From patchwork Tue Dec 9 15:39:49 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 76104 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3E6C1D3B7ED for ; Tue, 9 Dec 2025 15:40:03 +0000 (UTC) Received: from mail-wm1-f43.google.com (mail-wm1-f43.google.com [209.85.128.43]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.10696.1765294796374184067 for ; Tue, 09 Dec 2025 07:39:56 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=NFes18eI; spf=pass (domain: gmail.com, ip: 209.85.128.43, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f43.google.com with SMTP id 5b1f17b1804b1-47a8195e515so4205985e9.0 for ; Tue, 09 Dec 2025 07:39:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1765294795; x=1765899595; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:from:to:cc:subject:date:message-id:reply-to; bh=zRjgTlEsUHai2QVNTmNHMCzglHGsH+YxDtuwRJaB+0A=; b=NFes18eI6WunGKjDtWIIcLTSEt3mZhzTL2me8eyOSkewKhy5HOvgq4ldeIXQapPFK8 3l85NBhwlhoEDRbomW8Me5gQlcQehVgfQKljLXk+mWfqD5QHp8FnOlEtetnl+54Daakx 8/piwxqP4Vw1ubjHT+rdce59kZR7i1sTlIeaLmAInHVN3Fv13+U/IGpT3neH/x86UjvC 1HcTqOlO7ZxU0v7l7VW2wEO0GWfne2JAVbRF5cTut1ADftzfqWW30PoZWgyo5e1eC0h/ 3O3c0BqskTo1qaZrrFnqut63QHS+DvWrpgV2CI1QnFq4ulmETdh/GGbDCCWv3U9AM8WR q7hg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765294795; x=1765899595; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=zRjgTlEsUHai2QVNTmNHMCzglHGsH+YxDtuwRJaB+0A=; b=nvtK0P0BX5Ydz8oejtWdP5hIzx9Ies+ylRMPWuNfdGPzvEulJc4Ky6Lg03+taQgpQN /aotQJA8nHQ+OeTbhCXZncETWqFjzOTm1utTSgWNziJCOOZZq7hvoUuiY9iABGy6lR20 M7yiJeK7yIZ7U3+ctGmVYcGNspKz26UDzvep0MwtxCZSf9NM1achl/ZVeo4dLFTLdbqO R5BZIaOahfVguLRc5cLr+H9oL0bq5w5MG3XM46CwWIyl2wRnx9IZleI9aY/UYCuslJ6g 0IBN85Oek1pI8a8w2JE5rsNC9qrG3yRVg7cdPjHzwEFkKT37+Whzu23GozUBdyrI2W9S pMBA== X-Gm-Message-State: AOJu0YzSvcYgvGW7SjBvqnB+4I//HtmTpYDd/k/jlrMid5SXIUhYHGTs KirDUa0cfU3uZHkXo/Qd26/btBVqAKZbZtLwld2qSCWRF8qN6HXRiaA8aSnkyw== X-Gm-Gg: ASbGncsMruK0b89cUpSl0ynBHHuI53WiuMNpBaoa5J7XDiB6ECQgi5ggTL3rUzGb4hQ qMzYEKIL3wnvfKx+lM+GE9J/DyqzYirZrGWeZq6x9u6JLciNhRA5Z0ZiRKnt+0Mp2xfY78FTxDs ZON9VVvixYARemTcIx4p/YL1Qj6fpoeC/SrN8X5H0lcVaPJ9dkIqfJ8GeJEukdP5J3xqVEksM2w toE82qWTI0sOF0l7H3ujSsWmAecYbCOHiDUlpZnhs5cC8xdqIGhcyMBGAd/hGGishd9+mf4ysJ6 kn1+YnDjAVLFUYKSR/Po4xW7gi8nXsZnxb/+XHz8/yZvHqQf6MFHuT5YdOQl6lvIJ524zRQeZ6n q779rf0UkzSOnsDX3d9LrNBTFvgN9MoO1NbVMK3Lpr95NXYDsNQTc8GQkWbkKdVeMfzwwsLVqir 7feP7IDS2a X-Google-Smtp-Source: AGHT+IFDZBAN3zYraVxEsa0Y5jNvXDcxe4LdyXD/Gs/6MF/+ZLzT8MazASgIpK27qN2Q4qhXq5LX0A== X-Received: by 2002:a05:600c:3b07:b0:477:1ae1:fa5d with SMTP id 5b1f17b1804b1-47939e27b85mr112467385e9.20.1765294794463; Tue, 09 Dec 2025 07:39:54 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-47a7d632cebsm46375495e9.7.2025.12.09.07.39.53 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Dec 2025 07:39:54 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][PATCH 1/5] accountservice: ignore CVE-2023-3297 Date: Tue, 9 Dec 2025 16:39:49 +0100 Message-ID: <20251209153953.951218-1-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 09 Dec 2025 15:40:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/122460 Details: https://nvd.nist.gov/vuln/detail/CVE-2023-3297 The vulnerability is triggered by a patch added by Ubuntu, and the vulnerable patch is not present in the recipe. Signed-off-by: Gyorgy Sarvari --- .../recipes-support/accountsservice/accountsservice_23.13.9.