summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* zabbix: fix CVE-2023-29449Urade, Yogitag2023-08-032-0/+248
| | | | | | | | | | | | | | | | | JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access. References: https://support.zabbix.com/browse/ZBX-22589 Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* python3-django: upgrade 4.2.1 -> 4.2.3Narpat Mali2023-08-031-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The delta between 4.2.1 and 4.2.3 contains the CVE-2023-36053 fix and other bugfixes. git log --oneline 4.2.1..4.2.3 shows: 1651351386 (tag: 4.2.3) [4.2.x] Bumped version for 4.2.3 release. b7c5feb35a [4.2.x] Fixed CVE-2023-36053 -- Prevented potential ReDoS in EmailValidator and URLValidator. 1ea11365f6 [4.2.x] Fixed typo in docs/intro/tutorial08.txt. 7b45fe01ab [4.2.x] Added dedicated section for output_field in query expressions docs. 67fe092a85 [4.2.x] Fixed typo in docs/ref/models/querysets.txt. 9ab56e64de [4.2.x] Added stub release notes and release date for 4.2.3, 4.1.10, and 3.2.20. a18e0f44d5 [4.2.x] Corrected admin.E013 check message in docs. fabd0510a0 [4.2.x] Fixed typo in docs/topics/db/fixtures.txt. 4b433ef236 [4.2.x] Refs #30220 -- Bumped required version of Selenium to 3.8.0. 9e9a286bed [4.2.x] Fixed #34638 -- Fixed admin change list selected row highlight on editable boolean fields. 31d1fc36b3 [4.2.x] Fixed #34645 -- Restored alignment for admin date/time timezone warnings. eb84c068ed [4.2.x] Fixed #30355 -- Doc'd interaction between custom managers and prefetch_related(). b2355a8df3 [4.2.x] Added stub release notes for 4.2.3. 10de214055 [4.2.x] Post-release version bump. 6218ed3454 (tag: 4.2.2) [4.2.x] Bumped version for 4.2.2 release. e84d38ab36 [4.2.x] Added release date for 4.2.2. 87a4cd559b [4.2.x] Fixed #34620 -- Fixed serialization crash on m2m fields without natural keys when base querysets use select_related(). 66d9fa4371 [4.2.x] Refs #23528 -- Made cosmetic edits to swappable_dependency() docs. 92ad551afd [4.2.x] Fixed #23528 -- Doc'd django.db.migrations.swappable_dependency(). 738386470d [4.2.x] Fixed #34612 -- Fixed QuerySet.only() crash on reverse relationships. dae052d823 [4.2.x] Fixed #34595 -- Doc'd that format_string arg of format_html() is not escaped. dca5f5d58a [4.2.x] Fixed #34600 -- Removed references to bleach in docs. 25bd9faf32 [4.2.x] Fixed #34574 -- Noted unexpected outcomes in autoescape/escape docs. 91f8df5c2e [4.2.x] Fixed #34590 -- Reverted "Refs #33308 -- Improved adapting DecimalField values to decimal." a44e974412 [4.2.x] Corrected documentation of Log database function. bf5249fc8e [4.2.x] Refs #34118 -- Fixed FunctionalTests.test_cached_property_reuse_different_names() on Python 3.12+. c78a4421de [4.2.x] Fixed #34551 -- Fixed QuerySet.aggregate() crash when referencing subqueries. 57f499e412 [4.2.x] Refs #34551 -- Fixed QuerySet.aggregate() crash on precending aggregation reference. b4563cdd23 [4.2.x] Fixed #34579 -- Added Django Forum to contributing guides. 37ba4c3a94 [4.2.x] Fixed references to django.core.cache in docs. 6b76481fb9 [4.2.x] Fixed #34588 -- Removed usage of nonexistent stylesheet in the 'Congrats' page. e1c00f8b36 [4.2.x] Fixed #34580 -- Avoided unnecessary computation of selected expressions in SQLCompiler. cdd970ae22 [4.2.x] Fixed #34568 -- Made makemigrations --update respect --name option. 