I just tried poky master on ubuntu 20.04, and the issues do not
appear. Do you have a custom setup?

Alex

On Fri, 19 Jan 2024 at 04:06, ChenQi <qi.c...@windriver.com> wrote:
>
> I'm seeing build failures on Ubuntu 20.04.
> GCC version: 9.4.0
>
> 1. error: parameter name omitted
> The problem is that the active_sessions_count function's definition
> lacks parameter. I did change like below:
> -unsigned long active_sessions_count(const char *name, unsigned long unused)
> +unsigned long active_sessions_count(const char *name, unsigned long
> unused unused_parameter)
> But then I observed another error, as shown below.
>
> 2. undefined reference to `dlsym'.
> | /ala-lpggp72/qichen/Yocto/builds/build-master/tmp/hosttools/ld:
> ../lib/.libs/libshadow.a(libshadow_la-nss.o): in function `nss_exit':
> | nss.c:(.text+0x32): undefined reference to `dlclose'
> | /ala-lpggp72/qichen/Yocto/builds/build-master/tmp/hosttools/ld:
> ../lib/.libs/libshadow.a(libshadow_la-nss.o): in function `nss_init':
> | nss.c:(.text+0x1dd): undefined reference to `dlopen'
> | /ala-lpggp72/qichen/Yocto/builds/build-master/tmp/hosttools/ld:
> nss.c:(.text+0x21c): undefined reference to `dlsym'
> | /ala-lpggp72/qichen/Yocto/builds/build-master/tmp/hosttools/ld:
> nss.c:(.text+0x237): undefined reference to `dlsym'
> | /ala-lpggp72/qichen/Yocto/builds/build-master/tmp/hosttools/ld:
> nss.c:(.text+0x253): undefined reference to `dlsym'
> | /ala-lpggp72/qichen/Yocto/builds/build-master/tmp/hosttools/ld:
> nss.c:(.text+0x365): undefined reference to `dlclose'
> | /ala-lpggp72/qichen/Yocto/builds/build-master/tmp/hosttools/ld:
> nss.c:(.text+0x3b2): undefined reference to `dlerror'
> | collect2: error: ld returned 1 exit status
> | make[2]: *** [Makefile:1130: su] Error 1
>
> On Ubuntu22.04, there's no such issue.
>
> Regards,
> Qi
>
> On 1/11/24 21:15, Alexander Kanavin wrote:
> > License-Update: formatting, spdx conversion
> >
> > Drop:
> > 0001-Disable-use-of-syslog-for-sysroot.patch
> > (issue fixed upstream)
> >
> > 0001-Fix-can-not-print-full-login.patch
> > 0001-Overhaul-valid_field.patch
> > CVE-2023-29383.patch
> > (backports)
> >
> > libbsd is a new native dependency, as otherwise glibc >= 2.38
> > is needed.
> >
> > A similar fix is added to musl in order to define non-standard 
> > __BEGIN_DECLS/__END_DECLS.
