Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.1/patches/2225272/?format=api
{ "id": 2225272, "url": "http://patchwork.ozlabs.org/api/1.1/patches/2225272/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/20260420190748.181272-1-chakrabortyshubham66@gmail.com/", "project": { "id": 27, "url": "http://patchwork.ozlabs.org/api/1.1/projects/27/?format=api", "name": "Buildroot development", "link_name": "buildroot", "list_id": "buildroot.buildroot.org", "list_email": "buildroot@buildroot.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260420190748.181272-1-chakrabortyshubham66@gmail.com>", "date": "2026-04-20T19:07:47", "name": "[v2] package/botan: security bump to version 3.11.1", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "63deae250b63920962c4c88ac507a2d051399911", "submitter": { "id": 92564, "url": "http://patchwork.ozlabs.org/api/1.1/people/92564/?format=api", "name": "Shubham Chakraborty", "email": "chakrabortyshubham66@gmail.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20260420190748.181272-1-chakrabortyshubham66@gmail.com/mbox/", "series": [ { "id": 500666, "url": "http://patchwork.ozlabs.org/api/1.1/series/500666/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=500666", "date": "2026-04-20T19:07:47", "name": "[v2] package/botan: security bump to version 3.11.1", "version": 2, "mbox": "http://patchwork.ozlabs.org/series/500666/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2225272/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2225272/checks/", "tags": {}, "headers": { "Return-Path": "<buildroot-bounces@buildroot.org>", "X-Original-To": [ "incoming-buildroot@patchwork.ozlabs.org", "buildroot@buildroot.org" ], "Delivered-To": [ "patchwork-incoming-buildroot@legolas.ozlabs.org", "buildroot@buildroot.org" ], "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=Wu1khTX/;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::136; helo=smtp3.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)" ], "Received": [ "from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzw545RSYz1yD4\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Tue, 21 Apr 2026 05:08:56 +1000 (AEST)", "from localhost (localhost [127.0.0.1])\n\tby smtp3.osuosl.org (Postfix) with ESMTP id 9C944608E3;\n\tMon, 20 Apr 2026 19:08:54 +0000 (UTC)", "from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id bkI9Cyu-fWZT; Mon, 20 Apr 2026 19:08:53 +0000 (UTC)", "from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp3.osuosl.org (Postfix) with ESMTP id 9BA72610F0;\n\tMon, 20 Apr 2026 19:08:53 +0000 (UTC)", "from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n by lists1.osuosl.org (Postfix) with ESMTP id DB610257\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 19:08:52 +0000 (UTC)", "from localhost (localhost [127.0.0.1])\n by smtp4.osuosl.org (Postfix) with ESMTP id C12AC4111F\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 19:08:52 +0000 (UTC)", "from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id 4Ng-PWq6gcu9 for <buildroot@buildroot.org>;\n Mon, 20 Apr 2026 19:08:51 +0000 (UTC)", "from mail-pg1-x532.google.com (mail-pg1-x532.google.com\n [IPv6:2607:f8b0:4864:20::532])\n by smtp4.osuosl.org (Postfix) with ESMTPS id B573141112\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 19:08:51 +0000 (UTC)", "by mail-pg1-x532.google.com with SMTP id\n 41be03b00d2f7-c7358a7a8d1so2057922a12.3\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 12:08:51 -0700 (PDT)", "from fedora ([2409:40e5:101d:f700:95:a358:be57:4a93])\n by smtp.gmail.com with ESMTPSA id\n