[oe-core][mickledore][PATCH 1/1] qemu: fix CVE-2023-0330

2023-07-18 Thread Polampalli, Archana via lists.openembedded.org
A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free. References: https://nvd.nist.gov/vuln/detail/CVE-2023-0330 Upstream patches: https://gitlab.com/qemu-project/qemu/-/

[oe-core][mickledore][PATCH 1/1] vim: upgrade 9.0.1527 -> 9.0.1592

2023-07-20 Thread Polampalli, Archana via lists.openembedded.org
From: Trevor Gamblin Fixes: https://nvd.nist.gov/vuln/detail/CVE-2023-2609 d1ae836 patch 9.0.1531: crash when register contents ends up being invalid https://nvd.nist.gov/vuln/detail/CVE-2023-2610 ab9a2d8 patch 9.0.1532: crash when expanding "~" in substitute causes very long text Signed-off-b

[oe-core][kirkstone][PATCH 1/1] openssh: fix CVE-2023-38408

2023-07-28 Thread Polampalli, Archana via lists.openembedded.org
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because

[oe-core][kirkstone][PATCH 1/1] qemu: fix CVE-2023-3301

2023-07-31 Thread Polampalli, Archana via lists.openembedded.org
qemu: hotplug/hotunplug mlx vdpa device to the occupied addr port, then qemu core dump occurs after shutdown guest References: https://nvd.nist.gov/vuln/detail/CVE-2023-3301 Upstream patches: https://gitlab.com/qemu-project/qemu/-/commit/a0d7215e339b61c7d7a7b3fcf754954d80d93eb8 Signed-off-by: Ar

[oe-core][kirkstone][PATCH 1/1] qemu: fix CVE-2023-3255

2023-07-31 Thread Polampalli, Archana via lists.openembedded.org
VNC: infinite loop in inflate_buffer() leads to denial of service References: https://nvd.nist.gov/vuln/detail/CVE-2023-3255 Upstream patches: https://gitlab.com/qemu-project/qemu/-/commit/d921fea338c1059a27ce7b75309d7a2e485f710b Signed-off-by: Archana Polampalli --- meta/recipes-devtools/qemu

[oe-core][kirkstone][PATCH 1/1] qemu: fix CVE-2023-2861

2023-07-31 Thread Polampalli, Archana via lists.openembedded.org
9pfs: prevent opening special files References: https://nvd.nist.gov/vuln/detail/CVE-2023-2861 Upstream patches: https://github.com/qemu/qemu/commit/10fad73a2bf1c76c8aa9d6322755e5f877d83ce5 Signed-off-by: Archana Polampalli --- meta/recipes-devtools/qemu/qemu.inc | 1 + .../qemu/qe

[oe-core][kirkstone][PATCH 1/1] libpcre2: fix CVE-2022-41409

2023-08-03 Thread Polampalli, Archana via lists.openembedded.org
Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input. References: https://nvd.nist.gov/vuln/detail/CVE-2022-41409 Upstream patches: https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d94507

[oe-core]mickledore][PATCH 1/1] bind: upgrade 9.18.5 -> 9.18.16

2023-08-07 Thread Polampalli, Archana via lists.openembedded.org
Remove --enable-epoll and --disable-devpoll configuration option as these are removed in bind-9.18.16 6b6076c882: Remove obsolete epoll/kqueue/devpoll configure options Ref: https://github.com/isc-projects/bind9/commit/6b6076c882a00028197b04a827f6cf8e7a5369de Security fixes: https://nvd.nis

[oe-core]mickledore][PATCH 1/1] openssh: upgrade 9.3p1 -> 9.3p2

2023-08-07 Thread Polampalli, Archana via lists.openembedded.org
Signed-off-by: Archana Polampalli --- .../openssh/{openssh_9.3p1.bb => openssh_9.3p2.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-connectivity/openssh/{openssh_9.3p1.bb => openssh_9.3p2.bb} (98%) diff --git a/meta/recipes-connectivity/openssh/opens

[oe-core]mickledore][PATCH 1/1] ncurses: fix CVE-2023-29491

2023-08-07 Thread Polampalli, Archana via lists.openembedded.org
From: Chen Qi Backport patch to fix CVE-2023-29491. (From OE-Core rev: f1c95ae70f7aac574daf5b935a02bbba0d6f8a16) Signed-off-by: Chen Qi Signed-off-by: Alexandre Belloni Signed-off-by: Richard Purdie Signed-off-by: Archana Polampalli --- .../files/0001-Fix-CVE-2023-29491.patch | 462 +