> >
> > Signed-off-by: Alexander Kanavin <a...@linutronix.de>
> > ---
> >   ...01-Disable-use-of-syslog-for-sysroot.patch |  52 -------
> >   .../0001-Fix-can-not-print-full-login.patch   |  41 -----
> >   .../files/0001-Overhaul-valid_field.patch     |  65 --------
> >   .../shadow/files/CVE-2023-29383.patch         |  53 -------
> >   .../shadow/files/CVE-2023-4641.patch          | 147 ------------------
> >   ...nexpected-open-failure-in-chroot-env.patch |  16 +-
> >   meta/recipes-extended/shadow/shadow.inc       |  20 +--
> >   .../{shadow_4.13.bb => shadow_4.14.2.bb}      |   0
> >   8 files changed, 16 insertions(+), 378 deletions(-)
> >   delete mode 100644 
> > meta/recipes-extended/shadow/files/0001-Disable-use-of-syslog-for-sysroot.patch
> >   delete mode 100644 
> > meta/recipes-extended/shadow/files/0001-Fix-can-not-print-full-login.patch
> >   delete mode 100644 
> > meta/recipes-extended/shadow/files/0001-Overhaul-valid_field.patch
> >   delete mode 100644 meta/recipes-extended/shadow/files/CVE-2023-29383.patch
> >   delete mode 100644 meta/recipes-extended/shadow/files/CVE-2023-4641.patch
> >   rename meta/recipes-extended/shadow/{shadow_4.13.bb => shadow_4.14.2.bb} 
> > (100%)
> >
> > diff --git 
> > a/meta/recipes-extended/shadow/files/0001-Disable-use-of-syslog-for-sysroot.patch
> >  
> > b/meta/recipes-extended/shadow/files/0001-Disable-use-of-syslog-for-sysroot.patch
> > deleted file mode 100644
> > index fa1532c8317..00000000000
> > --- 
> > a/meta/recipes-extended/shadow/files/0001-Disable-use-of-syslog-for-sysroot.patch
> > +++ /dev/null
> > @@ -1,52 +0,0 @@
> > -From 85d0444229ee3d14fefcf10d093f49c862826f82 Mon Sep 17 00:00:00 2001
> > -From: Richard Purdie <richard.pur...@linuxfoundation.org>
> > -Date: Thu, 14 Apr 2022 23:11:53 +0000
> > -Subject: [PATCH] Disable use of syslog for shadow-native tools
> > -
> > -Disable use of syslog to prevent sysroot user and group additions from
> > -writing entries to the host's syslog. This patch should only be used
> > -with the shadow-native recipe.
> > -
> > -Upstream-Status: Inappropriate [OE specific configuration]
> > -Signed-off-by: Richard Purdie <richard.pur...@linuxfoundation.org>
> > -Signed-off-by: Peter Kjellerstedt <peter.kjellerst...@axis.com>
> > -
> > ----
> > - configure.ac      | 2 +-
> > - src/login_nopam.c | 3 ++-
> > - 2 files changed, 3 insertions(+), 2 deletions(-)
> > -
> > -diff --git a/configure.ac b/configure.ac
> > -index 924254a..603af81 100644
> > ---- a/configure.ac
> > -+++ b/configure.ac
> > -@@ -191,7 +191,7 @@ AC_DEFINE_UNQUOTED(PASSWD_PROGRAM, 
> > "$shadow_cv_passwd_dir/passwd",
> > -     [Path to passwd program.])
> > -
> > - dnl XXX - quick hack, should disappear before anyone notices :).
> > --AC_DEFINE(USE_SYSLOG, 1, [Define to use syslog().])
> > -+#AC_DEFINE(USE_SYSLOG, 1, [Define to use syslog().])
> > - if test "$ac_cv_func_ruserok" = "yes"; then
> > -     AC_DEFINE(RLOGIN, 1, [Define if login should support the -r flag for 
> > rlogind.])
> > -     AC_DEFINE(RUSEROK, 0, [Define to the ruserok() "success" return value 
> > (0 or 1).])
> > -diff --git a/src/login_nopam.c b/src/login_nopam.c
> > -index df6ba88..fc24e13 100644
> > ---- a/src/login_nopam.c
> > -+++ b/src/login_nopam.c
> > -@@ -29,7 +29,6 @@
> > - #ifndef USE_PAM
> > - #ident "$Id$"
> > -
> > --#include "prototypes.h"
> > -     /*
> > -      * This module implements a simple but effective form of login access
> > -      * control based on login names and on host (or domain) names, 
> > internet
> > -@@ -57,6 +56,8 @@
> > - #include <netinet/in.h>
> > - #include <arpa/inet.h>              /* for inet_ntoa() */
> > -
> > -+#include "prototypes.h"
> > -+
> > - #if !defined(MAXHOSTNAMELEN) || (MAXHOSTNAMELEN < 64)
> > - #undef MAXHOSTNAMELEN
> > - #define MAXHOSTNAMELEN 256
> > diff --git 
> > a/meta/recipes-extended/shadow/files/0001-Fix-can-not-print-full-login.patch
> >  
> > b/meta/recipes-extended/shadow/files/0001-Fix-can-not-print-full-login.patch
> > deleted file mode 100644
> > index 89f9c05c8d3..00000000000
> > --- 
> > a/meta/recipes-extended/shadow/files/0001-Fix-can-not-print-full-login.patch
> > +++ /dev/null
> > @@ -1,41 +0,0 @@
> > -commit 670cae834827a8f794e6f7464fa57790d911b63c
> > -Author: SoumyaWind <121475834+soumyaw...@users.noreply.github.com>
> > -Date:   Tue Dec 27 17:40:17 2022 +0530
> > -
> > -    shadow: Fix can not print full login timeout message
> > -
> > -    Login timed out message prints only first few bytes when write is 
> > immediately followed by exit.
