg_unpin_online()
    e667d5d566a2 Revert "regmap: detach regmap from dev on regmap_exit"
    d8ebb991790f Revert "drm/amdgpu: rework resume handling for display (v2)"
    7a07fb80ea88 iio: adc: rockchip_saradc: fix information leak in triggered buffer
    b5c2c988cb6a iio: imu: inv_icm42600: fix timestamps after suspend if sensor is on
    96ac1454f343 iio: imu: inv_icm42600: fix spi burst write not supported
    39f320df3537 Revert "PCI: Use preserve_config in place of pci_flags"
    ac3dd2497e6e drm/i915/fb: Relax clear color alignment to 64 bytes
    15b453db41d3 hrtimers: Handle CPU state correctly on hotplug
    59472bf85a3c irqchip/gic-v3: Handle CPU_PM_ENTER_FAILED correctly
    2d008d4961b0 gpiolib: cdev: Fix use after free in lineinfo_changed_notify
    649b266606bc fs/proc: fix softlockup in __read_vmcore (part 2)
    64e5fd96330d filemap: avoid truncating 64-bit offset to 32 bits
    9e5fed46ccd2 vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
    a4606b774de2 vsock: reset socket state when de-assigning the transport
    048dbd2b5b85 vsock/virtio: cancel close work in the destructor
    92f1b7930f13 net: ethernet: xgbe: re-add aneg to supported features in PHY quirks
    aba13043e628 x86/asm: Make serialize() always_inline
    612269eb3f8f nvmet: propagate npwg topology
    7df94f7f9e22 poll_wait: add mb() to fix theoretical race between waitqueue_active() and .poll()
    1c878c5527e1 ACPI: resource: acpi_dev_irq_override(): Check DMI match last
    a592ce58ca78 kheaders: Ignore silly-rename files
    2d1a5a595bf2 fs: fix missing declaration of init_files
    87e207b6aa93 hfs: Sanity check the root record
    80aee0bc0dbe mac802154: check local interfaces before deleting sdata list
    c5f1bc1d2324 i2c: rcar: fix NACK handling when being a target
    6c6e0961ccfd i2c: mux: demux-pinctrl: check initial mux selection, too
    37c63955ca68 Revert "mtd: spi-nor: core: replace dummy buswidth from addr to data"
    2f176c0ec9f5 hwmon: (tmp513) Fix division of negative numbers
    14e0a874488e drm/v3d: Ensure job pointer is set to NULL after job completion
    83775c9a9a65 net/mlx5: Fix RDMA TX steering prio
    a04effa1b79f net/mlx5: Refactor mlx5_get_flow_namespace
    ef6bb594598b net/mlx5: Add priorities for counters in RDMA namespaces
    3cc3575223c6 net: xilinx: axienet: Fix IRQ coalescing packet count overflow
    fdfe7ef525ad nfp: bpf: prevent integer overflow in nfp_bpf_event_output()
    036f8d814a2c gtp: Destroy device along with udp socket's netns dismantle.
    ed8be92df48d gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp().
    a111a7487f65 gtp: use exit_batch_rtnl() method
    041325b73abc net: add exit_batch_rtnl() method
    3450092cc2d1 pktgen: Avoid out-of-bounds access in get_imix_entries
    0ab52a8ca6e1 bpf: Fix bpf_sk_select_reuseport() memory leak
    9bb26176fba5 net: ethernet: ti: cpsw_ale: Fix cpsw_ale_get_field()
    9f15cd4174d0 phy: usb: Fix clock imbalance for suspend/resume
    795537eb2af1 phy: usb: Use slow clock for wake enabled suspend
    88b01048f286 mptcp: fix TCP options overflow.
    05ba00d97bb4 mptcp: drop port parameter of mptcp_pm_add_addr_signal
    f44e6d70c100 ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
    86f8046aa649 ocfs2: correct return value of ocfs2_local_free_info()
    0552befaccd8 phy: usb: Toggle the PHY power during init
    d0178cb2ccea phy: usb: Add "wake on" functionality for newer Synopsis XHCI controllers
    b2cec0d8f676 of: address: Preserve the flags portion on 1:1 dma-ranges mapping
    6a7832e332d9 of: address: Store number of bus flag cells rather than bool
    1b868ff7950b of: address: Remove duplicated functions
    19ec883a51bd of: address: Fix address translation when address-size is greater than 2
    b3f6bed9bf61 of/address: Add support for 3 address cell bus
    bce3629a9e53 of: unittest: Add bus address range parsing tests
    437b875e7389 arm64: dts: rockchip: add hevc power domain clock to rk3328
    f587c1ac6895 block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()
    e43dfc4a9c15 iio: adc: ad7124: Disable all channels at probe time
    d83ccca9e17e iio: inkern: call iio_device_put() only on mapped devices
    028a1ba8e3ba iio: adc: at91: call input_free_device() on allocated iio_dev
    060214459b63 iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep()
    c31009d2bd49 iio: gyro: fxas21002c: Fix missing data update in trigger handler
    aae967380068 iio: adc: ti-ads8688: fix information leak in triggered buffer
    a07f69808441 iio: imu: kmx61: fix information leak in triggered buffer
    cb488706cdec iio: light: vcnl4035: fix information leak in triggered buffer
    006073761888 iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
    64a989aa7475 iio: pressure: zpa2326: fix information leak in triggered buffer
    19fc1c83454c usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
    d9d18e2011c1 usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints
    7cdb2d0f1af9 usb: fix reference leak in usb_new_device()
    162428a00a0c USB: core: Disable LPM only for non-suspended ports
    8309c947b208 USB: usblp: return error when setting unsupported protocol
    d2de56cc45ee usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null
    1c7818e2746e topology: Keep the cpumask unchanged when printing cpumap
    85b8a1a3176d usb: dwc3: gadget: fix writing NYET threshold
    7f626e8e148c USB: serial: cp210x: add Phoenix Contact UPS Device
    2165ef034891 usb-storage: Add max sectors quirk for Nokia 208
    2748a203e098 staging: iio: ad9832: Correct phase range check
    e299dcbfc039 staging: iio: ad9834: Correct phase range check
    98645eac8ed4 USB: serial: option: add Neoway N723-EA support
    f072315c5d41 USB: serial: option: add MeiG Smart SRM815
    203f38eb72f2 md/raid5: fix atomicity violation in raid5_cache_count
    3b930badf88d scripts/sorttable: fix orc_sort_cmp() to maintain symmetry and transitivity
    1e5cc8d5b121 drm/amd/display: increase MAX_SURFACES to the value supported by hw
    dd3f23919b4d ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[]
    21db38809fb8 ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[]
    10c24df2e303 riscv: Fix sleeping in invalid context in die()
    95793f9684e5 drm/amd/display: Add check for granularity in dml ceil/floor helpers
    1dc5da6c4178 sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy
    0a0966312ac3 sctp: sysctl: udp_port: avoid using current->nsproxy
    bd2a29394235 sctp: sysctl: auth_enable: avoid using current->nsproxy
    0f78f0946674 sctp: sysctl: rto_min/max: avoid using current->nsproxy
    86ddf8118123 sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
    e52a55ec2d1f dm-ebs: don't set the flag DM_TARGET_PASSES_INTEGRITY
    802666a40c71 dm thin: make get_first_thin use rcu-safe list first function
    7cb3e77e9b4e afs: Fix the maximum cell name length
    781c743e18bf ksmbd: fix a missing return value check bug
    e719611285cd drm/mediatek: Add support for 180-degree rotation in the display driver
    b1b2353d768f netfilter: conntrack: clamp maximum hashtable size to INT_MAX
    2f2c1ce86708 netfilter: nf_tables: imbalance in flowtable binding
    6d6ce5f75d0e tls: Fix tls_sw_sendmsg error handling
    8fe5fcf25438 cxgb4: Avoid removal of uninserted tid
    0cfe1297df07 bnxt_en: Fix possible memory leak when hwrm_req_replace fails
    a313d6e6d5f3 net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
    10923508eb77 tcp/dccp: allow a connection when sk_max_ack_backlog is zero
    bcd1557f1d38 tcp/dccp: complete lockless accesses to sk->sk_max_ack_backlog
    e67fff8fd12c net: 802: LLC+SNAP OID:PID lookup on start of skb data
    8cc8bdfbe065 ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe()
    294b9826da0e ASoC: mediatek: disable buffer pre-allocation
    1f94fe692b7e exfat: fix the infinite loop in __exfat_free_cluster()
    28c21f0ac529 exfat: fix the infinite loop in exfat_readdir()
    3995b25d000c dm array: fix cursor index when skipping across block boundaries
    c850ddd1e1d8 dm array: fix unreleased btree blocks on closing a faulty array cursor
    738994872d77 dm array: fix releasing a faulty array block twice in dm_array_cursor_end
    6029c4240529 jbd2: flush filesystem device before updating tail sequence
    d42ad3f161a5 ceph: give up on paths longer than PATH_MAX
    b5d500042eb3 usb: hcd-pci: remove the action of faking interrupt request
    6f0605db50e2 clk: imx: Add check for kcalloc
    5b837b9e1543 bpf: Fix the indention issue in grow_stack_state()
    42b62697634d cifs: Fix the calling of smb_version_operations::calc_smb_size()
    b14acf729e9d f2fs: Add inline to f2fs_build_fault_attr() stub
    7c317bec311f f2fs: check validation of fault attrs in f2fs_build_fault_attr()
    81c12119c23f bpf: Fix accesses to uninit stack slots [ Upstream commit 6b4a64bafd107e521c01eec3453ce94a3fb38529 ]
    c4fa05422d87 smb: client: fix potential OOB in smb2_dump_detail()
    299ef3b5b00b of: module: add buffer overflow check in of_modalias()
    b8086c3c1548 reiserfs: Avoid touching renamed directory if parent does not change
    ea091017ef62 ipv6: Fix data races around sk->sk_prot.
    ff8710da80ee ipv6: annotate some data-races around sk->sk_prot
    e8c2eafaaa6a tcp: Fix data races around icsk->icsk_af_ops.
    8d1bab770956 locking/rwsem: Disable preemption while trying for rwsem lock
    7c82dac02886 block, loop: support partitions without scanning
    45f504f301d4 bpftool: Fix pretty print dump for maps without BTF loaded
    1f24338cb789 jbd2: Drop the merge conflicted hunk
    e1d0e3c51bde tpm: tis_i2c: Limit write bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
    1abe841fe331 tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
    6224acfc1d56 tpm: Add flag to use default cancellation policy
    1cd19d48fb90 tpm: tis_i2c: Fix sanity check interrupt enable mask
    a883da132fa8 tpm: Add tpm_tis_i2c backend for tpm_tis_core
    a742ac8a1c51 tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
    ef495c5f45f2 tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
    1f3be2e23aa6 gcc-plugins: Reorganize gimple includes for GCC 13
    24615a3b932a ata: ahci: fix enum constants for gcc-13
    5d6cb145541a net: stmmac: Enable mac_managed_pm phylink config
    fd93aabb4287 tools/resolve_btfids: Use pkg-config to locate libelf
    130f9da78406 tools/resolve_btfids: Build with host flags
    00f2f1a782f9 tools/resolve_btfids: Support cross-building the kernel with clang
    17776a4ba9c2 tools/resolve_btfids: Install libbpf headers when building
    7c9808380d70 libbpf: Make libbpf_version.h non-auto-generated
    37ae1ba791ac libbpf: Add LIBBPF_DEPRECATED_SINCE macro for scheduling API deprecations
    a2667e6d7314 drm/radeon: free iio for atombios when driver shutdown
    f100c753aa1f powerpc: Fix reschedule bug in KUAP-unlocked user copy
    da5513f30187 libbpf: Fix build warning on ref_ctr_off
    4c5a089621a8 perf python: Account for multiple words in CC
    1c5699ee85d4 fs: move S_ISGID stripping into the vfs_*() helpers
    838f5d0701d8 fs: add mode_strip_sgid() helper
    d97172683641 squashfs: provide backing_dev_info in order to disable read-ahead
    ed037d7be40c irq_work: use kasan_record_aux_stack_noalloc() record callstack
    1363bd7dbde3 ixgbevf: add disable link state
    e5601ae2bd24 ixgbe: add improvement for MDD response functionality
    caa57cd80575 ixgbe: add the ability for the PF to disable VF link state
    16a77bfcc7df Check /dev/console using init_stat()
    04574fd5579a tracing/arm: Have max stack tracer handle the case of return address after data
    0e51e5717018 gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully
    1e6b7da6ddba drivers/base: Fix unsigned comparison to -1 in CPUMAP_FILE_MAX_BYTES
    493160901320 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition
    04224f725aa3 irqchip/gic-v3-its: Skip HP notifier when no ITS is registered
    6f6c2996a81c irqchip/gic-v3-its: Postpone LPI pending table freeing and memreserve
    1fa94473423f irqchip/gic-v3-its: Give the percpu rdist struct its own flags field
    6013d1ae5feb cert host tools: Stop complaining about deprecated OpenSSL functions
    efe20512212b init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash
    a40d2daf2795 pnmtologo: use relocatable file name
    3b40d5b41155 of: configfs: remove unused variable overlay_lock
    6c085baf1838 tools: use basename to identify file in gen-mach-types
    2fca0fd71981 lib/build_OID_registry: fix reproducibility issues
    0f586f4ee8ad vt/conmakehash: improve reproducibility
    a75774679f28 OF: DT-Overlay configfs interface (v8)
    d179c639b30b x86/boot: Wrap literal addresses in absolute_pointer()
    856ec356cf91 ACPI: thermal: drop an always true check
    7614af249993 xfs: Fix -Werror=dangling-pointer work-around for older GCC
    41470215f97e xfs: Work around GCC 12 -Werror=dangling-pointer for xfs_attr_remote.o
    44a445c1922d virtio-pci: Remove wrong address verification in vp_del_vqs()
    77aa9e489eaf bpf: Disallow unprivileged bpf by default
    ebfb1822e9f9 fs/aufs: fixup 5.15.36 fixups
    4eba9348d3e2 Revert "Revert "fbdev: Hot-unplug firmware fb devices on forced removal""
    5df6d1b00f95 jbd2: fix use-after-free of transaction_t race
    2d83e8196487 jbd2: refactor wait logic for transaction updates into a common function
    07a63f760793 netfilter: conntrack: avoid useless indirection during conntrack destruction
    4e7122625996 Revert "fbdev: Hot-unplug firmware fb devices on forced removal"
    7ba4cb36fd4f rcu: Avoid alloc_pages() when recording stack
    f78574dee71e kasan: test: silence intentional read overflow warnings
    d313cb89b6b1 kasan: arm64: fix pcpu_page_first_chunk crash with KASAN_VMALLOC
    5e279d5647cc arm64: support page mapping percpu first chunk allocator
    e5bf16752dca vmalloc: choose a better start address in vm_area_register_early()
    660b3d21b46f kasan: test: bypass __alloc_size checks
    00aa7573e53a kasan: test: add memcpy test that avoids out-of-bounds write
    67becf0b1bd4 kasan: fix tag for large allocations when using CONFIG_SLAB
    bedf1e033213 workqueue, kasan: avoid alloc_pages() when recording stack
    7195b67ce69b kasan: generic: introduce kasan_record_aux_stack_noalloc()
    bdff763f0e29 kasan: common: provide can_alloc in kasan_save_stack()
    51423ebb36ad lib/stackdepot: introduce __stack_depot_save()
    85373e66d847 lib/stackdepot: remove unused function argument
    5b6cc9b251f3 lib/stackdepot: include gfp.h
    c9f3902d8069 aufs: reduce overhead for "code present but disabled" use case.
    b98d189df02c aufs: bugfix, umount passes NULL to ->parse_monolithic()
    13b883cbbbd9 aufs standalone: cosmetic, missing copyright sentence
    21f8b0d81898 aufs: 5.15.5-20220117 ---> 5.15.5-20220221
    6199fd896645 aufs: tiny, headers after fs_context
    8ddb40e31c29 aufs: fs_context 7/7, finally remount
    69035f71c6fd aufs: fs_context 6/7, now mount
    bc841b970697 aufs: fs_context 5/7, parse all other mount options
    435188053da2 aufs: fs_context 4/7, parse xino options
    9af1f1825cbd aufs: fs_context 3/7, parse the branch-management options
    1c05eb767f8c aufs: fs_context 2/7, parse "br" mount option
    a8488f603134 aufs: fs_context 1/7, skelton of the new shceme
    8e32e0015564 aufs: pre fs_context, convert a static flag to a macro
    f90cb4144aec aufs: pre fs_context, support the incomplete sb and sbinfo case
    948762ef859c aufs: pre fs_context, convert the type of alloc_sbinfo()
    77151a08776b aufs: 5.15.5-20211129 ---> 5.15.5-20220117
    2539adbbbe1e aufs: 5.14-20211018 ---> 5.15.5-20211129
    7d32b25193c4 aufs: for v5.15-rc1, sync_inode() is gone
    66ec0c509225 aufs: for v5.15-rc1, new param 'rcu' for ->get_acl()
    69709dc518cd aufs: for v5.15-rc1, no mand-lock anymore
    ada8fe9543e5 aufs: 5.14-20210906  ---> 5.14-20211018
    b77f7f3f394a Revert "aufs: adjust to v5.15 fs changes"
    81bdce5b5876 tick/nohz: WARN_ON --> WARN_ON_ONCE to prevent console saturation
    97c963889222 sched/isolation: really align nohz_full with rcu_nocbs
    871f23ad3627 Revert "ARM: defconfig: Enable ax88796c driver for Exynos boards"
    ffad0783dd5b ARM: config: multi v7: Regenerate defconifg
    5c1e1a1ff2d3 ARM: config: multi v7: Add renamed symbols
    badaf96564fe ARM: config: multi v7: Clean up enabled by default options
    34996040fc9b ARM: config: multi v7: Drop unavailable options
    7f685244afb3 powerpc/mm: Switch obsolete dssall to .long
    20301aeb1a64 riscv: fix build with binutils 2.38
    9df58d070506 powerpc/lib/sstep: fix 'ptesync' build error
    720b61fc400b x86_64_defconfig: Fix warnings
    02bf23d26bc4 arm64: defconfig: cleanup config options
    05914e2c87e5 arm: defconfig: drop unused POWER_AVS option
    ffb532fa19b9 aufs5: fix build against v5.15.3+
    a4b3abf4d96d qemux86: add configuration symbol to select values
    fee94ee09154 clear_warn_once: add a clear_warn_once= boot parameter
    3d8762d900d9 clear_warn_once: bind a timer to written reset value
    95faacac47e8 clear_warn_once: expand debugfs to include read support
    de20c4240018 perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel.
    0e4aacead9c1 perf: x86-32: explicitly include <errno.h>
    9ad92c11468e perf: mips64: Convert __u64 to unsigned long long
    09e7efe3e68a perf: fix bench numa compilation
    e79becc44fa6 perf: add SLANG_INC for slang.h
    b1033b588681 perf: add sgidefs.h to for mips builds
    cf9db484ac0b perf: change --root to --prefix for python install
    7fd052c2c562 perf: add 'libperl not found' warning
    27a437cdd469 perf: force include of <stdbool.h>
    3b99d21bec2f fat: don't use obsolete random32 call in namei_vfat
    a7e9293b506b FAT: Added FAT_NO_83NAME
    6fd0e71d9e5c FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option
    c379b0d324ae FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option
    538be0fdb124 aufs: adjust to v5.15 fs changes
    f45da75c8759 aufs5: core
    047f57e07e01 aufs5: standalone
    029fc15574c8 aufs5: mmap
    610d0192ee94 aufs5: base
    d4e428d0ec5f aufs5: kbuild
    eb067eca251a yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL
    286af18d0875 yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name
    24d59a4e26a6 yaffs2: v5.12+ build fixups (not runtime tested)
    22c73536d5d7 yaffs: include blkdev.h
    506b7251bfb8 yaffs: fix misplaced variable declaration
    a0e26ff364dc yaffs2: v5.6 build fixups
    b10b1b2d169e yaffs2: fix memory leak when /proc/yaffs is read
    ad9adccbb214 yaffs: add strict check when call yaffs_internal_read_super
    2e3c3aec8279 yaffs: repair yaffs_get_mtd_device
    d662538516a7 yaffs: Fix build failure by handling inode i_version with proper atomic API
    70a6113ee2c7 yaffs2: fix memory leak in mount/umount
    3378e4a9e404 yaffs: Avoid setting any ACL releated xattr
    ec2284edddef Yaffs:check oob size before auto selecting Yaffs1
    c2a49874051c fs: yaffs2: replace CURRENT_TIME by other appropriate apis
    e9a5105a3e73 yaffs2: adjust to proper location of MS_RDONLY
    608807406f13 yaffs2: import git revision b4ce1bb (jan, 2020)
    89e660ece42c initramfs: allow an optional wrapper script around initramfs generation
    b179dbc9aa10 iwlwifi: select MAC80211_LEDS conditionally
    3fd5ca3673d0 net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119)
    d1f6edbf0188 arm64/perf: Fix wrong cast that may cause wrong truncation
    d202fb2caf33 defconfigs: drop obselete options
    9a27e3b5f4e7 arm64/perf: fix backtrace for AAPCS with FP enabled
    e20d8cf019b4 linux-yocto: Handle /bin/awk issues
    b6d2a3dbbd3a uvesafb: provide option to specify timeout for task completion
    adb40f1e6a1a uvesafb: print error message when task timeout occurs
    f280a1ed0962 compiler.h: Undef before redefining __attribute_const__
    4352732f268c vmware: include jiffies.h
    7954a677968d Resolve jiffies wrapping about arp
    5f28a1035d95 nfs: Allow default io size to be configured.
    0d7260ad7106 check console device file on fs when booting
    900a12e37e0a mount_root: clarify error messages for when no rootfs found
    7b878cbea726 menuconfig,mconf-cfg: Allow specification of ncurses location
    6604fc1763b3 modpost: mask trivial warnings
    0d294adb09cb kbuild: exclude meta directory from distclean processing
    a097cdd95a9e powerpc: serialize image targets
    5db6ec39a0a3 arm: serialize build targets
    cbabca27905e crtsavres: fixups for 5.4+
    7fc7656ed403 powerpc/ptrace: Disable array-bounds warning with gcc8
    a5faac5a19a2 powerpc: Disable attribute-alias warnings from gcc8
    186c54665b67 powerpc: add crtsavres.o to archprepare for kbuild
    d1ea862964ca powerpc: kexec fix for powerpc64
    2ac35b89a0f9 powerpc: Add unwind information for SPE registers of E500 core
    2e1c348a28bb mips: vdso: fix 'jalr $t9' crash in vdso code
    ec57870b303a mips: Kconfig: add QEMUMIPS64 option
    6a81b3c08107 4kc cache tlb hazard: tlbp cache coherency
    74e3b2a21e54 malta uhci quirks: make allowance for slow 4k(e)c
    22e65b63d3b4 arm/Makefile: Fix systemtap
    b7f1ab59f19e vexpress: Pass LOADADDR to Makefile
    ce2800c73bf7 arm: ARM EABI socketcall
    019d142fd956 ARM: LPAE: Invalidate the TLB for module addresses during translation fault

(From OE-Core rev: 709bfb0e600148d65018db450a69de220c874efd)

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Bruce Ashfield
a6b17aa896 linux-yocto/5.15: update to v5.15.176
Updating linux-yocto/5.15 to the latest korg -stable release that comprises
the following commits:

    4735586da88e Linux 5.15.176
    63eac98d6f08 mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()
    5c4eb5401d7e dt-bindings: display: adi,adv7533: Drop single lane support
    0f51034bb813 drm: adv7511: Drop dsi single lane support
    f9c3adb083d3 net/sctp: Prevent autoclose integer overflow in sctp_association_init()
    d809d1aabec8 sky2: Add device ID 11ab:4373 for Marvell 88E8075
    9372e160d821 pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking
    c2f961c46ea0 RDMA/uverbs: Prevent integer overflow issue
    9aeece68684c kcov: mark in_softirq_really() as __always_inline
    362f86f3ee45 modpost: fix the missed iteration for the max bit in do_input()
    3b5efbf000d5 modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host
    ef26e5bb560b usb: xhci: Avoid queuing redundant Stop Endpoint commands
    f4539c3cab44 ARC: build: Try to guess GCC variant of cross compiler
    84142875b293 irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base
    faab60ed274d net: usb: qmi_wwan: add Telit FE910C04 compositions
    cc63b8c102c4 bpf: fix potential error return
    2dedcab091f2 sound: usb: format: don't warn that raw DSD is unsupported
    01b3661663c5 sound: usb: enable DSD output for ddHiFi TC44C
    63f4b594a688 btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount
    22d36ad92e57 drm/amdkfd: Correct the migration DMA map direction
    bd3eca303b3f wifi: mac80211: wake the queues in case of failure in resume
    efbdbf36c338 btrfs: sysfs: fix direct super block member reads
    0efdc0606fc8 btrfs: sysfs: convert scnprintf and snprintf to sysfs_emit
    526ff5b27f09 btrfs: fix use-after-free when COWing tree bock and tracing is enabled
    d4a7270b37d0 btrfs: rename and export __btrfs_cow_block()
    ad0677c37c14 ila: serialize calls to nf_register_net_hooks()
    de4f8d477c67 af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK
    65c67049e9ed af_packet: fix vlan_get_tci() vs MSG_PEEK
    0caa776f2829 net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init()
    579cfa595af1 net: restrict SO_REUSEPORT to inet sockets
    143378075904 RDMA/rtrs: Ensure 'ib_sge list' is accessible
    91a1adab5669 net: mv643xx_eth: fix an OF node reference leak
    36c95bbd4eb1 eth: bcmsysport: fix call balance of priv->clk handling routines
    d27088892b40 ALSA: usb-audio: US16x08: Initialize array before use
    c8187a378380 net: llc: reset skb->transport_header
    277f00b0c2dc netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext
    215c687344d5 drm/i915/dg1: Fix power gate sequence.
    769e36c2119a netrom: check buffer length before accessing it
    9d3895967729 net: fix memory leak in tcp_conn_request()
    4261fc54ca77 net: stmmac: restructure the error path of stmmac_probe_config_dt()
    f0da70367048 net: stmmac: don't create a MDIO bus if unnecessary
    860279ff72fe net: stmmac: platform: provide devm_stmmac_probe_config_dt()
    a68ec6380f2f RDMA/hns: Fix missing flush CQE for DWQE
    06e2d3ec7a7d RDMA/hns: Fix warning storm caused by invalid input in IO path
    3146512f40bb RDMA/hns: Fix mapping error of zero-hop WQE buffer
    bc509159a223 RDMA/hns: Remove redundant 'bt_level' for hem_list_alloc_item()
    5e7c02730cce RDMA/hns: Remove redundant 'attr_mask' in modify_qp_init_to_init()
    a03b9689e4e5 drm/bridge: adv7511_audio: Update Audio InfoFrame properly
    33df6f747501 RDMA/bnxt_re: Fix the locking while accessing the QP table
    802be99bc7bb RDMA/bnxt_re: Fix max_qp_wrs reported
    6da018852c42 RDMA/bnxt_re: Fix reporting hw_ver in query_device
    faf879baed95 RDMA/bnxt_re: Add check for path mtu in modify_qp
    2e4a9a22b7f9 RDMA/mlx5: Enforce same type port association for multiport RoCE
    590bd0f9148f xhci: Turn NEC specific quirk for handling Stop Endpoint errors generic
    62756ca746e2 usb: xhci: Limit Stop Endpoint retries
    28fcf6c7a1ef xhci: retry Stop Endpoint on buggy NEC controllers
    8f4871abf04f thunderbolt: Add support for Intel Panther Lake-M/P
    6cf75f685667 thunderbolt: Add support for Intel Lunar Lake
    c4c06c199410 thunderbolt: Add Intel Barlow Ridge PCI ID
    6c03ec8a0791 thunderbolt: Add support for Intel Meteor Lake
    c5c059d6bb77 thunderbolt: Add support for Intel Raptor Lake
    3bcdc9039a6e tracing: Have process_string() also allow arrays
    f70e4b9ec69d selinux: ignore unknown extended permissions
    0a2d26bf27c9 x86/hyperv: Fix hv tsc page based sched_clock for hibernation
    87bd909a7014 net: dsa: improve shutdown sequence
    5ade4382de16 nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
    214d92f0a465 btrfs: avoid monopolizing a core when activating a swap file
    c3703d9340ca power: supply: gpio-charger: Fix set charge current limits
    f60172b44731 tracing: Prevent bad count for tracing_cpumask_write
    c5a28af78555 tracing: Constify string literal data member in struct trace_event_call
    2107ab40629a ksmbd: fix racy issue from session lookup and expire
    2461ffdc7725 lib: stackinit: hide never-taken branch from compiler
    002668bfd416 drm/dp_mst: Verify request type in the corresponding down message reply
    3bc0d0831777 arm64: Ensure bits ASID[15:8] are masked out when the kernel uses 8-bit ASIDs
    082e68b9a714 arm64: mm: Rename asid2idx() to ctxid2asid()
    1aea5c9470be ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write
    6bd1bf0e8c42 ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read
    70e7166612f4 drm/dp_mst: Fix MST sideband message body length check
    24fec234d2ba bpf: Check validity of link->type in bpf_link_show_fdinfo()
    edcc68974580 MIPS: Probe toolchain support of -msym32
    5728a1d6247d vmalloc: fix accounting with i915
    6dea8e3de599 virtio-blk: don't keep queue frozen during system suspend
    a47235354ac4 scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error
    0d591e92c076 scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time
    7efc3fa902ce platform/x86: asus-nb-wmi: Ignore unknown event 0xCF
    b09527799946 regmap: Use correct format specifier for logging range errors
    7574cf3c8bf1 ALSA: hda/conexant: fix Z60MR100 startup pop issue
    3c654998a3e8 scsi: megaraid_sas: Fix for a potential deadlock
    ce697618e34f scsi: qla1280: Fix hw revision numbering for ISP1020/1040
    08a78ff9bf29 watchdog: it87_wdt: add PWRGD enable quirk for Qotom QCML04
    325c0e27668d tracing/kprobe: Make trace_kprobe's module callback called after jump_label update
    3d825a241e65 mtd: rawnand: fix double free in atmel_pmecc_create_user()
    8d364597de9c dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset
    7c99b3c60cac dmaengine: dw: Select only supported masters for ACPI devices
    3e9968660c26 dmaengine: mv_xor: fix child node refcount handling in early exit
    e0c101361c1e phy: core: Fix that API devm_phy_destroy() fails to destroy the phy
    6bf2aba838b2 phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider
    3a22224a443b phy: core: Fix that API devm_phy_put() fails to release the phy
    5d1a41420ed4 phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup()
    9d2916bb1276 phy: core: Fix an OF node refcount leakage in _of_phy_get()
    4f8a50745358 mtd: rawnand: arasan: Fix missing de-registration of NAND
    326d7fb3e4f1 mtd: rawnand: arasan: Fix double assertion of chip-select
    4b13d0d186df mtd: diskonchip: Cast an operand to prevent potential overflow
    804d55e92b7a nfsd: restore callback functionality for NFSv4.0
    e2373eea347e bpf: Check negative offsets in __bpf_skb_min_len()
    323bab15ff7c tcp_bpf: Add sk_rmem_alloc related logic for tcp_bpf ingress redirection
    38150bb4e3be tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress()
    c3ab56e1b434 mm/vmstat: fix a W=1 clang compiler warning
    53106510736e media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg
    c72057c4865c drm/amdgpu: Handle NULL bo->tbo.resource (again) in amdgpu_vm_bo_update
    dccf5138ad56 epoll: Add synchronous wakeup support for ep_poll_callback
    888dd1909559 ceph: validate snapdirname option length when mounting
    38a2a383a019 of: Fix refcount leakage for OF node returned by __of_get_dma_parent()
    a579b0b6a82f of: Fix error path in of_parse_phandle_with_args_map()
    0227594be815 udmabuf: also check for F_SEAL_FUTURE_WRITE
    912188316a8c nilfs2: prevent use of deleted inode
    a793e5c35722 of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one()
    abc874634c16 NFS/pnfs: Fix a live lock between recalled layouts and layoutget
    85d7635d54d7 tracing: Add "%s" check in test_event_printk()
    6cacfb59a7cc tracing: Add missing helper functions in event pointer dereference check
    3a41815771c4 tracing: Fix test_event_printk() to process entire print argument
    0840d360a890 KVM: x86: Play nice with protected guests in complete_hypercall_exit()
    042253c57be9 Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet
    0bef13423bb4 btrfs: tree-checker: reject inline extent items with 0 ref count
    6aa65cda937f zram: refuse to use zero sized block device as backing device
    2d3cde3aeb73 sh: clk: Fix clk_enable() to return 0 on NULL clk
    5049a45bc23b hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers
    de4fa408d68b hwmon: (tmp513) Fix Current Register value interpretation
    447d1430aa6c hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers
    b382e808e342 hwmon: (tmp513) Use SI constants from units.h
    e9668ba824c1 hwmon: (tmp513) Simplify with dev_err_probe()
    9a2cf6d4a616 hwmon: (tmp513) Don't use "proxy" headers
    e7c7b48a0fc5 drm/modes: Avoid divide by zero harder in drm_mode_vrefresh()
    d4ca3bf078cb USB: serial: option: add Telit FE910C04 rmnet compositions
    adeae07da972 USB: serial: option: add MediaTek T7XX compositions
    cf4df6f3f539 USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready
    6ccb85602c14 USB: serial: option: add MeiG Smart SLM770A
    7e25a9031004 USB: serial: option: add TCL IK512 MBIM & ECM
    68578224365a efivarfs: Fix error on non-existent file
    f2c15056b312 i2c: riic: Always round-up when calculating bus period
    16e1c1156674 chelsio/chtls: prevent potential integer overflow on 32bit
    f4780fedeb65 mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk
    9d120788418d net: mdiobus: fix an OF node reference leak
    c4f20ad100da netfilter: ipset: Fix for recursive locking warning
    24b6b9d6b21b net: ethernet: bgmac-platform: fix an OF node reference leak
    f9bad9428723 net: hinic: Fix cleanup in create_rxqs/txqs()
    48cc5df7757b ionic: use ee->offset when returning sprom data
    87847938f570 ionic: Fix netdev notifier unregister on failure
    b3a6daaf7cfb netdevsim: prevent bad user input in nsim_dev_health_break_write()
    6b80924af621 net/smc: check return value of sock_recvmsg when draining clc data
    a36364d8d4fa net/smc: check smcd_v2_ext_offset when receiving proposal msg
    f10635268a0a net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg
    0b86e31b6bbb net/smc: check sndbuf_space again after NOSPACE flag is set in smc_poll
    27d6adbb3ec4 erofs: fix incorrect symlink detection in fast symlink
    7e5fc0da0b76 i2c: pnx: Fix timeout in wait functions
    cff037a22793 usb: dwc2: gadget: Don't write invalid mapped sg entries into dma_desc with iommu enabled
    676cec3ad096 MIPS: Loongson64: DTS: Fix msi node for ls7a
    848257f4f9ef PCI: Add ACS quirk for Broadcom BCM5760X NIC
    c3119c7bab90 PCI: vmd: Create domain symlink before pci_bus_add_devices()
    82f635733337 ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP
    6eb9609c8bf0 usb: cdns3: Add quirk flag to enable suspend residency
    a19c6a484417 ALSA: usb: Fix UBSAN warning in parse_audio_unit()
    02052d22de91 PCI/AER: Disable AER service on suspend
    c1a1393f7844 PCI: Use preserve_config in place of pci_flags
    33db36b3c53d net: sched: fix ordering of qlen adjustment
    b5d500042eb3 usb: hcd-pci: remove the action of faking interrupt request
    6f0605db50e2 clk: imx: Add check for kcalloc
    5b837b9e1543 bpf: Fix the indention issue in grow_stack_state()
    42b62697634d cifs: Fix the calling of smb_version_operations::calc_smb_size()
    b14acf729e9d f2fs: Add inline to f2fs_build_fault_attr() stub
    7c317bec311f f2fs: check validation of fault attrs in f2fs_build_fault_attr()
    81c12119c23f bpf: Fix accesses to uninit stack slots [ Upstream commit 6b4a64bafd107e521c01eec3453ce94a3fb38529 ]
    c4fa05422d87 smb: client: fix potential OOB in smb2_dump_detail()
    299ef3b5b00b of: module: add buffer overflow check in of_modalias()
    b8086c3c1548 reiserfs: Avoid touching renamed directory if parent does not change
    ea091017ef62 ipv6: Fix data races around sk->sk_prot.
    ff8710da80ee ipv6: annotate some data-races around sk->sk_prot
    e8c2eafaaa6a tcp: Fix data races around icsk->icsk_af_ops.
    8d1bab770956 locking/rwsem: Disable preemption while trying for rwsem lock
    7c82dac02886 block, loop: support partitions without scanning
    45f504f301d4 bpftool: Fix pretty print dump for maps without BTF loaded
    1f24338cb789 jbd2: Drop the merge conflicted hunk
    e1d0e3c51bde tpm: tis_i2c: Limit write bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
    1abe841fe331 tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
    6224acfc1d56 tpm: Add flag to use default cancellation policy
    1cd19d48fb90 tpm: tis_i2c: Fix sanity check interrupt enable mask
    a883da132fa8 tpm: Add tpm_tis_i2c backend for tpm_tis_core
    a742ac8a1c51 tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
    ef495c5f45f2 tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
    1f3be2e23aa6 gcc-plugins: Reorganize gimple includes for GCC 13
    24615a3b932a ata: ahci: fix enum constants for gcc-13
    5d6cb145541a net: stmmac: Enable mac_managed_pm phylink config
    fd93aabb4287 tools/resolve_btfids: Use pkg-config to locate libelf
    130f9da78406 tools/resolve_btfids: Build with host flags
    00f2f1a782f9 tools/resolve_btfids: Support cross-building the kernel with clang
    17776a4ba9c2 tools/resolve_btfids: Install libbpf headers when building
    7c9808380d70 libbpf: Make libbpf_version.h non-auto-generated
    37ae1ba791ac libbpf: Add LIBBPF_DEPRECATED_SINCE macro for scheduling API deprecations
    a2667e6d7314 drm/radeon: free iio for atombios when driver shutdown
    f100c753aa1f powerpc: Fix reschedule bug in KUAP-unlocked user copy
    da5513f30187 libbpf: Fix build warning on ref_ctr_off
    4c5a089621a8 perf python: Account for multiple words in CC
    1c5699ee85d4 fs: move S_ISGID stripping into the vfs_*() helpers
    838f5d0701d8 fs: add mode_strip_sgid() helper
    d97172683641 squashfs: provide backing_dev_info in order to disable read-ahead
    ed037d7be40c irq_work: use kasan_record_aux_stack_noalloc() record callstack
    1363bd7dbde3 ixgbevf: add disable link state
    e5601ae2bd24 ixgbe: add improvement for MDD response functionality
    caa57cd80575 ixgbe: add the ability for the PF to disable VF link state
    16a77bfcc7df Check /dev/console using init_stat()
    04574fd5579a tracing/arm: Have max stack tracer handle the case of return address after data
    0e51e5717018 gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully
    1e6b7da6ddba drivers/base: Fix unsigned comparison to -1 in CPUMAP_FILE_MAX_BYTES
    493160901320 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition
    04224f725aa3 irqchip/gic-v3-its: Skip HP notifier when no ITS is registered
    6f6c2996a81c irqchip/gic-v3-its: Postpone LPI pending table freeing and memreserve
    1fa94473423f irqchip/gic-v3-its: Give the percpu rdist struct its own flags field
    6013d1ae5feb cert host tools: Stop complaining about deprecated OpenSSL functions
    efe20512212b init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash
    a40d2daf2795 pnmtologo: use relocatable file name
    3b40d5b41155 of: configfs: remove unused variable overlay_lock
    6c085baf1838 tools: use basename to identify file in gen-mach-types
    2fca0fd71981 lib/build_OID_registry: fix reproducibility issues
    0f586f4ee8ad vt/conmakehash: improve reproducibility
    a75774679f28 OF: DT-Overlay configfs interface (v8)
    d179c639b30b x86/boot: Wrap literal addresses in absolute_pointer()
    856ec356cf91 ACPI: thermal: drop an always true check
    7614af249993 xfs: Fix -Werror=dangling-pointer work-around for older GCC
    41470215f97e xfs: Work around GCC 12 -Werror=dangling-pointer for xfs_attr_remote.o
    44a445c1922d virtio-pci: Remove wrong address verification in vp_del_vqs()
    77aa9e489eaf bpf: Disallow unprivileged bpf by default
    ebfb1822e9f9 fs/aufs: fixup 5.15.36 fixups
    4eba9348d3e2 Revert "Revert "fbdev: Hot-unplug firmware fb devices on forced removal""
    5df6d1b00f95 jbd2: fix use-after-free of transaction_t race
    2d83e8196487 jbd2: refactor wait logic for transaction updates into a common function
    07a63f760793 netfilter: conntrack: avoid useless indirection during conntrack destruction
    4e7122625996 Revert "fbdev: Hot-unplug firmware fb devices on forced removal"
    7ba4cb36fd4f rcu: Avoid alloc_pages() when recording stack
    f78574dee71e kasan: test: silence intentional read overflow warnings
    d313cb89b6b1 kasan: arm64: fix pcpu_page_first_chunk crash with KASAN_VMALLOC
    5e279d5647cc arm64: support page mapping percpu first chunk allocator
    e5bf16752dca vmalloc: choose a better start address in vm_area_register_early()
    660b3d21b46f kasan: test: bypass __alloc_size checks
    00aa7573e53a kasan: test: add memcpy test that avoids out-of-bounds write
    67becf0b1bd4 kasan: fix tag for large allocations when using CONFIG_SLAB
    bedf1e033213 workqueue, kasan: avoid alloc_pages() when recording stack
    7195b67ce69b kasan: generic: introduce kasan_record_aux_stack_noalloc()
    bdff763f0e29 kasan: common: provide can_alloc in kasan_save_stack()
    51423ebb36ad lib/stackdepot: introduce __stack_depot_save()
    85373e66d847 lib/stackdepot: remove unused function argument
    5b6cc9b251f3 lib/stackdepot: include gfp.h
    c9f3902d8069 aufs: reduce overhead for "code present but disabled" use case.
    b98d189df02c aufs: bugfix, umount passes NULL to ->parse_monolithic()
    13b883cbbbd9 aufs standalone: cosmetic, missing copyright sentence
    21f8b0d81898 aufs: 5.15.5-20220117 ---> 5.15.5-20220221
    6199fd896645 aufs: tiny, headers after fs_context
    8ddb40e31c29 aufs: fs_context 7/7, finally remount
    69035f71c6fd aufs: fs_context 6/7, now mount
    bc841b970697 aufs: fs_context 5/7, parse all other mount options
    435188053da2 aufs: fs_context 4/7, parse xino options
    9af1f1825cbd aufs: fs_context 3/7, parse the branch-management options
    1c05eb767f8c aufs: fs_context 2/7, parse "br" mount option
    a8488f603134 aufs: fs_context 1/7, skelton of the new shceme
    8e32e0015564 aufs: pre fs_context, convert a static flag to a macro
    f90cb4144aec aufs: pre fs_context, support the incomplete sb and sbinfo case
    948762ef859c aufs: pre fs_context, convert the type of alloc_sbinfo()
    77151a08776b aufs: 5.15.5-20211129 ---> 5.15.5-20220117
    2539adbbbe1e aufs: 5.14-20211018 ---> 5.15.5-20211129
    7d32b25193c4 aufs: for v5.15-rc1, sync_inode() is gone
    66ec0c509225 aufs: for v5.15-rc1, new param 'rcu' for ->get_acl()
    69709dc518cd aufs: for v5.15-rc1, no mand-lock anymore
    ada8fe9543e5 aufs: 5.14-20210906  ---> 5.14-20211018
    b77f7f3f394a Revert "aufs: adjust to v5.15 fs changes"
    81bdce5b5876 tick/nohz: WARN_ON --> WARN_ON_ONCE to prevent console saturation
    97c963889222 sched/isolation: really align nohz_full with rcu_nocbs
    871f23ad3627 Revert "ARM: defconfig: Enable ax88796c driver for Exynos boards"
    ffad0783dd5b ARM: config: multi v7: Regenerate defconifg
    5c1e1a1ff2d3 ARM: config: multi v7: Add renamed symbols
    badaf96564fe ARM: config: multi v7: Clean up enabled by default options
    34996040fc9b ARM: config: multi v7: Drop unavailable options
    7f685244afb3 powerpc/mm: Switch obsolete dssall to .long
    20301aeb1a64 riscv: fix build with binutils 2.38
    9df58d070506 powerpc/lib/sstep: fix 'ptesync' build error
    720b61fc400b x86_64_defconfig: Fix warnings
    02bf23d26bc4 arm64: defconfig: cleanup config options
    05914e2c87e5 arm: defconfig: drop unused POWER_AVS option
    ffb532fa19b9 aufs5: fix build against v5.15.3+
    a4b3abf4d96d qemux86: add configuration symbol to select values
    fee94ee09154 clear_warn_once: add a clear_warn_once= boot parameter
    3d8762d900d9 clear_warn_once: bind a timer to written reset value
    95faacac47e8 clear_warn_once: expand debugfs to include read support
    de20c4240018 perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel.
    0e4aacead9c1 perf: x86-32: explicitly include <errno.h>
    9ad92c11468e perf: mips64: Convert __u64 to unsigned long long
    09e7efe3e68a perf: fix bench numa compilation
    e79becc44fa6 perf: add SLANG_INC for slang.h
    b1033b588681 perf: add sgidefs.h to for mips builds
    cf9db484ac0b perf: change --root to --prefix for python install
    7fd052c2c562 perf: add 'libperl not found' warning
    27a437cdd469 perf: force include of <stdbool.h>
    3b99d21bec2f fat: don't use obsolete random32 call in namei_vfat
    a7e9293b506b FAT: Added FAT_NO_83NAME
    6fd0e71d9e5c FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option
    c379b0d324ae FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option
    538be0fdb124 aufs: adjust to v5.15 fs changes
    f45da75c8759 aufs5: core
    047f57e07e01 aufs5: standalone
    029fc15574c8 aufs5: mmap
    610d0192ee94 aufs5: base
    d4e428d0ec5f aufs5: kbuild
    eb067eca251a yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL
    286af18d0875 yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name
    24d59a4e26a6 yaffs2: v5.12+ build fixups (not runtime tested)
    22c73536d5d7 yaffs: include blkdev.h
    506b7251bfb8 yaffs: fix misplaced variable declaration
    a0e26ff364dc yaffs2: v5.6 build fixups
    b10b1b2d169e yaffs2: fix memory leak when /proc/yaffs is read
    ad9adccbb214 yaffs: add strict check when call yaffs_internal_read_super
    2e3c3aec8279 yaffs: repair yaffs_get_mtd_device
    d662538516a7 yaffs: Fix build failure by handling inode i_version with proper atomic API
    70a6113ee2c7 yaffs2: fix memory leak in mount/umount
    3378e4a9e404 yaffs: Avoid setting any ACL releated xattr
    ec2284edddef Yaffs:check oob size before auto selecting Yaffs1
    c2a49874051c fs: yaffs2: replace CURRENT_TIME by other appropriate apis
    e9a5105a3e73 yaffs2: adjust to proper location of MS_RDONLY
    608807406f13 yaffs2: import git revision b4ce1bb (jan, 2020)
    89e660ece42c initramfs: allow an optional wrapper script around initramfs generation
    b179dbc9aa10 iwlwifi: select MAC80211_LEDS conditionally
    3fd5ca3673d0 net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119)
    d1f6edbf0188 arm64/perf: Fix wrong cast that may cause wrong truncation
    d202fb2caf33 defconfigs: drop obselete options
    9a27e3b5f4e7 arm64/perf: fix backtrace for AAPCS with FP enabled
    e20d8cf019b4 linux-yocto: Handle /bin/awk issues
    b6d2a3dbbd3a uvesafb: provide option to specify timeout for task completion
    adb40f1e6a1a uvesafb: print error message when task timeout occurs
    f280a1ed0962 compiler.h: Undef before redefining __attribute_const__
    4352732f268c vmware: include jiffies.h
    7954a677968d Resolve jiffies wrapping about arp
    5f28a1035d95 nfs: Allow default io size to be configured.
    0d7260ad7106 check console device file on fs when booting
    900a12e37e0a mount_root: clarify error messages for when no rootfs found
    7b878cbea726 menuconfig,mconf-cfg: Allow specification of ncurses location
    6604fc1763b3 modpost: mask trivial warnings
    0d294adb09cb kbuild: exclude meta directory from distclean processing
    a097cdd95a9e powerpc: serialize image targets
    5db6ec39a0a3 arm: serialize build targets
    cbabca27905e crtsavres: fixups for 5.4+
    7fc7656ed403 powerpc/ptrace: Disable array-bounds warning with gcc8
    a5faac5a19a2 powerpc: Disable attribute-alias warnings from gcc8
    186c54665b67 powerpc: add crtsavres.o to archprepare for kbuild
    d1ea862964ca powerpc: kexec fix for powerpc64
    2ac35b89a0f9 powerpc: Add unwind information for SPE registers of E500 core
    2e1c348a28bb mips: vdso: fix 'jalr $t9' crash in vdso code
    ec57870b303a mips: Kconfig: add QEMUMIPS64 option
    6a81b3c08107 4kc cache tlb hazard: tlbp cache coherency
    74e3b2a21e54 malta uhci quirks: make allowance for slow 4k(e)c
    22e65b63d3b4 arm/Makefile: Fix systemtap
    b7f1ab59f19e vexpress: Pass LOADADDR to Makefile
    ce2800c73bf7 arm: ARM EABI socketcall
    019d142fd956 ARM: LPAE: Invalidate the TLB for module addresses during translation fault

