]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/log
thirdparty/openembedded/openembedded-core-contrib.git
7 years agoapt: group variables (license, configuration, packaging)
Andreas Oberritter [Fri, 22 Apr 2016 00:01:24 +0000 (02:01 +0200)] 
apt: group variables (license, configuration, packaging)

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoapt: merge apt.inc into .bb
Andreas Oberritter [Thu, 21 Apr 2016 23:58:31 +0000 (01:58 +0200)] 
apt: merge apt.inc into .bb

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoapt: merge with apt-native
Andreas Oberritter [Thu, 21 Apr 2016 23:55:22 +0000 (01:55 +0200)] 
apt: merge with apt-native

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoapt-native: drop obsolete patches
Andreas Oberritter [Thu, 21 Apr 2016 23:40:23 +0000 (01:40 +0200)] 
apt-native: drop obsolete patches

0001-Revert-always-run-dpkg-configure-a-at-the-end-of-our.patch and
noconfigure.patch are obsolete due to dpkg's new cross-bootstrap
support.

db_linking_hack.patch and environment.patch are marked as backports
from 2007.

no-curl.patch: curl-native is already a prerequisite.

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoapt: rewrite do_install
Andreas Oberritter [Thu, 21 Apr 2016 23:25:15 +0000 (01:25 +0200)] 
apt: rewrite do_install

Install missing files and directories (apt, apt-ftparchive,
apt-helper, apt-mark, manpages, trusted.gpg.d).

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoapt: use default packaging rules for -dev package
Andreas Oberritter [Thu, 21 Apr 2016 23:04:18 +0000 (01:04 +0200)] 
apt: use default packaging rules for -dev package

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoapt: use default packaging rules for base package, prepend apt-utils
Andreas Oberritter [Thu, 21 Apr 2016 23:02:44 +0000 (01:02 +0200)] 
apt: use default packaging rules for base package, prepend apt-utils

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoapt: use default packaging rules for manpages
Andreas Oberritter [Thu, 21 Apr 2016 22:55:12 +0000 (00:55 +0200)] 
apt: use default packaging rules for manpages

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoapt-native: use sed to prepare apt.conf.sample
Andreas Oberritter [Thu, 21 Apr 2016 22:50:13 +0000 (00:50 +0200)] 
apt-native: use sed to prepare apt.conf.sample

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoapt: merge apt-package.inc into .bb
Andreas Oberritter [Thu, 21 Apr 2016 22:42:21 +0000 (00:42 +0200)] 
apt: merge apt-package.inc into .bb

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoapt-native: merge apt-native.inc into .bb
Andreas Oberritter [Thu, 21 Apr 2016 22:40:22 +0000 (00:40 +0200)] 
apt-native: merge apt-native.inc into .bb

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agodebianutils: Allow native builds
Andreas Oberritter [Fri, 20 Mar 2015 15:55:38 +0000 (16:55 +0100)] 
debianutils: Allow native builds

Apt has a runtime dependency on it.

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agopackage_manager/deb: pass option --cross-bootstrap to dpkg
Andreas Oberritter [Thu, 25 Sep 2014 22:31:08 +0000 (00:31 +0200)] 
package_manager/deb: pass option --cross-bootstrap to dpkg

Fixes removal of packages with new dpkg version.

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agodpkg-native: hardcode SYSCONFDIR to /etc in update-alternatives
Andreas Oberritter [Thu, 28 Aug 2014 14:05:50 +0000 (16:05 +0200)] 
dpkg-native: hardcode SYSCONFDIR to /etc in update-alternatives

It needs to be relative to DPKG_INSTDIR when installing.

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoapt-native: Use option --cross-bootstrap for rootfs
Andreas Oberritter [Thu, 28 Aug 2014 03:50:36 +0000 (05:50 +0200)] 
apt-native: Use option --cross-bootstrap for rootfs

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agodpkg: update-alternatives-dpkg should conflict with other providers
Andreas Oberritter [Wed, 27 Aug 2014 21:45:35 +0000 (23:45 +0200)] 
dpkg: update-alternatives-dpkg should conflict with other providers

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agodpkg: implement offline mode for update-alternatives
Andreas Oberritter [Wed, 27 Aug 2014 15:37:20 +0000 (17:37 +0200)] 
dpkg: implement offline mode for update-alternatives

Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agodb: Refresh patches
Richard Purdie [Wed, 28 Sep 2016 23:39:37 +0000 (00:39 +0100)] 
db: Refresh patches

The patches were failing to apply in some cases, refresh them aganst the
current source.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit eb11f60d9d87aa24e93a86f366764b1848bb5cb1)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agodb: Upgrade to 6.0.35
Aníbal Limón [Wed, 28 Sep 2016 16:06:10 +0000 (11:06 -0500)] 
db: Upgrade to 6.0.35

The SRC_URI was changed to point gentoo distfiles because now Oracle
request authorization for download the source code [1], there are no changes
in the LICENSE since version 6.0.20 when the LICENSE changes to AGPL-3
[2], also the md5sum was review to be sure that is the same.

This minor upgrade fix an issue related to multiple rpm instances querying
the database [3].

The bugfixes related are,

- Fixed a bug that may lead to a crash when opening multiple environments
in a multi-threaded program.
- Fixed a bug where closing a panic environment raised access violation
  and crashed the program.

For see the complete list of changes mostly bugfixes between 6.0.30 and 6.0.35 [4].

[1] http://download.oracle.com/otn/berkeley-db/db-6.0.35.tar.gz
[2] http://download.oracle.com/otndocs/products/berkeleydb/html/changelog_6_0.html#idp509784
[3] https://bugzilla.yoctoproject.org/show_bug.cgi?id=10157#c0
[4] http://download.oracle.com/otndocs/products/berkeleydb/html/changelog_6_0.html#idp503384

[YOCTO #10157]

Signed-off-by: Aníbal Limón <anibal.limon@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 8f72cae18961e9556e54db76a416bde497dc8b6d)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agokernel.bbclass: assign INITRAMFS_BASE_NAME using ?=
Andre McCurdy [Fri, 16 Sep 2016 22:52:29 +0000 (15:52 -0700)] 
kernel.bbclass: assign INITRAMFS_BASE_NAME using ?=

Default values for KERNEL_IMAGE_BASE_NAME and MODULE_IMAGE_BASE_NAME
are already assigned using ?= and anyone wanting to over-ride one is
likely to want to over-ride them all. Make the three consistent with
each other.

Signed-off-by: Andre McCurdy <armccurdy@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit e30c6c93bb70d17244c90c2be12229148f8f6314)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoopenjade/sgml-common: Add sstate postrm commands
Richard Purdie [Thu, 15 Sep 2016 10:48:39 +0000 (11:48 +0100)] 
openjade/sgml-common: Add sstate postrm commands

If you bump the PR of sgml-common and openjade-native but not sgml-
common-native, you will see a failure as files were removed from the
sysroot but still referenced by the sgml docbook catalog.

To properly handle this, the clean function needs to run at sstate
removal time, the problem is that this sstate removal can happen when
the metadata isn't present, so the correct removal commands are
unknown.

To avoid this, we need to write the commands into a "postrm" script
when we install the files, this can then be executed at sstate removal
time.

