<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/meta-openembedded.git/meta-webserver, branch master-next</title>
<subtitle>Mirror of git.openembedded.org/meta-openembedded</subtitle>
<id>https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=master-next</id>
<link rel='self' href='https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=master-next'/>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/'/>
<updated>2026-04-20T14:35:36+00:00</updated>
<entry>
<title>monkey: patch CVEs</title>
<updated>2026-04-20T14:35:36+00:00</updated>
<author>
<name>Gyorgy Sarvari</name>
<email>skandigraun@gmail.com</email>
</author>
<published>2026-04-20T07:46:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=d31f07340fad43120f5e2ee4aee98cdec6f2717d'/>
<id>urn:sha1:d31f07340fad43120f5e2ee4aee98cdec6f2717d</id>
<content type='text'>
These patches are about a number of CVEs files against the application:
CVE-2025-63649, CVE-2025-63650, CVE-2025-63651, CVE-2025-63652, CVE-2025-63653, CVE-2025-63655,
CVE-2025-63656, CVE-2025-63657 and CVE-2025-63658.

These patches are taken from a pull request[1] that is referenced in the relevant bug report[2].
The patches don't target specific CVEs on separately, but they fix a number of CVEs altogether.

Based on upstream analysis (in the linked issue) a number of these CVEs are duplicates of each
other and/or not exploitable. The valid CVEs are fixed by these patches.

I haven't added specific CVE info to the patches, one hand because of the above, it is hard to
separate the patches by CVE, and secondarily because NVD tracks these CVEs with incorrect version
info: NVD considers 1.8.6 fully fixed, even though the patches are only in the master branch,
untagged at this time. After updating the recipe to 1.8.6+, the vulnerabilites will disappear
from the CVE report due to this.

[1]: https://github.com/monkey/monkey/pull/434
[2]: https://github.com/monkey/monkey/issues/426

Signed-off-by: Gyorgy Sarvari &lt;skandigraun@gmail.com&gt;
Signed-off-by: Khem Raj &lt;khem.raj@oss.qualcomm.com&gt;
</content>
</entry>
<entry>
<title>monkey: upgrade 1.8.4 -&gt; 1.8.7</title>
<updated>2026-04-20T14:35:36+00:00</updated>
<author>
<name>Gyorgy Sarvari</name>
<email>skandigraun@gmail.com</email>
</author>
<published>2026-04-20T07:46:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=22277ca3a34083c27b5053bde58237e48b0e8799'/>
<id>urn:sha1:22277ca3a34083c27b5053bde58237e48b0e8799</id>
<content type='text'>
Shortlog:
https://github.com/monkey/monkey/compare/v1.8.4...v1.8.7

Signed-off-by: Gyorgy Sarvari &lt;skandigraun@gmail.com&gt;
Signed-off-by: Khem Raj &lt;khem.raj@oss.qualcomm.com&gt;
</content>
</entry>
<entry>
<title>hiawatha: Upgrade to 12.1 release</title>
<updated>2026-04-16T19:21:07+00:00</updated>
<author>
<name>Khem Raj</name>
<email>khem.raj@oss.qualcomm.com</email>
</author>
<published>2026-04-16T00:29:40+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=0c5517ff10dea49a14aba3c731d78369f61e1a5d'/>
<id>urn:sha1:0c5517ff10dea49a14aba3c731d78369f61e1a5d</id>
<content type='text'>
- HTTP/2 support added via the nghttp2 library
  (credits to Heiko Zimmermann) — noted as experimental, so
  testing carefully before enabling on production servers is
  recommended.
- mbed TLS updated from 4.0.0 to 4.1.0.
- ssi-cgi removed — the release notes suggest using
  Hiawatha's XSLT support as a more advanced alternative.

