<feed xmlns='http://www.w3.org/2005/Atom'>
<title>mtk-20170518/package/libs, branch v17.01.4</title>
<subtitle>MTK 20170518 : Mediatek SDK based on OpenWRT Barrier Breaker</subtitle>
<link rel='alternate' type='text/html' href='http://www.chd.sx/cgit/mtk-20170518/'/>
<entry>
<title>mbedtls: update to 2.6.0 CVE-2017-14032</title>
<updated>2017-09-30T13:24:52+00:00</updated>
<author>
<name>Kevin Darbyshire-Bryant</name>
<email>kevin@darbyshire-bryant.me.uk</email>
</author>
<published>2017-09-01T18:04:29+00:00</published>
<link rel='alternate' type='text/html' href='http://www.chd.sx/cgit/mtk-20170518/commit/?id=e232c6754d6e0cbde3892aa1fa243f4707d7ad5e'/>
<id>e232c6754d6e0cbde3892aa1fa243f4707d7ad5e</id>
<content type='text'>
Fixed an authentication bypass issue in SSL/TLS. When the TLS
authentication mode was set to 'optional',
mbedtls_ssl_get_verify_result() would incorrectly return 0 when the
peer's X.509 certificate chain had more than
MBEDTLS_X509_MAX_INTERMEDIATE_CA intermediates (default: 8), even when
it was not trusted. This could be triggered remotely on both the client
and server side. (Note, with the authentication mode set by
mbedtls_ssl_conf_authmode()to be 'required' (the default), the handshake
was correctly aborted).

Signed-off-by: Kevin Darbyshire-Bryant &lt;kevin@darbyshire-bryant.me.uk&gt;
Tested-by: Magnus Kroken &lt;mkroken@gmail.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fixed an authentication bypass issue in SSL/TLS. When the TLS
authentication mode was set to 'optional',
mbedtls_ssl_get_verify_result() would incorrectly return 0 when the
peer's X.509 certificate chain had more than
MBEDTLS_X509_MAX_INTERMEDIATE_CA intermediates (default: 8), even when
it was not trusted. This could be triggered remotely on both the client
and server side. (Note, with the authentication mode set by
mbedtls_ssl_conf_authmode()to be 'required' (the default), the handshake
was correctly aborted).

Signed-off-by: Kevin Darbyshire-Bryant &lt;kevin@darbyshire-bryant.me.uk&gt;
Tested-by: Magnus Kroken &lt;mkroken@gmail.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>uclient: update to 2017-09-06</title>
<updated>2017-09-06T13:48:05+00:00</updated>
<author>
<name>Matthias Schiffer</name>
<email>mschiffer@universe-factory.net</email>
</author>
<published>2017-09-06T13:44:14+00:00</published>
<link rel='alternate' type='text/html' href='http://www.chd.sx/cgit/mtk-20170518/commit/?id=bb6a8b2cbf55759ef383e52216aa96dfef377f76'/>
<id>bb6a8b2cbf55759ef383e52216aa96dfef377f76</id>
<content type='text'>
24d6eded73de uclient-http: fix Host: header for literal IPv6 addresses
83ce236dab86 uclient-fetch: read_data_cb: fix a potential buffer overflow

Signed-off-by: Matthias Schiffer &lt;mschiffer@universe-factory.net&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
24d6eded73de uclient-http: fix Host: header for literal IPv6 addresses
83ce236dab86 uclient-fetch: read_data_cb: fix a potential buffer overflow

Signed-off-by: Matthias Schiffer &lt;mschiffer@universe-factory.net&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>mbedtls: Re-allow SHA1-signed certificates</title>
<updated>2017-08-11T18:45:28+00:00</updated>
<author>
<name>Baptiste Jonglez</name>
<email>git@bitsofnetworks.org</email>
</author>
<published>2017-07-30T15:57:37+00:00</published>
<link rel='alternate' type='text/html' href='http://www.chd.sx/cgit/mtk-20170518/commit/?id=3e35eb13ada3b87e87cd108f9d459b9484446e9c'/>
<id>3e35eb13ada3b87e87cd108f9d459b9484446e9c</id>
<content type='text'>
Since mbedtls 2.5.1, SHA1 has been disallowed in TLS certificates.
This breaks openvpn clients that try to connect to servers that
present a TLS certificate signed with SHA1, which is fairly common.

