A vulnerability in the lsi53c895a device affects the latest version
of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption
bugs like stack overflow or use-after-free.
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-0330
Upstream patches:
https://gitlab.com/qemu-project/qemu/-/
From: Trevor Gamblin
Fixes:
https://nvd.nist.gov/vuln/detail/CVE-2023-2609
d1ae836 patch 9.0.1531: crash when register contents ends up being invalid
https://nvd.nist.gov/vuln/detail/CVE-2023-2610
ab9a2d8 patch 9.0.1532: crash when expanding "~" in substitute causes very long
text
Signed-off-b
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an
insufficiently trustworthy search path, leading to remote code
execution if an agent is forwarded to an attacker-controlled system.
(Code in /usr/lib is not necessarily safe for loading into ssh-agent.)
NOTE: this issue exists because
qemu: hotplug/hotunplug mlx vdpa device to the occupied addr port,
then qemu core dump occurs after shutdown guest
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-3301
Upstream patches:
https://gitlab.com/qemu-project/qemu/-/commit/a0d7215e339b61c7d7a7b3fcf754954d80d93eb8
Signed-off-by: Ar
VNC: infinite loop in inflate_buffer() leads to denial of service
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-3255
Upstream patches:
https://gitlab.com/qemu-project/qemu/-/commit/d921fea338c1059a27ce7b75309d7a2e485f710b
Signed-off-by: Archana Polampalli
---
meta/recipes-devtools/qemu
9pfs: prevent opening special files
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-2861
Upstream patches:
https://github.com/qemu/qemu/commit/10fad73a2bf1c76c8aa9d6322755e5f877d83ce5
Signed-off-by: Archana Polampalli
---
meta/recipes-devtools/qemu/qemu.inc | 1 +
.../qemu/qe
Integer overflow vulnerability in pcre2test before 10.41 allows attackers
to cause a denial of service or other unspecified impacts via negative input.
References:
https://nvd.nist.gov/vuln/detail/CVE-2022-41409
Upstream patches:
https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d94507
Remove --enable-epoll and --disable-devpoll configuration option as these are
removed in bind-9.18.16
6b6076c882: Remove obsolete epoll/kqueue/devpoll configure options
Ref:
https://github.com/isc-projects/bind9/commit/6b6076c882a00028197b04a827f6cf8e7a5369de
Security fixes:
https://nvd.nis
Signed-off-by: Archana Polampalli
---
.../openssh/{openssh_9.3p1.bb => openssh_9.3p2.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-connectivity/openssh/{openssh_9.3p1.bb =>
openssh_9.3p2.bb} (98%)
diff --git a/meta/recipes-connectivity/openssh/opens
From: Chen Qi
Backport patch to fix CVE-2023-29491.
(From OE-Core rev: f1c95ae70f7aac574daf5b935a02bbba0d6f8a16)
Signed-off-by: Chen Qi
Signed-off-by: Alexandre Belloni
Signed-off-by: Richard Purdie
Signed-off-by: Archana Polampalli
---
.../files/0001-Fix-CVE-2023-29491.patch | 462 +
On Behalf Of Polampalli, Archana via
> lists.openembedded.org
> Sent: Tuesday, August 8, 2023 1:24 AM
> To: openembedded-core@lists.openembedded.org
> Cc: hari.gpil...@windriver.com
> Subject: [oe-core]mickledore][PATCH 1/1] bind: upgrade 9.18.5 -> 9.18.16
Typo in commit short me
Remove enable-epoll & disable-devpoll configure options no longer supported in
bind-9.18.16
6b6076c882: Remove obsolete epoll/kqueue/devpoll configure options
Security fixes:
https://nvd.nist.gov/vuln/detail/CVE-2023-2828
https://nvd.nist.gov/vuln/detail/CVE-2023-2911
Changelog:
https://gith
A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle()
in ghostscript. This issue may allow a local attacker to cause a denial of
service
via outputting a crafted PDF file for a DEVN device with gs.
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2023-38559
Upstream pat
A flaw was found in the QEMU virtual crypto device while handling data
encryption/decryption requests in virtio_crypto_handle_sym_req.
