diff options
Diffstat (limited to 'meta/recipes-extended')
15 files changed, 445 insertions, 5 deletions
diff --git a/meta/recipes-extended/asciidoc/asciidoc_9.1.0.bb b/meta/recipes-extended/asciidoc/asciidoc_9.1.0.bb index 523bf33f42..3869abee59 100644 --- a/meta/recipes-extended/asciidoc/asciidoc_9.1.0.bb +++ b/meta/recipes-extended/asciidoc/asciidoc_9.1.0.bb | |||
@@ -8,7 +8,7 @@ LICENSE = "GPLv2" | |||
8 | LIC_FILES_CHKSUM = "file://COPYRIGHT;md5=4e5d1baf6f20559e3bec172226a47e4e \ | 8 | LIC_FILES_CHKSUM = "file://COPYRIGHT;md5=4e5d1baf6f20559e3bec172226a47e4e \ |
9 | file://LICENSE;md5=b234ee4d69f5fce4486a80fdaf4a4263 " | 9 | file://LICENSE;md5=b234ee4d69f5fce4486a80fdaf4a4263 " |
10 | 10 | ||
11 | SRC_URI = "git://github.com/asciidoc/asciidoc-py3;protocol=https;branch=9.x" | 11 | SRC_URI = "git://github.com/asciidoc/asciidoc-py;protocol=https;branch=9.x" |
12 | SRCREV = "9705d428439530104ce55d0ba12e8ef9d1b57ad1" | 12 | SRCREV = "9705d428439530104ce55d0ba12e8ef9d1b57ad1" |
13 | 13 | ||
14 | DEPENDS = "libxml2-native libxslt-native docbook-xml-dtd4-native docbook-xsl-stylesheets-native" | 14 | DEPENDS = "libxml2-native libxslt-native docbook-xml-dtd4-native docbook-xsl-stylesheets-native" |
diff --git a/meta/recipes-extended/cups/cups.inc b/meta/recipes-extended/cups/cups.inc index beee614828..a667d1a142 100644 --- a/meta/recipes-extended/cups/cups.inc +++ b/meta/recipes-extended/cups/cups.inc | |||
@@ -44,7 +44,7 @@ PACKAGECONFIG ??= "${@bb.utils.contains('DISTRO_FEATURES', 'zeroconf', 'avahi', | |||
44 | PACKAGECONFIG[avahi] = "--enable-avahi,--disable-avahi,avahi" | 44 | PACKAGECONFIG[avahi] = "--enable-avahi,--disable-avahi,avahi" |
45 | PACKAGECONFIG[acl] = "--enable-acl,--disable-acl,acl" | 45 | PACKAGECONFIG[acl] = "--enable-acl,--disable-acl,acl" |
46 | PACKAGECONFIG[pam] = "--enable-pam --with-pam-module=unix, --disable-pam, libpam" | 46 | PACKAGECONFIG[pam] = "--enable-pam --with-pam-module=unix, --disable-pam, libpam" |
47 | PACKAGECONFIG[systemd] = "--with-systemd=${systemd_system_unitdir},--without-systemd,systemd" | 47 | PACKAGECONFIG[systemd] = "--with-systemd=${systemd_system_unitdir},--disable-systemd,systemd" |
48 | PACKAGECONFIG[xinetd] = "--with-xinetd=${sysconfdir}/xinetd.d,--without-xinetd,xinetd" | 48 | PACKAGECONFIG[xinetd] = "--with-xinetd=${sysconfdir}/xinetd.d,--without-xinetd,xinetd" |
49 | 49 | ||
50 | EXTRA_OECONF = " \ | 50 | EXTRA_OECONF = " \ |
diff --git a/meta/recipes-extended/ghostscript/ghostscript/CVE-2021-45949.patch b/meta/recipes-extended/ghostscript/ghostscript/CVE-2021-45949.patch new file mode 100644 index 0000000000..f312f89e04 --- /dev/null +++ b/meta/recipes-extended/ghostscript/ghostscript/CVE-2021-45949.patch | |||
@@ -0,0 +1,65 @@ | |||
1 | From 6643ff0cb837db3eade489ffff21e3e92eee2ae0 Mon Sep 17 00:00:00 2001 | ||
2 | From: Chris Liddell <chris.liddell@artifex.com> | ||
3 | Date: Fri, 28 Jan 2022 08:21:19 +0000 | ||
4 | Subject: [PATCH] [PATCH] Bug 703902: Fix op stack management in | ||
5 | sampled_data_continue() | ||
6 | |||
7 | Replace pop() (which does no checking, and doesn't handle stack extension | ||
8 | blocks) with ref_stack_pop() which does do all that. | ||
9 | |||
10 | We still use pop() in one case (it's faster), but we have to later use | ||
11 | ref_stack_pop() before calling sampled_data_sample() which also accesses the | ||
12 | op stack. | ||
13 | |||
14 | Fixes: | ||
15 | https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34675 | ||
16 | |||
17 | Upstream-Status: Backported [https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=2a3129365d3bc0d4a41f107ef175920d1505d1f7] | ||
18 | CVE: CVE-2021-45949 | ||
19 | Signed-off-by: Minjae Kim <flowergom@gmail.com> | ||
20 | --- | ||
