aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* ramips: fix 16 bit IO on newer coresJohn Crispin2016-04-201-5/+6
| | | | | | Signed-off-by: John Crispin <blogic@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49203 3c298f89-4303-0410-b956-a3cf2f4a3e73
* ar71xx: fix nondeterministic hangs during bootconsole/console handoverRafał Miłecki2016-04-204-8/+57
| | | | | | | | | | | | | | | | | | | Reconfiguring the UART when the FIFO is not empty may cause the boot to hang. This hang is extremely suspectible to timing differences; recompiling the kernel with the same configuration, but different UTS_VERSION timestamps can yield images that hang more or less often. Sometimes images are produced that hang reproducibly. This patch should also make it into one of the next linux-stable releases, but it's better to get this fixed as soon as possible. Fixes #21773, #21857. Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net> Backport of r49156 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49202 3c298f89-4303-0410-b956-a3cf2f4a3e73
* ralink: add spi fixJohn Crispin2016-04-191-97/+7
| | | | | | | | | the fullduplex on CS1 is broken. remove the fullduplex support and run on plain half duplex on both CS lines. Signed-off-by: John Crispin <blogic@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49201 3c298f89-4303-0410-b956-a3cf2f4a3e73
* ralink: add i2c fixJohn Crispin2016-04-191-78/+59
| | | | | | | | | | there is a deadlock that triggers under heavy bus load. until the bug is fxed, revert to an old version of the I2C driver that does not suffer from this issue. Signed-off-by: John Crispin <blogic@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49200 3c298f89-4303-0410-b956-a3cf2f4a3e73
* CC: samba: fix some security problemsHauke Mehrtens2016-04-1721-46/+20105
| | | | | | | | | | | | | | | | | | Backport of r49175. This fixes the following security problems: * CVE-2015-7560 * CVE-2015-5370 * CVE-2016-2110 * CVE-2016-2111 * CVE-2016-2112 * CVE-2016-2115 * CVE-2016-2118 Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49177 3c298f89-4303-0410-b956-a3cf2f4a3e73
* mac80211: backport brcmfmac workaround for missing boardrevRafał Miłecki2016-04-162-7/+121
| | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49173 3c298f89-4303-0410-b956-a3cf2f4a3e73
* bcm53xx: backport upstream profiling and USB VCC patchesRafał Miłecki2016-04-1510-83/+145
| | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49172 3c298f89-4303-0410-b956-a3cf2f4a3e73
* bcm53xx: backport patch enabling UART on tested devicesRafał Miłecki2016-04-153-266/+192
| | | | | | | | Also rename and simpify patch enabling UART on untested ones. Signed-off-by: Rafał Miłecki <zajec5@gmail.com> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49171 3c298f89-4303-0410-b956-a3cf2f4a3e73
* bcm53xx: fix MD5 in Seama format on flash after installing OpenWrtRafał Miłecki2016-04-151-1/+1
| | | | | | | | | | We need to fix Seama just like we fix TRX due to the rootfs mark. Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Backport of r48522 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49170 3c298f89-4303-0410-b956-a3cf2f4a3e73
* mtd: enable "fixseama" on bcm53xxRafał Miłecki2016-04-151-1/+1
| | | | | | | | | | There are D-Link bcm53xx devices using Seama format. Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Backport of r48521 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49169 3c298f89-4303-0410-b956-a3cf2f4a3e73
* rpcd: update to latest versionLuka Perkov2016-04-131-4/+4
| | | | | | Signed-off-by: Luka Perkov <luka@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49163 3c298f89-4303-0410-b956-a3cf2f4a3e73
* bcm53xx: fixup 14e4:d612 device class to bridge as wellRafał Miłecki2016-04-051-1/+2
| | | | | | | | | | | | | | | | | | 14e4:d612 was found in D-Link DIR-885L and Netgear R8500. It's most likely a bridge used by all 14e4:4365 BCM4366 devices. Without this fixup device wasn't treated as a bridge: [ 2.849895] pci 0000:00:00.0: ignoring class 0x020000 (doesn't match header type 01) and didn't get its resources assigned. This resulted in child devices not being able to get any resources (due to the parrent missing them): [ 3.375428] pci 0000:01:00.0: BAR 2: no space for [mem size 0x00400000 64bit] [ 3.387949] pci 0000:01:00.0: BAR 2: failed to assign [mem size 0x00400000 64bit] [ 3.725797] pci 0000:01:00.0: BAR 0: no space for [mem size 0x00008000 64bit] [ 3.738314] pci 0000:01:00.0: BAR 0: failed to assign [mem size 0x00008000 64bit] Signed-off-by: Rafał Miłecki <zajec5@gmail.com> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49118 3c298f89-4303-0410-b956-a3cf2f4a3e73