> > -    Calling exit from new handler provides enough time to display full 
> > message.
> > -
> > -Upstream-Status: Backport 
> > [https://github.com/shadow-maint/shadow/commit/670cae834827a8f794e6f7464fa57790d911b63c]
> > -
> > -diff --git a/src/login.c b/src/login.c
> > -index 116e2cb3..c55f4de0 100644
> > ---- a/src/login.c
> > -+++ b/src/login.c
> > -@@ -120,6 +120,7 @@ static void get_pam_user (char **ptr_pam_user);
> > -
> > - static void init_env (void);
> > - static void alarm_handler (int);
> > -+static void exit_handler (int);
> > -
> > - /*
> > -  * usage - print login command usage and exit
> > -@@ -391,11 +392,16 @@ static void init_env (void)
> > - #endif                              /* !USE_PAM */
> > - }
> > -
> > -+static void exit_handler (unused int sig)
> > -+{
> > -+    _exit (0);
> > -+}
> > -
> > - static void alarm_handler (unused int sig)
> > - {
> > -     write (STDERR_FILENO, tmsg, strlen (tmsg));
> > --    _exit (0);
> > -+    signal(SIGALRM, exit_handler);
> > -+    alarm(2);
> > - }
> > -
> > - #ifdef USE_PAM
> > diff --git 
> > a/meta/recipes-extended/shadow/files/0001-Overhaul-valid_field.patch 
> > b/meta/recipes-extended/shadow/files/0001-Overhaul-valid_field.patch
> > deleted file mode 100644
> > index ac08be515bf..00000000000
> > --- a/meta/recipes-extended/shadow/files/0001-Overhaul-valid_field.patch
> > +++ /dev/null
> > @@ -1,65 +0,0 @@
> > -From 2eaea70111f65b16d55998386e4ceb4273c19eb4 Mon Sep 17 00:00:00 2001
> > -From: =?UTF-8?q?Christian=20G=C3=B6ttsche?= <cgzo...@googlemail.com>
> > -Date: Fri, 31 Mar 2023 14:46:50 +0200
> > -Subject: [PATCH] Overhaul valid_field()
> > -
> > -e5905c4b ("Added control character check") introduced checking for
> > -control characters but had the logic inverted, so it rejects all
> > -characters that are not control ones.
> > -
> > -Cast the character to `unsigned char` before passing to the character
> > -checking functions to avoid UB.
> > -
> > -Use strpbrk(3) for the illegal character test and return early.
