<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/meta-openembedded.git, branch kirkstone-next</title>
<subtitle>Mirror of git.openembedded.org/meta-openembedded</subtitle>
<id>https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=kirkstone-next</id>
<link rel='self' href='https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=kirkstone-next'/>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/'/>
<updated>2025-07-13T18:41:35+00:00</updated>
<entry>
<title>poco: Fix ptests</title>
<updated>2025-07-13T18:41:35+00:00</updated>
<author>
<name>Khem Raj</name>
<email>raj.khem@gmail.com</email>
</author>
<published>2025-07-13T09:46:14+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=06fc0278f10d630838d703dde707bbf0e2999873'/>
<id>urn:sha1:06fc0278f10d630838d703dde707bbf0e2999873</id>
<content type='text'>
testrunners file was coming out to be empty after anon python was turned
into a prepend to populate_packages which is executed during do_package
and hence POCO_TESTRUNNERS was not populated when it was used during
do_ptest_install now. Therefore alter the logic to collect the list of
tests to run into testrunners file. Also package the ignore file which
is platform specific, here the lnx version is packaged and specified
using -ignore cmd to tests

Signed-off-by: Khem Raj &lt;raj.khem@gmail.com&gt;
Signed-off-by: Peter Marko &lt;peter.marko@siemens.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>poco: Remove pushd/popd from run-ptest</title>
<updated>2025-07-13T18:41:31+00:00</updated>
<author>
<name>Khem Raj</name>
<email>raj.khem@gmail.com</email>
</author>
<published>2025-07-13T09:46:13+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=88f1dc85d8c5d06a0bc4cdb473b97d2bddb3f52e'/>
<id>urn:sha1:88f1dc85d8c5d06a0bc4cdb473b97d2bddb3f52e</id>
<content type='text'>
This could be worked out without needing to add bash dependency

Signed-off-by: Khem Raj &lt;raj.khem@gmail.com&gt;
Signed-off-by: Peter Marko &lt;peter.marko@siemens.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>poco: patch CVE-2025-6375</title>
<updated>2025-07-13T18:41:28+00:00</updated>
<author>
<name>Peter Marko</name>
<email>peter.marko@siemens.com</email>
</author>
<published>2025-07-13T09:46:12+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=e8682e980316e909067214b5ccb4d6138bc92a34'/>
<id>urn:sha1:e8682e980316e909067214b5ccb4d6138bc92a34</id>
<content type='text'>
Pick commit mentioned in [1].

[1] https://nvd.nist.gov/vuln/detail/CVE-2025-6375

Signed-off-by: Peter Marko &lt;peter.marko@siemens.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>spdlog: patch CVE-2025-6140</title>
<updated>2025-07-13T18:41:25+00:00</updated>
<author>
<name>Peter Marko</name>
<email>peter.marko@siemens.com</email>
</author>
<published>2025-07-12T12:55:12+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=c982a980e98fb7cfed4ded75e82be31eff0e8bd1'/>
<id>urn:sha1:c982a980e98fb7cfed4ded75e82be31eff0e8bd1</id>
<content type='text'>
Pick commit [1] mentioned in [2] as listed in [3].

[1] https://github.com/gabime/spdlog/commit/10320184df1eb4638e253a34b1eb44ce78954094
[2] https://github.com/gabime/spdlog/issues/3360
[3] https://nvd.nist.gov/vuln/detail/CVE-2025-6140

Signed-off-by: Peter Marko &lt;peter.marko@siemens.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>tcpreplay: fix CVE-2024-22654</title>
<updated>2025-07-13T18:41:22+00:00</updated>
<author>
<name>Archana Polampalli</name>
<email>archana.polampalli@windriver.com</email>
</author>
<published>2025-07-11T11:35:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=2e921c24862553df742a6b5ace574fbb942776cc'/>
<id>urn:sha1:2e921c24862553df742a6b5ace574fbb942776cc</id>
<content type='text'>
tcpreplay v4.4.4 was discovered to contain an infinite loop via the tcprewrite function at get.c.

