]> code.ossystems Code Review - openembedded-core.git/log
openembedded-core.git
9 years agonettle: Security fix CVE-2015-8804
Armin Kuster [Fri, 5 Feb 2016 16:41:24 +0000 (08:41 -0800)]
nettle: Security fix CVE-2015-8804

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agonettle: Security fix CVE-2015-8803 and CVE-2015-8805
Armin Kuster [Fri, 5 Feb 2016 16:37:29 +0000 (08:37 -0800)]
nettle: Security fix CVE-2015-8803 and CVE-2015-8805

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agosocat: Security fix CVE-2016-2217
Armin Kuster [Fri, 5 Feb 2016 14:31:06 +0000 (06:31 -0800)]
socat: Security fix CVE-2016-2217

this address both
Socat security advisory 7 and MSVR-1499: "Bad DH p parameter in OpenSSL"
and Socat security advisory 8: "Stack overflow in arguments parser

[Yocto # 9024]

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibpng: Security fix CVE-2015-8472
Armin Kuster [Fri, 5 Feb 2016 14:05:08 +0000 (06:05 -0800)]
libpng: Security fix CVE-2015-8472

libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions

this patch fixes an incomplete patch in CVE-2015-8126

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibpng: Security fix CVE-2015-8126
Armin Kuster [Fri, 5 Feb 2016 14:03:48 +0000 (06:03 -0800)]
libpng: Security fix CVE-2015-8126

libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agofoomatic-filters: Security fixes CVE-2015-8327
Armin Kuster [Mon, 1 Feb 2016 17:46:10 +0000 (09:46 -0800)]
foomatic-filters: Security fixes CVE-2015-8327

CVE-2015-8327 cups-filters: foomatic-rip did not consider the back tick as an illegal shell escape character

this time with the recipe changes.

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agofoomatic-filters: Security fix CVE-2015-8560
Armin Kuster [Mon, 1 Feb 2016 17:44:33 +0000 (09:44 -0800)]
foomatic-filters: Security fix CVE-2015-8560

CVE-2015-8560 cups-filters: foomatic-rip did not consider semicolon as illegal shell escape character

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agobuild-appliance-image: Update to jethro head revision
Richard Purdie [Sun, 7 Feb 2016 17:23:42 +0000 (17:23 +0000)]
build-appliance-image: Update to jethro head revision

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agocross-localedef-native: add ABI breaking glibc patch
Jens Rehsack [Fri, 5 Feb 2016 10:25:40 +0000 (11:25 +0100)]
cross-localedef-native: add ABI breaking glibc patch

Add patch from commit 96b1b5c127e9e0e637aaf7948cf3330a94a5cd57 to cross-localedef-native
to avoid broken images built with ENABLE_BINARY_LOCALE_GENERATION set to 1:

    $ sh -c "export LANG=de_DE; ls -la"
    sh: loadlocale.c:130: _nl_intern_locale_data: Assertion `cnt < (sizeof (_nl_value_type_LC_COLLATE) / sizeof (_nl_value_type_LC_COLLATE[0]))' failed.
    Aborted

Signed-off-by: Jens Rehsack <sno@netbsd.org>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agobuild-appliance-image: Update to jethro head revision
Richard Purdie [Fri, 5 Feb 2016 11:17:03 +0000 (11:17 +0000)]
build-appliance-image: Update to jethro head revision

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoe2fsprogs: Ensure we use the right mke2fs.conf when restoring from sstate
Richard Purdie [Fri, 5 Feb 2016 10:52:39 +0000 (10:52 +0000)]
e2fsprogs: Ensure we use the right mke2fs.conf when restoring from sstate

If we don't do this, we can use an mke2fs.conf from a different path which
may contain incompatible flags and lead to obtuse build failures such as:

Invalid filesystem option set: has_journal,extent,huge_file,flex_bg,metadata_csum,64bit,dir_nlink,extra_isize

To fix this, wrap the mke2fs binary and its hardlinks and point at the
correct configuration file.

In particular this fixes conflicts between master and jethro builds
affecting the main autobuilder.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agobuild-appliance-image: Update to jethro head revision
Richard Purdie [Thu, 4 Feb 2016 23:23:24 +0000 (23:23 +0000)]
build-appliance-image: Update to jethro head revision

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agopiglit: don't use /tmp to write generated sources to
Ross Burton [Tue, 2 Feb 2016 22:42:57 +0000 (22:42 +0000)]
piglit: don't use /tmp to write generated sources to

If there are multiple builds on the same machine then piglit writing it's
generated sources to /tmp will race.  Instead, export TEMP to tell the tempfile
module to use a temporary directory under ${B}.

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agogen-lockedsig-cache: fix bad destination path joining
Paul Eggleton [Tue, 26 Jan 2016 00:20:24 +0000 (13:20 +1300)]
gen-lockedsig-cache: fix bad destination path joining

When copying the sstate-cache into the extensible SDK, if the source
path had a trailing / and the destination path did not, there would be a
missing / between the path and the subdirectory name, and you'd end up
with subdirectories like "sstate-cacheCentOS-6.7". There are functions
in os.path for this sort of thing so let's just use them and avoid the
problem.