> > -
> > -Upstream-Status: Backport 
> > [https://github.com/shadow-maint/shadow/commit/2eaea70111f65b16d55998386e4ceb4273c19eb4]
> > -
> > -Signed-off-by: Xiangyu Chen <xiangyu.c...@windriver.com>
> > ----
> > - lib/fields.c | 24 ++++++++++--------------
> > - 1 file changed, 10 insertions(+), 14 deletions(-)
> > -
> > -diff --git a/lib/fields.c b/lib/fields.c
> > -index fb51b582..53929248 100644
> > ---- a/lib/fields.c
> > -+++ b/lib/fields.c
> > -@@ -37,26 +37,22 @@ int valid_field (const char *field, const char 
> > *illegal)
> > -
> > -     /* For each character of field, search if it appears in the list
> > -      * of illegal characters. */
> > -+    if (illegal && NULL != strpbrk (field, illegal)) {
> > -+            return -1;
> > -+    }
> > -+
> > -+    /* Search if there are non-printable or control characters */
> > -     for (cp = field; '\0' != *cp; cp++) {
> > --            if (strchr (illegal, *cp) != NULL) {
> > -+            unsigned char c = *cp;
> > -+            if (!isprint (c)) {
> > -+                    err = 1;
> > -+            }
> > -+            if (iscntrl (c)) {
> > -                     err = -1;
> > -                     break;
> > -             }
> > -     }
> > -
> > --    if (0 == err) {
> > --            /* Search if there are non-printable or control characters */
> > --            for (cp = field; '\0' != *cp; cp++) {
> > --                    if (!isprint (*cp)) {
> > --                            err = 1;
> > --                    }
> > --                    if (!iscntrl (*cp)) {
> > --                            err = -1;
> > --                            break;
> > --                    }
> > --            }
> > --    }
> > --
> > -     return err;
> > - }
> > -
> > ---
> > -2.34.1
> > -
> > diff --git a/meta/recipes-extended/shadow/files/CVE-2023-29383.patch 
> > b/meta/recipes-extended/shadow/files/CVE-2023-29383.patch
> > deleted file mode 100644
> > index f53341d3fc2..00000000000
> > --- a/meta/recipes-extended/shadow/files/CVE-2023-29383.patch
> > +++ /dev/null
> > @@ -1,53 +0,0 @@
> > -From e5905c4b84d4fb90aefcd96ee618411ebfac663d Mon Sep 17 00:00:00 2001
> > -From: tomspiderlabs <128755403+tomspiderl...@users.noreply.github.com>
> > -Date: Thu, 23 Mar 2023 23:39:38 +0000
> > -Subject: [PATCH] Added control character check
> > -
> > -Added control character check, returning -1 (to "err") if control 
> > characters are present.
> > -
> > -CVE: CVE-2023-29383
> > -Upstream-Status: Backport
> > -
> > -Reference to upstream:
> > -https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d
> > -
> > -Signed-off-by: Xiangyu Chen <xiangyu.c...@windriver.com>
> > ----
> > - lib/fields.c | 11 +++++++----
> > - 1 file changed, 7 insertions(+), 4 deletions(-)
> > -
> > -diff --git a/lib/fields.c b/lib/fields.c
> > -index 640be931..fb51b582 100644
> > ---- a/lib/fields.c
> > -+++ b/lib/fields.c
> > -@@ -21,9 +21,9 @@
> > -  *
> > -  * The supplied field is scanned for non-printable and other illegal
> > -  * characters.
> > -- *  + -1 is returned if an illegal character is present.
> > -- *  +  1 is returned if no illegal characters are present, but the field
> > -- *       contains a non-printable character.
> > -+ *  + -1 is returned if an illegal or control character is present.
> > -+ *  +  1 is returned if no illegal or control characters are present,
> > -+ *       but the field contains a non-printable character.
> > -  *  +  0 is returned otherwise.
> > -  */
> > - int valid_field (const char *field, const char *illegal)
> > -@@ -45,10 +45,13 @@ int valid_field (const char *field, const char 
> > *illegal)
> > -     }
> > -
> > -     if (0 == err) {
> > --            /* Search if there are some non-printable characters */
> > -+            /* Search if there are non-printable or control characters */
> > -             for (cp = field; '\0' != *cp; cp++) {
> > -                     if (!isprint (*cp)) {
> > -                             err = 1;
> > -+                    }
> > -+                    if (!iscntrl (*cp)) {
> > -+                            err = -1;
> > -                             break;
> > -                     }
> > -             }
> > ---
> > -2.34.1
> > -
> > diff --git a/meta/recipes-extended/shadow/files/CVE-2023-4641.patch 
> > b/meta/recipes-extended/shadow/files/CVE-2023-4641.patch
> > deleted file mode 100644
> > index 1fabfe928e4..00000000000
> > --- a/meta/recipes-extended/shadow/files/CVE-2023-4641.patch
> > +++ /dev/null
> > @@ -1,147 +0,0 @@
> > -From 25dbe2ce166a13322b7536ff2f738786ea2e61e7 Mon Sep 17 00:00:00 2001
> > -From: Alejandro Colomar <a...@kernel.org>
> > -Date: Sat, 10 Jun 2023 16:20:05 +0200
> > -Subject: [PATCH] gpasswd(1): Fix password leak
> > -
> > -How to trigger this password leak?