* bcm53xx: prepare for building D-Link DIR-885L imageRafał Miłecki2016-04-041-1/+32
| | | | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Partial backport of r48606 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49117 3c298f89-4303-0410-b956-a3cf2f4a3e73
* firmware-utils: add oseama tool for creating Seama entitiesRafał Miłecki2016-04-042-0/+423
| | | | | | | | | | | | | | | It has an important feature (compared to seama) of using multiple input files, aligning them and padding zeroes until reaching a specified absolute offset. This is needed for a proper flash layout on NAND. We want kernel partition to be big enough to handle future updates without a need to resize it and wipe whole "ubi" partition. It's important as we don't want to lose block counters. Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Backport of r48601 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49116 3c298f89-4303-0410-b956-a3cf2f4a3e73
* bcm53xx: update BCM5301X patchesRafał Miłecki2016-04-048-39/+228
| | | | | | | | | This moves few upstreamed patches and adds DIR-885L dts file. Please note it doesn't mean this device is supported yet. Signed-off-by: Rafał Miłecki <zajec5@gmail.com> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49115 3c298f89-4303-0410-b956-a3cf2f4a3e73
* kernel: update kernel 3.18 to version 3.18.29Rafał Miłecki2016-03-304-8/+8
| | | | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Backport of r49096 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49097 3c298f89-4303-0410-b956-a3cf2f4a3e73
* bcm53xx: improve USB 2.0 PHY support for BCM4709 and BCM47094Rafał Miłecki2016-03-301-0/+122
| | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49095 3c298f89-4303-0410-b956-a3cf2f4a3e73
* bcm53xx: support USB 3.0 PHY on BCM4707 rev. 6 and BCM47094Rafał Miłecki2016-03-302-6/+8
| | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49093 3c298f89-4303-0410-b956-a3cf2f4a3e73
* bcm53xx: simpify USB 3.0 PHY initializationRafał Miłecki2016-03-302-75/+24
| | | | | | | | We can use one code path for BCM4707 rev. 4 and BCM53018. Signed-off-by: Rafał Miłecki <zajec5@gmail.com> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49092 3c298f89-4303-0410-b956-a3cf2f4a3e73
* ar71xx: cosmetic fix of alfa ap120c/ap96 orderingLuka Perkov2016-03-244-17/+17
| | | | | | Signed-off-by: Luka Perkov <luka@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49087 3c298f89-4303-0410-b956-a3cf2f4a3e73
* uboot-envtools: add support for ap120cLuka Perkov2016-03-231-0/+1
| | | | | | Signed-off-by: Luka Perkov <luka@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49085 3c298f89-4303-0410-b956-a3cf2f4a3e73
* ar71xx: add support for ap120cLuka Perkov2016-03-237-7/+184
| | | | | | Signed-off-by: Luka Perkov <luka@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49084 3c298f89-4303-0410-b956-a3cf2f4a3e73
* CC: version.mk and image-config.in: adjust to 15.05.1John Crispin2016-03-202-2/+2
| | | | | | | | | | | | | | | | | | * Adjust the default version number in include/version.mk to 15.05.1 * Copy the correct download repo location from include/version.mk to base-files/image-config.in After the change to version.mk, new builds made from CC sources will have opkg config that downloads from the recent 15.05.1 packages repo instead of the ancient 15.05 packages repo. The change to image-config.in ensures that if somebody uses VERSIONOPT config options in .config, he will get the correct download repo address (instead of trunk snapshots). Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49053 3c298f89-4303-0410-b956-a3cf2f4a3e73
* ar71xx: change some TP-link modelnames (WR841, WA701, WA730)John Crispin2016-03-201-10/+10