There is no check for the value of `src_len` and `dst_len` in
virtio_crypto_sym_op_helper, potentially leading to a heap buffer
overflow when the two values differ.
Fixes:
https://nvd.nist.gov/vuln/detail/CVE-2023-3896
8154e642a (tag: v9.0.1664) patch 9.0.1664: divide by zero when scrolling with
'smoothscroll' set
Signed-off-by: Archana Polampalli
---
meta/recipes-support/vim/vim.inc | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/m
nks,
Steve
On Thu, Aug 17, 2023 at 12:18 AM Polampalli, Archana via
lists.openembedded.org
wrote:
>
> Fixes:
> https://nvd.nist.gov/vuln/detail/CVE-2023-3896
> 8154e642a (tag: v9.0.1664) patch 9.0.1664: divide by zero when scrolling with
> 'smoothscroll' set
>
>
Fixes:
https://nvd.nist.gov/vuln/detail/CVE-2023-3896
8154e642a (tag: v9.0.1664) patch 9.0.1664: divide by zero when scrolling with
'smoothscroll' set
Signed-off-by: Archana Polampalli
---
meta/recipes-support/vim/vim.inc | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/m
This release only contains bugfixes.
Highlighted bugfixes in 1.20.7:
Security fixes for flacparse, dvdspu, and subparse, and the RealMedia demuxer
h265parse: Fix framerate handling
filesink: Fix buffered mode writing of buffer lists and buffers with multiple
memories
asfmux, rtpbin_buffer_list t
From: Archana Polampalli
This includes CVE fix for CVE-2023-46246.
9198c1f2b (tag: v9.0.2068) patch 9.0.2068: [security] overflow in :history
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-46246
Signed-off-by: Archana Polampalli
---
meta/recipes-support/vim/vim.inc | 2 +-
1 file chang
From: Etienne Cordonnier
vim 8.3 has been out for a long time, so this comment is obsolete.
However we still need UPSTREAM_VERSION_UNKNOWN, since we ignore
the last digit of the upstream version number.
Test result:
$ devtool check-upgrade-status vim
...
INFO: vim 9.0.1
From: Richard Purdie
When making checkouts from git, the timestamps can vary and occasionally two
files
can end up with the same stamp. This triggers make to regenerate ru.cp1251.po
from
ru.po for example. If it isn't regenerated, the output isn't quite the same
leading
to reproducibility issu
From: Archana Polampalli
This includes CVE fix for CVE-2023-46246.
9198c1f2b (tag: v9.0.2068) patch 9.0.2068: [security] overflow in :history
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-46246
Signed-off-by: Archana Polampalli
---
meta/recipes-support/vim/vim.inc | 2 +-
1 file chang
From: Archana Polampalli
This includes CVE fix for CVE-2023-46246.
9198c1f2b (tag: v9.0.2068) patch 9.0.2068: [security] overflow in :history
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-46246
Signed-off-by: Archana Polampalli
---
meta/recipes-support/vim/vim.inc | 4 ++--
1 file cha
From: Archana Polampalli
This includes CVE fix for CVE-2023-46246.
9198c1f2b (tag: v9.0.2068) patch 9.0.2068: [security] overflow in :history
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-46246
Signed-off-by: Archana Polampalli
---
meta/recipes-support/vim/vim.inc | 4 ++--
1 file cha
ION: This email comes from a non Wind River email account!
Do not click links or open attachments unless you recognize the sender and know
the content is safe.
On Thu, 2023-11-16 at 04:15 +0000, Polampalli, Archana via
lists.openembedded.org wrote:
> From: Archana Polampalli
>
> This
From: Archana Polampalli
AV1 codec parser buffer overflow
Signed-off-by: Archana Polampalli
---
.../CVE-2023-44429.patch | 38 +++
.../gstreamer1.0-plugins-bad_1.20.7.bb| 1 +
2 files changed, 39 insertions(+)
create mode 100644
meta/recipes-mult
From: Archana Polampalli
This includes CVE fix for CVE-2023-48237.
