* [bug#74035] [PATCH 00/24] [security fixes] for near-leaf packages @ 2024-10-26 22:29 Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (4 more replies) 0 siblings, 5 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:29 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This patch series adds updates and security fixes for packages that have less than 10 dependent packages. Nicolas Graves (24): gnu: python-django-4.2: Update to 4.2.16. [security fixes] gnu: maradns: Update to 3.5.0036. [security fixes] gnu: maradns: Improve style. gnu: libmobi: Update to 0.12. [security fixes] gnu: bart: Update to 0.9.00. [security fixes] gnu: wireshark: Update to 4.4.1. [security fixes] gnu: pam-u2f: Update to 1.3.0. [security fixes] gnu: darkhttpd: Update to 1.16. [security fixes] gnu: xlsxio: Update to 0.2.35. [security fixes] gnu: pypy: Update to 7.3.17. [security fixes] gnu: indent: Remove uneeded arguments. gnu: indent: Add patch for CVE-2024-0911. [security fixes] gnu: squashfs-tools: Update to 4.6.1. [security fixes] gnu: shapelib: Update to 1.6.1. [security fixes] gnu: libzapojit: Update to 0.0.3-1.99d49ba. [security fixes] gnu: gifsicle: Update to 1.95. [security fixes] gnu: sendmail: Update to 8.18.1. [security fixes] gnu: openvpn: Update to 2.6.12. [security fixes] gnu: youtube-dl: Deprecate package. gnu: liblouis: Update to 3.31.0. [security fixes] gnu: unicorn: Update to 2.1.1. [security fixes] gnu: Add sexpp. gnu: rnp: Update to 0.17.1. [security fixes] gnu: cjson: Update to 1.7.18. [security fixes] gnu/local.mk | 1 + gnu/packages/code.scm | 31 +------- gnu/packages/compression.scm | 52 ++++++------- gnu/packages/django.scm | 8 +- gnu/packages/dns.scm | 64 ++++++++-------- gnu/packages/ebook.scm | 4 +- gnu/packages/emulators.scm | 9 ++- gnu/packages/geo.scm | 8 +- gnu/packages/gnome.scm | 45 ++++++----- gnu/packages/image-processing.scm | 8 +- gnu/packages/image.scm | 4 +- gnu/packages/javascript.scm | 4 +- gnu/packages/language.scm | 47 ++++++------ gnu/packages/mail.scm | 5 +- gnu/packages/networking.scm | 4 +- gnu/packages/openpgp.scm | 76 +++++++++++++------ .../patches/indent-CVE-2024-0911.patch | 61 +++++++++++++++ gnu/packages/pypy.scm | 4 +- gnu/packages/security-token.scm | 9 +-- gnu/packages/video.scm | 3 +- gnu/packages/vpn.scm | 4 +- gnu/packages/web.scm | 24 +++--- gnu/packages/xml.scm | 4 +- 23 files changed, 278 insertions(+), 201 deletions(-) create mode 100644 gnu/packages/patches/indent-CVE-2024-0911.patch -- 2.46.0 ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] 2024-10-26 22:29 [bug#74035] [PATCH 00/24] [security fixes] for near-leaf packages Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 02/24] gnu: maradns: Update to 3.5.0036. " Nicolas Graves via Guix-patches via ` (22 more replies) 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (3 subsequent siblings) 4 siblings, 23 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2024-24680, CVE-2024-41989, CVE-2024-41990, CVE-2024-41991, CVE-2024-42005, CVE-2024-45230, CVE-2024-45231, CVE-2023-43665 and CVE-2023-46695. * gnu/packages/django.scm (python-django-4.2): Update to 4.2.16. [properties]: Add lint-hidden-cve property. --- gnu/packages/django.scm | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/gnu/packages/django.scm b/gnu/packages/django.scm index 4404c8368d..4cf043f7c1 100644 --- a/gnu/packages/django.scm +++ b/gnu/packages/django.scm @@ -57,13 +57,13 @@ (define-module (gnu packages django) (define-public python-django-4.2 (package (name "python-django") - (version "4.2.5") + (version "4.2.16") (source (origin (method url-fetch) (uri (pypi-uri "Django" version)) (sha256 (base32 - "1ha6c5j3pizbsfzw37r52lvdz8z5lblq4iwa99mpkdzz92aiqp2y")))) + "1b8xgwg3gjr974j60x3vgcpp85cg5dwhzqdpdbl8qh3cg311c5kg")))) (build-system pyproject-build-system) (arguments '(#:test-flags @@ -140,7 +140,9 @@ (define-public python-django-4.2 any Web site. Django focuses on automating as much as possible and adhering to the @dfn{don't repeat yourself} (DRY) principle.") (license license:bsd-3) - (properties `((cpe-name . "django"))))) + (properties `((cpe-name . "django") + ;; This CVE seems fixed since 4.2.1. + (lint-hidden-cve . ("CVE-2023-31047")))))) (define-public python-django-3.2 (package -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 02/24] gnu: maradns: Update to 3.5.0036. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 03/24] gnu: maradns: Improve style Nicolas Graves via Guix-patches via ` (21 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-31137. * gnu/packages/dns.scm (maradns): Update to 3.5.0036. [properties]: Add release-monitoring-url property. --- gnu/packages/dns.scm | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/gnu/packages/dns.scm b/gnu/packages/dns.scm index e911a142ef..bd2df30f01 100644 --- a/gnu/packages/dns.scm +++ b/gnu/packages/dns.scm @@ -1181,7 +1181,7 @@ (define-public public-suffix-list (define-public maradns (package (name "maradns") - (version "3.5.0022") + (version "3.5.0036") (source (origin (method url-fetch) @@ -1189,7 +1189,7 @@ (define-public maradns (version-major+minor version) "/" version "/maradns-" version ".tar.xz")) (sha256 - (base32 "1sw267jxxxngjcar8cj3jpxnpiz0szgkhlz5l46c67qs690w9kdi")))) + (base32 "185kl7zfvnwzfpyxbzpwck13m468av74kbqijp0s4v33iicfpnvc")))) (build-system gnu-build-system) (arguments `(#:tests? #f ; need to be root to run tests @@ -1226,6 +1226,8 @@ (define-public maradns (description "MaraDNS is a small and lightweight DNS server. MaraDNS consists of a UDP-only authoritative DNS server for hosting domains, and a UDP and TCP-capable recursive DNS server for finding domains on the internet.") + (properties '((release-monitoring-url + . "https://maradns.samiam.org/download.html"))) (license license:bsd-2))) (define-public openresolv -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 03/24] gnu: maradns: Improve style. 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 02/24] gnu: maradns: Update to 3.5.0036. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 04/24] gnu: libmobi: Update to 0.12. [security fixes] Nicolas Graves via Guix-patches via ` (20 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves * gnu/packages/dns.scm (maradns)[arguments]: Use gexps. --- gnu/packages/dns.scm | 58 ++++++++++++++++++++++---------------------- 1 file changed, 29 insertions(+), 29 deletions(-) diff --git a/gnu/packages/dns.scm b/gnu/packages/dns.scm index bd2df30f01..7a78fb0308 100644 --- a/gnu/packages/dns.scm +++ b/gnu/packages/dns.scm @@ -1192,35 +1192,35 @@ (define-public maradns (base32 "185kl7zfvnwzfpyxbzpwck13m468av74kbqijp0s4v33iicfpnvc")))) (build-system gnu-build-system) (arguments - `(#:tests? #f ; need to be root to run tests - #:make-flags - (list - ,(string-append "CC=" (cc-for-target)) - (string-append "PREFIX=" %output) - (string-append "RPM_BUILD_ROOT=" %output)) - #:phases - (modify-phases %standard-phases - (replace 'configure - (lambda* (#:key native-inputs target #:allow-other-keys) - ;; make_32bit_tables generates a header file that is used during - ;; compilation. Hence, during cross compilation, it should be - ;; built for the host system. - (when target - (substitute* "rng/Makefile" - (("\\$\\(CC\\) -o make_32bit_tables") - (string-append (assoc-ref native-inputs "gcc") - "/bin/gcc -o make_32bit_tables")))) - (invoke "./configure"))) - (add-before 'install 'create-install-directories - (lambda* (#:key outputs #:allow-other-keys) - (let ((out (assoc-ref outputs "out"))) - (for-each (lambda (dir) - (mkdir-p (string-append out dir))) - (list "/bin" "/sbin" "/etc" - "/share/man/man1" - "/share/man/man5" - "/share/man/man8")) - #t)))))) + (list + #:tests? #f ; need to be root to run tests + #:make-flags + #~(list + (string-append "CC=" #$(cc-for-target)) + (string-append "PREFIX=" #$output) + (string-append "RPM_BUILD_ROOT=" #$output)) + #:phases + #~(modify-phases %standard-phases + (replace 'configure + (lambda* (#:key native-inputs target #:allow-other-keys) + ;; make_32bit_tables generates a header file that is used during + ;; compilation. Hence, during cross compilation, it should be + ;; built for the host system. + (when target + (substitute* "rng/Makefile" + (("\\$\\(CC\\) -o make_32bit_tables") + (string-append (search-input-file native-inputs "/bin/gcc") + " -o make_32bit_tables")))) + ;; ./configure doesn't support default flags + (invoke "./configure"))) + (add-before 'install 'create-install-directories + (lambda _ + (for-each (lambda (dir) + (mkdir-p (string-append #$output dir))) + (list "/bin" "/sbin" "/etc" + "/share/man/man1" + "/share/man/man5" + "/share/man/man8"))))))) (home-page "https://maradns.samiam.org") (synopsis "Small lightweight DNS server") (description "MaraDNS is a small and lightweight DNS server. MaraDNS -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 04/24] gnu: libmobi: Update to 0.12. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 02/24] gnu: maradns: Update to 3.5.0036. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 03/24] gnu: maradns: Improve style Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 05/24] gnu: bart: Update to 0.9.00. " Nicolas Graves via Guix-patches via ` (19 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2022-1533, CVE-2022-1534, CVE-2022-1907, CVE-2022-1908, CVE-2022-1987, CVE-2022-2279, CVE-2022-29788, CVE-2021-3751, CVE-2021-3881, CVE-2021-3888 and CVE-2021-3889. * gnu/packages/ebook.scm (libmobi): Update to 0.12. --- gnu/packages/ebook.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/ebook.scm b/gnu/packages/ebook.scm index dc30c98fdf..bf8dcfad09 100644 --- a/gnu/packages/ebook.scm +++ b/gnu/packages/ebook.scm @@ -648,7 +648,7 @@ (define-public xchm (define-public libmobi (package (name "libmobi") - (version "0.6") + (version "0.12") (source (origin (method git-fetch) (uri (git-reference @@ -657,7 +657,7 @@ (define-public libmobi (file-name (git-file-name name version)) (sha256 (base32 - "0yps72cm609xn2k7alflkdhp9kgr1w7zzyxjygz0n1kqrdcplihh")))) + "0cwya9n0rd97ai0fcqjwq7b3sjzigf3ywp7bnkbbw541f3knpds9")))) (build-system gnu-build-system) (native-inputs (list autoconf automake libtool)) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 05/24] gnu: bart: Update to 0.9.00. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (2 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 04/24] gnu: libmobi: Update to 0.12. [security fixes] Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 06/24] gnu: wireshark: Update to 4.4.1. " Nicolas Graves via Guix-patches via ` (18 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes bart reproducibility and CVE-2022-45387. * gnu/packages/image-processing.scm (bart): Update to 0.9.00. --- gnu/packages/image-processing.scm | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/gnu/packages/image-processing.scm b/gnu/packages/image-processing.scm index a79eaf6aed..3a7c67362f 100644 --- a/gnu/packages/image-processing.scm +++ b/gnu/packages/image-processing.scm @@ -115,20 +115,19 @@ (define-module (gnu packages image-processing) #:use-module (ice-9 match) #:use-module (srfi srfi-1)) -;; TODO: this is not reproducible. (define-public bart (package (name "bart") - (version "0.8.00") + (version "0.9.00") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/mrirecon/bart") - (commit "eacc67b95cf128487ecc48f0e6541ea4dca08818"))) + (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "05lcf7c3g7ms5h82bw1mi4kzkdv5wpqi1zrfhqfkgbcpd3irj6aq")))) + (base32 "0mj6jmw31rsnvqmpfqahhj4cy9iv5xgrhzmcsrikdz5dgd45lmjz")))) (build-system gnu-build-system) (arguments (list @@ -140,6 +139,7 @@ (define-public bart "OPENBLAS=1" "SCALAPACK=1" (string-append "BLAS_BASE=" #$(this-package-input "openblas")) + (string-append "CC=" #$(cc-for-target)) (string-append "FFTW_BASE=" #$(this-package-input "fftw"))) #:parallel-build? #false ;leads to non-deterministic output #:phases -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 06/24] gnu: wireshark: Update to 4.4.1. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (3 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 05/24] gnu: bart: Update to 0.9.00. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 07/24] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via ` (17 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2024-9780. * gnu/packages/networking.scm (wireshark): Update to 4.4.1. --- gnu/packages/networking.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/networking.scm b/gnu/packages/networking.scm index 7ed011a7f4..31b72f1104 100644 --- a/gnu/packages/networking.scm +++ b/gnu/packages/networking.scm @@ -1805,14 +1805,14 @@ (define-public whois (define-public wireshark (package (name "wireshark") - (version "4.4.0") + (version "4.4.1") (source (origin (method url-fetch) (uri (string-append "https://www.wireshark.org/download/src/wireshark-" version ".tar.xz")) (sha256 - (base32 "0s8jqxcvq7ibfsq8v4scl8dq7y5hqgpivq4iw9y2x6jj136cvmga")))) + (base32 "1v2nflm8rdifc6pwlzn1ciz22wl15zwkqs3r7gjw60kh59brd7ib")))) (build-system qt-build-system) (arguments (list -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 07/24] gnu: pam-u2f: Update to 1.3.0. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (4 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 06/24] gnu: wireshark: Update to 4.4.1. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 08/24] gnu: darkhttpd: Update to 1.16. " Nicolas Graves via Guix-patches via ` (16 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2021-31924. * gnu/packages/security-token.scm (pam-u2f): Update to 1.3.0. [inputs]: Add libfido2, openssl. Remove libu2f-host, libu2f-server. [native-inputs]: Sort packages. --- gnu/packages/security-token.scm | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/gnu/packages/security-token.scm b/gnu/packages/security-token.scm index 5abb461c0c..156a7d5e28 100644 --- a/gnu/packages/security-token.scm +++ b/gnu/packages/security-token.scm @@ -682,7 +682,7 @@ (define-public libu2f-server (define-public pam-u2f (package (name "pam-u2f") - (version "1.0.8") + (version "1.3.0") (source (origin (method git-fetch) (uri @@ -691,17 +691,16 @@ (define-public pam-u2f (commit (string-append "pam_u2f-" version)))) (file-name (git-file-name name version)) (sha256 - (base32 - "04d9davyi33gqbvga1rvh9fijp6f16mx2xmnn4n61rnhcn2jac98")))) + (base32 "1swvys98mw7ailllgqicvhj315qajhvqrmm314cp3bj0l76s9qpv")))) (build-system gnu-build-system) (arguments `(#:configure-flags (list (string-append "--with-pam-dir=" (assoc-ref %outputs "out") "/lib/security")))) (inputs - (list libu2f-host libu2f-server linux-pam)) + (list libfido2 linux-pam openssl)) (native-inputs - (list autoconf automake libtool asciidoc pkg-config)) + (list asciidoc autoconf automake libtool pkg-config)) (home-page "https://developers.yubico.com/pam-u2f/") (synopsis "PAM module for U2F authentication") (description -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 08/24] gnu: darkhttpd: Update to 1.16. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (5 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 07/24] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 09/24] gnu: xlsxio: Update to 0.2.35. " Nicolas Graves via Guix-patches via ` (15 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2024-23770 and CVE-2024-23771. * gnu/packages/web.scm (darkhttpd): Update to 1.16. [arguments]: Improve style. --- gnu/packages/web.scm | 24 +++++++++++------------- 1 file changed, 11 insertions(+), 13 deletions(-) diff --git a/gnu/packages/web.scm b/gnu/packages/web.scm index 34739bf088..eb27d3448c 100644 --- a/gnu/packages/web.scm +++ b/gnu/packages/web.scm @@ -6417,7 +6417,7 @@ (define-public surfraw (define-public darkhttpd (package (name "darkhttpd") - (version "1.13") + (version "1.16") (source (origin (method git-fetch) @@ -6426,20 +6426,18 @@ (define-public darkhttpd (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "0w11xq160q9yyffv4mw9ncp1n0dl50d9plmwxb0yijaaxls9i4sk")))) + (base32 "15mmq1v8p50mm9wx5w6g4rlr40b7d044lw7rs1wyzdiw9lcnihvm")))) (build-system gnu-build-system) (arguments - `(#:make-flags - (list (string-append "CC=" ,(cc-for-target))) - #:tests? #f ; No test suite - #:phases - (modify-phases %standard-phases - (delete 'configure) ; no configure script - (replace 'install - (lambda* (#:key outputs #:allow-other-keys) - (install-file "darkhttpd" - (string-append (assoc-ref outputs "out") - "/bin"))))))) + (list + #:make-flags #~(list (string-append "CC=" #$(cc-for-target))) + #:tests? #f ; No test suite + #:phases + #~(modify-phases %standard-phases + (delete 'configure) ; no configure script + (replace 'install + (lambda _ + (install-file "darkhttpd" (string-append #$output "/bin"))))))) (synopsis "Simple static web server") (description "darkhttpd is a simple static web server. It is standalone and does not need inetd or ucspi-tcp. It does not need any -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 09/24] gnu: xlsxio: Update to 0.2.35. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (6 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 08/24] gnu: darkhttpd: Update to 1.16. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 10/24] gnu: pypy: Update to 7.3.17. " Nicolas Graves via Guix-patches via ` (14 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-34795. * gnu/packages/xml.scm (xlsxio): Update to 0.2.35. --- gnu/packages/xml.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/xml.scm b/gnu/packages/xml.scm index cfd53a291a..4a3936b66d 100644 --- a/gnu/packages/xml.scm +++ b/gnu/packages/xml.scm @@ -1545,7 +1545,7 @@ (define-public xerces-c (define-public xlsxio (package (name "xlsxio") - (version "0.2.33") + (version "0.2.35") (source (origin (method git-fetch) @@ -1554,7 +1554,7 @@ (define-public xlsxio (commit version))) (file-name (git-file-name name version)) (sha256 - (base32 "16i3yd168kb63za7jpycpb2by4831gz7wi90vzifdf85csc8c70s")))) + (base32 "140ap2l3qy27z1fhqpkq3a44aikhr3v5zlnm9m8vag42qiagiznx")))) (native-inputs (list expat gnu-make minizip which)) (build-system gnu-build-system) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 10/24] gnu: pypy: Update to 7.3.17. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (7 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 09/24] gnu: xlsxio: Update to 0.2.35. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 11/24] gnu: indent: Remove uneeded arguments Nicolas Graves via Guix-patches via ` (13 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2022-37454. * gnu/packages/pypy.scm (pypy): Update to 7.3.17. --- gnu/packages/pypy.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/pypy.scm b/gnu/packages/pypy.scm index a39621b5ad..90986ac096 100644 --- a/gnu/packages/pypy.scm +++ b/gnu/packages/pypy.scm @@ -42,14 +42,14 @@ (define-module (gnu packages pypy) (define-public pypy (package (name "pypy") - (version "7.3.13") + (version "7.3.17") (source (origin (method url-fetch) (uri (string-append "https://downloads.python.org/pypy/" "pypy3.10-v" version "-src.tar.bz2")) (sha256 (base32 - "0v9s6pwrnaxqi5h1pvmaphj6kgyczx07ykl07hcx656h34y77haa")))) + "1xsbn9mbxi2kai4gg1nz6n6cbqsq60qh65f5l6ld7ip9g32lpmva")))) (build-system gnu-build-system) (arguments (list -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 11/24] gnu: indent: Remove uneeded arguments. 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (8 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 10/24] gnu: pypy: Update to 7.3.17. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 12/24] gnu: indent: Add patch for CVE-2024-0911. [security fixes] Nicolas Graves via Guix-patches via ` (12 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves * gnu/packages/code.scm (indent) [arguments]: Remove field. [native-inputs]: Remove automake. --- gnu/packages/code.scm | 27 +-------------------------- 1 file changed, 1 insertion(+), 26 deletions(-) diff --git a/gnu/packages/code.scm b/gnu/packages/code.scm index bbf10be987..094dd32982 100644 --- a/gnu/packages/code.scm +++ b/gnu/packages/code.scm @@ -881,33 +881,8 @@ (define-public indent (sha256 (base32 "15c0ayp9rib7hzvrcxm5ijs0mpagw5y8kf5w0jr9fryfqi7n6r4y")))) (build-system gnu-build-system) - (arguments - `(#:phases - (modify-phases %standard-phases - (add-after 'unpack 'fix-docdir - (lambda _ - ;; Although indent uses a modern autoconf in which docdir - ;; defaults to PREFIX/share/doc, the doc/Makefile.am - ;; overrides this to be in PREFIX/doc. Fix this. - (substitute* "doc/Makefile.in" - (("^docdir = .*$") "docdir = @docdir@\n")) - #t)) - (add-after 'unpack 'fix-configure - (lambda* (#:key inputs native-inputs #:allow-other-keys) - ;; Replace outdated config.sub and config.guess: - (with-directory-excursion "config" - (for-each (lambda (file) - (install-file - (string-append (assoc-ref - (or native-inputs inputs) "automake") - "/share/automake-" - ,(version-major+minor - (package-version automake)) - "/" file) ".")) - '("config.sub" "config.guess"))) - #t))))) (native-inputs - (list texinfo automake)) ; For up to date 'config.guess' and 'config.sub'. + (list texinfo)) (synopsis "Code reformatter") (description "Indent is a program that makes source code easier to read by -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 12/24] gnu: indent: Add patch for CVE-2024-0911. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (9 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 11/24] gnu: indent: Remove uneeded arguments Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 13/24] gnu: squashfs-tools: Update to 4.6.1. " Nicolas Graves via Guix-patches via ` (11 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves * gnu/packages/patches/indent-CVE-2024-0911.patch: Add patch here... * gnu/local.mk: ...here... * gnu/packages/code.scm (indent)[source]<origin>: ...and here. --- gnu/local.mk | 1 + gnu/packages/code.scm | 4 +- .../patches/indent-CVE-2024-0911.patch | 61 +++++++++++++++++++ 3 files changed, 65 insertions(+), 1 deletion(-) create mode 100644 gnu/packages/patches/indent-CVE-2024-0911.patch diff --git a/gnu/local.mk b/gnu/local.mk index d253b424bb..1a69a22aba 100644 --- a/gnu/local.mk +++ b/gnu/local.mk @@ -1559,6 +1559,7 @@ dist_patch_DATA = \ %D%/packages/patches/idris-test-ffi008.patch \ %D%/packages/patches/igraph-fix-varargs-integer-size.patch \ %D%/packages/patches/ilmbase-fix-tests.patch \ + %D%/packages/patches/indent-CVE-2024-0911.patch \ %D%/packages/patches/instead-use-games-path.patch \ %D%/packages/patches/intltool-perl-compatibility.patch \ %D%/packages/patches/irrlicht-use-system-libs.patch \ diff --git a/gnu/packages/code.scm b/gnu/packages/code.scm index 094dd32982..dda37528b8 100644 --- a/gnu/packages/code.scm +++ b/gnu/packages/code.scm @@ -879,7 +879,9 @@ (define-public indent (uri (string-append "mirror://gnu/indent/indent-" version ".tar.gz")) (sha256 - (base32 "15c0ayp9rib7hzvrcxm5ijs0mpagw5y8kf5w0jr9fryfqi7n6r4y")))) + (base32 "15c0ayp9rib7hzvrcxm5ijs0mpagw5y8kf5w0jr9fryfqi7n6r4y")) + ;; Remove patch when updating. + (patches (search-patches "indent-CVE-2024-0911.patch")))) (build-system gnu-build-system) (native-inputs (list texinfo)) diff --git a/gnu/packages/patches/indent-CVE-2024-0911.patch b/gnu/packages/patches/indent-CVE-2024-0911.patch new file mode 100644 index 0000000000..4687d3f59a --- /dev/null +++ b/gnu/packages/patches/indent-CVE-2024-0911.patch @@ -0,0 +1,61 @@ +Upstream issue: https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00001.html +Signed-off-by: Petr Písař <ppisar@redhat.com> +--- + regression/TEST | 2 +- + regression/input/comment-parent-heap-underread.c | 3 +++ + regression/standard/comment-parent-heap-underread.c | 5 +++++ + src/output.c | 2 +- + 4 files changed, 10 insertions(+), 2 deletions(-) + create mode 100644 regression/input/comment-parent-heap-underread.c + create mode 100644 regression/standard/comment-parent-heap-underread.c + +diff --git a/regression/TEST b/regression/TEST +index 7c07c2e..951b1a2 100755 +--- a/regression/TEST ++++ b/regression/TEST +@@ -40,6 +40,7 @@ BUGS="case-label.c one-line-1.c one-line-2.c one-line-3.c \ + macro.c enum.c elif.c nested.c wrapped-string.c minus_predecrement.c \ + bug-gnu-33364.c float-constant-suffix.c block-comments.c \ +- no-forced-nl-in-block-init.c hexadecimal_float.c binary-constant.c" ++ no-forced-nl-in-block-init.c hexadecimal_float.c binary-constant.c \ ++ comment-parent-heap-underread.c" + + INDENTSRC="args.c backup.h backup.c dirent_def.h globs.c indent.h \ + indent.c indent_globs.h io.c lexi.c memcpy.c parse.c pr_comment.c \ +diff --git a/regression/input/comment-parent-heap-underread.c +b/regression/input/comment-parent-heap-underread.c +new file mode 100644 +index 0000000..68e13cf +--- /dev/null ++++ b/regression/input/comment-parent-heap-underread.c +@@ -0,0 +1,3 @@ ++void foo(void) { ++/*a*/(1); ++} +diff --git a/regression/standard/comment-parent-heap-underread.c +b/regression/standard/comment-parent-heap-underread.c +new file mode 100644 +index 0000000..9a1c6e3 +--- /dev/null ++++ b/regression/standard/comment-parent-heap-underread.c +@@ -0,0 +1,5 @@ ++void ++foo (void) ++{ ++/*a*/ (1); ++} +diff --git a/src/output.c b/src/output.c +index ee01bcc..17eee6e 100644 +--- a/src/output.c ++++ b/src/output.c +@@ -290,7 +290,7 @@ void set_buf_break ( + /* Did we just parse a bracket that will be put on the next line + * by this line break? */ + +- if ((*token == '(') || (*token == '[')) ++ if (level > 0 && ((*token == '(') || (*token == '['))) + { + --level; /* then don't take it into account */ + } +-- +2.43.0 -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 13/24] gnu: squashfs-tools: Update to 4.6.1. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (10 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 12/24] gnu: indent: Add patch for CVE-2024-0911. [security fixes] Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 14/24] gnu: shapelib: Update to 1.6.1. " Nicolas Graves via Guix-patches via ` (10 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2021-40153 and CVE-2021-41072. * gnu/packages/compression.scm (squashfs-tools): Update to 4.6.1. [arguments]: Improve style. <#:make-flags>: Add INSTALL_MANPAGES_DIR value. <#:phases>: Remove phase 'install-documentation. Add phase 'patch-generated-source-shebangs. [native-inputs]: Add coreutils-minimal, help2man, which. [inputs]: Rewrite. --- gnu/packages/compression.scm | 52 ++++++++++++++++++------------------ 1 file changed, 26 insertions(+), 26 deletions(-) diff --git a/gnu/packages/compression.scm b/gnu/packages/compression.scm index a32b15a64a..b3eca16191 100644 --- a/gnu/packages/compression.scm +++ b/gnu/packages/compression.scm @@ -1023,7 +1023,7 @@ (define-public lz4 (define-public squashfs-tools (package (name "squashfs-tools") - (version "4.5") + (version "4.6.1") (source (origin (method git-fetch) @@ -1032,34 +1032,34 @@ (define-public squashfs-tools (commit version))) (file-name (git-file-name name version)) (sha256 - (base32 "18d4nwa22vgb8j2badngjngw63f0lj501cvlh3920wqy2mqxwav6")))) + (base32 "14nisidxx2d2qivyv7xfcg59qkj4fjiniir7nvymazdsng63gcr1")))) (build-system gnu-build-system) (arguments - `(#:tests? #f ; no check target - #:make-flags - (list (string-append "CC=" ,(cc-for-target)) - "XZ_SUPPORT=1" - "LZO_SUPPORT=1" - "LZ4_SUPPORT=1" - "ZSTD_SUPPORT=1" - (string-append "INSTALL_DIR=" (assoc-ref %outputs "out") "/bin")) - #:phases - (modify-phases %standard-phases - (replace 'configure - (lambda _ - (chdir "squashfs-tools"))) - (add-after 'install 'install-documentation - ;; Install what very little usage documentation is provided. - (lambda* (#:key outputs #:allow-other-keys) - (let* ((out (assoc-ref outputs "out")) - (doc (string-append out "/share/doc/" ,name))) - (install-file "../USAGE" doc))))))) + (list + #:tests? #f ; no check target + #:make-flags + #~(list + (string-append "CC=" #$(cc-for-target)) + "XZ_SUPPORT=1" + "LZO_SUPPORT=1" + "LZ4_SUPPORT=1" + "ZSTD_SUPPORT=1" + (string-append "INSTALL_DIR=" #$output "/bin") + (string-append "INSTALL_MANPAGES_DIR=" #$output "/share/man/man1")) + #:phases + #~(modify-phases %standard-phases + (replace 'configure + (lambda _ + (chdir "squashfs-tools"))) + (add-after 'patch-source-shebangs 'patch-generated-source-shebangs + (lambda _ + (substitute* (find-files "generate-manpages" "\\.sh") + (("print \"#!/bin/sh") + (string-append "print \"#!" (which "sh"))))))))) + (native-inputs + (list coreutils-minimal help2man which)) (inputs - `(("lz4" ,lz4) - ("lzo" ,lzo) - ("xz" ,xz) - ("zlib" ,zlib) - ("zstd:lib" ,zstd "lib"))) + (list lz4 lzo xz zlib `(,zstd "lib"))) (home-page "https://github.com/plougher/squashfs-tools") (synopsis "Tools to create and extract squashfs file systems") (description -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 14/24] gnu: shapelib: Update to 1.6.1. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (11 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 13/24] gnu: squashfs-tools: Update to 4.6.1. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 15/24] gnu: libzapojit: Update to 0.0.3-1.99d49ba. " Nicolas Graves via Guix-patches via ` (9 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2022-0699. * gnu/packages/geo.scm (shapelib): Update to 1.6.1. --- gnu/packages/geo.scm | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/gnu/packages/geo.scm b/gnu/packages/geo.scm index 5d120b3c98..affa50c515 100644 --- a/gnu/packages/geo.scm +++ b/gnu/packages/geo.scm @@ -2574,7 +2574,7 @@ (define-public readosm (define-public shapelib (package (name "shapelib") - (version "1.5.0") + (version "1.6.1") (source (origin (method git-fetch) @@ -2583,7 +2583,7 @@ (define-public shapelib (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "1lzch0jf6yqhw391phhafzw4ghmiz98zkf698h4fmq109fa2vhqd")))) + (base32 "0l67gp1618lcw7fg2iclbh016cqyw85s3cmd3qzx6aw0jq19hj8n")))) (build-system gnu-build-system) (native-inputs (list autoconf automake libtool)) @@ -2591,8 +2591,8 @@ (define-public shapelib (synopsis "Provides C library to write and update ESRI Shapefiles") (description "The Shapefile C Library provides the ability to write simple C programs -for reading, writing and updating (to a limited extent) ESRI Shapefiles, and the -associated attribute file (@file{.dbf}).") +for reading, writing and updating (to a limited extent) ESRI Shapefiles, and +the associated attribute file (@file{.dbf}).") (license license:gpl2+))) (define-public spatialite-tools -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 15/24] gnu: libzapojit: Update to 0.0.3-1.99d49ba. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (12 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 14/24] gnu: shapelib: Update to 1.6.1. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 16/24] gnu: gifsicle: Update to 1.95. " Nicolas Graves via Guix-patches via ` (8 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2021-39360. * gnu/packages/gnome.scm (libzapojit): Update to 0.0.3-1.99d49ba. --- gnu/packages/gnome.scm | 45 ++++++++++++++++++++++-------------------- 1 file changed, 24 insertions(+), 21 deletions(-) diff --git a/gnu/packages/gnome.scm b/gnu/packages/gnome.scm index 9b26819261..9abe433aa4 100644 --- a/gnu/packages/gnome.scm +++ b/gnu/packages/gnome.scm @@ -10591,28 +10591,31 @@ (define-public gsound (license license:lgpl2.1+))) (define-public libzapojit - (package - (name "libzapojit") - (version "0.0.3") - (source (origin - (method url-fetch) - (uri (string-append "mirror://gnome/sources/" name "/" - (version-major+minor version) "/" - name "-" version ".tar.xz")) - (sha256 - (base32 - "0zn3s7ryjc3k1abj4k55dr2na844l451nrg9s6cvnnhh569zj99x")))) - (build-system gnu-build-system) - (native-inputs - (list gobject-introspection intltool pkg-config)) - (inputs - (list gnome-online-accounts json-glib rest)) - (home-page "https://wiki.gnome.org/Projects/Zapojit") - (synopsis "Library for accessing SkyDrive and Hotmail") - (description - "Libzapojit is a GLib-based library for accessing online service APIs of + (let ((revision "1") + (commit "99d49bac5edc4afdcac742a0a142908e405597b0")) + (package + (name "libzapojit") + (version (git-version "0.0.3" revision commit)) + (source + (origin + (method git-fetch) + (uri (git-reference + (url "https://gitlab.gnome.org/Archive/libzapojit") + (commit commit))) + (file-name (git-file-name name version)) + (sha256 + (base32 "12frqg925rmic3rf37h5vs48xdy3mfi4ip24v0bl73h5sxy8n828")))) + (build-system gnu-build-system) + (native-inputs + (list gobject-introspection intltool pkg-config)) + (inputs + (list gnome-online-accounts json-glib rest)) + (home-page "https://wiki.gnome.org/Projects/Zapojit") + (synopsis "Library for accessing SkyDrive and Hotmail") + (description + "Libzapojit is a GLib-based library for accessing online service APIs of Microsoft SkyDrive and Hotmail, using their REST protocols.") - (license license:lgpl2.1+))) + (license license:lgpl2.1+)))) (define-public gnome-clocks (package -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 16/24] gnu: gifsicle: Update to 1.95. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (13 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 15/24] gnu: libzapojit: Update to 0.0.3-1.99d49ba. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 17/24] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via ` (7 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-44821 and CVE-2023-46009. * gnu/packages/image.scm (gifsicle): Update to 1.95. --- gnu/packages/image.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/image.scm b/gnu/packages/image.scm index 7f17c71aef..0d6593dc21 100644 --- a/gnu/packages/image.scm +++ b/gnu/packages/image.scm @@ -2172,14 +2172,14 @@ (define-public swappy (define-public gifsicle (package (name "gifsicle") - (version "1.94") + (version "1.95") (source (origin (method url-fetch) (uri (string-append "https://www.lcdf.org/gifsicle/gifsicle-" version ".tar.gz")) (sha256 - (base32 "16zq5wd6fyjgy0p0mak15k3mh1zpqb9rg6gqfpg215kqq02p1jab")))) + (base32 "0l69gn562l7a1l10zz1bfs756ipd682idgpk60qs3llz013icwdj")))) (build-system gnu-build-system) (arguments '(#:phases -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 17/24] gnu: sendmail: Update to 8.18.1. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (14 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 16/24] gnu: gifsicle: Update to 1.95. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 18/24] gnu: openvpn: Update to 2.6.12. " Nicolas Graves via Guix-patches via ` (6 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-51765 and CVE-2021-3618. * gnu/packages/mail.scm (sendmail): Update to 8.18.1. --- gnu/packages/mail.scm | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/gnu/packages/mail.scm b/gnu/packages/mail.scm index 77be7626a9..63e0f24534 100644 --- a/gnu/packages/mail.scm +++ b/gnu/packages/mail.scm @@ -3122,7 +3122,7 @@ (define-public mhonarc (define-public sendmail (package (name "sendmail") - (version "8.15.2") + (version "8.18.1") (source (origin (method url-fetch) @@ -3130,8 +3130,7 @@ (define-public sendmail "ftp://ftp.sendmail.org/pub/sendmail/sendmail." version ".tar.gz")) (sha256 - (base32 - "0fdl9ndmspqspdlmghzxlaqk56j3yajk52d7jxcg21b7sxglpy94")))) + (base32 "0w07iw4imp9wvczd2mijns7zxl8p1wk29b9yrzvhcj4fqc4z7wfb")))) (build-system gnu-build-system) (arguments `(#:phases -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 18/24] gnu: openvpn: Update to 2.6.12. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (15 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 17/24] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 19/24] gnu: youtube-dl: Deprecate package Nicolas Graves via Guix-patches via ` (5 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves Thix fixes CVE-2024-24974, CVE-2024-27459 and CVE-2024-27903. * gnu/packages/vpn.scm (openvpn): Update to 2.6.12. --- gnu/packages/vpn.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/vpn.scm b/gnu/packages/vpn.scm index 9f36595bfd..193b247779 100644 --- a/gnu/packages/vpn.scm +++ b/gnu/packages/vpn.scm @@ -867,7 +867,7 @@ (define-public openfortivpn (define-public openvpn (package (name "openvpn") - (version "2.6.7") + (version "2.6.12") (source (origin (method url-fetch) (uri (string-append @@ -875,7 +875,7 @@ (define-public openvpn version ".tar.gz")) (sha256 (base32 - "04wr0g97nmv81javym8r99mglmb86v1i49xmnmzf938x1cs7g67f")))) + "0a8r3bvg4aic9b7dix0h7990g3j1gq17wd3w6vqk8vk8xgfhyq8w")))) (build-system gnu-build-system) (arguments '(#:configure-flags '("--enable-iproute2=yes"))) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 19/24] gnu: youtube-dl: Deprecate package. 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (16 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 18/24] gnu: openvpn: Update to 2.6.12. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 20/24] gnu: liblouis: Update to 3.31.0. [security fixes] Nicolas Graves via Guix-patches via ` (4 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This package is not developped anymore. * gnu/packages/video.scm (youtube-dl): Deprecate package. --- gnu/packages/video.scm | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/gnu/packages/video.scm b/gnu/packages/video.scm index 92c0acef3c..9fca994b54 100644 --- a/gnu/packages/video.scm +++ b/gnu/packages/video.scm @@ -93,6 +93,7 @@ (define-module (gnu packages video) #:use-module ((guix licenses) #:prefix license:) #:use-module (guix utils) #:use-module (guix packages) + #:use-module (guix deprecation) #:use-module (guix download) #:use-module (guix gexp) #:use-module (guix git-download) @@ -3084,7 +3085,7 @@ (define-public yle-dl video streaming services of the Finnish national broadcasting company Yle.") (license license:gpl3+))) -(define-public youtube-dl +(define-deprecated/public youtube-dl #f (package (name "youtube-dl") (version "2021.12.17") -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 20/24] gnu: liblouis: Update to 3.31.0. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (17 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 19/24] gnu: youtube-dl: Deprecate package Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 21/24] gnu: unicorn: Update to 2.1.1. " Nicolas Graves via Guix-patches via ` (3 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2022-26981. * gnu/packages/language.scm (liblouis): Update to 3.31.0. [arguments]: Improve style using gexps. [native-inputs]: Rewrite and replace python-wrapper by python. --- gnu/packages/language.scm | 47 ++++++++++++++++++--------------------- 1 file changed, 22 insertions(+), 25 deletions(-) diff --git a/gnu/packages/language.scm b/gnu/packages/language.scm index 78fcba4287..6a5e7927b4 100644 --- a/gnu/packages/language.scm +++ b/gnu/packages/language.scm @@ -10,6 +10,7 @@ ;;; Copyright © 2023 gemmaro <gemmaro.dev@gmail.com> ;;; Copyright © 2024 Efraim Flashner <efraim@flashner.co.il> ;;; Copyright © 2024 Charles <charles@charje.net> +;;; Copyright © 2024 Nicolas Graves <ngraves@ngraves.fr> ;;; ;;; This file is part of GNU Guix. ;;; @@ -338,7 +339,7 @@ (define-public libchewing (define-public liblouis (package (name "liblouis") - (version "3.15.0") + (version "3.31.0") (source (origin (method git-fetch) @@ -348,34 +349,30 @@ (define-public liblouis (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "1ljy5xsy7vf2r0ix0d7bqcr6qvr6897f8madsx9zlm1mrj31n5px")))) + (base32 "02bga2l4jiyrgfqdl27wszz5yd6h80n2dmq3p6nb2br83jywisfh")))) (build-system gnu-build-system) (outputs '("out" "bin" "doc" "python")) (arguments - `(#:configure-flags - (list - "--disable-static" - "--enable-ucs4") - #:phases - (modify-phases %standard-phases - (add-after 'install 'install-python-extension - (lambda* (#:key outputs #:allow-other-keys) - (with-directory-excursion "python" - (invoke "python" "setup.py" "install" - (string-append "--prefix=" - (assoc-ref outputs "python")) - "--root=/"))))))) + (list + #:configure-flags #~(list "--disable-static" "--enable-ucs4") + #:phases + #~(modify-phases %standard-phases + (add-after 'install 'install-python-extension + (lambda _ + (with-directory-excursion "python" + (invoke "python3" "setup.py" "install" "--root=/" + (string-append "--prefix=" #$output:python)))))))) (native-inputs - `(("autoconf" ,autoconf) - ("automake" ,automake) - ("clang-format" ,clang) - ("help2man" ,help2man) - ("libtool" ,libtool) - ("libyaml" ,libyaml) - ("makeinfo" ,texinfo) - ("perl" ,perl) - ("pkg-config" ,pkg-config) - ("python" ,python-wrapper))) + (list autoconf + automake + clang + help2man + libtool + libyaml + texinfo + perl + pkg-config + python)) (synopsis "Braille translator and back-translator") (description "Liblouis is a braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 21/24] gnu: unicorn: Update to 2.1.1. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (18 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 20/24] gnu: liblouis: Update to 3.31.0. [security fixes] Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 22/24] gnu: Add sexpp Nicolas Graves via Guix-patches via ` (2 subsequent siblings) 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves Thix fixes CVE-2021-4296. * gnu/packages/emulators.scm (unicorn): Update to 2.1.1. --- gnu/packages/emulators.scm | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/gnu/packages/emulators.scm b/gnu/packages/emulators.scm index f0a60c0b49..948e588c4c 100644 --- a/gnu/packages/emulators.scm +++ b/gnu/packages/emulators.scm @@ -3508,13 +3508,18 @@ (define-public zsnes (define-public unicorn (package (name "unicorn") - (version "2.0.1.post1") + (version "2.1.1") (source (origin (method url-fetch) (uri (pypi-uri name version)) (sha256 - (base32 "0mlfs8qfi0clyncfkbxp6in0cpl747510i6bqymwid43xcirbikz")))) + (base32 "18sbrycr62wcs3a68a9q76ihpahfsd4bn3mryvyhimwwn1342kwh")) + (modules '((guix build utils))) + ;; cmake files are not in the cmake dir in pypi + (snippet #~(substitute* "src/CMakeLists.txt" + (("include\\(cmake/") + "include("))))) (build-system pyproject-build-system) (native-inputs (list cmake pkg-config)) (home-page "https://www.unicorn-engine.org") -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 22/24] gnu: Add sexpp. 