Re: [oe-core]mickledore][PATCH 1/1] bind: upgrade 9.18.5 -> 9.18.16

2023-08-07 Thread Polampalli, Archana via lists.openembedded.org
On Behalf Of Polampalli, Archana via > lists.openembedded.org > Sent: Tuesday, August 8, 2023 1:24 AM > To: openembedded-core@lists.openembedded.org > Cc: hari.gpil...@windriver.com > Subject: [oe-core]mickledore][PATCH 1/1] bind: upgrade 9.18.5 -> 9.18.16 Typo in commit short me

[oe-core]mickledore][PATCH 1/1] bind: upgrade 9.18.15 -> 9.18.16

2023-08-07 Thread Polampalli, Archana via lists.openembedded.org
Remove enable-epoll & disable-devpoll configure options no longer supported in bind-9.18.16 6b6076c882: Remove obsolete epoll/kqueue/devpoll configure options Security fixes: https://nvd.nist.gov/vuln/detail/CVE-2023-2828 https://nvd.nist.gov/vuln/detail/CVE-2023-2911 Changelog: https://gith

[oe-core][kirkstone][PATCH 1/1] ghostscript: fix CVE-2023-38559

2023-08-10 Thread Polampalli, Archana via lists.openembedded.org
A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs. Reference: https://nvd.nist.gov/vuln/detail/CVE-2023-38559 Upstream pat

[oe-core][kirkstone][PATCH 1/1] qemu: fix CVE-2023-3180

2023-08-14 Thread Polampalli, Archana via lists.openembedded.org
A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.

[oe-core][kirkstone][PATCH 1/1] vim: upgrade 9.0.1592 -> 9.0.1664

2023-08-17 Thread Polampalli, Archana via lists.openembedded.org
Fixes: https://nvd.nist.gov/vuln/detail/CVE-2023-3896 8154e642a (tag: v9.0.1664) patch 9.0.1664: divide by zero when scrolling with 'smoothscroll' set Signed-off-by: Archana Polampalli --- meta/recipes-support/vim/vim.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/m

Re: [oe-core][kirkstone][PATCH 1/1] vim: upgrade 9.0.1592 -> 9.0.1664

2023-08-17 Thread Polampalli, Archana via lists.openembedded.org
nks, Steve On Thu, Aug 17, 2023 at 12:18 AM Polampalli, Archana via lists.openembedded.org wrote: > > Fixes: > https://nvd.nist.gov/vuln/detail/CVE-2023-3896 > 8154e642a (tag: v9.0.1664) patch 9.0.1664: divide by zero when scrolling with > 'smoothscroll' set > >

[oe-core][master][mickledore][PATCH 1/1] vim: upgrade 9.0.1592 -> 9.0.1664

2023-08-18 Thread Polampalli, Archana via lists.openembedded.org
Fixes: https://nvd.nist.gov/vuln/detail/CVE-2023-3896 8154e642a (tag: v9.0.1664) patch 9.0.1664: divide by zero when scrolling with 'smoothscroll' set Signed-off-by: Archana Polampalli --- meta/recipes-support/vim/vim.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/m

[oe-core][kirkstone][PATCH 1/1] gstreamer1.0: upgrade 1.20.6 -> 1.20.7

2023-08-21 Thread Polampalli, Archana via lists.openembedded.org
This release only contains bugfixes. Highlighted bugfixes in 1.20.7: Security fixes for flacparse, dvdspu, and subparse, and the RealMedia demuxer h265parse: Fix framerate handling filesink: Fix buffered mode writing of buffer lists and buffers with multiple memories asfmux, rtpbin_buffer_list t

[oe-core][master][kirkstone][PATCH 1/1] vim: Upgrade 9.0.2048 -> 9.0.2068

2023-11-15 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli This includes CVE fix for CVE-2023-46246. 9198c1f2b (tag: v9.0.2068) patch 9.0.2068: [security] overflow in :history References: https://nvd.nist.gov/vuln/detail/CVE-2023-46246 Signed-off-by: Archana Polampalli --- meta/recipes-support/vim/vim.inc | 2 +- 1 file chang

[oe-core][dunfell][PATCH 1/3] vim: update obsolete comment

2023-11-16 Thread Polampalli, Archana via lists.openembedded.org
From: Etienne Cordonnier vim 8.3 has been out for a long time, so this comment is obsolete. However we still need UPSTREAM_VERSION_UNKNOWN, since we ignore the last digit of the upstream version number. Test result: $ devtool check-upgrade-status vim ... INFO: vim 9.0.1

