Please discard this series, sent prematurely (I hit ctrl-c in the middle, so not all pathes will arrive).
Alex On Mon, 8 Aug 2022 at 08:38, Alexander Kanavin via lists.openembedded.org <alex.kanavin=gmail....@lists.openembedded.org> wrote: > > Signed-off-by: Alexander Kanavin <a...@linutronix.de> > --- > .../rpm/files/0001-CVE-2021-3521.patch | 57 --- > ...lib-rpm-as-the-installation-path-for.patch | 14 +- > ...-linux-gnux32-variant-to-triplet-han.patch | 31 ++ > .../rpm/files/0002-CVE-2021-3521.patch | 64 ---- > .../rpm/files/0003-CVE-2021-3521.patch | 329 ------------------ > .../rpm/{rpm_4.17.0.bb => rpm_4.17.1.bb} | 6 +- > 6 files changed, 40 insertions(+), 461 deletions(-) > delete mode 100644 meta/recipes-devtools/rpm/files/0001-CVE-2021-3521.patch > create mode 100644 > meta/recipes-devtools/rpm/files/0001-configure.ac-add-linux-gnux32-variant-to-triplet-han.patch > delete mode 100644 meta/recipes-devtools/rpm/files/0002-CVE-2021-3521.patch > delete mode 100644 meta/recipes-devtools/rpm/files/0003-CVE-2021-3521.patch > rename meta/recipes-devtools/rpm/{rpm_4.17.0.bb => rpm_4.17.1.bb} (97%) > > diff --git a/meta/recipes-devtools/rpm/files/0001-CVE-2021-3521.patch > b/meta/recipes-devtools/rpm/files/0001-CVE-2021-3521.patch > deleted file mode 100644 > index 044b4dd2a0..0000000000 > --- a/meta/recipes-devtools/rpm/files/0001-CVE-2021-3521.patch > +++ /dev/null > @@ -1,57 +0,0 @@ > -From 9a6871126f472feea057d5f803505ec8cc78f083 Mon Sep 17 00:00:00 2001 > -From: Panu Matilainen <pmati...@redhat.com> > -Date: Thu, 30 Sep 2021 09:56:20 +0300 > -Subject: [PATCH 1/3] Refactor pgpDigParams construction to helper function > - > -No functional changes, just to reduce code duplication and needed by > -the following commits. > - > -CVE: CVE-2021-3521 > -Upstream-Status: Backport > [https://github.com/rpm-software-management/rpm/commit/9f03f42e2] > - > -Signed-off-by: Changqing Li <changqing...@windriver.com> > ---- > - rpmio/rpmpgp.c | 13 +++++++++---- > - 1 file changed, 9 insertions(+), 4 deletions(-) > - > -diff --git a/rpmio/rpmpgp.c b/rpmio/rpmpgp.c > -index d0688ebe9a..e472b5320f 100644 > ---- a/rpmio/rpmpgp.c > -+++ b/rpmio/rpmpgp.c > -@@ -1041,6 +1041,13 @@ unsigned int pgpDigParamsAlgo(pgpDigParams digp, > unsigned int algotype) > - return algo; > - } > - > -+static pgpDigParams pgpDigParamsNew(uint8_t tag) > -+{ > -+ pgpDigParams digp = xcalloc(1, sizeof(*digp)); > -+ digp->tag = tag; > -+ return digp; > -+} > -+ > - int pgpPrtParams(const uint8_t * pkts, size_t pktlen, unsigned int pkttype, > - pgpDigParams * ret) > - { > -@@ -1058,8 +1065,7 @@ int pgpPrtParams(const uint8_t * pkts, size_t pktlen, > unsigned int pkttype, > - if (pkttype && pkt.tag != pkttype) { > - break; > - } else { > -- digp = xcalloc(1, sizeof(*digp)); > -- digp->tag = pkt.tag; > -+ digp = pgpDigParamsNew(pkt.tag); > - } > - } > - > -@@ -1105,8 +1111,7 @@ int pgpPrtParamsSubkeys(const uint8_t *pkts, size_t > pktlen, > - digps = xrealloc(digps, alloced * sizeof(*digps)); > - } > - > -- digps[count] = xcalloc(1, sizeof(**digps)); > -- digps[count]->tag = PGPTAG_PUBLIC_SUBKEY; > -+ digps[count] = pgpDigParamsNew(PGPTAG_PUBLIC_SUBKEY); > - /* Copy UID from main key to subkey */ > - digps[count]->userid = xstrdup(mainkey->userid); > - > --- > -2.17.1 > - > diff --git > a/meta/recipes-devtools/rpm/files/0001-Do-not-hardcode-lib-rpm-as-the-installation-path-for.patch > > b/meta/recipes-devtools/rpm/files/0001-Do-not-hardcode-lib-rpm-as-the-installation-path-for.patch > index 6d236ac400..c6cf9d4c88 100644 > --- > a/meta/recipes-devtools/rpm/files/0001-Do-not-hardcode-lib-rpm-as-the-installation-path-for.patch > +++ > b/meta/recipes-devtools/rpm/files/0001-Do-not-hardcode-lib-rpm-as-the-installation-path-for.patch > @@ -1,4 +1,4 @@ > -From 8d013fe154a162305f76141151baf767dd04b598 Mon Sep 17 00:00:00 2001 > +From 4ab6a4c5bbad65c3401016bb26b87214cdd0c59b Mon Sep 17 00:00:00 2001 > From: Alexander Kanavin <alex.kana...@gmail.com> > Date: Mon, 27 Feb 2017 09:43:30 +0200 > Subject: [PATCH] Do not hardcode "lib/rpm" as the installation path for > @@ -14,10 +14,10 @@ Signed-off-by: Alexander Kanavin <alex.kana...@gmail.com> > 3 files changed, 4 insertions(+), 4 deletions(-) > > diff --git a/configure.ac b/configure.ac > -index eb7d6941b..10a889b5d 100644 > +index 372875fc4..1b7add9ee 100644 > --- a/configure.ac > +++ b/configure.ac > -@@ -871,7 +871,7 @@ else > +@@ -884,7 +884,7 @@ else > usrprefix=$prefix > fi > > @@ -27,10 +27,10 @@ index eb7d6941b..10a889b5d 100644 > > AC_SUBST(OBJDUMP) > diff --git a/macros.in b/macros.in > -index a1f795e5f..689e784ef 100644 > +index d53ab5ed5..9d10441c8 100644 > --- a/macros.in > +++ b/macros.in > -@@ -933,7 +933,7 @@ package or when debugging this package.\ > +@@ -911,7 +911,7 @@ package or when debugging this package.\ > %_sharedstatedir %{_prefix}/com > %_localstatedir %{_prefix}/var > %_lib lib > @@ -40,7 +40,7 @@ index a1f795e5f..689e784ef 100644 > %_infodir %{_datadir}/info > %_mandir %{_datadir}/man > diff --git a/rpm.am b/rpm.am > -index 7b57f433b..9bbb9ee96 100644 > +index ebe4e40d1..e6920e258 100644 > --- a/rpm.am > +++ b/rpm.am > @@ -1,10 +1,10 @@ > @@ -55,4 +55,4 @@ index 7b57f433b..9bbb9ee96 100644 > +rpmconfigdir = $(libdir)/rpm > > # Libtool version (current-revision-age) for all our libraries > - rpm_version_info = 11:0:2 > + rpm_version_info = 12:0:3 > diff --git > a/meta/recipes-devtools/rpm/files/0001-configure.ac-add-linux-gnux32-variant-to-triplet-han.patch > > b/meta/recipes-devtools/rpm/files/0001-configure.ac-add-linux-gnux32-variant-to-triplet-han.patch > new file mode 100644 > index 0000000000..2174a79e75 > --- /dev/null > +++ > b/meta/recipes-devtools/rpm/files/0001-configure.ac-add-linux-gnux32-variant-to-triplet-han.patch > @@ -0,0 +1,31 @@ > +From 8f51462d41d8fe942d5d0a06f08d47f625141995 Mon Sep 17 00:00:00 2001 > +From: Alexander Kanavin <a...