summaryrefslogtreecommitdiffstats
path: root/package/util-linux/0003-build-sys-fix-disable-all-programs-enable-schedutils.patch
Commit message (Collapse)AuthorAgeFilesLines
* util-linux: security bump to version 2.29.2Gustavo Zacarias2017-02-231-99/+0
| | | | | | | | | | | | | | | | | | From https://www.kernel.org/pub/linux/utils/util-linux/v2.29/v2.29.2-ReleaseNotes This release fixes su(1) security issue CVE-2017-2616: It is possible for any local user to send SIGKILL to other processes with root privileges. To exploit this, the user must be able to perform su with a successful login. SIGKILL can only be sent to processes which were executed after the su process. It is not possible to send SIGKILL to processes which were already running. Drop upstream patches and autoreconf since it's no longer required. [Peter: extend commit message with CVE info / description] Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* util-linux: build schedutils without enabling basic binariesCarlos Santos2017-02-201-0/+99
Pull an upstream fix to allow building schedutils (ionice, taskset, chrt) when util-linux is configured with $ configure --disable-all-programs --enable-schedutils Fixes: https://bugs.busybox.net/show_bug.cgi?id=9656 Reported-by: Aaron Holtzman <aholtzma@gmail.com> Signed-off-by: Carlos Santos <casantos@datacom.ind.br> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
OpenPOWER on IntegriCloud