[oe-core][dunfell][PATCH 2/3] vim: Improve locale handling

2023-11-16 Thread Polampalli, Archana via lists.openembedded.org
From: Richard Purdie When making checkouts from git, the timestamps can vary and occasionally two files can end up with the same stamp. This triggers make to regenerate ru.cp1251.po from ru.po for example. If it isn't regenerated, the output isn't quite the same leading to reproducibility issu

[oe-core][dunfell][PATCH 3/3] vim: Upgrade 9.0.2048 -> 9.0.2068

2023-11-16 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli This includes CVE fix for CVE-2023-46246. 9198c1f2b (tag: v9.0.2068) patch 9.0.2068: [security] overflow in :history References: https://nvd.nist.gov/vuln/detail/CVE-2023-46246 Signed-off-by: Archana Polampalli --- meta/recipes-support/vim/vim.inc | 2 +- 1 file chang

[oe-core][master][kirkstone][PATCH V2 1/1] vim: Upgrade 9.0.2048 -> 9.0.2068

2023-11-16 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli This includes CVE fix for CVE-2023-46246. 9198c1f2b (tag: v9.0.2068) patch 9.0.2068: [security] overflow in :history References: https://nvd.nist.gov/vuln/detail/CVE-2023-46246 Signed-off-by: Archana Polampalli --- meta/recipes-support/vim/vim.inc | 4 ++-- 1 file cha

[oe-core][dunfell][PATCH V2 1/1] vim: Upgrade 9.0.2048 -> 9.0.2068

2023-11-16 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli This includes CVE fix for CVE-2023-46246. 9198c1f2b (tag: v9.0.2068) patch 9.0.2068: [security] overflow in :history References: https://nvd.nist.gov/vuln/detail/CVE-2023-46246 Signed-off-by: Archana Polampalli --- meta/recipes-support/vim/vim.inc | 4 ++-- 1 file cha

Re: [oe-core][master][kirkstone][PATCH 1/1] vim: Upgrade 9.0.2048 -> 9.0.2068

2023-11-16 Thread Polampalli, Archana via lists.openembedded.org
ION: This email comes from a non Wind River email account! Do not click links or open attachments unless you recognize the sender and know the content is safe. On Thu, 2023-11-16 at 04:15 +0000, Polampalli, Archana via lists.openembedded.org wrote: > From: Archana Polampalli > > This

[oe-core][kirkstone][PATCH 1/1] gstreamer1.0-plugins-bad: fix CVE-2023-44429

2023-11-22 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli AV1 codec parser buffer overflow Signed-off-by: Archana Polampalli --- .../CVE-2023-44429.patch | 38 +++ .../gstreamer1.0-plugins-bad_1.20.7.bb| 1 + 2 files changed, 39 insertions(+) create mode 100644 meta/recipes-mult

[oe-core][master][kirkstone][PATCH 1/1] vim: Upgrade 9.0.2068 -> 9.0.2112

2023-11-23 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli This includes CVE fix for CVE-2023-48237. 6bf131888 (tag: v9.0.2112) patch 9.0.2112: [security]: overflow in shift_line References: https://nvd.nist.gov/vuln/detail/CVE-2023-48237 Signed-off-by: Archana Polampalli --- meta/recipes-support/vim/vim.inc | 4 ++-- 1 file

[oe-core][kirkstone][PATCH 1/1] bluez5: fix CVE-2023-45866

2023-12-08 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports,potentially permitting injection of HID messages when no user interaction has occurred in the Central r

[oe-core][PATCH 1/1] bluez5: fix CVE-2023-45866

2023-12-08 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports,potentially permitting injection of HID messages when no user interaction has occurred in the Central r

[oe-core][kirkstone][PATCH 1/1] nasm: fix CVE-2022-44370

2023-04-25 Thread Polampalli, Archana via lists.openembedded.org
NASM v2.16 was discovered to contain a heap buffer overflow in the component quote_for_pmake() asm/nasm.c:856 References: https://nvd.nist.gov/vuln/detail/CVE-2022-44370 Upstream patches: https://github.com/netwide-assembler/nasm/commit/2d4e6952417ec6f08b6f135d2b5d0e19b7dae30d Signed-off-by: Arc

Re: [oe-core][kirkstone][PATCH 1/1] nasm: fix CVE-2022-44370

2023-05-02 Thread Polampalli, Archana via lists.openembedded.org
Reminder! Sent from Mail<https://go.microsoft.com/fwlink/?LinkId=550986> for Windows From: Polampalli, Archana via lists.openembedded.org<mailto:archana.polampalli=windriver@lists.openembedded.org> Sent: 26 April 2023 12:17 To: openembedded-core@lists.openembedded.org<mail