6bf131888 (tag: v9.0.2112) patch 9.0.2112: [security]: overflow in shift_line
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-48237
Signed-off-by: Archana Polampalli
---
meta/recipes-support/vim/vim.inc | 4 ++--
1 file
From: Archana Polampalli
Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role
HID Device to initiate and establish an encrypted connection, and accept HID
keyboard reports,potentially permitting injection of HID messages when no user
interaction has occurred in the Central r
From: Archana Polampalli
Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role
HID Device to initiate and establish an encrypted connection, and accept HID
keyboard reports,potentially permitting injection of HID messages when no user
interaction has occurred in the Central r
NASM v2.16 was discovered to contain a heap buffer overflow in the
component quote_for_pmake() asm/nasm.c:856
References:
https://nvd.nist.gov/vuln/detail/CVE-2022-44370
Upstream patches:
https://github.com/netwide-assembler/nasm/commit/2d4e6952417ec6f08b6f135d2b5d0e19b7dae30d
Signed-off-by: Arc
Reminder!
Sent from Mail<https://go.microsoft.com/fwlink/?LinkId=550986> for Windows
From: Polampalli, Archana via
lists.openembedded.org<mailto:archana.polampalli=windriver@lists.openembedded.org>
Sent: 26 April 2023 12:17
To:
openembedded-core@lists.openembedded.org<mail
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7,
2.33.8,
2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted
`.gitmodules` file with submodule URLs that are longer than 1024 characters can
used
to exploit a bug in `config.c::git_config_copy_o
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7,
2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding
specially crafted input to `git apply --reject`, a path outside the working
tree can be overwritten with partially controlled contents (correspo
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7,
2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding
specially crafted input to `git apply --reject`, a path outside the working
tree can be overwritten with partially controlled contents (correspo
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7,
2.33.8,
2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted
`.gitmodules` file with submodule URLs that are longer than 1024 characters can
used
to exploit a bug in `config.c::git_config_copy_o
This is specific to Git-for-Windows.
Signed-off-by: Archana Polampalli
---
meta/recipes-devtools/git/git_2.39.2.bb | 2 ++
1 file changed, 2 insertions(+)
diff --git a/meta/recipes-devtools/git/git_2.39.2.bb
b/meta/recipes-devtools/git/git_2.39.2.bb
index 222e545f60..9fac9d13f8 100644
--- a/me
, 2018-04-21) Git was taught to avoid a costly gettext start-up when
there are not even any localized messages to work...
github.com
From: openembedded-core@lists.openembedded.org
on behalf of Polampalli, Archana via
lists.openembedded.org
Sent: Monday, May 22
This is specific to Git-for-Windows.
Signed-off-by: Archana Polampalli
---
meta/recipes-devtools/git/git_2.39.2.bb | 2 ++
1 file changed, 2 insertions(+)
diff --git a/meta/recipes-devtools/git/git_2.39.2.bb
b/meta/recipes-devtools/git/git_2.39.2.bb
index 222e545f60..9fac9d13f8 100644
--- a/me
From: Archana Polampalli
In ssh-agent in OpenSSH before 9.6, certain destination constraints can be
incompletely applied. When destination constraints are specified during
addition of PKCS#11-hosted private keys, these constraints are only applied
to the first key, even if a PKCS#11 token returns
From: Archana Polampalli
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or
host name has shell metacharacters, and this name is referenced by an expansion
token in certain situations. For example, an untrusted Git repository can have a
submodule with shell metachara
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ghostscript/CVE-2024-33870.patch | 92 +++
.../ghostscript/ghostscript_9.55.0.bb | 1 +
2 files changed, 93 insertions(+)
create mode 100644
meta/recipes-extended/ghostscript/ghostscript/CVE-2
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ghostscript/CVE-2024-33869-0001.patch | 39 ++
.../ghostscript/CVE-2024-33869-0002.patch | 52 +++
.../ghostscript/ghostscript_9.55.0.bb | 2 +
3 files changed, 93 insertions(+)
crea
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ghostscript/CVE-2023-52722.patch | 43 +++
