]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commitdiff
dropbear: upgrade 2025.88 -> 2025.89
authorPeter Marko <peter.marko@siemens.com>
Thu, 1 Jan 2026 13:13:48 +0000 (14:13 +0100)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 8 Jan 2026 11:21:21 +0000 (11:21 +0000)
Solves CVE-2025-14282 and CVE-2019-6111.

Release notes:
* https://github.com/mkj/dropbear/releases/tag/DROPBEAR_2025.89

Drop patch included in this release and refresh other patches.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-core/dropbear/dropbear/0001-Fix-proxycmd-without-netcat.patch [deleted file]
meta/recipes-core/dropbear/dropbear/0001-urandom-xauth-changes-to-options.h.patch
meta/recipes-core/dropbear/dropbear_2025.89.bb [moved from meta/recipes-core/dropbear/dropbear_2025.88.bb with 97% similarity]

diff --git a/meta/recipes-core/dropbear/dropbear/0001-Fix-proxycmd-without-netcat.patch b/meta/recipes-core/dropbear/dropbear/0001-Fix-proxycmd-without-netcat.patch
deleted file mode 100644 (file)
index 967b663..0000000
+++ /dev/null
@@ -1,74 +0,0 @@
-From 5cc0127000db5f7567b54d0495fb91a8e452fe09 Mon Sep 17 00:00:00 2001
-From: Konstantin Demin <rockdrilla@gmail.com>
-Date: Fri, 9 May 2025 22:39:35 +0300
-Subject: [PATCH] Fix proxycmd without netcat
-
-fixes e5a0ef27c2 "Execute multihop commands directly, no shell"
-
-Signed-off-by: Konstantin Demin <rockdrilla@gmail.com>
-
-Upstream-Status: Backport [https://github.com/mkj/dropbear/commit/5cc0127000db5f7567b54d0495fb91a8e452fe09]
-Signed-off-by: Peter Marko <peter.marko@siemens.com>
----
- src/cli-main.c | 12 +++++++++++-
- 1 file changed, 11 insertions(+), 1 deletion(-)
-
-diff --git a/src/cli-main.c b/src/cli-main.c
-index 2fafa88..0a052a3 100644
---- a/src/cli-main.c
-+++ b/src/cli-main.c
-@@ -77,7 +77,11 @@ int main(int argc, char ** argv) {
-       }
- #if DROPBEAR_CLI_PROXYCMD
--      if (cli_opts.proxycmd || cli_opts.proxyexec) {
-+      if (cli_opts.proxycmd
-+#if DROPBEAR_CLI_MULTIHOP
-+              || cli_opts.proxyexec
-+#endif
-+      ) {
-               cli_proxy_cmd(&sock_in, &sock_out, &proxy_cmd_pid);
-               if (signal(SIGINT, kill_proxy_sighandler) == SIG_ERR ||
-                       signal(SIGTERM, kill_proxy_sighandler) == SIG_ERR ||
-@@ -110,11 +114,13 @@ static void shell_proxy_cmd(const void *user_data_cmd) {
-       dropbear_exit("Failed to run '%s'\n", cmd);
- }
-+#if DROPBEAR_CLI_MULTIHOP
- static void exec_proxy_cmd(const void *unused) {
-       (void)unused;
-       run_command(cli_opts.proxyexec[0], cli_opts.proxyexec, ses.maxfd);
-       dropbear_exit("Failed to run '%s'\n", cli_opts.proxyexec[0]);
- }
-+#endif
- static void cli_proxy_cmd(int *sock_in, int *sock_out, pid_t *pid_out) {
-       char * cmd_arg = NULL;
-@@ -145,9 +151,11 @@ static void cli_proxy_cmd(int *sock_in, int *sock_out, pid_t *pid_out) {
-               cmd_arg = m_malloc(shell_cmdlen);
-               snprintf(cmd_arg, shell_cmdlen, "exec %s", cli_opts.proxycmd);
-               exec_fn = shell_proxy_cmd;
-+#if DROPBEAR_CLI_MULTIHOP
-       } else {
-               /* No shell */
-               exec_fn = exec_proxy_cmd;
-+#endif
-       }
-       ret = spawn_command(exec_fn, cmd_arg, sock_out, sock_in, NULL, pid_out);
-@@ -159,6 +167,7 @@ static void cli_proxy_cmd(int *sock_in, int *sock_out, pid_t *pid_out) {
- cleanup:
-       m_free(cli_opts.proxycmd);
-       m_free(cmd_arg);
-+#if DROPBEAR_CLI_MULTIHOP
-       if (cli_opts.proxyexec) {
-               char **a = NULL;
-               for (a = cli_opts.proxyexec; *a; a++) {
-@@ -166,6 +175,7 @@ cleanup:
-               }
-               m_free(cli_opts.proxyexec);
-       }
-+#endif
- }
- static void kill_proxy_sighandler(int UNUSED(signo)) {
index 0687e5dab1ffecb97fabeae0f1bb7e40bd9c99f6..a662230b883baa88146496b30f21af4528203469 100644 (file)
@@ -12,7 +12,7 @@ diff --git a/src/default_options.h b/src/default_options.h
 index 6e970bb..ccc8b47 100644
 --- a/src/default_options.h
 +++ b/src/default_options.h
-@@ -317,7 +317,7 @@ group1 in Dropbear server too */
+@@ -323,7 +323,7 @@ group1 in Dropbear server too */
  
  /* The command to invoke for xauth when using X11 forwarding.
   * "-q" for quiet */
similarity index 97%
rename from meta/recipes-core/dropbear/dropbear_2025.88.bb
rename to meta/recipes-core/dropbear/dropbear_2025.89.bb
index 72a886d907e0afd056ba5d62d6f74c82569785ce..957a0901fb05a3d9fd0f536fc560dadb2a3518d6 100644 (file)
@@ -19,11 +19,10 @@ SRC_URI = "http://matt.ucc.asn.au/dropbear/releases/dropbear-${PV}.tar.bz2 \
            file://dropbear@.service \
            file://dropbear.socket \
            file://dropbear.default \
-           file://0001-Fix-proxycmd-without-netcat.patch \
            ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
            "
 
-SRC_URI[sha256sum] = "783f50ea27b17c16da89578fafdb6decfa44bb8f6590e5698a4e4d3672dc53d4"
+SRC_URI[sha256sum] = "0d1f7ca711cfc336dc8a85e672cab9cfd8223a02fe2da0a4a7aeb58c9e113634"
 MIRRORS += "http://matt.ucc.asn.au/dropbear/releases/ https://dropbear.nl/mirror/releases/"
 
 PAM_SRC_URI = "file://0005-dropbear-enable-pam.patch \