Commit Graph

3582 Commits

Author SHA1 Message Date
Guocai He
a406bd6d53 mesa: Update SRC_URI
Update SRC_URI for mesa.
The the tarball of mesa has been changed
from:
https://mesa.freedesktop.org/archive/
to:
https://archive.mesa3d.org/

(From OE-Core rev: 6397cd1ad55927c312051cbd42d5825fa8ed969b)

Signed-off-by: Guocai He <guocai.he.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-04 08:42:48 -07:00
Peter Marko
47efe3545e freetype: patch CVE-2025-27363
From [1]:
An out of bounds write exists in FreeType versions 2.13.0 and below
(newer versions of FreeType are not vulnerable) when attempting to
parse font subglyph structures related to TrueType GX and variable font
files. The vulnerable code assigns a signed short value to an unsigned
long and then adds a static value causing it to wrap around and
allocate too small of a heap buffer. The code then writes up to 6
signed long integers out of bounds relative to this buffer. This may
result in arbitrary code execution. This vulnerability may have been
exploited in the wild.

Per [2] patches [3] and [4] are needed.
Unfortunately, the code changed since 2.11.1 and it's not possible to do
backport without significant changes. Since Debian and Ubuntu have
already patched this CVE, take the patch from them - [5]/[6].
The patch is a combination of patch originally proposed in [7] and
follow-up patch [4].

[1] https://nvd.nist.gov/vuln/detail/CVE-2025-27363
[2] https://gitlab.freedesktop.org/freetype/freetype/-/issues/1322
[3] ef63669652
[4] 73720c7c99
[5] https://git.launchpad.net/ubuntu/+source/freetype/commit/?h=applied/ubuntu/jammy-devel&id=fc406fb02653852dfa5979672e3d8d56ed329186
[6] 13295227b5
[7] https://www.openwall.com/lists/oss-security/2025/03/14/3

(From OE-Core rev: 5a8d4c7a9a0e099da0294141cf5590b55f0503cd)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-04-04 08:42:48 -07:00
Yogita Urade
9da4f8dc2b xwayland: fix CVE-2022-49737
In X.Org X server 20.11 through 21.1.16, when a client application
uses easystroke for mouse gestures, the main thread modifies various
data structures used by the input thread without acquiring a lock,
aka a race condition. In particular, AttachDevice in dix/devices.c
does not acquire an input lock.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-49737

Upstream patch:
dc7cb45482

(From OE-Core rev: 740ea9019cf5cf309c5a4ef380eac17d21078ac8)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-27 08:16:30 -07:00
Yogita Urade
5076bd268c xserver-xorg: fix CVE-2022-49737
In X.Org X server 20.11 through 21.1.16, when a client application
uses easystroke for mouse gestures, the main thread modifies various
data structures used by the input thread without acquiring a lock,
aka a race condition. In particular, AttachDevice in dix/devices.c
does not acquire an input lock.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-49737

Upstream patch:
dc7cb45482

(From OE-Core rev: c6a8ad45174a416c4129deb210eab9b7721ce01d)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-27 08:16:30 -07:00
Johannes Kauffmann
a3dc9e0f84 mesa: Fix missing GLES3 headers in SDK sysroot
Building weston with core-image-weston SDK fails:
```
../libweston/renderer-gl/gl-shader-config-color-transformation.c:29:10: fatal error: GLES3/gl3.h: No such file or directory
   29 | #include <GLES3/gl3.h>
      |          ^~~~~~~~~~~~~
```

Both GLES2 and GLES3 implementations are contained in libGLESv2.so.2,
which is packaged in libgles2-mesa. However, the headers are split
between libgles2-mesa-dev and libgles3-mesa-dev, which is why the
GLES3 headers end up missing in the SDK sysroot.

Add a dependency so the GLES3 headers are properly associated with
the GLES3 implementation.

