Commit Graph

230 Commits

Author SHA1 Message Date
AmadeusGhost
b4a699c6c3
mbedtls: update to 2.16.10 (#6630)
This release of Mbed TLS provides bug fixes and minor enhancements. This
release includes fixes for security issues.

Security fixes:
* Fix a buffer overflow in mbedtls_mpi_sub_abs()
* Fix an errorneous estimation for an internal buffer in
mbedtls_pk_write_key_pem()
* Fix a stack buffer overflow with mbedtls_net_poll() and
mbedtls_net_recv_timeout()
* Guard against strong local side channel attack against base64 tables
by making access aceess to them use constant flow code

Full release announcement:
https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.10

Signed-off-by: Magnus Kroken <mkroken@gmail.com>

Co-authored-by: Magnus Kroken <mkroken@gmail.com>
2021-04-02 09:52:36 +08:00
AmadeusGhost
84e3d78aa5
openssl: bump to 1.1.1k (#6608)
This version fixes 2 security vulnerabilities, among other changes:

 - CVE-2021-3450: problem with verifying a certificate chain when using
   the X509_V_FLAG_X509_STRICT flag.

 - CVE-2021-3449: OpenSSL TLS server may crash if sent a maliciously
   crafted renegotiation ClientHello message from a client.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>

Co-authored-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2021-03-27 16:44:41 +08:00
CN_SZTL
80a7e79a7b
mbedtls: fix typo error (#6507)
Fixes: #6505

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2021-03-10 13:39:43 +08:00
CN_SZTL
ef449e470b
mbedtls: Implements AES and GCM with ARMv8 Crypto Extensions (#6491)
* mbedtls: update to 2.16.9

Signed-off-by: Rosen Penev <rosenp@gmail.com>
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>

* mbedtls: Implements AES and GCM with ARMv8 Crypto Extensions

A compact patch that provides AES and GCM implementations that utilize the
ARMv8 Crypto Extensions. The config flag is MBEDTLS_ARMV8CE_AES_C, which
is disabled by default as we don't do runtime checking for the feature.
The new implementation lives in armv8ce_aes.c.

Provides similar functionality to https://github.com/ARMmbed/mbedtls/pull/432
Thanks to Barry O'Rourke and others for that contribtion.

Tested on a Cortex A53 device and QEMU. On a midrange phone the real AES-GCM
throughput increases about 4x, while raw AES speed is up to 10x faster.

[updated Makefile to enable this function, adjusted commit message]
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>

Co-authored-by: Rosen Penev <rosenp@gmail.com>
Co-authored-by: QiuSimons <45143996+QiuSimons@users.noreply.github.com>
2021-03-09 23:11:41 +08:00
AmadeusGhost
7436d6866f
openssl: bump to 1.1.1j (#6410)
This fixes 4 security vulnerabilities/bugs:

- CVE-2021-2839 - SSLv2 vulnerability. Openssl 1.1.1 does not support
  SSLv2, but the affected functions still exist. Considered just a bug.

- CVE-2021-2840 - calls EVP_CipherUpdate, EVP_EncryptUpdate and
  EVP_DecryptUpdate may overflow the output length argument in some
  cases where the input length is close to the maximum permissable
  length for an integer on the platform. In such cases the return value
  from the function call will be 1 (indicating success), but the output
  length value will be negative.

- CVE-2021-2841 - The X509_issuer_and_serial_hash() function attempts to
  create a unique hash value based on the issuer and serial number data
  contained within an X509 certificate. However it was failing to
  correctly handle any errors that may occur while parsing the issuer
  field (which might occur if the issuer field is maliciously
  constructed). This may subsequently result in a NULL pointer deref and
  a crash leading to a potential denial of service attack.

- Fixed SRP_Calc_client_key so that it runs in constant time. This could
  be exploited in a side channel attack to recover the password.

The 3 CVEs above are currently awaiting analysis.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>

Co-authored-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2021-02-21 12:25:02 +08:00
Kaffu Chino
8c37984f30
libnetfilter_conntrack: Update V1.0.8 (#6094) 2020-12-25 16:15:32 +08:00
AmadeusGhost
eed26dc436
openssl: update to 1.1.1i (#5925)
Fixes: CVE-2020-1971, defined as high severity, summarized as:
NULL pointer deref in GENERAL_NAME_cmp function can lead to a DOS
attack.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>

Co-authored-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-12-14 22:26:30 +08:00
AmadeusGhost
a16a54e4a4
openssl: bump to 1.1.1h (#5570)
This is a bug-fix release.  Patches were refreshed.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>

