]> rtime.felk.cvut.cz Git - coffee/buildroot.git/log
coffee/buildroot.git
6 years agolinux-headers: bump 4.1.x series
Bernd Kuhls [Thu, 7 Dec 2017 17:43:52 +0000 (18:43 +0100)]
linux-headers: bump 4.1.x series

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit ddfd34382804dcbe6f862e44ac8d20edcf951566)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoflann: Disable find package for HDF5
Johan Oudinet [Wed, 6 Dec 2017 14:47:53 +0000 (15:47 +0100)]
flann: Disable find package for HDF5

The HDF5 package is used by flann for testing purpose only and is
not part of buildroot packages. However, if present in the host, it will
be used and trigger the unsafe header/library path used in
cross-compilation error.

Signed-off-by: Johan Oudinet <johan.oudinet@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit f6ee339e92360fc43ebe17928656c06634b09c97)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: security bump 4.{4, 9, 14}.x series
Fabio Estevam [Tue, 5 Dec 2017 12:18:45 +0000 (10:18 -0200)]
linux-headers: security bump 4.{4, 9, 14}.x series

Fixes CVE-2017-1000405.

[Peter: drop 4.14.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
[Thomas: adjust commit description to mention the CVE being fixed.]
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 9f5178fa3495b5b59c4d86c2d1a6fca23bf4e6f3)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9}.x series
Bernd Kuhls [Fri, 1 Dec 2017 06:07:59 +0000 (07:07 +0100)]
linux-headers: bump 4.{4, 9}.x series

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit e394b446f5c61da23f9b33a132f244648149a3c6)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibcurl: security bump to version 7.57.0
Peter Korsgaard [Thu, 30 Nov 2017 00:07:01 +0000 (01:07 +0100)]
libcurl: security bump to version 7.57.0

Fixes the following security issues:

- CVE-2017-8816: NTLM buffer overflow via integer overflow
- CVE-2017-8817: FTP wildcard out of bounds read
- CVE-2017-8818: SSL out of buffer access

For more details, see the changelog:
https://curl.haxx.se/changes.html#7_57_0

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit fb2ed961988867ab77c48786075e03a6110d1d0a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/x11r7/xlib_libXfont: security bump to version 1.5.4
Bernd Kuhls [Wed, 29 Nov 2017 20:45:58 +0000 (21:45 +0100)]
package/x11r7/xlib_libXfont: security bump to version 1.5.4

Fixes CVE-2017-16611:
https://lists.x.org/archives/xorg-announce/2017-November/002825.html

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit eae85b620d8ae49e98dc5dfc4b1a11eed7946c26)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/x11r7/xlib_libXfont: bump version to 1.5.3
Bernd Kuhls [Sat, 21 Oct 2017 17:53:53 +0000 (19:53 +0200)]
package/x11r7/xlib_libXfont: bump version to 1.5.3

Added all hashes provided by upstream.

Removed patches applied upstream:
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?h=libXfont-1.5-branch&id=a2a5fa591762b430037e33f1df55b460550ab406
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?h=libXfont-1.5-branch&id=3b08934dca75e4c559db7d83797bc3d365c2a50a

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 80dc50e71695c62bae72840ebaf0ab8ab568b411)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/x11r7/xlib_libXfont2: security bump to version 2.0.3
Bernd Kuhls [Wed, 29 Nov 2017 20:45:57 +0000 (21:45 +0100)]
package/x11r7/xlib_libXfont2: security bump to version 2.0.3

Fixes CVE-2017-16611:
https://lists.x.org/archives/xorg-announce/2017-November/002824.html

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 35f6288a54bca343b180a4d210ffd6e1b5655ab1)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/x11r7/xlib_libXfont2: bump version to 2.0.2
Bernd Kuhls [Sat, 14 Oct 2017 11:37:25 +0000 (13:37 +0200)]
package/x11r7/xlib_libXfont2: bump version to 2.0.2

Removed patches applied upstream, added all upstream hashes.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit eb8222ab0bd47387d14d44bbd809988fef8b69f4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/x11r7/xlib_libXcursor: security bump to version 1.1.15
Bernd Kuhls [Wed, 29 Nov 2017 20:45:56 +0000 (21:45 +0100)]
package/x11r7/xlib_libXcursor: security bump to version 1.1.15

Fixes CVE-2017-16612:
https://lists.x.org/archives/xorg-announce/2017-November/002823.html

Added all hashed provided by upstream.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit f781add88fedf86f2ea2fad5eabb6a8c72752c7a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/exim: change tarball compression to xz
Jerzy Grzegorek [Fri, 8 Dec 2017 19:39:01 +0000 (20:39 +0100)]
package/exim: change tarball compression to xz

Signed-off-by: Jerzy Grzegorek <jerzy.m.grzegorek@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 7c42b5f38131ef19843301410e6e649c6173565d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/exim: security bump to version 4.89.1
Bernd Kuhls [Wed, 29 Nov 2017 20:38:27 +0000 (21:38 +0100)]
package/exim: security bump to version 4.89.1

Fixes CVE-2017-16943 & CVE-2017-16944:
https://lists.exim.org/lurker/message/20171128.215505.79ea8efa.en.html

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 06473084f4945eb254e589f7935228ae613ec540)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/exim: bump version to 4.89
Bernd Kuhls [Sat, 11 Mar 2017 15:12:05 +0000 (16:12 +0100)]
package/exim: bump version to 4.89

Rebased patch #0003, added uClibc compatibility patch.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit d791e9101cc7e202b396bb86a26cad81efd501e9)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agosupport/scripts/size-stats: avoid divide-by-zero
Andrey Yurovsky [Tue, 28 Nov 2017 03:37:07 +0000 (19:37 -0800)]
support/scripts/size-stats: avoid divide-by-zero

Some packages (ex: skeleton-init-systemd) have a zero size so we cannot
divide by the package size. In that case make their percent zero
explicitly and avoid a ZeroDivisionError exception.

Signed-off-by: Andrey Yurovsky <yurovsky@gmail.com>
Acked-by: "Yann E. MORIN" <yann.morin.1998@free.fr>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 88af7d330dec7b6386a9994d8e53900033d85903)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agosamba4: ensure that copied cache.txt is writable
Danomi Manchego [Wed, 29 Nov 2017 02:55:24 +0000 (21:55 -0500)]
samba4: ensure that copied cache.txt is writable

If the Buildroot tree is read-only, then cache.txt is copied read-only into
the build directory, and the configuration step fails.  Fix this in the
same way we do in other places, by opening permissions as we copy the file
using $(INSTALL).

Signed-off-by: Danomi Manchego <danomimanchego123@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 832b2de3ba82d8b51c393f743ee86ad530829607)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowebkitgtk: Add upstream patch to ensure CMAKE_BUILD_TYPE is honored
Adrian Perez de Castro [Wed, 29 Nov 2017 14:17:51 +0000 (16:17 +0200)]
webkitgtk: Add upstream patch to ensure CMAKE_BUILD_TYPE is honored

Make WebKitGTK+ honor the value of CMAKE_BUILD_TYPE defined in the CMake
toolchain file by backporting the following upstream WebKit patch:

    https://trac.webkit.org/changeset/225168

This reduces the generated binary sizes when building in "Release" mode
(BR2_ENABLE_DEBUG=n), for example when targeting ARMv8 the size reduction
is ~17 MiB.

Signed-off-by: Adrian Perez de Castro <aperez@igalia.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit a49c69862a617617d05c23e5c64ddea1c665174f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agomtools: do not link to libbsd
Carlos Santos [Tue, 28 Nov 2017 16:06:51 +0000 (14:06 -0200)]
mtools: do not link to libbsd

If libbsd is found by the configuration process, mtools unnecessarily
adds a NEEDED field with libbsd to its dynamic section, but it does not
actually use anything from libbsd under Linux. The same may happen to
host-mtools if some libbsd package is installed on the host machine.

Prevent this by forcing configure to bypass the checking for the
existence of a gethostbyname function in libbsd.

I stumbled on this problem when I built host-mtools and later removed
libbsd to upgrade to Fedora 27, due to Bug 1504831[1]. The previously
built host/bin/mtools started to fail due to the missing libbsd.so.0.

1. https://bugzilla.redhat.com/show_bug.cgi?id=1504831

Signed-off-by: Carlos Santos <casantos@datacom.ind.br>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f5ef363732fd6092b132cc21573efafea3f1d4ac)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibevent: disable openssl for host
Baruch Siach [Tue, 28 Nov 2017 15:23:21 +0000 (17:23 +0200)]
libevent: disable openssl for host

As host-libevent does not depend on host-openssl, it might attempt to
build against the host installed openssl. This does not work very well
on various hosts. Since we don't really need encryption support in
host-libevent just disable openssl support.

