]> Git Repo - buildroot-mgba.git/log
buildroot-mgba.git
13 months agopackage/onevpl: rename package to libvpl
Bernd Kuhls [Sun, 24 Dec 2023 08:13:19 +0000 (09:13 +0100)]
package/onevpl: rename package to libvpl

Upstream changed the package name and its github repo:
https://github.com/intel/libvpl/commit/44df6e08cc836ed65725ed344e7ec9ded5193874

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/intel-mediadriver: bump version to 23.4.3
Bernd Kuhls [Sun, 24 Dec 2023 08:13:18 +0000 (09:13 +0100)]
package/intel-mediadriver: bump version to 23.4.3

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/intel-gmmlib: bump version to 22.3.16
Bernd Kuhls [Sun, 24 Dec 2023 08:13:17 +0000 (09:13 +0100)]
package/intel-gmmlib: bump version to 22.3.16

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/onevpl-intel-gpu: bump version to 23.4.3
Bernd Kuhls [Sun, 24 Dec 2023 08:13:16 +0000 (09:13 +0100)]
package/onevpl-intel-gpu: bump version to 23.4.3

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/onevpl-intel-gpu: add missing dependency on BR2_x86_64
Thomas Petazzoni [Sun, 24 Dec 2023 16:16:19 +0000 (17:16 +0100)]
package/onevpl-intel-gpu: add missing dependency on BR2_x86_64

BR2_PACKAGE_ONEVPL_INTEL_GPU selects BR2_PACKAGE_INTEL_MEDIADRIVER,
but it forgets to replicate all its dependencies, in particular
BR2_x86_64, causing:

WARNING: unmet direct dependencies detected for BR2_PACKAGE_INTEL_MEDIADRIVER
  Depends on [n]: BR2_x86_64 [=n] && !BR2_STATIC_LIBS [=n] && BR2_INSTALL_LIBSTDCPP [=y] && BR2_TOOLCHAIN_GCC_AT_LEAST_8 [=y] && BR2_TOOLCHAIN_HAS_SYNC_1 [=y] && BR2_TOOLCHAIN_HAS_THREADS [=y] && BR2_TOOLCHAIN_HAS_THREADS_NPTL [=y]
  Selected by [y]:
  - BR2_PACKAGE_ONEVPL_INTEL_GPU [=y] && BR2_PACKAGE_ONEVPL_ARCH_SUPPORTS [=y] && BR2_INSTALL_LIBSTDCPP [=y] && !BR2_STATIC_LIBS [=n] && BR2_TOOLCHAIN_GCC_AT_LEAST_7 [=y] && BR2_TOOLCHAIN_HAS_SYNC_1 [=y] && BR2_TOOLCHAIN_HAS_THREADS [=y] && BR2_TOOLCHAIN_HAS_THREADS_NPTL [=y]

Fixes: ac65841defece904e91afe1fb51419084c993dba ("package/onevpl-intel-gpu: new package")
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agoconfigs/imx8mmpico: bump bsp components to version tn-kirkstone_5.15.71-2.2.0
Julien Olivain [Sat, 16 Sep 2023 14:06:13 +0000 (16:06 +0200)]
configs/imx8mmpico: bump bsp components to version tn-kirkstone_5.15.71-2.2.0

Those components are aligned with NXP BSP lf-5.15.71-2.2.0.

This commit introduces arm-trusted-firmware upstream patches to
compile the needed version with newer gcc and binutils.

Fixes:
https://gitlab.com/buildroot.org/buildroot/-/jobs/5083366606

Signed-off-by: Julien Olivain <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/google-breakpad: bump version to f49c2f1a2023da0cb055874fba050563dfea57db
Adam Duskett [Sun, 3 Dec 2023 04:18:39 +0000 (21:18 -0700)]
package/google-breakpad: bump version to f49c2f1a2023da0cb055874fba050563dfea57db

- Drop no longer needed
  0001-mainline-version-gcc-13-cannot-use-uintptr_t-via-inc.patch as
  it was a backport from upstream

- Updated license hash due to numerous additions of licenses, and
  updated copyright years. The LICENSE variable was updated
  accordingly, and clarified

- zlib is now a mandatory dependency, it is not checked at configure
  time, but <zlib.h> is uncondtionnally included, and libzlib is
  linked in unconditionnally. See
  https://chromium.googlesource.com/breakpad/breakpad/+/de086a98595f68715c1dce9860f77014a2a1b187

- explicitly disable zstd support, which was added in upstream commit
  https://chromium.googlesource.com/breakpad/breakpad/+/9ea5b228f560580f85df895c2f117d7e43340935. This
  requires adding AUTORECONF = YES because the pre-generated
  configure/Makefile.in available in the Git repository is out of
  date, and links unconditionnally with -lzstd, even when
  --disable-zstd is passed.

Signed-off-by: Adam Duskett <[email protected]>
[Thomas: handle zlib dependency, handle zstd option, fix LICENSE variable]
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agoboot/grub2: needs host-gawk
Julien Olivain [Sat, 23 Dec 2023 20:30:32 +0000 (21:30 +0100)]
boot/grub2: needs host-gawk

grub2 build is failing, when compiled on host system not including
gawk and host-gawk is not built by another package before. This can
be the the case on current Buildroot Docker image, based on Debian,
which includes mawk.

grub2 was updated in commit 5baf1ffe7e "boot/grub2: bump to version
2.12". This version includes the commit [1], which introduced the use
of the asorti() awk function. This function is a specific gawk
builtin extension. See [2].

This commit fixes this issue by adding host-gawk as a dependency.

Fixes:

    mawk: ../../grub-core/genmoddep.awk: line 110: function asorti never defined
    make[4]: *** [Makefile:49030: moddep.lst] Error 1
    make[4]: Leaving directory '/buildroot/output/build/grub2-2.12/build-i386-pc/grub-core'
    make[3]: *** [Makefile:28116: all] Error 2
    make[3]: Leaving directory '/buildroot/output/build/grub2-2.12/build-i386-pc/grub-core'
    make[2]: *** [Makefile:11714: all-recursive] Error 1
    make[2]: Leaving directory '/buildroot/output/build/grub2-2.12/build-i386-pc'
    make[1]: *** [Makefile:3547: all] Error 2
    make[1]: Leaving directory '/buildroot/output/build/grub2-2.12/build-i386-pc'
    make: *** [package/pkg-generic.mk:283: /buildroot/output/build/grub2-2.12/.stamp_built] Error 2

[1] https://git.savannah.gnu.org/gitweb/?p=grub.git;a=commitdiff;h=87648e9c12a32bddb005b899edc44c2c9c63df82
[2] https://www.gnu.org/software/gawk/manual/gawk.html#Sorting-Array-Values-and-Indices-with-gawk

Signed-off-by: Julien Olivain <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months ago.checkpackageignore: stop ignoring ShellCheck issues in google-breakpad
Thomas Petazzoni [Sat, 23 Dec 2023 21:35:11 +0000 (22:35 +0100)]
.checkpackageignore: stop ignoring ShellCheck issues in google-breakpad

The issues have been fixed by commit
f1089391a83aa63b6977e65970451365f10dc66a ("package/google-breakpad/gen-syms.sh:
fix shellcheck warnings")

Fixes:

  https://gitlab.com/buildroot.org/buildroot/-/jobs/5815132933

Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/google-breakpad: disable uclibc support
Adam Duskett [Sun, 3 Dec 2023 04:18:35 +0000 (21:18 -0700)]
package/google-breakpad: disable uclibc support

The google-breakpad package uses stab.h which is not included in
uClibc, causing the following build error:

src/common/stabs_reader.cc:37:10: fatal error: stab.h: No such file or directory
   37 | #include <stab.h>
      |          ^~~~~~~~
compilation terminated.

