From patchwork Sun Feb 1 14:04:17 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 80215 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D74B2E65273 for ; Sun, 1 Feb 2026 14:04:30 +0000 (UTC) Received: from mail-wm1-f54.google.com (mail-wm1-f54.google.com [209.85.128.54]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.29977.1769954664838059046 for ; Sun, 01 Feb 2026 06:04:25 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=LpcMtNuR; spf=pass (domain: gmail.com, ip: 209.85.128.54, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f54.google.com with SMTP id 5b1f17b1804b1-480706554beso39312545e9.1 for ; Sun, 01 Feb 2026 06:04:24 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769954663; x=1770559463; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=oPfe4ca3C+UODV4P40K81Qi7wMfEuC1qiZ9pr4SRo1s=; b=LpcMtNuR3FAwgaq7tjCiC64xRyiWSo/AqjQQxDI3MBpGVYAApdRDixAZuMP9j6L6dA 5yDeeK8X7cV4RSKCYVSOo9VCApXNul2oiOAHYKkJUiwg+G2A067em9mVoYrKnIRLGz6T kg3had6BLzlhybCL6gDGFpaEok8POd1iFIGTMlHOA3Y5jHs4y2UobW7WtAVelp+VBbLy FwXs0W5C+4DfYYWtSum/pu8r6yEAemydf03Wz+7jymPJ/S5JiuHkcjCVcMgGAjJCUVVo oquc38m5uH2Yzi2glVYnjOzAlOuE09XIuErQiWkDVIdsKYPyZgAk5BJBAjCp3fKCnuZq f03g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769954663; x=1770559463; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=oPfe4ca3C+UODV4P40K81Qi7wMfEuC1qiZ9pr4SRo1s=; b=YOcJTkLH13ZJWmQw2EXgvJEQdM/DWgjArZYqaT3uA2wXTpkM1ZalOwVsw9r0+hADI2 88J/UVSWtQaT1T4ish8HiUYmsXlYn5FlyA/rhBCvv27D/oGikAYbk5SJqrZEDelAW0hy vo3O45u0NKcpdboLiciIa6+wwgbwNXcUsWowusY9jP0AQecQq40Jzm2f6uE4k+OEkU1A Sp7boa3ddWgWIK/x/gbSmde6Cxt7D2AsN9hpvuPf4k8adTGM0rKraBtLCV8T40bL9Z3f /mWEtoPAmuzUyiZAmJ0AOVTRuF7NGpFcpOPxlFbkWAGA+aQoEsK0V/DivFyhdAdmh4sj Bx7A== X-Gm-Message-State: AOJu0YyjkOpSEcUorYo6m5f25T0Ue85G5nMvM92g2YJuOTuC/4jr/UyJ 2+aGRPFvmCg2R8n7tNBE7cmUBm9Vn2IkX6P5lmV1M8JzSoMzP/5sy023Vfrr6g== X-Gm-Gg: AZuq6aJlSDvLjOAY5UPuT9Ot3bDS/GPPSJVngTAQrH+juG1+/iIX7SywPT8zgyoJTfA il0ndexyjg2I9zBZKaFlVpOMqksQ71Dn1LXrNUChois+5lLrBMQih9SLLtbXnXktG5pHG1PybrT XSxfvQR+cUVl3o+wcAIKra4rpmlb3fYELF/xMd/Z1DkJRman/5taI3+L+DpauI5rqLx97g7tQZF k2HyHdxXAYLtOhtf0G6Mp5wvt9STSDp8135hsXqcDPEfy8+0e7dNOQ8du0VjVrxrmfapCErtM5N X3UfRJTraTdqLj29+EUNSdrv6k1FzTRSCKrwyWDC5ttD8YzKSTYTFug5HiSOfnLInC9Kt5F5rN/ 6ZBCgVUSLFYocJyUCV3fCmuftVCvMlP2SUQLfYLfh48L6n3z4JNeZ9OGlXJ8xdAEtA0xBtTeA/w vUIosa0QNu X-Received: by 2002:a05:600c:818f:b0:479:2a3c:f31a with SMTP id 5b1f17b1804b1-482db45976emr120471835e9.1.1769954663107; Sun, 01 Feb 2026 06:04:23 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806cdeafffsm307984695e9.7.2026.02.01.06.04.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 01 Feb 2026 06:04:22 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][scarthgap][PATCH 1/5] tigervnc: sync xserver component with oe-core Date: Sun, 1 Feb 2026 15:04:17 +0100 Message-ID: <20260201140421.768419-2-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260201140421.768419-1-skandigraun@gmail.com> References: <20260201140421.768419-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sun, 01 Feb 2026 14:04:30 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/124033 oe-core has a newer version of xserver than this recipe used to compile TigerVNC with. This recipe updates xserver to the same version, 21.1.18. TigerVNC only started to support this xserver version 2 versions later, with 1.13. Due to this 3 commits were backported that add the missing changes. Signed-off-by: Gyorgy Sarvari --- ...ncrease-supported-Xorg-version-to-1..patch | 29 ++++++ ...server21.1.1.patch-Add-Xorg-21-patch.patch | 95 +++++++++++++++++++ .../files/0001-xvnc-adapt-for-1.21.patch | 46 +++++++++ .../tigervnc/tigervnc_1.11.0.bb | 33 ++----- 4 files changed, 180 insertions(+), 23 deletions(-) create mode 100644 meta-oe/recipes-graphics/tigervnc/files/0001-xorg-version.h-Increase-supported-Xorg-version-to-1..patch create mode 100644 meta-oe/recipes-graphics/tigervnc/files/0001-xserver21.1.1.patch-Add-Xorg-21-patch.patch create mode 100644 meta-oe/recipes-graphics/tigervnc/files/0001-xvnc-adapt-for-1.21.patch diff --git