Disable build of example code as we already do for the target libevent.

Should fix:
http://autobuild.buildroot.net/results/403/403886e3afc6d5d18a138f4b0651f3c5a50ed064/
http://autobuild.buildroot.net/results/a2a/a2a84692049b0fb8038f1ad4b06554ecdac32e3c/
http://autobuild.buildroot.net/results/a36/a36abb1ac556a8b50e140ea1851955744b152608/

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 66426bfbc8de807d779bc08e2a5b28566a5a4c68)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinphone: add optional dependency on libupnp
Fabrice Fontaine [Sun, 26 Nov 2017 21:26:40 +0000 (22:26 +0100)]
linphone: add optional dependency on libupnp

linphone can optionally use libupnp, so this dependency should be
accounted for in linphone.mk. In addition, linphone is not compatible
with libupnp18, but misdetects it as a a proper libupnp, causing a
build failure.

The build failure with libupnp18 currently only happens on the next
branch (because libupnp18 has only been added there), but adding the
optional dependency on libupnp makes sense for the master branch
anyway.

Fixes:

  http://autobuild.buildroot.net/results/473c686f9bc5335d25b720cf1b0c45389138a7b4

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 9e5390a20bf7019d950da3849bb305f5edf692c6)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agotor: security bump to version 0.2.9.14
Peter Korsgaard [Mon, 11 Dec 2017 09:17:22 +0000 (10:17 +0100)]
tor: security bump to version 0.2.9.14

Fixes the following securoty issues:

- CVE-2017-8819: In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before
  0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before
  0.3.1.9, the replay-cache protection mechanism is ineffective for v2 onion
  services, aka TROVE-2017-009.  An attacker can send many INTRODUCE2 cells
  to trigger this issue.

- CVE-2017-8820: In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before
  0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before
  0.3.1.9, remote attackers can cause a denial of service (NULL pointer
  dereference and application crash) against directory authorities via a
  malformed descriptor, aka TROVE-2017-010.

- CVE-2017-8821: In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before
  0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before
  0.3.1.9, an attacker can cause a denial of service (application hang) via
  crafted PEM input that signifies a public key requiring a password, which
  triggers an attempt by the OpenSSL library to ask the user for the
  password, aka TROVE-2017-011.

- CVE-2017-8822: In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before
  0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before
  0.3.1.9, relays (that have incompletely downloaded descriptors) can pick
  themselves in a circuit path, leading to a degradation of anonymity, aka
  TROVE-2017-012.

- CVE-2017-8823: In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before
  0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before
  0.3.1.9, there is a use-after-free in onion service v2 during intro-point
  expiration because the expiring list is mismanaged in certain error cases,
  aka TROVE-2017-013.

For more details, see the release notes:
https://lists.torproject.org/pipermail/tor-announce/2017-December/000147.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoFix makefile include order by using sort/wildcard.
Peter Seiderer [Tue, 21 Nov 2017 19:13:30 +0000 (20:13 +0100)]
Fix makefile include order by using sort/wildcard.

The 'include' directive in GNU make supports wildcards, but their
expansion has no defined sort order (GLOB_NOSORT is passed to glob()).
Usually this doesn't matter. However, there is at least one case where
it does make a difference: toolchain/*/*.mk includes both the
definitions of the external toolchain packages and
pkg-toolchain-external.mk, but pkg-toolchain-external.mk must be
included first.

For predictability, use ordered 'include $(sort $(wildcard ...))'
instead of unordered direct 'include */*.mk' everywhere.

Fixes [1] reported by Petr Vorel:

  make: *** No rule to make target 'toolchain-external-custom', needed by '.../build/toolchain-external/.stamp_configured'.  Stop.

[1] http://lists.busybox.net/pipermail/buildroot/2017-November/206969.html

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Tested-by: Petr Vorel <petr.vorel@gmail.com>
[Arnout: also sort the one remaining include, of the external docs]
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit b9d2d4cb4ebc7a2290c4683dd9667b8f0a9e3cdf)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoUpdate for 2017.02.8 2017.02.8
Peter Korsgaard [Mon, 27 Nov 2017 21:56:06 +0000 (22:56 +0100)]
Update for 2017.02.8

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 3.2.x series
Bernd Kuhls [Mon, 27 Nov 2017 06:22:25 +0000 (07:22 +0100)]
linux-headers: bump 3.2.x series

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit c8f0a823efdb3f195c475194dc7b3341502819c0)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/dvb-apps: fix build with some perl version
Yann E. MORIN [Mon, 27 Nov 2017 10:48:54 +0000 (11:48 +0100)]
package/dvb-apps: fix build with some perl version

perl can't find a module that is located in the current directory,
so help it locate it.

Signed-off-by: "Yann E. MORIN" <yann.morin.1998@free.fr>
Cc: Francois Perrad <francois.perrad@gadz.org>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit d8234d440024719e4df61f583b26302162dc363f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/dvb-apps: is not parallel-safe
Yann E. MORIN [Mon, 27 Nov 2017 10:48:55 +0000 (11:48 +0100)]
package/dvb-apps: is not parallel-safe

This is invisible because the timings make it excessively difficult to
hit, but the Makefile is inherently flawed for parallel build, as it
contains:

    $(objects): atsc_psip_section.c atsc_psip_section.h

    atsc_psip_section.c atsc_psip_section.h:
        perl section_generate.pl atsc_psip_section.pl

and the perl script section_generate.pl will create both the .c and .h
files in one go, but given the construct above, there can be two such
script that run in parallel, which can clobber the generated .c and/or
.h files.

So, make dvb-apps a MAKE1 package.

Signed-off-by: "Yann E. MORIN" <yann.morin.1998@free.fr>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit ba6796c7ccb856fc34a7983c9ac031168f1e0b65)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoffmpeg: bump version to 3.2.9
Peter Korsgaard [Sat, 25 Nov 2017 22:17:18 +0000 (23:17 +0100)]
ffmpeg: bump version to 3.2.9

Fixes a number of bugs, including integer/buffer overflows:

https://git.ffmpeg.org/gitweb/ffmpeg.git/shortlog/n3.2.9

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoqt5webkit: fix URL for 5.6 download
Gaël PORTAY [Fri, 24 Nov 2017 22:37:37 +0000 (17:37 -0500)]
qt5webkit: fix URL for 5.6 download

The Qt community releases are not stored under submodules path
component.

Signed-off-by: Gaël PORTAY <gael.portay@savoirfairelinux.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 7780cef53540b59816852bfb89aa0c0012a36fbc)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 3.{2, 10}.x and 4.{1, 4, 9, 13}.x series
Bernd Kuhls [Fri, 24 Nov 2017 18:15:36 +0000 (19:15 +0100)]
linux-headers: bump 3.{2, 10}.x and 4.{1, 4, 9, 13}.x series

[Peter: drop 4.13.x bump]
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 1b7b0053131d42e7f502920eae4283f1f4f6c430)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/google-breakpad: replace references to 'struct ucontext' with 'ucontext_t'
Romain Naour [Wed, 22 Nov 2017 21:08:28 +0000 (22:08 +0100)]
package/google-breakpad: replace references to 'struct ucontext' with 'ucontext_t'

In glibc, since
https://sourceware.org/git/?p=glibc.git;h=251287734e89a52da3db682a8241eb6bccc050c9
the 'struct ucontext' tag has been replaced with 'struct ucontext_t'.
The tag itself is anyway not POSIX - only the 'ucontext_t' typedef is
specified. And that type has existed since at least 1997 in glibc.

Therefore, replace references to 'struct ucontext' with 'ucontext_t',
which works in all versions of glibc, uClibc and musl.

Fixes:
[arm]     http://autobuild.buildroot.net/results/6380341dbb6c114e4452c5cda37da6b44b80d178
[aarch64] http://autobuild.buildroot.net/results/4ecf770df7c984a62082d59f8fab632d3efbe06b
[mipsel]  http://autobuild.buildroot.net/results/e1473a12cf38ccf4dd3ed0f26a8ff9e6b57f0810

Signed-off-by: Romain Naour <romain.naour@gmail.com>
[Arnout: improve commit message]
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit ca4009fc24e3a283fc44327dbd20579bde6cc323)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 13}.x series
Bernd Kuhls [Thu, 23 Nov 2017 21:10:47 +0000 (22:10 +0100)]
linux-headers: bump 4.{4, 9, 13}.x series

[Peter: drop 4.13.x bump]
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit ee6840166fb6ce195547cc1f9a0417ac1d611b19)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolocaledef: fix xlocale.h related compile failure
Peter Seiderer [Mon, 20 Nov 2017 18:36:58 +0000 (19:36 +0100)]
localedef: fix xlocale.h related compile failure

Add upstream patch 'Don't include <xlocale.h>'.

