<feed xmlns='http://www.w3.org/2005/Atom'>
<title>buildroot, branch 2018.02-op-build</title>
<subtitle>OpenPOWER buildroot sources</subtitle>
<id>https://git.raptorcs.com/git/buildroot/atom?h=2018.02-op-build</id>
<link rel='self' href='https://git.raptorcs.com/git/buildroot/atom?h=2018.02-op-build'/>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/'/>
<updated>2018-04-12T06:29:40+00:00</updated>
<entry>
<title>Merge tag '2018.02.1' into 2018.02-op-build</title>
<updated>2018-04-12T06:29:40+00:00</updated>
<author>
<name>Joel Stanley</name>
<email>joel@jms.id.au</email>
</author>
<published>2018-04-12T06:29:40+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=a8d11267c2bfad3ff410ea342778f2791982da51'/>
<id>urn:sha1:a8d11267c2bfad3ff410ea342778f2791982da51</id>
<content type='text'>
Release 2018.02.1
</content>
</entry>
<entry>
<title>toolchain: add 4.16.x choice for headers</title>
<updated>2018-04-11T05:48:44+00:00</updated>
<author>
<name>Joel Stanley</name>
<email>joel@jms.id.au</email>
</author>
<published>2018-04-11T04:55:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=e17668bbe3538d42b0a0fab64251e60ff6c81d68'/>
<id>urn:sha1:e17668bbe3538d42b0a0fab64251e60ff6c81d68</id>
<content type='text'>
Signed-off-by: Joel Stanley &lt;joel@jms.id.au&gt;
</content>
</entry>
<entry>
<title>linux-headers: bump to 4.16 kernel version</title>
<updated>2018-04-11T05:48:23+00:00</updated>
<author>
<name>Joel Stanley</name>
<email>joel@jms.id.au</email>
</author>
<published>2018-04-11T04:58:13+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=e78f2606c6b50c91c54aa9d7965b16618d19cc80'/>
<id>urn:sha1:e78f2606c6b50c91c54aa9d7965b16618d19cc80</id>
<content type='text'>
Signed-off-by: Joel Stanley &lt;joel@jms.id.au&gt;
</content>
</entry>
<entry>
<title>Update for 2018.02.1</title>
<updated>2018-04-09T21:51:05+00:00</updated>
<author>
<name>Peter Korsgaard</name>
<email>peter@korsgaard.com</email>
</author>
<published>2018-04-09T21:51:05+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=9565a37e0d2aa3c5fb9a4148760c490f2e5226d4'/>
<id>urn:sha1:9565a37e0d2aa3c5fb9a4148760c490f2e5226d4</id>
<content type='text'>
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
</content>
</entry>
<entry>
<title>patch: add upstream security fix</title>
<updated>2018-04-09T19:01:30+00:00</updated>
<author>
<name>Baruch Siach</name>
<email>baruch@tkos.co.il</email>
</author>
<published>2018-04-09T16:20:36+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=c3e1d9849a72495f799b007260bbcdc61fc78da3'/>
<id>urn:sha1:c3e1d9849a72495f799b007260bbcdc61fc78da3</id>
<content type='text'>
Fixes CVE-2018-1000156: arbitrary command execution in ed-style patches.

Depend on MMU for now, because the patch adds a fork() call. Upstream
later switched to gnulib provided execute(), so this dependency can be
dropped on the next version bump.

Signed-off-by: Baruch Siach &lt;baruch@tkos.co.il&gt;
Signed-off-by: Thomas Petazzoni &lt;thomas.petazzoni@bootlin.com&gt;
(cherry picked from commit f4a4df2084b923f29eca2130976ca10a7aa6b719)
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
</content>
</entry>
<entry>
<title>package/linux: fix custom dts files handling</title>
<updated>2018-04-09T16:01:27+00:00</updated>
<author>
<name>Rafal Susz</name>
<email>rafal.susz@gmail.com</email>
</author>
<published>2018-03-13T18:00:05+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=014dbd4855fa0d52a32d2e2d15b425c64b2e7c95'/>
<id>urn:sha1:014dbd4855fa0d52a32d2e2d15b425c64b2e7c95</id>
<content type='text'>
Custom dts files are still conditionally copied based on non existing
boolean. So it is currently not possible to use custom dts file(s) at all.

List of dts files is now iterated and files are copied into dedicated kernel arch dir.

Signed-off-by: Rafal Susz &lt;rafal.susz@gmail.com&gt;
Tested-by: Jan Kundrát &lt;jan.kundrat@cesnet.cz&gt;
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
(cherry picked from commit 54157c6c2d9fba5ad230294ae1c7dfc0032b1ede)
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
</content>
</entry>
<entry>
<title>package/kmod: fix host install</title>
<updated>2018-04-09T15:51:04+00:00</updated>
<author>
<name>Yann E. MORIN</name>
<email>yann.morin.1998@free.fr</email>
</author>
<published>2018-04-08T08:11:51+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=34b8a1c5bcb7523f7f125f3b558d8cb1872cdf66'/>
<id>urn:sha1:34b8a1c5bcb7523f7f125f3b558d8cb1872cdf66</id>
<content type='text'>
The host directory no longer uses /usr.

This currently works because we still have the  legacy /usr
symlink, but for correctness it is better that we just fix it.

