Commit Graph

69130 Commits

Author SHA1 Message Date
Fabien Thomas
a17b184237 package/nettle: add missing host-gmp dependency
Since the generic package infrastructure removed auto derivation of
host dependencies [1] (2016.08), the host dependencies must be
explicitly set.

While adding the nettle host variant [2] the gmp dependency was not
duplicated and host-nettle was built without host-gmp (or built with
gmp installed on the build machine).

While building host-gnutls required for building mkeficapsule u-boot
tool, the configure script check if Libhogweed (nettle's companion
library) is build with libgmp support.

If internal toolchain is used, luckily host-gmp is built before
building host-nettle (and host-gnutls). But when using prebuilt
external toolchain, following error shows up :

Libhogweed (nettle's companion library) 3.6 was not found. Note that you must compile nettle with gmp support.

[1] 4bdb067e38
[2] dac6e30118
[3] eb24bfa808

Signed-off-by: Fabien Thomas <fabien.thomas@smile.fr>
Reviewed-by: Romain Naour <romain.naour@smile.fr>
Acked-by: Romain Naour <romain.naour@smile.fr>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit db3a730e8ce42b8f70f469eafe53e9e5981e57b7)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-11-07 22:44:32 +01:00
Thomas Petazzoni
64afb0136d package/nettle: add missing dependency on host-m4
nettle uses m4 during its build process. Without it, the build fails
with:

m4 ./m4-utils.m4 ./asm.m4 config.m4 machine.m4 aes-decrypt-internal.asm >aes-decrypt-internal.s
/bin/sh: 1: m4: not found

For the target package this is not visible, as the existing gmp
dependency pulls in host-m4. But technically speaking, nettle needs
host-m4 directly, so it makes sense to have this dependency.

For the host package, it clearly fails to build, but probably isn't
very visible as most systems have m4 installed system-wide: this was
noticed when building inside Buildroot's minimal Docker
container. There are no recorded autobuilder failures for this issue.

Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit d4ca1b03c0d6f34d10d10cab06ca28c24a7d296d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-11-07 22:44:07 +01:00
Fabrice Fontaine
1adc7b166f package/sedutil: fix build with gcc >= 13
Fix the following build failure with gcc >= 13:

In file included from ./Common/log.h:45,
                 from LinuxPBA/LinuxPBA.cpp:25:
./Common/DtaOptions.h:33:5: error: 'uint8_t' does not name a type
   33 |     uint8_t password;   /**< password supplied */
      |     ^~~~~~~
./Common/DtaOptions.h:1:1: note: 'uint8_t' is defined in header '<cstdint>'; did you forget to '#include <cstdint>'?

Fixes:
 - http://autobuild.buildroot.org/results/b6feb4fb33d595414b61174deb9867e8c30cd186

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit bdf1506e9664b7b7d2441496192723e26383623d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-11-07 20:37:49 +01:00
Fabrice Fontaine
49c058cb04 package/wolfssl: security bump to version 5.6.4
[Medium] A fix was added, but still under review for completeness, for a
Bleichenbacher style attack, leading to being able to decrypt a saved
TLS connection and potentially forge a signature after probing with a
large number of trial connections. This issue is around RSA decryption
and affects static RSA cipher suites on the server side, which are not
recommended to be used and are off by default. Static RSA cipher suites
were also removed from the TLS 1.3 protocol and only present in TLS 1.2
and lower. All padding versions of RSA decrypt are affected since the
code under review is outside of the padding processing. Information
about the private keys is NOT compromised in affected code. It's
recommended to disable static RSA cipher suites and update the version
of wolfSSL used if using RSA private decryption alone outside of TLS.

https://github.com/wolfSSL/wolfssl/releases/tag/v5.6.4-stable

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit c4658ede712305455eaf72a67a74509d4434a46a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
godot-2023.08.x-1
2023-11-01 10:22:00 +01:00
Peter Korsgaard
fb20fe2cb0 package/xen: security bump to version 4.14.6
Includes a number of bugfixes and the security fixes up to xsa-436:
https://xenproject.org/downloads/xen-project-archives/xen-project-4-14-series/xen-project-4-14-6/

