Message ID | 20220130162538.3370704-1-hauke@hauke-m.de |
---|---|
State | Superseded |
Delegated to: | Hauke Mehrtens |
Headers | show
Return-Path: <openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=4eg7Z7v8; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=hauke-m.de header.i=@hauke-m.de header.a=rsa-sha256 header.s=MBO0001 header.b=O8jQvosq; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.openwrt.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org; receiver=<UNKNOWN>) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4JmxVN0wZvz9s8s for <incoming@patchwork.ozlabs.org>; Mon, 31 Jan 2022 03:29:32 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=D//ii4JL9vm/5+ZyHcjk2hFOysdH+sM3zpr8P0C41s8=; b=4eg7Z7v8qr+fDM VRhMCyXr2dGCkiayA+itxLDp8t03jqtksXw3fGNs420jwy6CnDvjAb8KXZfhdfRYNbc6Yw7fc5dKr ALN94/HWkKpJQ76yobjluYpiDzAdp2yAsjgZOCWYejOkJXdpqw0Z2eJy+ULLtZjP3q3skzKkKJsBH 4LRwiDJzT7gmQ3ySKxZTSVwk5i8PSi+1OOmSBUElStJSK2oHL1zOji9U4SwSTQbBolc+6Csr2IaLc ratS1dzkOgGzyykWGH9A/a37gfu6nh2u+jcSxrbvIOBIehljWf1GgVEILdIRhJ43vwPl+MWaPR/K7 42z9kvUKpdJvTVwS+M/w==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nED3H-006xVf-UV; Sun, 30 Jan 2022 16:27:44 +0000 Received: from mout-p-102.mailbox.org ([80.241.56.152]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1nED1h-006xAo-0J for openwrt-devel@lists.openwrt.org; Sun, 30 Jan 2022 16:26:10 +0000 Received: from smtp202.mailbox.org (smtp202.mailbox.org [IPv6:2001:67c:2050:105:465:1:4:0]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-102.mailbox.org (Postfix) with ESMTPS id 4JmxQH328xz9sT8; Sun, 30 Jan 2022 17:25:59 +0100 (CET) X-Virus-Scanned: amavisd-new at heinlein-support.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hauke-m.de; s=MBO0001; t=1643559957; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=SvEithbY8ueBRg0cTbHj+SrncJetBP7MuIZLFr4KQIQ=; b=O8jQvosqFCTtKfVVgGBqyfKgwA+8KVPztEOQpPerlHriq4QeJ3ijJLRva8iaYJNGTDHeW+ y0c7Bc2s+YEHM2dYb+iUGDoUSA7viiT2bI71CfCfOkfDG/Cq5UTjJa0+v0AIaNN0iZW3fe YycZGoIOU9ijTnZ3+8ih8vkkrl071O1CcSbqZ6+9LrOvqHoI/qPyEmwLcN6L9b+61AujZj ZhFW/Aa30lsANZRf7MDhZ5Jr3FKALSM3r7Cdwbh7kt98FO6CV28ID+EmpJe60/mp8rjySe ENhcm/jxfCXZe+7TLO7PTPSuPt/ZgzSFYsSFrZVN13aeeNEYrMPocdv2npNFrQ== From: Hauke Mehrtens <hauke@hauke-m.de> To: openwrt-devel@lists.openwrt.org Cc: Hauke Mehrtens <hauke@hauke-m.de> Subject: [PATCH 01/11] toolchain: glibc: update to latest 2.34 HEAD Date: Sun, 30 Jan 2022 17:25:28 +0100 Message-Id: <20220130162538.3370704-1-hauke@hauke-m.de> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220130_082605_236359_FE2FA8BA X-CRM114-Status: UNSURE ( 8.92 ) X-CRM114-Notice: Please train this message. X-Spam-Score: -0.9 (/) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: e64235ff42 powerpc: Fix unrecognized instruction errors with recent GCC 73558ffe84 Update syscall lists for Linux 5.15 2fe2af88ab i386: Remove broken CAN_USE_REGISTER_ASM_EBP (bug 28771) 705f1e4606 Up [...] Content analysis details: (-0.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at https://www.dnswl.org/, low trust [80.241.56.152 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain X-BeenThere: openwrt-devel@lists.openwrt.