Commit Graph

156 Commits

Author SHA1 Message Date
Catalin Patulea
1b9a3ef569 libnetfilter-queue: fix package title and description
The original text was copy/pasted from some other package.
Adjust the package title and description to match the description
on the publishers page.

Signed-off-by: Catalin Patulea <catalinp@google.com>
[slightly adjust content and commit message]
Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
2020-06-24 12:03:50 +08:00
Chen Minqiang
e7bd7838ff toolchain: glibc ldd env path fixup
This replace the shell script header of ldd
when it install to `/usr/bin/ldd` where
`#! /..../staging_dir/host/bin/bash`
should be
`#!/bin/sh`

Signed-off-by: Chen Minqiang <ptpt52@gmail.com>
2020-06-19 11:59:02 +08:00
Ian Cooper
6ca48b8591 toolchain: remove gcc libssp and use libc variant
Removes the standalone implementation of stack smashing protection
in gcc's libssp in favour of the native implementation available
in glibc and uclibc. Musl libc already uses its native ssp, so this
patch does not affect musl-based toolchains.

Stack smashing protection configuration options are now uniform
across all supported libc variants.

This also makes kernel-level stack smashing protection available
for x86_64 and i386 builds using non-musl libc.

Signed-off-by: Ian Cooper <iancooper@hotmail.com>
2020-06-18 08:06:20 +08:00
Daniel Golle
d29cf5a61a uclient: uclient-fetch: add option to read POST data from file
c660986 uclient-fetch: add option to read POST data from file

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2020-06-18 08:03:42 +08:00
Hans Dedecker
a47b953854
nghttp2: bump to 1.41.0
8f7b008b Update bash_completion
83086ba9 Update manual pages
c3b46625 Merge pull request from GHSA-q5wr-xfw9-q7xr
3eecc2ca Bump version number to v1.41.0, LT revision to 34:0:20
881c060d Update AUTHORS
f8da73bd Earlier check for settings flood
336a98fe Implement max settings option
ef415836 Revert "Add missing connection error handling"
979e6c53 Merge pull request #1459 from nghttp2/proxyprotov2
b7d16101 Add missing connection error handling
cd53bd81 Merge pull request #1460 from gportay/patch-1
e5625b8c Fix doc
c663349f integration: Add PROXY protocol v2 tests
854e9fe3 nghttpx: Always call init_forwarded_for
c60ea227 Update doc
49cd8e6e nghttpx: Add PROXY-protocol v2 support
3b17a659 Merge pull request #1453 from Leo-Neat/master
600fcdf5 Merge pull request #1455 from xjtian/long_serials
4922bb41 static_cast size parameter in StringRef constructor to size_t
aad86975 Fix get_x509_serial for long serial numbers
dc7a7df6 Adding CIFuzz
b3f85e2d Merge pull request #1444 from nghttp2/fix-recv-window-flow-control-issue
ffb49c6c Merge pull request #1435 from geoffhill/master
2ec58551 Fix receiving stream data stall
459df42b Merge pull request #1442 from nghttp2/upgrade-llhttp
a4c1fed5 Bump llhttp to 2.0.4
866eadb5 Enable session_create_idle_stream test, fix errors
5e13274b Fix typo
e0d7f7de h2load: Allow port in --connect-to
df575f96 h2load: add --connect-to option
1fff7379 clang-format-9
b40c6c86 Merge pull request #1418 from vszakats/patch-1
9bc2c75e lib/CMakeLists.txt: Make hard-coded static lib suffix optional
2d5f7659 Bump up version number to 1.41.0-DEV

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2020-06-06 22:23:35 +08:00
Rosen Penev
16e6ccb89e libconfig: move into packages feed
No package in base uses libconfig. Everything is in the packages feed.

Ref: https://github.com/openwrt/packages/pull/12255
Signed-off-by: Rosen Penev <rosenp@gmail.com>
[subject facelift, PR ref]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
2020-06-06 18:01:46 +08:00
Eneas U de Queiroz
b0e552747e wolfssl: use -fomit-frame-pointer to fix asm error
32-bit x86 fail to compile fast-math feature when compiled with frame
pointer, which uses a register used in a couple of inline asm functions.