.../ghostscript/ghostscript_9.55.0.bb | 1 +
2 files changed, 44 insertions(+)
create mode 100644
meta/recipes-extended/ghostscript/ghostscript/CVE-2
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ghostscript/CVE-2024-29510.patch | 84 +++
.../ghostscript/ghostscript_9.55.0.bb | 1 +
2 files changed, 85 insertions(+)
create mode 100644
meta/recipes-extended/ghostscript/ghostscript/CVE-2
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ghostscript/CVE-2024-33870.patch | 99 +++
.../ghostscript/ghostscript_10.02.1.bb| 1 +
2 files changed, 100 insertions(+)
create mode 100644
meta/recipes-extended/ghostscript/ghostscript/CVE-
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ghostscript/CVE-2024-33871.patch | 43 +++
.../ghostscript/ghostscript_10.02.1.bb| 1 +
2 files changed, 44 insertions(+)
create mode 100644
meta/recipes-extended/ghostscript/ghostscript/CVE-2
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ghostscript/CVE-2024-33869-0001.patch | 39 ++
.../ghostscript/CVE-2024-33869-0002.patch | 52 +++
.../ghostscript/ghostscript_10.02.1.bb| 2 +
3 files changed, 93 insertions(+)
crea
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ghostscript/CVE-2024-29510.patch | 84 +++
.../ghostscript/ghostscript_10.02.1.bb| 1 +
2 files changed, 85 insertions(+)
create mode 100644
meta/recipes-extended/ghostscript/ghostscript/CVE-2
From: Archana Polampalli
GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution
Vulnerability.
This vulnerability allows remote attackers to execute arbitrary code on affected
installations of GStreamer. Interaction with this library is required to
exploit this
vulnerability but
From: Archana Polampalli
https://gstreamer.freedesktop.org/releases/1.22/#1.22.12
Signed-off-by: Archana Polampalli
---
.../{gst-devtools_1.22.11.bb => gst-devtools_1.22.12.bb}| 2 +-
...reamer1.0-libav_1.22.11.bb => gstreamer1.0-libav_1.22.12.bb} | 2 +-
...{gstreamer1.0-omx_1.22.11.b
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../less/files/CVE-2024-32487.patch | 74 +++
meta/recipes-extended/less/less_643.bb| 1 +
2 files changed, 75 insertions(+)
create mode 100644 meta/recipes-extended/less/files/CVE-2024-32487.patc
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ofono/ofono/CVE-2023-2794-0001.patch | 38 ++
.../ofono/ofono/CVE-2023-2794-0002.patch | 33 +
.../ofono/ofono/CVE-2023-2794-0003.patch | 45 ++
.../ofono/ofono/CVE-2023-2794-0004.patch | 128 +
From: Archana Polampalli
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local
attacker
to execute arbitrary code via the ff_bwdif_filter_intra_c function in the
libavfilter/bwdifdsp.c:125:5 component.
Signed-off-by: Archana Polampalli
---
.../ffmpeg/ffmpeg/CVE-2023-4950
From: Archana Polampalli
FFmpeg version n6.1.1 was discovered to contain a heap use-after-free via the
av_hwframe_ctx_init function.
Signed-off-by: Archana Polampalli
---
.../ffmpeg/ffmpeg/CVE-2024-31578.patch| 49 +++
.../recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb | 1
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ffmpeg/ffmpeg/CVE-2024-31582.patch| 34 +++
.../recipes-multimedia/ffmpeg/ffmpeg_6.1.1.bb | 1 +
2 files changed, 35 insertions(+)
create mode 100644 meta/recipes-multimedia/ffmpeg/ffmpeg/CVE-2024-31582
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ghostscript/CVE-2024-29511-0001.patch | 100
.../ghostscript/CVE-2024-29511-0002.patch | 219 ++
.../ghostscript/ghostscript_9.55.0.bb | 2 +
3 files changed, 321 insertions(+)
create
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ghostscript/CVE-2024-29509.patch | 45 +++
.../ghostscript/ghostscript_9.55.0.bb | 1 +
2 files changed, 46 insertions(+)
create mode 100644
meta/recipes-extended/ghostscript/ghostscript/CVE-2
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../ghostscript/CVE-2024-29506.patch | 45 +++
.../ghostscript/ghostscript_9.55.0.bb | 1 +
2 files changed, 46 insertions(+)
create mode 100644
meta/recipes-extended/ghostscript/ghostscript/CVE-2
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
meta/recipes-devtools/go/go-1.17.13.inc | 1 +
.../go/go-1.21/CVE-2024-24791.patch | 359 ++
2 files changed, 360 insertions(+)
create mode 100644 meta/recipes-devtools/go/go-1.21/CVE-2024-24791.pa
From: Archana Polampalli
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local
attacker
to execute arbitrary code via the av_malloc function in libavutil/mem.c:105:9
component.
