]> rtime.felk.cvut.cz Git - coffee/buildroot.git/log
coffee/buildroot.git
6 years agoUpdate for 2017.02.11 origin/2017.02.x 2017.02.11
Peter Korsgaard [Wed, 11 Apr 2018 19:08:40 +0000 (21:08 +0200)]
Update for 2017.02.11

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowireshark: bump version to 2.2.14 (security)
André Hentschel [Sat, 7 Apr 2018 12:59:03 +0000 (14:59 +0200)]
wireshark: bump version to 2.2.14 (security)

Security fixes since 2.2.12:

- wnpa-sec-2018-15
  The MP4 dissector could crash. (Bug 13777)
- wnpa-sec-2018-16
  The ADB dissector could crash. (Bug 14460)
- wnpa-sec-2018-17
  The IEEE 802.15.4 dissector could crash. (Bug 14468)
- wnpa-sec-2018-18
  The NBAP dissector could crash. (Bug 14471)
- wnpa-sec-2018-19
  The VLAN dissector could crash. (Bug 14469)
- wnpa-sec-2018-20
  The LWAPP dissector could crash. (Bug 14467)
- wnpa-sec-2018-23
  The Kerberos dissector could crash. (Bug 14576)
- wnpa-sec-2018-05
  The IEEE 802.11 dissector could crash. Bug 14442, CVE-2018-7335
- wnpa-sec-2018-06
  Multiple dissectors could go into large infinite loops. All ASN.1 BER dissectors (Bug 14444), along with the DICOM (Bug 14411), DMP (Bug 14408), LLTD (Bug 14419), OpenFlow (Bug 14420), RELOAD (Bug 14445), RPCoRDMA (Bug 14449), RPKI-Router (Bug 14414), S7COMM (Bug 14423), SCCP (Bug 14413), Thread (Bug 14428), Thrift (Bug 14379), USB (Bug 14421), and WCCP (Bug 14412) dissectors were susceptible.
- wnpa-sec-2018-07
  The UMTS MAC dissector could crash. Bug 14339, CVE-2018-7334
- wnpa-sec-2018-09
  The FCP dissector could crash. Bug 14374, CVE-2018-7336
- wnpa-sec-2018-10
  The SIGCOMP dissector could crash. Bug 14398, CVE-2018-7320
- wnpa-sec-2018-11
  The pcapng file parser could crash. Bug 14403, CVE-2018-7420
- wnpa-sec-2018-12
  The IPMI dissector could crash. Bug 14409, CVE-2018-7417
- wnpa-sec-2018-13
  The SIGCOMP dissector could crash. Bug 14410, CVE-2018-7418
-  wnpa-sec-2018-14
  The NBAP disssector could crash. Bug 14443, CVE-2018-7419

Full release notes:

  https://www.wireshark.org/docs/relnotes/wireshark-2.2.14.html

Signed-off-by: André Hentschel <nerv@dawncrow.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit c5c87c2bb61efb31421b345bdbf6931b882ff6a9)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 14, 15}.x series
Fabio Estevam [Sun, 8 Apr 2018 14:00:51 +0000 (11:00 -0300)]
linux-headers: bump 4.{4, 9, 14, 15}.x series

[Peter: drop 4.14.x / 4.15.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 2661d47425f866cf56617d2928b6b96566db8de4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopython-webpy: use webpy-0.39 tag
Peter Korsgaard [Thu, 5 Apr 2018 06:42:15 +0000 (08:42 +0200)]
python-webpy: use webpy-0.39 tag

No functional change, but upstream has now tagged the release, so use the
tag instead of the sha1.

https://github.com/webpy/webpy/issues/449

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 01320bb9ff297bac38a4c9bc32ae505ac79d600f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopython-webpy: security bump to version 0.39
Peter Korsgaard [Wed, 4 Apr 2018 15:51:32 +0000 (17:51 +0200)]
python-webpy: security bump to version 0.39

>From the changelog:

2018-02-28 0.39
* Fixed a security issue with the form module (tx Orange Tsai)
* Fixed a security issue with the db module (tx Adrián Brav and Orange Tsai)

2016-07-08 0.38
..
* Fixed a potential remote exeution risk in `reparam` (tx Adrián Brav)

License files are still not included on pypi, so continue to use the git
repo. Upstream has unfortunately not tagged 0.39, so use the latest commit
on the 0.39 branch.  A request to fix this has been submitted:

https://github.com/webpy/webpy/issues/449

0.39 now uses setuptools, so change the _SETUP_TYPE.

Add hashes for the license files.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit ce559162fca39c273583bea0dbed643229769d8c)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopython-webpy: needs hashlib support in python
Peter Korsgaard [Wed, 4 Apr 2018 15:51:31 +0000 (17:51 +0200)]
python-webpy: needs hashlib support in python

webpy uses hashlib for session handling, so ensure it is available:

web/session.py:    import hashlib
web/session.py:    sha1 = hashlib.sha1

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 543b0d50fbbb552296749d0cf18443aacfc6e58d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoopenblas: drop SSE_GENERIC target
Peter Korsgaard [Sun, 1 Apr 2018 08:46:41 +0000 (10:46 +0200)]
openblas: drop SSE_GENERIC target

Fixes #10856

The SSE_GENERIC target fails to build with a "sgemm_kernel.o: No such file
or directory" error. Several upstream bug reports exist for this:

https://github.com/xianyi/OpenBLAS/issues/502
https://github.com/xianyi/OpenBLAS/issues/685

In both cases, upstream suggests using a different target definition
instead.  E.G.  from issue 685:

You may use NORTHWOOD on x86: make TARGET=NORTHWOOD that uses SSE2
instructions.  It's very hard to find non-SSE2 x86 CPUs today.  For x86-64
use the PRESCOTT target

So drop the SSE_GENERIC target.  The only x86_64 variant we support not
covered by a more specific openblas target is the default variant, nocona
and jaguar.

Nocona was a Xeon variant of the P4 "Prescott" architecture, so use the
PRESCOTT openblas target:

https://en.wikipedia.org/wiki/Xeon#Nocona_and_Irwindale

Jaguar is from the Bobcat family, so use the BOBCAT openblas target:

https://en.wikipedia.org/wiki/List_of_AMD_microprocessors#Bobcat_core_architecture_(APU)

[Peter: add Jaguar as pointed out by Arnout]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 5e6fa93483caac317ab8844feb2ae9c07078a6c8)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoopencv3: fix Python module build for Python 3.x
Sasha Shyrokov [Tue, 6 Mar 2018 15:58:10 +0000 (10:58 -0500)]
opencv3: fix Python module build for Python 3.x

When the OpenCV3 Python support is enabled with Python 3.x, it builds
properly, and the resulting .so file is built for the target
architecture, but its name is wrong:

  output/target/usr/lib/python3.6/site-packages/cv2.cpython-36m-x86_64-linux-gnu.so

This prevents Python 3.x from importing the module:

>>> import cv2
Traceback (most recent call last):
  File "<stdin>", line 1, in <module>
ModuleNotFoundError: No module named 'cv2'

In order to fix this, we simply need to pass PKG_PYTHON_DISTUTILS_ENV
in the environment. The Python module then gets named:

  output/target/usr/lib/python3.6/site-packages/cv2.cpython-36m-arm-linux-gnueabi.so

And can be imported properly:

>>> import cv2
>>>

This solution was suggested by Arnout Vandecappelle in
https://stackoverflow.com/questions/49059035/buildroot-opencv3-python-package-builds-for-the-wrong-target.

