4113 Commits

Author SHA1 Message Date
Gyorgy Sarvari
8cab2b2977
libowfat: update SRC_URI
The https link does not work anymore, it just refuses the connection.
http still works though.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-28 08:14:39 -08:00
Gyorgy Sarvari
8da9f2fea2
ncp: update SRC_URI
The https link does not work anymore, it just refuses the connection.
http still works though.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-28 08:14:39 -08:00
Gyorgy Sarvari
c3c2495e9f
cifs-utils: fix broken PACKAGECONFIGs
Some PACKAGECONFIGs (cifsidmap, cifsacl, pam) were failing to build since
a while, erroring out with:

| ../sources/cifs-utils-7.4/resolve_host.c:23:10: fatal error: config.h: No such file or directory
|    23 | #include "config.h"
|       |          ^~~~~~~~~~
| compilation terminated.

The config.h header is generated in the root of build folder, and it seems
that the recipe can't be built 100% out of the source tree.

To avoid this issue, add ${B} as an include folder to CFLAGS, so it finds
the required header.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-25 11:25:59 -08:00
Gyorgy Sarvari
f2200178ed
cifs-utils: upgrade 7.0 -> 7.4
Contains fix for CVE-2025-2312

The recipe installs two scripts in bindir - this is nothing new.
But the shebang has changed from "/usr/bin/env python3" to
"/usr/bin/python3" - these were always python scripts, but
they weren't recognized as such during the QA checks, and
python wasn't installed as a runtime dependency.

Now QA check is complaining about missing python in RDEPENDS.
To avoid mandatory python installation, package the scripts
separately in cifs-utils-scripts package.

Shortlog:
cifs-utils: bump version to 7.4
mount.cifs: retry mount on -EINPROGRESS
cifs.upcall: correctly treat UPTARGET_UNSPECIFIED as UPTARGET_APP
cifscreds: use <libgen.h> for basename
getcifsacl, setcifsacl: use <libgen.h> for basename
cifs.upcall: fix memory leaks in check_service_ticket_exits()
cifs-utils: bump version to 7.3
Fix regression in mount.cifs with guest mount option
resolve_host.c: Initialize site_name
cldap_ping: Fix socket fd leak
cifs-utils: bump version to 7.2
getcifsacl: fix return code check for getting full ACL
cifs-utils: add documentation for upcall_target
cifs-utils: avoid using mktemp when updating mtab
cldap_ping.c: add missing <sys/types.h> include
configure.ac: libtalloc is now mandatory
cifscreds: allow user to set the key's timeout
cifscreds: use continue instead of break when matching commands
Do not pass passwords with sec=none and sec=krb5
docs: add esize description
docs: add max_cached_dirs description
docs: update actimeo description
Fix compiler warnings in mount.cifs
CIFS.upcall to accomodate new namespace mount opt
cifs-utils: Skip TGT check if valid service ticket is already available
use enums to check password or password2 in set_password, get_password_from_file and minor documentation additions
cifs-utils: support and document password2 mount option
smbinfo: add bash completion support for filestreaminfo, keys, gettconinfo
cifs-utils: bump version to 7.1
cifs: update documentation for sloppy mount option
docs: add closetimeo description
docs: add compress description
checkopts: update it to work with latest kernel version
cifs-utils: add documentation for multichannel and max_channels
cifs-utils: smbinfo: add gettconinfo command
Implement CLDAP Ping to find the closest site
mount.cifs.rst: update section about xattr/acl support
mount.cifs.rst: add missing reference for sssd
getcifsacl, setcifsacl: add missing <endian.h> include for le32toh
getcifsacl, setcifsacl: add missing <linux/limits.h> include for XATTR_SIZE_MAX
cifs-utils: Make automake treat /sbin as exec, not data
pam_cifscreds: fix warning on NULL arg passed to %s in pam_syslog()
cifs.upcall: fix UAF in get_cachename_from_process_env()
cifs-utils: add documentation for acregmax and acdirmax
setcifsacl: Fix uninitialized value.
Use explicit "#!/usr/bin/python3"

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-25 11:25:59 -08:00
Wang Mingyu
e3e3ffb13f
nbdkit: upgrade 1.45.15 -> 1.46.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-24 13:18:27 -08:00
Wang Mingyu
412a7debf1
memcached: upgrade 1.6.39 -> 1.6.40
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-24 13:18:27 -08:00
Gyorgy Sarvari
1fa7c7080e
wolfssl: ignore CVE-2025-11931 and CVE-2025-12889
NVD claims that WolfSSL 5.8.4 is affected by both of these vulnerabilities,
however actually both have been fixed in that version.

