Commit Graph

5465 Commits

Author SHA1 Message Date
Qian Lei 1caffb22f3 xlsclients: Add new recipe
xlsclients is a utility for listing information about the client
applications running on a X11 server.

Signed-off-by: Qian Lei <qianl.fnst@cn.fujitsu.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-24 11:58:31 +01:00
Qian Lei ee86039e2f xlsatoms: Add new recipe
xlsatoms lists the interned atoms defined on an X11 server.

Signed-off-by: Qian Lei <qianl.fnst@cn.fujitsu.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-24 11:58:31 +01:00
Qian Lei ddd15ecef2 tomoyo-tools: Add new recipes
TOMOYO Linux is a Mandatory Access Control (MAC) implementation for
Linux that can be used to increase the security of a system, while also
being useful purely as a system analysis tool.

Signed-off-by: Qian Lei <qianl.fnst@cn.fujitsu.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-24 11:58:31 +01:00
Chong.Lu@windriver.com d4af902af7 samba: fix error messages when startup samba service
This solves the following error messages when startup samba:

  Unable to open new log file '/var/log/samba/log.smbd': No such file or directory

Signed-off-by: Chong Lu <Chong.Lu@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-24 11:58:30 +01:00
Chong.Lu@windriver.com 42e1f31341 samba: add winbind.service to winbind package
This solves the following warning:

lib32-samba-3.6.24: lib32-samba: Files/directories were installed but not shipped
  /lib/systemd/system/winbind.service [installed-vs-shipped]

Signed-off-by: Chong Lu <Chong.Lu@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-24 11:58:30 +01:00
Martin Jansa 770994c2f8 postfix: Fix indentation
* we're using 4 spaces, not mix of tabs and spaces\!

Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-21 16:32:50 -05:00
Jackie Huang 66be3df87d postfix.inc: Remove references to buildmachine paths in target makedefs.out
Fixed the buildpaths QA issue:
ERROR: QA Issue: File
/work/core2-64-wrs-linux/postfix/2.11.1-r0/packages-split/postfix/etc/postfix/makedefs.out
in package contained reference to tmpdir [buildpaths]

Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-21 16:32:21 -05:00
Bian Naimeng c78db30ef5 esmpt: port from openembedded.
The esmtp is not longer being maintained since 1.2,
but it's used at many distribution now such as Ubuntu trusty(14.04LTS).

Signed-off-by: Bian Naimeng <biannm@cn.fujitsu.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-21 14:09:14 -05:00
Bian Naimeng 1037a44e9d libesmtp: port from openembedded.
Signed-off-by: Bian Naimeng <biannm@cn.fujitsu.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-21 14:09:14 -05:00
Armin Kuster b727080564 wireshark: update to 1.12.2
The following vulnerabilities have been fixed.
* wnpa-sec-2014-20
  SigComp UDVM buffer overflow. (Bug 10662)
  CVE-2014-8710
* wnpa-sec-2014-21
  AMQP crash. (Bug 10582)
  CVE-2014-8711
* wnpa-sec-2014-22
  NCP crashes. (Bug 10552, Bug 10628)
  CVE-2014-8712, CVE-2014-8713
* wnpa-sec-2014-23
  TN5250 infinite loops. (Bug 10596)
  CVE-2014-8714

Reference:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.2.html

Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-20 14:51:11 -05:00
Kai Kang 84d2f0a979 polarssl: add dependency openssl
polarssl compiles with openssl to build unit test cases. If openssl
doesn't exist, native libssl.so will be used. Then causes error:

| .../bitbake_build/tmp/sysroots/x86_64-linux/usr/lib/libssl.so: error adding symbols: File in wrong format

Add dependency openssl for polarssl to fix it.

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Mark Hatle <mark.hatle@windriver.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-20 14:51:11 -05:00
Zhenhua Luo c8c17e074a ptpd: add FSL QorIQ DPAA and eTSEC support
This patch is for Freescale QorIQ DPAA and eTSEC which support 1588 hardware
assist module, and mainly uses SO_TIMESTAMPING API for HW timestamp and PHC
API.

Signed-off-by: Yangbo Lu <yangbo.lu@freescale.com>
Signed-off-by: Zhenhua Luo <zhenhua.luo@freescale.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-19 15:21:04 +01:00
Peter Bigot 940aa02a4e imagemagick: update 6.8.9 to patchset 9
Signed-off-by: Peter A. Bigot <pab@pabigot.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-19 15:21:03 +01:00
Peter Bigot 7e034ebd54 imagemagick: update URI to allow fetching current and previous releases
The only version available at the original URI is patch 9.  All releases
are available at the /releases sub-path.