2b5c5e54de [4.2.x] Updated broken links in docs. 201d29b371 [4.2.x] Fixed #34570 -- Silenced noop deferral of many-to-many and GFK. 9c301814b0 [4.2.x] Fixed #34539 -- Restored get_prep_value() call when adapting JSONFields. ddccecee91 [4.2.x] Fixed #34556 -- Doc'd that StreamingHttpResponse accepts memoryviews and strings iterators. dbe263751c [4.2.x] Clarified database connections lifetime outside HTTP requests. e50fe33e13 [4.2.x] Made explicit the location of locally-built HTML docs. e0d8981139 [4.2.x] Fixed #34544 -- Avoided DBMS_LOB.SUBSTR() wrapping with IS NULL condition on Oracle. dc3b8190ed [4.2.x] Fixed #34545 -- Corrected the number of months in installation FAQ. bcf66f1355 [4.2.x] Corrected code-block directive in docs/ref/templates/builtins.txt. 4eaed191b6 [4.2.x] Corrected code-block directives in docs. 9ec1ff7879 [4.2.x] Fixed MultipleFileFieldTest.test_file_multiple_validation() test if Pillow isn't installed. 2756c69601 [4.2.x] Added CVE-2023-31047 to security archive. 110919987b [4.2.x] Added stub release notes for 4.2.2. 00152276e9 [4.2.x] Post-release version bump. Release Notes: https://docs.djangoproject.com/en/dev/releases/4.2.3/ Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* python3-django: upgrade 3.2.19 -> 3.2.20Narpat Mali2023-08-031-2/+2
| | | | | | | | | | | | | | | | | The delta between 3.2.19 and 3.2.20 contains the CVE-2023-36053 fix and other bugfixes. git log --oneline 3.2.19..3.2.20 shows: 19bc11f636 (tag: 3.2.20) [3.2.x] Bumped version for 3.2.20 release. 454f2fb934 [3.2.x] Fixed CVE-2023-36053 -- Prevented potential ReDoS in EmailValidator and URLValidator. 07cc014cb3 [3.2.x] Added stub release notes for 3.2.20. e1bbbbe6ac [3.2.x] Fixed MultipleFileFieldTest.test_file_multiple_validation() test if Pillow isn't installed. 47ef12e69c [3.2.x] Added CVE-2023-31047 to security archive. 15f90ebff3 [3.2.x] Post-release version bump. Release Notes: https://docs.djangoproject.com/en/dev/releases/3.2.20/ Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* yasm: fix CVE-2023-31975Polampalli, Archana2023-08-032-0/+30
| | | | | | | | | | | | | | | yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. References: https://nvd.nist.gov/vuln/detail/CVE-2023-31975 https://github.com/yasm/yasm/issues/210 Upstream patches: https://github.com/yasm/yasm/commit/b2cc5a1693b17ac415df76d0795b15994c106441 Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* python3-gcovr: Fix parsing of gcc-11 gcov metadataJasper Orschulko2023-07-252-0/+85
| | | | | | | | | | gcc-11 has metadata line "-: 0:Source is newer than graph" which throws an error. Backported from gcovr 5.2, as kirkstone release uses gcc-11. Signed-off-by: Jasper Orschulko <jasper@fancydomain.eu> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* yaml-cpp: Fix cmake exportJasper Orschulko2023-07-252-0/+118
| | | | | Signed-off-by: Jasper Orschulko <jasper@fancydomain.eu> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* libyang: fix CVE-2023-26917Urade, Yogita2023-07-252-0/+41
| | | | | | | | | | | | libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer dereference via the function lysp_stmt_validate_value at lys_parse_mem.c. References: https://github.com/CESNET/libyang/issues/1987 Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* frr: fix for CVE-2023-31490Narpat Mali2023-07-162-0/+161
| | | | | | | | | | | | | An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_attr_psid_sub() function. References: https://nvd.nist.gov/vuln/detail/CVE-2023-31490 https://github.com/FRRouting/frr/issues/13099 Signed-off-by: Narpat Mali <narpat.mali@windriver.com> [Fixup so patch would apply] Signed-off-by: Armin Kuster <akuster808@gmail.com>
* mbedtls: build with v2 version by defaultBeniamin Sandu2023-07-161-0/+3
| | | | | | | | For anyone else that wants to use the newer v3, there is PREFERRED_VERSION. Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* nodejs: upgrade 16.19.1 -> 16.20.1Polampalli, Archana2023-07-164-77/+1
