- 16 Jan, 2018 3 commits
-
-
Adrian Perez de Castro authored
This is a maintenance release of the current stable WebKitGTK+ version, which contains mitigations for CVE-2017-5753 and CVE-2017-5715, the vulnerabilities known as the "Spectre" attack. It also contains a fix which allows building the reference documentation with newer gtk-doc versions. Release notes can be found in the announcement: https://webkitgtk.org/2018/01/10/webkitgtk2.18.5-released.html Signed-off-by:
Adrian Perez de Castro <aperez@igalia.com> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 4c5bc08ba3198075dcf6f96b34684d577cfe5a69) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Fabio Estevam authored
[Peter: drop 4.14.x bump] Signed-off-by:
Fabio Estevam <fabio.estevam@nxp.com> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit f932dc96260bf56d732d3e7088c228775a286f90) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Peter Korsgaard authored
Fixes the following security issues: * AST-2017-014: Crash in PJSIP resource when missing a contact header A select set of SIP messages create a dialog in Asterisk. Those SIP messages must contain a contact header. For those messages, if the header was not present and using the PJSIP channel driver, it would cause Asterisk to crash. The severity of this vulnerability is somewhat mitigated if authentication is enabled. If authentication is enabled a user would have to first be authorized before reaching the crash point. For more details, see the announcement: https://www.asterisk.org/downloads/asterisk-news/asterisk-13185-1475-1515-and-1318-cert2-now-available-security Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 4f13dc362d5c9c63fb5a21ede7cf902c1281cef0) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
- 08 Jan, 2018 21 commits
-
-
Fabio Estevam authored
Signed-off-by:
Fabio Estevam <festevam@gmail.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit a24ed4127eafa8d2f1bea13142f5632f4c62031f) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Peter Korsgaard authored
Fixes #10556 The --with-crypto handling in ntp only works with libopenssl, not with libressl, where it ends up with compilation issues like: ntp_control.c:(.text+0x64): undefined reference to `EVP_MD_CTX_new' ntp_control.c:(.text+0x10c): undefined reference to `EVP_MD_CTX_free' libntpd.a(ntp_crypto.o): In function `bighash': ntp_crypto.c:(.text+0x2e8): undefined reference to `EVP_MD_CTX_new' ntp_crypto.c:(.text+0x328): undefined reference to `EVP_MD_CTX_free' libntpd.a(ntp_crypto.o): In function `crypto_verify': ntp_crypto.c:(.text+0x6cc): undefined reference to `EVP_MD_CTX_new' ntp_crypto.c:(.text+0x710): undefined reference to `EVP_MD_CTX_free' ntp_crypto.c:(.text+0x72c): undefined reference to `EVP_MD_CTX_free' So ensure we only pass --with-crypto when libopenssl is used. Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 522111f81c7d535f4f362ad4a15d141d0eb39ec5) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Peter Korsgaard authored
Fixes the following security issues: 14.6.1: * AST-2017-005 (applied to all released versions): The "strictrtp" option in rtp.conf enables a feature of the RTP stack that learns the source address of media for a session and drops any packets that do not originate from the expected address. This option is enabled by default in Asterisk 11 and above. The "nat" and "rtp_symmetric" options for chan_sip and chan_pjsip respectively enable symmetric RTP support in the RTP stack. This uses the source address of incoming media as the target address of any sent media. This option is not enabled by default but is commonly enabled to handle devices behind NAT. A change was made to the strict RTP support in the RTP stack to better tolerate late media when a reinvite occurs. When combined with the symmetric RTP support this introduced an avenue where media could be hijacked. Instead of only learning a new address when expected the new code allowed a new source address to be learned at all times. If a flood of RTP traffic was received the strict RTPsupport would allow the new address to provide media and with symmetric RTP enabled outgoing traffic would be sent to this new address, allowing the media to be hijacked. Provided the attacker continued to send traffic they would continue to receive traffic as well. * AST-2017-006 (applied to all released versions): The app_minivm module has an “externnotify” program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection. * AST-2017-007 (applied only to 13.17.1 and 14.6.1): A carefully crafted URI