diff options
author | Wang Mingyu <wangmy@fujitsu.com> | 2023-08-01 15:41:14 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2023-08-14 12:51:18 +0100 |
commit | 49b625116b67a19abfd17670431ba3f96031b86e (patch) | |
tree | eae7ca88984b698d52cb37e8d1aca9285dfe6b06 /meta/recipes-support/gmp/gmp | |
parent | facef006da35e22394a4cbb13243769586d10f31 (diff) | |
download | openembedded-core-49b625116b67a19abfd17670431ba3f96031b86e.tar.gz |
gmp: upgrade 6.2.1 -> 6.3.0
cve-2021-43618.patch
removed since it's included in 6.3.0
Changelog:
============
BUGS FIXED
* A possible overflow of type int is avoided for mpz_cmp on huge operands.
* A possible error condition when a malformed file is read with
mpz_inp_raw is now correctly handled.
FEATURES
* New public function mpz_prevprime, companion of the existing
mpz_nextprime.
* New documented pointer types mpz_ptr, mpz_srcptr, and similar for
other GMP types. Refer to the manual for full list and suggested
usage. These types have been present in gmp.h at least since
GMP-4.0, but previously not advertised to users.
* Support for 64-bit Arm under Macos.
* Support for the loongarch64 CPU family.
* Support for building with LTO, link-time optimisations.
SPEEDUPS
* New special code for base = 2 in mpz_powm reduces the average time
for the functions that test primality.
* Speedup for the function mpz_nextprime on large operands.
* Speedup for multiplications (some sizes only) thanks to new
internal functions to compute small negacyclic products.
* Special assembly code for IBM z13 and later "mainframe" CPUs, resulting in
a huge speedup.
* Improved assembly for several 64-bit x86 CPUs, Risc-V, 64-bit Arm.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-support/gmp/gmp')
-rw-r--r-- | meta/recipes-support/gmp/gmp/cve-2021-43618.patch | 27 |
1 files changed, 0 insertions, 27 deletions
diff --git a/meta/recipes-support/gmp/gmp/cve-2021-43618.patch b/meta/recipes-support/gmp/gmp/cve-2021-43618.patch deleted file mode 100644 index 095fb21eaa..0000000000 --- a/meta/recipes-support/gmp/gmp/cve-2021-43618.patch +++ /dev/null @@ -1,27 +0,0 @@ -CVE: CVE-2021-43618 -Upstream-Status: Backport -Signed-off-by: Ross Burton <ross.burton@arm.com> - -# HG changeset patch -# User Marco Bodrato <bodrato@mail.dm.unipi.it> -# Date 1634836009 -7200 -# Node ID 561a9c25298e17bb01896801ff353546c6923dbd -# Parent e1fd9db13b475209a864577237ea4b9105b3e96e -mpz/inp_raw.c: Avoid bit size overflows - -diff -r e1fd9db13b47 -r 561a9c25298e mpz/inp_raw.c ---- a/mpz/inp_raw.c Tue Dec 22 23:49:51 2020 +0100 -+++ b/mpz/inp_raw.c Thu Oct 21 19:06:49 2021 +0200 -@@ -88,8 +88,11 @@ - - abs_csize = ABS (csize); - -+ if (UNLIKELY (abs_csize > ~(mp_bitcnt_t) 0 / 8)) -+ return 0; /* Bit size overflows */ -+ - /* round up to a multiple of limbs */ -- abs_xsize = BITS_TO_LIMBS (abs_csize*8); -+ abs_xsize = BITS_TO_LIMBS ((mp_bitcnt_t) abs_csize * 8); - - if (abs_xsize != 0) - { |