Signed-off-by: "Yann E. MORIN" &lt;yann.morin.1998@free.fr&gt;
Cc: Yegor Yefremov &lt;yegorslists@googlemail.com&gt;
Cc: Arnout Vandecappelle &lt;arnout@mind.be&gt;
Cc: Thomas Petazzoni &lt;thomas.petazzoni@bootlin.com&gt;
Cc: Peter Korsgaard &lt;peter@korsgaard.com&gt;
Signed-off-by: Thomas Petazzoni &lt;thomas.petazzoni@bootlin.com&gt;
(cherry picked from commit dac25351e6453b35ded611ff367b95bb4b10a9cf)
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
</content>
</entry>
<entry>
<title>php: fix emalloc/efree/estrdup/... undefined references</title>
<updated>2018-04-09T15:49:03+00:00</updated>
<author>
<name>Thomas Petazzoni</name>
<email>thomas.petazzoni@bootlin.com</email>
</author>
<published>2018-04-05T21:06:22+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=d44357175bd7c711c54fd6c2df5637a181c1d03b'/>
<id>urn:sha1:d44357175bd7c711c54fd6c2df5637a181c1d03b</id>
<content type='text'>
zend_alloc.h defines some macros such as:

Where _estrdup is the actual function implemented by the PHP core. If
this header file is not included, and some code uses estrdup, one ends
up with an undefined reference. This happens when libexpat support is
enabled. This commit adds a PHP patch that fixes this issue. The patch
has been submitted upstream through a Github pull request.

Fixes:

  http://autobuild.buildroot.net/results/889d2c1f509c035cd506e36061939bfddc8f1500/

Signed-off-by: Thomas Petazzoni &lt;thomas.petazzoni@bootlin.com&gt;
(cherry picked from commit fc4b66dbc1b71e871129ce14b289fcda6eb3ea10)
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
</content>
</entry>
<entry>
<title>wireshark: bump version to 2.2.14 (security)</title>
<updated>2018-04-09T15:39:37+00:00</updated>
<author>
<name>André Hentschel</name>
<email>nerv@dawncrow.de</email>
</author>
<published>2018-04-07T12:59:03+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=dd730312e509ab40c3ebcc18a121a2aa637be184'/>
<id>urn:sha1:dd730312e509ab40c3ebcc18a121a2aa637be184</id>
<content type='text'>
Security fixes since 2.2.12:

- wnpa-sec-2018-15
  The MP4 dissector could crash. (Bug 13777)
- wnpa-sec-2018-16
  The ADB dissector could crash. (Bug 14460)
- wnpa-sec-2018-17
  The IEEE 802.15.4 dissector could crash. (Bug 14468)
- wnpa-sec-2018-18
  The NBAP dissector could crash. (Bug 14471)
- wnpa-sec-2018-19
  The VLAN dissector could crash. (Bug 14469)
- wnpa-sec-2018-20
  The LWAPP dissector could crash. (Bug 14467)
- wnpa-sec-2018-23
  The Kerberos dissector could crash. (Bug 14576)
- wnpa-sec-2018-05
  The IEEE 802.11 dissector could crash. Bug 14442, CVE-2018-7335
- wnpa-sec-2018-06
  Multiple dissectors could go into large infinite loops. All ASN.1 BER dissectors (Bug 14444), along with the DICOM (Bug 14411), DMP (Bug 14408), LLTD (Bug 14419), OpenFlow (Bug 14420), RELOAD (Bug 14445), RPCoRDMA (Bug 14449), RPKI-Router (Bug 14414), S7COMM (Bug 14423), SCCP (Bug 14413), Thread (Bug 14428), Thrift (Bug 14379), USB (Bug 14421), and WCCP (Bug 14412) dissectors were susceptible.
- wnpa-sec-2018-07
  The UMTS MAC dissector could crash. Bug 14339, CVE-2018-7334
- wnpa-sec-2018-09
  The FCP dissector could crash. Bug 14374, CVE-2018-7336
- wnpa-sec-2018-10
  The SIGCOMP dissector could crash. Bug 14398, CVE-2018-7320
- wnpa-sec-2018-11
  The pcapng file parser could crash. Bug 14403, CVE-2018-7420
- wnpa-sec-2018-12
  The IPMI dissector could crash. Bug 14409, CVE-2018-7417
- wnpa-sec-2018-13
  The SIGCOMP dissector could crash. Bug 14410, CVE-2018-7418
-  wnpa-sec-2018-14
  The NBAP disssector could crash. Bug 14443, CVE-2018-7419

Full release notes:

  https://www.wireshark.org/docs/relnotes/wireshark-2.2.14.html

Signed-off-by: André Hentschel &lt;nerv@dawncrow.de&gt;
Signed-off-by: Thomas Petazzoni &lt;thomas.petazzoni@bootlin.com&gt;
(cherry picked from commit c5c87c2bb61efb31421b345bdbf6931b882ff6a9)
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
</content>
</entry>
<entry>
<title>linux: bump default to version 4.15.16</title>
<updated>2018-04-08T19:37:39+00:00</updated>
<author>
<name>Fabio Estevam</name>
<email>festevam@gmail.com</email>
</author>
<published>2018-04-08T14:04:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=186489f7fe70b1d7b3e5fbfb2cc38a1a0283267a'/>
<id>urn:sha1:186489f7fe70b1d7b3e5fbfb2cc38a1a0283267a</id>
<content type='text'>
Signed-off-by: Fabio Estevam &lt;festevam@gmail.com&gt;
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
(cherry picked from commit bbbcfa57f80d239f94669586cadad4e14f073a5f)
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
</content>
</entry>
</feed>