21 | psi/zfsample.c | 13 ++++++++----- | ||
22 | 1 file changed, 8 insertions(+), 5 deletions(-) | ||
23 | |||
24 | diff --git a/psi/zfsample.c b/psi/zfsample.c | ||
25 | index 0023fa4..f84671f 100644 | ||
26 | --- a/psi/zfsample.c | ||
27 | +++ b/psi/zfsample.c | ||
28 | @@ -534,14 +534,17 @@ sampled_data_continue(i_ctx_t *i_ctx_p) | ||
29 | data_ptr[bps * i + j] = (byte)(cv >> ((bps - 1 - j) * 8)); /* MSB first */ | ||
30 | } | ||
31 | pop(num_out); /* Move op to base of result values */ | ||
32 | - | ||
33 | + /* From here on, we have to use ref_stack_pop() rather than pop() | ||
34 | + so that it handles stack extension blocks properly, before calling | ||
35 | + sampled_data_sample() which also uses the op stack. | ||
36 | + */ | ||
37 | /* Check if we are done collecting data. */ | ||
38 | |||
39 | if (increment_cube_indexes(params, penum->indexes)) { | ||
40 | if (stack_depth_adjust == 0) | ||
41 | - pop(O_STACK_PAD); /* Remove spare stack space */ | ||
42 | + ref_stack_pop(&o_stack, O_STACK_PAD); /* Remove spare stack space */ | ||
43 | else | ||
44 | - pop(stack_depth_adjust - num_out); | ||
45 | + ref_stack_pop(&o_stack, stack_depth_adjust - num_out); | ||
46 | /* Execute the closing procedure, if given */ | ||
47 | code = 0; | ||
48 | if (esp_finish_proc != 0) | ||
49 | @@ -554,11 +557,11 @@ sampled_data_continue(i_ctx_t *i_ctx_p) | ||
50 | if ((O_STACK_PAD - stack_depth_adjust) < 0) { | ||
51 | stack_depth_adjust = -(O_STACK_PAD - stack_depth_adjust); | ||
52 | check_op(stack_depth_adjust); | ||
53 | - pop(stack_depth_adjust); | ||
54 | + ref_stack_pop(&o_stack, stack_depth_adjust); | ||
55 | } | ||
56 | else { | ||
57 | check_ostack(O_STACK_PAD - stack_depth_adjust); | ||
58 | - push(O_STACK_PAD - stack_depth_adjust); | ||
59 | + ref_stack_push(&o_stack, O_STACK_PAD - stack_depth_adjust); | ||
60 | for (i=0;i<O_STACK_PAD - stack_depth_adjust;i++) | ||
61 | make_null(op - i); | ||
62 | } | ||
63 | -- | ||
64 | 2.17.1 | ||
65 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript/check-stack-limits-after-function-evalution.patch b/meta/recipes-extended/ghostscript/ghostscript/check-stack-limits-after-function-evalution.patch new file mode 100644 index 0000000000..722bab4ddb --- /dev/null +++ b/meta/recipes-extended/ghostscript/ghostscript/check-stack-limits-after-function-evalution.patch | |||
@@ -0,0 +1,51 @@ | |||
1 | From 7861fcad13c497728189feafb41cd57b5b50ea25 Mon Sep 17 00:00:00 2001 | ||
2 | From: Chris Liddell <chris.liddell@artifex.com> | ||
3 | Date: Fri, 12 Feb 2021 10:34:23 +0000 | ||
4 | Subject: [PATCH] oss-fuzz 30715: Check stack limits after function evaluation. | ||
5 | |||
6 | During function result sampling, after the callout to the Postscript | ||
7 | interpreter, make sure there is enough stack space available before pushing | ||
8 | or popping entries. | ||
9 | |||
10 | In thise case, the Postscript procedure for the "function" is totally invalid | ||
11 | (as a function), and leaves the op stack in an unrecoverable state (as far as | ||
12 | function evaluation is concerned). We end up popping more entries off the | ||
13 | stack than are available. | ||
14 | |||
15 | To cope, add in stack limit checking to throw an appropriate error when this | ||
16 | happens. | ||
17 | |||
18 | Upstream-Status: Backported [https://git.ghostscript.com/?p=ghostpdl.git;a=patch;h=7861fcad13c497728189feafb41cd57b5b50ea25] | ||
19 | Signed-off-by: Minjae Kim <flowergom@gmail.com> | ||
20 | --- | ||
21 | psi/zfsample.c | 14 +++++++++++--- | ||
22 | 1 file changed, 11 insertions(+), 3 deletions(-) | ||
23 | |||
24 | diff --git a/psi/zfsample.c b/psi/zfsample.c | ||
25 | index 290809405..652ae02c6 100644 | ||
26 | --- a/psi/zfsample.c | ||
27 | +++ b/psi/zfsample.c | ||
