Commit Graph

2957 Commits

Author SHA1 Message Date
Beniamin Sandu
579558c87f mbedtls: upgrade 3.4.0 -> 3.5.0
* Includes security fix for CVE-2023-43615 - Buffer overread in TLS stream cipher suites
* Includes security fix for CVE-2023-45199 - Buffer overflow in TLS handshake parsing with ECDH
* Includes aesce compilation fixes

Full changelog: https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-3.5.0

The extra patch fixes x86 32-bit builds.

Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-11-03 10:49:47 -04:00
Yi Zhao
79a6f60dab mbedtls: upgrade 2.28.2 -> 2.28.5
This release includes security fix for CVE-2023-43615.

Changelog:
https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-2.28.5

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
[Minor tweak to get it to apply]
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 09:07:38 -04:00
Denys Dmytriyenko
1d0d7f6e77 mbedtls: set up /usr/bin/hello as alternative
As mbedtls installs this rather generically-named /usr/bin/hello binary,
it conflicts with the one provided by lmbench, hence set it up as an
alternative to avoid conflicts when both are installed to rootfs or SDK.

Signed-off-by: Denys Dmytriyenko <denis@denix.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 08:52:32 -04:00
Martin Jansa
8808a69b6c mosquitto: add missing Upstream-Status
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 08:51:15 -04:00
Gianfranco Costamagna
a818281425 mosquitto: upgrade 2.0.17 -> 2.0.18
Add two patches from Debian, pull requests proposed upstream as 2894 and 2895
to make it start only when board is online, and to fix dynamic websockets link failure

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 08:50:47 -04:00
Gianfranco Costamagna
f6f0669c1f mosquitto: upgrade 2.0.15 -> 2.0.17
Fix for CVE-2023-28366, CVE-2023-0809, CVE-2023-3592

Signed-off-by: Gianfranco Costamagna <costamagnagianfranco@yahoo.it>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 08:50:15 -04:00
Gianfranco Costamagna
f6c58b4f9f mosquitto: do not automatically depend on dlt-daemon, it's a non-mandatory logging system
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 08:47:54 -04:00
Wang Mingyu
ebfb34db78 mosquitto: upgrade 2.0.14 -> 2.0.15
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 08:47:48 -04:00
Meenali Gupta
e2b534cc3a open-vm-tools: fix CVE-2023-20867
A fully compromised ESXi host can force VMware Tools to
fail to authenticate host-to-guest operations, impacting
the confidentiality and integrity of the guest virtual machine.

Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 08:44:17 -04:00
Polampalli, Archana
baf6153112 samba: fix CVE-2023-34968
A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol,
Samba discloses the server-side absolute path of shares, files, and directories in the
results for search queries. This flaw allows a malicious client or an attacker with a
targeted RPC request to view the information that is part of the disclosed path.

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 08:42:14 -04:00
Polampalli, Archana
bbe79e4f17 samba:fix CVE-2023-34967
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 08:41:58 -04:00
Polampalli, Archana
112397bdfe samba: fix CVE-2022-2127
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 08:41:21 -04:00
Polampalli, Archana
2715358a3d samba: fix CVE-2023-34966
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-10-17 08:40:46 -04:00
Armin Kuster
799e0847cc frr: Fix CVE-2023-41909
An issue was discovered in FRRouting FRR through 9.0. bgp_nlri_parse_flowspec
in bgpd/bgp_flowspec.c processes malformed requests with no attributes,
leading to a NULL pointer dereference.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-41909
https://security-tracker.debian.org/tracker/CVE-2023-41909

Signed-off-by: Narpat Mali <narpat.mali@windriver.com>
[Minor fixup ]
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-09-23 13:38:49 -04:00
Hitendra Prajapati
919a207458 wireshark: Fix CVE-2023-2906
Upstream-Status: Backport from 44dc70cc5a

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Armin Kuster <akuster@mvista.com>
2023-09-23 13:10:47 -04:00
Narpat Mali
0901bb4c6a frr: Fix CVE-2023-38802 and CVE-2023-41358
CVE-2023-38802:
FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote
attacker to cause a denial of service via a crafted BGP update with a
corrupted attribute 23 (Tunnel Encapsulation).