[oe-core][kirkstone][PATCH 1/1] git: fix CVE-2023-29007

2023-05-07 Thread Polampalli, Archana via lists.openembedded.org
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_o

[oe-core][kirkstone][PATCH 1/1] git: fix CVE-2023-25652

2023-05-07 Thread Polampalli, Archana via lists.openembedded.org
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (correspo

[oe-core][mickledore][PATCH 1/1] git: fix CVE-2023-25652

2023-05-09 Thread Polampalli, Archana via lists.openembedded.org
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (correspo

[oe-core][mickledore][PATCH 1/1] git: fix CVE-2023-29007

2023-05-09 Thread Polampalli, Archana via lists.openembedded.org
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_o

[oe-core][kirkstone][PATCH 1/1] git: ignore CVE-2023-25815

2023-05-22 Thread Polampalli, Archana via lists.openembedded.org
This is specific to Git-for-Windows. Signed-off-by: Archana Polampalli --- meta/recipes-devtools/git/git_2.39.2.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-devtools/git/git_2.39.2.bb b/meta/recipes-devtools/git/git_2.39.2.bb index 222e545f60..9fac9d13f8 100644 --- a/me

Re: [oe-core][kirkstone][PATCH 1/1] git: ignore CVE-2023-25815

2023-05-22 Thread Polampalli, Archana via lists.openembedded.org
, 2018-04-21) Git was taught to avoid a costly gettext start-up when there are not even any localized messages to work... github.com From: openembedded-core@lists.openembedded.org on behalf of Polampalli, Archana via lists.openembedded.org Sent: Monday, May 22

[oe-core][mickledore][PATCH 1/1] git: ignore CVE-2023-25815

2023-05-31 Thread Polampalli, Archana via lists.openembedded.org
This is specific to Git-for-Windows. Signed-off-by: Archana Polampalli --- meta/recipes-devtools/git/git_2.39.2.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-devtools/git/git_2.39.2.bb b/meta/recipes-devtools/git/git_2.39.2.bb index 222e545f60..9fac9d13f8 100644 --- a/me

[oe-core][kirkstone][PATCH 1/2] openssh: fix CVE-2023-51384

2023-12-27 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns

[oe-core][kirkstone][PATCH 2/2] openssh: fix CVE-2023-51385

2023-12-27 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metachara

[oe-core][kirkstone][PATCH 1/5] ghostscript: fix CVE-2024-33870

2024-05-28 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ghostscript/CVE-2024-33870.patch | 92 +++ .../ghostscript/ghostscript_9.55.0.bb | 1 + 2 files changed, 93 insertions(+) create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2

[oe-core][kirkstone][PATCH 2/5] ghostscript: fix CVE-2024-33869

2024-05-28 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ghostscript/CVE-2024-33869-0001.patch | 39 ++ .../ghostscript/CVE-2024-33869-0002.patch | 52 +++ .../ghostscript/ghostscript_9.55.0.bb | 2 + 3 files changed, 93 insertions(+) crea

[oe-core][kirkstone][PATCH 5/5] ghostscript: fix CVE-2023-52722

2024-05-28 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ghostscript/CVE-2023-52722.patch | 43 +++ .../ghostscript/ghostscript_9.55.0.bb | 1 + 2 files changed, 44 insertions(+) create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2

[oe-core][kirkstone][PATCH 4/5] ghostscript: fix CVE-2024-29510

2024-05-28 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ghostscript/CVE-2024-29510.patch | 84 +++ .../ghostscript/ghostscript_9.55.0.bb | 1 + 2 files changed, 85 insertions(+) create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2

[oe-core][scarthgap][PATCH 1/4] ghostscript: fix CVE-2024-33870

2024-05-28 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ghostscript/CVE-2024-33870.patch | 99 +++ .../ghostscript/ghostscript_10.02.1.bb| 1 + 2 files changed, 100 insertions(+) create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-

[oe-core][scarthgap][PATCH 3/4] ghostscript: fix CVE-2024-33871

2024-05-28 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ghostscript/CVE-2024-33871.patch | 43 +++ .../ghostscript/ghostscript_10.02.1.bb| 1 + 2 files changed, 44 insertions(+) create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2

[oe-core][scarthgap][PATCH 2/4] ghostscript: fix CVE-2024-33869

2024-05-28 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ghostscript/CVE-2024-33869-0001.patch | 39 ++ .../ghostscript/CVE-2024-33869-0002.patch | 52 +++ .../ghostscript/ghostscript_10.02.1.bb| 2 + 3 files changed, 93 insertions(+) crea

