355 Commits

Author SHA1 Message Date
Gyorgy Sarvari d31f07340f monkey: patch CVEs
These patches are about a number of CVEs files against the application:
CVE-2025-63649, CVE-2025-63650, CVE-2025-63651, CVE-2025-63652, CVE-2025-63653, CVE-2025-63655,
CVE-2025-63656, CVE-2025-63657 and CVE-2025-63658.

These patches are taken from a pull request[1] that is referenced in the relevant bug report[2].
The patches don't target specific CVEs on separately, but they fix a number of CVEs altogether.

Based on upstream analysis (in the linked issue) a number of these CVEs are duplicates of each
other and/or not exploitable. The valid CVEs are fixed by these patches.

I haven't added specific CVE info to the patches, one hand because of the above, it is hard to
separate the patches by CVE, and secondarily because NVD tracks these CVEs with incorrect version
info: NVD considers 1.8.6 fully fixed, even though the patches are only in the master branch,
untagged at this time. After updating the recipe to 1.8.6+, the vulnerabilites will disappear
from the CVE report due to this.

[1]: https://github.com/monkey/monkey/pull/434
[2]: https://github.com/monkey/monkey/issues/426

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
2026-04-20 07:35:36 -07:00
Gyorgy Sarvari 22277ca3a3 monkey: upgrade 1.8.4 -> 1.8.7
Shortlog:
https://github.com/monkey/monkey/compare/v1.8.4...v1.8.7

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
2026-04-20 07:35:36 -07:00
Khem Raj 0c5517ff10 hiawatha: Upgrade to 12.1 release
- HTTP/2 support added via the nghttp2 library
  (credits to Heiko Zimmermann) — noted as experimental, so
  testing carefully before enabling on production servers is
  recommended.
- mbed TLS updated from 4.0.0 to 4.1.0.
- ssi-cgi removed — the release notes suggest using
  Hiawatha's XSLT support as a more advanced alternative.

Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
2026-04-16 12:21:07 -07:00
Khem Raj 0581dcc49b sthttpd: disable C23 support to fix configure check
Set ac_cv_prog_cc_c23=no to prevent autoconf from detecting C23
compiler support, avoiding potential build failures as the package
is not yet fully ported to support C23 standard.

Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
2026-04-16 12:21:06 -07:00
Gyorgy Sarvari 81e1926faf nginx: upgrade 1.29.6 -> 1.29.7
Changes:
*) Security: a buffer overflow might occur while handling a COPY or MOVE
   request in a location with "alias", allowing an attacker to modify
   the source or destination path outside of the document root
   (CVE-2026-27654).

*) Security: processing of a specially crafted mp4 file by the
   ngx_http_mp4_module on 32-bit platforms might cause a worker process
   crash, or might have potential other impact (CVE-2026-27784).

*) Security: processing of a specially crafted mp4 file by the
   ngx_http_mp4_module might cause a worker process crash, or might have
   potential other impact (CVE-2026-32647).

*) Security: a segmentation fault might occur in a worker process if the
   CRAM-MD5 or APOP authentication methods were used and authentication
   retry was enabled (CVE-2026-27651).

*) Security: an attacker might use PTR DNS records to inject data in
   auth_http requests, as well as in the XCLIENT command in the backend
   SMTP connection (CVE-2026-28753).

*) Security: SSL handshake might succeed despite OCSP rejecting a client
   certificate in the stream module (CVE-2026-28755).

*) Feature: the "multipath" parameter of the "listen" directive.

*) Feature: the "local" parameter of the "keepalive" directive in the
   "upstream" block.
*) Change: now the "keepalive" directive in the "upstream" block is
   enabled by default.
*) Change: now ngx_http_proxy_module supports keepalive by default; the
   default value for "proxy_http_version" is "1.1"; the "Connection"
   proxy header is not sent by default anymore.
*) Bugfix: an invalid HTTP/2 request might be sent after switching to
   the next upstream if buffered body was used in the
   ngx_http_grpc_module.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
2026-03-28 08:32:48 -07:00
Gyorgy Sarvari 34b3d0f491 nginx: upgrade 1.28.2 -> 1.28.3
Changes:
*) Security: a buffer overflow might occur while handling a COPY or MOVE
   request in a location with "alias", allowing an attacker to modify
   the source or destination path outside of the document root
   (CVE-2026-27654).

