Commit Graph

44833 Commits

Author SHA1 Message Date
Thomas Petazzoni
14ee52f936 board/pc: drop unused grub-efi.cfg file
Following commit fee29b05bb
("configs/pc_x86_64_efi: use a GPT partition table"),
board/pc/grub-efi.cfg is no longer used anywhere: the
post-image-efi-gpt.sh script generates the grub configuration.

Also, since post-image-efi-gpt.sh generates a grub configuration file
that uses the root filesystem partition UUID as the root= kernel
argument, the instructions in the readme.txt file to tweak root= from
/dev/sda2 to /dev/vda2 is no longer relevant. This was noted in the
commit log of fee29b05bb:

    The root filesystem location is passed to the kernel by a partition
    UUID, so it is possible to boot on QEMU, directly from the disk image,
    or dump the image to a physical device.

Fixes: #11841
Cc: Pete Morici <pmorici@dev295.com>
Cc: Carlos A. M. dos Santos <unixmania@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 79b8540d62)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 11:10:07 +02:00
Peter Korsgaard
2568bf88eb package/postgresql: security bump to version 11.3
Fixes the following security issues:

CVE-2019-10129: Memory disclosure in partition routing

Prior to this release, a user running PostgreSQL 11 can read arbitrary bytes
of server memory by executing a purpose-crafted INSERT statement to a
partitioned table.

CVE-2019-10130: Selectivity estimators bypass row security policies

PostgreSQL maintains statistics for tables by sampling data available in
columns; this data is consulted during the query planning process.  Prior to
this release, a user able to execute SQL queries with permissions to read a
given column could craft a leaky operator that could read whatever data had
been sampled from that column.  If this happened to include values from rows
that the user is forbidden to see by a row security policy, the user could
effectively bypass the policy.  This is fixed by only allowing a
non-leakproof operator to use this data if there are no relevant row
security policies for the table.

For more details, see the release notes:
https://www.postgresql.org/about/news/1939/

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 5ea93e24cb)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 11:08:53 +02:00
Peter Korsgaard
55ea12c13c {linux, linux-headers}: bump 4.{9, 14, 19}.x / 5.0.x series
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 6606f6c6a1)
[Peter: drop 5.0.x bump]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 11:07:52 +02:00
Fabrice Fontaine
9a756a738e package/libsigrok: fix comment display
Commit 922b82bde9 added a dependency to
locale and updated comment text but forgot to add the !BR2_ENABLE_LOCALE
dependency to comment

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit a62f9803ad)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:31:55 +02:00
Peter Korsgaard
6ba6187077 package/atftp: security bump to version 0.7.2
Fixes the following security issues:

CVE-2019-11365: An issue was discovered in atftpd in atftp 0.7.1.  A remote
attacker may send a crafted packet triggering a stack-based buffer overflow
due to an insecurely implemented strncpy call.  The vulnerability is
triggered by sending an error packet of 3 bytes or fewer.  There are
multiple instances of this vulnerable strncpy pattern within the code base,
specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and
tftp_mtftp.c.

CVE-2019-11366: An issue was discovered in atftpd in atftp 0.7.1.  It does
not lock the thread_list_mutex mutex before assigning the current thread
data structure.  As a result, the daemon is vulnerable to a denial of
service attack due to a NULL pointer dereference.  If thread_data is NULL
when assigned to current, and modified by another thread before a certain
tftpd_list.c check, there is a crash when dereferencing current->next.

For details, see
https://pulsesecurity.co.nz/advisories/atftpd-multiple-vulnerabilities

Patch 0001-Makefile.am-link-against-libpthread-for-atftp.patch patches
Makefile.am, so add _AUTORECONF.

CFLAGS is now correctly handled since commit f9dbb96844167f (configure.ac:
fix hard setting of CFLAGS), so drop the workaround about passing
-fgnu89-inline in CPPFLAGS.

Add a hash for the license file.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Reviewed-by: Ryan Barnett <ryan.barnett@rockwellcollins.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 457837087d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:29:32 +02:00
Peter Seiderer
f96a08eb87 package/turbolua: replace utf-8 apostrophe by ascii single quote
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit ea6ed8bde9)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:28:43 +02:00
Peter Seiderer
936eab6deb package/sane-backends: replace utf-8 space by ascii character
Replace utf-8 NO-BREAK-SPACE (c2 a0) in comment line by simple
ascii space character.

