Commit Graph

3056 Commits

Author SHA1 Message Date
Khem Raj
0abaecf0a6 tftp-hpa: Fix includes for bsd_signal()
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-09-07 16:44:54 -07:00
Khem Raj
82620f8f46 linux-atm: Remove AC_CHECK_LIB for libresolv
libatm uses res_search which is provided by libc now a days in both
glibc and musl, we dont need to error out if libresolv is not found

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-09-05 22:49:35 -07:00
Khem Raj
014326ebca autofs: Backport innetgr and strerror_r musl patches
Fixes build with musl/x86

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-09-05 22:49:35 -07:00
Wang Mingyu
fca74376e1 chrony: upgrade 4.2 -> 4.3
arm_eabi.patch
upgrade for 4.3

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-09-05 15:58:34 -07:00
Alex Kiernan
3589aa5deb libcoap: Fix gnutls/openssl/mbedtls PACKAGECONFIG conflicts
These were missing a comma so were being added as RRECOMMENDS.

Signed-off-by: Alex Kiernan <alex.kiernan@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-09-03 12:20:15 -07:00
Khem Raj
26af1e5673 quagga: Fix AC_CHECK_LIB for libreadline
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-09-01 13:09:22 -07:00
Khem Raj
d8c94d06cf frr: Fix configure check for libreadline
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-09-01 10:55:23 -07:00
Khem Raj
704014e5a9 ot-daemon,ot-br-posix: Fix mbedtls module builds
Add a backport to fix build of mbedTLS on x86

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-31 10:06:32 -07:00
Yi Zhao
ea62a6b30a tcpreplay: fix buildpaths issue
POSIX_SHELL is specified a host tool path as it searches path on build
host using `which` when configure. Set it to a fixed path '/bin/sh'.

Fixes:
QA Issue: File /usr/bin/tcpbridge in package tcpreplay contains reference to TMPDIR
File /usr/bin/tcpliveplay in package tcpreplay contains reference to TMPDIR
File /usr/bin/tcprewrite in package tcpreplay contains reference to TMPDIR
File /usr/bin/tcpcapinfo in package tcpreplay contains reference to TMPDIR
File /usr/bin/tcpreplay in package tcpreplay contains reference to TMPDIR
File /usr/bin/tcpprep in package tcpreplay contains reference to TMPDIR
File /usr/bin/tcpreplay-edit in package tcpreplay contains reference to TMPDIR [buildpaths]
QA Issue: File /usr/src/debug/tcpreplay/4.4.2-r0/src/defines.h in package tcpreplay-src contains reference to TMPDIR [buildpaths]

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 15:27:08 -07:00
Khem Raj
254b6cb115 iscsi-initiator-utils: Avoid hardcoding sed to /usr/bin/sed
This ensures that it can use the sed provided by build environment, as
we poison host sysroots, we wont be able to get it from /usr/bin anyway

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 15:27:08 -07:00
Khem Raj
4e3e97ed27 openl2tp: Provide prototype for l2tp_api_rpc_check_request
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
f88f52d563 rdma-core: Fix build with musl
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
5bed4f9a47 ettercap: Pass -D_GNU_SOURCE
Fixes build on musl

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
7a880dcbd9 openlldp: Upgrade to 1.1.0
Drop already upstreamed patches
Add fix for clang15 build
Drop Wno-error

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
db24f3e273 memcached: Upgrade to 1.6.17
Fix build with clang while here

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
a1917e5bde linux-atm: Include missing string.h
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
c52b9e1a93 radvd: Fix build on musl
Backport a patch from upstream to fix musl builds
Merged inc file into bb file, makes it easy to use devtool

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
2bbccfe1ae iscsi-initiator-utils: Upgrade to 2.1.7
Fix build on musl by using proper typecast for pthread_t

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
e458eb326d fping: Fix build with musl
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
ad8363470e packagegroup-meta-networking: Remove ypbind-mt on musl
It does not build

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
516bded779 ypbind-mt: Upgrade to 2.7.2
Disable on musl since its using some non-portable glibc only constructs
Drop gettid patch its applied upstream

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
61eb94c55a mctp: Update to latest tip of trunk
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
e2b1b060b0 openflow: Include sys/stat.h for fchmod
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
5408788e2b ez-ipupdate: Fix build with clang
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
8c05c5b088 dante: Upgrade to 1.4.3
License-Update: Dates and address changed

Link with libtirpc for bindresvport() implementation
Drop krb5 packageconfig, its gone from this version

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
b7a1a02d56 dlm: Upgrade to 4.1.1
Forward port patches and add a patch to fix compiler warnings

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
fb232b368b corosync: Upgrade to 3.1.6
Changes - https://github.com/corosync/corosync/releases/tag/v3.1.6