a/meta-oe/recipes-graphics/tigervnc/files/0001-xorg-version.h-Increase-supported-Xorg-version-to-1..patch b/meta-oe/recipes-graphics/tigervnc/files/0001-xorg-version.h-Increase-supported-Xorg-version-to-1..patch new file mode 100644 index 0000000000..fd2871976a --- /dev/null +++ b/meta-oe/recipes-graphics/tigervnc/files/0001-xorg-version.h-Increase-supported-Xorg-version-to-1..patch @@ -0,0 +1,29 @@ +From 59f302c28cc15f2d7749840a311c2085c75d5833 Mon Sep 17 00:00:00 2001 +From: Gyorgy Sarvari +Date: Wed, 24 Nov 2021 21:09:36 +0100 +Subject: [PATCH] xorg-version.h: Increase supported Xorg version to 1.21 + +From: Joakim Tjernlund + +Upstream-Status: Backport [https://github.com/TigerVNC/tigervnc/commit/736b50d04e1ba965696cd15d456dc2b7fc123150] +Signed-off-by: Gyorgy Sarvari +--- + unix/xserver/hw/vnc/xorg-version.h | 4 +++- + 1 file changed, 3 insertions(+), 1 deletion(-) + +diff --git a/unix/xserver/hw/vnc/xorg-version.h b/unix/xserver/hw/vnc/xorg-version.h +index 5effe7e9..2449980d 100644 +--- a/unix/xserver/hw/vnc/xorg-version.h ++++ b/unix/xserver/hw/vnc/xorg-version.h +@@ -36,8 +36,10 @@ + #define XORG 119 + #elif XORG_VERSION_CURRENT < ((1 * 10000000) + (20 * 100000) + (99 * 1000)) + #define XORG 120 ++#elif XORG_VERSION_CURRENT < ((1 * 10000000) + (21 * 100000) + (99 * 1000)) ++#define XORG 121 + #else +-#error "X.Org newer than 1.20 is not supported" ++#error "X.Org newer than 1.21 is not supported" + #endif + + #endif diff --git a/meta-oe/recipes-graphics/tigervnc/files/0001-xserver21.1.1.patch-Add-Xorg-21-patch.patch b/meta-oe/recipes-graphics/tigervnc/files/0001-xserver21.1.1.patch-Add-Xorg-21-patch.patch new file mode 100644 index 0000000000..deb326e7a9 --- /dev/null +++ b/meta-oe/recipes-graphics/tigervnc/files/0001-xserver21.1.1.patch-Add-Xorg-21-patch.patch @@ -0,0 +1,95 @@ +From 4af7be2ac0d6e39a23ab4a9df964a2888659051a Mon Sep 17 00:00:00 2001 +From: Gyorgy Sarvari +Date: Fri, 26 Nov 2021 11:15:21 +0100 +Subject: [PATCH] xserver21.1.1.patch: Add Xorg 21 patch + +From: Joakim Tjernlund + +Upstream-Status: Backport [https://github.com/TigerVNC/tigervnc/commit/0c5a2b2e7759c2829c07186cfce4d24aa9b5274e] +Signed-off-by: Gyorgy Sarvari +--- + unix/xserver21.patch | 75 ++++++++++++++++++++++++++++++++++++++++ + 1 file changed, 75 insertions(+) + create mode 100644 unix/xserver21.patch + +diff --git a/unix/xserver21.patch b/unix/xserver21.patch +new file mode 100644 +index 00000000..a349af75 +--- /dev/null ++++ b/unix/xserver21.patch +@@ -0,0 +1,75 @@ ++diff -urpN xorg-server-1.20.0/configure.ac xorg-server-1.20.0/configure.ac ++--- xorg-server-1.20.0/configure.ac 2018-05-10 09:32:34.000000000 -0700 +++++ xorg-server-1.20.0/configure.ac 2018-06-13 19:04:47.536413626 -0700 ++@@ -74,6 +74,7 @@ dnl forcing an entire recompile.x ++ AC_CONFIG_HEADERS(include/version-config.h) ++ ++ AM_PROG_AS +++AC_PROG_CXX ++ AC_PROG_LN_S ++ LT_PREREQ([2.2]) ++ LT_INIT([disable-static win32-dll]) ++@@ -1777,6 +1778,10 @@ if test "x$XVFB" = xyes; then ++ AC_SUBST([XVFB_SYS_LIBS]) ++ fi ++ +++dnl Xvnc DDX +++AC_SUBST([XVNC_CPPFLAGS], ["-DHAVE_DIX_CONFIG_H $XSERVER_CFLAGS"]) +++AC_SUBST([XVNC_LIBS], ["$FB_LIB $FIXES_LIB $XEXT_LIB $CONFIG_LIB $DBE_LIB $RECORD_LIB $GLX_LIBS $RANDR_LIB $RENDER_LIB $DAMAGE_LIB $DRI3_LIB $PRESENT_LIB $MIEXT_SYNC_LIB $MIEXT_DAMAGE_LIB $MIEXT_SHADOW_LIB $XI_LIB $XKB_LIB $XKB_STUB_LIB $COMPOSITE_LIB $MAIN_LIB"]) +++AC_SUBST([XVNC_SYS_LIBS], ["$GLX_SYS_LIBS"]) ++ ++ dnl Xnest DDX ++ ++@@ -1812,6 +1817,8 @@ if test "x$XORG" = xauto; then ++ fi ++ AC_MSG_RESULT([$XORG]) ++ +++AC_DEFINE_UNQUOTED(XORG_VERSION_CURRENT, [$VENDOR_RELEASE], [Current Xorg version]) +++ ++ if test "x$XORG" = xyes; then ++ XORG_DDXINCS='-I$(top_srcdir)/hw/xfree86 -I$(top_srcdir)/hw/xfree86/include -I$(top_srcdir)/hw/xfree86/common' ++ XORG_OSINCS='-I$(top_srcdir)/hw/xfree86/os-support -I$(top_srcdir)/hw/xfree86/os-support/bus -I$(top_srcdir)/os' ++@@ -2029,7 +2036,6 @@ if test "x$XORG" = xyes; then ++ AC_DEFINE(XORG_SERVER, 1, [Building Xorg server]) ++ AC_DEFINE(XORGSERVER, 1, [Building Xorg server]) ++ AC_DEFINE(XFree86Server, 1, [Building XFree86 server]) ++- AC_DEFINE_UNQUOTED(XORG_VERSION_CURRENT, [$VENDOR_RELEASE], [Current Xorg version]) ++ AC_DEFINE(NEED_XF86_TYPES, 1, [Need XFree86 typedefs]) ++ AC_DEFINE(NEED_XF86_PROTOTYPES, 1, [Need XFree86 helper functions]) ++ AC_DEFINE(__XSERVERNAME__, "Xorg", [Name of X server]) ++@@ -2565,6 +2571,7 @@ hw/dmx/Makefile ++ hw/dmx/man/Makefile ++ hw/vfb/Makefile ++ hw/vfb/man/Makefile +++hw/vnc/Makefile ++ hw/xnest/Makefile ++ hw/xnest/man/Makefile ++ hw/xwin/Makefile ++diff -urpN xorg-server-1.20.0/hw/Makefile.am xorg-server-1.20.0/hw/Makefile.am ++--- xorg-server-1.20.0/hw/Makefile.am 2018-05-10 09:32:34.000000000 -0700 +++++ xorg-server-1.20.0/hw/Makefile.am 2018-06-13 19:04:47.536413626 -0700 ++@@ -44,3 +44,5 @@ ++ ++ relink: ++ $(AM_V_at)for i in $(SUBDIRS) ; do $(MAKE) -C $$i relink || exit 1 ; done +++ +++SUBDIRS += vnc ++diff -urpN xorg-server-1.20.0/mi/miinitext.c xorg-server-1.20.0/mi/miinitext.c ++--- xorg-server-1.20.0/mi/miinitext.c 2018-05-10 09:32:37.000000000 -0700 +++++ xorg-server-1.20.0/mi/miinitext.c 2018-06-13 19:05:14.742200675 -0700 ++@@ -107,8 +107,15 @@ SOFTWARE. ++ #include "os.h" ++ #include "globals.h" ++ +++#ifdef TIGERVNC +++extern void vncExtensionInit(void); +++#endif +++ ++ /* List of built-in (statically linked) extensions */ ++ static const ExtensionModule staticExtensions[] = { +++#ifdef TIGERVNC +++ {vncExtensionInit, "VNC-EXTENSION", NULL}, +++#endif ++ {GEExtensionInit, "Generic Event Extension", &noGEExtension}, ++ {ShapeExtensionInit, "SHAPE", NULL}, ++ #ifdef MITSHM diff --git a/meta-oe/recipes-graphics/tigervnc/files/0001-xvnc-adapt-for-1.21.patch b/meta-oe/recipes-graphics/tigervnc/files/0001-xvnc-adapt-for-1.21.patch new file mode 100644 index 0000000000..4f47e11ac4 --- /dev/null +++ b/meta-oe/recipes-graphics/tigervnc/files/0001-xvnc-adapt-for-1.21.patch @@ -0,0 +1,46 @@ +From 7d18a77dfbef8ffe2b17b31098c75316b13f1597 Mon Sep 17 00:00:00 2001 +From: Gyorgy Sarvari +Date: Wed, 24 Nov 2021 21:10:56 +0100 +Subject: [PATCH] xvnc: adapt for 1.21 + +From: Joakim Tjernlund + +VENDOR_STRING is gone as is DEFAULT_LOG_VERBOSITY +site.h has been removed and is not needed. + +Upstream-Status: Backport [https://github.com/TigerVNC/tigervnc/commit/f2577107f7f55382c524d8c738a777e5cdd80f60] +Signed-off-by: Gyorgy Sarvari +--- + unix/xserver/hw/vnc/xvnc.c | 6 ++---- + 1 file changed, 2 insertions(+), 4 deletions(-) + +diff --git a/unix/xserver/hw/vnc/xvnc.c b/unix/xserver/hw/vnc/xvnc.c +index fda6205f..d16a4355 100644 +--- a/unix/xserver/hw/vnc/xvnc.c ++++ b/unix/xserver/hw/vnc/xvnc.c +@@ -80,7 +80,6 @@ from the X Consortium. + #undef VENDOR_RELEASE + #undef VENDOR_STRING + #include "version-config.h" +-#include "site.h" + + #define XVNCVERSION "TigerVNC 1.11.0" + #define XVNCCOPYRIGHT ("Copyright (C) 1999-2020 TigerVNC Team and many others (see README.rst)\n" \ +@@ -148,15 +147,14 @@ static Bool Render = TRUE; + static Bool displaySpecified = FALSE; + static char displayNumStr[16]; + +-static int vncVerbose = DEFAULT_LOG_VERBOSITY; ++static int vncVerbose = 0; + + + static void + vncPrintBanner(void) + { + ErrorF("\nXvnc %s - built %s\n%s", XVNCVERSION, buildtime, XVNCCOPYRIGHT); +- ErrorF("Underlying X server release %d, %s\n\n", VENDOR_RELEASE, +- VENDOR_STRING); ++ ErrorF("Underlying X server release %d\n\n", VENDOR_RELEASE); + } + + static void diff --git a/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb b/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb index 5cde7c9fb4..acaac7183e 100644 --- a/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb +++ b/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb @@ -21,15 +21,18 @@ SRC_URI = "git://github.com/TigerVNC/tigervnc.git;branch=1.11-branch;protocol=ht file://0002-do-not-build-tests-sub-directory.patch \ file://0003-add-missing-dynamic-library-to-FLTK_LIBRARIES.patch \ file://0004-tigervnc-add-fPIC-option-to-COMPILE_FLAGS.patch \ + file://0001-xserver21.1.1.patch-Add-Xorg-21-patch.patch \ + file://0001-xorg-version.h-Increase-supported-Xorg-version-to-1..patch \ + file://0001-xvnc-adapt-for-1.21.patch \ " # Keep sync with xorg-server in oe-core XORG_PN ?