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 957e2d2ffd94aa51f043c75ff0adf8453127b1ab)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-11-01 10:21:47 +01:00
Fabrice Fontaine
e67ef0d8fa package/pango: fix build with gcc >= 13
Fix the following build failure with gcc >= 13:

In function 'find_best_lang_match_cached',
    inlined from 'find_best_lang_match_cached' at ../pango/pango-language.c:501:1,
    inlined from 'pango_language_get_scripts' at ../pango/pango-language.c:661:21:
../pango/pango-language.c:518:12: error: array subscript 0 is outside array bounds of 'const void *[0]' {aka 'const void *[]'} [-Werror=array-bounds=]
  518 |     *cache = result;
      |     ~~~~~~~^~~~~~~~
In function 'pango_language_get_scripts':
cc1: note: source object is likely at address zero
cc1: some warnings being treated as errors

Fixes:
 - http://autobuild.buildroot.org/results/e8b5a752a62621099942b29c1642747eef2930cb

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 477b39a1e08452a3210a71c4f83b6f910a062566)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-11-01 10:13:12 +01:00
Bernd Kuhls
71766b4fcd package/clamav: security bump version to 1.0.4
Release notes:
https://blog.clamav.net/2023/10/clamav-121-113-104-010311-patch.html

Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit ce7d054878ddfcdfaa4718085d6621c7f527f7ae)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-11-01 10:01:45 +01:00
Stefan Agner
2aaf51f867 package/docker-cli: bump version to v24.0.7
Minor bugfix in docker ps status description.

https://github.com/moby/moby/releases/tag/v24.0.7

Signed-off-by: Stefan Agner <stefan@agner.ch>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit ae2dc6ae619dfea517a833cd184890b8bca3768a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-11-01 09:58:51 +01:00
Stefan Agner
9971f8713c package/docker-engine: bump version to v24.0.7
The overlay2 layers metadata are now written atomically. Many other
bugfixes and hardening against security issues around the power capping
framework.

https://github.com/moby/moby/releases/tag/v24.0.7

Signed-off-by: Stefan Agner <stefan@agner.ch>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit d2290e614196bfec05c3bd08cdca1c98cb7d0bf2)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-11-01 09:58:42 +01:00
Peter Korsgaard
c4f67bf981 package/libopenssl: security bump to version 3.0.12
Fixes CVE-2023-5363:
https://www.openssl.org/news/secadv/20231024.txt
https://www.openssl.org/news/vulnerabilities.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-31 09:43:18 +01:00
Bernd Kuhls
d329d67020 {linux, linux-headers}: bump 4.{14, 19}.x / 5.{4, 10, 15}.x / 6.{1, 5}.x series
Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 96298d3b547670f3fdff26dccc095161ef17d6e4)
[Peter: drop 6.5.x bump]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-31 08:47:06 +01:00
Bernd Kuhls
4196900a1c package/php: bump version to 8.2.12
Changelog: https://www.php.net/ChangeLog-8.php#8.2.12
Release notes: https://www.php.net/releases/8_2_12.php

Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit a40924107d63551906050b199fe6b93d479a96ce)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 23:01:06 +01:00
Oleg Lyovin
e856907cd9 package/python-pycryptodomex: fix package build with gcc 4.8
python-pycryptodomex uses C99 features like variable
declaration in for-loop statement, while old compilers
assumes C89 by default.

This patch explicitly specifies C99 standard.

