Commit Graph

70393 Commits

Author SHA1 Message Date
Julien Olivain
5baf1ffe7e boot/grub2: bump to version 2.12
For release announce on mailing list, see [1].
For release general news, see [2].

This commit removes all package patches, as they are all included in
this version.

The .checkpackageignore file is updated accordingly (the entry for
patch 0001 is removed).

This commit also removes GRUB2_AVOID_AUTORECONF hooks, since patch
0001 is removed.

This commit also removes the GRUB2_IGNORE_CVES entries associated to
the removed patches. The version bump should now explicitly exclude
those CVEs. For patches 8 and 9, the upstream commit IDs were
incorrectly recorded:
  - patch 8 mentioned d5caac8ab79d068ad9a41030c772d03a4d4fbd7b while
    the actual commit is 5bff31cdb6b93d738f850834e6291df1d0b136fa
  - patch 9 mentioned 166a4d61448f74745afe1dac2f2cfb85d04909bf while
    the actual commit is 347880a13c239b4c2811c94c9a7cf78b607332e3

Finally, this commit introduces a new patch, adding a missing file in
the release tarball.

[1] https://lists.gnu.org/archive/html/grub-devel/2023-12/msg00052.html
[2] https://git.savannah.gnu.org/gitweb/?p=grub.git;a=blob;f=NEWS;hb=refs/tags/grub-2.12

Signed-off-by: Julien Olivain <ju.o@free.fr>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2023-12-23 12:13:18 +01:00
Grant Nichol
fc8eff0c76 package/libopenssl: use riscv-specific configure target
Adds BR2_PACKAGE_LIBOPENSSL_TARGET_ARCH for riscv32 and riscv64.
Otherwise, riscv targets fall back to the linux-generic libopenssl
configs. This exacerbates the issue partially addressed in
openssl/openssl#22871 which causes build failures.

Fixes a mispelling in upstream causing 0builds for riscv32 to fail when
linking.

Signed-off-by: Grant Nichol <me@grantnichol.com>
[yann.morin.1998@free.fr: squash the two commits together]
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2023-12-23 11:39:37 +01:00
Baruch Siach
088ac834b7 package/libcurl: fix build with GnuTLS and no verbose
A change of data logging introduced in version 8.5.0 broke the build.
Add a patch to fix that.

Fixes:
http://autobuild.buildroot.net/results/c5b996696333c4ff1392dbb8e6b0edc9c5322ee4/

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2023-12-23 11:28:51 +01:00
Thomas Petazzoni
adaae82c58 package/glibc: ignore CVEs not considered as security issues by upstream
5 CVEs affecting glibc according to the NVD database are considered as
not being security issues by upstream glibc developers:

* CVE-2010-4756: The glob implementation in the GNU C Library (aka
  glibc or libc6) allows remote authenticated users to cause a denial
  of service (CPU and memory consumption) via crafted glob expressions
  that do not match any pathnames. glibc maintainers position: "That's
  standard POSIX behaviour implemented by (e)glibc. Applications using
  glob need to impose limits for themselves"

* CVE-2019-1010022: GNU Libc current is affected by: Mitigation
  bypass. The impact is: Attacker may bypass stack guard
  protection. The component is: nptl. The attack vector is: Exploit
  stack buffer overflow vulnerability and use this bypass
  vulnerability to bypass stack guard. NOTE: Upstream comments
  indicate "this is being treated as a non-security bug and no real
  threat. glibc maintainers position: "Not treated as a security issue
  by upstream https://sourceware.org/bugzilla/show_bug.cgi?id=22850"

* CVE-2019-1010023: GNU Libc current is affected by: Re-mapping
  current loaded library with malicious ELF file. The impact is: In
  worst case attacker may evaluate privileges. The component is:
  libld. The attack vector is: Attacker sends 2 ELF files to victim
  and asks to run ldd on it. ldd execute code. NOTE: Upstream comments
  indicate "this is being treated as a non-security bug and no real
  threat. glibc maintainers position: "Not treated as a security issue
  by upstream https://sourceware.org/bugzilla/show_bug.cgi?id=22851"

* CVE-2019-1010024: GNU Libc current is affected by: Mitigation
  bypass. The impact is: Attacker may bypass ASLR using cache of
  thread stack and heap. The component is: glibc. NOTE: Upstream
  comments indicate "this is being treated as a non-security bug and
  no real threat. glibc maintainers position: "Not treated as a
  security issue by upstream
  https://sourceware.org/bugzilla/show_bug.cgi?id=22852"

