- 27 Dec, 2021 3 commits
-
-
Armin kuster authored
Signed-off-by:
Armin kuster <akuster808@gamil.com>
-
Robert Joslyn authored
Bug and security fixes. Fix patch fuzz as well to remove bitbake warning. Release notes available at: https://www.postgresql.org/docs/release/12.8/ https://www.postgresql.org/docs/release/12.9/ 12.8 fixes: CVE-2021-3677 12.9 fixes: CVE-2021-23214 CVE-2021-23222 Signed-off-by:
Robert Joslyn <robert.joslyn@redrectangle.org> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Ernst Sjöstrand authored
Extract patch from the 0.9.71 release commit. Upstream-Status: Backport CVE: CVE-2021-3466 Signed-off-by:
Ernst Sjöstrand <ernst.sjostrand@verisure.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
- 18 Dec, 2021 2 commits
-
-
sana kazi authored
Add patch to fix CVE-2021-43527 which causes heap overflow in nss. Signed-off-by:
Sana Kazi <Sana.Kazi@kpit.com> Signed-off-by:
Sana Kazi <sanakazisk19@gmail.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Jeremy Puhlman authored
Signed-off-by:
Jeremy A. Puhlman <jpuhlman@mvista.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
- 03 Dec, 2021 4 commits
-
-
Spectrejan authored
Port patch to fix CVE-2020-8927 for brotli from Debian Buster CVE: CVE-2020-8927 Signed-off-by:
Jan Kraemer <jan@spectrejan.de> [Fixup to apply with URL changes] Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
sana kazi authored
Added patch for CVE-2020-12674 Link: http://archive.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_2.2.33.2-1ubuntu4.7.debian.tar.xz Signed-off-by:
Sana Kazi <Sana.Kazi@kpit.com> Signed-off-by:
Sana Kazi <sanakazisk19@gmail.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
sana kazi authored
Added patch for CVE-2020-12673 Link: http://archive.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_2.2.33.2-1ubuntu4.7.debian.tar.xz Signed-off-by:
Sana Kazi <Sana.Kazi@kpit.com> Signed-off-by:
Sana Kazi <sanakazisk19@gmail.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
sana kazi authored
Added patches to fix CVE-2020-12100 Link: http://archive.ubuntu.com/ubuntu/pool/main/d/dovecot/dovecot_2.2.33.2-1ubuntu4.7.debian.tar.xz Signed-off-by:
Sana Kazi <Sana.Kazi@kpit.com> Signed-off-by:
Sana Kazi <sanakazisk19@gmail.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
- 30 Nov, 2021 1 commit
-
-
Marta Rybczynska authored
According to the upstream [1], the bug happens only if the programmer does not follow the API definition. [1] https://github.com/akheron/jansson/issues/548 Signed-off-by:
Marta Rybczynska <marta.rybczynska@huawei.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
- 18 Nov, 2021 1 commit
-
-
Martin Jansa authored
* with PTEST_ENABLED it enables with-tests PACKAGECONFIG which instead of using system googletest gmock, tries to fetch googletest from github and fails because branch was recently renamed from master to main | -- Found PkgConfig: /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/bin/pkg-config (found version "0.29.2") | -- Checking for module 'libsystemd>=236' | -- Found libsystemd, version 249 | -- Building with tests | Fetching googletest... | [1/9] Creating directories for 'googletest-populate' | [1/9] Performing download step (git clone) for 'googletest-populate' | Cloning into 'googletest-src'... | fatal: invalid reference: master | CMake Error at googletest-subbuild/googletest-populate-prefix/tmp/googletest-populate-gitclone.cmake:40 (message): | Failed to checkout tag: 'master' | | | FAILED: googletest-populate-prefix/src/googletest-populate-stamp/googletest-populate-download | cd /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/build/_deps && /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/bin/cmake -P /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/build/_deps/googletest-subbuild/googletest-populate-prefix/tmp/googletest-populate-gitclone.cmake && /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/bin/cmake -E touch /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/build/_deps/googletest-subbuild/googletest-populate-prefix/src/googletest-populate-stamp/googletest-populate-download | ninja: build stopped: subcommand failed. | | CMake Error at /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/share/cmake-3.19/Modules/FetchContent.cmake:989 (message): | Build step for googletest failed: 1 | Call Stack (most recent call