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Khem Raj
4262458aaa ippool: Fix build with clang15
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-30 00:14:58 -07:00
Adrian Freihofer
9e4d107f6a networkmanager: update 1.38.0 -> 1.40.0
NetworkManager:
* Drop unused, internal systemd DHCPv4 client. This is long
  replaced by nettools' n-dhcp4 implementation.
* The nmcli command now supports --offline argument with "add" and
  "modify" commands, allowing operation on keyfile-formatted connection
  profiles without the service running (e.g. during system provisioning).
* The device state file /run/NetworkManager/devices/$ifindex now has
  new sections [dhcp4] and [dhcp6] containing the DHCP options for the
  current lease.
* Add multipath TCP (MPTCP) support. NetworkManager can now configure IP addresses
  as MPTCP endpoints. This is configurable via the "connection.mptcp-flags"
  property. The default setting is such that MPTCP handling is automatically
  enabled if the kernel sysctl "/proc/sys/net/mptcp/enabled" indicates so.
  NetworkManager does not enable the MPTCP sysctl or adjust the limits (ip mptcp limits).
  The administrator or the distribution is supposed to configure the desired system
  settings.
  Note that strict reverse path filtering (rp_filter) breaks many MPTCP use cases.
  With MPTCP handling enabled, NetworkManager will relax a strict (1) rp_filter
  to loose (2). Otherwise rp_filter is untouched by NetworkManager.
* NetworkManager expanded log messages for invalid DHCP options.
* Fix the requirement of hardware address for DHCPv6, by dropping it.
* Increase the PMK lifetime for Wi-Fi connections using WPA-EAP.
* "nmcli networking off" now waits for deactivations to complete.
* Improve the appearance of nm-settings-nmcli man page by preserving
  paragraphs.
* Support enabling ipv4ll alongside DHCPv4 and static addressing.
* Support configuring "ipv6.mtu".
* Honor "nm.debug" kernel command line to enable debug logging of
  NetworkManager.
* NetworkManager reads the kernel command line "/proc/cmdline" for several
  purposes, including "nm.debug" for enabling debugging and the
  "match.kernel-command-line" setting in the profile. NetworkManager now
  first looks now for "/run/NetworkManager/proc-cmdline", which allows to
  overwrite the command line.
* Improve the reapply of non-bridge properties.
* Honor adding a Bluetooth NAP connection with all available methods.
* Improve carrier detection.
* During the build, stop relying on intltool for i18n and use gettext only.
* Undeprecate nm_remote_connection_get_secrets() in libnm.
* NetworkManager now will restart DHCP if the MAC changes on a device.
* Several internal improvements.

Recipe:
* Drop the last patch :-). -Difcfg_rh=false is now honored and the
  distro detection patch is no longer needed.
* Fix: move /etc/resolv-conf.NetworkManager to daemon package
* Fix: remove ppp rdepends from daemon. The ppp plugin rdepends on ppp.
* ifupdown plugin requires now bash not sh. But the ifupdown is an
  optional plugin anyway.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-29 13:07:18 -07:00
Wang Mingyu
69fb572481 tcpreplay: upgrade 4.4.1 -> 4.4.2
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-29 08:44:19 -07:00
Khem Raj
05f9c6f1ba crda: Fix build with clang-15
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-28 23:57:15 -07:00
Khem Raj
2d7e9e2fe7 samba: Fix warnings in configure tests for rpath checks
Add a patch to avoid implicit-function-declaration warnings, they will
soon become errors with clang 15+

set path for privatelibdir

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-28 23:57:15 -07:00
Yi Zhao
2b8b5dbe03 samba: fix buildpaths issue
The test case tfork_cmd_send in smbtorture fails on target as it
requries a script located in the source directory:

$ smbtorture ncalrpc:localhost local.tfork.tfork_cmd_send
test: tfork_cmd_send
/buildarea/build/tmp/work/core2-64-poky-linux/samba/4.14.14-r0/samba-4.14.14/testprogs/blackbox/tfork.sh:
Failed to exec child - No such file or directory

This also triggers the buildpaths warning:
QA Issue: File /usr/bin/smbtorture in package samba-testsuite contains reference to TMPDIR [buildpaths]

Skip this test case in smbtorture to avoid the warning.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-27 07:39:10 -07:00
Yi Zhao
0afcb4be77 samba: upgrade 4.14.13 -> 4.14.14
This is a security release in order to address the following defects:

CVE-2022-2031: Samba AD users can bypass certain restrictions associated
               with changing passwords.
               https://www.samba.org/samba/security/CVE-2022-2031.html

CVE-2022-32744: Samba AD users can forge password change requests for
                any user.
                https://www.samba.org/samba/security/CVE-2022-32744.html

CVE-2022-32745: Samba AD users can crash the server process with an LDAP
                add or modify request.
                https://www.samba.org/samba/security/CVE-2022-32745.html