* CVE-2019-1010025: GNU Libc current is affected by: Mitigation
  bypass. The impact is: Attacker may guess the heap addresses of
  pthread_created thread. The component is: glibc. NOTE: the vendor's
  position is "ASLR bypass itself is not a vulnerability. Glibc
  maintainers position: "Not treated as a security issue by upstream
  https://sourceware.org/bugzilla/show_bug.cgi?id=22853"

Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2023-12-23 11:11:37 +01:00
Thomas Petazzoni
af8c0e5c74 package/glibc: add proper CPE ID version detail
As reported in bug 15895, the GLIBC_VERSION field having a value
looking like 2.38-27-g750a45a783906a19591fb8ff6b7841470f1f5701, it
prevents the CPE/CVE matching with the NVD database to work correctly.

This commit fixes that by defining GLIBC_CPE_ID_VERSION, derived from
GLIBC_VERSION, by extracting the base version.

Also, we update GLIBC_IGNORE_CVES to account for the CVEs that have
clearly been fixed between 2.38 and
2.38-27-g750a45a783906a19591fb8ff6b7841470f1f5701. There are a number
of other CVEs still affecting the glibc package, but they are not
related to this
2.38...2.38-27-g750a45a783906a19591fb8ff6b7841470f1f5701 range.

Fixes: #15895

Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2023-12-23 10:58:40 +01:00
Thomas Petazzoni
e59346f7db package/libutempter: fix license information
According to the source file:

  This library is free software; you can redistribute it and/or
  modify it under the terms of the GNU Lesser General Public
  License as published by the Free Software Foundation; either
  version 2.1 of the License, or (at your option) any later version.

Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 23:38:19 +01:00
Adam Duskett
02c818bc5c package/libutempter: new package
Signed-off-by: Adam Duskett <adam.duskett@amarulasolutions.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 23:36:18 +01:00
Adam Duskett
de5a82755d package/fcft: new package
Signed-off-by: Adam Duskett <adam.duskett@amarulasolutions.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 23:12:53 +01:00
Adam Duskett
996b786cfc package/tllist: new package
Signed-off-by: Adam Duskett <adam.duskett@amarulasolutions.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 23:08:25 +01:00
Adam Duskett
7e767c81a8 package/sway/Config.in: select BR2_PACKAGE_XKEYBOARD_CONFIG
Much like weston, this is a runtime dependency.

Signed-off-by: Adam Duskett <adam.duskett@amarulasolutions.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 22:14:01 +01:00
Adam Duskett
d107888e38 package/sway/Config.in: remove duplicate dependencies
Signed-off-by: Adam Duskett <adam.duskett@amarulasolutions.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 22:05:51 +01:00
Bernd Kuhls
fdeb41bda6 package/transmission: bump version to 4.0.5
Release notes:
https://github.com/transmission/transmission/releases/tag/4.0.5

Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 22:01:56 +01:00
Giulio Benetti
fd1ede59aa package/libnvme: bump to version 1.7.1
Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 22:00:49 +01:00
James Hilliard
2b6c531486 package/python-matplotlib: bump to version 3.8.2
Add new python-contourpy runtime dependency.

Add new python-pybind dependency.

Add new host-python-setuptools-scm build dependency.

Update setup.cfg to new mplsetup.cfg install location.

Signed-off-by: James Hilliard <james.hilliard1@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 21:56:06 +01:00
James Hilliard
1e7f0794bb package/python-contourpy: new package
Signed-off-by: James Hilliard <james.hilliard1@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 21:55:24 +01:00
James Hilliard
36db831321 package/python-meson-python: new host package
Signed-off-by: James Hilliard <james.hilliard1@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 21:55:04 +01:00
James Hilliard
aa5ee701b1 package/python-pyproject-metadata: new host package
Signed-off-by: James Hilliard <james.hilliard1@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 21:54:52 +01:00
James Hilliard
088dd5fd3f package/python-pudb: bump to version 2023.1
Add new python-urwid-readline runtime dependency.

Add new python-packaging runtime dependency.

Remove no longer required python-setuptools runtime dependency.

