[master][PATCH v2 2/2] image_types: Set .7z extension for 7-Zip conversion command
Livius
From: Benjamin Szőke <egyszeregy@...>
Signed-off-by: Benjamin Szőke <egyszeregy@...> --- meta/classes-recipe/image_types.bbclass | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/classes-recipe/image_types.bbclass b/meta/classes-recipe/image_types.bbclass index f70c71b9d4..ae00728a74 100644 --- a/meta/classes-recipe/image_types.bbclass +++ b/meta/classes-recipe/image_types.bbclass @@ -61,7 +61,7 @@ ZIP_COMPRESSION_LEVEL ?= "-9" 7ZIP_COMPRESSION_LEVEL ?= "9" 7ZIP_COMPRESSION_METHOD ?= "BZip2" -7ZIP_EXTENSION ?= "zip" +7ZIP_EXTENSION ?= "7z" ZSTD_COMPRESSION_LEVEL ?= "-3" -- 2.38.1.windows.1 |
|
[master][PATCH v2 1/2] image_types: Add 7-Zip support in conversion types and commands
Livius
From: Benjamin Szőke <egyszeregy@...>
Add 7-Zip support in conversion types and commands. Default arguments of 7-Zip are compression level: 9, method: BZip2, extension: zip. All these are overridable from local.con for any other use case in user side. First goal was to make an alternative zip conversion which can operate faster in multi-thread systems (on many CPU core), normal zip is just a single thread compression. 7-Zip can do a zip compression in multi-thread processing, so it is fine to use and speed up it. Signed-off-by: Benjamin Szőke <egyszeregy@...> --- meta/classes-recipe/image_types.bbclass | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/meta/classes-recipe/image_types.bbclass b/meta/classes-recipe/image_types.bbclass index 764e6a5574..f70c71b9d4 100644 --- a/meta/classes-recipe/image_types.bbclass +++ b/meta/classes-recipe/image_types.bbclass @@ -59,6 +59,10 @@ XZ_INTEGRITY_CHECK ?= "crc32" ZIP_COMPRESSION_LEVEL ?= "-9" +7ZIP_COMPRESSION_LEVEL ?= "9" +7ZIP_COMPRESSION_METHOD ?= "BZip2" +7ZIP_EXTENSION ?= "zip" + ZSTD_COMPRESSION_LEVEL ?= "-3" JFFS2_SUM_EXTRA_ARGS ?= "" @@ -304,7 +308,7 @@ IMAGE_TYPES:append:x86-64 = " hddimg iso" # CONVERSION_CMD/DEPENDS. COMPRESSIONTYPES ?= "" -CONVERSIONTYPES = "gz bz2 lzma xz lz4 lzo zip zst sum md5sum sha1sum sha224sum sha256sum sha384sum sha512sum bmap u-boot vmdk vhd vhdx vdi qcow2 base64 gzsync zsync ${COMPRESSIONTYPES}" +CONVERSIONTYPES = "gz bz2 lzma xz lz4 lzo zip 7zip zst sum md5sum sha1sum sha224sum sha256sum sha384sum sha512sum bmap u-boot vmdk vhd vhdx vdi qcow2 base64 gzsync zsync ${COMPRESSIONTYPES}" CONVERSION_CMD:lzma = "lzma -k -f -7 ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}" CONVERSION_CMD:gz = "gzip -f -9 -n -c --rsyncable ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type} > ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}.gz" CONVERSION_CMD:bz2 = "pbzip2 -f -k ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}" @@ -312,6 +316,7 @@ CONVERSION_CMD:xz = "xz -f -k -c ${XZ_COMPRESSION_LEVEL} ${XZ_DEFAULTS} --check= CONVERSION_CMD:lz4 = "lz4 -9 -z -l ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type} ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}.lz4" CONVERSION_CMD:lzo = "lzop -9 ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}" CONVERSION_CMD:zip = "zip ${ZIP_COMPRESSION_LEVEL} ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}.zip ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}" +CONVERSION_CMD:7zip = "7za a -mx=${7ZIP_COMPRESSION_LEVEL} -mm=${7ZIP_COMPRESSION_METHOD} ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}.${7ZIP_EXTENSION} ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}" CONVERSION_CMD:zst = "zstd -f -k -T0 -c ${ZSTD_COMPRESSION_LEVEL} ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type} > ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}.zst" CONVERSION_CMD:sum = "sumtool -i ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type} -o ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}.sum ${JFFS2_SUM_EXTRA_ARGS}" CONVERSION_CMD:md5sum = "md5sum ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type} > ${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.