Signed-off-by: Peter A. Bigot <pab@pabigot.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-19 15:21:03 +01:00
Yevhen Kyriukha 2fb9f9df35 rabbitmq-c: update to v0.5.2.
Signed-off-by: Yevhen Kyriukha <kirgene@gmail.com>
Acked-by: Maciej Borzecki <maciej.borzecki@open-rnd.pl>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-19 15:21:03 +01:00
Xufeng Zhang 26f1111708 syslog-ng: Fix memory leak when udp connection is used [ LIN7-1379 ]
When udp connection is used, there are several memory leaks happen
after run a long time.

Signed-off-by: Xufeng Zhang <xufeng.zhang@windriver.com>
Signed-off-by: Roy Li <rongqing.li@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-19 15:21:03 +01:00
Mario Domenech Goulart 3243648a18 gmock: add recipe
gmock is a library for writing and using C++ mock classes, by Google.

Signed-off-by: Mario Domenech Goulart <mario@ossystems.com.br>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-19 15:19:25 +01:00
Mario Domenech Goulart ff5cda05c9 gtest: add recipe
gtest is a framework for writing C++ tests, by Google.

Signed-off-by: Mario Domenech Goulart <mario@ossystems.com.br>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-19 15:19:25 +01:00
Andreas Müller 23d2287983 gvfs: replace deprecated g_memmove by memmove
* g_memmove was deprecated ib glib-2.0 2.40
* opening a remote connection created by gigolo with thunar failed with:
  | thunar: symbol lookup error: /usr/lib/modules/libgvfsdbus.so: undefined symbol: g_memmove
* further tests showed that browsing in windows networks is fixed now

Signed-off-by: Andreas Müller <schnitzeltony@googlemail.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-19 15:19:25 +01:00
Andreas Müller b4ed05ae7a xfce4-weather-plugin: make work properly after met.no API change
see [1] for more information

https://bugzilla.xfce.org/show_bug.cgi?id=10916

Signed-off-by: Andreas Müller <schnitzeltony@googlemail.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-19 15:19:24 +01:00
Andrea Adami f38cf13f72 ubi-utils-klibc_1.5.1: initial commit of v. 1.5.1
NOTE: we track master upstream so we are some commits ahead v 1.5.1.

Signed-off-by: Andrea Adami <andrea.adami@gmail.com>
2014-11-17 10:00:45 +00:00
Andrea Adami e6f64ce21d ubi-utils-klibc_1.5.0: remove recipe and patches
Next patch replaces with v. 1.5.1 and new/rebased patchset

Signed-off-by: Andrea Adami <andrea.adami@gmail.com>
2014-11-17 10:00:45 +00:00
Andrea Adami 65007b398c klibc: define KLIBCLIBGCC
Fix build of klibc extending the EXTRA_OEMAKE.

|   LIST    usr/klibc/klib.list
|   KLIBCAR usr/klibc/libc.a
|   KLIBCLD usr/klibc/libc.so
| arm-oe-linux-gnueabi-ld: cannot find libgcc.a: No such file or directory
| make[2]: *** [usr/klibc/libc.so] Error 1
| make[2]: *** Waiting for unfinished jobs....
| make[1]: *** [all] Error 2
| make: *** [klibc] Error 2
| ERROR: oe_runmake failed

Signed-off-by: Andrea Adami <andrea.adami@gmail.com>
2014-11-17 10:00:45 +00:00
Roy Li c78eca1ea7 postfix: create or update aliases.db when using systemd
aliases.db should be created by postinstall script, but failed since
queue_directory is not includes root dir ${D}:
    ------
    |newaliases: fatal: chdir /var/spool/postfix: No such file or directory
    ------
initscript will recall newaliases before start postfix daemon, the similar
method, which run aliasesdb to create aliases.db when using systemd, is
introduced to fix this issue.

Signed-off-by: Roy.Li <rongqing.li@windriver.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-10 15:18:55 -05:00
Hongxu Jia 4b6970c24c ssmping: add do_install to ssmping
The previous do_install is empty and do nothing.

Tweak install doc dir, so the man doc could be installed to /usr/share/man
rather than /usr/locale/man.

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-10 15:12:05 -05:00
Hongxu Jia c5398fc0fe pimd: add do_install to pimd
The previous do_install is empty and do nothing.

Unset variables datadir and mandir, use pimd's default set.
So it could install doc files correctly.

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-10 15:11:34 -05:00
Jackie Huang 671cbca4e7 traceroute: add VPATH to find libraries and avoid host contamination
Fixed:
make[1]: *** No rule to make target '-lm', needed by 'traceroute'.  Stop.

Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-10 15:07:02 -05:00
Chen Qi dac2422f73 krb5: add initscripts-functions to RDEPENDS
As this recipe doesn't inherit update-rc.d, we need to add to its
runtime dependency initscripts-functions ourselves. Otherwise, we
would spot errors in systemd systems when we execute commands like
`systemctl start krb5-kdc'.