> > -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> > -
> > -When gpasswd(1) asks for the new password, it asks twice (as is usual
> > -for confirming the new password).  Each of those 2 password prompts
> > -uses agetpass() to get the password.  If the second agetpass() fails,
> > -the first password, which has been copied into the 'static' buffer
> > -'pass' via STRFCPY(), wasn't being zeroed.
> > -
> > -agetpass() is defined in <./libmisc/agetpass.c> (around line 91), and
> > -can fail for any of the following reasons:
> > -
> > --  malloc(3) or readpassphrase(3) failure.
> > -
> > -   These are going to be difficult to trigger.  Maybe getting the system
> > -   to the limits of memory utilization at that exact point, so that the
> > -   next malloc(3) gets ENOMEM, and possibly even the OOM is triggered.
> > -   About readpassphrase(3), ENFILE and EINTR seem the only plausible
> > -   ones, and EINTR probably requires privilege or being the same user;
> > -   but I wouldn't discard ENFILE so easily, if a process starts opening
> > -   files.
> > -
> > --  The password is longer than PASS_MAX.
> > -
> > -   The is plausible with physical access.  However, at that point, a
> > -   keylogger will be a much simpler attack.
> > -
> > -And, the attacker must be able to know when the second password is being
> > -introduced, which is not going to be easy.
> > -
> > -How to read the password after the leak?
> > -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> > -
> > -Provoking the leak yourself at the right point by entering a very long
> > -password is easy, and inspecting the process stack at that point should
> > -be doable.  Try to find some consistent patterns.
> > -
> > -Then, search for those patterns in free memory, right after the victim
> > -leaks their password.
> > -
> > -Once you get the leak, a program should read all the free memory
> > -searching for patterns that gpasswd(1) leaves nearby the leaked
> > -password.
> > -
> > -On 6/10/23 03:14, Seth Arnold wrote:
> > -> An attacker process wouldn't be able to use malloc(3) for this task.
> > -> There's a handful of tools available for userspace to allocate memory:
> > ->
> > -> -  brk / sbrk
> > -> -  mmap MAP_ANONYMOUS
> > -> -  mmap /dev/zero
> > -> -  mmap some other file
> > -> -  shm_open
> > -> -  shmget
> > ->
> > -> Most of these return only pages of zeros to a process.  Using mmap of an
> > -> existing file, you can get some of the contents of the file demand-loaded
> > -> into the memory space on the first use.
> > ->
> > -> The MAP_UNINITIALIZED flag only works if the kernel was compiled with
> > -> CONFIG_MMAP_ALLOW_UNINITIALIZED.  This is rare.
> > ->
> > -> malloc(3) doesn't zero memory, to our collective frustration, but all the
> > -> garbage in the allocations is from previous allocations in the current
> > -> process.  It isn't leftover from other processes.
> > ->
> > -> The avenues available for reading the memory:
> > -> -  /dev/mem and /dev/kmem (requires root, not available with Secure Boot)
> > -> -  /proc/pid/mem (requires ptrace privileges, mediated by YAMA)
> > -> -  ptrace (requires ptrace privileges, mediated by YAMA)
> > -> -  causing memory to be swapped to disk, and then inspecting the swap
> > ->
> > -> These all require a certain amount of privileges.
> > -
> > -How to fix it?