*) Security: processing of a specially crafted mp4 file by the
   ngx_http_mp4_module on 32-bit platforms might cause a worker process
   crash, or might have potential other impact (CVE-2026-27784).

*) Security: processing of a specially crafted mp4 file by the
   ngx_http_mp4_module might cause a worker process crash, or might have
   potential other impact (CVE-2026-32647).

*) Security: a segmentation fault might occur in a worker process if the
   CRAM-MD5 or APOP authentication methods were used and authentication
   retry was enabled (CVE-2026-27651).

*) Security: an attacker might use PTR DNS records to inject data in
   auth_http requests, as well as in the XCLIENT command in the backend
   SMTP connection (CVE-2026-28753).

*) Security: SSL handshake might succeed despite OCSP rejecting a client
   certificate in the stream module (CVE-2026-28755).

*) Change: now nginx limits the size and rate of QUIC stateless reset
   packets.

*) Bugfix: receiving a QUIC packet by a wrong worker process could cause
   the connection to terminate.

*) Bugfix: in the ngx_http_mp4_module.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
2026-03-28 08:32:48 -07:00
Khem Raj 79f39ce6c6 hiawatha: Fix checksum mismatch again
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
2026-03-24 18:55:44 -07:00
Alper Ak 79ef81c1b5 hiawatha: Fix checksum mismatch
Update the sha256sum to match the current upstream archive.

Signed-off-by: Alper Ak <alperyasinak1@gmail.com>
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
2026-03-21 14:23:46 -07:00
Gyorgy Sarvari 9857c47f2a sthttpd: remove obsolete CVE_STATUS
The CVE is now tracked with the correct version info by NVD.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-03-20 14:13:10 -07:00
Ankur Tyagi 757cf70943 nginx: upgrade 1.29.5 -> 1.29.6
Changelog:
* Feature: session affinity support; the "sticky" directive in the
"upstream" block of the "http" module; the "server" directive supports
the "route" and "drain" parameters.
* Change: now nginx limits the size and rate of QUIC stateless reset
packets.
* Bugfix: receiving a QUIC packet by a wrong worker process could cause the
connection to terminate.
* Bugfix: "[crit] cache file ... contains invalid header" messages might
appear in logs when sending a cached HTTP/2 response.
* Bugfix: proxying to scgi backends might not work when using chunked
transfer encoding and the "scgi_request_buffering" directive.
* Bugfix: in the ngx_http_mp4_module.
* Bugfix: nginx treated a comma as separator in the "Cookie" request header
line when evaluating "$cookie_..." variables.
* Bugfix: in IMAP command literal argument parsing.

Signed-off-by: Ankur Tyagi <ankur.tyagi85@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-03-18 14:33:26 -07:00
Gyorgy Sarvari f2d8476ca2 hiawatha: upgrade 11.8 -> 12.0
Changelog:
* mbed TLS updated to 4.0.0.
* Replaced strcpy() with strlcpy() and sprintf() with snprintf().
* Added OS sandbox.
* Removed DHsize option.
* Known bug: mbed TLS v4.0.0 doesn't compile in Cygwin, so building
  a Windows package is not possible.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-03-17 22:02:53 -07:00
Gyorgy Sarvari cd0a0f605e nginx: upgrade 1.29.1 -> 1.29.5
License-Update: copyright year bump.

Changelog:
1.29.5:
- Security: an attacker might inject plain text data in the response
  from an SSL backend (CVE-2026-1642).
-  Bugfix: use-after-free might occur after switching to the next gRPC
  or HTTP/2 backend.
- Bugfix: an invalid HTTP/2 request might be sent after switching to
  the next upstream.
- Bugfix: a response with multiple ranges might be larger than the
  source response.
- Bugfix: fixed setting HTTP_HOST when proxying to FastCGI, SCGI, and
  uwsgi backends.
- Bugfix: fixed warning when compiling with MSVC 2022 x86.
- Change: the logging level of the "ech_required" SSL error has been
  lowered from "crit" to "info".

