Commit Graph

149 Commits

Author SHA1 Message Date
Eneas U de Queiroz
3d41bf5ca5 wolfssl: update to 4.4.0-stable
This version adds many bugfixes, including a couple of security
vulnerabilities:
 - For fast math (enabled by wpa_supplicant option), use a constant time
   modular inverse when mapping to affine when operation involves a
   private key - keygen, calc shared secret, sign.
 - Change constant time and cache resistant ECC mulmod. Ensure points
   being operated on change to make constant time.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-05-21 12:02:44 +08:00
Robert Marko
7e4ff1091d libjson-c: backport security fixes
This backports upstream fixes for the out of bounds write vulnerability in json-c.
It was reported and patches in this upstream PR: https://github.com/json-c/json-c/pull/592

Addresses CVE-2020-12762

Signed-off-by: Robert Marko <robert.marko@sartura.hr>
Signed-off-by: Luka Perkov <luka.perkov@sartura.hr>
[bump PKG_RELEASE]
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2020-05-13 18:15:24 +08:00
ElonH
6cc3e77a2d
libpcap: fix prefix path 2020-04-23 14:24:08 +08:00
CN_SZTL
f69260725e
libubox: backport fixes
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2020-04-23 04:28:58 +08:00
Petr Štetiar
725e595526 openssl: bump to 1.1.1g
Fixes NULL dereference in SSL_check_chain() for TLS 1.3, marked with
high severity, assigned CVE-2020-1967.

Ref: https://www.openssl.org/news/secadv/20200421.txt
Signed-off-by: Petr Štetiar <ynezz@true.cz>
2020-04-22 22:26:01 +08:00
ElonH
7fc016b1d2
elfutils: fix build on powerpc musl
This commit fixed https://github.com/project-openwrt/openwrt-kisco/issues/41
2020-04-21 19:54:32 +08:00
Magnus Kroken
aad709ab60
mbedtls: update to 2.16.6
Security fixes for:
* CVE-2020-10932
* a potentially remotely exploitable buffer overread in a DTLS client
* bug in DTLS handling of new associations with the same parameters

Full release announement:
https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.6-and-2.7.15-released

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
2020-04-18 12:20:56 +08:00
Lucian Cristian
ae5bb65cc6
elfutils: aarch64 fix build on musl
aarch64_initreg.c: In function 'aarch64_set_initial_registers_tid':
aarch64_initreg.c:85:37: error: invalid operands to binary & (have 'long double' and 'unsigned int')
     dwarf_fregs[r] = fregs.vregs[r] & 0xFFFFFFFF;
                      ~~~~~~~~~~~~~~ ^

Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2020-04-17 21:06:56 +08:00
Rosen Penev
d4a6de1eb7
elfutils: update to 0.179
Removed sys/cdefs usage. The header is deprecated.

Removed canonicalize_file_name define. It's already fixed upstream.

Added --disable-debuginfod. Seems to be needed.

Modified patch 005 to build more stuff. It was failing before. It still
only builds libraries.

Modified patch 100 to use strerror under non-glibc. It is used under
glibc as strerror is not thread safe. It is under musl and uClibc-ng.
strerror_l is not available under uClibc-ng.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-04-14 20:28:43 +08:00
CN_SZTL
b2760e89d5
openssl: refresh download urls 2020-04-09 06:51:56 +08:00
Kevin Darbyshire-Bryant
4c9afddf51
jansson: convert to cmake
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-04-05 21:26:51 +08:00
CN_SZTL
03d7119e7a
Merge Lean's source 2020-04-03 23:50:50 +08:00
CN_SZTL
78bec3e9f0
openssl: bump to 1.1.1f (#4153) 2020-04-03 09:10:54 +08:00
CN_SZTL
33733198bf
openssl: bump to 1.1.1f 2020-04-01 04:37:25 +08:00
CN_SZTL
f8bd6e09a0
openssl: revert EOF detection change in 1.1.1 (#4127)
This adds patches to avoid possible application breakage caused by a
change in behavior introduced in 1.1.1e.  It affects at least nginx,
which logs error messages such as:
nginx[16652]: [crit] 16675#0: *358 SSL_read() failed (SSL: error:
4095126:SSL routines:ssl3_read_n:unexpected eof while reading) while
keepalive, client: xxxx, server: [::]:443

Openssl commits db943f4 (Detect EOF while reading in libssl), and
22623e0 (Teach more BIOs how to handle BIO_CTRL_EOF) changed the
behavior when encountering an EOF in SSL_read().  Previous behavior was
to return SSL_ERROR_SYSCALL, but errno would still be 0.  The commits
being reverted changed it to SSL_ERRO_SSL, and add an error to the
stack, which is correct.  Unfortunately this affects a number of
applications that counted on the old behavior, including nginx.