(From OE-Core rev: b39adc1b4d9e705b1801684020a0bc12217f6db8)

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:44 -08:00
Praveen Kumar
212172aa13 go: Fix CVE-2024-45336
The HTTP client drops sensitive headers after following a cross-domain redirect.
For example, a request to a.com/ containing an Authorization header which is redirected to
b.com/ will not send that header to b.com. In the event that the client received a subsequent
same-domain redirect, however, the sensitive headers would be restored. For example, a chain
of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the
Authorization header to b.com/2.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-45336

Upstream-patch:
b72d56f98d

(From OE-Core rev: 63e84b64f055ad7c91de67194e6739c96fb95496)

Signed-off-by: Praveen Kumar <praveen.kumar@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-15 06:04:43 -08:00
Antonin Godard
6840d3b71e dev-manual/building: document the initramfs-framework recipe
[ YOCTO #14747 ]

Adding a initramfs is a common task, and the way oe-core offers to do so
is by using the initramfs-framework recipe and companion modules. There
was already documentation on adding an initramfs but the documentation
was lacking details on this framework. Add it before the multiconfig
section because it is a bit more important IMO.

Reported-by: Alejandro <alejandro@enedino.org>
Reviewed-by: Quentin Schulz <quentin.schulz@cherry.de>
(From yocto-docs rev: b1a7dd6d34a291e2250e7169f4f9d93e61700a63)

Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
(cherry picked from commit caedbca4eced4cf5bc74aaae64e4ad2887c2fc65)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-05 06:54:35 -08:00
Deepesh Varatharajan
af0dd82dd3 glibc: stable 2.35 branch updates
549d831579 stdlib: Test using setenv with updated environ [BZ #32588]
8b5d4be762 Fix underallocation of abort_msg_s struct (CVE-2025-0395)
525e5f13de stdlib: Simplify buffer management in canonicalize
5eae275400 realpath: Bring back GNU extension on ENOENT and EACCES [BZ #28996]
8a82a76a42 realpath: Do not copy result on failure (BZ #28815)
e369114462 misc: Add support for Linux uio.h RWF_NOAPPEND flag
3f1ab0ed66 nptl: Convert tst-setuid2 to test-driver
76adee6e0f support: Add xpthread_cond_signal wrapper
c3beedeb70 elf: Support recursive use of dynamic TLS in interposed malloc
f48d763ab8 elf: Avoid some free (NULL) calls in _dl_update_slotinfo
710057676d sysdeps/x86/Makefile: Split and sort tests
a4207d4e83 x86: Only align destination to 1x VEC_SIZE in memset 4x loop
889f99c149 elf: Fix slow tls access after dlopen [BZ #19924]
543efedcb3 x86: Check the lower byte of EAX of CPUID leaf 2 [BZ #30643]
41a3e51233 x86_64: Add log1p with FMA
0d1c70aa4c x86_64: Add expm1 with FMA
516180d399 x86_64: Add log2 with FMA
30384b91ad x86_64: Sort fpu/multiarch/Makefile
d626c31ce5 x86: Avoid integer truncation with large cache sizes (bug 32470)
7ea35e28b4 nptl: initialize cpu_id_start prior to rseq registration
47d70ca8d9 nptl: initialize rseq area prior to registration

(From OE-Core rev: a397c152abf4f3da1323594e79ebac844a2c9f45)

Signed-off-by: Deepesh Varatharajan <Deepesh.Varatharajan@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-05 06:54:35 -08:00
Yash Shinde
57be589ed2 gdb: Fix CVE-2024-53589
CVE: CVE-2024-53589

(From OE-Core rev: 4ddd1e5aea1c4b84a6c4e1db5ded4938c4a35393)

Signed-off-by: Yash Shinde <Yash.Shinde@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-05 06:54:35 -08:00
Yash Shinde
7e19a67813 binutils: internal gdb: Fix CVE-2024-53589
CVE: CVE-2024-53589

(From OE-Core rev: 2d6df18f4a694d6499b337bbbab10ba8bb6e3fe4)

Signed-off-by: Yash Shinde <Yash.Shinde@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-05 06:54:35 -08:00
Peter Marko
3d240823a3 openssl: patch CVE-2024-13176
Picked [1] per link in [2].

[1] 07272b05b0
[2] https://nvd.nist.gov/vuln/detail/CVE-2024-13176

(From OE-Core rev: cb18163c11d7f8b62b829f203b00a4e14513c6cf)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-05 06:54:35 -08:00
Richard Purdie
1f103ae930 bitbake: tests/fetch: Fix git shallow test failure with git >= 2.48
>From git 2.48 release notes:

"""
When "git fetch $remote" notices that refs/remotes/$remote/HEAD is
missing and discovers what branch the other side points with its
HEAD, refs/remotes/$remote/HEAD is updated to point to it.
"""

This means with git 2.48 onwards, there is a mystery "HEAD" revision
appearing in some of our shallow clone tests. We can avoid this by
using the same canonicalization as used for the reference revisions.

This resolves autobuilder failures on the Fedora 40 workers.

(Bitbake rev: e71f1ce53cf3b8320caa481ae62d1ce2900c4670)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit c83444d1210740e27b1744d3aa7c5cad4e28db2f)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-02-05 06:54:35 -08:00
Antonin Godard
a42a2d776d test-manual/reproducible-builds: fix reproducible links
We don't run reproducible-builds on specific distros anymore, but on a
distro at random depending on what is available on the Autobuilder. Fix
the link to this builder and remove distro specific ones.

Reviewed-by: Quentin Schulz <quentin.schulz@cherry.de>
(From yocto-docs rev: d574e625b2bb1b07a2e51cbf2e1f0a28ee596c7b)

Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
(cherry picked from commit 8bd2bc3c00ca80f4c000a2a8d618a9f8ea3aa54b)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Antonin Godard
49affb8af2 Update autobuilder URLs to valkyrie
We have moved to Valkyrie which is hosted on
https://autobuilder.yoctoproject.org/valkyrie. Update the URL in the
documentation.

Also, the YOCTO_AB_URL macro was used in a single location in the
documentation so replace it by the :yocto_ab: custom extlink and remove
the macro.

Reviewed-by: Quentin Schulz <quentin.schulz@cherry.de>
(From yocto-docs rev: 66db484f51bc60e87d41bd5ad9d852e3ac44a1b2)

Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
(cherry picked from commit 0b0ed55d909dd11cdc9b29b105473271627c025e)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Ross Burton
966aead7e8 classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package architecture
Using the package architecture to select the right qemu options to pass
to qemu-user is incorrect, and fails for recipes that set PACKAGE_ARCH
to MACHINE_ARCH (as the qemuppc workarounds suggest) because there are
not typically any options set for the machine name.

Solve this by using TUNE_PKGARCH instead: for the majority of recipes
this is the same value, but for machine-specific recipes it remains the
same instead of changing to the machine name.

This means we can remove the qemuppc workarounds, as they're obsolete.

Also update the gcc-testsuite recipe which uses the same pattern to use
TUNE_PKGARCH, and generalise the else codepath to avoid needing to
update the list of architectures.

[ YOCTO #15647 ]

(From OE-Core rev: 077aab43f2c928eb8da71934405c62327010f552)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Ross Burton
83dfb365a8 classes/nativesdk: also override TUNE_PKGARCH
The nativesdk class overrides PACKAGE_ARCH and unsets TUNE_FEATURES, but
as recipes might want to look at TUNE_PKGARCH too (for example, when
setting QEMU_EXTRAOPTIONS) we should also override that variable.

Otherwise, a nativesdk recipe will have the TUNE_PKGARCH of the target,
which leads to errors (eg passing mips arguments to an arm qemu).

(From OE-Core rev: 38b4992329459f2200817a848e8888b9284b4917)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 05322beb290e1db30bef49b4364f8a8e6e9f7408)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Aleksandar Nikolic
9d4c312a0f scripts/install-buildtools: Update to 4.0.23
Update to the 4.0.23 release of the 4.0 series for buildtools.

(From OE-Core rev: 2effc054b1484dd3c87652267bf590c17d2d6f76)

Signed-off-by: Aleksandar Nikolic <aleksandar.nikolic@zeiss.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Peter Marko
ee88a1d22e ofono: patch CVE-2024-7540, CVE-2024-7541, CVE-2024-7542
Cherry-pick commit
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=29ff6334b492504ace101be748b256e6953d2c2f

(From OE-Core rev: f76c9f6940df64654710a83a6f3c6168b63fc611)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Archana Polampalli
b4825be806 rsync: fix CVE-2024-12747
A flaw was found in rsync. This vulnerability arises from a race condition during
rsync's handling of symbolic links. Rsync's default behavior when encountering
symbolic links is to skip them. If an attacker replaced a regular file with a
symbolic link at the right time, it was possible to bypass the default behavior
and traverse symbolic links. Depending on the privileges of the rsync process,
an attacker could leak sensitive information, potentially leading to privilege escalation.

(From OE-Core rev: c0905ffb2f1aa3bc4c6187ff4860dcc8d3dbfb01)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Archana Polampalli
f70841d2a2 rsync: fix CVE-2024-12088
A flaw was found in rsync. When using the `--safe-links` option, rsync fails to
properly verify if a symbolic link destination contains another symbolic link within it.
This results in a path traversal vulnerability, which may lead to arbitrary file write
outside the desired directory

(From OE-Core rev: 741200c41a19ef5b4876d9a80667dfde2e5f4a9d)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Archana Polampalli
2aebe10959 rsync: fix CVE-2024-12087
A path traversal vulnerability exists in rsync. It stems from behavior enabled
by the `--inc-recursive` option, a default-enabled option for many client options
and can be enabled by the server even if not explicitly enabled by the client.
When using the `--inc-recursive` option, a lack of proper symlink verification
coupled with deduplication checks occurring on a per-file-list basis could allow
a server to write files outside of the client's intended destination directory.
A malicious server could write malicious files to arbitrary locations named after
valid directories/paths on the client.

(From OE-Core rev: 12328df8dfcdc73ef70af299e9ebdc1d8ae73f37)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Archana Polampalli
1e04a4df0a rsync: fix CVE-2024-12086
A flaw was found in rsync. It could allow a server to enumerate the contents of an
arbitrary file from the client's machine. This issue occurs when files are being
copied from a client to a server. During this process, the rsync server will send
checksums of local data to the client to compare with in order to determine what
data needs to be sent to the server. By sending specially constructed checksum values
for arbitrary files, an attacker may be able to reconstruct the data of those files
byte-by-byte based on the responses from the client.

(From OE-Core rev: b49c8f58c20d7deb354a86a34488cb798c49eba3)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Archana Polampalli
5d60b24103 rsync: fix CVE-2024-12085
A flaw was found in the rsync daemon which could be triggered when rsync compares
file checksums. This flaw allows an attacker to manipulate the checksum length
(s2length) to cause a comparison between a checksum and uninitialized memory and
leak one byte of uninitialized stack data at a time.

(From OE-Core rev: 3fd8bea3e72573cca03cd3f6f4fc077cd2fd45a3)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Archana Polampalli
a1fab4c1a9 rsync: fix CVE-2024-12084
A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due
to improper handling of attacker-controlled checksum lengths (s2length) in the code.
When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write
out of bounds in the sum2 buffer.

(From OE-Core rev: 17fac276e27af19b00b6263f22156a55bae6a5c9)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Khem Raj
b7070c567a rsync: Delete pedantic errors re-ordering patch
It has been fixed by removing the check upstream see
9a3449a398

(From OE-Core rev: c6228b8371ea5c3c452db7b536948ae96d83844b)

(From OE-Core rev: 3746c60f38a6cf99f293131b8b1bfed7c73a1944)

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Alexander Kanavin
956e98851d rsync: update 3.2.5 -> 3.2.7
Rebase patches.

(From OE-Core rev: 827c787893caa973c509acf7cac9e17fec5692a4)

(From OE-Core rev: 798009f46f2044aaa0bac753430cca1964677741)

Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Zhang Peng
4ebaec2ca3 vte: fix CVE-2024-37535
CVE-2024-37535:
GNOME VTE before 0.76.3 allows an attacker to cause a denial of service
 (memory consumption) via a window resize escape sequence, a related
issue to CVE-2000-0476.

Reference:
[https://nvd.nist.gov/vuln/detail/CVE-2024-37535]

Upstream patches:
[036bc3ddcb]
[c313849c2e]

(From OE-Core rev: 132a5168b125d6f4fb9391d982bc64d73429ab8f)

Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Divya Chellam
0d7adecb6b wget: fix CVE-2024-10524
Applications that use Wget to access a remote resource using
shorthand URLs and pass arbitrary user credentials in the URL
are vulnerable. In these cases attackers can enter crafted
credentials which will cause Wget to access an arbitrary host.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-10524

Upstream-patch:
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778

(From OE-Core rev: eed5d59c138c210df91f31ac718383ccaf921faf)

Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Peter Marko
4bc82e0831 socat: patch CVE-2024-54661
Picked upstream commit
https://repo.or.cz/socat.git/commitdiff/4ee1f31cf80019c5907876576d6dfd49368d660f

Since this was the only commit in 1.8.0.2 it also contained release
changes which were dropped.

(From OE-Core rev: aa3187749ae9e04b91ad18be733ce09be63a50db)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Zhang Peng
744e331d5b avahi: fix CVE-2024-52616
CVE-2024-52616:
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs
randomly only once at startup, incrementing them sequentially after that. This
predictable behavior facilitates DNS spoofing attacks, allowing attackers to
guess transaction IDs.

Reference:
[https://nvd.nist.gov/vuln/detail/CVE-2024-52616]
[https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm]

Upstream patches:
[f8710bdc8b]

(From OE-Core rev: 7708d0c346b23ab3e687e2a2ca464d77d55cebd7)

Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:49:28 -08:00
Yogita Urade
65d58821e0 ofono: fix CVE-2024-7547
oFono SMS Decoder Stack-based Buffer Overflow Privilege Escalation
Vulnerability. This vulnerability allows local attackers to execute
arbitrary code on affected installations of oFono. An attacker must
first obtain the ability to execute code on the target modem in
order to exploit this vulnerability.

The specific flaw exists within the parsing of SMS PDUs. The issue
results from the lack of proper validation of the length of user-
supplied data prior to copying it to a stack-based buffer. An
attacker can leverage this vulnerability to execute code in the
context of the service account. Was ZDI-CAN-23460.

Reference:
https://security-tracker.debian.org/tracker/CVE-2024-7547

Upstream patch:
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=305df050d02aea8532f7625d6642685aa530f9b0

(From OE-Core rev: 8c32d91b64ae296d7832ddeb42983f4f3c237946)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-18 06:21:02 -08:00
Yogita Urade
a551469f70 ofono: fix CVE-2024-7546
oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation
Vulnerability. This vulnerability allows local attackers to execute
arbitrary code on affected installations of oFono. An attacker must
first obtain the ability to execute code on the target modem in
order to exploit this vulnerability.

The specific flaw exists within the parsing of STK command PDUs.
The issue results from the lack of proper validation of the length
of user-supplied data prior to copying it to a heap-based buffer.
An attacker can leverage this vulnerability to execute code in the
context of the service account. Was ZDI-CAN-23459.

Reference:
https://security-tracker.debian.org/tracker/CVE-2024-7546

Upstream patch:
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=79ea6677669e50b0bb9c231765adb4f81c375f63

(From OE-Core rev: 33b2a67b3134498e8c4845efddc7854b4d2315cd)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-18 06:21:02 -08:00
Yogita Urade
0c044be743 ofono: fix CVE-2024-7545
oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation
Vulnerability. This vulnerability allows local attackers to execute
arbitrary code on affected installations of oFono. An attacker must
first obtain the ability to execute code on the target modem in
order to exploit this vulnerability.

The specific flaw exists within the parsing of STK command PDUs.
The issue results from the lack of proper validation of the length
of user-supplied data prior to copying it to a heap-based buffer.
An attacker can leverage this vulnerability to execute code in the
context of the service account. Was ZDI-CAN-23458.

Reeference:
https://security-tracker.debian.org/tracker/CVE-2024-7545

Upstream patch:
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=556e14548c38c2b96d85881542046ee7ed750bb5

(From OE-Core rev: f062d2e4ad3d0a35a2dadda679632d5d213b8487)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-18 06:21:02 -08:00
Yogita Urade
481b2600a9 ofono: fix CVE-2024-7544
oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation
Vulnerability. This vulnerability allows local attackers to execute
arbitrary code on affected installations of oFono. An attacker must
first obtain the ability to execute code on the target modem in
order to exploit this vulnerability.

The specific flaw exists within the parsing of STK command PDUs.
The issue results from the lack of proper validation of the length
of user-supplied data prior to copying it to a heap-based buffer.
An attacker can leverage this vulnerability to execute code in the
context of the service account. Was ZDI-CAN-23457.

Reference:
https://security-tracker.debian.org/tracker/CVE-2024-7544

Upstream patch:
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=a240705a0d5d41eca6de4125ab2349ecde4c873a

(From OE-Core rev: c4e7d6fad2ed96296bcea2b7d12b41e1354eafa8)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-18 06:21:02 -08:00
Yogita Urade
380c41b667 ofono: fix CVE-2024-7543
oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation
Vulnerability. This vulnerability allows local attackers to execute
arbitrary code on affected installations of oFono. An attacker must
first obtain the ability to execute code on the target modem in
order to exploit this vulnerability.

The specific flaw exists within the parsing of STK command PDUs.
The issue results from the lack of proper validation of the length
of user-supplied data prior to copying it to a heap-based buffer.
An attacker can leverage this vulnerability to execute code in the
context of the service account. Was ZDI-CAN-23456.

Reference:
https://security-tracker.debian.org/tracker/CVE-2024-7543

Upstream patch:
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=90e60ada012de42964214d8155260f5749d0dcc7

(From OE-Core rev: 31ba25646b78d60923b1d897a43e37ef6f9edd51)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-18 06:21:02 -08:00
Yogita Urade
429a145133 ofono: fix CVE-2024-7539
oFono CUSD Stack-based Buffer Overflow Code Execution Vulnerability.
This vulnerability allows local attackers to execute arbitrary code
on affected installations of oFono. An attacker must first obtain
the ability to execute code on the target modem in order to exploit
this vulnerability.

The specific flaw exists within the parsing of responses from AT+CUSD
commands. The issue results from the lack of proper validation of the
length of user-supplied data prior to copying it to a stack-based buffer.
An attacker can leverage this vulnerability to execute code in the
context of root. Was ZDI-CAN-23195.

Reference:
https://security-tracker.debian.org/tracker/CVE-2024-7539

Upstream Patch:
https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=389e2344f86319265fb72ae590b470716e038fdc

(From OE-Core rev: b1626a0df6911172adafa85a99d36486eb7e2c62)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-18 06:21:02 -08:00
Peter Marko
e316dceeb6 gstreamer1.0: ignore CVEs fixed in plugins recipes
These were fixed in previous commits.

(From OE-Core rev: 09f0b16877ab207cba91f13d036bc6f4cd6bdf70)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-18 06:21:02 -08:00
Divya Chellam
61c55b9e30 ruby: fix CVE-2024-49761
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS
vulnerability when it parses an XML that has many digits between &# and x...;
in a hex numeric character reference (&#x.... This does not happen with
Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby.
The REXML gem 3.3.9 or later include the patch to fix the vulnerability.

CVE-2024-49761-0009.patch is the CVE fix and rest are dependent commits.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-49761

Upstream-patch:
810d228523
83ca5c4b0f
51217dbcc6
7e4049f6a6
fc6cad570b
7712855547
370666e314
a579730f25
ce59f2eb1a

(From OE-Core rev: 5b453400e9dd878b81b1447d14b3f518809de17e)

Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-18 06:21:02 -08:00
Archana Polampalli
4f959ce14c go: Fix CVE-2024-34158
Calling Parse on a "// +build" build tag line with deeply nested
expressions can cause a panic due to stack exhaustion.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-34158

Upstream-patch:
d4c53812e6

(From OE-Core rev: eb14e9722d023b4d1668c55ce4bc6ef02f8ce6c2)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-18 06:21:02 -08:00
Archana Polampalli
0c88d20540 go: Fix CVE-2024-34156
Calling Decoder.Decode on a message which contains deeply nested structures can
cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-34156

Upstream-patch:
2092294f2b

(From OE-Core rev: 3aeeee86a53cee14bb1a6a485f8781459b6f2ffc)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-18 06:21:02 -08:00
Archana Polampalli
f700dcdc1d go: Fix CVE-2024-34155
Calling any of the Parse functions on Go source code which contains
deeply nested literals can cause a panic due to stack exhaustion.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-34155

Upstream-patch:
b232596139

(From OE-Core rev: 9d21d527e2448e202030ae7ad38c88e25943a2f3)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-18 06:21:02 -08:00
269 changed files with 15725 additions and 3572 deletions

View File

@@ -27,7 +27,7 @@ import re
logger = logging.getLogger("BitBake.Cache")
__cache_version__ = "154"
__cache_version__ = "155"
def getCacheFile(path, filename, mc, data_hash):
mcspec = ''

View File

@@ -331,7 +331,7 @@ class SignatureGeneratorBasic(SignatureGenerator):
for dep in self.runtaskdeps[tid]:
data += self.get_unihash(dep)
for (f, cs) in self.file_checksum_values[tid]:
for (f, cs) in sorted(self.file_checksum_values[tid], key=clean_checksum_file_path):
if cs:
if "/./" in f:
data += "./" + f.split("/./")[1]
@@ -393,7 +393,7 @@ class SignatureGeneratorBasic(SignatureGenerator):
if runtime and tid in self.taskhash:
data['runtaskdeps'] = self.runtaskdeps[tid]
data['file_checksum_values'] = []
for f,cs in self.file_checksum_values[tid]:
for f,cs in sorted(self.file_checksum_values[tid], key=clean_checksum_file_path):
if "/./" in f:
data['file_checksum_values'].append(("./" + f.split("/./")[1], cs))
else:
@@ -720,6 +720,12 @@ class SignatureGeneratorTestMulticonfigDepends(SignatureGeneratorBasicHash):
name = "TestMulticonfigDepends"
supports_multiconfig_datacaches = True
def clean_checksum_file_path(file_checksum_tuple):
f, cs = file_checksum_tuple
if "/./" in f:
return "./" + f.split("/./")[1]
return f
def dump_this_task(outfile, d):
import bb.parse
fn = d.getVar("BB_FILENAME")

View File

@@ -1621,6 +1621,8 @@ class GitShallowTest(FetcherTest):
if cwd is None:
cwd = self.gitdir
actual_refs = self.git(['for-each-ref', '--format=%(refname)'], cwd=cwd).splitlines()
# Resolve references into the same format as the comparision (needed by git 2.48 onwards)
actual_refs = self.git(['rev-parse', '--symbolic-full-name'] + actual_refs, cwd=cwd).splitlines()
full_expected = self.git(['rev-parse', '--symbolic-full-name'] + expected_refs, cwd=cwd).splitlines()
self.assertEqual(sorted(set(full_expected)), sorted(set(actual_refs)))

View File

@@ -136,6 +136,7 @@ except ImportError:
sys.exit(1)
html_logo = 'sphinx-static/YoctoProject_Logo_RGB.jpg'
html_favicon = 'sphinx-static/favicon.ico'
# Add any paths that contain custom static files (such as style sheets) here,
# relative to this directory. They are copied after the builtin static files,

View File

@@ -791,3 +791,52 @@ Other layers may have similar testing branches but there is no formal
requirement or standard for these so please check the documentation for the
layers you are contributing to.
Acceptance of AI Generated Code
===============================
The Yocto Project and OpenEmbedded follow the guidance of the Linux Foundation
in regards to the use of generative AI tools. See:
https://www.linuxfoundation.org/legal/generative-ai.
All of the existing guidelines in this document are expected to be followed,
including in the :doc:`recipe-style-guide`, and contributing the changes with
additional requirements to the items in section
:ref:`contributor-guide/submit-changes:Implement and commit changes`.
All AI Generated Code must be labeled as such in the commit message,
prior to your ``Signed-off-by`` line. It is also strongly recommended,
that any patches or code within the commit also have a comment or other
indication that this code was AI generated.
For example, here is a properly formatted commit message::
component: Add the ability to ...
AI-Generated: Uses GitHub Copilot
Signed-off-by: Your Name <your.name@domain>
The ``Signed-off-by`` line must be written by you, and not the AI helper.
As a reminder, when contributing a change, your ``Signed-off-by`` line is
required and the stipulations in the `Developer's Statement of Origin
1.1 <https://developercertificate.org/>`__ still apply.
Additionally, you must stipulate AI contributions conform to the Linux
Foundation policy, specifically:
#. Contributors should ensure that the terms and conditions of the generative AI
tool do not place any contractual restrictions on how the tool's output can
be used that are inconsistent with the project's open source software
license, the project's intellectual property policies, or the Open Source
Definition.
#. If any pre-existing copyrighted materials (including pre-existing open
source code) authored or owned by third parties are included in the AI tool's
output, prior to contributing such output to the project, the Contributor
should confirm that they have permission from the third party
owners -- such as the form of an open source license or public domain
declaration that complies with the project's licensing policies -- to use and
modify such pre-existing materials and contribute them to the project.
Additionally, the contributor should provide notice and attribution of such
third party rights, along with information about the applicable license
terms, with their contribution.

View File

@@ -280,7 +280,9 @@ Follow these steps to create an :term:`Initramfs` image:
#. *Create the Initramfs Image Recipe:* You can reference the
``core-image-minimal-initramfs.bb`` recipe found in the
``meta/recipes-core`` directory of the :term:`Source Directory`
as an example from which to work.
as an example from which to work. The ``core-image-minimal-initramfs`` recipe
is based on the :ref:`initramfs-framework <dev-manual/building:Customizing an
Initramfs using \`\`initramfs-framework\`\`>` recipe described below.
#. *Decide if You Need to Bundle the Initramfs Image Into the Kernel
Image:* If you want the :term:`Initramfs` image that is built to be bundled
@@ -308,6 +310,86 @@ Follow these steps to create an :term:`Initramfs` image:
and bundled with the kernel image if you used the
:term:`INITRAMFS_IMAGE_BUNDLE` variable described earlier.
Customizing an Initramfs using ``initramfs-framework``
------------------------------------------------------
The ``core-image-minimal-initramfs.bb`` recipe found in
:oe_git:`meta/recipes-core/images
</openembedded-core/tree/meta/recipes-core/images>` uses the
:oe_git:`initramfs-framework_1.0.bb
</openembedded-core/tree/meta/recipes-core/initrdscripts/initramfs-framework_1.0.bb>`
recipe as its base component. The goal of the ``initramfs-framework`` recipe is
to provide the building blocks to build a customized :term:`Initramfs`.
The ``initramfs-framework`` recipe relies on shell initialization scripts
defined in :oe_git:`meta/recipes-core/initrdscripts/initramfs-framework
</openembedded-core/tree/meta/recipes-core/initrdscripts/initramfs-framework>`. Since some of
these scripts do not apply for all use cases, the ``initramfs-framework`` recipe
defines different packages:
- ``initramfs-framework-base``: this package installs the basic components of
an :term:`Initramfs`, such as the ``init`` script or the ``/dev/console``
character special file. As this package is a runtime dependency of all
modules listed below, it is automatically pulled in when one of the modules
is installed in the image.
- ``initramfs-module-exec``: support for execution of applications.
- ``initramfs-module-mdev``: support for `mdev
<https://wiki.gentoo.org/wiki/Mdev>`__.
- ``initramfs-module-udev``: support for :wikipedia:`Udev <Udev>`.
- ``initramfs-module-e2fs``: support for :wikipedia:`ext4/ext3/ext2
<Extended_file_system>` filesystems.
- ``initramfs-module-nfsrootfs``: support for locating and mounting the root
partition via :wikipedia:`NFS <Network_File_System>`.
- ``initramfs-module-rootfs``: support for locating and mounting the root
partition.
- ``initramfs-module-debug``: dynamic debug support.
- ``initramfs-module-lvm``: :wikipedia:`LVM <Logical_volume_management>` rootfs support.
- ``initramfs-module-overlayroot``: support for mounting a read-write overlay
on top of a read-only root filesystem.
In addition to the packages defined by the ``initramfs-framework`` recipe
itself, the following packages are defined by the recipes present in
:oe_git:`meta/recipes-core/initrdscripts </openembedded-core/tree/meta/recipes-core/initrdscripts>`:
- ``initramfs-module-install``: module to create and install a partition layout
on a selected block device.
- ``initramfs-module-install-efi``: module to create and install an EFI
partition layout on a selected block device.
- ``initramfs-module-setup-live``: module to start a shell in the
:term:`Initramfs` if ``root=/dev/ram0`` in passed in the `Kernel command-line
<https://www.kernel.org/doc/html/latest/admin-guide/kernel-parameters.html>`__
or the ``root=`` parameter was not passed.
To customize the :term:`Initramfs`, you can add or remove packages listed
earlier from the :term:`PACKAGE_INSTALL` variable with a :ref:`bbappend
<dev-manual/layers:Appending Other Layers Metadata With Your Layer>` on the
``core-image-minimal-initramfs`` recipe, or create a custom recipe for the
:term:`Initramfs` taking ``core-image-minimal-initramfs`` as example.
Custom scripts can be added to the :term:`Initramfs` by writing your own
recipes. The recipes are conventionally named ``initramfs-module-<module name>``
where ``<module name>`` is the name of the module. The recipe should set its
:term:`RDEPENDS` package-specific variables to include
``initramfs-framework-base`` and the other packages on which the module depends
at runtime.
The recipe must install shell initialization scripts in :term:`${D} <D>`\
``/init.d`` and must follow the ``<number>-<script name>`` naming scheme where:
- ``<number>`` is a *two-digit* number that affects the execution order of the
script compared to others. For example, the script ``80-setup-live`` would be
executed after ``01-udev`` because 80 is greater than 01.
This number being two-digits is important here as the scripts are executed
alphabetically. For example, the script ``10-script`` would be executed
before the script ``8-script``, because ``1`` is inferior to ``8``.
Therefore, the script should be named ``08-script``.
- ``<script name>`` is the script name which you can choose freely.
If two script use the same ``<number>``, they are sorted alphabetically based
on ``<script name>``.
Bundling an Initramfs Image From a Separate Multiconfig
-------------------------------------------------------

View File

@@ -80,15 +80,14 @@ recipe that are enabled with :term:`IMAGE_FEATURES`. The value of
:term:`EXTRA_IMAGE_FEATURES` is added to :term:`IMAGE_FEATURES` within
``meta/conf/bitbake.conf``.
To illustrate how you can use these variables to modify your image,
consider an example that selects the SSH server. The Yocto Project ships
with two SSH servers you can use with your images: Dropbear and OpenSSH.
Dropbear is a minimal SSH server appropriate for resource-constrained
environments, while OpenSSH is a well-known standard SSH server
implementation. By default, the ``core-image-sato`` image is configured
to use Dropbear. The ``core-image-full-cmdline`` and ``core-image-lsb``
images both include OpenSSH. The ``core-image-minimal`` image does not
contain an SSH server.
To illustrate how you can use these variables to modify your image, consider an
example that selects the SSH server. The Yocto Project ships with two SSH
servers you can use with your images: Dropbear and OpenSSH. Dropbear is a
minimal SSH server appropriate for resource-constrained environments, while
OpenSSH is a well-known standard SSH server implementation. By default, the
``core-image-sato`` image is configured to use Dropbear. The
``core-image-full-cmdline`` image includes OpenSSH. The ``core-image-minimal``
image does not contain an SSH server.
You can customize your image and change these defaults. Edit the
:term:`IMAGE_FEATURES` variable in your recipe or use the

