43799 Commits

Author SHA1 Message Date
Calin Crisan
9dcb36a72b motionEye: update to 0.40 20190427 2019-04-27 21:35:38 +03:00
Calin Crisan
40d40b6890 S14postupgrade: add lowercase os_version compatiblity 20190413 2019-04-12 17:15:06 +03:00
Calin Crisan
d0e9221cf9 Fix post-upgrade 20190127 2019-04-12 16:58:26 +03:00
Calin Crisan
23cf26dec0 Merge remote-tracking branch 'thingos/dev' into dev 2019-04-07 20:22:11 +03:00
Calin Crisan
b3b1cebc4f Raspberry Pi (all): add hashes for firmware & userland 2019-04-07 20:21:51 +03:00
Calin Crisan
14a17073b6 Merge remote-tracking branch 'thingos/dev' into dev 2019-04-06 22:21:44 +03:00
Calin Crisan
8a292fa9ab Raspberry Pi (all): update kernel, firmware & userland 2019-04-06 22:21:16 +03:00
Calin Crisan
21554b26a1 Merge branch 'master' into dev 2019-04-01 21:33:13 +03:00
Calin Crisan
c70505248c Merge commit '7df75d1ad072ca9d967691b6a00e304118652826' into dev 2019-04-01 21:32:25 +03:00
Calin Crisan
3d3379c2a0 Merge remote-tracking branch 'thingos/dev' into dev 2019-03-26 22:57:40 +02:00
Calin Crisan
a915ed3ae3 logger: do not log to stdout/stderr 2019-03-26 22:57:21 +02:00
Calin Crisan
80a0302d5e motioneye: update to 0.40rc5 2019-03-20 21:57:24 +02:00
Calin Crisan
dc82eeefe2 Merge remote-tracking branch 'thingos/dev' into dev 2019-03-18 23:57:20 +02:00
Calin Crisan
a70281169f dmesg.log: show relative time instead of timestamp 2019-03-18 23:56:51 +02:00
Calin Crisan
6064dc4242 Continuously retry to set date upon failure 2019-03-18 23:52:34 +02:00
Calin Crisan
8e2734b18d writeimage.sh: use uppercase vars in static_ip.conf 2019-03-18 23:23:57 +02:00
Calin Crisan
a6a673f9fd motioneye: update to 0.40rc4 2019-03-18 22:26:20 +02:00
Calin Crisan
e8f3b753ed motioneye: update to latest commit 2019-03-16 23:16:00 +02:00
Calin Crisan
adf81dea0d Raspberry PI (all): streameye: use camera files instead of thread files 2019-03-11 22:57:05 +02:00
Calin Crisan
42cb0d0c35 motioneye: update to 0.40rc3 2019-03-11 22:53:51 +02:00
Calin Crisan
0bd045ff3e motioneye: update to 0.40rc2 2019-03-10 23:26:14 +02:00
Calin Crisan
0cb473dad8 Enable libmicrohttpd package 2019-03-10 22:28:51 +02:00
Calin Crisan
f29202b798 motion: add hash for 4.2.2 2019-03-08 10:28:02 +02:00
Calin Crisan
fdaac060e6 Add 20190307.sh post-upgrade script for migrating old motion conf files 2019-03-07 23:26:51 +02:00
Calin Crisan
48de800bc6 motion: update to 4.2.2 2019-03-07 23:19:07 +02:00
Calin Crisan
026bc292ca motioneye: update to 0.40rc1 2019-03-07 23:15:49 +02:00
Calin Crisan
e13a4fd8c4 /etc/profile: automatically export vars from /etc/environment 2019-02-23 15:48:22 +02:00
Calin Crisan
016fe0a7f8 Merge remote-tracking branch 'thingos/dev' into dev 2019-02-22 09:48:11 +02:00
Calin Crisan
2a863ae6aa
Merge pull request #24 from ccrisan/fix-ssl-timeouts
Fix SSL timeouts
2019-02-22 09:47:19 +02:00
Calin Crisan
47e0d54de3 S50date: fix ntpdate path 2019-02-22 09:46:31 +02:00
Bernd Kuhls
633e90970f package/libopenssl: add runtime fixes for tor
For details see https://bugs.archlinux.org/task/61623

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:32:47 +02:00
Bernd Kuhls
2f2f2b9fab package/libopenssl: renumber patches
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:32:27 +02:00
Matt Weber
ebff015121 package/libopenssl: m68x use SMALL_FOOTPRINT mode
OPENSSL_SMALL_FOOTPRINT mode selects alternate paths in the sha512 and
blake2 algorithms which resolves a assembler issue like the following.