${type}.md5sum" @@ -337,6 +342,7 @@ CONVERSION_DEPENDS_xz = "xz-native" CONVERSION_DEPENDS_lz4 = "lz4-native" CONVERSION_DEPENDS_lzo = "lzop-native" CONVERSION_DEPENDS_zip = "zip-native" +CONVERSION_DEPENDS_7zip = "p7zip-native" CONVERSION_DEPENDS_zst = "zstd-native" CONVERSION_DEPENDS_sum = "mtd-utils-native" CONVERSION_DEPENDS_bmap = "bmap-tools-native" -- 2.38.1.windows.1 |
|
Re: [master][PATCH v2] image_types: Add 7-Zip support in conversion types and commands
Quentin Schulz
Hi Benjamin,
On 11/7/22 12:33, Livius wrote: Good point for this zip extension conflict, you are right. If somebody is a overzealous developer can use IMAGE_TYPES = "wic.zip wic.7zip" then sure there will be an extension conflict after the compression in deploy time. This escaped my notice this because this use case is not so realistic (normaly enough only one zip pack for wic image) but can be a real issue. 100% sure 7ZIP_EXTENSION ?= 7z can be better for default value, then it can be overridable to .zip extension in users's local.conf if needed (for example for me it .zip will be better).Yes, please make it a v2 also (git format-patch -v 2 when creating the patch before sending it with git-send-email). Cheers, Quentin |
|
Re: [master][PATCH v2] image_types: Add 7-Zip support in conversion types and commands
Livius
Good point for this zip extension conflict, you are right. If somebody is a overzealous developer can use IMAGE_TYPES = "wic.zip wic.7zip" then sure there will be an extension conflict after the compression in deploy time. This escaped my notice this because this use case is not so realistic (normaly enough only one zip pack for wic image) but can be a real issue. 100% sure 7ZIP_EXTENSION ?= 7z can be better for default value, then it can be overridable to .zip extension in users's local.conf if needed (for example for me it .zip will be better).
Do i need to resend again the patch in a new thread/topic if i like to solve the missing signed-off issue? |
|
Re: [PATCH] systemd: bump to v252
Alexander Kanavin
On Mon, 7 Nov 2022 at 11:01, Luca Bocassi <luca.boccassi@...> wrote:
This comes from a specific selftest:This makes oe-selftest fail:This is a very strange error, I don't think it comes from systemd? Any clue? wic.Wic2.test_efi_plugin_unified_kernel_image_qemu You should replicate what the test does, so you can see the issue first hand - or confirm that it's not the new systemd: https://git.yoctoproject.org/poky/tree/meta/lib/oeqa/selftest/cases/wic.py#n1171 Particularly the wic plugin used by the test does refer to systemd: https://git.yoctoproject.org/poky/tree/meta-selftest/wic/test_efi_plugin.wks Alex |
|
Re: [PATCH] systemd: bump to v252
Luca Bocassi
On Sun, 6 Nov 2022 at 15:36, Alexandre Belloni
<alexandre.belloni@...> wrote: This is a very strange error, I don't think it comes from systemd? Any clue? Kind regards, Luca Boccassi |
|
Re: [PATCH] mirrors.bbclass: use shallow tarball for nativesdk-binutils
Etienne Cordonnier
I've resent the patch and changed git's sendemail.envelopesender option so that the From field matches the email used in the SOB field. On Sun, Nov 6, 2022 at 5:02 PM Alexandre Belloni <alexandre.belloni@...> wrote: On 04/11/2022 15:24:43+0100, Etienne Cordonnier via lists.openembedded.org wrote: |
|
Re: Private: Re: [OE-core] [PATCH 0/1] add python3-brotli_1.0.9 in meta/recipes-devtools/python
Re-adding oe-core to the CC as this discussion should be on the list.
