Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Jitsi meet #20659

Closed
wants to merge 1,292 commits into from
Closed

Jitsi meet #20659

wants to merge 1,292 commits into from

Conversation

oida
Copy link
Contributor

@oida oida commented Nov 23, 2016

Motivation for this change

Added pkgs and modules for jitsi-meet, Jitsi Videobridge and Jitsi Conference Focus.

Things done
  • Tested using sandboxing
    (nix.useSandbox on NixOS,
    or option build-use-sandbox in nix.conf
    on non-NixOS)
  • Built on platform(s)
    • NixOS
    • macOS
    • Linux
  • Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
  • Tested execution of all binary files (usually in ./result/bin/)
  • Fits CONTRIBUTING.md.

fpletz and others added 30 commits September 4, 2016 21:44
kexec was broken before due to pic hardening.
Enables previously manually disabled stackprotector and stackguard
randomization.

From https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511811:

    If glibc is built with the --enable-stackguard-randomization option,
    each application gets a random canary value (at runtime) from /dev/urandom.
    If --enable-stackguard-randomization is absent, applications get a static
    canary value of "0xff0a0000". This is very unfortunate, because the
    attacker may be able to bypass the stack protection mechanism, by placing
    those 4 bytes in the canary word, before the actual canary check is
    performed (for example in memcpy-based buffer overflows).
fpletz and others added 28 commits November 3, 2016 12:55
Incorporates fixes from all patches for the CVEs listed and some more
security-related issues like:

  http://www.openwall.com/lists/oss-security/2016/11/04/11
@mention-bot
Copy link

@oida, thanks for your PR! By analyzing the history of the files in this pull request, we identified @letac, @pesterhazy and @pSub to be potential reviewers.

@oida oida closed this Nov 23, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet