From: Nikhil R
When building with GCC -Os, a warning is triggered indicating that sprintf
might overflow.
Error:
netname.c: In function 'user2netname':
netname.c:51:28: error: '%s' directive writing up to 255 bytes into a
region of size between 239 and 249 [-We
From: Nikhil R
When building with GCC -Os, a warning is triggered indicating that sprintf
might overflow.
Error:
netname.c: In function 'user2netname':
netname.c:51:28: error: '%s' directive writing up to 255 bytes into a
region of size between 239 and 249 [-We
From: Nikhil R
Ignore CVE-2023-46407 as Vulnerable code
introduced later than 5.0.1 version
Introduced by:
https://github.com/FFmpeg/FFmpeg/commit/f7ac3512f5b5cb8eb149f37300b43461d8e93af3
Debian link: https://security-tracker.debian.org/tracker/CVE-2023-46407
Signed-off-by: Nikhil R
libexpat through 2.5.0 allows a denial of service
(resource consumption) because many full reparsings
are required in the case of a large token for which
multiple buffer fills are needed.
References:
https://security-tracker.debian.org/tracker/CVE-2023-52425
https://ubuntu.com/security/CVE-2023-52
libexpat through 2.5.0 allows a denial of service
(resource consumption) because many full reparsings
are required in the case of a large token for which
multiple buffer fills are needed.
References:
https://security-tracker.debian.org/tracker/CVE-2023-52425
https://ubuntu.com/security/CVE-2023-52
libexpat through 2.5.0 allows a denial of service
(resource consumption) because many full reparsings
are required in the case of a large token for which
multiple buffer fills are needed.
References:
https://security-tracker.debian.org/tracker/CVE-2023-52425
https://ubuntu.com/security/CVE-2023-52
libexpat through 2.5.0 allows a denial of service
(resource consumption) because many full reparsings
are required in the case of a large token for which
multiple buffer fills are needed.
References:
https://security-tracker.debian.org/tracker/CVE-2023-52425
https://ubuntu.com/security/CVE-2023-52
libexpat through 2.5.0 allows a denial of service
(resource consumption) because many full reparsings
are required in the case of a large token for which
multiple buffer fills are needed.
References:
https://security-tracker.debian.org/tracker/CVE-2023-52425
https://ubuntu.com/security/CVE-2023-52
Whitelist CVE-2023-46407 as Vulnerable code
introduced later than 5.0.1 version
Introduced by:
https://github.com/FFmpeg/FFmpeg/commit/f7ac3512f5b5cb8eb149f37300b43461d8e93af3
Debian link: https://security-tracker.debian.org/tracker/CVE-2023-46407
Signed-off-by: Nikhil R
---
meta/recipes
Update LICENSE defined for xz packages to match the license
information provided in the xz COPYING file.
The License information from PACKAGERS file of xz mentions
packages with lzma files are in public domain.They ask to
use GPLv2+, if only it's not possible to mention "PD and GPLv2+".
Include P
Remove duplicated MIT license entry for libpciaccess
Duplication was done as part of below commit:
Link:
https://git.yoctoproject.org/poky/commit/meta/recipes-graphics/xorg-lib/libpciaccess_0.16.bb?h=kirkstone&id=b0130fcf91daee0d905af755302fabe608da141c
Signed-off-by: Bhabu Bindu
---
meta/rec
vg doesn't have GNU_HASH (didn't pass
LDFLAGS?) [ldflags] ERROR: librsvg-2.52.10-r0 do_package_qa: Fatal QA errors
were found, failing task.
Signed-off-by: Nikhil R
---
meta/recipes-gnome/librsvg/librsvg_2.56.3.bb | 2 ++
1 file changed, 2 insertions(+)
diff --git a/meta/r
vg doesn't have GNU_HASH (didn't pass
LDFLAGS?) [ldflags] ERROR: librsvg-2.52.10-r0 do_package_qa: Fatal QA errors
were found, failing task.
Signed-off-by: Nikhil R
---
meta/recipes-gnome/librsvg/librsvg_2.52.10.bb | 2 ++
1 file changed, 2 insertions(+)
diff --git a/meta/r
vg doesn't have GNU_HASH (didn't pass
LDFLAGS?) [ldflags] ERROR: librsvg-2.52.10-r0 do_package_qa: Fatal QA errors
were found, failing task.
Upstream-Status: Pending
gitlint-ignore: B1, CCL1
Signed-off-by: Nikhil R
---
meta/recipes-gnome/librsvg/librsvg_2.52.10.bb | 2 ++
1 file c
vg doesn't have GNU_HASH (didn't pass
LDFLAGS?) [ldflags] ERROR: librsvg-2.52.10-r0 do_package_qa: Fatal QA errors
were found, failing task.
Upstream-Status: Pending
gitlint-ignore: B1, CCL1
Signed-off-by: Nikhil R
---
meta/recipes-gnome/librsvg/librsvg_2.56.3.bb | 2 ++
1 file c
header in PNG files.
3. pngstest - verifies the integrity of PNG image by
dumping chunk level information.
4. timepng - provides details about PNG image chunks.
Signed-off-by: Nikhil R
---
.../distro/include/ptest-packagelists.inc | 1 +
.../recipes-multimedia/libpng/files/run-ptest | 29
header in PNG files.
3. pngstest - verifies the integrity of PNG image by
dumping chunk level information.
4. timepng - provides details about PNG image chunks.
Signed-off-by: Nikhil R
---
.../distro/include/ptest-packagelists.inc | 1 +
.../recipes-multimedia/libpng/files/run-ptest | 29
Add patch to fix CVE-2023-1999
Link:
https://github.com/webmproject/libwebp/commit/a486d800b60d0af4cc0836bf7ed8f21e12974129
Signed-off-by: Nikhil R
---
.../webp/files/CVE-2023-1999.patch| 55 +++
meta/recipes-multimedia/webp/libwebp_1.1.0.bb | 4 ++
2 files
Add patch to fix CVE-2023-1999
Link:
https://github.com/webmproject/libwebp/commit/a486d800b60d0af4cc0836bf7ed8f21e12974129
Signed-off-by: Nikhil R
---
.../webp/files/CVE-2023-1999.patch| 55 +++
meta/recipes-multimedia/webp/libwebp_1.1.0.bb | 4 ++
2 files
Remove 0001-Revised-handling-of-TIFFTAG_INKNAMES-and-related-TIF.patch
file from tiff as it was removed while upgrading tiff from
4.4.0 -> 4.5.0
Signed-off-by: Nikhil R
---
...-of-TIFFTAG_INKNAMES-and-related-TIF.patch | 267 --
1 file changed, 267 deletions(-)
delete m
20 matches
Mail list logo