diff options
| -rw-r--r-- | meta-gnome/recipes-gimp/gimp/gimp/0001-gimp-cross-compile-fix-for-bz2.patch | 4 | ||||
| -rw-r--r-- | meta-gnome/recipes-gimp/gimp/gimp_3.0.6.bb (renamed from meta-gnome/recipes-gimp/gimp/gimp_3.0.4.bb) | 7 | ||||
| -rw-r--r-- | meta-oe/recipes-devtools/yasm/yasm/CVE-2021-33456.patch | 35 | ||||
| -rw-r--r-- | meta-oe/recipes-devtools/yasm/yasm/CVE-2021-33464.patch | 34 | ||||
| -rw-r--r-- | meta-oe/recipes-devtools/yasm/yasm/CVE-2023-29579.patch | 39 | ||||
| -rw-r--r-- | meta-oe/recipes-devtools/yasm/yasm_git.bb | 7 | ||||
| -rw-r--r-- | meta-oe/recipes-support/googlebenchmark/googlebenchmark_1.9.4.bb | 4 | ||||
| -rw-r--r-- | meta-oe/recipes-support/links/links.inc | 2 | ||||
| -rw-r--r-- | meta-oe/recipes-support/links/links_2.29.bb | 2 | ||||
| -rw-r--r-- | meta-python/recipes-devtools/python/python3-icontract_2.7.2.bb (renamed from meta-python/recipes-devtools/python/python3-icontract_2.6.6.bb) | 2 | ||||
| -rw-r--r-- | meta-python/recipes-devtools/python/python3-rich-toolkit_0.15.1.bb | 17 |
11 files changed, 142 insertions, 11 deletions
diff --git a/meta-gnome/recipes-gimp/gimp/gimp/0001-gimp-cross-compile-fix-for-bz2.patch b/meta-gnome/recipes-gimp/gimp/gimp/0001-gimp-cross-compile-fix-for-bz2.patch index 721225c8b3..380e425f25 100644 --- a/meta-gnome/recipes-gimp/gimp/gimp/0001-gimp-cross-compile-fix-for-bz2.patch +++ b/meta-gnome/recipes-gimp/gimp/gimp/0001-gimp-cross-compile-fix-for-bz2.patch | |||
| @@ -16,8 +16,8 @@ diff --git a/meson.build b/meson.build | |||
| 16 | index 4e48f8c64c..d5dce47015 100644 | 16 | index 4e48f8c64c..d5dce47015 100644 |
| 17 | --- a/meson.build | 17 | --- a/meson.build |
| 18 | +++ b/meson.build | 18 | +++ b/meson.build |
| 19 | @@ -765,7 +765,7 @@ zlib = dependency('zlib') | 19 | @@ -777,7 +777,7 @@ zlib = dependency('zlib') |
| 20 | MIMEtypes += 'image/x-psp' | 20 | zlib = dependency('zlib') |
| 21 | 21 | ||
| 22 | # Compiler-provided headers can't be found in crossroads environment | 22 | # Compiler-provided headers can't be found in crossroads environment |
| 23 | -if not meson.is_cross_build() | 23 | -if not meson.is_cross_build() |
diff --git a/meta-gnome/recipes-gimp/gimp/gimp_3.0.4.bb b/meta-gnome/recipes-gimp/gimp/gimp_3.0.6.bb index e2ad29eb98..9f38cdcd03 100644 --- a/meta-gnome/recipes-gimp/gimp/gimp_3.0.4.bb +++ b/meta-gnome/recipes-gimp/gimp/gimp_3.0.6.bb | |||
| @@ -5,7 +5,7 @@ LICENSE = "GPL-3.0-only" | |||
| 5 | LIC_FILES_CHKSUM = "file://COPYING;md5=c678957b0c8e964aa6c70fd77641a71e" | 5 | LIC_FILES_CHKSUM = "file://COPYING;md5=c678957b0c8e964aa6c70fd77641a71e" |
| 6 | 6 | ||
| 7 | DEPENDS = " \ | 7 | DEPENDS = " \ |
| 8 | appstream-glib \ | 8 | appstream \ |
| 9 | atk \ | 9 | atk \ |
