summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--recipes-connectivity/hostapd/files/hostapd.service11
-rw-r--r--recipes-connectivity/hostapd/hostapd_2.10.bb51
-rw-r--r--recipes-connectivity/openssh/openssh/CVE-2021-28041.patch20
-rw-r--r--recipes-connectivity/openssh/openssh/CVE-2021-41617.patch52
-rw-r--r--recipes-connectivity/openssh/openssh_8.4p1.bb27
-rw-r--r--recipes-connectivity/strongswan/strongswan_%.bbappend18
-rw-r--r--recipes-connectivity/strongswan/strongswan_5.9.8.bb189
-rw-r--r--recipes-core/expat/expat_2.5.0.bb32
-rw-r--r--recipes-core/expat/files/run-ptest9
-rw-r--r--recipes-core/libxml/libxml2/0001-Make-ptest-run-the-python-tests-if-python-is-enabled.patch98
-rw-r--r--recipes-core/libxml/libxml2/0001-Port-gentest.py-to-Python-3.patch813
-rw-r--r--recipes-core/libxml/libxml2/CVE-2016-3709.patch89
-rw-r--r--recipes-core/libxml/libxml2/CVE-2019-20388.patch37
-rw-r--r--recipes-core/libxml/libxml2/CVE-2020-24977.patch41
-rw-r--r--recipes-core/libxml/libxml2/CVE-2020-7595.patch36
-rw-r--r--recipes-core/libxml/libxml2/CVE-2021-3517.patch53
-rw-r--r--recipes-core/libxml/libxml2/CVE-2021-3518.patch112
-rw-r--r--recipes-core/libxml/libxml2/CVE-2021-3537.patch50
-rw-r--r--recipes-core/libxml/libxml2/CVE-2021-3541.patch73
-rw-r--r--recipes-core/libxml/libxml2/CVE-2022-23308-fix-regression.patch98
-rw-r--r--recipes-core/libxml/libxml2/CVE-2022-23308.patch204
-rw-r--r--recipes-core/libxml/libxml2/CVE-2022-29824-dependent.patch53
-rw-r--r--recipes-core/libxml/libxml2/CVE-2022-29824.patch348
-rw-r--r--recipes-core/libxml/libxml2/fix-execution-of-ptests.patch33
-rw-r--r--recipes-core/libxml/libxml2/libxml-64bit.patch28
-rw-r--r--recipes-core/libxml/libxml2/libxml-m4-use-pkgconfig.patch216
-rw-r--r--recipes-core/libxml/libxml2/python-sitepackages-dir.patch35
-rw-r--r--recipes-core/libxml/libxml2/run-ptest4
-rw-r--r--recipes-core/libxml/libxml2/runtest.patch847
-rw-r--r--recipes-core/libxml/libxml2_2.9.10.bb133
-rwxr-xr-xrecipes-core/openvpn/openvpn/openvpn112
-rw-r--r--recipes-core/openvpn/openvpn/openvpn-volatile.conf1
-rw-r--r--recipes-core/openvpn/openvpn/openvpn@.service12
-rw-r--r--recipes-core/openvpn/openvpn_2.4.12.bb76
-rw-r--r--recipes-core/zlib/zlib/0001-configure-Pass-LDFLAGS-to-link-tests.patch80
-rw-r--r--recipes-core/zlib/zlib/run-ptest7
-rw-r--r--recipes-core/zlib/zlib_1.2.13.bb47
-rw-r--r--recipes-crypto/cryptsetup/cryptsetup_2.4.3.bb105
-rw-r--r--recipes-devtools/cmake/cmake-native_3.24.2.bb65
-rw-r--r--recipes-devtools/cmake/cmake.inc28
-rw-r--r--recipes-devtools/cmake/cmake/0001-CMakeDetermineSystem-use-oe-environment-vars-to-load.patch44
-rw-r--r--recipes-devtools/cmake/cmake/0005-Disable-use-of-ext2fs-ext2_fs.h-by-cmake-s-internal-.patch39
-rw-r--r--recipes-devtools/cmake/cmake/OEToolchainConfig.cmake20
-rw-r--r--recipes-devtools/cmake/cmake/SDKToolchainConfig.cmake.template31
-rwxr-xr-xrecipes-devtools/cmake/cmake/cmake-setup.py33
-rw-r--r--recipes-devtools/cmake/cmake/environment.d-cmake.sh2
-rw-r--r--recipes-devtools/cmake/cmake_3.24.2.bb67
-rw-r--r--recipes-devtools/python/python3/CVE-2022-37454.patch106
-rw-r--r--recipes-devtools/python/python3/CVE-2022-45061.patch101
-rw-r--r--recipes-devtools/python/python3_%.bbappend7
-rw-r--r--recipes-devtools/rsync/files/0001-Add-missing-prototypes-to-function-declarations.patch173
