616 Commits

Author SHA1 Message Date
Jason Schonberg
cb0a43ea78
hiawatha: upgrade 11.0 -> 11.1
Changelog: https://hiawatha.leisink.net/changelog

      mbed TLS updated to 3.1.0.
      Small bugfixes.

Signed-off-by: Jason Schonberg <schonm@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-03-20 08:46:57 -07:00
Khem Raj
93bf51cd7e
xdebug: Upgrade to 3.4.2 release
License-Update: Update license to match the PHP 3.01 license [1]

[1] 5fc2d81806
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-03-14 13:40:59 -07:00
Alexis Cellier
5c32343131
sthttpd: Fix service unit file
Update PID file path from /var/run to /run to avoid systemd warning:
    PIDFile= references a path below legacy directory /var/run/,
    updating /var/run/thttpd.pid → /run/thttpd.pid; please update
    the unit file accordingly.

Cc: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Alexis Cellier <alexis.cellier@smile.fr>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-27 13:10:00 -08:00
Paul Le Guen de Kerneizon
a495fd2a54
cockpit: remove deprecated packages
This commit removes from the recipe the following deprecated packages:
- `cockpit-docker`: cockpit project no longer supports Docker since version 228
  [1]
- `cockpit-machines`: cockpit-machines is now provided in a dedicated
  repository [2], and code base has been removed since version 242 [3]

[1]: https://cockpit-project.org/blog/cockpit-228.html
[2]: https://github.com/cockpit-project/cockpit-machines
[3]: https://cockpit-project.org/blog/cockpit-242.html

Signed-off-by: Paul Le Guen de Kerneizon <paul.leguendekerneizon@savoirfairelinux.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-25 09:48:06 -08:00
Changqing Li
569b675620
nginx: upgrade 1.27.3 to 1.27.4
License-Update: copyright year refreshed

Resolves:
* CVE-2025-23419

CHANGES:
https://nginx.org/en/CHANGES

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-16 23:42:42 -08:00
Changqing Li
66498315ca
nginx: upgrade 1.26.2 to 1.26.3
Solves:
* CVE-2025-23419

CHANGES:
https://nginx.org/en/CHANGES-1.26

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-16 23:42:42 -08:00
Wang Mingyu
93772a0fc3
apache2: upgrade 2.4.62 -> 2.4.63
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-10 08:45:35 -08:00
Changqing Li
5f43b10862
phpmyadmin: upgrade 5.2.1 -> 5.2.2
License-Update: License year updated

This upgrade include security fix for:
CVE-2025-24529
CVE-2025-24530

Release note:
https://www.phpmyadmin.net/news/2025/1/21/phpMyAdmin-522-is-released/

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-09 20:12:29 -08:00
Gyorgy Sarvari
10c13bf1fb
mod-dnssd: update SRC_URI
Upstream repository url changed.

Fixes unsuccessful fetch warning.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-02-03 11:25:21 -08:00
Jason Schonberg
9ba0679eee
hiawatha: upgrade 10.12 -> 11.0
The https://www.hiawatha-webserver.org/ site is defunct.  So move SRC_URI to use
https://hiawatha.leisink.net/ instead.  Update to 11.0 while we are here.

Changelog: https://hiawatha.leisink.net/changelog

    mbed TLS updated to 3.0.0.
    Dropped support for TLSv1.0 and TLSv1.1. Configuration option MinTLSversion removed.
    Dropped support for HTTP Public Key Pinning (HPKP). Configuration option PublicKeyPins removed.

Signed-off-by: Jason Schonberg <schonm@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-01-24 18:20:08 -08:00
Yi Zhao
9198508373
cockpit: set pam module path to ${base_libdir}/security
Set pam module path to ${base_libdir}/security as this is the default
path in libpam.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2025-01-06 07:22:29 -08:00
Peter Marko
59d3949e3e apache2: ignore CVE-1999-1237
This vulnerability is for Apache-AuthenSmb module.
Fixed in 0.9, current version is 0.72.
In any case, not part of Apache2 sources.

[1] points to [2], which is archived under [3]

[1] https://nvd.nist.gov/vuln/detail/CVE-1999-1237
[2] http://www.securityfocus.com/archive/1/14384
[3] https://web.archive.org/web/20020618143426/http://online.securityfocus.com/archive/1/14384

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-24 08:23:09 -08:00
Peter Marko
de9eeb369e
swagger-ui: mark CVE-2016-1000229 as fixed
as per https://github.com/swagger-api/swagger-ui/issues/1865
NVD tracks this CVE as version-less.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:33 -08:00
Peter Marko
da2b5e8b93
apache2: ignore disputed CVE CVE-2007-0086
This CVE is officially disputed by Redhat with official statement in
https://nvd.nist.gov/vuln/detail/CVE-2007-0086