Fixes:

  http://autobuild.buildroot.net/results/bba513b7c63a24a83805d2b989a9b95e5fe08e82/

Signed-off-by: Adam Duskett <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/google-breakpad: fix building with gcc 13.x
Adam Duskett [Sun, 3 Dec 2023 04:18:36 +0000 (21:18 -0700)]
package/google-breakpad: fix building with gcc 13.x

Fixes the following error when building with gcc 13.x:

‘uintptr_t’ is defined in header ‘<cstdint>’; did you forget to ‘#include <cstdint>’?

Fixes:

  http://autobuild.buildroot.net/results/73f17ec308b6fd20dabdb7e391a3f67793a14d5b/

  (which happens with the target google-breakpad, but the issue can
  also happen when building host-google-breakpad if the host system
  uses gcc 13.x)

Signed-off-by: Adam Duskett <[email protected]>
[Thomas: use upstream fix, improve commit log]
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/google-breakpad/gen-syms.sh: fix shellcheck warnings
Adam Duskett [Sun, 3 Dec 2023 04:18:34 +0000 (21:18 -0700)]
package/google-breakpad/gen-syms.sh: fix shellcheck warnings

Fixes warning SC2068

Signed-off-by: Adam Duskett <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/libxml2: bump version to 2.12.1
Bernd Kuhls [Mon, 4 Dec 2023 21:16:22 +0000 (22:16 +0100)]
package/libxml2: bump version to 2.12.1

Updated license hash due to upstream commit
https://github.com/GNOME/libxml2/commit/4a513d5667d7690998f01b9048c56c4f1f50f6a5

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/xmlstarlet: fix build with libxml2-2.12
Bernd Kuhls [Mon, 4 Dec 2023 21:16:21 +0000 (22:16 +0100)]
package/xmlstarlet: fix build with libxml2-2.12

Signed-off-by: Bernd Kuhls <[email protected]>
[Thomas: improved with a more complete patch provided by upstream
developer.]
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/squid: fix build with libxml2 version 2.12
Bernd Kuhls [Mon, 4 Dec 2023 21:16:20 +0000 (22:16 +0100)]
package/squid: fix build with libxml2 version 2.12

As we're about to update libxml2 to version 2.12, let's first fix a
build issue that would occur with squid by backporting an upstream
patch.

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/onevpl-intel-gpu: bump version to 23.4.2
Bernd Kuhls [Mon, 4 Dec 2023 21:18:07 +0000 (22:18 +0100)]
package/onevpl-intel-gpu: bump version to 23.4.2

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/intel-mediadriver: bump version to 23.4.2
Bernd Kuhls [Mon, 4 Dec 2023 21:18:06 +0000 (22:18 +0100)]
package/intel-mediadriver: bump version to 23.4.2

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/onevpl: bump version to 2023.4.0
Bernd Kuhls [Mon, 4 Dec 2023 21:18:05 +0000 (22:18 +0100)]
package/onevpl: bump version to 2023.4.0

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/intel-gmmlib: bump version to 22.3.14
Bernd Kuhls [Mon, 4 Dec 2023 21:18:04 +0000 (22:18 +0100)]
package/intel-gmmlib: bump version to 22.3.14

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agoconfigs/beaglebone_defconfig: bump Linux to 6.1.46-ti-r13 and U-Boot to 2023.10
Scott Fan [Fri, 8 Dec 2023 00:09:57 +0000 (08:09 +0800)]
configs/beaglebone_defconfig: bump Linux to 6.1.46-ti-r13 and U-Boot to 2023.10

The linux defconfig 'bb.org_defconfig' is the best for beagleboard.

To load compressed kernel modules, kmod and xz packages are needed
because busybox doesn't support it.

Bump U-Boot to version 2023.10. The uboot-tools package is no need.

Tested on beaglebone black.

[1] https://github.com/beagleboard/linux/releases/tag/6.1.46-ti-r13

Signed-off-by: Scott Fan <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agoconfigs/asus_tinker-s_rk3288_defconfig: use zImage by default
Flávio Tapajós [Thu, 30 Nov 2023 17:53:33 +0000 (14:53 -0300)]
configs/asus_tinker-s_rk3288_defconfig: use zImage by default

Migrates tinker-s away from deprecated uImage

Signed-off-by: Flávio Tapajós <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/openrc: bump version to 0.52.1
Adam Duskett [Wed, 29 Nov 2023 18:04:29 +0000 (11:04 -0700)]
package/openrc: bump version to 0.52.1

The runscript and rc binaries have been removed in this release. However,
Buildroot does not use those binaries, so only a simple version bump is
necessary.

Fixes:
  - cgroups being inconsistent
  - Start-stop-daemon did not work correctly on Linux 6.6

Tested on Debian 11 and Fedora 39 with the following command:
./support/testing/run-tests tests.init.test_openrc

Signed-off-by: Adam Duskett <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agoconfigs/rock5b: add hash for custom kernel
Kilian Zinnecker [Wed, 6 Dec 2023 19:25:27 +0000 (20:25 +0100)]
configs/rock5b: add hash for custom kernel

Commit d344ffe6245b (configs/rock5b: add hash for custom uboot)
explicitly noted that the kernel was retrieved from a git-clone, so the
sha1 of the commit was enough to get what we expect.

However, that does not account for the fact that the upstream repository
can disapear or be temporarily unavailable (maliciously or not). In that
case, the kernel archive will be looked up on the backup mirror.

In that case, the download is via wget over https, which protects the
transport, but does not guarantee that the remote server serves the
expected archive.

The hash file was dropped when d344ffe6245b was applied; restore it.

Since the defconfig now has hashes for all its downloads, enforce
checking hashes.

Signed-off-by: Kilian Zinnecker <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agoconfigs/rock5b: add hash for custom uboot
Kilian Zinnecker [Wed, 6 Dec 2023 19:25:27 +0000 (20:25 +0100)]
configs/rock5b: add hash for custom uboot

The defconfig uses a custom uboot version, downloaded with wget, so we
weant to be sure that it does not get modified on the server, so we add
a hash for it.

