<feed xmlns='http://www.w3.org/2005/Atom'>
<title>staging/dedeckeh/tools/patch, branch master</title>
<subtitle>Staging tree of dedeckeh</subtitle>
<id>https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/atom?h=master</id>
<link rel='self' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/'/>
<updated>2022-11-20T17:44:43Z</updated>
<entry>
<title>tools/patch: apply patch for EACCES on xattr copy</title>
<updated>2022-11-20T17:44:43Z</updated>
<author>
<name>Thomas Weißschuh</name>
</author>
<published>2022-11-09T04:17:00Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/commit/?id=0d375de10dac3160c65c264bb91a5137ef4c0817'/>
<id>urn:sha1:0d375de10dac3160c65c264bb91a5137ef4c0817</id>
<content type='text'>
When compiling OpenWRT on a compressed btrfs volume the build fails in
libtool.
The file `libltdl/config/ltmain.m4sh` from `libtool-2.4.2.tar.xz` is
missing write permissions, therefore patch falls back to copying the
file and patching that. During this patch tries to preserve all file
attribute on the new copy.
However the attribute `btrfs.compression` is privileged and btrfs return
EACCES.
While patch ignores multiple other error codes during the copy of xattr
copy it is not prepared for EACCES and aborts.

EACCES should be ignored the same way as the other errors.

Build log:
```
...
Applying ./patches/000-relocatable.patch using plaintext:
patching file libltdl/config/general.m4sh
patching file libtoolize.in
patching file libtoolize.m4sh
patching file libltdl/m4/libtool.m4

Applying ./patches/100-libdir-fixes.patch using plaintext:
patching file libltdl/config/ltmain.m4sh
File libltdl/config/ltmain.sh is read-only; trying to patch anyway
patching file libltdl/config/ltmain.sh
patch: setting attribute btrfs.compression for btrfs.compression: Permission denied
Patch failed!  Please fix ./patches/100-libdir-fixes.patch!
```

Link: https://lists.gnu.org/archive/html/bug-patch/2022-11/msg00000.html
Signed-off-by: Thomas Weißschuh &lt;thomas@t-8ch.de&gt;
</content>
</entry>
<entry>
<title>tools: add Host/Uninstall where possible</title>
<updated>2022-10-19T22:33:22Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2022-09-28T08:23:56Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/commit/?id=a63805b25f99e609d575ee920baae269fb58794c'/>
<id>urn:sha1:a63805b25f99e609d575ee920baae269fb58794c</id>
<content type='text'>
This cleans staging_dir when calling tool/x/clean.

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
</content>
</entry>
<entry>
<title>tools/patch: apply upstream patch for cve-2019-13638</title>
<updated>2019-08-13T08:00:10Z</updated>
<author>
<name>Russell Senior</name>
</author>
<published>2019-08-11T20:57:08Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/commit/?id=bcfd1d76852974170780dbe368e6194dbb0e123e'/>
<id>urn:sha1:bcfd1d76852974170780dbe368e6194dbb0e123e</id>
<content type='text'>
GNU patch through 2.7.6 is vulnerable to OS shell command injection that
can be exploited by opening a crafted patch file that contains an ed style

diff payload with shell metacharacters. The ed editor does not need to be
present on the vulnerable system. This is different from CVE-2018-1000156.

https://nvd.nist.gov/vuln/detail/CVE-2019-13638

Signed-off-by: Russell Senior &lt;russell@personaltelco.net&gt;
</content>
</entry>
<entry>
<title>tools/patch: apply upstream patch for CVE-2019-13636</title>
<updated>2019-07-30T08:16:16Z</updated>
<author>
<name>Russell Senior</name>
</author>
<published>2019-07-29T19:09:09Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/commit/?id=995bcc532943639f3df36dbcaa361f9167f9f4d5'/>
<id>urn:sha1:995bcc532943639f3df36dbcaa361f9167f9f4d5</id>
<content type='text'>
In GNU patch through 2.7.6, the following of symlinks is mishandled in
certain cases other than input files. This affects inp.c and util.c.

https://nvd.nist.gov/vuln/detail/CVE-2019-13636

Signed-off-by: Russell Senior &lt;russell@personaltelco.net&gt;
</content>
</entry>
<entry>
<title>tools/patch: Add fedora patch for crashing git style patches</title>
<updated>2018-11-01T16:16:52Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2018-10-31T23:55:14Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/commit/?id=32fc41baabc9e83a045a7a805b0d91a030cfbd3c'/>
<id>urn:sha1:32fc41baabc9e83a045a7a805b0d91a030cfbd3c</id>
<content type='text'>
https://lists.gnu.org/archive/html/bug-patch/2018-10/msg00000.html

I assume a CVE number will be assigned soon.