CVE-2022-32746: Samba AD users can induce a use-after-free in the server
                process with an LDAP add or modify request.
                https://www.samba.org/samba/security/CVE-2022-32746.html

CVE-2022-32742: Server memory information leak via SMB1.
                https://www.samba.org/samba/security/CVE-2022-32742.html

Release Notes:
https://www.samba.org/samba/history/samba-4.14.14.html

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-25 23:08:11 -07:00
Yi Zhao
1cd743f8d8 libldb: upgrade 2.3.3 -> 2.3.4
Required by samba 4.14.14.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-25 23:08:11 -07:00
Khem Raj
1b26adb83a libesmtp: Define _GNU_SOURCE
Needed for strlcpy

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-25 23:08:11 -07:00
Khem Raj
12fb09281f ssmtp: Fix null pointer assignments
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-25 23:08:11 -07:00
Khem Raj
68c96b4ac3 dibbler: Fix build with musl
Use _GNU_SOURCE to compile which helps fixing build with musl
add a header reordering patch to again fix another issue with musl
builds

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-25 08:01:35 -07:00
Jan Luebbe
517c9dab9e chrony: add support for config and source snippet includes
This makes it simpler to set specific config options or custom sources
by adding snippet files to /etc/chrony/conf.d/ or /etc/chrony/sources.d/
instead of modifying a copy of the full configuration file. As new
snippets can be added from separate recipes, targeted changes can be
done in multiple layers.

These specific directories are also used in Debian's default
configuration. It is not an error if they are missing.

Signed-off-by: Jan Luebbe <jlu@pengutronix.de>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-24 16:59:55 -07:00
Mingli Yu
8e6b9583d6 freediameter: fix buildpaths issue
The pass-ptest-env.patch uses ${B}/extensions as the EXTENSIONS_DIR at build
time and pass the env variable EXTENSIONS_DIR as ${libdir}/${fd_pkgname} at
run time to fix the run time error. But there still exists buildpaths issue.

So rework the pass-ptest-env.patch to make sure EXTENSIONS_DIR to be
${libdir}/${fd_pkgname} both in build and run time.

Fixes:
  WARNING: freediameter-1.4.0-r0 do_package_qa: QA Issue: File /usr/lib/freeDiameter/ptest/testloadext in package freediameter-ptest contains reference to TMPDIR
  File /usr/lib/freeDiameter/ptest/testmesg_stress in package freediameter-ptest contains reference to TMPDIR
  File /usr/lib/freeDiameter/ptest/CTestTestfile.cmake in package freediameter-ptest contains reference to TMPDIR [buildpaths]
  WARNING: freediameter-1.4.0-r0 do_package_qa: QA Issue: File /usr/src/debug/freediameter/1.4.0-r0/build/libfdcore/fdd.tab.c in package freediameter-src contains reference to TMPDIR

Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-24 08:26:55 -07:00
Khem Raj
8070c54457 ncftp: Fix TMPDIR path embedding into ncftpget
Fixes
QA Issue: File /usr/bin/ncftpget in package ncftp contains reference to TMPDIR

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-24 00:44:39 -07:00
Khem Raj
e4d91fad96 ncftp: Enable autoreconf
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-24 00:44:34 -07:00
Wang Mingyu
b5a791a1bf unbound: upgrade 1.16.1 -> 1.16.2
Changelog:
===========
Features
- Merge #718: Introduce infra-cache-max-rtt option to config max
  retransmit timeout.

Bug Fixes
- Fix the novel ghost domain issues CVE-2022-30698 and CVE-2022-30699.
- Fix bug introduced in 'improve val_sigcrypt.c::algo_needs_missing for
  one loop pass'.
- Merge PR #668 from Cristian Rodríguez: Set IP_BIND_ADDRESS_NO_PORT on
  outbound tcp sockets.
- Fix verbose EDE error printout.
- Fix dname count in sldns parse type descriptor for SVCB and HTTPS.
- For windows crosscompile, fix setting the IPV6_MTU socket option
  equivalent (IPV6_USER_MTU); allows cross compiling with latest
  cross-compiler versions.
- Merge PR 714: Avoid treat normal hosts as unresponsive servers.
  And fixup the lock code.
- iana portlist update.
- Update documentation for 'outbound-msg-retry:'.
- Tests for ghost domain fixes.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-23 19:12:52 -07:00
Wang Mingyu
d718d90d2d rdma-core: upgrade 41.0 -> 42.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-23 19:12:52 -07:00
Wang Mingyu
4a958b1ab5 nbdkit: upgrade 1.32.1 -> 1.33.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-23 19:12:52 -07:00
Wang Mingyu
a42cfc44dd mosquitto: upgrade 2.0.14 -> 2.0.15
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-23 19:12:52 -07:00
Khem Raj
375be9fd60 ntpsec: Add -D_GNU_SOURCE and fix building with devtool
wscript detects .git directory and if its present them invokes git
describe --dirty which does not work on the devtool created git
repository, since its synthesized.