The kernel we get from a git clone, so the sha1 of the commit is enough
to be sure that what we get is what we expect (because we do a local
tarball out of a git clone).

Since we only get a hash for uboot and not for the kernel, we don't
enable BR2_DOWNLOAD_FORCE_CHECK_HASHES.

Signed-off-by: Kilian Zinnecker <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/xmrig: bump version to 6.21.0
Bernd Kuhls [Mon, 4 Dec 2023 21:18:26 +0000 (22:18 +0100)]
package/xmrig: bump version to 6.21.0

Changelog: https://github.com/xmrig/xmrig/blob/master/CHANGELOG.md

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/cmake: bump version to 3.27.9
Bernd Kuhls [Mon, 4 Dec 2023 21:18:51 +0000 (22:18 +0100)]
package/cmake: bump version to 3.27.9

Changelog: https://cmake.org/cmake/help/v3.27/release/3.27.html#updates

Release notes:
https://www.kitware.com/cmake-3-27-8-available-for-download/
https://www.kitware.com/cmake-3-27-9-available-for-download/

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/swupdate: bump version to 2023.12
Giulio Benetti [Mon, 18 Dec 2023 22:47:47 +0000 (23:47 +0100)]
package/swupdate: bump version to 2023.12

* make json-c mandatory according to [0]
* make libubootenv mandatory according to [1]
* drop local patch that has been upstreamed [2]
* libconfig is not mandatory anymore if no lua parser is enabled
* adjust Config.in comment according to json-c and libubootenv

[0]: https://github.com/sbabic/swupdate/commit/82e75322443e021d119a026a3476c410f4705d67
[1]: https://github.com/sbabic/swupdate/commit/75838874e2575f822ed85d89532f47e9adf781b6
[2]: https://github.com/sbabic/swupdate/commit/1999685830d6e9b57014666b9e53e46de17a471c

Signed-off-by: Giulio Benetti <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/lua-ubjson: new package
Francois Perrad [Wed, 6 Dec 2023 09:39:42 +0000 (10:39 +0100)]
package/lua-ubjson: new package

Signed-off-by: Francois Perrad <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/lua-conciseserialization: new package
Francois Perrad [Wed, 6 Dec 2023 09:39:41 +0000 (10:39 +0100)]
package/lua-conciseserialization: new package

Signed-off-by: Francois Perrad <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/lua-messagepack: bump to version 0.5.4
Francois Perrad [Wed, 6 Dec 2023 09:39:40 +0000 (10:39 +0100)]
package/lua-messagepack: bump to version 0.5.4

Signed-off-by: Francois Perrad <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/lua-argparse: new package
Francois Perrad [Fri, 15 Dec 2023 19:50:15 +0000 (20:50 +0100)]
package/lua-argparse: new package

Signed-off-by: Francois Perrad <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/lua-ansicolors: new package
Francois Perrad [Fri, 15 Dec 2023 19:50:14 +0000 (20:50 +0100)]
package/lua-ansicolors: new package

Signed-off-by: Francois Perrad <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/rtl8188eu: bump to 2023-12-04 version on v5.2.2.4 branch
Giulio Benetti [Wed, 6 Dec 2023 20:07:30 +0000 (21:07 +0100)]
package/rtl8188eu: bump to 2023-12-04 version on v5.2.2.4 branch

This version allows to build with Linux 6.7

Signed-off-by: Giulio Benetti <[email protected]>
Reviewed-by: Luca Ceresoli <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/rtl8723bu: bump to 2023-12-04 version
Giulio Benetti [Wed, 6 Dec 2023 20:41:04 +0000 (21:41 +0100)]
package/rtl8723bu: bump to 2023-12-04 version

This version allows to build with Linux 6.7

Signed-off-by: Giulio Benetti <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/wlroots: add hwdata and hwdata_pnp_ids as a dependency
Adam Duskett [Thu, 21 Dec 2023 15:36:10 +0000 (08:36 -0700)]
package/wlroots: add hwdata and hwdata_pnp_ids as a dependency

Since upstream commit
eec95e3d5e1a4f2e13b1f6b34cc287475ca57daf ("backend/drm: use pnp.ids to
fetch EDID data"), the pnp.ids file from hwdata is parsed at build
time to generate a C source file. As per backend/drm/meson.build:

hwdata = dependency('hwdata', required: false, native: true)
if hwdata.found()
hwdata_dir = hwdata.get_variable(pkgconfig: 'pkgdatadir')
pnp_ids = files(hwdata_dir / 'pnp.ids')
else
pnp_ids = files('/usr/share/hwdata/pnp.ids')
endif

This is only needed when the DRM backend of wlroots is enabled, but
currently, Buildroot enables this backend unconditionally.

This failure can be reproduced using the following defconfig:

BR2_x86_64=y
BR2_TOOLCHAIN_EXTERNAL=y
BR2_ROOTFS_DEVICE_CREATION_DYNAMIC_EUDEV=y
BR2_PACKAGE_MESA3D=y
BR2_PACKAGE_MESA3D_OSMESA_GALLIUM=y
BR2_PACKAGE_MESA3D_OPENGL_EGL=y
BR2_PACKAGE_MESA3D_OPENGL_ES=y
BR2_PACKAGE_WLROOTS=y

The issue was not caught in the autobuilders because the last
successful build of a configuration that includes wlroots dates back
from 2022-05-05, at which time Buildroot had wlroots 0.15.1.

This change in wlroots was introduced in wlroots 0.16.0, which means
that it's only since Buildroot bumped from 0.15.1 to 0.16.2 in
d6279bc82c02b43c9a2f28c36639e092b9e9e08b ("package/wlroots: bump to
version 0.16.2") that the issue occurs. This commit is not yet in any
tagged release, so there is no need to backport this fix.

It should be noted that the proposed patch also installs pnp.ids to
the target filesystem, while it is in practice not needed at runtime
by wlroots. However, our current hwdata packaging doesn't allow
installing it only in staging, and since wlroots anyway implies we're
building a fairly heavy graphics stack, the size overhead of hwdata is
deemed to be an acceptable trade-off.

