Commit Graph

4718 Commits

Author SHA1 Message Date
Gyorgy Sarvari
996b497119 python3-behave: update SRC_URI branch
Master branch was renamed to main.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-11-17 09:08:38 +01:00
Soumya Sambu
0cffa14fcf python3-aiohttp: Fix CVE-2024-23829
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python.
Security-sensitive parts of the Python HTTP parser retained minor differences in
allowable character sets, that must trigger error handling to robustly match frame
boundaries of proxies in order to protect against injection of additional requests.
Additionally, validation could trigger exceptions that were not handled consistently
with processing of other malformed input. Being more lenient than internet standards
require could, depending on deployment environment, assist in request smuggling. The
unhandled exception could cause excessive resource consumption on the application
server and/or its logging facilities. This vulnerability exists due to an incomplete
fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.

References:
https://nvd.nist.gov/vuln/detail/CVE-2024-23829
https://security-tracker.debian.org/tracker/CVE-2024-23829

Upstream patch:
d33bc21414

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-11-07 12:42:02 +01:00
Soumya Sambu
7c7ab8ad4e python3-pillow: Fix CVE-2024-28219
In _imagingcms.c in Pillow before 10.3.0, a buffer overflow exists because
strcpy is used instead of strncpy.

References:
https://nvd.nist.gov/vuln/detail/CVE-2024-28219
https://security-tracker.debian.org/tracker/CVE-2024-28219

Upstream patch:
2a93aba5cf

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-11-07 12:41:54 +01:00
Gyorgy Sarvari
4f2fdcb503 python3-aspectlib: fix ptests
Backport patch that adapts failing tests.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-11-02 15:09:03 +01:00
Gyorgy Sarvari
4384648768 python3-gunicorn: add patch work with geventlet
python3-gunicorn depends on python3-geventlet. geventlet has made some
breaking changes (which is part of meta-oe/kirkstone), however gunicorn
wasn't adapted to this, and it broke some features (at least ptests).

This patch backports the change that adapts gunicorn to the used version
of geventlet.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-27 11:17:53 +01:00
Gyorgy Sarvari
8c59686618 python3-gevent: fix syntax error in cve patch
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-27 11:17:48 +01:00
Gyorgy Sarvari
5c7400ca76 python3-pint: fix ptests
1. Add missing ptest dependency (pytest-subtest)

2. The testsuite is installed in both the site-packages and ${PTEST_PATH}
folders, however some dependencies are only available in the site-packages
folder, so many test cases fail.
At this point of the branch lifecycle I decided not to refactor the recipe, but
rather to just use the installation in the site-packages dir to run the
tests (switch to that folder in the run-ptest script)

3. Fix the run-ptest script to output PASS/FAIL status.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-27 11:17:43 +01:00
Gyorgy Sarvari
1ff49e5d78 python3-requests-toolbelt: disable tests with expired certificate
The application ships with a self signed certificate as part of the test suite.
Unfortunately this certificate has expired in 2021, and since then the tests
refuse to use it, they just fail.

Upstream has fixed this issue by refactoring these tests[1] not to use a vendored
certificate, but rather to use the "python3-trustme" module - however this
is not part of Kirkstone meta-oe, so that patch cannot be used.

Due to this, disable these particular test cases.

[1]: b93b4067ea

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-27 11:17:38 +01:00
Gyorgy Sarvari
a943a21152 python3-py-cpuinfo: fix ptests
The tests require the library to be present in the folder of test execution,
otherwise many of them fail.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-27 11:17:36 +01:00
Gyorgy Sarvari
fd9bd9dba2 python3-yarl: fix ptests (and make it compatible with current python)
oe-core currently ships with Python 3.10.18.
Python 3.10.17 has introduced a change in urlparse library, regarding how
brackets are handled by urllib.parse.urlsplit() and urlparse() functions
(which makes it more conformant to the specification).

This has caused a regression in yarl: some tests have failed, and it also
revealed a bug in how yarl treates brackets.

This backported patch corrects this behavior, making it compatible once
again with the current Python version - and it also allows the the ptests
to pass once again.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-20 12:00:28 +02:00
Gyorgy Sarvari
b476f98381 python3-betamax: fix ptests
1. Some tests require internet access. Set a DNS for that, if it is not
available at the start of the test.