| | | | | | | | | | | | | | | | | | | Drop the gcc13.patch as it has been merged in 16.20.1 56cbc7fdda deps: V8: cherry-pick c2792e58035f The list of the CVEs are fixed in this relase: CVE-2023-30581 CVE-2023-30585 CVE-2023-30588 CVE-2023-30589 CVE-2023-30590 https://nodejs.org/en/blog/release/v16.20.0 https://nodejs.org/en/blog/release/v16.20.1 Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* webserver: nginx: Add streamLuke Schaefer2023-07-041-0/+1
| | | | | | | | Signed-off-by: Luke Schaefer <lukeschafer17@gmail.com> Add stream support to nginx PACKAGECONFIG Signed-off-by: Armin Kuster <akuster808@gmail.com>
* python3-werkzeug: fix for patch-fuzzNarpat Mali2023-07-021-17/+18
| | | | | | | Modified the CVE-2023-23934.patch to fix the patch-fuzz. Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* yajl: CVE-2023-33460 memory leak in yajl_tree_parse functionHitendra Prajapati2023-07-022-1/+32
| | | | | | | Upstream-Status: Backport from https://github.com/openEuler-BaseService/yajl/commit/23a122eddaa28165a6c219000adcc31ff9a8a698 Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* ntp: backport patch for 5 CVEs CVE-2023-26551/2/3/4/5Peter Marko2023-07-022-0/+332
| | | | | | | | | | | | Patch taken from https://archive.ntp.org/ntp4/ntp-4.2/ntp-4.2.8p15-3806-3807.patch It is linked as official patch for p15 in: - https://www.ntp.org/support/securitynotice/ntpbug3807/ - https://www.ntp.org/support/securitynotice/ntpbug3806/ Small adaptation to build is needed because of how tests are built. Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* mbedtls: add support for v3.xBeniamin Sandu2023-07-024-0/+167
| | | | | | | | | | Version 3.4.0 adds a lot of improvements and fixes (a notable one being initial support for PKCS7 CMS), but since this is a pretty big jump, let's keep both versions for a while, so the v2.x users can upgrade to 3.x in a timely manner if needed. Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* tcpreplay: upgrade 4.4.2 -> 4.4.4Polampalli, Archana2023-07-021-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This release contains bug fixes only. The following CVEs have been addressed: CVE-2023-27783 CVE-2023-27784 CVE-2023-27785 CVE-2023-27786 CVE-2023-27787 CVE-2023-27788 CVE-2023-27789 Changelog: ========= dlt_jnpr_ether_cleanup: check subctx before cleanup by @Marsman1996 in #781 Bug #780 assert tcpedit dlt cleanup by @fklassen in #800 Fix bugs caused by strtok_r by @Marsman1996 in #783 Bug #782 #784 #785 #786 #787 #788 strtok r isuses by @fklassen in #801 Update en10mb.c by @david-guti in #793 PR #793 ip6 unicast flood by @fklassen in #802 Bug #719 fix overflow check for parse_mpls() by @fklassen in #804 PR #793 - update tests for corrected IPv6 MAC by @fklassen in #805 PR #793 - update tests for vlandel by @fklassen in #806 Feature #773 gh actions ci by @fklassen in #807 Feature #759: Upgrade autogen/libopts to 5.18.16 by @fklassen in #760 Bug #751 don't exit after send error by @fklassen in #761 Bug #750: configure: libpcap version robustness by @fklassen in #764 Bug #749 flow stats: avoid overstating flow packet count by @fklassen in #765 Bug #750 more libpcap version updates by @fklassen in #766 Bug #767 tests: support for out-of-tree tests by @fklassen in #768 Bug #750 - fix macOS test failure by @fklassen in #770 4.4.3 by @fklassen in #769 and #771 Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* grpc: ignore CVE-2023-32732Peter Marko2023-07-021-0/+3
| | | | | | | | | It was introduced in in v1.53.0 and not backported to v1.46.x branch. NVD references PR which intrioduces the vulnerability: https://github.com/grpc/grpc/pull/32309#issuecomment-1589561295 Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* libssh: CVE-2020-16135 Fix NULL pointer dereference in sftpserver.cHitendra Prajapati2023-07-022-1/+47