Signed-off-by: James Hilliard <james.hilliard1@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 21:46:15 +01:00
James Hilliard
713a71c730 package/python-urwid-readline: new package
Signed-off-by: James Hilliard <james.hilliard1@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 21:44:16 +01:00
Francois Perrad
898941a0d7 package/lua-compat53: install compat-5.3.h
this file could be required by some native modules

note: compat-5.3.c is included by compat-5.3.h
Signed-off-by: Francois Perrad <francois.perrad@gadz.org>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 21:35:01 +01:00
Francois Perrad
259de5cff6 package/lua-compat53: bump to version 0.12
the project has moved to the organization “Lunar Modules”,
see https://github.com/lunarmodules/

diff LICENCE:
-Copyright (c) 2015 Kepler Project.
+Copyright (C) 1994-2020 Lua.org, PUC-Rio.
+Copyright (C) 2013-2023 The Lua-Compat-5.3 authors.

Signed-off-by: Francois Perrad <francois.perrad@gadz.org>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 21:32:49 +01:00
Yann E. MORIN
ceb678ca19 editorconfig: fix wildcard expansion
It turns out that wildcard expansion, * and ?, is not performed in
matching lists {...}, at least in the vim plugin. The spec is not clear
about that, but refer to "pattern matching through Unix shell-style
wildcards" [0].

So, let's consider that this is not supported. Expand the patterns into
one section each, rather than use a list.

[0] https://spec.editorconfig.org/

Signed-off-by: Yann E. MORIN <yann.morin@orange.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 21:32:06 +01:00
Marcus Folkesson
08b6c78e6a package/criu: bump to version 3.19
Signed-off-by: Marcus Folkesson <marcus.folkesson@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-20 21:25:22 +01:00
Giulio Benetti
7150660668 package/libnvme: bump to version 1.7
Drop local patches that have been upstreamed.

Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-12-20 11:49:26 +01:00
Giulio Benetti
620a88f755 package/libnss: bump to version 3.96.1
Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-12-20 11:49:21 +01:00
Peter Macleod Thompson
7951bb0686 package/sdl2_image: bump version to 2.8.1
Signed-off-by: Peter Macleod Thompson <peter.macleod.thompson@gmail.com>
[Peter: fix filename in .hash file]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-12-20 11:48:36 +01:00
Michael Nosthoff
85646943ec package/nmap: fix wording for nc symlink
Signed-off-by: Michael Nosthoff <buildroot@heine.tech>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-12-20 11:42:27 +01:00
Christian Stewart
3c047ea463 package/openssh: security bump to version 9.6p1
OpenSSH 9.6 was released on 2023-12-18.

This release contains fixes for a newly-discovered weakness in the
SSH transport protocol (the "Terrapin" attack), a logic error relating
to constrained PKCS#11 keys in ssh-agent(1) and countermeasures for
programs that invoke ssh(1) with user or hostnames containing invalid
characters.

https://www.openssh.com/txt/release-9.6

Signed-off-by: Christian Stewart <christian@aperture.us>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-12-20 11:42:06 +01:00
Xiangyu Chen
8c4bb1abb9 package/gawk: bump to version 5.3.0
Changes:
https://git.savannah.gnu.org/cgit/gawk.git/tree/ChangeLog?h=gawk-5.3.0

Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-12-20 11:41:44 +01:00
Fabrice Fontaine
96d0d67779 package/libldns: fix libressl build
Fix the following build failure raised since bump of libressl to version
3.8.2 in commit 21eca49ed5:

./keys.c:167:35: error: 'ENGINE_METHOD_ALL' undeclared (first use in this function)
  167 |         if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
      |                                   ^~~~~~~~~~~~~~~~~

Fixes:
 - http://autobuild.buildroot.org/results/37cc05b78a7004caa1b45d896121f059a4f8ca00

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2023-12-18 18:41:55 +01:00
Waldemar Brodkorb
3c207c40eb package/uclibc: update to 1.0.45
Git shortlog:

Ben Wolsieffer (3):
      fork: generate stub on no-MMU systems
      arm: elf-fdpic.h: avoid void pointer subtraction
      libpthread/nptl: make default stack size configurable

Greg Ungerer (1):
      elf: support ELF binaries in noMMU

Marcus Haehnel (3):
      fnmatch: fix possible access beyond of parameter string
      getaddrinfo.c: Avoid misleading indentation warning
      linuxthreads: Avoid unused variable warning

Marcus Hähnel (1):
      setjmp.h: Fix C++ build and avoid duplicate throw declaration