Previous versions of wolfssl had this by default.  Keeping an extra
register available may increase performance, so it's being restored for
all architectures.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-06-04 12:33:48 +08:00
Eneas U de Queiroz
3d41bf5ca5 wolfssl: update to 4.4.0-stable
This version adds many bugfixes, including a couple of security
vulnerabilities:
 - For fast math (enabled by wpa_supplicant option), use a constant time
   modular inverse when mapping to affine when operation involves a
   private key - keygen, calc shared secret, sign.
 - Change constant time and cache resistant ECC mulmod. Ensure points
   being operated on change to make constant time.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-05-21 12:02:44 +08:00
Robert Marko
7e4ff1091d libjson-c: backport security fixes
This backports upstream fixes for the out of bounds write vulnerability in json-c.
It was reported and patches in this upstream PR: https://github.com/json-c/json-c/pull/592

Addresses CVE-2020-12762

Signed-off-by: Robert Marko <robert.marko@sartura.hr>
Signed-off-by: Luka Perkov <luka.perkov@sartura.hr>
[bump PKG_RELEASE]
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2020-05-13 18:15:24 +08:00
ElonH
6cc3e77a2d
libpcap: fix prefix path 2020-04-23 14:24:08 +08:00
CN_SZTL
f69260725e
libubox: backport fixes
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2020-04-23 04:28:58 +08:00
Petr Štetiar
725e595526 openssl: bump to 1.1.1g
Fixes NULL dereference in SSL_check_chain() for TLS 1.3, marked with
high severity, assigned CVE-2020-1967.

Ref: https://www.openssl.org/news/secadv/20200421.txt
Signed-off-by: Petr Štetiar <ynezz@true.cz>
2020-04-22 22:26:01 +08:00
ElonH
7fc016b1d2
elfutils: fix build on powerpc musl
This commit fixed https://github.com/project-openwrt/openwrt-kisco/issues/41
2020-04-21 19:54:32 +08:00
Magnus Kroken
aad709ab60
mbedtls: update to 2.16.6
Security fixes for:
* CVE-2020-10932
* a potentially remotely exploitable buffer overread in a DTLS client
* bug in DTLS handling of new associations with the same parameters

Full release announement:
https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.6-and-2.7.15-released

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
2020-04-18 12:20:56 +08:00
Lucian Cristian
ae5bb65cc6
elfutils: aarch64 fix build on musl
aarch64_initreg.c: In function 'aarch64_set_initial_registers_tid':
aarch64_initreg.c:85:37: error: invalid operands to binary & (have 'long double' and 'unsigned int')
     dwarf_fregs[r] = fregs.vregs[r] & 0xFFFFFFFF;
                      ~~~~~~~~~~~~~~ ^

Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2020-04-17 21:06:56 +08:00
Rosen Penev
d4a6de1eb7
elfutils: update to 0.179
Removed sys/cdefs usage. The header is deprecated.

Removed canonicalize_file_name define. It's already fixed upstream.

Added --disable-debuginfod. Seems to be needed.

Modified patch 005 to build more stuff. It was failing before. It still
only builds libraries.

Modified patch 100 to use strerror under non-glibc. It is used under
glibc as strerror is not thread safe. It is under musl and uClibc-ng.
strerror_l is not available under uClibc-ng.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-04-14 20:28:43 +08:00
CN_SZTL
b2760e89d5
openssl: refresh download urls 2020-04-09 06:51:56 +08:00
Kevin Darbyshire-Bryant
4c9afddf51
jansson: convert to cmake
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-04-05 21:26:51 +08:00
CN_SZTL
03d7119e7a
Merge Lean's source 2020-04-03 23:50:50 +08:00
CN_SZTL
78bec3e9f0
openssl: bump to 1.1.1f (#4153) 2020-04-03 09:10:54 +08:00
CN_SZTL
33733198bf
openssl: bump to 1.1.1f 2020-04-01 04:37:25 +08:00
CN_SZTL
f8bd6e09a0
openssl: revert EOF detection change in 1.1.1 (#4127)
This adds patches to avoid possible application breakage caused by a
change in behavior introduced in 1.1.1e.  It affects at least nginx,
which logs error messages such as:
nginx[16652]: [crit] 16675#0: *358 SSL_read() failed (SSL: error:
4095126:SSL routines:ssl3_read_n:unexpected eof while reading) while
keepalive, client: xxxx, server: [::]:443

Openssl commits db943f4 (Detect EOF while reading in libssl), and
22623e0 (Teach more BIOs how to handle BIO_CTRL_EOF) changed the
behavior when encountering an EOF in SSL_read().  Previous behavior was
to return SSL_ERROR_SYSCALL, but errno would still be 0.  The commits
being reverted changed it to SSL_ERRO_SSL, and add an error to the
stack, which is correct.  Unfortunately this affects a number of
applications that counted on the old behavior, including nginx.