-rw-r--r--recipes-devtools/rsync/files/0001-Turn-on-pedantic-errors-at-the-end-of-configure.patch68
-rw-r--r--recipes-devtools/rsync/files/determism.patch34
-rw-r--r--recipes-devtools/rsync/files/makefile-no-rebuild.patch80
-rw-r--r--recipes-devtools/rsync/files/rsyncd.conf15
-rw-r--r--recipes-devtools/rsync/rsync_3.2.5.bb71
-rw-r--r--recipes-extended/libtirpc/libtirpc_1.3.3.bb28
-rw-r--r--recipes-extended/rsyslog/libfastjson/CVE-2020-12762.patch (renamed from recipes-extended/libfastjson/libfastjson/CVE-2020-12762.patch)0
-rw-r--r--recipes-extended/rsyslog/libfastjson_%.bbappend (renamed from recipes-extended/libfastjson/libfastjson_%.bbappend)0
-rw-r--r--recipes-extended/rsyslog/libfastjson_0.99.9.bb15
-rw-r--r--recipes-extended/rsyslog/librelp_1.10.0.bb18
-rw-r--r--recipes-extended/rsyslog/rsyslog/0001-Include-sys-time-h.patch32
-rw-r--r--recipes-extended/rsyslog/rsyslog/0001-tests-disable-the-check-for-inotify.patch46
-rw-r--r--recipes-extended/rsyslog/rsyslog/initscript118
-rw-r--r--recipes-extended/rsyslog/rsyslog/rsyslog.conf91
-rw-r--r--recipes-extended/rsyslog/rsyslog/rsyslog.logrotate39
-rw-r--r--recipes-extended/rsyslog/rsyslog/rsyslog.service21
-rw-r--r--recipes-extended/rsyslog/rsyslog/run-ptest12
-rw-r--r--recipes-extended/rsyslog/rsyslog/use-pkgconfig-to-check-libgcrypt.patch43
-rw-r--r--recipes-extended/rsyslog/rsyslog_8.2206.0.bb204
-rw-r--r--recipes-extended/sudo/files/CVE-2022-43995.patch59
-rw-r--r--recipes-extended/sudo/sudo_1.9.5p2.bb1
-rw-r--r--recipes-support/cifs/cifs-utils_7.0.bb44
-rw-r--r--recipes-support/curl/curl/0001-replace-krb5-config-with-pkg-config.patch30
-rw-r--r--recipes-support/curl/curl_7.86.0.bb92
-rw-r--r--recipes-support/gnutls/gnutls/0001-Creating-.hmac-file-should-be-excuted-in-target-envi.patch28
-rw-r--r--recipes-support/gnutls/gnutls/arm_eabi.patch30
-rw-r--r--recipes-support/gnutls/gnutls_3.7.8.bb90
-rw-r--r--recipes-support/gnutls/libtasn1/dont-depend-on-help2man.patch26
-rw-r--r--recipes-support/gnutls/libtasn1_4.19.0.bb23
-rw-r--r--recipes-support/libesmtp/libesmtp_1.1.0.bb32
-rw-r--r--recipes-support/libmodbus/libmodbus.inc16
-rw-r--r--recipes-support/libmodbus/libmodbus/Fix-float-endianness-issue-on-big-endian-arch.patch314
-rw-r--r--recipes-support/libmodbus/libmodbus/libmodbus_send_raw_message_tid.patch37
-rw-r--r--recipes-support/libmodbus/libmodbus_3.1.7.bb9
-rw-r--r--recipes-support/libmodbus/libmodbus_3.1.7.bbappend5
-rw-r--r--recipes-support/nettle/nettle/Add-target-to-only-build-tests-not-run-them.patch45
-rw-r--r--recipes-support/nettle/nettle/check-header-files-of-openssl-only-if-enable_.patch36
-rw-r--r--recipes-support/nettle/nettle/dlopen-test.patch29
-rw-r--r--recipes-support/nettle/nettle/run-ptest36
-rw-r--r--recipes-support/nettle/nettle_3.8.1.bb57
-rw-r--r--recipes-support/ntp/files/0001-libntp-Do-not-use-PTHREAD_STACK_MIN-on-glibc.patch32
-rw-r--r--recipes-support/ntp/files/0001-test-Fix-build-with-new-compiler-defaults-to-fno-com.patch66
-rw-r--r--recipes-support/ntp/files/ntp-4.2.4_p6-nano.patch27
-rw-r--r--recipes-support/ntp/files/ntp.conf21
-rwxr-xr-xrecipes-support/ntp/files/ntpd84
-rw-r--r--recipes-support/ntp/files/ntpd.list1
-rw-r--r--recipes-support/ntp/files/ntpd.service11
-rwxr-xr-xrecipes-support/ntp/files/ntpdate59
-rw-r--r--recipes-support/ntp/files/ntpdate.default7
-rw-r--r--recipes-support/ntp/files/ntpdate.service11
