summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* linux-headers: bump 4.{4,9,10}.x seriesVicente Olivert Riera2017-04-271-3/+3
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/libqmi: bump version to 1.18.0Matt Weber2017-04-272-4/+4
| | | | | | | | | | | udev support was added with this bump, however the support was disabled, as Buildroot currently doesn't support the gudev package. libqmi is looking for the Gobject bindings provided by that package to access libudev. Signed-off-by: Matthew Weber <matthew.weber@rockwellcollins.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* aircrack-ng: don't build SSE code for non SSE targetBaruch Siach2017-04-271-0/+6
| | | | | | | | | | | | Fixes: http://autobuild.buildroot.net/results/763/7631470016f923e8f4a7696e65437c71b8668b6e/ http://autobuild.buildroot.net/results/621/621588651b5cf54726bbf5361399a2dc301b8a29/ http://autobuild.buildroot.net/results/628/628a66ef766308fba699f1faa942306e600e5575/ Cc: Laurent Cans <laurent.cans@gmail.com> Cc: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libnl: add upstream security fixBaruch Siach2017-04-272-0/+3
| | | | | | | | | | | CVE-2017-0553: An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1511855.html Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* tiff: add upstream security fixesPeter Korsgaard2017-04-2713-0/+761
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add upstream post-4.0.7 commits (except for ChangeLog modifications) fixing the following security issues: CVE-2016-10266 - LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22. CVE-2016-10267 - LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8. CVE-2016-10269 - LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 512" and libtiff/tif_unix.c:340:2. CVE-2016-10270 - LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 8" and libtiff/tif_read.c:523:22. CVE-2017-5225 - LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value. CVE-2017-7592 - The putagreytile function in tif_getimage.c in LibTIFF 4.0.7 has a left-shift undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. CVE-2017-7593 - tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image. CVE-2017-7594 - The OJPEGReadHeaderInfoSecTablesDcTable function in tif_ojpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (memory leak) via a crafted image. CVE-2017-7595 - The JPEGSetupEncode function in tiff_jpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image. CVE-2017-7598 - tif_dirread.c in LibTIFF 4.0.7 might allow remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image. CVE-2017-7601 - LibTIFF 4.0.7 has a "shift exponent too large for 64-bit type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. CVE-2017-7602 - LibTIFF 4.0.7 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* icu: add upstream security fix for utf-8 handlingPeter Korsgaard2017-04-271-0/+173
| | | | | | | | | | | | | | | | | | Fixes: CVE-2017-7867 - International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function. CVE-2017-7868 - International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function. Upstream: http://bugs.icu-project.org/trac/changeset/39671 Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* tslib: speed up the build by skipping autoreconfMartin Kepplinger2017-04-271-1/+0
| | | | | | | | | We are not carrying any patches modifying auto* files, so autoreconf isn't needed. [Peter: extend commit message] Signed-off-by: Martin Kepplinger <martin.kepplinger@ginzinger.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* tovid: bump version to 0.35.2Steve Kenton2017-04-272-4/+4
| | | | | Signed-off-by: Steve Kenton <skenton@ou.edu> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libmpeg2: fix sparc32 buildWaldemar Brodkorb2017-04-271-0/+16
| | | | | | | | | | | The output detection recognized wrong target output, because sparcv9 optimization flags used for sparcv8 build. Fixes: http://autobuild.buildroot.net/results/1b3158b03f7eaf5afb5a4dab9526091888f6c9b8 Signed-off-by: Waldemar Brodkorb <wbx@openadk.org> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* DEVELOPERS: remove bouncing email addressBaruch Siach2017-04-271-4/+0
| | | | | | | | The DEVELOPERS email address of Waldemar Rymarkiewicz is bouncing. Remove his entry. Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libsndfile: security bump to version 1.0.28Peter Korsgaard2017-04-273-20/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes: CVE-2017-7585 - In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file. CVE-2017-7586 - In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file. CVE-2017-7741 - In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with write memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585. CVE-2017-7742 - In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with read memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585. Dop undocumented patch adjusting SUBDIRS in Makefile.in as it no longer applies. Instead pass --disable-full-suite to disable man pages, documentation and programs, as that was presumably the reason for the patch. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* ncftp: use tar.gz to workaround upstream changing tarball post-releasePeter Korsgaard2017-04-272-2/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As explained here: http://lists.busybox.net/pipermail/buildroot/2017-March/185550.html Upstream has silently updated their 3.2.6 tarball some time between our version bump in late November and December 4th. The changed tarball also contains a significant amount of source changes: libncftp/c_opennologin.c | 4 libncftp/ftp.c | 31 libncftp/ftw.c | 2 libncftp/io_getmem.c | 2 libncftp/io_list.c | 6 libncftp/io_sendfile.c | 4 libncftp/io_util.c | 4 libncftp/ncftp.h | 2 libncftp/open.c | 4 libncftp/rftw.c | 2 libncftp/rglobr.c | 2 libncftp/u_decodehost.c | 2 libncftp/u_decodeurl.c | 2 libncftp/u_getpass.c | 2 libncftp/u_misc.c | 2 libncftp/u_pathcat.c | 4 libncftp/u_scram.c | 2 libncftp/wincfg.h | 1 ncftp/cmds.c | 38 - ncftp/gl_getline.c | 26 ncftp/ls.c | 9 ncftp/ls.h | 9 ncftp/progress.c | 9 ncftp/readln.c | 4 ncftp/shell.h | 10 ncftp/spoolutil.c | 8 ncftp/version.c | 2 sh/mksrctar.sh | 1 sh_util/gpshare.c | 12 sh_util/ncftpbatch.c | 110 -- sh_util/ncftpget.c | 6 sh_util/ncftpls.c | 5 sh_util/ncftpput.c | 14 sio/DNSUtil.c | 4 sio/Makefile.in | 16 sio/SBind.c | 35 sio/SConnect.c | 9 sio/SNew.c | 115 --- sio/SRead.c | 6 sio/StrAddr.c | 6 sio/config.h.in | 24 sio/configure.in | 8 sio/sio.h | 18 sio/wincfg.h | 1 vis/bmed.c | 13 vis/wgets.c | 12 vis/wgets.h | 7 vis/wutil.c | 6 vis/wutil.h | 6 Upstream has been contacted to verify if this change was intentional and the reason why. From the mail: > Is this update intentional? Why was the tarball regenerated? Yes. The old hash was unfortunately already used in the 2017.02 (and .1) releases, so just changing the hash and updating the tarball on sources.buildroot.org would break ncftp for users of those releases. Instead change to use the .tar.gz tarball as suggested by Arnout. Cc: Arnout Vandecappelle <arnout@mind.be> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/pcsc-lite: bump version to 1.8.20Bernd Kuhls2017-04-262-3/+3
| | | | | Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* xorriso: disable libcdioBaruch Siach2017-04-261-9/+4
| | | | | | | | | | | | | | | | | | | | xorriso and libcdio define identically named symbols. This breaks static linking. Besides, upstream suggested that on Linux the built-in libburn adapter is much better tested than libcdio. Disable libcdio. Fixes: http://autobuild.buildroot.net/results/430/430a6b548fcc311f20ea71cecaa11fafac1d5a19/ http://autobuild.buildroot.net/results/a5d/a5d0f8bec0d39e48f6dfe4ecc07fe0ca3c6bd70a/ Cc: Steve Kenton <skenton@ou.edu> Suggested-by: Thomas Schmitt <scdbackup@gmx.net> Signed-off-by: Baruch Siach <baruch@tkos.co.il> Acked-by: Steve Kenton <skenton@ou.edu> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* uclibc: update to 1.0.24Waldemar Brodkorb2017-04-264-39/+3
| | | | | | | | Fixes aarch64 C++ issue. Removes old implementations for fnmatch/regex. Allow long double wrappers for all architectures. Signed-off-by: Waldemar Brodkorb <wbx@openadk.org> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/bullet: bump to version 2.86.1Romain Naour2017-04-262-2/+2
| | | | | Signed-off-by: Romain Naour <romain.naour@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/xenomai: fallback to httpRomain Naour2017-04-261-1/+1
| | | | | | | | | | | The https protocol return: "ERROR 503: Service Temporarily Unavailable" Fixes: http://autobuild.buildroot.net/results/120/12034603c46c8bd69590c88bbfe85261460b699c Signed-off-by: Romain Naour <romain.naour@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* imagemagick: add upstream security fix for CVE-2017-7606Peter Korsgaard2017-04-261-0/+52
| | | | | | | | | | | | | | This is not yet part of any release. coders/rle.c in ImageMagick 7.0.5-4 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. For more details, see: https://blogs.gentoo.org/ago/2017/04/02/imagemagick-undefined-behavior-in-codersrle-c/ Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcroco: bump to version 0.6.12Peter Korsgaard2017-04-262-3/+3
| | | | Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcroco: add upstream security fixesPeter Korsgaard2017-04-262-0/+108
| | | | | | | | | | | | | | | | | | | These have been added to upstream git after 0.6.12 was released. CVE-2017-7960 - The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file. CVE-2017-7961 - The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and 0.6.12 has an "outside the range of representable values of type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. For more details, see: https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/ Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* python-web2py: security bump to version 2.14.6Peter Korsgaard2017-04-262-2/+2