The reversion was discussed in openssl/openssl#11378, and implemented as
PR openssl/openssl#11400.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>

Co-authored-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-03-31 23:14:35 +08:00
Kevin Darbyshire-Bryant
9de293c406
jansson: import jansson from packages
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-03-30 19:50:14 +08:00
Eneas U de Queiroz
bf035d50fc
openssl: revert EOF detection change in 1.1.1
This adds patches to avoid possible application breakage caused by a
change in behavior introduced in 1.1.1e.  It affects at least nginx,
which logs error messages such as:
nginx[16652]: [crit] 16675#0: *358 SSL_read() failed (SSL: error:
4095126:SSL routines:ssl3_read_n:unexpected eof while reading) while
keepalive, client: xxxx, server: [::]:443

Openssl commits db943f4 (Detect EOF while reading in libssl), and
22623e0 (Teach more BIOs how to handle BIO_CTRL_EOF) changed the
behavior when encountering an EOF in SSL_read().  Previous behavior was
to return SSL_ERROR_SYSCALL, but errno would still be 0.  The commits
being reverted changed it to SSL_ERRO_SSL, and add an error to the
stack, which is correct.  Unfortunately this affects a number of
applications that counted on the old behavior, including nginx.

The reversion was discussed in openssl/openssl#11378, and implemented as
PR openssl/openssl#11400.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-03-29 16:17:31 +08:00
CN_SZTL
a68db5f2df
treewide: sync with upstream source 2020-03-28 23:37:17 +08:00
Jo-Philipp Wich
23251fcd9b
ustream-ssl: bump to latest Git HEAD
5e1bc34 ustream-openssl: clear error stack before SSL_read/SSL_write
f7f93ad add support for specifying usable ciphers

Also bump the ABI version since the layout of `struct ustream_ssl_ops`
changed.

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2020-03-26 20:04:32 +08:00
CN_SZTL
a696ac5392
System: revert some packages for OpenWrt-18.06 2020-03-25 20:16:17 +08:00
lean
5ee7b8ac82 Revert "libubox:fix array out of bounds GCC 10 warning"
This reverts commit 2c95a9f5e6.
2020-03-25 20:13:16 +08:00
CN_SZTL
983bd2d46f
Merge Lean's source 2020-03-25 19:11:35 +08:00
lean
334f365c2b rpcd: activate PIE ASLR by default 2020-03-25 12:59:53 +08:00
lean
2c95a9f5e6 libubox:fix array out of bounds GCC 10 warning 2020-03-25 12:17:48 +08:00
CN_SZTL
fbc565c228
Merge Lean's source 2020-03-24 20:20:12 +08:00
lean
b4eaefa54e libmnl: update ABI version 2020-03-24 18:24:26 +08:00
CN_SZTL
ca4a82b31a
Merge Lean's source 2020-03-23 12:09:22 +08:00
lean
8aabd4ef4f libnftnl: bump version 2020-03-23 11:23:46 +08:00
CN_SZTL
a225a908b2
Merge Lean's source 2020-03-22 19:07:54 +08:00
CN_SZTL
fd6d1b0700
openssl: update to 1.1.1e (#3926)
This version includes bug and security fixes, including medium-severity
CVE-2019-1551, affecting RSA1024, RSA1536, DSA1024 & DH512 on x86_64.

Ref: openwrt/openwrt@dcef8d6

Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2020-03-22 10:08:58 +08:00
CN_SZTL
f296fec6f4
openssl: refresh patches 2020-03-22 02:06:59 +08:00
CN_SZTL
b2e5d40aeb
readline: needs host depend on ncurses to build 2020-03-21 01:28:18 +08:00
CN_SZTL
c0e6fa94e0
openssl: adjust download url 2020-03-17 23:32:39 +08:00
CN_SZTL
cf20b1b002
openssl: bump to 1.1.1e release 2020-03-17 23:24:36 +08:00
CN_SZTL
e17aca712d
Merge Lean' ssource 2020-03-13 18:34:46 +08:00
lean
dd6ccb9c18 openssl: update config 2020-03-13 09:42:50 +08:00
AmadeusGhost
53872fe931
elfutils: bump to 0.177 (#3648)
commit:
  40de4c0 elfutils: bump to 0.176
  4760541 elfutils: Fix compile with uClibc-ng
  0851ce4 elfutils: bump to 0.177
  f4da28c elfutils: Add host build
2020-03-08 12:49:24 +08:00
CN_SZTL
b1d9a3a548
libubox: backport blobmsg_check_array() fix 2020-03-08 04:18:18 +08:00
CN_SZTL
68509769b0
ncurses: update to 6.2 2020-03-08 01:28:54 +08:00
CN_SZTL
d6934dceba
elfutils: bump to 0.177 2020-03-05 23:22:49 +08:00
CN_SZTL
6d0259e28e
libpcap: activate PIE ASLR by default 2020-03-02 17:53:14 +08:00
CN_SZTL
50ba6569a7
mbedtls: update to version 2.16.5 2020-02-27 17:44:49 +08:00
CN_SZTL
8af8db5ede
openssl: refresh patches 2020-02-25 17:37:20 +08:00