Add GNU_SOURCE define to get strptime() definition

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-23 09:55:28 -07:00
Jose Quaresma
f36a158aa0 wireguard-tools: Add a new package for wg-quick
- This will move the dependencie of bash to wg-quick

Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-22 14:13:37 -07:00
Jose Quaresma
e2a2320a79 wireguard-module: 1.0.20210219 -> 1.0.20220627
Also change the git protocol to https.

Relevant changes:
- 18fbcd6 version: bump
- 3ec3e82 compat: handle backported rng and blake2s
- ba45dd6 qemu: give up on RHEL8 in CI
- c7560fd qemu: set panic_on_warn=1 from cmdline
- 33c87a1 qemu: use vports on arm
- 894152a netns: limit parallelism to $(nproc) tests at once
- f888673 netns: make routing loop test non-fatal
- f9d9b4d device: check for metadata_dst with skb_valid_dst()
- f909532 qemu: enable ACPI for SMP
- ec89ca6 socket: ignore v6 endpoints when ipv6 is disabled
- fa32671 socket: free skb in send6 when ipv6 is disabled
- ffb8cd6 qemu: simplify RNG seeding
- 4eff63d queueing: use CFI-safe ptr_ring cleanup function
- 273018b crypto: curve25519-x86_64: use in/out register constraints more precisely
- 4f4c019 compat: drop Ubuntu 14.04
- 743eef2 version: bump
- 3c9f3b6 crypto: curve25519-x86_64: solve register constraints with reserved registers
- 8e40dd6 compat: udp_tunnel: don't take reference to non-init namespace
- ea6b8e7 compat: siphash: use _unaligned version by default
- 5325bc8 ratelimiter: use kvcalloc() instead of kvzalloc()
- e44c78c receive: drop handshakes if queue lock is contended
- 5707d38 receive: use ring buffer for incoming handshakes
- 68abb1b device: reset peer src endpoint when netns exits
- ea3f5fb main: rename 'mod_init' & 'mod_exit' functions to be module-specific
- cb001d4 netns: actually test for routing loops
- 2715e64 compat: update for RHEL 8.5
- 2974725 compat: account for grsecurity backports and changes
- 50dda8c compat: account for latest c8s backports
- d378f93 version: bump
- fb4a0da qemu: increase default dmesg log size
- 8f4414d qemu: add disgusting hacks for RHEL 8
- fd7a462 allowedips: add missing __rcu annotation to satisfy sparse
- 383461d allowedips: free empty intermediate nodes when removing single node
- 03add82 allowedips: allocate nodes in kmem_cache
- b56d48c allowedips: remove nodes in O(1)
- 3c14c4b allowedips: initialize list head in selftest
- 4d8b7ed peer: allocate in kmem_cache
- 6fbc0e6 global: use synchronize_net rather than synchronize_rcu
- 405caf0 kbuild: do not use -O3
- b50ef4d netns: make sure rp_filter is disabled on vethc
- e67b722 version: bump
- 1edffe2 Revert "compat: skb_mark_not_on_list will be backported to Ubuntu 18.04"
- 2cf9543 compat: update and improve detection of CentOS Stream 8
- 122f06b compat: icmp_ndo_send functions were backported extensively

Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-22 14:13:37 -07:00
Enguerrand de Ribaucourt
821e2e0cdf mdio-tools: add recipes
Self-description from the README: mdio-tools is a low-level debug tool
for communicating with devices attached to an MDIO bus.

Signed-off-by: Enguerrand de Ribaucourt <enguerrand.de-ribaucourt@savoirfairelinux.com>
Signed-off-by: Potin Lai <potin.lai.pt@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-22 08:57:20 -07:00
Wang Mingyu
0a58426ed0 uftp: upgrade 5.0 -> 5.0.1
Changelog:
==========
-On very low speed transfers (<10Kbps) sessions would time out due to a very
  large interpacket transmission interval.  Fixed by putting a lower limit
  on the advertised GRTT of of the interpacket transmission interval.
-Sending of ABORT messages on early shutdown would sometimes fail due to
  OpenSSL cleanup functions running before application cleanup.  Changed the
  ordering of atexit() handlers to ensure OpenSSL cleanup happens last.
-Fixed missing timestamp update when clients read CONG_CTRL messages
-Fix to GRTT handling on server to ensure it doesn't fall below minumim.
-Fixed bypassed checking of existing files on client for backup
-Various logging fixes

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-15 16:27:53 -07:00
Wang Mingyu
e99695e771 nbdkit: upgrade 1.31.15 -> 1.32.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-15 16:27:53 -07:00
Wang Mingyu
6d8fbbfc2f htpdate: upgrade 1.3.5 -> 1.3.6
Fix when correcting large time offsets (bug introduced in 1.3.5)