| | | | | | | Upstream-Status: Backport from https://git.libssh.org/projects/libssh.git/patch/?id=0a9268a60f2d3748ca69bde5651f20e72761058c Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* opensc: Fix CVE-2023-2977Soumya2023-07-022-0/+54
| | | | | | | | | | | | | A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible. Signed-off-by: Soumya <soumya.sambu@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* wireshark: Fix Multiple CVEsHitendra Prajapati2023-07-024-0/+224
| | | | | | | | | | Backport fixes for: * CVE-2023-0666 - Upstream-Status: Backport from https://gitlab.com/wireshark/wireshark/-/commit/265cbf15a418b629c3c8f02c0ba901913b1c8fd2 * CVE-2023-0667 - Upstream-Status: Backport from https://gitlab.com/wireshark/wireshark/-/commit/85fbca8adb09ea8e1af635db3d92727fbfa1e28a * CVE-2023-0668 - Upstream-Status: Backport from https://gitlab.com/wireshark/wireshark/-/commit/c4f37d77b29ec6a9754795d0efb6f68d633728d9 Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* postgresql: fix CVE-2023-2454 & CVE-2023-2455vkumbhar2023-06-233-0/+355
| | | | | | | | | fixed Below security CVE: 1)CVE-2023-2454 postgresql: schema_element defeats protective search_path changes. 2)CVE-2023-2455 postgresql: row security policies disregard user ID changes after inlining. Signed-off-by: Vivek Kumbhar <vkumbhar@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* frr: fix for CVE-2023-31489Narpat Mali2023-06-232-0/+53
| | | | | | | | | | | | | An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_capability_llgr() function. References: https://nvd.nist.gov/vuln/detail/CVE-2023-31489 https://github.com/FRRouting/frr/issues/13098 Signed-off-by: Narpat Mali <narpat.mali@windriver.com> [Refactored to get it to apply] Signed-off-by: Armin Kuster <akuster808@gmail.com>
* opencv: fix for CVE-2023-2618Narpat Mali2023-06-232-0/+33
| | | | | | | | | | | | | | | A vulnerability, which was classified as problematic, has been found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this issue is the function DecodedBitStreamParser::decodeHanziSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to memory leak. The attack may be launched remotely. The name of the patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-228548. Signed-off-by: Narpat Mali <narpat.mali@windriver.com> [Refactored to apply to kirkstone] Signed-off-by: Armin Kuster <akuster808@gmail.com>
* c-ares: backport patch for CVE-2023-31147Peter Marko2023-06-232-0/+718
| | | | | | | Backported from https://github.com/c-ares/c-ares/commit/823df3b989e59465d17b0a2eb1239a5fc048b4e5 Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* ExprTk: Update package to release/0.0.2Arash Partow2023-06-191-2/+2
| | | | | | | Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit 0522e66a26b1f4778948553a193a4728fb239efe) [The SRC_URI HASH no longer exists in repo so use 0.0.2 version] Signed-off-by: Armin Kuster <akuster808@gmail.com>
* Googletest: Adapt googletest 1.11.0 with gcc11sana kazi2023-06-192-1/+44
| | | | | | | | | | | | | | | | | | | Backport a commit to fix the build error when using gcc11. [commit] https://github.com/google/googletest/pull/3993/commits/096014a45dc38dff993f5b7bb28a258d8323344b [error] /usr/include/gtest/gtest-printers.h:291:36: error: no matching function for call to ‘testing::internal::internal_stream_operator_without_lexical_name_lookup::StreamPrinter::PrintValue(const A::B::C::D::E::F::G&, std::nullptr_t)’ 291 | T, decltype(Printer::PrintValue(std::declval<const T&>(), nullptr)), | ~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /usr/include/gtest/gtest-printers.h:214:15: note: candidate: ‘template<class T, class, class> static void testing::internal::internal_stream_operator_without_lexical_name_lookup::StreamPrinter::PrintValue(const T&, std::ostream*)’ 214 | static void PrintValue(const T& value, ::std::ostream* os) { | ^~~~~~~~~~ Signed-off-by: Peng Cui <peng.ca.cui@bmw.com> Signed-off-by: Sana Kazi <sana.kazi@kpit.com> Signed-off-by: Sana Kazi <sanakazisk19@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* samba: fix CVE-2021-44758Polampalli, Archana2023-06-172-0/+73
| | | | | | | | | | | | | | | Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept. References: https://nvd.nist.gov/vuln/detail/CVE-2021-44758 Upstream patches: https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580 Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* samba: fix CVE-2022-41916Polampalli, Archana2023-06-172-0/+39
| | | | | | | | | | | | | | | | | | | Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's libhx509. Users should upgrade to Heimdal 7.7.1 or 7.8. There are no known workarounds for this issue. References: https://nvd.nist.gov/vuln/detail/CVE-2022-41916 Upstream patches: https://github.com/heimdal/heimdal/commit/eb87af0c2d189c25294c7daf483a47b03af80c2c Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* samba: fix CVE-2022-45142Polampalli, Archana ñ2023-06-172-0/+52
| | | | | | | | | | | | | | | | | | | The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted. References: https://nvd.nist.gov/vuln/detail/CVE-2022-45142 Upstream patches: https://www.openwall.com/lists/oss-security/2023/02/08/1 https://github.com/heimdal/heimdal/commit/5f63215d0d82678233fdfb1c07f4b421f57c528b Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* samba: fix CVE-2022-3437Polampalli, Archana A2023-06-179-0/+416
| | | | | | | | | | | | | | | | | | | | | | | | | | A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack. References: https://nvd.nist.gov/vuln/detail/CVE-2022-3437 Upstream patches: https://github.com/heimdal/heimdal/commit/f6edaafcfefd843ca1b1a041f942a853d85ee7c3 https://github.com/heimdal/heimdal/commit/c9cc34334bd64b08fe91a2f720262462e9f6bb49 https://github.com/heimdal/heimdal/commit/a587a4bcb28d5b9047f332573b1e7c8f89ca3edd https://github.com/heimdal/heimdal/commit/c758910eaad3c0de2cfb68830a661c4739675a7d https://github.com/heimdal/heimdal/commit/414b2a77fd61c26d64562e3800dc5578d9d0f15d https://github.com/heimdal/heimdal/commit/be9bbd93ed8f204b4bc1b92d1bc3c16aac194696 https://github.com/heimdal/heimdal/commit/c8407ca079294d76a5ed140ba5b546f870d23ed2 https://github.com/heimdal/heimdal/commit/8fb508a25a6a47289c73e3f4339352a73a396eef Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* wireshark: CVE-2023-2952 XRA dissector infinite loopHitendra Prajapati2023-06-172-0/+99
| | | | | | | Upstream-Status: Backport from https://gitlab.com/wireshark/wireshark/-/commit/e18d0e369729b0fff5f76f41cbae67e97c2e52e5 Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* python3-sqlparse: fix for CVE-2023-30608Narpat Mali2023-06-172-0/+76
| | | | | | | | | | | | sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was introduced by commit `e75e358`. The vulnerability may lead to Denial of Service (DoS). This issues has been fixed in sqlparse 0.4.4 by commit `c457abd5f`. Users are advised to upgrade. There are no known workarounds for this issue. Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* python3-django: upgrade 3.2.12 -> 3.2.19Narpat Mali2023-06-171-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The delta between 3.2.12 and 3.2.19 contain numerous CVEs and other bugfixes. git log --oneline 3.2.12..3.2.19 shows: fc42edd2e6 (tag: 3.2.19) [3.2.x] Bumped version for 3.2.19 release. eed53d0011 [3.2.x] Fixed CVE-2023-31047, Fixed #31710 -- Prevented potential bypass of validation when uploading multiple files using one form field. 007e46d815 [3.2.x] Added missing backticks in docs/releases/1.7.txt. a37e4d5d6e [3.2.x] Added stub release notes for 3.2.19. 