Signed-off-by: Khem Raj &lt;khem.raj@oss.qualcomm.com&gt;
</content>
</entry>
<entry>
<title>sthttpd: disable C23 support to fix configure check</title>
<updated>2026-04-16T19:21:06+00:00</updated>
<author>
<name>Khem Raj</name>
<email>khem.raj@oss.qualcomm.com</email>
</author>
<published>2026-04-15T20:40:10+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=0581dcc49b60a0e049fc2641465e11d93cd81c97'/>
<id>urn:sha1:0581dcc49b60a0e049fc2641465e11d93cd81c97</id>
<content type='text'>
Set ac_cv_prog_cc_c23=no to prevent autoconf from detecting C23
compiler support, avoiding potential build failures as the package
is not yet fully ported to support C23 standard.

Signed-off-by: Khem Raj &lt;khem.raj@oss.qualcomm.com&gt;
</content>
</entry>
<entry>
<title>swagger-ui: upgrade 5.32.1 -&gt; 5.32.2</title>
<updated>2026-04-10T14:59:58+00:00</updated>
<author>
<name>Wang Mingyu</name>
<email>wangmy@fujitsu.com</email>
</author>
<published>2026-04-09T10:32:22+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=56e3346fa081815811e1f3470ce7a0868ec94173'/>
<id>urn:sha1:56e3346fa081815811e1f3470ce7a0868ec94173</id>
<content type='text'>
Signed-off-by: Wang Mingyu &lt;wangmy@fujitsu.com&gt;
Signed-off-by: Khem Raj &lt;khem.raj@oss.qualcomm.com&gt;
</content>
</entry>
<entry>
<title>webmin: upgrade 2.621 -&gt; 2.630</title>
<updated>2026-04-06T16:46:29+00:00</updated>
<author>
<name>Jason Schonberg</name>
<email>schonm@gmail.com</email>
</author>
<published>2026-04-06T08:33:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=39adc57e1749a67eaa592c842c82cc9c22d15b51'/>
<id>urn:sha1:39adc57e1749a67eaa592c842c82cc9c22d15b51</id>
<content type='text'>
Changelog: https://github.com/webmin/webmin/releases/tag/2.630

Signed-off-by: Jason Schonberg &lt;schonm@gmail.com&gt;
Signed-off-by: Khem Raj &lt;khem.raj@oss.qualcomm.com&gt;
</content>
</entry>
<entry>
<title>nginx: upgrade 1.29.6 -&gt; 1.29.7</title>
<updated>2026-03-28T15:32:48+00:00</updated>
<author>
<name>Gyorgy Sarvari</name>
<email>skandigraun@gmail.com</email>
</author>
<published>2026-03-28T07:30:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=81e1926faffdc13555f94422c722ab5fcbee6b61'/>
<id>urn:sha1:81e1926faffdc13555f94422c722ab5fcbee6b61</id>
<content type='text'>
Changes:
*) Security: a buffer overflow might occur while handling a COPY or MOVE
   request in a location with "alias", allowing an attacker to modify
   the source or destination path outside of the document root
   (CVE-2026-27654).

*) Security: processing of a specially crafted mp4 file by the
   ngx_http_mp4_module on 32-bit platforms might cause a worker process
   crash, or might have potential other impact (CVE-2026-27784).

*) Security: processing of a specially crafted mp4 file by the
   ngx_http_mp4_module might cause a worker process crash, or might have
   potential other impact (CVE-2026-32647).

*) Security: a segmentation fault might occur in a worker process if the
   CRAM-MD5 or APOP authentication methods were used and authentication
   retry was enabled (CVE-2026-27651).

*) Security: an attacker might use PTR DNS records to inject data in
   auth_http requests, as well as in the XCLIENT command in the backend
   SMTP connection (CVE-2026-28753).

*) Security: SSL handshake might succeed despite OCSP rejecting a client
   certificate in the stream module (CVE-2026-28755).

*) Feature: the "multipath" parameter of the "listen" directive.