in a From, To or Contact header could cause Asterisk to crash For more details, see the announcement: https://www.asterisk.org/downloads/asterisk-news/asterisk-11252-13171-1461-116-cert17-1313-cert5-now-available-security 14.6.2: * AST-2017-008: Insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the “nat” and “symmetric_rtp” options allow redirecting where Asterisk sends the next RTCP report. The RTP stream qualification to learn the source address of media always accepted the first RTP packet as the new source and allowed what AST-2017-005 was mitigating. The intent was to qualify a series of packets before accepting the new source address. For more details, see the announcement: https://www.asterisk.org/downloads/asterisk-news/asterisk-11253-13172-1462-116-cert18-1313-cert6-now-available-security Drop 0004-configure-in-cross-complation-assimne-eventfd-are-av.patch as this is now handled differently upstream (by disabling eventfd for cross compilation, see commit 2e927990b3d2 (eventfd: Disable during cross compilation)). If eventfd support is needed then this should be submitted upstream. Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> Reviewed-by:
"Yann E. MORIN" <yann.morin.1998@free.fr> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 3f1d2c6c746a04d19a493f4e7b866e84e3aa7dc8) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Peter Korsgaard authored
>From the advisory (https://irssi.org/security/irssi_sa_2018_01.txt): Multiple vulnerabilities have been located in Irssi. (a) When the channel topic is set without specifying a sender, Irssi may dereference NULL pointer. Found by Joseph Bisch. (CWE-476) CVE-2018-5206 was assigned to this issue. (b) When using incomplete escape codes, Irssi may access data beyond the end of the string. (CWE-126) Found by Joseph Bisch. CVE-2018-5205 was assigned to this issue. (c) A calculation error in the completion code could cause a heap buffer overflow when completing certain strings. (CWE-126) Found by Joseph Bisch. CVE-2018-5208 was assigned to this issue. (d) When using an incomplete variable argument, Irssi may access data beyond the end of the string. (CWE-126) Found by Joseph Bisch. CVE-2018 -5207 was assigned to this issue. Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit aebdb1cd4b4034542eb7c50fc4b6a265c5ba5c77) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Jan Heylen authored
Verified experimentally by using exception_ptr with m68k_cf5208 and looking at the value of ATOMIC_INT_LOCK_FREE. ATOMIC_INT_LOCK_FREE=1, so the issue is present. Also verified that gcc 7.x fixed it also for cf5208. Signed-off-by:
Jan Heylen <jan.heylen@nokia.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 98b3b83fb54323cd1be0f38084a51c4e0c939e65) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Bernd Kuhls authored
Patch originates from FreeBSD: https://lists.freebsd.org/pipermail/freebsd-x11/2015-July/016528.html https://svnweb.freebsd.org/ports/head/x11/libXpm/Makefile?r1=384234&r2=391122&pathrev=391122 Fixes http://autobuild.buildroot.net/results/f24/f24dc74c111690f068833ff6fc72df9a0853d210/ Signed-off-by:
Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 6653b0929fc3f4007294e289f88afa3920af2a89) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Bernd Kuhls authored
Fixes http://autobuild.buildroot.net/results/5be/5be1082dee8387b1140d802ac3c788896a4bf980/ Signed-off-by:
Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit d28fa26f272fddb1573da2d20e52412fd70dff4b) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Yann E. MORIN authored
Autotools-based packages that do not need C++ but check for it, and use libtool, will fail to configure on distros that lack /lib/cpp. This is the case for example on Arch Linux, where expat fails to build with: configure: error: in `/home/dkc/src/buildroot/build/build/expat-2.2.4': configure: error: C++ preprocessor "/lib/cpp" fails sanity check This is because libtool uses AC_PROC_CXXCPP, which can not be avoided, and does require a cpp that passes some "sanity" checks (does not choke on valid input, but does choke on invalid input). So we can use neither /bin/false nor /bin/true... We instead need something that can digest some basic C++ preprocessor input. We can't use the target preprocessor: that does not work, because it obviously has no C++ cupport: arm-linux-cpp.br_real: error: conftest.cpp: C++ compiler not installed on this system We can however consider that the host machine does have a C++ compiler, so we use the host' cpp, which is gcc's compiler wrapper