Red Hat does not consider this issue to be a security vulnerability.
The pottential attacker has to send acknowledgement packets periodically
to make server generate traffic. Exactly the same effect could be
achieved by simply downloading the file. The statement that setting the
TCP window size to arbitrarily high value would permit the attacker to
disconnect and stop sending ACKs is false, because Red Hat Enterprise
Linux limits the size of the TCP send buffer to 4MB by default.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:33 -08:00
Peter Marko
36a7e409d8
monkey: ignore CVE-2013-1771
This is gentoo specific CVE.
NVD tracks this as version-less CVE.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Peter Marko
0e7733f1b8
apache2: remove old version references from CVEs
These were not updated on recipe upgrade.
To make maintenance easier, remove exact versions.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Peter Marko
1b86a60f62
apache2: ignore CVE-1999-0678 and CVE-1999-1412
These CVEs are specific to Debian and MAC OS X respectively.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-19 13:00:32 -08:00
Derek Straka
1f4b413ebe
nginx: Upgrade mainline release version 1.27.1 -> 1.27.3
License-Update: License file negative and empty space changes

Signed-off-by: Derek Straka <derek@asterius.io>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-12-10 13:43:54 -08:00
Khem Raj
f1e8d8a510
meta: Add SECURITY.md file to all layers
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-11-23 09:00:14 -08:00
Wang Mingyu
5c3ba1c1fc
swagger-ui: upgrade 5.17.14 -> 5.18.2
Changelog:
=============
- update Scarf.js to v1.4.0 to avoid breaking Vitest
- docker: return explicit Node.js installation
- analytics: use Scarf.js to provide anonymized installation analytics

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-11-19 16:59:15 -08:00
Jan Vermaete
fa7ee06bd6
netdata: WebUI choice between all (default), v0, v1 or v2
Added a PACKAGECONFIG to select the version of the WebUI to be installed.
When not set, all versions (v0, v1 and v2) will be installed.  What is the
default of Netdata.

Enabling only the v1 version makes the package 25% smaller.

More info: https://github.com/netdata/netdata/issues/15640#issuecomment-1946041083

Signed-off-by: Jan Vermaete <jan.vermaete@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-11-05 09:42:49 -08:00
Jan Vermaete
c00b1fcc7c
netdata: Upgrade from 1.47.3 to 1.47.5 release
* 0001-Add-check-for-64bit-builtin-atomics.patch applied upstream
* removed not longer used systemd service file
  The service of the netdata is used in previous commit(s)
* oelint_adv issues solved

Changlog: https://github.com/netdata/netdata/blob/master/CHANGELOG.md#v1475-2024-10-24

Signed-off-by: Jan Vermaete <jan.vermaete@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-11-02 14:17:26 -07:00
Jan Vermaete
0f692c3ab7
swagger-ui: OpenAPI (aka swagger) website (v5.17.14)
New recipe with the static version of the Swagger UI.

This is *not* a NPM version of the website (swagger-ui, swagger-ui-dist, swagger-ui-react).
But the static release.

  Plain old HTML/CSS/JS (Standalone)

  The folder /dist includes all the HTML, CSS and JS files needed to run SwaggerUI on a static website or CMS, without requiring NPM.

      Download the latest release.
      Copy the contents of the /dist folder to your server.
      Open swagger-initializer.js in your text editor and replace "https://petstore.swagger.io/v2/swagger.json" with the URL for your OpenAPI 3.0 spec.

  -- https://github.com/swagger-api/swagger-ui/blob/HEAD/docs/usage/installation.md#plain-old-htmlcssjs-standalone

Signed-off-by: Jan Vermaete <jan.vermaete@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-30 12:34:00 -07:00
Tanguy Raufflet
8a34c94412
netdata: add RDEPENDS to the docker PACKAGECONFIG
Add the runtime dependency Virtual/docker need when the package config
Docker is enabled. This avoids do_rootfs installs issues.

Signed-off-by: Tanguy Raufflet <tanguy.raufflet@savoirfairelinux.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-24 05:52:19 -07:00
Tanguy Raufflet
9527f00467
netdata: add setuid to the xenstat plugin file
As mentioned in the Netdata documentation [1], The xenstat plugin
requires elevated privileges to be executed. The xenstat.plugin
permissions are modified to only allow users belonging to the netdata
group to execute the plugin with root privileges.

[1] https://learn.netdata.cloud/docs/collecting-metrics/containers-and-vms/xen-xcp-ng

Signed-off-by: Tanguy Raufflet <tanguy.raufflet@savoirfairelinux.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-24 05:52:19 -07:00
Tanguy Raufflet
6f6aa30602
netdata: modify apps.plugin permissions
Modification of the group for the apps.plugin file (from root to
netdata) and removal of execution authorization for the “others”.

This modification improves security by limiting the netdata group to
execute the plugin as root.