/tmp/ccfnLhKQ.s: Assembler messages:
/tmp/ccfnLhKQ.s:11167: Error: value -32790 out of range
make[2]: *** [crypto/blake2/blake2b.o] Error 1

This issue was found after the OpenSSL1.1.x bump.

Fixes
http://autobuild.buildroot.net/results/533e817695cde321b725145112cfd83c092d9d75

Upstream ticket
https://github.com/openssl/openssl/issues/8190

Signed-off-by: Matthew Weber <matthew.weber@rockwellcollins.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:31:49 +02:00
Peter Seiderer
ed98bc2fbb libopenssl: bump version to 1.1.1a
- use BR2_TOOLCHAIN_HAS_UCONTEXT
    This is used to set -DOPENSSL_NO_ASYNC if needed.

- apply the CFLAGS correctly when compiling with -Os (bugfix).

- use -latomic when needed
    This fixes the build for br-sparc-uclibc-2018.05

- don't use madvise() if no MMU
    Trying to do so results in undefined reference to madvise() as
    it is not available on uclibc without MMU.
    The original openssl code checks if a macro used in the madvise call
    is defined. The problem comes from the fact that the code in
    crypto/mem_sec.c also includes a kernel header defining the same macro
    unconditionally. Thus the check is always true in that case.
    Upstream: https://github.com/openssl/openssl/pull/8089

- don't compile test/fuzzers
    These binaries introduced with 1.1.x sometimes do not compile.
    This is the case with the br-arm-cortex-m4-full toolchain

- don't build ocsp daemon if no MMU.
    Patch from  Richard Levitte.

- correctly enable cryptodev engine
    Thanks to Arnout Vandecappelle for spotting this.

- remove all parallel build patches (openssl build-system changed)

- rebased 0001-Dont-waste-time-building-manpages-if-we-re-not-going.patch
  to apply to Configurations/unix-Makefile.tmpl (Makefile template)

- removed 0002-cryptodev-Fix-issue-with-signature-generation.patch
  (upstream applied)

- rebased 0003-Reproducible-build-do-not-leak-compiler-path.patch to
  apply to crypto/build.info (Makefile template)

- fix musl/uclibc build failure, use '-DOPENSSL_NO_ASYNC'

- remove legacy enable-tlsext configure option

- remove target/host libdir configure options, fixes openssl.pc installation
  path, fixes wget compile

- change legacy INSTALL_PREFIX to DESTDIR

- remove 'libraries gets installed read only, so strip fails'
  workaround (not needed anymore)

- change engine directory from /usr/lib/engines to
  /usr/lib/engines-1.1

- change license file hash, no license change, only the following
  hint was removed:

    Actually both licenses are BSD-style Open Source licenses.
    In case of any license issues related to OpenSSL please
    contact openssl-core@openssl.org.

Signed-off-by: Peter Seiderer <ps.report@gmx.net>
Tested-by: Ryan Coe <bluemrp9@gmail.com>
Signed-off-by: Vadim Kochan <vadim4j@gmail.com>
Signed-off-by: Patrick Havelange <patrick.havelange@essensium.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:31:28 +02:00
Joel Stanley
5d8f0d55a3 package/libopenssl: use HTTPS for URL
The host forces HTTPS regardless. This can be seen in the build logs:

 >>> host-libopenssl 1.0.2q Downloading
 URL transformed to HTTPS due to an HSTS policy
 --2018-12-10 09:53:27--  https://www.openssl.org/source/openssl-1.0.2q.tar.gz

Signed-off-by: Joel Stanley <joel@jms.id.au>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2019-02-17 20:30:30 +02:00
Peter Korsgaard
0429eaf769 libopenssl: security bump to version 1.0.2q
Fixes the following security vulnerabilities:

  *) Microarchitecture timing vulnerability in ECC scalar multiplication

     OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been
     shown to be vulnerable to a microarchitecture timing side channel attack.
     An attacker with sufficient access to mount local timing attacks during
     ECDSA signature generation could recover the private key.

