1. 27 Dec, 2021 3 commits
  2. 18 Dec, 2021 2 commits
  3. 03 Dec, 2021 4 commits
  4. 30 Nov, 2021 1 commit
  5. 18 Nov, 2021 1 commit
    • Martin Jansa's avatar
      sdbus-c++: don't fetch googletest during do_configure · d9717dea
      Martin Jansa authored
      * with PTEST_ENABLED it enables with-tests PACKAGECONFIG which
        instead of using system googletest gmock, tries to fetch googletest
        from github and fails because branch was recently renamed from master to main
      
      | -- Found PkgConfig: /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/bin/pkg-config (found version "0.29.2")
      | -- Checking for module 'libsystemd>=236'
      | --   Found libsystemd, version 249
      | -- Building with tests
      | Fetching googletest...
      | [1/9] Creating directories for 'googletest-populate'
      | [1/9] Performing download step (git clone) for 'googletest-populate'
      | Cloning into 'googletest-src'...
      | fatal: invalid reference: master
      | CMake Error at googletest-subbuild/googletest-populate-prefix/tmp/googletest-populate-gitclone.cmake:40 (message):
      |   Failed to checkout tag: 'master'
      |
      |
      | FAILED: googletest-populate-prefix/src/googletest-populate-stamp/googletest-populate-download
      | cd /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/build/_deps && /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/bin/cmake -P /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/build/_deps/googletest-subbuild/googletest-populate-prefix/tmp/googletest-populate-gitclone.cmake && /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/bin/cmake -E touch /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/build/_deps/googletest-subbuild/googletest-populate-prefix/src/googletest-populate-stamp/googletest-populate-download
      | ninja: build stopped: subcommand failed.
      |
      | CMake Error at /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/share/cmake-3.19/Modules/FetchContent.cmake:989 (message):
      |   Build step for googletest failed: 1
      | Call Stack (most recent call first):
      |   /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/share/cmake-3.19/Modules/FetchContent.cmake:1118:EVAL:2 (__FetchContent_directPopulate)
      |   /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/share/cmake-3.19/Modules/FetchContent.cmake:1118 (cmake_language)
      |   tests/CMakeLists.txt:17 (FetchContent_Populate)
      |
      |
      | -- Configuring incomplete, errors occurred!
      
      * unfortunately this backported patch fixes the fetching failure, because
        it uses release-${GOOGLETEST_VERSION} tag instead of now non-existent
        master branch, but is not enough to prevent fetching from github during
        do_configure:
      
        -- Building with tests
        -- Could NOT find GTest (missing: GTest_DIR)
        -- Checking for module 'gmock>=1.10.0'
        --   No package 'gmock' found
        Fetching googletest...
      
        we also need to add googletest dependency to with-tests PACKAGECONFIG was fixed in meta-oe/master with the upgrade to 1.0.0:
        https://github.com/openembedded/meta-openembedded/commit/b26b66e5da92718b4e99a57fbfaaef9e751c3cfe#diff-48a847e7323703994fd2ce0fcb731ff860fa955a77cdfe39d71a9cc84a042c06L15
      
      
      
        then it's ok and not fetching:
      
        -- Building with tests
        -- Looking for pthread.h
        -- Looking for pthread.h - found
      Signed-off-by: default avatarMartin Jansa <Martin.Jansa@gmail.com>
      Signed-off-by: default avatarArmin Kuster <akuster808@gmail.com>
      d9717dea
  6. 17 Nov, 2021 3 commits
  7. 02 Nov, 2021 8 commits
  8. 29 Oct, 2021 2 commits
    • Armin Kuster's avatar
      redis: update to 5.0.14 · 6be10fe6
      Armin Kuster authored
      Bug fix only updates. see: https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES
      
      Including these cves:
      