Signed-off-by: Oleg Lyovin <ovlevin@salutedevices.com>
[yann.morin.1998@free.fr: use TARGET/HOST_CFLAGS]
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 3c6f3af24db4b79d652874dd6c381ce3d6c5266b)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 23:00:16 +01:00
Fabrice Fontaine
4a5f362728 package/cjson: bump to version 1.7.16
https://github.com/DaveGamble/cJSON/releases/tag/v1.7.16

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 654f18c61709cf8c7d92236c1b81bb80a9ce70d6)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 22:56:34 +01:00
Fabrice Fontaine
396c902ec9 package/x11r7/xlib_libXpm: security bump to version 3.5.17
Fix CVE-2023-43788, CVE-2023-43789 and CVE-2023-43786

https://lists.x.org/archives/xorg-announce/2023-October/003424.html
https://lists.x.org/archives/xorg-announce/2023-October/003425.html

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit c709ab6fff85285c3f44eacbe780302a29a32ede)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 22:54:07 +01:00
Fabrice Fontaine
ef4f123ee3 package/x11r7/xlib_libX11: security bump to version 1.8.7
Fix CVE-2023-43785, CVE-2023-43786 and CVE-2023-43787

https://lists.x.org/archives/xorg-announce/2023-October/003424.html
https://lists.x.org/archives/xorg-announce/2023-October/003426.html

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 98d0a7b95f416c88581788b5ad3ee3d1d5cbbd67)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 22:53:53 +01:00
Fabrice Fontaine
61b918ecc9 package/python-urllib3: security bump to version 2.0.7
Fix CVE-2023-43804 and CVE-2023-45803

https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4
https://github.com/urllib3/urllib3/blob/2.0.7/CHANGES.rst

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit e0e96336aba445d711a352caadab68ed87e87d07)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 20:05:07 +01:00
Fabrice Fontaine
499256cd1c package/rabbitmq-c: fix CVE-2023-35789
An issue was discovered in the C AMQP client library (aka rabbitmq-c)
through 0.13.0 for RabbitMQ. Credentials can only be entered on the
command line (e.g., for amqp-publish or amqp-consume) and are thus
visible to local attackers by listing a process and its arguments.

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit c3fcaeaaa7fc0a6023d44ac16c9197b847504706)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 20:02:54 +01:00
Fabrice Fontaine
49bed3048b package/tiff: security bump to version 4.6.0
- Drop --without-x (now unrecognized)
- Fix CVE-2023-40745: LibTIFF is vulnerable to an integer overflow. This
  flaw allows remote attackers to cause a denial of service (application
  crash) or possibly execute an arbitrary code via a crafted tiff image,
  which triggers a heap-based buffer overflow.
- Fix CVE-2023-41175: A vulnerability was found in libtiff due to
  multiple potential integer overflows in raw2tiff.c. This flaw allows
  remote attackers to cause a denial of service or possibly execute an
  arbitrary code via a crafted tiff image, which triggers a heap-based
  buffer overflow.

https://libtiff.gitlab.io/libtiff/releases/v4.6.0.html

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit e96b1c4b0b06d65c54a764fe4a59d886afc70df5)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 18:23:34 +01:00
Fabrice Fontaine
60de45e184 package/zchunk: security bump to version 1.3.2
- Drop patches (already in version)
- tests can be disabled since version 1.2.3 and
  e2e3d6b14e
- docs can be disabled since version 1.2.3 and
  af6c10e8be
- Fix CVE-2023-46228: zchunk before 1.3.2 has multiple integer overflows
  via malformed zchunk files to lib/comp/comp.c, lib/comp/zstd/zstd.c,
  lib/dl/multipart.c, or lib/header.c.