[YOCTO #8273]

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit cdae3e76232110903d124195b036e4e70fb28aa4)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agosstate: Add postrm command support
Richard Purdie [Thu, 15 Sep 2016 10:45:14 +0000 (11:45 +0100)] 
sstate: Add postrm command support

There are some issues in sstate which can't be handled by file removal
alone. Currently there is no way to execute a command against sstate and
doing so is potentially problematic for things like dependencies. This
patch adds a mechanism where any "postrm" script is executed if its present
allowing some openjade/sgml issues to be resolved.

[YOCTO #8273]

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 2268efd0cd3ddb40870c4c424d10444ba86d2849)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agodpkg: Avoid automatic target architecture detection
Alexandre Belloni [Mon, 8 Aug 2016 09:56:09 +0000 (11:56 +0200)] 
dpkg: Avoid automatic target architecture detection

dpkg is using a script (dpkg-architecture.pl) to detect the target
architecture automatically.
Unfortunately, it is using the cross compiler prefix to do the detection
and for ARM, oe-core is using <vendor>-linux-gnueabi for toolchains with
and without call-convention hard. The script then always detects
'armel' and never gets 'armhf' for call-convention hard.

This solves:
dpkg: error processing archive evtest_1.32+0+b8343ec112-r0_armhf.deb (--install):
 package architecture (armhf) does not match system (armel)
 Errors were encountered while processing:
 evtest_1.32+0+b8343ec112-r0_armhf.deb

Signed-off-by: Alexandre Belloni <alexandre.belloni@free-electrons.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit b01a01ff47e09da4aaa2db992380ca0498f0e5ae)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agokernel.bbclass: add lzop dependency
Trevor Woerner [Mon, 1 Aug 2016 12:32:53 +0000 (08:32 -0400)] 
kernel.bbclass: add lzop dependency

If the initramfs image is type lzo, then a native lzop is needed.

Signed-off-by: Trevor Woerner <twoerner@gmail.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit ee0640cb0c32b959ffaaac6752d582ed1d76e313)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agokernel.bbclass: explicitly set workdir in do_bundle_initramfs
André Draszik [Thu, 21 Jul 2016 11:09:23 +0000 (12:09 +0100)] 
kernel.bbclass: explicitly set workdir in do_bundle_initramfs

bitbake rev 67a7b8b02 "build: don't use $B as the default cwd for
functions" (included in current bitbake master) breaks the assumption
that do_bundle_initramfs runs inside the build directory.

This causes kernel_do_compile() as called from within
do_bundle_initramfs() to fail, as the former is not being executed
from the correct directory anymore. (Note that kernel_do_compile()
as called from bitbake directly doesn't suffer from that problem,
as it inherits the workdir from base_do_compile() in that case.)

Set workdir explicitly.

Signed-off-by: André Draszik <git@andred.net>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit 4455da22a151c2ac006af63cbd39779b21b12580)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agodb: Use cross libtool
Khem Raj [Tue, 12 Jul 2016 17:10:17 +0000 (10:10 -0700)] 
db: Use cross libtool

Reintroduce the use of cross-libtool when building the target package
this fails otherwise with clang

| ./libtool --mode=execute true db_printlog
| /usr/lib/libstdc++.so: file not recognized: File format not recognized
| clang-3.9: error: linker command failed with exit code 1 (use -v to see invocation)

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit f9fab69a15a71f541f93fb38319de03ad07b1bf5)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agosstate.bbclass: make PV to depend on PV variable value
Ed Bartosh [Mon, 11 Jul 2016 09:43:09 +0000 (12:43 +0300)] 
sstate.bbclass: make PV to depend on PV variable value

Currently PV is defined in meta/conf/bitbake.conf as a python
expression: "${@bb.parse.BBHandler.vars_from_file(d.getVar('FILE',
False),d)[1] or '1.0'}". As FILE is whitelisted it causes PV to
not depend on it. This causes sstate code to not detect that
PV changes when recipe filename changes.

Making PV to explicitly depend on PV variable value overrides default
behaviour. Instead of depending on python expression bitbake depends
on evaluated value of PV variable, which should fix the above
mentioned issue.

[YOCTO #9806]

Signed-off-by: Ed Bartosh <ed.bartosh@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit 918646ca803d56004fb0ab7c21e86cc9cb14513d)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agodb: use S/B more idiomatically
Ross Burton [Tue, 23 Feb 2016 14:05:35 +0000 (14:05 +0000)] 
db: use S/B more idiomatically

Instead of setting S to a directory inside the tarball and B to another
directory inside the tarball, use the default value of S and set
AUTOTOOLS_SCRIPT_PATH to the right path to find configure.  Update the patches
so they still apply, and clean up the recipe slightly.

Because something is not quite right regarding quilt and patching, add a PR bump
to the recipes to ensure that a clean work directory is used: for some reason
rebuilds will rarely fail to patch correctly.

Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit dcbef72b8344c22617d65ea1e9f0fa7ad9a742bd)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoclasses/kernel: fix symlink logic when bundling initramfs images
André Draszik [Fri, 24 Jun 2016 13:40:08 +0000 (14:40 +0100)] 
classes/kernel: fix symlink logic when bundling initramfs images

If linkpath points to the a file in KERNEL_OUTPUT_DIR, rather than
outside, then symlink creation for the bundled initramfs image files
fails.

This is because in that case $linkpath.initramfs and $realpath.initramfs
are in the same directory, KERNEL_OUTPUT_DIR, and hence are the same.
Since we just created $realpath.initramfs, creating a symlink with the
same name will fail.

Given that $linkpath is not necessarily the same as the kernel image type,
just removing this symlink creation is not the right thing to do, as
in that case kernel_do_deploy() wouldn't find the bundled file.

What we really want is a symlink from the name of the initramfs-bundled
kernel image type to the real initramfs-bundled kernel image, as that is
what is actually used later in do_deploy().

This brings the code path for when $KERNEL_OUTPUT_DIR/$type is a symlink
in line with when it is not.

Signed-off-by: André Draszik <adraszik@tycoint.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit 7585ebbbe4e95870ab7475737ed5b94255351c72)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoclasses/kernel: fix symlink creation in DEPLOYDIR for bundled initramfs
André Draszik [Fri, 24 Jun 2016 10:42:32 +0000 (11:42 +0100)] 
classes/kernel: fix symlink creation in DEPLOYDIR for bundled initramfs

If multiple kernel image types have been specified, only the very first
one would receive a symlink in DEPLOYDIR.

The reason is that we're looping over the list of image types and check
if a bundled initramfs images exists using a relative path. As part of
the loop we're changing the current directory, hence all additional
iterations fail to see the files we're looking for, and hence no symlinks
are being created.

Fix by not changing the directory and adjusting the ln invocation instead.

Signed-off-by: André Draszik <adraszik@tycoint.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit 2a6ac8ca71b669b8653eb19417faf58575385a21)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agodb: add RECIPE_NO_UPDATE_REASON
Maxin B. John [Mon, 6 Jun 2016 09:13:41 +0000 (12:13 +0300)] 
db: add RECIPE_NO_UPDATE_REASON

db-6.2.23 does not work with RPM-5.x due to changes in locking semantics

Signed-off-by: Maxin B. John <maxin.john@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 8ea6be55b795ae5306606f7d4cdacdf3c2afa5ae)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agoopenssl: fix the dangling libcrypto.a symlink
Maxin B. John [Tue, 31 May 2016 15:26:03 +0000 (18:26 +0300)] 
openssl: fix the dangling libcrypto.a symlink

Update libcrypto.a symlink to the proper location.

