On 12/5/25 11:41, Anuj Mittal wrote:
CAUTION: This email comes from a non Wind River email account!
Do not click links or open attachments unless you recognize the sender and know 
the content is safe.

On Fri, Dec 5, 2025 at 8:22 AM Changqing Li via lists.openembedded.org
<[email protected]> wrote:

On 12/5/25 01:59, Steve Sakoman wrote:

CAUTION: This email comes from a non Wind River email account!
Do not click links or open attachments unless you recognize the sender and know 
the content is safe.

On Wed, Dec 3, 2025 at 12:25 AM Gyorgy Sarvari<[email protected]> wrote:

This is quite a big change in the middle of an LTS release... not that I
have a better solution. But maybe a warning in the docs would be
appropriate about this removed feature and its reason (not sure who
takes care of these).

You are quite correct, this is a large change and deserves further
discussion since it is removing a (admittedly experimental) feature.

I will remove this from this series pending further discussion on list.

Hi,

This vulnerability exists in libmicrohttpd_ws.so, which is generated when 
building with the --enable-experimental option, rather than in widely used 
libmicrohttpd.so.

We don't enable this option by default,  also we don't provide PACKAGECONFIG 
for it.

How about we still keep the patch for fixing CVE-2025-59777, CVE-2025-62689, 
and add the following warning in libmicrohttpd_1.0.2.bb

+python do_warn_experimental() {
+    if '--enable-experimental' in d.getVar('EXTRA_OECONF') and 
'0001-Remove-broken-experimental-code.patch' in d.getVar('SRC_URI'):
+        bb.warn("This option is removed for CVE-2025-59777, CVE-2025-62689, if you 
insist to use it, please remove patch 0001-Remove-broken-experimental-code.patch")
+}
+addtask warn_experimental before do_configure
+

if the user enable '--enable-experimental' , warning is it removed. if user 
insist to use it,  they can remove patch 
0001-Remove-broken-experimental-code.patch locally,  then

warning will disappear.
I think it should be the other way around. If we don't enable the
option and don't have a tunable PACKAGECONFIG for it, why complicate
and patch? If someone did enable it knowingly, they should fix it in
their append or recipe.

if we don't patch it,  should we add function like do_warn_experimental to remind user about the CVE?

it is possible that user enable experimental, but they don't know the existence of CVE-2025-59777, CVE-2025-62689.

Thanks

//Changqing

Thanks,

Anuj
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#227377): 
https://lists.openembedded.org/g/openembedded-core/message/227377
Mute This Topic: https://lists.openembedded.org/mt/116585220/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to