Co-authored-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-10-03 00:37:24 +08:00
CN_SZTL
a07a47018c
mbedtls: update to 2.16.7 (#5377)
Mbed TLS 2.16.7 is a maintenance release of the Mbed TLS 2.16 branch,
and provides bug fixes and minor enhancements. This release includes
fixes for security issues and the most severe one is described in more
detail in a security advisory:
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07

* Fix a side channel vulnerability in modular exponentiation that could
reveal an RSA private key used in a secure enclave.
* Fix side channel in mbedtls_ecp_check_pub_priv() and
mbedtls_pk_parse_key() / mbedtls_pk_parse_keyfile() (when loading a private
key that didn't include the uncompressed public key), as well as
mbedtls_ecp_mul() / mbedtls_ecp_mul_restartable() when called with a NULL
f_rng argument. An attacker with access to precise enough timing and
memory access information (typically an untrusted operating system
attacking a secure enclave) could fully recover the ECC private key.
* Fix issue in Lucky 13 counter-measure that could make it ineffective when
hardware accelerators were used (using one of the MBEDTLS_SHAxxx_ALT
macros).

Due to Mbed TLS moving from ARMmbed to the Trusted Firmware project, some
changes to the download URLs are required. For the time being, the
ARMmbed/mbedtls Github repository is the canonical source for Mbed TLS.

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
[Use https://codeload.github.com and new tar.gz file]
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>

Co-authored-by: Magnus Kroken <mkroken@gmail.com>
2020-08-30 21:17:26 +08:00
Her0R0cket
7ba6311016
fix depends for libdevmapper & change host pkg name (#5325)
* fix depends for libdevmapper

fix depends for libdevmapper

* Use python3 in18.04 

Use python3 in18.04
2020-08-18 01:40:34 +08:00
coolsnowwolf
0c95d8abf1 ipq40xx: rework with new v5.4 essedma eth setting 2020-07-03 12:17:04 +08:00
coolsnowwolf
33abeff31c Sync to snapshot kernel 5.4 version 2020-07-02 23:30:56 +08:00
coolsnowwolf
0f7ae686e5 fix uci bug which involed in 0326b4 2020-06-23 10:16:52 +08:00
BoBppy
bd2aaaea2c
libubox:fix array out of bounds GCC 10 warning 2020-06-19 17:16:24 +08:00
CN_SZTL
fc7ff01576
openssl: bump to 1.1.1g (#4415)
Fixes NULL dereference in SSL_check_chain() for TLS 1.3, marked with
high severity, assigned CVE-2020-1967.

Ref: https://www.openssl.org/news/secadv/20200421.txt

Cherry-pick from openwrt/openwrt@3773ae1.
Also add mirror for mainland China user in this commit.

Signed-off-by: Petr Štetiar <ynezz@true.cz>
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>

Co-authored-by: Petr Štetiar <ynezz@true.cz>
2020-04-23 10:47:31 +08:00
CN_SZTL
3bb1af32ad
mbedtls: update to 2.16.6 (#4387)
Security fixes for:
* CVE-2020-10932
* a potentially remotely exploitable buffer overread in a DTLS client
* bug in DTLS handling of new associations with the same parameters

Full release announement:
https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.6-and-2.7.15-released

Cherry-pick from: openwrt/openwrt@02fcbe2.

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>

Co-authored-by: Magnus Kroken <mkroken@gmail.com>
2020-04-20 21:04:48 +08:00
CN_SZTL
78bec3e9f0
openssl: bump to 1.1.1f (#4153) 2020-04-03 09:10:54 +08:00
CN_SZTL
f8bd6e09a0
openssl: revert EOF detection change in 1.1.1 (#4127)
This adds patches to avoid possible application breakage caused by a
change in behavior introduced in 1.1.1e.  It affects at least nginx,
which logs error messages such as:
nginx[16652]: [crit] 16675#0: *358 SSL_read() failed (SSL: error:
4095126:SSL routines:ssl3_read_n:unexpected eof while reading) while
keepalive, client: xxxx, server: [::]:443

Openssl commits db943f4 (Detect EOF while reading in libssl), and
22623e0 (Teach more BIOs how to handle BIO_CTRL_EOF) changed the
behavior when encountering an EOF in SSL_read().  Previous behavior was
to return SSL_ERROR_SYSCALL, but errno would still be 0.  The commits
being reverted changed it to SSL_ERRO_SSL, and add an error to the
stack, which is correct.  Unfortunately this affects a number of
applications that counted on the old behavior, including nginx.