The reversion was discussed in openssl/openssl#11378, and implemented as
PR openssl/openssl#11400.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>

Co-authored-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-03-31 23:14:35 +08:00
Kevin Darbyshire-Bryant
9de293c406
jansson: import jansson from packages
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-03-30 19:50:14 +08:00
Eneas U de Queiroz
bf035d50fc
openssl: revert EOF detection change in 1.1.1
This adds patches to avoid possible application breakage caused by a
change in behavior introduced in 1.1.1e.  It affects at least nginx,
which logs error messages such as:
nginx[16652]: [crit] 16675#0: *358 SSL_read() failed (SSL: error:
4095126:SSL routines:ssl3_read_n:unexpected eof while reading) while
keepalive, client: xxxx, server: [::]:443

Openssl commits db943f4 (Detect EOF while reading in libssl), and
22623e0 (Teach more BIOs how to handle BIO_CTRL_EOF) changed the
behavior when encountering an EOF in SSL_read().  Previous behavior was
to return SSL_ERROR_SYSCALL, but errno would still be 0.  The commits
being reverted changed it to SSL_ERRO_SSL, and add an error to the
stack, which is correct.  Unfortunately this affects a number of
applications that counted on the old behavior, including nginx.

The reversion was discussed in openssl/openssl#11378, and implemented as
PR openssl/openssl#11400.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-03-29 16:17:31 +08:00
CN_SZTL
a68db5f2df
treewide: sync with upstream source 2020-03-28 23:37:17 +08:00
Jo-Philipp Wich
23251fcd9b
ustream-ssl: bump to latest Git HEAD
5e1bc34 ustream-openssl: clear error stack before SSL_read/SSL_write
f7f93ad add support for specifying usable ciphers

Also bump the ABI version since the layout of `struct ustream_ssl_ops`
changed.

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2020-03-26 20:04:32 +08:00
CN_SZTL
a696ac5392
System: revert some packages for OpenWrt-18.06 2020-03-25 20:16:17 +08:00
lean
5ee7b8ac82 Revert "libubox:fix array out of bounds GCC 10 warning"
This reverts commit 2c95a9f5e6.
2020-03-25 20:13:16 +08:00
CN_SZTL
983bd2d46f
Merge Lean's source 2020-03-25 19:11:35 +08:00
lean
334f365c2b rpcd: activate PIE ASLR by default 2020-03-25 12:59:53 +08:00
lean
2c95a9f5e6 libubox:fix array out of bounds GCC 10 warning 2020-03-25 12:17:48 +08:00
CN_SZTL
fbc565c228
Merge Lean's source 2020-03-24 20:20:12 +08:00
lean
b4eaefa54e libmnl: update ABI version 2020-03-24 18:24:26 +08:00
CN_SZTL
ca4a82b31a
Merge Lean's source 2020-03-23 12:09:22 +08:00
lean
8aabd4ef4f libnftnl: bump version 2020-03-23 11:23:46 +08:00
CN_SZTL
a225a908b2
Merge Lean's source 2020-03-22 19:07:54 +08:00
CN_SZTL
fd6d1b0700
openssl: update to 1.1.1e (#3926)
This version includes bug and security fixes, including medium-severity
CVE-2019-1551, affecting RSA1024, RSA1536, DSA1024 & DH512 on x86_64.

Ref: openwrt/openwrt@dcef8d6

Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2020-03-22 10:08:58 +08:00
CN_SZTL
f296fec6f4
openssl: refresh patches 2020-03-22 02:06:59 +08:00
CN_SZTL
b2e5d40aeb
readline: needs host depend on ncurses to build 2020-03-21 01:28:18 +08:00
CN_SZTL
c0e6fa94e0
openssl: adjust download url 2020-03-17 23:32:39 +08:00
CN_SZTL
cf20b1b002
openssl: bump to 1.1.1e release 2020-03-17 23:24:36 +08:00
CN_SZTL
e17aca712d
Merge Lean' ssource 2020-03-13 18:34:46 +08:00
lean
dd6ccb9c18 openssl: update config 2020-03-13 09:42:50 +08:00
AmadeusGhost
53872fe931
elfutils: bump to 0.177 (#3648)
commit:
  40de4c0 elfutils: bump to 0.176
  4760541 elfutils: Fix compile with uClibc-ng
  0851ce4 elfutils: bump to 0.177
  f4da28c elfutils: Add host build
2020-03-08 12:49:24 +08:00
CN_SZTL
b1d9a3a548
libubox: backport blobmsg_check_array() fix 2020-03-08 04:18:18 +08:00
CN_SZTL
68509769b0
ncurses: update to 6.2 2020-03-08 01:28:54 +08:00
CN_SZTL
d6934dceba
elfutils: bump to 0.177 2020-03-05 23:22:49 +08:00
CN_SZTL
6d0259e28e
libpcap: activate PIE ASLR by default 2020-03-02 17:53:14 +08:00
CN_SZTL
50ba6569a7
mbedtls: update to version 2.16.5 2020-02-27 17:44:49 +08:00
CN_SZTL
8af8db5ede
openssl: refresh patches 2020-02-25 17:37:20 +08:00
CN_SZTL
b5f7ee1e4d
openssl: bump to 1.1.1e-dev 2020-02-24 16:53:07 +08:00
CN_SZTL
9b7267a672
libbsd: update to 0.10.0 2020-02-23 15:26:25 +08:00
CN_SZTL
98c564de49
Merge Lean's source 2020-02-22 16:06:32 +08:00
coolsnowwolf
b67976c246 readline: curses link 2020-02-22 16:00:57 +08:00
coolsnowwolf
e5a18fdcf6 ncurses: Do not pass both -fPIC and -fpic 2020-02-22 12:03:35 +08:00
CN_SZTL
0f68fb6e82
libubox: fix ABI_VERSION 2020-02-21 03:04:58 +08:00
CN_SZTL
14609a8f8a
Merge Lean's source 2020-02-21 02:50:38 +08:00