Thanks Armin for the update. I'll look into this.

Thanks,

Best Regards,

Ranjitsinh Rathod
Technical Leader |  | KPIT Technologies Ltd.
Cellphone: +91-84606 92403
__________________________________________
KPIT<http://www.kpit.com/> | Follow us on LinkedIn<http://www.kpit.com/linkedin>

[cid:0561260a-9c95-419c-867d-aba20d0e13f1]<https://www.kpit.com/TheNewBrand>

________________________________
From: akuster808 <[email protected]>
Sent: Saturday, July 16, 2022 2:48 AM
To: Ranjitsinh Rathod <[email protected]>; 
[email protected] 
<[email protected]>; Omkar Patil <[email protected]>
Cc: Chen Qi <[email protected]>; Khem Raj <[email protected]>
Subject: Re: [oe][meta-filesystems][dunfell][PATCH 1/8] ntfs-3g-ntfsprogs: 
upgrade to 2021.8.22

Caution: This email originated from outside of the KPIT. Do not click links or 
open attachments unless you recognize the sender and know the content is safe.

I am finally able to look into this series pend the master and kirkstone
back logs.

I am fine with the update but none of the patches apply. I tried two
different systems.

ERROR: ntfs-3g-ntfsprogs-2021.8.22-r0 do_patch: Applying patch
'CVE-2021-46790.patch' on target directory
'/builds/54vdLR_9/0/akuster/meta-branch-maint/build/tmp/work/core2-64-poky-linux/ntfs-3g-ntfsprogs/2021.8.22-r0/ntfs-3g_ntfsprogs-2021.8.22'
Command Error: 'quilt --quiltrc
/builds/54vdLR_9/0/akuster/meta-branch-maint/build/tmp/work/core2-64-poky-linux/ntfs-3g-ntfsprogs/2021.8.22-r0/recipe-sysroot-native/etc/quiltrc
push' exited with 0  Output:
Applying patch CVE-2021-46790.patch
patching file ntfsprogs/ntfsck.c
Hunk #1 FAILED at 616.
1 out of 1 hunk FAILED -- rejects in file ntfsprogs/ntfsck.c
Patch CVE-2021-46790.patch does not apply (enforce with -f)
ERROR: Logfile of failure stored in:
/builds/54vdLR_9/0/akuster/meta-branch-maint/build/tmp/work/core2-64-poky-linux/ntfs-3g-ntfsprogs/2021.8.22-r0/temp/log.do_patch.2884481


the nest one failed too.

Applying patch patches/CVE-2022-30783.patch
patching file libfuse-lite/mount.c
patching file src/ntfs-3g_common.c
Hunk #1 FAILED at 128.
Hunk #2 FAILED at 521.
2 out of 2 hunks FAILED -- rejects in file src/ntfs-3g_common.c
patching file src/ntfs-3g_common.h
Hunk #1 FAILED at 94.
1 out of 1 hunk FAILED -- rejects in file src/ntfs-3g_common.h