first): | /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/share/cmake-3.19/Modules/FetchContent.cmake:1118:EVAL:2 (__FetchContent_directPopulate) | /OE/tmp-glibc/work/qemux86-oe-linux/sdbus-c++/0.8.3-r0/recipe-sysroot-native/usr/share/cmake-3.19/Modules/FetchContent.cmake:1118 (cmake_language) | tests/CMakeLists.txt:17 (FetchContent_Populate) | | | -- Configuring incomplete, errors occurred! * unfortunately this backported patch fixes the fetching failure, because it uses release-${GOOGLETEST_VERSION} tag instead of now non-existent master branch, but is not enough to prevent fetching from github during do_configure: -- Building with tests -- Could NOT find GTest (missing: GTest_DIR) -- Checking for module 'gmock>=1.10.0' -- No package 'gmock' found Fetching googletest... we also need to add googletest dependency to with-tests PACKAGECONFIG was fixed in meta-oe/master with the upgrade to 1.0.0: https://github.com/openembedded/meta-openembedded/commit/b26b66e5da92718b4e99a57fbfaaef9e751c3cfe#diff-48a847e7323703994fd2ce0fcb731ff860fa955a77cdfe39d71a9cc84a042c06L15 then it's ok and not fetching: -- Building with tests -- Looking for pthread.h -- Looking for pthread.h - found Signed-off-by:
Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
- 17 Nov, 2021 3 commits
-
-
lumag authored
lmsensors will build isadump and isaset only on x86 architecture. Depending on this package breaks lmsensors on all non-x86 machines. Fix this by enabling ${PN}-isatools dependency only on x86. Signed-off-by:
Dmitry Baryshkov <dbaryshkov@gmail.com> Signed-off-by:
Khem Raj <raj.khem@gmail.com> Signed-off-by:
Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Ranjitsinh Rathod authored
Add patch for CVE-2020-12403 Link: https://github.com/nss-dev/nss/commit/9ff9d3925d31ab265a965ab1d16d76c496ddb5c8 https://github.com/nss-dev/nss/commit/06b2b1c50bd4eaa7f65d858e5e3f44f678cb3c45 Signed-off-by:
Ranjitsinh Rathod <ranjitsinh.rathod@kpit.com> Signed-off-by:
Ranjitsinh Rathod <ranjitsinhrathod1991@gmail.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Armin Kuster authored
This patch updates SRC_URIs using git to include branch=master if no branch is set and also to use protocol=https for github urls as generated by the conversion script in OE-Core. Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
- 02 Nov, 2021 8 commits
-
-
Maíra Canal via authored
Updates the python3-fasteners package considering that the 0.15 version doesn't support Python 3.8, only Python 3.5 or less. The 0.16.3 version support Python 3.8. The non-support of Python 3.8 results in the malfunction of many layers in the dunfell branch. Signed-off-by:
Maíra Canal <maira.canal@usp.br> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Alexander Thoma authored
Signed-off-by: Alexander Thoma a.thoma@rational-online.com Signed-off-by: Florian Wühr f.wuehr@rational-online.com Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Andreas Weger authored
Since it uses multiple fetch URIs make it explicit to define SRCREV_FORMAT Signed-off-by:
Andreas Weger <weger@hs-mittweida.de> Change-Id: Id1d0a1062d09f690123b2a1c06137ae5c04d7b20 Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Andreas Weger authored
Since it uses multiple fetch URIs make it explicit to define SRCREV_FORMAT Signed-off-by:
Andreas Weger <weger@hs-mittweida.de> Change-Id: Ib24fce16b3986a465f1c5854166b8f28446b5186 Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Andreas Weger authored
Since it uses multiple fetch URIs make it explicit to define SRCREV_FORMAT Signed-off-by:
Andreas Weger <weger@hs-mittweida.de> Change-Id: I062eb971a83594315cc674ccb6eba67a14d5656f Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Khem Raj authored
Since it uses multiple fetch URIs make it explicit to define SRCREV_FORMAT Signed-off-by:
Khem Raj <raj.khem@gmail.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Khem Raj authored
Since it uses multiple fetch URIs make it explicit to define SRCREV_FORMAT Signed-off-by:
Khem Raj <raj.khem@gmail.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Anastasios Kavoukis authored