2. Added a backported patch that fixes some failing tests, due to a
variable header value contained in a response. (fix-failing-ptest.patch)

3. Added a backported patch that avoids calling pytest fixtures directly.
If not applied, tests calling them are marked as failing by pytest.
(fix-direct-calls-to-test-fixtures.patch)

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-20 11:59:36 +02:00
Gyorgy Sarvari
975abfa259 python3-soupsieve: fix ptests
Some ptests have started to fail, due to a change in libxml 2.9.12 (oe-core
ships with 2.9.14 currently).
See upstream issue: https://github.com/facelessuser/soupsieve/issues/220

This backported patch solves this issue.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-20 11:59:36 +02:00
Derek Straka
9c72ce1d33 python3-typeguard: update ptest dependencies
Signed-off-by: Derek Straka <derek@asterius.io>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit bb8e0534be)

Adapted to Kirkstone.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-20 11:59:36 +02:00
Gyorgy Sarvari
a87113cb42 python3-ujson: fix run-ptest script
The current script doesn't execute any tests. This patch fixes the
run-ptest script.

This is mostly a backport of e183db0c8f.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-20 11:59:36 +02:00
Khem Raj
73115df6a4 python3-whoosh: Fix an intermittent ptest
It fails sometimes when system is under stress

Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 38e2f6a9a9)
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-20 11:59:35 +02:00
Bartosz Golaszewski
f62b1d0e44 python3-send2trash: add missing run-time dependencies
Add missing RDEPENDS for this package.

Signed-off-by: Bartosz Golaszewski <bartosz.golaszewski@linaro.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit e7430b5874)
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-02 15:16:50 +02:00
Bartosz Golaszewski
e66e1917b6 python3-pyparted: add missing run-time dependencies
Add missing RDEPENDS for this package.

Signed-off-by: Bartosz Golaszewski <bartosz.golaszewski@linaro.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 9249052f98)
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-02 15:16:50 +02:00
Bartosz Golaszewski
1d09e1628b python3-thrift: add missing run-time dependencies
Add missing RDEPENDS for this package.

Signed-off-by: Bartosz Golaszewski <bartosz.golaszewski@linaro.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit e015b0e996)
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-02 15:16:50 +02:00
Bartosz Golaszewski
0f0ab90c20 python3-hpack: add missing run-time dependencies
Add missing RDEPENDS for this package.

Signed-off-by: Bartosz Golaszewski <bartosz.golaszewski@linaro.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 1659a00086)
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-02 15:16:46 +02:00
Bartosz Golaszewski
7e1af614e2 python3-txws: add missing run-time dependencies
Add missing RDEPENDS for this package.

Signed-off-by: Bartosz Golaszewski <bartosz.golaszewski@linaro.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit d334d496c3)
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-02 15:16:40 +02:00
Marcus Flyckt
5023aa82bc python3-pyconnman: Add 'future' runtime dependency
pyconnman has an install_requires on 'future', but the corresponding
'python3-future' is missing from the recipes RDEPENDS.

Signed-off-by: Marcus Flyckt <mafl@kvaser.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 4ccb2fa47f)
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-01 19:40:59 +02:00
Bartosz Golaszewski
a72092583c python3-gsocketpool: add missing run-time dependencies
Add missing RDEPENDS for this package.

Signed-off-by: Bartosz Golaszewski <bartosz.golaszewski@linaro.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit b630485986)
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-10-01 19:40:59 +02:00
Gyorgy Sarvari
d6fb7f426b readme: update maintainer
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-09-18 11:49:40 +02:00
Soumya Sambu
84206e7917 python3-twisted: Fix CVE-2023-46137
Twisted is an event-based framework for internet applications. Prior to version
23.10.0rc1, when sending multiple HTTP requests in one TCP packet, twisted.web
will process the requests asynchronously without guaranteeing the response order.
If one of the endpoints is controlled by an attacker, the attacker can delay the
response on purpose to manipulate the response of the second request when a
victim launched two requests using HTTP pipeline. Version 23.10.0rc1 contains a
patch for this issue.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-46137
https://security-tracker.debian.org/tracker/CVE-2023-46137

Upstream patch:
1e6e9d23ca

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-09-18 09:53:56 +02:00
Soumya Sambu
7ca4d7761b python3-twisted: Fix CVE-2024-41810
Twisted is an event-based framework for internet applications, supporting Python 3.6+.
The `twisted.web.util.redirectTo` function contains an HTML injection vulnerability.
If application code allows an attacker to control the redirect URL this vulnerability
may result in Reflected Cross-Site Scripting (XSS) in the redirect response HTML body.
This vulnerability is fixed in 24.7.0rc1.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-41810