toggle quoted message
Show quoted text
I suggest you add the recipe to meta-python then. Ross On 5 Nov 2022, at 07:58, cp0613 <cp0613@...> wrote: |
|
Re: [master][PATCH v2] image_types: Add 7-Zip support in conversion types and commands
Alexander Kanavin
On Mon, 7 Nov 2022 at 10:46, Quentin Schulz via lists.openembedded.org
<quentin.schulz=theobroma-systems.com@...> wrote: I don't think so. There's plenty of references in oe-core recipes to+CONVERSION_DEPENDS_7zip = "p7zip-native"This tool is in meta-openembedded/meta-oe and not openembedded-core, recipes that are not in core, as long as they're not used by default. Alex |
|
[PATCH] mirrors.bbclass: use shallow tarball for nativesdk-binutils
Etienne Cordonnier
This is useful e.g. when using meta-clang, which introduces a dependency to nativesdk-binutils when
populating the SDK, and then a full tarball of binutils is fetched additionally to a shallow tarball. Signed-off-by: Etienne Cordonnier <ecordonnier@...> --- meta/classes-global/mirrors.bbclass | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/classes-global/mirrors.bbclass b/meta/classes-global/mirrors.bbclass index 81fef7f660..8b984de3bf 100644 --- a/meta/classes-global/mirrors.bbclass +++ b/meta/classes-global/mirrors.bbclass @@ -91,6 +91,8 @@ BB_GIT_SHALLOW:pn-binutils-cross-canadian-${TRANSLATED_TARGET_ARCH} = "1" BB_GIT_SHALLOW:pn-binutils-cross-testsuite = "1" BB_GIT_SHALLOW:pn-binutils-crosssdk-${SDK_SYS} = "1" BB_GIT_SHALLOW:pn-binutils-native = "1" +BB_GIT_SHALLOW:pn-nativesdk-binutils = "1" + BB_GIT_SHALLOW:pn-glibc = "1" PREMIRRORS += "git://sourceware.org/git/glibc.git https://downloads.yoctoproject.org/mirror/sources/ \ git://sourceware.org/git/binutils-gdb.git https://downloads.yoctoproject.org/mirror/sources/" -- 2.36.1.vfs.0.0 |
|
Re: [master][PATCH v2] image_types: Add 7-Zip support in conversion types and commands
Quentin Schulz
Hi Benjamin,
On 11/6/22 14:31, Livius wrote: From: Benjamin Szőke <egyszeregy@...>Your signed-off-by is missing here, it is usually added when you run git commit --signoff git commit -s You can add your signature to your patch locally with git commit --signoff --amend --no-edit ---Wouldn't this conflict with the output of the zip compression? Basically, if I have 7zip and zip for an archive, they will overwrite each other un-deterministically. Maybe the default .7z extension is better? +This tool is in meta-openembedded/meta-oe and not openembedded-core, should we actually move the recipe into oe-core? Cheers, Quentin |
|
Re: [kirkstone 06/31] tiff: fix CVE-2022-2953
Hello, I am new to this community and trying to understand the CVE patch fixing process. Kindly correct me if I am wrong with my understanding. 1] https://gitlab.com/libtiff/libtiff/-/commit/e319508 - tiffcrop: Fix issue #330 and some more from 320 to 349 On Fri, Nov 4, 2022 at 8:31 AM Steve Sakoman <steve@...> wrote: From: Zheng Qiu <zheng.qiu@...> |
|
Re: [PATCH 2/2] gstreamer1.0-plugins-good: use libsoup-3.0 by default
Markus Volk
Am So, 6. Nov 2022 um 23:12:40 +0100 schrieb Alexandre Belloni via lists.openembedded.org <alexandre.belloni=bootlin.com@...>:
Hello, i've sent a v2 for this patch that should fix the issue. |
|
[PATCHv2] gstreamer1.0-plugins-good: use libsoup-3.0 by default
Markus Volk
- add a PACKAGECONFIG for soup3