-armin

On 7/1/22 01:20, Ranjitsinh Rathod via lists.openembedded.org wrote:
> From: Chen Qi <[email protected]>
>
> This upgrade revolves a bunch of CVEs. See more details in:
> https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Ftuxera%2Fntfs-3g%2Fsecurity%2Fadvisories%2FGHSA-q759-8j5v-q5jp&amp;data=05%7C01%7Cranjitsinh.rathod%40kpit.com%7C9ff20d1727fb4f3a15a608da66a795da%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637935167258637991%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=UOVp4aZzpV0iqGcs6vI9sE58zfJYDJc50ht5rb3ZtVg%3D&amp;reserved=0.
>
> Fixed CVE's:
> CVE-2021-33285
> CVE-2021-33289
> CVE-2021-33286
> CVE-2021-35266
> CVE-2021-33287
> CVE-2021-35267
> CVE-2021-35268
> CVE-2021-35269
> CVE-2021-39251
> CVE-2021-39252
> CVE-2021-39253
> CVE-2021-39254
> CVE-2021-39255
> CVE-2021-39256
> CVE-2021-39257
> CVE-2021-39258
> CVE-2021-39259
> CVE-2021-39260
> CVE-2021-39261
> CVE-2021-39262
> CVE-2021-39263
>
> Signed-off-by: Chen Qi <[email protected]>
> Signed-off-by: Khem Raj <[email protected]>
> (cherry picked from commit 6791dc536444a1dd0f473653501ba43fc84704f2)
>
> Signed-off-by: Omkar Patil <[email protected]>
> Signed-off-by: Ranjitsinh Rathod <[email protected]>
> ---
>   ...-ntfsprogs_2017.3.23.bb => ntfs-3g-ntfsprogs_2021.8.22.bb} | 4 ++--
>   1 file changed, 2 insertions(+), 2 deletions(-)
>   rename 
> meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/{ntfs-3g-ntfsprogs_2017.3.23.bb
>  => ntfs-3g-ntfsprogs_2021.8.22.bb} (92%)
>
> diff --git 
> a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2017.3.23.bb
>  
> b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb
> similarity index 92%
> rename from 
> meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2017.3.23.bb
> rename to 
> meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb
> index 6f5cb6cee..19b2d6ca2 100644
> --- 
> a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2017.3.23.bb
> +++ 
> b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb
> @@ -10,8 +10,8 @@ SRC_URI = 
> "https://apc01.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftuxera.com%2Fopensource%2Fntfs-3g_ntfsprogs-%24&amp;data=05%7C01%7Cranjitsinh.rathod%40kpit.com%7C9ff20d1727fb4f3a15a608da66a795da%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637935167258637991%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=HknXUbHma5653s11%2Fq1x%2FqX%2FW2zwuyM2zcNB%2F1rInHw%3D&amp;reserved=0{PV}.tgz
>  \
>              
> file://0001-libntfs-3g-Makefile.am-fix-install-failed-while-host.patch \
>   "
>   S = "${WORKDIR}/ntfs-3g_ntfsprogs-${PV}"
> -SRC_URI[md5sum] = "d97474ae1954f772c6d2fa386a6f462c"
> -SRC_URI[sha256sum] = 
> "3e5a021d7b761261836dcb305370af299793eedbded731df3d6943802e1262d5"
> +SRC_URI[md5sum] = "90da343e78877d388eb34cefae6799ae"
> +SRC_URI[sha256sum] = 
> "55b883aa05d94b2ec746ef3966cb41e66bed6db99f22ddd41d1b8b94bb202efb"
>
>   UPSTREAM_CHECK_URI = 
> "https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.tuxera.com%2Fcommunity%2Fopen-source-ntfs-3g%2F&amp;data=05%7C01%7Cranjitsinh.rathod%40kpit.com%7C9ff20d1727fb4f3a15a608da66a795da%7C3539451eb46e4a26a242ff61502855c7%7C0%7C0%7C637935167258637991%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=M%2Feo3UWBd%2BnXkkj5PzBg4QW63gYzQisdc5LA3Vzl3x8%3D&amp;reserved=0";
>   UPSTREAM_CHECK_REGEX = "ntfs-3g_ntfsprogs-(?P<pver>\d+(\.\d+)+)\.tgz"
> --
> 2.17.1
>
> This message contains information that may be privileged or confidential and 
> is the property of the KPIT Technologies Ltd. It is intended only for the 
> person to whom it is addressed. If you are not the intended recipient, you 
> are not authorized to read, print, retain copy, disseminate, distribute, or 
> use this message or any part thereof. If you receive this message in error, 
> please notify the sender immediately and delete all copies of this message. 
> KPIT Technologies Ltd. does not accept any liability for virus infected mails.
>
> 
>

This message contains information that may be privileged or confidential and is 
the property of the KPIT Technologies Ltd. It is intended only for the person 
to whom it is addressed. If you are not the intended recipient, you are not 
authorized to read, print, retain copy, disseminate, distribute, or use this 
message or any part thereof. If you receive this message in error, please 
notify the sender immediately and delete all copies of this message. KPIT 
Technologies Ltd. does not accept any liability for virus infected mails.
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#97853): 
https://lists.openembedded.org/g/openembedded-devel/message/97853
Mute This Topic: https://lists.openembedded.org/mt/92104299/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to