{"id":2225011,"url":"http://patchwork.ozlabs.org/api/patches/2225011/?format=json","web_url":"http://patchwork.ozlabs.org/project/buildroot/patch/20260420084407.37993-1-chakrabortyshubham66@gmail.com/","project":{"id":27,"url":"http://patchwork.ozlabs.org/api/projects/27/?format=json","name":"Buildroot development","link_name":"buildroot","list_id":"buildroot.buildroot.org","list_email":"buildroot@buildroot.org","web_url":"","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260420084407.37993-1-chakrabortyshubham66@gmail.com>","list_archive_url":null,"date":"2026-04-20T08:44:06","name":"package/botan: bump to version 3.11.1","commit_ref":null,"pull_url":null,"state":"superseded","archived":false,"hash":"c36c4dcb772c0748b611dfd6f90788cde0aed3bc","submitter":{"id":92564,"url":"http://patchwork.ozlabs.org/api/people/92564/?format=json","name":"Shubham Chakraborty","email":"chakrabortyshubham66@gmail.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/buildroot/patch/20260420084407.37993-1-chakrabortyshubham66@gmail.com/mbox/","series":[{"id":500570,"url":"http://patchwork.ozlabs.org/api/series/500570/?format=json","web_url":"http://patchwork.ozlabs.org/project/buildroot/list/?series=500570","date":"2026-04-20T08:44:06","name":"package/botan: bump to version 3.11.1","version":1,"mbox":"http://patchwork.ozlabs.org/series/500570/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2225011/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2225011/checks/","tags":{},"related":[],"headers":{"Return-Path":"<buildroot-bounces@buildroot.org>","X-Original-To":["incoming-buildroot@patchwork.ozlabs.org","buildroot@buildroot.org"],"Delivered-To":["patchwork-incoming-buildroot@legolas.ozlabs.org","buildroot@buildroot.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=qlTO4oEw;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::136; helo=smtp3.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"],"Received":["from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzfDf4H0Bz1yGs\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Mon, 20 Apr 2026 18:44:34 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp3.osuosl.org (Postfix) with ESMTP id 998C660AFD;\n\tMon, 20 Apr 2026 08:44:32 +0000 (UTC)","from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id AjAX6kLQNl0h; Mon, 20 Apr 2026 08:44:31 +0000 (UTC)","from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp3.osuosl.org (Postfix) with ESMTP id 932C760B7C;\n\tMon, 20 Apr 2026 08:44:31 +0000 (UTC)","from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136])\n by lists1.osuosl.org (Postfix) with ESMTP id 9381D24D\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 08:44:30 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp3.osuosl.org (Postfix) with ESMTP id 908F560B7C\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 08:44:30 +0000 (UTC)","from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id vOz5t8RAFVWw for <buildroot@buildroot.org>;\n Mon, 20 Apr 2026 08:44:29 +0000 (UTC)","from mail-pg1-x531.google.com (mail-pg1-x531.google.com\n [IPv6:2607:f8b0:4864:20::531])\n by smtp3.osuosl.org (Postfix) with ESMTPS id A67E760AFD\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 08:44:29 +0000 (UTC)","by mail-pg1-x531.google.com with SMTP id\n 41be03b00d2f7-c79467f128cso919663a12.3\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 01:44:29 -0700 (PDT)","from fedora ([2409:4064:4e3f:c6c4:9958:eee0:142e:788d])\n by smtp.gmail.com with ESMTPSA id\n 41be03b00d2f7-c797703df68sm7495995a12.27.2026.04.20.01.44.23\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Mon, 20 Apr 2026 01:44:25 -0700 (PDT)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp3.osuosl.org 932C760B7C","OpenDKIM Filter v2.11.0 smtp3.osuosl.org A67E760AFD"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1776674671;\n\tbh=s8dbxr+G6T4fgnZaqX76auOyKfzjhQJgyPeMLNCpWMg=;\n\th=From:To:Cc:Date:Subject:List-Id:List-Unsubscribe:List-Archive:\n\t List-Post:List-Help:List-Subscribe:From;\n\tb=qlTO4oEwvihUEOPajJaoZBnbJB7wHVxggSeW+VSsnZZMuowYOWu0Xqe+008aZ3mTS\n\t lLMgv3mMR102gr/O9OHcN8AtcJix+oVNGWByk0Ovy49oV/W/mDHjDS0fYIK0Qs5/NA\n\t ouoJri2RNo9Bq+sPWXdoIA7Xey3PMgNsog+Z0lTdGKOBQlh1TV7wE7rlJtQzwj+ejO\n\t bFMqnMymoSOJ5/aT35TDKmi2brw/LVX3EX0uttezqsl+9fLKZqG8MtFLXfXd2rul5y\n\t dAHjz3kh9Hiaw9kyZKPlxTXYTdbvQjhNM+KP6qI1S3OqgH+m8PgwLRTFMYqTil9o82\n\t ChGUyObQcGueg==","Received-SPF":"Pass (mailfrom) identity=mailfrom;\n client-ip=2607:f8b0:4864:20::531; helo=mail-pg1-x531.google.com;\n envelope-from=chakrabortyshubham66@gmail.com; receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp3.osuosl.org A67E760AFD","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776674668; x=1777279468;\n h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=2H8kim6Jj9Rfdrwxv62TNFDJi2A0ItlDiOwIvJHNu50=;\n b=j/PGIExChDPDqpTYEE5/A6qHRsfGkW+hEV5YY8Ev9IjGOeX5TQpkPONzSxJqPvgFau\n oPflR4VXtUqUE/oAW1awx1PrZj8SYaD6uc5jUe1Sxd+sCWpVHYnvv2FHRvo16EuE+51e\n WJSS9gvrsYYU9LJ9GU+OAo+8BhHy64dzOrWhzxeJTgn2nIsUfsXmpFVDniPaftUPte+A\n ra5wNUz/xEsL4h4CLYu2ZRGyfHrkDVn3IqvvmUWkenQaOoSjby1jifidCTvvMmiimyUB\n x7ao8Yt2jB4qTzbzp/hWF1bqkYbtR3PKhTMQJmp0YOTdklckWyo9g445LBiNSx75itPk\n 7myw==","X-Gm-Message-State":"AOJu0YxL0f6LA3KwkKuJ/Xuj5ay0vi8qnonucUBjEzDG3/z/s822fGwi\n YEWs+i/PDuN9RrP8p+08vw5YMy7wh70c1iUBr/iSotImZCRb2NBY5oMpXtRYykf5Xcs=","X-Gm-Gg":"AeBDiesn6zECoa18xXZH+d3uI2R+Ob8drAdFNK1EIc9bFUA2vs7sb433vyJE+l1Ik5l\n gKXb5ng1w5v485y/Okhk9QK+EHuor/libWyj71S7ZRjtKkGN8Ne6u66kLHdFboPb4FaSjO4zjE6\n iTblfPZGPCPD4wQFr6Ac1nM3z1QOjuKEVtjptkdpbgS5HePfKMiTqgygDohXNpodoD5AGXgo80R\n GMVtfyvIE8u50lcg0DC1vGvh+zOoI5sOIiZ3e+W9fcuG/4Z0W7MpsfjzvWnZAV115BY+/hVa9AB\n zbj/MTgM8p4FJNl1v2XA69X9yBq8End8eiFW2VMm2eZdSD7ycgaL4jasF6TGze4QarPtpT/EKcf\n 2RgwEAsVzfH19gB+e4mmV6o6keoAaXXvKzKv9kb2V7v4qVHjJxPmIRDF0w2chuNcDe4eCNdZnvi\n qu/RFeCH1jIZGtETpsdvlcFcl2OU48Q1dhAFkIIP80wFpaGu4=","X-Received":"by 2002:a05:6a20:158b:b0:39b:fbb2:5e31 with SMTP id\n adf61e73a8af0-3a08d8fb898mr13552339637.43.1776674667943;\n Mon, 20 Apr 2026 01:44:27 -0700 (PDT)","From":"Shubham Chakraborty <chakrabortyshubham66@gmail.com>","To":"buildroot@buildroot.org","Cc":"Shubham Chakraborty <chakrabortyshubham66@gmail.com>","Date":"Mon, 20 Apr 2026 14:14:06 +0530","Message-ID":"<20260420084407.37993-1-chakrabortyshubham66@gmail.com>","X-Mailer":"git-send-email 2.53.0","MIME-Version":"1.0","X-Mailman-Original-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=gmail.com; s=20251104; t=1776674668; x=1777279468; darn=buildroot.org;\n h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n :to:from:from:to:cc:subject:date:message-id:reply-to;\n bh=2H8kim6Jj9Rfdrwxv62TNFDJi2A0ItlDiOwIvJHNu50=;\n b=IWN/sJeTxwpvJGCRQLYbCMGbthMSl8nncdIfZLRGEOkmNvr1QirmKjO1yuEySqKCXZ\n njkUqA9nkIwbbeYojumUzNjhhFgItSKk3AEPHQ9Ze7MmvurxebEhTrrkDgI8QU4iQM/L\n xCTygm/+zJ3hxdZUx1sc7nZDj4qhbzDRCgsXcA01cjUUncV2m7eVsEWuM2B/NkBN5xxc\n