https://github.com/zchunk/zchunk/compare/1.2.2...1.3.2

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 8716942ca68e98e384746c09871fedfb36c0f629)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 18:21:10 +01:00
Fabrice Fontaine
f8625442e9 package/zchunk: add ZCHUNK_CPE_ID_VENDOR
cpe:2.3🅰️zchunk:zchunk is a valid CPE identifier for this package:

  https://nvd.nist.gov/products/cpe/detail/480C0B83-3109-49EE-9E06-7866A54878CA

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 3499c75ccf8b481fb3499a218920a3e276b09fa9)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 18:20:58 +01:00
Peter Korsgaard
7aad5e1b43 package/aufs-util: use HTTPS for git.code.sf.net
git.code.sf.net is available over HTTPS, so use that for security and
consistency with the other packages.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 99d525028f969220719a4e6bcd694f7d9cfd5b67)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 18:17:34 +01:00
Peter Korsgaard
639b6ececb package/aufs: use HTTPS for git.code.sf.net
git.code.sf.net is available over HTTPS, so use that for security and
consistency with the other packages.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit f2a590750f5bedcee48ce7beb8f35356b42eda11)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 18:17:30 +01:00
Peter Korsgaard
9614e6ee78 Config.in: default to HTTPS for s.b.n backup site
Now that we have HTTPS support for sources.buildroot.net (through Lets
encrypt / Cloudflare), it makes sense to default to it for our backup site.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 05296ced369bab8877efa624f3d9b4d201ba5b38)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 18:17:14 +01:00
Peter Korsgaard
33a967ed85 package/riscv64-elf-toolchain: add .hash file
The host-riscv64-elf-toolchain package was missing a hash file, add it now.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit cf2dcaa1ecede670a0bc54841652a0e3bea5c744)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 14:07:33 +01:00
Fabrice Fontaine
70cb03d1b0 package/paho-mqtt-c: bump to version 1.3.13
https://github.com/eclipse/paho.mqtt.c/releases/tag/v1.3.13

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 97d6a77d1ef0057c9ccf3da91ac0bdebdb129112)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 14:05:58 +01:00
Fabrice Fontaine
cc74b71ea0 package/dhcpcd: bump to version 10.0.4
https://github.com/NetworkConfiguration/dhcpcd/releases/tag/v10.0.2
https://github.com/NetworkConfiguration/dhcpcd/releases/tag/v10.0.3
https://github.com/NetworkConfiguration/dhcpcd/releases/tag/v10.0.4

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f6890c1c4e04a968484ccf0c89ffce8b57ff3281)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 14:04:35 +01:00
Peter Korsgaard
d8bd44d455 package/mxsldr: add .hash file
The host-mxsldr package was missing a hash file, add it now.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit fefcfddc5e6a265c66adbdff615558f99133f148)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 13:41:27 +01:00
Fabrice Fontaine
4616a30c63 package/minizip-zlib: fix CVE-2023-45853
MiniZip in zlib through 1.3 has an integer overflow and resultant
heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long
filename, comment, or extra field. NOTE: MiniZip is not a supported part
of the zlib product.

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit de7bc4ada2ab5ef2e4094934acd5271c0aca19a1)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 13:40:31 +01:00
Fabrice Fontaine
30472d98b8 package/minizip-zlib: bump to version 1.3
https://github.com/madler/zlib/commits/v1.3/contrib/minizip

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit c6bf26cfb2ab61675cbab146c43c21511d0d5c29)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 13:40:27 +01:00
Fabrice Fontaine
b2a0d00ef0 package/libtommath: add LIBTOMMATH_CPE_ID_VENDOR
cpe:2.3🅰️libtom:libtommath is a valid CPE identifier for this package:

  https://nvd.nist.gov/products/cpe/detail/F0D99614-AA27-4713-ADD2-103647C8838B

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 17ffb91551cc7c76427fd9675bc5e5a01d683afe)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 11:18:22 +01:00
Fabrice Fontaine
e6e88ccf80 package/nghttp2: security bump to version 1.57.0
Fix CVE-2023-44487: The HTTP/2 protocol allows a denial of service
(server resource consumption) because request cancellation can reset
many streams quickly, as exploited in the wild in August through October
2023.