CVE-2025-11931: NVD[1] references [2] PR as a patch, which was merged in [3].
CVE-2025-12889: NVD[4] referenced [5] PR as a patch, which was merged in [6].

[1]: https://nvd.nist.gov/vuln/detail/CVE-2025-11931
[2]: https://github.com/wolfSSL/wolfssl/pull/9223
[3]: e497d28ae1
[4]: https://nvd.nist.gov/vuln/detail/CVE-2025-12889
[5]: https://github.com/wolfSSL/wolfssl/pull/9395
[6]: 2db1c7a522

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-24 13:18:25 -08:00
Gyorgy Sarvari
03328f6c73
tinyproxy: add ptest support
It takes <10s to execute.

Sample output:

root@qemux86-64:~# ptest-runner
START: ptest-runner
2025-12-23T17:45
BEGIN: /usr/lib/tinyproxy/ptest
starting web server... done (listening on 127.0.0.3:32123)
starting tinyproxy... done (listening on 127.0.0.2:12321)
waiting for 1 seconds.. done
checking direct connection to web server... ok
testing connection through tinyproxy... ok
requesting statspage via stathost url... ok
signaling tinyproxy to reload config...ok
checking direct connection to web server... ok
testing connection through tinyproxy... ok
requesting statspage via stathost url... ok
checking bogus request... ok, got expected error code 400
testing connection to filtered domain... ok, got expected error code 403
requesting connect method to denied port... ok, got expected error code 403
testing unavailable backend... ok, got expected error code 502
0 errors
killing tinyproxy... ok
killing webserver... ok
done
PASS: run_tests.sh
DURATION: 1
END: /usr/lib/tinyproxy/ptest
2025-12-23T17:45
STOP: ptest-runner
TOTAL: 1 FAIL: 0

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-24 13:18:25 -08:00
Gyorgy Sarvari
7981f52062
tinyproxy: patch CVE-2025-63938
Details: https://nvd.nist.gov/vuln/detail/CVE-2025-63938

Pick the patch referenced by the nvd report.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-24 13:18:25 -08:00
Liu Yiding
afa5d8ed6d
net-snmp: upgrade 5.9.4 -> 5.9.5
1.Drop following patches as they were merged upstream.
  0001-Android-Fix-the-build.patch
  0012-Fix-configuration-of-NETSNMP_FD_MASK_TYPE.patch
  net-snmp-5.9.4-kernel-6.7.patch
  0008-net-snmp-fix-engineBoots-value-on-SIGHUP.patch
  0001-Fix-LDFLAGS-vs-LIBS-ordering.patch

2.Drop 0005-snmplib-keytools.c-Don-t-check-for-return-from-EVP_M.patch as compile error has been fixed.

Signed-off-by: Liu Yiding <liuyd.fnst@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-23 12:22:41 -08:00
Gyorgy Sarvari
d02f259dd4
dovecot: upgrade 2.4.1-4 -> 2.4.2
Contains fix for CVE-2025-30189

Changelog: https://github.com/dovecot/core/releases/tag/2.4.2

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-22 18:20:58 -08:00
Wang Mingyu
70bf92a7b3
strongswan: upgrade 6.0.3 -> 6.0.4
Changelog:
==========
- Fixed a vulnerability in the NetworkManager plugin charon-nm that potentially
  allows using credentials of other local users.
- Concurrent requests to fetch the same CRL URI by multiple threads are now
  combined.
- Increased the max. supported length for section names in swanctl.conf to 256.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-21 08:54:04 -08:00
Gyorgy Sarvari
584fa06f3b
fetchmail: upgrade 6.5.2 -> 6.6.2
Contains fix for CVE-2025-61962.