Upstream patch:
046a164f89

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-09-18 09:53:18 +02:00
Gyorgy Sarvari
5c13812501 readme: update maintainer
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-09-16 09:04:49 +02:00
Peter Marko
7e7d7b39d6 python3-protobuf: patch CVE-2025-4565
This CVE fix was added to protobuf recipe but since it's patching python
code, it should have been submitted to python3-protobuf.
Take the patch from protobuf recipe and adapt to python3-protobuf.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-09-06 16:27:30 +02:00
Jiaying Song
78afe9d40c python3-aiohttp: fix CVE-2025-53643 and drop CVE-2024-42367 patch
- Fix CVE-2025-53643:
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and
Python. Prior to version 3.12.14, the Python parser is vulnerable to a
request smuggling vulnerability due to not parsing trailer sections of
an HTTP request. If a pure Python version of aiohttp is installed (i.e.
without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled,
then an attacker may be able to execute a request smuggling attack to
bypass certain firewalls or proxy protections. Version 3.12.14 contains
a patch for this issue.

References:
https://nvd.nist.gov/vuln/detail/CVE-2025-53643

- Drop CVE-2024-42367.patch:
According to upstream discussion and advisory [1][2], aiohttp 3.8.6 is
not affected by CVE-2024-42367, and the patch is therefore no longer
needed.

[1] https://github.com/advisories/GHSA-jwhx-xcg6-8xhj
[2] https://github.com/aio-libs/aiohttp/issues/11149

Signed-off-by: Jiaying Song <jiaying.song.cn@windriver.com>
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
2025-09-06 16:27:05 +02:00
Chen Qi
74f42273b4 python3-protobuf: fix RDEPENDS
python3-ctypes is needed as a runtime dependency.

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-07-02 20:36:39 -04:00
Jiaying Song
65523c22aa python3-aiohttp: fix CVE-2024-42367
aiohttp is an asynchronous HTTP client/server framework for asyncio and
Python. Prior to version 3.10.2, static routes which contain files with
compressed variants (`.gz` or `.br` extension) are vulnerable to path
traversal outside the root directory if those variants are symbolic
links. The server protects static routes from path traversal outside the
root directory when `follow_symlinks=False` (default). It does this by
resolving the requested URL to an absolute path and then checking that
path relative to the root. However, these checks are not performed when
looking for compressed variants in the `FileResponse` class, and
symbolic links are then automatically followed when performing the
`Path.stat()` and `Path.open()` to send the file. Version 3.10.2
contains a patch for the issue.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-42367
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-jwhx-xcg6-8xhj

Upstream patch:
ce2e975881

Signed-off-by: Jiaying Song <jiaying.song.cn@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-07-02 20:36:23 -04:00
Soumya Sambu
5c4b61d38a python3-twisted: Fix CVE-2024-41671
Twisted is an event-based framework for internet applications, supporting Python 3.6+.
The HTTP 1.0 and 1.1 server provided by twisted.web could process pipelined HTTP
requests out-of-order, possibly resulting in information disclosure. This vulnerability
is fixed in 24.7.0rc1.

References:
https://nvd.nist.gov/vuln/detail/CVE-2024-41671
https://ubuntu.com/security/CVE-2024-41671

Upstream patches:
f1cb4e616e
ef2c755e9e

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-05-25 14:48:44 -04:00
Peter Marko
7842d4eb45 python3-grpcio(-tools): fix build concurrency issue
Set GRPC_PYTHON_BUILD_EXT_COMPILER_JOBS to limit spawned compiler
processes. Without this it uses all available CPUs (via
multiprocessing.cpu_count()) and can exhaust build host since there are
lot of files to compile (e.g. with 128 cores it manages to spawn 128 gcc
processes)

Note that this is a general problem for all setuptools based builds with
build_ext compilation which can either compile with 1 thread or
cpu_count threads. grpcio hot-patches setuptools and allows to set
specific build concurrency value.

(From master rev: fe582374d3)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-03-06 09:49:24 -05:00
Wang Mingyu
178d4ae7c2 python3-future: upgrade 0.18.2 -> 0.18.3
Full changelog:
https://github.com/PythonCharmers/python-future/releases

(cherry-picked from a10bda8c87)

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Jiaying Song <jiaying.song.cn@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-03-06 09:39:34 -05:00
Martin Jansa
068379172d python3-h5py: add -Wno-error to allow building native with gcc-14 on host
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-02-09 07:58:24 -08:00
Soumya Sambu
de8681b4a2 python3-sqlparse: Fix CVE-2024-4340
Passing a heavily nested list to sqlparse.parse() leads to a Denial
of Service due to RecursionError.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-4340

Upstream-patch:
b4a39d9850

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-01-22 19:29:37 -05:00
Soumya Sambu
954acdcf1b python3-django: Fix CVE-2024-53907
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2
before 4.2.17. The strip_tags() method and striptags template filter are subject
to a potential denial-of-service attack via certain inputs containing large
sequences of nested incomplete HTML entities.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-53907

Upstream-patch:
790eb058b0

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-01-22 19:23:09 -05:00
Soumya Sambu
be168328f8 python3-django: Fix CVE-2024-45231
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The
django.contrib.auth.forms.PasswordResetForm class, when used in a view
implementing password reset flows, allows remote attackers to enumerate
user e-mail addresses by sending password reset requests and observing
the outcome (only when e-mail sending is consistently failing).