CVE-2023-41358:
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c
processes NLRIs if the attribute length is zero.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-38802
https://nvd.nist.gov/vuln/detail/CVE-2023-41358

Signed-off-by: Narpat Mali <narpat.mali@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-09-06 09:12:30 -04:00
Wang Mingyu
bef3ed137b tcpdump: upgrade 4.99.3 -> 4.99.4
Changelog:
==========
Source code:
----------------
  Fix spaces before tabs in indentation.
Updated printers:
-----------------
  LSP ping: Fix "Unused value" warnings from Coverity.
  CVE-2023-1801: Fix an out-of-bounds write in the SMB printer.
  DNS: sync resource types with IANA.
  ICMPv6: Update the output to show a RPL DAO field name.
  Geneve: Fix the Geneve UDP port test.
Building and testing:
----------------------
  Require at least autoconf 2.69.
  Don't check for strftime(), as it's in C90 and beyond.
  Update config.{guess,sub}, timestamps 2023-01-01,2023-01-21.
Documentation:
-------------
  man: Document TCP flag names better.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 2e782260d0)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-09-05 13:41:48 -04:00
Wang Mingyu
3e0b67a4fc tcpdump: upgrade 4.99.2 -> 4.99.3
Changelog:
==========
 Updated printers:
   PTP: Use the proper values for the control field and print un-allocated
     values for the message field as "Reserved" instead of "none".
 Source code:
   smbutil.c: Replace obsolete function call (asctime)
 Building and testing:
   cmake: Update the minimum required version to 2.8.12 (except Windows).
   CI: Introduce and use TCPDUMP_CMAKE_TAINTED.
   Makefile.in: Add the releasecheck target.
   Makefile.in: Add "make -s install" in the releasecheck target.
   Cirrus CI: Run the "make releasecheck" command in the Linux task.
   Makefile.in: Add the whitespacecheck target.
   Cirrus CI: Run the "make whitespacecheck" command in the Linux task.
   Address all shellcheck warnings in update-test.sh.
   Makefile.in: Get rid of a remain of gnuc.h.
 Documentation:
   Reformat the installation notes (INSTALL.txt) in Markdown.
   Convert CONTRIBUTING to Markdown.
   CONTRIBUTING.md: Document the use of "protocol: " in a commit summary.
   Add a README file for NetBSD.
   Fix CMake build to set man page section numbers in tcpdump.1