With Python 2.x, the module is named just cv2.so so this problem isn't
visible. However, for consistency, we also pass
PKG_PYTHON_DISTUTILS_ENV when building against Python 2.x, by putting
the OPENCV3_CONF_ENV assignment inside the
BR2_PACKAGE_OPENCV3_LIB_PYTHON condition, but outside the
BR2_PACKAGE_PYTHON3/BR2_PACKAGE_PYTHON condition.

Signed-off-by: Sasha Shyrokov <alexander-shyrokov@idexx.com>
[Thomas: extend the commit log, apply the solution to Python 2.x.]
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 8ba80282c3bb580c6a45ea114e70acac98fe1690)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/xterm: Avoid freetype2 path poisoning using imake
Valentin Korenblit [Tue, 27 Mar 2018 07:44:34 +0000 (09:44 +0200)]
package/xterm: Avoid freetype2 path poisoning using imake

When imake is installed on the host, it tries to include
freetype headers from host, so we must override ac_cv_path_IMAKE
to avoid this.

Extract from config.log:

configure:14803: checking if we should use imake to help
configure:14820: result: yes
configure:14829: checking for xmkmf
configure:14846: found /usr/bin/xmkmf
configure:14857: result: /usr/bin/xmkmf
configure:14920: testing Using /usr/bin/xmkmf  ...
configure:15015: testing IMAKE_CFLAGS  -I. -I/usr/include/freetype2

Signed-off-by: Valentin Korenblit <valentin.korenblit@smile.fr>
[Thomas: pass ac_cv_path_IMAKE="" as suggested by Romain Naour.]
Reviewed-by: Romain Naour <romain.naour@smile.fr>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 6d0316dc7b14f6cd2d44e92c6ab581a6ab385234)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 14, 15}.x series
Fabio Estevam [Sat, 31 Mar 2018 18:34:58 +0000 (15:34 -0300)]
linux-headers: bump 4.{4, 9, 14, 15}.x series

[Peter: drop 4.14.x / 4.15.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 6e17a16dc728845bcfad48230b8db9c375acd31e)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoopenssl: security bump to version 1.0.2o
Peter Korsgaard [Thu, 29 Mar 2018 14:52:09 +0000 (16:52 +0200)]
openssl: security bump to version 1.0.2o

Fixes the following security issues:

Constructed ASN.1 types with a recursive definition could exceed the stack
(CVE-2018-0739)

Constructed ASN.1 types with a recursive definition (such as can be found in
PKCS7) could eventually exceed the stack given malicious input with
excessive recursion.  This could result in a Denial Of Service attack.
There are no such structures used within SSL/TLS that come from untrusted
sources so this is considered safe.

Incorrect CRYPTO_memcmp on HP-UX PA-RISC (CVE-2018-0733)

Because of an implementation bug the PA-RISC CRYPTO_memcmp function is
effectively reduced to only comparing the least significant bit of each
byte.  This allows an attacker to forge messages that would be considered as
authenticated in an amount of tries lower than that guaranteed by the
security claims of the scheme.  The module can only be compiled by the HP-UX
assembler, so that only HP-UX PA-RISC targets are affected.

rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)

This issue has been reported in a previous OpenSSL security advisory and a
fix was provided for OpenSSL 1.0.2.  Due to the low severity no fix was
released at that time for OpenSSL 1.1.0.  The fix is now available in
OpenSSL 1.1.0h.

There is an overflow bug in the AVX2 Montgomery multiplication procedure
used in exponentiation with 1024-bit moduli.  No EC algorithms are affected.
Analysis suggests that attacks against RSA and DSA as a result of this
defect would be very difficult to perform and are not believed likely.
Attacks against DH1024 are considered just feasible, because most of the
work necessary to deduce information about a private key may be performed
offline.  The amount of resources required for such an attack would be
significant.  However, for an attack on TLS to be meaningful, the server
would have to share the DH1024 private key among multiple clients, which is
no longer an option since CVE-2016-0701.

This only affects processors that support the AVX2 but not ADX extensions
like Intel Haswell (4th generation).

For more details, see https://www.openssl.org/news/secadv/20180327.txt

The copyright year changed in LICENSE, so adjust the hash to match.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 6938c219d80e2267f8e25f3fc37f955ab723cc55)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agosngrep: fix libgcrypt handling
Peter Korsgaard [Thu, 29 Mar 2018 13:58:14 +0000 (15:58 +0200)]
sngrep: fix libgcrypt handling

Fixes:
http://autobuild.buildroot.net/results/f1c6494133806b9fc26ae3ce9e9c6a22fa2eda6f/

Commit 6205b75873c (sngrep: gnutls support also needs libgcrypt) ensured
that --with-gnutls is only used when both gnutls and libgcrypt are enabled,
but it didn't ensure libgcrypt gets built before sngrep or told the
configure script where to find libgcrypt-config, breaking the build.

Fix both issues.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit ae7d59eaae1c55d707b2a70437a84c280f598572)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{1, 4, 9, 14, 15}.x series
Fabio Estevam [Thu, 29 Mar 2018 11:31:00 +0000 (08:31 -0300)]
linux-headers: bump 4.{1, 4, 9, 14, 15}.x series

[Peter: drop 4.14.x / 4.15.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 9ef8f6b061b552012b767b83c7b21e5e3fb9fff7)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoxerces: add upstream security fix
Baruch Siach [Mon, 26 Mar 2018 20:23:02 +0000 (23:23 +0300)]
xerces: add upstream security fix

CVE-2017-12627: dereference of a NULL pointer while processing the path
to the DTD.

xerces 3.2.1 includes this patch. But this version also added
AC_RUN_IFELSE to its configure script, making cross compilation harder.

Switching to cmake is also problematic since the minimum required cmake
version is 3.2.0. The host dependencies check currently allows minimum
cmake version 3.1.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 142c8cc8d525f687ce199cc0163d48892e8a81f7)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 14, 15}.x series
Fabio Estevam [Sun, 25 Mar 2018 13:23:32 +0000 (10:23 -0300)]
linux-headers: bump 4.{4, 9, 14, 15}.x series

[Peter: drop 4.14.x / 4.15.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit d9534c816383ac45e75ae042b7c668406d9e8b1f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/apache: security bump to version 2.4.33
Bernd Kuhls [Sat, 24 Mar 2018 08:37:16 +0000 (09:37 +0100)]
package/apache: security bump to version 2.4.33

Changelog: http://www.apache.org/dist/httpd/CHANGES_2.4.33

Fixes CVE-2017-15710, CVE-2018-1283, CVE-2018-1303, CVE-2018-1301,
CVE-2017-15715, CVE-2018-1312, CVE-2018-1302.

Added license hash.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 65193bf3c93ec6922979907ce87fc82a73b25268)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/apache: bump version to 2.4.29
Bernd Kuhls [Mon, 23 Oct 2017 19:14:36 +0000 (21:14 +0200)]
package/apache: bump version to 2.4.29

Changelog: http://www.apache.org/dist/httpd/CHANGES_2.4.29

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 386ca343c514b4c7e30217ee688eb2d273585661)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/apache: bump to version 2.4.28
Bernd Kuhls [Fri, 6 Oct 2017 05:24:30 +0000 (07:24 +0200)]
package/apache: bump to version 2.4.28

Fix for CVE-2017-9798 is included in this release, so this patch is
removed.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
[Update commit log: not a security bump]
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit 1cff68251e6cd2fe8ed421d7b07813256342a150)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/imagemagick: security bump version to 7.0.7-27
Bernd Kuhls [Sat, 24 Mar 2018 07:57:39 +0000 (08:57 +0100)]
package/imagemagick: security bump version to 7.0.7-27

Fixes CVE-2018-6405 (upstream Github PR 964) and many others:
http://www.imagemagick.org/script/changelog.php

Added license hash.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 31086ea1de511b57e8377d9fa6b0fe7350b1e753)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 3.2.x and 4.{14, 15}.x series
Bernd Kuhls [Wed, 21 Mar 2018 18:06:32 +0000 (19:06 +0100)]
linux-headers: bump 3.2.x and 4.{14, 15}.x series

[Peter: drop 4.14.x / 4.15.x bump]
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit b83a4d3d69d5daa871812bd4c4803acef789e318)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agotremor: security bump to fix CVE-2018-5146
Peter Korsgaard [Mon, 19 Mar 2018 21:40:05 +0000 (22:40 +0100)]
tremor: security bump to fix CVE-2018-5146

Prevent out-of-bounds write in codebook decoding.

Codebooks that are not an exact divisor of the partition size are now
truncated to fit within the partition.

Upstream has migrated from subversion to git, so change to git and bump the
version to include the fix for CVE-2018-5146.

While we're at it, also add a hash file.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 80266c95052024381898cada4c51d44207fddd80)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 3.2.x and 4.{1, 14, 15}.x series
Fabio Estevam [Mon, 19 Mar 2018 10:57:30 +0000 (07:57 -0300)]
linux-headers: bump 3.2.x and 4.{1, 14, 15}.x series

[Peter: drop 4.14.x / 4.15.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit cd0fd093523b558cdcf282c1d1497bc2a494f4e0)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4,9}.x series
Peter Korsgaard [Sun, 18 Mar 2018 20:14:49 +0000 (21:14 +0100)]
linux-headers: bump 4.{4,9}.x series

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 50cd46b39f4af495a4c9d15f0e5d3df272e33c7c)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoirssi: security bump to version 1.0.7
Peter Korsgaard [Sun, 18 Mar 2018 14:40:08 +0000 (15:40 +0100)]
irssi: security bump to version 1.0.7

Fixes the following security issues:

Use after free when server is disconnected during netsplits.  Incomplete fix
of CVE-2017-7191.  Found by Joseph Bisch.  (CWE-416, CWE-825) -
CVE-2018-7054 [2] was assigned to this issue.

Use after free when SASL messages are received in unexpected order.  Found
by Joseph Bisch.  (CWE-416, CWE-691) - CVE-2018-7053 [3] was assigned to
this issue.

Null pointer dereference when an “empty” nick has been observed by Irssi.
Found by Joseph Bisch.  (CWE-476, CWE-475) - CVE-2018-7050 [4] was assigned
to this issue.

When the number of windows exceed the available space, Irssi would crash due
to Null pointer dereference.  Found by Joseph Bisch.  (CWE-690) -
CVE-2018-7052 [5] was assigned to this issue.

Certain nick names could result in out of bounds access when printing theme
strings.  Found by Oss-Fuzz.  (CWE-126) - CVE-2018-7051 [6] was assigned to
this issue.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 181ef8a1d01ddfa2be0b59ea85eb8902b0ce12c0)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibcurl: security bump to version 7.59.0
Baruch Siach [Thu, 15 Mar 2018 18:06:19 +0000 (20:06 +0200)]
libcurl: security bump to version 7.59.0

CVE-2018-1000120: curl could be fooled into writing a zero byte out of
bounds when curl is told to work on an FTP URL with the setting to only
issue a single CWD command, if the directory part of the URL contains a
"%00" sequence.

https://curl.haxx.se/docs/adv_2018-9cd6.html

CVE-2018-1000121: curl might dereference a near-NULL address when
getting an LDAP URL.

https://curl.haxx.se/docs/adv_2018-97a2.html

CVE-2018-1000122: When asked to transfer an RTSP URL, curl could
calculate a wrong data length to copy from the read buffer.

https://curl.haxx.se/docs/adv_2018-b047.html

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit bf3476e5b1527ac91c0a12949be7da5253ea66c1)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibpjsip: security bump to 2.7.2
Adam Duskett [Mon, 12 Mar 2018 08:44:44 +0000 (04:44 -0400)]
libpjsip: security bump to 2.7.2

Fixes the following vulnerabilities:

- CVE-2018-1000098: Crash when parsing SDP with an invalid media format
  description

- CVE-2018-1000099: Crash when receiving SDP with invalid fmtp attribute

[Peter: add CVE info]
Signed-off-by: Adam Duskett <aduskett@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit ed0d9d6f36dfc3e99ee70cc34de0c380925e871f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agosamba4: security bump to version 4.5.16
Peter Korsgaard [Wed, 11 Apr 2018 14:40:42 +0000 (16:40 +0200)]
samba4: security bump to version 4.5.16

CVE-2018-1050: Vulnerability to a denial of service attack when the RPC
spoolss service is configured to be run as an external daemon.

https://www.samba.org/samba/security/CVE-2018-1050.html

CVE-2018-1057: Authenticated users might change any other users'
passwords, including administrative users and privileged service
accounts (eg Domain Controllers).

https://www.samba.org/samba/security/CVE-2018-1057.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 14, 15}.x series
Fabio Estevam [Mon, 12 Mar 2018 02:30:27 +0000 (23:30 -0300)]
linux-headers: bump 4.{4, 9, 14, 15}.x series

[Peter: drop 4.14.x / 4.15.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 03b5b444f155ead9c73c2ed2596948de671c5fb9)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux: Config.in: correct typo in kernel compression format help text
Peter Korsgaard [Tue, 6 Mar 2018 15:46:51 +0000 (16:46 +0100)]
linux: Config.in: correct typo in kernel compression format help text

s/build/built/.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit d233cc72c4b901f1ea0ae4ce895ff665bd0b78d9)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agobusybox: add upstream post-1.27.2 httpd fix
Peter Korsgaard [Sat, 21 Oct 2017 17:20:33 +0000 (19:20 +0200)]
busybox: add upstream post-1.27.2 httpd fix

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit ec58149009776f63767644f9a3409f420c271766)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agobusybox: bump to version 1.27.2
Adam Duskett [Tue, 5 Sep 2017 12:20:05 +0000 (08:20 -0400)]
busybox: bump to version 1.27.2

Signed-off-by: Adam Duskett <aduskett@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 5cdb463e442d63f0ba361e7348d0ed56cb9b63d0)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agobusybox: disable new TLS support
Thomas Petazzoni [Sun, 30 Jul 2017 13:44:46 +0000 (15:44 +0200)]
busybox: disable new TLS support

Busybox 1.17.1 has added built-in TLS support. Unfortunately, it fails
to build on i686 with gcc 4.8, with:

networking/tls_pstm_mul_comba.c: In function 'pstm_mul_comba':
networking/tls_pstm_mul_comba.c:82:1: error: 'asm' operand has impossible constraints
 asm(                                                      \
 ^
networking/tls_pstm_mul_comba.c:279:4: note: in expansion of macro 'MULADD'
    MULADD(*tmpx++, *tmpy--);
    ^
make[3]: *** [networking/tls_pstm_mul_comba.o] Error 1
make[2]: *** [networking] Error 2

Since TLS support is a new feature in 1.27, and wasn't present until
now, let's disable it to avoid the build failure.