Fixes Bug-10501 ([1]):

In file included from ./include/locale.h:1:0,
                 from /usr/include/libintl.h:103,
                 from ./include/libintl.h:2,
                 from glibc/locale/programs/charmap.c:25:
glibc/locale/locale.h:146:11: fatal error: xlocale.h: No such file or directory
 # include <xlocale.h>

[1] https://bugs.busybox.net/show_bug.cgi?id=10501

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit d5cc76c5314f58fa18001e9abce196c1ac4a28d1)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agosamba4: security bump to version 4.5.15
Peter Korsgaard [Sat, 25 Nov 2017 23:30:09 +0000 (00:30 +0100)]
samba4: security bump to version 4.5.15

Fixes the following security issues:

- CVE-2017-14746:
  All versions of Samba from 4.0.0 onwards are vulnerable to a use after
  free vulnerability, where a malicious SMB1 request can be used to
  control the contents of heap memory via a deallocated heap pointer. It
  is possible this may be used to compromise the SMB server.

- CVE-2017-15275:
  All versions of Samba from 3.6.0 onwards are vulnerable to a heap
  memory information leak, where server allocated heap memory may be
  returned to the client without being cleared.

  There is no known vulnerability associated with this error, but
  uncleared heap memory may contain previously used data that may help
  an attacker compromise the server via other methods. Uncleared heap
  memory may potentially contain password hashes or other high-value
  data.

For more details, see the release notes:
https://www.samba.org/samba/history/samba-4.5.15.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibfastjson: indicate explicitly which gcc -std option to use
Thomas Petazzoni [Fri, 17 Nov 2017 15:14:16 +0000 (16:14 +0100)]
libfastjson: indicate explicitly which gcc -std option to use

This commit fixes the following build issue of libfastjson with old
enough compilers (4.8) and wchar disabled:

json_object.c: In function 'fjson_object_object_delete':
json_object.c:385:3: error: 'for' loop initial declarations are only allowed in C99 mode
   for (int i = 0 ; i < FJSON_OBJECT_CHLD_PG_SIZE ; ++i) {
   ^

The code of libfastjson requires C99. If your compiler is recent
enough (gcc 5.x), then no problem, it is C99 by default, no additional
flags are needed.

If your compiler is older (for example gcc 4.8), then -std=c99 or
-std=gnu99 is explicitly needed to tell the compiler to accept C99
constructs. Testing the compiler for the availability of such flags is
done by libfastjson configure script. However, the test program used
by the configure script uses some wchar_t types, and therefore the
test checking for C99 availability fails on toolchains with wchar
disabled. From config.log:

configure:3928: checking for /home/test/buildroot/output/host/usr/bin/i586-buildroot-linux-uclibc-gcc option to accept ISO C99
[...]
configure:4077: /home/test/buildroot/output/host/usr/bin/i586-buildroot-linux-uclibc-gcc -std=gnu99 -c -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64  -Os  -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 conftest.c >&5
conftest.c:54:3: error: unknown type name 'wchar_t'
   const wchar_t *name;
   ^

So, just like we did in libv4l in commit
f01396a158f14c53b781c35f7ff29da0bea8c8d6 ("libv4l: fix uclibc-ng
configure/compile"), let's hint directly the configure script that it
should use -std=gnu99. This fixes the build of libfastjson with old
compilers and wchar disabled.

Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 90430237ccdcc369d3e206fdd24266c0cad0dcb6)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoqt5webkit: correct download URL and hash for 5.6 variant
Peter Korsgaard [Thu, 16 Nov 2017 14:23:04 +0000 (15:23 +0100)]
qt5webkit: correct download URL and hash for 5.6 variant

Commit 06a4975d4bd03 (qt5: bump LTS version to 5.6.3) added an empty hash
for the 5.6.3 variant of qt5webkit, causing failures.

It also forgot to adjust the download URL as the qt5webkit tarballs are no
longer available under official_releases/ like the other submodules, but only
under community_releases/.

Fix both issues.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit d4a119ccc42f5b93a2e33f99438a86cc5ee1fb00)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibpjsip: fix ssl support
Adam Duskett [Tue, 14 Nov 2017 14:42:03 +0000 (09:42 -0500)]
libpjsip: fix ssl support

Currently, ssl support is implicitely disabled in the initial configure
options. This overrides the check for openssl below.

libpjsip is also currently only compatible with libopenssl. Change
the check to LIBOPENSSL instead of openssl, and depend on libopenssl.

[Peter: drop libopenssl change]
Signed-off-by: Adam Duskett <aduskett@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 9e479e65dcf1582b20433ca1b120efb66e806a04)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 13}.x series
Bernd Kuhls [Wed, 15 Nov 2017 20:13:05 +0000 (21:13 +0100)]
linux-headers: bump 4.{4, 9, 13}.x series

[Peter: drop 4.13.x bump]
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 5962717eb46f39214693d1b45c3cac2b330fca12)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/x11r7/xapp_xdriinfo: fix libgl dependency
Bernd Kuhls [Mon, 13 Nov 2017 19:23:49 +0000 (20:23 +0100)]
package/x11r7/xapp_xdriinfo: fix libgl dependency

Fixes
"mesa3d is in the dependency chain of xapp_xdriinfo that has added it
 to its _DEPENDENCIES variable without selecting it or depending on it
 from Config.in."
http://autobuild.buildroot.net/results/d8a/d8aeed2f64e21a277eb0bc5dc08d2339a14c682e/

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 6d97e73257ffb9fddb8a57dc8d2933b79b86f4b0)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibpjsip: fix static build failures due to name clash
Luca Ceresoli [Sat, 11 Nov 2017 23:06:31 +0000 (00:06 +0100)]
libpjsip: fix static build failures due to name clash

Several packages have a similar md5.c file, and each has a function
named byteReverse(). This generates link errors when building
statically ("multiple definition of `byteReverse'").

Fix by applying a patch from upstream:
  https://trac.pjsip.org/repos/changeset/5688

Fixes:
  http://autobuild.buildroot.org/results/5d7/5d72e0f8517a555399978d5a0e9f7efd0a278189/
  http://autobuild.buildroot.org/results/c47/c47ccbb9b40011cf0d79c7040bed061ddefd9629/
  http://autobuild.buildroot.org/results/419/419ab2c0e034cc68991281c51caa8271b0fadbab/

Signed-off-by: Luca Ceresoli <luca@lucaceresoli.net>
Cc: Adam Duskett <aduskett@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 8d44fb66085723b87efd8d111db50fdba7fa63ea)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoruby: security bump to version 2.4.2
Peter Korsgaard [Sun, 12 Nov 2017 13:43:11 +0000 (14:43 +0100)]
ruby: security bump to version 2.4.2

Fixed the following security issues:

CVE-2017-0898: Buffer underrun vulnerability in Kernel.sprintf
CVE-2017-10784: Escape sequence injection vulnerability in the Basic
authentication of WEBrick
CVE-2017-14033: Buffer underrun vulnerability in OpenSSL ASN1 decode
CVE-2017-14064: Heap exposure in generating JSON

For more details, see the release notes:
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-4-2-released/

Drop now upstreamed rubygems patches and add hashes for the license files
while we're at it.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f2c353054111b0398399ba1933a47d34441c875e)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/imagemagick: security bump to version 7.0.7-10
Bernd Kuhls [Sun, 12 Nov 2017 12:54:11 +0000 (13:54 +0100)]
package/imagemagick: security bump to version 7.0.7-10

Version 7.0.7-3 fixes CVE-2017-15218:
Stop potential leaks in the JNG decoder

Changelog: https://www.imagemagick.org/script/changelog.php

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 3c8dc542936484cf94efd06d96161c8a04fb17a5)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agomesa3d: fix build with BR2_SHARED_STATIC_LIBS
Fabrice Fontaine [Sun, 5 Nov 2017 10:49:58 +0000 (11:49 +0100)]
mesa3d: fix build with BR2_SHARED_STATIC_LIBS

mesa3d does not allow to enable both static and shared libraries so if
BR2_SHARED_STATIC_LIBS is set, disable static

Fixes https://bugs.busybox.net/show_bug.cgi?id=10326

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit dd09d500aa6972808b2549e4b8c7fa4e396ca91f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agovboot-utils: fix ARCH detection
Alex Suykov [Tue, 7 Nov 2017 10:17:15 +0000 (12:17 +0200)]
vboot-utils: fix ARCH detection

The package includes some target-specific code that is irrelevant
in a host package but gets built anyway. The target for this code
must be one of the supported ChromeOS targets.