Signed-off-by: Adam Duskett <[email protected]>
[Thomas: further extend the commit log, with details gathered by Yann
and myself.]
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/unrar: bump version to 6.2.12
Xiangyu Chen [Wed, 20 Dec 2023 11:18:28 +0000 (19:18 +0800)]
package/unrar: bump version to 6.2.12

According to the Debian changelog, it doesn't seem like there is any
security issue addressed between 6.2.10 and 6.2.12:

unrar-nonfree (1:6.2.12-1) unstable; urgency=medium

  * New upstream version 6.2.12
  * Rediff patches

 -- YOKOTA Hiroshi <[email protected]>  Thu, 05 Oct 2023 20:49:53 +0900

unrar-nonfree (1:6.2.11-1) unstable; urgency=medium

  * New upstream version 6.2.11

 -- YOKOTA Hiroshi <[email protected]>  Wed, 20 Sep 2023 21:41:29 +0900

Signed-off-by: Xiangyu Chen <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/kodi-pvr-hts: bump version to 20.7.0-Nexus
Bernd Kuhls [Wed, 20 Dec 2023 19:01:54 +0000 (20:01 +0100)]
package/kodi-pvr-hts: bump version to 20.7.0-Nexus

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/libssh: security bump to version 0.10.6
Peter Korsgaard [Thu, 21 Dec 2023 14:22:49 +0000 (15:22 +0100)]
package/libssh: security bump to version 0.10.6

Fixes the following security issues:

- CVE-2023-6004: Command Injection using malicious hostname in expanded proxycommand
  https://www.libssh.org/security/advisories/CVE-2023-6004.txt

- CVE-2023-48795: Avoid potential downgrade attacks by implementing strict kex
  https://www.libssh.org/security/advisories/CVE-2023-48795.txt

- CVE-2023-6918: Avoid potential use of weak keys in low memory conditions
  by systematically checking return values of MD functions.
  https://www.libssh.org/security/advisories/CVE-2023-6918.txt

Signed-off-by: Peter Korsgaard <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/putty: security bump to version 0.80
Peter Korsgaard [Thu, 21 Dec 2023 14:00:39 +0000 (15:00 +0100)]
package/putty: security bump to version 0.80

As described in the announcement, this fixes a security issue:

There is one security fix in this release:

 - Fix for a newly discovered security issue known as the 'Terrapin'
   attack, also numbered CVE-2023-48795. The issue affects widely-used
   OpenSSH extensions to the SSH protocol: the ChaCha20+Poly1305
   cipher system, and 'encrypt-then-MAC' mode.

   In order to benefit from the fix, you must be using a fixed version
   of PuTTY _and_ a server with the fix, so that they can agree to
   adopt a modified version of the protocol. Alternatively, you may be
   able to reconfigure PuTTY to avoid selecting any of the affected
   modes.

   If PuTTY 0.80 connects to an SSH server without the fix, it will
   warn you if the initial protocol negotiation chooses an insecure
   mode to run the connection in, so that you can abandon the
   connection. If it's possible to alter PuTTY's configuration to
   avoid the problem, then the warning message will tell you how to do
   it.

https://lists.tartarus.org/pipermail/putty-announce/2023/000037.html

Signed-off-by: Peter Korsgaard <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agosupport/testing: add python-tftpy runtime test
Colin Foster [Thu, 21 Dec 2023 19:08:00 +0000 (13:08 -0600)]
support/testing: add python-tftpy runtime test

This runtime test verifies the existence of the tftpy module when
selected.

Signed-off-by: Colin Foster <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/libmodsecurity: bump to version 3.0.11
Frank Vanbever [Fri, 22 Dec 2023 15:46:47 +0000 (16:46 +0100)]
package/libmodsecurity: bump to version 3.0.11

Signed-off-by: Frank Vanbever <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agoboot/edk2: add support for RISC-V 64bit architecture
Julien Olivain [Fri, 22 Dec 2023 10:56:55 +0000 (11:56 +0100)]
boot/edk2: add support for RISC-V 64bit architecture

RISC-V 64bit qemu virt machine support has been added in edk2
version "stable202302". See [1].

Since edk2-stable202308, introduced in buildroot in commit 5c9f310
"boot/edk2: bump to version edk2-stable202308", it is now possible
to boot the edk2 UEFI shell in qemu.

This commit adds this early RISC-V support to edk2.

The RISC-V edk2 UEFI shell can be booted in Buildroot with the
following commands:

    # Build EDK2 images
    cat > .config <<EOF
    BR2_riscv=y
    BR2_RISCV_64=y
    BR2_PACKAGE_HOST_QEMU=y
    BR2_PACKAGE_HOST_QEMU_SYSTEM_MODE=y
    BR2_TARGET_EDK2=y
    EOF
    make olddefconfig
    make

    # edk2 image size should fit the 32MB of qemu pflash memories
    truncate -s 32M output/images/RISCV_VIRT_CODE.fd
    truncate -s 32M output/images/RISCV_VIRT_VARS.fd

    # Start qemu:
    output/host/usr/bin/qemu-system-riscv64 \
        -M virt,pflash0=pflash0,pflash1=pflash1,acpi=off \
        -nographic \
        -blockdev node-name=pflash0,driver=file,read-only=on,filename=output/images/RISCV_VIRT_CODE.fd \
        -blockdev node-name=pflash1,driver=file,filename=output/images/RISCV_VIRT_VARS.fd

Note: a Qemu version >= 8.0.0 is needed to properly start edk2. A qemu
version on the host system might not be sufficient. This is why the
Buildroot host-qemu is built in this config example.

[1] https://github.com/tianocore/edk2/releases/tag/edk2-stable202302

Signed-off-by: Julien Olivain <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agoiputils/iputils: remove note about fork
Petr Vorel [Fri, 22 Dec 2023 20:53:21 +0000 (21:53 +0100)]
iputils/iputils: remove note about fork

After 10 years we don't have to justify the fork anymore, as it has been
the new upstream for that long now.

Signed-off-by: Petr Vorel <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/iputils: bump version to 20231222
Petr Vorel [Fri, 22 Dec 2023 20:53:20 +0000 (21:53 +0100)]
package/iputils: bump version to 20231222

Signed-off-by: Petr Vorel <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agoboot/grub2: bump to version 2.12
Julien Olivain [Fri, 22 Dec 2023 20:38:10 +0000 (21:38 +0100)]
boot/grub2: bump to version 2.12

For release announce on mailing list, see [1].
For release general news, see [2].

This commit removes all package patches, as they are all included in
this version.

The .checkpackageignore file is updated accordingly (the entry for
patch 0001 is removed).

This commit also removes GRUB2_AVOID_AUTORECONF hooks, since patch
0001 is removed.

This commit also removes the GRUB2_IGNORE_CVES entries associated to
the removed patches. The version bump should now explicitly exclude
those CVEs. For patches 8 and 9, the upstream commit IDs were
incorrectly recorded:
  - patch 8 mentioned d5caac8ab79d068ad9a41030c772d03a4d4fbd7b while
    the actual commit is 5bff31cdb6b93d738f850834e6291df1d0b136fa
  - patch 9 mentioned 166a4d61448f74745afe1dac2f2cfb85d04909bf while
    the actual commit is 347880a13c239b4c2811c94c9a7cf78b607332e3

Finally, this commit introduces a new patch, adding a missing file in
the release tarball.