> > -~~~~~~~~~~~~~~
> > -
> > -memzero(), which internally calls explicit_bzero(3), or whatever
> > -alternative the system provides with a slightly different name, will
> > -make sure that the buffer is zeroed in memory, and optimizations are not
> > -allowed to impede this zeroing.
> > -
> > -This is not really 100% effective, since compilers may place copies of
> > -the string somewhere hidden in the stack.  Those copies won't get zeroed
> > -by explicit_bzero(3).  However, that's arguably a compiler bug, since
> > -compilers should make everything possible to avoid optimizing strings
> > -that are later passed to explicit_bzero(3).  But we all know that
> > -sometimes it's impossible to have perfect knowledge in the compiler, so
> > -this is plausible.  Nevertheless, there's nothing we can do against such
> > -issues, except minimizing the time such passwords are stored in plain
> > -text.
> > -
> > -Security concerns
> > -~~~~~~~~~~~~~~~~~
> > -
> > -We believe this isn't easy to exploit.  Nevertheless, and since the fix
> > -is trivial, this fix should probably be applied soon, and backported to
> > -all supported distributions, to prevent someone else having more
> > -imagination than us to find a way.
> > -
> > -Affected versions
> > -~~~~~~~~~~~~~~~~~
> > -
> > -All.  Bug introduced in shadow 19990709.  That's the second commit in
> > -the git history.
> > -
> > -Fixes: 45c6603cc86c ("[svn-upgrade] Integrating new upstream version, 
> > shadow (19990709)")
> > -
> > -CVE: CVE-2023-4641
> > -Upstream-Status: Backport 
> > [https://github.com/shadow-maint/shadow/commit/65c88a43a23c2391dcc90c0abda3e839e9c57904]
> > -
> > -Reported-by: Alejandro Colomar <a...@kernel.org>
> > -Cc: Serge Hallyn <se...@hallyn.com>
> > -Cc: Iker Pedrosa <ipedr...@redhat.com>
> > -Cc: Seth Arnold <seth.arn...@canonical.com>
> > -Cc: Christian Brauner <christ...@brauner.io>
> > -Cc: Balint Reczey <rbal...@debian.org>
> > -Cc: Sam James <s...@gentoo.org>
> > -Cc: David Runge <dv...@archlinux.org>
> > -Cc: Andreas Jaeger <a...@suse.de>
> > -Cc: <~hallyn/sha...@lists.sr.ht>
> > -Signed-off-by: Alejandro Colomar <a...@kernel.org>
> > -Signed-off-by: Xiangyu Chen <xiangyu.c...@windriver.com>
> > ----
> > - src/gpasswd.c | 1 +
> > - 1 file changed, 1 insertion(+)
> > -
> > -diff --git a/src/gpasswd.c b/src/gpasswd.c
> > -index 5983f787..2d8869ef 100644
> > ---- a/src/gpasswd.c
> > -+++ b/src/gpasswd.c
> > -@@ -896,6 +896,7 @@ static void change_passwd (struct group *gr)
> > -             strzero (cp);
> > -             cp = getpass (_("Re-enter new password: "));
> > -             if (NULL == cp) {
> > -+                    memzero (pass, sizeof pass);
> > -                     exit (1);
> > -             }
> > -
> > ---
> > -2.34.1
> > -
> > diff --git 
> > a/meta/recipes-extended/shadow/files/commonio.c-fix-unexpected-open-failure-in-chroot-env.patch
> >  
> > b/meta/recipes-extended/shadow/files/commonio.c-fix-unexpected-open-failure-in-chroot-env.patch
> > index 85d91751056..4a932d2dbb1 100644
> > --- 
> > a/meta/recipes-extended/shadow/files/commonio.c-fix-unexpected-open-failure-in-chroot-env.patch
> > +++ 
> > b/meta/recipes-extended/shadow/files/commonio.c-fix-unexpected-open-failure-in-chroot-env.patch
> > @@ -1,4 +1,4 @@
> > -From 21583da072aa66901d859ac00ce209bac87ddecc Mon Sep 17 00:00:00 2001
> > +From a773c6b240d27e23d6be41decef0edf24fcee523 Mon Sep 17 00:00:00 2001
> >   From: Chen Qi <qi.c...@windriver.com>
> >   Date: Thu, 17 Jul 2014 15:53:34 +0800
> >   Subject: [PATCH] commonio.c-fix-unexpected-open-failure-in-chroot-env
> > @@ -15,35 +15,37 @@ Note that this patch doesn't change the logic in the 
> > code, it just expands
> >   the codes.
