33322 Commits

Author SHA1 Message Date
Calin Crisan
9dcb36a72b motionEye: update to 0.40 2019-04-27 21:35:38 +03:00
Calin Crisan
23cf26dec0 Merge remote-tracking branch 'thingos/dev' into dev 2019-04-07 20:22:11 +03:00
Calin Crisan
b3b1cebc4f Raspberry Pi (all): add hashes for firmware & userland 2019-04-07 20:21:51 +03:00
Calin Crisan
14a17073b6 Merge remote-tracking branch 'thingos/dev' into dev 2019-04-06 22:21:44 +03:00
Calin Crisan
8a292fa9ab Raspberry Pi (all): update kernel, firmware & userland 2019-04-06 22:21:16 +03:00
Calin Crisan
80a0302d5e motioneye: update to 0.40rc5 2019-03-20 21:57:24 +02:00
Calin Crisan
a6a673f9fd motioneye: update to 0.40rc4 2019-03-18 22:26:20 +02:00
Calin Crisan
e8f3b753ed motioneye: update to latest commit 2019-03-16 23:16:00 +02:00
Calin Crisan
42cb0d0c35 motioneye: update to 0.40rc3 2019-03-11 22:53:51 +02:00
Calin Crisan
0bd045ff3e motioneye: update to 0.40rc2 2019-03-10 23:26:14 +02:00
Calin Crisan
f29202b798 motion: add hash for 4.2.2 2019-03-08 10:28:02 +02:00
Calin Crisan
48de800bc6 motion: update to 4.2.2 2019-03-07 23:19:07 +02:00
Calin Crisan
026bc292ca motioneye: update to 0.40rc1 2019-03-07 23:15:49 +02:00
Calin Crisan
016fe0a7f8 Merge remote-tracking branch 'thingos/dev' into dev 2019-02-22 09:48:11 +02:00
Bernd Kuhls
633e90970f package/libopenssl: add runtime fixes for tor
For details see https://bugs.archlinux.org/task/61623

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:32:47 +02:00
Bernd Kuhls
2f2f2b9fab package/libopenssl: renumber patches
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:32:27 +02:00
Matt Weber
ebff015121 package/libopenssl: m68x use SMALL_FOOTPRINT mode
OPENSSL_SMALL_FOOTPRINT mode selects alternate paths in the sha512 and
blake2 algorithms which resolves a assembler issue like the following.

/tmp/ccfnLhKQ.s: Assembler messages:
/tmp/ccfnLhKQ.s:11167: Error: value -32790 out of range
make[2]: *** [crypto/blake2/blake2b.o] Error 1

This issue was found after the OpenSSL1.1.x bump.

Fixes
http://autobuild.buildroot.net/results/533e817695cde321b725145112cfd83c092d9d75

Upstream ticket
https://github.com/openssl/openssl/issues/8190

Signed-off-by: Matthew Weber <matthew.weber@rockwellcollins.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:31:49 +02:00
Peter Seiderer
ed98bc2fbb libopenssl: bump version to 1.1.1a
- use BR2_TOOLCHAIN_HAS_UCONTEXT
    This is used to set -DOPENSSL_NO_ASYNC if needed.

- apply the CFLAGS correctly when compiling with -Os (bugfix).

- use -latomic when needed
    This fixes the build for br-sparc-uclibc-2018.05

- don't use madvise() if no MMU
    Trying to do so results in undefined reference to madvise() as
    it is not available on uclibc without MMU.
    The original openssl code checks if a macro used in the madvise call
    is defined. The problem comes from the fact that the code in
    crypto/mem_sec.c also includes a kernel header defining the same macro
    unconditionally. Thus the check is always true in that case.
    Upstream: https://github.com/openssl/openssl/pull/8089

- don't compile test/fuzzers
    These binaries introduced with 1.1.x sometimes do not compile.
    This is the case with the br-arm-cortex-m4-full toolchain

- don't build ocsp daemon if no MMU.
    Patch from  Richard Levitte.

- correctly enable cryptodev engine
    Thanks to Arnout Vandecappelle for spotting this.