      5.0.14
      Security Fixes:
      * (CVE-2021-41099) Integer to heap buffer overflow handling certain string
      commands and network payloads, when proto-max-bulk-len is manually configured
      to a non-default, very large value [reported by yiyuaner].
      * (CVE-2021-32762) Integer to heap buffer overflow issue in redis-cli and
      redis-sentinel parsing large multi-bulk replies on some older and less common
      platforms [reported by Microsoft Vulnerability Research].
      * (CVE-2021-32687) Integer to heap buffer overflow with intsets, when
      set-max-intset-entries is manually configured to a non-default, very large
      value [reported by Pawel Wieczorkiewicz, AWS].
      * (CVE-2021-32675) Denial Of Service when processing RESP request payloads with
      a large number of elements on many connections.
      * (CVE-2021-32672) Random heap reading issue with Lua Debugger [reported by
      Meir Shpilraien].
      * (CVE-2021-32628) Integer to heap buffer overflow handling ziplist-encoded
      data types, when configuring a large, non-default value for
      hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries
      or zset-max-ziplist-value [reported by sundb].
      * (CVE-2021-32627) Integer to heap buffer overflow issue with streams, when
      configuring a non-default, large value for proto-max-bulk-len and
      client-query-buffer-limit [reported by sundb].
      * (CVE-2021-32626) Specially crafted Lua scripts may result with Heap buffer
      overflow [reported by Meir Shpilraien].
      
      5.0.11
      Integer overflow on 32-bit systems (CVE-2021-21309):
      Redis 4.0 or newer uses a configurable limit for the maximum supported bulk
      input size. By default, it is 512MB which is a safe value for all platforms.
      If the limit is significantly increased, receiving a large request from a client
      may trigger several integer overflow scenarios, which would result with buffer
      overflow and heap corruption.
      
      5.0.10
      This release fixes a potential heap overflow when using a heap allocator other
      than jemalloc or glibc's malloc. See:
      https://github.com/redis/redis/pull/7963
      
      Signed-off-by: default avatarArmin Kuster <akuster808@gmail.com>
      6be10fe6
    • Armin Kuster's avatar
      Apache: Several CVE fixes · 98ccbca4
      Armin Kuster authored
      Source: Apache.org
      MR: 113457, 113453
      Type: Security Fix
      Disposition: Backport from apache.org 2.4.51
      ChangeID: 9d7b58f49487baff99bf8f101e53217425a2b81f
      Description:
      
      Bug fix only update. LTS version
      https://httpd.apache.org/security/vulnerabilities_24.html
      
      
      
      Fixes CVEs:
      CVE-2021-42013
      CVE-2021-41524
      CVE-2021-41773
      Signed-off-by: default avatarArmin Kuster <akuster@mvista.com>
      Signed-off-by: default avatarKhem Raj <raj.khem@gmail.com>
      (cherry picked from commit c59ce329
      
      )
      Signed-off-by: default avatarArmin Kuster <akuster808@gmail.com>
      98ccbca4
  9. 14 Oct, 2021 2 commits
  10. 01 Oct, 2021 2 commits
    • Purushottam Choudhary's avatar
      tcpdump: Update CVE-2020-8037 tag · 3cf22d15
      Purushottam Choudhary authored
      
      CVE tag was missing inside the patch file
      which is the remedy for CVE-2020-8037 and
      tracked by cve-check.
      Signed-off-by: default avatarPurushottam Choudhary <purushottam.Choudhary@kpit.com>
      Signed-off-by: default avatarPurushottam Choudhary <purushottamchoudhary29@gmail.com>
      Signed-off-by: default avatarArmin Kuster <akuster808@gmail.com>
      3cf22d15
    • wangmy's avatar
      apache2: upgrade 2.4.48 -> 2.4.49 · df1a3371
      wangmy authored
      Source: git://git.openembedded.org/meta-openembedded
      MR: 112702, 113258, 113284, 113290, 113296
      Type: Security Fix
      Disposition: Backport from https://git.openembedded.org/meta-openembedded/commit/meta-webserver/recipes-httpd/apache2?h=honister&id=54a96fa4feb1a7712f9f3d1190c0d95d89eb6c7c
      
      
      ChangeID: 1576d86baac5a72ea4d2909a8a05c0c87fdce2f1
      Description:
      
      Changes with Apache 2.4.49
      
        *) SECURITY: CVE-2021-40438 (cve.mitre.org)
           mod_proxy: Server Side Request Forgery (SSRF) vulnerabilty [Yann Ylavic]
      
        *) SECURITY: CVE-2021-39275 (cve.mitre.org)
           core: ap_escape_quotes buffer overflow
      
        *) SECURITY: CVE-2021-36160 (cve.mitre.org)
           mod_proxy_uwsgi: Out of bound read vulnerability [Yann Ylavic]
      
        *) SECURITY: CVE-2021-34798 (cve.mitre.org)
           core: null pointer dereference on malformed request
      
        *) SECURITY: CVE-2021-33193 (cve.mitre.org)
           mod_http2: Request splitting vulnerability with mod_proxy [Stefan Eissing]
      
        *) core/mod_proxy/mod_ssl:
           Adding `outgoing` flag to conn_rec, indicating a connection is
           initiated by the server to somewhere, in contrast to incoming
           connections from clients.
           Adding 'ap_ssl_bind_outgoing()` function that marks a connection
           as outgoing and is used by mod_proxy instead of the previous
           optional function `ssl_engine_set`. This enables other SSL
           module to secure proxy connections.
           The optional functions `ssl_engine_set`, `ssl_engine_disable` and
           `ssl_proxy_enable` are now provided by the core to have backward
           compatibility with non-httpd modules that might use them. mod_ssl
           itself no longer registers these functions, but keeps them in its
           header for backward compatibility.
           The core provided optional function wrap any registered function
           like it was done for `ssl_is_ssl`.
           [Stefan Eissing]
      
        *) mod_ssl: Support logging private key material for use with
           wireshark via log file given by SSLKEYLOGFILE environment
           variable.  Requires OpenSSL 1.1.1.  PR 63391.  [Joe Orton]
      
        *) mod_proxy: Do not canonicalize the proxied URL when both "nocanon" and
           "ProxyPassInterpolateEnv On" are configured.  PR 65549.
           [Joel Self <joelself gmail.com>]
      
        *) mpm_event: Fix children processes possibly not stopped on graceful
           restart.  PR 63169.  [Joel Self <joelself gmail.com>]
      
        *) mod_proxy: Fix a potential infinite loop when tunneling Upgrade(d)
           protocols from mod_proxy_http, and a timeout triggering falsely when
           using mod_proxy_wstunnel, mod_proxy_connect or mod_proxy_http with
           upgrade= setting.  PRs 65521 and 65519.  [Yann Ylavic]
      
        *) mod_unique_id: Reduce the time window where duplicates may be generated
           PR 65159
           [Christophe Jaillet]
      
        *) mpm_prefork: Block signals for child_init hooks to prevent potential
           threads created from there to catch MPM's signals.
           [Ruediger Pluem, Yann Ylavic]
      
        *) Revert "mod_unique_id: Fix potential duplicated ID generation under heavy load.
           PR 65159" added in 2.4.47.
           This causes issue on Windows.
           [Christophe Jaillet]
      
        *) mod_proxy_uwsgi: Fix PATH_INFO setting for generic worker.  [Yann Ylavic]
      
        *) mod_md: Certificate/keys pairs are verified as matching before a renewal is accepted
           as successful or a staged renewal is replacing the existing certificates.
           This avoid potential mess ups in the md store file system to render the active
           certificates non-working. [@mkauf]
      
        *) mod_proxy: Faster unix socket path parsing in the "proxy:" URL.
           [Yann Ylavic]
      
        *) mod_ssl: tighten the handling of ALPN for outgoing (proxy)
           connections. If ALPN protocols are provided and sent to the
           remote server, the received protocol selected is inspected
           and checked for a match. Without match, the peer handshake
           fails.
           An exception is the proposal of "http/1.1" where it is
           accepted if the remote server did not answer ALPN with
           a selected protocol. This accomodates for hosts that do
           not observe/support ALPN and speak http/1.x be default.
      