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-45231

Upstream-patch:
bf4888d317

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-01-22 19:23:05 -05:00
Soumya Sambu
b4feba446d python3-django: Fix CVE-2024-45230
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and
4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are
subject to a potential denial-of-service attack via very large inputs with
a specific sequence of characters.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-45230

Upstream-patch:
d147a8ebbd

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-01-22 19:23:02 -05:00
Soumya Sambu
aa9e8a5557 python3-django: Fix CVE-2024-41991
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The
urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget,
are subject to a potential denial-of-service attack via certain inputs with a
very large number of Unicode characters.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-41991

Upstream-patch:
efea1ef7e2

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-01-22 19:22:59 -05:00
Soumya Sambu
4e8fa78778 python3-django: Fix CVE-2024-41990
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15.
The urlize() and urlizetrunc() template filters are subject to a potential
denial-of-service attack via very large inputs with a specific sequence of
characters.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-41990

Upstream-patch:
d0a82e26a7

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-01-22 19:22:56 -05:00
Soumya Sambu
46701493ac python3-django: Fix CVE-2024-41989
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The
floatformat template filter is subject to significant memory consumption when
given a string representation of a number in scientific notation with a large
exponent.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-41989

Upstream-patches:
08c5a78726
4b066bde69
dcd9746983
fc76660f58

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-01-22 19:20:15 -05:00
Soumya Sambu
91d60c9b0a python3-django: Fix CVE-2024-39614
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14.
get_supported_language_variant() was subject to a potential denial-of-service
attack when used with very long strings containing specific characters.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-39614

Upstream-patch:
17358fb35f

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-01-22 19:20:12 -05:00
Soumya Sambu
e13c721bed python3-django: Fix CVE-2023-23969
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values
of Accept-Language headers are cached in order to avoid repetitive parsing. This leads
to a potential denial-of-service vector via excessive memory usage if the raw value of
Accept-Language headers is very large.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-23969

Upstream-patch:
c7e0151fdf

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-01-22 19:20:09 -05:00
Soumya Sambu
59ebd5b114 python3-django: upgrade 4.2.15 -> 4.2.17
Fixes CVE-2024-45230, CVE-2024-45231,  CVE-2024-53907 and
CVE-2024-53908

Release Notes:
https://docs.djangoproject.com/en/dev/releases/4.2.16/
https://docs.djangoproject.com/en/dev/releases/4.2.17/

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-01-22 19:20:06 -05:00
Soumya Sambu
580693f8b9 python3-django: Fix CVE-2024-38875
An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7.
urlize and urlizetrunc were subject to a potential denial of service attack
via certain inputs with a very large number of brackets.

References:
https://nvd.nist.gov/vuln/detail/CVE-2024-38875
https://github.com/advisories/GHSA-qg2p-9jwr-mmqf

Upstream-patch:
79f3687642

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-01-22 19:20:02 -05:00
Soumya Sambu
c59e8e9dbc python3-werkzeug: Fix CVE-2024-49767
Werkzeug is a Web Server Gateway Interface web application library. Applications
using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug
prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications)
are vulnerable to a relatively simple but effective resource exhaustion (denial of
service) attack. A specifically crafted form submission request can cause the parser
to allocate and block 3 to 8 times the upload size in main memory. There is no upper
limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds.
Werkzeug version 3.0.6 fixes this issue.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-49767

Upstream-patch:
8760275afb

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2024-12-31 09:04:08 -05:00
Soumya Sambu
c3deda05a7 python3-werkzeug: Fix CVE-2024-34069
Werkzeug is a comprehensive WSGI web application library. The debugger in
affected versions of Werkzeug can allow an attacker to execute code on a
developer's machine under some circumstances. This requires the attacker
to get the developer to interact with a domain and subdomain they control,
and enter the debugger PIN, but if they are successful it allows access to
the debugger even if it is only running on localhost. This also requires
the attacker to guess a URL in the developer's application that will trigger
the debugger. This vulnerability is fixed in 3.0.3.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-34069