> >
> >   Signed-off-by: Chen Qi <qi.c...@windriver.com>
> > -
> >   ---
> >    lib/commonio.c | 16 ++++++++++++----
> >    1 file changed, 12 insertions(+), 4 deletions(-)
> >
> >   diff --git a/lib/commonio.c b/lib/commonio.c
> > -index 9a02ce1..61384ec 100644
> > +index 73fdb3a..d1231e9 100644
> >   --- a/lib/commonio.c
> >   +++ b/lib/commonio.c
> > -@@ -616,10 +616,18 @@ int commonio_open (struct commonio_db *db, int mode)
> > +@@ -606,10 +606,18 @@ int commonio_open (struct commonio_db *db, int mode)
> >       db->cursor = NULL;
> >       db->changed = false;
> >
> >   -   fd = open (db->filename,
> >   -                (db->readonly ? O_RDONLY : O_RDWR)
> > --               | O_NOCTTY | O_NONBLOCK | O_NOFOLLOW);
> > +-               | O_NOCTTY | O_NONBLOCK | O_NOFOLLOW | O_CLOEXEC);
> >   -   saved_errno = errno;
> >   +   if (db->readonly) {
> >   +           fd = open (db->filename,
> >   +                      (true ? O_RDONLY : O_RDWR)
> > -+                       | O_NOCTTY | O_NONBLOCK | O_NOFOLLOW);
> > ++                       | O_NOCTTY | O_NONBLOCK | O_NOFOLLOW | O_CLOEXEC);
> >   +           saved_errno = errno;
> >   +   } else {
> >   +           fd = open (db->filename,
> >   +                      (false ? O_RDONLY : O_RDWR)
> > -+                       | O_NOCTTY | O_NONBLOCK | O_NOFOLLOW);
> > ++                       | O_NOCTTY | O_NONBLOCK | O_NOFOLLOW| O_CLOEXEC);
> >   +           saved_errno = errno;
> >   +   }
> >   +
> >       db->fp = NULL;
> >       if (fd >= 0) {
> >    #ifdef WITH_TCB
> > +--
> > +2.30.2
> > +
> > diff --git a/meta/recipes-extended/shadow/shadow.inc 
> > b/meta/recipes-extended/shadow/shadow.inc
> > index ce3ce627156..c024746d4ff 100644
> > --- a/meta/recipes-extended/shadow/shadow.inc
> > +++ b/meta/recipes-extended/shadow/shadow.inc
> > @@ -5,7 +5,7 @@ BUGTRACKER = "http://github.com/shadow-maint/shadow/issues";
> >   SECTION = "base/utils"
> >   LICENSE = "BSD-3-Clause"
> >   LIC_FILES_CHKSUM = "file://COPYING;md5=c9a450b7be84eac23e6353efecb60b5b \
> > -                    
> > file://src/passwd.c;beginline=2;endline=30;md5=758c26751513b6795395275969dd3be1
> >  \
> > +                    
> > file://src/passwd.c;beginline=2;endline=7;md5=67bcf314687820b2f010d4863fce3fc5
> >  \
> >                       "
> >
> >   DEPENDS = "virtual/crypt"
> > @@ -14,10 +14,6 @@ GITHUB_BASE_URI = 
> > "https://github.com/shadow-maint/shadow/releases";
> >   SRC_URI = "${GITHUB_BASE_URI}/download/${PV}/${BP}.tar.gz \
> >              ${@bb.utils.contains('PACKAGECONFIG', 'pam', '${PAM_SRC_URI}', 
> > '', d)} \
> >              file://useradd \
> > -        file://0001-Fix-can-not-print-full-login.patch \
> > -           file://CVE-2023-29383.patch \
> > -           file://0001-Overhaul-valid_field.patch \
> > -           file://CVE-2023-4641.patch \
> >              "
> >