Fix CVE-2023-35945: nghttp2 fails to release memory when PUSH_PROMISE or
HEADERS frame cannot be sent, and nghttp2_on_stream_close_callback fails
with a fatal error. For example, if GOAWAY frame has been received, a
HEADERS frame that opens new stream cannot be sent.

https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6pcr-v3hg-752p
https://github.com/nghttp2/nghttp2/compare/v1.41.0...v1.57.0

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 07c44afc8d297c5a2e13bd6303e07f48f18b5c8a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 11:17:24 +01:00
Fabrice Fontaine
6ac17539d6 package/wireshark: security bump to version 4.0.10
https://www.wireshark.org/news/20231004.html
https://www.wireshark.org/news/20231004a.html

Fix CVE-2023-5371:
https://www.wireshark.org/security/wnpa-sec-2023-27.html

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 7385c7f8b302db76a944240ee32d9afafa1db2f7)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 11:16:46 +01:00
Bernd Kuhls
be9c7b92e4 package/apache: security bump version to 2.4.58
Fixes CVE-2023-31122, CVE-2023-43622 & CVE-2023-45802:
https://httpd.apache.org/security/vulnerabilities_24.html

Release notes:
https://lists.apache.org/thread/1qnr3jpk1mdnqc2c6foyjvg0ch636h1n

Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit d00881cad152040cc679c37124d636196ab7eb82)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 11:15:37 +01:00
Alexey Romanov
6489cb62b2 package/pkg-kernel-module: add BR2_MAKE_HOST_DEPENDENCY
Commit 0b9efc991f ("linux: use BR2_MAKE") switched LINUX_MAKE to
$(BR2_MAKE) to avoid build issue with kernel version >= 6.2 and GNU
Make version < 3.82. However, the same issue is actual for kernel
modules as well.

Using $(BR2_MAKE) should guarantee a consistent behavior between
kernel and kernel-modules builds.

Signed-off-by: Alexey Romanov <avromanov@sberdevices.ru>
Signed-off-by: Sergey Bobrenok <SIBobrenok@sberdevices.ru>
[yann.morin.1998@free.fr: minor coding style]
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 75fa573ef9336b57d1cfb86bfcaaed4872f64ac6)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 11:12:43 +01:00
Peter Korsgaard
0bc9bf9888 package/python-django: security bump to version 4.1.12
Fixes the following security issue:

CVE-2023-43665: Denial-of-service possibility in django.utils.text.Truncator

Following the fix for CVE-2019-14232, the regular expressions used in the
implementation of django.utils.text.Truncator’s chars() and words() methods
(with html=True) were revised and improved.  However, these regular
expressions still exhibited linear backtracking complexity, so when given a
very long, potentially malformed HTML input, the evaluation would still be
slow, leading to a potential denial of service vulnerability.

The chars() and words() methods are used to implement the truncatechars_html
and truncatewords_html template filters, which were thus also vulnerable.

The input processed by Truncator, when operating in HTML mode, has been
limited to the first five million characters in order to avoid potential
performance and memory issues.

https://www.djangoproject.com/weblog/2023/oct/04/security-releases/

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-30 08:35:24 +01:00
Fabrice Fontaine
1068d2b6a8 package/suricata: security bump to version 6.0.15
This is a security release, fixing a number of important issues.

https://forum.suricata.io/t/suricata-6-0-15-released/4068/2

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 5ef8369d987062247e8ba4f6e8b68ebf5b698af5)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-27 09:07:56 +02:00
Fabrice Fontaine
aa7713a29c package/vim: security bump to version 9.0.2053
Fix CVE-2023-5344, CVE-2023-5441 and CVE-2023-5535

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 9ccfb25dde3d9941a2fd8b0cff03c15d36406430)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-27 08:53:37 +02:00
Bernd Kuhls
4f59fee3ef {linux, linux-headers}: bump 5.15.x / 6.{1, 5}.x series
Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit d8bcff69fc2887b2b0ceda0720b3a3569cf8abb0)
[Peter: drop 6.5.x bump]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-27 08:44:05 +02:00
Yann E. MORIN
55e9093eaa package/pkg-utils: teach per-package-rsync to copy or hardlink dest
commit 21d52e52d8de (package/pkg-utils.mk: break hardlinks in global
{TARGET, HOST}_DIR on per-package build) was recently reverted, so we
are back to a situation where it is possible for packages and post-build
scripts to modify files in-place, and thus impact files in any arbitrary
per-package directory, which may break things on rebuild for example.