= "xorg-server" -XORG_PV ?= "1.20.6" -SRC_URI += "${XORG_MIRROR}/individual/xserver/${XORG_PN}-${XORG_PV}.tar.bz2;name=xorg" +XORG_PV ?= "21.1.18" +SRC_URI += "${XORG_MIRROR}/individual/xserver/${XORG_PN}-${XORG_PV}.tar.xz;name=xorg" XORG_S = "${WORKDIR}/${XORG_PN}-${XORG_PV}" -SRC_URI[xorg.md5sum] = "a98170084f2c8fed480d2ff601f8a14b" -SRC_URI[xorg.sha256sum] = "6316146304e6e8a36d5904987ae2917b5d5b195dc9fc63d67f7aca137e5a51d1" +SRC_URI[xorg.md5sum] = "43225ddc1fd8d7ae7671c25ab6d1f927" +SRC_URI[xorg.sha256sum] = "c878d1930d87725d4a5bf498c24f4be8130d5b2646a9fd0f2994deff90116352" # It is the directory containing the Xorg source for the # machine on which you are building TigerVNC. @@ -37,27 +40,11 @@ XSERVER_SOURCE_DIR="${S}/unix/xserver" do_patch[postfuncs] += "do_patch_xserver" do_patch_xserver () { - for subdir in Xext xkb GL hw/xquartz/bundle hw/xfree86/common; do - install -d ${XSERVER_SOURCE_DIR}/$subdir - done - - for subdir in hw/dmx/doc man doc hw/dmx/doxygen; do - install -d ${XSERVER_SOURCE_DIR}/$subdir - done - - sources="hw/xquartz/bundle/cpprules.in man/Xserver.man doc/smartsched \ - hw/dmx/doxygen/doxygen.conf.in xserver.ent.in xkb/README.compiled \ - hw/xfree86/xorgconf.cpp hw/xfree86/Xorg.sh.in" - for i in ${sources}; do - install -m 0644 ${XORG_S}/$i ${XSERVER_SOURCE_DIR}/$i; - done - - cd ${XORG_S} - find . -type f | egrep '.*\.(c|h|am|ac|inc|m4|h.in|pc.in|man.pre|pl|txt)$' | \ - xargs tar cf - | (cd ${XSERVER_SOURCE_DIR} && tar xf -) + # Put the xserver source in the right place in the tigervnc source tree + cp -rfl ${XORG_S}/* ${XSERVER_SOURCE_DIR} cd ${XSERVER_SOURCE_DIR} - xserverpatch="${S}/unix/xserver120.patch" + xserverpatch="${S}/unix/xserver21.patch" echo "Apply $xserverpatch" patch -p1 -b --suffix .vnc < $xserverpatch } From patchwork Sun Feb 1 14:04:18 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 80216 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 05DB5E65281 for ; Sun, 1 Feb 2026 14:04:31 +0000 (UTC) Received: from mail-wm1-f51.google.com (mail-wm1-f51.google.com [209.85.128.51]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.29956.1769954665385910986 for ; Sun, 01 Feb 2026 06:04:25 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=FhoD5BgE; spf=pass (domain: gmail.com, ip: 209.85.128.51, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f51.google.com with SMTP id 5b1f17b1804b1-47ee07570deso29929635e9.1 for ; Sun, 01 Feb 2026 06:04:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769954664; x=1770559464; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=/ctQW14w7YMAYpqlNRvRf66jery4qyOgWt6P0TZo7GA=; b=FhoD5BgEvhEklrOjWgeEpuwlttJPUdWpzLBHGje49fEWuc9BMGU/A0WFQn05RQeh9+ UH1bedyaIi3ln8BFw5fsI2DVhmre73woW60/ZwL2pFbu5afGgLa9XmskPYEKUba/60WF 0t6K532KVXRjy5xnolR+GLgYupN70vHVFikIGhkm2cwZFizKBbolwyl+TixA+nm5+09Y Y7vn7TmgApkTbN5KZnXWGFkwz7uN9AiXlb40d9y2IZIB9qrxisCSTUfsizvyU4sZQiyV QilTm+g3HqJ+1ZNwYBkw23bqdVM481T9wDguvDe7e5K8ikIxilHpnhy3EoyCtzwFrc6n j58A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769954664; x=1770559464; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=/ctQW14w7YMAYpqlNRvRf66jery4qyOgWt6P0TZo7GA=; b=Vbe4/0QDWXxUJpSkIQ+OE/M10p43USCWtyziOJbLL5LMPev8F1JIZWbLjqwh6Sw2y4 4sUUuR90oc9LfGOVHPRAQXQhgykBkHU/HQ1fFIZUhIIyb/PKYwUurRJUo1RTlI3tOGVN XCE4AqAZ6d1ghxMzlBfihagHDbebdW622Im1Nk2noQL4+t1yQXQjCarA1zCU3WXfUtUp eZ7Q5rM0mnZEhPT3BhGOLDOy7MHaFUVasW6pwRnnO/82hP3VnWGwKgGdi00D8Rl0kuNl TaPAKjYviY0sds0jjsd3Bw1g+l9h4skElJoUeUd7I5UYqfxvka5qRAPbqzUjKId8xxyN X1xA== X-Gm-Message-State: AOJu0YyfsbjNaKZFwyJ9DmALTcjw6W1tH2xrCGVEUz2iZV8e8I4Ptmly ldgsa7WtqRPmRv0InxODzw9gSgrXQ3tOTo5Qgko6Ekb6EGpmwPAOzgIbLEThKw== X-Gm-Gg: AZuq6aLZmF+uT8Nu6oq4FWattt8NMiIA8GWee7k60Hde1mgZaUM+GC8kwLca58aR7cf BdhAGEvsPrjgPL/jOhYqhOGif79W0Pw2WyjuhTDhfiD1sogHXMNXyalhbcTsBzzizdFIfZgv87X DBoKCa+R8NUno2SYzBLapjhXRffXHPt14piAQROBlNG8ZP13qo/TYy379ja7JQHCOhURVOzT7em 941GIewgLt6AGykpQqx9eB8QPHscB3Nxq+UpioSytAZnvZcW0ZM0Q1YOMSe2W1PUkiQLIZ8JoZJ Ia1SumAHNzF3dhnLGSBaxnoXY2lPyT8HqolqGMmNJFAI0su8VtquP6uNT5Do7M/PN7GmtW7xMBU iNHzTZ/YBeWbu5he1a/JsldWgmn2ijiUpC3C5cb2RSBiSOV/gbu/83x4qt64iUtTUR7bAo9y0GO V9tgWq5BE0 X-Received: by 2002:a05:600c:4e87:b0:459:db7b:988e with SMTP id 5b1f17b1804b1-482db4655c1mr108735655e9.13.1769954663724; Sun, 01 Feb 2026 06:04:23 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806cdeafffsm307984695e9.7.2026.02.01.06.04.