| 10 | babl \ | 10 | babl \ |
| 11 | bzip2 \ | 11 | bzip2 \ |
| @@ -56,13 +56,12 @@ GIDOCGEN_MESON_OPTION = "gi-docgen" | |||
| 56 | GIDOCGEN_MESON_ENABLE_FLAG = "enabled" | 56 | GIDOCGEN_MESON_ENABLE_FLAG = "enabled" |
| 57 | GIDOCGEN_MESON_DISABLE_FLAG = "disabled" | 57 | GIDOCGEN_MESON_DISABLE_FLAG = "disabled" |
| 58 | 58 | ||
| 59 | SRC_URI = "gitsm://gitlab.gnome.org/GNOME/gimp.git;protocol=https;branch=master" | 59 | SRC_URI = "https://download.gimp.org/gimp/v3.0/${BP}.tar.xz" |
| 60 | SRC_URI += "file://0001-gimp-cross-compile-fix-for-bz2.patch" | 60 | SRC_URI += "file://0001-gimp-cross-compile-fix-for-bz2.patch" |
| 61 | SRC_URI += "file://0002-meson.build-reproducibility-fix.patch" | 61 | SRC_URI += "file://0002-meson.build-reproducibility-fix.patch" |
| 62 | SRC_URI += "file://0001-meson.build-dont-check-for-lgi.patch" | 62 | SRC_URI += "file://0001-meson.build-dont-check-for-lgi.patch" |
| 63 | SRC_URI += "file://0001-meson.build-require-iso-codes-native.patch" | 63 | SRC_URI += "file://0001-meson.build-require-iso-codes-native.patch" |
| 64 | SRCREV = "c1901c5be644ab8dcaf779b1f383bf5370bc90c6" | 64 | SRC_URI[sha256sum] = "246c225383c72ef9f0dc7703b7d707084bbf177bd2900e94ce466a62862e296b" |
| 65 | |||
| 66 | 65 | ||
| 67 | PACKAGECONFIG[aa] = "-Daa=enabled,-Daa=disabled,aalib" | 66 | PACKAGECONFIG[aa] = "-Daa=enabled,-Daa=disabled,aalib" |
| 68 | PACKAGECONFIG[alsa] = "-Dalsa=enabled,-Dalsa=disabled,alsa-lib" | 67 | PACKAGECONFIG[alsa] = "-Dalsa=enabled,-Dalsa=disabled,alsa-lib" |
diff --git a/meta-oe/recipes-devtools/yasm/yasm/CVE-2021-33456.patch b/meta-oe/recipes-devtools/yasm/yasm/CVE-2021-33456.patch new file mode 100644 index 0000000000..2340d8ed75 --- /dev/null +++ b/meta-oe/recipes-devtools/yasm/yasm/CVE-2021-33456.patch | |||
| @@ -0,0 +1,35 @@ | |||
| 1 | From 1126140b8f5ece18c58640725f0e4c08e5ec97b0 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Gyorgy Sarvari <skandigraun@gmail.com> | ||
| 3 | Date: Sat, 15 Nov 2025 13:34:15 +0100 | ||
| 4 | Subject: [PATCH] A potential null pointer difference is that the return value | ||
| 5 | of the hash may be null. This fixes CVE-2021-33456. | ||
| 6 | |||
| 7 | From: lixuebing <lixuebing@cqsoftware.com.cn> | ||
| 8 | Date: Mon, 25 Aug 2025 13:51:28 +0800 | ||
| 9 | Subject: Fix null-pointer-dereference in hash | ||
| 10 | Bug: https://github.com/yasm/yasm/issues/175 | ||
| 11 | Origin: https://github.com/yasm/yasm/pull/290 | ||
| 12 | |||
| 13 | CVE: CVE-2021-33456 | ||
| 14 | Upstream-Status: Submitted [https://github.com/yasm/yasm/pull/290] | ||
| 15 | |||
| 16 | Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> | ||
| 17 | --- | ||
| 18 | modules/preprocs/nasm/nasm-pp.c | 4 ++++ | ||
| 19 | 1 file changed, 4 insertions(+) | ||