[1] https://lists.gnu.org/archive/html/grub-devel/2023-12/msg00052.html
[2] https://git.savannah.gnu.org/gitweb/?p=grub.git;a=blob;f=NEWS;hb=refs/tags/grub-2.12

Signed-off-by: Julien Olivain <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/libopenssl: use riscv-specific configure target
Grant Nichol [Sat, 23 Dec 2023 07:07:30 +0000 (01:07 -0600)]
package/libopenssl: use riscv-specific configure target

Adds BR2_PACKAGE_LIBOPENSSL_TARGET_ARCH for riscv32 and riscv64.
Otherwise, riscv targets fall back to the linux-generic libopenssl
configs. This exacerbates the issue partially addressed in
openssl/openssl#22871 which causes build failures.

Fixes a mispelling in upstream causing 0builds for riscv32 to fail when
linking.

Signed-off-by: Grant Nichol <[email protected]>
[[email protected]: squash the two commits together]
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/libcurl: fix build with GnuTLS and no verbose
Baruch Siach [Fri, 22 Dec 2023 05:46:00 +0000 (07:46 +0200)]
package/libcurl: fix build with GnuTLS and no verbose

A change of data logging introduced in version 8.5.0 broke the build.
Add a patch to fix that.

Fixes:
http://autobuild.buildroot.net/results/c5b996696333c4ff1392dbb8e6b0edc9c5322ee4/

Signed-off-by: Baruch Siach <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/glibc: ignore CVEs not considered as security issues by upstream
Thomas Petazzoni [Wed, 20 Dec 2023 20:01:08 +0000 (21:01 +0100)]
package/glibc: ignore CVEs not considered as security issues by upstream

5 CVEs affecting glibc according to the NVD database are considered as
not being security issues by upstream glibc developers:

* CVE-2010-4756: The glob implementation in the GNU C Library (aka
  glibc or libc6) allows remote authenticated users to cause a denial
  of service (CPU and memory consumption) via crafted glob expressions
  that do not match any pathnames. glibc maintainers position: "That's
  standard POSIX behaviour implemented by (e)glibc. Applications using
  glob need to impose limits for themselves"

* CVE-2019-1010022: GNU Libc current is affected by: Mitigation
  bypass. The impact is: Attacker may bypass stack guard
  protection. The component is: nptl. The attack vector is: Exploit
  stack buffer overflow vulnerability and use this bypass
  vulnerability to bypass stack guard. NOTE: Upstream comments
  indicate "this is being treated as a non-security bug and no real
  threat. glibc maintainers position: "Not treated as a security issue
  by upstream https://sourceware.org/bugzilla/show_bug.cgi?id=22850"

* CVE-2019-1010023: GNU Libc current is affected by: Re-mapping
  current loaded library with malicious ELF file. The impact is: In
  worst case attacker may evaluate privileges. The component is:
  libld. The attack vector is: Attacker sends 2 ELF files to victim
  and asks to run ldd on it. ldd execute code. NOTE: Upstream comments
  indicate "this is being treated as a non-security bug and no real
  threat. glibc maintainers position: "Not treated as a security issue
  by upstream https://sourceware.org/bugzilla/show_bug.cgi?id=22851"

* CVE-2019-1010024: GNU Libc current is affected by: Mitigation
  bypass. The impact is: Attacker may bypass ASLR using cache of
  thread stack and heap. The component is: glibc. NOTE: Upstream
  comments indicate "this is being treated as a non-security bug and
  no real threat. glibc maintainers position: "Not treated as a
  security issue by upstream
  https://sourceware.org/bugzilla/show_bug.cgi?id=22852"

* CVE-2019-1010025: GNU Libc current is affected by: Mitigation
  bypass. The impact is: Attacker may guess the heap addresses of
  pthread_created thread. The component is: glibc. NOTE: the vendor's
  position is "ASLR bypass itself is not a vulnerability. Glibc
  maintainers position: "Not treated as a security issue by upstream
  https://sourceware.org/bugzilla/show_bug.cgi?id=22853"

Signed-off-by: Thomas Petazzoni <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/glibc: add proper CPE ID version detail
Thomas Petazzoni [Wed, 20 Dec 2023 20:01:07 +0000 (21:01 +0100)]
package/glibc: add proper CPE ID version detail

As reported in bug 15895, the GLIBC_VERSION field having a value
looking like 2.38-27-g750a45a783906a19591fb8ff6b7841470f1f5701, it
prevents the CPE/CVE matching with the NVD database to work correctly.

This commit fixes that by defining GLIBC_CPE_ID_VERSION, derived from
GLIBC_VERSION, by extracting the base version.

Also, we update GLIBC_IGNORE_CVES to account for the CVEs that have
clearly been fixed between 2.38 and
2.38-27-g750a45a783906a19591fb8ff6b7841470f1f5701. There are a number
of other CVEs still affecting the glibc package, but they are not
related to this
2.38...2.38-27-g750a45a783906a19591fb8ff6b7841470f1f5701 range.

Fixes: #15895
Signed-off-by: Thomas Petazzoni <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/libutempter: fix license information
Thomas Petazzoni [Wed, 20 Dec 2023 22:38:19 +0000 (23:38 +0100)]
package/libutempter: fix license information

According to the source file:

  This library is free software; you can redistribute it and/or
  modify it under the terms of the GNU Lesser General Public
  License as published by the Free Software Foundation; either
  version 2.1 of the License, or (at your option) any later version.

Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/libutempter: new package
Adam Duskett [Mon, 18 Dec 2023 19:39:51 +0000 (12:39 -0700)]
package/libutempter: new package

Signed-off-by: Adam Duskett <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/fcft: new package
Adam Duskett [Mon, 18 Dec 2023 19:39:50 +0000 (12:39 -0700)]
package/fcft: new package

Signed-off-by: Adam Duskett <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/tllist: new package
Adam Duskett [Mon, 18 Dec 2023 19:39:49 +0000 (12:39 -0700)]
package/tllist: new package

Signed-off-by: Adam Duskett <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/sway/Config.in: select BR2_PACKAGE_XKEYBOARD_CONFIG
Adam Duskett [Mon, 18 Dec 2023 19:39:47 +0000 (12:39 -0700)]
package/sway/Config.in: select BR2_PACKAGE_XKEYBOARD_CONFIG

Much like weston, this is a runtime dependency.

Signed-off-by: Adam Duskett <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/sway/Config.in: remove duplicate dependencies
Adam Duskett [Mon, 18 Dec 2023 19:39:46 +0000 (12:39 -0700)]
package/sway/Config.in: remove duplicate dependencies

Signed-off-by: Adam Duskett <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/transmission: bump version to 4.0.5
Bernd Kuhls [Sun, 17 Dec 2023 17:25:14 +0000 (18:25 +0100)]
package/transmission: bump version to 4.0.5

Release notes:
https://github.com/transmission/transmission/releases/tag/4.0.5

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/libnvme: bump to version 1.7.1
Giulio Benetti [Wed, 20 Dec 2023 20:28:18 +0000 (21:28 +0100)]
package/libnvme: bump to version 1.7.1

Signed-off-by: Giulio Benetti <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/python-matplotlib: bump to version 3.8.2
James Hilliard [Sat, 25 Nov 2023 01:38:07 +0000 (18:38 -0700)]
package/python-matplotlib: bump to version 3.8.2

Add new python-contourpy runtime dependency.