28 | @@ -551,9 +551,17 @@ sampled_data_continue(i_ctx_t *i_ctx_p) | ||
29 | } else { | ||
30 | if (stack_depth_adjust) { | ||
31 | stack_depth_adjust -= num_out; | ||
32 | - push(O_STACK_PAD - stack_depth_adjust); | ||
33 | - for (i=0;i<O_STACK_PAD - stack_depth_adjust;i++) | ||
34 | - make_null(op - i); | ||
35 | + if ((O_STACK_PAD - stack_depth_adjust) < 0) { | ||
36 | + stack_depth_adjust = -(O_STACK_PAD - stack_depth_adjust); | ||
37 | + check_op(stack_depth_adjust); | ||
38 | + pop(stack_depth_adjust); | ||
39 | + } | ||
40 | + else { | ||
41 | + check_ostack(O_STACK_PAD - stack_depth_adjust); | ||
42 | + push(O_STACK_PAD - stack_depth_adjust); | ||
43 | + for (i=0;i<O_STACK_PAD - stack_depth_adjust;i++) | ||
44 | + make_null(op - i); | ||
45 | + } | ||
46 | } | ||
47 | } | ||
48 | |||
49 | -- | ||
50 | 2.25.1 | ||
51 | |||
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.53.3.bb b/meta/recipes-extended/ghostscript/ghostscript_9.53.3.bb index 216822478f..958a88e968 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_9.53.3.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_9.53.3.bb | |||
@@ -34,6 +34,8 @@ SRC_URI_BASE = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/d | |||
34 | file://avoid-host-contamination.patch \ | 34 | file://avoid-host-contamination.patch \ |
35 | file://mkdir-p.patch \ | 35 | file://mkdir-p.patch \ |
36 | file://0001-Bug-704342-Include-device-specifier-strings-in-acces.patch \ | 36 | file://0001-Bug-704342-Include-device-specifier-strings-in-acces.patch \ |
37 | file://check-stack-limits-after-function-evalution.patch \ | ||
38 | file://CVE-2021-45949.patch \ | ||
37 | " | 39 | " |
38 | 40 | ||
39 | SRC_URI = "${SRC_URI_BASE} \ | 41 | SRC_URI = "${SRC_URI_BASE} \ |
diff --git a/meta/recipes-extended/libarchive/libarchive_3.5.1.bb b/meta/recipes-extended/libarchive/libarchive_3.5.3.bb index 1387b69066..92bb223784 100644 --- a/meta/recipes-extended/libarchive/libarchive_3.5.1.bb +++ b/meta/recipes-extended/libarchive/libarchive_3.5.3.bb | |||
@@ -34,7 +34,7 @@ EXTRA_OECONF += "--enable-largefile" | |||
34 | 34 | ||
35 | SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz" | 35 | SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz" |
36 | 36 | ||
37 | SRC_URI[sha256sum] = "9015d109ec00bb9ae1a384b172bf2fc1dff41e2c66e5a9eeddf933af9db37f5a" | 37 | SRC_URI[sha256sum] = "72788e5f58d16febddfa262a5215e05fc9c79f2670f641ac039e6df44330ef51" |
38 | 38 | ||
39 | inherit autotools update-alternatives pkgconfig | 39 | inherit autotools update-alternatives pkgconfig |
40 | 40 | ||
diff --git a/meta/recipes-extended/lighttpd/lighttpd/0001-mod_extforward-fix-out-of-bounds-OOB-write-fixes-313.patch b/meta/recipes-extended/lighttpd/lighttpd/0001-mod_extforward-fix-out-of-bounds-OOB-write-fixes-313.patch new file mode 100644 index 0000000000..f4e93d1065 --- /dev/null +++ b/meta/recipes-extended/lighttpd/lighttpd/0001-mod_extforward-fix-out-of-bounds-OOB-write-fixes-313.patch | |||
@@ -0,0 +1,97 @@ | |||
1 | Upstream-Status: Backport | ||
2 | CVE: CVE-2022-22707 | ||
3 | Signed-off-by: Ross Burton <ross.burton@arm.com> | ||
4 | |||
5 | From 27103f3f8b1a2857aa45b889e775435f7daf141f Mon Sep 17 00:00:00 2001 | ||
6 | From: povcfe <povcfe@qq.com> | ||
7 | Date: Wed, 5 Jan 2022 11:11:09 +0000 | ||
8 | Subject: [PATCH] [mod_extforward] fix out-of-bounds (OOB) write (fixes #3134) | ||
9 | |||
10 | (thx povcfe) | ||
11 | |||
12 | (edited: gstrauss) | ||
13 | |||
14 | There is a potential remote denial of service in lighttpd mod_extforward | ||
15 | under specific, non-default and uncommon 32-bit lighttpd mod_extforward | ||
16 | configurations. | ||
17 | |||
18 | Under specific, non-default and uncommon lighttpd mod_extforward | ||