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit 5eb8f15c48b5f39a10eb2b63b026cf1ebfd05533)
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agolinux-yocto: Update SRCREV for qemux86* for 4.1, fixes CVE-2016-0728
Alejandro Hernandez [Tue, 2 Feb 2016 21:39:03 +0000 (21:39 +0000)]
linux-yocto: Update SRCREV for qemux86* for 4.1, fixes CVE-2016-0728

This addresses CVE-2016-0728: KEYS: Fix keyring ref leak in join_session_keyring(), and upgrades to LINUX_VERSION 4.1.17

Signed-off-by: Alejandro Hernandez <alejandro.hernandez@linux.intel.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agolinux-yocto: Update SRCREV for qemux86* for 3.19, fixes CVE-2016-0728
Alejandro Hernandez [Tue, 2 Feb 2016 21:39:02 +0000 (21:39 +0000)]
linux-yocto: Update SRCREV for qemux86* for 3.19, fixes CVE-2016-0728

This addresses CVE-2016-0728: KEYS: Fix keyring ref leak in join_session_keyring()

Signed-off-by: Alejandro Hernandez <alejandro.hernandez@linux.intel.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agolinux-yocto: Update SRCREV for qemux86* for 3.14, fixes CVE-2016-0728
Alejandro Hernandez [Tue, 2 Feb 2016 21:39:01 +0000 (21:39 +0000)]
linux-yocto: Update SRCREV for qemux86* for 3.14, fixes CVE-2016-0728

This addresses CVE-2016-0728: KEYS: Fix keyring ref leak in join_session_keyring(), and upgrades to LINUX_VERSION 3.14.39

Signed-off-by: Alejandro Hernandez <alejandro.hernandez@linux.intel.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agolibpng12: update URL that no longer exists
Maxin B. John [Tue, 2 Feb 2016 16:26:26 +0000 (18:26 +0200)]
libpng12: update URL that no longer exists

Fix the following warning:

WARNING: Failed to fetch URL http://downloads.sourceforge.net/project/
libpng/libpng12/1.2.53/libpng-1.2.53.tar.xz, attempting MIRRORS if
available.

[YOCTO #8739]

Signed-off-by: Maxin B. John <maxin.john@intel.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agolibpng: update URL that no longer exists
Maxin B. John [Tue, 2 Feb 2016 16:26:25 +0000 (18:26 +0200)]
libpng: update URL that no longer exists

Fix the following warning:

WARNING: Failed to fetch URL http://downloads.sourceforge.net/
project/libpng/libpng16/1.6.17/libpng-1.6.17.tar.xz, attempting
MIRRORS if available

[YOCTO #8739]

Signed-off-by: Maxin B. John <maxin.john@intel.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agobusybox: fix build of last applet
Ross Burton [Tue, 2 Feb 2016 15:31:07 +0000 (15:31 +0000)]
busybox: fix build of last applet

If CONFIG_FEATURE_LAST_SMALL is enabled the build fails because of a broken
__UT_NAMESIZE test.

[ YOCTO #8869 ]

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agoghostscript: add dependency for pnglibconf.h
Joe Slater [Fri, 4 Dec 2015 23:13:15 +0000 (15:13 -0800)]
ghostscript: add dependency for pnglibconf.h

When using parallel make jobs, we need to be sure that
pnglibconf.h is created before we try to reference it,
so add a rule to png.mak.

Signed-off-by: Joe Slater <jslater@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit fad19750d23aad2d14a1726c4e3c2c0d05f6e13d)
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agogcr: Require x11 DISTRO_FEATURE
Jussi Kukkonen [Wed, 25 Nov 2015 13:05:40 +0000 (15:05 +0200)]
gcr: Require x11 DISTRO_FEATURE

This enables a world build without x11. GTK3DISTROFEATURES is not
enough because gtk+-x11.pc is still required.

Fixes [YOCTO #8611].

Signed-off-by: Jussi Kukkonen <jussi.kukkonen@intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit dbdcd87144cc1cd6c5d50c800c7f266aaf25ca17)
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agouClibc: enable utmp for shadow compatibility
Bogdan-Alexandru Voiculescu [Wed, 25 Nov 2015 09:18:13 +0000 (11:18 +0200)]
uClibc: enable utmp for shadow compatibility

with the enabling of utmpx in busybox and uClibc it was noted that shadow
support for utmpx also needs utmp explicitly enabled in uclibc. this is
a workaround that might be removed once shadow properly supports
--enable-utmpx to check for utmpx configuration instead of utmp like
it does now

[YOCTO #8243]
[YOCTO #8971]

Signed-off-by: Bogdan-Alexandru Voiculescu <bogdanx.a.voiculescu@intel.com>
Signed-off-by: Benjamin Esquivel <benjamin.esquivel@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit 969158d63ba2c8e2e11af41c2a6d4f1aa5b0099f)
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agogit: Security fix CVE-2015-7545
Armin Kuster [Sun, 31 Jan 2016 22:27:05 +0000 (14:27 -0800)]
git: Security fix CVE-2015-7545

CVE-2015-7545 git: arbitrary code execution via crafted URLs

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agoglibc-locale: fix QA warning
Armin Kuster [Sun, 31 Jan 2016 17:32:05 +0000 (09:32 -0800)]
glibc-locale: fix QA warning

WARNING: QA Issue: glibc-locale: /glibc-binary-localedata-sd-in/usr/lib/locale/sd_IN/LC_CTYPE is owned by uid 1000, which is the same as the user running bitbake. This may be due to host contamination [host-user-contaminated]

fix type
Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agogrub: Security fix CVE-2015-8370
Armin Kuster [Sun, 31 Jan 2016 15:46:32 +0000 (07:46 -0800)]
grub: Security fix CVE-2015-8370

CVE-2015-8370 grub2: buffer overflow when checking password entered during bootup

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agogdk-pixbuf: Security fix CVE-2015-7674
Armin Kuster [Sun, 31 Jan 2016 15:14:33 +0000 (07:14 -0800)]
gdk-pixbuf: Security fix CVE-2015-7674

CVE-2015-7674 Heap overflow with a gif file in gdk-pixbuf < 2.32.1

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibrsvg: Security fix CVE-2015-7558
Armin Kuster [Sun, 31 Jan 2016 04:45:31 +0000 (20:45 -0800)]
librsvg: Security fix CVE-2015-7558

CVE-2015-7558 librsvg2: Stack exhaustion causing DoS

including two supporting patches.