Cherry-pick the following patch from upstream/master branch, as this fixes the following error(s) seen while running the 'pm-qa' scripts on the targets: cpufreq_01.sh: line 28: ../include/functions.sh: No such file or directory ----------------------------------------------- A commit in the repo of pm-qa: "adf9df9 Fix path to library files and change shebang line" Changed the text that sed was using to replace relative to absolute paths. As a result sed was not effectively finding the text "source ../include" to replace it, as the sed should be now searching for ". ../include". Similarly for "../Switches" Signed-off-by:
Anastasios Kavoukis <anastasios.kavoukis@arm.com> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit 06a93a04 ) Signed-off-by:
Bhupesh Sharma <bhupesh.sharma@linaro.org> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
- 29 Oct, 2021 2 commits
-
-
Armin Kuster authored
Bug fix only updates. see: https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES Including these cves: 5.0.14 Security Fixes: * (CVE-2021-41099) Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value [reported by yiyuaner]. * (CVE-2021-32762) Integer to heap buffer overflow issue in redis-cli and redis-sentinel parsing large multi-bulk replies on some older and less common platforms [reported by Microsoft Vulnerability Research]. * (CVE-2021-32687) Integer to heap buffer overflow with intsets, when set-max-intset-entries is manually configured to a non-default, very large value [reported by Pawel Wieczorkiewicz, AWS]. * (CVE-2021-32675) Denial Of Service when processing RESP request payloads with a large number of elements on many connections. * (CVE-2021-32672) Random heap reading issue with Lua Debugger [reported by Meir Shpilraien]. * (CVE-2021-32628) Integer to heap buffer overflow handling ziplist-encoded data types, when configuring a large, non-default value for hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value [reported by sundb]. * (CVE-2021-32627) Integer to heap buffer overflow issue with streams, when configuring a non-default, large value for proto-max-bulk-len and client-query-buffer-limit [reported by sundb]. * (CVE-2021-32626) Specially crafted Lua scripts may result with Heap buffer overflow [reported by Meir Shpilraien]. 5.0.11 Integer overflow on 32-bit systems (CVE-2021-21309): Redis 4.0 or newer uses a configurable limit for the maximum supported bulk input size. By default, it is 512MB which is a safe value for all platforms. If the limit is significantly increased, receiving a large request from a client may trigger several integer overflow scenarios, which would result with buffer overflow and heap corruption. 5.0.10 This release fixes a potential heap overflow when using a heap allocator other than jemalloc or glibc's malloc. See: https://github.com/redis/redis/pull/7963 Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Armin Kuster authored
Source: Apache.org MR: 113457, 113453 Type: Security Fix Disposition: Backport from apache.org 2.4.51 ChangeID: 9d7b58f49487baff99bf8f101e53217425a2b81f Description: Bug fix only update. LTS version https://httpd.apache.org/security/vulnerabilities_24.html Fixes CVEs: CVE-2021-42013 CVE-2021-41524 CVE-2021-41773 Signed-off-by:
Armin Kuster <akuster@mvista.com> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit c59ce329 ) Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
- 14 Oct, 2021 2 commits
-
-
Richard Purdie authored
Fixes in OE-Core added some pkgconfig dependencies back and this flagged that the .pc file was in ${PN}, not ${PN}-dev. Fix that. Signed-off-by:
Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit e9b3476a ) Signed-off-by:
Steve Sakoman <steve@sakoman.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Konrad Weihmann authored
as it's already packaged to ${PN}-dev, so the setting was without any effect anyway Signed-off-by:
Konrad Weihmann <kweihmann@outlook.com> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit 1d26b265 ) Signed-off-by:
Steve Sakoman <steve@sakoman.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
- 01 Oct, 2021 2 commits
-
-
Purushottam Choudhary authored
CVE tag was missing inside the patch file which is the remedy for CVE-2020-8037 and tracked by cve-check. Signed-off-by:
Purushottam Choudhary <purushottam.Choudhary@kpit.com> Signed-off-by:
Purushottam Choudhary <purushottamchoudhary29@gmail.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
wangmy authored