Max Filippov (1):
      daemon.c: make _fork_parent static inline again

Paul Iannetta (1):
      kvx: fix asm syntax

Pavel Kozlov (6):
      setrlimit/getrlimit: fix prlimit64 syscall use for 32-bit CPUs
      Fix -Warray-parameter warning for __sigsetjmp
      prlimit: add name redirection and fix incorrect parameters to syscall
      arc: add acq/rel variants for atomic cmpxchg/xchg
      arc: remove read ahead in asm strcmp code for ARCHS
      rlimit: fix 64-bit RLIM64_INFINITY macro

Waldemar Brodkorb (8):
      aarch64: add hwcap header file
      fcntl.h: declare f_owner_ex for all architectures
      arm: add hwcap header file
      lm32: disable ctor/dtor
      aarch64: disable lazy relocations
      riscv64: define __NR_riscv_flush_icache if not available
      depend on __UCLIBC_HAVE_STATX__
      bump version for 1.0.45 release

Yann Sionneau (9):
      fstatat64: define it as a wrapper of statx if the kernel does not support fstatat64 syscall
      fstat: add missing return value statement for the statx wrapping case
      add support for systems without legacy setrlimit/getrlimit syscalls
      fstatat: add wrapper that uses statx for non-legacy arch
      kvx: add support for kv3-2 (Coolidge v2 SoC)
      kvx: atomic: rework using compiler builtins
      kvx: align specification of user regs
      kvx: define that kvx port supports statx syscall
      kvx: use a custom stat.h header

lordrasmus (8):
      add vsdo support
      fix file permissions
      fix getauxval() on aarch64 gcc 11
      vdso support missing file
      c6x compile fix vdso support
      gettimeofday() only include ldso.h if vdso support is activated
      vdso support for x86_64
      gitignore

Signed-off-by: Waldemar Brodkorb <wbx@openadk.org>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2023-12-18 17:50:07 +01:00
Peter Korsgaard
6985955a69 package/jq: security bump to version 1.7.1
Fixes the following security issues:

CVE-2023-50246: Fix heap buffer overflow in jvp_literal_number_literal
https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc

CVE-2023-50268: fix stack-buffer-overflow if comparing nan with payload
https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2023-12-18 17:47:48 +01:00
Adam Duskett
df04f17976 package/giflib/0004-Fix-several-defects-found-by-Coverity-scan.patch: New security patch
Signed-off-by: Adam Duskett <adam.duskett@amarulasolutions.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2023-12-18 17:43:14 +01:00
Adam Duskett
74253ffee5 package/giflib/0003-Fix-CVE-2023-39742.patch: New security patch
Signed-off-by: Adam Duskett <adam.duskett@amarulasolutions.com>
[yann.morin.1998@free.fr: extend GIFLIB_IGNORE_CVES]
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2023-12-18 17:42:50 +01:00
Adam Duskett
4a93a83196 package/giflib/0002-Fix-CVE-2022-28506.patch: New security patch
Signed-off-by: Adam Duskett <adam.duskett@amarulasolutions.com>
[yann.morin.1998@free.fr: add GIFLIB_IGNORE_CVES]
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2023-12-18 17:42:06 +01:00
Maxim Kochetkov
e779df7dc9 package/timescaledb: bump version to 2.13.0
Release notes: https://github.com/timescale/timescaledb/blob/2.13.0/CHANGELOG.md

Signed-off-by: Maxim Kochetkov <fido_max@inbox.ru>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-18 09:20:15 +01:00
Bernd Kuhls
a91ad89fe3 package/gnutls: bump version to 3.8.2
Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-18 09:18:58 +01:00
Bernd Kuhls
4221e10683 package/gettext-gnu: bump version to 0.22.4
Release notes:
https://git.savannah.gnu.org/gitweb/?p=gettext.git;a=commitdiff;h=08f342937a09ce41977e8ceecc23509e4b330490

Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-18 09:16:16 +01:00
Bernd Kuhls
5714126eda package/libheif: bump version to 1.17.5
Release notes:
https://github.com/strukturag/libheif/releases

Added configure support for new codec plugins introduced in version
1.17.0: https://github.com/strukturag/libheif/releases/tag/v1.17.0

Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-18 09:15:18 +01:00
Bernd Kuhls
973b1eba5a package/libopenssl: bump version to 3.2.0
Release notes:
https://www.openssl.org/blog/blog/2023/11/23/OpenSSL32/

Removed patch 0001 and added no-docs configure option due to
956b4c75dc

Removed patch 0003 due to
78634e8ac2

Removed patch 0006 which is included in this release
e1b6ecbab4

Renumbered remaining patches.

Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-18 09:09:45 +01:00
Bernd Kuhls
faec3ca30e package/exim: bump version to 4.97
Removed patches which are included in this release:
https://git.exim.org/exim.git/commitdiff/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2
https://git.exim.org/exim.git/commitdiff/d8ecc7bf97934a1e2244788c610c958cacd740bd
https://git.exim.org/exim.git/commitdiff/158dff9936e36a2d31d037d3988b9353458d6471
https://git.exim.org/exim.git/commitdiff/32da6327e434e986a18b75a84f2d8c687ba14619

Added upstream patch to fix build error.

Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-18 09:09:03 +01:00
Bernd Kuhls
7d8585605e {linux, linux-headers}: bump 4.{14, 19}.x / 5.{4, 10, 15}.x / 6.{1, 6}.x series
Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-12-18 08:42:57 +01:00
Bernd Kuhls
fffb245f66 package/linux-headers: drop 6.5.x option
The 6.5.x series is now EOL upstream, so drop the linux-headers option
and add legacy handling for it.

Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
[Peter: drop option from linux-headers/Config.host.in]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-12-18 08:42:31 +01:00
Bernd Kuhls
9f8d62c955 package/tor: security bump version to 0.4.8.10
Release notes:
https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes
https://forum.torproject.org/t/security-release-0-4-8-10/10536

Fixes TROVE-2023-007.

Signed-off-by: Bernd Kuhls <bernd@kuhls.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-12-18 08:40:47 +01:00
Marcus Folkesson
25564f5e77 package/libostree: bump to version 2023.8
Signed-off-by: Marcus Folkesson <marcus.folkesson@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-12-18 08:40:35 +01:00
Francois Perrad
41e2828c41 package/perl: bump to version 5.38.2
The README file has seen some cosmetic changes that do not affect the
licensing terms.

Signed-off-by: Francois Perrad <francois.perrad@gadz.org>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-17 23:15:12 +01:00
Ralf Dragon
3ef6884e6d python-sip: fix compile error
Since the update of Python to version 3.11 in commit
738500c296 ("package/python3: bump to
version 3.11.0"), python-sip fails to compile with:

siplib.c: In function ‘sip_api_get_frame’:
siplib.c:13750:22: error: invalid use of undefined type ‘struct _frame’
13750 |         frame = frame->f_back;

This is due to a change in the Python C API, which is fixed by a new
patch. The patch can't be upstreamed, as SIP 4.x is no longer
maintained upstream.

Fixes:

  http://autobuild.buildroot.net/results/7b01739e7514e48c06182bc1804b32497ce2e414/

Signed-off-by: Ralf Dragon <hypnotoad@lindra.de>
[Thomas: improved commit log, reformatted patch using Git]
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-17 22:59:31 +01:00
Adam Duskett
afa5c2da33 package/firewalld: bump version to 2.0.2
Signed-off-by: Adam Duskett <adam.duskett@amarulasolutions.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-17 22:48:10 +01:00
Thomas Devoogdt
7b71ce5018 package/mesa3d: add compile patch for linux < 3.5
The kcmp() system call first appeared in linux 3.5,
and was also not there before linux 5.12 if
CONFIG_CHECKPOINT_RESTORE was not set.

See: https://man7.org/linux/man-pages/man2/kcmp.2.html

Signed-off-by: Thomas Devoogdt <thomas@devoogdt.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-17 22:39:13 +01:00
Sébastien Szymanski
16fc737251 package/tree: update _SITE URL
The current TREE_SITE URL doesn't work anymore.
Moreover the README states:
"
The main distribution site for tree is here:
http://oldmanprogrammer.net/source.php?dir=projects/tree

Backup GIT sites are:
https://gitlab.com/OldManProgrammer/unix-tree
https://github.com/Old-Man-Programmer/tree

Old site for as long as it lasts:
http://mama.indstate.edu/users/ice/tree/
ftp://mama.indstate.edu/linux/tree/
"

Use http://oldmanprogrammer.net/tar/tree/ for TREE_SITE

Signed-off-by: Sébastien Szymanski <sebastien.szymanski@armadeus.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2023-12-17 22:35:44 +01:00