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agobind: Security fix CVE-2015-8461
Armin Kuster [Sun, 31 Jan 2016 03:29:32 +0000 (19:29 -0800)]
bind: Security fix CVE-2015-8461

CVE-2015-8461 bind: race condition when handling socket errors can lead to an assertion failure in resolver.c\

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agobind: Security fix CVE-2015-8000
Armin Kuster [Sun, 31 Jan 2016 02:55:39 +0000 (18:55 -0800)]
bind: Security fix CVE-2015-8000

CVE-2015-8000 bind: responses with a malformed class attribute can trigger an assertion failure in db.c

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibxml2: Security fix CVE-2015-8710
Armin Kuster [Sat, 30 Jan 2016 22:39:28 +0000 (14:39 -0800)]
libxml2: Security fix CVE-2015-8710

CVE-2015-8710 libxml2: out-of-bounds memory access when parsing an unclosed HTML comment

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibxml2: Security fix CVE-2015-8241
Armin Kuster [Sat, 30 Jan 2016 22:37:35 +0000 (14:37 -0800)]
libxml2: Security fix CVE-2015-8241

CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agodpkg: Security fix CVE-2015-0860
Armin Kuster [Sat, 30 Jan 2016 22:12:44 +0000 (14:12 -0800)]
dpkg: Security fix CVE-2015-0860

CVE-2015-0860 dpkg: stack overflows and out of bounds read

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agotzdata: update to 2016a
Armin Kuster [Thu, 28 Jan 2016 02:17:59 +0000 (18:17 -0800)]
tzdata: update to 2016a

Changed LIC_CHKSUM_FILES to a new LICENSE  file.
Add BSD-3-clause to licenses

Changes affecting future time stamps

America/Cayman will not observe daylight saving this year after all.
Revert our guess that it would.  (Thanks to Matt Johnson.)

Asia/Chita switches from +0800 to +0900 on 2016-03-27 at 02:00.
(Thanks to Alexander Krivenyshev.)

Asia/Tehran now has DST predictions for the year 2038 and later,
to be March 21 00:00 to September 21 00:00.  This is likely better
than predicting no DST, albeit off by a day every now and then.

Changes affecting past and future time stamps

America/Metlakatla switched from PST all year to AKST/AKDT on
2015-11-01 at 02:00.  (Thanks to Steffen Thorsen.)

America/Santa_Isabel has been removed, and replaced with a
backward compatibility link to America/Tijuana.  Its contents were
apparently based on a misreading of Mexican legislation.

Changes affecting past time stamps
Asia/Karachi's two transition times in 2002 were off by a minute.
(Thanks to Matt Johnson.)

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit 39e231cfabda8d75906c935d2a01f37df6121b84)
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agotzcode: update to 2016a
Armin Kuster [Thu, 28 Jan 2016 02:17:58 +0000 (18:17 -0800)]
tzcode: update to 2016a

Change LIC_CHKSUM_FILES to License. Some files are BSD clause 3

Changes affecting build procedure

An installer can now combine leap seconds with use of the backzone file,
e.g., with 'make PACKRATDATA=backzone REDO=posix_right zones'.
The old 'make posix_packrat' rule is now marked as obsolescent.
(Thanks to Ian Abbott for an initial implementation.)

Changes affecting documentation and commentary

A new file LICENSE makes it easier to see that the code and data
are mostly public-domain.  (Thanks to James Knight.) The three
non-public-domain files now use the current (3-clause) BSD license
instead of older versions of that license.

tz-link.htm mentions the BDE library (thanks to Andrew Paprocki),
CCTZ (thanks to Tim Parenti), TimeJones.com, and has a new section
on editing tz source files (with a mention of Sublime zoneinfo,
thanks to Gilmore Davidson).

The Theory and asia files now mention the 2015 book "The Global
Transformation of Time, 1870-1950", and cite a couple of reviews.

The America/Chicago entry now documents the informal use of US
central time in Fort Pierre, South Dakota.  (Thanks to Rick
McDermid, Matt Johnson, and Steve Jones.)

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit b7f292b84eea202fb13730c11452ac1957e41cf0)
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agokernel-yocto: fix checkout bare-cloned kernel repositories
Jianxun Zhang [Tue, 8 Dec 2015 18:58:43 +0000 (10:58 -0800)]
kernel-yocto: fix checkout bare-cloned kernel repositories

The existing code doesn't tell regular (with .git) and bare cases and
just move the unpacked repo to the place of kernel source. But later
steps will fail on a bare-cloned repo because we can not checkout
directly in a bare cloned repo.

This change performs another clone to fix the issue.

Note: This change doesn't cover the case that S and WORKDIR are same
and the repo is bare cloned.