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 02614478cc)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:28:36 +02:00
Peter Seiderer
d291f30ede package/rpm: replace utf-8 space by ascii character
Replace utf-8 NO-BREAK-SPACE (c2 a0) in comment line by simple
ascii space character.

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 80ff8f5ee8)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:28:24 +02:00
Peter Seiderer
ae93e5463e package/python-pexpect: replace utf-8 apostrophe by ascii single quote
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 7c3d8667fe)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:27:53 +02:00
Peter Seiderer
deb978b9d8 package/python-mutagen: replace utf-8 apostrophe by ascii single quote
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 45cfcb5311)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:26:40 +02:00
Peter Seiderer
dcc7a1b822 package/python-idna: replace utf-8 quote by ascii single quote
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit a83dab1e3e)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:26:31 +02:00
Peter Seiderer
b3b2e05274 package/python-gunicorn: replace utf-8 quote by ascii single quote
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit fc5a3d9d84)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:26:21 +02:00
Peter Seiderer
a7c82133f9 package/pngquant: replace utf-8 hyphen by ascii hyphen
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 4089cc389c)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:26:12 +02:00
Peter Seiderer
3fb4e874c4 package/mksh: replace utf-8 apostrophe by ascii single quote
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f7cd28a1d8)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:25:50 +02:00
Peter Seiderer
d492eb9f5f package/madplay: replace utf-8 hyphen by ascii hyphen
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit c7820cab4e)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:25:37 +02:00
Peter Seiderer
0f45e9eab5 package/collectd: replace utf-8 quote by ascii single quote
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit ca5c5fe44c)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:24:52 +02:00
Peter Seiderer
c36b38f72a package/capnproto: replace utf-8 apostrophe by ascii single quote
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 2a72594448)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:24:44 +02:00
Peter Seiderer
842d792259 package/vde2: replace utf-8 space by ascii character
Replace utf-8 NO-BREAK-SPACE (c2 a0) in comment line by simple
ascii space character.

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 91f03aefaa)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:24:35 +02:00
Peter Seiderer
e934c41c7f package/tekui: replace utf-8 space by ascii character
Replace utf-8 NO-BREAK-SPACE (c2 a0) in comment line by simple
ascii space character.

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 784d41bec7)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:24:28 +02:00
Peter Seiderer
bce546275f package/qemu: replace utf-8 space by ascii character
Replace utf-8 NO-BREAK-SPACE (c2 a0) in comment line by simple
ascii space character.

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 5dd15ad1db)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:23:46 +02:00
Peter Seiderer
69ca49d740 package/libopenssl: replace utf-8 quote by ascii single quote
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 5006c86449)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:23:31 +02:00
Peter Seiderer
d9dff7a4c4 package/libglu: replace utf-8 apostrophe by ascii single quote
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f6522addda)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:23:19 +02:00
Peter Seiderer
6601483bed package/assimp: replace utf-8 quote by ascii single quote
Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit ad4a2b5e1c)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-26 09:22:41 +02:00
Peter Korsgaard
80daab4f97 package/docker-cli: bump version to 18.09.6
Additional post-18.09.5 fixes:

Builder:
- Fixed COPY and ADD with multiple <src> to not invalidate cache if
  DOCKER_BUILDKIT=1.moby/moby#38964

Networking:
- Cleaned up the cluster provider when the agent is closed. docker/libnetwork#2354
- Windows: Now selects a random host port if the user does not specify a
  host port.  docker/libnetwork#2369
- --service-cluster-ip-range is now configurable for UCP install.
  docker/orca#10263

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit c7e5f9cfc6)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-10 12:16:36 +02:00
Peter Korsgaard
590e35a590 package/docker-engine: bump version to 18.09.6
Additional post-18.09.5 fixes:

Builder:
- Fixed COPY and ADD with multiple <src> to not invalidate cache if
  DOCKER_BUILDKIT=1.moby/moby#38964

Networking:
- Cleaned up the cluster provider when the agent is closed. docker/libnetwork#2354
- Windows: Now selects a random host port if the user does not specify a
  host port.  docker/libnetwork#2369
- --service-cluster-ip-range is now configurable for UCP install.
  docker/orca#10263

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit d692ecb054)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-10 12:16:27 +02:00
Peter Korsgaard
82b1e76716 package/orc: bump version to 0.4.29
Contains a number of fixes. Release notes:

0.4.28: https://lists.freedesktop.org/archives/gstreamer-announce/2017-November/000449.html
0.4.29: https://lists.freedesktop.org/archives/gstreamer-announce/2019-April/000483.html

Also add a hash for the license file.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 116811c264)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-10 12:15:02 +02:00
Arnout Vandecappelle (Essensium/Mind)
c5a0c6f7ca package/owfs: delay sysvinit start until after network and avahi
In its default configuration, owserver opens a TCP socket on the 'lo'
interface. However, in some situations, the 'lo' interface may not yet
be up until S40network is started. This causes owserver not to start its
TCP socket, which makes it impossible for the owfs client to connect to
it.

In addition, owserver may have avahi integration.

Therefore, delay the start of owserver and owfs until after S40network
and S50avahi-daemon.

Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit efc6ccbddc)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-10 12:13:42 +02:00
Peter Korsgaard
948d9db61a package/coreutils: install base64 under /bin iso /usr/bin to match busybox
Fixes #11816

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 873fa4f01f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-10 12:12:10 +02:00
Peter Korsgaard
9f1b5a86f2 {linux, linux-headers}: bump 4.{9, 14, 19}.x / 5.0.x series
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 8a1fde4b3c)
[Peter: drop 5.0.x bump]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-10 12:11:42 +02:00
Angelo Compagnucci
284cf7d39f package/nfs-utils: fix unnecessary files removal
The removal of unnecessary files is currently broken by the fact that
the rm command is executed from the buildroot directory and not the
target directory.

This patch fixes the problem changing to target directory before
removing files.

Signed-off-by: Angelo Compagnucci <angelo@amarulasolutions.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit a64c3a847d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-10 11:56:19 +02:00
Fabrice Fontaine
c90b9d60c6 package/kf5-kcoreaddons: fix build with atomic
Fixes:
 - http://autobuild.buildroot.org/results/d17c2fb420e395b995b2c2eef387f0c66e89c96c

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 2b8a3cf5ad)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-10 11:51:01 +02:00
Grzegorz Blach
695d6fb864 package/libglib2: avoid printing null strings
GCC 9 is being stricter about passing null string pointers
to printf-like functions.

Signed-off-by: Grzegorz Blach <grzegorz@blach.pl>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit a5601a6416)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-10 11:40:44 +02:00
Petr Vorel
c540c9f31d package/libglib2: bump to version 2.56.4
Signed-off-by: Petr Vorel <petr.vorel@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit b08d4a9bfb)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-10 11:40:34 +02:00
Bernd Kuhls
815812e33e package/php: security bump version to 7.3.5
Release notes: https://www.php.net/archive/2019.php#id2019-05-02-1

Fixes 2019-11036:
* Heap-buffer-overflow in _estrndup via exif_process_IFD_TAG

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 934239eafb)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-10 11:32:58 +02:00
Peter Korsgaard
e5b7a75b16 {linux, linux-headers}: bump 4.{9, 14, 19}.x / 5.0.x series
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 0a79bb4871)
[Peter: drop 5.0.x bump]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-08 23:40:20 +02:00
Christian Stewart
5eaa6df8ba package/docker-engine: bump to version 18.09.5
Signed-off-by: Christian Stewart <christian@paral.in>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 0e70d7c761)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-08 23:34:19 +02:00
Christian Stewart
7b946e547f package/docker-cli: bump to version 18.09.5
Signed-off-by: Christian Stewart <christian@paral.in>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit ee6973e48b)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-08 23:34:10 +02:00
Christian Stewart
daa0e3a084 package/docker-containerd: bump to version 1.2.6
Signed-off-by: Christian Stewart <christian@paral.in>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit bcf7f56f26)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-08 23:33:54 +02:00
Christian Stewart
5dcb05d25b package/runc: bump to version 1.0.0-rc8
Signed-off-by: Christian Stewart <christian@paral.in>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 045df6a480)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-08 23:33:47 +02:00
Fabrice Fontaine
8af8887c33 package/rpm: drop unneeded third patch
After upstream review, I found that the third patch is not needed, just
doing an autoreconf fix the linking issue with -lintl

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit c6342736b0)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-08 23:32:56 +02:00
John Keeping
63b3643ed5 package/netcat-openbsd: switch to new upstream URL
anonscm.debian.org has been discontinued and now hosts a page pointing
to salsa.debian.org.  Switch to the new upstream URL, explicitly setting
the method to git now that we use an HTTPS URL.