| | | | | | | | | | | | | | | | | This patch changes the image-name of some TPlink-routers. Esp. for the TPlink WR841N + WR841ND some users are confused by the fact that some images have "nd"-names and others "n"-names only. In addition this also corrects a missed "D" on WA701 and a "-" for WA730RE. backport to CC of r48767 'http://git.openwrt.org/?p=openwrt.git;a=commit;h=dbd0ab83566291e3b4974f4d4289bb7c93b091d6' r48768 'http://git.openwrt.org/?p=openwrt.git;a=commit;h=656a17c77d530b14355e8fef4a83265ee2c3271d' r48769 'http://git.openwrt.org/?p=openwrt.git;a=commit;h=783756e3096a417565d58d78e082a29db10738d4' Signed-off-by: Sven Roederer <devel-sven@geroedel.de> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49052 3c298f89-4303-0410-b956-a3cf2f4a3e73
* CC: linux-firmware: fix rt73-usb-firmware packageHauke Mehrtens2016-03-191-2/+2
| | | | | | | | | | | | | | | | Backport of r49037 Some parts of this package were named rt73-pci-firmware before which looks like a copy and past error. This renames all parts to rt73-usb- firmware and then the firmware gets build and the dependencies from the package with the kernel module are also working correctly. This fixes #22069 Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49038 3c298f89-4303-0410-b956-a3cf2f4a3e73
* brcm47xx: image: create standard TRX images using new building systemRafał Miłecki2016-03-111-9/+20
| | | | | | | | | | | | | | | | | | | | | | | | | | Apart from using our new building system there are 2 more changes: 1) Limit amount of images So far we were generating all standard images (optimized one and two with no loader) for every SUBTARGET. This is not needed, as e.g. the only device requiring gzipped kernel is legacy Huawei E970. 2) Change output names The new image building system requires specifying device name. This forced picking some and resulted in: openwrt-brcm47xx-$(SUBTARGET)-squashfs.trx openwrt-brcm47xx-$(SUBTARGET)-squashfs-gz.trx openwrt-brcm47xx-$(SUBTARGET)-squashfs-noloader-nodictionary.trx becoming: openwrt-brcm47xx-$(SUBTARGET)-standard-squashfs.trx openwrt-brcm47xx-$(SUBTARGET)-standard-noloader-gz-squashfs.trx openwrt-brcm47xx-$(SUBTARGET)-standard-noloader-nodictionarylzma-squashfs.trx Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Backport of r49006 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49007 3c298f89-4303-0410-b956-a3cf2f4a3e73
* mac80211: backport brcmfmac fixes for WARNING and BCM4360 initRafał Miłecki2016-03-112-0/+103
| | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49004 3c298f89-4303-0410-b956-a3cf2f4a3e73
* brcm47xx: image: move disabled devices to the new building systemRafał Miłecki2016-03-111-13/+3
| | | | | | | | | | | This only drops WGR614 V9 which has 2 MiB flash and it's unlikely to get any interest. Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Backport of r48975 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49003 3c298f89-4303-0410-b956-a3cf2f4a3e73
* brcm47xx: image: switch Linksys WRT54G3GV2-VF to the new building systemRafał Miłecki2016-03-111-41/+28
| | | | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Backport of r48974 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49002 3c298f89-4303-0410-b956-a3cf2f4a3e73
* brcm47xx: image: switch Netgear WGT634U to the new building systemRafał Miłecki2016-03-111-6/+13
| | | | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Backport of r48973 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49001 3c298f89-4303-0410-b956-a3cf2f4a3e73
* brcm47xx: image: switch rest of 64k block devices to the new building systemRafał Miłecki2016-03-111-28/+45
| | | | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Backport of r48972 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@49000 3c298f89-4303-0410-b956-a3cf2f4a3e73
* brcm47xx: image: switch Motorola devices to the new building systemRafał Miłecki2016-03-111-7/+22
| | | | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Backport of r48971 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48999 3c298f89-4303-0410-b956-a3cf2f4a3e73
* brcm47xx: image: switch D-Link DWL-3150 to the new building systemRafał Miłecki2016-03-111-7/+13
| | | | | | | | Signed-off-by: Rafał Miłecki <zajec5@gmail.com> Backport of r48970 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48998 3c298f89-4303-0410-b956-a3cf2f4a3e73
* kernel: rework bcm47xx backport, fix build errors on the brcm47xx target ↵Felix Fietkau2016-03-052-52/+49