963f24cff2 [3.2.x] Added CVE-2023-24580 to security archive. e34a2283f2 [3.2.x] Post-release version bump. 722e9f8a38 (tag: 3.2.18) [3.2.x] Bumped version for 3.2.18 release. a665ed5179 [3.2.x] Fixed CVE-2023-24580 -- Prevented DoS with too many uploaded files. 932b5bd52d [3.2.x] Added stub release notes for 3.2.18. c35a5788f4 [3.2.x] Added CVE-2023-23969 to security archive. 9bd8db3940 [3.2.x] Post-release version bump. aed1bb56d1 (tag: 3.2.17) [3.2.x] Bumped version for 3.2.17 release. c7e0151fdf [3.2.x] Fixed CVE-2023-23969 -- Prevented DoS with pathological values for Accept-Language. 9da46345d8 [3.2.x] Fixed inspectdb.tests.InspectDBTestCase.test_custom_fields() on SQLite 3.37+. 4c2b26174f [3.2.x] Removed 'tests' path prefix in a couple tests. d21543182d [3.2.x] Adjusted release notes for 3.2.17. 4e31d3ea55 [3.2.x] Added stub release notes for 3.2.17. 238e8898ac [3.2.x] Corrected passenv value for tox 4.0.6+. b381ab4906 [3.2.x] Disabled auto-created table of contents entries on Sphinx 5.2+. f6f0699d01 [3.2.x] Removed obsolete doc reference to asyncio.iscoroutinefunction. accdd0576d [3.2.x] Added CVE-2022-36359 to security archive. 7190b38b8d [3.2.x] Post-release version bump. 4c85beca9d (tag: 3.2.16) [3.2.x] Bumped version for 3.2.16 release. 5b6b257fa7 [3.2.x] Fixed CVE-2022-41323 -- Prevented locales being interpreted as regular expressions. 33affaf0b6 [3.2.x] Added stub notes 3.2.16 release. 777362d74a [3.2.x] Added CVE-2022-36359 to security archive. eb5bdb461e [3.2.x] Post-release version bump. 653a7bd7b7 (tag: 3.2.15) [3.2.x] Bumped version for 3.2.15 release. b3e4494d75 [3.2.x] Fixed CVE-2022-36359 -- Escaped filename in Content-Disposition header. cb7fbac9f8 [3.2.x] Fixed collation tests on MySQL 8.0.30+. 840d009c06 [3.2.x] Fixed inspectdb and schema tests on MariaDB 10.6+. a5eba20f40 Adjusted release notes for 3.2.15. ad104fb50f [3.2.x] Added stub release notes for 3.2.15 release. 22916c8c1f [3.2.x] Fixed RelatedGeoModelTest.test08_defer_only() on MySQL 8+ with MyISAM storage engine. e1cfbe58b7 [3.2.x] Added CVE-2022-34265 to security archive. 605cf0d3f6 [3.2.x] Post-release version bump. 746e88cc63 (tag: 3.2.14) [3.2.x] Bumped version for 3.2.14 release. a9010fe555 [3.2.x] Fixed CVE-2022-34265 -- Protected Trunc(kind)/Extract(lookup_name) against SQL injection. 3acf156be3 [3.2.x] Fixed GEOSTest.test_emptyCollections() on GEOS 3.8.0. 4a5d98ee0a [3.2.x] Bumped minimum Sphinx version to 4.5.0. 1a9098166e [3.2.x] Fixed docs build with sphinxcontrib-spelling 7.5.0+. 37f4de2deb [3.2.x] Added stub release notes for 3.2.14. 7595f763a9 [3.2.x] Fixed test_request_lifecycle_signals_dispatched_with_thread_sensitive with asgiref 3.5.1+. 2dc85ecf3e [3.2.x] Fixed CoveringIndexTests.test_covering_partial_index() when DEFAULT_INDEX_TABLESPACE is set. a23c25d84a [3.2.x] Fixed #33753 -- Fixed docs build on Sphinx 5+. e01b383e02 [3.2.x] Added CVE-2022-28346 and CVE-2022-28347 to security archive. ac2fb5ccb6 [3.2.x] Post-release version bump. 08e6073f87 (tag: 3.2.13) [3.2.x] Bumped version for 3.2.13 release. 9e19accb6e [3.2.x] Fixed CVE-2022-28347 -- Protected QuerySet.explain(**options) against SQL injection on PostgreSQL. 2044dac5c6 [3.2.x] Fixed CVE-2022-28346 -- Protected QuerySet.annotate(), aggregate(), and extra() against SQL injection in column aliases. bdb92dba0b [3.2.x] Fixed #33628 -- Ignored directories with empty names in autoreloader check for template changes. 70035fb044 [3.2.x] Added stub release notes for 3.2.13 and 2.2.28. 7e7ea71a8d [3.2.x] Reverted "Fixed forms_tests.tests.test_renderers with Jinja 3.1.0+." 610ecc9053 [3.2.x] Fixed forms_tests.tests.test_renderers with Jinja 3.1.0+. 754af45773 [3.2.x] Fixed typo in release notes. 6f309165e5 [3.2.x] Added CVE-2022-22818 and CVE-2022-23833 to security archive. 1e6b555c92 [3.2.x] Post-release version bump. Release Notes: https://docs.djangoproject.com/en/3.2/releases/ Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* python3-django: fix for CVE-2023-31047Narpat Mali2023-06-172-0/+354