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit dab75037cc)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-09-05 13:41:35 -04:00
Wang Mingyu
0ea4684032 tcpdump: upgrade 4.99.1 -> 4.99.2
Changelog:
==========
Updated printers:
-----------------
  BGP: Update cease notification decoding to RFC 9003.
  BGP: decode BGP link-bandwidth extended community properly.
  BGP: Fix parsing the AIGP attribute
  BGP: make sure the path attributes don't go past the end of the packet.
  BGP: Shutdown message can be up to 255 bytes length according to rfc9003
  DSA: correctly determine VID.
  EAP: fix some length checks and output issues.
  802.11: Fix the misleading comment regarding "From DS", "To DS" Frame Control Flags.
  802.11: Fetch the CF and TIM IEs a field at a time.
  802.15.4, BGP, LISP: fix some length checks, compiler warnings,
    and undefined behavior warnings.
  PFLOG: handle LINKTYPE_PFLOG/DLT_PFLOG files from all OSes on all OSes.
  RRCP: support more Realtek protocols than just RRCP.
  MPLS: show the EXP field as TC, as per RFC 5462.
  ICMP: redo MPLS Extension code as general ICMP Extension code.
  VQP: Do not print unknown error codes twice.
  Juniper: Add some bounds checks.
  Juniper: Don't treat known DLT_ types as "Unknown".
  lwres: Fix a length check, update a variable type.
  EAP: Fix some undefined behaviors at runtime.
  Ethernet: Rework the length checks, add a length check.
  IPX: Add two length checks.
  Zephyr: Avoid printing non-ASCII characters.
  VRRP: Print the protocol name before any GET_().
  DCCP: Get rid of trailing commas in lists.
  Juniper: Report invalid packets as invalid, not truncated.
  IPv6: Remove an obsolete code in an always-false #if wrapper.
  ISAKMP: Use GET_U_1() to replace a direct dereference.
  RADIUS: Use GET_U_1() to replace a direct dereference.
  TCP: Fix an invalid check.
  RESP: Fix an invalid check.
  RESP: Remove an unnecessary test.
  Arista: Refine the output format and print HwInfo.
  sFlow: add support for IPv6 agent, add a length check.
  VRRP: add support for IPv6.
  OSPF: Update to match the Router Properties registry.
  OSPF: Remove two unnecessary dereferences.
  OSPF: Add support bit Nt RFC3101.
  OSPFv3: Remove two unnecessary dereferences.
  ICMPv6: Fix output for Router Renumbering messages.
  ICMPv6: Fix the Node Information flags.
  ICMPv6: Remove an unused macro and extra blank lines.
  ICMPv6: Add a length check in the rpl_dio_print() function.
  ICMPv6: Use GET_IP6ADDR_STRING() in the rpl_dio_print() function.
  IPv6: Add some checks for the Hop-by-Hop Options header
  IPv6: Add a check for the Jumbo Payload Hop-by-Hop option.
  NFS: Fix the format for printing an unsigned int
  PTP: fix printing of the correction fields
  PTP: Use ND_LCHECK_U for checking invalid length.
  WHOIS: Add its own printer source file and printer function
  MPTCP: print length before subtype inside MPTCP options
  ESP: Add a workaround to a "use-of-uninitialized-value".
  PPP: Add tests to avoid incorrectly re-entering ppp_hdlc().
  PPP: Don't process further if protocol is unknown (-e option).
  PPP: Change the pointer to packet data.
  ZEP: Add three length checks.
  Add some const qualifiers.
Building and testing:
----------------------
  Update config.guess and config.sub.
  Use AS_HELP_STRING macro instead of AC_HELP_STRING.
  Handle some Autoconf/make errors better.
  Fix an error when cross-compiling.
  Use "git archive" for the "make releasetar" process.
  Remove the release candidate rcX targets.
  Mend "make check" on Solaris 9 with Autoconf.
  Address assorted compiler warnings.
  Fix auto-enabling of Capsicum on FreeBSD with Autoconf.
  Treat "msys" as Windows for test exit statuses.
  Clean up some help messages in configure.
  Use unified diff by default.
  Remove awk code from mkdep.
  Fix configure test errors with Clang 15
  CMake: Prevent stripping of the RPATH on installation.
  AppVeyor CI: update Npcap site, update to 1.12 SDK.
  Cirrus CI: Use the same configuration as for the main branch.
  CI: Add back running tcpdump -J/-L and capture, now with Cirrus VMs.
  Remove four test files (They are now in the libpcap tests directory).
  On Solaris, for 64-bit builds, use the 64-bit pcap-config.
  Tell CMake not to check for a C++ compiler.
  CMake: Add a way to request -Werror and equivalents.
  configure: Special-case macOS /usr/bin/pcap-config as we do in CMake.
  configure: Use pcap-config --static-pcap-only if available.
  configure: Use ac_c_werror_flag to force unknown compiler flags to fail.
  configure: Use AC_COMPILE_IFELSE() and AC_LANG_SOURCE() for testing flags.
  Run the test that fails on OpenBSD only if we're not on OpenBSD.
Source code:
-------------
  Fix some snapend-changing routines to protect against pointer underflow.
  Use __func__ from C99 in some function calls.
  Memory allocator: Update nd_add_alloc_list() to a static function.
  addrtoname.c: Fix two invalid tests.
  Use more S_SUCCESS and S_ERR_HOST_PROGRAM in main().
  Add some comments about "don't use GET_IP6ADDR_STRING()".
  Assign ndo->ndo_packetp in pretty_print_packet().
  Add ND_LCHECKMSG_U, ND_LCHECK_U, ND_LCHECKMSG_ZU and ND_LCHECK_ZU macros.
  Update tok2strbuf() to a static function.
  netdissect.h: Keep the link-layer dissectors names sorted.
  setsignal(): Set SA_RESTART on non-lethal signals (REQ_INFO, FLUSH_PCAP)
    to avoid corrupting binary pcap output.
  Use __builtin_unreachable().
  Fail if nd_push_buffer() or nd_push_snaplen() fails.
  Improve code style and fix many typos.
Documentation:
---------------
  Some man page cleanups.
  Update the print interface for the packet count to stdout.
  Note that we require compilers to support at least some of C99.
  Update AIX and Solaris-related specifics.
  INSTALL.txt: Add doc/README.*, delete the deleted win32 directory.
  Update README.md and README.Win32.md.
  Update some comments with new RFC numbers.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 68db0a3880)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-09-05 13:41:24 -04:00
Sourav Kumar Pramanik
f67e45668e meta-oe-components: Avoid usage of nobranch=1
The usage of nobranch=1 in SRC_URI allows using unprotected branches.

This change updates the real branch name in place of nobranch=1 for these components.

Signed-off-by: Sourav Kumar Pramanik <pramanik.souravkumar@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-09-04 12:01:53 -04:00
Chen Qi
71d9cabed7 spice-protocol: fix populate_sdk error when spice is installed
spice depends on spice-protocol, when IMAGE_INSTALL contains spice,
do_populate_sdk fails with the following error:

  Error:
  Problem: package libspice-server-dev-0.14.2+git0+7cbd70b931_4fc4c2db36-r0.core2_64 requires spice-protocol-dev, but none of the providers can be installed
  - conflicting requests
  - nothing provides spice-protocol = 0.14.4-r0 needed by spice-protocol-dev-0.14.4-r0.core2_64
  (try to add '--skip-broken' to skip uninstallable packages)

For spice-protocol, it's a development package and all things are in
the dev package, so set ALLOW_EMPTY to fix the above error.

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-09-04 11:58:35 -04:00
J.D. Schroeder
a7a66cdb13 Fix groupname gid change warning
This patch fixes warnings when useradd-staticids.bbclass is used and
USERADD_PARAM is used to add the user to a group that has not been
explicitly created yet. By adding the GROUPADD_PARAM for the new group
being used the warnings for changing the gid from GID-OLD to GID-NEW
is eliminated.

Warnings fixed:
cyrus-sasl: Changing groupname mail's gid from (WXYZ) to (JKLM), verify configuration files!
radvd: Changing groupname nogroup's gid from (WXYZ) to (JKLM), verify configuration files!

Signed-off-by: JD Schroeder <sweng5080@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-08-03 16:50:52 -04:00
Narpat Mali
8ab74bed48 frr: fix for CVE-2023-31490
An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to
cause a denial of service via the bgp_attr_psid_sub() function.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-31490
https://github.com/FRRouting/frr/issues/13099

Signed-off-by: Narpat Mali <narpat.mali@windriver.com>
[Fixup so patch would apply]
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-07-16 15:31:05 -04:00
Beniamin Sandu
b541346589 mbedtls: build with v2 version by default
For anyone else that wants to use the newer v3, there is
PREFERRED_VERSION.

Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-07-16 15:30:58 -04:00
Peter Marko
3c3755a3da ntp: backport patch for 5 CVEs CVE-2023-26551/2/3/4/5
Patch taken from https://archive.ntp.org/ntp4/ntp-4.2/ntp-4.2.8p15-3806-3807.patch
It is linked as official patch for p15 in:
- https://www.ntp.org/support/securitynotice/ntpbug3807/
- https://www.ntp.org/support/securitynotice/ntpbug3806/

Small adaptation to build is needed because of how tests are built.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-07-02 11:19:14 -04:00
Beniamin Sandu
d434faf6c9 mbedtls: add support for v3.x
Version 3.4.0 adds a lot of improvements and fixes (a notable one
being initial support for PKCS7 CMS), but since this is a pretty
big jump, let's keep both versions for a while, so the v2.x users
can upgrade to 3.x in a timely manner if needed.

Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-07-02 11:19:05 -04:00
Polampalli, Archana
695fb5bedd tcpreplay: upgrade 4.4.2 -> 4.4.4
This release contains bug fixes only.
The following CVEs have been addressed:

CVE-2023-27783
CVE-2023-27784
CVE-2023-27785
CVE-2023-27786
CVE-2023-27787
CVE-2023-27788
CVE-2023-27789

Changelog:
=========
dlt_jnpr_ether_cleanup: check subctx before cleanup by @Marsman1996 in #781
Bug #780 assert tcpedit dlt cleanup by @fklassen in #800
Fix bugs caused by strtok_r by @Marsman1996 in #783
Bug #782 #784 #785 #786 #787 #788 strtok r isuses by @fklassen in #801
Update en10mb.c by @david-guti in #793
PR #793 ip6 unicast flood by @fklassen in #802
Bug #719 fix overflow check for parse_mpls() by @fklassen in #804
PR #793 - update tests for corrected IPv6 MAC by @fklassen in #805
PR #793 - update tests for vlandel by @fklassen in #806
Feature #773 gh actions ci by @fklassen in #807
Feature #759: Upgrade autogen/libopts to 5.18.16 by @fklassen in #760
Bug #751 don't exit after send error by @fklassen in #761
Bug #750: configure: libpcap version robustness by @fklassen in #764
Bug #749 flow stats: avoid overstating flow packet count by @fklassen in #765
Bug #750 more libpcap version updates by @fklassen in #766
Bug #767 tests: support for out-of-tree tests by @fklassen in #768
Bug #750 - fix macOS test failure by @fklassen in #770
4.4.3 by @fklassen in #769 and #771

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-07-02 11:19:01 -04:00
Hitendra Prajapati
0338bf0c6a wireshark: Fix Multiple CVEs
Backport fixes for:
* CVE-2023-0666 - Upstream-Status: Backport from 265cbf15a4
* CVE-2023-0667 - Upstream-Status: Backport from 85fbca8adb
* CVE-2023-0668 - Upstream-Status: Backport from c4f37d77b2

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-07-02 11:16:23 -04:00
Narpat Mali
0070827069 frr: fix for CVE-2023-31489
An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to
cause a denial of service via the bgp_capability_llgr() function.

References:
https://nvd.nist.gov/vuln/detail/CVE-2023-31489
https://github.com/FRRouting/frr/issues/13098

Signed-off-by: Narpat Mali <narpat.mali@windriver.com>
[Refactored to get it to apply]
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-06-23 07:49:20 -04:00
Polampalli, Archana
5790310da3 samba: fix CVE-2021-44758
Heimdal before 7.7.1 allows attackers to cause a NULL pointer
dereference in a SPNEGO acceptor via a preferred_mech_type of
GSS_C_NO_OID and a nonzero initial_response value to send_accept.

References:
https://nvd.nist.gov/vuln/detail/CVE-2021-44758

Upstream patches:
f9ec7002cd

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-06-17 14:22:30 -04:00
Polampalli, Archana
0393024cc5 samba: fix CVE-2022-41916
Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos.
Versions prior to 7.7.1 are vulnerable to a denial of service
vulnerability in Heimdal's PKI certificate validation library,
affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as
any third-party applications using Heimdal's libhx509. Users
should upgrade to Heimdal 7.7.1 or 7.8. There are no known
workarounds for this issue.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-41916

Upstream patches:
eb87af0c2d

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-06-17 14:22:25 -04:00
Polampalli, Archana ñ
84544d6440 samba: fix CVE-2022-45142
The fix for CVE-2022-3437 included changing memcmp to be constant
time and a workaround for a compiler bug by adding "!= 0"
comparisons to the result of memcmp. When these patches were
backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and
possibly other branches) a logic inversion sneaked in causing the
validation of message integrity codes in gssapi/arcfour to be inverted.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-45142

Upstream patches:
https://www.openwall.com/lists/oss-security/2023/02/08/1
5f63215d0d

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-06-17 14:21:38 -04:00
Polampalli, Archana A
9d203efe8f samba: fix CVE-2022-3437
A heap-based buffer overflow vulnerability was found in Samba within
the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The
DES and Triple-DES decryption routines in the Heimdal GSSAPI library
allow a length-limited write buffer overflow on malloc() allocated
memory when presented with a maliciously small packet. This flaw
allows a remote user to send specially crafted malicious data to the
application, possibly resulting in a denial of service (DoS) attack.

References:
https://nvd.nist.gov/vuln/detail/CVE-2022-3437

Upstream patches:
f6edaafcfe
c9cc34334b
a587a4bcb2
c758910eaa
414b2a77fd
be9bbd93ed
c8407ca079
8fb508a25a

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-06-17 14:21:38 -04:00
Hitendra Prajapati
25dcf4d65b wireshark: CVE-2023-2952 XRA dissector infinite loop
Upstream-Status: Backport from e18d0e3697

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-06-17 14:09:58 -04:00
Hitendra Prajapati
c7f4255d0e wireshark: Fix CVE-2023-2858 & CVE-2023-2879
Backport fixes for:
* CVE-2023-2858 - Upstream-Status: Backport from cb190d6839
* CVE-2023-2879 - Upstream-Status: Backport from 118815ca7c