The reversion was discussed in openssl/openssl#11378, and implemented as
PR openssl/openssl#11400.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>

Co-authored-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-03-31 23:14:35 +08:00
lean
5ee7b8ac82 Revert "libubox:fix array out of bounds GCC 10 warning"
This reverts commit 2c95a9f5e6.
2020-03-25 20:13:16 +08:00
lean
334f365c2b rpcd: activate PIE ASLR by default 2020-03-25 12:59:53 +08:00
lean
2c95a9f5e6 libubox:fix array out of bounds GCC 10 warning 2020-03-25 12:17:48 +08:00
lean
b4eaefa54e libmnl: update ABI version 2020-03-24 18:24:26 +08:00
lean
8aabd4ef4f libnftnl: bump version 2020-03-23 11:23:46 +08:00
CN_SZTL
fd6d1b0700
openssl: update to 1.1.1e (#3926)
This version includes bug and security fixes, including medium-severity
CVE-2019-1551, affecting RSA1024, RSA1536, DSA1024 & DH512 on x86_64.

Ref: openwrt/openwrt@dcef8d6

Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2020-03-22 10:08:58 +08:00
lean
dd6ccb9c18 openssl: update config 2020-03-13 09:42:50 +08:00
AmadeusGhost
53872fe931
elfutils: bump to 0.177 (#3648)
commit:
  40de4c0 elfutils: bump to 0.176
  4760541 elfutils: Fix compile with uClibc-ng
  0851ce4 elfutils: bump to 0.177
  f4da28c elfutils: Add host build
2020-03-08 12:49:24 +08:00
coolsnowwolf
b67976c246 readline: curses link 2020-02-22 16:00:57 +08:00
coolsnowwolf
e5a18fdcf6 ncurses: Do not pass both -fPIC and -fpic 2020-02-22 12:03:35 +08:00
coolsnowwolf
9f8000a6d6 sync build script for OpenWrt 19.07 2020-02-21 02:41:00 +08:00
AmadeusGhost
23519895ff package: update ipv6 to latest (#3021) 2020-02-10 15:40:14 +08:00
LEAN-ESX
dd576fa6ab nghttp2: bump to new version 2019-12-09 06:09:44 -08:00
CN_SZTL
992a3f2244 OpenSSL: bump to v1.1.1d (#2332)
* openssl: bump to v1.1.1d

