Commit Graph

63635 Commits

Author SHA1 Message Date
Julien Olivain
332dcce948 package/fmlib: fix build for ppc e500mc
When BR2_powerpc_e500mc=y, fmlib package compilation fails with output:

    make[2]: *** No rule to make target 'libfm-e500mc.a'.  Stop.

The fmlib package "make help" command shows:

    The available make libfm-<arch>.a targets are:
	    libfm-ppce500mc.a		(P2, P3, P4)
    ...

The package Config.in incorrectly sets BR2_PACKAGE_FMLIB_ARCHTYPE
to "e500mc", which is then passed as the package make target.
The correct value should be "ppce500mc".

The commit fixes this build issue.

Signed-off-by: Julien Olivain <ju.o@free.fr>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 1df9d42bdd)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-01-01 19:22:42 +01:00
Yann E. MORIN
72f6b419f0 package/qemu: fix indentation for host-qemu sub-options in menuconfig
Commit 255acdc143 (package/qemu: needs gcc >= 8) added a comment that
explains that host-qemu would not be available for gcc < 4.8.

However, it interspersed that comment between the main symbol and the
conditional block with the sub-options. This breaks the indentation of
the sub-options in menuconfig, where they appear at the same level as
the main symbol, rather than indented below it.

Fix that by moving the comment before the main symbol.

Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 037226b33b)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-01-01 18:55:44 +01:00
Fabrice Fontaine
45ce6c48ba package/rtl_433: drop dynamic library dependency
rtl_433 can be built statically since its addition in commit
4634e84978

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 7967755fbf)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-01-01 17:37:15 +01:00
Fabrice Fontaine
85a121770b package/exfat-utils: add CPE variables
cpe:2.3🅰️exfat_project:exfat is a valid CPE identifier for this
package:

  https://nvd.nist.gov/products/cpe/search/results?namingFormat=2.3&keyword=cpe%3A2.3%3Aa%3Aexfat_project%3Aexfat

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 8036b08748)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-01-01 16:57:20 +01:00
Fabrice Fontaine
e40f843b25 package/tiff: security bump to version 4.5.0
Fix CVE-2022-2056, CVE-2022-2057, CVE-2022-2058, CVE-2022-2519,
CVE-2022-2520, CVE-2022-2521, CVE-2022-2953, CVE-2022-34526,
CVE-2022-3570, CVE-2022-3597, CVE-2022-3598, CVE-2022-3599,
CVE-2022-3626, CVE-2022-3627 and CVE-2022-3970

- COPYRIGHT renamed to LICENSE.md and year updated with
  fa1d6d787f
- Use new --{en,dis}able options added by
  1ab0e2696a

http://www.simplesystems.org/libtiff/releases/v4.5.0.html

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 5b62ea0136)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-01-01 15:34:59 +01:00
Bernd Kuhls
613b281f4d {linux, linux-headers}: 5.{4, 10, 15}.x / 6.{0, 1}.x series
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 0245d30e56)
[Peter: drop 6.0.x / 6.1.x bump]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-01-01 15:28:12 +01:00
Bernd Kuhls
8676c2d982 package/libcurl: security bump version to 7.87.0
Fixes the following security issues:

- CVE-2022-43551: Another HSTS bypass via IDN
  https://curl.se/docs/CVE-2022-43551.html

- CVE-2022-43552: HTTP Proxy deny use-after-free
  https://curl.se/docs/CVE-2022-43552.html

Changelog: https://curl.se/changes.html

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 3b91fd7501)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2023-01-01 14:01:25 +01:00
Peter Seiderer
62fe783ba2 Config.in: update default CPAN mirror to https, update mirrors URL
The http site automatically redirects to the https variant, so let's
just use that as the default.

The mirror list URL http://search.cpan.org/mirror seems outdated
(re-directed to https://metacpan.org/mirrors aka 'Not Found - The
resource you requested could not be found.').

The closest matching URLs we found were:

  https://www.cpan.org/SITES.html
  http://mirrors.cpan.org/map.html
  http://mirrors.cpan.org/

That last one has all the list, so we use that; the second is a world
map, so we also include it.