Add new python-pybind dependency.

Add new host-python-setuptools-scm build dependency.

Update setup.cfg to new mplsetup.cfg install location.

Signed-off-by: James Hilliard <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/python-contourpy: new package
James Hilliard [Sat, 25 Nov 2023 01:38:06 +0000 (18:38 -0700)]
package/python-contourpy: new package

Signed-off-by: James Hilliard <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/python-meson-python: new host package
James Hilliard [Sat, 25 Nov 2023 01:38:05 +0000 (18:38 -0700)]
package/python-meson-python: new host package

Signed-off-by: James Hilliard <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/python-pyproject-metadata: new host package
James Hilliard [Sat, 25 Nov 2023 01:38:04 +0000 (18:38 -0700)]
package/python-pyproject-metadata: new host package

Signed-off-by: James Hilliard <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/python-pudb: bump to version 2023.1
James Hilliard [Sat, 25 Nov 2023 06:24:09 +0000 (23:24 -0700)]
package/python-pudb: bump to version 2023.1

Add new python-urwid-readline runtime dependency.

Add new python-packaging runtime dependency.

Remove no longer required python-setuptools runtime dependency.

Signed-off-by: James Hilliard <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/python-urwid-readline: new package
James Hilliard [Sat, 25 Nov 2023 06:24:08 +0000 (23:24 -0700)]
package/python-urwid-readline: new package

Signed-off-by: James Hilliard <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/lua-compat53: install compat-5.3.h
Francois Perrad [Sun, 10 Dec 2023 15:25:13 +0000 (16:25 +0100)]
package/lua-compat53: install compat-5.3.h

this file could be required by some native modules

note: compat-5.3.c is included by compat-5.3.h
Signed-off-by: Francois Perrad <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/lua-compat53: bump to version 0.12
Francois Perrad [Sun, 10 Dec 2023 15:25:12 +0000 (16:25 +0100)]
package/lua-compat53: bump to version 0.12

the project has moved to the organization “Lunar Modules”,
see https://github.com/lunarmodules/

diff LICENCE:
-Copyright (c) 2015 Kepler Project.
+Copyright (C) 1994-2020 Lua.org, PUC-Rio.
+Copyright (C) 2013-2023 The Lua-Compat-5.3 authors.

Signed-off-by: Francois Perrad <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agoeditorconfig: fix wildcard expansion
Yann E. MORIN [Mon, 18 Dec 2023 08:19:03 +0000 (09:19 +0100)]
editorconfig: fix wildcard expansion

It turns out that wildcard expansion, * and ?, is not performed in
matching lists {...}, at least in the vim plugin. The spec is not clear
about that, but refer to "pattern matching through Unix shell-style
wildcards" [0].

So, let's consider that this is not supported. Expand the patterns into
one section each, rather than use a list.

[0] https://spec.editorconfig.org/

Signed-off-by: Yann E. MORIN <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/criu: bump to version 3.19
Marcus Folkesson [Mon, 18 Dec 2023 07:25:06 +0000 (08:25 +0100)]
package/criu: bump to version 3.19

Signed-off-by: Marcus Folkesson <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/libnvme: bump to version 1.7
Giulio Benetti [Tue, 19 Dec 2023 23:18:04 +0000 (00:18 +0100)]
package/libnvme: bump to version 1.7

Drop local patches that have been upstreamed.

Signed-off-by: Giulio Benetti <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/libnss: bump to version 3.96.1
Giulio Benetti [Tue, 19 Dec 2023 23:13:24 +0000 (00:13 +0100)]
package/libnss: bump to version 3.96.1

Signed-off-by: Giulio Benetti <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/sdl2_image: bump version to 2.8.1
Peter Macleod Thompson [Wed, 20 Dec 2023 02:08:18 +0000 (19:08 -0700)]
package/sdl2_image: bump version to 2.8.1

Signed-off-by: Peter Macleod Thompson <[email protected]>
[Peter: fix filename in .hash file]
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/nmap: fix wording for nc symlink
Michael Nosthoff [Wed, 20 Dec 2023 07:55:57 +0000 (08:55 +0100)]
package/nmap: fix wording for nc symlink

Signed-off-by: Michael Nosthoff <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/openssh: security bump to version 9.6p1
Christian Stewart [Wed, 20 Dec 2023 09:27:41 +0000 (01:27 -0800)]
package/openssh: security bump to version 9.6p1

OpenSSH 9.6 was released on 2023-12-18.

This release contains fixes for a newly-discovered weakness in the
SSH transport protocol (the "Terrapin" attack), a logic error relating
to constrained PKCS#11 keys in ssh-agent(1) and countermeasures for
programs that invoke ssh(1) with user or hostnames containing invalid
characters.

https://www.openssh.com/txt/release-9.6

Signed-off-by: Christian Stewart <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/gawk: bump to version 5.3.0
Xiangyu Chen [Wed, 20 Dec 2023 10:27:50 +0000 (18:27 +0800)]
package/gawk: bump to version 5.3.0

Changes:
https://git.savannah.gnu.org/cgit/gawk.git/tree/ChangeLog?h=gawk-5.3.0

Signed-off-by: Xiangyu Chen <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/libldns: fix libressl build
Fabrice Fontaine [Tue, 12 Dec 2023 20:59:51 +0000 (21:59 +0100)]
package/libldns: fix libressl build

Fix the following build failure raised since bump of libressl to version
3.8.2 in commit 21eca49ed5110872407b76ab9337d2877c4cda24:

./keys.c:167:35: error: 'ENGINE_METHOD_ALL' undeclared (first use in this function)
  167 |         if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
      |                                   ^~~~~~~~~~~~~~~~~

Fixes:
 - http://autobuild.buildroot.org/results/37cc05b78a7004caa1b45d896121f059a4f8ca00

Signed-off-by: Fabrice Fontaine <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/uclibc: update to 1.0.45
Waldemar Brodkorb [Mon, 18 Dec 2023 12:28:40 +0000 (13:28 +0100)]
package/uclibc: update to 1.0.45

Git shortlog:

Ben Wolsieffer (3):
      fork: generate stub on no-MMU systems
      arm: elf-fdpic.h: avoid void pointer subtraction
      libpthread/nptl: make default stack size configurable

Greg Ungerer (1):
      elf: support ELF binaries in noMMU

Marcus Haehnel (3):
      fnmatch: fix possible access beyond of parameter string
      getaddrinfo.c: Avoid misleading indentation warning
      linuxthreads: Avoid unused variable warning

Marcus Hähnel (1):
      setjmp.h: Fix C++ build and avoid duplicate throw declaration