SVHRv1LCD11yvYxCvh5axrXx3Ez01j3YmgWlDtiEfV29BI45RJsSg90I/X5nmAbGE9IV\n /ce3vaBKEIUbdtiVkERxeSaI6n0+zl8zYM5swEL1qTmhL+dQSTz9eBcmrjZEZv/AM7YO\n h3rg==","X-Mailman-Original-Authentication-Results":["smtp3.osuosl.org;\n dmarc=pass (p=none dis=none)\n header.from=gmail.com","smtp3.osuosl.org;\n dkim=pass (2048-bit key,\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=IWN/sJeT"],"Subject":"[Buildroot] [PATCH] package/botan: bump to version 3.11.1","X-BeenThere":"buildroot@buildroot.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Discussion and development of buildroot <buildroot.buildroot.org>","List-Unsubscribe":"<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>","List-Archive":"<http://lists.buildroot.org/pipermail/buildroot/>","List-Post":"<mailto:buildroot@buildroot.org>","List-Help":"<mailto:buildroot-request@buildroot.org?subject=help>","List-Subscribe":"<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"buildroot-bounces@buildroot.org","Sender":"\"buildroot\" <buildroot-bounces@buildroot.org>"},"content":"- Update BOTAN_VERSION to 3.11.1\n- Remove 0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch\n  as it is already integrated upstream in this version (fixes CVE-2024-50382\n  and CVE-2024-50383)\n- Remove the --disable-altivec configuration option as it has been removed\n  from the Botan build system in version 3.x\n- Wrap the --disable-neon logic with ifeq ($(BR2_arm),y). In Botan 3.x,\n  the --disable-neon flag is specifically targeted at the arm32 architecture.\n  Furthermore, Buildroot's BR2_ARM_CPU_HAS_NEON variable is only defined\n  for 32-bit ARM, which previously caused a false-positive --disable-neon\n  flag to be passed on AArch64 builds\n- Update license.txt hash in botan.hash due to the copyright year update\n  to 2026\n\nhttps://botan.randombit.net/news.html#version-3-11-1-2026-03-31\n\nSigned-off-by: Shubham Chakraborty <chakrabortyshubham66@gmail.com>\n---\n ...avoid-compiler-induced-side-channels.patch | 65 -------------------\n package/botan/botan.hash                      |  4 +-\n package/botan/botan.mk                        | 11 +---\n 3 files changed, 5 insertions(+), 75 deletions(-)\n delete mode 100644 package/botan/0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch","diff":"diff --git a/package/botan/0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch b/package/botan/0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch\ndeleted file mode 100644\nindex 22f64be1b9..0000000000\n--- a/package/botan/0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch\n+++ /dev/null\n@@ -1,65 +0,0 @@\n-From 53b0cfde580e86b03d0d27a488b6c134f662e957 Mon Sep 17 00:00:00 2001\n-From: Jack Lloyd <jack@randombit.net>\n-Date: Sat, 19 Oct 2024 07:43:18 -0400\n-Subject: [PATCH] Add more value barriers to avoid compiler induced side\n- channels\n-\n-The paper https://arxiv.org/pdf/2410.13489 claims that on specific\n-architectures Clang and GCC may introduce jumps here. The donna128\n-issues only affect 32-bit processors, which explains why we would not\n-see it in the x86-64 valgrind runs.\n-\n-The GHASH leak would seem to be generic but the authors only observed\n-it on RISC-V.