Signed-off-by: Jianxun Zhang <jianxun.zhang@linux.intel.com>
Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
(cherry picked from commit ccfa2ee5c4f509de4c18a7054b2a66fc874d5d69)
Signed-off-by: Saul Wold <sgw@linux.intel.com>
9 years agolibpcre: bug fixes include security
Armin Kuster [Wed, 27 Jan 2016 22:20:21 +0000 (14:20 -0800)]
libpcre: bug fixes include security

[Yocto # 9008]

This is the next patch release for pcre. The 8.xx series now only contains
bug fixes.

http://www.pcre.org/original/changelog.txt

The following security fixes are included:
CVE-2015-3210 pcre: heap buffer overflow in pcre_compile2() / compile_regex()
CVE-2015-3217 pcre: stack overflow in match()
CVE-2015-5073 CVE-2015-8388 pcre: Buffer overflow caused by certain patterns with an unmatched closing parenthesis

CVE-2015-8380 pcre: Heap-based buffer overflow in pcre_exec
CVE-2015-8381 pcre: Heap Overflow in compile_regex()
CVE-2015-8383 pcre: Buffer overflow caused by repeated conditional group
CVE-2015-8384 pcre: Buffer overflow caused by recursive back reference by name within certain group
CVE-2015-8385 pcre: Buffer overflow caused by forward reference by name to certain group
CVE-2015-8386 pcre: Buffer overflow caused by lookbehind assertion
CVE-2015-8387 pcre: Integer overflow in subroutine calls
CVE-2015-8389 pcre: Infinite recursion in JIT compiler when processing certain patterns
 CVE-2015-8390 pcre: Reading from uninitialized memory when processing certain patterns

 CVE-2015-8392 pcre: Buffer overflow caused by certain patterns with duplicated named groups
 CVE-2015-8393 pcre: Information leak when running pcgrep -q on crafted binary
 CVE-2015-8394 pcre: Integer overflow caused by missing check for certain conditions
 CVE-2015-8395 pcre: Buffer overflow caused by certain references
 CVE-2016-1283 pcre: Heap buffer overflow in pcre_compile2 causes DoS

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoqemu: Security fix CVE-2015-7295
Armin Kuster [Fri, 29 Jan 2016 20:35:21 +0000 (12:35 -0800)]
qemu: Security fix CVE-2015-7295

CVE-2015-7295 Qemu: net: virtio-net possible remote DoS

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoqemu: Security fix CVE-2016-1568
Armin Kuster [Fri, 29 Jan 2016 20:35:20 +0000 (12:35 -0800)]
qemu: Security fix CVE-2016-1568

CVE-2016-1568 Qemu: ide: ahci use-after-free vulnerability in aio port commands

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoqemu: Security fix CVE-2015-8345
Armin Kuster [Fri, 29 Jan 2016 20:35:19 +0000 (12:35 -0800)]
qemu: Security fix CVE-2015-8345

CVE-2015-8345 Qemu: net: eepro100: infinite loop in processing command block list

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoqemu: Security fix CVE-2015-7512
Armin Kuster [Fri, 29 Jan 2016 20:35:18 +0000 (12:35 -0800)]
qemu: Security fix CVE-2015-7512

CVE-2015-7512 Qemu: net: pcnet: buffer overflow in non-loopback mod

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoqemu: Security fix CVE-2015-7504
Armin Kuster [Fri, 29 Jan 2016 20:35:17 +0000 (12:35 -0800)]
qemu: Security fix CVE-2015-7504

CVE-2015-7504 Qemu: net: pcnet: heap overflow vulnerability in loopback mode

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoqemu: Security fix CVE-2015-8504
Armin Kuster [Fri, 29 Jan 2016 20:35:16 +0000 (12:35 -0800)]
qemu: Security fix CVE-2015-8504

CVE-2015-8504 Qemu: ui: vnc: avoid floating point exception

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoopenssl: Security fix CVE-2016-0701
Armin Kuster [Fri, 29 Jan 2016 22:57:08 +0000 (14:57 -0800)]
openssl: Security fix CVE-2016-0701

CVE-2016-0701 OpenSSL: DH small subgroups

Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoopenssl: Security fix CVE-2015-3197
Armin Kuster [Fri, 29 Jan 2016 22:57:07 +0000 (14:57 -0800)]
openssl: Security fix CVE-2015-3197

CVE-2015-3197 OpenSSL: SSLv2 doesn't block disabled ciphers

Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agotiff: Security fix CVE-2015-8784
Armin Kuster [Sat, 30 Jan 2016 01:39:37 +0000 (17:39 -0800)]
tiff: Security fix CVE-2015-8784

CVE-2015-8784 libtiff: out-of-bound write in NeXTDecode()

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agotiff: Security fix CVE-2015-8781
Armin Kuster [Sat, 30 Jan 2016 01:39:36 +0000 (17:39 -0800)]
tiff: Security fix CVE-2015-8781

CVE-2015-8781 libtiff: out-of-bounds writes for invalid images

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agobind: CVE-2015-8704 and CVE-2015-8705
Derek Straka [Mon, 25 Jan 2016 19:15:28 +0000 (14:15 -0500)]
bind: CVE-2015-8704 and CVE-2015-8705

CVE-2015-8704:
Allows remote authenticated users to cause a denial of service via a malformed Address Prefix List record

CVE-2015-8705:
When debug logging is enabled, allows remote attackers to cause a denial of service or have possibly unspecified impact via OPT data or ECS option

[YOCTO 8966]

References:
https://kb.isc.org/article/AA-01346/0/BIND-9.10.3-P3-Release-Notes.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8705

Signed-off-by: Derek Straka <derek@asterius.io>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
9 years agorpmresolve.c: Fix unfreed pointers that keep DB opened
Mariano Lopez [Tue, 29 Dec 2015 10:25:02 +0000 (10:25 +0000)]
rpmresolve.c: Fix unfreed pointers that keep DB opened

There are some unfreed rpmmi pointers in printDepList()
function; this happens when the package have null as
the requirement.

This patch fixes these unfreed pointers and add small
changes to keep consistency with some variables.