19 | configurations, a remote attacker can trigger a 4-byte out-of-bounds | ||
20 | write of value '-1' to the stack. This is not believed to be exploitable | ||
21 | in any way beyond triggering a crash of the lighttpd server on systems | ||
22 | where the lighttpd server has been built 32-bit and with compiler flags | ||
23 | which enable a stack canary -- gcc/clang -fstack-protector-strong or | ||
24 | -fstack-protector-all, but bug not visible with only -fstack-protector. | ||
25 | |||
26 | With standard lighttpd builds using -O2 optimization on 64-bit x86_64, | ||
27 | this bug has not been observed to cause adverse behavior, even with | ||
28 | gcc/clang -fstack-protector-strong. | ||
29 | |||
30 | For the bug to be reachable, the user must be using a non-default | ||
31 | lighttpd configuration which enables mod_extforward and configures | ||
32 | mod_extforward to accept and parse the "Forwarded" header from a trusted | ||
33 | proxy. At this time, support for RFC7239 Forwarded is not common in CDN | ||
34 | providers or popular web server reverse proxies. It bears repeating that | ||
35 | for the user to desire to configure lighttpd mod_extforward to accept | ||
36 | "Forwarded", the user must also be using a trusted proxy (in front of | ||
37 | lighttpd) which understands and actively modifies the "Forwarded" header | ||
38 | sent to lighttpd. | ||
39 | |||
40 | lighttpd natively supports RFC7239 "Forwarded" | ||
41 | hiawatha natively supports RFC7239 "Forwarded" | ||
42 | |||
43 | nginx can be manually configured to add a "Forwarded" header | ||
44 | https://www.nginx.com/resources/wiki/start/topics/examples/forwarded/ | ||
45 | |||
46 | A 64-bit build of lighttpd on x86_64 (not known to be affected by bug) | ||
47 | in front of another 32-bit lighttpd will detect and reject a malicious | ||
48 | "Forwarded" request header, thereby thwarting an attempt to trigger | ||
49 | this bug in an upstream 32-bit lighttpd. | ||
50 | |||
51 | The following servers currently do not natively support RFC7239 Forwarded: | ||
52 | nginx | ||
53 | apache2 | ||
54 | caddy | ||
55 | node.js | ||
56 | haproxy | ||
57 | squid | ||
58 | varnish-cache | ||
59 | litespeed | ||
60 | |||
61 | Given the general dearth of support for RFC7239 Forwarded in popular | ||
62 | CDNs and web server reverse proxies, and given the prerequisites in | ||
63 | lighttpd mod_extforward needed to reach this bug, the number of lighttpd | ||
64 | servers vulnerable to this bug is estimated to be vanishingly small. | ||
65 | Large systems using reverse proxies are likely running 64-bit lighttpd, | ||
66 | which is not known to be adversely affected by this bug. | ||
67 | |||
68 | In the future, it is desirable for more servers to implement RFC7239 | ||
69 | Forwarded. lighttpd developers would like to thank povcfe for reporting | ||
70 | this bug so that it can be fixed before more CDNs and web servers | ||
71 | implement RFC7239 Forwarded. | ||
72 | |||
73 | x-ref: | ||
74 | "mod_extforward plugin has out-of-bounds (OOB) write of 4-byte -1" | ||
75 | https://redmine.lighttpd.net/issues/3134 | ||
76 | (not yet written or published) | ||
77 | CVE-2022-22707 | ||
78 | --- | ||
79 | src/mod_extforward.c | 2 +- | ||
80 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
81 | |||
82 | diff --git a/src/mod_extforward.c b/src/mod_extforward.c | ||
83 | index ba957e04..fdaef7f6 100644 | ||
84 | --- a/src/mod_extforward.c | ||
85 | +++ b/src/mod_extforward.c | ||
86 | @@ -715,7 +715,7 @@ static handler_t mod_extforward_Forwarded (request_st * const r, plugin_data * c | ||
87 | while (s[i] == ' ' || s[i] == '\t') ++i; | ||
88 | if (s[i] == ';') { ++i; continue; } | ||
89 | if (s[i] == ',') { | ||
90 | - if (j >= (int)(sizeof(offsets)/sizeof(int))) break; | ||
