Commit Graph

32450 Commits

Author SHA1 Message Date
Tom Geelen
5ce7d4c2ed
python3-sqlalchemy: upgrade 2.0.35 -> 2.0.36
Signed-off-by: Tom Geelen <t.f.g.geelen@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-21 16:22:43 -08:00
Tom Geelen
2bb5cdcbb3
python3-pytest-asyncio: upgrade 0.23.6 -> 0.24.0
Signed-off-by: Tom Geelen <t.f.g.geelen@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-21 16:22:43 -08:00
Tom Geelen
97fe5a3abb
python3-pyjwt: upgrade 2.9.0 -> 2.10.1
Signed-off-by: Tom Geelen <t.f.g.geelen@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-21 16:22:43 -08:00
Tom Geelen
55b7540e56
python3-propcache: upgrade 0.2.0 -> 0.2.1
Signed-off-by: Tom Geelen <t.f.g.geelen@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-21 16:22:42 -08:00
Tom Geelen
a7feabbc21
python3-pillow: upgrade 10.4.0 -> 11.0.0
Signed-off-by: Tom Geelen <t.f.g.geelen@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-21 16:22:42 -08:00
Tom Geelen
7f98c1aec1
python3-aiohttp: upgrade 3.11.8 -> 3.11.11
Signed-off-by: Tom Geelen <t.f.g.geelen@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-21 16:22:42 -08:00
Bartosz Golaszewski
d0b910a13f
python3-gpiod: update v2.2.2 -> v2.2.3
Small bugfix release addressing a potential crash due to a bad usage of
PyDict_Next() in the C extension.

Signed-off-by: Bartosz Golaszewski <bartosz.golaszewski@linaro.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:57 -08:00
Peter Marko
46f22a10be
weechat: upgrade 4.0.4 -> 4.5.0
Solves CVE-2024-46613

Update dependencies:
- remove openssl and icu
- add cjson and gettext-native

Remove patch to find gcrypt which is no longer needed.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:57 -08:00
Peter Marko
2d3988f7b6
wireshark: upgrade 4.2.8 -> 4.2.9
Solves CVE-2024-9781

Release notes:
https://www.wireshark.org/docs/relnotes/wireshark-4.2.7.html
https://www.wireshark.org/docs/relnotes/wireshark-4.2.8.html

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:57 -08:00
Peter Marko
576b84263b
sassc: ignore CVE-2022-43357
This CVE is fixed in current libsass recipe version.
So wrapper around it will also not show this problem.
It's usual usecase is to be statically linked with libsass which is
probably the reason why this is listed as vulnerable component.

[1] links [2] as issue tracker which points to [3] as fix.
[4] as base repository for the recipe is not involved and files from [3]
    are not present in this repository.

[1] https://nvd.nist.gov/vuln/detail/CVE-2022-43357
[2] https://github.com/sass/libsass/issues/3177
[3] https://github.com/sass/libsass/pull/3184
[4] https://github.com/sass/sassc/

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:56 -08:00
Peter Marko
607a446491
libmemcached: ignore CVE-2023-27478
Per [1] this is fixed by [2].
The commit message says that it is reverting feature added in:

$ git tag --no-contains d7a0084 | grep 1.0.18
1.0.18

This recipe is for the original memcached which is unmaintained now.
Hence the ignore instead of upgrade.

[1] https://nvd.nist.gov/vuln/detail/CVE-2023-27478
[2] https://github.com/awesomized/libmemcached/commit/48dcc61a

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:56 -08:00
Peter Marko
cdacbdf075
libmemcached: merge inc into bb
After removing old libmemcached recipe version, these is no reasons
anymore to have this split.
The memcached resurrected project uses cmake and different urls.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:56 -08:00
Peter Marko
7d3c32d609
libmemcached: remove recipe for version 1.0.7
This no longer compiles with latest toolchains.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:56 -08:00
Peter Marko
eea7188a24
php: upgrade 8.2.20 -> 8.2.26
Solves dozens of vulnerabilities. See
https://php.watch/versions/8.2/releases/8.2.21
https://php.watch/versions/8.2/releases/8.2.22
https://php.watch/versions/8.2/releases/8.2.23
https://php.watch/versions/8.2/releases/8.2.24
https://php.watch/versions/8.2/releases/8.2.25
https://php.watch/versions/8.2/releases/8.2.26

Removes CVE-2024-11233, CVE-2024-11234 and CVE-2024-11236 from
current cve metrics.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:56 -08:00
Peter Marko
fdbec64d99
memcached: upgrade 1.6.17 -> 1.6.33
Solves CVE-2023-46852 and CVE-2023-46853.