[YOCTO #9523]

Signed-off-by: Maxin B. John <maxin.john@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 3d6884a99a170a2d1925ed347431518fff3cf367)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agokernel: Make symbol link to vmlinuz in boot directory
He Zhe [Wed, 25 May 2016 08:47:17 +0000 (04:47 -0400)] 
kernel: Make symbol link to vmlinuz in boot directory

Rename do_kernel_link_vmlinux to do_kernel_link_images and make a
symbol link to vmlinuz(if exists) for reference in arch/$arch/boot
directory.

Signen-off-by: He Zhe <zhe.he@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit 6e58f54be103814b6b8a85b236510633c49e6832)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agokernel: Add KERNEL_IMAGETYPES to build multi types kernel at one time
He Zhe [Wed, 25 May 2016 08:47:16 +0000 (04:47 -0400)] 
kernel: Add KERNEL_IMAGETYPES to build multi types kernel at one time

Add KERNEL_IMAGETYPES to support building packaging and installing
multi types of kernel images, such as zImage uImage, at one time.

KERNEL_IMAGETYPE and KERNEL_ALT_IMAGETYPE work as before.

Signed-off-by: He Zhe <zhe.he@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit 849b67b2e4820564b5e5c9bd4bb293c44351c5f3)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agokernel-uimage: Fix python indentation
Richard Purdie [Sat, 21 May 2016 11:27:48 +0000 (12:27 +0100)] 
kernel-uimage: Fix python indentation

Use spaces, not tabs for python functions.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 96ed92aded49fc47c7e407d36ba4f03dafee28cd)
Signed-off-by: Andreas Oberritter <obi@opendreambox.org>
7 years agowpa_supplicant: fix WPA2 key replay security bug
Ross Burton [Mon, 16 Oct 2017 22:23:37 +0000 (23:23 +0100)] 
wpa_supplicant: fix WPA2 key replay security bug

WPA2 is vulnerable to replay attacks which result in unauthenticated users
having access to the network.

* CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake

* CVE-2017-13078: reinstallation of the group key in the Four-way handshake

* CVE-2017-13079: reinstallation of the integrity group key in the Four-way
handshake

* CVE-2017-13080: reinstallation of the group key in the Group Key handshake

* CVE-2017-13081: reinstallation of the integrity group key in the Group Key
handshake

* CVE-2017-13082: accepting a retransmitted Fast BSS Transition Reassociation
Request and reinstalling the pairwise key while processing it

* CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS)
PeerKey (TPK) key in the TDLS handshake

* CVE-2017-13087: reinstallation of the group key (GTK) when processing a
Wireless Network Management (WNM) Sleep Mode Response frame

* CVE-2017-13088: reinstallation of the integrity group key (IGTK) when
processing a Wireless Network Management (WNM) Sleep Mode Response frame

Backport patches from upstream to resolve these CVEs.

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agolibgcrypt: fix CVE-2017-9526
Ross Burton [Wed, 19 Jul 2017 13:27:32 +0000 (14:27 +0100)] 
libgcrypt: fix CVE-2017-9526

In libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from
side-channel observation during the signing process) can easily recover the
long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this
session key in secure memory, to ensure that constant-time point operations are
used in the MPI library.

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agolibgcrypt: fix CVE-2017-7526
Ross Burton [Wed, 19 Jul 2017 13:27:31 +0000 (14:27 +0100)] 
libgcrypt: fix CVE-2017-7526

Fixes CVE-2017-7526, 'flush+reload side-channel attack on RSA secret keys dubbed
"Sliding right into disaster"'.

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agoinitrdscripts/init-install*: Add rootwait when installing to USB devices
California Sullivan [Tue, 9 Aug 2016 20:35:52 +0000 (13:35 -0700)] 
initrdscripts/init-install*: Add rootwait when installing to USB devices

It can take a bit for USB devices to be detected, so if a USB device is
your rootfs and you don't set rootwait you will most likely get a kernel
panic. Fix this by adding rootwait to the kernel command line on
installation.

Fixes [YOCTO #9462].

Signed-off-by: California Sullivan <california.l.sullivan@intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
8 years agopackage_ipk: Clean up Source entry in ipk packages
Richard Purdie [Fri, 16 Jun 2017 08:42:30 +0000 (09:42 +0100)] 
package_ipk: Clean up Source entry in ipk packages

There is the potential for sensitive information to leak through the urls
there and removing it brings this into the behavior of the other package
backends since filtering it is likely error prone.

Since ipks don't appear to be generated at all if we don't set this, set
the field to the recipe name used (basename only, no paths). This avoids
information leaking. We may want to drop the field if opkg can allow that
at a future point but the recipe name is a suitable identifier for now.

Reported-by: Andrej Valek <andrej.valek@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agooeqa/selftest/recipetool: actually fix create_github test
Ross Burton [Wed, 7 Jun 2017 14:28:24 +0000 (15:28 +0100)] 
oeqa/selftest/recipetool: actually fix create_github test

The Meson revision was locked down but the license list change wasn't actually
committed...

Also specify the exact path for recipetool to write to, for clarity.

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agobuild-appliance-image: Update to krogoth head revision
Richard Purdie [Wed, 7 Jun 2017 07:42:49 +0000 (08:42 +0100)] 
build-appliance-image: Update to krogoth head revision

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agogrub2: enforce -no-pie if supported by compiler
Alexander Kanavin [Fri, 2 Dec 2016 19:14:07 +0000 (21:14 +0200)] 
grub2: enforce -no-pie if supported by compiler

Recent distros are enabling -pie by default; in case of grub
we need to turn it off.

(From OE-Core rev: aaff6c99dde3f1058bb3c4b320f27753c6c992ad)

Signed-off-by: Alexander Kanavin <alexander.kanavin@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agobuild-appliance-image: Update to krogoth head revision
Richard Purdie [Tue, 6 Jun 2017 17:52:35 +0000 (18:52 +0100)] 
build-appliance-image: Update to krogoth head revision

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agorootfs_rpm: Increase rootfs size
Saul Wold [Sun, 19 Jun 2016 00:13:55 +0000 (17:13 -0700)] 
rootfs_rpm: Increase rootfs size

This doubles the amount of extra space that is provided for SMART and
RPM, as they consume more disk space during qa testing via testimage

[YOCTO #9800]

(From OE-Core rev: 2d636068d9d3a1ea2db3ace49462be13ba9ef125)

Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agooeqa/selftest: lock down Meson git revision for reliability
Ross Burton [Mon, 5 Jun 2017 16:30:42 +0000 (17:30 +0100)] 
oeqa/selftest: lock down Meson git revision for reliability

The test_recipetool_create_github test fetches HEAD of the repository so
upstream changes can (and do) break the test.  Avoid these problems by passing
the rev= argument in the URL to lock the checkout to the same version that is
fetched in the github_tarball test.

Also pass the commands to runCmd() as a list instead of a string, the semicolon
in the URL needs more quotes if the shell is involved and passing a list
bypasses the shell entirely.

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agooeqa/runtime/rpm: use su instead of sudo
Ross Burton [Tue, 23 Aug 2016 14:14:04 +0000 (15:14 +0100)] 
oeqa/runtime/rpm: use su instead of sudo

This test works fine with su, which is more likely to be installed in images
than sudo.