Signed-off-by: John Keeping <john@metanate.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 14839eca9a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-02 08:35:58 +02:00
Yann E. MORIN
53ac60ced6 configs/qemu_xtensa_lx60_*: kernel build needs mkimage
Following ffbe46a529 ("linux: simplify LINUX_BUILD_CMDS"), the Linux
kernel build for these xtensa qemu builds an image format that needs
mkimage.

Reported-by: Jugurtha BELKALEM <jugurtha.belkalem@smile.fr>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
Cc: Jugurtha BELKALEM <jugurtha.belkalem@smile.fr>
Cc: Max Filippov <jcmvbkbc@gmail.com>
Cc: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
Cc: Arnout Vandecappelle <arnout@mind.be>
Reviewed-by: Max Filippov <jcmvbkbc@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 7cf13b9b06)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-02 08:35:42 +02:00
Bernd Kuhls
023741dcfd package/dovecot-pigeonhole: bump version to 0.5.6
Release notes:
https://dovecot.org/pipermail/dovecot-news/2019-April/000411.html

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 03a78e3470)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-02 08:29:22 +02:00
Bernd Kuhls
c88173a243 package/dovecot: security bump to version 2.3.6
Fixes
* CVE-2019-11494: Submission-login crashed with signal 11 due to null
  pointer access when authentication was aborted by disconnecting.
* CVE-2019-11499: Submission-login crashed when authentication was
  started over TLS secured channel and invalid authentication message
  was sent.

Release notes:
https://dovecot.org/pipermail/dovecot-news/2019-April/000408.html

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 70784619bc)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-02 08:29:15 +02:00
Jörg Krause
52baad93fa package/luajit: add hash for the license file
Signed-off-by: Jörg Krause <joerg.krause@embedded.rocks>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 86a7f00919)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-02 08:27:38 +02:00
Jörg Krause
16d94c3bb6 package/popt: add hash for the license file
Signed-off-by: Jörg Krause <joerg.krause@embedded.rocks>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 6b8e3e7415)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-02 08:27:16 +02:00
Fabrice Fontaine
db1f62c7a3 package/python-ply: add host variant
Commit 89e70a7077 (package/bind: fix python build) added a dependency on
host-python-ply to bind, which doesn't exist. Add it.

Fixes:
 - http://autobuild.buildroot.org/results/a68251773f61c3463f4d18aa626c83df70126afc

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
[Peter: reword / add commit reference]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

(cherry picked from commit 3d8e1ad1f3)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-01 22:12:32 +02:00
Peter Korsgaard
3c38c9138e package/gst1-plugins-base: add upstream SA-2019-0001 security fix
Fixes the following security issue:

CVE-2019-9928: GStreamer before 1.16.0 has a heap-based buffer overflow in
the RTSP connection parser via a crafted response from a server

For more details, see the advisory:
https://gstreamer.freedesktop.org/security/sa-2019-0001.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 99890750e0)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-01 22:11:45 +02:00
Peter Korsgaard
acd3da78d5 package/go: bump version to 1.11.9
Fixes a number of issues discovered since 1.11.6.  From the release notes:

go1.11.7 (released 2019/04/05) includes fixes to the runtime and the net
packages.  See the Go 1.11.7 milestone on our issue tracker for details.

go1.11.8 (released 2019/04/08) was accidentally released without its
intended fix.  It is identical to go1.11.7, except for its version number.
The intended fix is in go1.11.9.

go1.11.9 (released 2019/04/11) fixes an issue where using the prebuilt
binary releases on older versions of GNU/Linux led to failures when linking
programs that used cgo.  Only Linux users who hit this issue need to update.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-01 22:10:31 +02:00
Peter Korsgaard
3079eee43c package/imagemagick: security bump to version 7.0.8-42
Fixes the following security issues:

- CVE-2019-9956: In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer
  overflow in the function PopHexPixel of coders/ps.c, which allows an
  attacker to cause a denial of service or code execution via a crafted
  image file.

- CVE-2019-10650: In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer
  over-read in the function WriteTIFFImage of coders/tiff.c, which allows an
  attacker to cause a denial of service or information disclosure via a
  crafted image file.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 43ff6b974c)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-05-01 21:53:37 +02:00