that ends up calling the host's C++ preprocessor. That would give us a valid C++ preprocessor when we don't have one, in fact. But autotools will then correctly fail anyway, because there is indeed no C++ compiler at all, as we can see in this excerpt of a configure log from expat: checking whether we are using the GNU C++ compiler... no checking whether false accepts -g... no checking dependency style of false... none checking how to run the C++ preprocessor... cpp checking whether the false linker (/home/ymorin/dev/buildroot/O/host/bin/arm-linux-ld) supports shared libraries... yes libtool.m4: error: problem compiling CXX test program checking for false option to produce PIC... -DPIC checking if false PIC flag -DPIC works... no checking if false static flag works... no checking if false supports -c -o file.o... no checking if false supports -c -o file.o... (cached) no checking whether the false linker (/home/ymorin/dev/buildroot/O/host/bin/arm-linux-ld) supports shared libraries... yes So, using the host's C++ preprocessor (by way of gcc's wrapper) leads to a working situation, where the end result is as expected. Reported-by:
Damien Riegel <damien.riegel@savoirfairelinux.com> Signed-off-by:
"Yann E. MORIN" <yann.morin.1998@free.fr> Cc: Damien Riegel <damien.riegel@savoirfairelinux.com> Cc: Vivien Didelot <vivien.didelot@savoirfairelinux.com> Cc: Peter Korsgaard <peter@korsgaard.com> Cc: Thomas Petazzoni <thomas.petazzoni@free-electrons.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit bd39d11d2eaa679f09ab49fd3e4cd5511a168d1c) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Bernd Kuhls authored
Removed 0008-fix-asm-constraints-in-aarch64-multiply-macro.patch, patch was applied upstream: https://github.com/php/php-src/commit/d6d4f2a9b38cd7fa7e938142e49e5a514d612e52 Renumbered patch 0009. Signed-off-by:
Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 2c59323b846f9eefafb0d3c5d892119d2aa7becd) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Bernd Kuhls authored
Signed-off-by:
Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit ab01a1279c4990d201e6a560dbe9cc5b25a20fae) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Fabio Estevam authored
[Peter: drop 4.14.x bump] Signed-off-by:
Fabio Estevam <festevam@gmail.com> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 7f02b4ae4525cdfb2a67286f982264c7de1e73dc) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Ryan Coe authored
Release notes: https://mariadb.com/kb/en/mariadb-10130-release-notes/ Changelog: https://mariadb.com/kb/en/mariadb-10130-changelog/ Fixes the following security vulnerability: CVE-2017 -15365 - Replication in sql/event_data_objects.cc occurs before ACL checks. Signed-off-by:
Ryan Coe <bluemrp9@gmail.com> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit ca1f2d266ddba2f530731e91ebbf792638cee8bb) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Fabio Estevam authored
[Peter: drop 4.14.x bump] Signed-off-by:
Fabio Estevam <fabio.estevam@nxp.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 1897a56a2baae64f40dc9b155443d13818ef726b) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Fabio Estevam authored
Signed-off-by:
Fabio Estevam <festevam@gmail.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 28d57106b87ef97480374925e5f44dc541eba381) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Thomas De Schampheleire authored
Make sure that the pie charts produced by 'graph-build' and 'graph-size' targets are sorted on the size of each piece of the pie. Otherwise, making visual analysis is difficult, as one needs to look at the legends of each piece and do the sorting manually in their head. Signed-off-by:
Thomas De Schampheleire <thomas.de_schampheleire@nokia.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit a3f37c53d5b7ecd8ebae4b0baabb66147896302b) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Carlos Santos authored
BusyBox installs kill, link, mktemp, nice and printenv on /bin, so ensure that coreutils replaces them. Signed-off-by:
Carlos Santos <casantos@datacom.ind.br> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 443897bce4b01eae98155ac947d3387e6a2f289e) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Baruch Siach authored
The current link leads to a 400 Bad Request error page. Cc: Matt Weber <matthew.weber@rockwellcollins.com> Signed-off-by:
Baruch Siach <baruch@tkos.co.il> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit b0748bd1baf60461425ec124fd4f3be68f2dd4d6) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Thomas Petazzoni authored