(From OE-Core rev: 7e1308ec413e69a8427ac5998431005d9e4b8033)

(From OE-Core rev: 0d9f2fcc2058407eb138297d9f8f12595851b963)

Signed-off-by: Tom Hochstein <tom.hochstein@oss.nxp.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Johannes Kauffmann <johanneskauffmann@hotmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
cb4d8ec033 xwayland: Fix CVE-2025-26601
The patches are copied from xserver-xorg recipe.
CVE reported for both and patches apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/16a1242d &
https://gitlab.freedesktop.org/xorg/xserver/-/commit/f52cea2f &
https://gitlab.freedesktop.org/xorg/xserver/-/commit/8cbc90c8 & https://gitlab.freedesktop.org/xorg/xserver/-/commit/c2857989

(From OE-Core rev: 58f5a6a28d353f14c672bb99820608ec82f05e6e)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
fb3ba2fa42 xwayland: Fix CVE-2025-26600
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/6e0f332b

(From OE-Core rev: b02bf5f9abb4d2a514f9ea883cd1fe6057367c92)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
b589fab5bb xwayland: Fix CVE-2025-26599
The patches are copied from xserver-xorg recipe.
CVE reported for both and patches apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/c1ff84be & https://gitlab.freedesktop.org/xorg/xserver/-/commit/b07192a8

(From OE-Core rev: d79cd91d2abc1b0e9e1e47d18af140d351dce298)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
d828f38a4e xwayland: Fix CVE-2025-26598
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/bba9df1a

(From OE-Core rev: f01c281b94ff137003ef108e33a8c3230c541c46)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
d99c2b9b65 xwayland: Fix CVE-2025-26597
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/0e4ed949

(From OE-Core rev: a7f4c6b1946e7215d8df561340d7a1cd0b2d5c27)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
775d602327 xwayland: Fix CVE-2025-26596
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/80d69f01

(From OE-Core rev: 45738e56aaf5dac1a471cb37088d3cd24764156d)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
b48431c424 xwayland: Fix CVE-2025-26595
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/11fcda87

(From OE-Core rev: e0768162f0ece29392d4f387d263d62dd4083836)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
3cc6f0bb5c xwayland: Fix CVE-2025-26594
The patches are copied from xserver-xorg recipe.
CVE reported for both and patches apply on both.

Upstream-Commit: https://gitlab.freedesktop.org/xorg/xserver/-/commit/01642f26 & https://gitlab.freedesktop.org/xorg/xserver/-/commit/b0a09ba6

(From OE-Core rev: 2d8bf72c892a3a6422e2a294fb6528ff67971e6d)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
0f565d1c27 xwayland: Fix CVE-2024-9632
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: ba1d14f8ef

(From OE-Core rev: 2158a34839068b878344d214d3fc9feeb17e504a)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
46014acb66 xwayland: Fix CVE-2024-31083
The patches are copied from xserver-xorg recipe.
CVE reported for both and patches apply on both.

Upstream-Commit:
https://gitlab.freedesktop.org/xorg/xserver/-/commit/bdca6c3d1f5057ee & https://gitlab.freedesktop.org/xorg/xserver/-/commit/337d8d48b618d4fc

(From OE-Core rev: 1c4b1e7877210243707a91d6a9d37ed4546bc8a7)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
57a80e447e xwayland: Fix CVE-2024-31081
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: 3e77295f88

(From OE-Core rev: 3575ad718c8ea7d808247842df19982f00725187)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
4a8c873ccf xwayland: Fix CVE-2024-31080
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: 96798fc196

(From OE-Core rev: 4e41b1c8cccd3b2f359ee949cad402b9418f5983)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
3bbaf11178 xwayland: Fix CVE-2024-21886
The patches are copied from xserver-xorg recipe.
CVE reported for both and patches apply on both.

Upstream-Commit:
bc1fdbe465
& 26769aa71f

(From OE-Core rev: 77487fb0756951e29628f41ff00db12a5f9d7c27)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Vijay Anusuri
b442e01822 xwayland: Fix CVE-2024-21885
Patch copied from xserver-xorg recipe.
CVE reported for both and patch apply on both.