Sadly, neither of the mirrors list (table or map) are served as https;
they are only available as http...

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
[yann.morin.1998@free.fr:
  - add a little blurb to explain http->https redirect
  - update the mirror list URL, and...
  - extend commit message with original explanations from Peter, and..
  - notice that they are not served via https...
]
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit add21fd600)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 20:41:57 +01:00
Yann E. MORIN
ab1ed52570 utils/scancpan: bump required perl version
As the comment in package/perl/perl.mk instructs, bumping the perl
version must be propagated to utils/scancpan as well.

However, commit 7c1ef8129f (package/perl: bump to version 5.34.0)
forgot to do so.

Fixes: 7c1ef8129f

Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 4cbef389f3)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 20:38:50 +01:00
Peter Seiderer
17a3f721c3 utils/scancpan: update cpan.org and spdx.org URLs from http to https
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 072df09e2f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 20:38:36 +01:00
Bernd Kuhls
3c9959c256 {linux, linux-headers}: bump 4.{9, 14, 19}.x / 5.{4, 10, 15}.x / 6.0.x series
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 298bcb0455)
[Peter: drop 6.0.x bump]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 19:06:38 +01:00
Julien Olivain
d8665eaa19 Revert "package/gperf: add _CPE_ID_VENDOR and _CPE_ID_PRODUCT"
This reverts commit 3712e1dee7.

gperf -- the GNU perfect hash function generator
https://www.gnu.org/software/gperf/

and

gperftools -- the Google Performance Tools
https://github.com/gperftools/gperftools

are two different and unrelated projects.

Signed-off-by: Julien Olivain <ju.o@free.fr>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 7aeb6c654e)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 19:00:06 +01:00
Fabrice Fontaine
aaea3f2c31 package/mbedtls: security bump to version 2.28.2
Fix the following security issues:
- Fix potential heap buffer overread and overwrite in DTLS if
  MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and
  MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
- An adversary with access to precise enough information about memory
  accesses (typically, an untrusted operating system attacking a secure
  enclave) could recover an RSA private key after observing the victim
  performing a single private-key operation if the window size used for
  the exponentiation was 3 or smaller.

Drop patch (already in version:
9d9d45c6b2)

https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit c2baa583c3)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 18:59:40 +01:00
Bernd Kuhls
0922bbf905 DEVELOPERS: add Bernd Kuhls to package intel-microcode
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit aa409d82fc)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 18:58:58 +01:00
Bernd Kuhls
a2ee5c6bca package/intel-microcode: security bump version to 20221108
Fixes the following security issues:

- CVE-2021-0146: Hardware allows activation of test or debug logic at
  runtime for some Intel(R) processors which may allow an unauthenticated
  user to potentially enable escalation of privilege via physical access.

  https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html

- CVE-2021-0127: Insufficient control flow management in some Intel(R)
  Processors may allow an authenticated user to potentially enable a denial
  of service via local access.

  https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html

- CVE-2022-21151: Processor optimization removal or modification of
  security-critical code for some Intel(R) Processors may allow an
  authenticated user to potentially enable information disclosure via local
  access.

  https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html

- CVE-2022-0005: Sensitive information accessible by physical probing of
  JTAG interface for some Intel(R) Processors with SGX may allow an
  unprivileged user to potentially enable information disclosure via
  physical access.

  https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00614.html

- CVE-2022-21233: Improper isolation of shared resources in some Intel(R)
  Processors may allow a privileged user to potentially enable information
  disclosure via local access.

  https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html

For more details, see the release notes:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/main/releasenote.md

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
[Peter: extend commit message with security fix details]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f83377b7b3)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 18:58:30 +01:00
Quentin Schulz
f0be849c72 package/cairo: fix CVE-2020-35492
Add an upstream patch to fix CVE-2020-35492:
A flaw was found in cairo's image-compositor.c in all versions prior to
1.17.4. This flaw allows an attacker who can provide a crafted input
file to cairo's image-compositor (for example, by convincing a user to
open a file in an application using cairo, or if an application uses
cairo on untrusted input) to cause a stack buffer overflow ->
out-of-bounds WRITE. The highest impact from this vulnerability is to
confidentiality, integrity, as well as system availability.