| 20 | |||
| 21 | diff --git a/modules/preprocs/nasm/nasm-pp.c b/modules/preprocs/nasm/nasm-pp.c | ||
| 22 | index f9f92dd1..473d98c1 100644 | ||
| 23 | --- a/modules/preprocs/nasm/nasm-pp.c | ||
| 24 | +++ b/modules/preprocs/nasm/nasm-pp.c | ||
| 25 | @@ -1102,6 +1102,10 @@ hash(char *s) | ||
| 26 | { | ||
| 27 | unsigned int h = 0; | ||
| 28 | unsigned int i = 0; | ||
| 29 | + /* Check if the input string is NULL to avoid null pointer dereference */ | ||
| 30 | + if (s == NULL) { | ||
| 31 | + return 0; | ||
| 32 | + } | ||
| 33 | /* | ||
| 34 | * Powers of three, mod 31. | ||
| 35 | */ | ||
diff --git a/meta-oe/recipes-devtools/yasm/yasm/CVE-2021-33464.patch b/meta-oe/recipes-devtools/yasm/yasm/CVE-2021-33464.patch new file mode 100644 index 0000000000..ebae250ff9 --- /dev/null +++ b/meta-oe/recipes-devtools/yasm/yasm/CVE-2021-33464.patch | |||
| @@ -0,0 +1,34 @@ | |||
| 1 | From 3c3f968d48d768c1e355199d4067d99cb72abc26 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Gyorgy Sarvari <skandigraun@gmail.com> | ||
| 3 | Date: Sat, 15 Nov 2025 13:30:12 +0100 | ||
| 4 | Subject: [PATCH] Handle file descriptors with nonexisting env names better. | ||
| 5 | Avoid writing past allocated memory. | ||
| 6 | |||
| 7 | This fixes CVE-2021-33464. | ||
| 8 | Author: Petter Reinholdtsen <pere@debian.org> | ||
| 9 | Bug: https://github.com/yasm/yasm/issues/164 | ||
| 10 | Bug-Debian: https://bugs.debian.org/1016353 | ||
| 11 | Forwarded: https://github.com/yasm/yasm/issues/164 | ||
| 12 | Last-Update: 2025-04-30 | ||
| 13 | |||
| 14 | CVE: CVE-2021-33464 | ||
| 15 | Upstream-Status: Submitted [https://github.com/yasm/yasm/issues/164] | ||
| 16 | |||
| 17 | Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> | ||
| 18 | --- | ||
| 19 | modules/preprocs/nasm/nasm-pp.c | 2 +- | ||
| 20 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
| 21 | |||
| 22 | diff --git a/modules/preprocs/nasm/nasm-pp.c b/modules/preprocs/nasm/nasm-pp.c | ||
| 23 | index 512f02c3..f9f92dd1 100644 | ||
| 24 | --- a/modules/preprocs/nasm/nasm-pp.c | ||
| 25 | +++ b/modules/preprocs/nasm/nasm-pp.c | ||
| 26 | @@ -1815,7 +1815,7 @@ inc_fopen(char *file, char **newname) | ||
| 27 | error(ERR_WARNING, "environment variable `%s' does not exist", | ||
| 28 | p1+1); | ||
| 29 | *p2 = '%'; | ||
| 30 | - p1 = p2+1; | ||
| 31 | + pb = p1 = p2+1; | ||
| 32 | continue; | ||
| 33 | } | ||
| 34 | /* need to expand */ | ||
diff --git a/meta-oe/recipes-devtools/yasm/yasm/CVE-2023-29579.patch b/meta-oe/recipes-devtools/yasm/yasm/CVE-2023-29579.patch new file mode 100644 index 0000000000..58b4ed1996 --- /dev/null +++ b/meta-oe/recipes-devtools/yasm/yasm/CVE-2023-29579.patch | |||
| @@ -0,0 +1,39 @@ | |||