91 | + if (j >= (int)(sizeof(offsets)/sizeof(int))-1) break; | ||
92 | offsets[++j] = -1; /*("offset" separating params from next proxy)*/ | ||
93 | ++i; | ||
94 | continue; | ||
95 | -- | ||
96 | 2.25.1 | ||
97 | |||
diff --git a/meta/recipes-extended/lighttpd/lighttpd_1.4.59.bb b/meta/recipes-extended/lighttpd/lighttpd_1.4.59.bb index cf7f478915..73443f77b4 100644 --- a/meta/recipes-extended/lighttpd/lighttpd_1.4.59.bb +++ b/meta/recipes-extended/lighttpd/lighttpd_1.4.59.bb | |||
@@ -14,6 +14,7 @@ RRECOMMENDS_${PN} = "lighttpd-module-access \ | |||
14 | lighttpd-module-accesslog" | 14 | lighttpd-module-accesslog" |
15 | 15 | ||
16 | SRC_URI = "http://download.lighttpd.net/lighttpd/releases-1.4.x/lighttpd-${PV}.tar.xz \ | 16 | SRC_URI = "http://download.lighttpd.net/lighttpd/releases-1.4.x/lighttpd-${PV}.tar.xz \ |
17 | file://0001-mod_extforward-fix-out-of-bounds-OOB-write-fixes-313.patch \ | ||
17 | file://index.html.lighttpd \ | 18 | file://index.html.lighttpd \ |
18 | file://lighttpd.conf \ | 19 | file://lighttpd.conf \ |
19 | file://lighttpd \ | 20 | file://lighttpd \ |
diff --git a/meta/recipes-extended/mc/files/0001-Ticket-4200-fix-FTBFS-with-ncurses-build-with-disabl.patch b/meta/recipes-extended/mc/files/0001-Ticket-4200-fix-FTBFS-with-ncurses-build-with-disabl.patch new file mode 100644 index 0000000000..408473664f --- /dev/null +++ b/meta/recipes-extended/mc/files/0001-Ticket-4200-fix-FTBFS-with-ncurses-build-with-disabl.patch | |||
@@ -0,0 +1,87 @@ | |||
1 | From e7bbf72544ab62db9c92bfe7bd1155227e78c621 Mon Sep 17 00:00:00 2001 | ||
2 | From: Andrew Borodin <aborodin@vmail.ru> | ||
3 | Date: Sat, 28 Aug 2021 11:46:53 +0300 | ||
4 | Subject: [PATCH] Ticket #4200: fix FTBFS with ncurses build with | ||
5 | --disable-widec. | ||
6 | |||
7 | Upstream-Status: Accepted [https://github.com/MidnightCommander/mc/commit/e7bbf72544] | ||
8 | Signed-off-by: Andrew Borodin <aborodin@vmail.ru> | ||
9 | --- | ||
10 | lib/tty/tty-ncurses.c | 8 ++++++++ | ||
11 | lib/tty/tty-ncurses.h | 5 +++++ | ||
12 | lib/tty/tty-slang.h | 2 ++ | ||
13 | src/filemanager/boxes.c | 2 ++ | ||
14 | 4 files changed, 17 insertions(+) | ||
15 | |||
16 | diff --git a/lib/tty/tty-ncurses.c b/lib/tty/tty-ncurses.c | ||
17 | index f619c0a7bf31..13058a624208 100644 | ||
18 | --- a/lib/tty/tty-ncurses.c | ||
19 | +++ b/lib/tty/tty-ncurses.c | ||
20 | @@ -560,6 +560,7 @@ tty_fill_region (int y, int x, int rows, int cols, unsigned char ch) | ||
21 | void | ||
22 | tty_colorize_area (int y, int x, int rows, int cols, int color) | ||
23 | { | ||
24 | +#ifdef ENABLE_SHADOWS | ||
25 | cchar_t *ctext; | ||
26 | wchar_t wch[10]; /* TODO not sure if the length is correct */ | ||
27 | attr_t attrs; | ||
28 | @@ -585,6 +586,13 @@ tty_colorize_area (int y, int x, int rows, int cols, int color) | ||
29 | } | ||
30 | |||
31 | g_free (ctext); | ||
32 | +#else | ||
33 | + (void) y; | ||
34 | + (void) x; | ||
35 | + (void) rows; | ||
36 | + (void) cols; | ||
37 | + (void) color; | ||
38 | +#endif /* ENABLE_SHADOWS */ | ||
39 | } | ||
40 | |||
41 | /* --------------------------------------------------------------------------------------------- */ | ||
42 | diff --git a/lib/tty/tty-ncurses.h b/lib/tty/tty-ncurses.h | ||
43 | index d75df9533ab9..8feb17ccd045 100644 | ||
44 | --- a/lib/tty/tty-ncurses.h | ||
45 | +++ b/lib/tty/tty-ncurses.h | ||
46 | @@ -30,6 +30,11 @@ | ||
47 | #define NCURSES_CONST const | ||
48 | #endif | ||
49 | |||
50 | +/* do not draw shadows if NCurses is built with --disable-widec */ | ||
51 | +#if defined(NCURSES_WIDECHAR) && NCURSES_WIDECHAR | ||
52 | +#define ENABLE_SHADOWS 1 | ||
53 | +#endif | ||
54 | + | ||
55 | /*** typedefs(not structures) and defined constants **********************************************/ | ||