1.29.4:
- Feature: the ngx_http_proxy_module supports HTTP/2.
- Feature: Encrypted ClientHello TLS extension support when using
  OpenSSL ECH feature branch; the "ssl_ech_file" directive.
  Thanks to Stephen Farrell.
- Change: validation of host and port in the request line, "Host"
  header field, and ":authority" pseudo-header field has been changed
  to follow RFC 3986.
- Change: now a single LF used as a line terminator in a chunked
  request or response body is considered an error.
- Bugfix: when using HTTP/3 with OpenSSL 3.5.1 or newer a segmentation
  fault might occur in a worker process; the bug had appeared in
  1.29.1.
  Thanks to Jan Svojanovsky.
- Bugfix: a segmentation fault might occur in a worker process if the
 "try_files" directive and "proxy_pass" with a URI were used.

1.29.3:
- Feature: the "add_header_inherit" and "add_trailer_inherit"
  directives.
- Feature: the $request_port and $is_request_port variables.
- Feature: the $ssl_sigalg and $ssl_client_sigalg variables.
- Feature: the "volatile" parameter of the "geo" directive.
- Feature: now certificate compression is available with BoringSSL.
- Bugfix: now certificate compression is disabled with OCSP stapling.

1.29.2
- Feature: now nginx can be built with AWS-LC.
  Thanks Samuel Chiang.
- Bugfix: now the "ssl_protocols" directive works in a virtual server
  different from the default server when using OpenSSL 1.1.1 or newer.
- Bugfix: SSL handshake always failed when using TLSv1.3 with OpenSSL
  and client certificates and resuming a session with a different SNI
  value; the bug had appeared in 1.27.4.
- Bugfix: the "ignoring stale global SSL error" alerts might appear in
  logs when using QUIC and the "ssl_reject_handshake" directive; the
  bug had appeared in 1.29.0.
  Thanks to Vladimir Homutov.
- Bugfix: in delta-seconds processing in the "Cache-Control" backend
  response header line.
- Bugfix: an XCLIENT command didn't use the xtext encoding.
  Thanks to Igor Morgenstern of Aisle Research.
- Bugfix: in SSL certificate caching during reconfiguration.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-02-16 00:34:02 -08:00
Gyorgy Sarvari f2be1069f1 nginx: upgrade 1.28.1 -> 1.28.2
Changelog:
- Security: an attacker might inject plain text data in the response
  from an SSL backend (CVE-2026-1642).
- Bugfix: use-after-free might occur after switching to the next gRPC
  or HTTP/2 backend.
- Bugfix: fixed warning when compiling with MSVC 2022 x86.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-02-16 00:34:02 -08:00
Gyorgy Sarvari d92fa873e5 hiawatha: upgrade 11.7 -> 11.8
Drop patches that are included in this release.

Changes:
  * mbed TLS updated to 3.6.4.
  * Small bugfixes.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-02-04 20:53:29 -08:00
Peter Marko 5d3936d5dd nginx: ignore CVE-2025-53859 for 1.28.1
Fix is included via commit [1].

[1] https://github.com/nginx/nginx/commit/fbbbf189dadf3bd59c2462af68c16f2c2874d4ee

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-01-12 10:25:56 -08:00
Gyorgy Sarvari d25aadbbb5 nginx: set CVE_PRODUCT
nginx has a long history, and has used multiple CPEs
over time. Set CVE_PRODUCT to reflect current and historic
vendor:product pairs.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-01-04 11:34:49 -08:00
Jason Schonberg 222c642564 nginx: upgrade 1.28.0 -> 1.28.1
Drop CVE patch which has been integrated into this new version.