Supplied Makefile apparently relies on the environment to provide
a valid target, with a simple fallback to host arch. This breaks
the build if no value is provided and the host arch is not among
the supported ones.

Should fix
http://autobuild.buildroot.net/results/d118a83b6c4f7f910d0d44c279f36251d7ba29e8/
and similar failures.

Signed-off-by: Alex Suykov <alex.suykov@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit bbb25c3ad7b66e6882508e49028d1739732bca34)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agosnmp++: security bump to v3.3.10
Adam Duskett [Wed, 8 Nov 2017 12:00:33 +0000 (07:00 -0500)]
snmp++: security bump to v3.3.10

>From the changelong:
Set the FD_CLOEXEC flag on sockets, so they are not "leaked" to
spawned processes

Signed-off-by: Adam Duskett <aduskett@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 6be1631bf27cb0d2aa6ddcbad835d614f33698e6)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/collectd: Specify FP layout based on endianness
Andrey Smirnov [Tue, 7 Nov 2017 20:04:42 +0000 (12:04 -0800)]
package/collectd: Specify FP layout based on endianness

Big-endian CPUs store floating point as big endian (at lest majority
of them do), so, in order for 'network' plugin to work correctly (and
potentially any user of htond() in collectd's codebase),
--with-fp-layout=endianflip as opposed to --with-fp-layout=nothing
needs to be specified during configuration phase.

Cc: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Cc: Arnout Vandecappelle <arnout@mind.be>
Cc: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com>
Reviewed-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit bdd8475b90fa46644149d34bf852b213ec60ce71)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopostgresql: security bump to version 9.6.6
Peter Korsgaard [Sat, 11 Nov 2017 10:44:56 +0000 (11:44 +0100)]
postgresql: security bump to version 9.6.6

Fixes the following security issues:

CVE-2017-12172: Start scripts permit database administrator to modify
root-owned files.

CVE-2017-15098: Memory disclosure in JSON functions.

CVE-2017-15099: INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT
privileges.

See the announcement for more details:
https://www.postgresql.org/about/news/1801/

While we're at it, also add a hash for the license file.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit b97353f2b50add10971e8477ad0b4cede9244578)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowebkitgtk: security bump to version 2.18.3
Adrian Perez de Castro [Fri, 10 Nov 2017 14:03:04 +0000 (16:03 +0200)]
webkitgtk: security bump to version 2.18.3

This is a maintenance release of the current stable WebKitGTK+ version,
which contains a minor rendering fix, another for the WebDriver
implementation, and security fixes for CVE-2017-13798, CVE-2017-13788,
and CVE-2017-13803.

Release notes:

    https://webkitgtk.org/2017/11/10/webkitgtk2.18.3-released.html

Signed-off-by: Adrian Perez de Castro <aperez@igalia.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 5ff18880e9647e446a3d720b7c6c74eed97ef0b4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibpjsip: security bump to 2.7.1
Adam Duskett [Thu, 9 Nov 2017 21:51:47 +0000 (16:51 -0500)]
libpjsip: security bump to 2.7.1

Also add hash for license file

See release notes for details:
https://trac.pjsip.org/repos/milestone/release-2.7.1

Signed-off-by: Adam Duskett <Adamduskett@outlook.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 4bdc4e492ba75d34d859ca15f0c21ec8078785fc)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibpjsip: bump to 2.7
Adam Duskett [Fri, 13 Oct 2017 02:42:17 +0000 (22:42 -0400)]
libpjsip: bump to 2.7

Signed-off-by: Adam Duskett <Adamduskett@outlook.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 0f6dacb37a4e97c7acea59ea7ccda932512e3ff9)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 13}.x series
Fabio Estevam [Wed, 8 Nov 2017 10:36:38 +0000 (08:36 -0200)]
linux-headers: bump 4.{4, 9, 13}.x series

[Peter: drop 4.13.x bump]
Signed-off-by: Fabio Estevam <fabio.estevam@nxp.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 2aa12565d6645b5bf85b0da8f0b736f5482f1333)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowireshark: bump version to 2.2.10 (security)
André Hentschel [Mon, 6 Nov 2017 20:53:21 +0000 (21:53 +0100)]
wireshark: bump version to 2.2.10 (security)

Security fixes since 2.2.7:

- wnpa-sec-2017-22
  Bazaar dissector infinite loop (Bug 13599) CVE-2017-9352
- wnpa-sec-2017-23
  DOF dissector read overflow (Bug 13608) CVE-2017-9348
- wnpa-sec-2017-24
  DHCP dissector read overflow (Bug 13609, Bug 13628) CVE-2017-9351
- wnpa-sec-2017-25
  SoulSeek dissector infinite loop (Bug 13631) CVE-2017-9346
- wnpa-sec-2017-26
  DNS dissector infinite loop (Bug 13633) CVE-2017-9345
- wnpa-sec-2017-27
  DICOM dissector infinite loop (Bug 13685) CVE-2017-9349
- wnpa-sec-2017-28
  openSAFETY dissector memory exhaustion (Bug 13649) CVE-2017-9350
- wnpa-sec-2017-29
  BT L2CAP dissector divide by zero (Bug 13701) CVE-2017-9344
- wnpa-sec-2017-30
  MSNIP dissector crash (Bug 13725) CVE-2017-9343
- wnpa-sec-2017-31
  ROS dissector crash (Bug 13637) CVE-2017-9347
- wnpa-sec-2017-32
  RGMP dissector crash (Bug 13646) CVE-2017-9354
- wnpa-sec-2017-33
  IPv6 dissector crash (Bug 13675) CVE-2017-9353
- wnpa-sec-2017-13
  WBMXL dissector infinite loop (Bug 13477, Bug 13796) CVE-2017-7702, CVE-2017-11410
  Note: This is an update for a fix in Wireshark 2.2.6 and 2.0.12.
- wnpa-sec-2017-28
  openSAFETY dissector memory exhaustion (Bug 13649, Bug 13755) CVE-2017-9350, CVE-2017-11411
  Note: This is an update for a fix in Wireshark 2.2.7.
- wnpa-sec-2017-34
  AMQP dissector crash. (Bug 13780) CVE-2017-11408
- wnpa-sec-2017-35
  MQ dissector crash. (Bug 13792) CVE-2017-11407
- wnpa-sec-2017-36
  DOCSIS infinite loop. (Bug 13797) CVE-2017-11406
- wnpa-sec-2017-38
  MSDP dissector infinite loop (Bug 13933)
- wnpa-sec-2017-39
  Profinet I/O buffer overrun (Bug 13847)
- wnpa-sec-2017-41
  IrCOMM dissector buffer overrun (Bug 13929)

Full release notes:

  https://www.wireshark.org/docs/relnotes/wireshark-2.2.10.html

Signed-off-by: André Hentschel <nerv@dawncrow.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 708316f49fd08170e75d9c9eab61a4b3b1280bc9)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowireshark: bump version to 2.2.7 (security)
Vicente Olivert Riera [Fri, 2 Jun 2017 10:28:53 +0000 (11:28 +0100)]
wireshark: bump version to 2.2.7 (security)

Security fixes:

- wnpa-sec-2017-22
  Bazaar dissector infinite loop (Bug 13599) CVE-2017-9352
- wnpa-sec-2017-23
  DOF dissector read overflow (Bug 13608) CVE-2017-9348
- wnpa-sec-2017-24
  DHCP dissector read overflow (Bug 13609, Bug 13628) CVE-2017-9351
- wnpa-sec-2017-25
  SoulSeek dissector infinite loop (Bug 13631) CVE-2017-9346
- wnpa-sec-2017-26
  DNS dissector infinite loop (Bug 13633) CVE-2017-9345
- wnpa-sec-2017-27
  DICOM dissector infinite loop (Bug 13685) CVE-2017-9349
- wnpa-sec-2017-28
  openSAFETY dissector memory exhaustion (Bug 13649) CVE-2017-9350
- wnpa-sec-2017-29
  BT L2CAP dissector divide by zero (Bug 13701) CVE-2017-9344
- wnpa-sec-2017-30
  MSNIP dissector crash (Bug 13725) CVE-2017-9343
- wnpa-sec-2017-31
  ROS dissector crash (Bug 13637) CVE-2017-9347
- wnpa-sec-2017-32
  RGMP dissector crash (Bug 13646) CVE-2017-9354
- wnpa-sec-2017-33
  IPv6 dissector crash (Bug 13675) CVE-2017-9353

Full release notes:

  https://www.wireshark.org/docs/relnotes/wireshark-2.2.7.html

Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit c87443e65e0d25e88868d75cefba5cd901130925)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agogstreamer: needs dynamic libraries
Arnout Vandecappelle (Essensium/Mind) [Sun, 5 Nov 2017 20:31:22 +0000 (21:31 +0100)]
gstreamer: needs dynamic libraries

Fixes:
http://autobuild.buildroot.net/results/49d/49dcec0bd2f3bb78c18675a9fa5c9c53cc183fd2/

g_cclosure_marshal_VOID__VOID is defined both in libgobject.a and
libgstreamer.a. It is probably possible to fix this, but gstreamer0.10
has been deprecated for a long time now and is anyway unlikely to be
used in static-only situations, so let's just require dynamic linking.