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 01 Feb 2026 06:04:23 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][scarthgap][PATCH 2/5] tigervnc: ignore CVE-2014-8241 Date: Sun, 1 Feb 2026 15:04:18 +0100 Message-ID: <20260201140421.768419-3-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260201140421.768419-1-skandigraun@gmail.com> References: <20260201140421.768419-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sun, 01 Feb 2026 14:04:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/124034 Details: https://nvd.nist.gov/vuln/detail/CVE-2014-8241 The vulnerability is about a potential null-pointer dereference, because of a malloc result is not verified[1]. The vulnerable code has been refactored since completely[2], and the code isn't present anymore in the codebase. [1]: https://github.com/TigerVNC/tigervnc/issues/993#issuecomment-612874972 - attachment [2]: https://github.com/TigerVNC/tigervnc/commit/b8a24f055f1a29886d8b18bb3f0902144dc5bd14 Signed-off-by: Gyorgy Sarvari Signed-off-by: Khem Raj (cherry picked from commit ed8a1038d227ee521cf2349d9f7f8e37eec6a64a) Signed-off-by: Gyorgy Sarvari --- meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb b/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb index acaac7183e..6631995665 100644 --- a/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb +++ b/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb @@ -118,3 +118,5 @@ FILES:${PN} += " \ " FILES:${PN}-dbg += "${libdir}/xorg/modules/extensions/.debug" + +CVE_STATUS[CVE-2014-8241] = "fixed-version: The vulnerable code is not present in the used version (1.11.0)" From patchwork Sun Feb 1 14:04:19 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 80218 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0C211E6527D for ; Sun, 1 Feb 2026 14:04:31 +0000 (UTC) Received: from mail-wm1-f49.google.com (mail-wm1-f49.google.com [209.85.128.49]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.29957.1769954666103809008 for ; Sun, 01 Feb 2026 06:04:26 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=P2L5Y+FN; spf=pass (domain: gmail.com, ip: 209.85.128.49, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f49.google.com with SMTP id 5b1f17b1804b1-4806e0f6b69so25794605e9.3 for ; Sun, 01 Feb 2026 06:04:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769954664; x=1770559464; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=q6537JpLmD18Km/8aPYmgynncFu9EC3KlIyQcc4FztY=; b=P2L5Y+FNpmsIuId0Fjk1QqkzFOBFprwWy8wr/mmJ9pXdSeTGyA2Pvj7VOQLvMSpzUk v9EC/6JO/K4O7FWruFD+y9xmEkefK+hOjo78ViyY3soKyOuC14TcyMQhvHZhHWsr9A/s DFfW5/R8/qxzm54Lqq6y7jZxoAoR9fH1hBuAuyNoqaOToGEWDE2PyftCjTpFLeE/uw0J MdzWK0cYEjpbRNSxLLb7mCBCrk/49DIP2fm80Dd9KVs4HqY3x9yE91Os4QEIwQHfklk2 UAAf/ygL5gG1MCfv1KU62gK3rQZ1qrN808ZpCjXllGq5OC8arViw+2244DTDv/i4nXgX zbTQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769954664; x=1770559464; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=q6537JpLmD18Km/8aPYmgynncFu9EC3KlIyQcc4FztY=; b=LDy0k88sgCMMW4aN1YEDb8DZEhR6QF3Tv0Dvc5ehQb4v/tPxzXs6nuZFF+YUxAcjt0 RNzvy5m59YTHsTFVK9z/6oY517j59K7uWDiWPKLAH0qKQy9O5KPxG6U2aXRpE8C99vc2 Go5Y36q21r6MQ2YZC16CVgqI2wqIxx1RShlnbLDKe57ibLU2RRsVNzWNW5NPzO7NlsGH HrUzCGArEhWdqd36gyTlYFUlIEPnNEMX7pmsckRooQlafZu+XnJLLWLgb6vjEODFkti9 Wt/u3p4NVOpZVQKC/KOgBrp+WEqZwgeODOqb/+3053rm4iVlhKSShIZmm7uHM55w9ium lfEw== X-Gm-Message-State: AOJu0YxoOr4K4yLHW0QjJcfzcXCgxRsrbXK4keClFNwolHdbEpx4LxHR ixAuXmfpQXXDpwfJgv6D94wUZ6joFkwzL42+Sl+uSYZVyz47TPu0bSBa4WFx0w== X-Gm-Gg: AZuq6aJqHDddmYWNSP4Quub0F90Y9NbDtPIPAcgxiSyl4aLQ6JB93E7bIymR0t0QtuX 8bZsUO3wo/cIMXNOUZ8Rz9DEzUuf6AUv9Q+BMomWvf7DsJZvWpP5wn8iGIEL0V9Xwbn7rLhRqgJ DqXNSTuFPQiUamTa7Aa1Z0GJWUIPOvmMMhDI2odXLlKUQ0i75gTZSfCk/VqvBj8rtvu0KkLcXEI XB2e6pT6gBfXziasOW+bVt7GHX0Qf+OXgJ+sPawfR1KSktQnEoK6e50DCzyg6jJuLdQGZN86odx OQeeGeTmhzK9CkVnxC4X5gedOPqui2dqWpdBCI2nd6LriVsoNFet4DVJt925dTLhXZJylYjGbJ6 RUqGHqL1AP5LDZmuqIl9urA/i+l5aK+JexVglftk7ctKdJ0Q2OmQeRxUX7fHDH6K0XTEb5y5MI6 dmgDm42G+T X-Received: by 2002:a05:600c:3f0a:b0:480:4b59:9327 with SMTP id 5b1f17b1804b1-482db44780bmr115791235e9.1.1769954664357; Sun, 01 Feb 2026 06:04:24 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806cdeafffsm307984695e9.7.2026.02.01.06.04.