@linutronix.de> > +Date: Thu, 4 Aug 2022 12:15:08 +0200 > +Subject: [PATCH] configure.ac: add linux-gnux32 variant to triplet handling > + > +x32 is a 64 bit x86 ABI with 32 bit pointers. > + > +Upstream-Status: Submitted > [https://github.com/rpm-software-management/rpm/pull/2143] > +Signed-off-by: Alexander Kanavin <a...@linutronix.de> > +--- > + configure.ac | 4 ++++ > + 1 file changed, 4 insertions(+) > + > +diff --git a/configure.ac b/configure.ac > +index 372875fc49..7d6a3d274e 100644 > +--- a/configure.ac > ++++ b/configure.ac > +@@ -845,6 +845,10 @@ if echo "$host_os" | grep '.*-gnuabi64$' > /dev/null ; > then > + host_os=`echo "${host_os}" | sed 's/-gnuabi64$//'` > + host_os_gnu=-gnuabi64 > + fi > ++if echo "$host_os" | grep '.*-gnux32$' > /dev/null ; then > ++ host_os=`echo "${host_os}" | sed 's/-gnux32$//'` > ++ host_os_gnu=-gnux32 > ++fi > + if echo "$host_os" | grep '.*-gnu$' > /dev/null ; then > + host_os=`echo "${host_os}" | sed 's/-gnu$//'` > + fi > +-- > +2.30.2 > + > diff --git a/meta/recipes-devtools/rpm/files/0002-CVE-2021-3521.patch > b/meta/recipes-devtools/rpm/files/0002-CVE-2021-3521.patch > deleted file mode 100644 > index 683b57d455..0000000000 > --- a/meta/recipes-devtools/rpm/files/0002-CVE-2021-3521.patch > +++ /dev/null > @@ -1,64 +0,0 @@ > -From c4b1bee51bbdd732b94b431a951481af99117703 Mon Sep 17 00:00:00 2001 > -From: Panu Matilainen <pmati...@redhat.com> > -Date: Thu, 30 Sep 2021 09:51:10 +0300 > -Subject: [PATCH 2/3] Process MPI's from all kinds of signatures > - > -No immediate effect but needed by the following commits. > - > -CVE: CVE-2021-3521 > -Upstream-Status: Backport > [https://github.com/rpm-software-management/rpm/commit/b5e8bc74b] > - > -Signed-off-by: Changqing Li <changqing...@windriver.com> > - > ---- > - rpmio/rpmpgp.c | 13 +++++-------- > - 1 file changed, 5 insertions(+), 8 deletions(-) > - > -diff --git a/rpmio/rpmpgp.c b/rpmio/rpmpgp.c > -index 25f67048fd..509e777e6d 100644 > ---- a/rpmio/rpmpgp.c > -+++ b/rpmio/rpmpgp.c > -@@ -543,7 +543,7 @@ pgpDigAlg pgpDigAlgFree(pgpDigAlg alg) > - return NULL; > - } > - > --static int pgpPrtSigParams(pgpTag tag, uint8_t pubkey_algo, uint8_t sigtype, > -+static int pgpPrtSigParams(pgpTag tag, uint8_t pubkey_algo, > - const uint8_t *p, const uint8_t *h, size_t hlen, > - pgpDigParams sigp) > - { > -@@ -556,10 +556,8 @@ static int pgpPrtSigParams(pgpTag tag, uint8_t > pubkey_algo, uint8_t sigtype, > - int mpil = pgpMpiLen(p); > - if (pend - p < mpil) > - break; > -- if (sigtype == PGPSIGTYPE_BINARY || sigtype == PGPSIGTYPE_TEXT) { > -- if (sigalg->setmpi(sigalg, i, p)) > -- break; > -- } > -+ if (sigalg->setmpi(sigalg, i, p)) > -+ break; > - p += mpil; > - } > - > -@@ -619,7 +617,7 @@ static int pgpPrtSig(pgpTag tag, const uint8_t *h, > size_t hlen, > - } > - > - p = ((uint8_t *)v) + sizeof(*v); > -- rc = pgpPrtSigParams(tag, v->pubkey_algo, v->sigtype, p, h, hlen, > _digp); > -+ rc = pgpPrtSigParams(tag, v->pubkey_algo, p, h, hlen, _digp); > - } break; > - case 4: > - { pgpPktSigV4 v = (pgpPktSigV4)h; > -@@ -677,8 +675,7 @@ static int pgpPrtSig(pgpTag tag, const uint8_t *h, > size_t hlen, > - p += 2; > - if (p > hend) > - return 1; > -- > -- rc = pgpPrtSigParams(tag, v->pubkey_algo, v->sigtype, p, h, hlen, > _digp); > -+ rc = pgpPrtSigParams(tag, v->pubkey_algo, p, h, hlen, _digp); > - } break; > - default: > - rpmlog(RPMLOG_WARNING, _("Unsupported version of signature: V%d\n"), > version); > --- > -2.17.1 > - > diff --git a/meta/recipes-devtools/rpm/files/0003-CVE-2021-3521.patch > b/meta/recipes-devtools/rpm/files/0003-CVE-2021-3521.patch > deleted file mode 100644 > index a5ec802501..0000000000 > --- a/meta/recipes-devtools/rpm/files/0003-CVE-2021-3521.patch > +++ /dev/null > @@ -1,329 +0,0 @@ > -From 07676ca03ad8afcf1ca95a2353c83fbb1d970b9b Mon Sep 17 00:00:00 2001 > -From: Panu Matilainen <pmati...@redhat.com> > -Date: Thu, 30 Sep 2021 09:59:30 +0300 > -Subject: [PATCH 3/3] Validate and require subkey binding signatures on PGP > - public keys > - > -All subkeys must be followed by a binding signature by the primary key > -as per the OpenPGP RFC, enforce the presence and validity in the parser. > - > -The implementation is as kludgey as they come to work around our > -simple-minded parser structure without touching API, to maximise > -backportability. Store all the raw packets internally as we decode them > -to be able to access previous elements at will, needed to validate ordering > -and access the actual data. Add testcases for manipulated keys whose > -import previously would succeed. > - > -Depends on the two previous commits: > -7b399fcb8f52566e6f3b4327197a85facd08db91 and > -236b802a4aa48711823a191d1b7f753c82a89ec5 > - > -Fixes CVE-2021-3521. > - > -Upstream-Status: Backport > [https://github.com/rpm-software-management/rpm/commit/bd36c5dc9] > -CVE:CVE-2021-3521 > - > -Signed-off-by: Changqing Li <changqing...@windriver.com> > - > ---- > - rpmio/rpmpgp.c | 99 +++++++++++++++++-- > - tests/Makefile.am | 3 + > - tests/data/keys/CVE-2021-3521-badbind.asc | 25 +++++ > - .../data/keys/CVE-2021-3521-nosubsig-last.asc | 25 +++++ > - tests/data/keys/CVE-2021-3521-nosubsig.asc | 37 +++++++ > - tests/rpmsigdig.at | 28 ++++++ > - 6 files changed, 209 insertions(+), 8 deletions(-) > - create mode 100644 tests/data/keys/CVE-2021-3521-badbind.asc > - create mode 100644 tests/data/keys/CVE-2021-3521-nosubsig-last.asc > - create mode 100644 tests/data/keys/CVE-2021-3521-nosubsig.asc > - > -diff --git a/rpmio/rpmpgp.c b/rpmio/rpmpgp.c > -index 509e777e6d..371ad4d9b6 100644 > ---- a/rpmio/rpmpgp.c > -+++ b/rpmio/rpmpgp.c > -@@ -1061,33 +1061,116 @@ static pgpDigParams pgpDigParamsNew(uint8_t tag) > - return digp; > - } > - > -+static int hashKey(DIGEST_CTX hash, const struct pgpPkt *pkt, int exptag) > -+{ > -+ int rc = -1; > -+ if (pkt->tag == exptag) { > -+ uint8_t head[] = { > -+ 0x99, > -+ (pkt->blen >> 8), > -+ (pkt->blen ), > -+ }; > -+ > -+ rpmDigestUpdate(hash, head, 3); > -+ rpmDigestUpdate(hash, pkt->body, pkt->blen); > -+ rc = 0; > -+ } > -+ return rc; > -+} > -+ > -+static int pgpVerifySelf(pgpDigParams key, pgpDigParams selfsig, > -+ const struct pgpPkt *all, int i) > -+{ > -+ int rc = -1; > -+ DIGEST_CTX hash = NULL; > -+ > -+ switch (selfsig->sigtype) { > -+ case PGPSIGTYPE_SUBKEY_BINDING: > -+ hash = rpmDigestInit(selfsig->hash_algo, 0); > -+ if (hash) { > -+ rc = hashKey(hash, &all[0], PGPTAG_PUBLIC_KEY); > -+ if (!rc) > -+ rc = hashKey(hash, &all[i-1], PGPTAG_PUBLIC_SUBKEY); > -+ } > -+ break; > -+ default: > -+ /* ignore types we can't handle */ > -+ rc = 0; > -+ break; > -+ } > -+ > -+ if (hash && rc == 0) > -+ rc = pgpVerifySignature(key, selfsig, hash); > -+ > -+ rpmDigestFinal(hash, NULL, NULL, 0); > -+ > -+ return rc; > -+} > -+ > - int pgpPrtParams(const uint8_t * pkts, size_t pktlen, unsigned int pkttype, > - pgpDigParams * ret) > - { > - const uint8_t *p = pkts; > - const uint8_t *pend = pkts + pktlen; > - pgpDigParams digp = NULL; > -- struct pgpPkt pkt; > -+ pgpDigParams selfsig = NULL; > -+ int i = 0; > -+ int alloced = 16; /* plenty for normal cases */ > -+ struct pgpPkt *all = xmalloc(alloced * sizeof(*all)); > - int rc = -1; /* assume failure */ > -+ int expect = 0; > -+ int prevtag = 0; > - > - while (p < pend) { > -- if (decodePkt(p, (pend - p), &pkt)) > -+ struct pgpPkt *pkt = &all[i]; > -+ if (decodePkt(p, (pend - p), pkt)) > - break; > - > - if (digp == NULL) { > -- if (pkttype && pkt.tag != pkttype) { > -+ if (pkttype && pkt->tag != pkttype) { > - break; > - } else { > -- digp = pgpDigParamsNew(pkt.tag); > -+ digp = pgpDigParamsNew(pkt->tag); > - } > - } > - > -- if (pgpPrtPkt(&pkt, digp)) > -+ if (expect) { > -+ if (pkt->tag != expect) > -+ break; > -+ selfsig = pgpDigParamsNew(pkt->tag); > -+ } > -+ if (pgpPrtPkt(pkt, selfsig ? selfsig : digp)) > - break; > - > -- p += (pkt.body - pkt.head) + pkt.blen; > -- if (pkttype == PGPTAG_SIGNATURE) > -- break; > -+ if (selfsig) { > -+ /* subkeys must be followed by binding signature */ > -+ if (prevtag == PGPTAG_PUBLIC_SUBKEY) { > -+ if (selfsig->sigtype != PGPSIGTYPE_SUBKEY_BINDING) > -+ break; > -+ } > -+ > -+ int xx = pgpVerifySelf(digp, selfsig, all, i); > -+ > -+ selfsig = pgpDigParamsFree(selfsig); > -+ if (xx) > -+ break; > -+ expect = 0; > -+ } > -+ > -+ if (pkt->tag == PGPTAG_PUBLIC_SUBKEY) > -+ expect = PGPTAG_SIGNATURE; > -+ prevtag = pkt->tag; > -+ > -+ i++; > -+ p += (pkt->body - pkt->head) + pkt->blen; > -+ if (pkttype == PGPTAG_SIGNATURE) > -+ break; > -+ > -+ if (alloced <= i) { > -+ alloced *= 2; > -+ all = xrealloc(all, alloced * sizeof(*all)); > -+ } > -+ > - } > - > - rc = (digp && (p == pend)) ? 