aboutsummaryrefslogtreecommitdiffstats
path: root/meta/recipes-core
AgeCommit message (Collapse)Author
2016-09-27init-install.sh: fix disk_sizeRobert Yang
It mis-matched "SanDisk" or "Disk Flags" before, which caused unexpected error. Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit a68ac76c1b6ed4c1a2fbc944c5021c89fd26217f) [YOCTO #10333] Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-09-23util-linux: Security fix for CVE-2016-5011Armin Kuster
affects util-linux < 2.28.2 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-4448Armin Kuster
Affects libxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-4447Armin Kuster
Affects libxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-3627Armin Kuster
Affects libxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-1833Armin Kuster
Affects libxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-1835Armin Kuster
Affects libxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-1837Armin Kuster
Affects libxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-4449Armin Kuster
Affects limbxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-1836Armin Kuster
Affects libxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-1839Armin Kuster
Affects libxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-1838Armin Kuster
Affects libxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-1840Armin Kuster
affects libxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-4483.patchArmin Kuster
affects libxml2 < 2.9.4 Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-1834.patchArmin Kuster
Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-3705Armin Kuster
Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27libxml2: Security fix for CVE-2016-1762Armin Kuster
Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27glibc: Security fix for CVE-2016-4429Armin Kuster
Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-07-27glibc: Security Fix for CVE-2016-3706Armin Kuster
Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-05-23build-appliance-image: Update to jethro head revisionRichard Purdie
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-05-23build-appliance-image: Update to jethro head revisionRichard Purdie
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-05-14busybox: Security fix CVE-2016-2147Armin Kuster
busybox <= 1.24.2 Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-05-14busybox: Security Fix CVE-2016-2148Armin Kuster
busybox <= 1.24.2 Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-05-10glibc: Fix CVE-2015-8778Yuanjie Huang
CVE: CVE-2015-8778 Improve check against integer wraparound in hcreate_r [BZ #18240] This is an integer overflow in hcreate and hcreate_r which can result in an out-of-bound memory access. This could lead to application crashes or, potentially, arbitrary code execution. Upstream-Status: Backport [2.23] (cherry-picked from commit bae7c7c7, 4bd228c8) Signed-off-by: Yuanjie Huang <yuanjie.huang@windriver.com>
2016-04-11ncurses: update SRC_URIRoss Burton
Upstream re-arranged their FTP server and deleted the tarball that we were downloading. This tarball is mirrors on downloads.yoctoproject.org but not everyone uses that, so Work around this by pointing the SRC_URI at the Yocto Project source mirror directly. [ YOCTO #9379 ] Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-04-11systemd-serialgetty: allow baud rate overridingAwais Belal
In case a getty is required on a UART which is not being used as the kernel console, the current agetty invocation fails to obey the baud rate configured through the SERIAL_CONSOLES variable because it uses --keep-baud. (From OE-Core master rev: b54b73834e73d55de1038b55d0a4d7f49cda52d0) Signed-off-by: Awais Belal <awais_belal@mentor.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-04-11systemd: chown hwdb.bin to root:root for do_rootfsChristopher Larson
This is created by qemu for the do_rootfs case, which bypasses pseudo, so we need to correct the ownership. This fixes a warning issued by rootfs_check_host_user_contaminated. (From OE-Core master rev: 4ff6b8cadec10e17dbf884a873a227e29944f5d1) Signed-off-by: Christopher Larson <chris_larson@mentor.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Robert Yang <liezhi.yang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-04-11systemd: fix segfault on shutdownBill Randle
This applies upstream fixes to fix a segfault in systemd-logind on shutdown. [Fixes YOCTO #9265] Signed-off-by: Bill Randle <william.c.randle@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-04-11busybox_git: Fix SRCREVBrad Mouring
The SRCREV in the busybox git recipe did not point to a commit ID on the master branch. Point the variable to something reachable from the master branch (which fixes this recipe's fetch()). Suggested-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Brad Mouring <brad.mouring@ni.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-04-11busybox-1.23: Backport patch to fix zcip false-conflictBrad Mouring