Upgrade done via "devtool upgrade".

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:56 -08:00
Peter Marko
65cc05d6ee
memcached: add UPSTREAM_CHECK_URI
Download URL is not listable so devtool upgrade fails.
Using homepage works as it contains link to latest release,

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:55 -08:00
Peter Marko
2a432397cd
opensc: mark CVE-2024-8443 as fixed
NVD tracks this CVE as version-less.
Per [1] this is fixed by following commits:

$ git tag --contains b28a3cef416fcfb92fbb9ea7fd3c71df52c6c9fc
0.26.0
0.26.0-rc1
$ git tag --contains 02e847458369c08421fd2d5e9a16a5f272c2de9e
0.26.0
0.26.0-rc1

[1] https://github.com/OpenSC/OpenSC/wiki/CVE-2024-8443

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:55 -08:00
Peter Marko
0b3e7c1fd6
opensc: upgrade 0.25.1 -> 0.26.0
Solves CVE-2024-45615, CVE-2024-45616, CVE-2024-45617, CVE-2024-45618,
CVE-2024-45619 and CVE-2024-45620.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:55 -08:00
Yogita Urade
54bbf1a630
postgresql: upgrade 16.4 -> 16.5
Includes fix for CVE-2024-10976, CVE-2024-10977, CVE-2024-10978
and CVE-2024-10979

Changelog:
https://www.postgresql.org/docs/release/16.5/

0003-configure.ac-bypass-autoconf-2.69-version-check.patch
Refreshed for 16.5

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:55 -08:00
Khem Raj
e1a8da10f0
7zip: Fix build with clang
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-20 19:47:50 -08:00
Khem Raj
3f800ed93d
xfce4-pulseaudio-plugin: Fix build with libwindowing 4.19.6
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 22:40:14 -08:00
Peter Marko
d8d45d9093
emlog: set CVE_PRODUCT
This will remove false-positive CVE-2024-50655 from reports.
There are different emlog components from other vendors around.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:33 -08:00
Peter Marko
889ccce684
memcached: ignore disputed CVE-2022-26635
Per [1] this is a problem of applications using memcached inproperly.

This should not be a CVE against php-memcached, but for whatever
software the issue was actually found in. php-memcached and
libmemcached provide a VERIFY_KEY flag if they're too lazy to
filter untrusted user input.

[1] https://github.com/php-memcached-dev/php-memcached/issues/519

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:33 -08:00
Peter Marko
de9eeb369e
swagger-ui: mark CVE-2016-1000229 as fixed
as per https://github.com/swagger-api/swagger-ui/issues/1865
NVD tracks this CVE as version-less.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:33 -08:00
Peter Marko
da2b5e8b93
apache2: ignore disputed CVE CVE-2007-0086
This CVE is officially disputed by Redhat with official statement in
https://nvd.nist.gov/vuln/detail/CVE-2007-0086

Red Hat does not consider this issue to be a security vulnerability.
The pottential attacker has to send acknowledgement packets periodically
to make server generate traffic. Exactly the same effect could be
achieved by simply downloading the file. The statement that setting the
TCP window size to arbitrarily high value would permit the attacker to
disconnect and stop sending ACKs is false, because Red Hat Enterprise
Linux limits the size of the TCP send buffer to 4MB by default.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:33 -08:00
Peter Marko
7e17f8cec0
spice-gtk: mark CVE-2012-4425 as fixed
It is fixed by [1] since 0.15.3.
NVD tracks this CVE as version-less.