Signed-off-by: Archana Polampalli
---
.../ffmpeg/ffmpeg/CVE-2023-50008.patch| 29
From: Archana Polampalli
A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability
that exploits deterministic behavior in systems like GnuTLS, leading to
side-channel leaks. In specific scenarios, such as when using the
GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result i
From: Archana Polampalli
A flaw has been discovered in GnuTLS where an application crash can be induced
when attempting to verify a specially crafted .pem bundle using the
"certtool --verify-chain" command.
Signed-off-by: Archana Polampalli
---
.../gnutls/gnutls/CVE-2024-28835.patch| 4
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../CVE-2023-6.patch | 329 ++
.../gstreamer1.0-plugins-bad_1.20.7.bb| 1 +
2 files changed, 330 insertions(+)
create mode 100644
meta/recipes-multimedia/gstreamer/gstreamer1.0-pl
From: Archana Polampalli
A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow
bug
is triggered within the decode_submit_report() function during the SMS decoding.
It is assumed that the attack scenario is accessible from a compromised modem,
a malicious base station, or
From: Archana Polampalli
A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow
bug
is triggered within the sms_decode_address_field() function during the SMS
PDU decoding. It is assumed that the attack scenario is accessible from a
compromised
modem, a malicious base st
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../CVE-2024-0444.patch | 42 +++
.../gstreamer1.0-plugins-bad_1.20.7.bb| 1 +
2 files changed, 43 insertions(+)
create mode 100644
meta/recipes-multimedia/gstreamer/gstreamer1.0-plug
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../CVE-2023-6.patch | 329 ++
.../gstreamer1.0-plugins-bad_1.20.7.bb| 1 +
2 files changed, 330 insertions(+)
create mode 100644
meta/recipes-multimedia/gstreamer/gstreamer1.0-pl
From: Archana Polampalli
This release contains security fixes for
* CVE-2024-31080
* CVE-2024-31081
* CVE-2024-31082
* CVE-2024-31083
Changelog:
===
101caa1b0 (tag: xorg-server-21.1.12) xserver 21.1.12
117315640 render: fix refcounting of glyphs during ProcRenderAddGlyphs
0e34d8ebc Xqua
From: Archana Polampalli
Signed-off-by: Archana Polampalli
---
.../xserver-xorg/CVE-2024-31082.patch | 52 +++
.../xorg-xserver/xserver-xorg_21.1.8.bb | 1 +
2 files changed, 53 insertions(+)
create mode 100644
meta/recipes-graphics/xorg-xserver/xserver-xorg/CVE
From: Archana Polampalli
FreeGlyph() function declared in render/glyphstr_priv.h, it is not present in
current recipe version and introduced in later versions, added this change to
render/glyphstr.h
Signed-off-by: Archana Polampalli
---
.../xserver-xorg/CVE-2024-31083-0001.patch| 117 +
A Segmentation Fault issue discovered in in ieee_segment function in outieee.c
in nasm 2.14.03 and 2.15 allows remote attackers to cause a denial of service
via crafted assembly file.
References:
https://nvd.nist.gov/vuln/detail/CVE-2020-21528
Upstream patches:
https://github.com/netwide-assemble
Reminder,
Regards,
Archana
From: openembedded-core@lists.openembedded.org
on behalf of Polampalli, Archana via
lists.openembedded.org
Sent: 18 August 2023 13:19
To: openembedded-core@lists.openembedded.org
Cc: G Pillai, Hari
Subject: [oe-core][master
ow
the content is safe.