Propagate to the reverse dependencies. opencv3 already did depend on
dynamic libs.

[Peter: add autobuild reference]
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 0eee5465e51229c4c17d7930ca2095caace4f8d2)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agosuport/download: force svn to be non-interactive
Yann E. MORIN [Fri, 3 Nov 2017 21:22:16 +0000 (22:22 +0100)]
suport/download: force svn to be non-interactive

Fixes:
    http://autobuild.buildroot.org/results/2af/2af7412846c576089f8596857ab8c81ac31c1bed/

Signed-off-by: "Yann E. MORIN" <yann.morin.1998@free.fr>
Cc: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Cc: André Hentschel <nerv@dawncrow.de>
Reviewed-by: André Hentschel <nerv@dawncrow.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 4013f11a5b71f238b36f45dcdeb46b7f7a01e600)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibglib2: needs autoreconf
Thomas Petazzoni [Tue, 17 Oct 2017 19:46:48 +0000 (21:46 +0200)]
libglib2: needs autoreconf

Patch 0002-disable-tests.patch modifies Makefile.am, so we have to
autoreconf. It hasn't been seen until now, but becomes very clear
since the bump of automake to 1.15.1, as we're seeing build failures
such as:

configure.ac:66: error: version mismatch.  This is Automake 1.15.1,
configure.ac:66: but the definition used by this AM_INIT_AUTOMAKE
configure.ac:66: comes from Automake 1.15.  You should recreate
configure.ac:66: aclocal.m4 with aclocal and run automake again.

Fixes:

  http://autobuild.buildroot.net/results/3402357d8e90f1866dfeaee7bb61119d80dc8bcb/

Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 45fbec12e79dfd8416b20afa4c2590aecd3ddc5d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/libplist: needs threads
Bernd Kuhls [Sun, 12 Nov 2017 09:00:00 +0000 (10:00 +0100)]
package/libplist: needs threads

Upstream added a mandatory pthread check:
https://github.com/libimobiledevice/libplist/commit/eec2e855b4f192cb1808d1f02b6bc8935a979025

Fixes
http://autobuild.buildroot.net/results/863/863bb43db222f8e63d60b1fc4a53299575727de1/

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit dbd9915caa884073e4a644086a5783fb687d76f0)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/libplist: security bump to version 2.0.0
Bernd Kuhls [Sun, 5 Nov 2017 14:58:52 +0000 (15:58 +0100)]
package/libplist: security bump to version 2.0.0

Release notes:
https://github.com/libimobiledevice/libplist/blob/master/NEWS

This version bump fixes
  * CVE-2017-6440
  * CVE-2017-6439
  * CVE-2017-6438
  * CVE-2017-6437
  * CVE-2017-6436
  * CVE-2017-6435
  * CVE-2017-5836
  * CVE-2017-5835
  * CVE-2017-5834
  * CVE-2017-5545
  * CVE-2017-5209
... and several others that didn't receive any CVE (yet).

The dependency to libxml2 was removed.
Autoreconf is not needed anymore, the upstream tarball includes a
configure script.

[Peter: also drop host-pkgconf dependency, only used for cython]
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 4c3820248761c279e3c8f9839e5b24c8b39891fd)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoluajit: only available on x86(-64) hosts
Peter Korsgaard [Thu, 2 Nov 2017 10:45:19 +0000 (11:45 +0100)]
luajit: only available on x86(-64) hosts

The -m32 compiler flag is used for 32bit builds and host-luajit has
limited architecture support. Building for a 32-bit target on a 32-bit
host should always work, but we haven't tested that and it's very
unlikely that someone needs it. So just limit to x86(-64) hosts.

Fixes:
http://autobuild.buildroot.net/results/5f5b5edb058efe976c003678e21bcc28a87cc828/

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
[Arnout: clarify that it might work on 32-bit hosts for a 32-bit target]
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit 9b9347ee9f8e531dd177b437e8ea5387e29fc35e)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoti-gfx: only available on x86(-64) hosts
Peter Korsgaard [Thu, 2 Nov 2017 10:45:18 +0000 (11:45 +0100)]
ti-gfx: only available on x86(-64) hosts

ti-gfx is provided as a x86 self extracting executable, so it is only
available on x86(-64) hosts.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit e480e88169160ad2d2972c949336a668e122af98)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopython-config.sh: don't reassign ${prefix}
Matt Weber [Wed, 18 Oct 2017 16:55:23 +0000 (11:55 -0500)]
python-config.sh: don't reassign ${prefix}

When prefix is set to a path like /usr during crossbuild
the sed operations end up executing twice, once for the prefix
reassignment and another for includedir if it is set as a string
including the ${prefix} variable.  This results in an issue
when the build directory is under /usr.

This patch updates the remaining location which uses the prefix
variable to also sed and update to use the real path.

Upstream bug report:
https://bugs.python.org/issue31713

Buildroot bug:
https://bugs.busybox.net/show_bug.cgi?id=10361

Fixes failures like the following:
dbus-python-1.2.4 | NOK | http://autobuild.buildroot.net/results/758858efa97b6273c1b470513f5492258a6d8853

Signed-off-by: Matthew Weber <matthew.weber@rockwellcollins.com>
[Arnout: refer to autobuild failures that still exist]
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit 04d1699ba4cecaa77f688b4effbcac5e84419b15)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agocore/reproducible: do not override SOURCE_DATE_EPOCH
Yann E. MORIN [Sun, 5 Nov 2017 09:14:56 +0000 (10:14 +0100)]
core/reproducible: do not override SOURCE_DATE_EPOCH

SOURCE_DATE_EPOCH is currently forcibly set (to either the git commit
date, or the last release date).

However, the spec mandates that it should not be modified if already
set: https://reproducible-builds.org/specs/source-date-epoch/

    Build systems MUST NOT overwrite this variable for child
    processes to consume if it is already present.

Abide by the rule, and only set it if not already set.

This will allow users to pass it from an upper-layer buildsystem (e.g. a
jenkins or gitlab-ci job, for example), when they have a reson to do so.

Reported-by: Peter Korsgaard <peter@korsgaard.com>
Reported-by: Einar Jón Gunnarsson <tolvupostur@gmail.com>
Signed-off-by: "Yann E. MORIN" <yann.morin.1998@free.fr>
Cc: Peter Korsgaard <peter@korsgaard.com>
Cc: Einar Jón Gunnarsson <tolvupostur@gmail.com>
Cc: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Cc: Arnout Vandecappelle <arnout@mind.be>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 0437d2f8f6ef8c10b529c154f4534453ce34607b)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/openssl: security bump to version 1.0.2m
Bernd Kuhls [Fri, 3 Nov 2017 18:33:59 +0000 (19:33 +0100)]
package/openssl: security bump to version 1.0.2m

Fixes the following CVEs:
bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)
Malformed X.509 IPAddressFamily could cause OOB read (CVE-2017-3735)

Release notes: https://www.openssl.org/news/secadv/20171102.txt

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 63023c407fe601d7c349fbff1ef1fbb246b1e288)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/openssl: bump verstion to 1.0.2l
Bernd Kuhls [Sun, 28 May 2017 10:47:48 +0000 (12:47 +0200)]
package/openssl: bump verstion to 1.0.2l

According to https://www.openssl.org/news/newslog.html this release
does not contain security fixes.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 0b4f96335b9597ec68c4e560d5eae8ae605cf9ef)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 13}.x series
Fabio Estevam [Thu, 2 Nov 2017 14:18:12 +0000 (12:18 -0200)]
linux-headers: bump 4.{4, 9, 13}.x series

[Peter: drop 4.13.x bump]
Signed-off-by: Fabio Estevam <fabio.estevam@nxp.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 64b0cd16dcd509249da2f80dcad3ed0975251672)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoargp-standalone: fix build with gcc 7.x
Matt Weber [Tue, 31 Oct 2017 06:18:34 +0000 (01:18 -0500)]
argp-standalone: fix build with gcc 7.x

Back in commit a662ff7e79630ca0875dd8529fe54db27a275007
("package/argp-standalone: Fix build with c99 compilers"), we fixed
the build of argp-standalone with compilers defaulting to C99 inline
semantics, i.e starting from gcc 5.x.