[oe-core][scarthgap][PATCH 4/4] ghostscript: fix CVE-2024-29510

2024-05-28 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ghostscript/CVE-2024-29510.patch | 84 +++ .../ghostscript/ghostscript_10.02.1.bb| 1 + 2 files changed, 85 insertions(+) create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2

[oe-core][kirkstone][PATCH 1/1] gstreamer1.0-plugins-base: fix CVE-2024-4453

2024-06-28 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but

[oe-core][scarthgap][PATCH 1/1] gstreamer: upgrade 1.22.11 -> 1.22.12

2024-06-28 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli https://gstreamer.freedesktop.org/releases/1.22/#1.22.12 Signed-off-by: Archana Polampalli --- .../{gst-devtools_1.22.11.bb => gst-devtools_1.22.12.bb}| 2 +- ...reamer1.0-libav_1.22.11.bb => gstreamer1.0-libav_1.22.12.bb} | 2 +- ...{gstreamer1.0-omx_1.22.11.b

[oe-core][scarthgap][PATCH 1/1] less: fix CVE-2024-32487

2024-07-16 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../less/files/CVE-2024-32487.patch | 74 +++ meta/recipes-extended/less/less_643.bb| 1 + 2 files changed, 75 insertions(+) create mode 100644 meta/recipes-extended/less/files/CVE-2024-32487.patc

[oe-core][scarthgap][PATCH 1/3] ofono: fix CVE-2023-2794

2024-07-24 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ofono/ofono/CVE-2023-2794-0001.patch | 38 ++ .../ofono/ofono/CVE-2023-2794-0002.patch | 33 + .../ofono/ofono/CVE-2023-2794-0003.patch | 45 ++ .../ofono/ofono/CVE-2023-2794-0004.patch | 128 +

[oe-core][scarthgap][PATCH 2/3] ffmpeg: fix CVE-2023-49502

2024-07-24 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the ff_bwdif_filter_intra_c function in the libavfilter/bwdifdsp.c:125:5 component. Signed-off-by: Archana Polampalli --- .../ffmpeg/ffmpeg/CVE-2023-4950

[oe-core][scarthgap][PATCH 3/3] ffmpeg: fix CVE-2024-31578

2024-07-24 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli FFmpeg version n6.1.1 was discovered to contain a heap use-after-free via the av_hwframe_ctx_init function. Signed-off-by: Archana Polampalli --- .../ffmpeg/ffmpeg/CVE-2024-31578.patch| 49 +++ .../recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb | 1

[oe-core][scarthgap][PATCH 1/1] ffmpeg: fix CVE-2024-31582

2024-08-05 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ffmpeg/ffmpeg/CVE-2024-31582.patch| 34 +++ .../recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb | 1 + 2 files changed, 35 insertions(+) create mode 100644 meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-31582

[oe-core][kirkstone][PATCH 1/1] ghostscript: fix CVE-2024-29511

2024-08-05 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ghostscript/CVE-2024-29511-0001.patch | 100 .../ghostscript/CVE-2024-29511-0002.patch | 219 ++ .../ghostscript/ghostscript_9.55.0.bb | 2 + 3 files changed, 321 insertions(+) create

[oe-core][kirkstone][PATCH 1/3] ghostscript: fix CVE-2024-29509

2024-08-08 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ghostscript/CVE-2024-29509.patch | 45 +++ .../ghostscript/ghostscript_9.55.0.bb | 1 + 2 files changed, 46 insertions(+) create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2

[oe-core][kirkstone][PATCH 2/3] ghostscript: fix CVE-2024-29506

2024-08-08 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../ghostscript/CVE-2024-29506.patch | 45 +++ .../ghostscript/ghostscript_9.55.0.bb | 1 + 2 files changed, 46 insertions(+) create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2

[oe-core][kirkstone][PATCH 3/3] go: fix CVE-2024-24791

2024-08-08 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- meta/recipes-devtools/go/go-1.17.13.inc | 1 + .../go/go-1.21/CVE-2024-24791.patch | 359 ++ 2 files changed, 360 insertions(+) create mode 100644 meta/recipes-devtools/go/go-1.21/CVE-2024-24791.pa

[oe-core][scarthgap][PATCH 1/1] ffmpeg: fix CVE-2023-50008

2024-08-12 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the av_malloc function in libavutil/mem.c:105:9 component. Signed-off-by: Archana Polampalli --- .../ffmpeg/ffmpeg/CVE-2023-50008.patch| 29

[oe-core][kirkstone][PATCH 1/2] gnutls: fix CVE-2024-28834

2024-04-19 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result i

[oe-core][kirkstone][PATCH 2/2] gnutls: fix CVE-2024-28835

2024-04-19 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command. Signed-off-by: Archana Polampalli --- .../gnutls/gnutls/CVE-2024-28835.patch| 4

[oe-core][kirkstone][PATCH 4/4] gstreamer1.0-plugins-bad: fix CVE-2023-44446

2024-05-03 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../CVE-2023-6.patch | 329 ++ .../gstreamer1.0-plugins-bad_1.20.7.bb| 1 + 2 files changed, 330 insertions(+) create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-pl

[oe-core][kirkstone][PATCH 1/4] ofono: fix CVE-2023-4234

2024-05-03 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decode_submit_report() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base station, or

[oe-core][kirkstone][PATCH 2/4] ofono: fix CVE-2023-4233

2024-05-03 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the sms_decode_address_field() function during the SMS PDU decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base st

[oe-core][kirkstone][PATCH 3/4] gstreamer1.0-plugins-bad: fix CVE-2024-0444

2024-05-03 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../CVE-2024-0444.patch | 42 +++ .../gstreamer1.0-plugins-bad_1.20.7.bb| 1 + 2 files changed, 43 insertions(+) create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-plug

[oe-core][kirkstone][PATCH V2 1/1] gstreamer1.0-plugins-bad: fix CVE-2023-44446

2024-05-05 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../CVE-2023-6.patch | 329 ++ .../gstreamer1.0-plugins-bad_1.20.7.bb| 1 + 2 files changed, 330 insertions(+) create mode 100644 meta/recipes-multimedia/gstreamer/gstreamer1.0-pl

[oe-core][master][scarthgap][PATCH 1/1] xserver-xorg: upgrade 21.1.11 -> 21.1.12

2024-05-08 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli This release contains security fixes for * CVE-2024-31080 * CVE-2024-31081 * CVE-2024-31082 * CVE-2024-31083 Changelog: === 101caa1b0 (tag: xorg-server-21.1.12) xserver 21.1.12 117315640 render: fix refcounting of glyphs during ProcRenderAddGlyphs 0e34d8ebc Xqua

[oe-core][kirkstone][PATCH 1/2] xserver-xorg: fix CVE-2024-31082

2024-05-08 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli Signed-off-by: Archana Polampalli --- .../xserver-xorg/CVE-2024-31082.patch | 52 +++ .../xorg-xserver/xserver-xorg_21.1.8.bb | 1 + 2 files changed, 53 insertions(+) create mode 100644 meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE

[oe-core][kirkstone][PATCH 2/2] xserver-xorg: fix CVE-2024-31083

2024-05-08 Thread Polampalli, Archana via lists.openembedded.org
From: Archana Polampalli FreeGlyph() function declared in render/glyphstr_priv.h, it is not present in current recipe version and introduced in later versions, added this change to render/glyphstr.h Signed-off-by: Archana Polampalli --- .../xserver-xorg/CVE-2024-31083-0001.patch| 117 +

[oe-core][kirkstone][PATCH 1/1] nasm: fix CVE-2020-21528

2023-09-05 Thread Polampalli, Archana via lists.openembedded.org
A Segmentation Fault issue discovered in in ieee_segment function in outieee.c in nasm 2.14.03 and 2.15 allows remote attackers to cause a denial of service via crafted assembly file. References: https://nvd.nist.gov/vuln/detail/CVE-2020-21528 Upstream patches: https://github.com/netwide-assemble

Re: [oe-core][master][mickledore][PATCH 1/1] vim: upgrade 9.0.1592 -> 9.0.1664

2023-09-07 Thread Polampalli, Archana via lists.openembedded.org
Reminder, Regards, Archana From: openembedded-core@lists.openembedded.org on behalf of Polampalli, Archana via lists.openembedded.org Sent: 18 August 2023 13:19 To: openembedded-core@lists.openembedded.org Cc: G Pillai, Hari Subject: [oe-core][master

Re: [oe-core][master][mickledore][PATCH 1/1] vim: upgrade 9.0.1592 -> 9.0.1664

2023-09-07 Thread Polampalli, Archana via lists.openembedded.org
ow the content is safe. On Thu, 2023-09-07 at 09:23 +0000, Polampalli, Archana via lists.openembedded.org wrote: > > Reminder, > FWIW the reason this patch was delayed is that doesn't apply properly with fuzz warnings on master. I've forced it to apply in this case. Cheers, R