d2e1a72fcca58-82f8e9819fesm11477375b3a.4.2026.04.20.12.08.45\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Mon, 20 Apr 2026 12:08:49 -0700 (PDT)" ], "X-Virus-Scanned": [ "amavis at osuosl.org", "amavis at osuosl.org" ], "X-Comment": "SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ", "DKIM-Filter": [ "OpenDKIM Filter v2.11.0 smtp3.osuosl.org 9BA72610F0", "OpenDKIM Filter v2.11.0 smtp4.osuosl.org B573141112" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1776712133;\n\tbh=Sbi9MyL6j7ShqplXVfum+mMEUamIxgLaXDR7cE5EXlQ=;\n\th=From:To:Cc:Date:In-Reply-To:References:Subject:List-Id:\n\t List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe:\n\t From;\n\tb=Wu1khTX/jIU2IXwTqLfXk5gUJVqHHJjTVMwFtzZiHdPe8ZJyUZv75EXpudaJwL8cY\n\t OwY/qU8EIEeSJLYdgWjGi8kjQEKThXAeokktbFwmeuIGT6atDtZHIprPD4l+PcejKt\n\t nyO04yptgXwUvrLe0V2Ku2BoOXd6IF6EE02a++Mjp1jRUNe2RXtqT5nFt9gShwgAMo\n\t Xz10zonqgez6jNLmJEInIqtsAtxu6tZpHHxAFQ37uEJ6i+s3RtNhFGyZJIVVI1GVAy\n\t 8gOLL8IE9bTTbTDYJjLriJFPBHHjXoRtcQtBeJG2TSCHBQtIceQSrv2YAfrggg84Gs\n\t uKMKlu6qTV74A==", "Received-SPF": "Pass (mailfrom) identity=mailfrom;\n client-ip=2607:f8b0:4864:20::532; helo=mail-pg1-x532.google.com;\n envelope-from=chakrabortyshubham66@gmail.com; receiver=<UNKNOWN>", "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp4.osuosl.org B573141112", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776712130; x=1777316930;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=8ZVL7DpSsrdCAsCSUeZdAV6EtOhldJPWY4RdsPOY2HQ=;\n b=Kwohz3d4UOO0IQZT9sO9HIE7vNDKsNt7FE1+a3IPY8K+0Bf0iyzQtr+VdiXbs2esRl\n WQfc5aJ3Dc8mguPfQfCu7EaVSZyz1ZQcQGuNA4//8pHWDxioOqP+Vhmc2ClCBACa6imN\n 5ZCysDAwvn7tW+DI1dPtmHnfb/FGlW+NV+Ybd1PEQrnSpgsBPWIuPqM8+iSnxW70nz+K\n cTt+AuAf0jH6NO0g1G7Jwzp5s39K0PnzCNFdaeaneqmiHyiz0BV/NJ4F+YsxbO6Csw85\n Uc3+/wDhRd+eJd5jHn4SElsa6ecN6ImhJ7F3mwGaNvAHXuxFU3FYV8qk7gFHu+FYlTEO\n b2jg==", "X-Gm-Message-State": "AOJu0YzPjur4t+ZfPsFwXJDQSlfAEE1Hs+M6t8LNcyx9w3ETPH9d62Lc\n RqK67YnAjHMkpk9eys47Y6TsxBfb+KJnH4sXM/ciLhKWL3cdR6Z6hCz/l9MkKDS1", "X-Gm-Gg": "AeBDietieXmrhdVE23zGh9cNgZdnYJ9AyLHmpCGiOOEYM4lZs3WI7SQuaB0ifFl3kDz\n 7RQYgjjGt9zq7Ntr/g45P5gPwlq4Gb5KQZZRK1FP/T+P7WNUyOrNIbISE6aAVAnhnyTMnadFtrk\n LzgoNeT7MsubyNFpep21j3+cE9o3QdcGlLQkShbeaAIh0RVb2vTJVGg6oxuj36sLwiP7NDT/VFK\n 5IaWTRQTHvXU3EzpLWjt5uF2FWjobt6gR6XXgI9WZECWEWakDy47Kzi0nE8TNgxUvJ9AQSSRcoY\n APaqBxzCa8t4Y4FF7e76M65hiiBfwe94cmOkn45FocEsVTu4sEa/HD4nIGLoOiHIJz9SuCxZ1Lw\n GDdXGqUIOpg2QE103rfcC2ezRB/2bwBlPe9bT+rwzGkgXi4qq8/t0fMma+ZMeYifrAnK8eWkiPC\n jNaP9ZkkcpwbB8zQSY1SUU26lBH15EwZI72+zBLCQ/IQ==", "X-Received": "by 2002:a05:6a00:4186:b0:82f:280a:d888 with SMTP id\n d2e1a72fcca58-82f8c81d952mr16524769b3a.12.1776712130470;\n Mon, 20 Apr 2026 12:08:50 -0700 (PDT)", "From": "Shubham Chakraborty <chakrabortyshubham66@gmail.com>", "To": "buildroot@buildroot.org", "Cc": "Shubham Chakraborty <chakrabortyshubham66@gmail.com>", "Date": "Tue, 21 Apr 2026 00:37:47 +0530", "Message-ID": "<20260420190748.181272-1-chakrabortyshubham66@gmail.com>", "X-Mailer": "git-send-email 2.53.0", "In-Reply-To": "<20260420084407.37993-1-chakrabortyshubham66@gmail.com>", "References": "<20260420084407.37993-1-chakrabortyshubham66@gmail.com>", "MIME-Version": "1.0", "X-Mailman-Original-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=gmail.com; s=20251104; t=1776712130; x=1777316930; darn=buildroot.