56 | |||
57 | /*** enums ***************************************************************************************/ | ||
58 | diff --git a/lib/tty/tty-slang.h b/lib/tty/tty-slang.h | ||
59 | index 5b12c6512853..eeaade388af4 100644 | ||
60 | --- a/lib/tty/tty-slang.h | ||
61 | +++ b/lib/tty/tty-slang.h | ||
62 | @@ -23,6 +23,8 @@ | ||
63 | #define COLS SLtt_Screen_Cols | ||
64 | #define LINES SLtt_Screen_Rows | ||
65 | |||
66 | +#define ENABLE_SHADOWS 1 | ||
67 | + | ||
68 | /*** enums ***************************************************************************************/ | ||
69 | |||
70 | enum | ||
71 | diff --git a/src/filemanager/boxes.c b/src/filemanager/boxes.c | ||
72 | index 3eb525be4a9b..98df5ff2ed9a 100644 | ||
73 | --- a/src/filemanager/boxes.c | ||
74 | +++ b/src/filemanager/boxes.c | ||
75 | @@ -280,7 +280,9 @@ appearance_box_callback (Widget * w, Widget * sender, widget_msg_t msg, int parm | ||
76 | switch (msg) | ||
77 | { | ||
78 | case MSG_INIT: | ||
79 | +#ifdef ENABLE_SHADOWS | ||
80 | if (!tty_use_colors ()) | ||
81 | +#endif | ||
82 | { | ||
83 | Widget *shadow; | ||
84 | |||
85 | -- | ||
86 | 2.34.1 | ||
87 | |||
diff --git a/meta/recipes-extended/mc/mc_4.8.26.bb b/meta/recipes-extended/mc/mc_4.8.26.bb index 6bc7e6e8e1..906778400e 100644 --- a/meta/recipes-extended/mc/mc_4.8.26.bb +++ b/meta/recipes-extended/mc/mc_4.8.26.bb | |||
@@ -12,6 +12,7 @@ SRC_URI = "http://www.midnight-commander.org/downloads/${BPN}-${PV}.tar.bz2 \ | |||
12 | file://0001-mc-replace-perl-w-with-use-warnings.patch \ | 12 | file://0001-mc-replace-perl-w-with-use-warnings.patch \ |
13 | file://nomandate.patch \ | 13 | file://nomandate.patch \ |
14 | file://CVE-2021-36370.patch \ | 14 | file://CVE-2021-36370.patch \ |
15 | file://0001-Ticket-4200-fix-FTBFS-with-ncurses-build-with-disabl.patch \ | ||
15 | " | 16 | " |
16 | SRC_URI[sha256sum] = "9d6358d0a351a455a1410aab57f33b6b48b0fcf31344b9a10b0ff497595979d1" | 17 | SRC_URI[sha256sum] = "9d6358d0a351a455a1410aab57f33b6b48b0fcf31344b9a10b0ff497595979d1" |
17 | 18 | ||
@@ -24,7 +25,9 @@ PACKAGECONFIG ??= "" | |||
24 | PACKAGECONFIG[smb] = "--enable-vfs-smb,--disable-vfs-smb,samba," | 25 | PACKAGECONFIG[smb] = "--enable-vfs-smb,--disable-vfs-smb,samba," |
25 | PACKAGECONFIG[sftp] = "--enable-vfs-sftp,--disable-vfs-sftp,libssh2," | 26 | PACKAGECONFIG[sftp] = "--enable-vfs-sftp,--disable-vfs-sftp,libssh2," |
26 | 27 | ||
27 | CFLAGS_append_libc-musl = ' -DNCURSES_WIDECHAR=1 ' | 28 | # enable NCURSES_WIDECHAR=1 only if ENABLE_WIDEC has not been explicitly disabled (e.g. by the distro config). |
29 | # When compiling against the ncurses library, NCURSES_WIDECHAR needs to explicitly set to 0 in this case. | ||
30 | CFLAGS_append_libc-musl = "${@' -DNCURSES_WIDECHAR=1' if bb.utils.to_boolean((d.getVar('ENABLE_WIDEC') or 'True')) else ' -DNCURSES_WIDECHAR=0'}" | ||
28 | EXTRA_OECONF = "--with-screen=ncurses --without-gpm-mouse --without-x --disable-configure-args" | 31 | EXTRA_OECONF = "--with-screen=ncurses --without-gpm-mouse --without-x --disable-configure-args" |
29 | 32 | ||
30 | CACHED_CONFIGUREVARS += "ac_cv_path_PERL='/usr/bin/env perl'" | 33 | CACHED_CONFIGUREVARS += "ac_cv_path_PERL='/usr/bin/env perl'" |
diff --git a/meta/recipes-extended/pigz/files/0001-Fix-bug-when-combining-l-with-d.patch b/meta/recipes-extended/pigz/files/0001-Fix-bug-when-combining-l-with-d.patch new file mode 100644 index 0000000000..9c301f2054 --- /dev/null +++ b/meta/recipes-extended/pigz/files/0001-Fix-bug-when-combining-l-with-d.patch | |||
@@ -0,0 +1,50 @@ | |||
1 | From 65986f3d12d434b9bc428ceb6fcb1f6eeeb2c47d Mon Sep 17 00:00:00 2001 | ||
2 | From: Changqing Li <changqing.li@windriver.com> | ||
3 | Date: Mon, 17 Jan 2022 15:36:56 +0800 | ||