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-15 16:27:53 -07:00
Wang Mingyu
988566884d cifs-utils: upgrade 6.15 -> 7.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-15 16:27:53 -07:00
Khem Raj
38ce750aac unbound: Always enable largefile support
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-13 07:05:31 -07:00
Khem Raj
a203981a2a openipmi: Always enable largefile support
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-13 07:05:31 -07:00
Khem Raj
4114fdc78b netperf: Always enable largefile support
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-13 07:05:31 -07:00
Khem Raj
6538118f60 proftpd: Always enable largefile support
largefile DISTRO_FEATURE is deprecated

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-13 07:05:31 -07:00
Khem Raj
3d3d7b1d6b openipmi: Enable largefile cflags
When largefile distro feature is enabled the relevant flags are needed
to be passed, otherwise large file support wont work, since we are cross
compiling and runtime checks will fail.

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-12 01:24:27 -07:00
Ovidiu Panait
bf4a826c7d net-snmp: upgrade 5.9.1 -> 5.9.3
Upgrade summary:
----------------
- drop 0002-configure-fix-a-cc-check-issue.patch, as it was replaced with
  upstream commit https://github.com/net-snmp/net-snmp/commit/dbb49acfa2af
- drop 0001-snmpd-always-exit-after-displaying-usage.patch backport
- rebase net-snmp-5.7.2-fix-engineBoots-value-on-SIGHUP.patch manually
- refresh patches with devtool to get rid of fuzz

Changelog:
----------
*5.9.3*:
security:
  - These two CVEs can be exploited by a user with read-only credentials:
      - CVE-2022-24805 A buffer overflow in the handling of the INDEX of
        NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.
      - CVE-2022-24809 A malformed OID in a GET-NEXT to the nsVacmAccessTable
        can cause a NULL pointer dereference.
  - These CVEs can be exploited by a user with read-write credentials:
      - CVE-2022-24806 Improper Input Validation when SETing malformed
        OIDs in master agent and subagent simultaneously
      - CVE-2022-24807 A malformed OID in a SET request to
        SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an
        out-of-bounds memory access.
      - CVE-2022-24808 A malformed OID in a SET request to
        NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference
      - CVE-2022-24810 A malformed OID in a SET to the nsVacmAccessTable
        can cause a NULL pointer dereference.
  - To avoid these flaws, use strong SNMPv3 credentials and do not share them.
    If you must use SNMPv1 or SNMPv2c, use a complex community string
    and enhance the protection by restricting access to a given IP address
    range.
  - Thanks are due to Yu Zhang of VARAS@IIE and Nanyu Zhong of VARAS@IIE for
    reporting the following CVEs that have been fixed in this release, and
    to Arista Networks for providing fixes.

Windows:
  - WinExtDLL: Fix multiple compiler warnings
  - WinExtDLL: Make long strings occupy a single line Make it easier to
    look up error messages in the source code by making long strings
    occupy a single source code line.
  - WinExtDLL: Restore MIB-II support Make winExtDLL work on 64-bit
    Windows systems") caused snmpd to skip MIB-II on 64-bit systems.

IF-MIB: Update ifTable entries even if the interface name has changed
    At least on Linux a network interface index may be reused for a
    network interface with a different name. Hence this patch that
    enables replacing network interface information even if the network
    interface name has changed.

unspecified:
  - Moved transport code into a separate subdirectory in snmplib
  - Snmplib: remove inline versions of container funcs".

misc:
  - snmp-create-v3-user: Fix the snmpd.conf path   @datadir@ is
    expanded in ${datarootdir} so datarootdir must be set before
    @datadir@ is used.

*5.9.2*:
skipped due to a last minute library versioning found bug -- use 5.9.3 instead

Signed-off-by: Ovidiu Panait <ovidiu.panait@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-12 01:24:27 -07:00
Khem Raj
0b031b5704 autofs: Fix build with glibc 2.36
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 22:53:24 -07:00
Khem Raj
e7f3b224d9 kronosnet: Upgrade to 1.24
Remove upstreamed patches

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 22:53:24 -07:00
Jim Broadus
7c44094532 networkmanager: fix iptables and nft paths
The NetworkManager meson.build is searching for iptables and nft by
passing absolute paths to meson's find_program. The result is that it
locates tools on the host machine when they exist at those locations. If
they don't, it uses default locations. This often works out, but in some
cases, such as when the host uses a merged usr scheme and the build
target does not, the paths will be incorrect and the tools won't be
found at runtime.

These could be PACKAGECONFIG options, but since they have fallback
values, completely disabling the use of either iptables or nft would
require patching the meson.build or setting a bogus location.

Note that this meson.build file follows the same pattern elsewhere, but
most cases are already covered by PACKAGECONFIG options.