View File

@@ -287,12 +287,11 @@ present, the toolchain is also automatically used.
networking.
- SSH servers are available in some QEMU images. The ``core-image-sato``
QEMU image has a Dropbear secure shell (SSH) server that runs with
the root password disabled. The ``core-image-full-cmdline`` and
``core-image-lsb`` QEMU images have OpenSSH instead of Dropbear.
Including these SSH servers allow you to use standard ``ssh`` and
``scp`` commands. The ``core-image-minimal`` QEMU image, however,
contains no SSH server.
QEMU image has a Dropbear secure shell (SSH) server that runs with the
root password disabled. The ``core-image-full-cmdline`` QEMU image has
OpenSSH instead of Dropbear. Including these SSH servers allow you to use
standard ``ssh`` and ``scp`` commands. The ``core-image-minimal`` QEMU
image, however, contains no SSH server.
- You can use a provided, user-space NFS server to boot the QEMU
session using a local copy of the root filesystem on the host. In

View File

@@ -62,37 +62,77 @@ found in ``build/tmp/deploy/cve``.
For example the CVE check report for the ``flex-native`` recipe looks like::
$ cat poky/build/tmp/deploy/cve/flex-native
LAYER: meta
PACKAGE NAME: flex-native
PACKAGE VERSION: 2.6.4
CVE: CVE-2016-6354
CVE STATUS: Patched
CVE SUMMARY: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
CVSS v2 BASE SCORE: 7.5
CVSS v3 BASE SCORE: 9.8
VECTOR: NETWORK
MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2016-6354
LAYER: meta
PACKAGE NAME: flex-native
PACKAGE VERSION: 2.6.4
CVE: CVE-2019-6293
CVE STATUS: Ignored
CVE SUMMARY: An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service.
CVSS v2 BASE SCORE: 4.3
CVSS v3 BASE SCORE: 5.5
VECTOR: NETWORK
MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2019-6293
$ cat ./tmp/deploy/cve/flex-native_cve.json
{
"version": "1",
"package": [
{
"name": "flex-native",
"layer": "meta",
"version": "2.6.4",
"products": [
{
"product": "flex",
"cvesInRecord": "No"
},
{
"product": "flex",
"cvesInRecord": "Yes"
}
],
"issue": [
{
"id": "CVE-2006-0459",
"status": "Patched",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2006-0459",
"summary": "flex.skl in Will Estes and John Millaway Fast Lexical Analyzer Generator (flex) before 2.5.33 does not allocate enough memory for grammars containing (1) REJECT statements or (2) trailing context rules, which causes flex to generate code that contains a buffer overflow that might allow context-dependent attackers to execute arbitrary code.",
"scorev2": "7.5",
"scorev3": "0.0",
"scorev4": "0.0",
"modified": "2024-11-21T00:06Z",
"vector": "NETWORK",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"detail": "version-not-in-range"
},
{
"id": "CVE-2016-6354",
"status": "Patched",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2016-6354",
"summary": "Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.",
"scorev2": "7.5",
"scorev3": "9.8",
"scorev4": "0.0",
"modified": "2024-11-21T02:55Z",
"vector": "NETWORK",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"detail": "version-not-in-range"
},
{
"id": "CVE-2019-6293",
"status": "Ignored",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2019-6293",
"summary": "An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service.",
"scorev2": "4.3",
"scorev3": "5.5",
"scorev4": "0.0",
"modified": "2024-11-21T04:46Z",
"vector": "NETWORK",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"detail": "upstream-wontfix",
"description": "there is stack exhaustion but no bug and it is building the parser, not running it, effectively similar to a compiler ICE. Upstream no plans to address this."
}
]
}
]
}
For images, a summary of all recipes included in the image and their CVEs is also
generated in textual and JSON formats. These ``.cve`` and ``.json`` reports can be found
generated in the JSON format. These ``.json`` reports can be found
in the ``tmp/deploy/images`` directory for each compiled image.
At build time CVE check will also throw warnings about ``Unpatched`` CVEs::
WARNING: flex-2.6.4-r0 do_cve_check: Found unpatched CVE (CVE-2019-6293), for more information check /poky/build/tmp/work/core2-64-poky-linux/flex/2.6.4-r0/temp/cve.log
WARNING: libarchive-3.5.1-r0 do_cve_check: Found unpatched CVE (CVE-2021-36976), for more information check /poky/build/tmp/work/core2-64-poky-linux/libarchive/3.5.1-r0/temp/cve.log
WARNING: qemu-native-9.2.0-r0 do_cve_check: Found unpatched CVE (CVE-2023-1386)
It is also possible to check the CVE status of individual packages as follows::
@@ -111,10 +151,10 @@ upstream `NIST CVE database <https://nvd.nist.gov/>`__.
The variable supports using vendor and product names like this::
CVE_PRODUCT = "flex_project:flex"
CVE_PRODUCT = "flex_project:flex westes:flex"
In this example the vendor name used in the CVE database is ``flex_project`` and the
product is ``flex``. With this setting the ``flex`` recipe only maps to this specific
In this example we have two possible vendors names, ``flex_project`` and ``westes``,
with the product name ``flex``. With this setting the ``flex`` recipe only maps to this specific
product and not products from other vendors with same name ``flex``.
Similarly, when the recipe version :term:`PV` is not compatible with software versions used by

View File

@@ -30,4 +30,5 @@ Release 4.0 (kirkstone)
release-notes-4.0.21
release-notes-4.0.22
release-notes-4.0.23
release-notes-4.0.24
release-notes-4.0.25

View File

@@ -0,0 +1,383 @@
Release notes for Yocto-4.0.24 (Kirkstone)
------------------------------------------
Security Fixes in Yocto-4.0.24
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- coreutils: Fix :cve_nist:`2024-0684`
- cpio: Ignore :cve_nist:`2023-7216`
- diffoscope: Fix :cve_nist:`2024-25711`
- ffmpeg: fix :cve_mitre:`2023-47342`, :cve_nist:`2023-50007`, :cve_nist:`2023-50008`,
:cve_nist:`2023-51793`, :cve_nist:`2023-51794`, :cve_nist:`2023-51796`, :cve_nist:`2023-51798`,
:cve_nist:`2024-7055`, :cve_nist:`2024-31578`, :cve_nist:`2024-31582`, :cve_nist:`2024-32230`,
:cve_nist:`2024-35366`, :cve_nist:`2024-35367` and :cve_nist:`2024-35368`
- ghostscript: Fix :cve_nist:`2024-46951`, :cve_nist:`2024-46952`, :cve_nist:`2024-46953`,
:cve_nist:`2024-46955` and :cve_nist:`2024-46956`
- ghostscript: Ignore :cve_nist:`2024-46954`
- glib-2.0: Fix :cve_nist:`2024-52533`
- gnupg: Ignore :cve_nist:`2022-3515`
- grub: Ignore :cve_nist:`2024-1048` and :cve_nist:`2023-4001`
- gstreame1.0: Ignore :cve_nist:`2023-40474`, :cve_nist:`2023-40475`, :cve_nist:`2023-40476`,
:cve_nist:`2023-44429`, :cve_nist:`2023-44446`, :cve_nist:`2023-50186` and :cve_nist:`2024-0444`
- gstreamer1.0-plugins-base: Fix :cve_nist:`2024-47538`, :cve_nist:`2024-47541`,
:cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`, :cve_nist:`2024-47615`
and :cve_nist:`2024-47835`
- gstreamer1.0-plugins-good: Fix :cve_nist:`2024-47537`, :cve_nist:`2024-47539`,
:cve_nist:`2024-47540`, :cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`,
:cve_nist:`2024-47546`, :cve_nist:`2024-47596`, :cve_nist:`2024-47597`, :cve_nist:`2024-47598`,
:cve_nist:`2024-47599`, :cve_nist:`2024-47601`, :cve_nist:`2024-47602`, :cve_nist:`2024-47603`,
:cve_nist:`2024-47606`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`,
:cve_nist:`2024-47776`, :cve_nist:`2024-47777`, :cve_nist:`2024-47778` and :cve_nist:`2024-47834`
- gstreamer1.0: Fix :cve_nist:`2024-47606`
- libarchive: Fix :cve_nist:`2024-20696`
- libpam: Fix :cve_nist:`2024-10041`
- libsdl2: Ignore :cve_nist:`2020-14409` and :cve_nist:`2020-14410`
- libsndfile1: Fix :cve_nist:`2022-33065` and :cve_nist:`2024-50612`
- libsoup-2.4: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531` and :cve_nist:`2024-52532`
- libsoup: Fix :cve_nist:`2024-52530`, :cve_nist:`2024-52531` and :cve_nist:`2024-52532`
- linux-yocto/5.10: Fix :cve_nist:`2023-52889`, :cve_nist:`2023-52917`, :cve_nist:`2023-52918`,
:cve_nist:`2024-41011`, :cve_nist:`2024-42259`, :cve_nist:`2024-42271`, :cve_nist:`2024-42272`,
:cve_nist:`2024-42280`, :cve_nist:`2024-42283`, :cve_nist:`2024-42284`, :cve_nist:`2024-42285`,
:cve_nist:`2024-42286`, :cve_nist:`2024-42287`, :cve_nist:`2024-42288`, :cve_nist:`2024-42289`,
:cve_nist:`2024-42301`, :cve_nist:`2024-42302`, :cve_nist:`2024-42309`, :cve_nist:`2024-42310`,
:cve_nist:`2024-42311`, :cve_nist:`2024-42313`, :cve_nist:`2024-43828`, :cve_nist:`2024-43856`,
:cve_nist:`2024-43858`, :cve_nist:`2024-43860`, :cve_nist:`2024-43861`, :cve_nist:`2024-43871`,
:cve_nist:`2024-43882`, :cve_nist:`2024-43889`, :cve_nist:`2024-43890`, :cve_nist:`2024-43893`,
:cve_nist:`2024-43894`, :cve_nist:`2024-43907`, :cve_nist:`2024-43908`, :cve_nist:`2024-43914`,
:cve_nist:`2024-44935`, :cve_nist:`2024-44944`, :cve_nist:`2024-44947`, :cve_nist:`2024-44954`,
:cve_nist:`2024-44960`, :cve_nist:`2024-44965`, :cve_nist:`2024-44969`, :cve_nist:`2024-44971`,
:cve_nist:`2024-44987`, :cve_nist:`2024-44988`, :cve_nist:`2024-44989`, :cve_nist:`2024-44990`,
:cve_nist:`2024-44995`, :cve_nist:`2024-44998`, :cve_nist:`2024-44999`, :cve_nist:`2024-45003`,
:cve_nist:`2024-45006`, :cve_nist:`2024-45016`, :cve_nist:`2024-45018`, :cve_nist:`2024-45021`,
:cve_nist:`2024-45025`, :cve_nist:`2024-45026`, :cve_nist:`2024-45028`, :cve_nist:`2024-46673`,
:cve_nist:`2024-46674`, :cve_nist:`2024-46675`, :cve_nist:`2024-46676`, :cve_nist:`2024-46677`,
:cve_nist:`2024-46679`, :cve_nist:`2024-46685`, :cve_nist:`2024-46689`, :cve_nist:`2024-46702`,
:cve_nist:`2024-46707`, :cve_nist:`2024-46714`, :cve_nist:`2024-46719`, :cve_nist:`2024-46721`,
:cve_nist:`2024-46722`, :cve_nist:`2024-46723`, :cve_nist:`2024-46724`, :cve_nist:`2024-46725`,
:cve_nist:`2024-46731`, :cve_nist:`2024-46737`, :cve_nist:`2024-46738`, :cve_nist:`2024-46739`,
:cve_nist:`2024-46740`, :cve_nist:`2024-46743`, :cve_nist:`2024-46744`, :cve_nist:`2024-46747`,
:cve_nist:`2024-46750`, :cve_nist:`2024-46755`, :cve_nist:`2024-46759`, :cve_nist:`2024-46761`,
:cve_nist:`2024-46763`, :cve_nist:`2024-46771`, :cve_nist:`2024-46777`, :cve_nist:`2024-46780`,
:cve_nist:`2024-46781`, :cve_nist:`2024-46782`, :cve_nist:`2024-46783`, :cve_nist:`2024-46791`,
:cve_nist:`2024-46798`, :cve_nist:`2024-46800`, :cve_nist:`2024-46804`, :cve_nist:`2024-46814`,
:cve_nist:`2024-46815`, :cve_nist:`2024-46817`, :cve_nist:`2024-46818`, :cve_nist:`2024-46819`,
:cve_nist:`2024-46822`, :cve_nist:`2024-46828`, :cve_nist:`2024-46829`, :cve_nist:`2024-46832`,
:cve_nist:`2024-46840`, :cve_nist:`2024-46844`, :cve_nist:`2024-47659`, :cve_nist:`2024-47660`,
:cve_nist:`2024-47663`, :cve_nist:`2024-47667`, :cve_nist:`2024-47668`, :cve_nist:`2024-47669`,
:cve_nist:`2024-47679`, :cve_nist:`2024-47684`, :cve_nist:`2024-47685`, :cve_nist:`2024-47692`,
:cve_nist:`2024-47697`, :cve_nist:`2024-47698`, :cve_nist:`2024-47699`, :cve_nist:`2024-47701`,
:cve_nist:`2024-47705`, :cve_nist:`2024-47706`, :cve_nist:`2024-47710`, :cve_nist:`2024-47712`,
:cve_nist:`2024-47713`, :cve_nist:`2024-47718`, :cve_nist:`2024-47723`, :cve_nist:`2024-47735`,
:cve_nist:`2024-47737`, :cve_nist:`2024-47739`, :cve_nist:`2024-47742`, :cve_nist:`2024-47747`,
:cve_nist:`2024-47748`, :cve_nist:`2024-47749`, :cve_nist:`2024-47757`, :cve_nist:`2024-49851`,
:cve_nist:`2024-49858`, :cve_nist:`2024-49860`, :cve_nist:`2024-49863`, :cve_nist:`2024-49867`,
:cve_nist:`2024-49868`, :cve_nist:`2024-49875`, :cve_nist:`2024-49877`, :cve_nist:`2024-49878`,
:cve_nist:`2024-49879`, :cve_nist:`2024-49881`, :cve_nist:`2024-49882`, :cve_nist:`2024-49883`,
:cve_nist:`2024-49884`, :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`,
:cve_nist:`2024-49894`, :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`,
:cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49907`, :cve_nist:`2024-49913`,
:cve_nist:`2024-49924`, :cve_nist:`2024-49930`, :cve_nist:`2024-49933`, :cve_nist:`2024-49936`,
:cve_nist:`2024-49938`, :cve_nist:`2024-49944`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`,
:cve_nist:`2024-49952`, :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`,
:cve_nist:`2024-49959`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`, :cve_nist:`2024-49965`,
:cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`, :cve_nist:`2024-49975`,
:cve_nist:`2024-49977`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`,
:cve_nist:`2024-49985`, :cve_nist:`2024-49995`, :cve_nist:`2024-49997`, :cve_nist:`2024-50001`,
:cve_nist:`2024-50006`, :cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50013`,
:cve_nist:`2024-50015`, :cve_nist:`2024-50024`, :cve_nist:`2024-50033`, :cve_nist:`2024-50035`,
:cve_nist:`2024-50039`, :cve_nist:`2024-50040`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`,
:cve_nist:`2024-50046`, :cve_nist:`2024-50049`, :cve_nist:`2024-50059`, :cve_nist:`2024-50095`,
:cve_nist:`2024-50096`, :cve_nist:`2024-50179`, :cve_nist:`2024-50180`, :cve_nist:`2024-50181`,
:cve_nist:`2024-50184` and :cve_nist:`2024-50188`
- linux-yocto/5.15: Fix :cve_nist:`2022-48695`, :cve_nist:`2023-52530`, :cve_nist:`2023-52917`,
:cve_nist:`2024-45009`, :cve_nist:`2024-46714`, :cve_nist:`2024-46719`, :cve_nist:`2024-46721`,
:cve_nist:`2024-46722`, :cve_nist:`2024-46723`, :cve_nist:`2024-46724`, :cve_nist:`2024-46725`,
:cve_nist:`2024-46731`, :cve_nist:`2024-46732`, :cve_nist:`2024-46737`, :cve_nist:`2024-46738`,
:cve_nist:`2024-46739`, :cve_nist:`2024-46740`, :cve_nist:`2024-46743`, :cve_nist:`2024-46744`,
:cve_nist:`2024-46746`, :cve_nist:`2024-46747`, :cve_nist:`2024-46750`, :cve_nist:`2024-46755`,
:cve_nist:`2024-46759`, :cve_nist:`2024-46761`, :cve_nist:`2024-46763`, :cve_nist:`2024-46771`,
:cve_nist:`2024-46777`, :cve_nist:`2024-46780`, :cve_nist:`2024-46781`, :cve_nist:`2024-46782`,
:cve_nist:`2024-46783`, :cve_nist:`2024-46791`, :cve_nist:`2024-46795`, :cve_nist:`2024-46798`,
:cve_nist:`2024-46800`, :cve_nist:`2024-46804`, :cve_nist:`2024-46805`, :cve_nist:`2024-46807`,
:cve_nist:`2024-46810`, :cve_nist:`2024-46814`, :cve_nist:`2024-46815`, :cve_nist:`2024-46817`,
:cve_nist:`2024-46818`, :cve_nist:`2024-46819`, :cve_nist:`2024-46822`, :cve_nist:`2024-46828`,
:cve_nist:`2024-46829`, :cve_nist:`2024-46832`, :cve_nist:`2024-46840`, :cve_nist:`2024-46844`,
:cve_nist:`2024-47659`, :cve_nist:`2024-47660`, :cve_nist:`2024-47663`, :cve_nist:`2024-47665`,
:cve_nist:`2024-47667`, :cve_nist:`2024-47668`, :cve_nist:`2024-47669`, :cve_nist:`2024-47674`,
:cve_nist:`2024-47679`, :cve_nist:`2024-47684`, :cve_nist:`2024-47685`, :cve_nist:`2024-47690`,
:cve_nist:`2024-47692`, :cve_nist:`2024-47693`, :cve_nist:`2024-47695`, :cve_nist:`2024-47696`,
:cve_nist:`2024-47697`, :cve_nist:`2024-47698`, :cve_nist:`2024-47699`, :cve_nist:`2024-47701`,
:cve_nist:`2024-47705`, :cve_nist:`2024-47706`, :cve_nist:`2024-47710`, :cve_nist:`2024-47712`,
:cve_nist:`2024-47713`, :cve_nist:`2024-47718`, :cve_nist:`2024-47720`, :cve_nist:`2024-47723`,
:cve_nist:`2024-47734`, :cve_nist:`2024-47735`, :cve_nist:`2024-47737`, :cve_nist:`2024-47739`,
:cve_nist:`2024-47742`, :cve_nist:`2024-47747`, :cve_nist:`2024-47748`, :cve_nist:`2024-47749`,
:cve_nist:`2024-47757`, :cve_nist:`2024-49851`, :cve_nist:`2024-49852`, :cve_nist:`2024-49854`,
:cve_nist:`2024-49856`, :cve_nist:`2024-49858`, :cve_nist:`2024-49860`, :cve_nist:`2024-49863`,
:cve_nist:`2024-49866`, :cve_nist:`2024-49867`, :cve_nist:`2024-49868`, :cve_nist:`2024-49871`,
:cve_nist:`2024-49875`, :cve_nist:`2024-49877`, :cve_nist:`2024-49878`, :cve_nist:`2024-49879`,
:cve_nist:`2024-49881`, :cve_nist:`2024-49882`, :cve_nist:`2024-49883`, :cve_nist:`2024-49884`,
:cve_nist:`2024-49886`, :cve_nist:`2024-49889`, :cve_nist:`2024-49890`, :cve_nist:`2024-49892`,
:cve_nist:`2024-49894`, :cve_nist:`2024-49895`, :cve_nist:`2024-49896`, :cve_nist:`2024-49900`,
:cve_nist:`2024-49902`, :cve_nist:`2024-49903`, :cve_nist:`2024-49907`, :cve_nist:`2024-49913`,
:cve_nist:`2024-49924`, :cve_nist:`2024-49927`, :cve_nist:`2024-49930`, :cve_nist:`2024-49933`,
:cve_nist:`2024-49935`, :cve_nist:`2024-49936`, :cve_nist:`2024-49938`, :cve_nist:`2024-49944`,
:cve_nist:`2024-49946`, :cve_nist:`2024-49948`, :cve_nist:`2024-49949`, :cve_nist:`2024-49952`,
:cve_nist:`2024-49954`, :cve_nist:`2024-49955`, :cve_nist:`2024-49957`, :cve_nist:`2024-49958`,
:cve_nist:`2024-49959`, :cve_nist:`2024-49962`, :cve_nist:`2024-49963`, :cve_nist:`2024-49965`,
:cve_nist:`2024-49966`, :cve_nist:`2024-49969`, :cve_nist:`2024-49973`, :cve_nist:`2024-49975`,
:cve_nist:`2024-49977`, :cve_nist:`2024-49981`, :cve_nist:`2024-49982`, :cve_nist:`2024-49983`,
:cve_nist:`2024-49985`, :cve_nist:`2024-49995`, :cve_nist:`2024-49997`, :cve_nist:`2024-50000`,
:cve_nist:`2024-50001`, :cve_nist:`2024-50002`, :cve_nist:`2024-50003`, :cve_nist:`2024-50006`,
:cve_nist:`2024-50007`, :cve_nist:`2024-50008`, :cve_nist:`2024-50013`, :cve_nist:`2024-50015`,
:cve_nist:`2024-50019`, :cve_nist:`2024-50024`, :cve_nist:`2024-50031`, :cve_nist:`2024-50033`,
:cve_nist:`2024-50035`, :cve_nist:`2024-50038`, :cve_nist:`2024-50039`, :cve_nist:`2024-50040`,
:cve_nist:`2024-50041`, :cve_nist:`2024-50044`, :cve_nist:`2024-50045`, :cve_nist:`2024-50046`,
:cve_nist:`2024-50049`, :cve_nist:`2024-50059`, :cve_nist:`2024-50062`, :cve_nist:`2024-50074`,
:cve_nist:`2024-50082`, :cve_nist:`2024-50083`, :cve_nist:`2024-50093`, :cve_nist:`2024-50095`,
:cve_nist:`2024-50096`, :cve_nist:`2024-50099`, :cve_nist:`2024-50101`, :cve_nist:`2024-50103`,
:cve_nist:`2024-50110`, :cve_nist:`2024-50115`, :cve_nist:`2024-50116`, :cve_nist:`2024-50117`,
:cve_nist:`2024-50127`, :cve_nist:`2024-50128`, :cve_nist:`2024-50131`, :cve_nist:`2024-50134`,
:cve_nist:`2024-50141`, :cve_nist:`2024-50142`, :cve_nist:`2024-50143`, :cve_nist:`2024-50148`,
:cve_nist:`2024-50150`, :cve_nist:`2024-50151`, :cve_nist:`2024-50153`, :cve_nist:`2024-50154`,
:cve_nist:`2024-50156`, :cve_nist:`2024-50160`, :cve_nist:`2024-50162`, :cve_nist:`2024-50163`,
:cve_nist:`2024-50167`, :cve_nist:`2024-50168`, :cve_nist:`2024-50171`, :cve_nist:`2024-50179`,
:cve_nist:`2024-50180`, :cve_nist:`2024-50181`, :cve_nist:`2024-50182`, :cve_nist:`2024-50184`,
:cve_nist:`2024-50185`, :cve_nist:`2024-50186`, :cve_nist:`2024-50188`, :cve_nist:`2024-50189`,
:cve_nist:`2024-50191`, :cve_nist:`2024-50192`, :cve_nist:`2024-50193`, :cve_nist:`2024-50194`,
:cve_nist:`2024-50195`, :cve_nist:`2024-50196`, :cve_nist:`2024-50198`, :cve_nist:`2024-50201`,
:cve_nist:`2024-50202`, :cve_nist:`2024-50205`, :cve_nist:`2024-50208`, :cve_nist:`2024-50209`,
:cve_nist:`2024-50229`, :cve_nist:`2024-50230`, :cve_nist:`2024-50232`, :cve_nist:`2024-50233`,
:cve_nist:`2024-50234`, :cve_nist:`2024-50236`, :cve_nist:`2024-50237`, :cve_nist:`2024-50244`,
:cve_nist:`2024-50245`, :cve_nist:`2024-50247`, :cve_nist:`2024-50251`, :cve_nist:`2024-50257`,
:cve_nist:`2024-50259`, :cve_nist:`2024-50262`, :cve_nist:`2024-50264`, :cve_nist:`2024-50265`,
:cve_nist:`2024-50267`, :cve_nist:`2024-50268`, :cve_nist:`2024-50269`, :cve_nist:`2024-50273`,
:cve_nist:`2024-50278`, :cve_nist:`2024-50279`, :cve_nist:`2024-50282`, :cve_nist:`2024-50287`,
:cve_nist:`2024-50292`, :cve_nist:`2024-50296`, :cve_nist:`2024-50299`, :cve_nist:`2024-50301`,
:cve_nist:`2024-50302`, :cve_nist:`2024-53052`, :cve_nist:`2024-53055`, :cve_nist:`2024-53057`,
:cve_nist:`2024-53058`, :cve_nist:`2024-53059`, :cve_nist:`2024-53060`, :cve_nist:`2024-53061`,
:cve_nist:`2024-53063`, :cve_nist:`2024-53066`, :cve_nist:`2024-53088`, :cve_nist:`2024-53096`,
:cve_nist:`2024-53101`, :cve_nist:`2024-53103`, :cve_nist:`2024-53145`, :cve_nist:`2024-53146`,
:cve_nist:`2024-53150`, :cve_nist:`2024-53151`, :cve_nist:`2024-53155`, :cve_nist:`2024-53156`,
:cve_nist:`2024-53157`, :cve_nist:`2024-53165`, :cve_nist:`2024-53171`, :cve_nist:`2024-53173`,
:cve_nist:`2024-53226`, :cve_nist:`2024-53227`, :cve_nist:`2024-53237`, :cve_nist:`2024-56567`,
:cve_nist:`2024-56572`, :cve_nist:`2024-56574`, :cve_nist:`2024-56578`, :cve_nist:`2024-56581`,
:cve_nist:`2024-56593`, :cve_nist:`2024-56600`, :cve_nist:`2024-56601`, :cve_nist:`2024-56602`,
:cve_nist:`2024-56603`, :cve_nist:`2024-56605`, :cve_nist:`2024-56606`, :cve_nist:`2024-56614`,
:cve_nist:`2024-56622`, :cve_nist:`2024-56623`, :cve_nist:`2024-56629`, :cve_nist:`2024-56634`,
:cve_nist:`2024-56640`, :cve_nist:`2024-56642`, :cve_nist:`2024-56643`, :cve_nist:`2024-56648`,
:cve_nist:`2024-56650`, :cve_nist:`2024-56659`, :cve_nist:`2024-56662`, :cve_nist:`2024-56670`,
:cve_nist:`2024-56688`, :cve_nist:`2024-56694`, :cve_nist:`2024-56704`, :cve_nist:`2024-56708`,
:cve_nist:`2024-56720`, :cve_nist:`2024-56723`, :cve_nist:`2024-56724`, :cve_nist:`2024-56726`,
:cve_nist:`2024-56728`, :cve_nist:`2024-56739`, :cve_nist:`2024-56741`, :cve_nist:`2024-56745`,
:cve_nist:`2024-56746`, :cve_nist:`2024-56747`, :cve_nist:`2024-56748`, :cve_nist:`2024-56754`,
:cve_nist:`2024-56756`, :cve_nist:`2024-56770`, :cve_nist:`2024-56774`, :cve_nist:`2024-56776`,
:cve_nist:`2024-56777`, :cve_nist:`2024-56778`, :cve_nist:`2024-56779`, :cve_nist:`2024-56780`,
:cve_nist:`2024-56781`, :cve_nist:`2024-56785` and :cve_nist:`2024-56787`
- ovmf: Fix :cve_nist:`2022-36763`, :cve_nist:`2022-36764`, :cve_nist:`2022-36765`,
:cve_nist:`2023-45229`, :cve_nist:`2023-45230`, :cve_nist:`2023-45231`, :cve_nist:`2023-45232`,
:cve_nist:`2023-45233`, :cve_nist:`2023-45234`, :cve_nist:`2023-45235`, :cve_nist:`2023-45236`,
:cve_nist:`2023-45237`, :cve_nist:`2024-1298` and :cve_nist:`2024-38796`
- pixman: Ignore :cve_nist:`2023-37769`
- python3: Fix :cve_nist:`2024-9287`, :cve_nist:`2024-11168` and :cve_nist:`2024-50602`
- python3-pip: Fix :cve_nist:`2023-5752`
- python3-requests: Fix :cve_nist:`2024-35195`
- python3-zipp: Fix :cve_nist:`2024-5569`
- qemu: Fix :cve_nist:`2024-3446`, :cve_nist:`2024-3447` and :cve_nist:`2024-6505`
- qemu: Ignore :cve_nist:`2022-36648`
- subversion: Fix :cve_nist:`2024-46901`
- tiff: Fix :cve_nist:`2023-3164`
- tiff: Ignore :cve_nist:`2023-2731`
- webkitgtk: Fix :cve_nist:`2024-40776` and :cve_nist:`2024-40780`
- xserver-xorg: Fix :cve_nist:`2024-9632`
- xwayland: Fix :cve_nist:`2023-5380` and :cve_nist:`2024-0229`
Fixes in Yocto-4.0.24
~~~~~~~~~~~~~~~~~~~~~
- base-passwd: Add the sgx group
- base-passwd: Regenerate the patches
- base-passwd: Update the status for two patches
- base-passwd: Update to 3.5.52
- base-passwd: add the wheel group
- base-passwd: fix patchreview warning
- bitbake: fetch2: use persist_data context managers
- bitbake: fetch/wget: Increase timeout to 100s from 30s
- bitbake: persist_data: close connection in SQLTable __exit__
- build-appliance-image: Update to kirkstone head revision
- builder: set :term:`CVE_PRODUCT`
- contributor-guide: submit-changes.rst: suggest to remove the git signature
- cve-update-nvd2-native: Tweak to work better with NFS :term:`DL_DIR`
- dbus: disable assertions and enable only modular tests
- do_package/sstate/sstatesig: Change timestamp clamping to hash output only
- docs: Gather dependencies in poky.yaml.in
- docs: standards.md: add a section on admonitions
- gstreamer1.0: improve test reliability
- linux-yocto/5.10: update to v5.10.227
- linux-yocto/5.15: update to v5.15.175
- llvm: reduce size of -dbg package
- lttng-modules: fix build error after kernel update to 5.15.171
- migration-guides: add release notes for 4.0.23
- ninja: fix build with python 3.13
- oeqa/utils/gitarchive: Return tag name and improve exclude handling
- ovmf-native: remove .pyc files from install
- package.bbclass: Use shlex instead of deprecated pipes
- package_rpm: restrict rpm to 4 threads
- package_rpm: use zstd's default compression level
- poky.conf: add new tested distros
- poky.conf: bump version for 4.0.24
- poky.yaml.in: add missing locales dependency
- python3: upgrade to 3.10.16
- ref-manual: SSTATE_MIRRORS/SOURCE_MIRROR_URL: add instructions for mirror authentication
- ref-manual: classes: fix bin_package description
- ref-manual: devtool-reference: add warning note on deploy-target and shared objects
- ref-manual: move runtime-testing section to the test-manual
- ref-manual: packages: move ptest section to the test-manual
- ref-manual: system-requirements: update list of supported distros
- ref-manual: use standardized method accross both ubuntu and debian for locale install
- resulttool: Add --logfile-archive option to store mode
- resulttool: Allow store to filter to specific revisions
- resulttool: Clean up repoducible build logs
- resulttool: Fix passthrough of --all files in store mode
- resulttool: Handle ltp rawlogs as well as ptest
- resulttool: Improve repo layout for oeselftest results
- resulttool: Trim the precision of duration information
- resulttool: Use single space indentation in json output
- rootfs-postcommands.bbclass: make opkg status reproducible
- rxvt-unicode.inc: disable the terminfo installation by setting TIC to :
- sanity: check for working user namespaces
- scripts/install-buildtools: Update to 4.0.22
- selftest/reproducible: Clean up pathnames
- selftest/reproducible: Drop rawlogs
- test-manual: reproducible-builds.rst: document :term:`OEQA_REPRODUCIBLE_TEST_TARGET` and
:term:`OEQA_REPRODUCIBLE_TEST_SSTATE_TARGETS`
- test-manual: reproducible-builds.rst: show how to build a single package
- toolchain-shar-extract.sh: exit when post-relocate-setup.sh fails
- tzdata & tzcode-native: upgrade 2024b
- udev-extraconf: fix network.sh script did not configure hotplugged interfaces
- unzip: Fix configure tests to use modern C
- webkitgtk: Fix build on 32bit arm
- webkitgtk: fix perl-native dependency
- webkitgtk: reduce size of -dbg package
- wireless-regdb: upgrade to 2024.10.07
Known Issues in Yocto-4.0.24
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- N/A
Contributors to Yocto-4.0.24
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Thanks to the following people who contributed to this release:
- Aleksandar Nikolic
- Alex Kiernan
- Alexander Kanavin
- Alexandre Belloni
- Antonin Godard
- Archana Polampalli
- Bruce Ashfield
- Changqing Li
- Chen Qi
- Chris Laplante
- Divya Chellam
- Ernst Persson
- Guénaël Muller
- Hitendra Prajapati
- Hongxu Jia
- Jiaying Song
- Jinfeng Wang
- Khem Raj
- Lee Chee Yang
- Liyin Zhang
- Louis Rannou
- Markus Volk
- Mikko Rapeli
- Ovidiu Panait
- Peter Kjellerstedt
- Peter Marko
- Regis Dargent
- Richard Purdie
- Rohini Sangam
- Ross Burton
- Soumya Sambu
- Steve Sakoman
- Trevor Gamblin
- Vijay Anusuri
- Wang Mingyu
- Yogita Urade
- Zahir Hussain
Repositories / Downloads for Yocto-4.0.24
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
poky
- Repository Location: :yocto_git:`/poky`
- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
- Tag: :yocto_git:`yocto-4.0.24 </poky/log/?h=yocto-4.0.24>`
- Git Revision: :yocto_git:`f50532593651dff82bc952288d786c55038c2c86 </poky/commit/?id=f50532593651dff82bc952288d786c55038c2c86>`
- Release Artefact: poky-f50532593651dff82bc952288d786c55038c2c86
- sha: 0aa062d19510394748db9a2d6ded2d764f435383296d9c94fb6b25755280556e
- Download Locations:
https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/poky-f50532593651dff82bc952288d786c55038c2c86.tar.bz2
https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/poky-f50532593651dff82bc952288d786c55038c2c86.tar.bz2
openembedded-core
- Repository Location: :oe_git:`/openembedded-core`
- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
- Tag: :oe_git:`yocto-4.0.24 </openembedded-core/log/?h=yocto-4.0.24>`
- Git Revision: :oe_git:`a270d4c957259761bcc7382fcc54642a02f9fc7d </openembedded-core/commit/?id=a270d4c957259761bcc7382fcc54642a02f9fc7d>`
- Release Artefact: oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d
- sha: b08b9b16c8ffa587d521ad28e24e38c79d757a6f0839d18165ebac3081a34b68
- Download Locations:
https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d.tar.bz2
https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/oecore-a270d4c957259761bcc7382fcc54642a02f9fc7d.tar.bz2
meta-mingw
- Repository Location: :yocto_git:`/meta-mingw`
- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
- Tag: :yocto_git:`yocto-4.0.24 </meta-mingw/log/?h=yocto-4.0.24>`
- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
- Download Locations:
https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
meta-gplv2
- Repository Location: :yocto_git:`/meta-gplv2`
- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
- Tag: :yocto_git:`yocto-4.0.24 </meta-gplv2/log/?h=yocto-4.0.24>`
- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
- Download Locations:
https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
bitbake
- Repository Location: :oe_git:`/bitbake`
- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
- Tag: :oe_git:`yocto-4.0.24 </bitbake/log/?h=yocto-4.0.24>`
- Git Revision: :oe_git:`3f88b005244a0afb5d5c7260e54a94a453ec9b3e </bitbake/commit/?id=3f88b005244a0afb5d5c7260e54a94a453ec9b3e>`
- Release Artefact: bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e
- sha: 31f442b72ec7d81ca75509b1a7179c3fe3942528b1e31c823b21a413244bd15b
- Download Locations:
https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.24/bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e.tar.bz2
https://mirrors.kernel.org/yocto/yocto/yocto-4.0.24/bitbake-3f88b005244a0afb5d5c7260e54a94a453ec9b3e.tar.bz2
yocto-docs
- Repository Location: :yocto_git:`/yocto-docs`
- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
- Tag: :yocto_git:`yocto-4.0.24 </yocto-docs/log/?h=yocto-4.0.24>`
- Git Revision: :yocto_git:`3128bf149f40928e6c2a3e264590a0c6c9778c6a </yocto-docs/commit/?id=3128bf149f40928e6c2a3e264590a0c6c9778c6a>`

View File

@@ -0,0 +1,167 @@
Release notes for Yocto-4.0.25 (Kirkstone)
------------------------------------------
Security Fixes in Yocto-4.0.25
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- avahi: Fix :cve_nist:`2024-52616`
- binutils: Fix :cve_nist:`2024-53589`
- gdb: Fix :cve_nist:`2024-53589`
- go: Fix :cve_nist:`2024-34155`, :cve_nist:`2024-34156`, :cve_nist:`2024-34158` and
:cve_nist:`2024-45336`
- gstreamer1.0: Ignore :cve_nist:`2024-47537`, :cve_nist:`2024-47539`, :cve_nist:`2024-47540`,
:cve_nist:`2024-47543`, :cve_nist:`2024-47544`, :cve_nist:`2024-47545`, :cve_nist:`2024-47538`,
:cve_nist:`2024-47541`, :cve_nist:`2024-47542`, :cve_nist:`2024-47600`, :cve_nist:`2024-47607`,
:cve_nist:`2024-47615`, :cve_nist:`2024-47835`, :cve_nist:`2024-47546`, :cve_nist:`2024-47596`,
:cve_nist:`2024-47597`, :cve_nist:`2024-47598`, :cve_nist:`2024-47599`, :cve_nist:`2024-47601`,
:cve_nist:`2024-47777`, :cve_nist:`2024-47778`, :cve_nist:`2024-47834`, :cve_nist:`2024-47602`,
:cve_nist:`2024-47603`, :cve_nist:`2024-47613`, :cve_nist:`2024-47774`, :cve_nist:`2024-47775`
and :cve_nist:`2024-47776`
- linux-yocto/5.15: Fix :cve_nist:`2024-36476`, :cve_nist:`2024-55916`, :cve_nist:`2024-56369`,
:cve_nist:`2024-56626`, :cve_nist:`2024-56627`, :cve_nist:`2024-56715`, :cve_nist:`2024-56716`,
:cve_nist:`2024-57802`, :cve_nist:`2024-57807`, :cve_nist:`2024-57841`, :cve_nist:`2024-57890`,
:cve_nist:`2024-57896`, :cve_nist:`2024-57900`, :cve_nist:`2024-57910`, :cve_nist:`2024-57911`,
:cve_nist:`2024-57938`, :cve_nist:`2024-57951`, :cve_nist:`2025-21631`, :cve_nist:`2025-21665`,
:cve_nist:`2025-21666`, :cve_nist:`2025-21669`, :cve_nist:`2025-21680`, :cve_nist:`2025-21683`,
:cve_nist:`2025-21694`, :cve_nist:`2025-21697` and :cve_nist:`2025-21699`
- ofono: Fix :cve_nist:`2024-7539`, :cve_nist:`2024-7540`, :cve_nist:`2024-7541`,
:cve_nist:`2024-7542`, :cve_nist:`2024-7543`, :cve_nist:`2024-7544`, :cve_nist:`2024-7545`,
:cve_nist:`2024-7546` and :cve_nist:`2024-7547`
- openssl: Fix :cve_nist:`2024-13176`
- rsync: Fix :cve_nist:`2024-12084`, :cve_nist:`2024-12085`, :cve_nist:`2024-12086`,
:cve_nist:`2024-12087`, :cve_nist:`2024-12088` and :cve_nist:`2024-12747`
- ruby: Fix :cve_nist:`2024-49761`
- socat: Fix :cve_nist:`2024-54661`
- vte: Fix :cve_nist:`2024-37535`
- wget: Fix :cve_nist:`2024-10524`
Fixes in Yocto-4.0.25
~~~~~~~~~~~~~~~~~~~~~
- bitbake: tests/fetch: Fix git shallow test failure with git >= 2.48
- build-appliance-image: Update to kirkstone head revision
- classes-global/insane: Look up all runtime providers for file-rdeps
- classes/nativesdk: also override :term:`TUNE_PKGARCH`
- classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package architecture
- cmake: apply parallel build settings to ptest tasks
- dev-manual/building: document the initramfs-framework recipe
- docs: Update autobuilder URLs to valkyrie
- documentation: Fix typo in standards.md
- glibc: Suppress GCC -Os warning on user2netname for sunrpc
- glibc: stable 2.35 branch updates
- lib/packagedata.py: Add API to iterate over rprovides
- linux-yocto/5.15: upgrade to v5.15.178
- migration-guides: add release notes for 4.0.24
- openssl: upgrade to 3.0.16
- poky.conf: bump version for 4.0.25
- python3: Treat UID/GID overflow as failure
- rsync: Delete pedantic errors re-ordering patch
- rsync: upgrade to 3.2.7
- rust-common.bbclass: soft assignment for RUSTLIB path
- scripts/install-buildtools: Update to 4.0.23
- test-manual/reproducible-builds: fix reproducible links
Known Issues in Yocto-4.0.25
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- N/A
Contributors to Yocto-4.0.25
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Aleksandar Nikolic
- Alexander Kanavin
- Antonin Godard
- Archana Polampalli
- Bruce Ashfield
- Deepesh Varatharajan
- Divya Chellam
- Joshua Watt
- Khem Raj
- Lee Chee Yang
- Nikhil R
- Pedro Ferreira
- Peter Marko
- Praveen Kumar
- Richard Purdie
- Ross Burton
- Simon A. Eugster
- Steve Sakoman
- Yash Shinde
- Yogita Urade
- Zhang Peng
Repositories / Downloads for Yocto-4.0.25
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
poky
- Repository Location: :yocto_git:`/poky`
- Branch: :yocto_git:`kirkstone </poky/log/?h=kirkstone>`
- Tag: :yocto_git:`yocto-4.0.25 </poky/log/?h=yocto-4.0.25>`
- Git Revision: :yocto_git:`b5aa03f336c121269551f9e7baed4c677c76bb39 </poky/commit/?id=b5aa03f336c121269551f9e7baed4c677c76bb39>`
- Release Artefact: poky-b5aa03f336c121269551f9e7baed4c677c76bb39
- sha: 7afbcb25f0dd89a4fb6dd4c5945061705ef9ce79a6863806278603273c2b3b4a
- Download Locations:
https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/poky-b5aa03f336c121269551f9e7baed4c677c76bb39.tar.bz2
https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/poky-b5aa03f336c121269551f9e7baed4c677c76bb39.tar.bz2
openembedded-core
- Repository Location: :oe_git:`/openembedded-core`
- Branch: :oe_git:`kirkstone </openembedded-core/log/?h=kirkstone>`
- Tag: :oe_git:`yocto-4.0.25 </openembedded-core/log/?h=yocto-4.0.25>`
- Git Revision: :oe_git:`5a794fd244f7fdeb426bd5e3def6b4effc0e8c62 </openembedded-core/commit/?id=5a794fd244f7fdeb426bd5e3def6b4effc0e8c62>`
- Release Artefact: oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62
- sha: 8fc93109693e5f4702b3fe0633b6be833605291b3d595dc8bdeb6379f40cd2de
- Download Locations:
https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62.tar.bz2
https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/oecore-5a794fd244f7fdeb426bd5e3def6b4effc0e8c62.tar.bz2
meta-mingw
- Repository Location: :yocto_git:`/meta-mingw`
- Branch: :yocto_git:`kirkstone </meta-mingw/log/?h=kirkstone>`
- Tag: :yocto_git:`yocto-4.0.25 </meta-mingw/log/?h=yocto-4.0.25>`
- Git Revision: :yocto_git:`87c22abb1f11be430caf4372e6b833dc7d77564e </meta-mingw/commit/?id=87c22abb1f11be430caf4372e6b833dc7d77564e>`
- Release Artefact: meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e
- sha: f0bc4873e2e0319fb9d6d6ab9b98eb3f89664d4339a167d2db6a787dd12bc1a8
- Download Locations:
https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/meta-mingw-87c22abb1f11be430caf4372e6b833dc7d77564e.tar.bz2
meta-gplv2
- Repository Location: :yocto_git:`/meta-gplv2`
- Branch: :yocto_git:`kirkstone </meta-gplv2/log/?h=kirkstone>`
- Tag: :yocto_git:`yocto-4.0.25 </meta-gplv2/log/?h=yocto-4.0.25>`
- Git Revision: :yocto_git:`d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a </meta-gplv2/commit/?id=d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a>`
- Release Artefact: meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a
- sha: c386f59f8a672747dc3d0be1d4234b6039273d0e57933eb87caa20f56b9cca6d
- Download Locations:
https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/meta-gplv2-d2f8b5cdb285b72a4ed93450f6703ca27aa42e8a.tar.bz2
bitbake
- Repository Location: :oe_git:`/bitbake`
- Branch: :oe_git:`2.0 </bitbake/log/?h=2.0>`
- Tag: :oe_git:`yocto-4.0.25 </bitbake/log/?h=yocto-4.0.25>`
- Git Revision: :oe_git:`e71f1ce53cf3b8320caa481ae62d1ce2900c4670 </bitbake/commit/?id=e71f1ce53cf3b8320caa481ae62d1ce2900c4670>`
- Release Artefact: bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670
- sha: 007eef35174586c85b233f4ec91578956fe21e0236f7ca2c3f90f9d034f94b5b
- Download Locations:
https://downloads.yoctoproject.org/releases/yocto/yocto-4.0.25/bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670.tar.bz2
https://mirrors.kernel.org/yocto/yocto/yocto-4.0.25/bitbake-e71f1ce53cf3b8320caa481ae62d1ce2900c4670.tar.bz2
yocto-docs
- Repository Location: :yocto_git:`/yocto-docs`
- Branch: :yocto_git:`kirkstone </yocto-docs/log/?h=kirkstone>`
- Tag: :yocto_git:`yocto-4.0.25 </yocto-docs/log/?h=yocto-4.0.25>`
- Git Revision: :yocto_git:`c6dce0c77481dee7b0a0fcdc803f755ceccef234 </yocto-docs/commit/?id=c6dce0c77481dee7b0a0fcdc803f755ceccef234>`