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=8ZVL7DpSsrdCAsCSUeZdAV6EtOhldJPWY4RdsPOY2HQ=;\n b=GhL5UAGm3Dhd2lKcUZCT1wDCftjfyr9ggiLQz9LWL8/CihpsW0+KtJGhYT4yjeEko7\n ov1Jk4yoKVwsRY134sIwqxtdwCWytmhZKlBgqNeeRJGBV/7pqa56iyKx+Sqa4ZR2aR32\n TKjYSLJbW6PEODPKJ6ojUugKhRaYyqULrDtYc1XrHr3DgFAcF0ybEUYJbZQ59p5Fxkpi\n NcsX6efKtwr4sgI/VKo9IkXxOaGjoG5/18y3y8G00FpbSgenGPaUWjb7N97pdl5g5R9h\n nEwYmFEvvU0qx60NB+SDXGMBpuInW9PUs7+/aMUqNkkTJaE3+0cwPIhg+ZqZ5nxxVIg2\n rdEA==", "X-Mailman-Original-Authentication-Results": [ "smtp4.osuosl.org;\n dmarc=pass (p=none dis=none)\n header.from=gmail.com", "smtp4.osuosl.org;\n dkim=pass (2048-bit key,\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=GhL5UAGm" ], "Subject": "[Buildroot] [PATCH v2] package/botan: security bump to version\n 3.11.1", "X-BeenThere": "buildroot@buildroot.org", "X-Mailman-Version": "2.1.30", "Precedence": "list", "List-Id": "Discussion and development of buildroot <buildroot.buildroot.org>", "List-Unsubscribe": "<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>", "List-Archive": "<http://lists.buildroot.org/pipermail/buildroot/>", "List-Post": "<mailto:buildroot@buildroot.org>", "List-Help": "<mailto:buildroot-request@buildroot.org?subject=help>", "List-Subscribe": "<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Errors-To": "buildroot-bounces@buildroot.org", "Sender": "\"buildroot\" <buildroot-bounces@buildroot.org>" }, "content": "- Update BOTAN_VERSION to 3.11.1\n- Remove 0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch\n as it is already integrated upstream in this version.\n\nFixed in 3.11.1:\n- CVE-2026-35580: Resolve certificate verification bypass bug introduced\n in 3.11.0 (GH #5500)\n- CVE-2026-35582: Resolve TLS 1.3 client authentication bypass (GH #5599)\n\nFixed in 3.11.0:\n- CVE-2026-32877: Fix a heap over-read during SM2 decryption (GH #5450)\n- CVE-2026-32883: Fix an OCSP response forgery vulnerability (GH #5449)\n- CVE-2026-32884: Fix a name constraints bypass for DNS names (GH #5448)\n\n- Remove the --disable-altivec configuration option as it has been removed\n from the Botan build system in version 3.x\n- Optimize the --disable-neon logic using the yx pattern.\n In Botan 3.x, the --disable-neon flag is specifically targeted at the\n arm32 architecture. Furthermore, Buildroot's BR2_ARM_CPU_HAS_NEON\n variable is only defined for 32-bit ARM, which previously caused a\n false-positive --disable-neon flag to be passed on AArch64 builds\n- Update license.txt hash in botan.hash due to the copyright year update\n to 2026\n\nhttps://botan.randombit.net/news.html#version-3-11-1-2026-03-31\n\nSigned-off-by: Shubham Chakraborty <chakrabortyshubham66@gmail.com>\n\n---\nv1 -> v2:\n - Add \"security\" to the subject line.\n - Mention CVEs fixed in 3.11.0 and 3.11.1 as requested by Bernd Kuhls.\n - Optimize the NEON disable logic in botan.mk using the yx pattern.\n---\n ...avoid-compiler-induced-side-channels.patch | 65 -------------------\n package/botan/botan.hash | 4 +-\n package/botan/botan.mk | 11 +---\n 3 files changed, 4 insertions(+), 76 deletions(-)\n delete mode 100644 package/botan/0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch", "diff": "diff --git a/package/botan/0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch b/package/botan/0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch\ndeleted file mode 100644\nindex 22f64be1b9..0000000000\n--- a/package/botan/0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch\n+++ /dev/null\n@@ -1,65 +0,0 @@\n-From 53b0cfde580e86b03d0d27a488b6c134f662e957 Mon Sep 17 00:00:00 2001\n-From: Jack Lloyd <jack@randombit.net>\n-Date: Sat, 19 Oct 2024 07:43:18 -0400\n-Subject: [PATCH] Add more value barriers to avoid compiler induced side\n- channels\n-\n-The paper https://arxiv.org/pdf/2410.13489 claims that on specific\n-architectures Clang and GCC may introduce jumps here. The donna128\n-issues only affect 32-bit processors, which explains why we would not\n-see it in the x86-64 valgrind runs.