Signed-off-by: Jim Broadus <jim@thruwave.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 09:51:32 -07:00
Mingli Yu
8b76b6c8e3 frr: fix buildpaths issue
Fixes:
  WARNING: frr-8.2.2-r0 do_package_qa: QA Issue: File /usr/lib/libfrr.a in package frr-staticdev contains reference to TMPDIR [buildpaths]
  WARNING: frr-8.2.2-r0 do_package_qa: QA Issue: File /usr/src/debug/frr/8.2.2-r0/git/lib/version.h in package frr-src contains reference to TMPDIR [buildpaths]
  WARNING: frr-8.2.2-r0 do_package_qa: QA Issue: File /usr/include/frr/version.h in package frr-dev contains reference to TMPDIR [buildpaths]
  WARNING: frr-8.2.2-r0 do_package_qa: QA Issue: File /usr/bin/vtysh in package frr contains reference to TMPDIR
  File /usr/lib/libfrr.so.0.0.0 in package frr contains reference to TMPDIR [buildpaths]

Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 09:51:32 -07:00
Yi Zhao
42f8c22fcf strongswan: upgrade 5.9.6 -> 5.9.7
ChangeLog:
https://github.com/strongswan/strongswan/releases/tag/5.9.7

* Drop backport patch 0001-enum-Fix-compiler-warning.patch.
* Update RDEPENDS to fix strongswan startup failures:
    plugin 'mgf1': failed to load - mgf1_plugin_create not found and no plugin file available
    plugin 'fips-prf': failed to load - fips_prf_plugin_create not found and no plugin file available
    plugin 'kdf': failed to load - kdf_plugin_create not found and no plugin file available
    plugin 'drbg': failed to load - drbg_plugin_create not found and no plugin file available

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 09:40:09 -07:00
Mingli Yu
5abd81567d openipmi: Fix buildpaths issue
Fixes:
   WARNING: openipmi-2.0.32-r0 do_package_qa: QA Issue: File /usr/src/debug/openipmi/2.0.32-r0/OpenIPMI-2.0.32/swig/perl/OpenIPMI_wrap.c in package openipmi-src contains reference to TMPDIR [buildpaths]

Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 09:40:09 -07:00
Mingli Yu
1c91de67b4 freeradius: Fix buildpaths issue
Fixes:
  WARNING: freeradius-3.0.21-r0 do_package_qa: QA Issue: File /usr/bin/radeapclient in package freeradius-utils contains reference to TMPDIR [buildpaths]
  WARNING: freeradius-3.0.21-r0 do_package_qa: QA Issue: File /usr/lib/libfreeradius-server.so.0.0.0 in package freeradius contains reference to TMPDIR [buildpaths]

Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 09:40:09 -07:00
wangmy
8a50039955 pure-ftpd: upgrade 1.0.50 -> 1.0.51
0001-Remove-hardcoded-usr-local-includes-from-configure.a.patch
updated for new version.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 09:12:14 -07:00
wangmy
2736076d7b nbdkit: upgrade 1.31.14 -> 1.31.15
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 09:12:14 -07:00
wangmy
ea95e48d68 htpdate: upgrade 1.3.4 -> 1.3.5
Changelog:
===========
- Feature: set kernel synchronized
  (e.g. timedatectl will report 'System clock synchronized: yes')
- Improved time tuning accuracy/stability

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 09:12:14 -07:00
Alex Kiernan
9444f67b26 ntpsec: Add UPSTREAM_CHECK_URI
Signed-off-by: Alex Kiernan <alex.kiernan@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 09:07:11 -07:00
Mingli Yu
1bf83255ae net-snmp: set ac_cv_path_PSPROG
Fixes:
  WARNING: net-snmp-5.9.1-r0 do_package_qa: QA Issue: File /usr/include/net-snmp/net-snmp-config-64.h in package net-snmp-dev contains reference to TMPDIR
  File /usr/bin/net-snmp-create-v3-user in package net-snmp-dev contains reference to TMPDIR [buildpaths]
  WARNING: net-snmp-5.9.1-r0 do_package_qa: QA Issue: File /usr/lib/net-snmp/ptest/include/net-snmp/net-snmp-config.h in package net-snmp-ptest contains reference to TMPDIR [buildpaths]

Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 09:07:11 -07:00
Mike Petersen
5f97fef859 sshpass: add recipe
Needed for automating ssh logins, used in auto-tests.