Max Filippov (1):
      daemon.c: make _fork_parent static inline again

Paul Iannetta (1):
      kvx: fix asm syntax

Pavel Kozlov (6):
      setrlimit/getrlimit: fix prlimit64 syscall use for 32-bit CPUs
      Fix -Warray-parameter warning for __sigsetjmp
      prlimit: add name redirection and fix incorrect parameters to syscall
      arc: add acq/rel variants for atomic cmpxchg/xchg
      arc: remove read ahead in asm strcmp code for ARCHS
      rlimit: fix 64-bit RLIM64_INFINITY macro

Waldemar Brodkorb (8):
      aarch64: add hwcap header file
      fcntl.h: declare f_owner_ex for all architectures
      arm: add hwcap header file
      lm32: disable ctor/dtor
      aarch64: disable lazy relocations
      riscv64: define __NR_riscv_flush_icache if not available
      depend on __UCLIBC_HAVE_STATX__
      bump version for 1.0.45 release

Yann Sionneau (9):
      fstatat64: define it as a wrapper of statx if the kernel does not support fstatat64 syscall
      fstat: add missing return value statement for the statx wrapping case
      add support for systems without legacy setrlimit/getrlimit syscalls
      fstatat: add wrapper that uses statx for non-legacy arch
      kvx: add support for kv3-2 (Coolidge v2 SoC)
      kvx: atomic: rework using compiler builtins
      kvx: align specification of user regs
      kvx: define that kvx port supports statx syscall
      kvx: use a custom stat.h header

lordrasmus (8):
      add vsdo support
      fix file permissions
      fix getauxval() on aarch64 gcc 11
      vdso support missing file
      c6x compile fix vdso support
      gettimeofday() only include ldso.h if vdso support is activated
      vdso support for x86_64
      gitignore

Signed-off-by: Waldemar Brodkorb <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/jq: security bump to version 1.7.1
Peter Korsgaard [Mon, 18 Dec 2023 12:50:25 +0000 (13:50 +0100)]
package/jq: security bump to version 1.7.1

Fixes the following security issues:

CVE-2023-50246: Fix heap buffer overflow in jvp_literal_number_literal
https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc

CVE-2023-50268: fix stack-buffer-overflow if comparing nan with payload
https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j

Signed-off-by: Peter Korsgaard <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/giflib/0004-Fix-several-defects-found-by-Coverity-scan.patch: New security...
Adam Duskett [Tue, 5 Dec 2023 23:59:19 +0000 (16:59 -0700)]
package/giflib/0004-Fix-several-defects-found-by-Coverity-scan.patch: New security patch

Signed-off-by: Adam Duskett <[email protected]>
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/giflib/0003-Fix-CVE-2023-39742.patch: New security patch
Adam Duskett [Tue, 5 Dec 2023 23:59:18 +0000 (16:59 -0700)]
package/giflib/0003-Fix-CVE-2023-39742.patch: New security patch

Signed-off-by: Adam Duskett <[email protected]>
[[email protected]: extend GIFLIB_IGNORE_CVES]
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/giflib/0002-Fix-CVE-2022-28506.patch: New security patch
Adam Duskett [Tue, 5 Dec 2023 23:59:17 +0000 (16:59 -0700)]
package/giflib/0002-Fix-CVE-2022-28506.patch: New security patch

Signed-off-by: Adam Duskett <[email protected]>
[[email protected]: add GIFLIB_IGNORE_CVES]
Signed-off-by: Yann E. MORIN <[email protected]>
13 months agopackage/timescaledb: bump version to 2.13.0
Maxim Kochetkov [Tue, 5 Dec 2023 05:52:20 +0000 (08:52 +0300)]
package/timescaledb: bump version to 2.13.0

Release notes: https://github.com/timescale/timescaledb/blob/2.13.0/CHANGELOG.md

Signed-off-by: Maxim Kochetkov <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/gnutls: bump version to 3.8.2
Bernd Kuhls [Mon, 4 Dec 2023 21:14:29 +0000 (22:14 +0100)]
package/gnutls: bump version to 3.8.2

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/gettext-gnu: bump version to 0.22.4
Bernd Kuhls [Mon, 4 Dec 2023 21:13:59 +0000 (22:13 +0100)]
package/gettext-gnu: bump version to 0.22.4

Release notes:
https://git.savannah.gnu.org/gitweb/?p=gettext.git;a=commitdiff;h=08f342937a09ce41977e8ceecc23509e4b330490

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/libheif: bump version to 1.17.5
Bernd Kuhls [Mon, 4 Dec 2023 21:13:00 +0000 (22:13 +0100)]
package/libheif: bump version to 1.17.5

Release notes:
https://github.com/strukturag/libheif/releases

Added configure support for new codec plugins introduced in version
1.17.0: https://github.com/strukturag/libheif/releases/tag/v1.17.0

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/libopenssl: bump version to 3.2.0
Bernd Kuhls [Mon, 4 Dec 2023 21:11:22 +0000 (22:11 +0100)]
package/libopenssl: bump version to 3.2.0

Release notes:
https://www.openssl.org/blog/blog/2023/11/23/OpenSSL32/

Removed patch 0001 and added no-docs configure option due to
https://github.com/openssl/openssl/commit/956b4c75dc3f8710bf7b4e1cf01b4ef6d5ca2b45

Removed patch 0003 due to
https://github.com/openssl/openssl/commit/78634e8ac253a8edf338d329965724dfa8e033ab

Removed patch 0006 which is included in this release
https://github.com/openssl/openssl/commit/e1b6ecbab41514f45e9c355d01400691f74041c4

Renumbered remaining patches.

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/exim: bump version to 4.97
Bernd Kuhls [Mon, 4 Dec 2023 21:10:13 +0000 (22:10 +0100)]
package/exim: bump version to 4.97

Removed patches which are included in this release:
https://git.exim.org/exim.git/commitdiff/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2
https://git.exim.org/exim.git/commitdiff/d8ecc7bf97934a1e2244788c610c958cacd740bd
https://git.exim.org/exim.git/commitdiff/158dff9936e36a2d31d037d3988b9353458d6471
https://git.exim.org/exim.git/commitdiff/32da6327e434e986a18b75a84f2d8c687ba14619

Added upstream patch to fix build error.

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months ago{linux, linux-headers}: bump 4.{14, 19}.x / 5.{4, 10, 15}.x / 6.{1, 6}.x series
Bernd Kuhls [Sun, 17 Dec 2023 17:18:21 +0000 (18:18 +0100)]
{linux, linux-headers}: bump 4.{14, 19}.x / 5.{4, 10, 15}.x / 6.{1, 6}.x series

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/linux-headers: drop 6.5.x option
Bernd Kuhls [Sun, 17 Dec 2023 17:18:20 +0000 (18:18 +0100)]
package/linux-headers: drop 6.5.x option

The 6.5.x series is now EOL upstream, so drop the linux-headers option
and add legacy handling for it.