[YOCTO #8028]

(From OE-Core master rev: da7aa183f94adc1d0fff5bb81e827c584f9938ec)

Signed-off-by: Mariano Lopez <mariano.lopez@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
9 years agoopenssh: CVE-2016-1907
Armin Kuster [Sat, 16 Jan 2016 00:59:49 +0000 (16:59 -0800)]
openssh: CVE-2016-1907

This issue requires three commits:
https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c
https://anongit.mindrot.org/openssh.git/commit/?id=f98a09cacff7baad8748c9aa217afd155a4d493f
https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0

(From OE-Core master rev: a42229df424552955c0ac62da1063461f97f5938)

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
9 years agoglibc: CVE-2015-8776
Armin Kuster [Sat, 23 Jan 2016 04:25:19 +0000 (20:25 -0800)]
glibc: CVE-2015-8776

it was found that out-of-range time values passed to the strftime function may
cause it to crash, leading to a denial of service, or potentially disclosure
information.

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
9 years agoglibc: CVE-2015-9761
Armin Kuster [Sat, 23 Jan 2016 04:23:04 +0000 (20:23 -0800)]
glibc: CVE-2015-9761

A stack overflow vulnerability was found in nan* functions that could cause
applications which process long strings with the nan function to crash or,
potentially, execute arbitrary code.

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
9 years agoglibc: CVE-2015-8779
Armin Kuster [Sat, 23 Jan 2016 04:19:24 +0000 (20:19 -0800)]
glibc: CVE-2015-8779

A stack overflow vulnerability in the catopen function was found, causing
applications which pass long strings to the catopen function to crash or,
potentially execute arbitrary code.

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
9 years agoglibc: CVE-2015-8777.patch
Armin Kuster [Sat, 23 Jan 2016 04:13:00 +0000 (20:13 -0800)]
glibc: CVE-2015-8777.patch

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or
libc6) before 2.23 allows local users to bypass a pointer-guarding protection
mechanism via a zero value of the LD_POINTER_GUARD environment variable.

Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
9 years agonativesdk-buildtools-perl-dummy: Bump PR
Richard Purdie [Thu, 17 Dec 2015 12:33:39 +0000 (12:33 +0000)]
nativesdk-buildtools-perl-dummy: Bump PR

Recent changes to this recipe caused automated PR increments
to break, regressing package feeds. The only way to recover
is to bump PR, so do this centrally to fix anyone affected.

(From OE-Core rev: dacdb499d31cb2e80cca33cba9d599c8ee983dc4)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agonativesdk-buildtools-perl-dummy: properly set PACKAGE_ARCH
Paul Eggleton [Fri, 11 Dec 2015 00:51:31 +0000 (13:51 +1300)]
nativesdk-buildtools-perl-dummy: properly set PACKAGE_ARCH

Turns out I did a silly thing in OE-Core revision
9b1831cf4a2940dca1d23f14dff460ff5a50a520 and forgot to remove the
explicit setting of PACKAGE_ARCH outside of the anonymous python
function; the original bug was apparently fixed but the functionality of
allarch.bbclass was being disabled because it was able to see that
PACKAGE_ARCH was not set to "all" - which was what I was trying to
ensure.

(From OE-Core rev: a25ab5449825315d4f51b31a634fe6cd8f908526)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agonativesdk-buildtools-perl-dummy: fix rebuilding when SDKMACHINE changes
Paul Eggleton [Mon, 9 Nov 2015 16:45:21 +0000 (16:45 +0000)]
nativesdk-buildtools-perl-dummy: fix rebuilding when SDKMACHINE changes

This recipe produces an empty dummy package (in order to satisfy
dependencies on perl so we don't have perl within buildtools-tarball).
Because we were inheriting nativesdk here the recipe was being rebuilt,
but having forced PACKAGE_ARCH to a particular value the packages for
each architecture were stepping on eachother. Since the packages are
empty they can in fact be allarch (even though they won't actually go
into the "all" package feed). It turns out that nheriting nativesdk
wasn't actually necessary either, so drop that.

Fixes [YOCTO #8509].

(From OE-Core rev: 9b1831cf4a2940dca1d23f14dff460ff5a50a520)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoRevert "gstreamer1.0-plugins-good.inc: add gudev back to PACKAGECONFIG"
Richard Purdie [Wed, 20 Jan 2016 17:10:11 +0000 (17:10 +0000)]
Revert "gstreamer1.0-plugins-good.inc: add gudev back to PACKAGECONFIG"

This reverts commit 5c90b561930aac1783485d91579d313932273e92.

The original change was intentional so back out 'fixes'.

9 years agoRevert "gstreamer: Deal with merge conflict which breaks systemd builds"
Richard Purdie [Wed, 20 Jan 2016 17:08:59 +0000 (17:08 +0000)]
Revert "gstreamer: Deal with merge conflict which breaks systemd builds"

This reverts commit bc458ae9586b45b11b6908eadb31e94d892e698f.

The original change was intentional so back out 'fixes'.

9 years agobuild-appliance-image: Update to jethro head revision
Richard Purdie [Sun, 17 Jan 2016 14:32:58 +0000 (14:32 +0000)]
build-appliance-image: Update to jethro head revision

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agogstreamer: Deal with merge conflict which breaks systemd builds
Richard Purdie [Sun, 17 Jan 2016 14:31:31 +0000 (14:31 +0000)]
gstreamer: Deal with merge conflict which breaks systemd builds

In jethro, the dependency is "udev", the change to libgudev happened
in master after the release and this was a mistake during
backporting of gstreamer fixes.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agobuild-appliance-image: Update to jethro head revision
Richard Purdie [Fri, 15 Jan 2016 22:28:03 +0000 (22:28 +0000)]
build-appliance-image: Update to jethro head revision

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agokernel/kernel-arch: Explicitly mapping between i386/x86_64 and x86 for kernel ARCH
Jianxun Zhang [Tue, 12 Jan 2016 21:53:56 +0000 (13:53 -0800)]
kernel/kernel-arch: Explicitly mapping between i386/x86_64 and x86 for kernel ARCH

For a bare-bone kernel recipe which specifies 32 bit x86 target,
a 64 bit .config will be generated from do_configure task when
building 32-bit qemux86, once all of these conditions are true:

* arch of host is x86_64
* kernel source tree used in build has commit ffee0de41 which
  actually chooses i386 or x86_64 defconfig by asking host when
  ARCH is "x86" (arch/x86/Makefile)
* bare-bone kernel recipe inherits directly from kernel without
  other special treatments.

Build will fail because of the mismatched kernel architecture.

The patch sets ARCH i386 or x86_64 explicitly to configure
task to avoid this host contamination. Kernel artifact is also
changed so that it can map i386 and x64 back to arch/x86 when
needed.

Signed-off-by: Jianxun Zhang <jianxun.zhang@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoopenssh: update to 7.1p2
Alexander Kanavin [Thu, 14 Jan 2016 15:38:52 +0000 (17:38 +0200)]
openssh: update to 7.1p2

This fixes a number of security issues.

Signed-off-by: Alexander Kanavin <alexander.kanavin@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agodevtool: reset: do clean for multiple recipes at once with -a
Paul Eggleton [Wed, 6 Jan 2016 11:15:51 +0000 (00:15 +1300)]
devtool: reset: do clean for multiple recipes at once with -a

We need to run the clean for all recipes that are being reset before we
start deleting things from the workspace; if we don't, recipes providing
dependencies may be missing when we come to clean a recipe later (since
we don't and couldn't practically reset them in dependency order). This
also improves performance since we have the startup startup time for the
clean just once rather than for every recipe.

(From OE-Core master rev: c10a2de75a99410eb5338dd6da0e0b0e32bae6f5)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agodevtool: sdk-update: fix error checking
Paul Eggleton [Wed, 6 Jan 2016 11:15:47 +0000 (00:15 +1300)]
devtool: sdk-update: fix error checking

Running "raise" with no arguments here is invalid, we're not in
exception handling context. Rather than also adding code to catch the
exception I just moved the check out to the parent function from which
we can just exit.

(From OE-Core master rev: 0164dc66467739b357ab22bf9b8c0845f3eff4a4)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agodevtool: sdk-update: fix metadata update step
Paul Eggleton [Wed, 6 Jan 2016 11:15:46 +0000 (00:15 +1300)]
devtool: sdk-update: fix metadata update step

* Clone the correct path - we need .git on the end
* Pull from the specified path instead of expecting a remote to be set
* up in the repo already (it isn't by default)

(From OE-Core master rev: 1a60ee8bd21e156022c928f12bb296ab5caaa766)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agodevtool: sdk-update: fix not using updateserver config file option
Paul Eggleton [Wed, 6 Jan 2016 11:15:45 +0000 (00:15 +1300)]
devtool: sdk-update: fix not using updateserver config file option

We read the updateserver setting from the config file but we never
actually used that value - the code then went on to use only the value
supplied on the command line.

Fix courtesy of Dmitry Rozhkov <dmitry.rozhkov@intel.com>

(From OE-Core master rev: 1c85237803038fba539d5b03bf4de39d99380684)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoclasses/populate_sdk_ext: disable signature warnings
Paul Eggleton [Wed, 6 Jan 2016 11:15:44 +0000 (00:15 +1300)]
classes/populate_sdk_ext: disable signature warnings

The user of the extensible SDK doesn't need to see these.

(From OE-Core master rev: 7045fabf73d4eef9c023edb9e0a8b8d1d3f04680)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoclasses/populate_sdk_ext: fix cascading from preparation failure
Paul Eggleton [Wed, 6 Jan 2016 11:15:43 +0000 (00:15 +1300)]
classes/populate_sdk_ext: fix cascading from preparation failure

During extensible SDK installtion, if the build system preparation step
fails we try to put something at the end of the environment setup script
to show an error when it is sourced, in case the user doesn't realise
that the partially-installed SDK is broken. However, an apostrophe in
the message (actually a single quote) appears to terminate the string
and therefore breaks the command. Drop it to avoid that.

(From OE-Core master rev: 21e591d182e24c399ae010a8eff9b89947061a46)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoscripts/oe-publish-sdk: add missing call to git update-server-info
Paul Eggleton [Wed, 6 Jan 2016 11:15:42 +0000 (00:15 +1300)]
scripts/oe-publish-sdk: add missing call to git update-server-info

We need to call git update-server-info here on the created repository or
we can't share it over plain http as we need to be able to for the
update process to function as currently implemented.

(From OE-Core master rev: 3ab40bf9d5f19d91e45f7bae77f037b2544e889b)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agodevtool: use cp instead of shutil.copytree
Ed Bartosh [Fri, 18 Dec 2015 11:46:31 +0000 (13:46 +0200)]
devtool: use cp instead of shutil.copytree

Copied layers with 'cp -a' instead of calling shutil.copytree as
copytree fails to copy broken symlinks.

More pythonic fix would be to use copytree with 'ignore' parameter,
but this could slow down copying complex directory structures.

[YOCTO #8825]

(From OE-Core master rev: e5b841420b9fdd33829f7665a62cd06a3017f7e6)

Signed-off-by: Ed Bartosh <ed.bartosh@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agobuildhistory: fix not recording SDK information
Paul Eggleton [Sun, 20 Dec 2015 20:04:59 +0000 (09:04 +1300)]
buildhistory: fix not recording SDK information

After OE-Core revision baa4e43a29e45df17eaa3456acc179b08d571db6 we lost
recording SDK the contents in buildhistory. This was due to the
SDK_POSTPROCESS_COMMAND variable being set with = in
populate_sdk_base.bbclass which overwrote any value set with += in
buildhistory.bbclass; to fix it, use _append in buildhistory.bbclass
instead.

Fixes [YOCTO #8839].

(From OE-Core master rev: 11d1aa82ef4a00051e0a50a87a1efed1c50c73b5)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agorecipetool: create: fix error when extracting source to a specified directory
Paul Eggleton [Tue, 22 Dec 2015 04:03:17 +0000 (17:03 +1300)]
recipetool: create: fix error when extracting source to a specified directory

Having fetched the source and unpacked it to a temporary directory, we
then move part of it to the destination directory, or if the source is at
the top level we move the whole temporary directory, but in the latter
case we were later attempting to delete the temporary directory which no
longer existed. Clear out the variable so that doesn't happen.

(From OE-Core master rev: 91714a52e91cddba5a16c73cf5765d1f47f7856c)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agorecipetool: create: detect when specified URL returns a web page
Paul Eggleton [Tue, 22 Dec 2015 04:03:00 +0000 (17:03 +1300)]
recipetool: create: detect when specified URL returns a web page

If the user specifies a URL that just returns a web page, then it's
probably incorrect (or broken); attempt to detect this and show an error
if it's the case.

(From OE-Core master rev: 83b1245b2638eb5d314fe663d33cd52a776a34a7)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agorecipetool: create: prevent attempting to unpack entire DL_DIR
Paul Eggleton [Tue, 22 Dec 2015 04:02:59 +0000 (17:02 +1300)]
recipetool: create: prevent attempting to unpack entire DL_DIR

If you specify a URL ending in /, BitBake's fetcher returns a localpath
of ${DL_DIR}, and if you then try to unpack that it will attempt to copy
the entire DL_DIR contents to the destination - which at least on my
system filled my entire /tmp. Obviously we should fix the fetcher, but
at least detect and stop that from happening here for now.

(From OE-Core master rev: 7e63a672517518644a37ce006e05b5494c29cf6e)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agorecipetool: create: fix do_install handling for makefile-only software
Paul Eggleton [Tue, 22 Dec 2015 04:02:57 +0000 (17:02 +1300)]
recipetool: create: fix do_install handling for makefile-only software

In my testing here it appears make -qn returns an error (exit code 2)
whereas make -n doesn't; I can't immediately tell why based on the
documentation. We don't actually care for it to be quiet since we're
capturing the output, so let's just leave -q off and have this work
properly as a result.

(From OE-Core master rev: 30c4cd9efdac400d713dff645f23f2627277d75a)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agorecipetool: create: avoid traceback on fetch error
Paul Eggleton [Tue, 22 Dec 2015 04:02:56 +0000 (17:02 +1300)]
recipetool: create: avoid traceback on fetch error

If a fetch error occurs, the fetcher already prints a reasonable error -
we don't need the traceback as well, so catch that and exit if it
occurs.

(From OE-Core master rev: c2cc5abe34169eae92067d97ce1e747e7c1413f5)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agorecipetool: create: handle https://....git URLs
Paul Eggleton [Tue, 22 Dec 2015 04:02:55 +0000 (17:02 +1300)]
recipetool: create: handle https://....git URLs

When you grab a URL for a github repository you'll almost certainly find
it in https://github.com/path/to/repository.git format; but bitbake's
fetcher can't handle that because it'll see https:// at the start and
assume it should use wget to fetch it. If the URL starts with http:// or
https:// and the path part ends with .git then assume it's a git
repository and adjust it accordingly.

(From OE-Core master rev: bdbc4cf41d30eddb8a9ed882dedcc1670ce8fdd6)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agodevtool: sdk-update: fix traceback without update server set
Paul Eggleton [Tue, 22 Dec 2015 03:19:18 +0000 (16:19 +1300)]
devtool: sdk-update: fix traceback without update server set

If the SDK update server hasn't been set in the config (when building
the extensible SDK this would be set via SDK_UPDATE_URL) and it wasn't
specified on the command line then we were failing with a traceback
because we didn't pass the default value properly - None is interpreted
as no default, meaning raise an exception if no such option exists.

Additionally we don't need the try...except anymore either because with
a proper default value, NoSectionError is caught as well.

(From OE-Core master rev: 9763c1b83362f8445ed6dff2804dd7d282861f79)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agoclasses/populate_sdk_ext: error out of install if buildtools install fails
Paul Eggleton [Tue, 22 Dec 2015 03:19:17 +0000 (16:19 +1300)]
classes/populate_sdk_ext: error out of install if buildtools install fails

If the installation of buildtools fails then we should fail the entire
installation instead of blindly continuing on.

(From OE-Core master rev: 34bb63e6c72fb862e0ef0d2b26e1bfddaf7ddb99)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agogstreamer1.0-plugins-good.inc: add gudev back to PACKAGECONFIG
Robert Yang [Fri, 15 Jan 2016 09:07:20 +0000 (01:07 -0800)]
gstreamer1.0-plugins-good.inc: add gudev back to PACKAGECONFIG

The 66e32244aed8d33f1b49fbe78179f2442545c730 wrongly removed gudev from
PACKAGECONFIG, now add it back.

Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agolibaio: don't disable linking to the system libraries
Ross Burton [Fri, 6 Nov 2015 15:30:58 +0000 (15:30 +0000)]
libaio: don't disable linking to the system libraries

For some reason that I don't understand (a decade-old attempt at optimisation?)
libaio disables linkage to the system libraries.  Enabling fortify means linking
to the system libraries, so remove the existing addition of -lc for x86 (the
problem also happens on at least PPC) and just link to the system libraries on
all platforms.

Also remove the sed of src/Makefile as the build not respecting LDFLAGS has been
fixed upstream.