     This issue was reported to OpenSSL on 26th October 2018 by Alejandro
     Cabrera Aldaya, Billy Brumley, Sohaib ul Hassan, Cesar Pereida Garcia and
     Nicola Tuveri.
     (CVE-2018-5407)
     [Billy Brumley]

  *) Timing vulnerability in DSA signature generation

     The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
     timing side channel attack. An attacker could use variations in the signing
     algorithm to recover the private key.

     This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser.
     (CVE-2018-0734)
     [Paul Dale]

For more information, see the changelog:
https://www.openssl.org/news/cl102.txt

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:30:12 +02:00
Baruch Siach
4695e4a155 openssh: add upstream security fixes
CVE-2019-6109: Due to missing character encoding in the progress
display, a malicious server (or Man-in-The-Middle attacker) can employ
crafted object names to manipulate the client output, e.g., by using
ANSI control codes to hide additional files being transferred. This
affects refresh_progress_meter() in progressmeter.c.

CVE-2019-6111: Due to the scp implementation being derived from 1983
rcp, the server chooses which files/directories are sent to the client.
However, the scp client only performs cursory validation of the object
name returned (only directory traversal attacks are prevented). A
malicious scp server (or Man-in-The-Middle attacker) can overwrite
arbitrary files in the scp client target directory. If recursive
operation (-r) is performed, the server can manipulate subdirectories as
well (for example, to overwrite the .ssh/authorized_keys file).

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:27:14 +02:00
Chris Lesiak
2fca0905f4 package/openssh: Add sysusers.d snippet
Whether using the new sysusers.d snippet, or adding an entry to
/etc/password, set the service's home directory to /var/empty.
See README.privsep included as part of the openssh distribution.

Signed-off-by: Chris Lesiak <chris.lesiak@licor.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
2019-02-17 20:27:04 +02:00
Chris Lesiak
3947269290 package/openssh: Set /var/empty permissions
The openssh privilege separation feature, enabled by default,
requires that the path /var/empty exists and has certain permissions
(not writable by the sshd user). Note that nothing ever gets writting
in this directory, so it works fine on a readonly rootfs.

See README.privsep included as part of the openssh distribution.

Signed-off-by: Chris Lesiak <chris.lesiak@licor.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
2019-02-17 20:26:59 +02:00
Baruch Siach
f24e5e1e74 package/openssh: add upstream security fix
Fixes CVE-2018-20685: The scp client allows server to modify permissions
of the target directory by using empty ("D0777 0 \n") or dot ("D0777 0
.\n") directory name.

The bug reporter lists a number of related vulnerabilities that are not
fixed yet:

  https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:26:52 +02:00
Markus Mayer
7765a29773 package/openssh: use BR2_SYSTEM_DEFAULT_PATH as default PATH
We use the configuration option $(BR2_SYSTEM_DEFAULT_PATH) to set the
default PATH in OpenSSH sessions.

$(BR2_SYSTEM_DEFAULT_PATH) is a Kconfig string. So it is already
quoted, which is exactly what we want.

Signed-off-by: Markus Mayer <mmayer@broadcom.com>
Reviewed-by: "Yann E. MORIN" <yann.morin.1998@free.fr>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
2019-02-17 20:26:39 +02:00
Baruch Siach
8db68e80cf openssh: bump to version 7.9p1
Drop patch #1. uClibc no longer includes pthreads.h indirectly.

Drop patch #2. The sys/param.h header is included indirectly through the
local includes.h header since version 6.8p1.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2019-02-17 20:25:42 +02:00
Calin Crisan
c12b5fb60b python-colibris: update to 0.4.4 2019-02-17 17:01:18 +02:00
Calin Crisan
497c90ec0e Merge remote-tracking branch 'thingos/dev' into dev 2019-02-17 16:46:08 +02:00
Calin Crisan
f28555552a S13watchdog: fix program check 2019-02-17 16:45:48 +02:00
Calin Crisan
c0b1fcff80 Merge remote-tracking branch 'thingos/dev' into dev 2019-02-17 16:28:49 +02:00
Calin Crisan
2192bdf418 S35wifi: enable wpa_supplicant verbose logging when OS_DEBUG is set 2019-02-17 16:27:14 +02:00
Calin Crisan
e8c3341369 S12udev: ignore errors on stop 2019-02-17 16:18:45 +02:00
Calin Crisan
7cd6f527bc Update motioneye 2019-02-08 22:10:50 +02:00
Calin Crisan
e5c793a425 Merge remote-tracking branch 'thingos/dev' into dev 2019-02-04 20:32:44 +02:00