<feed xmlns='http://www.w3.org/2005/Atom'>
<title>staging/robimarko/tools/e2fsprogs, branch master</title>
<subtitle>Staging tree of Robert Marko</subtitle>
<id>https://git.openwrt.org/openwrt/staging/robimarko/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/openwrt/staging/robimarko/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/robimarko/'/>
<updated>2023-02-12T15:45:29Z</updated>
<entry>
<title>tools/e2fsprogs: update to 1.47.0</title>
<updated>2023-02-12T15:45:29Z</updated>
<author>
<name>Nick Hainke</name>
</author>
<published>2023-02-11T14:22:41Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/robimarko/commit/?id=11591752ac54436ca083647c4989eb82a886ba7d'/>
<id>urn:sha1:11591752ac54436ca083647c4989eb82a886ba7d</id>
<content type='text'>
Release notes:
https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.0

Signed-off-by: Nick Hainke &lt;vincent@systemli.org&gt;
</content>
</entry>
<entry>
<title>tools/e2fsprogs: update to 1.46.6</title>
<updated>2023-02-07T23:12:23Z</updated>
<author>
<name>Nick Hainke</name>
</author>
<published>2023-02-05T20:14:19Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/robimarko/commit/?id=38350650cbc43c0386977c9ca532b71ece15c80b'/>
<id>urn:sha1:38350650cbc43c0386977c9ca532b71ece15c80b</id>
<content type='text'>
Release information:
https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.46.6

Remove upstreamed patch:
- 004-CVE-2022-1304-libext2fs-add-sanity-check-to-extent-manipulation.patch

Refresh patch:
- 003-no-crond.patch

Signed-off-by: Nick Hainke &lt;vincent@systemli.org&gt;
</content>
</entry>
<entry>
<title>e2fsprogs: Fix CVE-2022-1304</title>
<updated>2022-12-06T22:09:00Z</updated>
<author>
<name>Hauke Mehrtens</name>
</author>
<published>2022-12-05T23:17:35Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/robimarko/commit/?id=60e335b76ea0aeedd9f8e01d247f9aaa617076da'/>
<id>urn:sha1:60e335b76ea0aeedd9f8e01d247f9aaa617076da</id>
<content type='text'>
This fixes CVE-2022-1304:
An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5.
This issue leads to a segmentation fault and possibly arbitrary code
execution via a specially crafted filesystem.

Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</content>
</entry>
<entry>
<title>tools: e2fsprogs: Update to version 1.46.5</title>
<updated>2022-08-13T12:05:29Z</updated>
<author>
<name>Hauke Mehrtens</name>
</author>
<published>2022-08-07T17:56:41Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/robimarko/commit/?id=d73e11b9c86e97beb149e82abe08cfb7ff748505'/>
<id>urn:sha1:d73e11b9c86e97beb149e82abe08cfb7ff748505</id>
<content type='text'>
Update to most recent version of e2fsprogs and sync with version from
package folder.

Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</content>
</entry>
<entry>
<title>tools/e2fsprogs: update to 1.46.4</title>
<updated>2021-09-20T13:21:17Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2021-09-18T08:09:29Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/robimarko/commit/?id=8c863f604d68da05abbdc7edfdb805db79ed5ded'/>
<id>urn:sha1:8c863f604d68da05abbdc7edfdb805db79ed5ded</id>
<content type='text'>
Refresh patches.

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
</content>
</entry>
<entry>
<title>tools/e2fsprogs: update to 1.46.2</title>
<updated>2021-06-21T04:10:15Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2021-06-19T22:11:23Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/robimarko/commit/?id=b154a2f8d37097e51099ed816a0f8142120405e6'/>
<id>urn:sha1:b154a2f8d37097e51099ed816a0f8142120405e6</id>
<content type='text'>
Fix wrong FPIC flag to fix compilation under sparc64

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
</content>
</entry>
<entry>
<title>tools/e2fsprogs: fix build under macos</title>
<updated>2020-04-10T10:52:00Z</updated>
<author>
<name>Kevin Darbyshire-Bryant</name>
</author>
<published>2020-04-10T10:37:26Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/robimarko/commit/?id=1e3d3d2bd5da9d0c4069a4049358fa983dffa8bd'/>
<id>urn:sha1:1e3d3d2bd5da9d0c4069a4049358fa983dffa8bd</id>
<content type='text'>
macos doesn't define a loff_t type, the native off_t type being 64bit
anyway.

Persuade e2fsprogs to accept off_t instead on macos

Signed-off-by: Kevin Darbyshire-Bryant &lt;ldir@darbyshire-bryant.me.uk&gt;
</content>
</entry>
<entry>
<title>tools/e2fsprogs: Update to 1.45.6</title>
<updated>2020-04-09T20:08:29Z</updated>
<author>
<name>Daniel Engberg</name>
</author>
<published>2020-04-05T19:53:47Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/robimarko/commit/?id=c9daacbf183ad6e0a77390dfdbebf3ccbfa123e4'/>
<id>urn:sha1:c9daacbf183ad6e0a77390dfdbebf3ccbfa123e4</id>
<content type='text'>
Update e2fsprogs to 1.45.6

Signed-off-by: Daniel Engberg &lt;daniel.engberg.lists@pyret.net&gt;
</content>
</entry>
<entry>
<title>tools/e2fsprogs: Update to 1.45.5</title>
<updated>2020-02-18T20:48:49Z</updated>
<author>
<name>Daniel Engberg</name>
</author>
<published>2020-02-03T13:21:56Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/robimarko/commit/?id=cf443e84f59284c872eeb3a993c9c085cc36eb88'/>
<id>urn:sha1:cf443e84f59284c872eeb3a993c9c085cc36eb88</id>
<content type='text'>
Update e2fsprogs to 1.45.5
Enable pthreads support

Signed-off-by: Daniel Engberg &lt;daniel.engberg.lists@pyret.net&gt;
</content>
</entry>
<entry>
<title>tools/e2fsprogs: Update to version 1.45.4</title>
<updated>2019-10-08T19:51:08Z</updated>
<author>
<name>Josef Schlehofer</name>
</author>
<published>2019-10-03T19:23:00Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/robimarko/commit/?id=700e7a2eb9c515ffe4f3278857e538ea37cc5e56'/>
<id>urn:sha1:700e7a2eb9c515ffe4f3278857e538ea37cc5e56</id>
<content type='text'>
Fixes CVE-2019-5094

Signed-off-by: Josef Schlehofer &lt;pepe.schlehofer@gmail.com&gt;
</content>
</entry>
</feed>