- add PACKAGECONFIG_SOUP variable as it is used in webkitgtk and epiphany Signed-off-by: Markus Volk <f_l_k@...> --- .../gstreamer/gstreamer1.0-plugins-good_1.20.3.bb | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_= 1.20.3.bb b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1= .20.3.bb index 0235935a4a..9dd629eaa0 100644 --- a/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.20.3.= bb +++ b/meta/recipes-multimedia/gstreamer/gstreamer1.0-plugins-good_1.20.3.= bb @@ -20,11 +20,14 @@ DEPENDS +=3D "gstreamer1.0-plugins-base libcap zlib" RPROVIDES:${PN}-pulseaudio +=3D "${PN}-pulse" RPROVIDES:${PN}-soup +=3D "${PN}-souphttpsrc" =20 +PACKAGECONFIG_SOUP ?=3D "soup3" + PACKAGECONFIG ??=3D " \ ${GSTREAMER_ORC} \ + ${PACKAGECONFIG_SOUP} \ ${@bb.utils.filter('DISTRO_FEATURES', 'pulseaudio x11', d)} \ ${@bb.utils.contains('TUNE_FEATURES', 'm64', 'asm', '', d)} \ - bz2 cairo flac gdk-pixbuf gudev jpeg lame libpng mpg123 soup speex t= aglib v4l2 \ + bz2 cairo flac gdk-pixbuf gudev jpeg lame libpng mpg123 speex taglib= v4l2 \ " =20 X11DEPENDS =3D "virtual/libx11 libsm libxrender libxfixes libxdamage" @@ -53,8 +56,9 @@ PACKAGECONFIG[qt5] =3D "-Dqt5=3Denabled,-Dqt5=3D= disabled,qtbase qtdeclarative q # instead of linking to it. And instead of using the default libsoup C h= eaders, it # uses its own stub header. Consequently, objdump will not show the libs= oup .so as # a dependency, and libsoup won't be added to an image. Fix this by sett= ing libsoup -# as RDEPEND instead of DEPEND. -PACKAGECONFIG[soup] =3D "-Dsoup=3Denabled,-Dsoup=3Ddisabled,,libso= up-2.4" +# as RDEPEND. +PACKAGECONFIG[soup2] =3D "-Dsoup=3Denabled,,libsoup-2.4,libsoup-2.4,,sou= p3" +PACKAGECONFIG[soup3] =3D "-Dsoup=3Denabled,,libsoup,libsoup,,soup2" PACKAGECONFIG[speex] =3D "-Dspeex=3Denabled,-Dspeex=3Ddisabled,spee= x" PACKAGECONFIG[rpi] =3D "-Drpicamsrc=3Denabled,-Drpicamsrc=3Ddisab= led,userland" PACKAGECONFIG[taglib] =3D "-Dtaglib=3Denabled,-Dtaglib=3Ddisabled,ta= glib" --=20 2.34.1 |
|
[dunfell][PATCH] bluez: CVE-2022-3637 A DoS exists in monitor/jlink.c
Hitendra Prajapati
Upstream-Status: Backport from https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/monitor/jlink.c?id=1d6cfb8e625a944010956714c1802bc1e1fc6c4f
Signed-off-by: Hitendra Prajapati <hprajapati@...> --- meta/recipes-connectivity/bluez5/bluez5.inc | 1 + .../bluez5/bluez5/CVE-2022-3637.patch | 39 +++++++++++++++++++ 2 files changed, 40 insertions(+) create mode 100644 meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3637.patch diff --git a/meta/recipes-connectivity/bluez5/bluez5.inc b/meta/recipes-connectivity/bluez5/bluez5.inc index eaac9ee849..0ef3192c77 100644 --- a/meta/recipes-connectivity/bluez5/bluez5.inc +++ b/meta/recipes-connectivity/bluez5/bluez5.inc @@ -57,6 +57,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/bluetooth/bluez-${PV}.tar.xz \ file://CVE-2021-3658.patch \ file://CVE-2022-0204.patch \ file://CVE-2022-39176.patch \ + file://CVE-2022-3637.patch \ " S = "${WORKDIR}/bluez-${PV}" diff --git a/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3637.patch b/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3637.patch new file mode 100644 index 0000000000..4ca60f99d5 --- /dev/null +++ b/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3637.patch @@ -0,0 +1,39 @@ +From b808b2852a0b48c6f9dbb038f932613cea3126c2 Mon Sep 17 00:00:00 2001 +From: Hitendra Prajapati <hprajapati@...> +Date: Thu, 27 Oct 2022 09:51:27 +0530 +Subject: [PATCH] CVE-2022-3637 + +Upstream-Status: Backport [https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/monitor/jlink.c?id=1d6cfb8e625a944010956714c1802bc1e1fc6c4f] +CVE: CVE-2022-3637 +Signed-off-by: Hitendra Prajapati <hprajapati@...> + +monitor: Fix crash when using RTT backend + +This fix regression introduced by "monitor: Fix memory leaks". +J-Link shared library is in use if jlink_init() returns 0 and thus +handle shall not be closed. +--- + monitor/jlink.c | 5 ++++- + 1 file changed, 4 insertions(+), 1 deletion(-) + +diff --git a/monitor/jlink.c b/monitor/jlink.c +index afa9d93..5bd4aed 100644 +--- a/monitor/jlink.c ++++ b/monitor/jlink.c +@@ -120,9 +120,12 @@ int jlink_init(void) + !jlink.tif_select || !jlink.setspeed || + !jlink.connect || !jlink.getsn || + !jlink.emu_getproductname || +- !jlink.rtterminal_control || !jlink.rtterminal_read) ++ !jlink.rtterminal_control || !jlink.rtterminal_read) { ++ dlclose(so); + return -EIO; ++ } + ++ /* don't dlclose(so) here cause symbols from it are in use now */ + return 0; + } + +-- +2.25.1 + -- 2.25.1 |