If we don't explicitly disable SELinux support in the host-tar build, it might pick up system-wide installed SELinux libraries, causing the tar in HOST_DIR/bin/ to depend on the host SELinux libraries, which is not desirable to make the SDK portable/relocatable. Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 121807c08927c0a0d04c965beb6a8785ea89e47f) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Yann E. MORIN authored
First, the .pc file was so far fixed as a post-configure hook of the matchbox-fakekey package, by directly tweaking the .pc file installed in staging by matchbox-lib. That's uterly wrong and bad. So, we move the fix to matchbox-lib. Second, it was incorreclty tweaking the .pc file when xlib_libXft was not enabled, because only then a path to staging was present. Third, even when xlib_libXft was enabled, the tweaking was still wrong, because unnecessary. Fix all that. Signed-off-by:
"Yann E. MORIN" <yann.morin.1998@free.fr> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 84a2645e5b2600d28d91005937c17bec554dd4d1) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Yann E. MORIN authored
matchbox-lib build-depends on xlib_libXext, but forgets to select it. It also build-depends on expat without selecting it, but it does need it. Fix that: select xlib_libXext, remove expat. Add myself to developpers for matchbox packages. Signed-off-by:
"Yann E. MORIN" <yann.morin.1998@free.fr> Cc: Arnout Vandecappelle <arnout@mind.be> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 2cfda4704e0fbf486bf1255c0779caed1ffab946) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Marcus Folkesson authored
Avahi needs avahi-daemon and D-Bus to build avahi-client. Signed-off-by:
Marcus Folkesson <marcus.folkesson@gmail.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 18e00edb7796790b1ac1a0f6982ab8e25e27c691) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
- 31 Dec, 2017 1 commit
-
-
Peter Korsgaard authored
Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
- 30 Dec, 2017 1 commit
-
-
Fabio Estevam authored
[Peter: drop 4.14.x bump] Signed-off-by:
Fabio Estevam <festevam@gmail.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit e4bdd2a8241eb0c3b6e2634c2b693a743e99cec8) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
- 28 Dec, 2017 1 commit
-
-
Yann E. MORIN authored
The conditions are not trivial to reproduce, but it can happen that the headers are not fully regenerated by the time they are included. This only happens when a python and/or perl interpreter are available, with a high number of jobs and a high load. Fixes: http://autobuild.buildroot.org/results/523/5231ff39a0839ec5e1962662004214d4b0773068/ http://autobuild.buildroot.org/results/5a7/5a75d44c028e77b58f0fd9ab794952f2b477dd84/ Signed-off-by:
"Yann E. MORIN" <yann.morin.1998@free.fr> Cc: Peter Korsgaard <peter@korsgaard.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit 1d8de10c5fb36619708898a529977058886f31d1) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
- 27 Dec, 2017 13 commits
-
-
Fabio Estevam authored
[Peter: drop 4.14.x bump] Signed-off-by:
Fabio Estevam <festevam@gmail.com> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 634bdbd52e7451b615b8972f0d3973e5b76ef987) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Romain Naour authored
Backport 2 upstream fix. Fixes: http://autobuild.buildroot.net/results/0d1/0d131f9fa5cce259d999f7d57f9092675bfc24c7 Signed-off-by:
Romain Naour <romain.naour@gmail.com> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit de035220aa17cfa223a2de8d5d1233d95d6dd0e7) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Romain Naour authored
Bump mfgtools to include the fix [1] for the C++ build issue reported by the autobuilders. This bump include only 4 small commits fixing memory leak and this build issue. Remove CPOL.htm (removed upstream) from MFGTOOLS_LICENSE_FILES but CPOL license is still valid. Add the README.txt file to MFGTOOLS_LICENSE_FILES since it contains licensing informations: Licenses: - CPOL: MfgToolLib/XmlLite.CPP and XmlLite.h - BSD: Others. Add license file hash. [1] https://github.com/codeauroraforum/mfgtools/commit/b370a43e548440025d274ff2abbb25342bbaa78c Fixes: http://autobuild.buildroot.net/results/7c2bbbe13ab315684f3502afd96958a76879b1d5 Signed-off-by:
Romain Naour <romain.naour@gmail.com> Cc: Gary Bisson <gary.bisson@boundarydevices.com> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 34c4c0680a6de06e8c11e7361c26c8594315ba36) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Baruch Siach authored