Important note: this is not the exact upstream patch. Indeed, the
upstream patch[1] contains a png file which appears as a binary diff
inside the patch. The `patch` tool which is used by Buildroot to apply
patches does not handle that kind of diff. Since it is just a test, it
shouldn't impact the quality of the CVE fix and all changes related to
the test are removed from the patch.

[1] 03a820b173
Cc: Quentin Schulz <foss+buildroot@0leil.net>
Signed-off-by: Quentin Schulz <quentin.schulz@theobroma-systems.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 111ab56d84)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 18:57:23 +01:00
Quentin Schulz
f1728357ee package/cairo: fix CVE-2019-6462
Add an upstream patch to fix CVE-2019-6462:

An issue was discovered in cairo 1.16.0. There is an infinite loop in
the function _arc_error_normalized in the file cairo-arc.c, related to
_arc_max_angle_for_tolerance_normalized.

Cc: Quentin Schulz <foss+buildroot@0leil.net>
Signed-off-by: Quentin Schulz <quentin.schulz@theobroma-systems.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit b38286d7e5)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 18:57:21 +01:00
Bernd Kuhls
782d5a47e7 package/x11r7/xserver_xorg-server: security bump version to 21.1.5
Release notes:
https://lists.x.org/archives/xorg-announce/2022-December/003303.html

Security advisory:
https://lists.x.org/archives/xorg-announce/2022-December/003302.html

Fixes CVE-2022-46340, CVE-2022-46341, CVE-2022-46342, CVE-2022-46343,
CVE-2022-46344 and CVE-2022-4283.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit b8881d4d7e)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 18:41:10 +01:00
Quentin Schulz
7898f6bd53 package/libxkbcommon: add LIBXKBCOMMON_CPE_ID_VENDOR
cpe:2.3🅰️xkbcommon:libxkbcommon is a valid CPE identifier for this
package:

  https://nvd.nist.gov/products/cpe/search/results?namingFormat=2.3&keyword=cpe%3A2.3%3Aa%3Axkbcommon%3Alibxkbcommon

Cc: Quentin Schulz <foss+buildroot@0leil.net>
Signed-off-by: Quentin Schulz <quentin.schulz@theobroma-systems.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 32c0225b72)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 18:31:24 +01:00
Fabrice Fontaine
cd43980688 package/libmbim: fix license
libmbim library is licensed under LGPL-2.1+ since at least version 1.8.0
and
25cc3ed88d

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit f3b31a39fd)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 18:20:58 +01:00
Christian Stewart
1e08067884 DEVELOPERS: add Christian Stewart to balena-engine package
Signed-off-by: Christian Stewart <christian@paral.in>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit fc644ed3be)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 18:11:00 +01:00
Thomas Claveirole
3ecd8dca4c DEVELOPERS: add Thomas Claveirole to package vuejs
Signed-off-by: Thomas Claveirole <thomas.claveirole@green-communications.fr>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit ba7b0bf52b)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 17:02:08 +01:00
Maxim Kochetkov
914c6fd93a package/postgresql: bump version to 14.6
Release notes: https://www.postgresql.org/docs/release/14.6/

Signed-off-by: Maxim Kochetkov <fido_max@inbox.ru>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 8f8592b686)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 16:52:02 +01:00
Christian Stewart
b7ccb8decc package/docker-cli: security bump to version 20.10.21
Partial mitigations for CVE-2022-39253 Git vulnerability and other fixes:

https://github.com/moby/moby/releases/tag/v20.10.21

Signed-off-by: Christian Stewart <christian@paral.in>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit c833234cb4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 15:18:59 +01:00
Christian Stewart
e57617fbce package/docker-engine: security bump to version 20.10.21
Partial mitigations for CVE-2022-39253 Git vulnerability and other fixes:

https://github.com/moby/moby/releases/tag/v20.10.21

Signed-off-by: Christian Stewart <christian@paral.in>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 309bc5d2d4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 15:18:57 +01:00
Peter Korsgaard
c1ab42087c package/containerd: security bump to version 1.5.16
CVE-2022-23471: https://github.com/advisories/GHSA-2qjp-425j-52j9

and other bugfixes, see:

https://github.com/containerd/containerd/releases/tag/v1.5.16

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 15:15:31 +01:00
Fabrice Fontaine
9b0eb58758 package/lttng-tools: bump to version 2.13.8
This bump will fix the following build failure without NPTL thanks to
27f2b8400c
which is raised since bump to version 2.13.2 in commit
8e5f2d0f8e and
014d7d3b5e:

In file included from thread.c:10:
../../src/common/compat/pthread.h: In function 'lttng_pthread_setname_np':
../../src/common/compat/pthread.h:63:27: error: 'LTTNG_UST_ABI_PROCNAME_LEN' undeclared (first use in this function)
   63 |         if (strnlen(name, LTTNG_UST_ABI_PROCNAME_LEN) >= LTTNG_UST_ABI_PROCNAME_LEN) {
      |                           ^~~~~~~~~~~~~~~~~~~~~~~~~~

https://github.com/lttng/lttng-tools/blob/v2.13.8/ChangeLog

Fixes:
 - http://autobuild.buildroot.org/results/bbc8d6621822bb5da7513331e69799ca25a03f66

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 2d94e7a621)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 14:09:46 +01:00
Fabrice Fontaine
fcf082ef0d package/capnproto: security bump to version 0.9.2
Fix CVE-2022-46149: Cap'n Proto is a data interchange format and remote
procedure call (RPC) system. Cap'n Proro prior to versions 0.7.1, 0.8.1,
0.9.2, and 0.10.3, as well as versions of Cap'n Proto's Rust
implementation prior to 0.13.7, 0.14.11, and 0.15.2 are vulnerable to
out-of-bounds read due to logic error handling list-of-list. This issue
may lead someone to remotely segfault a peer by sending it a malicious
message, if the victim performs certain actions on a list-of-pointer
type. Exfiltration of memory is possible if the victim performs
additional certain actions on a list-of-pointer type. To be vulnerable,
an application must perform a specific sequence of actions, described in
the GitHub Security Advisory. The bug is present in inlined code,
therefore the fix will require rebuilding dependent applications. Cap'n
Proto has C++ fixes available in versions 0.7.1, 0.8.1, 0.9.2, and
0.10.3.

https://github.com/capnproto/capnproto/security/advisories/GHSA-qqff-4vw4-f6hx
https://dwrensha.github.io/capnproto-rust/2022/11/30/out_of_bounds_memory_access_bug.html

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 040ab175df)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 09:09:53 +01:00
Peter Korsgaard
689015d71e package/x11r7/xserver_xorg-server: add upstream security fixes for CVE-2022-355{0, 1}
Fixes the following security issues:

- CVE-2022-3550: A vulnerability classified as critical was found in X.org
  Server.  Affected by this vulnerability is the function _GetCountedString
  of the file xkb/xkb.c.  The manipulation leads to buffer overflow.  It is
  recommended to apply a patch to fix this issue.  The associated identifier
  of this vulnerability is VDB-211051.

- CVE-2022-3551: A vulnerability, which was classified as problematic, has
  been found in X.org Server.  Affected by this issue is the function
  ProcXkbGetKbdByName of the file xkb/xkb.c.  The manipulation leads to
  memory leak.  It is recommended to apply a patch to fix this issue.  The
  identifier of this vulnerability is VDB-211052.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 66f3cc0b96)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 09:09:00 +01:00
Peter Korsgaard
b25aa7c065 package/asterisk: security bump to version 16.29.1
Fixes the following security issues:

- CVE-2022-37325: A zero length Called or Calling Party Number can cause a
  buffer under-run and Asterisk crash.

  https://downloads.asterisk.org/pub/security/AST-2022-007.html

- CVE-2022-42705: Use after free in res_pjsip_pubsub.c may allow a remote
  authenticated attacker to crash Asterisk (denial of service) by performing
  activity on a subscription via a reliable transport at the same time
  Asterisk is also performing activty on that subscription.

