diff options
author | Wang Mingyu <wangmy@fujitsu.com> | 2023-08-01 15:41:14 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2023-08-14 12:51:21 +0100 |
commit | c707605642f1ed7d9365111b8da4ec6596d4113b (patch) | |
tree | 2465e610b4900a33792400514155a8075bd7844f | |
parent | c0202392844adb4411b881ed6c697e9bcf444077 (diff) | |
download | poky-c707605642f1ed7d9365111b8da4ec6596d4113b.tar.gz |
gmp: upgrade 6.2.1 -> 6.3.0
cve-2021-43618.patch
removed since it's included in 6.3.0
Changelog:
============
BUGS FIXED
* A possible overflow of type int is avoided for mpz_cmp on huge operands.
* A possible error condition when a malformed file is read with
mpz_inp_raw is now correctly handled.
FEATURES
* New public function mpz_prevprime, companion of the existing
mpz_nextprime.
* New documented pointer types mpz_ptr, mpz_srcptr, and similar for
other GMP types. Refer to the manual for full list and suggested
usage. These types have been present in gmp.h at least since
GMP-4.0, but previously not advertised to users.
* Support for 64-bit Arm under Macos.
* Support for the loongarch64 CPU family.
* Support for building with LTO, link-time optimisations.
SPEEDUPS
* New special code for base = 2 in mpz_powm reduces the average time
for the functions that test primality.
* Speedup for the function mpz_nextprime on large operands.
* Speedup for multiplications (some sizes only) thanks to new
internal functions to compute small negacyclic products.
* Special assembly code for IBM z13 and later "mainframe" CPUs, resulting in
a huge speedup.
* Improved assembly for several 64-bit x86 CPUs, Risc-V, 64-bit Arm.
(From OE-Core rev: 49b625116b67a19abfd17670431ba3f96031b86e)
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r-- | meta/recipes-support/gmp/gmp/cve-2021-43618.patch | 27 | ||||
-rw-r--r-- | meta/recipes-support/gmp/gmp_6.3.0.bb (renamed from meta/recipes-support/gmp/gmp_6.2.1.bb) | 4 |
2 files changed, 1 insertions, 30 deletions
diff --git a/meta/recipes-support/gmp/gmp/cve-2021-43618.patch b/meta/recipes-support/gmp/gmp/cve-2021-43618.patch deleted file mode 100644 index 095fb21eaa..0000000000 --- a/meta/recipes-support/gmp/gmp/cve-2021-43618.patch +++ /dev/null | |||
@@ -1,27 +0,0 @@ | |||
1 | CVE: CVE-2021-43618 | ||
2 | Upstream-Status: Backport | ||
3 | Signed-off-by: Ross Burton <ross.burton@arm.com> | ||
4 | |||
5 | # HG changeset patch | ||
6 | # User Marco Bodrato <bodrato@mail.dm.unipi.it> | ||
7 | # Date 1634836009 -7200 | ||
8 | # Node ID 561a9c25298e17bb01896801ff353546c6923dbd | ||
9 | # Parent e1fd9db13b475209a864577237ea4b9105b3e96e | ||
10 | mpz/inp_raw.c: Avoid bit size overflows | ||
11 | |||
12 | diff -r e1fd9db13b47 -r 561a9c25298e mpz/inp_raw.c | ||
13 | --- a/mpz/inp_raw.c Tue Dec 22 23:49:51 2020 +0100 | ||
14 | +++ b/mpz/inp_raw.c Thu Oct 21 19:06:49 2021 +0200 | ||
15 | @@ -88,8 +88,11 @@ | ||
16 | |||
17 | abs_csize = ABS (csize); | ||
18 | |||
19 | + if (UNLIKELY (abs_csize > ~(mp_bitcnt_t) 0 / 8)) | ||
20 | + return 0; /* Bit size overflows */ | ||
21 | + | ||
22 | /* round up to a multiple of limbs */ | ||
23 | - abs_xsize = BITS_TO_LIMBS (abs_csize*8); | ||
24 | + abs_xsize = BITS_TO_LIMBS ((mp_bitcnt_t) abs_csize * 8); | ||
25 | |||
26 | if (abs_xsize != 0) | ||
27 | { | ||
diff --git a/meta/recipes-support/gmp/gmp_6.2.1.bb b/meta/recipes-support/gmp/gmp_6.3.0.bb index 29055492c2..3dbcd68b5c 100644 --- a/meta/recipes-support/gmp/gmp_6.2.1.bb +++ b/meta/recipes-support/gmp/gmp_6.3.0.bb | |||
@@ -14,10 +14,8 @@ SRC_URI = "https://gmplib.org/download/${BPN}/${BP}${REVISION}.tar.bz2 \ | |||
14 | file://use-includedir.patch \ | 14 | file://use-includedir.patch \ |
15 | file://0001-Append-the-user-provided-flags-to-the-auto-detected-.patch \ | 15 | file://0001-Append-the-user-provided-flags-to-the-auto-detected-.patch \ |
16 | file://0001-confiure.ac-Believe-the-cflags-from-environment.patch \ | 16 | file://0001-confiure.ac-Believe-the-cflags-from-environment.patch \ |
17 | file://cve-2021-43618.patch \ | ||
18 | " | 17 | " |
19 | SRC_URI[md5sum] = "28971fc21cf028042d4897f02fd355ea" | 18 | SRC_URI[sha256sum] = "ac28211a7cfb609bae2e2c8d6058d66c8fe96434f740cf6fe2e47b000d1c20cb" |
20 | SRC_URI[sha256sum] = "eae9326beb4158c386e39a356818031bd28f3124cf915f8c5b1dc4c7a36b4d7c" | ||
21 | 19 | ||
22 | acpaths = "" | 20 | acpaths = "" |
23 | 21 | ||