| | | | | | | | | | | | | | | | | | | | | CVE-2016-4806 - Web2py versions 2.14.5 and below was affected by Local File Inclusion vulnerability, which allows a malicious intended user to read/access web server sensitive files. CVE-2016-4807 - Web2py versions 2.14.5 and below was affected by Reflected XSS vulnerability, which allows an attacker to perform an XSS attack on logged in user (admin). CVE-2016-4808 - Web2py versions 2.14.5 and below was affected by CSRF (Cross Site Request Forgery) vulnerability, which allows an attacker to trick a logged in user to perform some unwanted actions i.e An attacker can trick an victim to disable the installed application just by sending a URL to victim. CVE-2016-10321 - web2py before 2.14.6 does not properly check if a host is denied before verifying passwords, allowing a remote attacker to perform brute-force attacks. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* minicom: security bump to version 2.7.1Peter Korsgaard2017-04-262-3/+3
| | | | | | | | | | | Fixes CVE-2017-7467 - minicom and prl-vzvncserver vt100.c escparms[] buffer overflow. For more details about the issue, see the nice writeup on oss-security: http://www.openwall.com/lists/oss-security/2017/04/18/5 Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* busybox: no need to disable clear and resetArnout Vandecappelle2017-04-261-12/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | Removing clear and reset from the busybox config when the ncurses tools are enabled is not really needed. Since commit 802bff9c42, the busybox install will not overwrite existing programs. Therefore, the tools will be installed correctly regardless of the order of the build: - if busybox is built first, the clear and reset apps are installed, but they will be overwritten by ncurses; - if ncurses is built first, it will install the clear and reset apps, and busybox will no longer install them. We prefer not to modify the busybox configuration when not strictly necessary, because it is surprising for the user that his configuration is not applied. Clearly, it's not ideal that busybox is configured with redundant apps, but if the user wants to shrink it, it's possible to provide a custom config. This partially reverts commit 33c72344a8686a136c1da6a056ed6c0945bbf8b7. Cc: Matthew Weber <matthew.weber@rockwellcollins.com> Cc: Danomi Manchego <danomimanchego123@gmail.com> Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be> Tested-by: Matt Weber <matthew.weber@rockwellcollins.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/aircrack-ng: bump version to 1.2-rc4Bernd Kuhls2017-04-266-102/+67
| | | | | | | | | | | | | | | | | | Removed patches applied upstream: 0001-Makefile-use-pkg-config-to-find-libpcre-it-s-more-cros.patch http://trac.aircrack-ng.org/changeset/2445 0002-Optionally-use-LIBPCAP-for-required-libpcap-libraries.patch http://trac.aircrack-ng.org/changeset/2446 0003-Wesside-ng-Use-termios-instead-of-sys-termios.patch http://trac.aircrack-ng.org/changeset/2533 Added option to disable stack-protector support auto-detection in gcc. Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/ccid: bump version to 1.4.26Bernd Kuhls2017-04-262-5/+6
| | | | | | | | Changed _SITE according to http://lists.alioth.debian.org/pipermail/pcsclite-muscle/Week-of-Mon-20170102/000780.html Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/acsccid: bump version to 1.1.4Bernd Kuhls2017-04-262-4/+4
| | | | | Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/acpica: bump version to 20170303Bernd Kuhls2017-04-262-2/+2
| | | | | Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/libgpgme: bump version to 1.9.0Bernd Kuhls2017-04-262-4/+3
| | | | | | | | | Removed configure option --with-gpg, it was removed upstream in 2013: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commitdiff;h=02ba35c1b6a2cbb3361b2f2ad507c53564b2be0b#patch3 [Peter: drop comment referring to --with-gpg option] Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* sg3_utils: improve license descriptionRahul Bedarkar2017-04-261-3/+3
| | | | | | | | | | Library is licensed under BSD-3-Clause. Some programs are licensed under GPL-2.0+ while other are BSD-3-Clause. Annotate licenses with components and improve readability of license strings when conditionally specifying license for programs using := instead of +=. Signed-off-by: Rahul Bedarkar <rahulbedarkar89@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* linux: bump default version to 4.10.12Vicente Olivert Riera2017-04-261-2/+2
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* linux-headers: bump 4.{4,9,10}.x seriesVicente Olivert Riera2017-04-261-3/+3
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* python-pyopenssl: bump version to 17.0.0Vicente Olivert Riera2017-04-262-4/+4
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* tcpreplay: bump version to 4.2.3Vicente Olivert Riera2017-04-262-2/+2
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/python-json-schema-validator: remove Python2 dependencyAndrey Smirnov2017-04-251-1/+0
| | | | | | | | | | python-json-schema-validator supports Python 3, so there's no reason to limit it to Python 2 only. Reviewed-by: Yegor Yefremov <yegorslists@googlemail.com> Signed-off-by: Matthew Carruth <carruthm@gmail.com> Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* package/python-versiontools: remove Python2 dependencyAndrey Smirnov2017-04-251-1/+0