[oe-core][mickledore][PATCH 1/1] vim: Upgrade 9.0.1664 -> 9.0.1894

2023-09-14 Thread Polampalli, Archana via lists.openembedded.org
From: Richard Purdie This includes multiple CVE fixes. The license change is due to changes in maintainership, the license itself is unchanged. (From OE-Core rev: 91e66b93a0c0928f0c2cfe78e22898a6c9800f34) Signed-off-by: Richard Purdie Signed-off-by: Archana Polampalli --- meta/recipes-suppo

[oe-core][kirkstone][PATCH 1/1] vim: update obsolete comment

2023-09-14 Thread Polampalli, Archana via lists.openembedded.org
From: Etienne Cordonnier vim 8.3 has been out for a long time, so this comment is obsolete. However we still need UPSTREAM_VERSION_UNKNOWN, since we ignore the last digit of the upstream version number. Test result: $ devtool check-upgrade-status vim ... INFO: vim 9.0.1

[oe-core][kirkstone][PATCH V2 1/1] vim: upgrade 9.0.1592 -> 9.0.1664

2023-09-14 Thread Polampalli, Archana via lists.openembedded.org
Fixes: https://nvd.nist.gov/vuln/detail/CVE-2023-3896 8154e642a (tag: v9.0.1664) patch 9.0.1664: divide by zero when scrolling with 'smoothscroll' set (From OE-Core rev: 4a1ab744142c9229f03a359b45e5e89a1fbae0d3) Signed-off-by: Archana Polampalli Signed-off-by: Richard Purdie Signed-off-by: Arc

[oe-core][kirkstone][PATCH 1/1] vim: Upgrade 9.0.1664 -> 9.0.1894

2023-09-14 Thread Polampalli, Archana via lists.openembedded.org
From: Richard Purdie This includes multiple CVE fixes. The license change is due to changes in maintainership, the license itself is unchanged. (From OE-Core rev: 91e66b93a0c0928f0c2cfe78e22898a6c9800f34) Signed-off-by: Richard Purdie Signed-off-by: Archana Polampalli --- meta/recipes-suppo

[oe-core][kirkstone][PATCH 1/1] ghostscript: fix CVE-2023-43115

2023-09-22 Thread Polampalli, Archana via lists.openembedded.org
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be spe

[oe-core][kirkstone][PATCH 1/3] gstreamer1.0-plugins-bad: fix CVE-2023-40474

2023-09-22 Thread Polampalli, Archana via lists.openembedded.org
gst-plugins-bad: Heap-based buffer overflow in the MXF file demuxer when handling malformed files with uncompressed video in GStreamer versions before 1.22.6 Signed-off-by: Archana Polampalli --- .../CVE-2023-40474.patch | 118 ++ .../gstreamer1.0-plugins-ba

[oe-core][kirkstone][PATCH 2/3] gstreamer1.0-plugins-bad: fix CVE-2023-40475

2023-09-22 Thread Polampalli, Archana via lists.openembedded.org
gst-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with AES3 audio Signed-off-by: Archana Polampalli --- .../CVE-2023-40475.patch | 49 +++ .../gstreamer1.0-plugins-bad_1.20.7.bb| 1 + 2 files changed, 50 insertions(+)

[oe-core][kirkstone][PATCH 3/3] gstreamer1.0-plugins-bad: fix CVE-2023-40476

2023-09-22 Thread Polampalli, Archana via lists.openembedded.org
gst-plugins-bad: h265parser: Fix possible overflow using max_sub_layers_minus1 Signed-off-by: Archana Polampalli --- .../CVE-2023-40476.patch | 44 +++ .../gstreamer1.0-plugins-bad_1.20.7.bb| 1 + 2 files changed, 45 insertions(+) create mode 100644

Re: [oe-core][kirkstone][PATCH 1/1] webkitgtk: fix CVE-2022-46691

2023-06-06 Thread Polampalli, Archana via lists.openembedded.org
Hi Steve, As you suggested Yogita will send V2 for all seven patches Regards, Archana From: openembedded-core@lists.openembedded.org on behalf of Steve Sakoman via lists.openembedded.org Sent: Tuesday, June 6, 2023 7:52 PM To: st...@sakoman.com Cc: Urade, Yog

Re: [oe-core][mickledore][PATCH 1/1] git: fix CVE-2023-25652

2023-06-13 Thread Polampalli, Archana via lists.openembedded.org
Reminder, Regards, Archana From: openembedded-core@lists.openembedded.org on behalf of Polampalli, Archana via lists.openembedded.org Sent: Tuesday, May 9, 2023 6:33 PM To: openembedded-core@lists.openembedded.org Cc: G Pillai, Hari ; Polampalli, Archana