Upstream-Commit: 4a5e9b1895

(From OE-Core rev: 4b0f6aaa994eeab5d18211ace8034ec8b92b7419)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-08 06:35:36 -08:00
Libo Chen
c1e070df6b virglrenderer: fix do_fetch error
Update SRC_URI to fix the following error:
WARNING: virglrenderer-native-0.9.1-r0 do_fetch: Failed to fetch URL
git://anongit.freedesktop.org/git/virglrenderer;branch=branch-0.9.1,
attempting MIRRORS if available

(From OE-Core rev: 72450859dd5ee5395b64917516f185a2eed52775)

Signed-off-by: Libo Chen <libo.chen.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
181051aa56 xserver-xorg: Fix for CVE-2025-26601
Upstream-Status: Backport from
https://gitlab.freedesktop.org/xorg/xserver/-/commit/16a1242d &
https://gitlab.freedesktop.org/xorg/xserver/-/commit/f52cea2f &
https://gitlab.freedesktop.org/xorg/xserver/-/commit/8cbc90c8 & https://gitlab.freedesktop.org/xorg/xserver/-/commit/c2857989

(From OE-Core rev: edc4a85c1aa5a137d4f5d8fbc74135c6805511db)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
7c9d09d47c xserver-xorg: Fix for CVE-2025-26600
Upstream-Status: Backport from https://gitlab.freedesktop.org/xorg/xserver/-/commit/6e0f332b

(From OE-Core rev: 4227ae54a29ca8b454e56ffd27de2bbce00b6b89)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
b4512e5691 xserver-xorg: Fix for CVE-2025-26599
Upstream-Status: Backport from
https://gitlab.freedesktop.org/xorg/xserver/-/commit/c1ff84be & https://gitlab.freedesktop.org/xorg/xserver/-/commit/b07192a8

(From OE-Core rev: c013fec3e5dd86544366308f53a031b080b140c6)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
a671186986 xserver-xorg: Fix for CVE-2025-26598
Upstream-Status: Backport from https://gitlab.freedesktop.org/xorg/xserver/-/commit/bba9df1a

(From OE-Core rev: 645ad1bcf8675873a7ab4778ffd2dd59dbb7b037)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
8e5a4d12ba xserver-xorg: Fix for CVE-2025-26597
Upstream-Status: Backport from https://gitlab.freedesktop.org/xorg/xserver/-/commit/0e4ed949

(From OE-Core rev: 9d095e34da2adde63358a878cfac45ea28727bdf)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
ed888d5c11 xserver-xorg: Fix for CVE-2025-26596
Upstream-Status: Backport from https://gitlab.freedesktop.org/xorg/xserver/-/commit/80d69f01

(From OE-Core rev: d510d87d9bb3e3489a4482dd0ce66e4bc7622ca0)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
ee975a7100 xserver-xorg: Fix for CVE-2025-26595
Upstream-Status: Backport from https://gitlab.freedesktop.org/xorg/xserver/-/commit/11fcda87

(From OE-Core rev: 78d718f0a683f9fb81aa24b39f148d2acf2e1fc6)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Vijay Anusuri
7a3fba1587 xserver-xorg: Fix for CVE-2025-26594
Upstream-Status: Backport from
https://gitlab.freedesktop.org/xorg/xserver/-/commit/01642f26 & https://gitlab.freedesktop.org/xorg/xserver/-/commit/b0a09ba6

(From OE-Core rev: f45b068860b1be1b3dadd58f8f787953a2951405)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-04 08:46:02 -08:00
Peter Marko
87ed7903a5 xwayland: patch CVE-2023-5380 CVE-2024-0229
The patches are copied from xserver-xorg recipe.
The CVES are reported for both and patched apply on both.

(From OE-Core rev: cdcb9957a6fe1629dc3230fcdfd09322877d4038)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-09 08:41:03 -08:00
Yogita Urade
5ea79cac19 xserver-xorg: fix CVE-2024-9632
A flaw was found in the X.org server. Due to improperly
tracked allocation size in _XkbSetCompatMap, a local
attacker may be able to trigger a buffer overflow condition
via a specially crafted payload, leading to denial of service
or local privilege escalation in distributions where the
X.org server is run with root privileges.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-9632

Upstream patch:
ba1d14f8ef

(From OE-Core rev: 95027410dba7a2a7e9b93f76279272f22445399b)

Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-12-20 06:01:45 -08:00
Peter Marko
c6bb0ec77c libsdl2: ignore CVE-2020-14409 and CVE-2020-14410
This was fixed in 2.0.14, but NVD DB lists > 2.0.20 causing
false positives in CVE metrics.

NVD entries [1] and [2] list commit [3] which redirects to commit [4].
Also Debian 10 uses this commit, while Debian 11 with 2.0.14 does not
patch it and claims it's fixed.