The bug has been reported upstream at
http://lists.busybox.net/pipermail/busybox/2017-July/085713.html.

Fixes:

 http://autobuild.buildroot.net/results/d973f9a2fbf0f52104f4943b902183e9dbf163a7/

Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit d5507262f37506d6b1b48eb409ed8bc3f08d3e47)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoRevert "busybox: add upstream post-1.26.2 fixes"
Peter Korsgaard [Tue, 10 Apr 2018 21:19:07 +0000 (23:19 +0200)]
Revert "busybox: add upstream post-1.26.2 fixes"

This reverts commit ace9345c96fe013468a7ab548b69dd1510e463c8.

With the bump to 1.27.x, these are no longer needed.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agobusybox: bump version to 1.27.1
Adam Duskett [Fri, 28 Jul 2017 16:18:08 +0000 (12:18 -0400)]
busybox: bump version to 1.27.1

In addition, update busybox-minimal.config and busybox.config by loading the
config files and saving them back.

Signed-off-by: Adam Duskett <aduskett@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 8cea29361770bd740b9799ac9b0b09ec131d7117)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{9, 14}.x series
Fabio Estevam [Sun, 4 Mar 2018 15:02:47 +0000 (12:02 -0300)]
linux-headers: bump 4.{9, 14}.x series

[Peter: drop 4.14.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 59e8b056ab1ed0e32b1913a9eee7d66a3c39ff0b)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agodhcp: add upstream security fixes
Baruch Siach [Sat, 3 Mar 2018 19:43:56 +0000 (21:43 +0200)]
dhcp: add upstream security fixes

CVE-2018-5732: The DHCP client incorrectly handled certain malformed
responses. A remote attacker could use this issue to cause the DHCP
client to crash, resulting in a denial of service, or possibly execute
arbitrary code. In the default installation, attackers would be isolated
by the dhclient AppArmor profile.

CVE-2018-5733: The DHCP server incorrectly handled reference counting. A
remote attacker could possibly use this issue to cause the DHCP server
to crash, resulting in a denial of service.

Both issues are fixed in version 4.4.1. But we are close to release, so
backport the fixes instead of bumping version.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 047cec5993223944d0765468f11aa137d3ade543)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/clamav: security bump to version 0.99.4
Bernd Kuhls [Fri, 2 Mar 2018 06:06:57 +0000 (07:06 +0100)]
package/clamav: security bump to version 0.99.4

Fixes CVE-2012-6706, CVE-2017-6419, CVE-2017-11423, CVE-2018-1000085 &
CVE-2018-0202.

For details see upstream announcement:
http://lists.clamav.net/pipermail/clamav-announce/2018/000029.html

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit d02cbe22dab7f2f0424d7a4f3274ea2459269dbe)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agomosquitto: unbreak build with websockets and !libopenssl
Peter Korsgaard [Sat, 3 Mar 2018 10:15:45 +0000 (11:15 +0100)]
mosquitto: unbreak build with websockets and !libopenssl

Fixes:
http://autobuild.buildroot.net/results/d69/d693f3e3f1c73ccf54ac7076623e436355a9d901/b

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 63dfbca2c3ad509504e9118a49d396210917b079)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agomosquitto: security bump to version 1.4.15
Peter Korsgaard [Wed, 28 Feb 2018 23:11:40 +0000 (00:11 +0100)]
mosquitto: security bump to version 1.4.15

Fixes CVE-2017-7651: Unauthenticated clients can send a crafted CONNECT
packet which causes large amounts of memory use in the broker.  If multiple
clients do this, an out of memory situation can occur and the system may
become unresponsive or the broker will be killed by the operating system.

The fix addresses the problem by limiting the permissible size for CONNECT
packet, and by adding a memory_limit configuration option that allows the
broker to self limit the amount of memory it uses.

The hash of new tarball is not (yet) available through download.php, so use
a locally calculated hash.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f4df4a18e5dd4702f842e61ee815f13afd93c366)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agomosquitto: bump version to 1.4.14
Peter Korsgaard [Tue, 11 Jul 2017 09:57:13 +0000 (11:57 +0200)]
mosquitto: bump version to 1.4.14

Drop CVE 2017-9868 patch as that is now upstream.

1.4.14 is a bugfix release, fixing significant websocket performance /
correctness issues.

Use HTTPS for the download as the server uses HSTS, thus saving a redirect.

While we're at it, add hashes for the license files.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 1b76bf7669d6482e61a82be9cd5d3c8806dabba6)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agomosquitto: clarify that patch hash is locally calculated
Peter Korsgaard [Sun, 2 Jul 2017 13:19:55 +0000 (15:19 +0200)]
mosquitto: clarify that patch hash is locally calculated

Commit e51d69a3b (mosquitto: specify that hash is taken from upstream)
changed the .hash description header, but the upstream hash only applies
to the tarball, not the patch.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 1ef8c2239339f52e35572e485db306df9012d500)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agomosquitto: specify that hash is taken from upstream
Vicente Olivert Riera [Wed, 28 Jun 2017 10:55:53 +0000 (11:55 +0100)]
mosquitto: specify that hash is taken from upstream

Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit d8dc97ee5ed10c75666e500b6752497690ea6853)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/dovecot: security bump to version 2.3.4
Bernd Kuhls [Thu, 1 Mar 2018 19:41:51 +0000 (20:41 +0100)]
package/dovecot: security bump to version 2.3.4

Fixes CVE-2017-15130, CVE-2017-14461 & CVE-2017-15132:
https://www.dovecot.org/list/dovecot-news/2018-February/000370.html

Removed patch applied upstream:
https://github.com/dovecot/core/commit/a008617e811673064fd657acf517dc4a12493d29

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 7c970b06ea4cfc235eefedd967551d165c1dd7ca)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 14, 15}.x series
Fabio Estevam [Wed, 28 Feb 2018 12:36:43 +0000 (09:36 -0300)]
linux-headers: bump 4.{4, 9, 14, 15}.x series

[Peter: drop 4.14.x / 4.15.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit fcf28ee36115003254ec671fde3fcc219f7c0a0d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowavpack: add upstream security fixes
Peter Korsgaard [Tue, 27 Feb 2018 21:26:52 +0000 (22:26 +0100)]
wavpack: add upstream security fixes

Fixes the following security issues:

CVE-2018-6767: A stack-based buffer over-read in the ParseRiffHeaderConfig
function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to
cause a denial-of-service attack or possibly have unspecified other impact
via a maliciously crafted RF64 file.

CVE-2018-7253: The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file
of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service
(heap-based buffer over-read) or possibly overwrite the heap via a
maliciously crafted DSDIFF file.

CVE-2018-7254: The ParseCaffHeaderConfig function of the cli/caff.c file of
WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global
buffer over-read), or possibly trigger a buffer overflow or incorrect memory
allocation, via a maliciously crafted CAF file.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 4de7e07e6efba7dae79a7f61f397864873272fd3)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowavpack: don't download patch from Github
Thomas Petazzoni [Sun, 2 Jul 2017 16:53:42 +0000 (18:53 +0200)]
wavpack: don't download patch from Github

Patches downloaded from Github are not stable, so bring them in the
tree.

Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 0a2576d37ebb4175aea1daf3c14c947df39cdcaa)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 3.2.x series
Bernd Kuhls [Tue, 27 Feb 2018 19:10:34 +0000 (20:10 +0100)]
linux-headers: bump 3.2.x series

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit e8e9bb3267930fd053add7b9eef85749362a1d0a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agocheck-host-tar.sh: blacklist tar 1.30+
Peter Korsgaard [Tue, 27 Feb 2018 08:55:41 +0000 (09:55 +0100)]
check-host-tar.sh: blacklist tar 1.30+

Tar 1.30 changed the --numeric-owner output for filenames > 100 characters,
leading to hash mismatches for the tar archives we create ourselves from
git.  This is really a fix for a bug in earlier tar versions regarding
deterministic output, so it is unlikely to be reverted in later versions.

For more details, see:
http://lists.busybox.net/pipermail/buildroot/2018-January/211222.html

To work around this issue, blacklist tar 1.30+ similar to how we do it for
pre-1.17 versions so Buildroot falls back to building host-tar.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit b8fa273d500b44153e9939f0a100e97db2ff63ed)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agodependencies.mk: check for valid host-tar before other host dependencies
Peter Korsgaard [Tue, 27 Feb 2018 08:55:40 +0000 (09:55 +0100)]
dependencies.mk: check for valid host-tar before other host dependencies

host-{cmake,lzip,xz} needs host-tar to extract their source code tarball, so
we need to ensure that host-tar gets added to DEPENDENCIES_HOST_PREREQ
before these in case they are both needed, otherwise the tools will fail to
extract.

With the upcoming change to blacklist modern tar versions this situation is
likely to trigger more often.

The real solution to this issue is the <foo>_EXTRACT_DEPENDENCIES rework,
but that series is a bit too intrusive to add this close to 2018.02, so
therefore this hack.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Reviewed-by: Matt Weber <matthew.weber@rockwellcollins.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 7c09cb82b75f30eba7a9daaae5e77a604f6e49c1)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 14, 15}.x series
Fabio Estevam [Mon, 26 Feb 2018 11:36:10 +0000 (08:36 -0300)]
linux-headers: bump 4.{4, 9, 14, 15}.x series

[Peter: drop 4.14.x / 4.15.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 1e7ee5a686dc74f18242a9c07623cf12065505c1)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopatch: add upstream security fix
Baruch Siach [Mon, 9 Apr 2018 16:20:36 +0000 (19:20 +0300)]
patch: add upstream security fix

Fixes CVE-2018-1000156: arbitrary command execution in ed-style patches.

Depend on MMU for now, because the patch adds a fork() call. Upstream
later switched to gnulib provided execute(), so this dependency can be
dropped on the next version bump.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit f4a4df2084b923f29eca2130976ca10a7aa6b719)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit c3e1d9849a72495f799b007260bbcdc61fc78da3)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopatch: security bump to version 2.7.6
Baruch Siach [Fri, 23 Feb 2018 05:22:31 +0000 (07:22 +0200)]
patch: security bump to version 2.7.6

Fixes CVE-2016-10713: Out-of-bounds access within pch_write_line() in
pch.c can possibly lead to DoS via a crafted input file.

Add upstream patch fixing CVE-2018-6951: There is a segmentation fault,
associated with a NULL pointer dereference, leading to a denial of
service in the intuit_diff_type function in pch.c, aka a "mangled
rename" issue.

This bump does NOT fix CVE-2018-6952. See upstream bug #53133
(https://savannah.gnu.org/bugs/index.php?53133).

Add license file hash.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 38d8d86d31147ef83d1d79f67b7ae90e4cefaaea)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agombedtls: fix API compatibility
Baruch Siach [Sat, 24 Feb 2018 20:49:00 +0000 (22:49 +0200)]
mbedtls: fix API compatibility

Add upstream patch fixing API compatibility with previous releases.

Fixes (hiawatha):
http://autobuild.buildroot.net/results/ce6/ce6b4a50e6aafd06f82eaae688dd8720b982e9c2/
http://autobuild.buildroot.net/results/cde/cdec7ae3565d5b76a9bc50156c6244b44197534e/
http://autobuild.buildroot.net/results/9c1/9c1aec09c03f60bee9dc134da5a29e2671fc3b5e/

Cc: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 7bb17b10af531749192e067efd67a117f2bc8053)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agombedtls: security bump to version 2.7.0
Baruch Siach [Fri, 23 Feb 2018 04:56:11 +0000 (06:56 +0200)]
mbedtls: security bump to version 2.7.0

CVE-2018-0487: Remote attackers can execute arbitrary code or cause a
denial of service (buffer overflow) via a crafted certificate chain that
is mishandled during RSASSA-PSS signature verification within a TLS or
DTLS session.

CVE-2018-0488: When the truncated HMAC extension and CBC are used,
allows remote attackers to execute arbitrary code or cause a denial of
service (heap corruption) via a crafted application packet within a TLS
or DTLS session.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 3b7a59304a9c377b9aec1303d85a60d019b4b9b2)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 14, 15}.x series
Fabio Estevam [Thu, 22 Feb 2018 17:12:11 +0000 (14:12 -0300)]
linux-headers: bump 4.{4, 9, 14, 15}.x series

[Peter: drop 4.14.x / 4.15.x bump]
Signed-off-by: Fabio Estevam <fabio.estevam@nxp.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 3733907f673427205288645a078691f930898333)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoexim: add upstream security fix
Peter Korsgaard [Mon, 19 Feb 2018 16:14:35 +0000 (17:14 +0100)]
exim: add upstream security fix

Fixes the following security issue:

CVE-2018-6789: Meh Chang discovered a buffer overflow flaw in a utility
function used in the SMTP listener of Exim, a mail transport agent.  A
remote attacker can take advantage of this flaw to cause a denial of
service, or potentially the execution of arbitrary code via a specially
crafted message.

Dropped ChangeLog hunk and adjusted file path of upstream commit so it
applies to tarball.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 8343069e2c3cc79ad14600816a772fcd7592e291)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoquagga: add upstream security fixes
Peter Korsgaard [Mon, 19 Feb 2018 15:50:59 +0000 (16:50 +0100)]
quagga: add upstream security fixes

Fixes the following security issues:

CVE-2018-5378

    It was discovered that the Quagga BGP daemon, bgpd, does not
    properly bounds check data sent with a NOTIFY to a peer, if an
    attribute length is invalid. A configured BGP peer can take
    advantage of this bug to read memory from the bgpd process or cause
    a denial of service (daemon crash).

    https://www.quagga.net/security/Quagga-2018-0543.txt

CVE-2018-5379

    It was discovered that the Quagga BGP daemon, bgpd, can double-free
    memory when processing certain forms of UPDATE message, containing
    cluster-list and/or unknown attributes, resulting in a denial of
    service (bgpd daemon crash).

    https://www.quagga.net/security/Quagga-2018-1114.txt

CVE-2018-5380

    It was discovered that the Quagga BGP daemon, bgpd, does not
    properly handle internal BGP code-to-string conversion tables.

    https://www.quagga.net/security/Quagga-2018-1550.txt

CVE-2018-5381

    It was discovered that the Quagga BGP daemon, bgpd, can enter an
    infinite loop if sent an invalid OPEN message by a configured peer.
    A configured peer can take advantage of this flaw to cause a denial
    of service (bgpd daemon not responding to any other events; BGP
    sessions will drop and not be reestablished; unresponsive CLI
    interface).

    https://www.quagga.net/security/Quagga-2018-1975.txt

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 157a198d304224c12fa0d91d977a6619d021f5c6)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agomariadb: security bump version to 10.1.31
Ryan Coe [Mon, 19 Feb 2018 14:23:39 +0000 (06:23 -0800)]
mariadb: security bump version to 10.1.31

Release notes: https://mariadb.com/kb/en/mariadb-10131-release-notes/
Changelog: https://mariadb.com/kb/en/mariadb-10131-changelog/

Fixes the following security vulnerabilities:

CVE-2018-2562 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server : Partition). Supported versions that are affected are
5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable
vulnerability allows low privileged attacker with network access via multiple
protocols to compromise MySQL Server. Successful attacks of this vulnerability
can result in unauthorized ability to cause a hang or frequently repeatable
crash (complete DOS) of MySQL Server as well as unauthorized update, insert or
delete access to some of MySQL Server accessible data.