License-Update: added a warning about linking against the newly relicensed WolfSSL.

Changelog: https://gitlab.com/fetchmail/fetchmail/-/blob/6.6.2/NEWS

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-20 11:41:01 -08:00
Gyorgy Sarvari
70a2b417c6
unbound: complete ptest support
The recipe had already an almost working ptest config which
wasn't enabled, it just needed some small fixes to make it work:
correct the output of the run-ptest script, and install some
extra testdata.

Execution is quick, single digit seconds:

root@qemux86-64:/usr/lib/unbound/ptest/tests# ptest-runner
START: ptest-runner
2025-12-16T11:53
BEGIN: /usr/lib/unbound/ptest
Start of unbound 1.24.2 unit test.
test authzone functions
test negative cache functions
test ub_random functions
[...many lines...]
PASS: ./testdata/val_unsecds_negcache.rpl
PASS: ./testdata/val_unsecds_qtypeds.rpl
PASS: ./testdata/val_wild_pos.rpl
PASS: ./testdata/version_bind.rpl
PASS: ./testdata/version_bind_hide.rpl
PASS: ./testdata/views.rpl
DURATION: 4
END: /usr/lib/unbound/ptest
2025-12-16T11:53
STOP: ptest-runner
TOTAL: 1 FAIL: 0

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-16 19:57:34 -08:00
Gyorgy Sarvari
0df484a922
unbound: upgrade 1.22.0 -> 1.24.2
Contains fixes for CVE-2025-11411 and CVE-2025-5994.

Drop patch that was incorporated in this release.

Changelogs:
https://github.com/NLnetLabs/unbound/releases/tag/release-1.24.2
https://github.com/NLnetLabs/unbound/releases/tag/release-1.24.1
https://github.com/NLnetLabs/unbound/releases/tag/release-1.24.0
https://github.com/NLnetLabs/unbound/releases/tag/release-1.23.1
https://github.com/NLnetLabs/unbound/releases/tag/release-1.23.0

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-16 19:57:34 -08:00
Gyorgy Sarvari
598176e1cb
libcoap: ignore CVE-2025-50518
Details: https://nvd.nist.gov/vuln/detail/CVE-2025-50518

The vulnerability is disputed by upstream, because the vulnerability
requires a user error, incorrect library usage. See also an upstream
discussion in a related (rejected) PR: https://github.com/obgm/libcoap/pull/1726

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-16 19:57:34 -08:00
Gyorgy Sarvari
30d2c25a8d
openvpn: upgrade 2.6.16 -> 2.6.17
Changelog:
- Windows/interactive service: fix erroneous exit on error that could
  be used by a local Windows users to achieve a local denial-of-service
  (CVE-2025-13751)
- Windows/interactive service: improve service pipe robustness against
  file access races (uuid) and access by unauthorized processes (ACL).
  upgrade bundled build instruction (vcpkg and patch) for pkcs11-helper
  to 1.31, fixing a parser bug

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-16 19:57:33 -08:00
Jason Schonberg
5f7c5c6641
nopoll: Upgrade to 0.4.7.b429
Signed-off-by: Jason Schonberg <schonm@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-14 10:19:50 -08:00
Khem Raj
c89e5b9e2d
packagegroups: Remove packages not yet ported onto riscv32
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-13 00:54:16 -08:00
Khem Raj
c13be1b757
freediameter: Add 600s timeout via ctest driver
This helps tests not hitting timeout (120s default)
especially testmesg_stress test can timeout on slower machines
e.g. fully emulated ( non-kvm ) qemu machines e.g.
qemuarm64 on x86_64 machine.

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-10 20:39:33 -08:00
Khem Raj
848bac20ea
dante: Add _GNU_SOURCE for musl builds
This helps build fixes e.g. cpuset_t definitions etc.
glibc builds have _GNU_SOURCE defined inherently.

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-10 08:56:15 -08:00
Khem Raj
d198cdc0d4
frr: Upgrade to 10.5.0
Relase Overview:

* BFD the ability to listen for specific VRFs only
  - Configure which VRFs the BFD daemon will listen to. By default, BFD listens to  all VRFs
    present in the system, including the default VRF. Default VRF must be specified as `default`.