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-06-11 11:29:06 -04:00
Hitendra Prajapati
c7a5562f77 wireshark: CVE-2023-2856 VMS TCPIPtrace file parser crash
Upstream-Status: Backport from db5135826d

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-06-11 11:29:02 -04:00
Hitendra Prajapati
a506fa6eac wireshark: CVE-2023-2855 Candump log file parser crash
Upstream-Status: Backport from 0181fafb21

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-06-11 11:28:58 -04:00
Jonas Gorski
3670781506 frr: Security fix CVE-2022-43681
Add a security fix cherry-picked from master:

CVE-2022-40318:
An out-of-bounds read exists in the BGP daemon of FRRouting FRR through
8.4. When sending a malformed BGP OPEN message that ends with the option
length octet (or the option length word, in case of an extended OPEN
message), the FRR code reads of out of the bounds of the packet,
throwing a SIGABRT signal and exiting. This results in a bgpd daemon
restart, causing a Denial-of-Service condition.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-43681
https://cyberriskleaders.com/new-vulnerabilities-disclosed-in-frrouting-software/

Patch from:
766eec1b7a

Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-24 10:47:53 -04:00
Jonas Gorski
16718c0a0e frr: Security fix CVE-2022-40318
Add a security fix from the stable/8.2 branch:

CVE-2022-40318:
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By
crafting a BGP OPEN message with an option of type 0xff (Extended Length
from RFC 9072), attackers may cause a denial of service (assertion
failure and daemon restart, or out-of-bounds read). This is possible
because of inconsistent boundary checks that do not account for reading
3 bytes (instead of 2) in this 0xff case. NOTE: this behavior occurs in
bgp_open_option_parse in the bgp_open.c file, a different location (with
a different attack vector) relative to CVE-2022-40302.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-40318
https://cyberriskleaders.com/new-vulnerabilities-disclosed-in-frrouting-software/

Patch from:
72088b05d4

Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-24 10:47:53 -04:00
Jonas Gorski
49c8c1e74e frr: Security fix CVE-2022-36440 / CVE-2022-40302
Add a security fix from the stable/8.2 branch for two CVEs for the same
vulneratiblity:

CVE-2022-36440:
A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the
peek_for_as4_capability function. Attackers can maliciously construct
BGP open packets and send them to BGP peers running frr-bgpd, resulting
in DoS.

CVE-2022-40302:
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By
crafting a BGP OPEN message with an option of type 0xff (Extended Length
from RFC 9072), attackers may cause a denial of service (assertion
failure and daemon restart, or out-of-bounds read). This is possible
because of inconsistent boundary checks that do not account for reading
3 bytes (instead of 2) in this 0xff case.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-36440
https://nvd.nist.gov/vuln/detail/CVE-2022-40302
https://cyberriskleaders.com/new-vulnerabilities-disclosed-in-frrouting-software/
https://github.com/FRRouting/frr/issues/13202

Patch from:
02a0e45f66

Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-24 10:47:53 -04:00
Chee Yang Lee
96d0f40a41 tinyproxy: fix CVE-2022-40468
(cherry-picked from 795ccdd86c)

Signed-off-by: Chee Yang Lee <chee.yang.lee@intel.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-09 06:50:47 -04:00
Arsalan H. Awan
ccaded77e5 meta-networking/licenses/netperf: remove unused license
This removes the old unused license for netperf as upstream
moved to using the MIT license for netperf.

See: meta-openembedded commit 587fe58777

Signed-off-by: Arsalan H. Awan <arsalan.awan@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 27bdecd1bc)
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-05-08 08:04:20 -04:00
Khem Raj
e6a91b2f95 postfix: Fix build on systems with linux 6.x
* cherry-picked from langdale "postfix: Upgrade to 3.7.3" commit
  dd5226bed9 without the upgrade.