CVE-2018-2622 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: DDL). Supported versions that are affected are 5.5.58
and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable
vulnerability allows low privileged attacker with network access via multiple
protocols to compromise MySQL Server. Successful attacks of this vulnerability
can result in unauthorized ability to cause a hang or frequently repeatable
crash (complete DOS) of MySQL Server.

CVE-2018-2640 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: Optimizer). Supported versions that are affected are
5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable
vulnerability allows low privileged attacker with network access via multiple
protocols to compromise MySQL Server. Successful attacks of this vulnerability
can result in unauthorized ability to cause a hang or frequently repeatable
crash (complete DOS) of MySQL Server.

CVE-2018-2665 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: Optimizer). Supported versions that are affected are
5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable
vulnerability allows low privileged attacker with network access via multiple
protocols to compromise MySQL Server. Successful attacks of this vulnerability
can result in unauthorized ability to cause a hang or frequently repeatable
crash (complete DOS) of MySQL Server.

CVE-2018-2668 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: Optimizer). Supported versions that are affected are
5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable
vulnerability allows low privileged attacker with network access via multiple
protocols to compromise MySQL Server. Successful attacks of this vulnerability
can result in unauthorized ability to cause a hang or frequently repeatable
crash (complete DOS) of MySQL Server.

CVE-2018-2612 - Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Supported versions that are affected are 5.6.38 and
prior and 5.7.20 and prior. Easily exploitable vulnerability allows high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized creation, deletion or modification access to critical data or all
MySQL Server accessible data and unauthorized ability to cause a hang or
frequently repeatable crash (complete DOS) of MySQL Server.

Signed-off-by: Ryan Coe <bluemrp9@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit fcdaab19bb564af01016b6632736f98baecbd22c)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agojq: compile as _GNU_SOURCE to fix segfault when compiled with gcc 6
Thomas De Schampheleire [Mon, 19 Feb 2018 15:57:34 +0000 (16:57 +0100)]
jq: compile as _GNU_SOURCE to fix segfault when compiled with gcc 6

When compiling host-jq with gcc 6+, running it gives an immediate segfault.
Reported upstream: https://github.com/stedolan/jq/issues/1598

The issue can be solved by compiling with _GNU_SOURCE as extra preprocessor
define. Once the issue is solved upstream, this change can be reverted.

As the issue will normally be the same for target, apply the same fix there.

Signed-off-by: Thomas De Schampheleire <thomas.de_schampheleire@nokia.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 21114013e83a67fd6b84e1d911ee503be3f0e35d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 14, 15}.x series
Fabio Estevam [Sat, 17 Feb 2018 14:06:15 +0000 (12:06 -0200)]
linux-headers: bump 4.{4, 9, 14, 15}.x series

[Peter: drop 4.14.x / 4.15.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit aa77030b8f5e41f1c53eb1c1ad664b8c814ba032)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibvorbis: security bump to version 1.3.6
Peter Korsgaard [Fri, 16 Mar 2018 21:35:29 +0000 (22:35 +0100)]
libvorbis: security bump to version 1.3.6

Fixes CVE-2018-5146: Prevent out-of-bounds write in codebook decoding.

Drop 0001-CVE-2017-14633-Don-t-allow-for-more-than-256-channel.patch and
0002-CVE-2017-14632-vorbis_analysis_header_out-Don-t-clea.patch as they are
now upstream, and add a hash for the license file while we're at it.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit eca03d677448000f9c5387e8359c116508e03f79)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 1f11463b3d8ef55ff5baf2ebd6d599529e9ee6fb)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibvorbis: add upstream security fixes
Peter Korsgaard [Fri, 16 Feb 2018 08:09:55 +0000 (09:09 +0100)]
libvorbis: add upstream security fixes

Fixes the following security issues:

CVE-2017-14632: Libvorbis 1.3.5 allows Remote Code Execution upon freeing
uninitialized memory in the function vorbis_analysis_headerout() in info.c
when vi->channels<=0, a similar issue to Mozilla bug 550184.

CVE-2017-14633: In libvorbis 1.3.5, an out-of-bounds array read
vulnerability exists in the function mapping0_forward() in mapping0.c, which
may lead to DoS when operating on a crafted audio file with
vorbis_analysis().

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit cc9282ae8c346c0b46fb249008696f6e9bc35f2c)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{9, 14}.x series
Fabio Estevam [Tue, 13 Feb 2018 21:18:19 +0000 (19:18 -0200)]
linux-headers: bump 4.{9, 14}.x series

[Peter: drop 4.14.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 7c084582701542e7a5b87561c4e142cf86ec8873)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibrsvg: security bump to version 2.40.20
Baruch Siach [Mon, 12 Feb 2018 20:02:31 +0000 (22:02 +0200)]
librsvg: security bump to version 2.40.20

Fixes CVE-2018-1000041: information disclosure via a crafted SVG file.

Bump to the latest (maybe last) release in the 2.40.x series. Newer
versions require a Rust compiler.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 4020c5a7b330613f7bccbc91a466c129bf8e40c5)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agobusybox: add upstream security fixes
Baruch Siach [Tue, 13 Feb 2018 16:51:41 +0000 (18:51 +0200)]
busybox: add upstream security fixes

CVE-2017-15873: Integer overflow in decompress_bunzip2.c leads to a read
access violation

CVE-2017-15874: Integer overflow in decompress_unlzma.c leads to a read
access violation

Cc: Adam Duskett <aduskett@gmail.com>
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 6665360b6dc9fce02381f20a3e0088974538b19f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoqt5tools: fix typo in <pkg>_SOURCE
Gaël PORTAY [Sat, 10 Feb 2018 14:49:06 +0000 (09:49 -0500)]
qt5tools: fix typo in <pkg>_SOURCE

The QT5TOOLS_SOURCE variable uses mismatch QT5BASE_VERSION variable.

This commit fixes the typo by using the appropriate QT5TOOLS_VERSION
variable.

Signed-off-by: Gaël PORTAY <gael.portay@savoirfairelinux.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 7c384c3b0f292413c3364f5113b340e22efa76f4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoqt53d: fix typo in <pkg>_SOURCES
Gaël PORTAY [Sat, 10 Feb 2018 12:38:00 +0000 (07:38 -0500)]
qt53d: fix typo in <pkg>_SOURCES

The QT53D_SOURCE variable uses mismatch QT5SVG_VERSION variable.

This commit fixes the typo by using the appropriate QT53D_VERSION
variable.

Signed-off-by: Gaël PORTAY <gael.portay@savoirfairelinux.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit caa3f12fd6fa63dbbcdc246c74a069fccc79ba41)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agorsync: security bump to version 3.1.3
Baruch Siach [Fri, 9 Feb 2018 05:26:28 +0000 (07:26 +0200)]
rsync: security bump to version 3.1.3

Fixes CVE-2018-5764: remote attackers can bypass an
argument-sanitization protection mechanism

Drop upstream patches.