[1] https://cgit.freedesktop.org/spice/spice-gtk/commit/?id=efbf867bb88845d5edf839550b54494b1bb752b9

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:33 -08:00
Peter Marko
87a1bcc149
redis: ignore CVE-2022-0543
This is Debian-specific CVE.
NVD tracks this CVE as version-less.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Peter Marko
36a7e409d8
monkey: ignore CVE-2013-1771
This is gentoo specific CVE.
NVD tracks this as version-less CVE.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Peter Marko
e5a12d5252
gattlib: mark CVE-2019-6498 as fixed
Our hash does not point to exact tag and CVE patch is already in.

We use: 33a8a275928b186381bb0aea0f9778e330e57ec3
Fix: 60b813a770

git describe --tags --match=v0.2 33a8a275928b186381bb0aea0f9778e330e57ec3 60b813a770e42fdb0e85c1d2da7a55327784b8d6
v0.2-262-g33a8a27
v0.2-85-g60b813a

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Peter Marko
073e845274
spice: ignore CVE-2016-0749
NVD tracks this as version-less CVE for spice.
It was fixed by [1] and [2] included in 0.13.2.

[1] 6b32af3e17
[2] 359ac42a7a

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Peter Marko
0e7733f1b8
apache2: remove old version references from CVEs
These were not updated on recipe upgrade.
To make maintenance easier, remove exact versions.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Peter Marko
1b86a60f62
apache2: ignore CVE-1999-0678 and CVE-1999-1412
These CVEs are specific to Debian and MAC OS X respectively.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Peter Marko
9bd6efd135
ace: ignore CVE-2009-1147
This CVE is for vmware ace.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:31 -08:00
Hongxu Jia
450798f0fc
android-tools: fix warning: library search path "/usr/lib/p7zip" is unsafe for cross-compilation
Refresh local patch to remove '-L/usr/lib/p7zip'

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:31 -08:00
Hongxu Jia
751cc692ee
Update p7zip to 7zip
Due to commit [Use 7zip 2409 to replace p7zip 16.02] applied,
update affected recipes

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:31 -08:00
Hongxu Jia
4cac1be12d
Use 7zip 24.09 to replace p7zip 16.02
According to DOC/readme.txt [1]:

    7-Zip and p7zip
    ===============
    Now there are two different ports of 7-Zip for Linux/macOS:

    1) p7zip - another port of 7-Zip for Linux, made by an independent developer.
       The latest version of p7zip now is 16.02, and that p7zip 16.02 is outdated now.
       http://sourceforge.net/projects/p7zip/

    2) 7-Zip for Linux/macOS - this package - it's new code with all changes from latest 7-Zip for Windows

Add recipe 7-zip [2] to instead of recipe p7zip[3] in which the upstream is dead since 2016

Use git repo to instead of tarball

Drop obsolete patches
- CVE-2016-9296.patch
- CVE-2017-17969.patch
- CVE-2018-5996.patch
- change_numMethods_from_bool_to_unsigned.patch
- 0001-Fix-two-buffer-overflow-vulnerabilities.patch
- 0001-Fix-narrowing-errors-Wc-11-narrowing.patch

License-Update: DOC/License.txt: Add BSD-2-Clause & BSD-3-Clause

The codec libraries was removed since 21.02 [4]

Refer debian to compile 7-zip [5]

Add link 7z.so to lib7z.so and create wrapper to command 7z
which required running with absolute path to link the library 7z.so

[1] https://salsa.debian.org/debian/7zip/-/blob/master/DOC/readme.txt?ref_type=heads
[2] https://sourceforge.net/projects/p7zip/
[3] https://www.7-zip.org/
[4] 6c6ed1eba9
[5] https://salsa.debian.org/debian/7zip/-/blob/master/debian/rules

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:31 -08:00
Kai Kang
e0f745b45e
xfce4-panel: 4.18.6 -> 4.20.0
Upgrade xfce4-panel from 4.18.6 to 4.20.0:

* add dependency libxfce4windowing
* set GDBUS_CODEGEN for configure
* rebase patches as well

The change log is at:

https://gitlab.xfce.org/xfce/xfce4-panel/-/blob/master/NEWS

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:31 -08:00
Kai Kang
b1b2dce41b
xfdesktop: 4.18.1 -> 4.20.0
Upgrade xfdesktop from 4.18.1 to 4.20.0:

* add dependency libxfce4windowing
* set variables from glib-2.0.pc in EXTRA_OECONF since paths have been
  removed from the .pc file in oe-core

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:30 -08:00
Kai Kang
6062a0c9af
libxfce4windowing: add recipe
Add recipe for libxfce4windowing 4.20.0 which is required by other xfce4
components such as xfce4-session, xfdesktop etc.

