[pull] master from buildroot:master#1028
Merged
pull[bot] merged 4 commits intoThomasDevoogdt:masterfrom Feb 15, 2026
Merged
Conversation
This commit fixes the following vulenerability: - CVE-2025-60876: BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20). For more information, see: - https://www.cve.org/CVERecord?id=CVE-2025-60876 - https://lists.busybox.net/pipermail/busybox/2025-November/091840.html - https://sources.debian.org/data/main/b/busybox/1%3A1.37.0-10/debian/patches/wget-disallow-control-chars-in-URLs-CVE-2025-60876.patch Signed-off-by: Thomas Perale <thomas.perale@mind.be> Signed-off-by: Julien Olivain <ju.o@free.fr>
The CVE-2023-45539 has incomplete informations (see [1]) and will be reported as exploitable by pkg-stats for haproxy v2.6.22. The vulnerability has been fixed upstream since version 2.6.15 [2][3]. This commit mark this vulnerability as ignored. [1] https://nvd.nist.gov/vuln/detail/CVE-2023-45539 [2] https://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=832b672eee54866c7a42a1d46078cc9ae0d544d9 [3] https://security-tracker.debian.org/tracker/CVE-2023-45539 Signed-off-by: Thomas Perale <thomas.perale@mind.be> Signed-off-by: Julien Olivain <ju.o@free.fr>
For more information on the release, see: - https://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=c3bf1ac6709072bf9984c829c3badda5a4e8fa7e This fixes the following vulnerability: - CVE-2025-11230: Inefficient algorithm complexity in mjson in HAProxy allows remote attackers to cause a denial of service via specially crafted JSON requests. For more information, see: - https://www.cve.org/CVERecord?id=CVE-2025-11230 - https://www.haproxy.com/blog/october-2025-cve-2025-11230-haproxy-mjson-library-denial-of-service-vulnerability Signed-off-by: Thomas Perale <thomas.perale@mind.be> Signed-off-by: Julien Olivain <ju.o@free.fr>
Upstream does not provide hashes in sha1/sha256 format anymore. https://lists.gnu.org/archive/html/coreutils-announce/2025-11/msg00000.html https://lists.gnu.org/archive/html/coreutils-announce/2026-02/msg00000.html "'kill' and 'uptime' are no longer built by default. These programs can be built with the --enable-install-program=kill,uptime configure option." Adjust coreutils.mk to install 'kill' and 'uptime'. Signed-off-by: Bernd Kuhls <bernd@kuhls.net> Signed-off-by: Julien Olivain <ju.o@free.fr>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
See Commits and Changes for more details.
Created by
pull[bot] (v2.0.0-alpha.4)
Can you help keep this open source service alive? 💖 Please sponsor : )