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:06:22 +01:00
Kang Kai 47cc7a8d16 libyaml: add fix for CVE-2014-2525 Security Advisory
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function
in LibYAML before 0.1.6 allows context-dependent attackers to execute
arbitrary code via a long sequence of percent-encoded characters in a
URI in a YAML file.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2525

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:46 +01:00
Kang Kai ffb649d043 postgresql: add fix for CVE-2014-0065 and CVE-2014-0066 Security Advisory
Coverity identified a number of places in which it couldn't prove that a
string being copied into a fixed-size buffer would fit.  We believe that
most, perhaps all of these are in fact safe, or are copying data that is
coming from a trusted source so that any overrun is not really a
security issue.  Nonetheless it seems prudent to forestall any risk by
using strlcpy() and similar functions.

Fixes by Peter Eisentraut and Jozef Mlich based on Coverity reports.

In addition, fix a potential null-pointer-dereference crash in
contrib/chkpass.  The crypt(3) function is defined to return NULL on
failure, but chkpass.c didn't check for that before using the result.
The main practical case in which this could be an issue is if libc is
configured to refuse to execute unapproved hashing algorithms (e.g.,
"FIPS mode").  This ideally should've been a separate commit, but since
it touches code adjacent to one of the buffer overrun changes, I
included it in this commit to avoid last-minute merge issues.  This
issue was reported by Honza Horak.

Security: CVE-2014-0065 for buffer overruns, CVE-2014-0066 for crypt()

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0065
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0066

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:45 +01:00
Kang Kai 59e4579554 postgresql: add fix for CVE-2014-0067 Security Advisory
The make check command for the test suites in PostgreSQL 9.3.3 and
earlier does not properly invoke initdb to specify the authentication
requirements for a database cluster to be used for the tests, which
allows local users to gain privileges by leveraging access to this
cluster.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0067

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:45 +01:00
Kang Kai f1978efac9 postgresql: add fix for CVE-2014-0063 Security Advisory
Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x
before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before
9.3.3 allow remote authenticated users to cause a denial of service
(crash) or possibly execute arbitrary code via vectors related to an
incorrect MAXDATELEN constant and datetime values involving (1)
intervals, (2) timestamps, or (3) timezones, a different vulnerability
than CVE-2014-0065.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0063

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:45 +01:00
Kang Kai bd9378688e postgresql: add fix for CVE-2014-0062 Security Advisory
Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE
commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before
9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote
authenticated users to create an unauthorized index or read portions of
unauthorized tables by creating or deleting a table with the same name
during the timing window.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0062

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:45 +01:00
Kang Kai 30f8a0515a postgresql: add fix for CVE-2014-0061 Security Advisory
The validator functions for the procedural languages (PLs) in PostgreSQL
before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before
9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain
privileges via a function that is (1) defined in another language or (2)
not allowed to be directly called by the user due to permissions.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0061

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:45 +01:00
Kang Kai b89271147d postgresql: add fix for CVE-2014-0060 Security Advisory
PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12,
9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the
ADMIN OPTION restriction, which allows remote authenticated members of a
role to add or remove arbitrary users to that role by calling the SET
ROLE command before the associated GRANT command.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0060

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:45 +01:00
Kang Kai cd4cd79199 postgresql: add fix for CVE-2014-0064 Security Advisory
Multiple integer overflows in the path_in and other unspecified
functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before
9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote
authenticated users to have unspecified impact and attack vectors, which
trigger a buffer overflow. NOTE: this identifier has been SPLIT due to
different affected versions; use CVE-2014-2669 for the hstore vector.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0064

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:45 +01:00
Chen Qi 3692902448 mariadb: use ${PN} for SYSTEMD_AUTO_ENABLE
Use ${PN} instead of hardcoding 'mariadb' so that everything works
fine in case of multilib.

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:08 +01:00
Anders Darander e89f58a72d breakpad: correct the file suffix of the symbol file
minidump_stackwalk looks for a .sym file extension. Correct the extension used for the generated file.

Signed-off-by: Anders Darander <anders@chargestorm.se>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:06 +01:00
Yue Tao f2fdce3ec9 fftw: s/PN/BPN/
Replace the PN with BPN to fix the multilib build.

The error is:
/ala-lpggp21/bpiolin/intel-x86-64-gplv2-4/bitbake_build/tmp/pkgdata/*/runtime-reverse/lib32-libfftw:
No such file or directory

Because the PN causes the package is named as lib32-liblib32-fftw.