\n-\n-The GHASH leak would seem to be generic but the authors only observed\n-it on RISC-V.\n-\n-CVE: CVE-2024-50382\n-CVE: CVE-2024-50383\n-Upstream: https://github.com/randombit/botan/commit/53b0cfde580e86b03d0d27a488b6c134f662e957\n-Signed-off-by: Thomas Perale <thomas.perale@mind.be>\n----\n- src/lib/utils/donna128.h | 5 +++--\n- src/lib/utils/ghash/ghash.cpp | 2 +-\n- 2 files changed, 4 insertions(+), 3 deletions(-)\n-\n-diff --git a/src/lib/utils/donna128.h b/src/lib/utils/donna128.h\n-index 8212bd349e0..7adf54546df 100644\n---- a/src/lib/utils/donna128.h\n-+++ b/src/lib/utils/donna128.h\n-@@ -8,6 +8,7 @@\n- #ifndef BOTAN_CURVE25519_DONNA128_H_\n- #define BOTAN_CURVE25519_DONNA128_H_\n- \n-+#include <botan/internal/ct_utils.h>\n- #include <botan/internal/mul128.h>\n- #include <type_traits>\n- \n-@@ -73,14 +74,14 @@ class donna128 final {\n- l += x.l;\n- h += x.h;\n- \n-- const uint64_t carry = (l < x.l);\n-+ const uint64_t carry = CT::Mask<uint64_t>::is_lt(l, x.l).if_set_return(1);\n- h += carry;\n- return *this;\n- }\n- \n- constexpr donna128& operator+=(uint64_t x) {\n- l += x;\n-- const uint64_t carry = (l < x);\n-+ const uint64_t carry = CT::Mask<uint64_t>::is_lt(l, x).if_set_return(1);\n- h += carry;\n- return *this;\n- }\n-diff --git a/src/lib/utils/ghash/ghash.cpp b/src/lib/utils/ghash/ghash.cpp\n-index 8c3b1ed6c2a..61b28590002 100644\n---- a/src/lib/utils/ghash/ghash.cpp\n-+++ b/src/lib/utils/ghash/ghash.cpp\n-@@ -131,7 +131,7 @@ void GHASH::key_schedule(std::span<const uint8_t> key) {\n- m_HM[4 * j + 2 * i + 1] = H1;\n- \n- // GCM's bit ops are reversed so we carry out of the bottom\n-- const uint64_t carry = R * (H1 & 1);\n-+ const uint64_t carry = CT::Mask<uint64_t>::expand(H1 & 1).if_set_return(R);\n- H1 = (H1 >> 1) | (H0 << 63);\n- H0 = (H0 >> 1) ^ carry;\n- }\ndiff --git a/package/botan/botan.hash b/package/botan/botan.hash\nindex d948271900..6b391c06a3 100644\n--- a/package/botan/botan.hash\n+++ b/package/botan/botan.hash\n@@ -1,4 +1,4 @@\n # From https://botan.randombit.net/releases/sha256sums.txt\n-sha256 67e8dae1ca2468d90de4e601c87d5f31ff492b38e8ab8bcbd02ddf7104ed8a9f Botan-3.5.0.tar.xz\n+sha256 c1cd7152519f4188591fa4f6ddeb116bc1004491f5f3c58aa99b00582eb8a137 Botan-3.11.1.tar.xz\n # Locally computed\n-sha256 db9168bdccaaea26557094436652577cc9bf43164e8be078d88aef1342fe4fb6 license.txt\n+sha256 758ea6b4a65d5611bf79c24920f92473ef44bdde0b3b97fa578470a0ffc34f14 license.txt\ndiff --git a/package/botan/botan.mk b/package/botan/botan.mk\nindex 38948f0184..06f1ce2730 100644\n--- a/package/botan/botan.mk\n+++ b/package/botan/botan.mk\n@@ -4,16 +4,13 @@\n #\n ################################################################################\n \n-BOTAN_VERSION = 3.5.0\n+BOTAN_VERSION = 3.11.1\n BOTAN_SOURCE = Botan-$(BOTAN_VERSION).tar.xz\n BOTAN_SITE = http://botan.randombit.net/releases\n BOTAN_LICENSE = BSD-2-Clause\n BOTAN_LICENSE_FILES = license.txt\n BOTAN_CPE_ID_VALID = YES\n \n-# 0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch\n-BOTAN_IGNORE_CVES += CVE-2024-50382 CVE-2024-50383\n-\n BOTAN_INSTALL_STAGING = YES\n \n BOTAN_DEPENDENCIES = host-python3\n@@ -91,11 +88,7 @@ BOTAN_DEPENDENCIES += zlib\n BOTAN_CONF_OPTS += --with-zlib\n endif\n \n-ifeq ($(BR2_POWERPC_CPU_HAS_ALTIVEC),)\n-BOTAN_CONF_OPTS += --disable-altivec\n-endif\n-\n-ifeq ($(BR2_ARM_CPU_HAS_NEON),)\n+ifeq ($(BR2_arm)x$(BR2_ARM_CPU_HAS_NEON),yx)\n BOTAN_CONF_OPTS += --disable-neon\n endif\n \n", "prefixes": [ "v2" ] }