Co-authored-by: Ioan-Adrian Ratiu <adrian.ratiu@ni.com>
Signed-off-by: Mike Petersen <mike.petersen@ni.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-08-06 08:39:06 -07:00
wangmy
1b43fcf335 wolfssl: upgrade 5.3.0 -> 5.4.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-26 10:40:36 -04:00
wangmy
3b40c93f44 unbound: upgrade 1.16.0 -> 1.16.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-26 10:40:35 -04:00
wangmy
52be803ba5 stunnel: upgrade 5.64 -> 5.65
fix-openssl-no-des.patch
refreshed for version 5.65

Changelog:
==========
    Security bugfixes
        OpenSSL DLLs updated to version 3.0.5.
    Bugfixes
        Fixed handling globally enabled FIPS.
        Fixed the default openssl.cnf path in stunnel.exe.
        Fixed a number of MSVC warnings.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-26 10:40:35 -04:00
wangmy
e174de32ef nbdkit: upgrade 1.31.12 -> 1.31.14
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-26 10:40:35 -04:00
Wang Mingyu
c77bc20081 ndisc6: upgrade 1.0.5 -> 1.0.6
Changelog:
==========
# ndisc6: print NAT64 prefix if present.
# rdnssd: fix timeout calculation.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-19 18:39:24 -07:00
wangmy
b88b492c21 nbdkit: upgrade 1.31.10 -> 1.31.12
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-19 06:44:18 -07:00
Davide Gardenal
72a41f8e31 openflow: ignore unrelated CVEs
CVE-2015-1611 and CVE-2015-1612 are not referred to our implementation
of openflow as specified by the NVD database, ignore them.

Signed-off-by: Davide Gardenal <davide.gardenal@huawei.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-15 12:48:34 -04:00
Davide Gardenal
5dfcb2603d freeradius: ignore patched CVEs
CVE-2002-0318 and CVE-2011-4966 are both patched in our version of
freeradius. The CPE in the NVD database doesn't reflect correctly
the vulnerable versions that's why they are incorrectly picked up.

Signed-off-by: Davide Gardenal <davide.gardenal@huawei.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-15 12:48:34 -04:00
Alex Kiernan
7e67fb0a07 nftables: Upgrade 1.0.2 -> 1.0.4
Drop backported patch, switch PACKAGECONFIG assignment to ?= (matches
current practice), add in editline, linenoise CLI options and xtables
option. Switch to --disable-python when building without python to avoid
a configure time warning.

We can drop UPSTREAM_CHECK_REGEX as the version no longer gets confused
by the 0.099 version which exists.

Fix buildpaths warning by switching to setuptools and add dependency on
${PN}-python to ${PN}-ptest so that the embedded paths in the compiled
python files are correct.

Signed-off-by: Alex Kiernan <alex.kiernan@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-12 15:25:00 -07:00
Alex Stewart
59be04fbcd openvpn: distribute sample-config-files
The openvpn tarball has additional sample config files which are
generally useful to users, and which are typically distributed in other
distros' openvpn packages.

Include these sample configs in the OE recipe.

Signed-off-by: Bill Pittman <bill.pittman@ni.com>

Rebased to openvpn_2.5.7.

Signed-off-by: Alex Stewart <alex.stewart@ni.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-08 22:43:03 -04:00
Adrian Freihofer
77b3a2e6ca firewalld: upgrade 1.1.1 -> 1.2.0
Firewalld:
This is a feature release. It also includes all bug fixes since v1.1.0.
Details are here: https://firewalld.org/2022/07/firewalld-1-2-0-release

Recipe:
Firewalld defaults to create a log file for debug messages. This is
basically an empty file until firewalld's log level is configured to
debug level. Writing log files requies something like log-rotate to
prevent full disks. The default for OE is to not create files and send
all log messages to syslog (journald).

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-07 10:26:37 -04:00
Yi Zhao
e0e1eb4bed openvpn: add PACKAGECONFIG for selinux
This is useful for selinux distro feature.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-07 10:26:37 -04:00
Yi Zhao
c098cf9190 openvpn: add PACKAGECONFIG for systemd
The systemd support had been integrated to openvpn for a long time. Add
PACKAGECONFIG for it and use its own service files and volatile file.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-07 10:26:37 -04:00
wangmy
345b08680a openconnect: upgrade 8.20 -> 9.01
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-07 10:26:37 -04:00
wangmy
e60f083d5b nbdkit: upgrade 1.31.9 -> 1.31.10
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-07 10:26:37 -04:00
Davide Gardenal
8babc2e751 quagga: ignore CVE-2016-4049
CVE-2016-4049 is not affecting our version, so we can ignore it.
This is caused because the CPE in the NVD database doesn't specify
a vulnerable version range.

Signed-off-by: Davide Gardenal <davide.gardenal@huawei.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-06 05:08:49 -07:00
Davide Gardenal
dd25c78889 spice: ignore patched CVEs
The following CVEs are already patched so we can ignore them:
- CVE-2016-0749
- CVE-2016-2150
- CVE-2018-10893

This is caused by inaccurate CPE in the NVD database.