This was done as part of a patch that used "inline" instead of "extern
inline". However, using "inline" once again broke the build with gcc
7.x. To fix this, revert back to using just "extern inline" (hence
removing a patch of patch 0003-fix_build_with_c99_compilers.patch) and
instead use -fgnu89-inline in the CFLAGS.

See https://gcc.gnu.org/gcc-5/porting_to.html for more details.

Fixes:

  http://autobuild.buildroot.net/results/a9cedc54829b7bd2dd7ae6ff2bd6c6db242f1c35/

Signed-off-by: Matthew Weber <matthew.weber@rockwellcollins.com>
[Thomas: also drop the patch of
0003-fix_build_with_c99_compilers.patch that is no longer needed.]
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit f0b65bd90ce4429d6b7e952ce7de2d5f92a2dd26)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoquagga: add upstream security fix for CVE-2017-16227
Peter Korsgaard [Mon, 30 Oct 2017 21:53:09 +0000 (22:53 +0100)]
quagga: add upstream security fix for CVE-2017-16227

>From the advisory:
http://www.openwall.com/lists/oss-security/2017/10/30/4

It was discovered that the bgpd daemon in the Quagga routing suite does
not properly calculate the length of multi-segment AS_PATH UPDATE
messages, causing bgpd to drop a session and potentially resulting in
loss of network connectivity.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit d77d7220a7ced8daa89e3e0aa0090a4e60074001)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoopenssh: fix getpagesize() related static linking issue
Peter Korsgaard [Mon, 30 Oct 2017 22:45:55 +0000 (23:45 +0100)]
openssh: fix getpagesize() related static linking issue

Fixes:
http://autobuild.buildroot.net/results/8cc/8cc30818a400c7a392a3de787cabc9cd8425495f/

The configure script checks for getpagesize() and sets HAVE_GETPAGESIZE in
config.h, but bsd-getpagesize.c forgot to include includes.h (which
indirectly includes config.h) so the checks always fails, causing linker
issues when linking statically on systems with getpagesize().

Fix it by including includes.h.

Patch submitted upstream:
https://lists.mindrot.org/pipermail/openssh-unix-dev/2017-October/036413.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit cc856401e8ac6a2c7a8767737b73dde933a5798a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoapr-util: security bump to version 1.6.1
Baruch Siach [Mon, 30 Oct 2017 19:11:02 +0000 (21:11 +0200)]
apr-util: security bump to version 1.6.1

Fixes CVE-2017-12618: Out-of-bounds access in corrupted SDBM database.

Switch to bz2 compressed tarball.

Use upstream provided SHA256 hash.

Add license hash.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 1d3c611dee82090d9456730e24af368b51dcb4a9)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoapr: security bump to version 1.6.3
Baruch Siach [Mon, 30 Oct 2017 19:11:01 +0000 (21:11 +0200)]
apr: security bump to version 1.6.3

Fixes CVE-2017-12613: Out-of-bounds array deref in apr_time_exp*()
functions.

Use upstream provided SHA256 hash.

Add license has.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit c91981a985108a83bfeca1a61a4457b5ac785574)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoapr: bump version to 1.6.2
Adam Duskett [Wed, 21 Jun 2017 20:30:57 +0000 (16:30 -0400)]
apr: bump version to 1.6.2

Signed-off-by: Adam Duskett <aduskett@codeblue.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit d56868011b521df802cd171b4f39e56120585396)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/apr: bump version to 1.5.2
Bernd Kuhls [Sun, 21 May 2017 15:21:04 +0000 (17:21 +0200)]
package/apr: bump version to 1.5.2

Rebased patch 0001 and changed _SOURCE to .tar.bz2.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 614da9ef8a7847ec511e5962cd34a2fdcc0d5b13)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/python-pyqt5: fix build with Qt 5.6.3
Scott Ellis [Sun, 29 Oct 2017 08:15:49 +0000 (04:15 -0400)]
package/python-pyqt5: fix build with Qt 5.6.3

This commit adds 5_6_3 to the Timeline patch that fixed the build with
Qt 5.6.2.

Signed-off-by: Scott Ellis <scott@jumpnowtek.com>
[Thomas: adjust patch existing patch description.]
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 063b2a8121530d72389ca5a3aad7c9647f5a5c5b)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoqt5: bump LTS version to 5.6.3
Peter Seiderer [Fri, 20 Oct 2017 18:41:10 +0000 (20:41 +0200)]
qt5: bump LTS version to 5.6.3

qt5base:
  - move hash file to 5.6.3
  - move 0001-eglfs-rasp-pi-header-inclusion.patch to 5.6.3
  - remove 0002-eglfs-fix-eglfs_mali-compile-for-odroid-mali.patch (upstream committed [1])

qt5declarative:
  - move patches to 5.6.3

qt5quickcontrols2:
  - move hash file to 5.6.3

qt5webkit:
  - move patches to 5.6.3

[1] http://code.qt.io/cgit/qt/qtbase.git/commit/?h=5.6&id=f1b4bd4790860e1ff5afcec111a359bc3a91cfda

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 06a4975d4bd030ab3cf291d18fa36a39cb58cc89)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoUpdate for 2017.02.7 2017.02.7
Peter Korsgaard [Sat, 28 Oct 2017 18:55:26 +0000 (20:55 +0200)]
Update for 2017.02.7

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoRevert "musl: add upstream security fix for CVE-2017-15650"
Peter Korsgaard [Sat, 28 Oct 2017 18:47:31 +0000 (20:47 +0200)]
Revert "musl: add upstream security fix for CVE-2017-15650"

This reverts commit 5a9013c6d1203f107b64d7003e7621e75b3972af.

This patch was already added by commit 4c05a1fd669be68, no need to add it
twice.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowget: add optional zlib support
Peter Korsgaard [Fri, 27 Oct 2017 12:18:58 +0000 (14:18 +0200)]
wget: add optional zlib support

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit aff7673602d21b599470227edf323e72831dd3eb)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowget: security bump to version 1.19.2
Peter Korsgaard [Fri, 27 Oct 2017 12:02:08 +0000 (14:02 +0200)]
wget: security bump to version 1.19.2

Fixes the following security issues:

CVE-2017-13089: The http.c:skip_short_body() function is called in some
circumstances, such as when processing redirects.  When the response is sent
chunked, the chunk parser uses strtol() to read each chunk's length, but
doesn't check that the chunk length is a non-negative number.  The code then
tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but
ends up passing the negative chunk length to connect.c:fd_read().  As
fd_read() takes an int argument, the high 32 bits of the chunk length are
discarded, leaving fd_read() with a completely attacker controlled length
argument.

CVE-2017-13090: The retr.c:fd_read_body() function is called when processing
OK responses.  When the response is sent chunked, the chunk parser uses
strtol() to read each chunk's length, but doesn't check that the chunk
length is a non-negative number.  The code then tries to read the chunk in
pieces of 8192 bytes by using the MIN() macro, but ends up passing the
negative chunk length to retr.c:fd_read().  As fd_read() takes an int
argument, the high 32 bits of the chunk length are discarded, leaving
fd_read() with a completely attacker controlled length argument.  The
attacker can corrupt malloc metadata after the allocated buffer.

Drop now upstreamed patch and change to .tar.lz as .tar.xz is no longer
available.