View File

@@ -12,7 +12,6 @@ DISTRO_REL_TAG : "yocto-4.0"
DOCCONF_VERSION : "dev"
BITBAKE_SERIES : ""
YOCTO_DL_URL : "https://downloads.yoctoproject.org"
YOCTO_AB_URL : "https://autobuilder.yoctoproject.org"
YOCTO_RELEASE_DL_URL : "&YOCTO_DL_URL;/releases/yocto/yocto-&DISTRO;"
MIN_PYTHON_VERSION : "3.6.0"
MIN_TAR_VERSION : "1.28"

View File

@@ -488,7 +488,7 @@ You can also look for vulnerabilities in specific packages by passing
``-c cve_check`` to BitBake.
After building the software with Bitbake, CVE check output reports are available in ``tmp/deploy/cve``
and image specific summaries in ``tmp/deploy/images/*.cve`` or ``tmp/deploy/images/*.json`` files.
and image specific summaries in ``tmp/deploy/images/*.json`` files.
When building, the CVE checker will emit build time warnings for any detected
issues which are in the state ``Unpatched``, meaning that CVE issue seems to affect the software component

View File

@@ -12,7 +12,7 @@ Features provide a mechanism for working out which packages should be
included in the generated images. Distributions can select which
features they want to support through the :term:`DISTRO_FEATURES` variable,
which is set or appended to in a distribution's configuration file such
as ``poky.conf``, ``poky-tiny.conf``, ``poky-lsb.conf`` and so forth.
as ``poky.conf``, ``poky-tiny.conf``, ``poky-altcfg.conf`` and so forth.
Machine features are set in the :term:`MACHINE_FEATURES` variable, which is
set in the machine configuration file and specifies the hardware
features for a given machine.

View File

@@ -51,27 +51,6 @@ Here is a list of supported recipes:
- ``core-image-full-cmdline``: A console-only image with more
full-featured Linux system functionality installed.
- ``core-image-lsb``: An image that conforms to the Linux Standard Base
(LSB) specification. This image requires a distribution configuration
that enables LSB compliance (e.g. ``poky-lsb``). If you build
``core-image-lsb`` without that configuration, the image will not be
LSB-compliant.
- ``core-image-lsb-dev``: A ``core-image-lsb`` image that is suitable
for development work using the host. The image includes headers and
libraries you can use in a host development environment. This image
requires a distribution configuration that enables LSB compliance
(e.g. ``poky-lsb``). If you build ``core-image-lsb-dev`` without that
configuration, the image will not be LSB-compliant.
- ``core-image-lsb-sdk``: A ``core-image-lsb`` that includes everything
in the cross-toolchain but also includes development headers and
libraries to form a complete standalone SDK. This image requires a
distribution configuration that enables LSB compliance (e.g.
``poky-lsb``). If you build ``core-image-lsb-sdk`` without that
configuration, the image will not be LSB-compliant. This image is
suitable for development using the target.
- ``core-image-minimal``: A small image just capable of allowing a
device to boot.

View File

@@ -196,7 +196,7 @@ effort has been made to automate the tests so that more people can use
them and the Yocto Project development team can run them faster and more
efficiently.
The Yocto Project's main Autobuilder (&YOCTO_AB_URL;) publicly tests each Yocto
The Yocto Project's main :yocto_ab:`Autobuilder <>` publicly tests each Yocto
Project release's code in the :oe_git:`openembedded-core </openembedded-core>`,
:yocto_git:`poky </poky>` and :oe_git:`bitbake </bitbake>` repositories. The
testing occurs for both the current state of the "master" branch and also for

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.3 KiB

View File

@@ -1,6 +1,6 @@
# Standards for contributing to Yocto Project documentation
This document attemps to standardize the way the Yocto Project
This document attempts to standardize the way the Yocto Project
documentation is created.
It is currently a work in progress.

View File

@@ -119,12 +119,8 @@ https://autobuilder.yocto.io/pub/repro-fail/ in the form ``oe-reproducible +
The project's current reproducibility status can be seen at
:yocto_home:`/reproducible-build-results/`
You can also check the reproducibility status on supported host distributions:
- CentOS: :yocto_ab:`/typhoon/#/builders/reproducible-centos`
- Debian: :yocto_ab:`/typhoon/#/builders/reproducible-debian`
- Fedora: :yocto_ab:`/typhoon/#/builders/reproducible-fedora`
- Ubuntu: :yocto_ab:`/typhoon/#/builders/reproducible-ubuntu`
You can also check the reproducibility status on the Autobuilder:
:yocto_ab:`/valkyrie/#/builders/reproducible`.
===============================
Can I test my layer or recipes?

View File

@@ -20,7 +20,7 @@ helps review and test patches and this is his testing tree).
We have two broad categories of test builds, including "full" and
"quick". On the Autobuilder, these can be seen as "a-quick" and
"a-full", simply for ease of sorting in the UI. Use our Autobuilder
:yocto_ab:`console view </typhoon/#/console>` to see where we manage most
:yocto_ab:`console view </valkyrie/#/console>` to see where we manage most
test-related items.
Builds are triggered manually when the test branches are ready. The

View File

@@ -10,7 +10,7 @@ Execution Flow within the Autobuilder
The "a-full" and "a-quick" targets are the usual entry points into the
Autobuilder and it makes sense to follow the process through the system
starting there. This is best visualized from the :yocto_ab:`Autobuilder
Console view </typhoon/#/console>`.
Console view </valkyrie/#/console>`.
Each item along the top of that view represents some "target build" and
these targets are all run in parallel. The 'full' build will trigger the

View File

@@ -1,7 +1,7 @@
DISTRO = "poky"
DISTRO_NAME = "Poky (Yocto Project Reference Distro)"
#DISTRO_VERSION = "3.4+snapshot-${METADATA_REVISION}"
DISTRO_VERSION = "4.0.24"
DISTRO_VERSION = "4.0.26"
DISTRO_CODENAME = "kirkstone"
SDK_VENDOR = "-pokysdk"
SDK_VERSION = "${@d.getVar('DISTRO_VERSION').replace('snapshot-${METADATA_REVISION}', 'snapshot')}"
@@ -37,6 +37,7 @@ SANITY_TESTED_DISTROS ?= " \
ubuntu-18.04 \n \
ubuntu-20.04 \n \
ubuntu-22.04 \n \
ubuntu-24.04 \n \
fedora-37 \n \
fedora-39 \n \
fedora-40 \n \

View File

@@ -62,6 +62,8 @@ EXTRA_OECMAKE:append = " ${PACKAGECONFIG_CONFARGS}"
export CMAKE_BUILD_PARALLEL_LEVEL
CMAKE_BUILD_PARALLEL_LEVEL:task-compile = "${@oe.utils.parallel_make(d, False)}"
CMAKE_BUILD_PARALLEL_LEVEL:task-install = "${@oe.utils.parallel_make(d, True)}"
CMAKE_BUILD_PARALLEL_LEVEL:task-compile-ptest-base = "${@oe.utils.parallel_make(d, False)}"
CMAKE_BUILD_PARALLEL_LEVEL:task-install-ptest-base = "${@oe.utils.parallel_make(d, True)}"
OECMAKE_TARGET_COMPILE ?= "all"
OECMAKE_TARGET_INSTALL ?= "install"

View File

@@ -761,13 +761,7 @@ def package_qa_check_rdepends(pkg, pkgdest, skip, taskdeps, packages, d):
if rdep_data and 'PN' in rdep_data and rdep_data['PN'] in taskdeps:
continue
if not rdep_data or not 'PN' in rdep_data:
pkgdata_dir = d.getVar("PKGDATA_DIR")
try:
possibles = os.listdir("%s/runtime-rprovides/%s/" % (pkgdata_dir, rdepend))
except OSError:
possibles = []
for p in possibles:
rdep_data = oe.packagedata.read_subpkgdata(p, d)
for _, rdep_data in oe.packagedata.foreach_runtime_provider_pkgdata(d, rdepend):
if rdep_data and 'PN' in rdep_data and rdep_data['PN'] in taskdeps:
break
if rdep_data and 'PN' in rdep_data and rdep_data['PN'] in taskdeps:
@@ -811,17 +805,17 @@ def package_qa_check_rdepends(pkg, pkgdest, skip, taskdeps, packages, d):
# perl
filerdepends.pop(rdep,None)
# For Saving the FILERPROVIDES, RPROVIDES and FILES_INFO
rdep_data = oe.packagedata.read_subpkgdata(rdep, d)
for key in rdep_data:
if key.startswith("FILERPROVIDES:") or key.startswith("RPROVIDES:"):
for subkey in bb.utils.explode_deps(rdep_data[key]):
filerdepends.pop(subkey,None)
# Add the files list to the rprovides
if key.startswith("FILES_INFO:"):
# Use eval() to make it as a dict
for subkey in eval(rdep_data[key]):
filerdepends.pop(subkey,None)
for _, rdep_data in oe.packagedata.foreach_runtime_provider_pkgdata(d, rdep, True):
for key in rdep_data:
if key.startswith("FILERPROVIDES:") or key.startswith("RPROVIDES:"):
for subkey in bb.utils.explode_deps(rdep_data[key]):
filerdepends.pop(subkey,None)
# Add the files list to the rprovides
if key.startswith("FILES_INFO:"):
# Use eval() to make it as a dict
for subkey in eval(rdep_data[key]):
filerdepends.pop(subkey,None)
if not filerdepends:
# Break if all the file rdepends are met
break

View File

@@ -23,6 +23,7 @@ RECIPE_SYSROOT = "${WORKDIR}/recipe-sysroot"
#
PACKAGE_ARCH = "${SDK_ARCH}-${SDKPKGSUFFIX}"
PACKAGE_ARCHS = "${SDK_PACKAGE_ARCHS}"
TUNE_PKGARCH = "${SDK_ARCH}"
#
# We need chrpath >= 0.14 to ensure we can deal with 32 and 64 bit

View File

@@ -54,8 +54,8 @@ def qemu_run_binary(data, rootfs_path, binary):
# this dance). For others (e.g. arm) a -cpu option is not necessary, since the
# qemu-arm default CPU supports all required architecture levels.
QEMU_OPTIONS = "-r ${OLDEST_KERNEL} ${@d.getVar("QEMU_EXTRAOPTIONS_%s" % d.getVar('PACKAGE_ARCH')) or ""}"
QEMU_OPTIONS[vardeps] += "QEMU_EXTRAOPTIONS_${PACKAGE_ARCH}"
QEMU_OPTIONS = "-r ${OLDEST_KERNEL} ${@d.getVar("QEMU_EXTRAOPTIONS_%s" % d.getVar('TUNE_PKGARCH')) or ""}"
QEMU_OPTIONS[vardeps] += "QEMU_EXTRAOPTIONS_${TUNE_PKGARCH}"
QEMU_EXTRAOPTIONS_ppce500v2 = " -cpu e500v2"
QEMU_EXTRAOPTIONS_ppce500mc = " -cpu e500mc"
@@ -65,7 +65,3 @@ QEMU_EXTRAOPTIONS_ppce6500 = " -cpu e500mc"
QEMU_EXTRAOPTIONS_ppc64e6500 = " -cpu e500mc"
QEMU_EXTRAOPTIONS_ppc7400 = " -cpu 7400"
QEMU_EXTRAOPTIONS_powerpc64le = " -cpu POWER9"
# Some packages e.g. fwupd sets PACKAGE_ARCH = MACHINE_ARCH and uses meson which
# needs right options to usermode qemu
QEMU_EXTRAOPTIONS_qemuppc = " -cpu 7400"
QEMU_EXTRAOPTIONS_qemuppc64 = " -cpu POWER9"

View File

@@ -6,7 +6,7 @@ FILES:${PN} += "${rustlibdir}/*.so"
FILES:${PN}-dev += "${rustlibdir}/*.rlib ${rustlibdir}/*.rmeta"
FILES:${PN}-dbg += "${rustlibdir}/.debug"
RUSTLIB = "-L ${STAGING_LIBDIR}/rust"
RUSTLIB ?= "-L ${STAGING_LIBDIR}/rust"
RUST_DEBUG_REMAP = "--remap-path-prefix=${WORKDIR}=/usr/src/debug/${PN}/${EXTENDPE}${PV}-${PR}"
RUSTFLAGS += "${RUSTLIB} ${RUST_DEBUG_REMAP}"
RUSTLIB_DEP ?= "libstd-rs"

View File

@@ -6,10 +6,10 @@
# to the distro running on the build machine.
#
UNINATIVE_MAXGLIBCVERSION = "2.40"
UNINATIVE_VERSION = "4.6"
UNINATIVE_MAXGLIBCVERSION = "2.41"
UNINATIVE_VERSION = "4.7"
UNINATIVE_URL ?= "http://downloads.yoctoproject.org/releases/uninative/${UNINATIVE_VERSION}/"
UNINATIVE_CHECKSUM[aarch64] ?= "c2d36338272eba101580f648dd8dff5352cdb4c1809db7dedf8fc4d7e7df716c"
UNINATIVE_CHECKSUM[i686] ?= "0041584678109c18deca48fb59eaf14cf725cf024a170ab537b354b63240c504"
UNINATIVE_CHECKSUM[x86_64] ?= "6bf00154c5a7bc48adbf63fd17684bb87eb07f4814fbb482a3fbd817c1ccf4c5"
UNINATIVE_CHECKSUM[aarch64] ?= "ac440e4fc80665c79f9718c665c6e28d771e51609c088c3c97ba3ad5cfed197a"
UNINATIVE_CHECKSUM[i686] ?= "c5efa31450f3bbd63ea961d4e7c747ae41317937d429f65e1d5cf2050338e27a"
UNINATIVE_CHECKSUM[x86_64] ?= "5800d4e9a129d1be09cf548918d25f74e91a7c1193ae5239d5b0c9246c486d2c"

View File

@@ -1,6 +1,11 @@
#!/bin/sh
export LC_ALL=en_US.UTF-8
# The pipefail option is now part of POSIX (POSIX.1-2024) and available in more
# and more shells. Enable it if available to make the SDK installer more robust.
(set -o pipefail 2> /dev/null) && set -o pipefail
#Make sure at least one python is installed
INIT_PYTHON=$(which python3 2>/dev/null )
[ -z "$INIT_PYTHON" ] && INIT_PYTHON=$(which python2 2>/dev/null)

View File

@@ -108,3 +108,18 @@ def recipename(pkg, d):
"""Return the recipe name for the given binary package name."""
return pkgmap(d).get(pkg)
def foreach_runtime_provider_pkgdata(d, rdep, include_rdep=False):
pkgdata_dir = d.getVar("PKGDATA_DIR")
possibles = set()
try:
possibles |= set(os.listdir("%s/runtime-rprovides/%s/" % (pkgdata_dir, rdep)))
except OSError:
pass
if include_rdep:
possibles.add(rdep)
for p in sorted(list(possibles)):
rdep_data = read_subpkgdata(p, d)
yield p, rdep_data

View File

@@ -0,0 +1,68 @@
From ea703528a8581a2ea7e0bad424a70fdf0aec7d8f Mon Sep 17 00:00:00 2001
From: B Horn <b@horn.uk>
Date: Sat, 15 Jun 2024 02:33:08 +0100
Subject: [PATCH 1/2] misc: Implement grub_strlcpy()
grub_strlcpy() acts the same way as strlcpy() does on most *NIX,
returning the length of src and ensuring dest is always NUL
terminated except when size is 0.
Signed-off-by: B Horn <b@horn.uk>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=ea703528a8581a2ea7e0bad424a70fdf0aec7d8f]
Signed-off-by: Peter Marko <peter.marko@siemens.com>
---
include/grub/misc.h | 39 +++++++++++++++++++++++++++++++++++++++
1 file changed, 39 insertions(+)
diff --git a/include/grub/misc.h b/include/grub/misc.h
index 1578f36c3..14d8f37ac 100644
--- a/include/grub/misc.h
+++ b/include/grub/misc.h
@@ -64,6 +64,45 @@ grub_stpcpy (char *dest, const char *src)
return d - 1;
}
+static inline grub_size_t
+grub_strlcpy (char *dest, const char *src, grub_size_t size)
+{
+ char *d = dest;
+ grub_size_t res = 0;
+ /*
+ * We do not subtract one from size here to avoid dealing with underflowing
+ * the value, which is why to_copy is always checked to be greater than one
+ * throughout this function.
+ */
+ grub_size_t to_copy = size;
+
+ /* Copy size - 1 bytes to dest. */
+ if (to_copy > 1)
+ while ((*d++ = *src++) != '\0' && ++res && --to_copy > 1)
+ ;
+
+ /*
+ * NUL terminate if size != 0. The previous step may have copied a NUL byte
+ * if it reached the end of the string, but we know dest[size - 1] must always
+ * be a NUL byte.
+ */
+ if (size != 0)
+ dest[size - 1] = '\0';
+
+ /* If there is still space in dest, but are here, we reached the end of src. */
+ if (to_copy > 1)
+ return res;
+
+ /*
+ * If we haven't reached the end of the string, iterate through to determine
+ * the strings total length.
+ */
+ while (*src++ != '\0' && ++res)
+ ;
+
+ return res;
+}
+
/* XXX: If grub_memmove is too slow, we must implement grub_memcpy. */
static inline void *
grub_memcpy (void *dest, const void *src, grub_size_t n)

View File

@@ -0,0 +1,40 @@
From 2c34af908ebf4856051ed29e46d88abd2b20387f Mon Sep 17 00:00:00 2001
From: Daniel Axtens <dja@axtens.net>
Date: Fri, 8 Mar 2024 22:47:20 +1100
Subject: [PATCH] video/readers/jpeg: Do not permit duplicate SOF0 markers in
JPEG
Otherwise a subsequent header could change the height and width
allowing future OOB writes.
Fixes: CVE-2024-45774
Reported-by: Nils Langius <nils@langius.de>
Signed-off-by: Daniel Axtens <dja@axtens.net>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2024-45774
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=2c34af908ebf4856051ed29e46d88abd2b20387f]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/video/readers/jpeg.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/grub-core/video/readers/jpeg.c b/grub-core/video/readers/jpeg.c
index 6019b6a..5e5e39c 100644
--- a/grub-core/video/readers/jpeg.c
+++ b/grub-core/video/readers/jpeg.c
@@ -330,6 +330,10 @@ grub_jpeg_decode_sof (struct grub_jpeg_data *data)
if (grub_errno != GRUB_ERR_NONE)
return grub_errno;
+ if (data->image_height != 0 || data->image_width != 0)
+ return grub_error (GRUB_ERR_BAD_FILE_TYPE,
+ "jpeg: cannot have duplicate SOF0 markers");
+
if (grub_jpeg_get_byte (data) != 8)
return grub_error (GRUB_ERR_BAD_FILE_TYPE,
"jpeg: only 8-bit precision is supported");
--
2.25.1

View File

@@ -0,0 +1,41 @@
From 05be856a8c3aae41f5df90cab7796ab7ee34b872 Mon Sep 17 00:00:00 2001
From: Lidong Chen <lidong.chen@oracle.com>
Date: Fri, 22 Nov 2024 06:27:55 +0000
Subject: [PATCH] commands/extcmd: Missing check for failed allocation
The grub_extcmd_dispatcher() calls grub_arg_list_alloc() to allocate
a grub_arg_list struct but it does not verify the allocation was successful.
In case of failed allocation the NULL state pointer can be accessed in
parse_option() through grub_arg_parse() which may lead to a security issue.
Fixes: CVE-2024-45775
Reported-by: Nils Langius <nils@langius.de>
Signed-off-by: Lidong Chen <lidong.chen@oracle.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
Reviewed-by: Alec Brown <alec.r.brown@oracle.com>
CVE: CVE-2024-45775
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=05be856a8c3aae41f5df90cab7796ab7ee34b872]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/commands/extcmd.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/grub-core/commands/extcmd.c b/grub-core/commands/extcmd.c
index 90a5ca2..c236be1 100644
--- a/grub-core/commands/extcmd.c
+++ b/grub-core/commands/extcmd.c
@@ -49,6 +49,9 @@ grub_extcmd_dispatcher (struct grub_command *cmd, int argc, char **args,
}
state = grub_arg_list_alloc (ext, argc, args);
+ if (state == NULL)
+ return grub_errno;
+
if (grub_arg_parse (ext, argc, args, state, &new_args, &new_argc))
{
context.state = state;
--
2.25.1

View File

@@ -0,0 +1,42 @@
From 09bd6eb58b0f71ec273916070fa1e2de16897a91 Mon Sep 17 00:00:00 2001
From: Lidong Chen <lidong.chen@oracle.com>
Date: Fri, 22 Nov 2024 06:27:56 +0000
Subject: [PATCH] gettext: Integer overflow leads to heap OOB write or read
Calculation of ctx->grub_gettext_msg_list size in grub_mofile_open() may
overflow leading to subsequent OOB write or read. This patch fixes the
issue by replacing grub_zalloc() and explicit multiplication with
grub_calloc() which does the same thing in safe manner.
Fixes: CVE-2024-45776
Reported-by: Nils Langius <nils@langius.de>
Signed-off-by: Lidong Chen <lidong.chen@oracle.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
Reviewed-by: Alec Brown <alec.r.brown@oracle.com>
CVE: CVE-2024-45776
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=09bd6eb58b0f71ec273916070fa1e2de16897a91]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/gettext/gettext.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/grub-core/gettext/gettext.c b/grub-core/gettext/gettext.c
index 4d02e62..55d8b67 100644
--- a/grub-core/gettext/gettext.c
+++ b/grub-core/gettext/gettext.c
@@ -323,8 +323,8 @@ grub_mofile_open (struct grub_gettext_context *ctx,
for (ctx->grub_gettext_max_log = 0; ctx->grub_gettext_max >> ctx->grub_gettext_max_log;
ctx->grub_gettext_max_log++);
- ctx->grub_gettext_msg_list = grub_zalloc (ctx->grub_gettext_max
- * sizeof (ctx->grub_gettext_msg_list[0]));
+ ctx->grub_gettext_msg_list = grub_calloc (ctx->grub_gettext_max,
+ sizeof (ctx->grub_gettext_msg_list[0]));
if (!ctx->grub_gettext_msg_list)
{
grub_file_close (fd);
--
2.25.1

View File

@@ -0,0 +1,60 @@
From b970a5ed967816bbca8225994cd0ee2557bad515 Mon Sep 17 00:00:00 2001
From: Lidong Chen <lidong.chen@oracle.com>
Date: Fri, 22 Nov 2024 06:27:57 +0000
Subject: [PATCH] gettext: Integer overflow leads to heap OOB write
The size calculation of the translation buffer in
grub_gettext_getstr_from_position() may overflow
to 0 leading to heap OOB write. This patch fixes
the issue by using grub_add() and checking for
an overflow.
Fixes: CVE-2024-45777
Reported-by: Nils Langius <nils@langius.de>
Signed-off-by: Lidong Chen <lidong.chen@oracle.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
Reviewed-by: Alec Brown <alec.r.brown@oracle.com>
CVE: CVE-2024-45777
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=b970a5ed967816bbca8225994cd0ee2557bad515]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/gettext/gettext.c | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/grub-core/gettext/gettext.c b/grub-core/gettext/gettext.c
index 55d8b67..85ea44a 100644
--- a/grub-core/gettext/gettext.c
+++ b/grub-core/gettext/gettext.c
@@ -26,6 +26,7 @@
#include <grub/file.h>
#include <grub/kernel.h>
#include <grub/i18n.h>
+#include <grub/safemath.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -99,6 +100,7 @@ grub_gettext_getstr_from_position (struct grub_gettext_context *ctx,
char *translation;
struct string_descriptor desc;
grub_err_t err;
+ grub_size_t alloc_sz;
internal_position = (off + position * sizeof (desc));
@@ -109,7 +111,10 @@ grub_gettext_getstr_from_position (struct grub_gettext_context *ctx,
length = grub_cpu_to_le32 (desc.length);
offset = grub_cpu_to_le32 (desc.offset);
- translation = grub_malloc (length + 1);
+ if (grub_add (length, 1, &alloc_sz))
+ return NULL;
+
+ translation = grub_malloc (alloc_sz);
if (!translation)
return NULL;
--
2.25.1

View File

@@ -0,0 +1,58 @@
From 26db6605036bd9e5b16d9068a8cc75be63b8b630 Mon Sep 17 00:00:00 2001
From: Daniel Axtens <dja@axtens.net>
Date: Sat, 23 Mar 2024 15:59:43 +1100
Subject: [PATCH] fs/bfs: Disable under lockdown
The BFS is not fuzz-clean. Don't allow it to be loaded under lockdown.
This will also disable the AFS.
Fixes: CVE-2024-45778
Fixes: CVE-2024-45779
Reported-by: Nils Langius <nils@langius.de>
Signed-off-by: Daniel Axtens <dja@axtens.net>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2024-45778
CVE: CVE-2024-45779
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=26db6605036bd9e5b16d9068a8cc75be63b8b630]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/fs/bfs.c | 9 +++++++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/grub-core/fs/bfs.c b/grub-core/fs/bfs.c
index 47dbe20..8d704e2 100644
--- a/grub-core/fs/bfs.c
+++ b/grub-core/fs/bfs.c
@@ -30,6 +30,7 @@
#include <grub/types.h>
#include <grub/i18n.h>
#include <grub/fshelp.h>
+#include <grub/lockdown.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -1104,7 +1105,10 @@ GRUB_MOD_INIT (bfs)
{
COMPILE_TIME_ASSERT (1 << LOG_EXTENT_SIZE ==
sizeof (struct grub_bfs_extent));
- grub_fs_register (&grub_bfs_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_bfs_fs);
+ }
}
#ifdef MODE_AFS
@@ -1113,5 +1117,6 @@ GRUB_MOD_FINI (afs)
GRUB_MOD_FINI (bfs)
#endif
{
- grub_fs_unregister (&grub_bfs_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_bfs_fs);
}
--
2.25.1

View File

@@ -0,0 +1,96 @@
From 0087bc6902182fe5cedce2d034c75a79cf6dd4f3 Mon Sep 17 00:00:00 2001
From: Lidong Chen <lidong.chen@oracle.com>
Date: Fri, 22 Nov 2024 06:27:58 +0000
Subject: [PATCH] fs/tar: Integer overflow leads to heap OOB write
Both namesize and linksize are derived from hd.size, a 12-digit octal
number parsed by read_number(). Later direct arithmetic calculation like
"namesize + 1" and "linksize + 1" may exceed the maximum value of
grub_size_t leading to heap OOB write. This patch fixes the issue by
using grub_add() and checking for an overflow.
Fixes: CVE-2024-45780
Reported-by: Nils Langius <nils@langius.de>
Signed-off-by: Lidong Chen <lidong.chen@oracle.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
Reviewed-by: Alec Brown <alec.r.brown@oracle.com>
CVE: CVE-2024-45780
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=0087bc6902182fe5cedce2d034c75a79cf6dd4f3]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/fs/tar.c | 23 ++++++++++++++++++-----
1 file changed, 18 insertions(+), 5 deletions(-)
diff --git a/grub-core/fs/tar.c b/grub-core/fs/tar.c
index c551ed6..a9e39b0 100644
--- a/grub-core/fs/tar.c
+++ b/grub-core/fs/tar.c
@@ -25,6 +25,7 @@
#include <grub/mm.h>
#include <grub/dl.h>
#include <grub/i18n.h>
+#include <grub/safemath.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -76,6 +77,7 @@ grub_cpio_find_file (struct grub_archelp_data *data, char **name,
{
struct head hd;
int reread = 0, have_longname = 0, have_longlink = 0;
+ grub_size_t sz;
data->hofs = data->next_hofs;
@@ -97,7 +99,11 @@ grub_cpio_find_file (struct grub_archelp_data *data, char **name,
{
grub_err_t err;
grub_size_t namesize = read_number (hd.size, sizeof (hd.size));
- *name = grub_malloc (namesize + 1);
+
+ if (grub_add (namesize, 1, &sz))
+ return grub_error (GRUB_ERR_BAD_FS, N_("name size overflow"));
+
+ *name = grub_malloc (sz);
if (*name == NULL)
return grub_errno;
err = grub_disk_read (data->disk, 0,
@@ -117,15 +123,19 @@ grub_cpio_find_file (struct grub_archelp_data *data, char **name,
{
grub_err_t err;
grub_size_t linksize = read_number (hd.size, sizeof (hd.size));
- if (data->linkname_alloc < linksize + 1)
+
+ if (grub_add (linksize, 1, &sz))
+ return grub_error (GRUB_ERR_BAD_FS, N_("link size overflow"));
+
+ if (data->linkname_alloc < sz)
{
char *n;
- n = grub_calloc (2, linksize + 1);
+ n = grub_calloc (2, sz);
if (!n)
return grub_errno;
grub_free (data->linkname);
data->linkname = n;
- data->linkname_alloc = 2 * (linksize + 1);
+ data->linkname_alloc = 2 * (sz);
}
err = grub_disk_read (data->disk, 0,
@@ -148,7 +158,10 @@ grub_cpio_find_file (struct grub_archelp_data *data, char **name,
while (extra_size < sizeof (hd.prefix)
&& hd.prefix[extra_size])
extra_size++;
- *name = grub_malloc (sizeof (hd.name) + extra_size + 2);
+
+ if (grub_add (sizeof (hd.name) + 2, extra_size, &sz))
+ return grub_error (GRUB_ERR_BAD_FS, N_("long name size overflow"));
+ *name = grub_malloc (sz);
if (*name == NULL)
return grub_errno;
if (hd.prefix[0])
--
2.25.1

View File

@@ -0,0 +1,38 @@
From c1a291b01f4f1dcd6a22b61f1c81a45a966d16ba Mon Sep 17 00:00:00 2001
From: B Horn <b@horn.uk>
Date: Sun, 12 May 2024 02:03:33 +0100
Subject: [PATCH 2/2] fs/ufs: Fix a heap OOB write
grub_strcpy() was used to copy a symlink name from the filesystem
image to a heap allocated buffer. This led to a OOB write to adjacent
heap allocations. Fix by using grub_strlcpy().
Fixes: CVE-2024-45781
Reported-by: B Horn <b@horn.uk>
Signed-off-by: B Horn <b@horn.uk>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2024-45781
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=c1a291b01f4f1dcd6a22b61f1c81a45a966d16ba]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/fs/ufs.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/grub-core/fs/ufs.c b/grub-core/fs/ufs.c
index 34a698b..4727266 100644
--- a/grub-core/fs/ufs.c
+++ b/grub-core/fs/ufs.c
@@ -463,7 +463,7 @@ grub_ufs_lookup_symlink (struct grub_ufs_data *data, int ino)
/* Check against zero is paylindromic, no need to swap. */
if (data->inode.nblocks == 0
&& INODE_SIZE (data) <= sizeof (data->inode.symlink))
- grub_strcpy (symlink, (char *) data->inode.symlink);
+ grub_strlcpy (symlink, (char *) data->inode.symlink, sz);
else
{
if (grub_ufs_read_file (data, 0, 0, 0, sz, symlink) < 0)
--
2.25.1

View File

@@ -0,0 +1,39 @@
From 417547c10410b714e43f08f74137c24015f8f4c3 Mon Sep 17 00:00:00 2001
From: B Horn <b@horn.uk>
Date: Sun, 12 May 2024 02:48:33 +0100
Subject: [PATCH] fs/hfs: Fix stack OOB write with grub_strcpy()
Replaced with grub_strlcpy().
Fixes: CVE-2024-45782
Fixes: CVE-2024-56737
Fixes: https://savannah.gnu.org/bugs/?66599
Reported-by: B Horn <b@horn.uk>
Signed-off-by: B Horn <b@horn.uk>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2024-45782
CVE: CVE-2024-56737
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=417547c10410b714e43f08f74137c24015f8f4c3]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/fs/hfs.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/grub-core/fs/hfs.c b/grub-core/fs/hfs.c
index f419965..bb7af5f 100644
--- a/grub-core/fs/hfs.c
+++ b/grub-core/fs/hfs.c
@@ -379,7 +379,7 @@ grub_hfs_mount (grub_disk_t disk)
volume name. */
key.parent_dir = grub_cpu_to_be32_compile_time (1);
key.strlen = data->sblock.volname[0];
- grub_strcpy ((char *) key.str, (char *) (data->sblock.volname + 1));
+ grub_strlcpy ((char *) key.str, (char *) (data->sblock.volname + 1), sizeof (key.str));
if (grub_hfs_find_node (data, (char *) &key, data->cat_root,
0, (char *) &dir, sizeof (dir)) == 0)
--
2.25.1

View File

@@ -0,0 +1,42 @@
From f7c070a2e28dfab7137db0739fb8db1dc02d8898 Mon Sep 17 00:00:00 2001
From: B Horn <b@horn.uk>
Date: Sun, 12 May 2024 06:22:51 +0100
Subject: [PATCH] fs/hfsplus: Set a grub_errno if mount fails
It was possible for mount to fail but not set grub_errno. This led to
a possible double decrement of the module reference count if the NULL
page was mapped.
Fixing in general as a similar bug was fixed in commit 61b13c187
(fs/hfsplus: Set grub_errno to prevent NULL pointer access) and there
are likely more variants around.
Fixes: CVE-2024-45783
Reported-by: B Horn <b@horn.uk>
Signed-off-by: B Horn <b@horn.uk>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2024-45783
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=f7c070a2e28dfab7137db0739fb8db1dc02d8898]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/fs/hfsplus.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/grub-core/fs/hfsplus.c b/grub-core/fs/hfsplus.c
index 19c7b33..e7fd98a 100644
--- a/grub-core/fs/hfsplus.c
+++ b/grub-core/fs/hfsplus.c
@@ -393,7 +393,7 @@ grub_hfsplus_mount (grub_disk_t disk)
fail:
- if (grub_errno == GRUB_ERR_OUT_OF_RANGE)
+ if (grub_errno == GRUB_ERR_OUT_OF_RANGE || grub_errno == GRUB_ERR_NONE)
grub_error (GRUB_ERR_BAD_FS, "not a HFS+ filesystem");
grub_free (data);
--
2.25.1

View File

@@ -0,0 +1,39 @@
From 2123c5bca7e21fbeb0263df4597ddd7054700726 Mon Sep 17 00:00:00 2001
From: B Horn <b@horn.uk>
Date: Fri, 1 Nov 2024 19:24:29 +0000
Subject: [PATCH 1/3] commands/pgp: Unregister the "check_signatures" hooks on
module unload
If the hooks are not removed they can be called after the module has
been unloaded leading to an use-after-free.
Fixes: CVE-2025-0622
Reported-by: B Horn <b@horn.uk>
Signed-off-by: B Horn <b@horn.uk>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2025-0622
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=2123c5bca7e21fbeb0263df4597ddd7054700726]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/commands/pgp.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/grub-core/commands/pgp.c b/grub-core/commands/pgp.c
index 5daa1e9..1abdea6 100644
--- a/grub-core/commands/pgp.c
+++ b/grub-core/commands/pgp.c
@@ -1010,6 +1010,8 @@ GRUB_MOD_INIT(pgp)
GRUB_MOD_FINI(pgp)
{
+ grub_register_variable_hook ("check_signatures", NULL, NULL);
+ grub_env_unset ("check_signatures");
grub_verifier_unregister (&grub_pubkey_verifier);
grub_unregister_extcmd (cmd);
grub_unregister_extcmd (cmd_trust);
--
2.25.1