Trying to apply the patch shows it's already applied.

Following shows git history of this commit wrt tags.
SDL$ git describe a7ff6e96155f550a5597621ebeddd03c98aa9294 --tags
release-2.0.12-305-ga7ff6e961
SDL$ git describe release-2.0.14 --tags --match=release-2.0.12
release-2.0.12-873-g4cd981609
SDL$ git describe release-2.0.20 --tags --match=release-2.0.12
release-2.0.12-3126-gb424665e0

[1] https://nvd.nist.gov/vuln/detail/CVE-2020-14409
[2] https://nvd.nist.gov/vuln/detail/CVE-2020-14410
[3] https://hg.libsdl.org/SDL/rev/3f9b4e92c1d9
[4] a7ff6e9615

(From OE-Core rev: 3079d562b4df69ab0ac20ec8d13a4240ce0a3514)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-12-16 05:58:03 -08:00
Peter Marko
cfaf5aa831 pixman: ignore CVE-2023-37769
Same was done in newer Yocto releases.
See commit 72f2d4cf44b795f766ecdee0b8362c7e162c5efc

(From OE-Core rev: 390421edf8b6eb6031de657cdcaf0c7d50b605be)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-12-09 07:54:03 -08:00
Peter Marko
7b83bbc2ff builder: set CVE_PRODUCT
Builder is a common word and there are many other builder components
which makes us to ignore CVEs for all of them.
There is already 1 ignored and currently 3 new ones.

Instead, set product to yocto to filter them.

(From OE-Core rev: 941a645b3b18418e020ada9ebdd19f425f03dfc8)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-12-02 06:23:20 -08:00
Randolph Sapp
c2dcb5102c kmscube: create_framebuffer: backport modifier fix
Backport the upstream buffer modifier fix for create_framebuffer to
handle the case where no valid modifiers are available.

(From OE-Core rev: 983e3efb51ab22f1fa5f90cbbfba2d701aa425fc)

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-10-24 06:31:58 -07:00
Purushottam Choudhary
f50e096795 kmscube: Add patch to fix -int-conversion build error
On some platforms, `EGLNativeDisplayType` is an int instead of
a pointer, in which case the void pointer will raise
a `-Wint-conversion`.

Add change as a patch instead of updating SRCREV .
if we update SRCREV might will get compatiblity issue
with current gstreamer 1.20.7 version because SRCREV brings changes
which resolves negotiation issues encountered with V4L2 stateless
hardware video decoders when using kmscube video playback option
which has gstreamer dependency requirement to 1.22.0

(From OE-Core rev: 19a899d2ec69572e0eae4576d9fc55a7ba857309)

Signed-off-by: Purushottam Choudhary <purushottam27.kumar@lge.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-10-07 05:43:22 -07:00
Bhabu Bindu
e575d02196 libpciaccess: Remove duplicated license entry
Remove duplicated MIT license entry for libpciaccess

Duplication was done as part of below commit:

Link: https://git.yoctoproject.org/poky/commit/meta/recipes-graphics/xorg-lib/libpciaccess_0.16.bb?h=kirkstone&id=b0130fcf91daee0d905af755302fabe608da141c

(From OE-Core rev: f85d5dfc91d536a00669ca3148d8c3b2727b183d)

Signed-off-by: Bhabu Bindu <bhabu.bindu@kpit.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-05-16 05:22:09 -07:00
Archana Polampalli
0eea8a2194 xserver-xorg: fix CVE-2024-31083
FreeGlyph() function declared in render/glyphstr_priv.h, it is not present in
current recipe version and introduced in later versions, added this change to
render/glyphstr.h

(From OE-Core rev: cc2d9275203ad9489da43ff4e1f0983c00f235fd)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-05-16 05:22:09 -07:00
Archana Polampalli
e0fdd6f40a xserver-xorg: fix CVE-2024-31082
(From OE-Core rev: 32fc43f0c3c5481b2c38c2136706758dba054b6e)

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-05-16 05:22:09 -07:00
Vijay Anusuri
0603438c81 xserver-xorg: Fix for CVE-2024-31080 and CVE-2024-31081
Upstream-Status: Backport from
96798fc196
& 3e77295f88