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 01 Feb 2026 06:04:24 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][scarthgap][PATCH 3/5] tigervnc: ignore CVE-2023-6377 Date: Sun, 1 Feb 2026 15:04:19 +0100 Message-ID: <20260201140421.768419-4-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260201140421.768419-1-skandigraun@gmail.com> References: <20260201140421.768419-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sun, 01 Feb 2026 14:04:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/124035 Details: https://nvd.nist.gov/vuln/detail/CVE-2023-6377 TigerVNC compiles its own xserver, this is why this CVE is associated with it - despite the vulnerability being in xserver. The vulnerability was fixed by [1] (from the nvd report), which has been backported[2] to the xserver version used by the recipe - so ignore the CVE, since it's patched already. [1]: https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd [2]: https://gitlab.freedesktop.org/xorg/xserver/-/commit/a7bda3080d2b44eae668cdcec7a93095385b9652 Signed-off-by: Gyorgy Sarvari Signed-off-by: Khem Raj (cherry picked from commit f691f2178b15eec22f09a1c17b9945fad4e330e6) Signed-off-by: Gyorgy Sarvari --- meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb b/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb index 6631995665..fc314e8ac1 100644 --- a/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb +++ b/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb @@ -120,3 +120,4 @@ FILES:${PN} += " \ FILES:${PN}-dbg += "${libdir}/xorg/modules/extensions/.debug" CVE_STATUS[CVE-2014-8241] = "fixed-version: The vulnerable code is not present in the used version (1.11.0)" +CVE_STATUS[CVE-2023-6377] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" From patchwork Sun Feb 1 14:04:20 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 80214 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D9974E65275 for ; Sun, 1 Feb 2026 14:04:30 +0000 (UTC) Received: from mail-wr1-f42.google.com (mail-wr1-f42.google.com [209.85.221.42]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.29979.1769954666812688675 for ; Sun, 01 Feb 2026 06:04:27 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=AdlUbI67; spf=pass (domain: gmail.com, ip: 209.85.221.42, mailfrom: skandigraun@gmail.com) Received: by mail-wr1-f42.google.com with SMTP id ffacd0b85a97d-43601e96f72so380408f8f.2 for ; Sun, 01 Feb 2026 06:04:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769954665; x=1770559465; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=t+mOP0aQOGF34HTkbZwqjiKXvYuBf8eCdlqGZJevD58=; b=AdlUbI67Wjm+9btjf1TmYX+Dp/3BjmDQWosk+nZgeY1l/bvkwTQFJwk7DFtTddeY4d EeO0e+uje0+XV5rDPGVg4xmRxYDa3Xu3ubjbbdEydB3+176W7BOgwvMVbNQsPvC4T+z1 2L/qy3Y3VbngJWPq58QwkhlPJSjPWtXfyc8zUyqIAEulpwXwW3OByisme8HHXXL260HY fRUfoI+mB6klXsaoOn1k7mj6Ub5jNjdjHaMqwlOMch7hPJxlztQiBJAy49pikhbfvfzL AfOncqYb3zywgK4RAmFxQQKZfGrGQqYCUIAh6D82PBBvlz9n9RFcThsdsXpc7T9aUkCs eOVA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769954665; x=1770559465; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=t+mOP0aQOGF34HTkbZwqjiKXvYuBf8eCdlqGZJevD58=; b=FCuFSkE8NIkQeApSJm4eJr+qgMRC4fZ0HILRILmISlp/ODiKw5lAcAUBEuWL26d5Zv twDJWM5lBVYxFGmj0dG7P/JoQgeuOYCXywzGNt4gPffk+kxbNaO0zEnkPamJ2yE3g1TY Re2Fb4IcT9GwsT/e1n5aoT5JBf9xse4LD8+YJyi18fNsNpwlBsKGsW/YxSSIKKj7Ifqg jWo7QASSF2TiSWDZf/DUGaAGCMyVMVEuN8gN31Hcnf2buvZIF64R9kEQeTEnLlaJlYN0 DPIxJdqVBE5s0UHaK13XRS4Z5VSRUqdweh4DddfF/PQ6OohHJ4RW92JKmnZWn+UIZb+x RBjw== X-Gm-Message-State: AOJu0Yxu3XGMpRCfifKN0COYzkmWzahRnxWnAOf5deSZRnUTYYLH05Cp JEEUAcaeWcJvCVcoQo4Ab2ZjJyrnuDxwjGSPEMAH9c9Kk8LK5EmAWgYr6lIVJg== X-Gm-Gg: AZuq6aJgmr6KOs5u95FZsPEXxd2zTqpFxDqlYoEcx2n8vnv4r25WRuiu5luzEzEB+30 