| | | | | | | | | | python-versiontools supports Python 3, so there's no reason to limit it to Python 2 only. Reviewed-by: Yegor Yefremov <yegorslists@googlemail.com> Signed-off-by: Matthew Carruth <carruthm@gmail.com> Signed-off-by: Andrey Smirnov <andrew.smirnov@gmail.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* binutils: arc: fix 0301-PATCH-check-ldrunpath-length.patch after version bumpZakharov Vlad2017-04-241-2/+2
| | | | | | | | | | | | | | | | | This commit fixes another brown-paper-bag issue that I've introduced by my following patch: toolchain: Bump ARC tools to arc-2017.03-rc1 (5f8ef7e25c5cc5c2e4ae4c8b6e8caa029ddf9a94) arc-2017.03-rc1 differs a bit from 2.28. And so corresponding of-the-tree patch should be updated appropriately. Fixes target binutils build for arc: http://autobuild.buildroot.net/results/f67/f67c905979870936d8050a505b61186be6dad85d// [Peter: tweak commit message] Signed-off-by: Vlad Zakharov <vzakhar@synopsys.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* mongoose: bump to version 6.7Davide Viti2017-04-242-2/+2
| | | | | Signed-off-by: Davide Viti <zinosat@tiscali.it> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* mpv: bump version to 0.25.0Vicente Olivert Riera2017-04-243-43/+4
| | | | | | | | | | | Remove 0003-fix-build-with-have-gl.patch which is already included in this release. Remove --{enable|disable}-standard-gl configure option because it doesn't exist. Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* poppler: bump version to 0.54.0Vicente Olivert Riera2017-04-242-2/+2
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* harfbuzz: bump version to 1.4.6Vicente Olivert Riera2017-04-242-3/+3
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* python-dataproperty: bump version to 0.18.1Vicente Olivert Riera2017-04-242-4/+4
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* x265: bump version to 2.4Vicente Olivert Riera2017-04-242-2/+2
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* perl-gd: bump to version 2.66Francois Perrad2017-04-244-74/+5
| | | | | | | remove last patch Signed-off-by: Francois Perrad <francois.perrad@gadz.org> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* syslog-ng: disable mongodbBaruch Siach2017-04-221-1/+1
| | | | | | | | | | | | | | | | | | | | | libbson is a dependency of the mongo-c-driver that syslog-ng uses. Buildroot doesn't package mongo-c-driver so syslog-ng uses the bundled one. The bundled mongo-c-driver in turn may optionally use a bundled libbson. When Buildroot builds libbson mongo-c-driver detects that and does not configure its bundled libbson. This breaks the build of the syslog-ng mongodb module because it adds the bundled libbson to the headers search path. Disable the mongodb module to avoid this issue. Fixes: http://autobuild.buildroot.net/results/843/84331e9a168d8bdf2cceca8e9e1480611c1ecaed/ http://autobuild.buildroot.net/results/b5b/b5bad64abbf5764faf2a7129a1a25ad75c34980b/ http://autobuild.buildroot.net/results/3c3/3c32f4eb7436da06f3fb59f928363959df2a5e86/ Cc: Chris Packham <judge.packham@gmail.com> Signed-off-by: Baruch Siach <baruch@tkos.co.il> Acked-by: Chris Packham <judge.packham@gmail.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* package makefiles: clean up backslash spacing.Adam Duskett2017-04-2239-295/+295
| | | | | | | | | | The check-package script when ran gave warnings on only using one space before backslashes on all of these makefiles. This patch cleans up all warnings related to the one space before backslashes rule in the make files in the package directory. Signed-off-by: Adam Duskett <aduskett@codeblue.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* package/qt: fix headerAdam Duskett2017-04-221-8/+1
| | | | | | | The header was non-standard according to check-package. Signed-off-by: Adam Duskett <aduskett@codeblue.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* package/qt5: add comment headerAdam Duskett2017-04-221-0/+6
| | | | | Signed-off-by: Adam Duskett <aduskett@codeblue.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* package/xenomai: properly indent XENOMAI_DEVICES variableAdam Duskett2017-04-221-3/+3
| | | | | Signed-off-by: Adam Duskett <aduskett@codeblue.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* package/busybox: fix unexpected indent with tabsAdam Duskett2017-04-221-1/+1
| | | | | Signed-off-by: Adam Duskett <aduskett@codeblue.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* toolchain: Bump ARC tools to arc-2017.03-rc1Zakharov Vlad2017-04-2214-49/+45
| | | | | | | | | | | | | This commit bumps ARC toolchain to arc-2017.03-rc1 Please note that it is a release candidate and it might contain some breakages, please don't use it for production builds. Also I have updated patches for binutils as our source files in binutils differ comparing to 2.28. Signed-off-by: Vlad Zakharov <vzakhar@synopsys.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
OpenPOWER on IntegriCloud