View File

@@ -0,0 +1,44 @@
From 9c16197734ada8d0838407eebe081117799bfe67 Mon Sep 17 00:00:00 2001
From: B Horn <b@horn.uk>
Date: Fri, 1 Nov 2024 23:46:55 +0000
Subject: [PATCH 2/3] normal: Remove variables hooks on module unload
The normal module does not entirely cleanup after itself in
its GRUB_MOD_FINI() leaving a few variables hooks in place.
It is not possible to unload normal module now but fix the
issues for completeness.
On the occasion replace 0s with NULLs for "pager" variable
hooks unregister.
Fixes: CVE-2025-0622
Reported-by: B Horn <b@horn.uk>
Signed-off-by: B Horn <b@horn.uk>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2025-0622
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=9c16197734ada8d0838407eebe081117799bfe67]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/normal/main.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/grub-core/normal/main.c b/grub-core/normal/main.c
index c4ebe9e..31c53a6 100644
--- a/grub-core/normal/main.c
+++ b/grub-core/normal/main.c
@@ -581,7 +581,9 @@ GRUB_MOD_FINI(normal)
grub_xputs = grub_xputs_saved;
grub_set_history (0);
- grub_register_variable_hook ("pager", 0, 0);
+ grub_register_variable_hook ("pager", NULL, NULL);
+ grub_register_variable_hook ("color_normal", NULL, NULL);
+ grub_register_variable_hook ("color_highlight", NULL, NULL);
grub_fs_autoload_hook = 0;
grub_unregister_command (cmd_clear);
}
--
2.25.1

View File

@@ -0,0 +1,41 @@
From 7580addfc8c94cedb0cdfd7a1fd65b539215e637 Mon Sep 17 00:00:00 2001
From: B Horn <b@horn.uk>
Date: Fri, 1 Nov 2024 23:52:06 +0000
Subject: [PATCH 3/3] gettext: Remove variables hooks on module unload
The gettext module does not entirely cleanup after itself in
its GRUB_MOD_FINI() leaving a few variables hooks in place.
It is not possible to unload gettext module because normal
module depends on it. Though fix the issues for completeness.
Fixes: CVE-2025-0622
Reported-by: B Horn <b@horn.uk>
Signed-off-by: B Horn <b@horn.uk>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2025-0622
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=7580addfc8c94cedb0cdfd7a1fd65b539215e637]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/gettext/gettext.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/grub-core/gettext/gettext.c b/grub-core/gettext/gettext.c
index 85ea44a..7a25c9d 100644
--- a/grub-core/gettext/gettext.c
+++ b/grub-core/gettext/gettext.c
@@ -540,6 +540,10 @@ GRUB_MOD_INIT (gettext)
GRUB_MOD_FINI (gettext)
{
+ grub_register_variable_hook ("locale_dir", NULL, NULL);
+ grub_register_variable_hook ("secondary_locale_dir", NULL, NULL);
+ grub_register_variable_hook ("lang", NULL, NULL);
+
grub_gettext_delete_list (&main_context);
grub_gettext_delete_list (&secondary_context);
--
2.25.1

View File

@@ -0,0 +1,87 @@
From 5eef88152833062a3f7e017535372d64ac8ef7e1 Mon Sep 17 00:00:00 2001
From: B Horn <b@horn.uk>
Date: Fri, 15 Nov 2024 13:12:09 +0000
Subject: [PATCH] net: Fix OOB write in grub_net_search_config_file()
The function included a call to grub_strcpy() which copied data from an
environment variable to a buffer allocated in grub_cmd_normal(). The
grub_cmd_normal() didn't consider the length of the environment variable.
So, the copy operation could exceed the allocation and lead to an OOB
write. Fix the issue by replacing grub_strcpy() with grub_strlcpy() and
pass the underlying buffers size to the grub_net_search_config_file().
Fixes: CVE-2025-0624
Reported-by: B Horn <b@horn.uk>
Signed-off-by: B Horn <b@horn.uk>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2025-0624
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=5eef88152833062a3f7e017535372d64ac8ef7e1]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/net/net.c | 7 ++++---
grub-core/normal/main.c | 2 +-
include/grub/net.h | 2 +-
3 files changed, 6 insertions(+), 5 deletions(-)
diff --git a/grub-core/net/net.c b/grub-core/net/net.c
index 4d3eb5c..ec7f01c 100644
--- a/grub-core/net/net.c
+++ b/grub-core/net/net.c
@@ -1773,14 +1773,15 @@ grub_config_search_through (char *config, char *suffix,
}
grub_err_t
-grub_net_search_config_file (char *config)
+grub_net_search_config_file (char *config, grub_size_t config_buf_len)
{
- grub_size_t config_len;
+ grub_size_t config_len, suffix_len;
char *suffix;
config_len = grub_strlen (config);
config[config_len] = '-';
suffix = config + config_len + 1;
+ suffix_len = config_buf_len - (config_len + 1);
struct grub_net_network_level_interface *inf;
FOR_NET_NETWORK_LEVEL_INTERFACES (inf)
@@ -1806,7 +1807,7 @@ grub_net_search_config_file (char *config)
if (client_uuid)
{
- grub_strcpy (suffix, client_uuid);
+ grub_strlcpy (suffix, client_uuid, suffix_len);
if (grub_config_search_through (config, suffix, 1, 0) == 0)
return GRUB_ERR_NONE;
}
diff --git a/grub-core/normal/main.c b/grub-core/normal/main.c
index 31c53a6..a95c25e 100644
--- a/grub-core/normal/main.c
+++ b/grub-core/normal/main.c
@@ -344,7 +344,7 @@ grub_cmd_normal (struct grub_command *cmd __attribute__ ((unused)),
if (grub_strncmp (prefix + 1, "tftp", sizeof ("tftp") - 1) == 0 &&
!disable_net_search)
- grub_net_search_config_file (config);
+ grub_net_search_config_file (config, config_len);
grub_enter_normal_mode (config);
grub_free (config);
diff --git a/include/grub/net.h b/include/grub/net.h
index 7ae4b6b..d6ba8b1 100644
--- a/include/grub/net.h
+++ b/include/grub/net.h
@@ -570,7 +570,7 @@ void
grub_net_remove_dns_server (const struct grub_net_network_level_address *s);
grub_err_t
-grub_net_search_config_file (char *config);
+grub_net_search_config_file (char *config, grub_size_t config_buf_len);
extern char *grub_net_default_server;
--
2.25.1

View File

@@ -0,0 +1,380 @@
From 47b2dfc7953f70f98ddf35dfdd6e7f4f20283b10 Mon Sep 17 00:00:00 2001
From: Daniel Axtens <dja@axtens.net>
Date: Sat, 23 Mar 2024 16:20:45 +1100
Subject: [PATCH] fs: Disable many filesystems under lockdown
The idea is to permit the following: btrfs, cpio, exfat, ext, f2fs, fat,
hfsplus, iso9660, squash4, tar, xfs and zfs.
The JFS, ReiserFS, romfs, UDF and UFS security vulnerabilities were
reported by Jonathan Bar Or <jonathanbaror@gmail.com>.
Fixes: CVE-2025-0677
Fixes: CVE-2025-0684
Fixes: CVE-2025-0685
Fixes: CVE-2025-0686
Fixes: CVE-2025-0689
Suggested-by: Daniel Axtens <dja@axtens.net>
Signed-off-by: Daniel Axtens <dja@axtens.net>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2025-0677
CVE: CVE-2025-0684
CVE: CVE-2025-0685
CVE: CVE-2025-0686
CVE: CVE-2025-0689
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=47b2dfc7953f70f98ddf35dfdd6e7f4f20283b10]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/fs/affs.c | 9 +++++++--
grub-core/fs/cbfs.c | 9 +++++++--
grub-core/fs/jfs.c | 9 +++++++--
grub-core/fs/minix.c | 9 +++++++--
grub-core/fs/nilfs2.c | 9 +++++++--
grub-core/fs/ntfs.c | 9 +++++++--
grub-core/fs/reiserfs.c | 9 +++++++--
grub-core/fs/romfs.c | 9 +++++++--
grub-core/fs/sfs.c | 9 +++++++--
grub-core/fs/udf.c | 9 +++++++--
grub-core/fs/ufs.c | 9 +++++++--
11 files changed, 77 insertions(+), 22 deletions(-)
diff --git a/grub-core/fs/affs.c b/grub-core/fs/affs.c
index cafcd0f..d676532 100644
--- a/grub-core/fs/affs.c
+++ b/grub-core/fs/affs.c
@@ -26,6 +26,7 @@
#include <grub/types.h>
#include <grub/fshelp.h>
#include <grub/charset.h>
+#include <grub/lockdown.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -699,11 +700,15 @@ static struct grub_fs grub_affs_fs =
GRUB_MOD_INIT(affs)
{
- grub_fs_register (&grub_affs_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_affs_fs);
+ }
my_mod = mod;
}
GRUB_MOD_FINI(affs)
{
- grub_fs_unregister (&grub_affs_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_affs_fs);
}
diff --git a/grub-core/fs/cbfs.c b/grub-core/fs/cbfs.c
index 581215e..477a14e 100644
--- a/grub-core/fs/cbfs.c
+++ b/grub-core/fs/cbfs.c
@@ -26,6 +26,7 @@
#include <grub/dl.h>
#include <grub/i18n.h>
#include <grub/cbfs_core.h>
+#include <grub/lockdown.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -390,12 +391,16 @@ GRUB_MOD_INIT (cbfs)
#if (defined (__i386__) || defined (__x86_64__)) && !defined (GRUB_UTIL) && !defined (GRUB_MACHINE_EMU) && !defined (GRUB_MACHINE_XEN)
init_cbfsdisk ();
#endif
- grub_fs_register (&grub_cbfs_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_cbfs_fs);
+ }
}
GRUB_MOD_FINI (cbfs)
{
- grub_fs_unregister (&grub_cbfs_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_cbfs_fs);
#if (defined (__i386__) || defined (__x86_64__)) && !defined (GRUB_UTIL) && !defined (GRUB_MACHINE_EMU) && !defined (GRUB_MACHINE_XEN)
fini_cbfsdisk ();
#endif
diff --git a/grub-core/fs/jfs.c b/grub-core/fs/jfs.c
index 6f7c439..c0bbab8 100644
--- a/grub-core/fs/jfs.c
+++ b/grub-core/fs/jfs.c
@@ -26,6 +26,7 @@
#include <grub/types.h>
#include <grub/charset.h>
#include <grub/i18n.h>
+#include <grub/lockdown.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -963,11 +964,15 @@ static struct grub_fs grub_jfs_fs =
GRUB_MOD_INIT(jfs)
{
- grub_fs_register (&grub_jfs_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_jfs_fs);
+ }
my_mod = mod;
}
GRUB_MOD_FINI(jfs)
{
- grub_fs_unregister (&grub_jfs_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_jfs_fs);
}
diff --git a/grub-core/fs/minix.c b/grub-core/fs/minix.c
index 3cd18c8..7588835 100644
--- a/grub-core/fs/minix.c
+++ b/grub-core/fs/minix.c
@@ -25,6 +25,7 @@
#include <grub/dl.h>
#include <grub/types.h>
#include <grub/i18n.h>
+#include <grub/lockdown.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -732,7 +733,10 @@ GRUB_MOD_INIT(minix)
#endif
#endif
{
- grub_fs_register (&grub_minix_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_minix_fs);
+ }
my_mod = mod;
}
@@ -754,5 +758,6 @@ GRUB_MOD_FINI(minix)
#endif
#endif
{
- grub_fs_unregister (&grub_minix_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_minix_fs);
}
diff --git a/grub-core/fs/nilfs2.c b/grub-core/fs/nilfs2.c
index 3c248a9..3f8e495 100644
--- a/grub-core/fs/nilfs2.c
+++ b/grub-core/fs/nilfs2.c
@@ -34,6 +34,7 @@
#include <grub/dl.h>
#include <grub/types.h>
#include <grub/fshelp.h>
+#include <grub/lockdown.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -1231,11 +1232,15 @@ GRUB_MOD_INIT (nilfs2)
grub_nilfs2_dat_entry));
COMPILE_TIME_ASSERT (1 << LOG_INODE_SIZE
== sizeof (struct grub_nilfs2_inode));
- grub_fs_register (&grub_nilfs2_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_nilfs2_fs);
+ }
my_mod = mod;
}
GRUB_MOD_FINI (nilfs2)
{
- grub_fs_unregister (&grub_nilfs2_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_nilfs2_fs);
}
diff --git a/grub-core/fs/ntfs.c b/grub-core/fs/ntfs.c
index 8f63c83..713e24d 100644
--- a/grub-core/fs/ntfs.c
+++ b/grub-core/fs/ntfs.c
@@ -27,6 +27,7 @@
#include <grub/fshelp.h>
#include <grub/ntfs.h>
#include <grub/charset.h>
+#include <grub/lockdown.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -1254,11 +1255,15 @@ static struct grub_fs grub_ntfs_fs =
GRUB_MOD_INIT (ntfs)
{
- grub_fs_register (&grub_ntfs_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_ntfs_fs);
+ }
my_mod = mod;
}
GRUB_MOD_FINI (ntfs)
{
- grub_fs_unregister (&grub_ntfs_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_ntfs_fs);
}
diff --git a/grub-core/fs/reiserfs.c b/grub-core/fs/reiserfs.c
index af6a226..76cb231 100644
--- a/grub-core/fs/reiserfs.c
+++ b/grub-core/fs/reiserfs.c
@@ -39,6 +39,7 @@
#include <grub/types.h>
#include <grub/fshelp.h>
#include <grub/i18n.h>
+#include <grub/lockdown.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -1417,11 +1418,15 @@ static struct grub_fs grub_reiserfs_fs =
GRUB_MOD_INIT(reiserfs)
{
- grub_fs_register (&grub_reiserfs_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_reiserfs_fs);
+ }
my_mod = mod;
}
GRUB_MOD_FINI(reiserfs)
{
- grub_fs_unregister (&grub_reiserfs_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_reiserfs_fs);
}
diff --git a/grub-core/fs/romfs.c b/grub-core/fs/romfs.c
index d97b8fb..d174449 100644
--- a/grub-core/fs/romfs.c
+++ b/grub-core/fs/romfs.c
@@ -23,6 +23,7 @@
#include <grub/disk.h>
#include <grub/fs.h>
#include <grub/fshelp.h>
+#include <grub/lockdown.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -475,10 +476,14 @@ static struct grub_fs grub_romfs_fs =
GRUB_MOD_INIT(romfs)
{
- grub_fs_register (&grub_romfs_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_romfs_fs);
+ }
}
GRUB_MOD_FINI(romfs)
{
- grub_fs_unregister (&grub_romfs_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_romfs_fs);
}
diff --git a/grub-core/fs/sfs.c b/grub-core/fs/sfs.c
index 983e880..f64bdd2 100644
--- a/grub-core/fs/sfs.c
+++ b/grub-core/fs/sfs.c
@@ -26,6 +26,7 @@
#include <grub/types.h>
#include <grub/fshelp.h>
#include <grub/charset.h>
+#include <grub/lockdown.h>
#include <grub/safemath.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -779,11 +780,15 @@ static struct grub_fs grub_sfs_fs =
GRUB_MOD_INIT(sfs)
{
- grub_fs_register (&grub_sfs_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_sfs_fs);
+ }
my_mod = mod;
}
GRUB_MOD_FINI(sfs)
{
- grub_fs_unregister (&grub_sfs_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_sfs_fs);
}
diff --git a/grub-core/fs/udf.c b/grub-core/fs/udf.c
index 2ac5c1d..f89c6b0 100644
--- a/grub-core/fs/udf.c
+++ b/grub-core/fs/udf.c
@@ -27,6 +27,7 @@
#include <grub/fshelp.h>
#include <grub/charset.h>
#include <grub/datetime.h>
+#include <grub/lockdown.h>
#include <grub/udf.h>
#include <grub/safemath.h>
@@ -1382,11 +1383,15 @@ static struct grub_fs grub_udf_fs = {
GRUB_MOD_INIT (udf)
{
- grub_fs_register (&grub_udf_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_udf_fs);
+ }
my_mod = mod;
}
GRUB_MOD_FINI (udf)
{
- grub_fs_unregister (&grub_udf_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_udf_fs);
}
diff --git a/grub-core/fs/ufs.c b/grub-core/fs/ufs.c
index 4727266..90fda07 100644
--- a/grub-core/fs/ufs.c
+++ b/grub-core/fs/ufs.c
@@ -25,6 +25,7 @@
#include <grub/dl.h>
#include <grub/types.h>
#include <grub/i18n.h>
+#include <grub/lockdown.h>
GRUB_MOD_LICENSE ("GPLv3+");
@@ -899,7 +900,10 @@ GRUB_MOD_INIT(ufs1)
#endif
#endif
{
- grub_fs_register (&grub_ufs_fs);
+ if (!grub_is_lockdown ())
+ {
+ grub_fs_register (&grub_ufs_fs);
+ }
my_mod = mod;
}
@@ -913,6 +917,7 @@ GRUB_MOD_FINI(ufs1)
#endif
#endif
{
- grub_fs_unregister (&grub_ufs_fs);
+ if (!grub_is_lockdown ())
+ grub_fs_unregister (&grub_ufs_fs);
}
--
2.25.1

View File

@@ -0,0 +1,90 @@
From 84bc0a9a68835952ae69165c11709811dae7634e Mon Sep 17 00:00:00 2001
From: Lidong Chen <lidong.chen@oracle.com>
Date: Tue, 21 Jan 2025 19:02:37 +0000
Subject: [PATCH] fs: Prevent overflows when allocating memory for arrays
Use grub_calloc() when allocating memory for arrays to ensure proper
overflow checks are in place.
The HFS+ and squash4 security vulnerabilities were reported by
Jonathan Bar Or <jonathanbaror@gmail.com>.
Fixes: CVE-2025-0678
Fixes: CVE-2025-1125
Signed-off-by: Lidong Chen <lidong.chen@oracle.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2025-0678
CVE: CVE-2025-1125
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=84bc0a9a68835952ae69165c11709811dae7634e]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/fs/btrfs.c | 4 ++--
grub-core/fs/hfspluscomp.c | 9 +++++++--
grub-core/fs/squash4.c | 8 ++++----
3 files changed, 13 insertions(+), 8 deletions(-)
diff --git a/grub-core/fs/btrfs.c b/grub-core/fs/btrfs.c
index 6320303..3b8b2f0 100644
--- a/grub-core/fs/btrfs.c
+++ b/grub-core/fs/btrfs.c
@@ -1197,8 +1197,8 @@ grub_btrfs_mount (grub_device_t dev)
}
data->n_devices_allocated = 16;
- data->devices_attached = grub_malloc (sizeof (data->devices_attached[0])
- * data->n_devices_allocated);
+ data->devices_attached = grub_calloc (data->n_devices_allocated,
+ sizeof (data->devices_attached[0]));
if (!data->devices_attached)
{
grub_free (data);
diff --git a/grub-core/fs/hfspluscomp.c b/grub-core/fs/hfspluscomp.c
index d76f3f1..4965ef1 100644
--- a/grub-core/fs/hfspluscomp.c
+++ b/grub-core/fs/hfspluscomp.c
@@ -244,14 +244,19 @@ hfsplus_open_compressed_real (struct grub_hfsplus_file *node)
return 0;
}
node->compress_index_size = grub_le_to_cpu32 (index_size);
- node->compress_index = grub_malloc (node->compress_index_size
- * sizeof (node->compress_index[0]));
+ node->compress_index = grub_calloc (node->compress_index_size,
+ sizeof (node->compress_index[0]));
if (!node->compress_index)
{
node->compressed = 0;
grub_free (attr_node);
return grub_errno;
}
+
+ /*
+ * The node->compress_index_size * sizeof (node->compress_index[0]) is safe here
+ * due to relevant checks done in grub_calloc() above.
+ */
if (grub_hfsplus_read_file (node, 0, 0,
0x104 + sizeof (index_size),
node->compress_index_size
diff --git a/grub-core/fs/squash4.c b/grub-core/fs/squash4.c
index 6dd731e..f79fc75 100644
--- a/grub-core/fs/squash4.c
+++ b/grub-core/fs/squash4.c
@@ -804,10 +804,10 @@ direct_read (struct grub_squash_data *data,
break;
}
total_blocks = ((total_size + data->blksz - 1) >> data->log2_blksz);
- ino->block_sizes = grub_malloc (total_blocks
- * sizeof (ino->block_sizes[0]));
- ino->cumulated_block_sizes = grub_malloc (total_blocks
- * sizeof (ino->cumulated_block_sizes[0]));
+ ino->block_sizes = grub_calloc (total_blocks,
+ sizeof (ino->block_sizes[0]));
+ ino->cumulated_block_sizes = grub_calloc (total_blocks,
+ sizeof (ino->cumulated_block_sizes[0]));
if (!ino->block_sizes || !ino->cumulated_block_sizes)
{
grub_free (ino->block_sizes);
--
2.25.1

View File

@@ -0,0 +1,75 @@
From dad8f502974ed9ad0a70ae6820d17b4b142558fc Mon Sep 17 00:00:00 2001
From: Jonathan Bar Or <jonathanbaror@gmail.com>
Date: Thu, 23 Jan 2025 19:17:05 +0100
Subject: [PATCH] commands/read: Fix an integer overflow when supplying more
than 2^31 characters
The grub_getline() function currently has a signed integer variable "i"
that can be overflown when user supplies more than 2^31 characters.
It results in a memory corruption of the allocated line buffer as well
as supplying large negative values to grub_realloc().
Fixes: CVE-2025-0690
Reported-by: Jonathan Bar Or <jonathanbaror@gmail.com>
Signed-off-by: Jonathan Bar Or <jonathanbaror@gmail.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2025-0690
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=dad8f502974ed9ad0a70ae6820d17b4b142558fc]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/commands/read.c | 19 +++++++++++++++----
1 file changed, 15 insertions(+), 4 deletions(-)
diff --git a/grub-core/commands/read.c b/grub-core/commands/read.c
index fe3e88b..f3ff826 100644
--- a/grub-core/commands/read.c
+++ b/grub-core/commands/read.c
@@ -25,19 +25,21 @@
#include <grub/types.h>
#include <grub/command.h>
#include <grub/i18n.h>
+#include <grub/safemath.h>
GRUB_MOD_LICENSE ("GPLv3+");
static char *
grub_getline (void)
{
- int i;
+ grub_size_t i;
char *line;
char *tmp;
char c;
+ grub_size_t alloc_size;
i = 0;
- line = grub_malloc (1 + i + sizeof('\0'));
+ line = grub_malloc (1 + sizeof('\0'));
if (! line)
return NULL;
@@ -50,8 +52,17 @@ grub_getline (void)
line[i] = c;
if (grub_isprint (c))
grub_printf ("%c", c);
- i++;
- tmp = grub_realloc (line, 1 + i + sizeof('\0'));
+ if (grub_add (i, 1, &i))
+ {
+ grub_error (GRUB_ERR_OUT_OF_RANGE, N_("overflow is detected"));
+ return NULL;
+ }
+ if (grub_add (i, 1 + sizeof('\0'), &alloc_size))
+ {
+ grub_error (GRUB_ERR_OUT_OF_RANGE, N_("overflow is detected"));
+ return NULL;
+ }
+ tmp = grub_realloc (line, alloc_size);
if (! tmp)
{
grub_free (line);
--
2.25.1

View File

@@ -0,0 +1,40 @@
From 34824806ac6302f91e8cabaa41308eaced25725f Mon Sep 17 00:00:00 2001
From: B Horn <b@horn.uk>
Date: Thu, 18 Apr 2024 20:29:39 +0100
Subject: [PATCH] commands/minicmd: Block the dump command in lockdown mode
The dump enables a user to read memory which should not be possible
in lockdown mode.
Fixes: CVE-2025-1118
Reported-by: B Horn <b@horn.uk>
Reported-by: Jonathan Bar Or <jonathanbaror@gmail.com>
Signed-off-by: B Horn <b@horn.uk>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
CVE: CVE-2025-1118
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=34824806ac6302f91e8cabaa41308eaced25725f]
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
---
grub-core/commands/minicmd.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/grub-core/commands/minicmd.c b/grub-core/commands/minicmd.c
index fa49893..903af33 100644
--- a/grub-core/commands/minicmd.c
+++ b/grub-core/commands/minicmd.c
@@ -203,8 +203,8 @@ GRUB_MOD_INIT(minicmd)
grub_register_command ("help", grub_mini_cmd_help,
0, N_("Show this message."));
cmd_dump =
- grub_register_command ("dump", grub_mini_cmd_dump,
- N_("ADDR [SIZE]"), N_("Show memory contents."));
+ grub_register_command_lockdown ("dump", grub_mini_cmd_dump,
+ N_("ADDR [SIZE]"), N_("Show memory contents."));
cmd_rmmod =
grub_register_command ("rmmod", grub_mini_cmd_rmmod,
N_("MODULE"), N_("Remove a module."));
--
2.25.1

View File

@@ -41,6 +41,24 @@ SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \
file://CVE-2023-4692.patch \
file://CVE-2023-4693.patch \
file://0001-fs-fat-Don-t-error-when-mtime-is-0.patch \
file://0001-misc-Implement-grub_strlcpy.patch \
file://CVE-2024-45774.patch \
file://CVE-2024-45775.patch \
file://CVE-2024-45776.patch \
file://CVE-2024-45777.patch \
file://CVE-2024-45778_CVE-2024-45779.patch \
file://CVE-2024-45780.patch \
file://CVE-2024-45781.patch \
file://CVE-2024-45782_CVE-2024-56737.patch \
file://CVE-2024-45783.patch \
file://CVE-2025-0622-01.patch \
file://CVE-2025-0622-02.patch \
file://CVE-2025-0622-03.patch \
file://CVE-2025-0624.patch \
file://CVE-2025-0677_CVE-2025-0684_CVE-2025-0685_CVE-2025-0686_CVE-2025-0689.patch \
file://CVE-2025-0678_CVE-2025-1125.patch \
file://CVE-2025-0690.patch \
file://CVE-2025-1118.patch \
"
SRC_URI[sha256sum] = "23b64b4c741569f9426ed2e3d0e6780796fca081bee4c99f62aa3f53ae803f5f"

View File

@@ -0,0 +1,44 @@
From bdbf7a05e26f3c5fd437c99e2755ffde186ddc80 Thr Jun 2 00:00:00 2022
From: Andrea zi0Black Cappa <zi0Black@protonmail.com>
Date: Tue, 14 Jun 2022 17:16:00 +0200
Subject: [PATCH] net: nfs: Fix CVE-2022-30767 (old CVE-2019-14196)
This patch mitigates the vulnerability identified via CVE-2019-14196.
The previous patch was bypassed/ineffective, and now the vulnerability
is identified via CVE-2022-30767. The patch removes the sanity check
introduced to mitigate CVE-2019-14196 since it's ineffective.
filefh3_length is changed to unsigned type integer, preventing negative
numbers from being used during comparison with positive values during
size sanity checks.
CVE: CVE-2019-14196
Upstream-Status: Backport [https://source.denx.de/u-boot/u-boot/-/commit/bdbf7a05e26f3c5fd437c99e2755ffde186ddc80]
Signed-off-by: Andrea zi0Black Cappa <zi0Black@protonmail.com>
Signed-off-by: Carlos Dominguez <carlos.dominguez@windriver.com>
---
net/nfs.c | 4 +---
1 file changed, 1 insertions(+), 3 deletions(-)
diff --git a/net/nfs.c b/net/nfs.c
index 70d0e08bde..3003f54aac 100644
--- a/net/nfs.c
+++ b/net/nfs.c
@@ -57,7 +57,7 @@ static ulong nfs_timeout = NFS_TIMEOUT;
static char dirfh[NFS_FHSIZE]; /* NFSv2 / NFSv3 file handle of directory */
static char filefh[NFS3_FHSIZE]; /* NFSv2 / NFSv3 file handle */
-static int filefh3_length; /* (variable) length of filefh when NFSv3 */
+static unsigned int filefh3_length; /* (variable) length of filefh when NFSv3 */
static enum net_loop_state nfs_download_state;
static struct in_addr nfs_server_ip;
@@ -578,8 +578,6 @@ static int nfs_lookup_reply(uchar *pkt, unsigned len)
filefh3_length = ntohl(rpc_pkt.u.reply.data[1]);
if (filefh3_length > NFS3_FHSIZE)
filefh3_length = NFS3_FHSIZE;
- if (((uchar *)&(rpc_pkt.u.reply.data[0]) - (uchar *)(&rpc_pkt) + filefh3_length) > len)
- return -NFS_RPC_DROP;
memcpy(filefh, rpc_pkt.u.reply.data + 2, filefh3_length);
}

View File

@@ -0,0 +1,129 @@
From 9d2d2deabc49dbedf93a7192b25f55d9933fcede Mon Sep 17 00:00:00 2001
From: Venkatesh Yadav Abbarapu <venkatesh.abbarapu@amd.com>
Date: Thu, 3 Nov 2022 09:37:48 +0530
Subject: [PATCH 1/2] usb: gadget: dfu: Fix the unchecked length field
DFU implementation does not bound the length field in USB
DFU download setup packets, and it does not verify that
the transfer direction. Fixing the length and transfer
direction.
CVE-2022-2347
Signed-off-by: Venkatesh Yadav Abbarapu <venkatesh.abbarapu@amd.com>
Reviewed-by: Marek Vasut <marex@denx.de>
CVE: CVE-2022-2347
Upstream-Status: Backport [fbce985e28eaca3af82afecc11961aadaf971a7e]
Signed-off-by: Sakib Sajal <sakib.sajal@windriver.com>
---
drivers/usb/gadget/f_dfu.c | 56 +++++++++++++++++++++++++-------------
1 file changed, 37 insertions(+), 19 deletions(-)
diff --git a/drivers/usb/gadget/f_dfu.c b/drivers/usb/gadget/f_dfu.c
index 4bedc7d3a1..33ef62f8ba 100644
--- a/drivers/usb/gadget/f_dfu.c
+++ b/drivers/usb/gadget/f_dfu.c
@@ -321,21 +321,29 @@ static int state_dfu_idle(struct f_dfu *f_dfu,
u16 len = le16_to_cpu(ctrl->wLength);
int value = 0;
+ len = len > DFU_USB_BUFSIZ ? DFU_USB_BUFSIZ : len;
+
switch (ctrl->bRequest) {
case USB_REQ_DFU_DNLOAD:
- if (len == 0) {
- f_dfu->dfu_state = DFU_STATE_dfuERROR;
- value = RET_STALL;
- break;
+ if (ctrl->bRequestType == USB_DIR_OUT) {
+ if (len == 0) {
+ f_dfu->dfu_state = DFU_STATE_dfuERROR;
+ value = RET_STALL;
+ break;
+ }
+ f_dfu->dfu_state = DFU_STATE_dfuDNLOAD_SYNC;
+ f_dfu->blk_seq_num = w_value;
+ value = handle_dnload(gadget, len);
}
- f_dfu->dfu_state = DFU_STATE_dfuDNLOAD_SYNC;
- f_dfu->blk_seq_num = w_value;
- value = handle_dnload(gadget, len);
break;
case USB_REQ_DFU_UPLOAD:
- f_dfu->dfu_state = DFU_STATE_dfuUPLOAD_IDLE;
- f_dfu->blk_seq_num = 0;
- value = handle_upload(req, len);
+ if (ctrl->bRequestType == USB_DIR_IN) {
+ f_dfu->dfu_state = DFU_STATE_dfuUPLOAD_IDLE;
+ f_dfu->blk_seq_num = 0;
+ value = handle_upload(req, len);
+ if (value >= 0 && value < len)
+ f_dfu->dfu_state = DFU_STATE_dfuIDLE;
+ }
break;
case USB_REQ_DFU_ABORT:
/* no zlp? */
@@ -424,11 +432,15 @@ static int state_dfu_dnload_idle(struct f_dfu *f_dfu,
u16 len = le16_to_cpu(ctrl->wLength);
int value = 0;
+ len = len > DFU_USB_BUFSIZ ? DFU_USB_BUFSIZ : len;
+
switch (ctrl->bRequest) {
case USB_REQ_DFU_DNLOAD:
- f_dfu->dfu_state = DFU_STATE_dfuDNLOAD_SYNC;
- f_dfu->blk_seq_num = w_value;
- value = handle_dnload(gadget, len);
+ if (ctrl->bRequestType == USB_DIR_OUT) {
+ f_dfu->dfu_state = DFU_STATE_dfuDNLOAD_SYNC;
+ f_dfu->blk_seq_num = w_value;
+ value = handle_dnload(gadget, len);
+ }
break;
case USB_REQ_DFU_ABORT:
f_dfu->dfu_state = DFU_STATE_dfuIDLE;
@@ -511,13 +523,17 @@ static int state_dfu_upload_idle(struct f_dfu *f_dfu,
u16 len = le16_to_cpu(ctrl->wLength);
int value = 0;
+ len = len > DFU_USB_BUFSIZ ? DFU_USB_BUFSIZ : len;
+
switch (ctrl->bRequest) {
case USB_REQ_DFU_UPLOAD:
- /* state transition if less data then requested */
- f_dfu->blk_seq_num = w_value;
- value = handle_upload(req, len);
- if (value >= 0 && value < len)
- f_dfu->dfu_state = DFU_STATE_dfuIDLE;
+ if (ctrl->bRequestType == USB_DIR_IN) {
+ /* state transition if less data then requested */
+ f_dfu->blk_seq_num = w_value;
+ value = handle_upload(req, len);
+ if (value >= 0 && value < len)
+ f_dfu->dfu_state = DFU_STATE_dfuIDLE;
+ }
break;
case USB_REQ_DFU_ABORT:
f_dfu->dfu_state = DFU_STATE_dfuIDLE;
@@ -593,6 +609,8 @@ dfu_handle(struct usb_function *f, const struct usb_ctrlrequest *ctrl)
int value = 0;
u8 req_type = ctrl->bRequestType & USB_TYPE_MASK;
+ len = len > DFU_USB_BUFSIZ ? DFU_USB_BUFSIZ : len;
+
debug("w_value: 0x%x len: 0x%x\n", w_value, len);
debug("req_type: 0x%x ctrl->bRequest: 0x%x f_dfu->dfu_state: 0x%x\n",
req_type, ctrl->bRequest, f_dfu->dfu_state);
@@ -612,7 +630,7 @@ dfu_handle(struct usb_function *f, const struct usb_ctrlrequest *ctrl)
value = dfu_state[f_dfu->dfu_state] (f_dfu, ctrl, gadget, req);
if (value >= 0) {
- req->length = value;
+ req->length = value > DFU_USB_BUFSIZ ? DFU_USB_BUFSIZ : value;
req->zero = value < len;
value = usb_ep_queue(gadget->ep0, req, 0);
if (value < 0) {
--
2.32.0

View File

@@ -0,0 +1,66 @@
From 0f465b3e81baa095b62a154a739c5378285526db Mon Sep 17 00:00:00 2001
From: Hugo SIMELIERE <hsimeliere.opensource@witekio.com>
Date: Wed, 30 Nov 2022 09:29:16 +0100
Subject: [PATCH 2/2] usb: gadget: dfu: Fix check of transfer direction
Commit fbce985e28eaca3af82afecc11961aadaf971a7e to fix CVE-2022-2347
blocks DFU usb requests.
The verification of the transfer direction was done by an equality
but it is a bit mask.
Signed-off-by: Hugo SIMELIERE <hsimeliere.opensource@witekio.com>
Reviewed-by: Fabio Estevam <festevam@denx.de>
Reviewed-by: Sultan Qasim Khan <sultan.qasimkhan@nccgroup.com>
Reviewed-by: Marek Vasut <marex@denx.de>
Tested-by: Marek Vasut <marex@denx.de>
CVE: CVE-2022-2347
Upstream-Status: Backport [14dc0ab138988a8e45ffa086444ec8db48b3f103]
Signed-off-by: Sakib Sajal <sakib.sajal@windriver.com>
---
drivers/usb/gadget/f_dfu.c | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/drivers/usb/gadget/f_dfu.c b/drivers/usb/gadget/f_dfu.c
index 33ef62f8ba..44877df4ec 100644
--- a/drivers/usb/gadget/f_dfu.c
+++ b/drivers/usb/gadget/f_dfu.c
@@ -325,7 +325,7 @@ static int state_dfu_idle(struct f_dfu *f_dfu,
switch (ctrl->bRequest) {
case USB_REQ_DFU_DNLOAD:
- if (ctrl->bRequestType == USB_DIR_OUT) {
+ if (!(ctrl->bRequestType & USB_DIR_IN)) {
if (len == 0) {
f_dfu->dfu_state = DFU_STATE_dfuERROR;
value = RET_STALL;
@@ -337,7 +337,7 @@ static int state_dfu_idle(struct f_dfu *f_dfu,
}
break;
case USB_REQ_DFU_UPLOAD:
- if (ctrl->bRequestType == USB_DIR_IN) {
+ if (ctrl->bRequestType & USB_DIR_IN) {
f_dfu->dfu_state = DFU_STATE_dfuUPLOAD_IDLE;
f_dfu->blk_seq_num = 0;
value = handle_upload(req, len);
@@ -436,7 +436,7 @@ static int state_dfu_dnload_idle(struct f_dfu *f_dfu,
switch (ctrl->bRequest) {
case USB_REQ_DFU_DNLOAD:
- if (ctrl->bRequestType == USB_DIR_OUT) {
+ if (!(ctrl->bRequestType & USB_DIR_IN)) {
f_dfu->dfu_state = DFU_STATE_dfuDNLOAD_SYNC;
f_dfu->blk_seq_num = w_value;
value = handle_dnload(gadget, len);
@@ -527,7 +527,7 @@ static int state_dfu_upload_idle(struct f_dfu *f_dfu,
switch (ctrl->bRequest) {
case USB_REQ_DFU_UPLOAD:
- if (ctrl->bRequestType == USB_DIR_IN) {
+ if (ctrl->bRequestType & USB_DIR_IN) {
/* state transition if less data then requested */
f_dfu->blk_seq_num = w_value;
value = handle_upload(req, len);
--
2.32.0