|
[kirkstone][PATCH] bluez: CVE-2022-3563 Fix null pointer derefference
Hitendra Prajapati
Upstream-Status: Backport from https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e3c92f1f786f0b55440bd908b55894d0c792cf0e
Signed-off-by: Hitendra Prajapati <hprajapati@...> --- meta/recipes-connectivity/bluez5/bluez5.inc | 1 + .../bluez5/bluez5/CVE-2022-3563.patch | 44 +++++++++++++++++++ 2 files changed, 45 insertions(+) create mode 100644 meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3563.patch diff --git a/meta/recipes-connectivity/bluez5/bluez5.inc b/meta/recipes-connectivity/bluez5/bluez5.inc index 07d36ab74b..a9989585f5 100644 --- a/meta/recipes-connectivity/bluez5/bluez5.inc +++ b/meta/recipes-connectivity/bluez5/bluez5.inc @@ -54,6 +54,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/bluetooth/bluez-${PV}.tar.xz \ file://0001-tests-add-a-target-for-building-tests-without-runnin.patch \ file://0001-test-gatt-Fix-hung-issue.patch \ file://CVE-2022-3637.patch \ + file://CVE-2022-3563.patch \ " S = "${WORKDIR}/bluez-${PV}" diff --git a/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3563.patch b/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3563.patch new file mode 100644 index 0000000000..e67e7093ec --- /dev/null +++ b/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3563.patch @@ -0,0 +1,44 @@ +From 5e22473411bbd673b588d9f3d9d130199be13b4b Mon Sep 17 00:00:00 2001 +From: Hitendra Prajapati <hprajapati@...> +Date: Fri, 4 Nov 2022 17:09:57 +0530 +Subject: [PATCH] CVE-2022-3563 + +Upstream-Status: Backport [https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e3c92f1f786f0b55440bd908b55894d0c792cf0e] +CVE: CVE-2022-3563 +Signed-off-by: Hitendra Prajapati <hprajapati@...> + +mgmt-tester: Fix null dereference issue reported by scan-build +This patch fixes the null dereference reported by the scan-build. + +tools/mgmt-tester.c:12025:28: warning: Access to field 'cap_len' results +in a dereference of a null pointer (loaded from variable 'rp') +[core.NullDereference] + + if (sizeof(rp->cap_len) + rp->cap_len != length) { + ^~~~~~~~~~~ +--- + tools/mgmt-tester.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/tools/mgmt-tester.c b/tools/mgmt-tester.c +index e5319d1..b15ed5e 100644 +--- a/tools/mgmt-tester.c ++++ b/tools/mgmt-tester.c +@@ -11960,12 +11960,14 @@ static void read_50_controller_cap_complete(uint8_t status, uint16_t length, + tester_warn("Failed to read advertising features: %s (0x%02x)", + mgmt_errstr(status), status); + tester_test_failed(); ++ return; + } + + if (sizeof(rp->cap_len) + rp->cap_len != length) { + tester_warn("Controller capabilities malformed, size %zu != %u", + sizeof(rp->cap_len) + rp->cap_len, length); + tester_test_failed(); ++ return; + } + + while (offset < rp->cap_len) { +-- +2.25.1 + -- 2.25.1 |
|
[kirkstone][PATCH] bluez: CVE-2022-3637 A DoS exists in monitor/jlink.c
Hitendra Prajapati
Upstream-Status: Backport from https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/monitor/jlink.c?id=1d6cfb8e625a944010956714c1802bc1e1fc6c4f
