Released version 1.5.8 with the following main changes :
- BUG/MAJOR: buffer: check the space left is enough or not
when input data in a buffer is wrapped
- BUG/BUILD: revert accidental change in the
makefile from latest SSL fix
Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
This release includes security fixes for the following vulnerabilities:
* CVE-2014-8080: Denial of Service XML Expansion
* Changed default settings of ext/openssl related to CVE-2014-3566
And there are some bug-fixes.
Ref: https://www.ruby-lang.org/en/news/2014/10/27/ruby-2-1-4-released/
Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
Note that hash files are currently not supported by OpenWRT package of Berkeley DB.
CDB is still default.
Signed-off-by: Denis Shulyaka <Shulyaka@gmail.com>
When OVS detects a kernel version >= 3.12 it does not build
it's own vxlan module and tries to use the kernel's, when building
the OVS kernel module.
I also pushed a patch to the OpenWRT trunk to add a +kmod-vxlan package.
This will add the kernel's vxlan.ko kernel module if it exists.
So, for kernel >= 3.12, this package should exist and be installed
when installing OVS.
Tested on OpenWRT trunk with kernel 3.14.18.
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
Number of suggested rewrites:
* use lua ubus bindings instead of os.execute
* combine multiple actions to use same handler 'lxc_action' and pass
actions as arguments to consolidate code
* read openwrt version from lua directly
* start using String.prototype.format for string formatting
Also, drop 'rename' and 'clone' until they are fully functional on all
platforms.
Thanks Jo-Philipp for suggestions on how to improve the code.
Signed-off-by: Petar Koretic <petar.koretic@sartura.hr>
Seems that while fixing the build for GCC 4.9
I broke the build for GCC 4.8, because that KCFLAG I added
causes a build error (since it's not recognized).
The fix is to add KCFLAG only when GCC 4.9 is used.
OpenVSwitch now builds successfully with GCC 4.8 and 4.9.
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
The update fixes CVE-2014-4877 which allows malicious FTP servers
to modify local filesystem contents through specificially crafted
symlinks.
Please backport to for-14.07 too.
Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>