Upstream-patches:
71b69dfb7d
890b6b6263

Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2024-12-31 09:04:05 -05:00
Jiaying Song
c5c647ba6a python3-aiohttp: fix CVE-2023-49081/CVE-2024-30251/CVE-2024-52304/CVE-2023-49082/CVE-2024-27306
CVE-2023-49081:
aiohttp is an asynchronous HTTP client/server framework for asyncio and
Python. Improper validation made it possible for an attacker to modify
the HTTP request (e.g. to insert a new header) or create a new HTTP
request if the attacker controls the HTTP version. The vulnerability
only occurs if the attacker can control the HTTP version of the request.
This issue has been patched in version 3.9.0.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-49081

Upstream patches:
1e86b777e6

CVE-2024-30251:
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python.
In affected versions an attacker can send a specially crafted POST
(multipart/form-data) request. When the aiohttp server processes it, the server
will enter an infinite loop and be unable to process any further requests. An
attacker can stop the application from serving requests after sending a single
request. This issue has been addressed in version 3.9.4. Users are advised to
upgrade. Users unable to upgrade may manually apply a patch to their systems.
Please see the linked GHSA for instructions.

References:
https://nvd.nist.gov/vuln/detail/CVE-2024-30251

Upstream patches:
cebe526b9c
7eecdff163
f21c6f2ca5

CVE-2024-52304:
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python.
Prior to version 3.10.11, the Python parser parses newlines in chunk extensions
incorrectly which can lead to request smuggling vulnerabilities under certain
conditions. If a pure Python version of aiohttp is installed (i.e. without the
usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may
be able to execute a request smuggling attack to bypass certain firewalls or
proxy protections. Version 3.10.11 fixes the issue.

References:
https://nvd.nist.gov/vuln/detail/CVE-2024-52304

Upstream patches:
259edc3690

CVE-2023-49082:
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python.
Improper validation makes it possible for an attacker to modify the HTTP
request (e.g. insert a new header) or even create a new HTTP request if the
attacker controls the HTTP method. The vulnerability occurs only if the
attacker can control the HTTP method (GET, POST etc.) of the request. If the
attacker can control the HTTP version of the request it will be able to modify
the request (request smuggling). This issue has been patched in version 3.9.0.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-49082

Upstream patches:
a43bc17798

CVE-2024-27306:
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python.
A XSS vulnerability exists on index pages for static file handling. This
vulnerability is fixed in 3.9.4. We have always recommended using a reverse
proxy server (e.g. nginx) for serving static files. Users following the
recommendation are unaffected. Other users can disable `show_index` if unable
to upgrade.

References:
https://nvd.nist.gov/vuln/detail/CVE-2024-27306

Upstream patches:
28335525d1

Signed-off-by: Jiaying Song <jiaying.song.cn@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2024-12-08 15:04:29 -05:00
Martin Jansa
4b706692ba python3-geomet: fix branch parameter
* drop unused SRC_URI[sha256sum] as this recipe uses git fetcher

* release-0.3.0 branch doesn't exist, but the SRCREV is in master branch:
  geomet $ git branch -a --contains 73ec5ec96cca32f2e2461d3964fc3d4ab80248f9
  * master
    remotes/origin/HEAD -> origin/master
    remotes/origin/master
    remotes/origin/release-1.0
    remotes/origin/release-1.1.0

* release-0.3.0 branch doesn't exist even the tarball on MIRROR:
  https://sources.yoctoproject.org/mirror/sources/git2_github.com.geomet.geomet.git.tar.gz
  not sure when it was removed from upstream git repo, but it was removed:

Pruning origin
URL: https://github.com/geomet/geomet.git
 * [pruned] refs/heads/issue_esri_srid
 * [pruned] refs/pull/74/merge
 * [pruned] refs/pull/76/merge
 * [pruned] refs/pull/77/merge
 * [pruned] refs/heads/release-0.3.0

* master branch is used since mickledore upgrade to 1.0.0 in:
  https://git.openembedded.org/meta-openembedded/commit/?h=mickledore&id=382f7d51e3b92b8b7a23cd98f9bfc63c51a33dfd

Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2024-12-08 14:38:16 -05:00
Martin Jansa
07dcc9149b python3-lxml: ignore incompatible-pointer-types issues in native build
* to allow building native version on hosts with gcc-14
* it's properly fixed in 5.0.2 version sent to oe-core/scarthgap in:
  https://lists.openembedded.org/g/openembedded-core/message/206391
  but for kirkstone we can just demote the issue back to warning

* fixes:
  https://bugs.launchpad.net/lxml/+bug/2045435

Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2024-12-08 14:38:16 -05:00