\n-\n-CVE: CVE-2024-50382\n-CVE: CVE-2024-50383\n-Upstream: https://github.com/randombit/botan/commit/53b0cfde580e86b03d0d27a488b6c134f662e957\n-Signed-off-by: Thomas Perale <thomas.perale@mind.be>\n----\n- src/lib/utils/donna128.h      | 5 +++--\n- src/lib/utils/ghash/ghash.cpp | 2 +-\n- 2 files changed, 4 insertions(+), 3 deletions(-)\n-\n-diff --git a/src/lib/utils/donna128.h b/src/lib/utils/donna128.h\n-index 8212bd349e0..7adf54546df 100644\n---- a/src/lib/utils/donna128.h\n-+++ b/src/lib/utils/donna128.h\n-@@ -8,6 +8,7 @@\n- #ifndef BOTAN_CURVE25519_DONNA128_H_\n- #define BOTAN_CURVE25519_DONNA128_H_\n- \n-+#include <botan/internal/ct_utils.h>\n- #include <botan/internal/mul128.h>\n- #include <type_traits>\n- \n-@@ -73,14 +74,14 @@ class donna128 final {\n-          l += x.l;\n-          h += x.h;\n- \n--         const uint64_t carry = (l < x.l);\n-+         const uint64_t carry = CT::Mask<uint64_t>::is_lt(l, x.l).if_set_return(1);\n-          h += carry;\n-          return *this;\n-       }\n- \n-       constexpr donna128& operator+=(uint64_t x) {\n-          l += x;\n--         const uint64_t carry = (l < x);\n-+         const uint64_t carry = CT::Mask<uint64_t>::is_lt(l, x).if_set_return(1);\n-          h += carry;\n-          return *this;\n-       }\n-diff --git a/src/lib/utils/ghash/ghash.cpp b/src/lib/utils/ghash/ghash.cpp\n-index 8c3b1ed6c2a..61b28590002 100644\n---- a/src/lib/utils/ghash/ghash.cpp\n-+++ b/src/lib/utils/ghash/ghash.cpp\n-@@ -131,7 +131,7 @@ void GHASH::key_schedule(std::span<const uint8_t> key) {\n-          m_HM[4 * j + 2 * i + 1] = H1;\n- \n-          // GCM's bit ops are reversed so we carry out of the bottom\n--         const uint64_t carry = R * (H1 & 1);\n-+         const uint64_t carry = CT::Mask<uint64_t>::expand(H1 & 1).if_set_return(R);\n-          H1 = (H1 >> 1) | (H0 << 63);\n-          H0 = (H0 >> 1) ^ carry;\n-       }\ndiff --git a/package/botan/botan.hash b/package/botan/botan.hash\nindex d948271900..6b391c06a3 100644\n--- a/package/botan/botan.hash\n+++ b/package/botan/botan.hash\n@@ -1,4 +1,4 @@\n # From https://botan.randombit.net/releases/sha256sums.txt\n-sha256  67e8dae1ca2468d90de4e601c87d5f31ff492b38e8ab8bcbd02ddf7104ed8a9f  Botan-3.5.0.tar.xz\n+sha256  c1cd7152519f4188591fa4f6ddeb116bc1004491f5f3c58aa99b00582eb8a137  Botan-3.11.1.tar.xz\n # Locally computed\n-sha256  db9168bdccaaea26557094436652577cc9bf43164e8be078d88aef1342fe4fb6  license.txt\n+sha256  758ea6b4a65d5611bf79c24920f92473ef44bdde0b3b97fa578470a0ffc34f14  license.txt\ndiff --git a/package/botan/botan.mk b/package/botan/botan.mk\nindex 38948f0184..989263403f 100644\n--- a/package/botan/botan.mk\n+++ b/package/botan/botan.mk\n@@ -4,16 +4,13 @@\n #\n ################################################################################\n \n-BOTAN_VERSION = 3.5.0\n+BOTAN_VERSION = 3.11.1\n BOTAN_SOURCE = Botan-$(BOTAN_VERSION).tar.xz\n BOTAN_SITE = http://botan.randombit.net/releases\n BOTAN_LICENSE = BSD-2-Clause\n BOTAN_LICENSE_FILES = license.txt\n BOTAN_CPE_ID_VALID = YES\n \n-# 0001-Add-more-value-barriers-to-avoid-compiler-induced-side-channels.patch\n-BOTAN_IGNORE_CVES += CVE-2024-50382 CVE-2024-50383\n-\n BOTAN_INSTALL_STAGING = YES\n \n BOTAN_DEPENDENCIES = host-python3\n@@ -91,13 +88,11 @@ BOTAN_DEPENDENCIES += zlib\n BOTAN_CONF_OPTS += --with-zlib\n endif\n \n-ifeq ($(BR2_POWERPC_CPU_HAS_ALTIVEC),)\n-BOTAN_CONF_OPTS += --disable-altivec\n-endif\n-\n+ifeq ($(BR2_arm),y)\n ifeq ($(BR2_ARM_CPU_HAS_NEON),)\n BOTAN_CONF_OPTS += --disable-neon\n endif\n+endif\n \n ifeq ($(BR2_SOFT_FLOAT),y)\n BOTAN_CONF_OPTS += --disable-neon\n","prefixes":[]}