(From OE-Core rev: 59d10be745a1f7d31c68e4d5da9e1c3461b7d390)

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agolibunwind: Fix build race conflict with gcc and musl
Richard Purdie [Thu, 18 Aug 2016 13:46:32 +0000 (14:46 +0100)] 
libunwind: Fix build race conflict with gcc and musl

Building libunwind, then gcc-runtime causes build failures. This is hard
to fix since gcc-runtime wants the internal gcc unwind.h header but libunwind
wants to provide this. There are differences in include behaviour between gcc
and glibc which are by design.

This patch hacks around the issue by looking for a define used during gcc-runtime's
build and skipping to the internal header in that case. The patch is only enabled
on musl and is the best workaround I could come up with to unblock failing builds
on our autobuilder.

[YOCTO #10129]

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agoselftest/recipetool: Fix test for krogoth
Richard Purdie [Tue, 30 May 2017 13:21:31 +0000 (14:21 +0100)] 
selftest/recipetool: Fix test for krogoth

This test was backported and doesn't function quite the same way under
krogoth since some of the extended python license checking wasn't yet
added. This tweaks the output to match the expected result in krogoth.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agowebkitgtk: fix racy double build of WebKit2-4.0.gir
Alexander Kanavin [Mon, 29 Aug 2016 14:30:22 +0000 (17:30 +0300)] 
webkitgtk: fix racy double build of WebKit2-4.0.gir

This occasionally triggered autobuilder errors where the .gir file
appeared truncated to introspection tools.

(From OE-Core rev: 2154c1c803b7bd36a1401fa657e7fd8cb1060a70)

RP: backported from 2.12 to 2.10
Signed-off-by: Alexander Kanavin <alexander.kanavin@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agocryptodev-linux: update SRC_URI
Chang Rebecca Swee Fun [Fri, 26 May 2017 08:03:26 +0000 (16:03 +0800)] 
cryptodev-linux: update SRC_URI

Gna! project announced that the download site from gna.org HTTP server
will soon be closing down. We have verified that the site is no longer
accessible without network proxy cache. We need to update SRC_URI to
point to new alternative (nwl.cc HTTP server) in order to avoid fetcher
issues in future.

[YOCTO #11575]

Signed-off-by: Chang Rebecca Swee Fun <rebecca.swee.fun.chang@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agopseudo: Work around issues with glibc 2.24
Richard Purdie [Wed, 18 May 2016 18:28:29 +0000 (19:28 +0100)] 
pseudo: Work around issues with glibc 2.24

There are issues with a change made to RTLD_NEXT behaviour in glibc 2.24
and that change was also backported to older glibc versions in some distros
like Fedora 23. This adds a workaround whilst the pseudo maintainer fixes
various issues properly.

(From OE-Core rev: 21c38a091c4a1917f62a942c4751b0fd11dce340)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agopseudo: obey our LDFLAGS
Christopher Larson [Wed, 11 May 2016 16:25:27 +0000 (09:25 -0700)] 
pseudo: obey our LDFLAGS

(From OE-Core rev: fc04eae73cb99d3783b09d062120a9b7dc95210a)

Signed-off-by: Christopher Larson <chris_larson@mentor.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoopenssl.inc: avoid random ptest failures
Patrick Ohly [Fri, 23 Sep 2016 13:23:20 +0000 (15:23 +0200)] 
openssl.inc: avoid random ptest failures

"make alltests" is sensitive to the timestamps of the installed
files. Depending on the order in which cp copies files, .o and/or
executables may end up with time stamps older than the source files.
Running tests then triggers recompilation attempts, which typically
will fail because dev tools and files are not installed.

"cp -a" is not enough because the files also have to be newer than
the installed header files. Setting the file time stamps to
the current time explicitly after copying solves the problem because
do_install_ptest_base is guaranteed to run after do_install.

(From OE-Core rev: 101e2a5e0b7822ca3de3d3a73369405c05ab3c5b)

Signed-off-by: Patrick Ohly <patrick.ohly@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoopenssl: fix do_configure error when cwd is not in @INC
Robert Yang [Tue, 20 Sep 2016 05:34:36 +0000 (22:34 -0700)] 
openssl: fix do_configure error when cwd is not in @INC

Fixed when building on Debian-testing:
| Can't locate find.pl in @INC (@INC contains: /etc/perl /usr/local/lib/x86_64-linux-gnu/perl/5.22.2 /usr/local/share/perl/5.22.2 /usr/lib/x86_64-linux-gnu/perl5/5.22 /usr/share/perl5 /usr/lib/x86_64-linux-gnu/perl/5.22 /usr/share/perl/5.22 /usr/local/lib/site_perl /usr/lib/x86_64-linux-gnu/perl-base) at perlpath.pl line 7.

(From OE-Core rev: c28065671b582c140d5971c73791d2ac8bdebe69)

Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
fixed merge conflict
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoopenssl: Security fix CVE-2016-2177
Armin Kuster [Sat, 16 Jul 2016 23:04:11 +0000 (16:04 -0700)] 
openssl: Security fix CVE-2016-2177

Affects openssl <= 1.0.2h
CVSS v2 Base Score: 7.5 HIGH

(From OE-Core rev: 2848c7d3e454cbc84cba9183f23ccdf3e9200ec9)

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
fixed merge conflicts
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoopenssl: prevent warnings from openssl-c_rehash.sh
Joshua Lock [Wed, 22 Jun 2016 10:22:25 +0000 (11:22 +0100)] 
openssl: prevent warnings from openssl-c_rehash.sh

The openssl-c_rehash.sh script reports duplicate files and files which
don't contain a certificate or CRL by echoing a WARNING to stdout.
This warning gets picked up by the log checker during rootfs and results
in several warnings getting reported to the console during an image build.

To prevent the log from being overrun by warnings related to certificates
change these messages in openssl-c_rehash.sh to be prefixed with NOTE not
WARNING.

(From OE-Core rev: 88c25318db9f8091719b317bacd636b03d50a411)

Signed-off-by: Joshua Lock <joshua.g.lock@intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoopenssl: Ensure SSL certificates are stored on sysconfdir
Otavio Salvador [Mon, 23 May 2016 20:45:27 +0000 (17:45 -0300)] 
openssl: Ensure SSL certificates are stored on sysconfdir

Debian and other generic distributions has moved the certificates for
sysconfdir (/etc/ssl) and made the libdir content to link for it.

This provides several advantages specially for read-only
rootfs. Another benefit is that it ensures foreign implementations
(e.g: BoringSSL, from Chromium, when running with OpenSSL backend for
the certificates) to find the content correctly.

(From OE-Core rev: 50d63fa346bbb05dafffc0cb55e21e1092272d95)

Signed-off-by: Otavio Salvador <otavio@ossystems.com.br>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoopenssl: Add Shell-Script based c_rehash utility
Otavio Salvador [Mon, 23 May 2016 20:45:25 +0000 (17:45 -0300)] 
openssl: Add Shell-Script based c_rehash utility

The PLD Linux distribution has ported the c_rehash[1] utility from Perl
to Shell-Script, allowing it to be shipped by default.

1. https://git.pld-linux.org/?p=packages/openssl.git;a=blob;f=openssl-c_rehash.sh;h=0ea22637ee6dbce845a9e2caf62540aaaf5d0761

The OpenSSL upstream intends[2] to convert the utility for C however
did not yet finished the conversion.

2. https://rt.openssl.org/Ticket/Display.html?id=2324

This patch adds this script and thus removed the Perl requirement for
it.