Run-tested with openvpn-mbedtls 2.4.3, LEDE 17.01.2, on ar71xx.

Fixes: FS#942

Signed-off-by: Baptiste Jonglez &lt;git@bitsofnetworks.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Since mbedtls 2.5.1, SHA1 has been disallowed in TLS certificates.
This breaks openvpn clients that try to connect to servers that
present a TLS certificate signed with SHA1, which is fairly common.

Run-tested with openvpn-mbedtls 2.4.3, LEDE 17.01.2, on ar71xx.

Fixes: FS#942

Signed-off-by: Baptiste Jonglez &lt;git@bitsofnetworks.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>mbedtls: update to 2.5.1</title>
<updated>2017-06-26T07:57:11+00:00</updated>
<author>
<name>Magnus Kroken</name>
<email>mkroken@gmail.com</email>
</author>
<published>2017-06-21T19:05:09+00:00</published>
<link rel='alternate' type='text/html' href='http://www.chd.sx/cgit/mtk-20170518/commit/?id=73e81a8318d1038cbcb2ad788bf8d956f338f587'/>
<id>73e81a8318d1038cbcb2ad788bf8d956f338f587</id>
<content type='text'>
Fixes some security issues (no remote exploits), and introduces
some changes. See release notes for details:
https://tls.mbed.org/tech-updates/releases/mbedtls-2.5.1-2.1.8-and-1.3.20-released

* Fixes an unlimited overread of heap-based buffers in mbedtls_ssl_read()
* Adds exponent blinding to RSA private operations
* Wipes stack buffers in RSA private key operations (rsa_rsaes_pkcs1_v15_decrypt(), rsa_rsaes_oaep_decrypt())
* Removes SHA-1 and RIPEMD-160 from the default hash algorithms for certificate verification.
* Fixes offset in FALLBACK_SCSV parsing that caused TLS server to fail to detect it sometimes.
* Tighten parsing of RSA PKCS#1 v1.5 signatures, to avoid a potential Bleichenbacher/BERserk-style attack.

Signed-off-by: Magnus Kroken &lt;mkroken@gmail.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fixes some security issues (no remote exploits), and introduces
some changes. See release notes for details:
https://tls.mbed.org/tech-updates/releases/mbedtls-2.5.1-2.1.8-and-1.3.20-released

* Fixes an unlimited overread of heap-based buffers in mbedtls_ssl_read()
* Adds exponent blinding to RSA private operations
* Wipes stack buffers in RSA private key operations (rsa_rsaes_pkcs1_v15_decrypt(), rsa_rsaes_oaep_decrypt())
* Removes SHA-1 and RIPEMD-160 from the default hash algorithms for certificate verification.
* Fixes offset in FALLBACK_SCSV parsing that caused TLS server to fail to detect it sometimes.
* Tighten parsing of RSA PKCS#1 v1.5 signatures, to avoid a potential Bleichenbacher/BERserk-style attack.

Signed-off-by: Magnus Kroken &lt;mkroken@gmail.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>openssl: Use mkhash for STAMP_CONFIGURED</title>
<updated>2017-04-22T10:43:51+00:00</updated>
<author>
<name>Florian Fainelli</name>
<email>f.fainelli@gmail.com</email>
</author>
<published>2017-03-01T18:48:32+00:00</published>
<link rel='alternate' type='text/html' href='http://www.chd.sx/cgit/mtk-20170518/commit/?id=72fcdb6286ad7be24296acbd36043ee3e96e5ec4'/>
<id>72fcdb6286ad7be24296acbd36043ee3e96e5ec4</id>
<content type='text'>
The current way of creating a STAMP_CONFIGURED filename for OpenSSL can
lead to an extremely long filename that makes touch unable to create it,
and fail the build.

Use mkhash to produce a hash against OPENSSL_OPTIONS which creates a
shortert stamp file,

Fixes #572

Signed-off-by: Florian Fainelli &lt;f.fainelli@gmail.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The current way of creating a STAMP_CONFIGURED filename for OpenSSL can
lead to an extremely long filename that makes touch unable to create it,
and fail the build.