On Thu, 2023-09-07 at 09:23 +0000, Polampalli, Archana via
lists.openembedded.org wrote:
>
> Reminder,
>
FWIW the reason this patch was delayed is that doesn't apply properly
with fuzz warnings on master. I've forced it to apply in this case.
Cheers,
R
From: Richard Purdie
This includes multiple CVE fixes.
The license change is due to changes in maintainership, the license
itself is unchanged.
(From OE-Core rev: 91e66b93a0c0928f0c2cfe78e22898a6c9800f34)
Signed-off-by: Richard Purdie
Signed-off-by: Archana Polampalli
---
meta/recipes-suppo
From: Etienne Cordonnier
vim 8.3 has been out for a long time, so this comment is obsolete.
However we still need UPSTREAM_VERSION_UNKNOWN, since we ignore
the last digit of the upstream version number.
Test result:
$ devtool check-upgrade-status vim
...
INFO: vim 9.0.1
Fixes:
https://nvd.nist.gov/vuln/detail/CVE-2023-3896
8154e642a (tag: v9.0.1664) patch 9.0.1664: divide by zero when scrolling with
'smoothscroll' set
(From OE-Core rev: 4a1ab744142c9229f03a359b45e5e89a1fbae0d3)
Signed-off-by: Archana Polampalli
Signed-off-by: Richard Purdie
Signed-off-by: Arc
From: Richard Purdie
This includes multiple CVE fixes.
The license change is due to changes in maintainership, the license
itself is unchanged.
(From OE-Core rev: 91e66b93a0c0928f0c2cfe78e22898a6c9800f34)
Signed-off-by: Richard Purdie
Signed-off-by: Archana Polampalli
---
meta/recipes-suppo
In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote
code execution via crafted PostScript documents because they can switch to the
IJS device, or change the IjsServer parameter, after SAFER has been activated.
NOTE: it is a documented risk that the IJS server can be spe
gst-plugins-bad: Heap-based buffer overflow in the MXF file demuxer when
handling
malformed files with uncompressed video in GStreamer versions before 1.22.6
Signed-off-by: Archana Polampalli
---
.../CVE-2023-40474.patch | 118 ++
.../gstreamer1.0-plugins-ba
gst-plugins-bad: Integer overflow leading to heap overwrite in MXF file
handling with AES3 audio
Signed-off-by: Archana Polampalli
---
.../CVE-2023-40475.patch | 49 +++
.../gstreamer1.0-plugins-bad_1.20.7.bb| 1 +
2 files changed, 50 insertions(+)
gst-plugins-bad: h265parser: Fix possible overflow using max_sub_layers_minus1
Signed-off-by: Archana Polampalli
---
.../CVE-2023-40476.patch | 44 +++
.../gstreamer1.0-plugins-bad_1.20.7.bb| 1 +
2 files changed, 45 insertions(+)
create mode 100644
Hi Steve,
As you suggested Yogita will send V2 for all seven patches
Regards,
Archana
From: openembedded-core@lists.openembedded.org
on behalf of Steve Sakoman via
lists.openembedded.org
Sent: Tuesday, June 6, 2023 7:52 PM
To: st...@sakoman.com
Cc: Urade, Yog
Reminder,
Regards,
Archana
From: openembedded-core@lists.openembedded.org
on behalf of Polampalli, Archana via
lists.openembedded.org
Sent: Tuesday, May 9, 2023 6:33 PM
To: openembedded-core@lists.openembedded.org
Cc: G Pillai, Hari ; Polampalli, Archana
Reminder,
Regards,
archana
From: openembedded-core@lists.openembedded.org
on behalf of Polampalli, Archana via
lists.openembedded.org
Sent: Tuesday, May 9, 2023 6:44 PM
To: openembedded-core@lists.openembedded.org
Cc: G Pillai, Hari ; Polampalli, Archana
A heap-based buffer overflow vulnerability was found in Samba within
the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The
DES and Triple-DES decryption routines in the Heimdal GSSAPI library
allow a length-limited write buffer overflow on malloc() allocated
memory when presented with
The fix for CVE-2022-3437 included changing memcmp to be constant
time and a workaround for a compiler bug by adding "!= 0"
comparisons to the result of memcmp. When these patches were
backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and
possibly other branches) a logic inversion sneaked
Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos.