4 | Subject: [PATCH] Fix bug when combining -l with -d. | ||
5 | |||
6 | Though it makes no sense to do pigz -ld, that is implicit when | ||
7 | doing unpigz -l. This commit fixes a bug for that combination. | ||
8 | |||
9 | Upstream-Status: Backport [https://github.com/madler/pigz/commit/326bba44aa102c707dd6ebcd2fc3f413b3119db0] | ||
10 | |||
11 | Signed-off-by: Changqing Li <changqing.li@windriver.com> | ||
12 | --- | ||
13 | pigz.c | 14 +++++++------- | ||
14 | 1 file changed, 7 insertions(+), 7 deletions(-) | ||
15 | |||
16 | diff --git a/pigz.c b/pigz.c | ||
17 | index f90157f..d648216 100644 | ||
18 | --- a/pigz.c | ||
19 | +++ b/pigz.c | ||
20 | @@ -4007,6 +4007,13 @@ local void process(char *path) { | ||
21 | } | ||
22 | SET_BINARY_MODE(g.ind); | ||
23 | |||
24 | + // if requested, just list information about the input file | ||
25 | + if (g.list && g.decode != 2) { | ||
26 | + list_info(); | ||
27 | + load_end(); | ||
28 | + return; | ||
29 | + } | ||
30 | + | ||
31 | // if decoding or testing, try to read gzip header | ||
32 | if (g.decode) { | ||
33 | in_init(); | ||
34 | @@ -4048,13 +4055,6 @@ local void process(char *path) { | ||
35 | } | ||
36 | } | ||
37 | |||
38 | - // if requested, just list information about input file | ||
39 | - if (g.list) { | ||
40 | - list_info(); | ||
41 | - load_end(); | ||
42 | - return; | ||
43 | - } | ||
44 | - | ||
45 | // create output file out, descriptor outd | ||
46 | if (path == NULL || g.pipeout) { | ||
47 | // write to stdout | ||
48 | -- | ||
49 | 2.17.1 | ||
50 | |||
diff --git a/meta/recipes-extended/pigz/pigz_2.6.bb b/meta/recipes-extended/pigz/pigz_2.6.bb index 05be9b733f..5c0aab55a7 100644 --- a/meta/recipes-extended/pigz/pigz_2.6.bb +++ b/meta/recipes-extended/pigz/pigz_2.6.bb | |||
@@ -8,7 +8,8 @@ SECTION = "console/utils" | |||
8 | LICENSE = "Zlib & Apache-2.0" | 8 | LICENSE = "Zlib & Apache-2.0" |
9 | LIC_FILES_CHKSUM = "file://pigz.c;md5=9ae6dee8ceba9610596ed0ada493d142;beginline=7;endline=21" | 9 | LIC_FILES_CHKSUM = "file://pigz.c;md5=9ae6dee8ceba9610596ed0ada493d142;beginline=7;endline=21" |
10 | 10 | ||
11 | SRC_URI = "http://zlib.net/${BPN}/fossils/${BP}.tar.gz" | 11 | SRC_URI = "http://zlib.net/${BPN}/fossils/${BP}.tar.gz \ |
12 | file://0001-Fix-bug-when-combining-l-with-d.patch" | ||
12 | SRC_URI[sha256sum] = "2eed7b0d7449d1d70903f2a62cd6005d262eb3a8c9e98687bc8cbb5809db2a7d" | 13 | SRC_URI[sha256sum] = "2eed7b0d7449d1d70903f2a62cd6005d262eb3a8c9e98687bc8cbb5809db2a7d" |
13 | PROVIDES_class-native += "gzip-native" | 14 | PROVIDES_class-native += "gzip-native" |
14 | 15 | ||
diff --git a/meta/recipes-extended/zip/zip-3.0/0001-configure-use-correct-CPP.patch b/meta/recipes-extended/zip/zip-3.0/0001-configure-use-correct-CPP.patch new file mode 100644 index 0000000000..02253f968c --- /dev/null +++ b/meta/recipes-extended/zip/zip-3.0/0001-configure-use-correct-CPP.patch | |||
@@ -0,0 +1,47 @@ | |||
1 | From 7a2729ee7f5d9b9d4a0d9b83fe641a2ab03c4ee0 Mon Sep 17 00:00:00 2001 | ||
2 | From: Joe Slater <joe.slater@windriver.com> | ||
3 | Date: Thu, 24 Feb 2022 17:36:59 -0800 | ||
4 | Subject: [PATCH 1/2] configure: use correct CPP | ||
5 | |||
6 | configure uses CPP to test that two assembler routines | ||
7 | can be built. Unfortunately, it will use /usr/bin/cpp | ||
8 | if it exists, invalidating the tests. We use the $CC | ||
9 | passed to configure. | ||
10 | |||
11 | Upstream-Status: Inappropriate [openembedded specific] | ||
12 | |||
13 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
14 | --- | ||
15 | unix/configure | 15 +++++++++------ | ||
16 | 1 file changed, 9 insertions(+), 6 deletions(-) | ||
17 | |||
18 | diff --git a/unix/configure b/unix/configure | ||
19 | index 73ba803..7e21070 100644 | ||