  https://downloads.asterisk.org/pub/security/AST-2022-008.html

- CVE-2022-42706: AMI Users with “config” permissions may read files outside
  of Asterisk directory via GetConfig AMI Action even if “live_dangerously"
  is set to "no"

  https://downloads.asterisk.org/pub/security/AST-2022-009.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit c34e0b1cd5)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 09:07:32 +01:00
Fabrice Fontaine
b61f781e50 package/exempi: bump to version 2.6.3
Samples can be disabled since version 2.6.2 and
a8db9f4e7e

This bump will fix the following build failure on arm with gcc 10 raised
since bump to version 2.6.0 in commit
55f1d0a359 and
0872e35a30
0872e35a30
thanks to
f26d77ba26:

/home/giuliobenetti/autobuild/run/instance-3/output-1/host/lib/gcc/arm-buildroot-linux-uclibcgnueabi/10.3.0/../../../../arm-buildroot-linux-uclibcgnueabi/bin/ld: ../../XMPFiles/source/.libs/libXMPFiles.a(XMPFiles_Impl.o):(.rodata+0x5c): multiple definition of `typeinfo name for TXMPMeta<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >'; XMPFilesCoverage.o:(.rodata+0x0): first defined here

https://gitlab.freedesktop.org/libopenraw/exempi/-/blob/2.6.3/NEWS

Fixes:
 - http://autobuild.buildroot.org/results/c440719de02a154c6bdae11bda06ea30c131c71d

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 63b540638c)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-21 09:07:05 +01:00
Francois Perrad
c463cfc0fb package/ruby: security bump to version 3.1.3
fix CVE-2021-33621: HTTP response splitting in CGI

see https://www.ruby-lang.org/en/news/2022/11/24/ruby-3-1-3-released/

Signed-off-by: Francois Perrad <francois.perrad@gadz.org>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 20f7ed86aa)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-20 13:12:19 +01:00
Bernd Kuhls
b072663e25 {linux, linux-headers}: bump 4.{9, 14, 19}.x / 5.{4, 10, 15}.x / 6.0.x series
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 6936ec7ec6)
[Peter: drop 6.0.x bump]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-20 12:52:55 +01:00
Norbert Lange
988a548da6 package/polkit: fix file permissions to match upstream
The permissions are now in sync with meson_post_install.py,
and debian.

Most importantly, polkit-agent-helper-1 is now setuid root,
but also the rules.d directories rather than their parents
are owned by polkitd.

Signed-off-by: Norbert Lange <nolange79@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 712ee21876)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-20 10:51:30 +01:00
Fabrice Fontaine
ceae152c70 package/libftdi1: fix static build with libusb and -latomic
Use pkg-config to retrieve libusb dependencies such as -latomic and
avoid the following static build failure raised since bump of libusb to
version 1.0.25 in commit aad609936f:

/nvmedata/autobuild/instance-29/output-1/per-package/libftdi1/host/bin/../lib/gcc/sparc-buildroot-linux-uclibc/10.3.0/../../../../sparc-buildroot-linux-uclibc/bin/ld: /nvmedata/autobuild/instance-29/output-1/per-package/libftdi1/host/sparc-buildroot-linux-uclibc/sysroot/lib/libusb-1.0.a(core.o): in function `libusb_unref_device':
/nvmedata/autobuild/instance-29/output-1/build/libusb-1.0.25/libusb/core.c:1186: undefined reference to `__atomic_fetch_add_4'

Fixes:
 - http://autobuild.buildroot.org/results/1ca7cd85ae60ad4797a6d8a83b2fb51d7eab96d9

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Reviewed-by: Yegor Yefremov <yegorslists@googlemail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit de82d57b56)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-20 08:44:19 +01:00
Fabrice Fontaine
f0b7ac81ba package/libuwsc: fix wolfssl build
libuwsc needs BR2_PACKAGE_WOLFSSL_ALL (which enables openssl compat
layer) to avoid the following wolfssl build failure raised since the
addition of the package in commit
120c04775d:

/home/br-user/work/instance-1/output-1/build/libuwsc-3.3.5/src/ssl.c:62:5: error: unknown type name 'SSL_CTX'
   62 |     SSL_CTX *ctx;
      |     ^~~~~~~

Note that we do not select _ALL when wolfssl is enabled, because wolfssl
is neither the only nor the preferred choice, so the condition would
have to be a bit more complex:

    select BR2_PACKAGE_WOLFSSL_ALL if BR2_PACKAGE_WOLFSSL \
        && !BR2_STATIC_LIBS && !BR2_PACKAGE_OPENSSL

It is not overly complicated, but it is no longer trivial or obvious,
and would easily break if the ordering of preferences were to change in
the .mk fie in the future.