sbcJkZB+L6PNd6lYwPuXEjZMhBCgfYsaTly5FMPGVmCMVHU2RugrXt4Mvb4q5+834YzDKtW4ynP y33ekavP8y8u8Tj3g35iD9RMVKsAcYdE0ln0xsZMdnoe13qTwo1adSZ8y+GteHi0lD8StO/1sgQ uDecwQb3XPiBfWYlKVu+aLagy7AO6FDM9pZ4gGM3mtrU4G1ubNyJlYlBtNclGH+8Nln6IyY1+MY pgzFKCTc0HfHinS6Z2lY+enxARJXNkVSDYHt/4VUhtQpoMAtQ3D+MkOlorzugc9P+poVDabIHj/ E7DSSSCrCMKfBR47FEtKWkEmXl/QgNS21o0fZwOw5NsoWsgETkhJ9nUVzwmCVQgORV2dyVh23JO 6z34Agyv9l X-Received: by 2002:a05:600c:3586:b0:477:582e:7a81 with SMTP id 5b1f17b1804b1-482db45237cmr134780775e9.4.1769954665099; Sun, 01 Feb 2026 06:04:25 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806cdeafffsm307984695e9.7.2026.02.01.06.04.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 01 Feb 2026 06:04:24 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][scarthgap][PATCH 4/5] tigervnc: ignore CVE-2023-6478 Date: Sun, 1 Feb 2026 15:04:20 +0100 Message-ID: <20260201140421.768419-5-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260201140421.768419-1-skandigraun@gmail.com> References: <20260201140421.768419-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sun, 01 Feb 2026 14:04:30 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/124036 Details: https://nvd.nist.gov/vuln/detail/CVE-2023-6478 TigerVNC compiles its own xserver, this is why this CVE is associated with it - despite the vulnerability being in xserver. The vulnerability was fixed by [1] (from the nvd report), which has been backported[2] to the xserver version used by the recipe - so ignore the CVE, since it's patched already. [1]: https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632 [2]: https://gitlab.freedesktop.org/xorg/xserver/-/commit/58e83c683950ac9e253ab05dd7a13a8368b70a3c Signed-off-by: Gyorgy Sarvari Signed-off-by: Khem Raj (cherry picked from commit 62a78f8ba7c8bd229cc82cf81bcc6a6d8116ebca) Signed-off-by: Gyorgy Sarvari --- meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb b/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb index fc314e8ac1..8ff5e3185b 100644 --- a/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb +++ b/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb @@ -121,3 +121,4 @@ FILES:${PN}-dbg += "${libdir}/xorg/modules/extensions/.debug" CVE_STATUS[CVE-2014-8241] = "fixed-version: The vulnerable code is not present in the used version (1.11.0)" CVE_STATUS[CVE-2023-6377] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" +CVE_STATUS[CVE-2023-6478] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" From patchwork Sun Feb 1 14:04:21 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gyorgy Sarvari X-Patchwork-Id: 80217 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E82E3E65278 for ; Sun, 1 Feb 2026 14:04:30 +0000 (UTC) Received: from mail-wm1-f43.google.com (mail-wm1-f43.google.com [209.85.128.43]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.29958.1769954667506868376 for ; Sun, 01 Feb 2026 06:04:27 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=HLedq/x6; spf=pass (domain: gmail.com, ip: 209.85.128.43, mailfrom: skandigraun@gmail.com) Received: by mail-wm1-f43.google.com with SMTP id 5b1f17b1804b1-47ee07570deso29929825e9.1 for ; Sun, 01 Feb 2026 06:04:27 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769954666; x=1770559466; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=U/PLITga/HTBNVkjJuWisysJTKRUPwMN2T7DUd2koT4=; b=HLedq/x6FGfavkwzbA8Hn0wUiGQ03I7HuSaYjmMyb/uFW3jXjuqgGkw2DDE+UB+xeF OY0Z4AvtFdYXEiCY5a9U6ktVCobJusz8Nc24rQRSTDZbSeFo2wDdS7Rijn6bQ5hdt8yR TV4XbyStV0zcNwU4vjD+sOdGVi0fr47v5wy0A8AT9zl7Bjf9k2qe7Bl/LLGw7x1Ek87f 1kfTFh/8gYlT97tJCMa+HE0eUrVKQFUVt1/2/FIp1r/tXO7QJAZp+FBdepSAwRVBjLNC GOvzacSUEALmpoG3U7U9sMuFT0IENGH6Xfve4Y2pJHL2aM6cRmBEUMi9JbMvhy19vDW1 B+Rg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769954666; x=1770559466; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=U/PLITga/HTBNVkjJuWisysJTKRUPwMN2T7DUd2koT4=; b=Jl0CyG/Q75l1NbHyGODI8QcHi1Hdn59nYeFxYQfNL/J2tuY2yv7FL49lwdpN9wSlyd uA7uPp4+XSJLZ9iZt3FQjmM6mUXYwhVLdNLt4reEm/GYvHBHwC7HE5ZiHdc8yDgbuy2r yiZEVGa+4CYR23O2QRjLnALHRnR0MOBBztC7b/gDTsaEjPJ4s+EgYg/+3zWKufFgHiG8 2wr0ll7KTOlmZGRHNHxojgN6xOtM5DrdxaH6A20Te73EKTCGQdVruWYvn45NmeGHy2dH