View File

@@ -0,0 +1,149 @@
From 1817c3824a08bbad7fd2fbae1a6e73be896e8e5e Mon Sep 17 00:00:00 2001
From: Rasmus Villemoes <rasmus.villemoes@prevas.dk>
Date: Fri, 14 Oct 2022 19:43:39 +0200
Subject: [PATCH] net: (actually/better) deal with CVE-2022-{30790,30552}
I hit a strange problem with v2022.10: Sometimes my tftp transfer
would seemingly just hang. It only happened for some files. Moreover,
changing tftpblocksize from 65464 to 65460 or 65000 made it work again
for all the files I tried. So I started suspecting it had something to
do with the file sizes and in particular the way the tftp blocks get
fragmented and reassembled.
v2022.01 showed no problems with any of the files or any value of
tftpblocksize.
Looking at what had changed in net.c or tftp.c since January showed
only one remotely interesting thing, b85d130ea0ca.
So I fired up wireshark on my host to see if somehow one of the
packets would be too small. But no, with both v2022.01 and v2022.10,
the exact same sequence of packets were sent, all but the last of size
1500, and the last being 1280 bytes.
But then it struck me that 1280 is 5*256, so one of the two bytes
on-the-wire is 0 and the other is 5, and when then looking at the code
again the lack of endianness conversion becomes obvious. [ntohs is
both applied to ip->ip_off just above, as well as to ip->ip_len just a
little further down when the "len" is actually computed].
IOWs the current code would falsely reject any packet which happens to
be a multiple of 256 bytes in size, breaking tftp transfers somewhat
randomly, and if it did get one of those "malicious" packets with
ip_len set to, say, 27, it would be seen by this check as being 6912
and hence not rejected.
====
Now, just adding the missing ntohs() would make my initial problem go
away, in that I can now download the file where the last fragment ends
up being 1280 bytes. But there's another bug in the code and/or
analysis: The right-hand side is too strict, in that it is ok for the
last fragment not to have a multiple of 8 bytes as payload - it really
must be ok, because nothing in the IP spec says that IP datagrams must
have a multiple of 8 bytes as payload. And comments in the code also
mention this.
To fix that, replace the comparison with <= IP_HDR_SIZE and add
another check that len is actually a multiple of 8 when the "more
fragments" bit is set - which it necessarily is for the case where
offset8 ends up being 0, since we're only called when
(ip_off & (IP_OFFS | IP_FLAGS_MFRAG)).
====
So, does this fix CVE-2022-30790 for real? It certainly correctly
rejects the POC code which relies on sending a packet of size 27 with
the MFRAG flag set. Can the attack be carried out with a size 27
packet that doesn't set MFRAG (hence must set a non-zero fragment
offset)? I dunno. If we get a packet without MFRAG, we update
h->last_byte in the hole we've found to be start+len, hence we'd enter
one of
if ((h >= thisfrag) && (h->last_byte <= start + len)) {
or
} else if (h->last_byte <= start + len) {
and thus won't reach any of the
/* overlaps with initial part of the hole: move this hole */
newh = thisfrag + (len / 8);
/* fragment sits in the middle: split the hole */
newh = thisfrag + (len / 8);
IOW these division are now guaranteed to be exact, and thus I think
the scenario in CVE-2022-30790 cannot happen anymore.
====
However, there's a big elephant in the room, which has always been
spelled out in the comments, and which makes me believe that one can
still cause mayhem even with packets whose payloads are all 8-byte
aligned:
This code doesn't deal with a fragment that overlaps with two
different holes (thus being a superset of a previously-received
fragment).
Suppose each character below represents 8 bytes, with D being already
received data, H being a hole descriptor (struct hole), h being
non-populated chunks, and P representing where the payload of a just
received packet should go:
DDDHhhhhDDDDHhhhDDDD
PPPPPPPPP
I'm pretty sure in this case we'd end up with h being the first hole,
enter the simple
} else if (h->last_byte <= start + len) {
/* overlaps with final part of the hole: shorten this hole */
h->last_byte = start;
case, and thus in the memcpy happily overwrite the second H with our
chosen payload. This is probably worth fixing...
Signed-off-by: Rasmus Villemoes <rasmus.villemoes@prevas.dk>
CVE: CVE-2022-30790
Upstream-Status: Backport [1817c3824a08bbad7fd2fbae1a6e73be896e8e5e]
Signed-off-by: Sakib Sajal <sakib.sajal@windriver.com>
---
net/net.c | 10 +++++++++-
1 file changed, 9 insertions(+), 1 deletion(-)
diff --git a/net/net.c b/net/net.c
index 434c3b411e..987c25931e 100644
--- a/net/net.c
+++ b/net/net.c
@@ -924,7 +924,11 @@ static struct ip_udp_hdr *__net_defragment(struct ip_udp_hdr *ip, int *lenp)
int offset8, start, len, done = 0;
u16 ip_off = ntohs(ip->ip_off);
- if (ip->ip_len < IP_MIN_FRAG_DATAGRAM_SIZE)
+ /*
+ * Calling code already rejected <, but we don't have to deal
+ * with an IP fragment with no payload.
+ */
+ if (ntohs(ip->ip_len) <= IP_HDR_SIZE)
return NULL;
/* payload starts after IP header, this fragment is in there */
@@ -934,6 +938,10 @@ static struct ip_udp_hdr *__net_defragment(struct ip_udp_hdr *ip, int *lenp)
start = offset8 * 8;
len = ntohs(ip->ip_len) - IP_HDR_SIZE;
+ /* All but last fragment must have a multiple-of-8 payload. */
+ if ((len & 7) && (ip_off & IP_FLAGS_MFRAG))
+ return NULL;
+
if (start + len > IP_MAXUDP) /* fragment extends too far */
return NULL;
--
2.25.1

View File

@@ -0,0 +1,47 @@
From 3f9deb424ecd6ecd50f165b42f0b0290d83853f5 Mon Sep 17 00:00:00 2001
From: Richard Weinberger <richard@nod.at>
Date: Fri, 2 Aug 2024 18:36:45 +0200
Subject: [PATCH 1/8] squashfs: Fix integer overflow in sqfs_inode_size()
A carefully crafted squashfs filesystem can exhibit an extremly large
inode size and overflow the calculation in sqfs_inode_size().
As a consequence, the squashfs driver will read from wrong locations.
Fix by using __builtin_add_overflow() to detect the overflow.
Signed-off-by: Richard Weinberger <richard@nod.at>
Reviewed-by: Miquel Raynal <miquel.raynal@bootlin.com>
CVE: CVE-2024-57254
Upstream-Status: Backport [https://source.denx.de/u-boot/u-boot/-/commit/c8e929e5758999933f9e905049ef2bf3fe6b140d]
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
---
fs/squashfs/sqfs_inode.c | 9 +++++++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/fs/squashfs/sqfs_inode.c b/fs/squashfs/sqfs_inode.c
index d25cfb53..bb3ccd37 100644
--- a/fs/squashfs/sqfs_inode.c
+++ b/fs/squashfs/sqfs_inode.c
@@ -78,11 +78,16 @@ int sqfs_inode_size(struct squashfs_base_inode *inode, u32 blk_size)
case SQFS_SYMLINK_TYPE:
case SQFS_LSYMLINK_TYPE: {
+ int size;
+
struct squashfs_symlink_inode *symlink =
(struct squashfs_symlink_inode *)inode;
- return sizeof(*symlink) +
- get_unaligned_le32(&symlink->symlink_size);
+ if (__builtin_add_overflow(sizeof(*symlink),
+ get_unaligned_le32(&symlink->symlink_size), &size))
+ return -EINVAL;
+
+ return size;
}
case SQFS_BLKDEV_TYPE:
--
2.34.1

View File

@@ -0,0 +1,53 @@
From 5d7ca74388544bf8c95e104517a9120e94bfe40d Mon Sep 17 00:00:00 2001
From: Richard Weinberger <richard@nod.at>
Date: Fri, 2 Aug 2024 18:36:44 +0200
Subject: [PATCH 2/8] squashfs: Fix integer overflow in sqfs_resolve_symlink()
A carefully crafted squashfs filesystem can exhibit an inode size of 0xffffffff,
as a consequence malloc() will do a zero allocation.
Later in the function the inode size is again used for copying data.
So an attacker can overwrite memory.
Avoid the overflow by using the __builtin_add_overflow() helper.
Signed-off-by: Richard Weinberger <richard@nod.at>
Reviewed-by: Miquel Raynal <miquel.raynal@bootlin.com>
CVE: CVE-2024-57255
Upstream-Status: Backport [https://source.denx.de/u-boot/u-boot/-/commit/233945eba63e24061dffeeaeb7cd6fe985278356]
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
---
fs/squashfs/sqfs.c | 10 ++++++----
1 file changed, 6 insertions(+), 4 deletions(-)
diff --git a/fs/squashfs/sqfs.c b/fs/squashfs/sqfs.c
index 1430e671..16a07c06 100644
--- a/fs/squashfs/sqfs.c
+++ b/fs/squashfs/sqfs.c
@@ -422,8 +422,10 @@ static char *sqfs_resolve_symlink(struct squashfs_symlink_inode *sym,
char *resolved, *target;
u32 sz;
- sz = get_unaligned_le32(&sym->symlink_size);
- target = malloc(sz + 1);
+ if (__builtin_add_overflow(get_unaligned_le32(&sym->symlink_size), 1, &sz))
+ return NULL;
+
+ target = malloc(sz);
if (!target)
return NULL;
@@ -431,9 +433,9 @@ static char *sqfs_resolve_symlink(struct squashfs_symlink_inode *sym,
* There is no trailling null byte in the symlink's target path, so a
* copy is made and a '\0' is added at its end.
*/
- target[sz] = '\0';
+ target[sz - 1] = '\0';
/* Get target name (relative path) */
- strncpy(target, sym->symlink, sz);
+ strncpy(target, sym->symlink, sz - 1);
/* Relative -> absolute path conversion */
resolved = sqfs_get_abs_path(base_path, target);
--
2.34.1

View File

@@ -0,0 +1,51 @@
From 49cab731abe7a98db4ac16666e3b5ab3bc799282 Mon Sep 17 00:00:00 2001
From: Richard Weinberger <richard@nod.at>
Date: Fri, 9 Aug 2024 11:54:28 +0200
Subject: [PATCH 3/8] ext4: Fix integer overflow in ext4fs_read_symlink()
While zalloc() takes a size_t type, adding 1 to the le32 variable
will overflow.
A carefully crafted ext4 filesystem can exhibit an inode size of 0xffffffff
and as consequence zalloc() will do a zero allocation.
Later in the function the inode size is again used for copying data.
So an attacker can overwrite memory.
Avoid the overflow by using the __builtin_add_overflow() helper.
Signed-off-by: Richard Weinberger <richard@nod.at>
CVE: CVE-2024-57256
Upstream-Status: Backport [https://source.denx.de/u-boot/u-boot/-/commit/35f75d2a46e5859138c83a75cd2f4141c5479ab9]
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
---
fs/ext4/ext4_common.c | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/fs/ext4/ext4_common.c b/fs/ext4/ext4_common.c
index f50de7c0..a7798296 100644
--- a/fs/ext4/ext4_common.c
+++ b/fs/ext4/ext4_common.c
@@ -2188,13 +2188,18 @@ static char *ext4fs_read_symlink(struct ext2fs_node *node)
struct ext2fs_node *diro = node;
int status;
loff_t actread;
+ size_t alloc_size;
if (!diro->inode_read) {
status = ext4fs_read_inode(diro->data, diro->ino, &diro->inode);
if (status == 0)
return NULL;
}
- symlink = zalloc(le32_to_cpu(diro->inode.size) + 1);
+
+ if (__builtin_add_overflow(le32_to_cpu(diro->inode.size), 1, &alloc_size))
+ return NULL;
+
+ symlink = zalloc(alloc_size);
if (!symlink)
return NULL;
--
2.34.1

View File

@@ -0,0 +1,228 @@
From 790a2005e7a44dba059f5dbf1b9eff3a13e9b5e7 Mon Sep 17 00:00:00 2001
From: Hongxu Jia <hongxu.jia@windriver.com>
Date: Wed, 19 Feb 2025 15:51:53 +0800
Subject: [PATCH] squashfs: Fix stack overflow while symlink resolving
The squashfs driver blindly follows symlinks, and calls sqfs_size()
recursively. So an attacker can create a crafted filesystem and with
a deep enough nesting level a stack overflow can be achieved.
Fix by limiting the nesting level to 8.
Signed-off-by: Richard Weinberger <richard@nod.at>
Reviewed-by: Miquel Raynal <miquel.raynal@bootlin.com>
CVE: CVE-2024-57257
Upstream-Status: Backport [https://source.denx.de/u-boot/u-boot/-/commit/4f5cc096bfd0a591f8a11e86999e3d90a9484c34]
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
---
fs/squashfs/sqfs.c | 76 +++++++++++++++++++++++++++++++++++++---------
1 file changed, 61 insertions(+), 15 deletions(-)
diff --git a/fs/squashfs/sqfs.c b/fs/squashfs/sqfs.c
index 7f2af8e1f9..09c0911689 100644
--- a/fs/squashfs/sqfs.c
+++ b/fs/squashfs/sqfs.c
@@ -24,7 +24,12 @@
#include "sqfs_filesystem.h"
#include "sqfs_utils.h"
+#define MAX_SYMLINK_NEST 8
+
static struct squashfs_ctxt ctxt;
+static int symlinknest;
+
+static int sqfs_readdir_nest(struct fs_dir_stream *fs_dirs, struct fs_dirent **dentp);
static int sqfs_disk_read(__u32 block, __u32 nr_blocks, void *buf)
{
@@ -502,7 +507,7 @@ static int sqfs_search_dir(struct squashfs_dir_stream *dirs, char **token_list,
goto out;
}
- while (!sqfs_readdir(dirsp, &dent)) {
+ while (!sqfs_readdir_nest(dirsp, &dent)) {
ret = strcmp(dent->name, token_list[j]);
if (!ret)
break;
@@ -527,6 +532,11 @@ static int sqfs_search_dir(struct squashfs_dir_stream *dirs, char **token_list,
/* Check for symbolic link and inode type sanity */
if (get_unaligned_le16(&dir->inode_type) == SQFS_SYMLINK_TYPE) {
+ if (++symlinknest == MAX_SYMLINK_NEST) {
+ ret = -ELOOP;
+ goto out;
+ }
+
sym = (struct squashfs_symlink_inode *)table;
/* Get first j + 1 tokens */
path = sqfs_concat_tokens(token_list, j + 1);
@@ -872,7 +882,7 @@ out:
return metablks_count;
}
-int sqfs_opendir(const char *filename, struct fs_dir_stream **dirsp)
+static int sqfs_opendir_nest(const char *filename, struct fs_dir_stream **dirsp)
{
unsigned char *inode_table = NULL, *dir_table = NULL;
int j, token_count = 0, ret = 0, metablks_count;
@@ -967,7 +977,19 @@ out:
return ret;
}
+int sqfs_opendir(const char *filename, struct fs_dir_stream **dirsp)
+{
+ symlinknest = 0;
+ return sqfs_opendir_nest(filename, dirsp);
+}
+
int sqfs_readdir(struct fs_dir_stream *fs_dirs, struct fs_dirent **dentp)
+{
+ symlinknest = 0;
+ return sqfs_readdir_nest(fs_dirs, dentp);
+}
+
+static int sqfs_readdir_nest(struct fs_dir_stream *fs_dirs, struct fs_dirent **dentp)
{
struct squashfs_super_block *sblk = ctxt.sblk;
struct squashfs_dir_stream *dirs;
@@ -1311,8 +1333,8 @@ static int sqfs_get_lregfile_info(struct squashfs_lreg_inode *lreg,
return datablk_count;
}
-int sqfs_read(const char *filename, void *buf, loff_t offset, loff_t len,
- loff_t *actread)
+static int sqfs_read_nest(const char *filename, void *buf, loff_t offset,
+ loff_t len, loff_t *actread)
{
char *dir = NULL, *fragment_block, *datablock = NULL, *data_buffer = NULL;
char *fragment = NULL, *file = NULL, *resolved, *data;
@@ -1342,11 +1364,11 @@ int sqfs_read(const char *filename, void *buf, loff_t offset, loff_t len,
}
/*
- * sqfs_opendir will uncompress inode and directory tables, and will
+ * sqfs_opendir_nest will uncompress inode and directory tables, and will
* return a pointer to the directory that contains the requested file.
*/
sqfs_split_path(&file, &dir, filename);
- ret = sqfs_opendir(dir, &dirsp);
+ ret = sqfs_opendir_nest(dir, &dirsp);
if (ret) {
goto out;
}
@@ -1354,7 +1376,7 @@ int sqfs_read(const char *filename, void *buf, loff_t offset, loff_t len,
dirs = (struct squashfs_dir_stream *)dirsp;
/* For now, only regular files are able to be loaded */
- while (!sqfs_readdir(dirsp, &dent)) {
+ while (!sqfs_readdir_nest(dirsp, &dent)) {
ret = strcmp(dent->name, file);
if (!ret)
break;
@@ -1403,9 +1425,14 @@ int sqfs_read(const char *filename, void *buf, loff_t offset, loff_t len,
break;
case SQFS_SYMLINK_TYPE:
case SQFS_LSYMLINK_TYPE:
+ if (++symlinknest == MAX_SYMLINK_NEST) {
+ ret = -ELOOP;
+ goto out;
+ }
+
symlink = (struct squashfs_symlink_inode *)ipos;
resolved = sqfs_resolve_symlink(symlink, filename);
- ret = sqfs_read(resolved, buf, offset, len, actread);
+ ret = sqfs_read_nest(resolved, buf, offset, len, actread);
free(resolved);
goto out;
case SQFS_BLKDEV_TYPE:
@@ -1579,7 +1606,14 @@ out:
return ret;
}
-int sqfs_size(const char *filename, loff_t *size)
+int sqfs_read(const char *filename, void *buf, loff_t offset, loff_t len,
+ loff_t *actread)
+{
+ symlinknest = 0;
+ return sqfs_read_nest(filename, buf, offset, len, actread);
+}
+
+static int sqfs_size_nest(const char *filename, loff_t *size)
{
struct squashfs_super_block *sblk = ctxt.sblk;
struct squashfs_symlink_inode *symlink;
@@ -1595,10 +1629,10 @@ int sqfs_size(const char *filename, loff_t *size)
sqfs_split_path(&file, &dir, filename);
/*
- * sqfs_opendir will uncompress inode and directory tables, and will
+ * sqfs_opendir_nest will uncompress inode and directory tables, and will
* return a pointer to the directory that contains the requested file.
*/
- ret = sqfs_opendir(dir, &dirsp);
+ ret = sqfs_opendir_nest(dir, &dirsp);
if (ret) {
ret = -EINVAL;
goto free_strings;
@@ -1606,7 +1640,7 @@ int sqfs_size(const char *filename, loff_t *size)
dirs = (struct squashfs_dir_stream *)dirsp;
- while (!sqfs_readdir(dirsp, &dent)) {
+ while (!sqfs_readdir_nest(dirsp, &dent)) {
ret = strcmp(dent->name, file);
if (!ret)
break;
@@ -1639,6 +1673,11 @@ int sqfs_size(const char *filename, loff_t *size)
break;
case SQFS_SYMLINK_TYPE:
case SQFS_LSYMLINK_TYPE:
+ if (++symlinknest == MAX_SYMLINK_NEST) {
+ *size = 0;
+ return -ELOOP;
+ }
+
symlink = (struct squashfs_symlink_inode *)ipos;
resolved = sqfs_resolve_symlink(symlink, filename);
ret = sqfs_size(resolved, size);
@@ -1678,10 +1717,11 @@ int sqfs_exists(const char *filename)
sqfs_split_path(&file, &dir, filename);
/*
- * sqfs_opendir will uncompress inode and directory tables, and will
+ * sqfs_opendir_nest will uncompress inode and directory tables, and will
* return a pointer to the directory that contains the requested file.
*/
- ret = sqfs_opendir(dir, &dirsp);
+ symlinknest = 0;
+ ret = sqfs_opendir_nest(dir, &dirsp);
if (ret) {
ret = -EINVAL;
goto free_strings;
@@ -1689,7 +1729,7 @@ int sqfs_exists(const char *filename)
dirs = (struct squashfs_dir_stream *)dirsp;
- while (!sqfs_readdir(dirsp, &dent)) {
+ while (!sqfs_readdir_nest(dirsp, &dent)) {
ret = strcmp(dent->name, file);
if (!ret)
break;
@@ -1706,6 +1746,12 @@ free_strings:
return ret == 0;
}
+int sqfs_size(const char *filename, loff_t *size)
+{
+ symlinknest = 0;
+ return sqfs_size_nest(filename, size);
+}
+
void sqfs_close(void)
{
sqfs_decompressor_cleanup(&ctxt);
--
2.34.1

View File

@@ -0,0 +1,47 @@
From 50ab41c3628dedeca1a331dd86dd203b73faea74 Mon Sep 17 00:00:00 2001
From: Richard Weinberger <richard@nod.at>
Date: Fri, 2 Aug 2024 12:08:45 +0200
Subject: [PATCH 5/8] dlmalloc: Fix integer overflow in sbrk()
Make sure that the new break is within mem_malloc_start
and mem_malloc_end before making progress.
ulong new = old + increment; can overflow for extremely large
increment values and memset() can get wrongly called.
Signed-off-by: Richard Weinberger <richard@nod.at>
Reviewed-by: Simon Glass <sjg@chromium.org>
CVE: CVE-2024-57258
Upstream-Status: Backport [https://source.denx.de/u-boot/u-boot/-/commit/0a10b49206a29b4aa2f80233a3e53ca0466bb0b3]
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
---
common/dlmalloc.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/common/dlmalloc.c b/common/dlmalloc.c
index de3f0422..bae2a27c 100644
--- a/common/dlmalloc.c
+++ b/common/dlmalloc.c
@@ -591,6 +591,9 @@ void *sbrk(ptrdiff_t increment)
ulong old = mem_malloc_brk;
ulong new = old + increment;
+ if ((new < mem_malloc_start) || (new > mem_malloc_end))
+ return (void *)MORECORE_FAILURE;
+
/*
* if we are giving memory back make sure we clear it out since
* we set MORECORE_CLEARS to 1
@@ -598,9 +601,6 @@ void *sbrk(ptrdiff_t increment)
if (increment < 0)
memset((void *)new, 0, -increment);
- if ((new < mem_malloc_start) || (new > mem_malloc_end))
- return (void *)MORECORE_FAILURE;
-
mem_malloc_brk = new;
return (void *)old;
--
2.34.1

View File

@@ -0,0 +1,43 @@
From db7c626204f488a802a2e58b7a788b11fde6be7d Mon Sep 17 00:00:00 2001
From: Richard Weinberger <richard@nod.at>
Date: Fri, 2 Aug 2024 12:08:44 +0200
Subject: [PATCH 6/8] dlmalloc: Fix integer overflow in request2size()
req is of type size_t, casting it to long opens the door
for an integer overflow.
Values between LONG_MAX - (SIZE_SZ + MALLOC_ALIGN_MASK) - 1 and LONG_MAX
cause and overflow such that request2size() returns MINSIZE.
Fix by removing the cast.
The origin of the cast is unclear, it's in u-boot and ppcboot since ever
and predates the CVS history.
Doug Lea's original dlmalloc implementation also doesn't have it.
Signed-off-by: Richard Weinberger <richard@nod.at>
Reviewed-by: Simon Glass <sjg@chromium.org>
CVE: CVE-2024-57258
Upstream-Status: Backport [https://source.denx.de/u-boot/u-boot/-/commit/8642b2178d2c4002c99a0b69a845a48f2ae2706f]
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
---
common/dlmalloc.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/common/dlmalloc.c b/common/dlmalloc.c
index bae2a27c..1ac4ee9f 100644
--- a/common/dlmalloc.c
+++ b/common/dlmalloc.c
@@ -379,8 +379,8 @@ nextchunk-> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/* pad request bytes into a usable size */
#define request2size(req) \
- (((long)((req) + (SIZE_SZ + MALLOC_ALIGN_MASK)) < \
- (long)(MINSIZE + MALLOC_ALIGN_MASK)) ? MINSIZE : \
+ ((((req) + (SIZE_SZ + MALLOC_ALIGN_MASK)) < \
+ (MINSIZE + MALLOC_ALIGN_MASK)) ? MINSIZE : \
(((req) + (SIZE_SZ + MALLOC_ALIGN_MASK)) & ~(MALLOC_ALIGN_MASK)))
/* Check if m has acceptable alignment */
--
2.34.1

View File

@@ -0,0 +1,40 @@
From 37095a204127b60b5e00c4c5d435d6e48a6a1c51 Mon Sep 17 00:00:00 2001
From: Richard Weinberger <richard@nod.at>
Date: Fri, 2 Aug 2024 12:08:43 +0200
Subject: [PATCH 7/8] x86: Fix ptrdiff_t for x86_64
sbrk() assumes ptrdiff_t is large enough to enlarge/shrink the heap
by LONG_MIN/LONG_MAX.
So, use the long type, also to match the rest of the Linux ecosystem.
Signed-off-by: Richard Weinberger <richard@nod.at>
Reviewed-by: Simon Glass <sjg@chromium.org>
CVE: CVE-2024-57258
Upstream-Status: Backport [https://source.denx.de/u-boot/u-boot/-/commit/c17b2a05dd50a3ba437e6373093a0d6a359cdee0]
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
---
arch/x86/include/asm/posix_types.h | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/arch/x86/include/asm/posix_types.h b/arch/x86/include/asm/posix_types.h
index dbcea7f4..e1ed9bca 100644
--- a/arch/x86/include/asm/posix_types.h
+++ b/arch/x86/include/asm/posix_types.h
@@ -20,11 +20,12 @@ typedef unsigned short __kernel_gid_t;
#if defined(__x86_64__)
typedef unsigned long __kernel_size_t;
typedef long __kernel_ssize_t;
+typedef long __kernel_ptrdiff_t;
#else
typedef unsigned int __kernel_size_t;
typedef int __kernel_ssize_t;
-#endif
typedef int __kernel_ptrdiff_t;
+#endif
typedef long __kernel_time_t;
typedef long __kernel_suseconds_t;
typedef long __kernel_clock_t;
--
2.34.1

View File

@@ -0,0 +1,41 @@
From 2c08fe306c6cbc60ec4beb434c71e56bb7abb678 Mon Sep 17 00:00:00 2001
From: Richard Weinberger <richard@nod.at>
Date: Fri, 2 Aug 2024 22:05:09 +0200
Subject: [PATCH 8/8] squashfs: Fix heap corruption in sqfs_search_dir()
res needs to be large enough to store both strings rem and target,
plus the path separator and the terminator.
Currently the space for the path separator is not accounted, so
the heap is corrupted by one byte.
Signed-off-by: Richard Weinberger <richard@nod.at>
Reviewed-by: Miquel Raynal <miquel.raynal@bootlin.com>
CVE: CVE-2024-57259
Upstream-Status: Backport [https://source.denx.de/u-boot/u-boot/-/commit/048d795bb5b3d9c5701b4855f5e74bcf6849bf5e]
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
---
fs/squashfs/sqfs.c | 7 +++++--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/fs/squashfs/sqfs.c b/fs/squashfs/sqfs.c
index a5b7890e..1bd9b2a4 100644
--- a/fs/squashfs/sqfs.c
+++ b/fs/squashfs/sqfs.c
@@ -563,8 +563,11 @@ static int sqfs_search_dir(struct squashfs_dir_stream *dirs, char **token_list,
ret = -ENOMEM;
goto out;
}
- /* Concatenate remaining tokens and symlink's target */
- res = malloc(strlen(rem) + strlen(target) + 1);
+ /*
+ * Concatenate remaining tokens and symlink's target.
+ * Allocate enough space for rem, target, '/' and '\0'.
+ */
+ res = malloc(strlen(rem) + strlen(target) + 2);
if (!res) {
ret = -ENOMEM;
goto out;
--
2.34.1

View File

@@ -7,6 +7,18 @@ SRC_URI += " file://0001-riscv32-Use-double-float-ABI-for-rv32.patch \
file://0001-fs-squashfs-sqfs_read-Prevent-arbitrary-code-executi.patch \
file://0001-net-Check-for-the-minimum-IP-fragmented-datagram-siz.patch \
file://0001-fs-squashfs-Use-kcalloc-when-relevant.patch \
file://0001-CVE-2022-30767.patch \
file://CVE-2022-30790.patch \
file://CVE-2022-2347_1.patch \
file://CVE-2022-2347_2.patch \
file://CVE-2024-57254.patch \
file://CVE-2024-57255.patch \
file://CVE-2024-57256.patch \
file://CVE-2024-57257.patch \
file://CVE-2024-57258-1.patch \
file://CVE-2024-57258-2.patch \
file://CVE-2024-57258-3.patch \
file://CVE-2024-57259.patch \
"
DEPENDS += "bc-native dtc-native python3-setuptools-native"

View File

@@ -35,6 +35,7 @@ SRC_URI = "https://github.com/lathiat/avahi/releases/download/v${PV}/avahi-${PV}
file://CVE-2023-38471-2.patch \
file://CVE-2023-38472.patch \
file://CVE-2023-38473.patch \
file://CVE-2024-52616.patch \
"
UPSTREAM_CHECK_URI = "https://github.com/lathiat/avahi/releases/"

View File

@@ -0,0 +1,104 @@
From f8710bdc8b29ee1176fe3bfaeabebbda1b7a79f7 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Petr=20Men=C5=A1=C3=ADk?= <pemensik@redhat.com>
Date: Mon, 11 Nov 2024 00:56:09 +0100
Subject: [PATCH] Properly randomize query id of DNS packets
CVE: CVE-2024-52616
Upstream-Status: Backport [https://github.com/avahi/avahi/commit/f8710bdc8b29ee1176fe3bfaeabebbda1b7a79f7]
Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com>
---
avahi-core/wide-area.c | 36 ++++++++++++++++++++++++++++--------
configure.ac | 3 ++-
2 files changed, 30 insertions(+), 9 deletions(-)
diff --git a/avahi-core/wide-area.c b/avahi-core/wide-area.c
index 971f5e714..00a15056e 100644
--- a/avahi-core/wide-area.c
+++ b/avahi-core/wide-area.c
@@ -40,6 +40,13 @@
#include "addr-util.h"
#include "rr-util.h"
+#ifdef HAVE_SYS_RANDOM_H
+#include <sys/random.h>
+#endif
+#ifndef HAVE_GETRANDOM
+# define getrandom(d, len, flags) (-1)
+#endif
+
#define CACHE_ENTRIES_MAX 500
typedef struct AvahiWideAreaCacheEntry AvahiWideAreaCacheEntry;
@@ -84,8 +91,6 @@ struct AvahiWideAreaLookupEngine {
int fd_ipv4, fd_ipv6;
AvahiWatch *watch_ipv4, *watch_ipv6;
- uint16_t next_id;
-
/* Cache */
AVAHI_LLIST_HEAD(AvahiWideAreaCacheEntry, cache);
AvahiHashmap *cache_by_key;
@@ -201,6 +206,26 @@ static void sender_timeout_callback(AvahiTimeEvent *e, void *userdata) {
avahi_time_event_update(e, avahi_elapse_time(&tv, 1000, 0));
}
+static uint16_t get_random_uint16(void) {
+ uint16_t next_id;
+
+ if (getrandom(&next_id, sizeof(next_id), 0) == -1)
+ next_id = (uint16_t) rand();
+ return next_id;
+}
+
+static uint16_t avahi_wide_area_next_id(AvahiWideAreaLookupEngine *e) {
+ uint16_t next_id;
+
+ next_id = get_random_uint16();
+ while (find_lookup(e, next_id)) {
+ /* This ID is already used, get new. */
+ next_id = get_random_uint16();
+ }
+ return next_id;
+}
+
+
AvahiWideAreaLookup *avahi_wide_area_lookup_new(
AvahiWideAreaLookupEngine *e,
AvahiKey *key,
@@ -227,11 +252,7 @@ AvahiWideAreaLookup *avahi_wide_area_lookup_new(
/* If more than 65K wide area quries are issued simultaneously,
* this will break. This should be limited by some higher level */
- for (;; e->next_id++)
- if (!find_lookup(e, e->next_id))
- break; /* This ID is not yet used. */
-
- l->id = e->next_id++;
+ l->id = avahi_wide_area_next_id(e);
/* We keep the packet around in case we need to repeat our query */
l->packet = avahi_dns_packet_new(0);
@@ -604,7 +625,6 @@ AvahiWideAreaLookupEngine *avahi_wide_area_engine_new(AvahiServer *s) {
e->watch_ipv6 = s->poll_api->watch_new(e->server->poll_api, e->fd_ipv6, AVAHI_WATCH_IN, socket_event, e);
e->n_dns_servers = e->current_dns_server = 0;
- e->next_id = (uint16_t) rand();
/* Initialize cache */
AVAHI_LLIST_HEAD_INIT(AvahiWideAreaCacheEntry, e->cache);
diff --git a/configure.ac b/configure.ac
index a3211b80e..31bce3d76 100644
--- a/configure.ac
+++ b/configure.ac
@@ -367,7 +367,8 @@ AC_FUNC_SELECT_ARGTYPES
# whether libc's malloc does too. (Same for realloc.)
#AC_FUNC_MALLOC
#AC_FUNC_REALLOC
-AC_CHECK_FUNCS([gethostname memchr memmove memset mkdir select socket strchr strcspn strdup strerror strrchr strspn strstr uname setresuid setreuid setresgid setregid strcasecmp gettimeofday putenv strncasecmp strlcpy gethostbyname seteuid setegid setproctitle getprogname])
+AC_CHECK_FUNCS([gethostname memchr memmove memset mkdir select socket strchr strcspn strdup strerror strrchr strspn strstr uname setresuid setreuid setresgid setregid strcasecmp gettimeofday putenv strncasecmp strlcpy gethostbyname seteuid setegid setproctitle getprogname getrandom])
+AC_CHECK_HEADERS([sys/random.h])
AC_FUNC_CHOWN
AC_FUNC_STAT

View File

@@ -20,7 +20,7 @@ SRC_URI = "https://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.xz \
file://0001-avoid-start-failure-with-bind-user.patch \
"
SRC_URI[sha256sum] = "e7cce9a165f7b619eefc4832f0a8dc16b005d29e3890aed6008c506ea286a5e7"
SRC_URI[sha256sum] = "fb373fac5ebbc41c645160afd5a9fb451918f6c0e69ab1d9474154e2b515de40"
UPSTREAM_CHECK_URI = "https://ftp.isc.org/isc/bind9/"
# follow the ESV versions divisible by 2

View File

@@ -0,0 +1,88 @@
From 389e2344f86319265fb72ae590b470716e038fdc Mon Sep 17 00:00:00 2001
From: "Sicelo A. Mhlongo" <absicsz@gmail.com>
Date: Tue, 17 Dec 2024 11:31:29 +0200
Subject: [PATCH] ussd: ensure ussd content fits in buffers
Fixes: CVE-2024-7539
CVE: CVE-2024-7539
Upstream-Status: Backport [https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=389e2344f86319265fb72ae590b470716e038fdc]
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
---
drivers/atmodem/ussd.c | 5 ++++-
drivers/huaweimodem/ussd.c | 5 ++++-
drivers/speedupmodem/ussd.c | 5 ++++-
3 files changed, 12 insertions(+), 3 deletions(-)
diff --git a/drivers/atmodem/ussd.c b/drivers/atmodem/ussd.c
index 3be1832..29f86dc 100644
--- a/drivers/atmodem/ussd.c
+++ b/drivers/atmodem/ussd.c
@@ -106,7 +106,7 @@ static void cusd_parse(GAtResult *result, struct ofono_ussd *ussd)
const char *content;
int dcs;
enum sms_charset charset;
- unsigned char msg[160];
+ unsigned char msg[160] = {0};
const unsigned char *msg_ptr = NULL;
long msg_len;
@@ -124,6 +124,9 @@ static void cusd_parse(GAtResult *result, struct ofono_ussd *ussd)
if (!g_at_result_iter_next_number(&iter, &dcs))
dcs = 0;
+ if (strlen(content) > sizeof(msg) * 2)
+ goto out;
+
if (!cbs_dcs_decode(dcs, NULL, NULL, &charset, NULL, NULL, NULL)) {
ofono_error("Unsupported USSD data coding scheme (%02x)", dcs);
status = 4; /* Not supported */
diff --git a/drivers/huaweimodem/ussd.c b/drivers/huaweimodem/ussd.c
index fbed3cd..4160b7d 100644
--- a/drivers/huaweimodem/ussd.c
+++ b/drivers/huaweimodem/ussd.c
@@ -50,7 +50,7 @@ static void cusd_parse(GAtResult *result, struct ofono_ussd *ussd)
GAtResultIter iter;
int status, dcs;
const char *content;
- unsigned char msg[160];
+ unsigned char msg[160] = {0};
const unsigned char *msg_ptr = NULL;
long msg_len;
@@ -68,6 +68,9 @@ static void cusd_parse(GAtResult *result, struct ofono_ussd *ussd)
if (!g_at_result_iter_next_number(&iter, &dcs))
dcs = 0;
+ if (strlen(content) > sizeof(msg) * 2)
+ goto out;
+
msg_ptr = decode_hex_own_buf(content, -1, &msg_len, 0, msg);
out:
diff --git a/drivers/speedupmodem/ussd.c b/drivers/speedupmodem/ussd.c
index 57b91d7..99af19a 100644
--- a/drivers/speedupmodem/ussd.c
+++ b/drivers/speedupmodem/ussd.c
@@ -49,7 +49,7 @@ static void cusd_parse(GAtResult *result, struct ofono_ussd *ussd)
GAtResultIter iter;
int status, dcs;
const char *content;
- unsigned char msg[160];
+ unsigned char msg[160] = {0};
const unsigned char *msg_ptr = NULL;
long msg_len;
@@ -67,6 +67,9 @@ static void cusd_parse(GAtResult *result, struct ofono_ussd *ussd)
if (!g_at_result_iter_next_number(&iter, &dcs))
dcs = 0;
+ if (strlen(content) > sizeof(msg) * 2)
+ goto out;
+
msg_ptr = decode_hex_own_buf(content, -1, &msg_len, 0, msg);
out:
--
2.40.0

View File

@@ -0,0 +1,52 @@
From 29ff6334b492504ace101be748b256e6953d2c2f Mon Sep 17 00:00:00 2001
From: "Sicelo A. Mhlongo" <absicsz@gmail.com>
Date: Tue, 17 Dec 2024 11:31:28 +0200
Subject: [PATCH] atmodem: sms: ensure buffer is initialized before use
Fixes: CVE-2024-7540
Fixes: CVE-2024-7541
Fixes: CVE-2024-7542
CVE: CVE-2024-7540
CVE: CVE-2024-7541
CVE: CVE-2024-7542
Upstream-Status: Backport [https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=29ff6334b492504ace101be748b256e6953d2c2f]
Signed-off-by: Peter Marko <peter.marko@siemens.com>
---
drivers/atmodem/sms.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/atmodem/sms.c b/drivers/atmodem/sms.c
index d994856b..0668c631 100644
--- a/drivers/atmodem/sms.c
+++ b/drivers/atmodem/sms.c
@@ -412,7 +412,7 @@ static void at_cmt_notify(GAtResult *result, gpointer user_data)
struct sms_data *data = ofono_sms_get_data(sms);
GAtResultIter iter;
const char *hexpdu;
- unsigned char pdu[176];
+ unsigned char pdu[176] = {0};
long pdu_len;
int tpdu_len;
@@ -479,7 +479,7 @@ static void at_cmgr_notify(GAtResult *result, gpointer user_data)
struct sms_data *data = ofono_sms_get_data(sms);
GAtResultIter iter;
const char *hexpdu;
- unsigned char pdu[176];
+ unsigned char pdu[176] = {0};
long pdu_len;
int tpdu_len;
@@ -661,7 +661,7 @@ static void at_cmgl_notify(GAtResult *result, gpointer user_data)
struct sms_data *data = ofono_sms_get_data(sms);
GAtResultIter iter;
const char *hexpdu;
- unsigned char pdu[176];
+ unsigned char pdu[176] = {0};
long pdu_len;
int tpdu_len;
int index;
--
2.30.2

View File

@@ -0,0 +1,30 @@
From 90e60ada012de42964214d8155260f5749d0dcc7 Mon Sep 17 00:00:00 2001
From: Ivaylo Dimitrov <ivo.g.dimitrov.75@gmail.com>
Date: Tue, 3 Dec 2024 21:43:50 +0200
Subject: [PATCH] stkutil: Fix CVE-2024-7543
CVE: CVE-2024-7543
Upstream-Status: Backport [https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=90e60ada012de42964214d8155260f5749d0dcc7]
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
---
src/stkutil.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/src/stkutil.c b/src/stkutil.c
index 4f31af4..fdd11ad 100644
--- a/src/stkutil.c
+++ b/src/stkutil.c
@@ -1876,6 +1876,10 @@ static bool parse_dataobj_mms_reference(struct comprehension_tlv_iter *iter,
data = comprehension_tlv_iter_get_data(iter);
mr->len = len;
+
+ if (len > sizeof(mr->ref))
+ return false;
+
memcpy(mr->ref, data, len);
return true;
--
2.40.0

View File

@@ -0,0 +1,30 @@
From a240705a0d5d41eca6de4125ab2349ecde4c873a Mon Sep 17 00:00:00 2001
From: Ivaylo Dimitrov <ivo.g.dimitrov.75@gmail.com>
Date: Tue, 3 Dec 2024 21:43:49 +0200
Subject: [PATCH] stkutil: Fix CVE-2024-7544
CVE: CVE-2024-7544
Upstream-Status: Backport [https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=a240705a0d5d41eca6de4125ab2349ecde4c873a]
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
---
src/stkutil.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/src/stkutil.c b/src/stkutil.c
index fdd11ad..475caaa 100644
--- a/src/stkutil.c
+++ b/src/stkutil.c
@@ -1898,6 +1898,10 @@ static bool parse_dataobj_mms_id(struct comprehension_tlv_iter *iter,
data = comprehension_tlv_iter_get_data(iter);
mi->len = len;
+
+ if (len > sizeof(mi->id))
+ return false;
+
memcpy(mi->id, data, len);
return true;
--
2.40.0

View File

@@ -0,0 +1,32 @@
From 556e14548c38c2b96d85881542046ee7ed750bb5 Mon Sep 17 00:00:00 2001
From: Sicelo A. Mhlongo <absicsz@gmail.com>
Date: Wed, Dec 4 12:07:34 2024 +0200
Subject: [PATCH] stkutil: ensure data fits in buffer
Fixes CVE-2024-7545
CVE: CVE-2024-7545
Upstream-Status: Backport [https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=556e14548c38c2b96d85881542046ee7ed750bb5]
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
---
src/stkutil.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/src/stkutil.c b/src/stkutil.c
index 475caaa..e1fd75c 100644
--- a/src/stkutil.c
+++ b/src/stkutil.c
@@ -1938,6 +1938,10 @@ static bool parse_dataobj_mms_content_id(
data = comprehension_tlv_iter_get_data(iter);
mci->len = len;
+
+ if (len > sizeof(mci->id))
+ return false;
+
memcpy(mci->id, data, len);
return true;
--
2.40.0