| | | | | | | | (#21974) Signed-off-by: Felix Fietkau <nbd@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48925 3c298f89-4303-0410-b956-a3cf2f4a3e73
* CC: curl: detect the library as renamed wolfsslHauke Mehrtens2016-03-032-1/+102
| | | | | | | | | | Without this patch curl does not detect the new cyassl/wolfssl version and would be build without ssl support instead when cyassl was selected. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48900 3c298f89-4303-0410-b956-a3cf2f4a3e73
* mac80211: improve rate control performanceFelix Fietkau2016-03-031-0/+77
| | | | | | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org> Backport of r48897 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48899 3c298f89-4303-0410-b956-a3cf2f4a3e73
* mt76: update to the latest version, adds stability fixesFelix Fietkau2016-03-031-2/+2
| | | | | | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org> Backport of r48895 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48898 3c298f89-4303-0410-b956-a3cf2f4a3e73
* CC: kernel: update kernel 3.18 to version 3.18.27Hauke Mehrtens2016-03-0339-311/+132
| | | | | | | | | | | | | Changelog: * https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.24 * https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.25 * https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.26 * https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.27 Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48896 3c298f89-4303-0410-b956-a3cf2f4a3e73
* ramips: EX2700: remove unused kernel modulesJohn Crispin2016-03-031-1/+2
| | | | | | | | | | | Remove the kmod-mt76 package from the EX2700 profile to free up around 100 KiB of space on the root filesystem. This patch applies to both trunk and Chaos Calmer. Signed-off-by: Joseph C. Lehner <joseph.c.lehner@gmail.com> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48887 3c298f89-4303-0410-b956-a3cf2f4a3e73
* mac80211: add a number of pending fixesFelix Fietkau2016-03-025-0/+180
| | | | | | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org> Backport of r48883 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48884 3c298f89-4303-0410-b956-a3cf2f4a3e73
* mac80211/hostapd: rework 802.11w driver support selection, do not hardcode ↵Felix Fietkau2016-03-022-1/+5
| | | | | | | | | | drivers in hostapd makefile Signed-off-by: Felix Fietkau <nbd@openwrt.org> Backport of r46903 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48878 3c298f89-4303-0410-b956-a3cf2f4a3e73
* CC: cyassl: disable Intel ASM for nowJo-Philipp Wich2016-03-021-8/+8
| | | | | | | | | | With ASM support enabled, CyaSSL fails to build on all x86 subtargets. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> Backport of r48876 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48877 3c298f89-4303-0410-b956-a3cf2f4a3e73
* curl: bump pkg revisionJo-Philipp Wich2016-03-021-2/+2
| | | | | | Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48875 3c298f89-4303-0410-b956-a3cf2f4a3e73
* CC: cyassl: update to wolfssl version 3.8.0 to fix security problemsHauke Mehrtens2016-03-015-39/+47
| | | | | | | | | | | | | | | | | Backport of: r46167: cyassl: version bump to 3.4.6 r46168: cyassl: update to wolfssl 3.6.0 r46551: cyassl: the upstream package in version 4.6.0 changed r47791: cyassl: update to wolfSSL version 3.7.0 This version and version 3.6.8 are fixing the following security problems: * CVE-2015-7744 * CVE-2015-6925 r48616: cyassl: update to wolfssl version 3.8.0 Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48873 3c298f89-4303-0410-b956-a3cf2f4a3e73
* CC: curl: fix CVE-2016-0755Hauke Mehrtens2016-03-011-0/+126
| | | | | | | | | | | | | This fixes the following security problem: CVE-2016-0755: NTLM credentials not-checked for proxy connection re-use http://curl.haxx.se/docs/adv_20160127B.html backport of r48614. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48872 3c298f89-4303-0410-b956-a3cf2f4a3e73
* CC: bcm53xx: make patches apply againHauke Mehrtens2016-03-011-6/+8
| | | | | | | | | | Commit r48849 changed the drivers/mtd/spi-nor/spi-nor.c file and broke this patch in bcm53xx. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48871 3c298f89-4303-0410-b956-a3cf2f4a3e73