21d52e52d8de was too big a hammer, but we can still apply the reasoning
from it, to the aggregation of the final target and host directories.

This solves the case for post-build scripts at least. We leave the case
of inter-package modification aside, as it is a bigger issue that will
need more than just copying files around.

We use --hard-links, so that hard-links in the source (the PPD), are
kept as new hard-links (i.e. "copy" of hard-links) in the destination.
This contributes to limiting the size of target/.

Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
Cc: Herve Codina <herve.codina@bootlin.com>
Cc: Peter Korsgaard <peter@korsgaard.com>
Cc: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
Reviewed-by: Herve Codina <herve.codina@bootlin.com>
(cherry picked from commit 23edf9837c93445ff32db718b1ab6b0baa32c7a7)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-26 20:32:31 +02:00
Yann E. MORIN
a1169c45f4 Revert "package/pkg-utils.mk: break hardlinks in global {TARGET, HOST}_DIR on per-package build"
Commit 21d52e52d8de (package/pkg-utils.mk: break hardlinks in global
{TARGET, HOST}_DIR on per-package build) stopped hardlink the source and
destination when rsyncing per-package directory, on the rationale that
modifying files in-place after the rsync would also modify the original
file, and that break foo-rebuild and can cause issues with post-build
scripts.

However, what 21d52e52d8de did not envision, is that copying instead of
hard-linking has two nasty side effects:

  - the size increase for the build directory increase with the number
    of packages and with the depth of th dependency chains for those
    packages: a (relatively small) build that was previously totalling
    ~13GiB in output/, now totals north of 122GiB, an almost 10-time
    increase;

  - the build time increases, as it takes more time to read+write files
    than it takes to create a new link to a file; the same build saw an
    increase of build time from 5min 10s to 7min 30s, a 45% increase.

These regressions are both serious, so revert the change; we'll come up
with a stopgap measure in follow-up commits.

This reverts commit 21d52e52d8dee0940d28b3a38551eb183be37813.

Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
Cc: Herve Codina <herve.codina@bootlin.com>
Cc: Peter Korsgaard <peter@korsgaard.com>
Cc: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
Reviewed-by: Herve Codina <herve.codina@bootlin.com>
(cherry picked from commit 8f1487d6fa4cde5330f73e2432c264c0bd7940c6)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-26 20:29:54 +02:00
Adrian Perez de Castro
c8c96d9c35 package/xdg-dbus-proxy: fix tarball name in hash file
Fixes: 487761a5b2 ("package/xdg-dbus-proxy: bump to version 0.1.5")
Signed-off-by: Adrian Perez de Castro <aperez@igalia.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit d4fc46f751c7cb3db3f4cbef10f67e5ab3d90135)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-26 18:58:31 +02:00
Adrian Perez de Castro
b77df1db5b package/xdg-dbus-proxy: bump to version 0.1.5
Version 0.1.5 mainly fixes handling of paths with more than 255
characters. Release notes:

  https://github.com/flatpak/xdg-dbus-proxy/releases/tag/0.1.5

Signed-off-by: Adrian Perez de Castro <aperez@igalia.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 487761a5b294ae1806030b935faa97c1f1fd1820)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-26 18:40:10 +02:00
Bernd Kuhls
89a71e4222 {linux, linux-headers}: bump 6.1.x series
Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 2e1890db65fe0e08d626770e226e399309d33fe5)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-26 18:36:20 +02:00
Joachim Wiberg
3b5e9e24c4 package/inadyn: bump to v2.12.0
New features and DDNS provider support (IPv64.net), but also a lot of
fixes to regressions introduced in v2.11.0, e.g.:

 - dynv6.com not working at all, regression in v2.11.0
 - Regression in DDNS provider names, introduced in v2.11.0:
   - dyndns@3322.org
   - dyndns@he.net
   - default@dynv6.com
   - ipv6tb@he.net

From https://github.com/troglobit/inadyn/releases/tag/v2.12.0

Signed-off-by: Joachim Wiberg <troglobit@gmail.com>
Signed-off-by: Arnout Vandecappelle <arnout@mind.be>
(cherry picked from commit dc84952eb38bf1ef63fc8718dc2ced200a3e52dd)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-26 18:33:01 +02:00
Fabrice Fontaine
78ea668c6f package/casync: fix build with gcc >= 13
Fix the following build failure with gcc >= 13:

In file included from ../src/compressor.c:3:
../src/compressor.h:59:59: error: unknown type name 'size_t'
   59 | int compressor_input(CompressorContext *c, const void *p, size_t sz);
      |                                                           ^~~~~~
../src/compressor.h:19:1: note: 'size_t' is defined in header '<stddef.h>'; did you forget to '#include <stddef.h>'?
   18 | #include "cacompression.h"
  +++ |+#include <stddef.h>
   19 |

Fixes:
 - http://autobuild.buildroot.org/results/ab08f3b90d253db45643dd058b80ae1dd5f49d0f

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Arnout Vandecappelle <arnout@mind.be>
(cherry picked from commit 39e092a06ed79a98e3842f9d897c089a132eaa58)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-26 13:13:33 +02:00
Fabrice Fontaine
7616363468 package/ksmbd-tools: security bump to version 3.4.9
Fix two security issues that reported by ZDI.

https://github.com/cifsd-team/ksmbd-tools/releases/tag/3.4.7
https://github.com/cifsd-team/ksmbd-tools/releases/tag/3.4.8
https://github.com/cifsd-team/ksmbd-tools/releases/tag/3.4.9

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Arnout Vandecappelle <arnout@mind.be>
(cherry picked from commit 5eac719129f66185a83bba6adff8658b41420159)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-26 13:11:48 +02:00
Woodrow Douglass
9d863d5315 package/opencv4-contrib: properly note dependencies between modules
Also, add myself to the DEVELOPERS file

Signed-off-by: Woodrow Douglass <wdouglass@carnegierobotics.com>
[Arnout: fix typo BR2_PACKAGE_OPENCV4_LIB_OBJDETECCT]
Signed-off-by: Arnout Vandecappelle <arnout@mind.be>
(cherry picked from commit a7736afacaefc9250f8e68825e42c8f7c229b410)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-26 13:04:22 +02:00
Brandon Maier
377941f670 Makefile: fix SDK relocation for per-package-dirs
The relocate-sdk.sh script does not work correctly when
BR2_PER_PACKAGE_DIRECTORIES is enabled. relocate-sdk.sh expects
everything to point at $HOST_DIR, but each package will be pointing at
its $(O)/per-package/*/host.

Use the same command for scrubing host paths during the build, to scrub
to the final host directory location.

Signed-off-by: Brandon Maier <Brandon.Maier@collins.com>
Acked-by: Charles Hardin <ckhardin@gmail.com>
Signed-off-by: Arnout Vandecappelle <arnout@mind.be>
(cherry picked from commit 25e60fbe1cabb678952330a8d8d48efe7f8e5048)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-25 23:10:24 +02:00
Titouan Christophe
d4393ae271 package/redis: security bump to v7.0.14
This contains security fixes for:
- CVE-2022-24834
- CVE-2023-36824
- CVE-2023-41053
- CVE-2023-45145

See the release notes:
https://raw.githubusercontent.com/redis/redis/7.0.14/00-RELEASENOTES

Signed-off-by: Titouan Christophe <titouanchristophe@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-10-24 17:16:01 +02:00