View File

@@ -0,0 +1,30 @@
From 79ea6677669e50b0bb9c231765adb4f81c375f63 Mon Sep 17 00:00:00 2001
From: Ivaylo Dimitrov <ivo.g.dimitrov.75@gmail.com>
Date: Tue, 3 Dec 2024 21:43:52 +0200
Subject: [PATCH] Fix CVE-2024-7546
CVE: CVE-2024-7546
Upstream-Status: Backport [https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=79ea6677669e50b0bb9c231765adb4f81c375f63]
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
---
src/stkutil.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/src/stkutil.c b/src/stkutil.c
index e1fd75c..88a715d 100644
--- a/src/stkutil.c
+++ b/src/stkutil.c
@@ -1783,6 +1783,10 @@ static bool parse_dataobj_frame_layout(struct comprehension_tlv_iter *iter,
fl->layout = data[0];
fl->len = len - 1;
+
+ if (fl->len > sizeof(fl->size))
+ return false;
+
memcpy(fl->size, data + 1, fl->len);
return true;
--
2.40.0

View File

@@ -0,0 +1,29 @@
From 305df050d02aea8532f7625d6642685aa530f9b0 Mon Sep 17 00:00:00 2001
From: Ivaylo Dimitrov <ivo.g.dimitrov.75@gmail.com>
Date: Tue, 3 Dec 2024 21:43:51 +0200
Subject: [PATCH] Fix CVE-2024-7547
CVE: CVE-2024-7547
Upstream-Status: Backport [https://git.kernel.org/pub/scm/network/ofono/ofono.git/commit/?id=305df050d02aea8532f7625d6642685aa530f9b0]
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
---
src/smsutil.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/src/smsutil.c b/src/smsutil.c
index e073a06..f8ff428 100644
--- a/src/smsutil.c
+++ b/src/smsutil.c
@@ -1475,6 +1475,9 @@ static gboolean decode_command(const unsigned char *pdu, int len,
if ((len - offset) < out->command.cdl)
return FALSE;
+ if (out->command.cdl > sizeof(out->command.cd))
+ return FALSE;
+
memcpy(out->command.cd, pdu + offset, out->command.cdl);
return TRUE;
--
2.40.0

View File

@@ -18,6 +18,13 @@ SRC_URI = "\
file://CVE-2023-2794-0002.patch \
file://CVE-2023-2794-0003.patch \
file://CVE-2023-2794-0004.patch \
file://CVE-2024-7539.patch \
file://CVE-2024-7543.patch \
file://CVE-2024-7544.patch \
file://CVE-2024-7545.patch \
file://CVE-2024-7546.patch \
file://CVE-2024-7547.patch \
file://CVE-2024-7540_CVE-2024-7541_CVE-2024-7542.patch \
"
SRC_URI[sha256sum] = "c0b96d3013447ec2bcb74579bef90e4e59c68dbfa4b9c6fbce5d12401a43aac7"

View File

@@ -0,0 +1,140 @@
From 0832aac79517611dd4de93ad0a83577994d9c907 Mon Sep 17 00:00:00 2001
From: "djm@openbsd.org" <djm@openbsd.org>
Date: Tue, 18 Feb 2025 08:02:48 +0000
Subject: [PATCH] upstream: Fix cases where error codes were not correctly set
Reported by the Qualys Security Advisory team. ok markus@
OpenBSD-Commit-ID: 7bcd4ffe0fa1e27ff98d451fb9c22f5fae6e610d
Upstream-Status: Backport [https://github.com/openssh/openssh-portable/commit/0832aac79517611dd4de93ad0a83577994d9c907]
CVE: CVE-2025-26465
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
---
krl.c | 2 ++
ssh-agent.c | 3 +++
ssh-sk-client.c | 2 ++
sshconnect2.c | 5 ++++-
sshsig.c | 1 +
5 files changed, 12 insertions(+), 1 deletion(-)
diff --git a/krl.c b/krl.c
index 17b88ed..aef2001 100644
--- a/krl.c
+++ b/krl.c
@@ -674,6 +674,7 @@ revoked_certs_generate(struct revoked_certs *rc, struct sshbuf *buf)
break;
case KRL_SECTION_CERT_SERIAL_BITMAP:
if (rs->lo - bitmap_start > INT_MAX) {
+ r = SSH_ERR_INVALID_FORMAT;
error_f("insane bitmap gap");
goto out;
}
@@ -1008,6 +1009,7 @@ ssh_krl_from_blob(struct sshbuf *buf, struct ssh_krl **krlp,
goto out;
if ((krl = ssh_krl_init()) == NULL) {
+ r = SSH_ERR_ALLOC_FAIL;
error_f("alloc failed");
goto out;
}
diff --git a/ssh-agent.c b/ssh-agent.c
index 4dbb4f3..6382ef4 100644
--- a/ssh-agent.c
+++ b/ssh-agent.c
@@ -1198,6 +1198,7 @@ parse_key_constraint_extension(struct sshbuf *m, char **sk_providerp,
"restrict-destination-v00@openssh.com") == 0) {
if (*dcsp != NULL) {
error_f("%s already set", ext_name);
+ r = SSH_ERR_INVALID_FORMAT;
goto out;
}
if ((r = sshbuf_froms(m, &b)) != 0) {
@@ -1207,6 +1208,7 @@ parse_key_constraint_extension(struct sshbuf *m, char **sk_providerp,
while (sshbuf_len(b) != 0) {
if (*ndcsp >= AGENT_MAX_DEST_CONSTRAINTS) {
error_f("too many %s constraints", ext_name);
+ r = SSH_ERR_INVALID_FORMAT;
goto out;
}
*dcsp = xrecallocarray(*dcsp, *ndcsp, *ndcsp + 1,
@@ -1663,6 +1665,7 @@ process_ext_session_bind(SocketEntry *e)
/* record new key/sid */
if (e->nsession_ids >= AGENT_MAX_SESSION_IDS) {
error_f("too many session IDs recorded");
+ r = -1;
goto out;
}
e->session_ids = xrecallocarray(e->session_ids, e->nsession_ids,
diff --git a/ssh-sk-client.c b/ssh-sk-client.c
index 321fe53..750accb 100644
--- a/ssh-sk-client.c
+++ b/ssh-sk-client.c
@@ -439,6 +439,7 @@ sshsk_load_resident(const char *provider_path, const char *device,
}
if ((srk = calloc(1, sizeof(*srk))) == NULL) {
error_f("calloc failed");
+ r = SSH_ERR_ALLOC_FAIL;
goto out;
}
srk->key = key;
@@ -450,6 +451,7 @@ sshsk_load_resident(const char *provider_path, const char *device,
if ((tmp = recallocarray(srks, nsrks, nsrks + 1,
sizeof(*srks))) == NULL) {
error_f("recallocarray keys failed");
+ r = SSH_ERR_ALLOC_FAIL;
goto out;
}
debug_f("srks[%zu]: %s %s uidlen %zu", nsrks,
diff --git a/sshconnect2.c b/sshconnect2.c
index 83ae4a4..6cfae2a 100644
--- a/sshconnect2.c
+++ b/sshconnect2.c
@@ -97,7 +97,7 @@ static int
verify_host_key_callback(struct sshkey *hostkey, struct ssh *ssh)
{
if (verify_host_key(xxx_host, xxx_hostaddr, hostkey,
- xxx_conn_info) == -1)
+ xxx_conn_info) != 0)
fatal("Host key verification failed.");
return 0;
}
@@ -713,6 +713,7 @@ input_userauth_pk_ok(int type, u_int32_t seq, struct ssh *ssh)
if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) {
debug_f("server sent unknown pkalg %s", pkalg);
+ r = SSH_ERR_INVALID_FORMAT;
goto done;
}
if ((r = sshkey_from_blob(pkblob, blen, &key)) != 0) {
@@ -723,6 +724,7 @@ input_userauth_pk_ok(int type, u_int32_t seq, struct ssh *ssh)
error("input_userauth_pk_ok: type mismatch "
"for decoded key (received %d, expected %d)",
key->type, pktype);
+ r = SSH_ERR_INVALID_FORMAT;
goto done;
}
@@ -742,6 +744,7 @@ input_userauth_pk_ok(int type, u_int32_t seq, struct ssh *ssh)
SSH_FP_DEFAULT);
error_f("server replied with unknown key: %s %s",
sshkey_type(key), fp == NULL ? "<ERROR>" : fp);
+ r = SSH_ERR_INVALID_FORMAT;
goto done;
}
ident = format_identity(id);
diff --git a/sshsig.c b/sshsig.c
index 7736134..76d7c21 100644
--- a/sshsig.c
+++ b/sshsig.c
@@ -857,6 +857,7 @@ cert_filter_principals(const char *path, u_long linenum,
}
if ((principals = sshbuf_dup_string(nprincipals)) == NULL) {
error_f("buffer error");
+ r = SSH_ERR_ALLOC_FAIL;
goto out;
}
/* success */
--
2.25.1

View File

@@ -37,6 +37,7 @@ SRC_URI = "http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar
file://CVE-2023-51384.patch \
file://CVE-2023-51385.patch \
file://CVE-2024-6387.patch \
file://CVE-2025-26465.patch \
"
SRC_URI[sha256sum] = "fd497654b7ab1686dac672fb83dfb4ba4096e8b5ffcdaccd262380ae58bec5e7"

View File

@@ -1,202 +0,0 @@
From 72ae83ad214d2eef262461365a1975707f862712 Mon Sep 17 00:00:00 2001
From: Viktor Dukhovni <viktor@openssl.org>
Date: Thu, 19 Sep 2024 01:02:40 +1000
Subject: [PATCH] Harden BN_GF2m_poly2arr against misuse.
The BN_GF2m_poly2arr() function converts characteristic-2 field
(GF_{2^m}) Galois polynomials from a representation as a BIGNUM bitmask,
to a compact array with just the exponents of the non-zero terms.
These polynomials are then used in BN_GF2m_mod_arr() to perform modular
reduction. A precondition of calling BN_GF2m_mod_arr() is that the
polynomial must have a non-zero constant term (i.e. the array has `0` as
its final element).
Internally, callers of BN_GF2m_poly2arr() did not verify that
precondition, and binary EC curve parameters with an invalid polynomial
could lead to out of bounds memory reads and writes in BN_GF2m_mod_arr().
The precondition is always true for polynomials that arise from the
standard form of EC parameters for characteristic-two fields (X9.62).
See the "Finite Field Identification" section of:
https://www.itu.int/ITU-T/formal-language/itu-t/x/x894/2018-cor1/ANSI-X9-62.html
The OpenSSL GF(2^m) code supports only the trinomial and pentanomial
basis X9.62 forms.
This commit updates BN_GF2m_poly2arr() to return `0` (failure) when
the constant term is zero (i.e. the input bitmask BIGNUM is not odd).
Additionally, the return value is made unambiguous when there is not
enough space to also pad the array with a final `-1` sentinel value.
The return value is now always the number of elements (including the
final `-1`) that would be filled when the output array is sufficiently
large. Previously the same count was returned both when the array has
just enough room for the final `-1` and when it had only enough space
for non-sentinel values.
Finally, BN_GF2m_poly2arr() is updated to reject polynomials whose
degree exceeds `OPENSSL_ECC_MAX_FIELD_BITS`, this guards against
CPU exhausition attacks via excessively large inputs.
The above issues do not arise in processing X.509 certificates. These
generally have EC keys from "named curves", and RFC5840 (Section 2.1.1)
disallows explicit EC parameters. The TLS code in OpenSSL enforces this
constraint only after the certificate is decoded, but, even if explicit
parameters are specified, they are in X9.62 form, which cannot represent
problem values as noted above.
Initially reported as oss-fuzz issue 71623.
A closely related issue was earlier reported in
<https://github.com/openssl/openssl/issues/19826>.
Severity: Low, CVE-2024-9143
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/25639)
(cherry picked from commit 8e008cb8b23ec7dc75c45a66eeed09c815b11cd2)
CVE: CVE-2024-9143
Upstream-Status: Backport [https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712]
Signed-off-by: Peter Marko <peter.marko@siemens.com>
---
crypto/bn/bn_gf2m.c | 28 +++++++++++++++-------
test/ec_internal_test.c | 51 +++++++++++++++++++++++++++++++++++++++++
2 files changed, 71 insertions(+), 8 deletions(-)
diff --git a/crypto/bn/bn_gf2m.c b/crypto/bn/bn_gf2m.c
index c811ae82d6b15..bcc66613cc14d 100644
--- a/crypto/bn/bn_gf2m.c
+++ b/crypto/bn/bn_gf2m.c
@@ -15,6 +15,7 @@
#include "bn_local.h"
#ifndef OPENSSL_NO_EC2M
+# include <openssl/ec.h>
/*
* Maximum number of iterations before BN_GF2m_mod_solve_quad_arr should
@@ -1140,16 +1141,26 @@ int BN_GF2m_mod_solve_quad(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
/*
* Convert the bit-string representation of a polynomial ( \sum_{i=0}^n a_i *
* x^i) into an array of integers corresponding to the bits with non-zero
- * coefficient. Array is terminated with -1. Up to max elements of the array
- * will be filled. Return value is total number of array elements that would
- * be filled if array was large enough.
+ * coefficient. The array is intended to be suitable for use with
+ * `BN_GF2m_mod_arr()`, and so the constant term of the polynomial must not be
+ * zero. This translates to a requirement that the input BIGNUM `a` is odd.
+ *
+ * Given sufficient room, the array is terminated with -1. Up to max elements
+ * of the array will be filled.
+ *
+ * The return value is total number of array elements that would be filled if
+ * array was large enough, including the terminating `-1`. It is `0` when `a`
+ * is not odd or the constant term is zero contrary to requirement.
+ *
+ * The return value is also `0` when the leading exponent exceeds
+ * `OPENSSL_ECC_MAX_FIELD_BITS`, this guards against CPU exhaustion attacks,
*/
int BN_GF2m_poly2arr(const BIGNUM *a, int p[], int max)
{
int i, j, k = 0;
BN_ULONG mask;
- if (BN_is_zero(a))
+ if (!BN_is_odd(a))
return 0;
for (i = a->top - 1; i >= 0; i--) {
@@ -1167,12 +1178,13 @@ int BN_GF2m_poly2arr(const BIGNUM *a, int p[], int max)
}
}
- if (k < max) {
+ if (k > 0 && p[0] > OPENSSL_ECC_MAX_FIELD_BITS)
+ return 0;
+
+ if (k < max)
p[k] = -1;
- k++;
- }
- return k;
+ return k + 1;
}
/*
diff --git a/test/ec_internal_test.c b/test/ec_internal_test.c
index 8c2cd05631696..02cfd4e9d8858 100644
--- a/test/ec_internal_test.c
+++ b/test/ec_internal_test.c
@@ -155,6 +155,56 @@ static int field_tests_ecp_mont(void)
}
#ifndef OPENSSL_NO_EC2M
+/* Test that decoding of invalid GF2m field parameters fails. */
+static int ec2m_field_sanity(void)
+{
+ int ret = 0;
+ BN_CTX *ctx = BN_CTX_new();
+ BIGNUM *p, *a, *b;
+ EC_GROUP *group1 = NULL, *group2 = NULL, *group3 = NULL;
+
+ TEST_info("Testing GF2m hardening\n");
+
+ BN_CTX_start(ctx);
+ p = BN_CTX_get(ctx);
+ a = BN_CTX_get(ctx);
+ if (!TEST_ptr(b = BN_CTX_get(ctx))
+ || !TEST_true(BN_one(a))
+ || !TEST_true(BN_one(b)))
+ goto out;
+
+ /* Even pentanomial value should be rejected */
+ if (!TEST_true(BN_set_word(p, 0xf2)))
+ goto out;
+ if (!TEST_ptr_null(group1 = EC_GROUP_new_curve_GF2m(p, a, b, ctx)))
+ TEST_error("Zero constant term accepted in GF2m polynomial");
+
+ /* Odd hexanomial should also be rejected */
+ if (!TEST_true(BN_set_word(p, 0xf3)))
+ goto out;
+ if (!TEST_ptr_null(group2 = EC_GROUP_new_curve_GF2m(p, a, b, ctx)))
+ TEST_error("Hexanomial accepted as GF2m polynomial");
+
+ /* Excessive polynomial degree should also be rejected */
+ if (!TEST_true(BN_set_word(p, 0x71))
+ || !TEST_true(BN_set_bit(p, OPENSSL_ECC_MAX_FIELD_BITS + 1)))
+ goto out;
+ if (!TEST_ptr_null(group3 = EC_GROUP_new_curve_GF2m(p, a, b, ctx)))
+ TEST_error("GF2m polynomial degree > %d accepted",
+ OPENSSL_ECC_MAX_FIELD_BITS);
+
+ ret = group1 == NULL && group2 == NULL && group3 == NULL;
+
+ out:
+ EC_GROUP_free(group1);
+ EC_GROUP_free(group2);
+ EC_GROUP_free(group3);
+ BN_CTX_end(ctx);
+ BN_CTX_free(ctx);
+
+ return ret;
+}
+
/* test EC_GF2m_simple_method directly */
static int field_tests_ec2_simple(void)
{
@@ -443,6 +493,7 @@ int setup_tests(void)
ADD_TEST(field_tests_ecp_simple);
ADD_TEST(field_tests_ecp_mont);
#ifndef OPENSSL_NO_EC2M
+ ADD_TEST(ec2m_field_sanity);
ADD_TEST(field_tests_ec2_simple);
#endif
ADD_ALL_TESTS(field_tests_default, crv_len);

View File

@@ -12,14 +12,13 @@ SRC_URI = "https://github.com/openssl/openssl/releases/download/openssl-${PV}/op
file://0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch \
file://afalg.patch \
file://0001-Configure-do-not-tweak-mips-cflags.patch \
file://CVE-2024-9143.patch \
"
SRC_URI:append:class-nativesdk = " \
file://environment.d-openssl.sh \
"
SRC_URI[sha256sum] = "23c666d0edf20f14249b3d8f0368acaee9ab585b09e1de82107c66e1f3ec9533"
SRC_URI[sha256sum] = "57e03c50feab5d31b152af2b764f10379aecd8ee92f16c985983ce4a99f7ef86"
inherit lib_package multilib_header multilib_script ptest perlnative
MULTILIB_SCRIPTS = "${PN}-bin:${bindir}/c_rehash"

View File

@@ -0,0 +1,113 @@
From 4ee1f31cf80019c5907876576d6dfd49368d660f Mon Sep 17 00:00:00 2001
From: Gerhard Rieger <gerhard@dest-unreach.org>
Date: Fri, 6 Dec 2024 11:42:09 +0100
Subject: [PATCH] Version 1.8.0.2 - CVE-2024-54661: Arbitrary file overwrite in
readline.sh
CVE: CVE-2024-54661
Upstream-Status: Backport [https://repo.or.cz/socat.git/commitdiff/4ee1f31cf80019c5907876576d6dfd49368d660f]
Signed-off-by: Peter Marko <peter.marko@siemens.com>
---
readline.sh | 10 +++++++--
test.sh | 63 +++++++++++++++++++++++++++++++++++++++++++++++++++++
2 files changed, 71 insertions(+), 2 deletions(-)
diff --git a/readline.sh b/readline.sh
index b6f8438..1045303 100755
--- a/readline.sh
+++ b/readline.sh
@@ -22,9 +22,15 @@ if [ "$withhistfile" ]; then
else
HISTOPT=
fi
-mkdir -p /tmp/$USER || exit 1
#
#
-exec socat -d readline"$HISTOPT",noecho='[Pp]assword:' exec:"$PROGRAM",sigint,pty,setsid,ctty,raw,echo=0,stderr 2>/tmp/$USER/stderr2
+if test -w .; then
+ STDERR=./socat-readline.${1##*/}.log
+ rm -f $STDERR
+else
+ STDERR=/dev/null
+fi
+
+exec socat -d readline"$HISTOPT",noecho='[Pp]assword:' exec:"$PROGRAM",sigint,pty,setsid,ctty,raw,echo=0,stderr 2>$STDERR
diff --git a/test.sh b/test.sh
index 46bebf8..5204ac7 100755
--- a/test.sh
+++ b/test.sh
@@ -15657,6 +15657,69 @@ esac
N=$((N+1))
+# Test the readline.sh file overwrite vulnerability
+NAME=READLINE_SH_OVERWRITE
+case "$TESTS" in
+*%$N%*|*%functions%*|*%bugs%*|*%readline%*|*%security%*|*%$NAME%*)
+TEST="$NAME: Test the readline.sh file overwrite vulnerability"
+# Create a symlink /tmp/$USER/stderr2 pointing to a temporary file,
+# run readline.sh
+# When the temporary file is kept the test succeeded
+if ! eval $NUMCOND; then :
+elif ! cond=$(checkconds \
+ "" \
+ "" \
+ "readline.sh" \
+ "" \
+ "" \
+ "" \
+ "" ); then
+ $PRINTF "test $F_n $TEST... ${YELLOW}$cond${NORMAL}\n" $N
+ numCANT=$((numCANT+1))
+ listCANT="$listCANT $N"
+ namesCANT="$namesCANT $NAME"
+else
+ tf="$td/test$N.file"
+ te="$td/test$N.stderr"
+ tdiff="$td/test$N.diff"
+ da="test$N $(date) $RANDOM"
+ echo "$da" >"$tf"
+ ln -sf "$tf" /tmp/$USER/stderr2
+ CMD0="readline.sh cat"
+ printf "test $F_n $TEST... " $N
+ $CMD0 </dev/null >/dev/null 2>"${te}0"
+ rc0=$?
+# if [ "$rc0" -ne 0 ]; then
+# $PRINTF "$CANT (rc0=$rc0)\n"
+# echo "$CMD0"
+# cat "${te}0" >&2
+# numCANT=$((numCANT+1))
+# listCANT="$listCANT $N"
+# namesCANT="$namesCANT $NAME"
+# elif ! echo "$da" |diff - "$tf" >$tdiff; then
+ if ! echo "$da" |diff - "$tf" >$tdiff; then
+ $PRINTF "$FAILED (diff)\n"
+ echo "$CMD0 &"
+ cat "${te}0" >&2
+ echo "// diff:" >&2
+ cat "$tdiff" >&2
+ numFAIL=$((numFAIL+1))
+ listFAIL="$listFAIL $N"
+ namesFAIL="$namesFAIL $NAME"
+ else
+ $PRINTF "$OK\n"
+ if [ "$VERBOSE" ]; then echo "$CMD0 &"; fi
+ if [ "$DEBUG" ]; then cat "${te}0" >&2; fi
+ if [ "$VERBOSE" ]; then echo "$CMD1"; fi
+ if [ "$DEBUG" ]; then cat "${te}1" >&2; fi
+ numOK=$((numOK+1))
+ listOK="$listOK $N"
+ fi
+fi # NUMCOND
+ ;;
+esac
+N=$((N+1))
+
# end of common tests
##################################################################################
--
2.30.2

View File

@@ -9,7 +9,9 @@ LICENSE = "GPL-2.0-with-OpenSSL-exception"
LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263 \
file://README;beginline=257;endline=287;md5=82520b052f322ac2b5b3dfdc7c7eea86"
SRC_URI = "http://www.dest-unreach.org/socat/download/socat-${PV}.tar.bz2"
SRC_URI = "http://www.dest-unreach.org/socat/download/socat-${PV}.tar.bz2 \
file://CVE-2024-54661.patch \
"
SRC_URI[sha256sum] = "fbd42bd2f0e54a3af6d01bdf15385384ab82dbc0e4f1a5e153b3e0be1b6380ac"

View File

@@ -1,6 +1,6 @@
SRCBRANCH ?= "release/2.35/master"
PV = "2.35"
SRCREV_glibc ?= "37214df5f103f4075cf0a79a227e70f3e064701c"
SRCREV_glibc ?= "549d8315791aa8176ff1537db3e09c185c6e602f"
SRCREV_localedef ?= "794da69788cbf9bf57b59a852f9f11307663fa87"
GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git"

View File

@@ -0,0 +1,61 @@
From 6128e82ebe973163d2dd614d31753c88c0c4d645 Mon Sep 17 00:00:00 2001
From: Adhemerval Zanella Netto <adhemerval.zanella@linaro.org>
Date: Wed, 21 Sep 2022 10:51:07 -0300
Subject: [PATCH] sunrpc: Suppress GCC -Os warning on user2netname
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
GCC with -Os warns that sprint might overflow:
netname.c: In function ‘user2netname’:
netname.c:51:28: error: ‘%s’ directive writing up to 255 bytes into a
region of size between 239 and 249 [-Werror=format-overflow=]
51 | sprintf (netname, "%s.%d@%s", OPSYS, uid, dfltdom);
| ^~ ~~~~~~~
netname.c:51:3: note: ‘sprintf’ output between 8 and 273 bytes into a
destination of size 256
51 | sprintf (netname, "%s.%d@%s", OPSYS, uid, dfltdom);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
cc1: all warnings being treated as errors
However the code does test prior the sprintf call that dfltdom plus
the required extra space for OPSYS, uid, and extra character will not
overflow and return 0 instead.
Checked on x86_64-linux-gnu and i686-linux-gnu.
Reviewed-by: Carlos O'Donell <carlos@redhat.com>
Tested-by: Carlos O'Donell <carlos@redhat.com>
Upstream-Status: Backport [https://github.com/bminor/glibc/commit/6128e82ebe973163d2dd614d31753c88c0c4d645]
Signed-off-by: nikhil <nikhil.r@kpit.com>
---
sunrpc/netname.c | 6 ++++++
1 file changed, 6 insertions(+)
diff --git a/sunrpc/netname.c b/sunrpc/netname.c
index bf7f0b81c43..c1d1c43e502 100644
--- a/sunrpc/netname.c
+++ b/sunrpc/netname.c
@@ -20,6 +20,7 @@
#include <string.h>
#include <rpc/rpc.h>
#include <shlib-compat.h>
+#include <libc-diag.h>
#include "nsswitch.h"
@@ -48,7 +49,12 @@ user2netname (char netname[MAXNETNAMELEN + 1], const uid_t uid,
if ((strlen (dfltdom) + OPSYS_LEN + 3 + MAXIPRINT) > (size_t) MAXNETNAMELEN)
return 0;
+ /* GCC with -Os warns that sprint might overflow while handling dfltdom,
+ however the above test does check if an overflow would happen. */
+ DIAG_PUSH_NEEDS_COMMENT;
+ DIAG_IGNORE_Os_NEEDS_COMMENT (8, "-Wformat-overflow");
sprintf (netname, "%s.%d@%s", OPSYS, uid, dfltdom);
+ DIAG_POP_NEEDS_COMMENT;
i = strlen (netname);
if (netname[i - 1] == '.')
netname[i - 1] = '\0';

View File

@@ -64,6 +64,7 @@ SRC_URI = "${GLIBC_GIT_URI};branch=${SRCBRANCH};name=glibc \
\
file://0001-Revert-Linux-Implement-a-useful-version-of-_startup_.patch \
file://0002-get_nscd_addresses-Fix-subscript-typos-BZ-29605.patch \
file://0003-sunrpc-suppress-gcc-os-warning-on-user2netname.patch \
"
S = "${WORKDIR}/git"
B = "${WORKDIR}/build-${TARGET_SYS}"

View File

@@ -24,7 +24,7 @@ IMAGE_FSTYPES = "wic.vmdk wic.vhd wic.vhdx"
inherit core-image setuptools3
SRCREV ?= "cb03c7cf84b3e5a974395f7c02754a01913ddbe1"
SRCREV ?= "91484dd59353b085bb6c463da9ecd5d2b51d8e64"
SRC_URI = "git://git.yoctoproject.org/poky;branch=kirkstone \
file://Yocto_Build_Appliance.vmx \
file://Yocto_Build_Appliance.vmxf \

View File

@@ -13,6 +13,6 @@ API = "--enable-obsolete-api"
do_install:append () {
rm -rf ${D}${includedir}
rm -rf ${D}${libdir}/pkgconfig
rm -rf ${D}${libdir}/libcrypt.so
rm -rf ${D}${datadir}
}

View File

@@ -0,0 +1,38 @@
From 5a19e21605398cef6a8b1452477a8705cb41562b Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Wed, 2 Nov 2022 16:13:27 +0100
Subject: [PATCH] malloc-fail: Fix use-after-free in xmlXIncludeAddNode
Found with libFuzzer, see #344.
Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b]
CVE: CVE-2022-49043
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
---
xinclude.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/xinclude.c b/xinclude.c
index e5fdf0f..36fa8ec 100644
--- a/xinclude.c
+++ b/xinclude.c
@@ -612,14 +612,15 @@ xmlXIncludeAddNode(xmlXIncludeCtxtPtr ctxt, xmlNodePtr cur) {
}
URL = xmlSaveUri(uri);
xmlFreeURI(uri);
- xmlFree(URI);
if (URL == NULL) {
xmlXIncludeErr(ctxt, cur, XML_XINCLUDE_HREF_URI,
"invalid value URI %s\n", URI);
if (fragment != NULL)
xmlFree(fragment);
+ xmlFree(URI);
return(-1);
}
+ xmlFree(URI);
if (xmlStrEqual(URL, ctxt->doc->URL))
local = 1;
--
2.25.1

View File

@@ -0,0 +1,42 @@
From 245b70d7d2768572ae1b05b3668ca858b9ec4ed4 Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Tue, 10 Dec 2024 16:52:05 +0100
Subject: [PATCH] [CVE-2024-56171] Fix use-after-free after
xmlSchemaItemListAdd
xmlSchemaItemListAdd can reallocate the items array. Update local
variables after adding item in
- xmlSchemaIDCFillNodeTables
- xmlSchemaBubbleIDCNodeTables
Fixes #828.
CVE: CVE-2024-56171
Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/245b70d7d2768572ae1b05b3668ca858b9ec4ed4]
Signed-off-by: Peter Marko <peter.marko@siemens.com>
---
xmlschemas.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xmlschemas.c b/xmlschemas.c
index a089ebc5..18e35e75 100644
--- a/xmlschemas.c
+++ b/xmlschemas.c
@@ -23647,6 +23647,7 @@ xmlSchemaIDCFillNodeTables(xmlSchemaValidCtxtPtr vctxt,
}
if (xmlSchemaItemListAdd(bind->dupls, bind->nodeTable[j]) == -1)
goto internal_error;
+ dupls = (xmlSchemaPSVIIDCNodePtr *) bind->dupls->items;
/*
* Remove the duplicate entry from the IDC node-table.
*/
@@ -23863,6 +23864,8 @@ xmlSchemaBubbleIDCNodeTables(xmlSchemaValidCtxtPtr vctxt)
goto internal_error;
}
xmlSchemaItemListAdd(parBind->dupls, parNode);
+ dupls = (xmlSchemaPSVIIDCNodePtr *)
+ parBind->dupls->items;
} else {
/*
* Add the node-table entry (node and key-sequence) of

View File

@@ -0,0 +1,58 @@
From 858ca26c0689161a6b903a6682cc8a1cc10a0ea8 Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Tue, 11 Feb 2025 17:30:40 +0100
Subject: [PATCH] [CVE-2025-24928] Fix stack-buffer-overflow in
xmlSnprintfElements
Fixes #847.
CVE: CVE-2025-24928
Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/858ca26c0689161a6b903a6682cc8a1cc10a0ea8]
Signed-off-by: Peter Marko <peter.marko@siemens.com>
---
valid.c | 25 +++++++++++++------------
1 file changed, 13 insertions(+), 12 deletions(-)
diff --git a/valid.c b/valid.c
index ed3c8503..36a0435b 100644
--- a/valid.c
+++ b/valid.c
@@ -5259,25 +5259,26 @@ xmlSnprintfElements(char *buf, int size, xmlNodePtr node, int glob) {
return;
}
switch (cur->type) {
- case XML_ELEMENT_NODE:
+ case XML_ELEMENT_NODE: {
+ int qnameLen = xmlStrlen(cur->name);
+
+ if ((cur->ns != NULL) && (cur->ns->prefix != NULL))
+ qnameLen += xmlStrlen(cur->ns->prefix) + 1;
+ if (size - len < qnameLen + 10) {
+ if ((size - len > 4) && (buf[len - 1] != '.'))
+ strcat(buf, " ...");
+ return;
+ }
if ((cur->ns != NULL) && (cur->ns->prefix != NULL)) {
- if (size - len < xmlStrlen(cur->ns->prefix) + 10) {
- if ((size - len > 4) && (buf[len - 1] != '.'))
- strcat(buf, " ...");
- return;
- }
strcat(buf, (char *) cur->ns->prefix);
strcat(buf, ":");
}
- if (size - len < xmlStrlen(cur->name) + 10) {
- if ((size - len > 4) && (buf[len - 1] != '.'))
- strcat(buf, " ...");
- return;
- }
- strcat(buf, (char *) cur->name);
+ if (cur->name != NULL)
+ strcat(buf, (char *) cur->name);
if (cur->next != NULL)
strcat(buf, " ");
break;
+ }
case XML_TEXT_NODE:
if (xmlIsBlankNode(cur))
break;

View File

@@ -0,0 +1,32 @@
From 503f788e84f1c1f1d769c2c7258d77faee94b5a3 Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Thu, 13 Feb 2025 16:48:53 +0100
Subject: [PATCH] pattern: Fix compilation of explicit child axis
The child axis is the default axis and should generate XML_OP_ELEM like
the case without an axis.
CVE: CVE-2025-27113
Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/503f788e84f1c1f1d769c2c7258d77faee94b5a3]
Signed-off-by: Peter Marko <peter.marko@siemens.com>
---
pattern.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/pattern.c b/pattern.c
index 27e96946..3182794e 100644
--- a/pattern.c
+++ b/pattern.c
@@ -1178,10 +1178,10 @@ xmlCompileStepPattern(xmlPatParserContextPtr ctxt) {
goto error;
}
} else {
- PUSH(XML_OP_CHILD, token, URL);
+ PUSH(XML_OP_ELEM, token, URL);
}
} else
- PUSH(XML_OP_CHILD, name, NULL);
+ PUSH(XML_OP_ELEM, name, NULL);
return;
} else if (xmlStrEqual(name, (const xmlChar *) "attribute")) {
XML_PAT_FREE_STRING(ctxt, name)

View File

@@ -33,6 +33,10 @@ SRC_URI += "http://www.w3.org/XML/Test/xmlts20080827.tar;subdir=${BP};name=testt
file://CVE-2023-45322-2.patch \
file://CVE-2024-25062.patch \
file://CVE-2024-34459.patch \
file://CVE-2022-49043.patch \
file://CVE-2025-27113.patch \
file://CVE-2024-56171.patch \
file://CVE-2025-24928.patch \
"
SRC_URI[archive.sha256sum] = "60d74a257d1ccec0475e749cba2f21559e48139efba6ff28224357c7c798dfee"

View File

@@ -333,7 +333,7 @@ def update_db(conn, elt):
accessVector = None
vectorString = None
cveId = elt['cve']['id']
if elt['cve']['vulnStatus'] == "Rejected":
if elt['cve'].get('vulnStatus') == "Rejected":
c = conn.cursor()
c.execute("delete from PRODUCTS where ID = ?;", [cveId])
c.execute("delete from NVD where ID = ?;", [cveId])