| 1 | From 81c1b7b0a28f052eaadddcb010944bf67e6ae257 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Gyorgy Sarvari <skandigraun@gmail.com> | ||
| 3 | Date: Sat, 15 Nov 2025 13:24:21 +0100 | ||
| 4 | Subject: [PATCH] Make sure CPU feature parsing use large enough string buffer. | ||
| 5 | Fixes CVE-2023-29579. | ||
| 6 | |||
| 7 | Author: Petter Reinholdtsen <pere@debian.org> | ||
| 8 | Bug: https://github.com/yasm/yasm/issues/214 | ||
| 9 | Bug-Debian: https://bugs.debian.org/1035951 | ||
| 10 | Forwarded: https://github.com/yasm/yasm/issues/214 | ||
| 11 | Last-Update: 2025-04-30 | ||
| 12 | |||
| 13 | This patch is taken from Debian: | ||
| 14 | https://sources.debian.org/patches/yasm/1.3.0-8/1000-x86-dir-cpu-CVE-2023-29579.patch/ | ||
| 15 | |||
| 16 | CVE: CVE-2023-29579 | ||
| 17 | Upstream-Status: Submitted [https://github.com/yasm/yasm/issues/214] | ||
| 18 | |||
| 19 | Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> | ||
| 20 | --- | ||
| 21 | modules/arch/x86/x86arch.c | 5 +++-- | ||
| 22 | 1 file changed, 3 insertions(+), 2 deletions(-) | ||
| 23 | |||
| 24 | diff --git a/modules/arch/x86/x86arch.c b/modules/arch/x86/x86arch.c | ||
| 25 | index bac11774..58327958 100644 | ||
| 26 | --- a/modules/arch/x86/x86arch.c | ||
| 27 | +++ b/modules/arch/x86/x86arch.c | ||
| 28 | @@ -165,8 +165,9 @@ x86_dir_cpu(yasm_object *object, yasm_valparamhead *valparams, | ||
| 29 | yasm_error_set(YASM_ERROR_SYNTAX, | ||
| 30 | N_("invalid argument to [%s]"), "CPU"); | ||
| 31 | else { | ||
| 32 | - char strcpu[16]; | ||
| 33 | - sprintf(strcpu, "%lu", yasm_intnum_get_uint(intcpu)); | ||
| 34 | + char strcpu[21]; /* 21 = ceil(log10(LONG_MAX)+1) */ | ||
| 35 | + assert(8*sizeof(unsigned long) <= 64); | ||
| 36 | + snprintf(strcpu, sizeof(strcpu), "%lu", yasm_intnum_get_uint(intcpu)); | ||
| 37 | yasm_x86__parse_cpu(arch_x86, strcpu, strlen(strcpu)); | ||
| 38 | } | ||
| 39 | } else | ||
diff --git a/meta-oe/recipes-devtools/yasm/yasm_git.bb b/meta-oe/recipes-devtools/yasm/yasm_git.bb index 68895a1697..6ddd94621a 100644 --- a/meta-oe/recipes-devtools/yasm/yasm_git.bb +++ b/meta-oe/recipes-devtools/yasm/yasm_git.bb | |||
| @@ -14,7 +14,10 @@ SRC_URI = "git://github.com/yasm/yasm.git;branch=master;protocol=https \ | |||
| 14 | file://0001-yasm-Set-build-date-to-SOURCE_DATE_EPOCH.patch \ | 14 | file://0001-yasm-Set-build-date-to-SOURCE_DATE_EPOCH.patch \ |
| 15 | file://0002-yasm-Use-BUILD_DATE-for-reproducibility.patch \ | 15 | file://0002-yasm-Use-BUILD_DATE-for-reproducibility.patch \ |
| 16 | file://0001-bitvect-fix-build-with-gcc-15.patch \ | 16 | file://0001-bitvect-fix-build-with-gcc-15.patch \ |
| 17 | " | 17 | file://CVE-2023-29579.patch \ |
| 18 | file://CVE-2021-33464.patch \ | ||