*) Feature: the "local" parameter of the "keepalive" directive in the
   "upstream" block.
*) Change: now the "keepalive" directive in the "upstream" block is
   enabled by default.
*) Change: now ngx_http_proxy_module supports keepalive by default; the
   default value for "proxy_http_version" is "1.1"; the "Connection"
   proxy header is not sent by default anymore.
*) Bugfix: an invalid HTTP/2 request might be sent after switching to
   the next upstream if buffered body was used in the
   ngx_http_grpc_module.

Signed-off-by: Gyorgy Sarvari &lt;skandigraun@gmail.com&gt;
Signed-off-by: Khem Raj &lt;khem.raj@oss.qualcomm.com&gt;
</content>
</entry>
<entry>
<title>nginx: upgrade 1.28.2 -&gt; 1.28.3</title>
<updated>2026-03-28T15:32:48+00:00</updated>
<author>
<name>Gyorgy Sarvari</name>
<email>skandigraun@gmail.com</email>
</author>
<published>2026-03-28T07:30:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=34b3d0f4917169c5cd568cdb13796a2d75f1fbf1'/>
<id>urn:sha1:34b3d0f4917169c5cd568cdb13796a2d75f1fbf1</id>
<content type='text'>
Changes:
*) Security: a buffer overflow might occur while handling a COPY or MOVE
   request in a location with "alias", allowing an attacker to modify
   the source or destination path outside of the document root
   (CVE-2026-27654).

*) Security: processing of a specially crafted mp4 file by the
   ngx_http_mp4_module on 32-bit platforms might cause a worker process
   crash, or might have potential other impact (CVE-2026-27784).

*) Security: processing of a specially crafted mp4 file by the
   ngx_http_mp4_module might cause a worker process crash, or might have
   potential other impact (CVE-2026-32647).

*) Security: a segmentation fault might occur in a worker process if the
   CRAM-MD5 or APOP authentication methods were used and authentication
   retry was enabled (CVE-2026-27651).

*) Security: an attacker might use PTR DNS records to inject data in
   auth_http requests, as well as in the XCLIENT command in the backend
   SMTP connection (CVE-2026-28753).

*) Security: SSL handshake might succeed despite OCSP rejecting a client
   certificate in the stream module (CVE-2026-28755).

*) Change: now nginx limits the size and rate of QUIC stateless reset
   packets.

*) Bugfix: receiving a QUIC packet by a wrong worker process could cause
   the connection to terminate.

*) Bugfix: in the ngx_http_mp4_module.

Signed-off-by: Gyorgy Sarvari &lt;skandigraun@gmail.com&gt;
Signed-off-by: Khem Raj &lt;khem.raj@oss.qualcomm.com&gt;
</content>
</entry>
<entry>
<title>swagger-ui: upgrade 5.32.0 -&gt; 5.32.1</title>
<updated>2026-03-27T16:09:03+00:00</updated>
<author>
<name>Wang Mingyu</name>
<email>wangmy@fujitsu.com</email>
</author>
<published>2026-03-26T11:56:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=ab7159e7e4dc6bc2d57c265629ee4ef06bdf4787'/>
<id>urn:sha1:ab7159e7e4dc6bc2d57c265629ee4ef06bdf4787</id>
<content type='text'>
Bugfixes:
=========
- invalidate models components cache based on location
- style: use container queries for responsive design

Signed-off-by: Wang Mingyu &lt;wangmy@fujitsu.com&gt;
Signed-off-by: Khem Raj &lt;khem.raj@oss.qualcomm.com&gt;
</content>
</entry>
<entry>
<title>hiawatha: Fix checksum mismatch again</title>
<updated>2026-03-25T01:55:44+00:00</updated>
<author>
<name>Khem Raj</name>
<email>khem.raj@oss.qualcomm.com</email>
</author>
<published>2026-03-25T01:54:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=79f39ce6c63231d38556971c5d8c46e3aca79cdf'/>
<id>urn:sha1:79f39ce6c63231d38556971c5d8c46e3aca79cdf</id>
<content type='text'>
Signed-off-by: Khem Raj &lt;khem.raj@oss.qualcomm.com&gt;
</content>
</entry>
</feed>