Versions prior to 7.7.1 are vulnerable to a denial of service
vulnerability in Heimdal's PKI certificate validation library,
affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as
any third-party applications using Heimdal's
A heap-based buffer overflow vulnerability was found in Samba within
the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The
DES and Triple-DES decryption routines in the Heimdal GSSAPI library
allow a length-limited write buffer overflow on malloc() allocated
memory when presented with
The fix for CVE-2022-3437 included changing memcmp to be constant
time and a workaround for a compiler bug by adding "!= 0"
comparisons to the result of memcmp. When these patches were
backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and
possibly other branches) a logic inversion sneaked
Please ignore this patch
Regards,
Archana
From: openembedded-core@lists.openembedded.org
on behalf of Polampalli, Archana via
lists.openembedded.org
Sent: Friday, June 16, 2023 5:42 PM
To: openembedded-core@lists.openembedded.org
Cc: G Pillai, Hari
Subject
Please ignore this patch
Regards,
Archana
From: openembedded-core@lists.openembedded.org
on behalf of Polampalli, Archana via
lists.openembedded.org
Sent: Friday, June 16, 2023 5:40 PM
To: openembedded-core@lists.openembedded.org
Cc: G Pillai, Hari
Subject
Please ignore this patch
Regards,
Archana
From: openembedded-core@lists.openembedded.org
on behalf of Polampalli, Archana via
lists.openembedded.org
Sent: Friday, June 16, 2023 5:35 PM
To: openembedded-core@lists.openembedded.org
Cc: G Pillai, Hari
Subject
Please Ignore this patch
Regards,
Archana
From: openembedded-core@lists.openembedded.org
on behalf of Polampalli, Archana via
lists.openembedded.org
Sent: Friday, June 16, 2023 5:34 PM
To: openembedded-core@lists.openembedded.org
Cc: G Pillai, Hari
Subject
Please ignore this patch
Regards,
Archana
From: openembedded-core@lists.openembedded.org
on behalf of Polampalli, Archana via
lists.openembedded.org
Sent: Friday, June 16, 2023 5:34 PM
To: openembedded-core@lists.openembedded.org
Cc: G Pillai, Hari
Subject
NASM v2.16 was discovered to contain a segmentation violation
in the component ieee_write_file at /output/outieee.c.
References:
https://nvd.nist.gov/vuln/detail/CVE-2022-46457
Upstream patches:
https://github.com/netwide-assembler/nasm/commit/c8af73112027fad0ecbb277e9cba257678c405af
Signed-off-
The go command may execute arbitrary code at build time when using cgo.
This may occur when running "go get" on a malicious module, or when running
any other command which builds untrusted code. This is can by triggered by
linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a
The go command may execute arbitrary code at build time when using cgo.
This may occur when running "go get" on a malicious module, or when running
any other command which builds untrusted code. This is can by triggered by
linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing
emb
The go command may generate unexpected code at build time when using cgo.
This may result in unexpected behavior when running a go program which uses cgo.
This may occur when running an untrusted module which contains directories
with newline characters in their names. Modules which are retrieved u
The go command may generate unexpected code at build time when using cgo.
This may result in unexpected behavior when running a go program which uses cgo.
This may occur when running an untrusted module which contains directories
with newline characters in their names. Modules which are retrieved u
From: Trevor Gamblin
Fixes:
https://nvd.nist.gov/vuln/detail/CVE-2023-2609
d1ae836 patch 9.0.1531: crash when register contents ends up being invalid
https://nvd.nist.gov/vuln/detail/CVE-2023-2610
ab9a2d8 patch 9.0.1532: crash when expanding "~" in substitute causes very long
text
Signed-off-b
1 - 100 of 186 matches
Mail list logo