* BGP SRv6/MPLS coexistence
  - Allow MPLS and SRv6 to coexist on the same L3VRF, even for a given prefix. This feature is
    important in brown fields where some operators want to migrate from MPLS to SRv6 backbone.

* BGP SRv6 locator per VRF support
  - Ability to choose SRv6 locator per VRF.

* BGP Error handling (RFC 7606) for iBGP peers
  - Before 10.5.0, once we received a malformed packet between iBGP peers, we always reset the
    session, and with this release, we handle malformed packets the same way as for eBGP
    (by withdrawing or discarding the malformed packets).

* BGP IPv6 Link-Local Capability is disabled by default
  - In 10.4.0, this capability was enabled by default for a “datacenter” profile, but it’s disabled
    for 10.5.0 and will be backported to 10.4.2 as well. The problem arises when the receiver has
    configured a route-map with `set ipv6 next-hop prefer-global` and we send only an IPv6 Link-Local
    address; therefore, it was decided to revert it to be disabled by default.

* BGP BGPID Next-Hop Characteristic
  - In some cases, the BGP speaker sending a route might encode only a link-local address and no
    global address. To provide uniqueness in this case, it is sufficient to associate the BGP
    Identifier and AS Number of the route's sender. The BGP Identifier Characteristic
    (BGPID) provides a way to convey this information if required.

* BGP EVPN flooding per VNI support
  - Add an ability to adjust BUM flooding per VNI, instead of just globally. E.g., disable flooding
    only for an arbitrary VNI.

* BGP RPKI strict mode
  - RPKI strict mode prevents BGP from establishing a session if no RPKI cache server
    is connected.

* BGP rejects AS_SET by default**
  - Until 10.5.0, it was disabled by default, and since RFC 9774 was published, we switched this on
    by default (to reject).

* BGP has lots of improvements for Graceful-Restart**

* PIM/PIMv6 route-map support to allow users to filter IGMP/MLD joins using source, group, and
  interface combinations

* Support for multiple SRv6 locators
  - This extends the SRv6 SID Manager to add support for multiple locators.

* Zebra 16-bit next hop weights support
  - The weights used in ECMP’s consistent hashing have been widened from 8 bits to 16 bits since
    the 6.12 Linux kernel.

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-10 08:56:14 -08:00
Gyorgy Sarvari
f2b8b47e45
wolfssl: upgrade 5.8.0 -> 5.8.4
License-Update: the project was relicensed from GPL-2 to GPL-3

Inludes fixes for the following vulnerabilities:
CVE-2025-7394, CVE-2025-7395, CVE-2025-7396, CVE-2025-12888, CVE-2025-11936,
CVE-2025-11935, CVE-2025-11934, CVE-2025-11933, CVE-2025-11932, CVE-2025-11931,
CVE-2025-12889

Drop patch that is incorporated in this release.

Changelog: https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md

Ptests passed:

START: ptest-runner
2025-12-09T18:23
BEGIN: /usr/lib/wolfssl/ptest
Wolfssl ptest logs are stored in /tmp/wolfss_temp.6rsnys/ptest.log
Test script returned: 0
unit_test: Success for all configured tests.
PASS: Wolfssl
DURATION: 13
END: /usr/lib/wolfssl/ptest
2025-12-09T18:23
STOP: ptest-runner
TOTAL: 1 FAIL: 0

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-10 08:56:13 -08:00
Gyorgy Sarvari
9f12c5fbc6
dante: upgrade 1.4.3 -> 1.4.4
License-Update: copyright year bump

Changelog:
- Fix potential security issue CVE-2024-54662, related to "socksmethod"
  use in client/hostid-rules.
- Add a missing call to setgroups(2).
- Patch to fix compilation with libminiupnp 2.2.8.
- Client connectchild optimizations.
- Client SIGIO handling improvements.
- Various configure/build fixes.
- Updated to support TCP_EXP1 version of TCP hostid format.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-10 08:56:12 -08:00
Gyorgy Sarvari
bfb76da63b
civetweb: ignore CVE-2025-9648
Details: https://nvd.nist.gov/vuln/detail/CVE-2025-9648

It is already fixed in the currently used version.