Signed-off-by: Tanguy Raufflet <tanguy.raufflet@savoirfairelinux.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-24 05:52:19 -07:00
Valeria Petrov
ac5855c74d
apache2: do not depend on zlib header and libs from host
This commit modifies the PACKAGECONFIG entry for zlib to ensure that the
mod_deflate module is enabled with the appropriate zlib configuration.
By adding the --with-zlib=${STAGING_LIBDIR}/../ option, we direct the
configure script to use the zlib library from the staging directory
instead of relying on the host system's zlib installation.

Without that configure will search the host for zlib headers and lib.

This change resolves build failures related to zlib dependency when
mod_deflate is enabled and ensures a consistent build environment across
different host configurations.

Signed-off-by: Valeria Petrov <valeria.petrov@spinetix.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-09 15:47:23 -07:00
Khem Raj
fb566b0d09
netdata: Upgrade to 1.47.3 release
Update the atomics patch to v2 of upstream submission

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-04 22:45:35 -07:00
Enguerrand de Ribaucourt
d5a24aa9ba
netdata: add go plugin PACKAGECONFIG
Many netdata plugins are written in go, add a PACKAGECONFIG to enable
them.

Signed-off-by: Enguerrand de Ribaucourt <enguerrand.de-ribaucourt@savoirfairelinux.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-02 19:54:53 -07:00
Enguerrand de Ribaucourt
5c497aa92e
netdata: refresh netdata.conf
Our provided netdata.conf contained a lot of keys which are no longer
supported by netdata. Netdata allows to regenerate the configuration
file and present all possible keys with their default values. This
refreshed file will be more easy to configure by our users.

To generate this file, I basically ran the documented command and
replaced the file paths with our variables when applicable.

Signed-off-by: Enguerrand de Ribaucourt <enguerrand.de-ribaucourt@savoirfairelinux.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-02 19:54:53 -07:00
Enguerrand de Ribaucourt
d801dfaa24
netdata: use builtin packaging service files
Netdata now provides its own systemd service files. They provide better
hardening than the one we were defining in the recipe.

Unfortunately, the CMakeLists.txt file wants to install them into /lib
rather than /usr/lib. I added mv commands to put them in the expected
location depending on usrmerge.

Signed-off-by: Enguerrand de Ribaucourt <enguerrand.de-ribaucourt@savoirfairelinux.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-02 19:54:53 -07:00
Enguerrand de Ribaucourt
5ac897fae9
netdata: add docker PACKAGECONFIG
Some netdata plugins like cgroups or docker require permissions to
access the docker socket in order to label data properly.

Signed-off-by: Enguerrand de Ribaucourt <enguerrand.de-ribaucourt@savoirfairelinux.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-02 19:54:53 -07:00
Khem Raj
d909e0d1e3
layer.conf: Update to walnascar (5.2) layer/release series
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-10-01 09:23:12 -07:00
Niko Mauno
5cff9e8672
cherokee: Remove obsolete recipe
This recipe depends on meta-python2, master branch of which has not
been updated sine February 2022, see
https://git.openembedded.org/meta-python2/log/?h=master

Also, https://cherokee-project.com/doc/basics_requirements.html states

  The main Python releases targeted by our developers are 2.4, 2.5 and 2.6.
  Anything other than that is not guaranteed to work at the moment.

Also, master branch of cherokee has not been updated since January
2023, see https://github.com/cherokee/webserver/commits/master/

Thus, remove the obsolete recipe and the associated packagegroup
reference.

Signed-off-by: Niko Mauno <niko.mauno@vaisala.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-09-30 07:34:28 -07:00
Peter Marko
12a36136fe
nginx: Upgrade mainline 1.25.3 -> 1.27.1
Solves:
* CVE-2024-7347
* CVE-2024-24989
* CVE-2024-24990
* CVE-2024-31079
* CVE-2024-32760
* CVE-2024-34161
* CVE-2024-35200

License-Update: copyright year refreshed

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-09-17 15:46:33 -07:00
Peter Marko
d6504f150b
nginx: Upgrade stable 1.26.0 -> 1.26.2
Solves:
* CVE-2024-7347
* CVE-2024-31079
* CVE-2024-32760
* CVE-2024-34161
* CVE-2024-35200

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-09-17 15:46:33 -07:00
Khem Raj
a2010f12fd
netdata: Add checks for 64-bit atomic builtins
This helps in passing correct flags to h2o module compilation

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-09-17 07:50:23 -07:00
Jan Vermaete
e9c9bfb1bc
netdata: version bump 1.47.0 -> 1.47.1
Signed-off-by: Jan Vermaete <jan.vermaete@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-09-14 08:43:55 -07:00
Khem Raj
37b2dac8de
netdata: Upgrade to 1.47.0
Disable go plugins as we need some work to enable them.
Convert to cmake build system