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta-gnome/recipes-support/accountsservice/accountsservice_23.13.9.bb b/meta-gnome/recipes-support/accountsservice/accountsservice_23.13.9.bb index e3dfcfffff..c024ae3f92 100644 --- a/meta-gnome/recipes-support/accountsservice/accountsservice_23.13.9.bb +++ b/meta-gnome/recipes-support/accountsservice/accountsservice_23.13.9.bb @@ -41,3 +41,5 @@ FILES:${PN} += " \ ${datadir}/dbus-1 \ ${datadir}/polkit-1 \ " + +CVE_STATUS[CVE-2023-3297] = "not-applicable-platform: The vulnerability is Ubuntu specific" From patchwork Tue Dec 9 15:39:50 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 76108 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3D6EFD3B7EA for ; Tue, 9 Dec 2025 15:40:03 +0000 (UTC) Received: from mail-wm1-f42.google.com (mail-wm1-f42.google.com [209.85.128.42]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.10653.1765294796792893601 for ; Tue, 09 Dec 2025 07:39:57 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=naVDSYzD; spf=pass (domain: gmail.com, ip: 209.85.128.42, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f42.google.com with SMTP id 5b1f17b1804b1-477bf34f5f5so45710995e9.0 for ; Tue, 09 Dec 2025 07:39:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1765294795; x=1765899595; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=EIeswjZjL0S2WD+jxXX1gtEX0Y6nIx189ZdoBP5HiWc=; b=naVDSYzD4YeIMbHXZJ5thEME8kftQwKQc3L27DbYjI7h0oVqmq2ZxbHkucrQz1aX1q KPGw0jJ0pswiBVGzPbWWwHqT6xin4qQC/alnMLqj8ri42CwL4AiLWAvGMUSxYDTCWoTM u+frKW/fatGQQfYycxUq8/QXnkI0WmI7BIH6loEpuJGUr+KaVpDV7VrDpmfF7OtIxY5g ITIgPnnf5lo5lFmCCCtEwAezvZg0Mrfgr6FeXiHjZpVRsPeclcSRqbTNmGpy5g6UVxIN 7KkpXtgmI6N6+kl76PFo4Oqxs44FJZ4zfMbb+42UhKlmLO3PCTp0D5EimOa55Ib5moo+ MuaA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765294795; x=1765899595; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=EIeswjZjL0S2WD+jxXX1gtEX0Y6nIx189ZdoBP5HiWc=; b=nJOhBpzFlIvhNDFqS9PaZchHqqpDAREcRpPgWwPSWMHo3S5lOZvL7hUASHGQKii5nm sqdo+x1bJ0JaO+bCuLYN9miP8JY47BgsB9c1lIIwcVlTlmnmKQ//TWB3YA+944+2hDYm 6iqWH1Lj9tC1phtLCH65odthG/+ceR1YDRRhshxzOculLrweRiUafF2nPeVBKZS9k3AZ KK4HiUpd2uWIObUUMS+SbwuymU87eKCd39rP5nGWZUJZU9wVApLEIyzgo/Q+CS0OUNpL xFlgL9Q7jwR9zFQ6YO1ailT9iAAzpUPVOYqjBBkBf/24MHraNqsVnMuSqjs2lp/4O+hs F7CQ== X-Gm-Message-State: AOJu0YzmdAzLQnbo86XUkuKK1g2lddckIdmxa9F6MlCsujRLaQ+r4l1m efxLhfJ50f2QTizGP83g2Odv/4sIsnWz+9pDGAHX7OCB7yF9CgAZoWKpXeW7Nw== X-Gm-Gg: ASbGncv2BSugA49yr0JsHipihFfauw0R70huPWYWE5HNbBkmUl5GDcynUJPidxFxuu2 3ACAjKegRj9gmPIvvz9vZxTgnMceAPCem+fIyvwNgaJ9bG8dCASg4tBX7hvw/jlO4F+eVAJQJO/ nchlbSfWH/2x/fJuddQSlWBPXD4H73OaVWDgrEH28tkhU4B9V35xFUFpsDCaeOnydmWKphPQ1kl Iaj14yw1+hIQv+3e1XR/Sx8//SP7cKdRVs++zRTu4uuB23XTwkifJvvCSnn/l41OaPBX3NpydCW OXngPjLLPuoQmFnIiTurLpXX/ZGlN39W4P8GsvcsWucueIw7I1Mh9MSKhQ6aQ8PbRjji0SNHcrg