(From OE-Core rev: cb6150f1a779e356f120d5e45c91fda75789970a)

Signed-off-by: Otavio Salvador <otavio@ossystems.com.br>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoopenssl: fix add missing dependencies building for test directory
Andrej Valek [Fri, 19 Aug 2016 10:51:06 +0000 (12:51 +0200)] 
openssl: fix add missing dependencies building for test directory

Regarding the last commit about missing dependencies, another issue
was found. The problem was found, while ptest has been built with some
set extra settings. It means, when ptest is going to be built,
it is necessary to rebuild dependencies for test directory too.

(From OE-Core rev: 030142d0410bec85aeacfff6be27d5fed41ce808)

Signed-off-by: Andrej Valek <andrej.valek@siemens.com>
Signed-off-by: Pascal Bach <pascal.bach@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoopenssl: fix add missing `make depend` command before `make` library
Andrej Valek [Fri, 5 Aug 2016 11:16:33 +0000 (13:16 +0200)] 
openssl: fix add missing `make depend` command before `make` library

Settings from EXTRA_OECONF like en/disable no-ssl3, are transferred
only into DEPFLAGS. It means that settings have no effect on output files.
DEPFLAGS will be transferred into output files with make depend command.

https://wiki.openssl.org/index.php/Compilation_and_Installation#Dependencies

(From OE-Core rev: e3c251427a305780d3257a011260bd978de273d5)

Signed-off-by: Andrej Valek <andrej.valek@siemens.com>
Signed-off-by: Pascal Bach <pascal.bach@siemens.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoopenssl: Fix MIPS64be and add MIPS64le
Zubair Lutfullah Kakakhel [Wed, 14 Sep 2016 16:53:11 +0000 (17:53 +0100)] 
openssl: Fix MIPS64be and add MIPS64le

MIPS64 target was being configured for linux-mips which defaults to
MIPS32. Doesn't cause any issue as far as I can see but it would be
wiser to use the correct target configuration.

Also add MIPS64le configuration which is missing.

(From OE-Core rev: 0afec72913bc31d315cba079da317e8b28755ded)

Signed-off-by: Zubair Lutfullah Kakakhel <Zubair.Kakakhel@imgtec.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agomesa: update SRC_URI
Armin Kuster [Sat, 11 Feb 2017 21:50:37 +0000 (16:50 -0500)] 
mesa: update SRC_URI

ERROR: mesa-2_11.1.2-r0 do_checkuri: Function failed: Fetcher failure for URL: 'ftp://ftp.freedesktop.org/pub/mesa/11.1.2/mesa-11.1.2.tar.xz'. URL ftp://ftp.freedesktop.org/pub/mesa/11.1.2/mesa-11.1.2.tar.xz doesn't work
ERROR: Logfile of failure stored in: /home/akuster/oss/maint/poky/build/tmp/work/i586-poky-linux/mesa/2_11.1.2-r0/temp/log.do_checkuri.30779
Log data follows:
| DEBUG: Executing python function do_checkuri
| DEBUG: Testing URL ftp://ftp.freedesktop.org/pub/mesa/11.1.2/mesa-11.1.2.tar.xz
| DEBUG: checkstatus() urlopen failed: <urlopen error ftp error: 550 Failed to change directory.>
| DEBUG: Python function do_checkuri finished
| ERROR: Function failed: Fetcher failure for URL: 'ftp://ftp.freedesktop.org/pub/mesa/11.1.2/mesa-11.1.2.tar.xz'. URL ftp://ftp.freedesktop.org/pub/mesa/11.1.2/mesa-11.1.2.tar.xz doesn't work

Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agolibpng -lsb: update SRC_URI
Armin Kuster [Sat, 11 Feb 2017 19:55:39 +0000 (14:55 -0500)] 
libpng -lsb: update SRC_URI

ERROR: libpng12-1.2.56-r0 do_checkuri: Function failed: Fetcher failure for URL: 'http://distfiles.gentoo.org/distfiles/libpng-1.2.56.tar.xz'. URL http://distfiles.gentoo.org/distfiles/libpng-1.2.56.tar.xz doesn't work
ERROR: Logfile of failure stored in: /home/akuster/oss/maint/poky/build/tmp/work/i586-poky-linux/libpng12/1.2.56-r0/temp/log.do_checkuri.19750
Log data follows:
| DEBUG: Executing python function do_checkuri
| DEBUG: Testing URL http://distfiles.gentoo.org/distfiles/libpng-1.2.56.tar.xz
| DEBUG: checkstatus() urlopen failed: HTTP Error 404: Not Found
| DEBUG: Python function do_checkuri finished
| ERROR: Function failed: Fetcher failure for URL: 'http://distfiles.gentoo.org/distfiles/libpng-1.2.56.tar.xz'. URL http://distfiles.gentoo.org/distfiles/libpng-1.2.56.tar.xz doesn't work

Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agolibxslt: update SRC_URI
Armin Kuster [Sat, 11 Feb 2017 19:36:36 +0000 (14:36 -0500)] 
libxslt: update SRC_URI

| ERROR: Function failed: Fetcher failure for URL: 'ftp://xmlsoft.org/libxslt/libxslt-1.1.28.tar.gz'. URL ftp://xmlsoft.org/libxslt/libxslt-1.1.28.tar.gz doesn't work
ERROR: Logfile of failure stored in: /home/akuster/oss/maint/poky/build/tmp/work/x86_64-linux/libxslt-native/1.1.28-r0/temp/log.do_checkuri.16102
Log data follows:
| DEBUG: Executing python function do_checkuri
| DEBUG: Testing URL ftp://xmlsoft.org/libxslt/libxslt-1.1.28.tar.gz
| DEBUG: checkstatus() urlopen failed: <urlopen error ftp error: [Errno 110] Connection timed out>
| DEBUG: Python function do_checkuri finished
| ERROR: Function failed: Fetcher failure for URL: 'ftp://xmlsoft.org/libxslt/libxslt-1.1.28.tar.gz'. URL ftp://xmlsoft.org/libxslt/libxslt-1.1.28.tar.gz doesn't work

Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agolibpng: update SRC_URI back to SF
Armin Kuster [Sat, 11 Feb 2017 19:26:10 +0000 (14:26 -0500)] 
libpng: update SRC_URI back to SF

ERROR: Task 944 (virtual:nativesdk:/home/akuster/oss/maint/poky/meta/recipes-multimedia/libpng/libpng_1.6.21.bb, do_checkuri) failed with exit code '1'
ERROR: libpng12-1.2.56-r0 do_checkuri: Function failed: Fetcher failure for URL: 'http://distfiles.gentoo.org/distfiles/libpng-1.2.56.tar.xz'. URL http://distfiles.gentoo.org/distfiles/libpng-1.2.56.tar.xz doesn't work
ERROR: Logfile of failure stored in: /home/akuster/oss/maint/poky/build/tmp/work/i586-poky-linux/libpng12/1.2.56-r0/temp/log.do_checkuri.14781
Log data follows:
| DEBUG: Executing python function do_checkuri
| DEBUG: Testing URL http://distfiles.gentoo.org/distfiles/libpng-1.2.56.tar.xz
| DEBUG: checkstatus() urlopen failed: HTTP Error 404: Not Found
| DEBUG: Python function do_checkuri finished
| ERROR: Function failed: Fetcher failure for URL: 'http://distfiles.gentoo.org/distfiles/libpng-1.2.56.tar.xz'. URL http://distfiles.gentoo.org/distfiles/libpng-1.2.56.tar.xz doesn't work

SF now has a old releases dir which contains this tarball. It got dropped from Gentoo

Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agolibpcre: update SRC_URI
Armin Kuster [Sat, 11 Feb 2017 19:09:13 +0000 (14:09 -0500)] 
libpcre: update SRC_URI

ERROR: Task 75 (/home/akuster/oss/maint/poky/meta/recipes-support/libpcre/libpcre_8.38.bb, do_checkuri) failed with exit code '1'
ERROR: libpcre-native-8.38-r0 do_checkuri: Function failed: Fetcher failure for URL: 'ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-8.38.tar.bz2'. URL ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-8.38.tar.bz2 doesn't work

Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agozlib: update SRC_URI to fix fetching
Joshua Lock [Thu, 5 Jan 2017 16:34:23 +0000 (16:34 +0000)] 
zlib: update SRC_URI to fix fetching

Upstream have removed the file from zlib.net as a new version has
been released, switch to fetching from the official sourceforge
mirror.

