<feed xmlns='http://www.w3.org/2005/Atom'>
<title>staging/dangole/tools/patch, branch main</title>
<subtitle>Staging tree of Daniel Golle</subtitle>
<id>https://git-03.infra.openwrt.org/openwrt/staging/dangole/atom?h=main</id>
<link rel='self' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/atom?h=main'/>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/'/>
<updated>2024-05-23T09:49:03Z</updated>
<entry>
<title>tools: refresh all patches</title>
<updated>2024-05-23T09:49:03Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2024-05-18T19:14:20Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/commit/?id=337b0c80cbbb2c76e80f9f970b03decedcd4c827'/>
<id>urn:sha1:337b0c80cbbb2c76e80f9f970b03decedcd4c827</id>
<content type='text'>
Refresh all tools patches now that tools/refresh correctly works.

CI now checks for them and actively complain if tools have unrefreshed
patches.

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
[ reword commit message ]
Link: https://github.com/openwrt/openwrt/pull/15524
Signed-off-by: Christian Marangi &lt;ansuelsmth@gmail.com&gt;
</content>
</entry>
<entry>
<title>tools: prefer gz or bz2 tarballs</title>
<updated>2024-04-06T09:24:18Z</updated>
<author>
<name>Robert Marko</name>
</author>
<published>2024-04-03T17:12:57Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/commit/?id=bab3ae2ee7656600a185f4cef11cef94389023af'/>
<id>urn:sha1:bab3ae2ee7656600a185f4cef11cef94389023af</id>
<content type='text'>
In the light of recent XZ events, and fundamental XZ issues lets work on
moving away from using XZ.

So, use gz compressed tarballs as sources whenever possible.

dwarves only offers bz2 compressed tarballs, so use those as size
difference is minor compared to XZ.

Signed-off-by: Robert Marko &lt;robimarko@gmail.com&gt;

dwarves
</content>
</entry>
<entry>
<title>tools/patch: apply patch for EACCES on xattr copy</title>
<updated>2022-11-20T17:44:43Z</updated>
<author>
<name>Thomas Weißschuh</name>
</author>
<published>2022-11-09T04:17:00Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/commit/?id=0d375de10dac3160c65c264bb91a5137ef4c0817'/>
<id>urn:sha1:0d375de10dac3160c65c264bb91a5137ef4c0817</id>
<content type='text'>
When compiling OpenWRT on a compressed btrfs volume the build fails in
libtool.
The file `libltdl/config/ltmain.m4sh` from `libtool-2.4.2.tar.xz` is
missing write permissions, therefore patch falls back to copying the
file and patching that. During this patch tries to preserve all file
attribute on the new copy.
However the attribute `btrfs.compression` is privileged and btrfs return
EACCES.
While patch ignores multiple other error codes during the copy of xattr
copy it is not prepared for EACCES and aborts.

EACCES should be ignored the same way as the other errors.

Build log:
```
...
Applying ./patches/000-relocatable.patch using plaintext:
patching file libltdl/config/general.m4sh
patching file libtoolize.in
patching file libtoolize.m4sh
patching file libltdl/m4/libtool.m4

Applying ./patches/100-libdir-fixes.patch using plaintext:
patching file libltdl/config/ltmain.m4sh
File libltdl/config/ltmain.sh is read-only; trying to patch anyway
patching file libltdl/config/ltmain.sh
patch: setting attribute btrfs.compression for btrfs.compression: Permission denied
Patch failed!  Please fix ./patches/100-libdir-fixes.patch!
```

Link: https://lists.gnu.org/archive/html/bug-patch/2022-11/msg00000.html
Signed-off-by: Thomas Weißschuh &lt;thomas@t-8ch.de&gt;
</content>
</entry>
<entry>
<title>tools: add Host/Uninstall where possible</title>
<updated>2022-10-19T22:33:22Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2022-09-28T08:23:56Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/commit/?id=a63805b25f99e609d575ee920baae269fb58794c'/>
<id>urn:sha1:a63805b25f99e609d575ee920baae269fb58794c</id>
<content type='text'>
This cleans staging_dir when calling tool/x/clean.