Also add a hash for the license file while we're at it.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 86eb94636e0dcfaf332ba808eeee04a61b13af60)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 13}.x series
Bernd Kuhls [Sat, 28 Oct 2017 06:52:48 +0000 (08:52 +0200)]
linux-headers: bump 4.{4, 9, 13}.x series

[Peter: drop 4.13.x bump]
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit ec2851f4b97b19ab386e6f8d7ca52c277c2cee91)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowebkitgtk: security bump to version 2.18.2
Adrian Perez de Castro [Fri, 27 Oct 2017 16:10:33 +0000 (19:10 +0300)]
webkitgtk: security bump to version 2.18.2

This is a maintenance release of the current stable WebKitGTK+ version,
which contains bugfixes; mostly for crashes and rendering issues, plus
one important fix for the layout or Arabic text.

Release notes:

    https://webkitgtk.org/2017/10/27/webkitgtk2.18.2-released.html

Even though an acconpanying security advisory has not been published
for this release, the release contains fixes for several crashes (one
of them for the decoder of the very common GIF image format), which
arguably can be considered potential security issues.

Signed-off-by: Adrian Perez de Castro <aperez@igalia.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit e3459fd9c5cc4ddb04d22b534ef66b441e1aea71)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoopenssh: security bump to version 7.6p1
Peter Korsgaard [Thu, 26 Oct 2017 12:52:47 +0000 (14:52 +0200)]
openssh: security bump to version 7.6p1

Fixes CVE-2017-15906 - The process_open function in sftp-server.c in OpenSSH
before 7.6 does not properly prevent write operations in readonly mode,
which allows attackers to create zero-length files.

For more details, see the release notes:
https://www.openssh.com/txt/release-7.6

Also add a hash for the license file while we're at it.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 70663a9a4fcb9211fcef7668a8a35de11cc54775)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoopenssh: don't download patch from Github
Thomas Petazzoni [Sun, 2 Jul 2017 16:53:31 +0000 (18:53 +0200)]
openssh: don't download patch from Github

Patches downloaded from Github are not stable, so bring them in the
tree.

Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 4e7522aacd4e76c0ab5e602ade9a60f5a4473939)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoredis: bump to version 3.2.11
Peter Korsgaard [Thu, 26 Oct 2017 12:44:15 +0000 (14:44 +0200)]
redis: bump to version 3.2.11

3.2.11 fixes important issues. From the release notes:

================================================================================
Redis 3.2.11     Released Thu Sep 21 15:47:53 CEST 2017
================================================================================

Upgrade urgency HIGH: Potentially critical bugs fixed.

AOF flush on SHUTDOWN did not cared to really write the AOF buffers
(not in the kernel but in the Redis process memory) to disk before exiting.
Calling SHUTDOWN during traffic resulted into not every operation to be
persisted on disk.

Also add a hash for the license file while we're at it.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 751cd4cfab88ff15143d13eccf87f982a274e4e3)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoredis: bump version to 3.2.9
Vicente Olivert Riera [Thu, 18 May 2017 10:32:34 +0000 (11:32 +0100)]
redis: bump version to 3.2.9

Remove sha1 hash. Upstream provides now a sha256 hash.

Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 34761b2c409cf4bfd8be46e2e531adeafb39b742)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agosdl2: security bump to version 2.0.7
Peter Korsgaard [Thu, 26 Oct 2017 12:18:43 +0000 (14:18 +0200)]
sdl2: security bump to version 2.0.7

Fixes CVE-2017-2888 - An exploitable integer overflow vulnerability exists
when creating a new RGB Surface in SDL 2.0.5.  A specially crafted file can
cause an integer overflow resulting in too little memory being allocated
which can lead to a buffer overflow and potential code execution.  An
attacker can provide a specially crafted image file to trigger this
vulnerability.

Also add a hash for the license file while we're at it.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 07a9f0200cfd1c34f33e8054f62b990d05ccb934)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agosdl2: explicitly disable raspberry pi video backend
Peter Korsgaard [Wed, 25 Oct 2017 16:03:26 +0000 (18:03 +0200)]
sdl2: explicitly disable raspberry pi video backend

Fixes:
http://autobuild.buildroot.net/results/d59/d5992dcc9a49ee77afaebdcc9448ac1868fa7de1/
http://autobuild.buildroot.net/results/e89/e894f21ce1983ee3bd8d65a8e59e1adab9a62707/

The configure script automatically enables support for the raspberry pi
video backend if it detects the rpi-userland package.  Unfortunately it
hardcodes a number of include/linker paths unsuitable for cross compilation,
breaking the build:

    if test x$enable_video = xyes -a x$enable_video_rpi = xyes; then
..
     RPI_CFLAGS="-I/opt/vc/include -I/opt/vc/include/interface/vcos/pthreads -I/opt/vc/include/interface/vmcs_host/linux"
     RPI_LDFLAGS="-L/opt/vc/lib -lbcm_host"
    fi

So explicitly disable it until the configure script is fixed.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 3a798acf239dee04d573f575337bf823c13020fd)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agosdl2: Bump version to 2.0.6
Olivier Schonken [Sun, 1 Oct 2017 18:46:00 +0000 (20:46 +0200)]
sdl2: Bump version to 2.0.6

Bump version and remove patches that were merged upstream

Signed-off-by: Olivier Schonken <olivier.schonken@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 380093238674031d51c56abb0a2a22f721504931)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibcurl: security bump to version 7.56.1
Peter Korsgaard [Mon, 23 Oct 2017 23:13:17 +0000 (01:13 +0200)]
libcurl: security bump to version 7.56.1

Fixes CVE-2017-1000257 - IMAP FETCH response out of bounds read

https://curl.haxx.se/docs/adv_20171023.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 62d4dd2999a0446c2b868a7c6fbcc764a470493d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoirssi: security bump to version 1.0.5
Peter Korsgaard [Mon, 23 Oct 2017 23:08:36 +0000 (01:08 +0200)]
irssi: security bump to version 1.0.5

Fixes the following security issues:

(a) When installing themes with unterminated colour formatting
    sequences, Irssi may access data beyond the end of the
    string. (CWE-126) Found by Hanno Böck.

    CVE-2017-15228 was assigned to this issue.

(b) While waiting for the channel synchronisation, Irssi may
    incorrectly fail to remove destroyed channels from the query list,
    resulting in use after free conditions when updating the state
    later on. Found by Joseph Bisch. (CWE-416 caused by CWE-672)

    CVE-2017-15227 was assigned to this issue.

(c) Certain incorrectly formatted DCC CTCP messages could cause NULL
    pointer dereference. Found by Joseph Bisch. This is a separate,
    but similar issue to CVE-2017-9468. (CWE-690)

    CVE-2017-15721 was assigned to this issue.

(d) Overlong nicks or targets may result in a NULL pointer dereference
    while splitting the message. Found by Joseph Bisch. (CWE-690)

    CVE-2017-15723 was assigned to this issue.

(e) In certain cases Irssi may fail to verify that a Safe channel ID
    is long enough, causing reads beyond the end of the string. Found
    by Joseph Bisch. (CWE-126)

    CVE-2017-15722 was assigned to this issue.

For more details, see the advisory:
https://irssi.org/security/irssi_sa_2017_10.txt

While we're at it, also add a hash for the license file.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit a9a4ec0dcce4500319e00e7d875414d6bc6606fa)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agonodejs: security bump to version 6.11.5
Peter Korsgaard [Wed, 25 Oct 2017 20:16:13 +0000 (22:16 +0200)]
nodejs: security bump to version 6.11.5

Fixes CVE-2017-14919 - In zlib v1.2.9, a change was made that causes an
error to be raised when a raw deflate stream is initialized with windowBits
set to 8.  On some versions this crashes Node and you cannot recover from
it, while on some versions it throws an exception.  Node.js will now
gracefully set windowBits to 9 replicating the legacy behavior to avoid a
DOS vector.

For more details, see the announcement:
https://nodejs.org/en/blog/vulnerability/oct-2017-dos/

Drop 0002-inspector-don-t-build-when-ssl-support-is-disabled.patch as that
is now upstream:

https://github.com/nodejs/node/commit/ba23506419

And refresh the other patches.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 13}.x series
Bernd Kuhls [Sun, 22 Oct 2017 17:04:11 +0000 (19:04 +0200)]
linux-headers: bump 4.{4, 9, 13}.x series

[Peter: drop 4.13.x bump]
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f7479f4c818f335332fdca128d7d4f3e5e7c02ac)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{1, 4, 9, 13}.x series
Bernd Kuhls [Thu, 19 Oct 2017 17:34:02 +0000 (19:34 +0200)]
linux-headers: bump 4.{1, 4, 9, 13}.x series

[Peter: drop 4.13.x bump]
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 60e3da602d3d5b017b5176848abcba92866df3f3)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibffi: add patch to fix MIPS support
Mauro Condarelli [Fri, 21 Apr 2017 10:33:08 +0000 (12:33 +0200)]
libffi: add patch to fix MIPS support

Building Python 3.x on MIPS with musl fails because the libffi code
uses a "#ifdef linux" test to decide if we're building on Linux or
not. When building with -std=c99, "linux" is not defined, so instead
of including <asm/sgidefs.h>, libffi's code tries to include
<sgidefs.h>, which doesn't exist on musl.