[YOCTO #10879]

(From OE-Core rev: bb99e4a620efd59556539c156cd98ea23aae74c8)

(From OE-Core rev: b7599330f1d629384e16a5fbeffc1a65c1555667)

Signed-off-by: Joshua Lock <joshua.g.lock@intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agopopulate_sdk_ext: whitelist do_package tasks
Ed Bartosh [Wed, 4 Jan 2017 18:48:18 +0000 (20:48 +0200)] 
populate_sdk_ext: whitelist do_package tasks

With enabled SSTATE_MIRRORS sstate code expects mirrors to
contain entries for all tasks, which is not the case for ext
installer as it uses reduced sstate cache.

Added do_package tasks to BB_SETSCENE_ENFORCE_WHITELIST to prevent
installer failing with ERROR: Sstate artifact unavailable

[YOCTO #10832]

(From OE-Core rev: 2ed46ada4b8e496493835e84b36f7e9c367f59d2)

(From OE-Core rev: eb2fc2cd9081a4533ed30fe81c9f491b06cc5ae1)

Signed-off-by: Ed Bartosh <ed.bartosh@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agopopulate_sdk_ext: fix working with uninative sstate
Ed Bartosh [Wed, 4 Jan 2017 18:48:17 +0000 (20:48 +0200)] 
populate_sdk_ext: fix working with uninative sstate

Mapped uninative sstate directories to make ext SDK installer to
use them when it's run on systems with gcc version different from
gcc version used to build installer.

[YOCTO #10832]

(From OE-Core rev: fb945c0fd2e66d70461e6cf2e602020eeabe32f7)

Signed-off-by: Ed Bartosh <ed.bartosh@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agotiff: Security fix CVE-2016-9538
Mingli Yu [Wed, 7 Dec 2016 08:01:12 +0000 (16:01 +0800)] 
tiff: Security fix CVE-2016-9538

* tools/tiffcrop.c: fix read of undefined buffer in
readContigStripsIntoBuffer() due to uint16 overflow.

External References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9538

Patch from:
https://github.com/vadz/libtiff/commit/43c0b81a818640429317c80fea1e66771e85024b#diff-c8b4b355f9b5c06d585b23138e1c185f

(From OE-Core rev: 9af5d5ea882c853e4cb15006f990d3814eeea9ae)

(From OE-Core rev: 33cad1173f6d1b803b794a2ec57fe8a9ef19fb44)

Signed-off-by: Mingli Yu <Mingli.Yu@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agotiff: Security fix CVE-2016-9535
Mingli Yu [Wed, 7 Dec 2016 08:01:11 +0000 (16:01 +0800)] 
tiff: Security fix CVE-2016-9535

* libtiff/tif_predict.h, libtiff/tif_predict.c:
Replace assertions by runtime checks to avoid assertions in debug mode,
or buffer overflows in release mode. Can happen when dealing with
unusual tile size like YCbCr with subsampling.

External References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9535

Patch from:
https://github.com/vadz/libtiff/commit/3ca657a8793dd011bf869695d72ad31c779c3cc1
https://github.com/vadz/libtiff/commit/6a984bf7905c6621281588431f384e79d11a2e33

(From OE-Core rev: 61d3feb9cad9f61f6551b43f4f19bfa33cadd275)

(From OE-Core rev: d55b4470c20f4a4b73b1e6f148a45d94649dfdb5)

Signed-off-by: Mingli Yu <Mingli.Yu@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agotiff: Security fix CVE-2016-9539
Zhixiong Chi [Mon, 28 Nov 2016 09:52:13 +0000 (17:52 +0800)] 
tiff: Security fix CVE-2016-9539

tools/tiffcrop.c in libtiff 4.0.6 has an out-of-bounds read in
readContigTilesIntoBuffer(). Reported as MSVR 35092.

External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9539

Patch from:
https://github.com/vadz/libtiff/commit/ae9365db1b271b62b35ce018eac8799b1d5e8a53

(From OE-Core rev: 58bf0a237ca28459eb8c3afa030c0054f5bc1f16)

(From OE-Core rev: 0933a11707a369c8eaefebd31e8eea634084d66e)

Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agotiff: Security fix CVE-2016-9540
Zhixiong Chi [Mon, 28 Nov 2016 08:12:04 +0000 (16:12 +0800)] 
tiff: Security fix CVE-2016-9540

tools/tiffcp.c in libtiff 4.0.6 has an out-of-bounds write on tiled
images with odd tile width versus image width. Reported as MSVR 35103,
aka "cpStripToTile heap-buffer-overflow."

External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9540

Patch from:
https://github.com/vadz/libtiff/commit/5ad9d8016fbb60109302d558f7edb2cb2a3bb8e3

(From OE-Core rev: cc97dc66006c7892473e3b4790d05e12445bb927)

(From OE-Core rev: ad2c4710ef15c35f6dd4e7642efbceb2cbf81736)

Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agotiff: Security fix CVE-2016-3632
Yi Zhao [Thu, 17 Nov 2016 08:08:10 +0000 (16:08 +0800)] 
tiff: Security fix CVE-2016-3632

CVE-2016-3632 libtiff: The _TIFFVGetField function in tif_dirinfo.c in
LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of
service (out-of-bounds write) or execute arbitrary code via a crafted
TIFF image.

External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3632
http://bugzilla.maptools.org/show_bug.cgi?id=2549
https://bugzilla.redhat.com/show_bug.cgi?id=1325095

The patch is from RHEL7.

(From OE-Core rev: 9206c86239717718be840a32724fd1c190929370)

(From OE-Core rev: 0c6928f4129e5b1e24fa2d42279353e9d15d39f0)

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agotiff: Security fix CVE-2016-3658
Zhixiong Chi [Mon, 14 Nov 2016 09:46:52 +0000 (17:46 +0800)] 
tiff: Security fix CVE-2016-3658

The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool
allows remote attackers to cause a denial of service (out-of-bounds read) via vectors
involving the ma variable.