Re: [oe-core][mickledore][PATCH 1/1] git: fix CVE-2023-29007

2023-06-13 Thread Polampalli, Archana via lists.openembedded.org
Reminder, Regards, archana From: openembedded-core@lists.openembedded.org on behalf of Polampalli, Archana via lists.openembedded.org Sent: Tuesday, May 9, 2023 6:44 PM To: openembedded-core@lists.openembedded.org Cc: G Pillai, Hari ; Polampalli, Archana

[OE-core] [PATCH] samba: fix CVE-2022-3437

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with

[OE-core] [PATCH] samba: fix CVE-2022-45142

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked

[OE-core] [PATCH] samba: fix CVE-2022-41916

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's

[OE-core] [oe][meta-networking][kirkstone][PATCH V2 1/1] samba: fix CVE-2022-3437

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with

[OE-core] [oe][meta-networking][kirkstone][PATCH V2 1/1] samba: fix CVE-2022-45142

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked

Re: [OE-core] [oe][meta-networking][kirkstone][PATCH V2 1/1] samba: fix CVE-2022-45142

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Please ignore this patch Regards, Archana From: openembedded-core@lists.openembedded.org on behalf of Polampalli, Archana via lists.openembedded.org Sent: Friday, June 16, 2023 5:42 PM To: openembedded-core@lists.openembedded.org Cc: G Pillai, Hari Subject

Re: [OE-core] [oe][meta-networking][kirkstone][PATCH V2 1/1] samba: fix CVE-2022-3437

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Please ignore this patch Regards, Archana From: openembedded-core@lists.openembedded.org on behalf of Polampalli, Archana via lists.openembedded.org Sent: Friday, June 16, 2023 5:40 PM To: openembedded-core@lists.openembedded.org Cc: G Pillai, Hari Subject

Re: [OE-core] [PATCH] samba: fix CVE-2022-41916

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Please ignore this patch Regards, Archana From: openembedded-core@lists.openembedded.org on behalf of Polampalli, Archana via lists.openembedded.org Sent: Friday, June 16, 2023 5:35 PM To: openembedded-core@lists.openembedded.org Cc: G Pillai, Hari Subject

Re: [OE-core] [PATCH] samba: fix CVE-2022-3437

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Please Ignore this patch Regards, Archana From: openembedded-core@lists.openembedded.org on behalf of Polampalli, Archana via lists.openembedded.org Sent: Friday, June 16, 2023 5:34 PM To: openembedded-core@lists.openembedded.org Cc: G Pillai, Hari Subject

Re: [OE-core] [PATCH] samba: fix CVE-2022-45142

2023-06-16 Thread Polampalli, Archana via lists.openembedded.org
Please ignore this patch Regards, Archana From: openembedded-core@lists.openembedded.org on behalf of Polampalli, Archana via lists.openembedded.org Sent: Friday, June 16, 2023 5:34 PM To: openembedded-core@lists.openembedded.org Cc: G Pillai, Hari Subject

[oe-core][kirkstone][PATCH 1/1] nasm: fix CVE-2022-46457

2023-06-19 Thread Polampalli, Archana via lists.openembedded.org
NASM v2.16 was discovered to contain a segmentation violation in the component ieee_write_file at /output/outieee.c. References: https://nvd.nist.gov/vuln/detail/CVE-2022-46457 Upstream patches: https://github.com/netwide-assembler/nasm/commit/c8af73112027fad0ecbb277e9cba257678c405af Signed-off-

[oe-core][kirkstone][PATCH 1/1] go: fix CVE-2023-29404

2023-06-21 Thread Polampalli, Archana via lists.openembedded.org
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a

[oe-core][kirkstone][PATCH 1/1] go: fix CVE-2023-29405

2023-06-21 Thread Polampalli, Archana via lists.openembedded.org
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing emb

[oe-core][kirkstone][PATCH 1/1] go: fix CVE-2023-29402

2023-06-26 Thread Polampalli, Archana via lists.openembedded.org
The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved u

[oe-core][kirkstone][PATCH V2 1/1] go: fix CVE-2023-29402

2023-06-27 Thread Polampalli, Archana via lists.openembedded.org
The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved u

[oe-core][kirkstone][PATCH 1/1] vim: upgrade 9.0.1527 -> 9.0.1592

2023-07-17 Thread Polampalli, Archana via lists.openembedded.org
From: Trevor Gamblin Fixes: https://nvd.nist.gov/vuln/detail/CVE-2023-2609 d1ae836 patch 9.0.1531: crash when register contents ends up being invalid https://nvd.nist.gov/vuln/detail/CVE-2023-2610 ab9a2d8 patch 9.0.1532: crash when expanding "~" in substitute causes very long text Signed-off-b

  1   2   >