(From OE-Core rev: f435ac9db0581d8313a38d586b00c2b3de419298)

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agolinux-yocto/4.1: update to v4.1.15
Bruce Ashfield [Fri, 18 Dec 2015 13:39:18 +0000 (08:39 -0500)]
linux-yocto/4.1: update to v4.1.15

Updating the 4.1 kernel repo to the latest 4.1.x stable.

(From OE-Core rev: 1df3a79cf454754e6be6c1ffc91ba8310a880616)

Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
9 years agolibxml2: security fix CVE-2015-5312
Armin Kuster [Sat, 5 Dec 2015 19:00:24 +0000 (11:00 -0800)]
libxml2: security fix CVE-2015-5312

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibxml2: security fix CVE-2015-8242
Armin Kuster [Sat, 5 Dec 2015 18:59:55 +0000 (10:59 -0800)]
libxml2: security fix CVE-2015-8242

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibxml2: security fix CVE-2015-7500
Armin Kuster [Sat, 5 Dec 2015 18:59:18 +0000 (10:59 -0800)]
libxml2: security fix CVE-2015-7500

includes a depend fix security issue CVE-2015-7500

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibxml2: security fix CVE-2015-7499
Armin Kuster [Sat, 5 Dec 2015 18:58:09 +0000 (10:58 -0800)]
libxml2: security fix CVE-2015-7499

includes:
CVE-2015-7499-1
CVE-2015-7499-2

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibxml2: security fix CVE-2015-7497
Armin Kuster [Sat, 5 Dec 2015 18:57:48 +0000 (10:57 -0800)]
libxml2: security fix CVE-2015-7497

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibxml2: security fix CVE-2015-7498
Armin Kuster [Sat, 5 Dec 2015 18:57:27 +0000 (10:57 -0800)]
libxml2: security fix CVE-2015-7498

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibxml2: security fix CVE-2015-8035
Armin Kuster [Sat, 5 Dec 2015 18:56:23 +0000 (10:56 -0800)]
libxml2: security fix CVE-2015-8035

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibxml2: security fix CVE-2015-7942
Armin Kuster [Sat, 5 Dec 2015 18:54:57 +0000 (10:54 -0800)]
libxml2: security fix CVE-2015-7942

includes:
CVE-2015-7942
CVE-2015-7942-2

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibxml2: security fix CVE-2015-8317
Armin Kuster [Sat, 5 Dec 2015 18:54:29 +0000 (10:54 -0800)]
libxml2: security fix CVE-2015-8317

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agolibxml2: security fix CVE-2015-7941
Armin Kuster [Sat, 5 Dec 2015 18:52:42 +0000 (10:52 -0800)]
libxml2: security fix CVE-2015-7941

includes:
CVE-2015-7941-1
CVE-2015-7941-2

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agoopenssl: fix for CVE-2015-3195
Armin Kuster [Tue, 8 Dec 2015 00:57:45 +0000 (16:57 -0800)]
openssl: fix for CVE-2015-3195

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agoopenssl: fix for CVE-2015-3194
Armin Kuster [Tue, 8 Dec 2015 00:57:07 +0000 (16:57 -0800)]
openssl: fix for CVE-2015-3194

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agoopenssl: fix for CVE-2015-3193
Armin Kuster [Tue, 8 Dec 2015 00:55:52 +0000 (16:55 -0800)]
openssl: fix for CVE-2015-3193

Signed-off-by: Armin Kuster <akuster@mvista.com>
9 years agologrotate: do not move binary logrotate to /usr/bin
Hongxu Jia [Mon, 2 Nov 2015 08:33:27 +0000 (16:33 +0800)]
logrotate: do not move binary logrotate to /usr/bin

In oe-core commit a46d3646a3e1781be4423b508ea63996b3cfca8a
...
Author: Fahad Usman <fahad_usman@mentor.com>
Date:   Tue Aug 26 13:16:48 2014 +0500

    logrotate: obey our flags

    Needed to quiet GNU_HASH warnings, and some minor fixes.
...
it explicitly move logrotate to /usr/bin without any reason,
which is against the original Linux location /usr/sbin.

So partly revert the above commit which let logrotate be
kept in the original place /usr/sbin.

(From OE-Core master rev: 0007436b486fd0bea9e6ef60bf57603e7cfce54b)

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
9 years agocairo: fix license for cairo-script-interpreter
Andre McCurdy [Fri, 30 Oct 2015 23:07:10 +0000 (16:07 -0700)]
cairo: fix license for cairo-script-interpreter

Without an explicit license, cairo-script-interpreter inherits
the default LICENSE and isn't packaged in builds which blacklist
GPLv3.

(From OE-Core master rev: cb8f84218b065fed88a8c36f3c78065e8ab726bf)

Signed-off-by: Andre McCurdy <armccurdy@gmail.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
9 years agoglibc: Fix ld.so / prelink interface for ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA
Mark Hatle [Fri, 30 Oct 2015 14:48:27 +0000 (09:48 -0500)]
glibc: Fix ld.so / prelink interface for ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA

A bug in glibc 2.22's ld.so interface for the prelink support causes
the displayed values to be incorrect.  The included path fixes this
issue.

   Clear ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA for prelink

   prelink runs ld.so with the environment variable LD_TRACE_PRELINKING
   set to dump the relocation type class from _dl_debug_bindings.  prelink
   has the following relocation type classes:

   where ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA has a conflict with
   RTYPE_CLASS_TLS.

   Since prelink doesn't use ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA, we
   should clear the ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA bit when the
   DL_DEBUG_PRELINK bit is set.

 (From OE-Core master rev: 12c86bdcc60c54e587a896b0dceb8bb6cc9ff7e3)

Signed-off-by: Mark Hatle <mark.hatle@windriver.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>