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (19 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 21/24] gnu: unicorn: Update to 2.1.1. " Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 23/24] gnu: rnp: Update to 0.17.1. [security fixes] Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 24/24] gnu: cjson: Update to 1.7.18. " Nicolas Graves via Guix-patches via 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves * gnu/packages/openpgp.scm (sexpp): New variable. --- gnu/packages/openpgp.scm | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) diff --git a/gnu/packages/openpgp.scm b/gnu/packages/openpgp.scm index 9b6f04b407..356908ab1f 100644 --- a/gnu/packages/openpgp.scm +++ b/gnu/packages/openpgp.scm @@ -1,5 +1,6 @@ ;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2020 Justus Winter <justus@sequoia-pgp.org> +;;; Copyright © 2024 Nicolas Graves <ngraves@ngraves.fr> ;;; ;;; This file is part of GNU Guix. ;;; @@ -157,3 +158,26 @@ (define-public rnp license:asl2.0 ;; Nominet UK's BSD 3-Clause License (netpgp). license:bsd-3))))) + +(define-public sexpp + (package + (name "sexpp") + (version "0.9.0") + (source + (origin + (method git-fetch) + (uri (git-reference + (url "https://github.com/rnpgp/sexpp") + (commit (string-append "v" version)))) + (file-name (git-file-name name version)) + (sha256 + (base32 "16y9f42w6ay3w0s23xmigqm0qi1swdfvc93g2xn3xkg1r4kpmnwq")))) + (build-system cmake-build-system) + (arguments + (list #:configure-flags '(list "-DDOWNLOAD_GTEST=off"))) + (native-inputs (list googletest pkg-config)) + (home-page "https://github.com/rnpgp/sexpp") + (synopsis "C++ library for S-expressions") + (description + "This package provides a C++ library for working with S-Expressions.") + (license license:expat))) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 23/24] gnu: rnp: Update to 0.17.1. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (20 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 22/24] gnu: Add sexpp Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 24/24] gnu: cjson: Update to 1.7.18. " Nicolas Graves via Guix-patches via 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-29479 and CVE-2023-29480. * gnu/packages/openpgp.scm (rnp): Update to 0.17.1. [arguments]: Improve style using gexps. <#:phases>: Add phase 'inject-sexpp-source. [inputs]: Add sexpp. --- gnu/packages/openpgp.scm | 52 +++++++++++++++++++++++----------------- 1 file changed, 30 insertions(+), 22 deletions(-) diff --git a/gnu/packages/openpgp.scm b/gnu/packages/openpgp.scm index 356908ab1f..baf786c5ee 100644 --- a/gnu/packages/openpgp.scm +++ b/gnu/packages/openpgp.scm @@ -23,6 +23,7 @@ (define-module (gnu packages openpgp) #:use-module (guix git-download) #:use-module (guix build-system cmake) #:use-module (guix build-system gnu) + #:use-module (guix gexp) #:use-module ((guix licenses) #:prefix license:) #:use-module (gnu packages) #:use-module (gnu packages check) @@ -98,10 +99,10 @@ (define-public dkgpg (license license:gpl2+))) (define-public rnp - (let ((day-of-release "2022-09-22")) + (let ((day-of-release "2024-05-14")) (package (name "rnp") - (version "0.16.2") + (version "0.17.1") (source (origin (method git-fetch) (uri (git-reference @@ -110,33 +111,40 @@ (define-public rnp (file-name (git-file-name name version)) (sha256 (base32 - "13z5kxm48a72w4m2crwgdjdng4a4pwxsd72r2z3a4pcakfp2swi8")))) + "052872b6a88vkcc58alxcm532y6dra5qqd997jga41v72h3pnj4d")))) (build-system cmake-build-system) - (arguments `(#:configure-flags - '("-DBUILD_SHARED_LIBS=on" - "-DBUILD_TESTING=on" - "-DDOWNLOAD_GTEST=off" - "-DDOWNLOAD_RUBYRNP=off") - #:phases - (modify-phases %standard-phases - (add-after 'unpack 'patch-tests - (lambda _ - (substitute* "src/tests/support.cpp" - (("\"cp\"") (search-input-file inputs "/bin/cp"))))) - (replace 'check - (lambda* (#:key tests? #:allow-other-keys) - (when tests? - ;; Some OpenPGP certificates used by the tests expire. - ;; To work around that, set the time to roughly the - ;; release date. - (invoke "faketime" ,day-of-release "make" "test"))))))) + (arguments + (list + #:configure-flags + ''("-DBUILD_SHARED_LIBS=on" + "-DBUILD_TESTING=on" + "-DDOWNLOAD_GTEST=off" + "-DDOWNLOAD_RUBYRNP=off") + #:phases + #~(modify-phases %standard-phases + (add-after 'unpack 'patch-tests + (lambda _ + (substitute* "src/tests/support.cpp" + (("\"cp\"") (search-input-file inputs "/bin/cp"))))) + (add-after 'unpack 'inject-sexpp-source + (lambda _ + (rmdir "src/libsexpp") + (symlink #$(package-source (this-package-input "sexpp")) + "src/libsexpp"))) + (replace 'check + (lambda* (#:key tests? #:allow-other-keys) + (when tests? + ;; Some OpenPGP certificates used by the tests expire. + ;; To work around that, set the time to roughly the + ;; release date. + (invoke "faketime" #$day-of-release "make" "test"))))))) (native-inputs (list gnupg ; for tests googletest ; for tests libfaketime ; for tests pkg-config python)) - (inputs (list botan bzip2 json-c zlib)) + (inputs (list botan bzip2 json-c sexpp zlib)) (synopsis "RFC4880-compliant OpenPGP library written in C++") (description -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH 24/24] gnu: cjson: Update to 1.7.18. [security fixes] 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via ` (21 preceding siblings ...) 2024-10-26 22:42 ` [bug#74035] [PATCH 23/24] gnu: rnp: Update to 0.17.1. [security fixes] Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 ` Nicolas Graves via Guix-patches via 22 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-10-26 22:42 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-50471 and CVE-2023-50472. * gnu/packages/javascript.scm (cjson): Update to 1.7.18. --- gnu/packages/javascript.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/javascript.scm b/gnu/packages/javascript.scm index 4f97dcfef6..b48acf47dc 100644 --- a/gnu/packages/javascript.scm +++ b/gnu/packages/javascript.scm @@ -49,7 +49,7 @@ (define-module (gnu packages javascript) (define-public cjson (package (name "cjson") - (version "1.7.16") + (version "1.7.18") (source (origin (method git-fetch) (uri (git-reference @@ -57,7 +57,7 @@ (define-public cjson (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "00599lzzb0vszk317n0gln7wizdpchy4warxgpj3khrir73pphbb")))) + (base32 "08p37q4i3za3dgz7wynma1fh8y4rq7pyzyjzcda710nxrmsm1pyv")))) (build-system cmake-build-system) (arguments `(#:configure-flags '("-DENABLE_CJSON_UTILS=On"))) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. [security fixes] 2024-10-26 22:29 [bug#74035] [PATCH 00/24] [security fixes] for near-leaf packages Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via @ 2024-11-03 16:01 ` Nicolas Graves via Guix-patches via 2024-11-03 16:01 ` [bug#74035] [PATCH v2 02/26] gnu: python-django-4.2: Update to 4.2.16. " Nicolas Graves via Guix-patches via ` (25 more replies) 2024-11-05 23:10 ` [bug#74035] [PATCH v3 0/8] [security] fixes for near-leaf packages Nicolas Graves via Guix-patches via ` (2 subsequent siblings) 4 siblings, 26 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:01 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2021-28902, CVE-2021-28903, CVE-2021-28904, CVE-2021-28905 and CVE-2021-28906. * gnu/packages/networking.scm (libyang): Update to 3.4.2. --- gnu/packages/networking.scm | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/gnu/packages/networking.scm b/gnu/packages/networking.scm index 8481e2d2f4..17d4072ee0 100644 --- a/gnu/packages/networking.scm +++ b/gnu/packages/networking.scm @@ -4238,7 +4238,7 @@ (define-public iwgtk (define-public libyang (package (name "libyang") - (version "1.0.215") + (version "3.4.2") (source (origin (method git-fetch) (uri (git-reference @@ -4247,12 +4247,12 @@ (define-public libyang (file-name (git-file-name name version)) (sha256 (base32 - "0mrs2ppmq77z8sbqgm2w0rl9bfgybd6bcxanakfww4chih6cy0dw")))) + "07skjr3r4na12kadca2dyk45clpcpnp4zkkwfaa8sqyslx7vhj56")))) (build-system cmake-build-system) (arguments `(#:configure-flags (list "-DENABLE_BUILD_TESTS=ON" "-DENABLE_LYD_PRIV=ON"))) - (propagated-inputs (list pcre)) + (propagated-inputs (list pcre2)) (native-inputs (list cmocka pkg-config)) (home-page "https://github.com/CESNET/libyang") (synopsis "YANG data modelling language library") -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 02/26] gnu: python-django-4.2: Update to 4.2.16. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:01 ` Nicolas Graves via Guix-patches via 2024-11-04 16:08 ` Zheng Junjie 2024-11-03 16:01 ` [bug#74035] [PATCH v2 03/26] gnu: maradns: Update to 3.5.0036. " Nicolas Graves via Guix-patches via ` (24 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:01 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2024-24680, CVE-2024-41989, CVE-2024-41990, CVE-2024-41991, CVE-2024-42005, CVE-2024-45230, CVE-2024-45231, CVE-2023-43665 and CVE-2023-46695. * gnu/packages/django.scm (python-django-4.2): Update to 4.2.16. [properties]: Add lint-hidden-cve property. --- gnu/packages/django.scm | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/gnu/packages/django.scm b/gnu/packages/django.scm index 4404c8368d..4cf043f7c1 100644 --- a/gnu/packages/django.scm +++ b/gnu/packages/django.scm @@ -57,13 +57,13 @@ (define-module (gnu packages django) (define-public python-django-4.2 (package (name "python-django") - (version "4.2.5") + (version "4.2.16") (source (origin (method url-fetch) (uri (pypi-uri "Django" version)) (sha256 (base32 - "1ha6c5j3pizbsfzw37r52lvdz8z5lblq4iwa99mpkdzz92aiqp2y")))) + "1b8xgwg3gjr974j60x3vgcpp85cg5dwhzqdpdbl8qh3cg311c5kg")))) (build-system pyproject-build-system) (arguments '(#:test-flags @@ -140,7 +140,9 @@ (define-public python-django-4.2 any Web site. Django focuses on automating as much as possible and adhering to the @dfn{don't repeat yourself} (DRY) principle.") (license license:bsd-3) - (properties `((cpe-name . "django"))))) + (properties `((cpe-name . "django") + ;; This CVE seems fixed since 4.2.1. + (lint-hidden-cve . ("CVE-2023-31047")))))) (define-public python-django-3.2 (package -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 02/26] gnu: python-django-4.2: Update to 4.2.16. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 02/26] gnu: python-django-4.2: Update to 4.2.16. " Nicolas Graves via Guix-patches via @ 2024-11-04 16:08 ` Zheng Junjie 0 siblings, 0 replies; 88+ messages in thread From: Zheng Junjie @ 2024-11-04 16:08 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 1748 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2024-24680, CVE-2024-41989, CVE-2024-41990, > CVE-2024-41991, CVE-2024-42005, CVE-2024-45230, CVE-2024-45231, > CVE-2023-43665 and CVE-2023-46695. > > * gnu/packages/django.scm (python-django-4.2): Update to 4.2.16. > [properties]: Add lint-hidden-cve property. > --- > gnu/packages/django.scm | 8 +++++--- > 1 file changed, 5 insertions(+), 3 deletions(-) > > diff --git a/gnu/packages/django.scm b/gnu/packages/django.scm > index 4404c8368d..4cf043f7c1 100644 > --- a/gnu/packages/django.scm > +++ b/gnu/packages/django.scm > @@ -57,13 +57,13 @@ (define-module (gnu packages django) > (define-public python-django-4.2 > (package > (name "python-django") > - (version "4.2.5") > + (version "4.2.16") > (source (origin > (method url-fetch) > (uri (pypi-uri "Django" version)) > (sha256 > (base32 > - "1ha6c5j3pizbsfzw37r52lvdz8z5lblq4iwa99mpkdzz92aiqp2y")))) > + "1b8xgwg3gjr974j60x3vgcpp85cg5dwhzqdpdbl8qh3cg311c5kg")))) > (build-system pyproject-build-system) > (arguments > '(#:test-flags > @@ -140,7 +140,9 @@ (define-public python-django-4.2 > any Web site. Django focuses on automating as much as possible and adhering > to the @dfn{don't repeat yourself} (DRY) principle.") > (license license:bsd-3) > - (properties `((cpe-name . "django"))))) > + (properties `((cpe-name . "django") > + ;; This CVE seems fixed since 4.2.1. > + (lint-hidden-cve . ("CVE-2023-31047")))))) > > (define-public python-django-3.2 > (package apply. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 03/26] gnu: maradns: Update to 3.5.0036. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via 2024-11-03 16:01 ` [bug#74035] [PATCH v2 02/26] gnu: python-django-4.2: Update to 4.2.16. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:01 ` Nicolas Graves via Guix-patches via 2024-11-04 16:09 ` Zheng Junjie 2024-11-03 16:01 ` [bug#74035] [PATCH v2 04/26] gnu: maradns: Improve style Nicolas Graves via Guix-patches via ` (23 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:01 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-31137. * gnu/packages/dns.scm (maradns): Update to 3.5.0036. [properties]: Add release-monitoring-url property. --- gnu/packages/dns.scm | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/gnu/packages/dns.scm b/gnu/packages/dns.scm index e911a142ef..bd2df30f01 100644 --- a/gnu/packages/dns.scm +++ b/gnu/packages/dns.scm @@ -1181,7 +1181,7 @@ (define-public public-suffix-list (define-public maradns (package (name "maradns") - (version "3.5.0022") + (version "3.5.0036") (source (origin (method url-fetch) @@ -1189,7 +1189,7 @@ (define-public maradns (version-major+minor version) "/" version "/maradns-" version ".tar.xz")) (sha256 - (base32 "1sw267jxxxngjcar8cj3jpxnpiz0szgkhlz5l46c67qs690w9kdi")))) + (base32 "185kl7zfvnwzfpyxbzpwck13m468av74kbqijp0s4v33iicfpnvc")))) (build-system gnu-build-system) (arguments `(#:tests? #f ; need to be root to run tests @@ -1226,6 +1226,8 @@ (define-public maradns (description "MaraDNS is a small and lightweight DNS server. MaraDNS consists of a UDP-only authoritative DNS server for hosting domains, and a UDP and TCP-capable recursive DNS server for finding domains on the internet.") + (properties '((release-monitoring-url + . "https://maradns.samiam.org/download.html"))) (license license:bsd-2))) (define-public openresolv -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 03/26] gnu: maradns: Update to 3.5.0036. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 03/26] gnu: maradns: Update to 3.5.0036. " Nicolas Graves via Guix-patches via @ 2024-11-04 16:09 ` Zheng Junjie 0 siblings, 0 replies; 88+ messages in thread From: Zheng Junjie @ 2024-11-04 16:09 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 1698 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2023-31137. > > * gnu/packages/dns.scm (maradns): Update to 3.5.0036. > [properties]: Add release-monitoring-url property. > --- > gnu/packages/dns.scm | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) > > diff --git a/gnu/packages/dns.scm b/gnu/packages/dns.scm > index e911a142ef..bd2df30f01 100644 > --- a/gnu/packages/dns.scm > +++ b/gnu/packages/dns.scm > @@ -1181,7 +1181,7 @@ (define-public public-suffix-list > (define-public maradns > (package > (name "maradns") > - (version "3.5.0022") > + (version "3.5.0036") > (source > (origin > (method url-fetch) > @@ -1189,7 +1189,7 @@ (define-public maradns > (version-major+minor version) "/" > version "/maradns-" version ".tar.xz")) > (sha256 > - (base32 "1sw267jxxxngjcar8cj3jpxnpiz0szgkhlz5l46c67qs690w9kdi")))) > + (base32 "185kl7zfvnwzfpyxbzpwck13m468av74kbqijp0s4v33iicfpnvc")))) > (build-system gnu-build-system) > (arguments > `(#:tests? #f ; need to be root to run tests > @@ -1226,6 +1226,8 @@ (define-public maradns > (description "MaraDNS is a small and lightweight DNS server. MaraDNS > consists of a UDP-only authoritative DNS server for hosting domains, and a UDP > and TCP-capable recursive DNS server for finding domains on the internet.") > + (properties '((release-monitoring-url > + . "https://maradns.samiam.org/download.html"))) > (license license:bsd-2))) > > (define-public openresolv apply. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 04/26] gnu: maradns: Improve style. 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via 2024-11-03 16:01 ` [bug#74035] [PATCH v2 02/26] gnu: python-django-4.2: Update to 4.2.16. " Nicolas Graves via Guix-patches via 2024-11-03 16:01 ` [bug#74035] [PATCH v2 03/26] gnu: maradns: Update to 3.5.0036. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:01 ` Nicolas Graves via Guix-patches via 2024-11-04 16:09 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 05/26] gnu: libmobi: Update to 0.12. [security fixes] Nicolas Graves via Guix-patches via ` (22 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:01 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves * gnu/packages/dns.scm (maradns)[arguments]: Use gexps. --- gnu/packages/dns.scm | 58 ++++++++++++++++++++++---------------------- 1 file changed, 29 insertions(+), 29 deletions(-) diff --git a/gnu/packages/dns.scm b/gnu/packages/dns.scm index bd2df30f01..7a78fb0308 100644 --- a/gnu/packages/dns.scm +++ b/gnu/packages/dns.scm @@ -1192,35 +1192,35 @@ (define-public maradns (base32 "185kl7zfvnwzfpyxbzpwck13m468av74kbqijp0s4v33iicfpnvc")))) (build-system gnu-build-system) (arguments - `(#:tests? #f ; need to be root to run tests - #:make-flags - (list - ,(string-append "CC=" (cc-for-target)) - (string-append "PREFIX=" %output) - (string-append "RPM_BUILD_ROOT=" %output)) - #:phases - (modify-phases %standard-phases - (replace 'configure - (lambda* (#:key native-inputs target #:allow-other-keys) - ;; make_32bit_tables generates a header file that is used during - ;; compilation. Hence, during cross compilation, it should be - ;; built for the host system. - (when target - (substitute* "rng/Makefile" - (("\\$\\(CC\\) -o make_32bit_tables") - (string-append (assoc-ref native-inputs "gcc") - "/bin/gcc -o make_32bit_tables")))) - (invoke "./configure"))) - (add-before 'install 'create-install-directories - (lambda* (#:key outputs #:allow-other-keys) - (let ((out (assoc-ref outputs "out"))) - (for-each (lambda (dir) - (mkdir-p (string-append out dir))) - (list "/bin" "/sbin" "/etc" - "/share/man/man1" - "/share/man/man5" - "/share/man/man8")) - #t)))))) + (list + #:tests? #f ; need to be root to run tests + #:make-flags + #~(list + (string-append "CC=" #$(cc-for-target)) + (string-append "PREFIX=" #$output) + (string-append "RPM_BUILD_ROOT=" #$output)) + #:phases + #~(modify-phases %standard-phases + (replace 'configure + (lambda* (#:key native-inputs target #:allow-other-keys) + ;; make_32bit_tables generates a header file that is used during + ;; compilation. Hence, during cross compilation, it should be + ;; built for the host system. + (when target + (substitute* "rng/Makefile" + (("\\$\\(CC\\) -o make_32bit_tables") + (string-append (search-input-file native-inputs "/bin/gcc") + " -o make_32bit_tables")))) + ;; ./configure doesn't support default flags + (invoke "./configure"))) + (add-before 'install 'create-install-directories + (lambda _ + (for-each (lambda (dir) + (mkdir-p (string-append #$output dir))) + (list "/bin" "/sbin" "/etc" + "/share/man/man1" + "/share/man/man5" + "/share/man/man8"))))))) (home-page "https://maradns.samiam.org") (synopsis "Small lightweight DNS server") (description "MaraDNS is a small and lightweight DNS server. MaraDNS -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 04/26] gnu: maradns: Improve style. 2024-11-03 16:01 ` [bug#74035] [PATCH v2 04/26] gnu: maradns: Improve style Nicolas Graves via Guix-patches via @ 2024-11-04 16:09 ` Zheng Junjie 0 siblings, 0 replies; 88+ messages in thread From: Zheng Junjie @ 2024-11-04 16:09 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 3703 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > * gnu/packages/dns.scm (maradns)[arguments]: Use gexps. > --- > gnu/packages/dns.scm | 58 ++++++++++++++++++++++---------------------- > 1 file changed, 29 insertions(+), 29 deletions(-) > > diff --git a/gnu/packages/dns.scm b/gnu/packages/dns.scm > index bd2df30f01..7a78fb0308 100644 > --- a/gnu/packages/dns.scm > +++ b/gnu/packages/dns.scm > @@ -1192,35 +1192,35 @@ (define-public maradns > (base32 "185kl7zfvnwzfpyxbzpwck13m468av74kbqijp0s4v33iicfpnvc")))) > (build-system gnu-build-system) > (arguments > - `(#:tests? #f ; need to be root to run tests > - #:make-flags > - (list > - ,(string-append "CC=" (cc-for-target)) > - (string-append "PREFIX=" %output) > - (string-append "RPM_BUILD_ROOT=" %output)) > - #:phases > - (modify-phases %standard-phases > - (replace 'configure > - (lambda* (#:key native-inputs target #:allow-other-keys) > - ;; make_32bit_tables generates a header file that is used during > - ;; compilation. Hence, during cross compilation, it should be > - ;; built for the host system. > - (when target > - (substitute* "rng/Makefile" > - (("\\$\\(CC\\) -o make_32bit_tables") > - (string-append (assoc-ref native-inputs "gcc") > - "/bin/gcc -o make_32bit_tables")))) > - (invoke "./configure"))) > - (add-before 'install 'create-install-directories > - (lambda* (#:key outputs #:allow-other-keys) > - (let ((out (assoc-ref outputs "out"))) > - (for-each (lambda (dir) > - (mkdir-p (string-append out dir))) > - (list "/bin" "/sbin" "/etc" > - "/share/man/man1" > - "/share/man/man5" > - "/share/man/man8")) > - #t)))))) > + (list > + #:tests? #f ; need to be root to run tests > + #:make-flags > + #~(list > + (string-append "CC=" #$(cc-for-target)) > + (string-append "PREFIX=" #$output) > + (string-append "RPM_BUILD_ROOT=" #$output)) > + #:phases > + #~(modify-phases %standard-phases > + (replace 'configure > + (lambda* (#:key native-inputs target #:allow-other-keys) > + ;; make_32bit_tables generates a header file that is used during > + ;; compilation. Hence, during cross compilation, it should be > + ;; built for the host system. > + (when target > + (substitute* "rng/Makefile" > + (("\\$\\(CC\\) -o make_32bit_tables") > + (string-append (search-input-file native-inputs "/bin/gcc") > + " -o make_32bit_tables")))) > + ;; ./configure doesn't support default flags > + (invoke "./configure"))) > + (add-before 'install 'create-install-directories > + (lambda _ > + (for-each (lambda (dir) > + (mkdir-p (string-append #$output dir))) > + (list "/bin" "/sbin" "/etc" > + "/share/man/man1" > + "/share/man/man5" > + "/share/man/man8"))))))) > (home-page "https://maradns.samiam.org") > (synopsis "Small lightweight DNS server") > (description "MaraDNS is a small and lightweight DNS server. MaraDNS apply. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 05/26] gnu: libmobi: Update to 0.12. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (2 preceding siblings ...) 2024-11-03 16:01 ` [bug#74035] [PATCH v2 04/26] gnu: maradns: Improve style Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-04 11:57 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 06/26] gnu: bart: Update to 0.9.00. " Nicolas Graves via Guix-patches via ` (21 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2022-1533, CVE-2022-1534, CVE-2022-1907, CVE-2022-1908, CVE-2022-1987, CVE-2022-2279, CVE-2022-29788, CVE-2021-3751, CVE-2021-3881, CVE-2021-3888 and CVE-2021-3889. * gnu/packages/ebook.scm (libmobi): Update to 0.12. --- gnu/packages/ebook.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/ebook.scm b/gnu/packages/ebook.scm index dc30c98fdf..bf8dcfad09 100644 --- a/gnu/packages/ebook.scm +++ b/gnu/packages/ebook.scm @@ -648,7 +648,7 @@ (define-public xchm (define-public libmobi (package (name "libmobi") - (version "0.6") + (version "0.12") (source (origin (method git-fetch) (uri (git-reference @@ -657,7 +657,7 @@ (define-public libmobi (file-name (git-file-name name version)) (sha256 (base32 - "0yps72cm609xn2k7alflkdhp9kgr1w7zzyxjygz0n1kqrdcplihh")))) + "0cwya9n0rd97ai0fcqjwq7b3sjzigf3ywp7bnkbbw541f3knpds9")))) (build-system gnu-build-system) (native-inputs (list autoconf automake libtool)) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 05/26] gnu: libmobi: Update to 0.12. [security fixes] 2024-11-03 16:02 ` [bug#74035] [PATCH v2 05/26] gnu: libmobi: Update to 0.12. [security fixes] Nicolas Graves via Guix-patches via @ 2024-11-04 11:57 ` Zheng Junjie 0 siblings, 0 replies; 88+ messages in thread From: Zheng Junjie @ 2024-11-04 11:57 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 1237 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2022-1533, CVE-2022-1534, CVE-2022-1907, CVE-2022-1908, > CVE-2022-1987, CVE-2022-2279, CVE-2022-29788, CVE-2021-3751, > CVE-2021-3881, CVE-2021-3888 and CVE-2021-3889. > > * gnu/packages/ebook.scm (libmobi): Update to 0.12. > --- > gnu/packages/ebook.scm | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/gnu/packages/ebook.scm b/gnu/packages/ebook.scm > index dc30c98fdf..bf8dcfad09 100644 > --- a/gnu/packages/ebook.scm > +++ b/gnu/packages/ebook.scm > @@ -648,7 +648,7 @@ (define-public xchm > (define-public libmobi > (package > (name "libmobi") > - (version "0.6") > + (version "0.12") > (source (origin > (method git-fetch) > (uri (git-reference > @@ -657,7 +657,7 @@ (define-public libmobi > (file-name (git-file-name name version)) > (sha256 > (base32 > - "0yps72cm609xn2k7alflkdhp9kgr1w7zzyxjygz0n1kqrdcplihh")))) > + "0cwya9n0rd97ai0fcqjwq7b3sjzigf3ywp7bnkbbw541f3knpds9")))) > (build-system gnu-build-system) > (native-inputs > (list autoconf automake libtool)) apply. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 06/26] gnu: bart: Update to 0.9.00. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (3 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 05/26] gnu: libmobi: Update to 0.12. [security fixes] Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 07/26] gnu: wireshark: Update to 4.4.1. " Nicolas Graves via Guix-patches via ` (20 subsequent siblings) 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes bart reproducibility and CVE-2022-45387. * gnu/packages/image-processing.scm (bart): Update to 0.9.00. --- gnu/packages/image-processing.scm | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/gnu/packages/image-processing.scm b/gnu/packages/image-processing.scm index a79eaf6aed..3a7c67362f 100644 --- a/gnu/packages/image-processing.scm +++ b/gnu/packages/image-processing.scm @@ -115,20 +115,19 @@ (define-module (gnu packages image-processing) #:use-module (ice-9 match) #:use-module (srfi srfi-1)) -;; TODO: this is not reproducible. (define-public bart (package (name "bart") - (version "0.8.00") + (version "0.9.00") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/mrirecon/bart") - (commit "eacc67b95cf128487ecc48f0e6541ea4dca08818"))) + (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "05lcf7c3g7ms5h82bw1mi4kzkdv5wpqi1zrfhqfkgbcpd3irj6aq")))) + (base32 "0mj6jmw31rsnvqmpfqahhj4cy9iv5xgrhzmcsrikdz5dgd45lmjz")))) (build-system gnu-build-system) (arguments (list @@ -140,6 +139,7 @@ (define-public bart "OPENBLAS=1" "SCALAPACK=1" (string-append "BLAS_BASE=" #$(this-package-input "openblas")) + (string-append "CC=" #$(cc-for-target)) (string-append "FFTW_BASE=" #$(this-package-input "fftw"))) #:parallel-build? #false ;leads to non-deterministic output #:phases -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 07/26] gnu: wireshark: Update to 4.4.1. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (4 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 06/26] gnu: bart: Update to 0.9.00. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-04 9:38 ` Z572 2024-11-03 16:02 ` [bug#74035] [PATCH v2 08/26] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via ` (19 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2024-9780. * gnu/packages/networking.scm (wireshark): Update to 4.4.1. --- gnu/packages/networking.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/networking.scm b/gnu/packages/networking.scm index 17d4072ee0..be8b5c8e93 100644 --- a/gnu/packages/networking.scm +++ b/gnu/packages/networking.scm @@ -1805,14 +1805,14 @@ (define-public whois (define-public wireshark (package (name "wireshark") - (version "4.4.0") + (version "4.4.1") (source (origin (method url-fetch) (uri (string-append "https://www.wireshark.org/download/src/wireshark-" version ".tar.xz")) (sha256 - (base32 "0s8jqxcvq7ibfsq8v4scl8dq7y5hqgpivq4iw9y2x6jj136cvmga")))) + (base32 "1v2nflm8rdifc6pwlzn1ciz22wl15zwkqs3r7gjw60kh59brd7ib")))) (build-system qt-build-system) (arguments (list -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 07/26] gnu: wireshark: Update to 4.4.1. [security fixes] 2024-11-03 16:02 ` [bug#74035] [PATCH v2 07/26] gnu: wireshark: Update to 4.4.1. " Nicolas Graves via Guix-patches via @ 2024-11-04 9:38 ` Z572 0 siblings, 0 replies; 88+ messages in thread From: Z572 @ 2024-11-04 9:38 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 1076 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2024-9780. > > * gnu/packages/networking.scm (wireshark): Update to 4.4.1. > --- > gnu/packages/networking.scm | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/gnu/packages/networking.scm b/gnu/packages/networking.scm > index 17d4072ee0..be8b5c8e93 100644 > --- a/gnu/packages/networking.scm > +++ b/gnu/packages/networking.scm > @@ -1805,14 +1805,14 @@ (define-public whois > (define-public wireshark > (package > (name "wireshark") > - (version "4.4.0") > + (version "4.4.1") > (source > (origin > (method url-fetch) > (uri (string-append "https://www.wireshark.org/download/src/wireshark-" > version ".tar.xz")) > (sha256 > - (base32 "0s8jqxcvq7ibfsq8v4scl8dq7y5hqgpivq4iw9y2x6jj136cvmga")))) > + (base32 "1v2nflm8rdifc6pwlzn1ciz22wl15zwkqs3r7gjw60kh59brd7ib")))) > (build-system qt-build-system) > (arguments > (list apply, and switch to git-fetch. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 08/26] gnu: pam-u2f: Update to 1.3.0. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (5 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 07/26] gnu: wireshark: Update to 4.4.1. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 09/26] gnu: darkhttpd: Update to 1.16. " Nicolas Graves via Guix-patches via ` (18 subsequent siblings) 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2021-31924. * gnu/packages/security-token.scm (pam-u2f): Update to 1.3.0. [inputs]: Add libfido2, openssl. Remove libu2f-host, libu2f-server. [native-inputs]: Sort packages. --- gnu/packages/security-token.scm | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/gnu/packages/security-token.scm b/gnu/packages/security-token.scm index 5abb461c0c..156a7d5e28 100644 --- a/gnu/packages/security-token.scm +++ b/gnu/packages/security-token.scm @@ -682,7 +682,7 @@ (define-public libu2f-server (define-public pam-u2f (package (name "pam-u2f") - (version "1.0.8") + (version "1.3.0") (source (origin (method git-fetch) (uri @@ -691,17 +691,16 @@ (define-public pam-u2f (commit (string-append "pam_u2f-" version)))) (file-name (git-file-name name version)) (sha256 - (base32 - "04d9davyi33gqbvga1rvh9fijp6f16mx2xmnn4n61rnhcn2jac98")))) + (base32 "1swvys98mw7ailllgqicvhj315qajhvqrmm314cp3bj0l76s9qpv")))) (build-system gnu-build-system) (arguments `(#:configure-flags (list (string-append "--with-pam-dir=" (assoc-ref %outputs "out") "/lib/security")))) (inputs - (list libu2f-host libu2f-server linux-pam)) + (list libfido2 linux-pam openssl)) (native-inputs - (list autoconf automake libtool asciidoc pkg-config)) + (list asciidoc autoconf automake libtool pkg-config)) (home-page "https://developers.yubico.com/pam-u2f/") (synopsis "PAM module for U2F authentication") (description -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 09/26] gnu: darkhttpd: Update to 1.16. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (6 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 08/26] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-04 9:40 ` Z572 2024-11-03 16:02 ` [bug#74035] [PATCH v2 10/26] gnu: xlsxio: Update to 0.2.35. " Nicolas Graves via Guix-patches via ` (17 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2024-23770 and CVE-2024-23771. * gnu/packages/web.scm (darkhttpd): Update to 1.16. [arguments]: Improve style. --- gnu/packages/web.scm | 24 +++++++++++------------- 1 file changed, 11 insertions(+), 13 deletions(-) diff --git a/gnu/packages/web.scm b/gnu/packages/web.scm index 34739bf088..eb27d3448c 100644 --- a/gnu/packages/web.scm +++ b/gnu/packages/web.scm @@ -6417,7 +6417,7 @@ (define-public surfraw (define-public darkhttpd (package (name "darkhttpd") - (version "1.13") + (version "1.16") (source (origin (method git-fetch) @@ -6426,20 +6426,18 @@ (define-public darkhttpd (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "0w11xq160q9yyffv4mw9ncp1n0dl50d9plmwxb0yijaaxls9i4sk")))) + (base32 "15mmq1v8p50mm9wx5w6g4rlr40b7d044lw7rs1wyzdiw9lcnihvm")))) (build-system gnu-build-system) (arguments - `(#:make-flags - (list (string-append "CC=" ,(cc-for-target))) - #:tests? #f ; No test suite - #:phases - (modify-phases %standard-phases - (delete 'configure) ; no configure script - (replace 'install - (lambda* (#:key outputs #:allow-other-keys) - (install-file "darkhttpd" - (string-append (assoc-ref outputs "out") - "/bin"))))))) + (list + #:make-flags #~(list (string-append "CC=" #$(cc-for-target))) + #:tests? #f ; No test suite + #:phases + #~(modify-phases %standard-phases + (delete 'configure) ; no configure script + (replace 'install + (lambda _ + (install-file "darkhttpd" (string-append #$output "/bin"))))))) (synopsis "Simple static web server") (description "darkhttpd is a simple static web server. It is standalone and does not need inetd or ucspi-tcp. It does not need any -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 09/26] gnu: darkhttpd: Update to 1.16. [security fixes] 2024-11-03 16:02 ` [bug#74035] [PATCH v2 09/26] gnu: darkhttpd: Update to 1.16. " Nicolas Graves via Guix-patches via @ 2024-11-04 9:40 ` Z572 0 siblings, 0 replies; 88+ messages in thread From: Z572 @ 2024-11-04 9:40 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 2186 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2024-23770 and CVE-2024-23771. > > * gnu/packages/web.scm (darkhttpd): Update to 1.16. > [arguments]: Improve style. > --- > gnu/packages/web.scm | 24 +++++++++++------------- > 1 file changed, 11 insertions(+), 13 deletions(-) > > diff --git a/gnu/packages/web.scm b/gnu/packages/web.scm > index 34739bf088..eb27d3448c 100644 > --- a/gnu/packages/web.scm > +++ b/gnu/packages/web.scm > @@ -6417,7 +6417,7 @@ (define-public surfraw > (define-public darkhttpd > (package > (name "darkhttpd") > - (version "1.13") > + (version "1.16") > (source > (origin > (method git-fetch) > @@ -6426,20 +6426,18 @@ (define-public darkhttpd > (commit (string-append "v" version)))) > (file-name (git-file-name name version)) > (sha256 > - (base32 "0w11xq160q9yyffv4mw9ncp1n0dl50d9plmwxb0yijaaxls9i4sk")))) > + (base32 "15mmq1v8p50mm9wx5w6g4rlr40b7d044lw7rs1wyzdiw9lcnihvm")))) > (build-system gnu-build-system) > (arguments > - `(#:make-flags > - (list (string-append "CC=" ,(cc-for-target))) > - #:tests? #f ; No test suite > - #:phases > - (modify-phases %standard-phases > - (delete 'configure) ; no configure script > - (replace 'install > - (lambda* (#:key outputs #:allow-other-keys) > - (install-file "darkhttpd" > - (string-append (assoc-ref outputs "out") > - "/bin"))))))) > + (list > + #:make-flags #~(list (string-append "CC=" #$(cc-for-target))) > + #:tests? #f ; No test suite > + #:phases > + #~(modify-phases %standard-phases > + (delete 'configure) ; no configure script > + (replace 'install > + (lambda _ > + (install-file "darkhttpd" (string-append #$output "/bin"))))))) > (synopsis "Simple static web server") > (description "darkhttpd is a simple static web server. It is > standalone and does not need inetd or ucspi-tcp. It does not need any apply, and enable tests. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 10/26] gnu: xlsxio: Update to 0.2.35. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (7 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 09/26] gnu: darkhttpd: Update to 1.16. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-04 16:12 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 11/26] gnu: pypy: Update to 7.3.17. " Nicolas Graves via Guix-patches via ` (16 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-34795. * gnu/packages/xml.scm (xlsxio): Update to 0.2.35. --- gnu/packages/xml.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/xml.scm b/gnu/packages/xml.scm index cfd53a291a..4a3936b66d 100644 --- a/gnu/packages/xml.scm +++ b/gnu/packages/xml.scm @@ -1545,7 +1545,7 @@ (define-public xerces-c (define-public xlsxio (package (name "xlsxio") - (version "0.2.33") + (version "0.2.35") (source (origin (method git-fetch) @@ -1554,7 +1554,7 @@ (define-public xlsxio (commit version))) (file-name (git-file-name name version)) (sha256 - (base32 "16i3yd168kb63za7jpycpb2by4831gz7wi90vzifdf85csc8c70s")))) + (base32 "140ap2l3qy27z1fhqpkq3a44aikhr3v5zlnm9m8vag42qiagiznx")))) (native-inputs (list expat gnu-make minizip which)) (build-system gnu-build-system) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 10/26] gnu: xlsxio: Update to 0.2.35. [security fixes] 2024-11-03 16:02 ` [bug#74035] [PATCH v2 10/26] gnu: xlsxio: Update to 0.2.35. " Nicolas Graves via Guix-patches via @ 2024-11-04 16:12 ` Zheng Junjie 0 siblings, 0 replies; 88+ messages in thread From: Zheng Junjie @ 2024-11-04 16:12 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 1039 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2023-34795. > > * gnu/packages/xml.scm (xlsxio): Update to 0.2.35. > --- > gnu/packages/xml.scm | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/gnu/packages/xml.scm b/gnu/packages/xml.scm > index cfd53a291a..4a3936b66d 100644 > --- a/gnu/packages/xml.scm > +++ b/gnu/packages/xml.scm > @@ -1545,7 +1545,7 @@ (define-public xerces-c > (define-public xlsxio > (package > (name "xlsxio") > - (version "0.2.33") > + (version "0.2.35") > (source > (origin > (method git-fetch) > @@ -1554,7 +1554,7 @@ (define-public xlsxio > (commit version))) > (file-name (git-file-name name version)) > (sha256 > - (base32 "16i3yd168kb63za7jpycpb2by4831gz7wi90vzifdf85csc8c70s")))) > + (base32 "140ap2l3qy27z1fhqpkq3a44aikhr3v5zlnm9m8vag42qiagiznx")))) > (native-inputs > (list expat gnu-make minizip which)) > (build-system gnu-build-system) apply [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 11/26] gnu: pypy: Update to 7.3.17. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (8 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 10/26] gnu: xlsxio: Update to 0.2.35. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-04 9:39 ` Z572 2024-11-03 16:02 ` [bug#74035] [PATCH v2 12/26] gnu: indent: Remove uneeded arguments Nicolas Graves via Guix-patches via ` (15 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2022-37454. * gnu/packages/pypy.scm (pypy): Update to 7.3.17. --- gnu/packages/pypy.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/pypy.scm b/gnu/packages/pypy.scm index a39621b5ad..90986ac096 100644 --- a/gnu/packages/pypy.scm +++ b/gnu/packages/pypy.scm @@ -42,14 +42,14 @@ (define-module (gnu packages pypy) (define-public pypy (package (name "pypy") - (version "7.3.13") + (version "7.3.17") (source (origin (method url-fetch) (uri (string-append "https://downloads.python.org/pypy/" "pypy3.10-v" version "-src.tar.bz2")) (sha256 (base32 - "0v9s6pwrnaxqi5h1pvmaphj6kgyczx07ykl07hcx656h34y77haa")))) + "1xsbn9mbxi2kai4gg1nz6n6cbqsq60qh65f5l6ld7ip9g32lpmva")))) (build-system gnu-build-system) (arguments (list -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 11/26] gnu: pypy: Update to 7.3.17. [security fixes] 2024-11-03 16:02 ` [bug#74035] [PATCH v2 11/26] gnu: pypy: Update to 7.3.17. " Nicolas Graves via Guix-patches via @ 2024-11-04 9:39 ` Z572 0 siblings, 0 replies; 88+ messages in thread From: Z572 @ 2024-11-04 9:39 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 1063 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2022-37454. > > * gnu/packages/pypy.scm (pypy): Update to 7.3.17. > --- > gnu/packages/pypy.scm | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/gnu/packages/pypy.scm b/gnu/packages/pypy.scm > index a39621b5ad..90986ac096 100644 > --- a/gnu/packages/pypy.scm > +++ b/gnu/packages/pypy.scm > @@ -42,14 +42,14 @@ (define-module (gnu packages pypy) > (define-public pypy > (package > (name "pypy") > - (version "7.3.13") > + (version "7.3.17") > (source (origin > (method url-fetch) > (uri (string-append "https://downloads.python.org/pypy/" > "pypy3.10-v" version "-src.tar.bz2")) > (sha256 > (base32 > - "0v9s6pwrnaxqi5h1pvmaphj6kgyczx07ykl07hcx656h34y77haa")))) > + "1xsbn9mbxi2kai4gg1nz6n6cbqsq60qh65f5l6ld7ip9g32lpmva")))) > (build-system gnu-build-system) > (arguments > (list apply [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 12/26] gnu: indent: Remove uneeded arguments. 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (9 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 11/26] gnu: pypy: Update to 7.3.17. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 13/26] gnu: indent: Add patch for CVE-2024-0911. [security fixes] Nicolas Graves via Guix-patches via ` (14 subsequent siblings) 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves * gnu/packages/code.scm (indent) [arguments]: Remove field. [native-inputs]: Remove automake. --- gnu/packages/code.scm | 27 +-------------------------- 1 file changed, 1 insertion(+), 26 deletions(-) diff --git a/gnu/packages/code.scm b/gnu/packages/code.scm index 3f7a6de478..b1523f5ac7 100644 --- a/gnu/packages/code.scm +++ b/gnu/packages/code.scm @@ -881,33 +881,8 @@ (define-public indent (sha256 (base32 "15c0ayp9rib7hzvrcxm5ijs0mpagw5y8kf5w0jr9fryfqi7n6r4y")))) (build-system gnu-build-system) - (arguments - `(#:phases - (modify-phases %standard-phases - (add-after 'unpack 'fix-docdir - (lambda _ - ;; Although indent uses a modern autoconf in which docdir - ;; defaults to PREFIX/share/doc, the doc/Makefile.am - ;; overrides this to be in PREFIX/doc. Fix this. - (substitute* "doc/Makefile.in" - (("^docdir = .*$") "docdir = @docdir@\n")) - #t)) - (add-after 'unpack 'fix-configure - (lambda* (#:key inputs native-inputs #:allow-other-keys) - ;; Replace outdated config.sub and config.guess: - (with-directory-excursion "config" - (for-each (lambda (file) - (install-file - (string-append (assoc-ref - (or native-inputs inputs) "automake") - "/share/automake-" - ,(version-major+minor - (package-version automake)) - "/" file) ".")) - '("config.sub" "config.guess"))) - #t))))) (native-inputs - (list texinfo automake)) ; For up to date 'config.guess' and 'config.sub'. + (list texinfo)) (synopsis "Code reformatter") (description "Indent is a program that makes source code easier to read by -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 13/26] gnu: indent: Add patch for CVE-2024-0911. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (10 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 12/26] gnu: indent: Remove uneeded arguments Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 14/26] gnu: squashfs-tools: Update to 4.6.1. " Nicolas Graves via Guix-patches via ` (13 subsequent siblings) 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves * gnu/packages/patches/indent-CVE-2024-0911.patch: Add patch here... * gnu/local.mk: ...here... * gnu/packages/code.scm (indent)[source]<origin>: ...and here. --- gnu/local.mk | 1 + gnu/packages/code.scm | 4 +- .../patches/indent-CVE-2024-0911.patch | 61 +++++++++++++++++++ 3 files changed, 65 insertions(+), 1 deletion(-) create mode 100644 gnu/packages/patches/indent-CVE-2024-0911.patch diff --git a/gnu/local.mk b/gnu/local.mk index 3b94e6cc7e..06e8f1363c 100644 --- a/gnu/local.mk +++ b/gnu/local.mk @@ -1562,6 +1562,7 @@ dist_patch_DATA = \ %D%/packages/patches/idris-test-ffi008.patch \ %D%/packages/patches/igraph-fix-varargs-integer-size.patch \ %D%/packages/patches/ilmbase-fix-tests.patch \ + %D%/packages/patches/indent-CVE-2024-0911.patch \ %D%/packages/patches/instead-use-games-path.patch \ %D%/packages/patches/intltool-perl-compatibility.patch \ %D%/packages/patches/irrlicht-use-system-libs.patch \ diff --git a/gnu/packages/code.scm b/gnu/packages/code.scm index b1523f5ac7..04ca4dfd6b 100644 --- a/gnu/packages/code.scm +++ b/gnu/packages/code.scm @@ -879,7 +879,9 @@ (define-public indent (uri (string-append "mirror://gnu/indent/indent-" version ".tar.gz")) (sha256 - (base32 "15c0ayp9rib7hzvrcxm5ijs0mpagw5y8kf5w0jr9fryfqi7n6r4y")))) + (base32 "15c0ayp9rib7hzvrcxm5ijs0mpagw5y8kf5w0jr9fryfqi7n6r4y")) + ;; Remove patch when updating. + (patches (search-patches "indent-CVE-2024-0911.patch")))) (build-system gnu-build-system) (native-inputs (list texinfo)) diff --git a/gnu/packages/patches/indent-CVE-2024-0911.patch b/gnu/packages/patches/indent-CVE-2024-0911.patch new file mode 100644 index 0000000000..4687d3f59a --- /dev/null +++ b/gnu/packages/patches/indent-CVE-2024-0911.patch @@ -0,0 +1,61 @@ +Upstream issue: https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00001.html +Signed-off-by: Petr Písař <ppisar@redhat.com> +--- + regression/TEST | 2 +- + regression/input/comment-parent-heap-underread.c | 3 +++ + regression/standard/comment-parent-heap-underread.c | 5 +++++ + src/output.c | 2 +- + 4 files changed, 10 insertions(+), 2 deletions(-) + create mode 100644 regression/input/comment-parent-heap-underread.c + create mode 100644 regression/standard/comment-parent-heap-underread.c + +diff --git a/regression/TEST b/regression/TEST +index 7c07c2e..951b1a2 100755 +--- a/regression/TEST ++++ b/regression/TEST +@@ -40,6 +40,7 @@ BUGS="case-label.c one-line-1.c one-line-2.c one-line-3.c \ + macro.c enum.c elif.c nested.c wrapped-string.c minus_predecrement.c \ + bug-gnu-33364.c float-constant-suffix.c block-comments.c \ +- no-forced-nl-in-block-init.c hexadecimal_float.c binary-constant.c" ++ no-forced-nl-in-block-init.c hexadecimal_float.c binary-constant.c \ ++ comment-parent-heap-underread.c" + + INDENTSRC="args.c backup.h backup.c dirent_def.h globs.c indent.h \ + indent.c indent_globs.h io.c lexi.c memcpy.c parse.c pr_comment.c \ +diff --git a/regression/input/comment-parent-heap-underread.c +b/regression/input/comment-parent-heap-underread.c +new file mode 100644 +index 0000000..68e13cf +--- /dev/null ++++ b/regression/input/comment-parent-heap-underread.c +@@ -0,0 +1,3 @@ ++void foo(void) { ++/*a*/(1); ++} +diff --git a/regression/standard/comment-parent-heap-underread.c +b/regression/standard/comment-parent-heap-underread.c +new file mode 100644 +index 0000000..9a1c6e3 +--- /dev/null ++++ b/regression/standard/comment-parent-heap-underread.c +@@ -0,0 +1,5 @@ ++void ++foo (void) ++{ ++/*a*/ (1); ++} +diff --git a/src/output.c b/src/output.c +index ee01bcc..17eee6e 100644 +--- a/src/output.c ++++ b/src/output.c +@@ -290,7 +290,7 @@ void set_buf_break ( + /* Did we just parse a bracket that will be put on the next line + * by this line break? */ + +- if ((*token == '(') || (*token == '[')) ++ if (level > 0 && ((*token == '(') || (*token == '['))) + { + --level; /* then don't take it into account */ + } +-- +2.43.0 -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 14/26] gnu: squashfs-tools: Update to 4.6.1. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (11 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 13/26] gnu: indent: Add patch for CVE-2024-0911. [security fixes] Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-04 11:59 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 15/26] gnu: shapelib: Update to 1.6.1. " Nicolas Graves via Guix-patches via ` (12 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2021-40153 and CVE-2021-41072. * gnu/packages/compression.scm (squashfs-tools): Update to 4.6.1. [arguments]: Improve style. <#:make-flags>: Add INSTALL_MANPAGES_DIR value. <#:phases>: Remove phase 'install-documentation. Add phase 'patch-generated-source-shebangs. [native-inputs]: Add coreutils-minimal, help2man, which. [inputs]: Rewrite. --- gnu/packages/compression.scm | 52 ++++++++++++++++++------------------ 1 file changed, 26 insertions(+), 26 deletions(-) diff --git a/gnu/packages/compression.scm b/gnu/packages/compression.scm index 97696ff0ef..7627717db6 100644 --- a/gnu/packages/compression.scm +++ b/gnu/packages/compression.scm @@ -1023,7 +1023,7 @@ (define-public lz4 (define-public squashfs-tools (package (name "squashfs-tools") - (version "4.5") + (version "4.6.1") (source (origin (method git-fetch) @@ -1032,34 +1032,34 @@ (define-public squashfs-tools (commit version))) (file-name (git-file-name name version)) (sha256 - (base32 "18d4nwa22vgb8j2badngjngw63f0lj501cvlh3920wqy2mqxwav6")))) + (base32 "14nisidxx2d2qivyv7xfcg59qkj4fjiniir7nvymazdsng63gcr1")))) (build-system gnu-build-system) (arguments - `(#:tests? #f ; no check target - #:make-flags - (list (string-append "CC=" ,(cc-for-target)) - "XZ_SUPPORT=1" - "LZO_SUPPORT=1" - "LZ4_SUPPORT=1" - "ZSTD_SUPPORT=1" - (string-append "INSTALL_DIR=" (assoc-ref %outputs "out") "/bin")) - #:phases - (modify-phases %standard-phases - (replace 'configure - (lambda _ - (chdir "squashfs-tools"))) - (add-after 'install 'install-documentation - ;; Install what very little usage documentation is provided. - (lambda* (#:key outputs #:allow-other-keys) - (let* ((out (assoc-ref outputs "out")) - (doc (string-append out "/share/doc/" ,name))) - (install-file "../USAGE" doc))))))) + (list + #:tests? #f ; no check target + #:make-flags + #~(list + (string-append "CC=" #$(cc-for-target)) + "XZ_SUPPORT=1" + "LZO_SUPPORT=1" + "LZ4_SUPPORT=1" + "ZSTD_SUPPORT=1" + (string-append "INSTALL_DIR=" #$output "/bin") + (string-append "INSTALL_MANPAGES_DIR=" #$output "/share/man/man1")) + #:phases + #~(modify-phases %standard-phases + (replace 'configure + (lambda _ + (chdir "squashfs-tools"))) + (add-after 'patch-source-shebangs 'patch-generated-source-shebangs + (lambda _ + (substitute* (find-files "generate-manpages" "\\.sh") + (("print \"#!/bin/sh") + (string-append "print \"#!" (which "sh"))))))))) + (native-inputs + (list coreutils-minimal help2man which)) (inputs - `(("lz4" ,lz4) - ("lzo" ,lzo) - ("xz" ,xz) - ("zlib" ,zlib) - ("zstd:lib" ,zstd "lib"))) + (list lz4 lzo xz zlib `(,zstd "lib"))) (home-page "https://github.com/plougher/squashfs-tools") (synopsis "Tools to create and extract squashfs file systems") (description -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 14/26] gnu: squashfs-tools: Update to 4.6.1. [security fixes] 2024-11-03 16:02 ` [bug#74035] [PATCH v2 14/26] gnu: squashfs-tools: Update to 4.6.1. " Nicolas Graves via Guix-patches via @ 2024-11-04 11:59 ` Zheng Junjie 0 siblings, 0 replies; 88+ messages in thread From: Zheng Junjie @ 2024-11-04 11:59 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 3531 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2021-40153 and CVE-2021-41072. > > * gnu/packages/compression.scm (squashfs-tools): Update to 4.6.1. > [arguments]: Improve style. > <#:make-flags>: Add INSTALL_MANPAGES_DIR value. > <#:phases>: Remove phase 'install-documentation. Add phase > 'patch-generated-source-shebangs. > [native-inputs]: Add coreutils-minimal, help2man, which. > [inputs]: Rewrite. > --- > gnu/packages/compression.scm | 52 ++++++++++++++++++------------------ > 1 file changed, 26 insertions(+), 26 deletions(-) > > diff --git a/gnu/packages/compression.scm b/gnu/packages/compression.scm > index 97696ff0ef..7627717db6 100644 > --- a/gnu/packages/compression.scm > +++ b/gnu/packages/compression.scm > @@ -1023,7 +1023,7 @@ (define-public lz4 > (define-public squashfs-tools > (package > (name "squashfs-tools") > - (version "4.5") > + (version "4.6.1") > (source > (origin > (method git-fetch) > @@ -1032,34 +1032,34 @@ (define-public squashfs-tools > (commit version))) > (file-name (git-file-name name version)) > (sha256 > - (base32 "18d4nwa22vgb8j2badngjngw63f0lj501cvlh3920wqy2mqxwav6")))) > + (base32 "14nisidxx2d2qivyv7xfcg59qkj4fjiniir7nvymazdsng63gcr1")))) > (build-system gnu-build-system) > (arguments > - `(#:tests? #f ; no check target > - #:make-flags > - (list (string-append "CC=" ,(cc-for-target)) > - "XZ_SUPPORT=1" > - "LZO_SUPPORT=1" > - "LZ4_SUPPORT=1" > - "ZSTD_SUPPORT=1" > - (string-append "INSTALL_DIR=" (assoc-ref %outputs "out") "/bin")) > - #:phases > - (modify-phases %standard-phases > - (replace 'configure > - (lambda _ > - (chdir "squashfs-tools"))) > - (add-after 'install 'install-documentation > - ;; Install what very little usage documentation is provided. > - (lambda* (#:key outputs #:allow-other-keys) > - (let* ((out (assoc-ref outputs "out")) > - (doc (string-append out "/share/doc/" ,name))) > - (install-file "../USAGE" doc))))))) > + (list > + #:tests? #f ; no check target > + #:make-flags > + #~(list > + (string-append "CC=" #$(cc-for-target)) > + "XZ_SUPPORT=1" > + "LZO_SUPPORT=1" > + "LZ4_SUPPORT=1" > + "ZSTD_SUPPORT=1" > + (string-append "INSTALL_DIR=" #$output "/bin") > + (string-append "INSTALL_MANPAGES_DIR=" #$output "/share/man/man1")) > + #:phases > + #~(modify-phases %standard-phases > + (replace 'configure > + (lambda _ > + (chdir "squashfs-tools"))) > + (add-after 'patch-source-shebangs 'patch-generated-source-shebangs > + (lambda _ > + (substitute* (find-files "generate-manpages" "\\.sh") > + (("print \"#!/bin/sh") > + (string-append "print \"#!" (which "sh"))))))))) > + (native-inputs > + (list coreutils-minimal help2man which)) > (inputs > - `(("lz4" ,lz4) > - ("lzo" ,lzo) > - ("xz" ,xz) > - ("zlib" ,zlib) > - ("zstd:lib" ,zstd "lib"))) > + (list lz4 lzo xz zlib `(,zstd "lib"))) > (home-page "https://github.com/plougher/squashfs-tools") > (synopsis "Tools to create and extract squashfs file systems") > (description apply [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 15/26] gnu: shapelib: Update to 1.6.1. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (12 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 14/26] gnu: squashfs-tools: Update to 4.6.1. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 16/26] gnu: libzapojit: Update to 0.0.3-1.99d49ba. " Nicolas Graves via Guix-patches via ` (11 subsequent siblings) 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2022-0699. * gnu/packages/geo.scm (shapelib): Update to 1.6.1. --- gnu/packages/geo.scm | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/gnu/packages/geo.scm b/gnu/packages/geo.scm index 5d120b3c98..affa50c515 100644 --- a/gnu/packages/geo.scm +++ b/gnu/packages/geo.scm @@ -2574,7 +2574,7 @@ (define-public readosm (define-public shapelib (package (name "shapelib") - (version "1.5.0") + (version "1.6.1") (source (origin (method git-fetch) @@ -2583,7 +2583,7 @@ (define-public shapelib (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "1lzch0jf6yqhw391phhafzw4ghmiz98zkf698h4fmq109fa2vhqd")))) + (base32 "0l67gp1618lcw7fg2iclbh016cqyw85s3cmd3qzx6aw0jq19hj8n")))) (build-system gnu-build-system) (native-inputs (list autoconf automake libtool)) @@ -2591,8 +2591,8 @@ (define-public shapelib (synopsis "Provides C library to write and update ESRI Shapefiles") (description "The Shapefile C Library provides the ability to write simple C programs -for reading, writing and updating (to a limited extent) ESRI Shapefiles, and the -associated attribute file (@file{.dbf}).") +for reading, writing and updating (to a limited extent) ESRI Shapefiles, and +the associated attribute file (@file{.dbf}).") (license license:gpl2+))) (define-public spatialite-tools -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 16/26] gnu: libzapojit: Update to 0.0.3-1.99d49ba. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (13 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 15/26] gnu: shapelib: Update to 1.6.1. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-04 16:06 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 17/26] gnu: gifsicle: Update to 1.95. " Nicolas Graves via Guix-patches via ` (10 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2021-39360. * gnu/packages/gnome.scm (libzapojit): Update to 0.0.3-1.99d49ba. --- gnu/packages/gnome.scm | 45 ++++++++++++++++++++++-------------------- 1 file changed, 24 insertions(+), 21 deletions(-) diff --git a/gnu/packages/gnome.scm b/gnu/packages/gnome.scm index 77a0633b50..82ea9d6699 100644 --- a/gnu/packages/gnome.scm +++ b/gnu/packages/gnome.scm @@ -10591,28 +10591,31 @@ (define-public gsound (license license:lgpl2.1+))) (define-public libzapojit - (package - (name "libzapojit") - (version "0.0.3") - (source (origin - (method url-fetch) - (uri (string-append "mirror://gnome/sources/" name "/" - (version-major+minor version) "/" - name "-" version ".tar.xz")) - (sha256 - (base32 - "0zn3s7ryjc3k1abj4k55dr2na844l451nrg9s6cvnnhh569zj99x")))) - (build-system gnu-build-system) - (native-inputs - (list gobject-introspection intltool pkg-config)) - (inputs - (list gnome-online-accounts json-glib rest)) - (home-page "https://wiki.gnome.org/Projects/Zapojit") - (synopsis "Library for accessing SkyDrive and Hotmail") - (description - "Libzapojit is a GLib-based library for accessing online service APIs of + (let ((revision "1") + (commit "99d49bac5edc4afdcac742a0a142908e405597b0")) + (package + (name "libzapojit") + (version (git-version "0.0.3" revision commit)) + (source + (origin + (method git-fetch) + (uri (git-reference + (url "https://gitlab.gnome.org/Archive/libzapojit") + (commit commit))) + (file-name (git-file-name name version)) + (sha256 + (base32 "12frqg925rmic3rf37h5vs48xdy3mfi4ip24v0bl73h5sxy8n828")))) + (build-system gnu-build-system) + (native-inputs + (list gobject-introspection intltool pkg-config)) + (inputs + (list gnome-online-accounts json-glib rest)) + (home-page "https://wiki.gnome.org/Projects/Zapojit") + (synopsis "Library for accessing SkyDrive and Hotmail") + (description + "Libzapojit is a GLib-based library for accessing online service APIs of Microsoft SkyDrive and Hotmail, using their REST protocols.") - (license license:lgpl2.1+))) + (license license:lgpl2.1+)))) (define-public gnome-clocks (package -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 16/26] gnu: libzapojit: Update to 0.0.3-1.99d49ba. [security fixes] 2024-11-03 16:02 ` [bug#74035] [PATCH v2 16/26] gnu: libzapojit: Update to 0.0.3-1.99d49ba. " Nicolas Graves via Guix-patches via @ 2024-11-04 16:06 ` Zheng Junjie 0 siblings, 0 replies; 88+ messages in thread From: Zheng Junjie @ 2024-11-04 16:06 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 2783 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2021-39360. > > * gnu/packages/gnome.scm (libzapojit): Update to 0.0.3-1.99d49ba. > --- > gnu/packages/gnome.scm | 45 ++++++++++++++++++++++-------------------- > 1 file changed, 24 insertions(+), 21 deletions(-) > > diff --git a/gnu/packages/gnome.scm b/gnu/packages/gnome.scm > index 77a0633b50..82ea9d6699 100644 > --- a/gnu/packages/gnome.scm > +++ b/gnu/packages/gnome.scm > @@ -10591,28 +10591,31 @@ (define-public gsound > (license license:lgpl2.1+))) > > (define-public libzapojit > - (package > - (name "libzapojit") > - (version "0.0.3") > - (source (origin > - (method url-fetch) > - (uri (string-append "mirror://gnome/sources/" name "/" > - (version-major+minor version) "/" > - name "-" version ".tar.xz")) > - (sha256 > - (base32 > - "0zn3s7ryjc3k1abj4k55dr2na844l451nrg9s6cvnnhh569zj99x")))) > - (build-system gnu-build-system) > - (native-inputs > - (list gobject-introspection intltool pkg-config)) > - (inputs > - (list gnome-online-accounts json-glib rest)) > - (home-page "https://wiki.gnome.org/Projects/Zapojit") > - (synopsis "Library for accessing SkyDrive and Hotmail") > - (description > - "Libzapojit is a GLib-based library for accessing online service APIs of > + (let ((revision "1") > + (commit "99d49bac5edc4afdcac742a0a142908e405597b0")) > + (package > + (name "libzapojit") > + (version (git-version "0.0.3" revision commit)) > + (source > + (origin > + (method git-fetch) > + (uri (git-reference > + (url "https://gitlab.gnome.org/Archive/libzapojit") > + (commit commit))) > + (file-name (git-file-name name version)) > + (sha256 > + (base32 "12frqg925rmic3rf37h5vs48xdy3mfi4ip24v0bl73h5sxy8n828")))) > + (build-system gnu-build-system) > + (native-inputs > + (list gobject-introspection intltool pkg-config)) > + (inputs > + (list gnome-online-accounts json-glib rest)) > + (home-page "https://wiki.gnome.org/Projects/Zapojit") > + (synopsis "Library for accessing SkyDrive and Hotmail") > + (description > + "Libzapojit is a GLib-based library for accessing online service APIs of > Microsoft SkyDrive and Hotmail, using their REST protocols.") > - (license license:lgpl2.1+))) > + (license license:lgpl2.1+)))) > > (define-public gnome-clocks > (package apply, and add autoconf, autoconf-archive, automake, glib:bin and libtool to fix build. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 17/26] gnu: gifsicle: Update to 1.95. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (14 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 16/26] gnu: libzapojit: Update to 0.0.3-1.99d49ba. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-04 11:58 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 18/26] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via ` (9 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-44821 and CVE-2023-46009. * gnu/packages/image.scm (gifsicle): Update to 1.95. --- gnu/packages/image.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/image.scm b/gnu/packages/image.scm index 7f17c71aef..0d6593dc21 100644 --- a/gnu/packages/image.scm +++ b/gnu/packages/image.scm @@ -2172,14 +2172,14 @@ (define-public swappy (define-public gifsicle (package (name "gifsicle") - (version "1.94") + (version "1.95") (source (origin (method url-fetch) (uri (string-append "https://www.lcdf.org/gifsicle/gifsicle-" version ".tar.gz")) (sha256 - (base32 "16zq5wd6fyjgy0p0mak15k3mh1zpqb9rg6gqfpg215kqq02p1jab")))) + (base32 "0l69gn562l7a1l10zz1bfs756ipd682idgpk60qs3llz013icwdj")))) (build-system gnu-build-system) (arguments '(#:phases -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 17/26] gnu: gifsicle: Update to 1.95. [security fixes] 2024-11-03 16:02 ` [bug#74035] [PATCH v2 17/26] gnu: gifsicle: Update to 1.95. " Nicolas Graves via Guix-patches via @ 2024-11-04 11:58 ` Zheng Junjie 0 siblings, 0 replies; 88+ messages in thread From: Zheng Junjie @ 2024-11-04 11:58 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 1070 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2023-44821 and CVE-2023-46009. > > * gnu/packages/image.scm (gifsicle): Update to 1.95. > --- > gnu/packages/image.scm | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/gnu/packages/image.scm b/gnu/packages/image.scm > index 7f17c71aef..0d6593dc21 100644 > --- a/gnu/packages/image.scm > +++ b/gnu/packages/image.scm > @@ -2172,14 +2172,14 @@ (define-public swappy > (define-public gifsicle > (package > (name "gifsicle") > - (version "1.94") > + (version "1.95") > (source > (origin > (method url-fetch) > (uri (string-append "https://www.lcdf.org/gifsicle/gifsicle-" > version ".tar.gz")) > (sha256 > - (base32 "16zq5wd6fyjgy0p0mak15k3mh1zpqb9rg6gqfpg215kqq02p1jab")))) > + (base32 "0l69gn562l7a1l10zz1bfs756ipd682idgpk60qs3llz013icwdj")))) > (build-system gnu-build-system) > (arguments > '(#:phases apply, and build from git source, use g-expressions. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 18/26] gnu: sendmail: Update to 8.18.1. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (15 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 17/26] gnu: gifsicle: Update to 1.95. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 19/26] gnu: openvpn: Update to 2.6.12. " Nicolas Graves via Guix-patches via ` (8 subsequent siblings) 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-51765 and CVE-2021-3618. * gnu/packages/mail.scm (sendmail): Update to 8.18.1. --- gnu/packages/mail.scm | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/gnu/packages/mail.scm b/gnu/packages/mail.scm index 2c69a7b818..ca1a55818e 100644 --- a/gnu/packages/mail.scm +++ b/gnu/packages/mail.scm @@ -3122,7 +3122,7 @@ (define-public mhonarc (define-public sendmail (package (name "sendmail") - (version "8.15.2") + (version "8.18.1") (source (origin (method url-fetch) @@ -3130,8 +3130,7 @@ (define-public sendmail "ftp://ftp.sendmail.org/pub/sendmail/sendmail." version ".tar.gz")) (sha256 - (base32 - "0fdl9ndmspqspdlmghzxlaqk56j3yajk52d7jxcg21b7sxglpy94")))) + (base32 "0w07iw4imp9wvczd2mijns7zxl8p1wk29b9yrzvhcj4fqc4z7wfb")))) (build-system gnu-build-system) (arguments `(#:phases -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 19/26] gnu: openvpn: Update to 2.6.12. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (16 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 18/26] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 20/26] gnu: liblouis: Update to 3.31.0. " Nicolas Graves via Guix-patches via ` (7 subsequent siblings) 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves Thix fixes CVE-2024-24974, CVE-2024-27459 and CVE-2024-27903. * gnu/packages/vpn.scm (openvpn): Update to 2.6.12. --- gnu/packages/vpn.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/vpn.scm b/gnu/packages/vpn.scm index 9f36595bfd..193b247779 100644 --- a/gnu/packages/vpn.scm +++ b/gnu/packages/vpn.scm @@ -867,7 +867,7 @@ (define-public openfortivpn (define-public openvpn (package (name "openvpn") - (version "2.6.7") + (version "2.6.12") (source (origin (method url-fetch) (uri (string-append @@ -875,7 +875,7 @@ (define-public openvpn version ".tar.gz")) (sha256 (base32 - "04wr0g97nmv81javym8r99mglmb86v1i49xmnmzf938x1cs7g67f")))) + "0a8r3bvg4aic9b7dix0h7990g3j1gq17wd3w6vqk8vk8xgfhyq8w")))) (build-system gnu-build-system) (arguments '(#:configure-flags '("--enable-iproute2=yes"))) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 20/26] gnu: liblouis: Update to 3.31.0. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (17 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 19/26] gnu: openvpn: Update to 2.6.12. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-04 11:58 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 21/26] gnu: youtube-dl: Deprecate package Nicolas Graves via Guix-patches via ` (6 subsequent siblings) 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2022-26981. * gnu/packages/language.scm (liblouis): Update to 3.31.0. [arguments]: Improve style using gexps. [native-inputs]: Rewrite and replace python-wrapper by python. --- gnu/packages/language.scm | 47 ++++++++++++++++++--------------------- 1 file changed, 22 insertions(+), 25 deletions(-) diff --git a/gnu/packages/language.scm b/gnu/packages/language.scm index 78fcba4287..6a5e7927b4 100644 --- a/gnu/packages/language.scm +++ b/gnu/packages/language.scm @@ -10,6 +10,7 @@ ;;; Copyright © 2023 gemmaro <gemmaro.dev@gmail.com> ;;; Copyright © 2024 Efraim Flashner <efraim@flashner.co.il> ;;; Copyright © 2024 Charles <charles@charje.net> +;;; Copyright © 2024 Nicolas Graves <ngraves@ngraves.fr> ;;; ;;; This file is part of GNU Guix. ;;; @@ -338,7 +339,7 @@ (define-public libchewing (define-public liblouis (package (name "liblouis") - (version "3.15.0") + (version "3.31.0") (source (origin (method git-fetch) @@ -348,34 +349,30 @@ (define-public liblouis (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "1ljy5xsy7vf2r0ix0d7bqcr6qvr6897f8madsx9zlm1mrj31n5px")))) + (base32 "02bga2l4jiyrgfqdl27wszz5yd6h80n2dmq3p6nb2br83jywisfh")))) (build-system gnu-build-system) (outputs '("out" "bin" "doc" "python")) (arguments - `(#:configure-flags - (list - "--disable-static" - "--enable-ucs4") - #:phases - (modify-phases %standard-phases - (add-after 'install 'install-python-extension - (lambda* (#:key outputs #:allow-other-keys) - (with-directory-excursion "python" - (invoke "python" "setup.py" "install" - (string-append "--prefix=" - (assoc-ref outputs "python")) - "--root=/"))))))) + (list + #:configure-flags #~(list "--disable-static" "--enable-ucs4") + #:phases + #~(modify-phases %standard-phases + (add-after 'install 'install-python-extension + (lambda _ + (with-directory-excursion "python" + (invoke "python3" "setup.py" "install" "--root=/" + (string-append "--prefix=" #$output:python)))))))) (native-inputs - `(("autoconf" ,autoconf) - ("automake" ,automake) - ("clang-format" ,clang) - ("help2man" ,help2man) - ("libtool" ,libtool) - ("libyaml" ,libyaml) - ("makeinfo" ,texinfo) - ("perl" ,perl) - ("pkg-config" ,pkg-config) - ("python" ,python-wrapper))) + (list autoconf + automake + clang + help2man + libtool + libyaml + texinfo + perl + pkg-config + python)) (synopsis "Braille translator and back-translator") (description "Liblouis is a braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 20/26] gnu: liblouis: Update to 3.31.0. [security fixes] 2024-11-03 16:02 ` [bug#74035] [PATCH v2 20/26] gnu: liblouis: Update to 3.31.0. " Nicolas Graves via Guix-patches via @ 2024-11-04 11:58 ` Zheng Junjie 2024-11-06 16:09 ` Ludovic Courtès 0 siblings, 1 reply; 88+ messages in thread From: Zheng Junjie @ 2024-11-04 11:58 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 3465 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2022-26981. > > * gnu/packages/language.scm (liblouis): Update to 3.31.0. > [arguments]: Improve style using gexps. > [native-inputs]: Rewrite and replace python-wrapper by python. > --- > gnu/packages/language.scm | 47 ++++++++++++++++++--------------------- > 1 file changed, 22 insertions(+), 25 deletions(-) > > diff --git a/gnu/packages/language.scm b/gnu/packages/language.scm > index 78fcba4287..6a5e7927b4 100644 > --- a/gnu/packages/language.scm > +++ b/gnu/packages/language.scm > @@ -10,6 +10,7 @@ > ;;; Copyright © 2023 gemmaro <gemmaro.dev@gmail.com> > ;;; Copyright © 2024 Efraim Flashner <efraim@flashner.co.il> > ;;; Copyright © 2024 Charles <charles@charje.net> > +;;; Copyright © 2024 Nicolas Graves <ngraves@ngraves.fr> > ;;; > ;;; This file is part of GNU Guix. > ;;; > @@ -338,7 +339,7 @@ (define-public libchewing > (define-public liblouis > (package > (name "liblouis") > - (version "3.15.0") > + (version "3.31.0") > (source > (origin > (method git-fetch) > @@ -348,34 +349,30 @@ (define-public liblouis > (commit (string-append "v" version)))) > (file-name (git-file-name name version)) > (sha256 > - (base32 "1ljy5xsy7vf2r0ix0d7bqcr6qvr6897f8madsx9zlm1mrj31n5px")))) > + (base32 "02bga2l4jiyrgfqdl27wszz5yd6h80n2dmq3p6nb2br83jywisfh")))) > (build-system gnu-build-system) > (outputs '("out" "bin" "doc" "python")) > (arguments > - `(#:configure-flags > - (list > - "--disable-static" > - "--enable-ucs4") > - #:phases > - (modify-phases %standard-phases > - (add-after 'install 'install-python-extension > - (lambda* (#:key outputs #:allow-other-keys) > - (with-directory-excursion "python" > - (invoke "python" "setup.py" "install" > - (string-append "--prefix=" > - (assoc-ref outputs "python")) > - "--root=/"))))))) > + (list > + #:configure-flags #~(list "--disable-static" "--enable-ucs4") > + #:phases > + #~(modify-phases %standard-phases > + (add-after 'install 'install-python-extension > + (lambda _ > + (with-directory-excursion "python" > + (invoke "python3" "setup.py" "install" "--root=/" > + (string-append "--prefix=" #$output:python)))))))) > (native-inputs > - `(("autoconf" ,autoconf) > - ("automake" ,automake) > - ("clang-format" ,clang) > - ("help2man" ,help2man) > - ("libtool" ,libtool) > - ("libyaml" ,libyaml) > - ("makeinfo" ,texinfo) > - ("perl" ,perl) > - ("pkg-config" ,pkg-config) > - ("python" ,python-wrapper))) > + (list autoconf > + automake > + clang > + help2man > + libtool > + libyaml > + texinfo > + perl > + pkg-config > + python)) > (synopsis "Braille translator and back-translator") > (description "Liblouis is a braille translator and back-translator named in > honor of Louis Braille. It features support for computer and literary braille, apply, adjust message and use python-minimal, not python. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 20/26] gnu: liblouis: Update to 3.31.0. [security fixes] 2024-11-04 11:58 ` Zheng Junjie @ 2024-11-06 16:09 ` Ludovic Courtès 2024-11-07 11:21 ` Z572 0 siblings, 1 reply; 88+ messages in thread From: Ludovic Courtès @ 2024-11-06 16:09 UTC (permalink / raw) To: Zheng Junjie; +Cc: ngraves, 74035 Hi, Zheng Junjie <zhengjunjie@iscas.ac.cn> skribis: > Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > >> This fixes CVE-2022-26981. >> >> * gnu/packages/language.scm (liblouis): Update to 3.31.0. >> [arguments]: Improve style using gexps. >> [native-inputs]: Rewrite and replace python-wrapper by python. [...] > apply, adjust message and use python-minimal, not python. Apparently this broke liblouisutdml: <https://ci.guix.gnu.org/build/6336033/details>. Many test failures like this: --8<---------------cut here---------------start------------->8--- warning: lou_getDataPath is deprecated. ../../lbu_files/wiskunde.ctb:43: warning: class is deprecated, use attribute instead ../../lbu_files/wiskunde.ctb:44: warning: class is deprecated, use attribute instead ../../lbu_files/wiskunde.ctb:45: warning: class is deprecated, use attribute instead ../../lbu_files/wiskunde.ctb:46: warning: class is deprecated, use attribute instead ../../lbu_files/wiskunde.ctb:47: warning: class is deprecated, use attribute instead ../../lbu_files/wiskunde.ctb:49: warning: class is deprecated, use attribute instead unicode.dis,../../lbu_files/wiskunde.ctb,braille-patterns.cti: 6 warnings issued warning: lou_getDataPath is deprecated. FAIL test_mathml_woluwe/test_045.test (exit status: 1) --8<---------------cut here---------------end--------------->8--- Ludo’. ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 20/26] gnu: liblouis: Update to 3.31.0. [security fixes] 2024-11-06 16:09 ` Ludovic Courtès @ 2024-11-07 11:21 ` Z572 0 siblings, 0 replies; 88+ messages in thread From: Z572 @ 2024-11-07 11:21 UTC (permalink / raw) To: Ludovic Courtès; +Cc: 74035, ngraves [-- Attachment #1: Type: text/plain, Size: 1564 bytes --] Ludovic Courtès <ludo@gnu.org> writes: > Hi, > > Zheng Junjie <zhengjunjie@iscas.ac.cn> skribis: > >> Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: >> >>> This fixes CVE-2022-26981. >>> >>> * gnu/packages/language.scm (liblouis): Update to 3.31.0. >>> [arguments]: Improve style using gexps. >>> [native-inputs]: Rewrite and replace python-wrapper by python. > > [...] > >> apply, adjust message and use python-minimal, not python. > > Apparently this broke liblouisutdml: > <https://ci.guix.gnu.org/build/6336033/details>. > > Many test failures like this: > > --8<---------------cut here---------------start------------->8--- > warning: lou_getDataPath is deprecated. > ../../lbu_files/wiskunde.ctb:43: warning: class is deprecated, use attribute instead > ../../lbu_files/wiskunde.ctb:44: warning: class is deprecated, use attribute instead > ../../lbu_files/wiskunde.ctb:45: warning: class is deprecated, use attribute instead > ../../lbu_files/wiskunde.ctb:46: warning: class is deprecated, use attribute instead > ../../lbu_files/wiskunde.ctb:47: warning: class is deprecated, use attribute instead > ../../lbu_files/wiskunde.ctb:49: warning: class is deprecated, use attribute instead > unicode.dis,../../lbu_files/wiskunde.ctb,braille-patterns.cti: 6 warnings issued > warning: lou_getDataPath is deprecated. > FAIL test_mathml_woluwe/test_045.test (exit status: 1) > --8<---------------cut here---------------end--------------->8--- > > Ludo’. please try https://issues.guix.gnu.org/74238 [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 21/26] gnu: youtube-dl: Deprecate package. 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (18 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 20/26] gnu: liblouis: Update to 3.31.0. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 22/26] gnu: unicorn: Update to 2.1.1. [security fixes] Nicolas Graves via Guix-patches via ` (5 subsequent siblings) 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This package is not developped anymore. * gnu/packages/video.scm (youtube-dl): Deprecate package. --- gnu/packages/video.scm | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/gnu/packages/video.scm b/gnu/packages/video.scm index ff5dcd8daa..74cfabf6e7 100644 --- a/gnu/packages/video.scm +++ b/gnu/packages/video.scm @@ -93,6 +93,7 @@ (define-module (gnu packages video) #:use-module ((guix licenses) #:prefix license:) #:use-module (guix utils) #:use-module (guix packages) + #:use-module (guix deprecation) #:use-module (guix download) #:use-module (guix gexp) #:use-module (guix git-download) @@ -3085,7 +3086,7 @@ (define-public yle-dl video streaming services of the Finnish national broadcasting company Yle.") (license license:gpl3+))) -(define-public youtube-dl +(define-deprecated/public youtube-dl #f (package (name "youtube-dl") (version "2021.12.17") -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 22/26] gnu: unicorn: Update to 2.1.1. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (19 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 21/26] gnu: youtube-dl: Deprecate package Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 23/26] gnu: Add sexpp Nicolas Graves via Guix-patches via ` (4 subsequent siblings) 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves Thix fixes CVE-2021-4296. * gnu/packages/emulators.scm (unicorn): Update to 2.1.1. --- gnu/packages/emulators.scm | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/gnu/packages/emulators.scm b/gnu/packages/emulators.scm index f0a60c0b49..948e588c4c 100644 --- a/gnu/packages/emulators.scm +++ b/gnu/packages/emulators.scm @@ -3508,13 +3508,18 @@ (define-public zsnes (define-public unicorn (package (name "unicorn") - (version "2.0.1.post1") + (version "2.1.1") (source (origin (method url-fetch) (uri (pypi-uri name version)) (sha256 - (base32 "0mlfs8qfi0clyncfkbxp6in0cpl747510i6bqymwid43xcirbikz")))) + (base32 "18sbrycr62wcs3a68a9q76ihpahfsd4bn3mryvyhimwwn1342kwh")) + (modules '((guix build utils))) + ;; cmake files are not in the cmake dir in pypi + (snippet #~(substitute* "src/CMakeLists.txt" + (("include\\(cmake/") + "include("))))) (build-system pyproject-build-system) (native-inputs (list cmake pkg-config)) (home-page "https://www.unicorn-engine.org") -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 23/26] gnu: Add sexpp. 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (20 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 22/26] gnu: unicorn: Update to 2.1.1. [security fixes] Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 24/26] gnu: rnp: Update to 0.17.1. [security fixes] Nicolas Graves via Guix-patches via ` (3 subsequent siblings) 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves * gnu/packages/openpgp.scm (sexpp): New variable. --- gnu/packages/openpgp.scm | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) diff --git a/gnu/packages/openpgp.scm b/gnu/packages/openpgp.scm index 9b6f04b407..356908ab1f 100644 --- a/gnu/packages/openpgp.scm +++ b/gnu/packages/openpgp.scm @@ -1,5 +1,6 @@ ;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2020 Justus Winter <justus@sequoia-pgp.org> +;;; Copyright © 2024 Nicolas Graves <ngraves@ngraves.fr> ;;; ;;; This file is part of GNU Guix. ;;; @@ -157,3 +158,26 @@ (define-public rnp license:asl2.0 ;; Nominet UK's BSD 3-Clause License (netpgp). license:bsd-3))))) + +(define-public sexpp + (package + (name "sexpp") + (version "0.9.0") + (source + (origin + (method git-fetch) + (uri (git-reference + (url "https://github.com/rnpgp/sexpp") + (commit (string-append "v" version)))) + (file-name (git-file-name name version)) + (sha256 + (base32 "16y9f42w6ay3w0s23xmigqm0qi1swdfvc93g2xn3xkg1r4kpmnwq")))) + (build-system cmake-build-system) + (arguments + (list #:configure-flags '(list "-DDOWNLOAD_GTEST=off"))) + (native-inputs (list googletest pkg-config)) + (home-page "https://github.com/rnpgp/sexpp") + (synopsis "C++ library for S-expressions") + (description + "This package provides a C++ library for working with S-Expressions.") + (license license:expat))) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 24/26] gnu: rnp: Update to 0.17.1. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (21 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 23/26] gnu: Add sexpp Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 25/26] gnu: cjson: Update to 1.7.18. " Nicolas Graves via Guix-patches via ` (2 subsequent siblings) 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-29479 and CVE-2023-29480. * gnu/packages/openpgp.scm (rnp): Update to 0.17.1. [arguments]: Improve style using gexps. <#:phases>: Add phase 'inject-sexpp-source. [inputs]: Add sexpp. --- gnu/packages/openpgp.scm | 52 +++++++++++++++++++++++----------------- 1 file changed, 30 insertions(+), 22 deletions(-) diff --git a/gnu/packages/openpgp.scm b/gnu/packages/openpgp.scm index 356908ab1f..baf786c5ee 100644 --- a/gnu/packages/openpgp.scm +++ b/gnu/packages/openpgp.scm @@ -23,6 +23,7 @@ (define-module (gnu packages openpgp) #:use-module (guix git-download) #:use-module (guix build-system cmake) #:use-module (guix build-system gnu) + #:use-module (guix gexp) #:use-module ((guix licenses) #:prefix license:) #:use-module (gnu packages) #:use-module (gnu packages check) @@ -98,10 +99,10 @@ (define-public dkgpg (license license:gpl2+))) (define-public rnp - (let ((day-of-release "2022-09-22")) + (let ((day-of-release "2024-05-14")) (package (name "rnp") - (version "0.16.2") + (version "0.17.1") (source (origin (method git-fetch) (uri (git-reference @@ -110,33 +111,40 @@ (define-public rnp (file-name (git-file-name name version)) (sha256 (base32 - "13z5kxm48a72w4m2crwgdjdng4a4pwxsd72r2z3a4pcakfp2swi8")))) + "052872b6a88vkcc58alxcm532y6dra5qqd997jga41v72h3pnj4d")))) (build-system cmake-build-system) - (arguments `(#:configure-flags - '("-DBUILD_SHARED_LIBS=on" - "-DBUILD_TESTING=on" - "-DDOWNLOAD_GTEST=off" - "-DDOWNLOAD_RUBYRNP=off") - #:phases - (modify-phases %standard-phases - (add-after 'unpack 'patch-tests - (lambda _ - (substitute* "src/tests/support.cpp" - (("\"cp\"") (search-input-file inputs "/bin/cp"))))) - (replace 'check - (lambda* (#:key tests? #:allow-other-keys) - (when tests? - ;; Some OpenPGP certificates used by the tests expire. - ;; To work around that, set the time to roughly the - ;; release date. - (invoke "faketime" ,day-of-release "make" "test"))))))) + (arguments + (list + #:configure-flags + ''("-DBUILD_SHARED_LIBS=on" + "-DBUILD_TESTING=on" + "-DDOWNLOAD_GTEST=off" + "-DDOWNLOAD_RUBYRNP=off") + #:phases + #~(modify-phases %standard-phases + (add-after 'unpack 'patch-tests + (lambda _ + (substitute* "src/tests/support.cpp" + (("\"cp\"") (search-input-file inputs "/bin/cp"))))) + (add-after 'unpack 'inject-sexpp-source + (lambda _ + (rmdir "src/libsexpp") + (symlink #$(package-source (this-package-input "sexpp")) + "src/libsexpp"))) + (replace 'check + (lambda* (#:key tests? #:allow-other-keys) + (when tests? + ;; Some OpenPGP certificates used by the tests expire. + ;; To work around that, set the time to roughly the + ;; release date. + (invoke "faketime" #$day-of-release "make" "test"))))))) (native-inputs (list gnupg ; for tests googletest ; for tests libfaketime ; for tests pkg-config python)) - (inputs (list botan bzip2 json-c zlib)) + (inputs (list botan bzip2 json-c sexpp zlib)) (synopsis "RFC4880-compliant OpenPGP library written in C++") (description -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 25/26] gnu: cjson: Update to 1.7.18. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (22 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 24/26] gnu: rnp: Update to 0.17.1. [security fixes] Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-04 9:39 ` Z572 2024-11-03 16:02 ` [bug#74035] [PATCH v2 26/26] gnu: snapcast: Update to 0.29.0. " Nicolas Graves via Guix-patches via 2024-11-04 16:08 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Zheng Junjie 25 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-50471 and CVE-2023-50472. * gnu/packages/javascript.scm (cjson): Update to 1.7.18. --- gnu/packages/javascript.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/javascript.scm b/gnu/packages/javascript.scm index 4f97dcfef6..b48acf47dc 100644 --- a/gnu/packages/javascript.scm +++ b/gnu/packages/javascript.scm @@ -49,7 +49,7 @@ (define-module (gnu packages javascript) (define-public cjson (package (name "cjson") - (version "1.7.16") + (version "1.7.18") (source (origin (method git-fetch) (uri (git-reference @@ -57,7 +57,7 @@ (define-public cjson (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "00599lzzb0vszk317n0gln7wizdpchy4warxgpj3khrir73pphbb")))) + (base32 "08p37q4i3za3dgz7wynma1fh8y4rq7pyzyjzcda710nxrmsm1pyv")))) (build-system cmake-build-system) (arguments `(#:configure-flags '("-DENABLE_CJSON_UTILS=On"))) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 25/26] gnu: cjson: Update to 1.7.18. [security fixes] 2024-11-03 16:02 ` [bug#74035] [PATCH v2 25/26] gnu: cjson: Update to 1.7.18. " Nicolas Graves via Guix-patches via @ 2024-11-04 9:39 ` Z572 0 siblings, 0 replies; 88+ messages in thread From: Z572 @ 2024-11-04 9:39 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 1209 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2023-50471 and CVE-2023-50472. > > * gnu/packages/javascript.scm (cjson): Update to 1.7.18. > --- > gnu/packages/javascript.scm | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/gnu/packages/javascript.scm b/gnu/packages/javascript.scm > index 4f97dcfef6..b48acf47dc 100644 > --- a/gnu/packages/javascript.scm > +++ b/gnu/packages/javascript.scm > @@ -49,7 +49,7 @@ (define-module (gnu packages javascript) > (define-public cjson > (package > (name "cjson") > - (version "1.7.16") > + (version "1.7.18") > (source (origin > (method git-fetch) > (uri (git-reference > @@ -57,7 +57,7 @@ (define-public cjson > (commit (string-append "v" version)))) > (file-name (git-file-name name version)) > (sha256 > - (base32 "00599lzzb0vszk317n0gln7wizdpchy4warxgpj3khrir73pphbb")))) > + (base32 "08p37q4i3za3dgz7wynma1fh8y4rq7pyzyjzcda710nxrmsm1pyv")))) > (build-system cmake-build-system) > (arguments > `(#:configure-flags '("-DENABLE_CJSON_UTILS=On"))) apply [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 26/26] gnu: snapcast: Update to 0.29.0. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (23 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 25/26] gnu: cjson: Update to 1.7.18. " Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 ` Nicolas Graves via Guix-patches via 2024-11-04 16:08 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Zheng Junjie 25 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-03 16:02 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-36177. * gnu/packages/audio.scm (snapcast): Update to 0.29.0. --- gnu/packages/audio.