MItOp/v3Cx6ACEHWIk9nOUYgyoc5cfag6gj5BrFMBJ4ajsOAMXQJ53eERzVhG+J2QZFBIkKdsaB ozVPZh0onR X-Google-Smtp-Source: AGHT+IEj3yfs9rEdE8YAU75Uio8IoYKOe91TcZ4ZukTJygJYdfLuapgKB30eh6wxrx5+HSIYvoNv5A== X-Received: by 2002:a05:600c:3593:b0:477:5c58:3d42 with SMTP id 5b1f17b1804b1-47939df8334mr122005135e9.10.1765294795084; Tue, 09 Dec 2025 07:39:55 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-47a7d632cebsm46375495e9.7.2025.12.09.07.39.54 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Dec 2025 07:39:54 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][PATCH 2/5] civetweb: ignore CVE-2025-9648 Date: Tue, 9 Dec 2025 16:39:50 +0100 Message-ID: <20251209153953.951218-2-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20251209153953.951218-1-skandigraun@gmail.com> References: <20251209153953.951218-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 09 Dec 2025 15:40:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/122461 Details: https://nvd.nist.gov/vuln/detail/CVE-2025-9648 It is already fixed in the currently used version. Also, update CVE-2025-55763's status to "fixed-version" (so it will be marked as "Patched" in the CVE report instead of "Ignored") Signed-off-by: Gyorgy Sarvari --- meta-networking/recipes-connectivity/civetweb/civetweb_1.16.bb | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/meta-networking/recipes-connectivity/civetweb/civetweb_1.16.bb b/meta-networking/recipes-connectivity/civetweb/civetweb_1.16.bb index 1d0207edb1..0e13bc6deb 100644 --- a/meta-networking/recipes-connectivity/civetweb/civetweb_1.16.bb +++ b/meta-networking/recipes-connectivity/civetweb/civetweb_1.16.bb @@ -10,7 +10,8 @@ SRC_URI = "git://github.com/civetweb/civetweb.git;branch=master;protocol=https \ file://0001-Unittest-Link-librt-and-libm-using-l-option.patch \ " -CVE_STATUS[CVE-2025-55763] = "cpe-incorrect: The vulnerability is fixed in the used revision" +CVE_STATUS[CVE-2025-55763] = "fixed-version: The vulnerability is fixed in the used revision" +CVE_STATUS[CVE-2025-9648] = "fixed-version: The vulnerability is fixed in the used revision" # civetweb supports building with make or cmake (although cmake lacks few features) inherit cmake From patchwork Tue Dec 9 15:39:51 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 76105 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3F6F1D1CDC6 for ; Tue, 9 Dec 2025 15:40:03 +0000 (UTC) Received: from mail-wm1-f45.google.com (mail-wm1-f45.google.com [209.85.128.45]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.10698.1765294797526564466 for ; Tue, 09 Dec 2025 07:39:57 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=UD7NTzkG; spf=pass (domain: gmail.com, ip: 209.85.128.45, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f45.google.com with SMTP id 5b1f17b1804b1-4779ce2a624so74158485e9.2 for ; Tue, 09 Dec 2025 07:39:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1765294796; x=1765899596; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=6k1tNh7/0Uo55vjSZ1Ff62Tckj+6tTTw06vaQ6yEO18=; b=UD7NTzkGyoo2ljAeViX1Adkv/of8Ul86dWTpm7xVK+ZDLnvRWU75SGIMmkR/MZCccK