| | | | | | | | | | | | | | | In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise. Since, there is no ptest available for python3-django so have not tested the patch changes at runtime. Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: use the files path correctlyChen Qi2023-06-1510-2/+0
| | | | | | | | | | | | | | | | | | | | | Recipes are not expected to set FILESPATH directly, they are expected to use FILESEXTRAPATH. I can see the seting of FILESPATH in this recipe only wants to find redis-7 specific patches and files. This could be easily achieved by using redis-7.0.11/ directory to hold all those files. Using FILESPATH in this way removes the possibility of overriding some files (e.g., the redis service file) from other layers via FILESEXTRAPATH:prepend, which is kind of a common practice and is actually working for basically all other recipes. This is because we have: meta/classes-global/base.bbclass:FILESPATH = "${@base_set_filespath(["${FILE_DIRNAME}/${BP}", "${FILE_DIRNAME}/${BPN}", "${FILE_DIRNAME}/files"], d)}" And FILESEXTRAPATH is handled in base_set_filespath. Signed-off-by: Chen Qi <Qi.Chen@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* meta-oe: add pahole to NON_MULTILIB_RECIPESXiangyu Chen2023-06-151-1/+1
| | | | | | | | pahole need to line up with kernel's architectures bitsize, so add it to NON_MULTILIB_RECIPES. Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* openldap: Fix CVE-2023-2953Ashish Sharma2023-06-153-0/+108
| | | | | | | | | | Upstream-Status: Backport [https://git.openldap.org/openldap/openldap/-/commit/752d320cf96e46f24c0900f1a8f6af0a3fc3c4ce & https://git.openldap.org/openldap/openldap/-/commit/6563fab9e2feccb0a684d0398e78571d09fb808b] Signed-off-by: Ashish Sharma <asharma@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* c-ares: ignore CVE-2023-31124Peter Marko2023-06-151-0/+4
| | | | | | | | | | | | CVE-2023-31124 applies only when cross-compiling using autotools. Yocto cross-compiles via cmake which is also listed as official workaround. See: * https://nvd.nist.gov/vuln/detail/CVE-2023-31124 * https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4 Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* opencv: Fix for CVE-2023-2617Soumya2023-06-152-0/+89
| | | | | | | | | | | | | | A vulnerability classified as problematic was found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this vulnerability is the function DecodedBitStreamParser::decodeByteSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-228547. Signed-off-by: Soumya <soumya.sambu@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* lapack: add packageconfig for lapackeAdrian Zaharia2023-06-151-0/+3
| | | | | | | | | | backport of commit: d799db35d lapack: add packageconfig for lapacke Signed-off-by: Adrian Zaharia <Adrian.Zaharia@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Randy MacLeod <Randy.MacLeod@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* python3-werkzeug: fix for CVE-2023-23934Narpat Mali2023-06-112-1/+118
| | | | | | | | | | | | | | | Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3. Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* gnulib: Update recipe name to 2018-12-18schitrod=cisco.com@lists.openembedded.org2023-06-111-0/+0