Signed-off-by: Bernd Kuhls <[email protected]>
[Peter: drop option from linux-headers/Config.host.in]
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/tor: security bump version to 0.4.8.10
Bernd Kuhls [Sun, 17 Dec 2023 17:22:23 +0000 (18:22 +0100)]
package/tor: security bump version to 0.4.8.10

Release notes:
https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes
https://forum.torproject.org/t/security-release-0-4-8-10/10536

Fixes TROVE-2023-007.

Signed-off-by: Bernd Kuhls <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/libostree: bump to version 2023.8
Marcus Folkesson [Mon, 18 Dec 2023 06:59:16 +0000 (07:59 +0100)]
package/libostree: bump to version 2023.8

Signed-off-by: Marcus Folkesson <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/perl: bump to version 5.38.2
Francois Perrad [Mon, 4 Dec 2023 17:41:19 +0000 (18:41 +0100)]
package/perl: bump to version 5.38.2

The README file has seen some cosmetic changes that do not affect the
licensing terms.

Signed-off-by: Francois Perrad <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopython-sip: fix compile error
Ralf Dragon [Tue, 12 Dec 2023 16:01:11 +0000 (17:01 +0100)]
python-sip: fix compile error

Since the update of Python to version 3.11 in commit
738500c296c8b1206f20e94ca3e7c5932a6a0486 ("package/python3: bump to
version 3.11.0"), python-sip fails to compile with:

siplib.c: In function ‘sip_api_get_frame’:
siplib.c:13750:22: error: invalid use of undefined type ‘struct _frame’
13750 |         frame = frame->f_back;

This is due to a change in the Python C API, which is fixed by a new
patch. The patch can't be upstreamed, as SIP 4.x is no longer
maintained upstream.

Fixes:

  http://autobuild.buildroot.net/results/7b01739e7514e48c06182bc1804b32497ce2e414/

Signed-off-by: Ralf Dragon <[email protected]>
[Thomas: improved commit log, reformatted patch using Git]
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/firewalld: bump version to 2.0.2
Adam Duskett [Tue, 12 Dec 2023 21:23:29 +0000 (14:23 -0700)]
package/firewalld: bump version to 2.0.2

Signed-off-by: Adam Duskett <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/mesa3d: add compile patch for linux < 3.5
Thomas Devoogdt [Tue, 12 Dec 2023 13:56:34 +0000 (14:56 +0100)]
package/mesa3d: add compile patch for linux < 3.5

The kcmp() system call first appeared in linux 3.5,
and was also not there before linux 5.12 if
CONFIG_CHECKPOINT_RESTORE was not set.

See: https://man7.org/linux/man-pages/man2/kcmp.2.html

Signed-off-by: Thomas Devoogdt <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/tree: update _SITE URL
Sébastien Szymanski [Tue, 12 Dec 2023 13:49:55 +0000 (14:49 +0100)]
package/tree: update _SITE URL

The current TREE_SITE URL doesn't work anymore.
Moreover the README states:
"
The main distribution site for tree is here:
http://oldmanprogrammer.net/source.php?dir=projects/tree

Backup GIT sites are:
https://gitlab.com/OldManProgrammer/unix-tree
https://github.com/Old-Man-Programmer/tree

Old site for as long as it lasts:
http://mama.indstate.edu/users/ice/tree/
ftp://mama.indstate.edu/linux/tree/
"

Use http://oldmanprogrammer.net/tar/tree/ for TREE_SITE

Signed-off-by: Sébastien Szymanski <[email protected]>
Signed-off-by: Thomas Petazzoni <[email protected]>
13 months agopackage/crun: bump to version 1.12
Xiangyu Chen [Fri, 15 Dec 2023 03:10:19 +0000 (11:10 +0800)]
package/crun: bump to version 1.12

Changes:
https://github.com/containers/crun/releases/tag/1.12

Also add a patch to fix crun compile without libseccomp libcap issue

Signed-off-by: Xiangyu Chen <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agoDEVELOPERS: fix indentation on 2 entries
Giulio Benetti [Thu, 14 Dec 2023 22:12:26 +0000 (23:12 +0100)]
DEVELOPERS: fix indentation on 2 entries

Substitute spaces with tab on 2 entries for consistency.

Signed-off-by: Giulio Benetti <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/z3: bump to version 4.12.4
Julien Olivain [Mon, 11 Dec 2023 19:14:00 +0000 (20:14 +0100)]
package/z3: bump to version 4.12.4

For change log since 4.12.2, see:
https://github.com/Z3Prover/z3/blob/z3-4.12.4/RELEASE_NOTES.md#version-4124

Signed-off-by: Julien Olivain <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agoconfigs/zynqmp_kria_kd240_defconfig: new defconfig
Neal Frager [Wed, 13 Dec 2023 13:48:49 +0000 (13:48 +0000)]
configs/zynqmp_kria_kd240_defconfig: new defconfig

This patch adds support for Xilinx Kria KD240 starter kit.

KD240 features can be found here:
https://www.xilinx.com/products/som/kria/kd240-drives-starter-kit.html

While the Kria SOM is based on a ZynqMP SoC, there are some key
boot config differences from the other ZynqMP evaluation boards.

1. There are no boot switches on Kria SOMs. The boot mode is thus
hard configured for QSPI flash. A pre-programmed boot.bin comes
with every Starter Kit. U-Boot can then find the Linux kernel and
file system on the SD card.

Optional instructions for updating the boot.bin in the QSPI flash
can be found in the readme.txt file and the link below.

https://xilinx-wiki.atlassian.net/wiki/spaces/A/pages/1641152513/Kria+K26+SOM

2. Kria SOMs use UART1 for the console instead of UART0. For this
reason, Kria Starter Kits will use a separate extlinux.conf file
from other ZynqMP evaluation boards.

3. The KD240 has a USB to SD card bridge, so the Linux kernel
and file system are found on /dev/sda1 and /dev/sda2.

4. The following patches have been submitted upstream to u-boot.
Without these patches, the usb, sd card and ethernet peripherals
do not work correctly.

https://patchwork.ozlabs.org/project/uboot/patch/20231213134007.2818069[email protected]/
https://patchwork.ozlabs.org/project/uboot/patch/20231213134052.2818879[email protected]/

Signed-off-by: Neal Frager <[email protected]>
Reviewed-by: Luca Ceresoli <[email protected]>
[Peter: add upstream tag, drop patch numbering from patches]
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/rsyslog: bump version to 8.2312.0
Flávio Tapajós [Tue, 12 Dec 2023 12:47:35 +0000 (09:47 -0300)]
package/rsyslog: bump version to 8.2312.0

Signed-off-by: Flávio Tapajós <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
13 months agopackage/quickjs: bump to version 2023-12-09
Francois Perrad [Mon, 11 Dec 2023 20:58:50 +0000 (21:58 +0100)]
package/quickjs: bump to version 2023-12-09

Signed-off-by: Francois Perrad <[email protected]>
Signed-off-by: Peter Korsgaard <[email protected]>
This page took 0.085914 seconds and 4 git commands to generate.