VbGJKDL6EetynWsKrCOfS4UdDQqb448QdqofeK111Ige4ZfTXUg8bcSJhZFB8CR/7Tkp neBG0Vbit6k24/D/qIZImDixPWD7T45KkWQaCd7y7gwy48iFNeVNV1hs9QEP901KPS54 39hg1P+BstgwyzCprefE+a111+akjo9iqrWMpIenxUbVlxBkUBogoAmjBi1ZHsyp/yf0 ydWSGu3NpxXNcXxJzgTDlQhYB8CKXbKCSBHNCyAKMDhNrKucu1VFddTwf8N/T20JRwbi CsjA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765294796; x=1765899596; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=6k1tNh7/0Uo55vjSZ1Ff62Tckj+6tTTw06vaQ6yEO18=; b=WlC3ETicm1rOlz0LE8vu3CKr/BAYYVZnJ1FdRRhpLb39PwTWPXTlQfCgut0nIhAYg9 Or5spegNhMPez1g60FpglkJVcLVyLaker+7BEN9aJ9MYldrVKUY37hZHJocyGA/pHhRZ w2BVjZLks4eQMEj3W9DqG0trSqCP4Hmiebma+Csf4y94gxweyfkcjU3NeiaQ2JCKRHhq 07+1G/709ctv8X/F2UW0MAI43jAjJotjlBEfdcRAbPV4b2mD5SLH+yctv3S9/0YzneYh dxvNP1Rr32TFvnyNR4988gzSPmV2ErpzOzDBzY1UK2Jyi138jFre7HoATXR0dFJpLgi1 20Jw== X-Gm-Message-State: AOJu0YyauwFa8k7OnEZV4OrlWtVX4uL1L/OoH3t/pu64QZT0cCTtvBGT 29FwQLSRCfjjGcibz02RBRA65C0o7QB2eFQ3j7jf4MNAvvib8dwwqhWtQjlFRA== X-Gm-Gg: ASbGncuWXuez69DDZnqQn1FVa12zfeLn7GVlSCHZmq4NnfkUdCy/Zmp3HKQp/NM1gLJ y3PCq8ttj89yAlPdizlJhn5N1M/RU3yEN7bWAmCXGIQbyWSo24rqpxqbFoXrswmJ8jWMr0X2dvh 20fYtRREIwP0RiI4JRKxgmfKeibhDnTPF2ENy315+pAbP5xe9spkaOFW4ZpKNi2OJoRSLVYI7rb EUnFsAe5E1grBpvFAG38I6ICBfFk2kH6dzTrN5K2XA8rcc2AeH36TshKW4TLvBbAAoEyWQAbKdJ febwFOjOUTn7V11Y6bkr+llBkj+Hq6RvtRdFbFojBL6xIACxSHe7Q2fLDZjObgCbgD3HgcgwupQ El6jfc15IiUna39o/9vQTBBk08PL4vcOv4bL+m9pN9ETfC9l5DixEHjF4F/OgAOPipr2zk64aMc gep4KOQruG X-Google-Smtp-Source: AGHT+IEumneqfEbaRmHhxM73JGW3opGRhdNSa5mO8QzjsqdjvQFKEIyBpgr9s/2BLX0P/SgVrjEhQg== X-Received: by 2002:a05:600c:c494:b0:477:54cd:2029 with SMTP id 5b1f17b1804b1-47939dedbe1mr103614735e9.4.1765294795772; Tue, 09 Dec 2025 07:39:55 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-47a7d632cebsm46375495e9.7.2025.12.09.07.39.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Dec 2025 07:39:55 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][PATCH 3/5] cups-filters: patch CVE-2025-64524 Date: Tue, 9 Dec 2025 16:39:51 +0100 Message-ID: <20251209153953.951218-3-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20251209153953.951218-1-skandigraun@gmail.com> References: <20251209153953.951218-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 09 Dec 2025 15:40:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/122462 Details: https://nvd.nist.gov/vuln/detail/CVE-2025-64524 Pick the patch mentioned in the nvd report. Signed-off-by: Gyorgy Sarvari --- .../cups/cups-filters/CVE-2025-64524.patch | 82 +++++++++++++++++++ .../cups/cups-filters_2.0.1.bb | 10 +-- 2 files changed, 87 insertions(+), 5 deletions(-) create mode 100644 meta-oe/recipes-printing/cups/cups-filters/CVE-2025-64524.patch diff --git a/meta-oe/recipes-printing/cups/cups-filters/CVE-2025-64524.patch b/meta-oe/recipes-printing/cups/cups-filters/CVE-2025-64524.patch new file mode 100644 index 0000000000..b8338e333a --- /dev/null +++ b/meta-oe/recipes-printing/cups/cups-filters/CVE-2025-64524.patch @@ -0,0 +1,82 @@ +From 4230ceaec8a6751f724a0d556ce4650d52a83a02 Mon Sep 17 00:00:00 2001 +From: Gyorgy Sarvari +Date: Wed, 12 Nov 2025 15:47:24 +0100 +Subject: [PATCH] rastertopclx.c: Fix infinite loop caused by crafted file + +From: Zdenek Dohnal + +Infinite loop happened because of crafted input raster file, which led +into heap buffer overflow of `CompressBuf` array. + +Based on comments there should be always some `count` when compressing +the data, and processing of crafted file ended with offset and count +being 0. + +Fixes CVE-2025-64524 + +CVE: CVE-2025-64524 +Upstream-Status: Backport [https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06] +Signed-off-by: Gyorgy Sarvari +--- + filter/rastertopclx.c | 25 +++++++++++++++++++++++-- + 1 file changed, 23 insertions(+), 2 deletions(-) + +diff --git a/filter/rastertopclx.c b/filter/rastertopclx.c +index ded86f1..39cb378 100644 +--- a/filter/rastertopclx.c ++++ b/filter/rastertopclx.c +@@ -825,10 +825,10 @@ StartPage(cf_filter_data_t *data, // I - filter data + } + + if (header->cupsCompression) +- CompBuffer = malloc(DotBufferSize * 4); ++ CompBuffer = calloc(DotBufferSize * 4, sizeof(unsigned char)); + + if (header->cupsCompression >= 3) +- SeedBuffer = malloc(DotBufferSize); ++ SeedBuffer = calloc(DotBufferSize, sizeof(unsigned char)); + + SeedInvalid = 1; + +@@ -1159,6 +1159,13 @@ CompressData(unsigned char *line, // I - Data to compress + seed ++; + count ++; + } ++ ++ // ++ // Bail out if we don't have count to compress ++ // ++ ++ if (count == 0) ++ break; + } + + // +@@ -1252,6 +1259,13 @@ CompressData(unsigned char *line, // I - Data to compress + + count = line_ptr - start; + ++ // ++ // Bail out if we don't have count to compress ++ // ++ ++ if (count == 0) ++ break; ++ + #if 0 + fprintf(stderr, + "DEBUG: offset=%d, count=%d, comp_ptr=%p(%d of %d)...\n", +@@ -1424,6 +1438,13 @@ CompressData(unsigned char *line, // I - Data to compress + + count = (line_ptr - start) / 3; + ++ // ++ // Bail out if we don't have count to compress ++ // ++ ++ if (count == 0) ++ break; ++ + // + // Place mode 10 compression data in the buffer; each sequence + // starts with a command byte that looks like: diff --git a/meta-oe/recipes-printing/cups/cups-filters_2.0.1.bb b/meta-oe/recipes-printing/cups/cups-filters_2.0.1.bb index e488bd3039..a6eedda5d7 100644 --- a/meta-oe/recipes-printing/cups/cups-filters_2.0.1.bb +++ b/meta-oe/recipes-printing/cups/cups-filters_2.0.1.bb @@ -5,11 +5,11 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=6d5b952b53dbe7752199903d082e5f07" DEPENDS = "libcupsfilters libppd glib-2.0 poppler" -SRC_URI = " \ - https://github.com/OpenPrinting/${BPN}/releases/download/${PV}/${BP}.tar.xz \ - file://fix-make-race.patch \ - file://0001-Fix-build-failure-with-GCC-15-and-std-c23.patch \ -" +SRC_URI = "https://github.com/OpenPrinting/${BPN}/releases/download/${PV}/${BP}.tar.xz \ + file://fix-make-race.patch \ + file://0001-Fix-build-failure-with-GCC-15-and-std-c23.patch \ + file://CVE-2025-64524.patch \ + " SRC_URI[sha256sum] = "39e71de3ce06762b342749f1dc7cba6817738f7bf4d322c1bb9ab10b8569ab80" UPSTREAM_CHECK_URI = "https://github.com/OpenPrinting/cups-filters/releases" From patchwork Tue Dec 9 15:39:52 