* iw: update to version 4.3, sync with trunk r47782Felix Fietkau2016-03-018-672/+603
| | | | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48870 3c298f89-4303-0410-b956-a3cf2f4a3e73
* CC: openssl: update to 1.0.2g (8 CVEs)Jo-Philipp Wich2016-03-014-15/+15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CVE-2016-0704 s2_srvr.c overwrite the wrong bytes in the master-key when applying Bleichenbacher protection for export cipher suites. This provides a Bleichenbacher oracle, and could potentially allow more efficient variants of the DROWN attack. CVE-2016-0703 s2_srvr.c did not enforce that clear-key-length is 0 for non-export ciphers. If clear-key bytes are present for these ciphers, they *displace* encrypted-key bytes. This leads to an efficient divide-and-conquer key recovery attack: if an eavesdropper has intercepted an SSLv2 handshake, they can use the server as an oracle to determine the SSLv2 master-key, using only 16 connections to the server and negligible computation. More importantly, this leads to a more efficient version of DROWN that is effective against non-export ciphersuites, and requires no significant computation. CVE-2016-0702 A side-channel attack was found which makes use of cache-bank conflicts on the Intel Sandy-Bridge microarchitecture which could lead to the recovery of RSA keys. The ability to exploit this issue is limited as it relies on an attacker who has control of code in a thread running on the same hyper- threaded core as the victim thread which is performing decryptions. CVE-2016-0799 The internal |fmtstr| function used in processing a "%s" format string in the BIO_*printf functions could overflow while calculating the length of a string and cause an OOB read when printing very long strings. Additionally the internal |doapr_outch| function can attempt to write to an OOB memory location (at an offset from the NULL pointer) in the event of a memory allocation failure. In 1.0.2 and below this could be caused where the size of a buffer to be allocated is greater than INT_MAX. E.g. this could be in processing a very long "%s" format string. Memory leaks can also occur. The first issue may mask the second issue dependent on compiler behaviour. These problems could enable attacks where large amounts of untrusted data is passed to the BIO_*printf functions. If applications use these functions in this way then they could be vulnerable. OpenSSL itself uses these functions when printing out human-readable dumps of ASN.1 data. Therefore applications that print this data could be vulnerable if the data is from untrusted sources. OpenSSL command line applications could also be vulnerable where they print out ASN.1 data, or if untrusted data is passed as command line arguments. Libssl is not considered directly vulnerable. Additionally certificates etc received via remote connections via libssl are also unlikely to be able to trigger these issues because of message size limits enforced within libssl. CVE-2016-0797 In the BN_hex2bn function the number of hex digits is calculated using an int value |i|. Later |bn_expand| is called with a value of |i * 4|. For large values of |i| this can result in |bn_expand| not allocating any memory because |i * 4| is negative. This can leave the internal BIGNUM data field as NULL leading to a subsequent NULL ptr deref. For very large values of |i|, the calculation |i * 4| could be a positive value smaller than |i|. In this case memory is allocated to the internal BIGNUM data field, but it is insufficiently sized leading to heap corruption. A similar issue exists in BN_dec2bn. This could have security consequences if BN_hex2bn/BN_dec2bn is ever called by user applications with very large untrusted hex/dec data. This is anticipated to be a rare occurrence. All OpenSSL internal usage of these functions use data that is not expected to be untrusted, e.g. config file data or application command line arguments. If user developed applications generate config file data based on untrusted data then it is possible that this could also lead to security consequences. This is also anticipated to be rare. CVE-2016-0798 The SRP user database lookup method SRP_VBASE_get_by_user had confusing memory management