<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/meta-openembedded.git/meta-oe, branch stable/kirkstone-nut</title>
<subtitle>Mirror of git.openembedded.org/meta-openembedded</subtitle>
<id>https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=stable%2Fkirkstone-nut</id>
<link rel='self' href='https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=stable%2Fkirkstone-nut'/>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/'/>
<updated>2023-11-03T14:52:59+00:00</updated>
<entry>
<title>indent: fix CVE-2023-40305</title>
<updated>2023-11-03T14:52:59+00:00</updated>
<author>
<name>Yogita Urade</name>
<email>yogita.urade@windriver.com</email>
</author>
<published>2023-10-20T04:56:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=7da6cb848bc42b3e6bd5d2b37b52ba75510a6ca0'/>
<id>urn:sha1:7da6cb848bc42b3e6bd5d2b37b52ba75510a6ca0</id>
<content type='text'>
GNU indent 2.2.13 has a heap-based buffer overflow in search_brace
in indent.c via a crafted file.

Reference:
https://savannah.gnu.org/bugs/index.php?64503

Signed-off-by: Yogita Urade &lt;yogita.urade@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>suiteparse: Adapt to upstream branch name changes</title>
<updated>2023-11-03T14:49:44+00:00</updated>
<author>
<name>Richard Purdie</name>
<email>richard.purdie@linuxfoundation.org</email>
</author>
<published>2023-10-26T13:11:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=8274d201cbe36b2fc5feb409b4fc9f84d85afa97'/>
<id>urn:sha1:8274d201cbe36b2fc5feb409b4fc9f84d85afa97</id>
<content type='text'>
meta-oe master branch already made this change.

Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>c-ares: CVE-ID correction for CVE-2022-4904</title>
<updated>2023-09-27T14:23:10+00:00</updated>
<author>
<name>Shinu Chandran</name>
<email>shinucha@cisco.com</email>
</author>
<published>2023-09-25T05:42:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=b25e6a9e9111cbc0fc71e0e96c560c5cd2ee845d'/>
<id>urn:sha1:b25e6a9e9111cbc0fc71e0e96c560c5cd2ee845d</id>
<content type='text'>
- The c-ares commit https://github.com/c-ares/c-ares/commit/9903253c347f
  (Add str len check in config_sortlist to avoid stack overflow),
  fixes the CVE-2022-4904 instead of CVE-2022-4415
  https://security-tracker.debian.org/tracker/CVE-2022-4904
- CVE-ID inside the CVE-2022-4904.patch is wrong
  in the OE commit[092e125f44f6]
- Hence corrected the CVE-ID in CVE-2022-4904.patch

Signed-off-by: Shinu Chandran &lt;shinucha@cisco.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>openldap: update to 2.5.16</title>
<updated>2023-09-27T14:00:32+00:00</updated>
<author>
<name>Armin Kuster</name>
<email>akuster808@gmail.com</email>
</author>
<published>2023-09-27T11:58:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=06c077155c6fa02967fa1ee75dc0fd1974264ce3'/>
<id>urn:sha1:06c077155c6fa02967fa1ee75dc0fd1974264ce3</id>
<content type='text'>
2.5.x is an LTS version per the project.
Drop patch now included.

Signed-off-by: Armin Kuster &lt;akuster@mvista.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>freeglut: Add packageconfigs for x11/wayland/gles</title>
<updated>2023-09-23T17:38:46+00:00</updated>
<author>
<name>Khem Raj</name>
<email>raj.khem@gmail.com</email>
</author>
<published>2023-01-10T10:24:00+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=dd5003603b47bff937123c85f27e03e0eb34a15c'/>
<id>urn:sha1:dd5003603b47bff937123c85f27e03e0eb34a15c</id>
<content type='text'>
helps it compiling on on different openGL implementations which may not
implement fulll openGL specs

Signed-off-by: Khem Raj &lt;raj.khem@gmail.com&gt;
(cherry picked from commit a9212722c1b1a2ab29215651063ca94fb114c39b)
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>redis: upgrade 7.0.12 -&gt; 7.0.13</title>
<updated>2023-09-23T17:09:01+00:00</updated>
<author>
<name>Polampalli, Archana</name>
<email>archana.polampallii@windriver.com</email>
</author>
<published>2023-09-08T06:34:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=fcfdcc38085ac5e5f33a813b51642e067ac0e1e0'/>
<id>urn:sha1:fcfdcc38085ac5e5f33a813b51642e067ac0e1e0</id>
<content type='text'>
This release has only security and bug fixes.