| | | | | | | | | | | | | | | | | | | | As per gnulib_2018-03-07 recipe information, SRCREV = "0d6e3307bbdb8df4d56043d5f373eeeffe4cbef3" This revision was committed on "2018-12-18". There is a discrepancy between SRCREV and the recipe version. Which reports "CVE-2018-17942" as unpatched. To report "CVE-2018-17942" as patched, We need to align a recipe name with SRCREV commit date. Signed-off-by: Sanjay Chitroda <schitrod@cisco.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit 9edbe7033cc41f4a49f74717cd3146b52588ce22) Signed-off-by: Sanjay Chitroda <schitrod@cisco.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> (cherry picked from commit 928658212611ea457a5eacec48f0760e03269a24) Signed-off-by: Armin Kuster <akuster808@gmail.com>
* c-ares: fix CVEs CVE-2023-32067 and CVE-2023-31130vkumbhar2023-06-113-0/+415
| | | | | | | | | Fix below CVE: 1)CVE-2023-32067 c-ares: 0-byte UDP payload Denial of Service. 2)CVE-2023-31130 c-ares: Buffer Underwrite in ares_inet_net_pton(). Signed-off-by: Vivek Kumbhar <vkumbhar@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* wireshark: Fix CVE-2023-2858 & CVE-2023-2879Hitendra Prajapati2023-06-113-0/+134
| | | | | | | | | Backport fixes for: * CVE-2023-2858 - Upstream-Status: Backport from https://gitlab.com/wireshark/wireshark/-/commit/cb190d6839ddcd4596b0205844f45553f1e77105 * CVE-2023-2879 - Upstream-Status: Backport from https://gitlab.com/wireshark/wireshark/-/commit/118815ca7c9f82c1f83f8f64d9e0e54673f31677 Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* wireshark: CVE-2023-2856 VMS TCPIPtrace file parser crashHitendra Prajapati2023-06-112-0/+70
| | | | | | | Upstream-Status: Backport from https://gitlab.com/wireshark/wireshark/-/commit/db5135826de3a5fdb3618225c2ff02f4207012ca Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* wireshark: CVE-2023-2855 Candump log file parser crashHitendra Prajapati2023-06-112-0/+109
| | | | | | | Upstream-Status: Backport from https://gitlab.com/wireshark/wireshark/-/commit/0181fafb2134a177328443a60b5e29c4ee1041cb Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* python3-m2crypto: fix for CVE-2020-25657Narpat Mali2023-06-032-0/+176
| | | | | | | | | | A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality. Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* libyang: backport a fix for CVE-2023-26916Natasha Bailey2023-06-032-0/+58
| | | | | | | | | | | | | This patch fixes a bug in libyang which could cause a null pointer dereference from a call to strcmp. Since this recipe includes ptests, the tests were run twice (once before the patch and once after) with the same results: all tests passing except utest_types, which is skipped. Signed-off-by: Natasha Bailey <nat.bailey@windriver.com> Signed-off-by: Randy MacLeod <Randy.MacLeod@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* python3-django: upgrade 4.0.2 -> 4.2.1Narpat Mali2023-06-031-1/+1
| | | | | | | | | | | | | | | Django 4.2* is designated as a long-term support release. It will receive security updates for at least three years after its release (From April-2023 to April-2026). The delta between 4.0.2 and 4.2.1 contain numerous CVEs and other bugfixes. Changelog: https://docs.djangoproject.com/en/dev/releases/4.2.1/ Signed-off-by: Randy MacLeod <randy.macleod@windriver.com> Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* frr: Security fix CVE-2022-43681Jonas Gorski2023-05-242-0/+60
| | | | | | | | | | | | | | | | | | | | | | Add a security fix cherry-picked from master: CVE-2022-40318: An out-of-bounds read exists in the BGP daemon of FRRouting FRR through 8.4. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition. Reference: https://nvd.nist.gov/vuln/detail/CVE-2022-43681 https://cyberriskleaders.com/new-vulnerabilities-disclosed-in-frrouting-software/ Patch from: https://github.com/FRRouting/frr/commit/766eec1b7accffe2c04a5c9ebb14e9f487bb9f78 Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de> Signed-off-by: Armin Kuster <akuster808@gmail.com>