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/audio.scm b/gnu/packages/audio.scm index eaffa0842d..467dc4a74f 100644 --- a/gnu/packages/audio.scm +++ b/gnu/packages/audio.scm @@ -1567,7 +1567,7 @@ (define-public omins-lv2 (define-public snapcast (package (name "snapcast") - (version "0.27.0") + (version "0.29.0") (source (origin (method git-fetch) (uri (git-reference @@ -1576,7 +1576,7 @@ (define-public snapcast (file-name (git-file-name name version)) (sha256 (base32 - "10l5hvmaqr9ykipsnzl95wqg19ff36rhpa1q88axxcia0k2valkn")))) + "1960xp54vsndj9vvc03kx9kg9phdchdgrfghhvcp2b0nfq2qcqqm")))) (build-system cmake-build-system) (arguments '(#:tests? #f)) ; no included tests -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. [security fixes] 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via ` (24 preceding siblings ...) 2024-11-03 16:02 ` [bug#74035] [PATCH v2 26/26] gnu: snapcast: Update to 0.29.0. " Nicolas Graves via Guix-patches via @ 2024-11-04 16:08 ` Zheng Junjie 25 siblings, 0 replies; 88+ messages in thread From: Zheng Junjie @ 2024-11-04 16:08 UTC (permalink / raw) To: 74035; +Cc: ngraves [-- Attachment #1: Type: text/plain, Size: 1536 bytes --] Nicolas Graves via Guix-patches via <guix-patches@gnu.org> writes: > This fixes CVE-2021-28902, CVE-2021-28903, CVE-2021-28904, > CVE-2021-28905 and CVE-2021-28906. > > * gnu/packages/networking.scm (libyang): Update to 3.4.2. > --- > gnu/packages/networking.scm | 6 +++--- > 1 file changed, 3 insertions(+), 3 deletions(-) > > diff --git a/gnu/packages/networking.scm b/gnu/packages/networking.scm > index 8481e2d2f4..17d4072ee0 100644 > --- a/gnu/packages/networking.scm > +++ b/gnu/packages/networking.scm > @@ -4238,7 +4238,7 @@ (define-public iwgtk > (define-public libyang > (package > (name "libyang") > - (version "1.0.215") > + (version "3.4.2") > (source (origin > (method git-fetch) > (uri (git-reference > @@ -4247,12 +4247,12 @@ (define-public libyang > (file-name (git-file-name name version)) > (sha256 > (base32 > - "0mrs2ppmq77z8sbqgm2w0rl9bfgybd6bcxanakfww4chih6cy0dw")))) > + "07skjr3r4na12kadca2dyk45clpcpnp4zkkwfaa8sqyslx7vhj56")))) > (build-system cmake-build-system) > (arguments > `(#:configure-flags > (list "-DENABLE_BUILD_TESTS=ON" "-DENABLE_LYD_PRIV=ON"))) > - (propagated-inputs (list pcre)) > + (propagated-inputs (list pcre2)) > (native-inputs (list cmocka pkg-config)) > (home-page "https://github.com/CESNET/libyang") > (synopsis "YANG data modelling language library") apply, and update it single dependent package: frrouting. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v3 0/8] [security] fixes for near-leaf packages 2024-10-26 22:29 [bug#74035] [PATCH 00/24] [security fixes] for near-leaf packages Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via @ 2024-11-05 23:10 ` Nicolas Graves via Guix-patches via 2024-11-05 23:10 ` [bug#74035] [PATCH v3 1/8] gnu: bart: Update to 0.9.00. [security fixes] Nicolas Graves via Guix-patches via ` (2 more replies) 2024-11-05 23:13 ` [bug#74035] [PATCH v4 1/8] gnu: bart: Update to 0.9.00. " Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 4 siblings, 3 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:10 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This patch series removes patches that have been built in the v2, so that it's easier to review. It's also a bump for QA. Nicolas Graves (8): gnu: bart: Update to 0.9.00. [security fixes] gnu: pam-u2f: Update to 1.3.0. [security fixes] gnu: sendmail: Update to 8.18.1. [security fixes] gnu: openvpn: Update to 2.6.12. [security fixes] gnu: youtube-dl: Deprecate package. gnu: unicorn: Update to 2.1.1. [security fixes] gnu: Add sexpp. gnu: rnp: Update to 0.17.1. [security fixes] gnu/packages/emulators.scm | 9 +++- gnu/packages/image-processing.scm | 8 ++-- gnu/packages/mail.scm | 5 +- gnu/packages/openpgp.scm | 76 ++++++++++++++++++++++--------- gnu/packages/security-token.scm | 9 ++-- gnu/packages/video.scm | 3 +- gnu/packages/vpn.scm | 4 +- 7 files changed, 75 insertions(+), 39 deletions(-) -- 2.46.0 ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v3 1/8] gnu: bart: Update to 0.9.00. [security fixes] 2024-11-05 23:10 ` [bug#74035] [PATCH v3 0/8] [security] fixes for near-leaf packages Nicolas Graves via Guix-patches via @ 2024-11-05 23:10 ` Nicolas Graves via Guix-patches via 2024-11-05 23:10 ` [bug#74035] [PATCH v3 2/8] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via 2024-11-05 23:10 ` [bug#74035] [PATCH v3 3/8] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via 2 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:10 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes bart reproducibility and CVE-2022-45387. * gnu/packages/image-processing.scm (bart): Update to 0.9.00. --- gnu/packages/image-processing.scm | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/gnu/packages/image-processing.scm b/gnu/packages/image-processing.scm index a79eaf6aed..3a7c67362f 100644 --- a/gnu/packages/image-processing.scm +++ b/gnu/packages/image-processing.scm @@ -115,20 +115,19 @@ (define-module (gnu packages image-processing) #:use-module (ice-9 match) #:use-module (srfi srfi-1)) -;; TODO: this is not reproducible. (define-public bart (package (name "bart") - (version "0.8.00") + (version "0.9.00") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/mrirecon/bart") - (commit "eacc67b95cf128487ecc48f0e6541ea4dca08818"))) + (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "05lcf7c3g7ms5h82bw1mi4kzkdv5wpqi1zrfhqfkgbcpd3irj6aq")))) + (base32 "0mj6jmw31rsnvqmpfqahhj4cy9iv5xgrhzmcsrikdz5dgd45lmjz")))) (build-system gnu-build-system) (arguments (list @@ -140,6 +139,7 @@ (define-public bart "OPENBLAS=1" "SCALAPACK=1" (string-append "BLAS_BASE=" #$(this-package-input "openblas")) + (string-append "CC=" #$(cc-for-target)) (string-append "FFTW_BASE=" #$(this-package-input "fftw"))) #:parallel-build? #false ;leads to non-deterministic output #:phases -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v3 2/8] gnu: pam-u2f: Update to 1.3.0. [security fixes] 2024-11-05 23:10 ` [bug#74035] [PATCH v3 0/8] [security] fixes for near-leaf packages Nicolas Graves via Guix-patches via 2024-11-05 23:10 ` [bug#74035] [PATCH v3 1/8] gnu: bart: Update to 0.9.00. [security fixes] Nicolas Graves via Guix-patches via @ 2024-11-05 23:10 ` Nicolas Graves via Guix-patches via 2024-11-05 23:10 ` [bug#74035] [PATCH v3 3/8] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via 2 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:10 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2021-31924. * gnu/packages/security-token.scm (pam-u2f): Update to 1.3.0. [inputs]: Add libfido2, openssl. Remove libu2f-host, libu2f-server. [native-inputs]: Sort packages. --- gnu/packages/security-token.scm | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/gnu/packages/security-token.scm b/gnu/packages/security-token.scm index 5abb461c0c..156a7d5e28 100644 --- a/gnu/packages/security-token.scm +++ b/gnu/packages/security-token.scm @@ -682,7 +682,7 @@ (define-public libu2f-server (define-public pam-u2f (package (name "pam-u2f") - (version "1.0.8") + (version "1.3.0") (source (origin (method git-fetch) (uri @@ -691,17 +691,16 @@ (define-public pam-u2f (commit (string-append "pam_u2f-" version)))) (file-name (git-file-name name version)) (sha256 - (base32 - "04d9davyi33gqbvga1rvh9fijp6f16mx2xmnn4n61rnhcn2jac98")))) + (base32 "1swvys98mw7ailllgqicvhj315qajhvqrmm314cp3bj0l76s9qpv")))) (build-system gnu-build-system) (arguments `(#:configure-flags (list (string-append "--with-pam-dir=" (assoc-ref %outputs "out") "/lib/security")))) (inputs - (list libu2f-host libu2f-server linux-pam)) + (list libfido2 linux-pam openssl)) (native-inputs - (list autoconf automake libtool asciidoc pkg-config)) + (list asciidoc autoconf automake libtool pkg-config)) (home-page "https://developers.yubico.com/pam-u2f/") (synopsis "PAM module for U2F authentication") (description -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v3 3/8] gnu: sendmail: Update to 8.18.1. [security fixes] 2024-11-05 23:10 ` [bug#74035] [PATCH v3 0/8] [security] fixes for near-leaf packages Nicolas Graves via Guix-patches via 2024-11-05 23:10 ` [bug#74035] [PATCH v3 1/8] gnu: bart: Update to 0.9.00. [security fixes] Nicolas Graves via Guix-patches via 2024-11-05 23:10 ` [bug#74035] [PATCH v3 2/8] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via @ 2024-11-05 23:10 ` Nicolas Graves via Guix-patches via 2 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:10 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-51765 and CVE-2021-3618. * gnu/packages/mail.scm (sendmail): Update to 8.18.1. --- gnu/packages/mail.scm | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/gnu/packages/mail.scm b/gnu/packages/mail.scm index 2c69a7b818..ca1a55818e 100644 --- a/gnu/packages/mail.scm +++ b/gnu/packages/mail.scm @@ -3122,7 +3122,7 @@ (define-public mhonarc (define-public sendmail (package (name "sendmail") - (version "8.15.2") + (version "8.18.1") (source (origin (method url-fetch) @@ -3130,8 +3130,7 @@ (define-public sendmail "ftp://ftp.sendmail.org/pub/sendmail/sendmail." version ".tar.gz")) (sha256 - (base32 - "0fdl9ndmspqspdlmghzxlaqk56j3yajk52d7jxcg21b7sxglpy94")))) + (base32 "0w07iw4imp9wvczd2mijns7zxl8p1wk29b9yrzvhcj4fqc4z7wfb")))) (build-system gnu-build-system) (arguments `(#:phases -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 1/8] gnu: bart: Update to 0.9.00. [security fixes] 2024-10-26 22:29 [bug#74035] [PATCH 00/24] [security fixes] for near-leaf packages Nicolas Graves via Guix-patches via ` (2 preceding siblings ...) 2024-11-05 23:10 ` [bug#74035] [PATCH v3 0/8] [security] fixes for near-leaf packages Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-11 11:47 ` Maxim Cournoyer 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 4 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes bart reproducibility and CVE-2022-45387. * gnu/packages/image-processing.scm (bart): Update to 0.9.00. --- gnu/packages/image-processing.scm | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/gnu/packages/image-processing.scm b/gnu/packages/image-processing.scm index a79eaf6aed..3a7c67362f 100644 --- a/gnu/packages/image-processing.scm +++ b/gnu/packages/image-processing.scm @@ -115,20 +115,19 @@ (define-module (gnu packages image-processing) #:use-module (ice-9 match) #:use-module (srfi srfi-1)) -;; TODO: this is not reproducible. (define-public bart (package (name "bart") - (version "0.8.00") + (version "0.9.00") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/mrirecon/bart") - (commit "eacc67b95cf128487ecc48f0e6541ea4dca08818"))) + (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "05lcf7c3g7ms5h82bw1mi4kzkdv5wpqi1zrfhqfkgbcpd3irj6aq")))) + (base32 "0mj6jmw31rsnvqmpfqahhj4cy9iv5xgrhzmcsrikdz5dgd45lmjz")))) (build-system gnu-build-system) (arguments (list @@ -140,6 +139,7 @@ (define-public bart "OPENBLAS=1" "SCALAPACK=1" (string-append "BLAS_BASE=" #$(this-package-input "openblas")) + (string-append "CC=" #$(cc-for-target)) (string-append "FFTW_BASE=" #$(this-package-input "fftw"))) #:parallel-build? #false ;leads to non-deterministic output #:phases -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 1/8] gnu: bart: Update to 0.9.00. [security fixes] 2024-11-05 23:13 ` [bug#74035] [PATCH v4 1/8] gnu: bart: Update to 0.9.00. " Nicolas Graves via Guix-patches via @ 2024-11-11 11:47 ` Maxim Cournoyer 2024-11-11 15:23 ` Nicolas Graves via Guix-patches via 0 siblings, 1 reply; 88+ messages in thread From: Maxim Cournoyer @ 2024-11-11 11:47 UTC (permalink / raw) To: Nicolas Graves; +Cc: 74035 Hi, Nicolas Graves <ngraves@ngraves.fr> writes: > This fixes bart reproducibility and CVE-2022-45387. CVE-2022-45387 is about the Jenkins bart plugin, not this BART toolbox software; so it's nice to update it but there's no CVE fix here. -- Thanks, Maxim ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 1/8] gnu: bart: Update to 0.9.00. [security fixes] 2024-11-11 11:47 ` Maxim Cournoyer @ 2024-11-11 15:23 ` Nicolas Graves via Guix-patches via 0 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-11 15:23 UTC (permalink / raw) To: Maxim Cournoyer; +Cc: 74035 On 2024-11-11 20:47, Maxim Cournoyer wrote: > Hi, > > Nicolas Graves <ngraves@ngraves.fr> writes: > >> This fixes bart reproducibility and CVE-2022-45387. > > CVE-2022-45387 is about the Jenkins bart plugin, not this BART toolbox > software; so it's nice to update it but there's no CVE fix here. Indeed, thanks for checking! -- Best regards, Nicolas Graves ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 1/8] gnu: bart: Update to 0.9.00. [security fixes] 2024-10-26 22:29 [bug#74035] [PATCH 00/24] [security fixes] for near-leaf packages Nicolas Graves via Guix-patches via ` (3 preceding siblings ...) 2024-11-05 23:13 ` [bug#74035] [PATCH v4 1/8] gnu: bart: Update to 0.9.00. " Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 2/8] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via ` (6 more replies) 4 siblings, 7 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes bart reproducibility and CVE-2022-45387. * gnu/packages/image-processing.scm (bart): Update to 0.9.00. --- gnu/packages/image-processing.scm | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/gnu/packages/image-processing.scm b/gnu/packages/image-processing.scm index a79eaf6aed..3a7c67362f 100644 --- a/gnu/packages/image-processing.scm +++ b/gnu/packages/image-processing.scm @@ -115,20 +115,19 @@ (define-module (gnu packages image-processing) #:use-module (ice-9 match) #:use-module (srfi srfi-1)) -;; TODO: this is not reproducible. (define-public bart (package (name "bart") - (version "0.8.00") + (version "0.9.00") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/mrirecon/bart") - (commit "eacc67b95cf128487ecc48f0e6541ea4dca08818"))) + (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 - (base32 "05lcf7c3g7ms5h82bw1mi4kzkdv5wpqi1zrfhqfkgbcpd3irj6aq")))) + (base32 "0mj6jmw31rsnvqmpfqahhj4cy9iv5xgrhzmcsrikdz5dgd45lmjz")))) (build-system gnu-build-system) (arguments (list @@ -140,6 +139,7 @@ (define-public bart "OPENBLAS=1" "SCALAPACK=1" (string-append "BLAS_BASE=" #$(this-package-input "openblas")) + (string-append "CC=" #$(cc-for-target)) (string-append "FFTW_BASE=" #$(this-package-input "fftw"))) #:parallel-build? #false ;leads to non-deterministic output #:phases -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 2/8] gnu: pam-u2f: Update to 1.3.0. [security fixes] 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 3/8] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via ` (5 subsequent siblings) 6 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2021-31924. * gnu/packages/security-token.scm (pam-u2f): Update to 1.3.0. [inputs]: Add libfido2, openssl. Remove libu2f-host, libu2f-server. [native-inputs]: Sort packages. --- gnu/packages/security-token.scm | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/gnu/packages/security-token.scm b/gnu/packages/security-token.scm index 5abb461c0c..156a7d5e28 100644 --- a/gnu/packages/security-token.scm +++ b/gnu/packages/security-token.scm @@ -682,7 +682,7 @@ (define-public libu2f-server (define-public pam-u2f (package (name "pam-u2f") - (version "1.0.8") + (version "1.3.0") (source (origin (method git-fetch) (uri @@ -691,17 +691,16 @@ (define-public pam-u2f (commit (string-append "pam_u2f-" version)))) (file-name (git-file-name name version)) (sha256 - (base32 - "04d9davyi33gqbvga1rvh9fijp6f16mx2xmnn4n61rnhcn2jac98")))) + (base32 "1swvys98mw7ailllgqicvhj315qajhvqrmm314cp3bj0l76s9qpv")))) (build-system gnu-build-system) (arguments `(#:configure-flags (list (string-append "--with-pam-dir=" (assoc-ref %outputs "out") "/lib/security")))) (inputs - (list libu2f-host libu2f-server linux-pam)) + (list libfido2 linux-pam openssl)) (native-inputs - (list autoconf automake libtool asciidoc pkg-config)) + (list asciidoc autoconf automake libtool pkg-config)) (home-page "https://developers.yubico.com/pam-u2f/") (synopsis "PAM module for U2F authentication") (description -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 3/8] gnu: sendmail: Update to 8.18.1. [security fixes] 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 2/8] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 4/8] gnu: openvpn: Update to 2.6.12. " Nicolas Graves via Guix-patches via ` (4 subsequent siblings) 6 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-51765 and CVE-2021-3618. * gnu/packages/mail.scm (sendmail): Update to 8.18.1. --- gnu/packages/mail.scm | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/gnu/packages/mail.scm b/gnu/packages/mail.scm index 2c69a7b818..ca1a55818e 100644 --- a/gnu/packages/mail.scm +++ b/gnu/packages/mail.scm @@ -3122,7 +3122,7 @@ (define-public mhonarc (define-public sendmail (package (name "sendmail") - (version "8.15.2") + (version "8.18.1") (source (origin (method url-fetch) @@ -3130,8 +3130,7 @@ (define-public sendmail "ftp://ftp.sendmail.org/pub/sendmail/sendmail." version ".tar.gz")) (sha256 - (base32 - "0fdl9ndmspqspdlmghzxlaqk56j3yajk52d7jxcg21b7sxglpy94")))) + (base32 "0w07iw4imp9wvczd2mijns7zxl8p1wk29b9yrzvhcj4fqc4z7wfb")))) (build-system gnu-build-system) (arguments `(#:phases -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 4/8] gnu: openvpn: Update to 2.6.12. [security fixes] 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 2/8] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 3/8] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 5/8] gnu: youtube-dl: Deprecate package Nicolas Graves via Guix-patches via ` (3 subsequent siblings) 6 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves Thix fixes CVE-2024-24974, CVE-2024-27459 and CVE-2024-27903. * gnu/packages/vpn.scm (openvpn): Update to 2.6.12. --- gnu/packages/vpn.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gnu/packages/vpn.scm b/gnu/packages/vpn.scm index 9f36595bfd..193b247779 100644 --- a/gnu/packages/vpn.scm +++ b/gnu/packages/vpn.scm @@ -867,7 +867,7 @@ (define-public openfortivpn (define-public openvpn (package (name "openvpn") - (version "2.6.7") + (version "2.6.12") (source (origin (method url-fetch) (uri (string-append @@ -875,7 +875,7 @@ (define-public openvpn version ".tar.gz")) (sha256 (base32 - "04wr0g97nmv81javym8r99mglmb86v1i49xmnmzf938x1cs7g67f")))) + "0a8r3bvg4aic9b7dix0h7990g3j1gq17wd3w6vqk8vk8xgfhyq8w")))) (build-system gnu-build-system) (arguments '(#:configure-flags '("--enable-iproute2=yes"))) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 5/8] gnu: youtube-dl: Deprecate package. 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via ` (2 preceding siblings ...) 2024-11-05 23:13 ` [bug#74035] [PATCH v4 4/8] gnu: openvpn: Update to 2.6.12. " Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-11 11:48 ` Maxim Cournoyer 2024-11-05 23:13 ` [bug#74035] [PATCH v4 6/8] gnu: unicorn: Update to 2.1.1. [security fixes] Nicolas Graves via Guix-patches via ` (2 subsequent siblings) 6 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This package is not developped anymore. * gnu/packages/video.scm (youtube-dl): Deprecate package. --- gnu/packages/video.scm | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/gnu/packages/video.scm b/gnu/packages/video.scm index ff5dcd8daa..74cfabf6e7 100644 --- a/gnu/packages/video.scm +++ b/gnu/packages/video.scm @@ -93,6 +93,7 @@ (define-module (gnu packages video) #:use-module ((guix licenses) #:prefix license:) #:use-module (guix utils) #:use-module (guix packages) + #:use-module (guix deprecation) #:use-module (guix download) #:use-module (guix gexp) #:use-module (guix git-download) @@ -3085,7 +3086,7 @@ (define-public yle-dl video streaming services of the Finnish national broadcasting company Yle.") (license license:gpl3+))) -(define-public youtube-dl +(define-deprecated/public youtube-dl #f (package (name "youtube-dl") (version "2021.12.17") -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 5/8] gnu: youtube-dl: Deprecate package. 2024-11-05 23:13 ` [bug#74035] [PATCH v4 5/8] gnu: youtube-dl: Deprecate package Nicolas Graves via Guix-patches via @ 2024-11-11 11:48 ` Maxim Cournoyer 2024-11-11 15:22 ` Nicolas Graves via Guix-patches via 0 siblings, 1 reply; 88+ messages in thread From: Maxim Cournoyer @ 2024-11-11 11:48 UTC (permalink / raw) To: Nicolas Graves; +Cc: 74035 Hi Nicolas, Nicolas Graves <ngraves@ngraves.fr> writes: > This package is not developped anymore. > > * gnu/packages/video.scm (youtube-dl): Deprecate package. This is maybe a bit preposterous; the repository is still alive, last touched in August of this year [0]. [0] https://github.com/ytdl-org/youtube-dl I've dropped this commit from my locally queued series. -- Thanks, Maxim ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 5/8] gnu: youtube-dl: Deprecate package. 2024-11-11 11:48 ` Maxim Cournoyer @ 2024-11-11 15:22 ` Nicolas Graves via Guix-patches via 0 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-11 15:22 UTC (permalink / raw) To: Maxim Cournoyer; +Cc: 74035 On 2024-11-11 20:48, Maxim Cournoyer wrote: > Hi Nicolas, > > Nicolas Graves <ngraves@ngraves.fr> writes: > >> This package is not developped anymore. >> >> * gnu/packages/video.scm (youtube-dl): Deprecate package. > > This is maybe a bit preposterous; the repository is still alive, last > touched in August of this year [0]. > > [0] https://github.com/ytdl-org/youtube-dl > > I've dropped this commit from my locally queued series. My bad, I only checked the home-page because I thought development was halted (and basically efforts for that functionality went to yt-dlp instead) for legal reasons. At least the home-page is indeed blocked in France. I haven't tested the package, OK to drop this commit. -- Best regards, Nicolas Graves ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 6/8] gnu: unicorn: Update to 2.1.1. [security fixes] 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via ` (3 preceding siblings ...) 