External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3658
http://bugzilla.maptools.org/show_bug.cgi?id=2546

Patch from:
https://github.com/vadz/libtiff/commit/45c68450bef8ad876f310b495165c513cad8b67d

(From OE-Core rev: c060e91d2838f976774d074ef07c9e7cf709f70a)

(From OE-Core rev: cc266584158c8dfc8583d21534665b6152a4f7ee)

Signed-off-by: Zhixiong Chi <zhixiong.chi@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoexpat: CVE-2012-6702, CVE-2016-5300
Sona Sarmadi [Mon, 16 Jan 2017 06:30:00 +0000 (07:30 +0100)] 
expat: CVE-2012-6702, CVE-2016-5300

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702
http://www.openwall.com/lists/oss-security/2016/06/04/5

Reference to upstream fix:
https://bugzilla.redhat.com/attachment.cgi?id=1165210
Squashed backport against vanilla Expat 2.1.1, addressing:
* CVE-2012-6702 -- unanticipated internal calls to srand
* CVE-2016-5300 -- use of too little entropy

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agooeqa: fix hasPackage, add hasPackageMatch
Ross Burton [Wed, 15 Jun 2016 11:01:23 +0000 (12:01 +0100)] 
oeqa: fix hasPackage, add hasPackageMatch

hasPackage() was looking for the string provided as an RE substring in the
manifest, which resulted in a large number of false positives (i.e. libgtkfoo
would match "gtk+").

Rewrite the manifest loader to parse the files into a proper data structure,
change hasPackage to do full string matches, and add hasPackageMatch which does
RE substring matches.

(From OE-Core rev: b9409863af71899e02275439949e3f4cdfaf2d0f)

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agotzdata: update to 2016i
Armin Kuster [Fri, 4 Nov 2016 05:53:28 +0000 (22:53 -0700)] 
tzdata: update to 2016i

  Briefly: Cyprus split into two time zones on 2016-10-30, and Tonga
  reintroduces DST on 2016-11-06.

  Changes to future time stamps

    Pacific/Tongatapu begins DST on 2016-11-06 at 02:00, ending on
    2017-01-15 at 03:00.  Assume future observances in Tonga will be
    from the first Sunday in November through the third Sunday in
    January, like Fiji.  (Thanks to Pulu ʻAnau.)  Switch to numeric
    time zone abbreviations for this zone.

  Changes to past and future time stamps

    Northern Cyprus is now +03 year round, causing a split in Cyprus
    time zones starting 2016-10-30 at 04:00.  This creates a zone
    Asia/Famagusta.  (Thanks to Even Scharning and Matt Johnson.)

    Antarctica/Casey switched from +08 to +11 on 2016-10-22.
    (Thanks to Steffen Thorsen.)

  Changes to past time stamps

    Several corrections were made for pre-1975 time stamps in Italy.
    These affect Europe/Malta, Europe/Rome, Europe/San_Marino, and
    Europe/Vatican.

    First, the 1893-11-01 00:00 transition in Italy used the new UT
    offset (+01), not the old (+00:49:56).  (Thanks to Michael
    Deckers.)

    Second, rules for daylight saving in Italy were changed to agree
    with Italy's National Institute of Metrological Research (INRiM)
    except for 1944, as follows (thanks to Pierpaolo Bernardi, Brian
    Inglis, and Michael Deckers):

      The 1916-06-03 transition was at 24:00, not 00:00.

      The 1916-10-01, 1919-10-05, and 1920-09-19 transitions were at
      00:00, not 01:00.

      The 1917-09-30 and 1918-10-06 transitions were at 24:00, not
      01:00.

      The 1944-09-17 transition was at 03:00, not 01:00.  This
      particular change is taken from Italian law as INRiM's table,
      (which says 02:00) appears to have a typo here.  Also, keep the
      1944-04-03 transition for Europe/Rome, as Rome was controlled by
      Germany then.

      The 1967-1970 and 1972-1974 fallback transitions were at 01:00,
      not 00:00.

(From OE-Core rev: daf95f7fd9f7ab65685d7b764d8e50df8d00d308)

Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agotzcode: update to 2016i
Armin Kuster [Fri, 4 Nov 2016 05:53:27 +0000 (22:53 -0700)] 
tzcode: update to 2016i

Changes to code

  The code should now be buildable on AmigaOS merely by setting the
  appropriate Makefile variables.  (From a patch by Carsten Larsen.)

(From OE-Core rev: d2b8c4ee535684f5d874082a7f76efbda1907ea5)

Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoopenssl: Security fix CVE-2016-8610
Armin Kuster [Sun, 6 Nov 2016 15:33:27 +0000 (07:33 -0800)] 
openssl: Security fix CVE-2016-8610

affects openssl < 1.0.2i

(From OE-Core rev: 0256b61cdafe540edb3cec2a34429e24b037cfae)

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agotiff: Security fix CVE-2016-3622
Yi Zhao [Wed, 26 Oct 2016 08:26:48 +0000 (16:26 +0800)] 
tiff: Security fix CVE-2016-3622

CVE-2016-3622 libtiff: The fpAcc function in tif_predict.c in the
tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to
cause a denial of service (divide-by-zero error) via a crafted TIFF
image.

External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3622
http://www.openwall.com/lists/oss-security/2016/04/07/4

Patch from:
https://github.com/vadz/libtiff/commit/92d966a5fcfbdca67957c8c5c47b467aa650b286

(From OE-Core rev: 0af0466f0381a72b560f4f2852e1d19be7b6a7fb)

(From OE-Core rev: 928eadf8442cf87fb2d4159602bd732336d74bb7)

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agotiff: Security fix CVE-2016-3623
Yi Zhao [Wed, 26 Oct 2016 08:26:47 +0000 (16:26 +0800)] 
tiff: Security fix CVE-2016-3623

CVE-2016-3623 libtiff: The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier
allows remote attackers to cause a denial of service (divide-by-zero) by
setting the (1) v or (2) h parameter to 0.

External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3623
http://bugzilla.maptools.org/show_bug.cgi?id=2569

Patch from:
https://github.com/vadz/libtiff/commit/bd024f07019f5d9fea236675607a69f74a66bc7b

(From OE-Core rev: d66824eee47b7513b919ea04bdf41dc48a9d85e9)

(From OE-Core rev: f0e77ffa6bbc3adc61a2abd5dbc9228e830c055d)

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agotiff: Security fix CVE-2016-3991
Yi Zhao [Wed, 26 Oct 2016 08:26:46 +0000 (16:26 +0800)] 
tiff: Security fix CVE-2016-3991

CVE-2016-3991 libtiff: Heap-based buffer overflow in the loadImage
function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote
attackers to cause a denial of service (out-of-bounds write) or execute
arbitrary code via a crafted TIFF image with zero tiles.

External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3991
http://bugzilla.maptools.org/show_bug.cgi?id=2543

Patch from:
https://github.com/vadz/libtiff/commit/e596d4e27c5afb7960dc360fdd3afd90ba0fb8ba

(From OE-Core rev: d31267438a654ecb396aefced201f52164171055)

(From OE-Core rev: cf58711f12425fc1c29ed1e3bf3919b3452aa2b2)

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agotiff: Security fix CVE-2016-3990
Yi Zhao [Wed, 26 Oct 2016 08:26:45 +0000 (16:26 +0800)] 
tiff: Security fix CVE-2016-3990

CVE-2016-3990 libtiff: Heap-based buffer overflow in the
horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and
earlier allows remote attackers to cause a denial of service (crash) or
execute arbitrary code via a crafted TIFF image to tiffcp.

