[OE-core][kirkstone][PATCH] glibc: Suppress GCC -Os warning on user2netname for sunrpc

2025-02-03 Thread nikhil via lists.openembedded.org
From: Nikhil R When building with GCC -Os, a warning is triggered indicating that sprintf might overflow. Error: netname.c: In function 'user2netname': netname.c:51:28: error: '%s' directive writing up to 255 bytes into a region of size between 239 and 249 [-Werror=format-overflow=]

[OE-core][dunfell][PATCH] glibc: Suppress GCC -Os warning on user2netname for sunrpc

2025-02-03 Thread nikhil via lists.openembedded.org
From: Nikhil R When building with GCC -Os, a warning is triggered indicating that sprintf might overflow. Error: netname.c: In function 'user2netname': netname.c:51:28: error: '%s' directive writing up to 255 bytes into a region of size between 239 and 249 [-Werror=format-overflow=]

[OE-core][kirkstone][PATCH] ffmpeg: Ignore CVE-2023-46407

2024-09-23 Thread Nikhil via lists.openembedded.org
From: Nikhil R Ignore CVE-2023-46407 as Vulnerable code introduced later than 5.0.1 version Introduced by: https://github.com/FFmpeg/FFmpeg/commit/f7ac3512f5b5cb8eb149f37300b43461d8e93af3 Debian link: https://security-tracker.debian.org/tracker/CVE-2023-46407 Signed-off-by: Nikhil R --- meta

[OE-core][kirkstone][PATCH v4] expat: fix CVE-2023-52425

2024-08-22 Thread Nikhil via lists.openembedded.org
libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed. References: https://security-tracker.debian.org/tracker/CVE-2023-52425 https://ubuntu.com/security/CVE-2023-52

[OE-core][kirkstone][PATCH v3] expat: fix CVE-2023-52425

2024-08-12 Thread Nikhil via lists.openembedded.org
libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed. References: https://security-tracker.debian.org/tracker/CVE-2023-52425 https://ubuntu.com/security/CVE-2023-52

[OE-core][kirkstone][PATCH] expat: fix CVE-2023-52425

2024-08-12 Thread Nikhil via lists.openembedded.org
libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed. References: https://security-tracker.debian.org/tracker/CVE-2023-52425 https://ubuntu.com/security/CVE-2023-52

[OE-core][kirkstone][PATCH] expat: fix CVE-2023-52425

2024-08-09 Thread Nikhil via lists.openembedded.org
libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed. References: https://security-tracker.debian.org/tracker/CVE-2023-52425 https://ubuntu.com/security/CVE-2023-52

[OE-core][kirkstone][PATCH] expat: fix CVE-2023-52425

2024-08-09 Thread Nikhil via lists.openembedded.org
libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed. References: https://security-tracker.debian.org/tracker/CVE-2023-52425 https://ubuntu.com/security/CVE-2023-52