0 : -1; > -diff --git a/tests/Makefile.am b/tests/Makefile.am > -index a41ce10de8..7bb23247f1 100644 > ---- a/tests/Makefile.am > -+++ b/tests/Makefile.am > -@@ -107,6 +107,9 @@ EXTRA_DIST += data/SPECS/hello-config-buildid.spec > - EXTRA_DIST += data/SPECS/hello-cd.spec > - EXTRA_DIST += data/keys/rpm.org-rsa-2048-test.pub > - EXTRA_DIST += data/keys/rpm.org-rsa-2048-test.secret > -+EXTRA_DIST += data/keys/CVE-2021-3521-badbind.asc > -+EXTRA_DIST += data/keys/CVE-2022-3521-nosubsig.asc > -+EXTRA_DIST += data/keys/CVE-2022-3521-nosubsig-last.asc > - EXTRA_DIST += data/macros.testfile > - EXTRA_DIST += data/macros.debug > - EXTRA_DIST += data/SOURCES/foo.c > -diff --git a/tests/data/keys/CVE-2021-3521-badbind.asc > b/tests/data/keys/CVE-2021-3521-badbind.asc > -new file mode 100644 > -index 0000000000..aea00f9d7a > ---- /dev/null > -+++ b/tests/data/keys/CVE-2021-3521-badbind.asc > -@@ -0,0 +1,25 @@ > -+-----BEGIN PGP PUBLIC KEY BLOCK----- > -+Version: rpm-4.17.90 (NSS-3) > -+ > -+mQENBFjmORgBCAC7TMEk6wnjSs8Dr4yqSScWdU2pjcqrkTxuzdWvowcIUPZI0w/g > -+HkRqGd4apjvY2V15kjL10gk3QhFP3pZ/9p7zh8o8NHX7aGdSGDK7NOq1eFaErPRY > -+91LW9RiZ0lbOjXEzIL0KHxUiTQEmdXJT43DJMFPyW9fkCWg0OltiX618FUdWWfI8 > -+eySdLur1utnqBvdEbCUvWK2RX3vQZQdvEBODnNk2pxqTyV0w6VPQ96W++lF/5Aas > -+7rUv3HIyIXxIggc8FRrnH+y9XvvHDonhTIlGnYZN4ubm9i4y3gOkrZlGTrEw7elQ > -+1QeMyG2QQEbze8YjpTm4iLABCBrRfPRaQpwrABEBAAG0IXJwbS5vcmcgUlNBIHRl > -+c3RrZXkgPHJzYUBycG0ub3JnPokBNwQTAQgAIQUCWOY5GAIbAwULCQgHAgYVCAkK > -+CwIEFgIDAQIeAQIXgAAKCRBDRFkeGWTF/MxxCACnjqFL+MmPh9W9JQKT2DcLbBzf > -+Cqo6wcEBoCOcwgRSk8dSikhARoteoa55JRJhuMyeKhhEAogE9HRmCPFdjezFTwgB > -+BDVBpO2dZ023mLXDVCYX3S8pShOgCP6Tn4wqCnYeAdLcGg106N4xcmgtcssJE+Pr > -+XzTZksbZsrTVEmL/Ym+R5w5jBfFnGk7Yw7ndwfQsfNXQb5AZynClFxnX546lcyZX > -+fEx3/e6ezw57WNOUK6WT+8b+EGovPkbetK/rGxNXuWaP6X4A/QUm8O98nCuHYFQq > -++mvNdsCBqGf7mhaRGtpHk/JgCn5rFvArMDqLVrR9hX0LdCSsH7EGE+bR3r7wuQEN > -+BFjmORgBCACk+vDZrIXQuFXEYToZVwb2attzbbJJCqD71vmZTLsW0QxuPKRgbcYY > -+zp4K4lVBnHhFrF8MOUOxJ7kQWIJZMZFt+BDcptCYurbD2H4W2xvnWViiC+LzCMzz > -+iMJT6165uefL4JHTDPxC2fFiM9yrc72LmylJNkM/vepT128J5Qv0gRUaQbHiQuS6 > -+Dm/+WRnUfx3i89SV4mnBxb/Ta93GVqoOciWwzWSnwEnWYAvOb95JL4U7c5J5f/+c > -+KnQDHsW7sIiIdscsWzvgf6qs2Ra1Zrt7Fdk4+ZS2f/adagLhDO1C24sXf5XfMk5m > -+L0OGwZSr9m5s17VXxfspgU5ugc8kBJfzABEBAAE= > -+=WCfs > -+-----END PGP PUBLIC KEY BLOCK----- > -+ > -diff --git a/tests/data/keys/CVE-2021-3521-nosubsig-last.asc > b/tests/data/keys/CVE-2021-3521-nosubsig-last.asc > -new file mode 100644 > -index 0000000000..aea00f9d7a > ---- /dev/null > -+++ b/tests/data/keys/CVE-2021-3521-nosubsig-last.asc > -@@ -0,0 +1,25 @@ > -+-----BEGIN PGP PUBLIC KEY BLOCK----- > -+Version: rpm-4.17.90 (NSS-3) > -+ > -+mQENBFjmORgBCAC7TMEk6wnjSs8Dr4yqSScWdU2pjcqrkTxuzdWvowcIUPZI0w/g > -+HkRqGd4apjvY2V15kjL10gk3QhFP3pZ/9p7zh8o8NHX7aGdSGDK7NOq1eFaErPRY > -+91LW9RiZ0lbOjXEzIL0KHxUiTQEmdXJT43DJMFPyW9fkCWg0OltiX618FUdWWfI8 > -+eySdLur1utnqBvdEbCUvWK2RX3vQZQdvEBODnNk2pxqTyV0w6VPQ96W++lF/5Aas > -+7rUv3HIyIXxIggc8FRrnH+y9XvvHDonhTIlGnYZN4ubm9i4y3gOkrZlGTrEw7elQ > -+1QeMyG2QQEbze8YjpTm4iLABCBrRfPRaQpwrABEBAAG0IXJwbS5vcmcgUlNBIHRl > -+c3RrZXkgPHJzYUBycG0ub3JnPokBNwQTAQgAIQUCWOY5GAIbAwULCQgHAgYVCAkK > -+CwIEFgIDAQIeAQIXgAAKCRBDRFkeGWTF/MxxCACnjqFL+MmPh9W9JQKT2DcLbBzf > -+Cqo6wcEBoCOcwgRSk8dSikhARoteoa55JRJhuMyeKhhEAogE9HRmCPFdjezFTwgB > -+BDVBpO2dZ023mLXDVCYX3S8pShOgCP6Tn4wqCnYeAdLcGg106N4xcmgtcssJE+Pr > -+XzTZksbZsrTVEmL/Ym+R5w5jBfFnGk7Yw7ndwfQsfNXQb5AZynClFxnX546lcyZX > -+fEx3/e6ezw57WNOUK6WT+8b+EGovPkbetK/rGxNXuWaP6X4A/QUm8O98nCuHYFQq > -++mvNdsCBqGf7mhaRGtpHk/JgCn5rFvArMDqLVrR9hX0LdCSsH7EGE+bR3r7wuQEN > -+BFjmORgBCACk+vDZrIXQuFXEYToZVwb2attzbbJJCqD71vmZTLsW0QxuPKRgbcYY > -+zp4K4lVBnHhFrF8MOUOxJ7kQWIJZMZFt+BDcptCYurbD2H4W2xvnWViiC+LzCMzz > -+iMJT6165uefL4JHTDPxC2fFiM9yrc72LmylJNkM/vepT128J5Qv0gRUaQbHiQuS6 > -+Dm/+WRnUfx3i89SV4mnBxb/Ta93GVqoOciWwzWSnwEnWYAvOb95JL4U7c5J5f/+c > -+KnQDHsW7sIiIdscsWzvgf6qs2Ra1Zrt7Fdk4+ZS2f/adagLhDO1C24sXf5XfMk5m > -+L0OGwZSr9m5s17VXxfspgU5ugc8kBJfzABEBAAE= > -+=WCfs > -+-----END PGP PUBLIC KEY BLOCK----- > -+ > -diff --git a/tests/data/keys/CVE-2021-3521-nosubsig.asc > b/tests/data/keys/CVE-2021-3521-nosubsig.asc > -new file mode 100644 > -index 0000000000..3a2e7417f8 > ---- /dev/null > -+++ b/tests/data/keys/CVE-2021-3521-nosubsig.asc > -@@ -0,0 +1,37 @@ > -+-----BEGIN PGP PUBLIC KEY BLOCK----- > -+Version: rpm-4.17.90 (NSS-3) > -+ > -+mQENBFjmORgBCAC7TMEk6wnjSs8Dr4yqSScWdU2pjcqrkTxuzdWvowcIUPZI0w/g > -+HkRqGd4apjvY2V15kjL10gk3QhFP3pZ/9p7zh8o8NHX7aGdSGDK7NOq1eFaErPRY > -+91LW9RiZ0lbOjXEzIL0KHxUiTQEmdXJT43DJMFPyW9fkCWg0OltiX618FUdWWfI8 > -+eySdLur1utnqBvdEbCUvWK2RX3vQZQdvEBODnNk2pxqTyV0w6VPQ96W++lF/5Aas > -+7rUv3HIyIXxIggc8FRrnH+y9XvvHDonhTIlGnYZN4ubm9i4y3gOkrZlGTrEw7elQ > -+1QeMyG2QQEbze8YjpTm4iLABCBrRfPRaQpwrABEBAAG0IXJwbS5vcmcgUlNBIHRl > -+c3RrZXkgPHJzYUBycG0ub3JnPokBNwQTAQgAIQUCWOY5GAIbAwULCQgHAgYVCAkK > -+CwIEFgIDAQIeAQIXgAAKCRBDRFkeGWTF/MxxCACnjqFL+MmPh9W9JQKT2DcLbBzf > -+Cqo6wcEBoCOcwgRSk8dSikhARoteoa55JRJhuMyeKhhEAogE9HRmCPFdjezFTwgB > -+BDVBpO2dZ023mLXDVCYX3S8pShOgCP6Tn4wqCnYeAdLcGg106N4xcmgtcssJE+Pr > -+XzTZksbZsrTVEmL/Ym+R5w5jBfFnGk7Yw7ndwfQsfNXQb5AZynClFxnX546lcyZX > -+fEx3/e6ezw57WNOUK6WT+8b+EGovPkbetK/rGxNXuWaP6X4A/QUm8O98nCuHYFQq > -++mvNdsCBqGf7mhaRGtpHk/JgCn5rFvArMDqLVrR9hX0LdCSsH7EGE+bR3r7wuQEN > -+BFjmORgBCACk+vDZrIXQuFXEYToZVwb2attzbbJJCqD71vmZTLsW0QxuPKRgbcYY > -+zp4K4lVBnHhFrF8MOUOxJ7kQWIJZMZFt+BDcptCYurbD2H4W2xvnWViiC+LzCMzz > -+iMJT6165uefL4JHTDPxC2fFiM9yrc72LmylJNkM/vepT128J5Qv0gRUaQbHiQuS6 > -+Dm/+WRnUfx3i89SV4mnBxb/Ta93GVqoOciWwzWSnwEnWYAvOb95JL4U7c5J5f/+c > -+KnQDHsW7sIiIdscsWzvgf6qs2Ra1Zrt7Fdk4+ZS2f/adagLhDO1C24sXf5XfMk5m > -+L0OGwZSr9m5s17VXxfspgU5ugc8kBJfzABEBAAG5AQ0EWOY5GAEIAKT68NmshdC4 > -+VcRhOhlXBvZq23NtskkKoPvW+ZlMuxbRDG48pGBtxhjOngriVUGceEWsXww5Q7En > -+uRBYglkxkW34ENym0Ji6tsPYfhbbG+dZWKIL4vMIzPOIwlPrXrm558vgkdMM/ELZ > -+8WIz3KtzvYubKUk2Qz+96lPXbwnlC/SBFRpBseJC5LoOb/5ZGdR/HeLz1JXiacHF > -+v9Nr3cZWqg5yJbDNZKfASdZgC85v3kkvhTtzknl//5wqdAMexbuwiIh2xyxbO+B/ > -+qqzZFrVmu3sV2Tj5lLZ/9p1qAuEM7ULbixd/ld8yTmYvQ4bBlKv2bmzXtVfF+ymB > -+Tm6BzyQEl/MAEQEAAYkBHwQYAQgACQUCWOY5GAIbDAAKCRBDRFkeGWTF/PANB/9j > -+mifmj6z/EPe0PJFhrpISt9PjiUQCt0IPtiL5zKAkWjHePIzyi+0kCTBF6DDLFxos > -+3vN4bWnVKT1kBhZAQlPqpJTg+m74JUYeDGCdNx9SK7oRllATqyu+5rncgxjWVPnQ > -+zu/HRPlWJwcVFYEVXYL8xzfantwQTqefjmcRmBRdA2XJITK+hGWwAmrqAWx+q5xX > -+Pa8wkNMxVzNS2rUKO9SoVuJ/wlUvfoShkJ/VJ5HDp3qzUqncADfdGN35TDzscngQ > -+gHvnMwVBfYfSCABV1hNByoZcc/kxkrWMmsd/EnIyLd1Q1baKqc3cEDuC6E6/o4yJ > -+E4XX4jtDmdZPreZALsiB > -+=rRop > -+-----END PGP PUBLIC KEY BLOCK----- > -+ > -diff --git a/tests/rpmsigdig.at b/tests/rpmsigdig.at > -index 8e7c759b8f..e2d30a7f1b 100644 > ---- a/tests/rpmsigdig.at > -+++ b/tests/rpmsigdig.at > -@@ -2,6 +2,34 @@ > - > - AT_BANNER([RPM signatures and digests]) > - > -+AT_SETUP([rpmkeys --import invalid keys]) > -+AT_KEYWORDS([rpmkeys import]) > -+RPMDB_INIT > -+ > -+AT_CHECK([ > -+runroot rpmkeys --import /data/keys/CVE-2021-3521-badbind.asc > -+], > -+[1], > -+[], > -+[error: /data/keys/CVE-2021-3521-badbind.asc: key 1 import failed.] > -+) > -+AT_CHECK([ > -+runroot rpmkeys --import /data/keys/CVE-2021-3521-nosubsig.asc > -+], > -+[1], > -+[], > -+[error: /data/keys/CVE-2021-3521-nosubsig.asc: key 1 import failed.] > -+) > -+ > -+AT_CHECK([ > -+runroot rpmkeys --import /data/keys/CVE-2021-3521-nosubsig-last.asc > -+], > -+[1], > -+[], > -+[error: /data/keys/CVE-2021-3521-nosubsig-last.asc: key 1 import failed.] > -+) > -+AT_CLEANUP > -+ > - # ------------------------------ > - # Test pre-built package verification > - AT_SETUP([rpmkeys -Kv <unsigned> 1]) > --- > -2.17.1 > - > diff --git a/meta/recipes-devtools/rpm/rpm_4.17.0.bb > b/meta/recipes-devtools/rpm/rpm_4.17.1.bb > similarity index 97% > rename from meta/recipes-devtools/rpm/rpm_4.17.0.bb > rename to meta/recipes-devtools/rpm/rpm_4.17.1.bb > index c392ac0db4..9b6446f265 100644 > --- a/meta/recipes-devtools/rpm/rpm_4.17.0.bb > +++ b/meta/recipes-devtools/rpm/rpm_4.17.1.bb > @@ -39,13 +39,11 @@ SRC_URI = > "git://github.com/rpm-software-management/rpm;branch=rpm-4.17.x;protoc > file://0001-tools-Add-error.h-for-non-glibc-case.patch \ > file://0001-docs-do-not-build-manpages-requires-pandoc.patch \ > > file://0001-build-pack.c-do-not-insert-payloadflags-into-.rpm-me.patch \ > - file://0001-CVE-2021-3521.patch \ > - file://0002-CVE-2021-3521.patch \ > - file://0003-CVE-2021-3521.patch \ > + > file://0001-configure.ac-add-linux-gnux32-variant-to-triplet-han.patch \ > " > > PE = "1" > -SRCREV = "3e74e8ba2dd5e76a5353d238dc7fc38651ce27b3" > +SRCREV = "5bef402da334595ed9302b8bca1acdf5e88bfe11" > > S = "${WORKDIR}/git" > > -- > 2.30.2 > > > >
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#169024): https://lists.openembedded.org/g/openembedded-core/message/169024 Mute This Topic: https://lists.openembedded.org/mt/92886966/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-