-rw-r--r--recipes-support/ntp/files/reproducibility-fixed-path-to-posix-shell.patch15
-rw-r--r--recipes-support/ntp/files/sntp1
-rw-r--r--recipes-support/ntp/files/sntp.service11
-rw-r--r--recipes-support/ntp/ntp_4.2.8p15.bb206
105 files changed, 7491 insertions, 1 deletions
diff --git a/recipes-connectivity/hostapd/files/hostapd.service b/recipes-connectivity/hostapd/files/hostapd.service
new file mode 100644
index 0000000..151c050
--- /dev/null
+++ b/recipes-connectivity/hostapd/files/hostapd.service
@@ -0,0 +1,11 @@
+[Unit]
+Description=Hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
+After=network.target
+
+[Service]
+Type=forking
+PIDFile=/run/hostapd.pid
+ExecStart=@SBINDIR@/hostapd @SYSCONFDIR@/hostapd.conf -P /run/hostapd.pid -B
+
+[Install]
+WantedBy=multi-user.target
diff --git a/recipes-connectivity/hostapd/hostapd_2.10.bb b/recipes-connectivity/hostapd/hostapd_2.10.bb
new file mode 100644
index 0000000..04b70d9
--- /dev/null
+++ b/recipes-connectivity/hostapd/hostapd_2.10.bb
@@ -0,0 +1,51 @@
+SUMMARY = "User space daemon for extended IEEE 802.11 management"
+HOMEPAGE = "http://w1.fi/hostapd/"
+SECTION = "kernel/userland"
+LICENSE = "BSD-3-Clause"
+LIC_FILES_CHKSUM = "file://hostapd/README;md5=c905478466c90f1cefc0df987c40e172"
+
+DEPENDS = "libnl openssl"
+
+SRC_URI = " \
+ http://w1.fi/releases/hostapd-${PV}.tar.gz \
+ file://defconfig \
+ file://init \
+ file://hostapd.service \
+"
+
+
+SRC_URI[sha256sum] = "206e7c799b678572c2e3d12030238784bc4a9f82323b0156b4c9466f1498915d"
+
+S = "${WORKDIR}/hostapd-${PV}"
+B = "${WORKDIR}/hostapd-${PV}/hostapd"
+
+inherit update-rc.d systemd pkgconfig features_check
+
+CONFLICT_DISTRO_FEATURES = "openssl-no-weak-ciphers"
+
+INITSCRIPT_NAME = "hostapd"
+
+SYSTEMD_SERVICE_${PN} = "hostapd.service"
+SYSTEMD_AUTO_ENABLE_${PN} = "disable"
+
+do_configure_append() {
+ install -m 0644 ${WORKDIR}/defconfig ${B}/.config
+}
+
+do_compile() {
+ export CFLAGS="-MMD -O2 -Wall -g"
+ export EXTRA_CFLAGS="${CFLAGS}"
+ make V=1
+}
+
+do_install() {
+ install -d ${D}${sbindir} ${D}${sysconfdir}/init.d ${D}${systemd_unitdir}/system/
+ install -m 0644 ${B}/hostapd.conf ${D}${sysconfdir}
+ install -m 0755 ${B}/hostapd ${D}${sbindir}
+ install -m 0755 ${B}/hostapd_cli ${D}${sbindir}
+ install -m 755 ${WORKDIR}/init ${D}${sysconfdir}/init.d/hostapd
+ install -m 0644 ${WORKDIR}/hostapd.service ${D}${systemd_unitdir}/system/
+ sed -i -e 's,@SBINDIR@,${sbindir},g' -e 's,@SYSCONFDIR@,${sysconfdir},g' ${D}${systemd_unitdir}/system/hostapd.service
+}
+
+CONFFILES_${PN} += "${sysconfdir}/hostapd.conf"
diff --git a/recipes-connectivity/openssh/openssh/CVE-2021-28041.patch b/recipes-connectivity/openssh/openssh/CVE-2021-28041.patch
new file mode 100644
index 0000000..9fd7e93
--- /dev/null
+++ b/recipes-connectivity/openssh/openssh/CVE-2021-28041.patch
@@ -0,0 +1,20 @@
+Description: fix double-free memory corruption in ssh-agent
+Author: Marc Deslauriers <marc.deslauriers@canonical.com>
+Origin: minimal fix for https://github.com/openssh/openssh-portable/commit/e04fd6dde16de1cdc5a4d9946397ff60d96568db
+
+Signed-off-by: Sana Kazi <Sana.Kazi@kpit.com>
+
+CVE: CVE-2021-28041
+Upstream-Status: Backport [http://archive.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_8.2p1-4ubuntu0.3.debian.tar.xz]
+Comment: No change in any hunk
+
+--- a/ssh-agent.c
++++ b/ssh-agent.c