External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3990
http://bugzilla.maptools.org/show_bug.cgi?id=2544

Patch from:
https://github.com/vadz/libtiff/commit/6a4dbb07ccf92836bb4adac7be4575672d0ac5f1

(From OE-Core rev: c6492563037bcdf7f9cc50c8639f7b6ace261e62)

(From OE-Core rev: d7165cd738ac181fb29d2425e360f2734b0d1107)

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agotiff: Security fix CVE-2016-3945
Yi Zhao [Wed, 26 Oct 2016 08:26:44 +0000 (16:26 +0800)] 
tiff: Security fix CVE-2016-3945

CVE-2016-3945 libtiff: Multiple integer overflows in the (1)
cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in
LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote
attackers to cause a denial of service (crash) or execute arbitrary code
via a crafted TIFF image, which triggers an out-of-bounds write.

External References:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3945
http://bugzilla.maptools.org/show_bug.cgi?id=2545

Patch from:
https://github.com/vadz/libtiff/commit/7c39352ccd9060d311d3dc9a1f1bc00133a160e6

(From OE-Core rev: 04b9405c7e980d7655c2fd601aeeae89c0d83131)

(From OE-Core rev: 3a4d2618c50aed282af335ef213c5bc0c9f0534e)

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 years agotzdata: Update to 2016h
Armin Kuster [Mon, 24 Oct 2016 03:00:16 +0000 (20:00 -0700)] 
tzdata: Update to 2016h

Changes to future time stamps

    Asia/Gaza and Asia/Hebron end DST on 2016-10-29 at 01:00, not
    2016-10-21 at 00:00.  (Thanks to Sharef Mustafa.)  Predict that
    future fall transitions will be on the last Saturday of October
    at 01:00, which is consistent with predicted spring transitions
    on the last Saturday of March.  (Thanks to Tim Parenti.)

Changes to past time stamps

    In Turkey, transitions in 1986-1990 were at 01:00 standard time
    not at 02:00, and the spring 1994 transition was on March 20, not
    March 27.  (Thanks to Kıvanç Yazan.)

Changes to past and future time zone abbreviations

    Asia/Colombo now uses numeric time zone abbreviations like "+0530"
    instead of alphabetic ones like "IST" and "LKT".  Various
    English-language sources use "IST", "LKT" and "SLST", with no
    working consensus.  (Usage of "SLST" mentioned by Sadika
    Sumanapala.)

(From OE-Core rev: ff11ca44fec8e4b2aa523e032bd967e3ab8339a8)

(From OE-Core rev: 5637d1555b51569cdd7202ee47a0b913a0b429cb)

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agotzcode-native: update to 2016h
Armin Kuster [Mon, 24 Oct 2016 03:00:15 +0000 (20:00 -0700)] 
tzcode-native: update to 2016h

Changes to code

zic no longer mishandles relativizing file names when creating
symbolic links like /etc/localtime, when these symbolic links
are outside the usual directory hierarchy.  This fixes a bug
introduced in 2016g.  (Problem reported by Andreas Stieger.)

(From OE-Core rev: 9c5de646e01a83219be74e99dcf7c1e56ba38b53)

(From OE-Core rev: 9288b6e699abbf5b314029b0db9230ca159b335a)

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agocurl: CVE-2016-8625
Sona Sarmadi [Tue, 15 Nov 2016 09:08:20 +0000 (10:08 +0100)] 
curl: CVE-2016-8625

IDNA 2003 makes curl use wrong host

Affected versions: curl 7.12.0 to and including 7.50.3
Reference:
https://curl.haxx.se/docs/adv_20161102K.html

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agocurl: CVE-2016-8624
Sona Sarmadi [Tue, 15 Nov 2016 09:08:19 +0000 (10:08 +0100)] 
curl: CVE-2016-8624

invalid URL parsing with '#'

Affected versions: curl 7.1 to and including 7.50.3
Reference:
https://curl.haxx.se/docs/adv_20161102J.html

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agocurl: CVE-2016-8623
Sona Sarmadi [Tue, 15 Nov 2016 09:08:18 +0000 (10:08 +0100)] 
curl: CVE-2016-8623

Use-after-free via shared cookies

Affected versions: curl 7.10.7 to and including 7.50.3
Reference:
https://curl.haxx.se/docs/adv_20161102I.html

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agocurl: CVE-2016-8622
Sona Sarmadi [Tue, 15 Nov 2016 09:08:17 +0000 (10:08 +0100)] 
curl: CVE-2016-8622

URL unescape heap overflow via integer truncation

Affected versions: curl 7.24.0 to and including 7.50.3
Reference:
https://curl.haxx.se/docs/adv_20161102H.html

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agocurl: CVE-2016-8621
Sona Sarmadi [Tue, 15 Nov 2016 09:08:16 +0000 (10:08 +0100)] 
curl: CVE-2016-8621

curl_getdate read out of bounds

Affected versions: curl 7.12.2 to and including 7.50.3
Reference:
https://curl.haxx.se/docs/adv_20161102G.html

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agocurl: CVE-2016-8620
Sona Sarmadi [Tue, 15 Nov 2016 09:08:15 +0000 (10:08 +0100)] 
curl: CVE-2016-8620

glob parser write/read out of bounds

Affected versions: curl 7.34.0 to and including 7.50.3
Reference:
https://curl.haxx.se/docs/adv_20161102F.html

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agocurl: CVE-2016-8619
Sona Sarmadi [Tue, 15 Nov 2016 09:08:14 +0000 (10:08 +0100)] 
curl: CVE-2016-8619

double-free in krb5 code

Affected versions: curl 7.3 to and including 7.50.3
Reference:
https://curl.haxx.se/docs/adv_20161102E.html

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agocurl: CVE-2016-8618
Sona Sarmadi [Tue, 15 Nov 2016 09:08:13 +0000 (10:08 +0100)] 
curl: CVE-2016-8618

double-free in curl_maprintf

Affected versions: curl 7.1 to and including 7.50.3
Reference:
https://curl.haxx.se/docs/adv_20161102D.html

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agocurl: CVE-2016-8617
Sona Sarmadi [Tue, 15 Nov 2016 09:08:12 +0000 (10:08 +0100)] 
curl: CVE-2016-8617

OOB write via unchecked multiplication

Affected versions: curl 7.1 to and including 7.50.3

Reference:
https://curl.haxx.se/docs/adv_20161102C.html

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agocurl: CVE-2016-8616
Sona Sarmadi [Tue, 15 Nov 2016 09:08:11 +0000 (10:08 +0100)] 
curl: CVE-2016-8616

case insensitive password comparison

Affected versions: curl 7.7 to and including 7.50.3

Reference:
https://curl.haxx.se/docs/adv_20161102B.html

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agocurl: CVE-2016-8615
Sona Sarmadi [Tue, 15 Nov 2016 09:08:10 +0000 (10:08 +0100)] 
curl: CVE-2016-8615

cookie injection for other servers

Affected versions: curl 7.1 to and including 7.50.3

Reference:
https://curl.haxx.se/docs/adv_20161102A.html

Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
8 years agoweston: Add no-input-device patch to 1.9.0.
Daniel Díaz [Tue, 25 Oct 2016 18:09:45 +0000 (13:09 -0500)] 
weston: Add no-input-device patch to 1.9.0.

The included patch, backported from Weston master, allows
it to run without any input device at launch. An ini option
is introduced for this purpose, so there is no behavioral
change.

Related change in weston.ini:
  [core]
  require-input=true

Default is true; setting it false allows Weston to run
without a keyboard or mouse, which is handy for automated
environments.

Signed-off-by: Daniel Díaz <daniel.diaz@linaro.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>