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-09-09 18:22:57 -07:00
J. S.
38f44e742a
webmin: upgrade 2.111 -> 2.202
commit f6d27810b4f48562a06ce5006b1559378f30c99c
Author: Jason Schonberg <schonm@gmail.com>
Date:   Mon Aug 19 00:26:48 2024 -0400

    Changelog:
    https://webmin.com/changelog/webmin-2.202-released/

    Modified net-generic.patch to update a hardcoded version number to avoid
    patch fuzz.

webmin: upgrade 2.111 -> 2.202
Signed-off-by: Jason Schonberg <schonm@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-08-21 08:45:47 -07:00
Wang Mingyu
ff8cc5ddf9
apache2: upgrade 2.4.61 -> 2.4.62
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-08-09 14:25:12 -07:00
Maxin John
a944926d19
nginx: add PACKAGECONFIG knobs for fastcgi, scgi and uwsgi
fastcgi, scgi and uwsgi are enabled by default in nginx. Provide an
option to disable these features (that reduces binary size by 8%).

Signed-off-by: Maxin John <maxin.john@gehealthcare.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-07-23 08:41:14 -07:00
Trevor Woerner
99800d24c5
apache2: use update-alternatives for httpd
Busybox can optionally provide an httpd server, but by default The Yocto
Project defconfig for busybox does not enable it. If it is enabled,
busybox puts the resulting /usr/sbin/httpd object under the control of
update-alternatives.

apache2, on the other hand, does not put /usr/sbin/httpd under the control
of update-alternatives. Therefore, in the off chance a user enables the
busybox httpd server, it does not play well with apache2.

Add update-alternatives information to apache2 so that it plays nicely with
busybox which can optionally provide an httpd server at /usr/sbin/httpd.

Signed-off-by: Trevor Woerner <twoerner@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-07-18 20:24:06 -07:00
Archana Polampalli
7cfaa76200
apache2: Upgrade 2.4.60 -> 2.4.61
Security fixes:
CVE-2024-39884 Apache HTTP Server: source code disclosure with handlers configured via AddType

Changelog:
https://github.com/apache/httpd/blob/2.4.61/CHANGES
https://httpd.apache.org/security/vulnerabilities_24.html

Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-07-16 08:24:26 -07:00
Khem Raj
294c0251f8
webmin: Upgrade to 2.111 release
Drop remove-python2.3.patch since corresponding script is gone

License-Update: Formatting changes

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-07-14 12:06:20 -07:00
alba@thehoodiefirm.com
46b2eef28b
apache2:apache2-native: sort CVE status
Signed-off-by: Alba Herrerías <alba@thehoodiefirm.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-07-04 08:45:54 -07:00
Ninette Adhikari
a1441be529
apache2: Update CVE status
Update CVE status for: CVE-1999-0289, CVE-2007-0450, CVE-2010-0425

The current version (2.4.6) is not affected. It only applies for Windows.

Signed-off-by: Ninette Adhikari <ninette@thehoodiefirm.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-07-03 20:20:18 -07:00
Ninette Adhikari
17bcf478a5
monkey: Update status for CVE-2013-2183
Current version (1.6.9) is not affected. Issue was addressed in version 1.3.0

Signed-off-by: Ninette Adhikari <ninette@thehoodiefirm.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-07-03 20:20:17 -07:00
Siddharth Doshi
8c5860f22d
apache2: Upgrade 2.4.59 -> 2.4.60
CVE's Fixed by upgrade:
CVE-2024-36387 apache2/httpd: DoS by null pointer in websocket over HTTP/2
CVE-2024-38472 apache2/httpd: UNC SSRF on WIndows
CVE-2024-38473 apache2/httpd: Encoding problem in mod_proxy
CVE-2024-38474 apache2/httpd: Substitution encoding issue in mod_rewrite
CVE-2024-38475 apache2/httpd: Improper escaping of output in mod_rewrite
CVE-2024-38476 apache2/httpd: Apache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect
CVE-2024-38477 apache2/httpd: null pointer dereference in mod_proxy
CVE-2024-39573 apache2/httpd: Potential SSRF in mod_rewrite

Other Changes between 2.4.59 -> 2.4.60
======================================
https://github.com/apache/httpd/blob/2.4.60/CHANGES

Signed-off-by: Siddharth Doshi <sdoshi@mvista.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-07-02 16:59:02 -07:00
Ninette Adhikari
a9741a9d9c
apache2:apache2-native: CVE status update
Update status for:
CVE-2007-6421, CVE-2007-6422, CVE-2007-6423, CVE-2008-2168

CPE is incorrect, the current version (2.4.59) is not affected.

Signed-off-by: Ninette Adhikari <ninette@thehoodiefirm.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2024-06-28 11:22:04 -07:00