2024-11-05 23:13 ` [bug#74035] [PATCH v4 5/8] gnu: youtube-dl: Deprecate package Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 7/8] gnu: Add sexpp Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 8/8] gnu: rnp: Update to 0.17.1. [security fixes] Nicolas Graves via Guix-patches via 6 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves Thix fixes CVE-2021-4296. * gnu/packages/emulators.scm (unicorn): Update to 2.1.1. --- gnu/packages/emulators.scm | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/gnu/packages/emulators.scm b/gnu/packages/emulators.scm index f0a60c0b49..948e588c4c 100644 --- a/gnu/packages/emulators.scm +++ b/gnu/packages/emulators.scm @@ -3508,13 +3508,18 @@ (define-public zsnes (define-public unicorn (package (name "unicorn") - (version "2.0.1.post1") + (version "2.1.1") (source (origin (method url-fetch) (uri (pypi-uri name version)) (sha256 - (base32 "0mlfs8qfi0clyncfkbxp6in0cpl747510i6bqymwid43xcirbikz")))) + (base32 "18sbrycr62wcs3a68a9q76ihpahfsd4bn3mryvyhimwwn1342kwh")) + (modules '((guix build utils))) + ;; cmake files are not in the cmake dir in pypi + (snippet #~(substitute* "src/CMakeLists.txt" + (("include\\(cmake/") + "include("))))) (build-system pyproject-build-system) (native-inputs (list cmake pkg-config)) (home-page "https://www.unicorn-engine.org") -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 7/8] gnu: Add sexpp. 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via ` (4 preceding siblings ...) 2024-11-05 23:13 ` [bug#74035] [PATCH v4 6/8] gnu: unicorn: Update to 2.1.1. [security fixes] Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 8/8] gnu: rnp: Update to 0.17.1. [security fixes] Nicolas Graves via Guix-patches via 6 siblings, 0 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves * gnu/packages/openpgp.scm (sexpp): New variable. --- gnu/packages/openpgp.scm | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) diff --git a/gnu/packages/openpgp.scm b/gnu/packages/openpgp.scm index 9b6f04b407..356908ab1f 100644 --- a/gnu/packages/openpgp.scm +++ b/gnu/packages/openpgp.scm @@ -1,5 +1,6 @@ ;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2020 Justus Winter <justus@sequoia-pgp.org> +;;; Copyright © 2024 Nicolas Graves <ngraves@ngraves.fr> ;;; ;;; This file is part of GNU Guix. ;;; @@ -157,3 +158,26 @@ (define-public rnp license:asl2.0 ;; Nominet UK's BSD 3-Clause License (netpgp). license:bsd-3))))) + +(define-public sexpp + (package + (name "sexpp") + (version "0.9.0") + (source + (origin + (method git-fetch) + (uri (git-reference + (url "https://github.com/rnpgp/sexpp") + (commit (string-append "v" version)))) + (file-name (git-file-name name version)) + (sha256 + (base32 "16y9f42w6ay3w0s23xmigqm0qi1swdfvc93g2xn3xkg1r4kpmnwq")))) + (build-system cmake-build-system) + (arguments + (list #:configure-flags '(list "-DDOWNLOAD_GTEST=off"))) + (native-inputs (list googletest pkg-config)) + (home-page "https://github.com/rnpgp/sexpp") + (synopsis "C++ library for S-expressions") + (description + "This package provides a C++ library for working with S-Expressions.") + (license license:expat))) -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 8/8] gnu: rnp: Update to 0.17.1. [security fixes] 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via ` (5 preceding siblings ...) 2024-11-05 23:13 ` [bug#74035] [PATCH v4 7/8] gnu: Add sexpp Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-11 13:14 ` Maxim Cournoyer 2024-11-12 14:12 ` [bug#74035] " Maxim Cournoyer 6 siblings, 2 replies; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-05 23:13 UTC (permalink / raw) To: 74035; +Cc: Nicolas Graves This fixes CVE-2023-29479 and CVE-2023-29480. * gnu/packages/openpgp.scm (rnp): Update to 0.17.1. [arguments]: Improve style using gexps. <#:phases>: Add phase 'inject-sexpp-source. [inputs]: Add sexpp. --- gnu/packages/openpgp.scm | 52 +++++++++++++++++++++++----------------- 1 file changed, 30 insertions(+), 22 deletions(-) diff --git a/gnu/packages/openpgp.scm b/gnu/packages/openpgp.scm index 356908ab1f..baf786c5ee 100644 --- a/gnu/packages/openpgp.scm +++ b/gnu/packages/openpgp.scm @@ -23,6 +23,7 @@ (define-module (gnu packages openpgp) #:use-module (guix git-download) #:use-module (guix build-system cmake) #:use-module (guix build-system gnu) + #:use-module (guix gexp) #:use-module ((guix licenses) #:prefix license:) #:use-module (gnu packages) #:use-module (gnu packages check) @@ -98,10 +99,10 @@ (define-public dkgpg (license license:gpl2+))) (define-public rnp - (let ((day-of-release "2022-09-22")) + (let ((day-of-release "2024-05-14")) (package (name "rnp") - (version "0.16.2") + (version "0.17.1") (source (origin (method git-fetch) (uri (git-reference @@ -110,33 +111,40 @@ (define-public rnp (file-name (git-file-name name version)) (sha256 (base32 - "13z5kxm48a72w4m2crwgdjdng4a4pwxsd72r2z3a4pcakfp2swi8")))) + "052872b6a88vkcc58alxcm532y6dra5qqd997jga41v72h3pnj4d")))) (build-system cmake-build-system) - (arguments `(#:configure-flags - '("-DBUILD_SHARED_LIBS=on" - "-DBUILD_TESTING=on" - "-DDOWNLOAD_GTEST=off" - "-DDOWNLOAD_RUBYRNP=off") - #:phases - (modify-phases %standard-phases - (add-after 'unpack 'patch-tests - (lambda _ - (substitute* "src/tests/support.cpp" - (("\"cp\"") (search-input-file inputs "/bin/cp"))))) - (replace 'check - (lambda* (#:key tests? #:allow-other-keys) - (when tests? - ;; Some OpenPGP certificates used by the tests expire. - ;; To work around that, set the time to roughly the - ;; release date. - (invoke "faketime" ,day-of-release "make" "test"))))))) + (arguments + (list + #:configure-flags + ''("-DBUILD_SHARED_LIBS=on" + "-DBUILD_TESTING=on" + "-DDOWNLOAD_GTEST=off" + "-DDOWNLOAD_RUBYRNP=off") + #:phases + #~(modify-phases %standard-phases + (add-after 'unpack 'patch-tests + (lambda _ + (substitute* "src/tests/support.cpp" + (("\"cp\"") (search-input-file inputs "/bin/cp"))))) + (add-after 'unpack 'inject-sexpp-source + (lambda _ + (rmdir "src/libsexpp") + (symlink #$(package-source (this-package-input "sexpp")) + "src/libsexpp"))) + (replace 'check + (lambda* (#:key tests? #:allow-other-keys) + (when tests? + ;; Some OpenPGP certificates used by the tests expire. + ;; To work around that, set the time to roughly the + ;; release date. + (invoke "faketime" #$day-of-release "make" "test"))))))) (native-inputs (list gnupg ; for tests googletest ; for tests libfaketime ; for tests pkg-config python)) - (inputs (list botan bzip2 json-c zlib)) + (inputs (list botan bzip2 json-c sexpp zlib)) (synopsis "RFC4880-compliant OpenPGP library written in C++") (description -- 2.46.0 ^ permalink raw reply related [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 8/8] gnu: rnp: Update to 0.17.1. [security fixes] 2024-11-05 23:13 ` [bug#74035] [PATCH v4 8/8] gnu: rnp: Update to 0.17.1. [security fixes] Nicolas Graves via Guix-patches via @ 2024-11-11 13:14 ` Maxim Cournoyer 2024-11-11 15:23 ` Nicolas Graves via Guix-patches via 2024-11-12 14:12 ` [bug#74035] " Maxim Cournoyer 1 sibling, 1 reply; 88+ messages in thread From: Maxim Cournoyer @ 2024-11-11 13:14 UTC (permalink / raw) To: Nicolas Graves; +Cc: 74035 Hi, Nicolas Graves <ngraves@ngraves.fr> writes: > This fixes CVE-2023-29479 and CVE-2023-29480. > > * gnu/packages/openpgp.scm (rnp): Update to 0.17.1. > [arguments]: Improve style using gexps. > <#:phases>: Add phase 'inject-sexpp-source. > [inputs]: Add sexpp. This one fails its test suite for me: --8<---------------cut here---------------start------------->8--- Start 15: rnp_tests.s2k_iteration_tuning 16/263 Test #15: rnp_tests.s2k_iteration_tuning ................................................***Failed 8.02 sec [...] The following tests FAILED: 15 - rnp_tests.s2k_iteration_tuning (Failed) --8<---------------cut here---------------end--------------->8--- It should probably be repoted upstream. -- Thanks, Maxim ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 8/8] gnu: rnp: Update to 0.17.1. [security fixes] 2024-11-11 13:14 ` Maxim Cournoyer @ 2024-11-11 15:23 ` Nicolas Graves via Guix-patches via 2024-11-12 11:54 ` bug#74035: " Maxim Cournoyer 0 siblings, 1 reply; 88+ messages in thread From: Nicolas Graves via Guix-patches via @ 2024-11-11 15:23 UTC (permalink / raw) To: Maxim Cournoyer; +Cc: 74035 On 2024-11-11 22:14, Maxim Cournoyer wrote: > Hi, > > Nicolas Graves <ngraves@ngraves.fr> writes: > >> This fixes CVE-2023-29479 and CVE-2023-29480. >> >> * gnu/packages/openpgp.scm (rnp): Update to 0.17.1. >> [arguments]: Improve style using gexps. >> <#:phases>: Add phase 'inject-sexpp-source. >> [inputs]: Add sexpp. > > This one fails its test suite for me: > > --8<---------------cut here---------------start------------->8--- > Start 15: rnp_tests.s2k_iteration_tuning > 16/263 Test #15: rnp_tests.s2k_iteration_tuning ................................................***Failed 8.02 sec > [...] > The following tests FAILED: > 15 - rnp_tests.s2k_iteration_tuning (Failed) > --8<---------------cut here---------------end--------------->8--- > > It should probably be repoted upstream. Strange, it worked for me IIRC. Maybe tests are flaky and we should exclude this one? -- Best regards, Nicolas Graves ^ permalink raw reply [flat|nested] 88+ messages in thread
* bug#74035: [PATCH v4 8/8] gnu: rnp: Update to 0.17.1. [security fixes] 2024-11-11 15:23 ` Nicolas Graves via Guix-patches via @ 2024-11-12 11:54 ` Maxim Cournoyer 0 siblings, 0 replies; 88+ messages in thread From: Maxim Cournoyer @ 2024-11-12 11:54 UTC (permalink / raw) To: Nicolas Graves; +Cc: 74035-done Hi Nicolas, Nicolas Graves <ngraves@ngraves.fr> writes: > On 2024-11-11 22:14, Maxim Cournoyer wrote: > >> Hi, >> >> Nicolas Graves <ngraves@ngraves.fr> writes: >> >>> This fixes CVE-2023-29479 and CVE-2023-29480. >>> >>> * gnu/packages/openpgp.scm (rnp): Update to 0.17.1. >>> [arguments]: Improve style using gexps. >>> <#:phases>: Add phase 'inject-sexpp-source. >>> [inputs]: Add sexpp. >> >> This one fails its test suite for me: >> >> --8<---------------cut here---------------start------------->8--- >> Start 15: rnp_tests.s2k_iteration_tuning >> 16/263 Test #15: rnp_tests.s2k_iteration_tuning ................................................***Failed 8.02 sec >> [...] >> The following tests FAILED: >> 15 - rnp_tests.s2k_iteration_tuning (Failed) >> --8<---------------cut here---------------end--------------->8--- >> >> It should probably be repoted upstream. > > Strange, it worked for me IIRC. Maybe tests are flaky and we should > exclude this one? The test appears to be sensitive to the CPU speed; upstream provided a solution. I've now applied this series, culminating with commit 44b06b030d. Thank you! -- Maxim ^ permalink raw reply [flat|nested] 88+ messages in thread
* [bug#74035] [PATCH v4 8/8] gnu: rnp: Update to 0.17.1. [security fixes] 2024-11-05 23:13 ` [bug#74035] [PATCH v4 8/8] gnu: rnp: Update to 0.17.1. [security fixes] Nicolas Graves via Guix-patches via 2024-11-11 13:14 ` Maxim Cournoyer @ 2024-11-12 14:12 ` Maxim Cournoyer 1 sibling, 0 replies; 88+ messages in thread From: Maxim Cournoyer @ 2024-11-12 14:12 UTC (permalink / raw) To: Nicolas Graves; +Cc: 74035 Hi, Nicolas Graves <ngraves@ngraves.fr> writes: > This fixes CVE-2023-29479 and CVE-2023-29480. > > * gnu/packages/openpgp.scm (rnp): Update to 0.17.1. > [arguments]: Improve style using gexps. > <#:phases>: Add phase 'inject-sexpp-source. > [inputs]: Add sexpp. I could work it out with this: --8<---------------cut here---------------start------------->8--- modified gnu/packages/openpgp.scm @@ -117,6 +117,9 @@ (define-public rnp (list #:configure-flags ''("-DBUILD_SHARED_LIBS=on" + ;; Lower the minimum tuning ratio from 6 to 4, as suggested + ;; upstream to avoid the s2k_iteration_tuning failing. + "-DS2K_MINIMUM_TUNING_RATIO=4" "-DBUILD_TESTING=on" "-DDOWNLOAD_GTEST=off" "-DDOWNLOAD_RUBYRNP=off") @@ -129,22 +132,27 @@ (define-public rnp (add-after 'unpack 'inject-sexpp-source (lambda _ (rmdir "src/libsexpp") - (symlink #$(package-source (this-package-input "sexpp")) + (symlink #$(package-source (this-package-native-input "sexpp")) "src/libsexpp"))) (replace 'check - (lambda* (#:key tests? #:allow-other-keys) + (lambda* (#:key tests? parallel-tests? #:allow-other-keys) (when tests? ;; Some OpenPGP certificates used by the tests expire. ;; To work around that, set the time to roughly the ;; release date. - (invoke "faketime" #$day-of-release "make" "test"))))))) + (setenv "CTEST_OUTPUT_ON_FAILURE" "1") + (invoke "faketime" #$day-of-release "ctest" + "-j" (if parallel-tests? + (number->string (parallel-job-count)) + "1")))))))) (native-inputs - (list gnupg ; for tests - googletest ; for tests - libfaketime ; for tests + (list gnupg ;for tests + googletest ;for tests + libfaketime ;for tests pkg-config - python)) - (inputs (list botan bzip2 json-c sexpp zlib)) + python + sexpp)) ;sexpp is used as source only + (inputs (list botan bzip2 json-c zlib)) (synopsis "RFC4880-compliant OpenPGP library written in C++") (description --8<---------------cut here---------------end--------------->8--- Thanks to upstream's extreme responsiveness (answered in seconds!) Nitpick: inline comments shouldn't have a space between the ';' and the text. I've also made the test suite run in parallel and restored the CTEST_OUTPUT_ON_FAILURE behavior of the stock check phase, as that's very useful in case of problems. -- Thanks, Maxim ^ permalink raw reply [flat|nested] 88+ messages in thread
end of thread, other threads:[~2024-11-12 14:14 UTC | newest] Thread overview: 88+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2024-10-26 22:29 [bug#74035] [PATCH 00/24] [security fixes] for near-leaf packages Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 01/24] gnu: python-django-4.2: Update to 4.2.16. [security fixes] Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 02/24] gnu: maradns: Update to 3.5.0036. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 03/24] gnu: maradns: Improve style Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 04/24] gnu: libmobi: Update to 0.12. [security fixes] Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 05/24] gnu: bart: Update to 0.9.00. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 06/24] gnu: wireshark: Update to 4.4.1. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 07/24] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 08/24] gnu: darkhttpd: Update to 1.16. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 09/24] gnu: xlsxio: Update to 0.2.35. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 10/24] gnu: pypy: Update to 7.3.17. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 11/24] gnu: indent: Remove uneeded arguments Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 12/24] gnu: indent: Add patch for CVE-2024-0911. [security fixes] Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 13/24] gnu: squashfs-tools: Update to 4.6.1. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 14/24] gnu: shapelib: Update to 1.6.1. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 15/24] gnu: libzapojit: Update to 0.0.3-1.99d49ba. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 16/24] gnu: gifsicle: Update to 1.95. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 17/24] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 18/24] gnu: openvpn: Update to 2.6.12. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 19/24] gnu: youtube-dl: Deprecate package Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 20/24] gnu: liblouis: Update to 3.31.0. [security fixes] Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 21/24] gnu: unicorn: Update to 2.1.1. " Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 22/24] gnu: Add sexpp Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 23/24] gnu: rnp: Update to 0.17.1. [security fixes] Nicolas Graves via Guix-patches via 2024-10-26 22:42 ` [bug#74035] [PATCH 24/24] gnu: cjson: Update to 1.7.18. " Nicolas Graves via Guix-patches via 2024-11-03 16:01 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Nicolas Graves via Guix-patches via 2024-11-03 16:01 ` [bug#74035] [PATCH v2 02/26] gnu: python-django-4.2: Update to 4.2.16. " Nicolas Graves via Guix-patches via 2024-11-04 16:08 ` Zheng Junjie 2024-11-03 16:01 ` [bug#74035] [PATCH v2 03/26] gnu: maradns: Update to 3.5.0036. " Nicolas Graves via Guix-patches via 2024-11-04 16:09 ` Zheng Junjie 2024-11-03 16:01 ` [bug#74035] [PATCH v2 04/26] gnu: maradns: Improve style Nicolas Graves via Guix-patches via 2024-11-04 16:09 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 05/26] gnu: libmobi: Update to 0.12. [security fixes] Nicolas Graves via Guix-patches via 2024-11-04 11:57 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 06/26] gnu: bart: Update to 0.9.00. " Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 07/26] gnu: wireshark: Update to 4.4.1. " Nicolas Graves via Guix-patches via 2024-11-04 9:38 ` Z572 2024-11-03 16:02 ` [bug#74035] [PATCH v2 08/26] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 09/26] gnu: darkhttpd: Update to 1.16. " Nicolas Graves via Guix-patches via 2024-11-04 9:40 ` Z572 2024-11-03 16:02 ` [bug#74035] [PATCH v2 10/26] gnu: xlsxio: Update to 0.2.35. " Nicolas Graves via Guix-patches via 2024-11-04 16:12 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 11/26] gnu: pypy: Update to 7.3.17. " Nicolas Graves via Guix-patches via 2024-11-04 9:39 ` Z572 2024-11-03 16:02 ` [bug#74035] [PATCH v2 12/26] gnu: indent: Remove uneeded arguments Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 13/26] gnu: indent: Add patch for CVE-2024-0911. [security fixes] Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 14/26] gnu: squashfs-tools: Update to 4.6.1. " Nicolas Graves via Guix-patches via 2024-11-04 11:59 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 15/26] gnu: shapelib: Update to 1.6.1. " Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 16/26] gnu: libzapojit: Update to 0.0.3-1.99d49ba. " Nicolas Graves via Guix-patches via 2024-11-04 16:06 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 17/26] gnu: gifsicle: Update to 1.95. " Nicolas Graves via Guix-patches via 2024-11-04 11:58 ` Zheng Junjie 2024-11-03 16:02 ` [bug#74035] [PATCH v2 18/26] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 19/26] gnu: openvpn: Update to 2.6.12. " Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 20/26] gnu: liblouis: Update to 3.31.0. " Nicolas Graves via Guix-patches via 2024-11-04 11:58 ` Zheng Junjie 2024-11-06 16:09 ` Ludovic Courtès 2024-11-07 11:21 ` Z572 2024-11-03 16:02 ` [bug#74035] [PATCH v2 21/26] gnu: youtube-dl: Deprecate package Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 22/26] gnu: unicorn: Update to 2.1.1. [security fixes] Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 23/26] gnu: Add sexpp Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 24/26] gnu: rnp: Update to 0.17.1. [security fixes] Nicolas Graves via Guix-patches via 2024-11-03 16:02 ` [bug#74035] [PATCH v2 25/26] gnu: cjson: Update to 1.7.18. " Nicolas Graves via Guix-patches via 2024-11-04 9:39 ` Z572 2024-11-03 16:02 ` [bug#74035] [PATCH v2 26/26] gnu: snapcast: Update to 0.29.0. " Nicolas Graves via Guix-patches via 2024-11-04 16:08 ` [bug#74035] [PATCH v2 01/26] gnu: libyang: Update to 3.4.2. " Zheng Junjie 2024-11-05 23:10 ` [bug#74035] [PATCH v3 0/8] [security] fixes for near-leaf packages Nicolas Graves via Guix-patches via 2024-11-05 23:10 ` [bug#74035] [PATCH v3 1/8] gnu: bart: Update to 0.9.00. [security fixes] Nicolas Graves via Guix-patches via 2024-11-05 23:10 ` [bug#74035] [PATCH v3 2/8] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via 2024-11-05 23:10 ` [bug#74035] [PATCH v3 3/8] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 1/8] gnu: bart: Update to 0.9.00. " Nicolas Graves via Guix-patches via 2024-11-11 11:47 ` Maxim Cournoyer 2024-11-11 15:23 ` Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 2/8] gnu: pam-u2f: Update to 1.3.0. " Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 3/8] gnu: sendmail: Update to 8.18.1. " Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 4/8] gnu: openvpn: Update to 2.6.12. " Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 5/8] gnu: youtube-dl: Deprecate package Nicolas Graves via Guix-patches via 2024-11-11 11:48 ` Maxim Cournoyer 2024-11-11 15:22 ` Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 6/8] gnu: unicorn: Update to 2.1.1. [security fixes] Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 7/8] gnu: Add sexpp Nicolas Graves via Guix-patches via 2024-11-05 23:13 ` [bug#74035] [PATCH v4 8/8] gnu: rnp: Update to 0.17.1. [security fixes] Nicolas Graves via Guix-patches via 2024-11-11 13:14 ` Maxim Cournoyer 2024-11-11 15:23 ` Nicolas Graves via Guix-patches via 2024-11-12 11:54 ` bug#74035: " Maxim Cournoyer 2024-11-12 14:12 ` [bug#74035] " Maxim Cournoyer
Code repositories for project(s) associated with this public inbox https://git.savannah.gnu.org/cgit/guix.git This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).