The old SGI site is not accessible anymore. Use the link from the README file. Signed-off-by:
Baruch Siach <baruch@tkos.co.il> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 1fa2f7646f11e775fc8f2e5ba729a2efb9b2e653) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Romain Naour authored
The last commit before the 1.4.0 release was to disable parallel build [1] [1] https://github.com/lipnitsk/libcue/commit/bebbc18a8c00a0b8c26bc6191af68c6a83629b40 Fixes: http://autobuild.buildroot.net/results/f25/f256037ca3d49f96add8ca2e2f9c980f5f9d764e http://autobuild.buildroot.net/results/d84/d84c7d0cb9cf5fa9996c42149eda5295700516f5 Signed-off-by:
Romain Naour <romain.naour@gmail.com> Reviewed-by:
"Yann E. MORIN" <yann.morin.1998@free.fr> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 103d283c445ea518cd4529e91c957fc6d2ffdf96) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Adrian Perez de Castro authored
This is a maintenance release of the current stable WebKitGTK+ version, which contains fixes for CVE-2017-13866, CVE-2017-13870, CVE-2017-7156, and CVE-2017-13856. Additionally, this release brings improvements in the WebDriver spec-compliance, plugs several memory leaks in its GStreamer based multimedia backend, and fixes a bug when handling cookie removal. Release notes can be found in the announcement: https://webkitgtk.org/2017/12/19/webkitgtk2.18.4-released.html More details about the security fixes are provided in the following WebKitGTK+ Security Advisory report: https://webkitgtk.org/security/WSA-2017-0010.html Last but not least, this new release includes the fix for honoring the CMAKE_BUILD_TYPE value from CMake toolchain files and the corresponding patch is removed. Signed-off-by:
Adrian Perez de Castro <aperez@igalia.com> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit fbf6a483e00a87fb561fa5fe9a423c4a14867f50) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Adrian Perez de Castro authored
Signed-off-by:
Adrian Perez de Castro <aperez@igalia.com> Signed-off-by:
Thomas Petazzoni <thomas.petazzoni@free-electrons.com> (cherry picked from commit e7f82694cfe98f659ff08b5834e32f8996ca55c5) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Peter Korsgaard authored
Fixes the following security issues: CVE-2017-13672: QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update. CVE-2017-15118: Stack buffer overflow in NBD server triggered via long export name CVE-2017-15119: DoS via large option request CVE-2017-15268: Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c. For more details, see the release announcement: https://lists.nongnu.org/archive/html/qemu-devel/2017-12/msg03618.html Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit eb2b3df62666b0e2dc3042efdfecd7f62513bc9a) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Baruch Siach authored
This would make the unicode challenged menuconfig show something sensible. Split the sentence for the text to make sense. Signed-off-by:
Baruch Siach <baruch@tkos.co.il> Reviewed-by:
"Yann E. MORIN" <yann.morin.1998@free.fr> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 5099c909393e6dc0c4e16f904e36259b4e499cb9) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Fabio Estevam authored
[Peter: drop 4.14.x bump] Signed-off-by:
Fabio Estevam <fabio.estevam@nxp.com> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 8447f04c1c2ea596d69c3a90d73e25f6d937e511) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Peter Korsgaard authored
The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon. For more details, see: https://bugzilla.samba.org/show_bug.cgi?id=13112 Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 7f33f1d848908975b513f852873ae4fdb2702183) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Baruch Siach authored
The (deprecated) libsamplerate support is not enabled unless --enable-samplerate is passed to configure. Fix this. Signed-off-by:
Baruch Siach <baruch@tkos.co.il> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 5b85c6a038cc210355d8d5715cdf6fa73d18e8ac) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-
Baruch Siach authored
Put together alsa-lib dependency and configure option code. As a side effect we now avoid alsa-lib dependency when the required support in alsa is missing. Use positive logic. Explicitly enable alsa support when available. Signed-off-by:
Baruch Siach <baruch@tkos.co.il> Signed-off-by:
Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 8a560563f94e2aa2053db1cd41aa6c74ece1957c) Signed-off-by:
Peter Korsgaard <peter@korsgaard.com>
-