Add license file hash.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 4652f5940137a03509ea3f4b32e50576a7ff7385)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibxml2: add security fix
Baruch Siach [Fri, 9 Feb 2018 09:07:58 +0000 (11:07 +0200)]
libxml2: add security fix

CVE-2017-8872: An attackers can cause a denial of service (buffer
over-read) or information disclosure.

Patch from the upstream bug tracker.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 86e027f6d3eee30304da6a4fff84c808cd79182f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibxml2: bump to 2.9.7
Adam Duskett [Mon, 20 Nov 2017 15:03:25 +0000 (10:03 -0500)]
libxml2: bump to 2.9.7

Signed-off-by: Adam Duskett <aduskett@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit a54794e6525444f1031d468e2d16889df334b626)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/libxml2: add license hash
Samuel Martin [Fri, 3 Nov 2017 10:36:53 +0000 (11:36 +0100)]
package/libxml2: add license hash

Signed-off-by: Samuel Martin <s.martin49@gmail.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit fd313f8dc610fc051f3f2c416e103d9a874caaa0)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agodnsmasq: add upstream security fix patches
Baruch Siach [Thu, 8 Feb 2018 19:16:35 +0000 (21:16 +0200)]
dnsmasq: add upstream security fix patches

Fixes CVE-2017-15107: An attacker can craft an NSEC which wrongly proves
non-existence.

Cc: Matt Weber <matthew.weber@rockwellcollins.com>
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit aec658f5d684be9e1b7801af5898b503c1a465fd)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agodnsmasq: simplify build configuration
Baruch Siach [Mon, 2 Oct 2017 17:38:26 +0000 (20:38 +0300)]
dnsmasq: simplify build configuration

Drop direct sed'ing of config.h for HAVE_CONNTRACK, HAVE_LUASCRIPT, and
HAVE_DBUS. Use MAKE_OPTS COPTS parameters instead, like we do already
for all other options.

Rename DNSMASQ_ENABLE_LUA to DNSMASQ_TWEAK_LIBLUA since it now does only
that.

Merge two conntrack and three dbus conditional sections.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 1042fea88aea4ebddcac5e215286394f1ad012b4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolibtasn1: security bump to version 4.13
Baruch Siach [Thu, 8 Feb 2018 18:46:45 +0000 (20:46 +0200)]
libtasn1: security bump to version 4.13

CVE-2017-10790: NULL pointer dereference and crash when reading crafted
input

CVE-2018-6003: Stack exhaustion due to indefinite recursion during BER
decoding

Add license files hashes.

Cc: Stefan Fröberg <stefan.froberg@petroprogram.com>
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 9ac75335bfaa84f12cea4836602a9764403d0a7a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agontp: fix build without SSP support
Baruch Siach [Wed, 7 Mar 2018 06:59:41 +0000 (08:59 +0200)]
ntp: fix build without SSP support

In version 4.2.8p11 ntp changed its configure script build hardening
parameter to '--with-hardenfile'. Update the parameter name to avoid
-fstack-protector-all when the toolchain does not support this option.

Fixes:
http://autobuild.buildroot.net/results/60e/60e8b9864932f2cabc7deb43234abe168bd113c5/
http://autobuild.buildroot.net/results/592/592db6836817bb078a2f1146d2ce6241bf7997a3/
http://autobuild.buildroot.net/results/b07/b070fbc66a928888df8d2561dad3632778d55e0d/

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 5766b6fb34a897092092f7d76d6b4f2bc8c48571)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agontp: security bump to version 4.2.8p11
Baruch Siach [Tue, 6 Mar 2018 17:00:47 +0000 (19:00 +0200)]
ntp: security bump to version 4.2.8p11

Fixed or improved security issues:

  CVE-2016-1549 (fixed in 4.2.8p7; this release adds protection): A
  malicious authenticated peer can create arbitrarily-many ephemeral
  associations in order to win the clock selection algorithm

  CVE-2018-7182: Buffer read overrun leads to undefined behavior and
  information leak

  CVE-2018-7170: Multiple authenticated ephemeral associations

  CVE-2018-7184: Interleaved symmetric mode cannot recover from bad
  state

  CVE-2018-7185: Unauthenticated packet can reset authenticated
  interleaved association

  CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit

Drop patch #3. libntpq_a_CFLAGS now includes NTP_HARD_CFLAGS via
AM_CFLAGS.

Add license file hash.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit da05d748057a98254a9c4fbd6afbc8ebf7e08afd)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agontp: explicitly enable openssl-random when crypto is enabled
Adam Duskett [Wed, 8 Nov 2017 13:18:39 +0000 (08:18 -0500)]
ntp: explicitly enable openssl-random when crypto is enabled

If OpenSSL is selected, --enable-openssl-random should be explicitly
enabled for consistency with the disable case.

[Peter: tweak commit text]
Signed-off-by: Adam Duskett <aduskett@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 905677cbd59fb0f9f56f207b63e1fa6e7c9167d5)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agontp: no longer require openssl
Adam Duskett [Tue, 7 Nov 2017 21:29:06 +0000 (16:29 -0500)]
ntp: no longer require openssl

4.2.8p10 no longer requires openssl to compile.

Signed-off-by: Adam Duskett <Adamduskett@outlook.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 8a2111258ace2fc4d01a6bb3d3287ec0115eef29)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agodhcp: disable isc assertions (reproducible builds)
Peter Seiderer [Fri, 27 Oct 2017 19:24:24 +0000 (21:24 +0200)]
dhcp: disable isc assertions (reproducible builds)

The isc assertions from the bundled bind dns library are
using the __FILE__ macro for debug messages (see
dhcp-4.3.5/bind/bind-9.9.9-P3/lib/isc/include/isc/assertions.h).

Disabling the assertions gains:

- reproducible builds (no build time paths in the executable)
- space saving on the target:
  dhcpd: 1.9M -> 1.6M
  dhcrelay: 1.6M -> 1.3M

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 3d1a7a86205a31625a8d5e8666ae7eb357e0de75)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9, 14, 15}.x series
Fabio Estevam [Sat, 3 Feb 2018 18:14:52 +0000 (16:14 -0200)]
linux-headers: bump 4.{4, 9, 14, 15}.x series

[Peter: drop 4.14.x/4.15.x bump]
Signed-off-by: Fabio Estevam <festevam@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 9fab7e408a2f4148d732b128eff077a6b38b27bb)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoMakefile, manual, website: Bump copyright year
Peter Korsgaard [Thu, 1 Feb 2018 15:48:31 +0000 (16:48 +0100)]
Makefile, manual, website: Bump copyright year

Happy 2018!

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 676400379abfdb7d1346c12ab592a88012b2fd5b)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agodnsmasq: update homepage link
Baruch Siach [Wed, 31 Jan 2018 14:56:28 +0000 (16:56 +0200)]
dnsmasq: update homepage link

The doc.html seems like a better choice for a homepage link than the
list of files in the containing directory listing.