The right fix is to use __linux__, which is POSIX compliant, and
therefore defined even when -std=c99 is used.

Note that glibc and uClibc were not affected because they do provide a
<sgidefs.h> header in addition to the <asm/sgidefs.h> one.

Signed-off-by: Mauro Condarelli <mc5686@mclink.it>
[Thomas: reformat patch with Git, add a better commit log and description.]
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 4852f05907cd365825f37c283a415a77ba1fcba9)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoAdd DEPENDENCIES_HOST_PREREQ to the list of packages
Alfredo Alvarez Fernandez [Fri, 28 Apr 2017 09:35:21 +0000 (11:35 +0200)]
Add DEPENDENCIES_HOST_PREREQ to the list of packages

That way packages included in that list like ccache will also be
regarded as a normal packages for targets like external-deps,
show-targets or legal-info

Signed-off-by: Alfredo Alvarez Fernandez <alfredo.alvarez_fernandez@nokia.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit 862b76cfefc101943f09db2a73f5519f9a5bb2cb)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agodependencies: always use HOSTCC_NOCACHE for DEPENDENCIES_HOST_PREREQ
Alfredo Alvarez Fernandez [Fri, 28 Apr 2017 09:35:20 +0000 (11:35 +0200)]
dependencies: always use HOSTCC_NOCACHE for DEPENDENCIES_HOST_PREREQ

Currently, HOSTCC and HOSTCXX are set to their _NOCACHE variants in the
'dependencies' target. This is needed because at that time, ccache is
not built yet - host-ccache is one of the dependencies. However, because
this override is only specified for the 'dependencies' target (and
thereby gets inherited by its dependencies), the override is only
applied when the package is reached through the 'dependencies' target.
This is not the case when one of DEPENDENCIES_HOST_PREREQ is built
directly from the command line, e.g. when doing 'make host-ccache'. So
in that case, ccache will be built with ccache... which fails of
course.

To fix this, directly apply the override to the DEPENCIES_HOST_PREREQ
targets.

Note that this only fixes the issue for 'make host-ccache', NOT for
e.g. 'make host-ccache-configure'.

Signed-off-by: Alfredo Alvarez Fernandez <alfredo.alvarez_fernandez@nokia.com>
[Arnout: improve commit message]
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit 36d398ac30f35ca9d4405a9dee2b33560ec3595d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolame: security bump to version 3.100
Peter Korsgaard [Sun, 22 Oct 2017 11:15:08 +0000 (13:15 +0200)]
lame: security bump to version 3.100

Fixes the following security issues:

CVE-2017-9410: fill_buffer_resample function in libmp3lame/util.c heap-based
buffer over-read and ap

CVE-2017-9411: fill_buffer_resample function in libmp3lame/util.c invalid
memory read and application crash

CVE-2017-9412: unpack_read_samples function in frontend/get_audio.c invalid
memory read and application crash

Drop patches now upstream or no longer needed:

0001-configure.patch: Upstream as mentioned in patch description

0002-gtk1-ac-directives.patch: Upstream as mentioned in patch
description/release notes:

Resurrect Owen Taylor's code dated from 97-11-3 to properly deal with GTK1.
This was transplanted back from aclocal.m4 with a patch provided by Andres
Mejia. This change makes it easy to regenerate autotools' files with a simple
invocation of autoconf -vfi.

0003-msse.patch: Not needed as -march <x86-variant-with-msse-support>
nowadays implies -msse.

With these removed, autoreconf is no longer needed.

Also add a hash for the license file while we're at it.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 7e3583dd558925a447eaa4367d659f39482fbbc0)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agomusl: add upstream security fix for CVE-2017-15650
Peter Korsgaard [Sat, 21 Oct 2017 19:12:59 +0000 (21:12 +0200)]
musl: add upstream security fix for CVE-2017-15650

>From the upstream announcement:
http://www.openwall.com/lists/oss-security/2017/10/19/5

Felix Wilhelm has discovered a flaw in the dns response parsing for
musl libc 1.1.16 that leads to overflow of a stack-based buffer.
Earlier versions are also affected.

When an application makes a request via getaddrinfo for both IPv4 and
IPv6 results (AF_UNSPEC), an attacker who controls or can spoof the
nameservers configured in resolv.conf can reply to both the A and AAAA
queries with A results. Since A records are smaller than AAAA records,
it's possible to fit more addresses than the precomputed bound, and a
buffer overflow occurs.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 209f42fd3a5f4357e22fb72f1597a6868566aabd)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/go: fix cross-compilation settings
Angelo Compagnucci [Mon, 16 Oct 2017 17:08:45 +0000 (19:08 +0200)]
package/go: fix cross-compilation settings

This patch fixes a bug with the BR2_TOOLCHAIN_HAS_THREADS variable
handling which causes CGO_ENABLED to be always 0.

Furthermore, it fixes the cross compilation options for the go
compiler: setting CGO_ENABLED should be done only for the target
compiler not the host one.

Signed-off-by: Angelo Compagnucci <angelo.compagnucci@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Acked-by: Christian Stewart <christian@paral.in>
(cherry picked from commit 80ea21bc3c2147adf810731b0b242e94a3ad294e)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowebkitgtk: security bump to version 2.18.1
Adrian Perez de Castro [Wed, 18 Oct 2017 23:07:06 +0000 (02:07 +0300)]
webkitgtk: security bump to version 2.18.1

This is a maintenance release of the current stable WebKitGTK+ version,
which contains bugfixes (many of them related to rendering, plus one
important fix for touch input) and many security fixes.

Release notes:

    https://webkitgtk.org/2017/10/18/webkitgtk2.18.1-released.html

Fixes CVE-2017-7081, CVE-2017-7087, CVE-2017-7089, CVE-2017-7090,
CVE-2017-7091, CVE-2017-7092, CVE-2017-7093, CVE-2017-7094,
CVE-2017-7095, CVE-2017-7096, CVE-2017-7098, CVE-2017-7099,
CVE-2017-7100, CVE-2017-7102, CVE-2017-7104, CVE-2017-7107,
CVE-2017-7109, CVE-2017-7111, CVE-2017-7117, CVE-2017-7120,
CVE-2017-7142:

    https://webkitgtk.org/security/WSA-2017-0008.html

Signed-off-by: Adrian Perez de Castro <aperez@igalia.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 6d623e72770534c8e40e5afd7aa8fb77e49d1974)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowebkitgtk: update to version 2.18.0
Adrian Perez de Castro [Wed, 13 Sep 2017 16:51:20 +0000 (19:51 +0300)]
webkitgtk: update to version 2.18.0

Release notes:
    https://webkitgtk.org/2017/09/11/webkitgtk2.18.0-released.html

No corresponding WebKit Security Advisory (WSA) has been published.

All patches have been applied upstream.

This also bumps the required target GCC version, due to the WebKit code
now using more modern C++ features which were introduced in version
5.x of the compiler.

Signed-off-by: Adrian Perez de Castro <aperez@igalia.com>
[Arnout:
 - propagate dependency to midori;
 - mention in commit message why patches were removed.]
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit 905b1ab5c21f39f9cd1777f6d5745c90d863da4b)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoConfig.in: fix help comment for gcc optimization
Lothar Felten [Fri, 20 Oct 2017 11:19:17 +0000 (13:19 +0200)]
Config.in: fix help comment for gcc optimization

The default for is set to BR2_OPTIMIZE_S, the help comment designated
BR2_OPTIMIZE_0 as default.
Changed the help comment to show that BR2_OPTIMIZE_S is the default.

Signed-off-by: Lothar Felten <lothar.felten@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 4e09fd8bdef6ddea1097f91df07515abde389cd0)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoxen: add upstream post-4.7.3 security fix for XSA-245
Peter Korsgaard [Sat, 21 Oct 2017 16:24:37 +0000 (18:24 +0200)]
xen: add upstream post-4.7.3 security fix for XSA-245

Fixes XA-245: ARM: Some memory not scrubbed at boot

https://xenbits.xenproject.org/xsa/advisory-245.html

Notice: Not applying XSA-237..244 as they are x86 only and have patch file
name conflicts between 2017.02.x and master.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>