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
</content>
</entry>
<entry>
<title>tools: patch: Add missing CVE-2018-6951 fix</title>
<updated>2018-10-16T10:51:10Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2018-10-15T17:17:29Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/commit/?id=a6bd9d0cb652686453604b762e80a35d023908c4'/>
<id>urn:sha1:a6bd9d0cb652686453604b762e80a35d023908c4</id>
<content type='text'>
uscan reports a new CVE now that PKG_CPE_ID was added.

Reordered patches by date.

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
[re-title commit &amp; refresh patches]
Signed-off-by: Kevin Darbyshire-Bryant &lt;ldir@darbyshire-bryant.me.uk&gt;
</content>
</entry>
<entry>
<title>tools: patch: Fix build by not modifing Makefile.am</title>
<updated>2018-10-14T14:47:15Z</updated>
<author>
<name>Hauke Mehrtens</name>
</author>
<published>2018-10-14T14:42:45Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/commit/?id=759f111f8d7f2d9f5f12713fc6f48ce6422997ec'/>
<id>urn:sha1:759f111f8d7f2d9f5f12713fc6f48ce6422997ec</id>
<content type='text'>
A new test case was adding in one of the patches fixing a problem, this
also included a change in the test/Makefile.am to add this test case.
The build system detected a change in the Makefile.am and wants to
regenerate the Makefile.in, but this fails because automake-1.15 is not
installed yet. As automake depends on patch being build first, make sure
we do not modify the Makefile.am.

This fixes build problem seen by the build bots.

Fixes: 4797dddfde6 ("patch: apply upstream cve fixes")
Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</content>
</entry>
<entry>
<title>patch: apply upstream cve fixes</title>
<updated>2018-10-14T12:36:09Z</updated>
<author>
<name>Russell Senior</name>
</author>
<published>2018-10-14T09:34:32Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/commit/?id=4797dddfde6a8ffdbdcb4e5b5e137b0a00313f62'/>
<id>urn:sha1:4797dddfde6a8ffdbdcb4e5b5e137b0a00313f62</id>
<content type='text'>
Apply two upstream patches to address two CVEs:

 * CVE-2018-1000156
 * CVE-2018-6952

Add PKG_CPE_ID to Makefile.

Build tested on apm821xx and ar71xx.

Signed-off-by: Russell Senior &lt;russell@personaltelco.net&gt;
</content>
</entry>
<entry>
<title>tools: update patch to v2.7.6</title>
<updated>2018-02-12T08:27:56Z</updated>
<author>
<name>Russell Senior</name>
</author>
<published>2018-02-12T07:40:59Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/commit/?id=89a0fed2a2d2fc8b5e8eef4247f572ed9b53e72b'/>
<id>urn:sha1:89a0fed2a2d2fc8b5e8eef4247f572ed9b53e72b</id>
<content type='text'>
Removes a redundant patch with a fix already upstream.  Build tested on
apm821xx (PPC).

Signed-off-by: Russell Senior &lt;russell@personaltelco.net&gt;
</content>
</entry>
<entry>
<title>tools: patch various gnu tools for macOS 10.13</title>
<updated>2017-08-23T16:56:33Z</updated>
<author>
<name>Ryan Mounce</name>
</author>
<published>2017-08-03T11:07:58Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/openwrt/staging/dedeckeh/commit/?id=25c045763a08a579feb6e42f9361edd1ca6333ae'/>
<id>urn:sha1:25c045763a08a579feb6e42f9361edd1ca6333ae</id>
<content type='text'>
These host tools compile but may crash at runtime when building on
macOS 10.13 (High Sierra). Backport upstream gnulib patch until new
releases of affected tools.

https://lists.gnu.org/archive/html/bug-gnulib/2017-07/msg00056.html
https://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=c41f233c4c38e84023a16339782ee306f03e7f59

Signed-off-by: Ryan Mounce &lt;ryan@mounce.com.au&gt;
</content>
</entry>
</feed>