Cc: Matt Weber <matthew.weber@rockwellcollins.com>
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit f9da847d93c061b2242547343cb4a707e8f1179d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopostgresql: security bump to 9.6.8
Adam Duskett [Sat, 3 Mar 2018 18:09:37 +0000 (13:09 -0500)]
postgresql: security bump to 9.6.8

Helps mitigate CVE-2018-1058

see: https://www.postgresql.org/about/news/1834/ for more information bugfixes.
Signed-off-by: Adam Duskett <aduskett@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolz4: version v1.7.5
Jeroen Roovers [Fri, 24 Mar 2017 06:29:52 +0000 (07:29 +0100)]
lz4: version v1.7.5

Signed-off-by: Jeroen Roovers <jer@airfi.aero>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 5408fc925d06d5225a6ba7d18f71fc97cc3a813a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopostgresql: security bump to 9.6.7
Adam Duskett [Mon, 12 Feb 2018 12:12:16 +0000 (07:12 -0500)]
postgresql: security bump to 9.6.7

from https://www.postgresql.org/about/news/1829/

Fixes:
[1] CVE-2018-1052: Fix the processing of partition keys containing multiple
                   expressions

[2] CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
                   non-world-readable

Signed-off-by: Adam Duskett <aduskett@gmail.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoUpdate for 2017.02.10 2017.02.10
Peter Korsgaard [Wed, 31 Jan 2018 19:19:39 +0000 (20:19 +0100)]
Update for 2017.02.10

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/liberation: fix download site due to recent fedorahosted.org closing
Julien BOIBESSOT [Fri, 10 Mar 2017 13:19:26 +0000 (14:19 +0100)]
package/liberation: fix download site due to recent fedorahosted.org closing

Signed-off-by: Julien BOIBESSOT <julien.boibessot@armadeus.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 53c07aa3a24d0f0a647e0e6858af5e65c6e81833)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agolinux-headers: bump 4.{4, 9}.x series
Fabio Estevam [Wed, 31 Jan 2018 13:15:15 +0000 (11:15 -0200)]
linux-headers: bump 4.{4, 9}.x series

Signed-off-by: Fabio Estevam <fabio.estevam@nxp.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 2dbfb76d2e62df2e27b960ffacfbe4600fce4b3f)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoeudev: fix printf usage in init script
Carlos Santos [Tue, 30 Jan 2018 04:07:19 +0000 (02:07 -0200)]
eudev: fix printf usage in init script

Using a variable in a printf format string may lead to undesirable
results if the variable contains format controls, so replace

    printf "foo $var bar"

by

    printf "foo %s bar" "$var"

Signed-off-by: Carlos Santos <casantos@datacom.ind.br>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 6298ed8bf46dd546d4ee7244136f2f9bad82ecad)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoeudev: fix error handling init script
Carlos Santos [Tue, 30 Jan 2018 04:07:18 +0000 (02:07 -0200)]
eudev: fix error handling init script

Replace (echo "msg" && exit 1) by { echo "msg"; exit 1; }.

The (list) compound command runs in a subshell, so the "exit" interrupts
the subshell, not the main script. Examples:

    $ sh -c "echo 1; (exit 1); echo 2"
    1
    2
    $ sh -c "echo 1; { exit 1; }; echo 2"
    1
    $

Signed-off-by: Carlos Santos <casantos@datacom.ind.br>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 3f568fe09948369831c36a713f5a47fe4c2d19b6)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/berkeleydb: add security fix for CVE-2017-10140
Bernd Kuhls [Sat, 27 Jan 2018 22:41:21 +0000 (23:41 +0100)]
package/berkeleydb: add security fix for CVE-2017-10140

Fixes CVE-2017-10140: Berkeley DB reads DB_CONFIG from cwd

For more details, see:
https://security-tracker.debian.org/tracker/CVE-2017-10140

And add license hash while we are at it.

[Peter: extend commit message]
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 0b368023f7e166648f136244960608a0e009332d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agodovecot: add upstream security fix for CVE-2017-15132
Peter Korsgaard [Sun, 28 Jan 2018 22:33:10 +0000 (23:33 +0100)]
dovecot: add upstream security fix for CVE-2017-15132

A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0.  An abort of SASL
authentication results in a memory leak in dovecot's auth client used by
login processes.  The leak has impact in high performance configuration
where same login processes are reused and can cause the process to crash due
to memory exhaustion.

For more details, see:
http://www.openwall.com/lists/oss-security/2018/01/25/4

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 28adb37be48566ede823969c284c1490b456530a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/dovecot: bump version to 2.2.33.2
Bernd Kuhls [Tue, 14 Nov 2017 06:51:50 +0000 (07:51 +0100)]
package/dovecot: bump version to 2.2.33.2

Added license hashes.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 746f94c282fcc2c0728b53e24d96e7553fcaa46a)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/dovecot: bump version to 2.2.31
Bernd Kuhls [Tue, 27 Jun 2017 04:38:08 +0000 (06:38 +0200)]
package/dovecot: bump version to 2.2.31

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 5723251f1892c0ffdf36f86d2574d3ba7dee3084)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/dovecot: bump version to 2.2.30.2
Bernd Kuhls [Tue, 6 Jun 2017 19:48:13 +0000 (21:48 +0200)]
package/dovecot: bump version to 2.2.30.2

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 64c476da409f60b6e78916c264978010891ca538)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/dovecot: bump version to 2.30.1
Bernd Kuhls [Sat, 3 Jun 2017 18:07:32 +0000 (20:07 +0200)]
package/dovecot: bump version to 2.30.1

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
(cherry picked from commit 083e9c64f052a2dc712bc9d3834a9b9b8e8671c1)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/dovecot: bump version to 2.2.30
Bernd Kuhls [Wed, 31 May 2017 05:54:57 +0000 (07:54 +0200)]
package/dovecot: bump version to 2.2.30

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit bcded15090db5796126bf2298ce1b2304a544a5d)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agoopenocd: add security fix for CVE-2018-5704
Peter Korsgaard [Sun, 28 Jan 2018 22:02:56 +0000 (23:02 +0100)]
openocd: add security fix for CVE-2018-5704

Open On-Chip Debugger (OpenOCD) 0.10.0 does not block attempts to use HTTP
POST for sending data to 127.0.0.1 port 4444, which allows remote attackers
to conduct cross-protocol scripting attacks, and consequently execute
arbitrary commands, via a crafted web site.

For more details, see:
https://sourceforge.net/p/openocd/mailman/message/36188041/

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 8fb8dddbf487706891040659959352af8c8d28d4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit a01d75d125644ac68c99dc8469f5f47b250c8f24)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agowireshark: security bump to version 2.2.12
Peter Korsgaard [Sun, 28 Jan 2018 19:23:02 +0000 (20:23 +0100)]
wireshark: security bump to version 2.2.12

Fixes the following security issues:

CVE-2017-17997: MRDISC dissector crash
https://www.wireshark.org/security/wnpa-sec-2018-02.html

CVE-2018-5334: IxVeriWave file parser crash
https://www.wireshark.org/security/wnpa-sec-2018-03.html

CVE-2018-5335: WCP dissector crash
https://www.wireshark.org/security/wnpa-sec-2018-04.html

CVE-2018-5336: Multiple dissectors could crash
https://www.wireshark.org/security/wnpa-sec-2018-01.html

For more information, see the release notes:
https://www.wireshark.org/docs/relnotes/wireshark-2.2.12.html

While we are at it, also add as hash for license file.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 2d920ad1b40967ae9241eaaa551d7d13c19f1b14)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 years agopackage/transmission: security bump version to 2.93
Bernd Kuhls [Sat, 27 Jan 2018 22:29:53 +0000 (23:29 +0100)]
package/transmission: security bump version to 2.93

Fixes CVE-2018-5702:
https://github.com/transmission/transmission/pull/468

Added license hash.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
(cherry picked from commit 6e43a52aa8a971a4e328335ce993f6868b4c51a4)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>