Source: git://git.openembedded.org/meta-openembedded MR: 112702, 113258, 113284, 113290, 113296 Type: Security Fix Disposition: Backport from https://git.openembedded.org/meta-openembedded/commit/meta-webserver/recipes-httpd/apache2?h=honister&id=54a96fa4feb1a7712f9f3d1190c0d95d89eb6c7c ChangeID: 1576d86baac5a72ea4d2909a8a05c0c87fdce2f1 Description: Changes with Apache 2.4.49 *) SECURITY: CVE-2021-40438 (cve.mitre.org) mod_proxy: Server Side Request Forgery (SSRF) vulnerabilty [Yann Ylavic] *) SECURITY: CVE-2021-39275 (cve.mitre.org) core: ap_escape_quotes buffer overflow *) SECURITY: CVE-2021-36160 (cve.mitre.org) mod_proxy_uwsgi: Out of bound read vulnerability [Yann Ylavic] *) SECURITY: CVE-2021-34798 (cve.mitre.org) core: null pointer dereference on malformed request *) SECURITY: CVE-2021-33193 (cve.mitre.org) mod_http2: Request splitting vulnerability with mod_proxy [Stefan Eissing] *) core/mod_proxy/mod_ssl: Adding `outgoing` flag to conn_rec, indicating a connection is initiated by the server to somewhere, in contrast to incoming connections from clients. Adding 'ap_ssl_bind_outgoing()` function that marks a connection as outgoing and is used by mod_proxy instead of the previous optional function `ssl_engine_set`. This enables other SSL module to secure proxy connections. The optional functions `ssl_engine_set`, `ssl_engine_disable` and `ssl_proxy_enable` are now provided by the core to have backward compatibility with non-httpd modules that might use them. mod_ssl itself no longer registers these functions, but keeps them in its header for backward compatibility. The core provided optional function wrap any registered function like it was done for `ssl_is_ssl`. [Stefan Eissing] *) mod_ssl: Support logging private key material for use with wireshark via log file given by SSLKEYLOGFILE environment variable. Requires OpenSSL 1.1.1. PR 63391. [Joe Orton] *) mod_proxy: Do not canonicalize the proxied URL when both "nocanon" and "ProxyPassInterpolateEnv On" are configured. PR 65549. [Joel Self <joelself gmail.com>] *) mpm_event: Fix children processes possibly not stopped on graceful restart. PR 63169. [Joel Self <joelself gmail.com>] *) mod_proxy: Fix a potential infinite loop when tunneling Upgrade(d) protocols from mod_proxy_http, and a timeout triggering falsely when using mod_proxy_wstunnel, mod_proxy_connect or mod_proxy_http with upgrade= setting. PRs 65521 and 65519. [Yann Ylavic] *) mod_unique_id: Reduce the time window where duplicates may be generated PR 65159 [Christophe Jaillet] *) mpm_prefork: Block signals for child_init hooks to prevent potential threads created from there to catch MPM's signals. [Ruediger Pluem, Yann Ylavic] *) Revert "mod_unique_id: Fix potential duplicated ID generation under heavy load. PR 65159" added in 2.4.47. This causes issue on Windows. [Christophe Jaillet] *) mod_proxy_uwsgi: Fix PATH_INFO setting for generic worker. [Yann Ylavic] *) mod_md: Certificate/keys pairs are verified as matching before a renewal is accepted as successful or a staged renewal is replacing the existing certificates. This avoid potential mess ups in the md store file system to render the active certificates non-working. [@mkauf] *) mod_proxy: Faster unix socket path parsing in the "proxy:" URL. [Yann Ylavic] *) mod_ssl: tighten the handling of ALPN for outgoing (proxy) connections. If ALPN protocols are provided and sent to the remote server, the received protocol selected is inspected and checked for a match. Without match, the peer handshake fails. An exception is the proposal of "http/1.1" where it is accepted if the remote server did not answer ALPN with a selected protocol. This accomodates for hosts that do not observe/support ALPN and speak http/1.x be default. *) mod_proxy: Fix possible reuse/merging of Proxy(Pass)Match worker instances with others when their URLs contain a '$' substitution. PR 65419 + 65429. [Yann Ylavic] *) mod_dav: Add method_precondition hook. WebDAV extensions define conditions that must exist before a WebDAV method can be executed. This hook allows a WebDAV extension to verify these preconditions. [Graham Leggett] *) Add hooks deliver_report and gather_reports to mod_dav.h. Allows other modules apart from versioning implementations to handle the REPORT method. [Graham Leggett] *) Add dav_get_provider(), dav_open_lockdb(), dav_close_lockdb() and dav_get_resource() to mod_dav.h. [Graham Leggett] *) core: fix ap_escape_quotes substitution logic. [Eric Covener] *) Easy patches: synch 2.4.x and trunk - mod_auth_basic: Use ap_cstr_casecmp instead of strcasecmp. - mod_ldap: log and abort locking errors. - mod_ldap: style fix for r1831165 - mod_ldap: build break fix for r1831165 - mod_deflate: Avoid hard-coded "%ld" format strings in mod_deflate's logging statements - mod_deflate: Use apr_uint64_t instead of uint64_t (follow up to r1849590) - mod_forensic: Follow up to r1856490: missing one mod_log_forensic test_char_table case. - mod_rewrite: Save a few cycles. - mod_request: Fix a comment (missing '_' in 'keep_body') and some style issues - core: remove extra whitespace in HTTP_NOT_IMPLEMENTED [Christophe Jaillet] *) core/mpm: add hook 'child_stopping` that gets called when the MPM is stopping a child process. The additional `graceful` parameter allows registered hooks to free resources early during a graceful shutdown. [Yann Ylavic, Stefan Eissing] *) mod_proxy: Fix icomplete initialization of BalancerMember(s) from the balancer-manager, which can lead to a crash. [Yann Ylavic] *) mpm_event: Fix graceful stop/restart of children processes if connections are in lingering close for too long. [Yann Ylavic] *) mod_md: fixed a potential null pointer dereference if ACME/OCSP server returned 2xx responses without content type. Reported by chuangwen. [chuangwen, Stefan Eissing] *) mod_md: - Domain names in `<MDomain ...>` can now appear in quoted form. - Fixed a failure in ACME challenge selection that aborted further searches when the tls-alpn-01 method did not seem to be suitable. - Changed the tls-alpn-01 setup to only become unsuitable when none of the dns names showed support for a configured 'Protocols ... acme-tls/1'. This allows use of tls-alpn-01 for dns names that are not mapped to a VirtualHost. [Stefan Eissing] *) Add CPING to health check logic. [Jean-Frederic Clere] *) core: Split ap_create_request() from ap_read_request(). [Graham Leggett] *) core, h2: common ap_parse_request_line() and ap_check_request_header() code. [Yann Ylavic] *) core: Add StrictHostCheck to allow unconfigured hostnames to be rejected. [Eric Covener] *) htcacheclean: Improve help messages. [Christophe Jaillet] Signed-off-by:
Wang Mingyu <wangmy@fujitsu.com> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit 54a96fa4 ) Signed-off-by:
Armin Kuster <akuster808@gmail.com> (cherry picked from commit f44e1a2b ) Signed-off-by:
Armin Kuster <akuster@mvista.com>
-
- 20 Sep, 2021 2 commits
-
-
Marek Vasut authored
The tool depends on the six module, add it, otherwise the following traceback happens when running it on the target: Traceback (most recent call last): File "/usr/bin/dstat", line 32, in <module> import six ModuleNotFoundError: No module named 'six' Signed-off-by:
Marek Vasut <marex@denx.de> Cc: Khem Raj <raj.khem@gmail.com> Cc: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Neetika Singh authored
Added below patches to fix CVE-2021-3672 1. ares_expand_name-should-escape-more-characters.patch 2. ares_expand_name-fix-formatting-and-handling-of-root.patch Link: http://snapshot.debian.org/archive/debian-security/20210810T064453Z/pool/updates/main/c/c-ares/c-ares_1.17.1-1%2Bdeb11u1.debian.tar.xz Signed-off-by:
akash hadke <Akash.Hadke@kpit.com> Signed-off-by:
Neetika Singh <Neetika.Singh@kpit.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
- 10 Sep, 2021 3 commits
-
-
Armin Kuster authored
Source: https://thekelleys.org.uk/dnsmasq.git MR: 110238 Type: Security Fix Disposition: Backport from https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=74d4fcd756a85bc1823232ea74334f7ccfb9d5d2 ChangeID: 3365bcc47b0467b487f14fc6bfad89bc560cd818 Description: A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity. Signed-off-by:
Armin Kuster <akuster@mvista.com>
-
Yi Zhao authored
Source: https://git.openembedded.org/meta-openembedded MR: 112165 Type: Security Fix Disposition: Backport from https://git.openembedded.org/meta-openembedded/commit/meta-oe/recipes-connectivity/krb5?id=69087d69d01a4530e2d588036fcbeaf8856b2ff1 ChangeID: e7cdfd1c4530312b4773103cf58d322451af1421 Description: CVE-2021-36222: ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation. References: https://nvd.nist.gov/vuln/detail/CVE-2021-36222 Patches from: https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 Signed-off-by:
Yi Zhao <yi.zhao@windriver.com> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit 620badcbf8a59fbd2cdda6ab01c4ffba1c3ee327) Signed-off-by:
Armin Kuster <akuster808@gmail.com> (cherry picked from commit 523f6d83 ) [Fixup for Dunfell context] Signed-off-by:
Armin Kuster <akuster@mvista.com>
-
Pierre-Jean Texier authored
Source: https://git.openembedded.org/meta-openembedded MR: 109039 Type: Security Fix Disposition: Backport from https://git.openembedded.org/meta-openembedded/commit/meta-networking/recipes-support/stunnel?h=gatesgarth&id=b76712700c79e4627028787ae65ab306c21eed02 ChangeID: 2543a2516b0f00024ed117a1fe33d1157b3d725f Description: Affects < 5.57 License-Update: copyright years updated. This is a bug fix release: - X.509 v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificaes. - Fixed a tiny memory leak in configuration file reload error handling (thx to Richard Könning). - Merged Debian 05-typos.patch (thx to Peter Pentchev). - Merged with minor changes Debian 06-hup-separate.patch (thx to Peter Pentchev). - Merged Debian 07-imap-capabilities.patch (thx to Ansgar). - Merged Debian 08-addrconfig-workaround.patch (thx to Peter Pentchev). - Fixed tests on the WSL2 platform. Signed-off-by:
Pierre-Jean Texier <pjtexier@koncepto.io> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit b7671270) [Includes CVE-2021-20230 per changelog Full commit https://github.com/mtrojnar/stunnel/commit/ebad9ddc4efb2635f37174c9d800d06206f1edf9 ] Signed-off-by:
Armin Kuster <akuster@mvista.com>
-
- 05 Sep, 2021 7 commits
-
-
Armin Kuster authored
Source: https://hg.mozilla.org/projects/nss MR: 106863 Type: Security Fix Disposition: Backport from https://hg.mozilla.org/projects/nss/rev/e55ab3145546ae3cf1333b43956a974675d2d25c and 3f022d5eca5d3cd0e366a825a5681953d76299d0 ChangeID: f7f16ca20fbb2436071fde063fe56aa8b319ce41 Description: Affects NSS < 3.55 This address both VE-2020-6829 and CVE-2020-12400 Signed-off-by:
Armin Kuster <akuster@mvista.com>
-
Zang Ruochen authored
Source: https://git.openembedded.org MR: 111050 Type: Security Fix Disposition: Backport from https://git.openembedded.org/meta-openembedded/commit/meta-oe/recipes-support/c-ares?h=hardknott&id=dc25d9f11f3c7abc84700fc1d51fe6c2088a11c4 ChangeID: dc25d9f1 Description: Signed-off-by:
Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit dc25d9f1 ) [Includes cve: CVE-2020-14354. Bug fix update, no ABI changes] Signed-off-by:
Armin Kuster <akuster@mvista.com>
-
Gianfranco authored
- add an upstream proposed patch 317.patch to fix a build failure with enabled systemd binding Signed-off-by:
Gianfranco Costamagna <costamagnagianfranco@yahoo.it> Signed-off-by:
Gianfranco Costamagna <locutusofborg@debian.org> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit 01fa6089 ) [Stable version, bug fix only] Signed-off-by:
Scott Murray <scott.murray@konsulko.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Gianfranco Costamagna authored
- drop patches 241 245 275: upstream Signed-off-by:
Gianfranco Costamagna <costamagnagianfranco@yahoo.it> Signed-off-by:
Gianfranco Costamagna <locutusofborg@debian.org> Signed-off-by:
Khem Raj <raj.khem@gmail.com> Stable version, bug fix only] (cherry picked from commit 8c17cac6 ) [ Stable version, bug fix only Fixup for Dunfell context] Signed-off-by:
Scott Murray <scott.murray@konsulko.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Gianfranco Costamagna authored
Upstream commented to use the second one Signed-off-by:
Gianfranco Costamagna <costamagnagianfranco@yahoo.it> Signed-off-by:
Gianfranco Costamagna <locutusofborg@debian.org> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit c32d2eb4 ) [Fixup for Dunfell context] Signed-off-by:
Scott Murray <scott.murray@konsulko.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Gianfranco Costamagna authored
Signed-off-by:
Gianfranco Costamagna <costamagnagianfranco@yahoo.it> Signed-off-by:
Gianfranco Costamagna <locutusofborg@debian.org> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit a7c9aa13 ) Signed-off-by:
Scott Murray <scott.murray@konsulko.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-
Gianfranco authored
Signed-off-by:
Gianfranco Costamagna <costamagnagianfranco@yahoo.it> Signed-off-by:
Gianfranco Costamagna <locutusofborg@debian.org> Signed-off-by:
Khem Raj <raj.khem@gmail.com> (cherry picked from commit b2fe7667 ) Signed-off-by:
Scott Murray <scott.murray@konsulko.com> Signed-off-by:
Armin Kuster <akuster808@gmail.com>
-