XHn+2jnhukz3ua0+H/5JDdCyYyHzUhTm+3c3xQCZQgqifoJqzOvlEAbb8VYeHvwknsvQ Eggw== X-Gm-Message-State: AOJu0YyU488yXV0CNRyH+erWBnbZqxSE1NBNa/W2plI50ohTax5n5NYY 7uwMFq8C0UzTYt6++lNUf2UX7UFUiYSPaf3qehwGNROD22sb0rMjLm8lF/qYbw== X-Gm-Gg: AZuq6aLqd1tdzk7ihHE2+xxNtu1BOWiE3x93ERI0FkAIQD3lKT86o8VQxjYywXcWhlU XtZ8I4RIO+LLX1FYORIXWvpDL/IajnjBqGpdPo7QgKq0atuwPqEOGRwTy2ftb2uYEISfuaePIjV 3ihclMUcR/2ssiRWYl/ypVY+Svhzl93TaHqX8qDAyTysZgaiFNuOc4Ve1ldwUGCK9CR463lCE5C lLlRjlA4KyP1TDRYrPIl3JGdJZmA2fYl0h8ZcyR3N1YgaoMJ5/97g0Rf7j9ogO03VLOX0cp9TAd XgYMe0NZLWXfWOgyCpOQW0DIVELOSm+toGXPH0E8YXKXncYzAczewM6keAjS9wn8eadRnxtPLSd Cr0lFChg6T/mmBhcdi8d65bcHKucweRK0TH/aNOuORFLe3S28d0Xzfd5P9QUNNFAe//rilBIxkU x7EcWON+12 X-Received: by 2002:a05:600c:6298:b0:477:2f7c:314f with SMTP id 5b1f17b1804b1-482db4bda82mr109523955e9.10.1769954665830; Sun, 01 Feb 2026 06:04:25 -0800 (PST) Received: from desktop ([51.154.145.205]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4806cdeafffsm307984695e9.7.2026.02.01.06.04.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 01 Feb 2026 06:04:25 -0800 (PST) From: Gyorgy Sarvari To: openembedded-devel@lists.openembedded.org Subject: [meta-oe][scarthgap][PATCH 5/5] tigervnc: ignore CVE-2025-26594...26601 Date: Sun, 1 Feb 2026 15:04:21 +0100 Message-ID: <20260201140421.768419-6-skandigraun@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260201140421.768419-1-skandigraun@gmail.com> References: <20260201140421.768419-1-skandigraun@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Sun, 01 Feb 2026 14:04:30 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/124037 Ignore the following CVEs: CVE-2025-26594, CVE-2025-26595, CVE-2025-26596, CVE-2025-26597, CVE-2025-26598, CVE-2025-26599, CVE-2025-26600, CVE-2025-26601 Details: https://nvd.nist.gov/vuln/detail/CVE-2025-26594 https://nvd.nist.gov/vuln/detail/CVE-2025-26595 https://nvd.nist.gov/vuln/detail/CVE-2025-26596 https://nvd.nist.gov/vuln/detail/CVE-2025-26597 https://nvd.nist.gov/vuln/detail/CVE-2025-26598 https://nvd.nist.gov/vuln/detail/CVE-2025-26599 https://nvd.nist.gov/vuln/detail/CVE-2025-26600 https://nvd.nist.gov/vuln/detail/CVE-2025-26601 TigerVNC compiles its own xserver, this is why these CVEs are associated with it - despite the vulnerabilities being in xserver. All of these vulnerabilities were fixed by the same PR[1], which has been part of xserver since version 21.1.16 (the currently used xserver version in TigerVNC is 21.1.18). Due to this, ignore these vulnerabilities, and just mark them as patched. [1]: https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/1830 Signed-off-by: Gyorgy Sarvari Signed-off-by: Khem Raj (cherry picked from commit 4924e89bb77fe5486063229c50039a458d60f8ea) Signed-off-by: Gyorgy Sarvari --- meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb b/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb index 8ff5e3185b..57b1682e95 100644 --- a/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb +++ b/meta-oe/recipes-graphics/tigervnc/tigervnc_1.11.0.bb @@ -122,3 +122,11 @@ FILES:${PN}-dbg += "${libdir}/xorg/modules/extensions/.debug" CVE_STATUS[CVE-2014-8241] = "fixed-version: The vulnerable code is not present in the used version (1.11.0)" CVE_STATUS[CVE-2023-6377] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" CVE_STATUS[CVE-2023-6478] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" +CVE_STATUS[CVE-2025-26594] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" +CVE_STATUS[CVE-2025-26595] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" +CVE_STATUS[CVE-2025-26596] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" +CVE_STATUS[CVE-2025-26597] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" +CVE_STATUS[CVE-2025-26598] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" +CVE_STATUS[CVE-2025-26599] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" +CVE_STATUS[CVE-2025-26600] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)" +CVE_STATUS[CVE-2025-26601] = "fixed-version: The vulnerable code is not present in the used xserver version (21.1.18)"