Solves:
* CVE-2025-53859

CHANGES:
https://nginx.org/en/CHANGES-1.28

Signed-off-by: Jason Schonberg <schonm@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-01-04 11:06:41 -08:00
Valeria Petrov 220835dac9 apache2: upgrade 2.4.65 -> 2.4.66
Security fixes:
- CVE-2025-66200
- CVE-2025-65082
- CVE-2025-59775
- CVE-2025-58098
- CVE-2025-55753

See: http://www.apache.org/dist/httpd/CHANGES_2.4.66

Signed-off-by: Valeria Petrov <valeria.petrov@spinetix.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-05 10:13:24 -08:00
Hongxu Jia 3e308aacb0 nginx: switch to libpcre2
NGINX 1.22 and later supports PCRE2 [1]

[1] https://github.com/nginx/nginx/commit/c6fec0b027569a4e0b1d8aaee7dea0f2e4d6052b

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-01 08:45:52 -08:00
Gyorgy Sarvari 11fc309ae9 apache2: ignore CVE-2025-3891
The vulnerability was reported against mod_auth_openidc, which module
is a 3rd party one, and not part of the apache2 source distribution.

The affected module is not part of the meta-oe universe currently,
so ignore the CVE.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-10-05 21:52:27 -07:00
Khem Raj 5a4d1bc713 hiawatha: Fix bundled mbedtls with clang-21
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-08-29 22:02:54 -07:00
Peter Marko 93c4d2c9f6 nginx: patch CVE-2025-53859 in stable
Pick patch from nginx site which is also mentioned in [1].

[1] https://security-tracker.debian.org/tracker/CVE-2025-53859

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-08-25 20:07:19 -07:00
Peter Marko a41344f3bd nginx: upgrade mainline 1.27.4 -> 1.29.1
Solves CVE-2025-53859

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-08-25 20:07:19 -07:00
Peter Marko 3228b7d706 nginx: upgrade stable 1.26.3 -> 1.28.0
2025-04-23
nginx-1.28.0 stable version has been released, incorporating new
features and bug fixes from the 1.27.x mainline branch - including
memory usage and CPU usage optimizations in complex SSL configurations,
automatic re‑resolution of hostnames in upstream groups, performance
enhancements in QUIC, OCSP validation of client SSL certificates and
OCSP stapling support in the stream module, variables support in the
proxy_limit_rate, fastcgi_limit_rate, scgi_limit_rate, and
uwsgi_limit_rate directives, the proxy_pass_trailers directive, and
more.

License-Update: copyright years refreshed and removed C-style comments

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-08-25 20:07:19 -07:00
Wang Mingyu f50e7433cb apache2: upgrade 2.4.64 -> 2.4.65
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-07-30 08:03:04 -07:00
Wang Mingyu 207b98bcd7 apache2: upgrade 2.4.63 -> 2.4.64
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-07-15 23:54:14 -07:00
Khem Raj 99376af87c hiawatha: Upgrade to 11.7
Enable TLS support
Fix build with cmake4+

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-07-12 13:50:00 -07:00
Khem Raj a7ab25be9a monkey: Upgrade to 1.8.4
Use default cmake backend ( ninja )

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-07-12 13:50:00 -07:00
Alexander Kanavin fc78d37ff0 meta-openembedded/all: adapt to UNPACKDIR changes
Please see
https://git.yoctoproject.org/poky/commit/?id=4dd321f8b83afecd962393101b2a6861275b5265
for what changes are needed, and sed commands that can be used to make them en masse.

I've verified that bitbake -c patch world works with these, but did not run a world
build; the majority of recipes shouldn't need further fixups, but if there are
some that still fall out, they can be fixed in followups.

Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-06-25 06:44:52 -07:00
Yoann Congal 273c29232e hiawatha: use -std=gnu17 for compilation
hiawatha does not build under -std=gnu23 which is the default of
gcc15. Forcing -std=gnu17 fixes these build errors:
| .../tmp/work/core2-64-poky-linux/hiawatha/11.2/hiawatha-11.2/src/hiawatha.c:814:25: error: passing argument 2 of 'signal' from incompatible pointer type [-Wincompatible-pointer-types]
|   814 |         signal(SIGHUP,  HUP_handler);
|       |                         ^~~~~~~~~~~
|       |                         |
|       |                         void (*)(void)
| .../tmp/work/core2-64-poky-linux/hiawatha/11.2/recipe-sysroot/usr/include/signal.h:88:57: note: expected '__sighandler_t' {aka 'void (*)(int)'} but argument is of type 'void (*)(void)'
|    88 | extern __sighandler_t signal (int __sig, __sighandler_t __handler)
|       |                                          ~~~~~~~~~~~~~~~^~~~~~~~~
| .../tmp/work/core2-64-poky-linux/hiawatha/11.2/hiawatha-11.2/src/hiawatha.c:294:6: note: 'HUP_handler' declared here
|   294 | void HUP_handler() {
|       |      ^~~~~~~~~~~
| .../tmp/work/core2-64-poky-linux/hiawatha/11.2/recipe-sysroot/usr/include/signal.h:72:16: note: '__sighandler_t' declared here
|    72 | typedef void (*__sighandler_t) (int);
|       |                ^~~~~~~~~~~~~~

Note: Upstream project has no published way to upstream patches.

Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-05-08 18:29:34 -07:00
Yoann Congal 18a627a46c hiawatha: update HOMEPAGE
As noted in 11.7 changelog: https://hiawatha.leisink.net/changelog
> All references to http://www.hiawatha-webserver.org/ changed to
> https://hiawatha.leisink.net/.

Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-05-08 18:29:33 -07:00
Khem Raj f00a3f153a apache2: Scrub -ffile-prefix-map in build.nice file
Fixes
QA Issue: File /usr/libexec/apache2/build/config.nice in package apache2-dev contains reference to TMPDIR [buildpaths]

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-04-22 09:10:56 -07:00
Jason Schonberg 0573c4c996 monkey: Update project website
Signed-off-by: Jason Schonberg <schonm@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-04-16 08:04:41 -07:00
Jason Schonberg b14543cd26 hiawatha: upgrade 11.1 -> 11.2
Changelog: https://hiawatha.leisink.net/changelog

    mbed TLS updated to 3.2.1.
    Small improvements.

Signed-off-by: Jason Schonberg <schonm@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-03-20 15:17:23 -07:00
Jason Schonberg cb0a43ea78 hiawatha: upgrade 11.0 -> 11.1
Changelog: https://hiawatha.leisink.net/changelog

      mbed TLS updated to 3.1.0.
      Small bugfixes.

Signed-off-by: Jason Schonberg <schonm@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-03-20 08:46:57 -07:00
Alexis Cellier 5c32343131 sthttpd: Fix service unit file
Update PID file path from /var/run to /run to avoid systemd warning:
    PIDFile= references a path below legacy directory /var/run/,
    updating /var/run/thttpd.pid → /run/thttpd.pid; please update
    the unit file accordingly.

Cc: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Alexis Cellier <alexis.cellier@smile.fr>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-27 13:10:00 -08:00
Changqing Li 569b675620 nginx: upgrade 1.27.3 to 1.27.4
License-Update: copyright year refreshed

Resolves:
* CVE-2025-23419

CHANGES:
https://nginx.org/en/CHANGES

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-16 23:42:42 -08:00
Changqing Li 66498315ca nginx: upgrade 1.26.2 to 1.26.3
Solves:
* CVE-2025-23419

CHANGES:
https://nginx.org/en/CHANGES-1.26

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-16 23:42:42 -08:00
Wang Mingyu 93772a0fc3 apache2: upgrade 2.4.62 -> 2.4.63
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-10 08:45:35 -08:00
Gyorgy Sarvari 10c13bf1fb mod-dnssd: update SRC_URI
Upstream repository url changed.

Fixes unsuccessful fetch warning.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-03 11:25:21 -08:00
Jason Schonberg 9ba0679eee hiawatha: upgrade 10.12 -> 11.0
The https://www.hiawatha-webserver.org/ site is defunct.  So move SRC_URI to use
https://hiawatha.leisink.net/ instead.  Update to 11.0 while we are here.