Fixes:
 - http://autobuild.buildroot.org/results/6c2a6ed6fca1f92aab299f6ed9cd900b20e8d512

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
[yann.morin.1998@free.fr: explain why we don't select _ALL]
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 1567fbd72d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-16 16:04:26 +01:00
Fabrice Fontaine
2d32b043a6 package/connman: fix CVE-2022-3229{2,3}
Fix CVE-2022-32292: In ConnMan through 1.41, remote attackers able to
send HTTP requests to the gweb component are able to exploit a
heap-based buffer overflow in received_data to execute code.

Fix CVE-2022-32293: In ConnMan through 1.41, a man-in-the-middle attack
against a WISPR HTTP query could be used to trigger a use-after-free in
WISPR handling, leading to crashes or code execution.

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 2f2b4c80f4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-16 15:21:28 +01:00
Fabrice Fontaine
e3e8ebd7d7 package/botan: security bump to version 2.19.3
Fix CVE-2022-43705: In Botan before 2.19.3, it is possible to forge OCSP
responses due to a certificate verification error. This issue was
introduced in Botan 1.11.34 (November 2016).

https://github.com/randombit/botan/security/advisories/GHSA-4v9w-qvcq-6q7w
https://github.com/randombit/botan/blob/2.19.3/news.rst

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f276188ef7)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-16 15:18:01 +01:00
Fabrice Fontaine
d937041b8f package/botan: bump to version 2.19.2
Drop openssl dependency: "The OpenSSL provider was incompatible with
OpenSSL 3.0. It has been removed"

https://github.com/randombit/botan/blob/2.19.2/news.rst

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 72ac45acea)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-16 15:17:02 +01:00
Fabrice Fontaine
137a8dbee0 package/botan: fix mips64 build
Disable cc-tests to avoid the following build failure on mips64:

  ERROR: Configured target is mips64 but compiler probe indicates mips32

Fixes:
 - http://autobuild.buildroot.org/results/c44f44f36686268479563afd879db588e15ede7d

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit fb9a422eba)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-16 15:16:43 +01:00
Fabrice Fontaine
30e9d1c7f6 package/botan: bump to version 2.19.1
- Drop patch (not needed since
  97483f93bd)
- Update hash of license file (update in year:
  ff62a51ac2)

https://github.com/randombit/botan/blob/2.19.1/news.rst

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit e28156074d)
2022-12-16 15:16:37 +01:00
Peter Korsgaard
7b32bbb7ec package/go: security bump to version 1.18.9
go1.18.9 (released 2022-12-06) includes security fixes to the net/http and
os packages, as well as bug fixes to cgo, the compiler, the runtime, and the
crypto/x509 and os/exec packages

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-16 15:10:35 +01:00
Quentin Schulz
01548a7be1 package/wayland: fix CVE-2021-3782
Add an upstream patch to fix CVE-2021-3782:
An internal reference count is held on the buffer pool, incremented
every time a new buffer is created from the pool. The reference count is
maintained as an int; on LP64 systems this can cause the reference count
to overflow if the client creates a large number of wl_shm buffer
objects, or if it can coerce the server to create a large number of
external references to the buffer storage. With the reference count
overflowing, a use-after-free can be constructed on the wl_shm_pool
tracking structure, where values may be incremented or decremented; it
may also be possible to construct a limited oracle to leak 4 bytes of
server-side memory to the attacking client at a time.

The first patch (0003-util-set-errno-in-wl_map_reserve_new.patch) comes
from upstream and its sole purpose is to allow the patch fixing
CVE-2021-3782 to be cleanly applied without any modification.