- remove all parallel build patches (openssl build-system changed)

- rebased 0001-Dont-waste-time-building-manpages-if-we-re-not-going.patch
  to apply to Configurations/unix-Makefile.tmpl (Makefile template)

- removed 0002-cryptodev-Fix-issue-with-signature-generation.patch
  (upstream applied)

- rebased 0003-Reproducible-build-do-not-leak-compiler-path.patch to
  apply to crypto/build.info (Makefile template)

- fix musl/uclibc build failure, use '-DOPENSSL_NO_ASYNC'

- remove legacy enable-tlsext configure option

- remove target/host libdir configure options, fixes openssl.pc installation
  path, fixes wget compile

- change legacy INSTALL_PREFIX to DESTDIR

- remove 'libraries gets installed read only, so strip fails'
  workaround (not needed anymore)

- change engine directory from /usr/lib/engines to
  /usr/lib/engines-1.1

- change license file hash, no license change, only the following
  hint was removed:

    Actually both licenses are BSD-style Open Source licenses.
    In case of any license issues related to OpenSSL please
    contact openssl-core@openssl.org.

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Tested-by: Ryan Coe <bluemrp9@gmail.com>
Signed-off-by: Vadim Kochan <vadim4j@gmail.com>
Signed-off-by: Patrick Havelange <patrick.havelange@essensium.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:31:28 +02:00
Joel Stanley
5d8f0d55a3 package/libopenssl: use HTTPS for URL
The host forces HTTPS regardless. This can be seen in the build logs:

 >>> host-libopenssl 1.0.2q Downloading
 URL transformed to HTTPS due to an HSTS policy
 --2018-12-10 09:53:27--  https://www.openssl.org/source/openssl-1.0.2q.tar.gz

Signed-off-by: Joel Stanley <joel@jms.id.au>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2019-02-17 20:30:30 +02:00
Peter Korsgaard
0429eaf769 libopenssl: security bump to version 1.0.2q
Fixes the following security vulnerabilities:

  *) Microarchitecture timing vulnerability in ECC scalar multiplication

     OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been
     shown to be vulnerable to a microarchitecture timing side channel attack.
     An attacker with sufficient access to mount local timing attacks during
     ECDSA signature generation could recover the private key.

     This issue was reported to OpenSSL on 26th October 2018 by Alejandro
     Cabrera Aldaya, Billy Brumley, Sohaib ul Hassan, Cesar Pereida Garcia and
     Nicola Tuveri.
     (CVE-2018-5407)
     [Billy Brumley]

  *) Timing vulnerability in DSA signature generation

     The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
     timing side channel attack. An attacker could use variations in the signing
     algorithm to recover the private key.

     This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser.
     (CVE-2018-0734)
     [Paul Dale]

For more information, see the changelog:
https://www.openssl.org/news/cl102.txt

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:30:12 +02:00
Baruch Siach
4695e4a155 openssh: add upstream security fixes
CVE-2019-6109: Due to missing character encoding in the progress
display, a malicious server (or Man-in-The-Middle attacker) can employ
crafted object names to manipulate the client output, e.g., by using
ANSI control codes to hide additional files being transferred. This
affects refresh_progress_meter() in progressmeter.c.

CVE-2019-6111: Due to the scp implementation being derived from 1983
rcp, the server chooses which files/directories are sent to the client.
However, the scp client only performs cursory validation of the object
name returned (only directory traversal attacks are prevented). A
malicious scp server (or Man-in-The-Middle attacker) can overwrite
arbitrary files in the scp client target directory. If recursive
operation (-r) is performed, the server can manipulate subdirectories as
well (for example, to overwrite the .ssh/authorized_keys file).

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:27:14 +02:00
Chris Lesiak
2fca0905f4 package/openssh: Add sysusers.d snippet
Whether using the new sysusers.d snippet, or adding an entry to
/etc/password, set the service's home directory to /var/empty.
See README.privsep included as part of the openssh distribution.

Signed-off-by: Chris Lesiak <chris.lesiak@licor.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
2019-02-17 20:27:04 +02:00
Chris Lesiak
3947269290 package/openssh: Set /var/empty permissions
The openssh privilege separation feature, enabled by default,
requires that the path /var/empty exists and has certain permissions
(not writable by the sshd user). Note that nothing ever gets writting
in this directory, so it works fine on a readonly rootfs.

See README.privsep included as part of the openssh distribution.