        *) mod_proxy: Fix possible reuse/merging of Proxy(Pass)Match worker instances
           with others when their URLs contain a '$' substitution.  PR 65419 + 65429.
           [Yann Ylavic]
      
        *) mod_dav: Add method_precondition hook. WebDAV extensions define
           conditions that must exist before a WebDAV method can be executed.
           This hook allows a WebDAV extension to verify these preconditions.
           [Graham Leggett]
      
        *) Add hooks deliver_report and gather_reports to mod_dav.h. Allows other
           modules apart from versioning implementations to handle the REPORT method.
           [Graham Leggett]
      
        *) Add dav_get_provider(), dav_open_lockdb(), dav_close_lockdb() and
           dav_get_resource() to mod_dav.h. [Graham Leggett]
      
        *) core: fix ap_escape_quotes substitution logic. [Eric Covener]
      
        *) Easy patches: synch 2.4.x and trunk
           - mod_auth_basic: Use ap_cstr_casecmp instead of strcasecmp.
           - mod_ldap: log and abort locking errors.
           - mod_ldap: style fix for r1831165
           - mod_ldap: build break fix for r1831165
           - mod_deflate: Avoid hard-coded "%ld" format strings in mod_deflate's logging statements
           - mod_deflate: Use apr_uint64_t instead of uint64_t (follow up to r1849590)
           - mod_forensic: Follow up to r1856490: missing one mod_log_forensic test_char_table case.
           - mod_rewrite: Save a few cycles.
           - mod_request: Fix a comment (missing '_' in 'keep_body') and some style issues
           - core: remove extra whitespace in HTTP_NOT_IMPLEMENTED
          [Christophe Jaillet]
      
        *) core/mpm: add hook 'child_stopping` that gets called when the MPM is
           stopping a child process. The additional `graceful` parameter allows
           registered hooks to free resources early during a graceful shutdown.
           [Yann Ylavic, Stefan Eissing]
      
        *) mod_proxy: Fix icomplete initialization of BalancerMember(s) from the
           balancer-manager, which can lead to a crash.  [Yann Ylavic]
      
        *) mpm_event: Fix graceful stop/restart of children processes if connections
           are in lingering close for too long.  [Yann Ylavic]
      
        *) mod_md: fixed a potential null pointer dereference if ACME/OCSP
           server returned 2xx responses without content type. Reported by chuangwen.
           [chuangwen, Stefan Eissing]
      
        *) mod_md:
           - Domain names in `<MDomain ...>` can now appear in quoted form.
           - Fixed a failure in ACME challenge selection that aborted further searches
             when the tls-alpn-01 method did not seem to be suitable.
           - Changed the tls-alpn-01 setup to only become unsuitable when none of the
             dns names showed support for a configured 'Protocols ... acme-tls/1'. This
             allows use of tls-alpn-01 for dns names that are not mapped to a VirtualHost.
           [Stefan Eissing]
      
        *) Add CPING to health check logic. [Jean-Frederic Clere]
      
        *) core: Split ap_create_request() from ap_read_request(). [Graham Leggett]
      
        *) core, h2: common ap_parse_request_line() and ap_check_request_header()
           code. [Yann Ylavic]
      
        *) core: Add StrictHostCheck to allow unconfigured hostnames to be
           rejected. [Eric Covener]
      
        *) htcacheclean: Improve help messages.  [Christophe Jaillet]
      Signed-off-by: default avatarWang Mingyu <wangmy@fujitsu.com>
      Signed-off-by: default avatarKhem Raj <raj.khem@gmail.com>
      (cherry picked from commit 54a96fa4
      
      )
      Signed-off-by: default avatarArmin Kuster <akuster808@gmail.com>
      (cherry picked from commit f44e1a2b
      
      )
      Signed-off-by: default avatarArmin Kuster <akuster@mvista.com>
      df1a3371
  11. 20 Sep, 2021 2 commits
  12. 10 Sep, 2021 3 commits
  13. 05 Sep, 2021 7 commits