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: OpenWrt Development List <openwrt-devel.lists.openwrt.org> List-Unsubscribe: <https://lists.openwrt.org/mailman/options/openwrt-devel>, <mailto:openwrt-devel-request@lists.openwrt.org?subject=unsubscribe> List-Archive: <http://lists.openwrt.org/pipermail/openwrt-devel/> List-Post: <mailto:openwrt-devel@lists.openwrt.org> List-Help: <mailto:openwrt-devel-request@lists.openwrt.org?subject=help> List-Subscribe: <https://lists.openwrt.org/mailman/listinfo/openwrt-devel>, <mailto:openwrt-devel-request@lists.openwrt.org?subject=subscribe> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "openwrt-devel" <openwrt-devel-bounces@lists.openwrt.org> Errors-To: openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org |
Series |
[01/11] toolchain: glibc: update to latest 2.34 HEAD
|
expand
|
diff --git a/toolchain/glibc/common.mk b/toolchain/glibc/common.mk index e957ff52e509..51d13c457ead 100644 --- a/toolchain/glibc/common.mk +++ b/toolchain/glibc/common.mk @@ -12,8 +12,8 @@ PKG_RELEASE:=1 PKG_SOURCE_PROTO:=git PKG_SOURCE_SUBDIR:=$(PKG_NAME)-$(PKG_VERSION) -PKG_SOURCE_VERSION:=d5ba02f67dd62a63e29c29eebd6c543722aa6b5b -PKG_MIRROR_HASH:=19e49929c7ea3480a0d1213b6763a23a5ed8129a34fe201a985498927c583ce1 +PKG_SOURCE_VERSION:=72123e1b56f53f9205bb105f8a62d0869b837b22 +PKG_MIRROR_HASH:=934ec7067d41da0b76b8f29a1cd03b10ba9d98c2f761f7b32f8595e59ac2b428 PKG_SOURCE_URL:=https://sourceware.org/git/glibc.git PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION)-$(PKG_SOURCE_VERSION).tar.xz
e64235ff42 powerpc: Fix unrecognized instruction errors with recent GCC 73558ffe84 Update syscall lists for Linux 5.15 2fe2af88ab i386: Remove broken CAN_USE_REGISTER_ASM_EBP (bug 28771) 705f1e4606 Update syscall lists for Linux 5.16 03e6e02e6a Disable debuginfod in printer tests [BZ #28757] 5575daae50 socket: Add the __sockaddr_un_set function 7b5d433fd0 CVE-2022-23219: Buffer overflow in sunrpc clnt_create for "unix" (bug 22542) 1081f1d3dd sunrpc: Test case for clnt_create "unix" buffer overflow (bug 22542) 6890b8a3ae CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bug 28768) 1d401d1fcc x86: use default cache size if it cannot be determined [BZ #28784] 82b1acd9de powerpc: Fix unrecognized instruction errors with recent binutils 062ff490c1 support: Add helpers to create paths longer than PATH_MAX 269eb9d930 stdlib: Sort tests in Makefile 73c362840c stdlib: Fix formatting of tests list in Makefile f7a79879c0 realpath: Set errno to ENAMETOOLONG for result larger than PATH_MAX [BZ #28770] 8c8a71c85f tst-realpath-toolong: Fix hurd build 472e799a5f getcwd: Set errno to ERANGE for size == 1 (CVE-2021-3999) d084965adc realpath: Avoid overwriting preexisting error (CVE-2021-3998) 3438bbca90 Linux: Detect user namespace support in io/tst-getcwd-smallbuff 1b9cd6a721 NEWS: add bug entry for BZ #28769 and BZ #28770 b50d5b746c x86: Fix __wcsncmp_avx2 in strcmp-avx2.S [BZ# 28755] 08beb3a3f4 x86: Fix __wcsncmp_evex in strcmp-evex.S [BZ# 28755] 72123e1b56 NEWS: Add a bug entry for BZ #28755 This fixes multiple bugs including the following security problems: CVE-2022-23219: Buffer overflow in sunrpc clnt_create for "unix" CVE-2022-23218: Buffer overflow in sunrpc svcunix_create CVE-2021-3999: Off-by-one buffer overflow/underflow in getcwd() CVE-2021-3998: Unexpected return value from realpath() for too long results Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> --- toolchain/glibc/common.mk | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)