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:30 -08:00
Kai Kang
093a67bc62
xfce4-dev-tools: 4.18.1 -> 4.20.0
Upgrade xfce4-dev-tools from 4.18.1 to 4.20.0:

* add dependency meson-native

The change log is at:

https://gitlab.xfce.org/xfce/xfce4-dev-tools/-/blob/master/NEWS

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:30 -08:00
Kai Kang
021926bc92
xfwm4: 4.19.0 -> 4.20.0
4.20.0 (2024-12-15)
======
- Translation Updates:
  Finnish, Portuguese, Romanian

4.19.1 (2024-12-01)
======
- I18n: Update po/LINGUAS list
- hints: Fix buffer overflow in XChangeProperty
- Translation Updates:
  Finnish, Kurdish, Polish, Sinhala, Telugu, Vietnamese

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:30 -08:00
Kai Kang
fd2837f326
xfce4-settings: 4.18.3 -> 4.20.0
Upgrade xfce4-settings from 4.18.3 to 4.20.0:

* remove patch which has been applied in upstream already
  https://gitlab.xfce.org/xfce/xfce4-settings/-/commit/d1a04d4
* set GDBUS_CODEGEN in EXTRA_OECONF
* add PACKAGECONFIG wayland

The change log is at:

https://gitlab.xfce.org/xfce/xfce4-settings/-/blob/master/NEWS

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:29 -08:00
Kai Kang
5da5979066
xfconf: 4.18.2 -> 4.20.0
Update xfconf from 4.18.2 to 4.20.0:

* update EXTRA_OECONF to remove legacy perl setting, and add config for
  gdbug-codegen

The change log is at:

https://gitlab.xfce.org/xfce/xfconf/-/blob/master/NEWS

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:29 -08:00
Khem Raj
dedc9af69d
libnfs: Add gnutls build time dependency
It does not build without it.

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:29 -08:00
Khem Raj
8cbbded9ed
lua-lgi: Disable on architecture without luajit port
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:29 -08:00
Wang Mingyu
fc532e0db1
libp11: update 0.4.12 -> 0.4.13
0001-detect-correct-openssl-3.x.patch
removed since it's included in 0.4.13

Changelog:
=========
- Increased maximum PIN length
- Fixed several memory leaks
- Don't include libp11.rc VERSIONINFO into pkcs11
- Reimplement CI with GitHub Actions
- Improved tests
- Added static ENGINE (libpkcas11.a) build
- Added a workaround broken foreign key handling in OpenSSL
  3.0.12-3.0.13, 3.1.4-3.1.5, 3.2.0-3.2.1
- Added a workaround for conflicting atexit() callbacks
- Always login with PIN If FORCE_LOGIN is specified in openssl config
- Added OAEP support to RSA_private_decrypt
- Added PKCS11_enumerate_*_ext functions
- Fixed non-null-terminated label padding
- Fixed several object management issues
- Deferred libp11 initialization until needed

Signed-off-by: Wang Mingyu <wangmy@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:28 -08:00
Khem Raj
bd8748209b
libpeas: Disable lua support on architectures without luajit port
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:28 -08:00
Bartosz Golaszewski
0c59f9fc36
gpiod-sysfs-proxy: update v0.1.1 -> v0.1.2
Small bugfix release addressing some corner-cases spotted in testing.

Signed-off-by: Bartosz Golaszewski <bartosz.golaszewski@linaro.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:28 -08:00
Khem Raj
4bebe950d4
packagegroup-meta-oe: Remove libpeas from packagegroup-meta-oe-gnome
all libpeas recipes are in meta-gnome now.

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:28 -08:00
Markus Volk
3924888f6e
gedit: build with libpeas-1
Signed-off-by: Markus Volk <f_l_k@t-online.de>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 09:41:27 -08:00