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:05 +01:00
Chen Qi aec24e33e0 mariadb: change socket location in my.cnf
Change socket location to /var/lib/mysql/mysql.sock. Otherwise, we
could spot errors in systemd systems like below.

mysqladmin: connect to server at 'localhost' failed
error: 'Can't connect to local MySQL server through socket '/tmp/mysql.sock' (2)'
Check that mysqld is running and that the socket: '/tmp/mysql.sock' exists!

This is because mysqld.service is using PrivateTmp=true.

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:05 +01:00
Jackie Huang 67d5c9e377 samba: make build deterministic by adding PACKAGECONFIG for valgrind
* No configure option for valgrind, use the ac_cv_header_*
* The PACKAGECONFIG for valgrind is disabled by default

Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2014-11-07 15:05:05 +01:00
Jackie Huang 34ca3aeef1 vpnc: use nativeperl to run perl scripts
inhert perlnative and make sure we use nativeperl
to run perl scripts when compile.

fixed:
| ./makeman.pl
| Can't locate Fatal.pm in @INC

Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-04 16:02:44 -05:00
Chong Lu 22119569b9 squid: change ksh reference in krb ldap helper to sh
This solves the following warning:

squid-3.4.7: squid requires /bin/bash, /usr/bin/perl, but no providers in its
RDEPENDS [file-rdeps]

Signed-off-by: Chong Lu <Chong.Lu@windriver.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-04 16:02:44 -05:00
Chong Lu c1958c2171 polarssl: set LIB_INSTALL_DIR to baselib
This solves the following warning:

polarssl-1.3.8: polarssl: Files/directories were installed but not shipped
  /usr/lib
  /usr/lib/libpolarssl.so.1.3.8
  /usr/lib/libpolarssl.so.7
  /usr/lib/libpolarssl.so
  /usr/lib/libpolarssl.a
  /usr/lib/.debug
  /usr/lib/.debug/libpolarssl.so.1.3.8 [installed-vs-shipped]
polarssl-1.3.8: polarssl requires libpolarssl.so.7()(64bit), but no providers
in its RDEPENDS [file-rdeps]

Signed-off-by: Chong Lu <Chong.Lu@windriver.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-04 16:02:44 -05:00
Roy Li 4bb8bb5e47 net-snmp: fix for Security Advisory - CVE-2014-3565
snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used,
allows remote attackers to cause a denial of service (snmptrapd crash) via
a crafted SNMP trap message, which triggers a conversion to the variable
type designated in the MIB file, as demonstrated by a NULL type in an ifMtu
trap message.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3565

Signed-off-by: Roy Li <rongqing.li@windriver.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-04 16:01:01 -05:00
Chen Qi e3a1a2d839 ntp: make daemon run under ntp:ntp
Fix the service so that the ntpd daemon is run under ntp:ntp.

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Acked-by: Peter A. Bigot <pab@pabigot.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-04 14:56:44 -05:00
Chong Lu 0ea47488bb ntp: add sntp.service for sntp package
This solves the following warning:

lib32-ntp-4.2.6p5: lib32-ntp: Files/directories were installed but not shipped
  /lib/systemd/system/sntp.service [installed-vs-shipped]

Signed-off-by: Chong Lu <Chong.Lu@windriver.com>
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2014-11-04 14:56:08 -05:00
Chong.Lu@windriver.com 2f99ea7223 webmin: remove init script for gentoo
The configure.initd.gentoo script is used for gentoo, it is invalid for oe. So
remove it to solve the following warning:

webmin-1.700: webmin-module-ajaxterm requires /sbin/runscript, but no providers
in its RDEPENDS [file-rdeps]

Signed-off-by: Chong Lu <Chong.Lu@windriver.com>
2014-10-31 11:35:26 +00:00
Roy Li 6b530d936f phpmyadmin: fix for Security Advisory CVE-2014-7217
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before
4.0.10.4, 4.1.x before 4.1.14.5, and 4.2.x before 4.2.9.1 allow remote
authenticated users to inject arbitrary web script or HTML via a crafted ENUM
value that is improperly handled during rendering of the (1) table search or (2)
table structure page, related to
libraries/TableSearch.class.php and libraries/Util.class.php.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7217

Signed-off-by: Roy Li <rongqing.li@windriver.com>
2014-10-31 11:35:25 +00:00
Roy Li 7edda3d926 phpmyadmin: fix for Security Advisory CVE-2014-5274
Cross-site scripting (XSS) vulnerability in the view operations page in
phpMyAdmin 4.1.x before 4.1.14.3 and 4.2.x before 4.2.7.1 allows remote
authenticated users to inject arbitrary web script or HTML via a crafted
view name, related to js/functions.js.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5274

Signed-off-by: Roy Li <rongqing.li@windriver.com>
2014-10-31 11:35:25 +00:00