> >   SRC_URI:append:class-target = " \
> > @@ -26,14 +22,9 @@ SRC_URI:append:class-target = " \
> >              "
> >
> >   SRC_URI:append:class-native = " \
> > -           file://0001-Disable-use-of-syslog-for-sysroot.patch \
> >              
> > file://commonio.c-fix-unexpected-open-failure-in-chroot-env.patch \
> >              "
> > -SRC_URI:append:class-nativesdk = " \
> > -           file://0001-Disable-use-of-syslog-for-sysroot.patch \
> > -           "
> > -SRC_URI[sha256sum] = 
> > "813057047499c7fe81108adcf0cffa3ad4ec75e19a80151f9cbaa458ff2e86cd"
> > -
> > +SRC_URI[sha256sum] = 
> > "a305edf5d19bddbdf5e836d2d609fa8bff2d35458819de4d9f06306a1cf24342"
> >
> >   # Additional Policy files for PAM
> >   PAM_SRC_URI = "file://pam.d/chfn \
> > @@ -44,7 +35,7 @@ PAM_SRC_URI = "file://pam.d/chfn \
> >                  file://pam.d/passwd \
> >                  file://pam.d/su"
> >
> > -inherit autotools gettext github-releases
> > +inherit autotools gettext github-releases pkgconfig
> >
> >   export CONFIG_SHELL="/bin/sh"
> >
> > @@ -54,6 +45,8 @@ EXTRA_OECONF += "--without-libcrack \
> >                    --without-sssd \
> >                    ${NSCDOPT}"
> >
> > +CFLAGS:append:libc-musl = " -DLIBBSD_OVERLAY"
> > +
> >   NSCDOPT = ""
> >   NSCDOPT:class-native = "--without-nscd"
> >   NSCDOPT:class-nativesdk = "--without-nscd"
> > @@ -73,13 +66,14 @@ PAM_PLUGINS = "libpam-runtime \
> >
> >   PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)} \
> >                      ${@bb.utils.contains('DISTRO_FEATURES', 'xattr', 
> > 'attr', '', d)}"
> > -PACKAGECONFIG:class-native ??= "${@bb.utils.contains('DISTRO_FEATURES', 
> > 'xattr', 'attr', '', d)}"
> > +PACKAGECONFIG:class-native ??= "${@bb.utils.contains('DISTRO_FEATURES', 
> > 'xattr', 'attr', '', d)} libbsd"
> >   PACKAGECONFIG:class-nativesdk = ""
> >   PACKAGECONFIG[pam] = 
> > "--with-libpam,--without-libpam,libpam,${PAM_PLUGINS}"
> >   PACKAGECONFIG[attr] = "--with-attr,--without-attr,attr"
> >   PACKAGECONFIG[acl] = "--with-acl,--without-acl,acl"
> >   PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit"
> >   PACKAGECONFIG[selinux] = "--with-selinux,--without-selinux,libselinux 
> > libsemanage"
> > +PACKAGECONFIG[libbsd] = "--with-libbsd,--without-libbsd,libbsd"
> >
> >   RDEPENDS:${PN} = "shadow-securetty \
> >                     base-passwd \
> > diff --git a/meta/recipes-extended/shadow/shadow_4.13.bb 
> > b/meta/recipes-extended/shadow/shadow_4.14.2.bb
> > similarity index 100%
> > rename from meta/recipes-extended/shadow/shadow_4.13.bb
> > rename to meta/recipes-extended/shadow/shadow_4.14.2.bb
> >
> > 
> >
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#194025): 
https://lists.openembedded.org/g/openembedded-core/message/194025
Mute This Topic: https://lists.openembedded.org/mt/103661547/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to