Use mkhash to produce a hash against OPENSSL_OPTIONS which creates a
shortert stamp file,

Fixes #572

Signed-off-by: Florian Fainelli &lt;f.fainelli@gmail.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>libubox: fix host build on macOS</title>
<updated>2017-04-08T12:49:05+00:00</updated>
<author>
<name>Felix Fietkau</name>
<email>nbd@nbd.name</email>
</author>
<published>2017-02-20T11:32:45+00:00</published>
<link rel='alternate' type='text/html' href='http://www.chd.sx/cgit/mtk-20170518/commit/?id=5866ff8be8ef961cf17c4469f5afb54f91570b95'/>
<id>5866ff8be8ef961cf17c4469f5afb54f91570b95</id>
<content type='text'>
Use the defaults instead of a custom non-portable Host/Install section

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Use the defaults instead of a custom non-portable Host/Install section

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>libubox: add host build</title>
<updated>2017-04-08T12:48:55+00:00</updated>
<author>
<name>Jo-Philipp Wich</name>
<email>jo@mein.io</email>
</author>
<published>2017-02-17T09:49:14+00:00</published>
<link rel='alternate' type='text/html' href='http://www.chd.sx/cgit/mtk-20170518/commit/?id=293c54c5677cb7db21a53df7fae0a1fd2f663b04'/>
<id>293c54c5677cb7db21a53df7fae0a1fd2f663b04</id>
<content type='text'>
Our opkg fork requires libubox to build, so add a host build for it.

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Our opkg fork requires libubox to build, so add a host build for it.

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>mbedtls: update to version 2.4.2</title>
<updated>2017-03-13T21:35:48+00:00</updated>
<author>
<name>Hauke Mehrtens</name>
<email>hauke@hauke-m.de</email>
</author>
<published>2017-03-13T19:04:32+00:00</published>
<link rel='alternate' type='text/html' href='http://www.chd.sx/cgit/mtk-20170518/commit/?id=c4ed92ae7d9568b42490eeba540e68684c6ed981'/>
<id>c4ed92ae7d9568b42490eeba540e68684c6ed981</id>
<content type='text'>
This fixes the following security problems:
* CVE-2017-2784: Freeing of memory allocated on stack when validating a public key with a secp224k1 curve
* SLOTH vulnerability
* Denial of Service through Certificate Revocation List

Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This fixes the following security problems:
* CVE-2017-2784: Freeing of memory allocated on stack when validating a public key with a secp224k1 curve
* SLOTH vulnerability
* Denial of Service through Certificate Revocation List

Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>libpcap: add optional netfilter support</title>
<updated>2017-03-01T19:37:37+00:00</updated>
<author>
<name>Martin Schiller</name>
<email>mschiller@tdt.de</email>
</author>
<published>2017-02-20T05:27:41+00:00</published>
<link rel='alternate' type='text/html' href='http://www.chd.sx/cgit/mtk-20170518/commit/?id=87e021e6e3eecb8dcaf1e38d5f63264629696743'/>
<id>87e021e6e3eecb8dcaf1e38d5f63264629696743</id>
<content type='text'>
This is needed to use the nflog interface with tcpdump

Signed-off-by: Martin Schiller &lt;mschiller@tdt.de&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This is needed to use the nflog interface with tcpdump

Signed-off-by: Martin Schiller &lt;mschiller@tdt.de&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>mbedtls: add --function-sections and --data-sections to CFLAGS</title>
<updated>2017-03-01T19:37:37+00:00</updated>
<author>
<name>Felix Fietkau</name>
<email>nbd@nbd.name</email>
</author>
<published>2017-02-21T13:33:14+00:00</published>
<link rel='alternate' type='text/html' href='http://www.chd.sx/cgit/mtk-20170518/commit/?id=2e8545333a356a413c44fd8c673039807b780c42'/>
<id>2e8545333a356a413c44fd8c673039807b780c42</id>
<content type='text'>
This allows binaries that links these libraries statically to be reduced
by using --gc-sections on link

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This allows binaries that links these libraries statically to be reduced
by using --gc-sections on link

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</pre>
</div>
</content>
</entry>
</feed>
