- Switch download to the Github clone of crtmpserver
- Rebase patches against latest version
- Pregenerate version.h file
- Disable applestreamingclient as it is broken
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
When building libsoup within the SDK, the following usually nonfatal warning
is causing the build to fail:
make[6]: Entering directory '.../build_dir/target-arm_xscale_musl-1.1.14_eabi/libsoup-2.53.2/libsoup'
CC libsoup_2_4_la-soup-address.lo
cc1: error: .../staging_dir/target-arm_xscale_musl-1.1.14_eabi/include: No such file or directory [-Werror=missing-include-dirs]
cc1: some warnings being treated as errors
Makefile:962: recipe for target 'libsoup_2_4_la-soup-address.lo' failed
Use the upstream `--disable-more-warnings` configure switch to disable this
class of `-Werror` flags.
Also drop the shipped copy of `intltool.m4` to force using the system wide one
which does not require the `XML::Parser` module to be installed (see #2771).
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
When libftdi1 is detecting the presence of the Boost unit testing framework,
it will conditionally enable the build of libftdi1 test binaries which fail to
link on some targets with the following error:
CMakeFiles/test_libftdi1.dir/basic.cpp.o: In function `main':
basic.cpp:(.text.startup+0xc): undefined reference to `boost::unit_test::unit_test_main(bool (*)(), int, char**)'
collect2: error: ld returned 1 exit status
test/CMakeFiles/test_libftdi1.dir/build.make:123: recipe for target 'test/test_libftdi1' failed
make[6]: *** [test/test_libftdi1] Error 1
Since we do not care about test cases and since we want to avoid unpredictable
conditional compilation simply disable the testcases entirely.
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
Correct spelling in a patch back to the faulty original,
as the patch wes broken by #2594
This commit fixes#2719
Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
This fixes the following CVEs:
- in BCMath: CVE-2016-4537, CVE-2016-4538
- in EXIF: CVE-2016-4542, CVE-2016-4543, CVE-2016-4544
- in GD: CVE-2016-3074
- in Intl: CVE-2016-4540, CVE-2016-4541
- in XML: CVE-2016-4539
Signed-off-by: Michael Heimpold <mhei@heimpold.de>