Changelog: https://hiawatha.leisink.net/changelog

    mbed TLS updated to 3.0.0.
    Dropped support for TLSv1.0 and TLSv1.1. Configuration option MinTLSversion removed.
    Dropped support for HTTP Public Key Pinning (HPKP). Configuration option PublicKeyPins removed.

Signed-off-by: Jason Schonberg <schonm@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-01-24 18:20:08 -08:00
Peter Marko 59d3949e3e apache2: ignore CVE-1999-1237
This vulnerability is for Apache-AuthenSmb module.
Fixed in 0.9, current version is 0.72.
In any case, not part of Apache2 sources.

[1] points to [2], which is archived under [3]

[1] https://nvd.nist.gov/vuln/detail/CVE-1999-1237
[2] http://www.securityfocus.com/archive/1/14384
[3] https://web.archive.org/web/20020618143426/http://online.securityfocus.com/archive/1/14384

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-24 08:23:09 -08:00
Peter Marko da2b5e8b93 apache2: ignore disputed CVE CVE-2007-0086
This CVE is officially disputed by Redhat with official statement in
https://nvd.nist.gov/vuln/detail/CVE-2007-0086

Red Hat does not consider this issue to be a security vulnerability.
The pottential attacker has to send acknowledgement packets periodically
to make server generate traffic. Exactly the same effect could be
achieved by simply downloading the file. The statement that setting the
TCP window size to arbitrarily high value would permit the attacker to
disconnect and stop sending ACKs is false, because Red Hat Enterprise
Linux limits the size of the TCP send buffer to 4MB by default.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:33 -08:00
Peter Marko 36a7e409d8 monkey: ignore CVE-2013-1771
This is gentoo specific CVE.
NVD tracks this as version-less CVE.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Peter Marko 0e7733f1b8 apache2: remove old version references from CVEs
These were not updated on recipe upgrade.
To make maintenance easier, remove exact versions.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Peter Marko 1b86a60f62 apache2: ignore CVE-1999-0678 and CVE-1999-1412
These CVEs are specific to Debian and MAC OS X respectively.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Derek Straka 1f4b413ebe nginx: Upgrade mainline release version 1.27.1 -> 1.27.3
License-Update: License file negative and empty space changes

Signed-off-by: Derek Straka <derek@asterius.io>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-10 13:43:54 -08:00
Valeria Petrov ac5855c74d apache2: do not depend on zlib header and libs from host
This commit modifies the PACKAGECONFIG entry for zlib to ensure that the
mod_deflate module is enabled with the appropriate zlib configuration.
By adding the --with-zlib=${STAGING_LIBDIR}/../ option, we direct the
configure script to use the zlib library from the staging directory
instead of relying on the host system's zlib installation.

Without that configure will search the host for zlib headers and lib.

This change resolves build failures related to zlib dependency when
mod_deflate is enabled and ensures a consistent build environment across
different host configurations.

Signed-off-by: Valeria Petrov <valeria.petrov@spinetix.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-09 15:47:23 -07:00
Niko Mauno 5cff9e8672 cherokee: Remove obsolete recipe
This recipe depends on meta-python2, master branch of which has not
been updated sine February 2022, see
https://git.openembedded.org/meta-python2/log/?h=master

Also, https://cherokee-project.com/doc/basics_requirements.html states

  The main Python releases targeted by our developers are 2.4, 2.5 and 2.6.
  Anything other than that is not guaranteed to work at the moment.

Also, master branch of cherokee has not been updated since January
2023, see https://github.com/cherokee/webserver/commits/master/

Thus, remove the obsolete recipe and the associated packagegroup
reference.

Signed-off-by: Niko Mauno <niko.mauno@vaisala.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-09-30 07:34:28 -07:00
Peter Marko 12a36136fe nginx: Upgrade mainline 1.25.3 -> 1.27.1
Solves:
* CVE-2024-7347
* CVE-2024-24989
* CVE-2024-24990
* CVE-2024-31079
* CVE-2024-32760
* CVE-2024-34161
* CVE-2024-35200

License-Update: copyright year refreshed

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-09-17 15:46:33 -07:00