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 76107 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4B62FD3B7F8 for ; Tue, 9 Dec 2025 15:40:03 +0000 (UTC) Received: from mail-wm1-f44.google.com (mail-wm1-f44.google.com [209.85.128.44]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.10654.1765294798123951993 for ; Tue, 09 Dec 2025 07:39:58 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=Vszwrr9I; spf=pass (domain: gmail.com, ip: 209.85.128.44, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f44.google.com with SMTP id 5b1f17b1804b1-477770019e4so61756545e9.3 for ; Tue, 09 Dec 2025 07:39:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1765294796; x=1765899596; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=tBiEdjzEvPKFjDRRWFlyoARwzqjG5d2LxwKBTnx20kU=; b=Vszwrr9ImWk1nVV2IfOjO/hjnkddv9k5bxVkkktSMm+Pr0d6IfSgKSsSqaSM/iVqvx AZ0dmS6g29a5db4DtcCwubtDhbpD0eRUVdLnk0eL9d7yFZK+wiyyvNFQspis7jlGbHR7 ORZ7EdoM3VuHWlOi8BSwcMMA7KcuKB8pjoWqfbpGk3g0/ijaNmMSTPwnPH3QYhWvgLLq e99Jlj3rNKPTt1HIbHQwhYVFfQzDQ1E46SAr6d7aTBcqj04Ub2HofgRcDBU2j4OTioO+ DLw9OkvbzfrdZfW7v/gwA1ovjrQ8G/OLgb4YFxGJ1tUk2oWeCy9tTV0ReobfIvsa9GgB dLzw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765294796; x=1765899596; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=tBiEdjzEvPKFjDRRWFlyoARwzqjG5d2LxwKBTnx20kU=; b=Y4HG3h7ooNRVh2EyYvbD8qcS5AGk+HyGoRTNOIDyzTde+GW4sgHQfeAEqfkTndGBnZ MjtJxhx8gebESFYTXgnUi2g9AeSCphJiNDZe8srs1vFD6o6RfbM7XxAWXNEMIVKbkZLA W45O8TIOeSPxVwFpUmTPoC34X4nk945AgLAm6GWTcX83DRpT88CjtU/JiMXG2N/2ncQ9 dKrXfUc6XyB0jVclvMdSwtNDUNAQYlR5oHUpm/17yj9kavN/XHM8vWc5smFvRFiCi/sM AJf0iiPmJMuV50k8MjfT22BnYllZGtMZ3Qq3N8t2UvFIRLgVR0+NyP4LIYtDWjpRvuyL jqVQ== X-Gm-Message-State: AOJu0YyBG/7IdRfE5ifmqlKOpkyQKat6AxChcxc4f8ees6+Qnzbj8Oy1 JYELmsQ5ehGPnqScaHSTeZuMtdgi0jihp7NAU/OgGnTlDx6dSFxEpqTpEqmL/Q== X-Gm-Gg: ASbGncsQIjC9E8p7mJp/bRjDnDmEl+af7HOAvcwMFC7Trt6S6Cd0/09NFcfFbLLZvWR AeAF9sBztkvWJ12AnoLX/5BeyzRjVJYonlIwj7pmUJMziu+fJkxsghe1jLb5hGtvH2/Zh0N66Qd WbUR+V0wgJMljS5334UfNpuCjUjKfW+z1dmbcloP+jmSYAh31zLsVAu2bAki8bhjaDSWNGwKgLH 8sL+XdCO8jx7OKsc+0kY2DDSjcvItCtugpM4jafh/HEZu7Wktr3O4/2ikzEXnmQHa9PcBiC8qY3 op0KRvXMzmsMB4Mzn3Igx6p4EYuo4IdqTOoru+QgHCaqdCdaiZMspau0Ns1DXhFkAowTKCwPSGB XCjF3dQEbFx1BNA9n0ZY0HcniNtHJb1gIQDIUAAahsJ2NIXvx6XeS6gt14iX02ja8tDOwbWfH/N cx44p7h87p X-Google-Smtp-Source: AGHT+IGsbh6/dnC8eWZplbwGA56VvwRwTju7XuJQmS9gIpgf+HXap8K/kMN460/UEFQE4c7kyBvPAQ== X-Received: by 2002:a05:600c:4f81:b0:475:dd7f:f6cd with SMTP id 5b1f17b1804b1-47939e5c540mr151380245e9.35.1765294796399; Tue, 09 Dec 2025 07:39:56 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-47a7d632cebsm46375495e9.7.2025.12.09.07.39.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Dec 2025 07:39:56 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-networking][PATCH 4/5] dante: upgrade 1.4.3 -> 1.4.4 Date: Tue, 9 Dec 2025 16:39:52 +0100 Message-ID: <20251209153953.951218-4-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20251209153953.951218-1-skandigraun@gmail.com> References: <20251209153953.951218-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 09 Dec 2025 15:40:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/122463 License-Update: copyright year bump Changelog: - Fix potential security issue CVE-2024-54662, related to "socksmethod" use in client/hostid-rules. - Add a missing call to setgroups(2). - Patch to fix compilation with libminiupnp 2.2.8. - Client connectchild optimizations. - Client SIGIO handling improvements. - Various configure/build fixes. - Updated to support TCP_EXP1 version of TCP hostid format. Signed-off-by: Gyorgy Sarvari --- .../dante/{dante_1.4.3.bb => dante_1.4.4.bb} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename meta-networking/recipes-protocols/dante/{dante_1.4.3.bb => dante_1.4.4.bb} (90%) diff --git a/meta-networking/recipes-protocols/dante/dante_1.4.3.bb b/meta-networking/recipes-protocols/dante/dante_1.4.4.bb similarity index 90% rename from meta-networking/recipes-protocols/dante/dante_1.4.3.bb rename to meta-networking/recipes-protocols/dante/dante_1.4.4.bb index 901167f1b3..7aa1103855 100644 --- a/meta-networking/recipes-protocols/dante/dante_1.4.3.bb +++ b/meta-networking/recipes-protocols/dante/dante_1.4.4.bb @@ -9,11 +9,11 @@ what could be described as a non-transparent Layer 4 router." HOMEPAGE = "http://www.inet.no/dante/" LICENSE = "BSD-3-Clause" -LIC_FILES_CHKSUM = "file://LICENSE;md5=edd508404db7339042dfc861a3a690ad" +LIC_FILES_CHKSUM = "file://LICENSE;md5=b3a8e7dc09bb720460f28c9d3796afa5" SRC_URI = "https://www.inet.no/dante/files/dante-${PV}.tar.gz \ " -SRC_URI[sha256sum] = "418a065fe1a4b8ace8fbf77c2da269a98f376e7115902e76cda7e741e4846a5d" +SRC_URI[sha256sum] = "1973c7732f1f9f0a4c0ccf2c1ce462c7c25060b25643ea90f9b98f53a813faec" # without --without-gssapi, config.log will contain reference to /usr/lib # as a consequence of GSSAPI path being set to /usr by default. From patchwork Tue Dec 9 15:39:53 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 76106 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 54FC9D3B7FB for ; Tue, 9 Dec 2025 15:40:03 +0000 (UTC) Received: from mail-wm1-f42.google.com (mail-wm1-f42.google.com [209.85.128.42]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.10702.1765294798820602215 for ; Tue, 09 Dec 2025 07:39:59 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=K3Jd5Hpw; spf=pass (domain: gmail.com, ip: 209.85.128.42, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f42.google.com with SMTP id 5b1f17b1804b1-4779aa4f928so58768565e9.1 for ; Tue, 09 Dec 2025 07:39:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1765294797; x=1765899597; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=KOSoSCvqY+rWlNqpBh1u40LA8q6mZpzdITV1UP2Bt7c=; b=K3Jd5HpwUzisXgwo1YCTGwH4EcPEcQrp7wakXpvyaWWMDKgk7C49jNfgvGqtkwbjNm b/7HrMzKRsEDZD14xDVhawrB0vIvpfZP0Vkl+Q1TF2RgLGBQwlXAw3JLifCgT2jgUSvc VOfLb/gHDk1YOk+iJFAcFbG2e5qEekHgYeBPMwWeYBysIGQWPfz/HnCxq7WQMY5edSd6 obMAp6BzwzUvdmmkMrB8ZCk4tjwJoryPSE+MJrFsE/+Xyr4Md6EJ/B3jyeme+XfdbXbh zKSM4GLPBeKQpJwgb1O5BX7PqzPWTtmSulrzn5eoQBjQhgGj1zy7o0p5luAmUfVx6J86 