Signed-off-by: Davide Gardenal <davide.gardenal@huawei.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-06 05:08:49 -07:00
Davide Gardenal
d2c19dc7ca wireshark: upgrade 3.4.11 -> 3.4.12
This upgrade includes the following CVE fixes:
- CVE-2021-4190
- CVE-2022-0581
- CVE-2022-0582
- CVE-2022-0583
- CVE-2022-0585
- CVE-2022-0586

Signed-off-by: Davide Gardenal <davide.gardenal@huawei.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-06 00:08:14 -04:00
Davide Gardenal
5260705b4c openflow: ignore CVE-2018-1078
CVE-2018-1078 is not for openflow but in the NVD database the
CVE is for a specific implementation that we don't have so we
can ignore it.

Signed-off-by: Davide Gardenal <davide.gardenal@huawei.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-05 09:23:04 -04:00
Davide Gardenal
1973a0adc6 ntp: ignore many CVEs
cve-check is not able to correctly identify many of the patched
CVEs because of the non standard version number. All the ignored
CVEs were manually checked with the NVD database and deemed not
applicable to the current version.

Signed-off-by: Davide Gardenal <davide.gardenal@huawei.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-05 09:23:04 -04:00
Davide Gardenal
279fce2c87 usrsctp: add CVE_VERSION to correctly check for CVEs
The current version of usrsctp is not a release so cve-check
is not able to find the product version. CVE_VERSION is now set
to 0.9.3.0  that is the nearest version in the past starting from
the revision we have.
This is done because we don't have the complete 0.9.4.0 release.

Signed-off-by: Davide Gardenal <davide.gardenal@huawei.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-05 09:23:04 -04:00
Theodore A. Roth
b85b4afe93 crda: Depend on correct wireless-regdb package
The cdra application is looking for the `regulatory.bin` file that is
installed by the `wireless-regdb` package, but that is not installed
because the RDEPENDS lists`wireless-regdb-static` (which conflicts with
`wireless-regdb`).

Changing RDEPENDS to use `wireless-regdb` instead of
`wireless-regdb-static` allows the cdra application to function
properly.

Example output before this fix was applied:

    root@yocto:~# COUNTRY=US crda
    failed to open db file: No such file or directory

    root@yocto:~# COUNTRY=US strace crda
    execve("/usr/sbin/crda", ["crda"], 0xbec80d70 /* 17 vars */) = 0

    ...

    openat(AT_FDCWD, "/usr/local/lib/crda/regulatory.bin", O_RDONLY) = -1 ENOENT (No such file or directory)
    openat(AT_FDCWD, "/usr/lib/crda/regulatory.bin", O_RDONLY) = -1 ENOENT (No such file or directory)
    openat(AT_FDCWD, "/lib/crda/regulatory.bin", O_RDONLY) = -1 ENOENT (No such file or directory)

    ...

    write(3, "failed to open db file: No such "..., 50failed to open db file: No such file or directory
    ) = 50
    close(3)                                = 0
    exit_group(-2)                          = ?
    +++ exited with 254 +++

Signed-off-by: Theodore A. Roth <theodore_roth@trimble.com>
Signed-off-by: Theodore A. Roth <troth@openavr.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-02 11:40:50 -04:00
Jeremy Puhlman
8687d488f7 freeradius: mutlilib fixes
Define raddbdir based on multilib
Add multilib headers and scripts for conflicting content

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-02 11:40:50 -04:00
Yi Zhao
689e8422b8 strongswan: upgrade 5.9.5 -> 5.9.6
* Drop backport patch 0001-openssl-Don-t-unload-providers.patch

* Backport a patch to fix the build error:
src/libstrongswan/utils/enum.c: In function 'enum_flags_to_string':
src/libstrongswan/utils/enum.c💯9: error: format not a string literal and no format arguments [-Werror=format-security]
  100 |         if (snprintf(buf, len, e->names[0]) >= len)
      |         ^~

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-02 11:37:03 -04:00
Javier Viguera
105288aa55 networkmanager: fix build with enabled ppp
If 'ppp' packageconfig option is enabled, but the build system does NOT
have pppd binary installed, the build fails with:

| Has header "pppd/pppd.h" : YES
| Program pppd /sbin/pppd /usr/sbin/pppd found: NO
|
| ../NetworkManager-1.36.2/meson.build:570:4: ERROR: Assert failed: pppd required but not found, please provide a valid pppd path or use -Dppp=false to disable it

This is due to meson trying to look for the 'pppd' binary in the build
system when it should not. If the build system does not contain pppd,
the build fails.

Signed-off-by: Javier Viguera <javier.viguera@digi.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-02 11:37:02 -04:00
wangmy
c3377acd23 nbdkit: upgrade 1.31.8 -> 1.31.9
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-07-02 11:37:02 -04:00
Changqing Li
3200122d68 chrony: create /var/lib/chrony by systemd-tmpfiles
Ensure /var/lib/chrony exist to avoid error like:
chronyd.service: Failed to set up mount namespacing: /run/systemd/unit-root/var/lib/chrony: No such>
chronyd.service: Failed at step NAMESPACE spawning /usr/sbin/chronyd: No such file or directory

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-06-30 13:39:29 -04:00