20 | --- a/unix/configure | ||
21 | +++ b/unix/configure | ||
22 | @@ -220,13 +220,16 @@ fi | ||
23 | echo Check for the C preprocessor | ||
24 | # on SVR4, cc -E does not produce correct assembler files. Need /lib/cpp. | ||
25 | CPP="${CC} -E" | ||
26 | + | ||
27 | +# We should not change CPP for yocto builds. | ||
28 | +# | ||
29 | # solaris as(1) needs -P, maybe others as well ? | ||
30 | -[ -f /usr/ccs/lib/cpp ] && CPP="/usr/ccs/lib/cpp -P" | ||
31 | -[ -f /usr/lib/cpp ] && CPP=/usr/lib/cpp | ||
32 | -[ -f /lib/cpp ] && CPP=/lib/cpp | ||
33 | -[ -f /usr/bin/cpp ] && CPP=/usr/bin/cpp | ||
34 | -[ -f /xenix ] && CPP="${CC} -E" | ||
35 | -[ -f /lynx.os ] && CPP="${CC} -E" | ||
36 | +# [ -f /usr/ccs/lib/cpp ] && CPP="/usr/ccs/lib/cpp -P" | ||
37 | +# [ -f /usr/lib/cpp ] && CPP=/usr/lib/cpp | ||
38 | +# [ -f /lib/cpp ] && CPP=/lib/cpp | ||
39 | +# [ -f /usr/bin/cpp ] && CPP=/usr/bin/cpp | ||
40 | +# [ -f /xenix ] && CPP="${CC} -E" | ||
41 | +# [ -f /lynx.os ] && CPP="${CC} -E" | ||
42 | |||
43 | echo "#include <stdio.h>" > conftest.c | ||
44 | $CPP conftest.c >/dev/null 2>/dev/null || CPP="${CC} -E" | ||
45 | -- | ||
46 | 2.24.1 | ||
47 | |||
diff --git a/meta/recipes-extended/zip/zip-3.0/0002-configure-support-PIC-code-build.patch b/meta/recipes-extended/zip/zip-3.0/0002-configure-support-PIC-code-build.patch new file mode 100644 index 0000000000..6e0879616a --- /dev/null +++ b/meta/recipes-extended/zip/zip-3.0/0002-configure-support-PIC-code-build.patch | |||
@@ -0,0 +1,34 @@ | |||
1 | From b0492506d2c28581193906e9d260d4f0451e2c39 Mon Sep 17 00:00:00 2001 | ||
2 | From: Joe Slater <joe.slater@windriver.com> | ||
3 | Date: Thu, 24 Feb 2022 17:46:03 -0800 | ||
4 | Subject: [PATCH 2/2] configure: support PIC code build | ||
5 | |||
6 | Disable building match.S. The code requires | ||
7 | relocation in .text. | ||
8 | |||
9 | Upstream-Status: Inappropriate [openembedded specific] | ||
10 | |||
11 | Signed-off-by: Joe Slater <joe.slater@windriver.com> | ||
12 | --- | ||
13 | unix/configure | 5 +++-- | ||
14 | 1 file changed, 3 insertions(+), 2 deletions(-) | ||
15 | |||
16 | diff --git a/unix/configure b/unix/configure | ||
17 | index 7e21070..1bc698b 100644 | ||
18 | --- a/unix/configure | ||
19 | +++ b/unix/configure | ||
20 | @@ -242,8 +242,9 @@ if eval "$CPP match.S > _match.s 2>/dev/null"; then | ||
21 | if test ! -s _match.s || grep error < _match.s > /dev/null; then | ||
22 | : | ||
23 | elif eval "$CC -c _match.s >/dev/null 2>/dev/null" && [ -f _match.o ]; then | ||
24 | - CFLAGS="${CFLAGS} -DASMV" | ||
25 | - OBJA="match.o" | ||
26 | + # disable match.S for PIC code | ||
27 | + # CFLAGS="${CFLAGS} -DASMV" | ||
28 | + # OBJA="match.o" | ||
29 | echo "int foo() { return 0;}" > conftest.c | ||
30 | $CC -c conftest.c >/dev/null 2>/dev/null | ||
31 | echo Check if compiler generates underlines | ||
32 | -- | ||
33 | 2.24.1 | ||
34 | |||
diff --git a/meta/recipes-extended/zip/zip_3.0.bb b/meta/recipes-extended/zip/zip_3.0.bb index 18b5d8648e..f8e0b6e259 100644 --- a/meta/recipes-extended/zip/zip_3.0.bb +++ b/meta/recipes-extended/zip/zip_3.0.bb | |||
@@ -14,6 +14,8 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/infozip/Zip%203.x%20%28latest%29/3.0/zip30.tar. | |||
14 | file://fix-security-format.patch \ | 14 | file://fix-security-format.patch \ |
15 | file://10-remove-build-date.patch \ | 15 | file://10-remove-build-date.patch \ |
16 | file://zipnote-crashes-with-segfault.patch \ | 16 | file://zipnote-crashes-with-segfault.patch \ |
17 | file://0001-configure-use-correct-CPP.patch \ | ||
18 | file://0002-configure-support-PIC-code-build.patch \ | ||
17 | " | 19 | " |
18 | UPSTREAM_VERSION_UNKNOWN = "1" | 20 | UPSTREAM_VERSION_UNKNOWN = "1" |
19 | 21 | ||