QweA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765294797; x=1765899597; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=KOSoSCvqY+rWlNqpBh1u40LA8q6mZpzdITV1UP2Bt7c=; b=M7q0d2Z+fy6FYmkpTBFnA0JxIEdMqY+MD/wP9aOAAViN2dt8+tnj4KcpjIm1xxRE88 ZqGHXJDG3iOKhAPPVmMuW9evSbe5VZeGalC6hfGEfSWAPFcc3bQGDybFOJRga7WBOV9G wIawDDdvc7z7nJP8q3qQiWlv9L9bDRt0Afm/0iinhIPP4NlnK1Mvy9usFimUT2o8/96s bcfVl051GO7yV0V++M4zqUOtMPPXezfReREvIMzif883AwgDS5crZeI0NfHcfrTnOSbN AtZaG2x+LmJNJSlRWBO/QSGdKscsn2RTCEnCilZOBujTs41DuOOZoTwxPIiBizpGY3kW Gv1g== X-Gm-Message-State: AOJu0YzYvOmuTVwaG84IHCkX2gOFdZ7QoKSdGpzHffHi8NBYaXlzBeoV pUed9oQp2TW7uzJzcPtnB6rIOm2QQyawSmDhOmElzLA+WfmQnE4a6H/FaPIzrA== X-Gm-Gg: ASbGnctFDbMoTAbCOTaAPWRBfYVCTh3QaEHpsODTTtziNSrAGpLlkkiS9lC43XzCEIO zTyWwy6i8fHDCppjzBKSJb7hhiOGmqhqPN5wA4D5Xz+CiWIHmLWaOGygUoplqgR04bBB7v5s8cS uXAfrVTxzZuvMAFyisLu4ym2m0yKXTqCK05knZxcVCjYNb7m9/KS4H7SyLRtrqet+dqoMznQn+J i+F6823G/bUlM57hHbT1aTJSN7KEN/egTlB0oEi74jkWfJcpS0vOiQQcLsUps5g0hbPKB886vAK TtGeVYxFrLF0m6Tk2MwNrkePuwVTQcgLPTZ1QMEMAUbtKFeJI7Ww/A6Zp5za8eydP4ZdDkxaOJx BQ0InwmmEAyE1lXYTIJiNpB2jOrtz1JpplmjBWQC+LBMzVogefEpzq9fWJi8Ip8fzxZZGDFvoDt oPxyEA55Uf X-Google-Smtp-Source: AGHT+IG4LWA2IImHUc0VZOnb7oY2aRoYTAlXg9QfR+mEM65bRmwS4nu6pl+3002/ftjCuZ39qb53Aw== X-Received: by 2002:a05:600c:548a:b0:46e:761b:e7ff with SMTP id 5b1f17b1804b1-47939e45f7fmr106465675e9.28.1765294797083; Tue, 09 Dec 2025 07:39:57 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-47a7d632cebsm46375495e9.7.2025.12.09.07.39.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Dec 2025 07:39:56 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][PATCH 5/5] fex: ignore unrelated CVEs Date: Tue, 9 Dec 2025 16:39:53 +0100 Message-ID: <20251209153953.951218-5-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20251209153953.951218-1-skandigraun@gmail.com> References: <20251209153953.951218-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 09 Dec 2025 15:40:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/122464 These CVEs were filed for "Fram's Fast File Exchange" application, which has the same abbreviated name as fex. Currently this recipe has no historical CVEs associated, so I couldn't set the correct CVE_PRODUCT. Rather ignore these irrelevant CVEs explicitly. Signed-off-by: Gyorgy Sarvari --- meta-oe/recipes-devtools/fex/fex_2511.bb | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/meta-oe/recipes-devtools/fex/fex_2511.bb b/meta-oe/recipes-devtools/fex/fex_2511.bb index 9c0748ac63..88dd48f953 100644 --- a/meta-oe/recipes-devtools/fex/fex_2511.bb +++ b/meta-oe/recipes-devtools/fex/fex_2511.bb @@ -54,3 +54,9 @@ LDFLAGS += "-fuse-ld=lld" FILES:${PN} += "${datadir} ${libdir}/binfmt.d ${libdir}/libFEXCore.so" FILES:${PN}-dev = "${includedir}" + +# At the time of writing this, this recipe has no historical CVEs associated, and couldn't +# find a CPE to set. So ignore these unrelated vulnerabilities. +CVE_STATUS_GROUPS = "CVE_STATUS_WRONG_CPE" +CVE_STATUS_WRONG_CPE[status] = "cpe-incorrect: These vulnerabilities are for unrelated Fram's Fast File-EXchange application" +CVE_STATUS_WRONG_CPE = "CVE-2012-0869 CVE-2012-1293 CVE-2014-3875 CVE-2014-3876 CVE-2014-3877"