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-13 08:26:04 -04:00
Martin Jansa
3f0ee06cde restinio: fix S variable in multilib builds
* do_populate_lic as well as do_configure fails in multilib builds, because S points to empty:
  lib32-restinio/0.6.13-r0/lib32-restinio-0.6.13/dev

Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-04-13 08:25:57 -04:00
Peter Marko
084a584897 dnsmasq: fix CVE-2023-28450
The patch is modified by removing irrelevant and conflicting
CHANGELOG entry.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-25 09:08:29 -04:00
Yi Zhao
60e8a5e23a mbedtls: upgrade 2.28.0 -> 2.28.2
ChangeLog:
https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2

Security Fixes:
CVE-2022-46392:
https://nvd.nist.gov/vuln/detail/CVE-2022-46392
CVE-2022-46393:
https://nvd.nist.gov/vuln/detail/CVE-2022-46393

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-22 07:33:16 -04:00
Peter Marko
fd298f6e6b ntp: whitelist CVE-2019-11331
Links from https://nvd.nist.gov/vuln/detail/CVE-2019-11331 lead to
conclusion that this is how icurrent ntp protocol is designed.
New RFC is propsed for future but it will not be compatible with current
one.

See https://support.f5.com/csp/article/K09940637

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-16 08:13:19 -04:00
Chee Yang Lee
75cc182f38 cifs-utils: fix CVE-2022-27239 CVE-2022-29869
Signed-off-by: Chee Yang Lee <chee.yang.lee@intel.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-05 07:52:13 -05:00
Martin Jansa
dfcbe97b55 mdns: use git fetcher
* https://opensource.apple.com/tarballs/mDNSResponder/mDNSResponder-${PV}.tar.gz
  is just redirect to unsafe github archives which are regenerated from time to
  time.

* We do have src-uri-bad QA check which prevents to use github archives in SRC_URI
  since 2019:
  21f84fcdd6
  but this cannot catch such redirects, see:

$ wget https://opensource.apple.com/tarballs/mDNSResponder/mDNSResponder-878.30.4.tar.gz
--2023-01-31 10:06:02--  https://opensource.apple.com/tarballs/mDNSResponder/mDNSResponder-878.30.4.tar.gz
Resolving opensource.apple.com (opensource.apple.com)... 17.253.73.203, 17.253.73.206, 2a01:b740:a26:f000::5, ...
Connecting to opensource.apple.com (opensource.apple.com)|17.253.73.203|:443... connected.
HTTP request sent, awaiting response... 302 Redirect
Location: https://github.com/apple-oss-distributions/mDNSResponder/archive/refs/tags/mDNSResponder-878.30.4.tar.gz [following]
--2023-01-31 10:06:02--  https://github.com/apple-oss-distributions/mDNSResponder/archive/refs/tags/mDNSResponder-878.30.4.tar.gz
Resolving github.com (github.com)... 140.82.121.3
Connecting to github.com (github.com)|140.82.121.3|:443... connected.
HTTP request sent, awaiting response... 302 Found
Location: https://codeload.github.com/apple-oss-distributions/mDNSResponder/tar.gz/refs/tags/mDNSResponder-878.30.4 [following]
--2023-01-31 10:06:02--  https://codeload.github.com/apple-oss-distributions/mDNSResponder/tar.gz/refs/tags/mDNSResponder-878.30.4
Resolving codeload.github.com (codeload.github.com)... 140.82.121.10
Connecting to codeload.github.com (codeload.github.com)|140.82.121.10|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [application/x-gzip]
Saving to: ?mDNSResponder-878.30.4.tar.gz?

* The tarball was regenerated recently as discussed in:
  https://github.com/orgs/community/discussions/45830

* Use top-level directory in S to fix DEBUG_PREFIX_MAP usage
  like the version in master does, the only exception here is that
  there still was top-level Makefile (which fails to set VER with:
  Makefile:26: *** missing separator.  Stop.
  so use the simple one like newer version in master)
* it's already included in master as part of version upgrade in:
  ec96eb577b

Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-03-05 07:44:28 -05:00
Yi Zhao
b19d7a311a frr: Security fix for CVE-2022-42917
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-42917
https://www.suse.com/de-de/security/cve/CVE-2022-42917.html
https://bugzilla.suse.com/show_bug.cgi?id=1204124

Patch from:
[1] 5216a05b32
[2] 6031b8a322

Per [2], update frr.pam to eliminate the warning issued by pam:
vtysh[485]: pam_warn(frr:account): function=[pam_sm_acct_mgmt] flags=0
service=[frr] terminal=[<unknown>] user=[root] ruser=[<unknown>] rhost=[<unknown>]

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2023-02-11 11:11:04 -05:00