+@@ -496,6 +496,7 @@ process_add_identity(SocketEntry *e)
+ goto err;
+ }
+ free(ext_name);
++ ext_name = NULL;
+ break;
+ default:
+ error("%s: Unknown constraint %d", __func__, ctype);
diff --git a/recipes-connectivity/openssh/openssh/CVE-2021-41617.patch b/recipes-connectivity/openssh/openssh/CVE-2021-41617.patch
new file mode 100644
index 0000000..bda896f
--- /dev/null
+++ b/recipes-connectivity/openssh/openssh/CVE-2021-41617.patch
@@ -0,0 +1,52 @@
+From a6414400ec94a17871081f7df24f910a6ee01b8b Mon Sep 17 00:00:00 2001
+From: Ali Abdallah <aabdallah@suse.de>
+Date: Wed, 24 Nov 2021 13:33:39 +0100
+Subject: [PATCH] CVE-2021-41617 fix
+
+backport of the following two upstream commits
+
+f3cbe43e28fe71427d41cfe3a17125b972710455
+bf944e3794eff5413f2df1ef37cddf96918c6bde
+
+CVE-2021-41617 failed to correctly initialise supplemental groups
+when executing an AuthorizedKeysCommand or AuthorizedPrincipalsCommand,
+where a AuthorizedKeysCommandUser or AuthorizedPrincipalsCommandUser
+directive has been set to run the command as a different user. Instead
+these commands would inherit the groups that sshd(8) was started with.
+---
+ auth.c | 8 ++++++++
+ 1 file changed, 8 insertions(+)
+
+CVE: CVE-2021-41617
+Upstream-Status: Backport [https://bugzilla.suse.com/attachment.cgi?id=854015]
+Comment: No change in any hunk
+Signed-off-by: Sana Kazi <Sana.Kazi@kpit.com>
+
+diff --git a/auth.c b/auth.c
+index 163038f..a47b267 100644
+--- a/auth.c
++++ b/auth.c
+@@ -52,6 +52,7 @@
+ #include <limits.h>
+ #include <netdb.h>
+ #include <time.h>
++#include <grp.h>
+
+ #include "xmalloc.h"
+ #include "match.h"
+@@ -851,6 +852,13 @@ subprocess(const char *tag, struct passwd *pw, const char *command,
+ }
+ closefrom(STDERR_FILENO + 1);
+
++ if (geteuid() == 0 &&
++ initgroups(pw->pw_name, pw->pw_gid) == -1) {
++ error("%s: initgroups(%s, %u): %s", tag,
++ pw->pw_name, (u_int)pw->pw_gid, strerror(errno));
++ _exit(1);
++ }
++
+ /* Don't use permanently_set_uid() here to avoid fatal() */
+ if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) == -1) {
+ error("%s: setresgid %u: %s", tag, (u_int)pw->pw_gid,
+--
+2.26.2
diff --git a/recipes-connectivity/openssh/openssh_8.4p1.bb b/recipes-connectivity/openssh/openssh_8.4p1.bb
index 2fb4816..8e73ceb 100644
--- a/recipes-connectivity/openssh/openssh_8.4p1.bb
+++ b/recipes-connectivity/openssh/openssh_8.4p1.bb
@@ -25,13 +25,40 @@ SRC_URI = "https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.ta
file://sshd_check_keys \
file://add-test-support-for-busybox.patch \
file://0f90440ca70abab947acbd77795e9f130967956c.patch \
+ file://CVE-2021-28041.patch \
+ file://CVE-2021-41617.patch \
"
SRC_URI[sha256sum] = "5a01d22e407eb1c05ba8a8f7c654d388a13e9f226e4ed33bd38748dafa1d2b24"
+# This CVE is specific to OpenSSH with the pam opie which we don't build/use here
+CVE_CHECK_WHITELIST += "CVE-2007-2768"
+
# This CVE is specific to OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7
# and when running in a Kerberos environment. As such it is not relevant to OpenEmbedded
CVE_CHECK_WHITELIST += "CVE-2014-9278"
+# CVE-2008-3844 was reported in OpenSSH on Red Hat Enterprise Linux and
+# certain packages may have been compromised. This CVE is not applicable
+# as our source is OpenBSD. https://securitytracker.com/id?1020730
+# https://www.securityfocus.com/bid/30794