(From OE-Core rev: 223950f9c748f89ee1b2a9df9cd77a0099e74581)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-04-19 04:50:38 -07:00
Lee Chee Yang
65e2df5990 xwayland: fix CVE-2023-6816 CVE-2024-0408/0409
fix CVE-2023-6816 CVE-2024-0408 CVE-2024-0409

(From OE-Core rev: e8feba36e09aefffcafcebc85ec75abb5b97b3eb)

Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-04-05 07:23:58 -07:00
Lee Chee Yang
ef5bd0511c xwayland: Fix CVE-2023-6377 CVE-2023-6478
(From OE-Core rev: 89974b7fa33f3e9d3e3a4df7ad219898fe400d3a)

Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-02-07 03:30:05 -10:00
Vijay Anusuri
d9f531b374 xserver-xorg: Multiple CVE fixes
Fix below CVE's
CVE-2023-6816
CVE-2024-0229
CVE-2024-21885
CVE-2024-21886
CVE-2024-0408
CVE-2024-0409

(From OE-Core rev: ad696a0067e11c332a4542ccacd76455f5fbd984)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-01-24 04:04:55 -10:00
Vijay Anusuri
d1aae420f9 xserver-xorg: Fix for CVE-2023-6377 and CVE-2023-6478
Upstream-Status: Backport
[0c1a93d319
&
14f480010a]

(From OE-Core rev: abadef9d1759254699577fe40ee353e75958f9a2)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-01-11 06:21:37 -10:00
Lee Chee Yang
82e76d21dc xwayland: fix CVE-2023-5367
(From OE-Core rev: 9c21b08c18414bb61abebcbbb8704946ea288a7b)

Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2023-12-12 04:20:34 -10:00
Vijay Anusuri
4e227eaf1c xserver-xorg: Fix for CVE-2023-5367 and CVE-2023-5380
Upstream-Status: Backport
[541ab2ecd4
&
564ccf2ce9]

(From OE-Core rev: afc30fc07d806c3f0d2192454344995f19e68575)

Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2023-11-14 06:49:11 -10:00
Siddharth Doshi
fb38c59633 libx11: Security Fix for CVE-2023-43785, CVE-2023-43786 and CVE-2023-43787
CVE's Fixed:
CVE-2023-43785: libX11: out-of-bounds memory access in _XkbReadKeySyms()
CVE-2023-43786: libX11: stack exhaustion from infinite recursion in PutSubImage()
CVE-2023-43787: libX11: integer overflow in XCreateImage() leading to a heap overflow

(From OE-Core rev: 8175d023c203d524d011d8947f90fbd02786c6db)

Signed-off-by: Siddharth Doshi <sdoshi@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2023-10-25 04:45:50 -10:00
Siddharth Doshi
36a2a0129a libxpm: upgrade to 3.5.17
This release fixes the following CVEs:

- CVE-2023-43788
- CVE-2023-43789

(From OE-Core rev: 1475a47239d77a368bcec69f12e5a63f8bebe14f)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Siddharth Doshi <sdoshi@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2023-10-21 05:21:36 -10:00
Ross Burton
6cbbd132d3 xserver-xorg: ignore CVE-2022-3553 as it is XQuartz-specific
(cherry-pick from commit 769576f36aac9652525beec5c7e8a4d26632b844 )

(From OE-Core rev: 96d36b97d9c6d1f5e79b1bea79f182561423fecb)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2023-09-30 09:43:59 -10:00
Poonam Jadhav
6826d0ba08 pixman: Remove duplication of license MIT
Remove duplication of license MIT from pixman bbfile.

(From OE-Core rev: 76f928359f76d449de0d884c591a5d9fdba9d19c)

Signed-off-by: Poonam Jadhav <poonam.jadhav@kpit.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2023-08-26 04:24:02 -10:00
Peter Marko
f24230b04b libjpeg-turbo: patch CVE-2023-2804
Relevant links:
* linked fronm NVD:
  * https://github.com/libjpeg-turbo/libjpeg-turbo/issues/668#issuecomment-1492586118
* follow-up analysis:
  * https://github.com/libjpeg-turbo/libjpeg-turbo/issues/668#issuecomment-1496473989
  * picked commits fix all issues mentioned in this analysis

(From OE-Core rev: ca8ede6d29c04159e85c2bdd2b635c58ec6a1484)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2023-08-02 04:47:12 -10:00