Signed-off-by: Hitendra Prajapati <hprajapati@...> --- meta/recipes-connectivity/bluez5/bluez5.inc | 1 + .../bluez5/bluez5/CVE-2022-3637.patch | 39 +++++++++++++++++++ 2 files changed, 40 insertions(+) create mode 100644 meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3637.patch diff --git a/meta/recipes-connectivity/bluez5/bluez5.inc b/meta/recipes-connectivity/bluez5/bluez5.inc index 79d4645ca8..07d36ab74b 100644 --- a/meta/recipes-connectivity/bluez5/bluez5.inc +++ b/meta/recipes-connectivity/bluez5/bluez5.inc @@ -53,6 +53,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/bluetooth/bluez-${PV}.tar.xz \ ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', '', 'file://0001-Allow-using-obexd-without-systemd-in-the-user-sessio.patch', d)} \ file://0001-tests-add-a-target-for-building-tests-without-runnin.patch \ file://0001-test-gatt-Fix-hung-issue.patch \ + file://CVE-2022-3637.patch \ " S = "${WORKDIR}/bluez-${PV}" diff --git a/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3637.patch b/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3637.patch new file mode 100644 index 0000000000..5bd00ddca5 --- /dev/null +++ b/meta/recipes-connectivity/bluez5/bluez5/CVE-2022-3637.patch @@ -0,0 +1,39 @@ +From 8b8a8f76b64a72ddc78f9052f80c87c0da72bcc6 Mon Sep 17 00:00:00 2001 +From: Hitendra Prajapati <hprajapati@...> +Date: Thu, 3 Nov 2022 11:56:44 +0530 +Subject: [PATCH] CVE-2022-3637 + +Upstream-Status: Backport [https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/monitor/jlink.c?id=1d6cfb8e625a944010956714c1802bc1e1fc6c4f] +CVE: CVE-2022-3637 +Signed-off-by: Hitendra Prajapati <hprajapati@...> + +monitor: Fix crash when using RTT backend + +This fix regression introduced by "monitor: Fix memory leaks". +J-Link shared library is in use if jlink_init() returns 0 and thus +handle shall not be closed. +--- + monitor/jlink.c | 5 ++++- + 1 file changed, 4 insertions(+), 1 deletion(-) + +diff --git a/monitor/jlink.c b/monitor/jlink.c +index 9aaa4eb..f9d4037 100644 +--- a/monitor/jlink.c ++++ b/monitor/jlink.c +@@ -107,9 +107,12 @@ int jlink_init(void) + !jlink.tif_select || !jlink.setspeed || + !jlink.connect || !jlink.getsn || + !jlink.emu_getproductname || +- !jlink.rtterminal_control || !jlink.rtterminal_read) ++ !jlink.rtterminal_control || !jlink.rtterminal_read) { ++ dlclose(so); + return -EIO; ++ } + ++ /* don't dlclose(so) here cause symbols from it are in use now */ + return 0; + } + +-- +2.25.1 + -- 2.25.1 |
|
Re: [master][kirkstone][PATCH V2] rng-tools: Add Arm aarch64 CPU specific configuration to address excessive CPU usage on startup
Xiangyu Chen
On 11/7/22 10:18, Khem Raj wrote:
CAUTION: This email comes from a non Wind River email account!I tested two aarch64 platforms on my hand, zynqmp and raspi4, the rng-tools behavior is the same, when service start, the jitter random generator would load full cpu cores load. It would cause other services take long time to start. I also checked another linux distribution, so far, only Alpine Linux processed this issue and it applied those configurations on all aarch64 platforms. Thanks, Xiangyu
|
|
Re: [master][kirkstone][PATCH V2] rng-tools: Add Arm aarch64 CPU specific configuration to address excessive CPU usage on startup
On Sun, Nov 6, 2022 at 5:21 PM Xiangyu Chen <xiangyu.chen@...> wrote:
My concern is that will it be so for all aarch64 machines ?
|
|
Re: [master][kirkstone][PATCH V2] rng-tools: Add Arm aarch64 CPU specific configuration to address excessive CPU usage on startup
Xiangyu Chen
On 11/1/22 09:48, Xiangyu Chen wrote:
With the default jitter options aarch64 CPU-based devices typically experience continuousFriendly ping. Is there any more concern on this? Thanks, Xiangyu --- |
|