ChangeLog:
https://github.com/redis/redis/releases/tag/7.0.13

Security Fixes:
https://nvd.nist.gov/vuln/detail/CVE-2023-41053

$ git log --oneline 7.0.12..7.0.13
49dbedb1d (tag: 7.0.13, origin/7.0) Redis 7.0.13
0f14d3279 Fix sort_ro get-keys function return wrong key number (#12522)
4d67bb6af do not call handleClientsBlockedOnKeys inside yielding command (#12459)
37599fe75 Ensure that the function load timeout is disabled during loading from RDB/AOF and on replicas. (#12451)
ea1bc6f62 Process loss of slot ownership in cluster bus (#12344)
646069a90 Skip test for sdsRemoveFreeSpace when mem_allocator is not jemalloc (#11878)

Signed-off-by: Archana Polampalli &lt;archana.polampalli@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster@mvista.com&gt;
</content>
</entry>
<entry>
<title>rabbitmq-c: Fix CVE-2023-35789</title>
<updated>2023-09-23T17:06:57+00:00</updated>
<author>
<name>Soumya Sambu</name>
<email>soumya.sambu@windriver.com</email>
</author>
<published>2023-09-06T13:22:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=6548426c43a43f5fefcd6b24320eef786309db9b'/>
<id>urn:sha1:6548426c43a43f5fefcd6b24320eef786309db9b</id>
<content type='text'>
An issue was discovered in the C AMQP client library (aka rabbitmq-c) through
0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g.,
for amqp-publish or amqp-consume) and are thus visible to local attackers by
listing a process and its arguments.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2023-35789

Signed-off-by: Soumya Sambu &lt;soumya.sambu@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster@mvista.com&gt;
</content>
</entry>
<entry>
<title>opensc: ignore CVE-2021-34193</title>
<updated>2023-09-19T11:55:41+00:00</updated>
<author>
<name>Jose Quaresma</name>
<email>quaresma.jose@gmail.com</email>
</author>
<published>2023-09-13T17:01:06+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=43a4259f68b72228bd17b2b5bdf08cb2fa0e6edb'/>
<id>urn:sha1:43a4259f68b72228bd17b2b5bdf08cb2fa0e6edb</id>
<content type='text'>
The CVE-2021-34193 is a duplicate CVE covering the 5 individual already fixed.

https://github.com/OpenSC/OpenSC/pull/2855

Signed-off-by: Jose Quaresma &lt;jose.quaresma@foundries.io&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>hdf5: Fix CVE-2021-37501</title>
<updated>2023-09-19T11:55:11+00:00</updated>
<author>
<name>Mingli Yu</name>
<email>mingli.yu@windriver.com</email>
</author>
<published>2023-09-11T06:54:00+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=04423e6ee7c1f90db38dd4bff8b1261b638c0774'/>
<id>urn:sha1:04423e6ee7c1f90db38dd4bff8b1261b638c0774</id>
<content type='text'>
Backport a patch [1] to fix CVE-2021-37501.

[1] https://github.com/HDFGroup/hdf5/commit/b16ec83d4bd79f9ffaad85de16056419f3532887

Signed-off-by: Mingli Yu &lt;mingli.yu@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>hwloc: fix CVE-2022-47022</title>
<updated>2023-09-06T13:13:26+00:00</updated>
<author>
<name>Soumya Sambu</name>
<email>soumya.sambu@windriver.com</email>
</author>
<published>2023-09-06T09:23:01+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=a88cb922f91fda95e8a584cee3092083d5ad3e98'/>
<id>urn:sha1:a88cb922f91fda95e8a584cee3092083d5ad3e98</id>
<content type='text'>
An issue was discovered in open-mpi hwloc 2.1.0 allows attackers to cause
a denial of service or other unspecified impacts via glibc-cpuset in topology-linux.c.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-47022
https://github.com/open-mpi/hwloc/issues/544

Signed-off-by: Soumya Sambu &lt;soumya.sambu@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
</feed>