semantics; the returned pointer was sometimes newly allocated, and sometimes owned by the callee. The calling code has no way of distinguishing these two cases. Specifically, SRP servers that configure a secret seed to hide valid login information are vulnerable to a memory leak: an attacker connecting with an invalid username can cause a memory leak of around 300 bytes per connection. Servers that do not configure SRP, or configure SRP but do not configure a seed are not vulnerable. In Apache, the seed directive is known as SSLSRPUnknownUserSeed. To mitigate the memory leak, the seed handling in SRP_VBASE_get_by_user is now disabled even if the user has configured a seed. Applications are advised to migrate to SRP_VBASE_get1_by_user. However, note that OpenSSL makes no strong guarantees about the indistinguishability of valid and invalid logins. In particular, computations are currently not carried out in constant time. CVE-2016-0705 A double free bug was discovered when OpenSSL parses malformed DSA private keys and could lead to a DoS attack or memory corruption for applications that receive DSA private keys from untrusted sources. This scenario is considered rare. CVE-2016-0800 A cross-protocol attack was discovered that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle. Note that traffic between clients and non- vulnerable servers can be decrypted provided another server supporting SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP or POP) shares the RSA keys of the non-vulnerable server. This vulnerability is known as DROWN (CVE-2016-0800). Recovering one session key requires the attacker to perform approximately 2^50 computation, as well as thousands of connections to the affected server. A more efficient variant of the DROWN attack exists against unpatched OpenSSL servers using versions that predate 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf released on 19/Mar/2015 (see CVE-2016-0703 below). Users can avoid this issue by disabling the SSLv2 protocol in all their SSL/TLS servers, if they've not done so already. Disabling all SSLv2 ciphers is also sufficient, provided the patches for CVE-2015-3197 (fixed in OpenSSL 1.0.1r and 1.0.2f) have been deployed. Servers that have not disabled the SSLv2 protocol, and are not patched for CVE-2015-3197 are vulnerable to DROWN even if all SSLv2 ciphers are nominally disabled, because malicious clients can force the use of SSLv2 with EXPORT ciphers. OpenSSL 1.0.2g and 1.0.1s deploy the following mitigation against DROWN: SSLv2 is now by default disabled at build-time. Builds that are not configured with "enable-ssl2" will not support SSLv2. Even if "enable-ssl2" is used, users who want to negotiate SSLv2 via the version-flexible SSLv23_method() will need to explicitly call either of: SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv2); or SSL_clear_options(ssl, SSL_OP_NO_SSLv2); as appropriate. Even if either of those is used, or the application explicitly uses the version-specific SSLv2_method() or its client or server variants, SSLv2 ciphers vulnerable to exhaustive search key recovery have been removed. Specifically, the SSLv2 40-bit EXPORT ciphers, and SSLv2 56-bit DES are no longer available. In addition, weak ciphers in SSLv3 and up are now disabled in default builds of OpenSSL. Builds that are not configured with "enable-weak-ssl-ciphers" will not provide any "EXPORT" or "LOW" strength ciphers. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> Backport of r48868. git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48869 3c298f89-4303-0410-b956-a3cf2f4a3e73
* CC: toolchain: use latest glibc 2.21 revisionJohn Crispin2016-03-013-8/+12
| | | | | | | | | Fixes "CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflow" Signed-off-by: Michael Marley <michael@michaelmarley.com> git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48864 3c298f89-4303-0410-b956-a3cf2f4a3e73
* kernel: add Realtek USB to Ethernet modulesJohn Crispin2016-03-011-0/+30
| | | | | | | | | | https://forum.openwrt.org/viewtopic.php?pid=279394 Signed-off-by: Dirk Neukirchen <dirkneukirchen@web.de> Backport of r46031 git-svn-id: svn://svn.openwrt.org/openwrt/branches/chaos_calmer@48863 3c298f89-4303-0410-b956-a3cf2f4a3e73