Also, update CVE-2025-55763's status to "fixed-version" (so it will be
marked as "Patched" in the CVE report instead of "Ignored")

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-10 08:56:12 -08:00
Wang Mingyu
ad7c9ad199 nftables: upgrade 1.1.5 -> 1.1.6
0001-fix-typo-in-test-script.patch
removed since it's included in 1.1.6

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-09 15:11:01 -08:00
Wang Mingyu
5322aba126 openfortivpn: upgrade 1.23.1 -> 1.24.0
Changelog:
===========
- add OpenSSL 3.0+ PKCS#11 support using OSSL_STORE API
- add OpenSSL Engine support (with OpenSSL < 3.0)
- update package links for distros in README
- remove deprecated option --plugin
- increase the maximum size of the proxy response
- route: always remove wrong pppd route to self
- fix several Coverity warnings
- fix a memory leak in new ipv4_drop_wrong_route method
- HTTP: fixes missing '\0' in debug
- IO: fixes a RC use after free
- SSL: Avoid leaking SSL context

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-09 15:11:00 -08:00
Wang Mingyu
573a77680e nbdkit: upgrade 1.45.14 -> 1.45.15
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-09 15:11:00 -08:00
Wang Mingyu
e4c2d01d2d
libnftnl: upgrade 1.3.0 -> 1.3.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-09 09:08:16 -08:00
Liu Yiding
f0622d3e5c
ufw: upgrade 0.36.1 -> 0.36.2
Signed-off-by: Liu Yiding <liuyd.fnst@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-08 23:22:19 -08:00
Mingli Yu
c41fb791fa
openipmi: Pass BUILD_CFLAGS to BUILD_CC
* The option -fcanon-prefix-map is added to CFLAGS after the commit [1]
introduced and result in the below build error.
  Making all in sdrcomp
  make[3]: Entering directory '/tmp/work/cortexa57-wrs-linux/openipmi/2.0.37/sources/OpenIPMI-2.0.37/lanserv/sdrcomp'
aarch64-wrs-linux-gcc  -mcpu=cortex-a57+crc -mbranch-protection=standard -fstack-protector-strong  -O2 -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -Werror=format-security --sysroot=/tmp/work/cortexa57-wrs-linux/openipmi/2.0.37/recipe-sysroot -DHAVE_CONFIG_H -I. -I../..  -DSTATEDIR='"/var"'  -Wall -Wsign-compare -I../../include -I../../lanserv -I../../utils -O2 -g -fcanon-prefix-map  -ffile-prefix-map=/tmp/work/cortexa57-wrs-linux/openipmi/2.0.37/sources/OpenIPMI-2.0.37=/usr/src/debug/openipmi/2.0.37  -ffile-prefix-map=/tmp/work/cortexa57-wrs-linux/openipmi/2.0.37/sources/OpenIPMI-2.0.37=/usr/src/debug/openipmi/2.0.37  -ffile-prefix-map=/tmp/work/cortexa57-wrs-linux/openipmi/2.0.37/recipe-sysroot=  -ffile-prefix-map=/tmp/work/cortexa57-wrs-linux/openipmi/2.0.37/recipe-sysroot-native=  -pipe -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -c -o sdrcomp.o sdrcomp.c
gcc  -o sdrcomp_build ../../lanserv/sdrcomp/sdrcomp.c -O2 -g -fcanon-prefix-map  -ffile-prefix-map=/tmp/work/cortexa57-wrs-linux/openipmi/2.0.37/sources/OpenIPMI-2.0.37=/usr/src/debug/openipmi/2.0.37  -ffile-prefix-map=/tmp/work/cortexa57-wrs-linux/openipmi/2.0.37/sources/OpenIPMI-2.0.37=/usr/src/debug/openipmi/2.0.37  -ffile-prefix-map=/tmp/work/cortexa57-wrs-linux/openipmi/2.0.37/recipe-sysroot=  -ffile-prefix-map=/tmp/work/cortexa57-wrs-linux/openipmi/2.0.37/recipe-sysroot-native=  -pipe -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -Wall -Wsign-compare -I../../include -I../../lanserv -I../../utils -lm
  gcc: error: unrecognized command-line option ‘-fcanon-prefix-map’; did you mean ‘-fmacro-prefix-map=’?