Signed-off-by: Chris Lesiak <chris.lesiak@licor.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
2019-02-17 20:26:59 +02:00
Baruch Siach
f24e5e1e74 package/openssh: add upstream security fix
Fixes CVE-2018-20685: The scp client allows server to modify permissions
of the target directory by using empty ("D0777 0 \n") or dot ("D0777 0
.\n") directory name.

The bug reporter lists a number of related vulnerabilities that are not
fixed yet:

  https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:26:52 +02:00
Markus Mayer
7765a29773 package/openssh: use BR2_SYSTEM_DEFAULT_PATH as default PATH
We use the configuration option $(BR2_SYSTEM_DEFAULT_PATH) to set the
default PATH in OpenSSH sessions.

$(BR2_SYSTEM_DEFAULT_PATH) is a Kconfig string. So it is already
quoted, which is exactly what we want.

Signed-off-by: Markus Mayer <mmayer@broadcom.com>
Reviewed-by: "Yann E. MORIN" <yann.morin.1998@free.fr>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2019-02-17 20:26:39 +02:00
Baruch Siach
8db68e80cf openssh: bump to version 7.9p1
Drop patch #1. uClibc no longer includes pthreads.h indirectly.

Drop patch #2. The sys/param.h header is included indirectly through the
local includes.h header since version 6.8p1.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:25:42 +02:00
Calin Crisan
c12b5fb60b python-colibris: update to 0.4.4 2019-02-17 17:01:18 +02:00
Calin Crisan
7cd6f527bc Update motioneye 2019-02-08 22:10:50 +02:00
Calin Crisan
0cff6f52b0 Merge remote-tracking branch 'thingos/dev' into dev 2019-01-30 14:30:31 +02:00
Calin Crisan
abd5ee8eb3 python-colibris: update to 0.4.3 2019-01-27 22:52:04 +02:00
Calin Crisan
e5e3c609fc Merge remote-tracking branch 'thingos/dev' into dev 2019-01-27 19:32:50 +02:00
Calin Crisan
79b2870009 python-webargs: downgrade to 4.2.0 2019-01-27 18:21:10 +02:00
Calin Crisan
a4092b77e4 Merge branch 'thingos-next' into dev 2019-01-27 15:40:03 +02:00
Calin Crisan
8fb4bca930 Update watch control to use uppercase vars 2019-01-27 15:39:38 +02:00
Calin Crisan
49d65c3643 Update ip control to use uppercase vars 2019-01-27 15:35:47 +02:00
Calin Crisan
33d789f7d0 Update date control to use uppercase vars 2019-01-27 15:28:16 +02:00
Calin Crisan
211c885786
Merge pull request #1784 from jasaw/rpi-only-omx-endofframe
ffmpeg omx endofframe: updated patch file to official version
2019-01-25 23:34:45 +02:00
Calin Crisan
de6ac5915b Merge remote-tracking branch 'thingos/dev' into thingos-next 2019-01-25 23:08:28 +02:00
Calin Crisan
a0f27144fc python-mock: fix Config deps 2019-01-24 23:42:02 +02:00
Calin Crisan
c9d33c5b74 python-apispec: add patch for fixing setup encoding 2019-01-24 23:39:38 +02:00
Calin Crisan
dc4a2f5b5f python-mock: add host-python-pbr to deps 2019-01-24 23:34:47 +02:00
Calin Crisan
8d717bb579 Merge branch 'dev' into thingos-next 2019-01-24 16:31:33 +02:00
Calin Crisan
95273a1cf9 Merge remote-tracking branch 'thingos/dev' into thingos-next 2019-01-24 16:29:19 +02:00
Calin Crisan
d7b23605f0 Add python-fastentrypoints package 2019-01-23 22:46:51 +02:00
Calin Crisan
5b3fd64957 python-attrs: update to 18.2.0 2019-01-23 22:08:31 +02:00
Calin Crisan
73dbb6e128 python-idna-ssl: fix package version 2019-01-23 22:04:53 +02:00
Calin Crisan
e01e10a81b Add python-idna-ssl package 2019-01-23 22:02:47 +02:00
Calin Crisan
343db44072 python-cached-property: update to 1.5.1 2019-01-23 21:54:15 +02:00
Calin Crisan
69e4d9b1fa host-python-pbr: remove wrong deps 2019-01-22 23:20:39 +02:00
Calin Crisan
c428ec3d2c Add host-python-pbr package support 2019-01-22 23:16:48 +02:00