* trojan: compile with native openssl utils

* qt5: fix compile with openssl v1.1.x
2019-12-09 21:08:27 +08:00
LEAN-ESX
7655ad367f fstool: mount/umount fs without reboot 2019-12-08 09:30:10 -08:00
LEAN-ESX
3376f50203 Revert "netifd: bump to latest version"
This reverts commit d6ce485de7.
2019-11-24 19:57:24 -08:00
LEAN-ESX
d6ce485de7 netifd: bump to latest version 2019-11-23 10:39:08 -08:00
LEAN-ESX
707e1186ca libnl: update to lastest version 2019-11-23 09:58:26 -08:00
LEAN-ESX
c235f68028 qBittorrent: rollback qt5 and openssl 2019-11-09 02:16:08 -08:00
LEAN-ESX
217cc81b58 Revert "ustream-ssl: bump version"
This reverts commit cd903a7e25.
2019-10-28 01:22:20 -07:00
LEAN-ESX
177d33049e "libjson-c: bump version"
This reverts commit 438f06ab11.
2019-10-28 01:21:22 -07:00
LEAN-ESX
438f06ab11 libjson-c: bump version 2019-10-27 09:05:05 -07:00
LEAN-ESX
cd903a7e25 ustream-ssl: bump version 2019-10-27 05:15:04 -07:00
LEAN-ESX
08ddbd586a libevent2: Make it build using OpenSSL 1.1 2019-10-27 00:05:18 -07:00
LEAN-ESX
b9e5d69777 openssl: OPENSSL_WITH_ASM default 2019-10-25 06:51:09 -07:00
LEAN-ESX
f339b00c7a openssl: bump to v1.1.1d 2019-10-25 06:49:04 -07:00
LEAN-ESX
ed8c0532b4 mbedtls: enable x86 32bit SSE2 support (Atom N270 etc.) 2019-10-19 09:24:38 -07:00
LEAN-ESX
d4ecf90f67 mbedtls: enable x86 32bit SSE2 support (Atom N270 etc.) 2019-10-19 09:23:20 -07:00
LEAN-ESX
223cd21383 mbedtls: add support for x64 SSE2/AES-NI speedup 2019-10-16 21:57:28 -07:00
LEAN-ESX
540fe95b29 openssl: optimization speed for x64 (Compile with SSE2 and optimized assembly code) 2019-10-14 03:18:50 -07:00
coolsnowwolf
a52f85c70f iproute2: add cake fwmark support 2019-03-20 14:30:49 +08:00
coolsnowwolf
712b9794e6 openssl: revert 1.0.2 2019-02-13 23:15:34 +08:00
coolsnowwolf
ed9daec69e openssl: optimizations based on ARCH/small flash 2019-02-13 23:09:22 +08:00
coolsnowwolf
347daa04b2 Merge branch master of https://github.com/coolsnowwolf/lede 2019-01-03 19:29:28 +08:00
coolsnowwolf
ac7c76d45a mbedtls:bump to 2.14.1 2018-12-18 17:52:50 +08:00
coolsnowwolf
20d6f26fc8 openssl:enable openssl multiple threads by default 2018-10-22 15:18:31 +08:00
coolsnowwolf
3b9a77b9b0 Enable optimization for openssl speed instead of size 2018-10-14 19:22:50 +08:00
coolsnowwolf
806f5db174 sync with OpenWrt trunk 2018-09-07 13:43:55 +08:00
coolsnowwolf
9ba04fd0d7 sync with OpenWrt v18.06.1 stable new R8.1 version 2018-08-23 17:40:23 +08:00
coolsnowwolf
730605bea8 revert livevent2 and remove wifidog 2018-05-17 13:36:19 +08:00
coolsnowwolf
29f2ced3e6 fix apfree wifidog with libevent2 2018-05-13 11:49:52 +08:00
coolsnowwolf
8fe0636b8a Merge branch 'master' of github.com:lede-project/source 2018-04-23 18:50:49 +08:00
aooom
75d75c1722 20180409 2018-04-09 14:06:38 +08:00
coolsnowwolf
f5a44efb25 update toolchain GCC to 7.3.0 2018-02-08 22:08:32 +08:00
aooom
5efa8647e5 20180113 2018-01-18 18:17:35 +08:00
coolsnowwolf
20f7e75789 update to R7.5.4 2018-01-15 18:26:41 +08:00
coolsnowwolf
5d5ba500e6 fix gettext path for gdbm 2018-01-11 21:19:53 +08:00
coolsnowwolf
b0f643aa87 update to R7.5.3 stable to fix firewall freeze 2018-01-10 20:55:06 +08:00
coolsnowwolf
229cde62a4 Merge branch 'master' of https://github.com/lede-project/source 2018-01-09 14:38:15 +08:00
coolsnowwolf
b780d3bfb6 Add ARM and NEON optimizations 2018-01-08 18:19:57 +08:00
coolsnowwolf
03e969ff38 update kernel 4.4/4.9 to the lastest version 2017-12-25 10:45:33 +08:00
aooom
595ebacd6d Merge remote-tracking branch 'upstream/master'
Conflicts:
	package/kernel/mac80211/files/lib/wifi/mac80211.sh
2017-11-02 22:53:42 +08:00
coolsnowwolf
506faec99a openssl: Enable assembler optimizations for x64/arm8 2017-10-31 15:23:13 +08:00
coolsnowwolf
5d1a43f782 squashfs: use host cflags and fix for x86/x64 vmware firstboot 2017-10-24 23:23:45 +08:00
aooom
ca1c449a69 Merge https://github.com/coolsnowwolf/lede 2017-10-16 21:03:24 +08:00
coolsnowwolf
47c9f16b45 hostapd: CERT case ID: VU#228519 for WPA packet number reuse with key reinstallation and CVE fixes 2017-10-16 20:55:05 +08:00
coolsnowwolf
7284f410aa move package to lean folder 2017-10-09 23:13:30 +08:00
mltao
06bd77942f ‘解决amule编译通不过的bug
git commit -a -m ‘解决amule编译通不过的bug
2017-10-08 19:19:08 +08:00
aooom
9dcde4fc39 add wifidog SSID修复 CPU信息显示 2017-10-07 20:19:36 +08:00
coolsnowwolf
e3656a3e9a openssl multiple threads optimization 2017-09-13 22:02:37 +08:00
coolsnowwolf
03efb03919 Merge branch 'master' of https://github.com/lede-project/source 2017-09-12 01:07:20 +08:00
coolsnowwolf
97a4ffcc12 update source 2017-09-06 19:19:45 +08:00