* Pass BUILD_CFLAGS for BUILD_CC to fix the above build issue.

[1] https://git.openembedded.org/openembedded-core/commit/?id=3dbc4a79f01ebfc54da024c1460c06772659088d

Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-05 17:01:11 -08:00
Vijay Anusuri
316770a9f5
net-snmp: Update Upstream-status in the net-snmp-5.9.4-kernel-6.7.patch
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-05 10:46:53 -08:00
Peter Marko
331126a6d0
nftables: remove python dependency from main package
The recipe splits python code to nftables-python package, however
setuptools classes add the dependency to main package.
Since nftables-python package already has python3-core explicit
dependency, remove it from the main package.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-05 10:13:23 -08:00
Peter Marko
6a9cc44a92
libcoap: upgrade 4.3.5 -> 4.3.5a
Changelog [1]:
  * Fixes the following CVEs
    CVE-2025-59391
    CVE-2025-65494
    CVE-2025-65495
    CVE-2025-65496
    CVE-2025-65497
    CVE-2025-65498
    CVE-2025-65499
    CVE-2025-65500
    CVE-2025-65501
  * CVE-2025-50518 not fixed as user application error.
  * Support for Mbed TLS 3.6.3.
  * Support for RIOT update changes.
  * Fixes for later CI environment builds.
  * Critical reported bugs fixed.

Add tag to SRC_URI for hash verification.

License-Update: copyright years refreshed [2]

[1] https://github.com/obgm/libcoap/blob/v4.3.5a/ChangeLog
[2] 993c12ac92

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-04 06:06:46 -08:00
Wang Mingyu
cde1da5ec1
postfix: upgrade 3.10.5 -> 3.10.6
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-02 09:22:49 -08:00
Wang Mingyu
8c3baf61d0
libdaq: upgrade 3.0.22 -> 3.0.23
Changelog:
 api: add tcp flag in DAQ flow stats

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-02 09:22:49 -08:00
Liu Yiding
7fb4910ccb
pgpool2: 4.6.3 -> 4.6.4
Drop 0001-snprintf-Add-math.h-to-ensure-isnan-and-isinf-are-de.patch and
v1-0001-Make-time-calculations-always-long-long.patch as those were merged upstream.

Signed-off-by: Liu Yiding <liuyd.fnst@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-02 09:18:20 -08:00
Gyorgy Sarvari
c435acf247
lowpan-tools: drop recipe
The application has received its last upstream update
11 years ago. It has been on the skiplist[1] of meta-networking
for the past 6 years due to being severly outdated.

There are no recipes that would depend on this recipe in the meta-oe
layers, nor in the layer-index[3].

Let's bid farewell.

[1]: https://github.com/linux-wpan/lowpan-tools/commits/master/
[2]: 1383039355
[3]: https://layers.openembedded.org/layerindex/branch/master/recipes/?q=depends%3Alowpan-tools

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-02 09:18:20 -08:00
Hongxu Jia
9ec1605567
postfix: switch to libpcre2
Postfix 3.7 and later supports pcre2 library [1]

[1] https://www.postfix.org/PCRE_README.html

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-12-01 08:45:52 -08:00
Dan McGregor
91389e4d5a
netcat-openbsd: update to 1.228
A version newer than 1.195 is required for certain features of newer
versions of cloud-init.  May as well bump to the version in Debian
Testing.

I also noticed it appears the licence was incorrectly specified, and is
indeed BSD-3-Clause.