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
</content>
</entry>
<entry>
<title>tools/patch: apply upstream patch for cve-2019-13638</title>
<updated>2019-08-13T08:00:10Z</updated>
<author>
<name>Russell Senior</name>
</author>
<published>2019-08-11T20:57:08Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/commit/?id=bcfd1d76852974170780dbe368e6194dbb0e123e'/>
<id>urn:sha1:bcfd1d76852974170780dbe368e6194dbb0e123e</id>
<content type='text'>
GNU patch through 2.7.6 is vulnerable to OS shell command injection that
can be exploited by opening a crafted patch file that contains an ed style

diff payload with shell metacharacters. The ed editor does not need to be
present on the vulnerable system. This is different from CVE-2018-1000156.

https://nvd.nist.gov/vuln/detail/CVE-2019-13638

Signed-off-by: Russell Senior &lt;russell@personaltelco.net&gt;
</content>
</entry>
<entry>
<title>tools/patch: apply upstream patch for CVE-2019-13636</title>
<updated>2019-07-30T08:16:16Z</updated>
<author>
<name>Russell Senior</name>
</author>
<published>2019-07-29T19:09:09Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/commit/?id=995bcc532943639f3df36dbcaa361f9167f9f4d5'/>
<id>urn:sha1:995bcc532943639f3df36dbcaa361f9167f9f4d5</id>
<content type='text'>
In GNU patch through 2.7.6, the following of symlinks is mishandled in
certain cases other than input files. This affects inp.c and util.c.

https://nvd.nist.gov/vuln/detail/CVE-2019-13636

Signed-off-by: Russell Senior &lt;russell@personaltelco.net&gt;
</content>
</entry>
<entry>
<title>tools/patch: Add fedora patch for crashing git style patches</title>
<updated>2018-11-01T16:16:52Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2018-10-31T23:55:14Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/commit/?id=32fc41baabc9e83a045a7a805b0d91a030cfbd3c'/>
<id>urn:sha1:32fc41baabc9e83a045a7a805b0d91a030cfbd3c</id>
<content type='text'>
https://lists.gnu.org/archive/html/bug-patch/2018-10/msg00000.html

I assume a CVE number will be assigned soon.

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
</content>
</entry>
<entry>
<title>tools: patch: Add missing CVE-2018-6951 fix</title>
<updated>2018-10-16T10:51:10Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2018-10-15T17:17:29Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/commit/?id=a6bd9d0cb652686453604b762e80a35d023908c4'/>
<id>urn:sha1:a6bd9d0cb652686453604b762e80a35d023908c4</id>
<content type='text'>
uscan reports a new CVE now that PKG_CPE_ID was added.

Reordered patches by date.

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
[re-title commit &amp; refresh patches]
Signed-off-by: Kevin Darbyshire-Bryant &lt;ldir@darbyshire-bryant.me.uk&gt;
</content>
</entry>
<entry>
<title>tools: patch: Fix build by not modifing Makefile.am</title>
<updated>2018-10-14T14:47:15Z</updated>
<author>
<name>Hauke Mehrtens</name>
</author>
<published>2018-10-14T14:42:45Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/commit/?id=759f111f8d7f2d9f5f12713fc6f48ce6422997ec'/>
<id>urn:sha1:759f111f8d7f2d9f5f12713fc6f48ce6422997ec</id>
<content type='text'>
A new test case was adding in one of the patches fixing a problem, this
also included a change in the test/Makefile.am to add this test case.
The build system detected a change in the Makefile.am and wants to
regenerate the Makefile.in, but this fails because automake-1.15 is not
installed yet. As automake depends on patch being build first, make sure
we do not modify the Makefile.am.

This fixes build problem seen by the build bots.

Fixes: 4797dddfde6 ("patch: apply upstream cve fixes")
Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</content>
</entry>
<entry>
<title>patch: apply upstream cve fixes</title>
<updated>2018-10-14T12:36:09Z</updated>
<author>
<name>Russell Senior</name>
</author>
<published>2018-10-14T09:34:32Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dangole/commit/?id=4797dddfde6a8ffdbdcb4e5b5e137b0a00313f62'/>
<id>urn:sha1:4797dddfde6a8ffdbdcb4e5b5e137b0a00313f62</id>
<content type='text'>
Apply two upstream patches to address two CVEs:

 * CVE-2018-1000156
 * CVE-2018-6952

Add PKG_CPE_ID to Makefile.

Build tested on apm821xx and ar71xx.

Signed-off-by: Russell Senior &lt;russell@personaltelco.net&gt;
</content>
</entry>
</feed>