View File

@@ -1,829 +0,0 @@
From 1904a64bcc18199738e5be183d28887ac5d837d7 Mon Sep 17 00:00:00 2001
From: Doug Flick <dougflick@microsoft.com>
Date: Wed, 8 May 2024 22:56:29 -0700
Subject: [PATCH] NetworkPkg TcpDxe: SECURITY PATCH CVE-2023-45236
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4541
REF: https://www.rfc-editor.org/rfc/rfc1948.txt
REF: https://www.rfc-editor.org/rfc/rfc6528.txt
REF: https://www.rfc-editor.org/rfc/rfc9293.txt
Bug Overview:
PixieFail Bug #8
CVE-2023-45236
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Updates TCP ISN generation to use a cryptographic hash of the
connection's identifying parameters and a secret key.
This prevents an attacker from guessing the ISN used for some other
connection.
This is follows the guidance in RFC 1948, RFC 6528, and RFC 9293.
RFC: 9293 Section 3.4.1. Initial Sequence Number Selection
A TCP implementation MUST use the above type of "clock" for clock-
driven selection of initial sequence numbers (MUST-8), and SHOULD
generate its initial sequence numbers with the expression:
ISN = M + F(localip, localport, remoteip, remoteport, secretkey)
where M is the 4 microsecond timer, and F() is a pseudorandom
function (PRF) of the connection's identifying parameters ("localip,
localport, remoteip, remoteport") and a secret key ("secretkey")
(SHLD-1). F() MUST NOT be computable from the outside (MUST-9), or
an attacker could still guess at sequence numbers from the ISN used
for some other connection. The PRF could be implemented as a
cryptographic hash of the concatenation of the TCP connection
parameters and some secret data. For discussion of the selection of
a specific hash algorithm and management of the secret key data,
please see Section 3 of [42].
For each connection there is a send sequence number and a receive
sequence number. The initial send sequence number (ISS) is chosen by
the data sending TCP peer, and the initial receive sequence number
(IRS) is learned during the connection-establishing procedure.
For a connection to be established or initialized, the two TCP peers
must synchronize on each other's initial sequence numbers. This is
done in an exchange of connection-establishing segments carrying a
control bit called "SYN" (for synchronize) and the initial sequence
numbers. As a shorthand, segments carrying the SYN bit are also
called "SYNs". Hence, the solution requires a suitable mechanism for
picking an initial sequence number and a slightly involved handshake
to exchange the ISNs.
Cc: Saloni Kasbekar <saloni.kasbekar@intel.com>
Cc: Zachary Clark-williams <zachary.clark-williams@intel.com>
Signed-off-by: Doug Flick [MSFT] <doug.edk2@gmail.com>
Reviewed-by: Saloni Kasbekar <saloni.kasbekar@intel.com>
CVE: CVE-2023-45236
Upstream-Status: Backport [https://github.com/tianocore/edk2/commit/1904a64bcc18199738e5be183d28887ac5d837d7]
Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
---
NetworkPkg/SecurityFixes.yaml | 22 +++
NetworkPkg/TcpDxe/TcpDriver.c | 92 ++++++++++++-
NetworkPkg/TcpDxe/TcpDxe.inf | 8 +-
NetworkPkg/TcpDxe/TcpFunc.h | 23 ++--
NetworkPkg/TcpDxe/TcpInput.c | 13 +-
NetworkPkg/TcpDxe/TcpMain.h | 59 ++++++--
NetworkPkg/TcpDxe/TcpMisc.c | 244 ++++++++++++++++++++++++++++++++--
NetworkPkg/TcpDxe/TcpTimer.c | 3 +-
8 files changed, 415 insertions(+), 49 deletions(-)
diff --git a/NetworkPkg/SecurityFixes.yaml b/NetworkPkg/SecurityFixes.yaml
index 2b2c794697..ab355419cc 100644
--- a/NetworkPkg/SecurityFixes.yaml
+++ b/NetworkPkg/SecurityFixes.yaml
@@ -121,6 +121,28 @@ CVE_2023_45235:
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
+CVE_2023_45236:
+ commit_titles:
+ - "NetworkPkg: TcpDxe: SECURITY PATCH CVE-2023-45236 Patch"
+ cve: CVE-2023-45236
+ date_reported: 2023-08-28 13:56 UTC
+ description: "Bug 08 - edk2/NetworkPkg: Predictable TCP Initial Sequence Numbers"
+ note:
+ files_impacted:
+ - NetworkPkg/Include/Library/NetLib.h
+ - NetworkPkg/TcpDxe/TcpDriver.c
+ - NetworkPkg/TcpDxe/TcpDxe.inf
+ - NetworkPkg/TcpDxe/TcpFunc.h
+ - NetworkPkg/TcpDxe/TcpInput.c
+ - NetworkPkg/TcpDxe/TcpMain.h
+ - NetworkPkg/TcpDxe/TcpMisc.c
+ - NetworkPkg/TcpDxe/TcpTimer.c
+ links:
+ - https://bugzilla.tianocore.org/show_bug.cgi?id=4541
+ - https://nvd.nist.gov/vuln/detail/CVE-2023-45236
+ - http://www.openwall.com/lists/oss-security/2024/01/16/2
+ - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
+ - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
CVE_2023_45237:
commit_titles:
- "NetworkPkg:: SECURITY PATCH CVE 2023-45237"
diff --git a/NetworkPkg/TcpDxe/TcpDriver.c b/NetworkPkg/TcpDxe/TcpDriver.c
index 8fe6badd68..40bba4080c 100644
--- a/NetworkPkg/TcpDxe/TcpDriver.c
+++ b/NetworkPkg/TcpDxe/TcpDriver.c
@@ -83,6 +83,12 @@ EFI_SERVICE_BINDING_PROTOCOL gTcpServiceBinding = {
TcpServiceBindingDestroyChild
};
+//
+// This is the handle for the Hash2ServiceBinding Protocol instance this driver produces
+// if the platform does not provide one.
+//
+EFI_HANDLE mHash2ServiceHandle = NULL;
+
/**
Create and start the heartbeat timer for the TCP driver.
@@ -165,6 +171,23 @@ TcpDriverEntryPoint (
EFI_STATUS Status;
UINT32 Random;
+ //
+ // Initialize the Secret used for hashing TCP sequence numbers
+ //
+ // Normally this should be regenerated periodically, but since
+ // this is only used for UEFI networking and not a general purpose
+ // operating system, it is not necessary to regenerate it.
+ //
+ Status = PseudoRandomU32 (&mTcpGlobalSecret);
+ if (EFI_ERROR (Status)) {
+ DEBUG ((DEBUG_ERROR, "%a failed to generate random number: %r\n", __func__, Status));
+ return Status;
+ }
+
+ //
+ // Get a random number used to generate a random port number
+ // Intentionally not linking this to mTcpGlobalSecret to avoid leaking information about the secret
+ //
Status = PseudoRandomU32 (&Random);
if (EFI_ERROR (Status)) {
DEBUG ((DEBUG_ERROR, "%a Failed to generate random number: %r\n", __func__, Status));
@@ -207,9 +230,8 @@ TcpDriverEntryPoint (
}
//
- // Initialize ISS and random port.
+ // Initialize the random port.
//
- mTcpGlobalIss = Random % mTcpGlobalIss;
mTcp4RandomPort = (UINT16)(TCP_PORT_KNOWN + (Random % TCP_PORT_KNOWN));
mTcp6RandomPort = mTcp4RandomPort;
@@ -224,6 +246,8 @@ TcpDriverEntryPoint (
@param[in] IpVersion IP_VERSION_4 or IP_VERSION_6.
@retval EFI_OUT_OF_RESOURCES Failed to allocate some resources.
+ @retval EFI_UNSUPPORTED Service Binding Protocols are unavailable.
+ @retval EFI_ALREADY_STARTED The TCP driver is already started on the controller.
@retval EFI_SUCCESS A new IP6 service binding private was created.
**/
@@ -234,11 +258,13 @@ TcpCreateService (
IN UINT8 IpVersion
)
{
- EFI_STATUS Status;
- EFI_GUID *IpServiceBindingGuid;
- EFI_GUID *TcpServiceBindingGuid;
- TCP_SERVICE_DATA *TcpServiceData;
- IP_IO_OPEN_DATA OpenData;
+ EFI_STATUS Status;
+ EFI_GUID *IpServiceBindingGuid;
+ EFI_GUID *TcpServiceBindingGuid;
+ TCP_SERVICE_DATA *TcpServiceData;
+ IP_IO_OPEN_DATA OpenData;
+ EFI_SERVICE_BINDING_PROTOCOL *Hash2ServiceBinding;
+ EFI_HASH2_PROTOCOL *Hash2Protocol;
if (IpVersion == IP_VERSION_4) {
IpServiceBindingGuid = &gEfiIp4ServiceBindingProtocolGuid;
@@ -272,6 +298,33 @@ TcpCreateService (
return EFI_UNSUPPORTED;
}
+ Status = gBS->LocateProtocol (&gEfiHash2ProtocolGuid, NULL, (VOID **)&Hash2Protocol);
+ if (EFI_ERROR (Status)) {
+ //
+ // If we can't find the Hashing protocol, then we need to create one.
+ //
+
+ //
+ // Platform is expected to publish the hash service binding protocol to support TCP.
+ //
+ Status = gBS->LocateProtocol (
+ &gEfiHash2ServiceBindingProtocolGuid,
+ NULL,
+ (VOID **)&Hash2ServiceBinding
+ );
+ if (EFI_ERROR (Status) || (Hash2ServiceBinding == NULL) || (Hash2ServiceBinding->CreateChild == NULL)) {
+ return EFI_UNSUPPORTED;
+ }
+
+ //
+ // Create an instance of the hash protocol for this controller.
+ //
+ Status = Hash2ServiceBinding->CreateChild (Hash2ServiceBinding, &mHash2ServiceHandle);
+ if (EFI_ERROR (Status)) {
+ return EFI_UNSUPPORTED;
+ }
+ }
+
//
// Create the TCP service data.
//
@@ -423,6 +476,7 @@ TcpDestroyService (
EFI_STATUS Status;
LIST_ENTRY *List;
TCP_DESTROY_CHILD_IN_HANDLE_BUF_CONTEXT Context;
+ EFI_SERVICE_BINDING_PROTOCOL *Hash2ServiceBinding;
ASSERT ((IpVersion == IP_VERSION_4) || (IpVersion == IP_VERSION_6));
@@ -439,6 +493,30 @@ TcpDestroyService (
return EFI_SUCCESS;
}
+ //
+ // Destroy the Hash2ServiceBinding instance if it is created by Tcp driver.
+ //
+ if (mHash2ServiceHandle != NULL) {
+ Status = gBS->LocateProtocol (
+ &gEfiHash2ServiceBindingProtocolGuid,
+ NULL,
+ (VOID **)&Hash2ServiceBinding
+ );
+ if (EFI_ERROR (Status) || (Hash2ServiceBinding == NULL) || (Hash2ServiceBinding->DestroyChild == NULL)) {
+ return EFI_UNSUPPORTED;
+ }
+
+ //
+ // Destroy the instance of the hashing protocol for this controller.
+ //
+ Status = Hash2ServiceBinding->DestroyChild (Hash2ServiceBinding, &mHash2ServiceHandle);
+ if (EFI_ERROR (Status)) {
+ return EFI_UNSUPPORTED;
+ }
+
+ mHash2ServiceHandle = NULL;
+ }
+
Status = gBS->OpenProtocol (
NicHandle,
ServiceBindingGuid,
diff --git a/NetworkPkg/TcpDxe/TcpDxe.inf b/NetworkPkg/TcpDxe/TcpDxe.inf
index cf5423f4c5..76de4cf9ec 100644
--- a/NetworkPkg/TcpDxe/TcpDxe.inf
+++ b/NetworkPkg/TcpDxe/TcpDxe.inf
@@ -6,6 +6,7 @@
# stack has been loaded in system. This driver supports both IPv4 and IPv6 network stack.
#
# Copyright (c) 2009 - 2018, Intel Corporation. All rights reserved.<BR>
+# Copyright (c) Microsoft Corporation
#
# SPDX-License-Identifier: BSD-2-Clause-Patent
#
@@ -68,7 +69,6 @@
NetLib
IpIoLib
-
[Protocols]
## SOMETIMES_CONSUMES
## SOMETIMES_PRODUCES
@@ -81,6 +81,12 @@
gEfiIp6ServiceBindingProtocolGuid ## TO_START
gEfiTcp6ProtocolGuid ## BY_START
gEfiTcp6ServiceBindingProtocolGuid ## BY_START
+ gEfiHash2ProtocolGuid ## BY_START
+ gEfiHash2ServiceBindingProtocolGuid ## BY_START
+
+[Guids]
+ gEfiHashAlgorithmMD5Guid ## CONSUMES
+ gEfiHashAlgorithmSha256Guid ## CONSUMES
[Depex]
gEfiHash2ServiceBindingProtocolGuid
diff --git a/NetworkPkg/TcpDxe/TcpFunc.h b/NetworkPkg/TcpDxe/TcpFunc.h
index a7af01fff2..c707bee3e5 100644
--- a/NetworkPkg/TcpDxe/TcpFunc.h
+++ b/NetworkPkg/TcpDxe/TcpFunc.h
@@ -2,7 +2,7 @@
Declaration of external functions shared in TCP driver.
Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.<BR>
-
+ Copyright (c) Microsoft Corporation
SPDX-License-Identifier: BSD-2-Clause-Patent
**/
@@ -36,8 +36,11 @@ VOID
@param[in, out] Tcb Pointer to the TCP_CB of this TCP instance.
+ @retval EFI_SUCCESS The operation completed successfully
+ @retval others The underlying functions failed and could not complete the operation
+
**/
-VOID
+EFI_STATUS
TcpInitTcbLocal (
IN OUT TCP_CB *Tcb
);
@@ -128,17 +131,6 @@ TcpCloneTcb (
IN TCP_CB *Tcb
);
-/**
- Compute an ISS to be used by a new connection.
-
- @return The result ISS.
-
-**/
-TCP_SEQNO
-TcpGetIss (
- VOID
- );
-
/**
Get the local mss.
@@ -202,8 +194,11 @@ TcpFormatNetbuf (
@param[in, out] Tcb Pointer to the TCP_CB that wants to initiate a
connection.
+ @retval EFI_SUCCESS The operation completed successfully
+ @retval others The underlying functions failed and could not complete the operation
+
**/
-VOID
+EFI_STATUS
TcpOnAppConnect (
IN OUT TCP_CB *Tcb
);
diff --git a/NetworkPkg/TcpDxe/TcpInput.c b/NetworkPkg/TcpDxe/TcpInput.c
index fb1aa827f8..0477a15d0c 100644
--- a/NetworkPkg/TcpDxe/TcpInput.c
+++ b/NetworkPkg/TcpDxe/TcpInput.c
@@ -724,6 +724,7 @@ TcpInput (
TCP_SEQNO Urg;
UINT16 Checksum;
INT32 Usable;
+ EFI_STATUS Status;
ASSERT ((Version == IP_VERSION_4) || (Version == IP_VERSION_6));
@@ -872,7 +873,17 @@ TcpInput (
Tcb->LocalEnd.Port = Head->DstPort;
Tcb->RemoteEnd.Port = Head->SrcPort;
- TcpInitTcbLocal (Tcb);
+ Status = TcpInitTcbLocal (Tcb);
+ if (EFI_ERROR (Status)) {
+ DEBUG (
+ (DEBUG_ERROR,
+ "TcpInput: discard a segment because failed to init local end for TCB %p\n",
+ Tcb)
+ );
+
+ goto DISCARD;
+ }
+
TcpInitTcbPeer (Tcb, Seg, &Option);
TcpSetState (Tcb, TCP_SYN_RCVD);
diff --git a/NetworkPkg/TcpDxe/TcpMain.h b/NetworkPkg/TcpDxe/TcpMain.h
index c0c9b7f46e..4d5566ab93 100644
--- a/NetworkPkg/TcpDxe/TcpMain.h
+++ b/NetworkPkg/TcpDxe/TcpMain.h
@@ -3,7 +3,7 @@
It is the common head file for all Tcp*.c in TCP driver.
Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.<BR>
-
+ Copyright (c) Microsoft Corporation
SPDX-License-Identifier: BSD-2-Clause-Patent
**/
@@ -13,6 +13,7 @@
#include <Protocol/ServiceBinding.h>
#include <Protocol/DriverBinding.h>
+#include <Protocol/Hash2.h>
#include <Library/IpIoLib.h>
#include <Library/DevicePathLib.h>
#include <Library/PrintLib.h>
@@ -31,7 +32,7 @@ extern EFI_UNICODE_STRING_TABLE *gTcpControllerNameTable;
extern LIST_ENTRY mTcpRunQue;
extern LIST_ENTRY mTcpListenQue;
-extern TCP_SEQNO mTcpGlobalIss;
+extern TCP_SEQNO mTcpGlobalSecret;
extern UINT32 mTcpTick;
///
@@ -45,14 +46,6 @@ extern UINT32 mTcpTick;
#define TCP_EXPIRE_TIME 65535
-///
-/// The implementation selects the initial send sequence number and the unit to
-/// be added when it is increased.
-///
-#define TCP_BASE_ISS 0x4d7e980b
-#define TCP_ISS_INCREMENT_1 2048
-#define TCP_ISS_INCREMENT_2 100
-
typedef union {
EFI_TCP4_CONFIG_DATA Tcp4CfgData;
EFI_TCP6_CONFIG_DATA Tcp6CfgData;
@@ -774,4 +767,50 @@ Tcp6Poll (
IN EFI_TCP6_PROTOCOL *This
);
+/**
+ Retrieves the Initial Sequence Number (ISN) for a TCP connection identified by local
+ and remote IP addresses and ports.
+
+ This method is based on https://datatracker.ietf.org/doc/html/rfc9293#section-3.4.1
+ Where the ISN is computed as follows:
+ ISN = TimeStamp + MD5(LocalIP, LocalPort, RemoteIP, RemotePort, Secret)
+
+ Otherwise:
+ ISN = M + F(localip, localport, remoteip, remoteport, secretkey)
+
+ "Here M is the 4 microsecond timer, and F() is a pseudorandom function (PRF) of the
+ connection's identifying parameters ("localip, localport, remoteip, remoteport")
+ and a secret key ("secretkey") (SHLD-1). F() MUST NOT be computable from the
+ outside (MUST-9), or an attacker could still guess at sequence numbers from the
+ ISN used for some other connection. The PRF could be implemented as a
+ cryptographic hash of the concatenation of the TCP connection parameters and some
+ secret data. For discussion of the selection of a specific hash algorithm and
+ management of the secret key data."
+
+ @param[in] LocalIp A pointer to the local IP address of the TCP connection.
+ @param[in] LocalIpSize The size, in bytes, of the LocalIp buffer.
+ @param[in] LocalPort The local port number of the TCP connection.
+ @param[in] RemoteIp A pointer to the remote IP address of the TCP connection.
+ @param[in] RemoteIpSize The size, in bytes, of the RemoteIp buffer.
+ @param[in] RemotePort The remote port number of the TCP connection.
+ @param[out] Isn A pointer to the variable that will receive the Initial
+ Sequence Number (ISN).
+
+ @retval EFI_SUCCESS The operation completed successfully, and the ISN was
+ retrieved.
+ @retval EFI_INVALID_PARAMETER One or more of the input parameters are invalid.
+ @retval EFI_UNSUPPORTED The operation is not supported.
+
+**/
+EFI_STATUS
+TcpGetIsn (
+ IN UINT8 *LocalIp,
+ IN UINTN LocalIpSize,
+ IN UINT16 LocalPort,
+ IN UINT8 *RemoteIp,
+ IN UINTN RemoteIpSize,
+ IN UINT16 RemotePort,
+ OUT TCP_SEQNO *Isn
+ );
+
#endif
diff --git a/NetworkPkg/TcpDxe/TcpMisc.c b/NetworkPkg/TcpDxe/TcpMisc.c
index c93212d47d..3310306f63 100644
--- a/NetworkPkg/TcpDxe/TcpMisc.c
+++ b/NetworkPkg/TcpDxe/TcpMisc.c
@@ -3,7 +3,7 @@
(C) Copyright 2014 Hewlett-Packard Development Company, L.P.<BR>
Copyright (c) 2009 - 2017, Intel Corporation. All rights reserved.<BR>
-
+ Copyright (c) Microsoft Corporation
SPDX-License-Identifier: BSD-2-Clause-Patent
**/
@@ -20,7 +20,34 @@ LIST_ENTRY mTcpListenQue = {
&mTcpListenQue
};
-TCP_SEQNO mTcpGlobalIss = TCP_BASE_ISS;
+//
+// The Session secret
+// This must be initialized to a random value at boot time
+//
+TCP_SEQNO mTcpGlobalSecret;
+
+//
+// Union to hold either an IPv4 or IPv6 address
+// This is used to simplify the ISN hash computation
+//
+typedef union {
+ UINT8 IPv4[4];
+ UINT8 IPv6[16];
+} NETWORK_ADDRESS;
+
+//
+// The ISN is computed by hashing this structure
+// It is initialized with the local and remote IP addresses and ports
+// and the secret
+//
+//
+typedef struct {
+ UINT16 LocalPort;
+ UINT16 RemotePort;
+ NETWORK_ADDRESS LocalAddress;
+ NETWORK_ADDRESS RemoteAddress;
+ TCP_SEQNO Secret;
+} ISN_HASH_CTX;
CHAR16 *mTcpStateName[] = {
L"TCP_CLOSED",
@@ -41,12 +68,18 @@ CHAR16 *mTcpStateName[] = {
@param[in, out] Tcb Pointer to the TCP_CB of this TCP instance.
+ @retval EFI_SUCCESS The operation completed successfully
+ @retval others The underlying functions failed and could not complete the operation
+
**/
-VOID
+EFI_STATUS
TcpInitTcbLocal (
IN OUT TCP_CB *Tcb
)
{
+ TCP_SEQNO Isn;
+ EFI_STATUS Status;
+
//
// Compute the checksum of the fixed parts of pseudo header
//
@@ -57,6 +90,16 @@ TcpInitTcbLocal (
0x06,
0
);
+
+ Status = TcpGetIsn (
+ Tcb->LocalEnd.Ip.v4.Addr,
+ sizeof (IPv4_ADDRESS),
+ Tcb->LocalEnd.Port,
+ Tcb->RemoteEnd.Ip.v4.Addr,
+ sizeof (IPv4_ADDRESS),
+ Tcb->RemoteEnd.Port,
+ &Isn
+ );
} else {
Tcb->HeadSum = NetIp6PseudoHeadChecksum (
&Tcb->LocalEnd.Ip.v6,
@@ -64,9 +107,25 @@ TcpInitTcbLocal (
0x06,
0
);
+
+ Status = TcpGetIsn (
+ Tcb->LocalEnd.Ip.v6.Addr,
+ sizeof (IPv6_ADDRESS),
+ Tcb->LocalEnd.Port,
+ Tcb->RemoteEnd.Ip.v6.Addr,
+ sizeof (IPv6_ADDRESS),
+ Tcb->RemoteEnd.Port,
+ &Isn
+ );
+ }
+
+ if (EFI_ERROR (Status)) {
+ DEBUG ((DEBUG_ERROR, "TcpInitTcbLocal: failed to get isn\n"));
+ ASSERT (FALSE);
+ return Status;
}
- Tcb->Iss = TcpGetIss ();
+ Tcb->Iss = Isn;
Tcb->SndUna = Tcb->Iss;
Tcb->SndNxt = Tcb->Iss;
@@ -82,6 +141,8 @@ TcpInitTcbLocal (
Tcb->RetxmitSeqMax = 0;
Tcb->ProbeTimerOn = FALSE;
+
+ return EFI_SUCCESS;
}
/**
@@ -506,18 +567,162 @@ TcpCloneTcb (
}
/**
- Compute an ISS to be used by a new connection.
-
- @return The resulting ISS.
+ Retrieves the Initial Sequence Number (ISN) for a TCP connection identified by local
+ and remote IP addresses and ports.
+
+ This method is based on https://datatracker.ietf.org/doc/html/rfc9293#section-3.4.1
+ Where the ISN is computed as follows:
+ ISN = TimeStamp + MD5(LocalIP, LocalPort, RemoteIP, RemotePort, Secret)
+
+ Otherwise:
+ ISN = M + F(localip, localport, remoteip, remoteport, secretkey)
+
+ "Here M is the 4 microsecond timer, and F() is a pseudorandom function (PRF) of the
+ connection's identifying parameters ("localip, localport, remoteip, remoteport")
+ and a secret key ("secretkey") (SHLD-1). F() MUST NOT be computable from the
+ outside (MUST-9), or an attacker could still guess at sequence numbers from the
+ ISN used for some other connection. The PRF could be implemented as a
+ cryptographic hash of the concatenation of the TCP connection parameters and some
+ secret data. For discussion of the selection of a specific hash algorithm and
+ management of the secret key data."
+
+ @param[in] LocalIp A pointer to the local IP address of the TCP connection.
+ @param[in] LocalIpSize The size, in bytes, of the LocalIp buffer.
+ @param[in] LocalPort The local port number of the TCP connection.
+ @param[in] RemoteIp A pointer to the remote IP address of the TCP connection.
+ @param[in] RemoteIpSize The size, in bytes, of the RemoteIp buffer.
+ @param[in] RemotePort The remote port number of the TCP connection.
+ @param[out] Isn A pointer to the variable that will receive the Initial
+ Sequence Number (ISN).
+
+ @retval EFI_SUCCESS The operation completed successfully, and the ISN was
+ retrieved.
+ @retval EFI_INVALID_PARAMETER One or more of the input parameters are invalid.
+ @retval EFI_UNSUPPORTED The operation is not supported.
**/
-TCP_SEQNO
-TcpGetIss (
- VOID
+EFI_STATUS
+TcpGetIsn (
+ IN UINT8 *LocalIp,
+ IN UINTN LocalIpSize,
+ IN UINT16 LocalPort,
+ IN UINT8 *RemoteIp,
+ IN UINTN RemoteIpSize,
+ IN UINT16 RemotePort,
+ OUT TCP_SEQNO *Isn
)
{
- mTcpGlobalIss += TCP_ISS_INCREMENT_1;
- return mTcpGlobalIss;
+ EFI_STATUS Status;
+ EFI_HASH2_PROTOCOL *Hash2Protocol;
+ EFI_HASH2_OUTPUT HashResult;
+ ISN_HASH_CTX IsnHashCtx;
+ EFI_TIME TimeStamp;
+
+ //
+ // Check that the ISN pointer is valid
+ //
+ if (Isn == NULL) {
+ return EFI_INVALID_PARAMETER;
+ }
+
+ //
+ // The local ip may be a v4 or v6 address and may not be NULL
+ //
+ if ((LocalIp == NULL) || (LocalIpSize == 0) || (RemoteIp == NULL) || (RemoteIpSize == 0)) {
+ return EFI_INVALID_PARAMETER;
+ }
+
+ //
+ // the local ip may be a v4 or v6 address
+ //
+ if ((LocalIpSize != sizeof (EFI_IPv4_ADDRESS)) && (LocalIpSize != sizeof (EFI_IPv6_ADDRESS))) {
+ return EFI_INVALID_PARAMETER;
+ }
+
+ //
+ // Locate the Hash Protocol
+ //
+ Status = gBS->LocateProtocol (&gEfiHash2ProtocolGuid, NULL, (VOID **)&Hash2Protocol);
+ if (EFI_ERROR (Status)) {
+ DEBUG ((DEBUG_NET, "Failed to locate Hash Protocol: %r\n", Status));
+
+ //
+ // TcpCreateService(..) is expected to be called prior to this function
+ //
+ ASSERT_EFI_ERROR (Status);
+ return Status;
+ }
+
+ //
+ // Initialize the hash algorithm
+ //
+ Status = Hash2Protocol->HashInit (Hash2Protocol, &gEfiHashAlgorithmSha256Guid);
+ if (EFI_ERROR (Status)) {
+ DEBUG ((DEBUG_NET, "Failed to initialize sha256 hash algorithm: %r\n", Status));
+ return Status;
+ }
+
+ IsnHashCtx.LocalPort = LocalPort;
+ IsnHashCtx.RemotePort = RemotePort;
+ IsnHashCtx.Secret = mTcpGlobalSecret;
+
+ //
+ // Check the IP address family and copy accordingly
+ //
+ if (LocalIpSize == sizeof (EFI_IPv4_ADDRESS)) {
+ CopyMem (&IsnHashCtx.LocalAddress.IPv4, LocalIp, LocalIpSize);
+ } else if (LocalIpSize == sizeof (EFI_IPv6_ADDRESS)) {
+ CopyMem (&IsnHashCtx.LocalAddress.IPv6, LocalIp, LocalIpSize);
+ } else {
+ return EFI_INVALID_PARAMETER; // Unsupported address size
+ }
+
+ //
+ // Repeat the process for the remote IP address
+ //
+ if (RemoteIpSize == sizeof (EFI_IPv4_ADDRESS)) {
+ CopyMem (&IsnHashCtx.RemoteAddress.IPv4, RemoteIp, RemoteIpSize);
+ } else if (RemoteIpSize == sizeof (EFI_IPv6_ADDRESS)) {
+ CopyMem (&IsnHashCtx.RemoteAddress.IPv6, RemoteIp, RemoteIpSize);
+ } else {
+ return EFI_INVALID_PARAMETER; // Unsupported address size
+ }
+
+ //
+ // Compute the hash
+ // Update the hash with the data
+ //
+ Status = Hash2Protocol->HashUpdate (Hash2Protocol, (UINT8 *)&IsnHashCtx, sizeof (IsnHashCtx));
+ if (EFI_ERROR (Status)) {
+ DEBUG ((DEBUG_NET, "Failed to update hash: %r\n", Status));
+ return Status;
+ }
+
+ //
+ // Finalize the hash and retrieve the result
+ //
+ Status = Hash2Protocol->HashFinal (Hash2Protocol, &HashResult);
+ if (EFI_ERROR (Status)) {
+ DEBUG ((DEBUG_NET, "Failed to finalize hash: %r\n", Status));
+ return Status;
+ }
+
+ Status = gRT->GetTime (&TimeStamp, NULL);
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ //
+ // copy the first 4 bytes of the hash result into the ISN
+ //
+ CopyMem (Isn, HashResult.Md5Hash, sizeof (*Isn));
+
+ //
+ // now add the timestamp to the ISN as 4 microseconds units (1000 / 4 = 250)
+ //
+ *Isn += (TCP_SEQNO)TimeStamp.Nanosecond * 250;
+
+ return Status;
}
/**
@@ -721,17 +926,28 @@ TcpFormatNetbuf (
@param[in, out] Tcb Pointer to the TCP_CB that wants to initiate a
connection.
+ @retval EFI_SUCCESS The operation completed successfully
+ @retval others The underlying functions failed and could not complete the operation
+
**/
-VOID
+EFI_STATUS
TcpOnAppConnect (
IN OUT TCP_CB *Tcb
)
{
- TcpInitTcbLocal (Tcb);
+ EFI_STATUS Status;
+
+ Status = TcpInitTcbLocal (Tcb);
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
TcpSetState (Tcb, TCP_SYN_SENT);
TcpSetTimer (Tcb, TCP_TIMER_CONNECT, Tcb->ConnectTimeout);
TcpToSendData (Tcb, 1);
+
+ return EFI_SUCCESS;
}
/**
diff --git a/NetworkPkg/TcpDxe/TcpTimer.c b/NetworkPkg/TcpDxe/TcpTimer.c
index 5d2e124977..065b1bdf5f 100644
--- a/NetworkPkg/TcpDxe/TcpTimer.c
+++ b/NetworkPkg/TcpDxe/TcpTimer.c
@@ -2,7 +2,7 @@
TCP timer related functions.
Copyright (c) 2009 - 2010, Intel Corporation. All rights reserved.<BR>
-
+ Copyright (c) Microsoft Corporation
SPDX-License-Identifier: BSD-2-Clause-Patent
**/
@@ -483,7 +483,6 @@ TcpTickingDpc (
INT16 Index;
mTcpTick++;
- mTcpGlobalIss += TCP_ISS_INCREMENT_2;
//
// Don't use LIST_FOR_EACH, which isn't delete safe.
--
2.40.0

View File

@@ -1,78 +0,0 @@
From cf07238e5fa4f8b1138ac1c9e80530b4d4e59f1c Mon Sep 17 00:00:00 2001
From: Pierre Gondois <pierre.gondois@arm.com>
Date: Fri, 11 Aug 2023 16:33:06 +0200
Subject: [PATCH] MdePkg/Rng: Add GUID to describe Arm Rndr Rng algorithms
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4441
The EFI_RNG_PROTOCOL can rely on the RngLib. The RngLib has multiple
implementations, some of them are unsafe (e.g. BaseRngLibTimerLib).
To allow the RngDxe to detect when such implementation is used,
a GetRngGuid() function is added in a following patch.
Prepare GetRngGuid() return values and add a gEfiRngAlgorithmArmRndr
to describe a Rng algorithm accessed through Arm's RNDR instruction.
[1] states that the implementation of this algorithm should be
compliant to NIST SP900-80. The compliance is not guaranteed.
[1] Arm Architecture Reference Manual Armv8, for A-profile architecture
sK12.1 'Properties of the generated random number'
Signed-off-by: Pierre Gondois <pierre.gondois@arm.com>
Reviewed-by: Sami Mujawar <sami.mujawar@arm.com>
Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
Acked-by: Ard Biesheuvel <ardb@kernel.org>
Tested-by: Kun Qin <kun.qin@microsoft.com>
CVE: CVE-2023-45237
Upstream-Status: Backport [https://github.com/tianocore/edk2/commit/cf07238e5fa4f8b1138ac1c9e80530b4d4e59f1c]
Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
---
MdePkg/Include/Protocol/Rng.h | 10 ++++++++++
MdePkg/MdePkg.dec | 1 +
2 files changed, 11 insertions(+)
diff --git a/MdePkg/Include/Protocol/Rng.h b/MdePkg/Include/Protocol/Rng.h
index baf425587b..38bde53240 100644
--- a/MdePkg/Include/Protocol/Rng.h
+++ b/MdePkg/Include/Protocol/Rng.h
@@ -67,6 +67,15 @@ typedef EFI_GUID EFI_RNG_ALGORITHM;
{ \
0xe43176d7, 0xb6e8, 0x4827, {0xb7, 0x84, 0x7f, 0xfd, 0xc4, 0xb6, 0x85, 0x61 } \
}
+///
+/// The Arm Architecture states the RNDR that the DRBG algorithm should be compliant
+/// with NIST SP800-90A, while not mandating a particular algorithm, so as to be
+/// inclusive of different geographies.
+///
+#define EFI_RNG_ALGORITHM_ARM_RNDR \
+ { \
+ 0x43d2fde3, 0x9d4e, 0x4d79, {0x02, 0x96, 0xa8, 0x9b, 0xca, 0x78, 0x08, 0x41} \
+ }
/**
Returns information about the random number generation implementation.
@@ -146,5 +155,6 @@ extern EFI_GUID gEfiRngAlgorithmSp80090Ctr256Guid;
extern EFI_GUID gEfiRngAlgorithmX9313DesGuid;
extern EFI_GUID gEfiRngAlgorithmX931AesGuid;
extern EFI_GUID gEfiRngAlgorithmRaw;
+extern EFI_GUID gEfiRngAlgorithmArmRndr;
#endif
diff --git a/MdePkg/MdePkg.dec b/MdePkg/MdePkg.dec
index 59b405928b..a449dbc556 100644
--- a/MdePkg/MdePkg.dec
+++ b/MdePkg/MdePkg.dec
@@ -594,6 +594,7 @@
gEfiRngAlgorithmX9313DesGuid = { 0x63c4785a, 0xca34, 0x4012, {0xa3, 0xc8, 0x0b, 0x6a, 0x32, 0x4f, 0x55, 0x46 }}
gEfiRngAlgorithmX931AesGuid = { 0xacd03321, 0x777e, 0x4d3d, {0xb1, 0xc8, 0x20, 0xcf, 0xd8, 0x88, 0x20, 0xc9 }}
gEfiRngAlgorithmRaw = { 0xe43176d7, 0xb6e8, 0x4827, {0xb7, 0x84, 0x7f, 0xfd, 0xc4, 0xb6, 0x85, 0x61 }}
+ gEfiRngAlgorithmArmRndr = { 0x43d2fde3, 0x9d4e, 0x4d79, {0x02, 0x96, 0xa8, 0x9b, 0xca, 0x78, 0x08, 0x41 }}
## Include/Protocol/AdapterInformation.h
gEfiAdapterInfoMediaStateGuid = { 0xD7C74207, 0xA831, 0x4A26, {0xB1, 0xF5, 0xD1, 0x93, 0x06, 0x5C, 0xE8, 0xB6 }}
--
2.40.0

File diff suppressed because it is too large Load Diff

View File

@@ -47,9 +47,6 @@ SRC_URI = "gitsm://github.com/tianocore/edk2.git;branch=master;protocol=https \
file://CVE-2023-45229-0002.patch \
file://CVE-2023-45229-0003.patch \
file://CVE-2023-45229-0004.patch \
file://CVE-2023-45237-0001.patch \
file://CVE-2023-45237-0002.patch \
file://CVE-2023-45236.patch \
file://CVE-2022-36765-0001.patch \
file://CVE-2022-36765-0002.patch \
file://CVE-2022-36765-0003.patch \

View File

@@ -14,7 +14,7 @@ LICENSE = "GPL-2.0-only & LGPL-2.1-only"
LIC_FILES_CHKSUM = "file://LICENSE.GPL2;md5=751419260aa954499f7abaabaa882bbe \
file://LICENSE.LGPL2.1;md5=4fbd65380cdd255951079008b364516c"
SRCREV = "4a31fa2fb040005b73253da75cf84949b8485175"
SRCREV = "4ada1290584745ab6643eece9e1756a8c0e079ca"
SRCBRANCH = "v250-stable"
SRC_URI = "git://github.com/systemd/systemd-stable.git;protocol=https;branch=${SRCBRANCH}"

View File

@@ -1,4 +1,4 @@
From 9a1841402ce3ef21a10a7314a07a615f8196d406 Mon Sep 17 00:00:00 2001
From 10ec14bf4a75891a99defa37f5e9452ac6fe12b3 Mon Sep 17 00:00:00 2001
From: Khem Raj <raj.khem@gmail.com>
Date: Fri, 21 Jan 2022 22:19:37 -0800
Subject: [PATCH] Adjust for musl headers
@@ -174,7 +174,7 @@ index d15766cd7b..60728b4f94 100644
#include "conf-parser.h"
#include "ipvlan.h"
diff --git a/src/network/netdev/macsec.c b/src/network/netdev/macsec.c
index f1a566a9ca..1f37927a83 100644
index df0d924443..6400032f96 100644
--- a/src/network/netdev/macsec.c
+++ b/src/network/netdev/macsec.c
@@ -1,7 +1,7 @@
@@ -200,7 +200,7 @@ index c41be6e78f..ee2660c5bf 100644
#include "conf-parser.h"
#include "macvlan.h"
diff --git a/src/network/netdev/netdev.c b/src/network/netdev/netdev.c
index 8e7fe11c18..701ab2bd69 100644
index b46b9ecc90..e6e58c5f0f 100644
--- a/src/network/netdev/netdev.c
+++ b/src/network/netdev/netdev.c
@@ -2,7 +2,7 @@
@@ -275,7 +275,7 @@ index c946e81fc0..d1a6be73f9 100644
#include "netlink-util.h"
diff --git a/src/network/netdev/vlan.c b/src/network/netdev/vlan.c
index af3e77963e..efa4b0a164 100644
index 58c2da32dd..f4a5fd7343 100644
--- a/src/network/netdev/vlan.c
+++ b/src/network/netdev/vlan.c
@@ -2,7 +2,7 @@
@@ -327,7 +327,7 @@ index 30b0855598..a065158801 100644
#include "conf-parser.h"
#include "alloc-util.h"
diff --git a/src/network/netdev/wireguard.c b/src/network/netdev/wireguard.c
index 88f668753a..5fc753384b 100644
index 6c251b3a2e..000e3d01a9 100644
--- a/src/network/netdev/wireguard.c
+++ b/src/network/netdev/wireguard.c
@@ -6,7 +6,7 @@
@@ -373,7 +373,7 @@ index 10025a97ae..a0239ea83a 100644
#define STATIC_BRIDGE_MDB_ENTRIES_PER_NETWORK_MAX 1024U
diff --git a/src/network/networkd-dhcp-common.c b/src/network/networkd-dhcp-common.c
index 7996960bd1..e870b9ba26 100644
index 4f13eada05..7e3ea2108b 100644
--- a/src/network/networkd-dhcp-common.c
+++ b/src/network/networkd-dhcp-common.c
@@ -1,7 +1,8 @@
@@ -421,7 +421,7 @@ index 9acfd17d49..3108289602 100644
#include "sd-dhcp-server.h"
diff --git a/src/network/networkd-dhcp4.c b/src/network/networkd-dhcp4.c
index cb9c428ae9..a35d58f3f1 100644
index f97e8033b8..21026ac0bf 100644
--- a/src/network/networkd-dhcp4.c
+++ b/src/network/networkd-dhcp4.c
@@ -3,7 +3,7 @@
@@ -434,7 +434,7 @@ index cb9c428ae9..a35d58f3f1 100644
#include "alloc-util.h"
#include "dhcp-client-internal.h"
diff --git a/src/network/networkd-link.c b/src/network/networkd-link.c
index b62a154828..75949e6094 100644
index 090da53a1e..8b402a5b04 100644
--- a/src/network/networkd-link.c
+++ b/src/network/networkd-link.c
@@ -3,7 +3,7 @@
@@ -447,7 +447,7 @@ index b62a154828..75949e6094 100644
#include <linux/netdevice.h>
#include <sys/socket.h>
diff --git a/src/network/networkd-route.c b/src/network/networkd-route.c
index ee7a535075..ce6ed64133 100644
index f3b6f38967..5793fd93f8 100644
--- a/src/network/networkd-route.c
+++ b/src/network/networkd-route.c
@@ -1,9 +1,5 @@
@@ -472,7 +472,7 @@ index ee7a535075..ce6ed64133 100644
_cleanup_(route_freep) Route *route = NULL;
diff --git a/src/network/networkd-setlink.c b/src/network/networkd-setlink.c
index e00cc1e589..e392c7e1a2 100644
index 1ab58a5bd2..72860cc542 100644
--- a/src/network/networkd-setlink.c
+++ b/src/network/networkd-setlink.c
@@ -2,7 +2,7 @@

View File

@@ -1,4 +1,4 @@
From beb0219b71510bc63aed81d2a970a04349d6c616 Mon Sep 17 00:00:00 2001
From e06212833237dd639a843b5f9733f8a49f3a9119 Mon Sep 17 00:00:00 2001
From: Khem Raj <raj.khem@gmail.com>
Date: Tue, 29 Sep 2020 18:01:41 -0700
Subject: [PATCH] Move sysusers.d/sysctl.d/binfmt.d/modules-load.d to /usr
@@ -7,21 +7,26 @@ These directories are moved to /lib since systemd v246, commit
4a56315a990b ("path: use ROOTPREFIX properly"), but in oe-core/yocto,
the old /usr/lib is still being used.
Modified to resolve the merge conflict introduced by systemd v250.14
version.
Upstream-Status: Inappropriate (OE-specific)
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Jiaqing Zhao <jiaqing.zhao@linux.intel.com>
Signed-off-by: Narpat Mali <narpat.falna@gmail.com>
---
src/core/systemd.pc.in | 8 ++++----
src/libsystemd/sd-path/sd-path.c | 8 ++++----
2 files changed, 8 insertions(+), 8 deletions(-)
diff --git a/src/core/systemd.pc.in b/src/core/systemd.pc.in
index fc0f8c34fa..65996bbed8 100644
index 693433b34b..8368a3ff02 100644
--- a/src/core/systemd.pc.in
+++ b/src/core/systemd.pc.in
@@ -65,16 +65,16 @@ systemdshutdowndir=${systemd_shutdown_dir}
tmpfiles_dir=${prefix}/lib/tmpfiles.d
tmpfilesdir=${tmpfiles_dir}
@@ -67,16 +67,16 @@ tmpfilesdir=${tmpfiles_dir}
user_tmpfiles_dir=${prefix}/share/user-tmpfiles.d
-sysusers_dir=${rootprefix}/lib/sysusers.d
+sysusers_dir=${prefix}/lib/sysusers.d
@@ -68,6 +73,3 @@ index ff1e0d5f8e..19a001f47e 100644
return 0;
case SD_PATH_CATALOG:
--
2.34.1

View File

@@ -0,0 +1,41 @@
From 10c567204edcd2926ce4f762d7015d5894756d52 Mon Sep 17 00:00:00 2001
From: Jonas Gorski <jonas.gorski@bisdn.de>
Date: Thu, 12 Sep 2024 15:46:29 +0200
Subject: [PATCH] core: fix build when seccomp is off
Something went wrong when 6aa2c55522d7cac62ecfd5d5687a86a84f158d18 was
cherry-picked for v250-stable, causing it to fail to build when seccomp
is disabled.
Fix this by changing the code to how it looks like in other versions of
the backported commit, slightly adapted to the file's style in v250.
Fixes the following build error:
| ../git/src/core/main.c: In function 'parse_config_file':
| ../git/src/core/main.c:721:101: error: lvalue required as unary '&' operand
| 721 | { "Manager", "SystemCallArchitectures", config_parse_syscall_archs, 0, &DISABLED_CONFIGURATION },
| | ^
Fixes: 8e8c7d51140b ("pid1: generate compat warning for SystemCallArchitectures= if seccomp is off")
Upstream-Status: Backport [https://github.com/systemd/systemd-stable/commit/b19b7c67e9cb74c44c43a0daf6172f9d32f134ec]
Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>
Signed-off-by: Narpat Mali <narpat.falna@gmail.com>
---
src/core/main.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/core/main.c b/src/core/main.c
index 19686fa475..5914be6a83 100644
--- a/src/core/main.c
+++ b/src/core/main.c
@@ -718,7 +718,7 @@ static int parse_config_file(void) {
#if HAVE_SECCOMP
{ "Manager", "SystemCallArchitectures", config_parse_syscall_archs, 0, &arg_syscall_archs },
#else
- { "Manager", "SystemCallArchitectures", config_parse_syscall_archs, 0, &DISABLED_CONFIGURATION },
+ { "Manager", "SystemCallArchitectures", config_parse_warn_compat, DISABLED_CONFIGURATION, NULL },
#endif
{ "Manager", "TimerSlackNSec", config_parse_nsec, 0, &arg_timer_slack_nsec },
{ "Manager", "DefaultTimerAccuracySec", config_parse_sec, 0, &arg_default_timer_accuracy_usec },

Some files were not shown because too many files have changed in this diff Show More