]> code.ossystems Code Review - openembedded-core.git/commitdiff
glibc: update to lastest 2.31 release HEAD
authorSteve Sakoman <steve@sakoman.com>
Wed, 26 Jan 2022 14:37:07 +0000 (04:37 -1000)
committerSteve Sakoman <steve@sakoman.com>
Mon, 7 Feb 2022 14:40:00 +0000 (04:40 -1000)
Includes the following fixes:

3ef8be9b89 CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bug 28768)
e5c8da9826 <shlib-compat.h>: Support compat_symbol_reference for _ISOMAC
412aaf1522 sunrpc: Test case for clnt_create "unix" buffer overflow (bug 22542)
c4c833d3dd CVE-2022-23219: Buffer overflow in sunrpc clnt_create for "unix" (bug 22542)
547b63bf6d socket: Add the __sockaddr_un_set function
b061e95277 Revert "Fix __minimal_malloc segfaults in __mmap due to stack-protector"
95e206b67f Fix __minimal_malloc segfaults in __mmap due to stack-protector
e26a2db141 gconv: Do not emit spurious NUL character in ISO-2022-JP-3 (bug 28524)
094618d401 x86_64: Remove unneeded static PIE check for undefined weak diagnostic

Also add CVE-2022-23218 and CVE-2022-23219 to ignore list since they are fixed
by the above changes.

Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-core/glibc/glibc-version.inc
meta/recipes-core/glibc/glibc_2.31.bb

index aac0d9b3bf7577bf555e3f0a70dd5c6f4ba30ac1..68efd09ece24649d3568a677c192b89ff1525ac9 100644 (file)
@@ -1,6 +1,6 @@
 SRCBRANCH ?= "release/2.31/master"
 PV = "2.31+git${SRCPV}"
-SRCREV_glibc ?= "4f0a61f75385c9a5879cbe7202042e88f692a3c8"
+SRCREV_glibc ?= "3ef8be9b89ef98300951741f381eb79126ac029f"
 SRCREV_localedef ?= "cd9f958c4c94a638fa7b2b4e21627364f1a1a655"
 
 GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git"
index 4a545cb97dc811a974bc7ca24535422e1f4f51d7..0c37467fe4961934f86353a67365a2dd72763280 100644 (file)
@@ -3,6 +3,7 @@ require glibc-version.inc
 
 CVE_CHECK_WHITELIST += "CVE-2020-10029 CVE-2020-6096 CVE-2016-10228 CVE-2020-1751 CVE-2020-1752 \
                         CVE-2021-27645 CVE-2021-3326 CVE-2020-27618 CVE-2020-29562 CVE-2019-25013 \
+                        CVE-2022-23218 CVE-2022-23219 \
 "
 
 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010022