License-update: Added copyright holders and clarified man page licence
Signed-off-by: Dan McGregor <dan.mcgregor@usask.ca>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-11-28 11:39:52 -08:00
Wang Mingyu
351ac66213
openvpn: upgrade 2.6.15 -> 2.6.16
Code maintenance / Compat changes
---------------------------------
- adapt to new "encrypt-then-mac" cipher suites in OpenSSL 3.6.0 - these
  need special handling which we don't do, so the t_lpback self-test
  failed on them.  Exclude from list of allowed ciphers, as there is no
  strong reason today to make OpenVPN use these.
- fix various compile-time warnings

Documentation updates
---------------------
- fix outdated and non-HTTPS URLs throughout the tree (doxygen, warnings,
  manpage, ...)

Bugfixes
--------
- Fix memcmp check for the hmac verification in the 3way handshake.
  This bug renders the HMAC based protection against state exhaustion on
  receiving spoofed TLS handshake packets in the OpenVPN server inefficient.
  CVE: 2025-13086
- fix invalid pointer creation in tls_pre_decrypt() - technically this is
  a memory over-read issue, in practice, the compilers optimize it away
  so no negative effects could be observed.
- Windows: in the interactive service, fix the "undo DNS config" handling.
- Windows: in the interactive service, disallow using of "stdin" for the
  config file, unless the caller is authorized OpenVPN Administrator
- Windows: in the interactive service, change all netsh calls to use
  interface index and not interface name - sidesteps all possible attack
  avenues with special characters in interface names.
- Windows: in the interactive service, improve error handling in
  some "unlikely to happen" paths.
- auth plugin/script handling: properly check for errors in creation on
  $auth_failed_reason_file (arf).
- for incoming TCP connections, close-on-exec option was applied to
  the wrong socket fd, leaking socket FDs to child processes.
- sitnl: set close-on-exec flag on netlink socket
- ssl_mbedtls: fix missing perf_pop() call (optional performance profiling)

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-11-25 07:44:41 -08:00
Khem Raj
2d33949443
open-vm-tools: Avoid GLib g_free macro redefinition error
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-11-21 00:39:01 -08:00
Yi Zhao
2fa9680861
vsomeip: upgrade 3.5.10 -> 3.5.11
ChangeLog:
https://github.com/COVESA/vsomeip/releases/tag/3.5.11

* Refresh local patches
* Fix build with boost 1.89

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-11-20 08:37:05 -08:00
Khem Raj
3e44699820
python-scapy: Ignore failing ptests
These tests fail in OE qemu environment and is sensitive to ISP provider

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-11-20 00:34:05 -08:00
Khem Raj
7a25981202
lkcp-tools: Fix test_1_to_1_recvfrom ptest failure
Build it with fortify disabled to get the intended behavior
of the test

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-11-19 12:00:45 -08:00
Khem Raj
5d82ef30be
python3-scapy: Upgrade to 2.6.1
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-11-19 07:45:40 -08:00
Wang Mingyu
ea8411366e
openipmi: upgrade 2.0.36 -> 2.0.37
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-11-18 08:23:44 -08:00
Wang Mingyu
989a1651e4
nbdkit: upgrade 1.45.12 -> 1.45.14
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-11-18 08:23:43 -08:00
Wang Mingyu
6498d5b940
libcpr: upgrade 1.12.0 -> 1.13.0
Changelog:
==========
- Implement support for CURLOPT_CAINFO_BLOB
- Added support for CURLOPT_SSLCERT_BLOB
- Refactor: Pass std::string_view by value instead of by const reference
- Add connection pool option (V3)
- fix: Calling empty callbacks
- fix: callback function pointer type mismatch in writeFunction
- 1.12.0 CI Fixes
- fix: Cmake config file
- fix: make is_same_v check constexpr in set_option_internal
- cpr::MultiPerform fixes - #1047 and #1186
- Bump actions/setup-python from 5 to 6
- Bump actions/checkout from 3 to 5
- Allow disabling PSL
- Make curl dependency management optional
- curl_container: allow calling GetContent without CurlHolder
- Bump stefanzweifel/git-auto-commit-action from 6 to 7
- Bump actions/upload-artifact from 4 to 5
- Bump actions/setup-python from 1 to 5

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-11-18 08:23:43 -08:00
Wang Mingyu
7915bcecf5
corosync: upgrade 3.1.9 -> 3.1.10
CVE-2025-30472.patch
removed since it's included in 3.1.10

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-11-18 08:23:42 -08:00