Cc: Quentin Schulz <foss+buildroot@0leil.net>
Signed-off-by: Quentin Schulz <quentin.schulz@theobroma-systems.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-16 14:51:46 +01:00
Peter Korsgaard
ea51485ee9 Update for 2022.02.8
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-10 16:17:16 +01:00
Fabrice Fontaine
fa31c1b679 package/gdb: zlib is mandatory, not optional
zlib is a mandatory dependency of gdb and by default, gdb will use its
internal one. Moreover, --with-zlib has been replaced by
--with-system-zlib since version 7.10 and
fa1f5da0b6

Fixes:
 - https://bugs.buildroot.org/show_bug.cgi?id=15131

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 3341ceb1e5)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-09 14:47:11 +01:00
Fabrice Fontaine
404d6e29bf package/python3: fix CVE-2022-37454
The Keccak XKCP SHA-3 reference implementation before fdc6fef has an
integer overflow and resultant buffer overflow that allows attackers to
execute arbitrary code or eliminate expected cryptographic properties.
This occurs in the sponge function interface.

Python 3.11 and later switched to using tiny_sha3 in GH-32060, so they
should not be affected.

https://github.com/python/cpython/issues/98517

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 92d96e8513)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-08 10:56:46 +01:00
Fabrice Fontaine
a69856d902 package/optee-client: rename S30optee
Commit b1c4c18766 forgot to rename
S30optee in optee-client.mk resulting in the following build failure:

/usr/bin/install -m 0755 -D package/optee-client//S30optee /home/autobuild/autobuild/instance-0/output-1/target/etc/init.d/S30optee
/usr/bin/install: cannot stat 'package/optee-client//S30optee': No such file or directory

Fixes:
 - http://autobuild.buildroot.org/results/21fc165933e6d226de277b62d4ce99342cef0ffb

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit cac489ce1d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-08 10:55:26 +01:00
Max Filippov
096dfb90eb package/elf2flt: fix text relocations on xtensa
elf2flt 2021.08 has changed endianness swapping logic for relocated
entries in the text segment. This broke little-endian xtensa FLAT images
which now fail to start with the following message:

  binfmt_flat: reloc outside program 0x24c80100 (0 - 0x6e430/0x56a20)

Fix it by restoring old endianness swapping logic for relocated entries
in the text segment when building for xtensa.

Reported-by: Niklas Cassel <niklas.cassel@wdc.com>
Signed-off-by: Max Filippov <jcmvbkbc@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit 3781e4efc5)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-08 10:54:58 +01:00
Etienne Carriere
33281360cc package: optee-client: fix indentation issues
Fix issues reported by utils/check-package:
    package/optee-client/S30optee:40: should be indented with tabs (http://nightly.buildroot.org/#adding-packages-start-script)
    package/optee-client/S30optee:46: should be indented with tabs (http://nightly.buildroot.org/#adding-packages-start-script)
    package/optee-client/S30optee:47: should be indented with tabs (http://nightly.buildroot.org/#adding-packages-start-script)
    package/optee-client/S30optee:48: should be indented with tabs (http://nightly.buildroot.org/#adding-packages-start-script)
    package/optee-client/S30optee:0: filename should be S<number><number><daemon name> (http://nightly.buildroot.org/#adding-packages-start-script)
    package/optee-client/S30tee-supplicant:0: run 'shellcheck' and fix the warnings

Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
[yann.morin.1998@free.fr:
  - fix shellcheck SC2086
  - rename the file
]
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
(cherry picked from commit b1c4c18766)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-08 10:53:09 +01:00
Giulio Benetti
6d3e43a946 package/rtl8723bu: fix build failure due to missing Linux options
This driver requires:
CONFIG_NET
CONFIG_WIRELESS
CONFIG_CFG80211
CONFIG_USB_SUPPORT
CONFIG_USB
to build so let's add them to RTL8723BU_LINUX_CONFIG_FIXUPS.

Fixes:
http://autobuild.buildroot.net/results/7f3637760ad88d314e6812865f3667d1de091957/

Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 1978e9b021)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-12-08 10:49:44 +01:00