| 19 | file://CVE-2021-33456.patch \ | ||
| 20 | " | ||
| 18 | 21 | ||
| 19 | 22 | ||
| 20 | inherit autotools gettext python3native | 23 | inherit autotools gettext python3native |
| @@ -33,3 +36,5 @@ do_configure:prepend() { | |||
| 33 | CVE_STATUS_GROUPS += "CVE_STATUS_HASH_UPDATE" | 36 | CVE_STATUS_GROUPS += "CVE_STATUS_HASH_UPDATE" |
| 34 | CVE_STATUS_HASH_UPDATE = "CVE-2021-33454 CVE-2023-31975 CVE-2023-37732" | 37 | CVE_STATUS_HASH_UPDATE = "CVE-2021-33454 CVE-2023-31975 CVE-2023-37732" |
| 35 | CVE_STATUS_HASH_UPDATE[status] = "fixed-version: patched in current git hash" | 38 | CVE_STATUS_HASH_UPDATE[status] = "fixed-version: patched in current git hash" |
| 39 | |||
| 40 | CVE_PRODUCT += "tortall:yasm yasm_project:yasm" | ||
diff --git a/meta-oe/recipes-support/googlebenchmark/googlebenchmark_1.9.4.bb b/meta-oe/recipes-support/googlebenchmark/googlebenchmark_1.9.4.bb index 4558aa13d6..7f6755d51e 100644 --- a/meta-oe/recipes-support/googlebenchmark/googlebenchmark_1.9.4.bb +++ b/meta-oe/recipes-support/googlebenchmark/googlebenchmark_1.9.4.bb | |||
| @@ -7,13 +7,15 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57" | |||
| 7 | SRC_URI = "git://github.com/google/benchmark.git;protocol=https;branch=main;tag=v${PV}" | 7 | SRC_URI = "git://github.com/google/benchmark.git;protocol=https;branch=main;tag=v${PV}" |
| 8 | SRCREV = "eddb0241389718a23a42db6af5f0164b6e0139af" | 8 | SRCREV = "eddb0241389718a23a42db6af5f0164b6e0139af" |
| 9 | 9 | ||
| 10 | |||
| 11 | EXTRA_OECMAKE = " \ | 10 | EXTRA_OECMAKE = " \ |
| 12 | -DBUILD_SHARED_LIBS=yes \ | 11 | -DBUILD_SHARED_LIBS=yes \ |
| 13 | -DBENCHMARK_ENABLE_TESTING=no \ | 12 | -DBENCHMARK_ENABLE_TESTING=no \ |
| 14 | -DCMAKE_BUILD_TYPE=Release \ | 13 | -DCMAKE_BUILD_TYPE=Release \ |
| 15 | " | 14 | " |
| 16 | 15 | ||
| 16 | # Needed with glibc 2.43 which also defines __COUNTER__ now | ||
| 17 | CXXFLAGS += "-Wno-c2y-extensions" | ||
| 18 | |||
| 17 | inherit cmake | 19 | inherit cmake |
| 18 | 20 | ||
| 19 | FILES:${PN}-dev += "${libdir}/cmake" | 21 | FILES:${PN}-dev += "${libdir}/cmake" |
diff --git a/meta-oe/recipes-support/links/links.inc b/meta-oe/recipes-support/links/links.inc index d772d54aff..a255f0ba6b 100644 --- a/meta-oe/recipes-support/links/links.inc +++ b/meta-oe/recipes-support/links/links.inc | |||
| @@ -14,4 +14,6 @@ PACKAGECONFIG ??= "" | |||
| 14 | PACKAGECONFIG[bzip2] = "--with-bzip2,--without-bzip2,bzip2" | 14 | PACKAGECONFIG[bzip2] = "--with-bzip2,--without-bzip2,bzip2" |
| 15 | PACKAGECONFIG[lzma] = "--with-lzma,--without-lzma,xz" | 15 | PACKAGECONFIG[lzma] = "--with-lzma,--without-lzma,xz" |
| 16 | 16 | ||
| 17 | CVE_PRODUCT = "twibright_labs:links twibright:links links:links" | ||
| 18 | |||