Busybox upstream fixed the issue where an incorrect comparison of addresses led to bogus renegotiation of a new ll ip in 1.24. Backport this change to 1.23.2. Signed-off-by: Brad Mouring <brad.mouring@ni.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-03-03os-release: put double-quotes around variable contentsCraig McQueen
This makes the resulting /etc/os-release file have valid shell assignment syntax. This makes it loadable by a shell script, using the 'source' command: source /etc/os-release Signed-off-by: Ross Burton <ross.burton@intel.com> (From OE-Core master rev: f6e0ea000fa3b9a726ab56500f643f9902371618) Signed-off-by: Joshua Lock <joshua.g.lock@intel.com>
2016-02-24build-appliance-image: Update to jethro head revisionRichard Purdie
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-02-21uclibc: Security fix CVE-2016-2225Armin Kuster
CVE-2016-2225 Make sure to always terminate decoded string This change is being provide to comply to Yocto compatiblility. Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-02-21uclibc: Security fix CVE-2016-2224Armin Kuster
CVE-2016-2224 Do not follow compressed items forever. This change is being provide to comply to Yocto compatiblity. Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-02-18glibc: Security fix CVE-2015-7547Armin Kuster
CVE-2015-7547: getaddrinfo() stack-based buffer overflow Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-02-07build-appliance-image: Update to jethro head revisionRichard Purdie
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-02-07build-appliance-image: Update to jethro head revisionRichard Purdie
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-02-07cross-localedef-native: add ABI breaking glibc patchJens Rehsack
Add patch from commit 96b1b5c127e9e0e637aaf7948cf3330a94a5cd57 to cross-localedef-native to avoid broken images built with ENABLE_BINARY_LOCALE_GENERATION set to 1: $ sh -c "export LANG=de_DE; ls -la" sh: loadlocale.c:130: _nl_intern_locale_data: Assertion `cnt < (sizeof (_nl_value_type_LC_COLLATE) / sizeof (_nl_value_type_LC_COLLATE[0]))' failed. Aborted Signed-off-by: Jens Rehsack <sno@netbsd.org> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-02-05build-appliance-image: Update to jethro head revisionRichard Purdie
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-02-04build-appliance-image: Update to jethro head revisionRichard Purdie
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2016-02-02busybox: fix build of last appletRoss Burton
If CONFIG_FEATURE_LAST_SMALL is enabled the build fails because of a broken __UT_NAMESIZE test. [ YOCTO #8869 ] Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
2016-02-02uClibc: enable utmp for shadow compatibilityBogdan-Alexandru Voiculescu
with the enabling of utmpx in busybox and uClibc it was noted that shadow support for utmpx also needs utmp explicitly enabled in uclibc. this is a workaround that might be removed once shadow properly supports --enable-utmpx to check for utmpx configuration instead of utmp like it does now [YOCTO #8243] [YOCTO #8971] Signed-off-by: Bogdan-Alexandru Voiculescu <bogdanx.a.voiculescu@intel.com> Signed-off-by: Benjamin Esquivel <benjamin.esquivel@linux.intel.com> Signed-off-by: Ross Burton <ross.burton@intel.com> (cherry picked from commit 969158d63ba2c8e2e11af41c2a6d4f1aa5b0099f) Signed-off-by: Saul Wold <sgw@linux.intel.com>
2016-02-01glibc-locale: fix QA warningArmin Kuster
WARNING: QA Issue: glibc-locale: /glibc-binary-localedata-sd-in/usr/lib/locale/sd_IN/LC_CTYPE is owned by uid 1000, which is the same as the user running bitbake. This may be due to host contamination [host-user-contaminated] fix type Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-02-01libxml2: Security fix CVE-2015-8710Armin Kuster
CVE-2015-8710 libxml2: out-of-bounds memory access when parsing an unclosed HTML comment Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-02-01libxml2: Security fix CVE-2015-8241Armin Kuster
CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar Signed-off-by: Armin Kuster <akuster@mvista.com>
2016-01-30glibc: CVE-2015-8776Armin Kuster
it was found that out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information. Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
2016-01-30glibc: CVE-2015-9761Armin Kuster
A stack overflow vulnerability was found in nan* functions that could cause applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
2016-01-30glibc: CVE-2015-8779Armin Kuster
A stack overflow vulnerability in the catopen function was found, causing applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
2016-01-30glibc: CVE-2015-8777.patchArmin Kuster
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable. Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
2016-01-21nativesdk-buildtools-perl-dummy: Bump PRRichard Purdie
Recent changes to this recipe caused automated PR increments to break, regressing package feeds. The only way to recover is to bump PR, so do this centrally to fix anyone affected. (From OE-Core rev: dacdb499d31cb2e80cca33cba9d599c8ee983dc4) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>