Signed-off-by: Archana Polampalli &lt;archana.polampalli@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>open-vm-tools: fix CVE-2025-22247</title>
<updated>2025-07-13T18:41:17+00:00</updated>
<author>
<name>Hitendra Prajapati</name>
<email>hprajapati@mvista.com</email>
</author>
<published>2025-07-11T05:25:13+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=12375606232655c1562f69ad757d365ae711a430'/>
<id>urn:sha1:12375606232655c1562f69ad757d365ae711a430</id>
<content type='text'>
Upstream-Status: Backport from https://github.com/vmware/open-vm-tools/blob/CVE-2025-22247.patch/CVE-2025-22247-1100-1225-VGAuth-updates.patch

Signed-off-by: Hitendra Prajapati &lt;hprajapati@mvista.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>jq: Fix CVEs</title>
<updated>2025-07-13T18:36:35+00:00</updated>
<author>
<name>Colin McAllister</name>
<email>colin.mcallister@garmin.com</email>
</author>
<published>2025-07-07T21:39:43+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=9daee866d1b4567a40c7af8067f0ade213a7091d'/>
<id>urn:sha1:9daee866d1b4567a40c7af8067f0ade213a7091d</id>
<content type='text'>
Adds backported patches to fix CVE-2024-23339, CVE-2024-53427, and
CVE-2025-48060.

Signed-off-by: Colin Pinnell McAllister &lt;colin.mcallister@garmin.com&gt;
Change-Id: Ibc2db956b7fd5d0388dbed1a81ddf9aa58431fb1
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>imagemagick: Fix CVE vulnerablities</title>
<updated>2025-07-13T18:35:54+00:00</updated>
<author>
<name>Sana Kazi</name>
<email>sanakazi720@gmail.com</email>
</author>
<published>2025-07-03T11:20:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=f73c3e4b7729798d3c90c9e568378f74c57fdd83'/>
<id>urn:sha1:f73c3e4b7729798d3c90c9e568378f74c57fdd83</id>
<content type='text'>
Fix following CVEs for imagemagick:
CVE-2023-5341, CVE-2022-1114, CVE-2023-1289 and CVE-2023-34474

Signed-off-by: Sana Kazi &lt;sanakazi720@gmail.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>udisks2: Hardening measure of CVE-2025-6019</title>
<updated>2025-07-13T18:35:51+00:00</updated>
<author>
<name>Changqing Li</name>
<email>changqing.li@windriver.com</email>
</author>
<published>2025-07-03T11:03:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=c2645698cb4f9559bb72cbc48a5f55eb808927a9'/>
<id>urn:sha1:c2645698cb4f9559bb72cbc48a5f55eb808927a9</id>
<content type='text'>
Refer [1], CVE-2025-6019 is strongly related to udisk daemon, and
this is a hardening measure related to this.

[1] https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt
[2] https://security-tracker.debian.org/tracker/CVE-2025-6019
[3] https://ubuntu.com/blog/udisks-libblockdev-lpe-vulnerability-fixes-available

Signed-off-by: Changqing Li &lt;changqing.li@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>libblockdev: fix CVE-2025-6019</title>
<updated>2025-07-13T18:35:44+00:00</updated>
<author>
<name>Changqing Li</name>
<email>changqing.li@windriver.com</email>
</author>
<published>2025-07-03T11:03:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=e73af91ee37e49fe8beea0a25bf703d05ed4be18'/>
<id>urn:sha1:e73af91ee37e49fe8beea0a25bf703d05ed4be18</id>
<content type='text'>
CVE-2025-6019:
A Local Privilege Escalation (LPE) vulnerability was found in
libblockdev. Generally, the "allow_active" setting in Polkit permits a
physically present user to take certain actions based on the session
type. Due to the way libblockdev interacts with the udisks daemon, an
"allow_active" user on a system may be able escalate to full root
privileges on the target host. Normally, udisks mounts user-provided
filesystem images with security flags like nosuid and nodev to prevent
privilege escalation. However, a local attacker can create a specially
crafted XFS image containing a SUID-root shell, then trick udisks into
resizing it. This mounts their malicious filesystem with root
privileges, allowing them to execute their SUID-root shell and gain
complete control of the system.

Refer:
https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt

Signed-off-by: Changqing Li &lt;changqing.li@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
</feed>