| 17 | inherit autotools pkgconfig | 19 | inherit autotools pkgconfig |
diff --git a/meta-oe/recipes-support/links/links_2.29.bb b/meta-oe/recipes-support/links/links_2.29.bb index 311d84e484..e3a15d1819 100644 --- a/meta-oe/recipes-support/links/links_2.29.bb +++ b/meta-oe/recipes-support/links/links_2.29.bb | |||
| @@ -9,5 +9,3 @@ EXTRA_OECONF = "--enable-graphics \ | |||
| 9 | --without-directfb --without-pmshell --without-atheos \ | 9 | --without-directfb --without-pmshell --without-atheos \ |
| 10 | --without-x" | 10 | --without-x" |
| 11 | SRC_URI[sha256sum] = "22aa96c0b38e1a6f8f7ed9d7a4167a47fc37246097759ef6059ecf8f9ead7998" | 11 | SRC_URI[sha256sum] = "22aa96c0b38e1a6f8f7ed9d7a4167a47fc37246097759ef6059ecf8f9ead7998" |
| 12 | |||
| 13 | CVE_STATUS[CVE-2008-3319] = "cpe-incorrect: The recipe used in the `meta-openembedded` is a different links package compared to the one which has the CVE issue." | ||
diff --git a/meta-python/recipes-devtools/python/python3-icontract_2.6.6.bb b/meta-python/recipes-devtools/python/python3-icontract_2.7.2.bb index 5075a1a6a1..b906be4ac2 100644 --- a/meta-python/recipes-devtools/python/python3-icontract_2.6.6.bb +++ b/meta-python/recipes-devtools/python/python3-icontract_2.7.2.bb | |||
| @@ -7,7 +7,7 @@ PR = "r0" | |||
| 7 | 7 | ||
| 8 | inherit pypi setuptools3 | 8 | inherit pypi setuptools3 |
| 9 | PYPI_PACKAGE = "icontract" | 9 | PYPI_PACKAGE = "icontract" |
| 10 | SRC_URI[sha256sum] = "c1fd55c7709ef18a2ee64313fe863be2668b53060828fcca3525051160c92691" | 10 | SRC_URI[sha256sum] = "281ec16f1d09bbcca7a4227e82cd10b4d5fb291f638df77c29b7acf493dd3178" |
| 11 | 11 | ||
| 12 | RDEPENDS:${PN} += "python3-asttokens" | 12 | RDEPENDS:${PN} += "python3-asttokens" |
| 13 | 13 | ||
diff --git a/meta-python/recipes-devtools/python/python3-rich-toolkit_0.15.1.bb b/meta-python/recipes-devtools/python/python3-rich-toolkit_0.15.1.bb new file mode 100644 index 0000000000..b649d41575 --- /dev/null +++ b/meta-python/recipes-devtools/python/python3-rich-toolkit_0.15.1.bb | |||
| @@ -0,0 +1,17 @@ | |||
| 1 | SUMMARY = "Rich toolkit for building command-line applications" | ||
| 2 | HOMEPAGE = "https://github.com/patrick91/rich-toolkit" | ||
| 3 | LICENSE = "MIT" | ||
| 4 | LIC_FILES_CHKSUM = "file://pyproject.toml;md5=29c91c89ee62891477a1476375143bef;beginline=6;endline=6" | ||
| 5 | |||
| 6 | SRC_URI[sha256sum] = "6f9630eb29f3843d19d48c3bd5706a086d36d62016687f9d0efa027ddc2dd08a" | ||
| 7 | |||
| 8 | inherit pypi python_hatchling ptest-python-pytest | ||
| 9 | |||
| 10 | PYPI_PACKAGE = "rich_toolkit" | ||
| 11 | |||
| 12 | RDEPENDS:${PN} = "\ | ||
| 13 | python3-click \ | ||
| 14 | python3-rich \ | ||
| 15 | python3-typing-extensions \ | ||
| 16 | python3-inline-snapshot \ | ||
| 17 | " | ||
