<feed xmlns='http://www.w3.org/2005/Atom'>
<title>staging/dedeckeh/package/libs, branch master</title>
<subtitle>Staging tree of dedeckeh</subtitle>
<id>https://git.openwrt.org/openwrt/staging/dedeckeh/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/openwrt/staging/dedeckeh/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/dedeckeh/'/>
<updated>2023-04-29T10:33:44Z</updated>
<entry>
<title>openssl: fix low-severity CVE-2023-1255</title>
<updated>2023-04-29T10:33:44Z</updated>
<author>
<name>Eneas U de Queiroz</name>
</author>
<published>2023-04-26T11:35:23Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/dedeckeh/commit/?id=1c5cafa3ebcb6427e95f221eec3ffe27bc7a76c9'/>
<id>urn:sha1:1c5cafa3ebcb6427e95f221eec3ffe27bc7a76c9</id>
<content type='text'>
This applies commit 02ac9c94 to fix this OpenSSL Security Advisory
issued on 20th April 2023[1]:

Input buffer over-read in AES-XTS implementation on 64 bit ARM
(CVE-2023-1255)
==============================================================

Severity: Low

Issue summary: The AES-XTS cipher decryption implementation for 64 bit
ARM platform contains a bug that could cause it to read past the input
buffer, leading to a crash.

Impact summary: Applications that use the AES-XTS algorithm on the 64
bit ARM platform can crash in rare circumstances. The AES-XTS algorithm
is usually used for disk encryption.

The AES-XTS cipher decryption implementation for 64 bit ARM platform
will read past the end of the ciphertext buffer if the ciphertext size
is 4 mod 5 in 16 byte blocks, e.g. 144 bytes or 1024 bytes. If the
memory after the ciphertext buffer is unmapped, this will trigger a
crash which results in a denial of service.

If an attacker can control the size and location of the ciphertext
buffer being decrypted by an application using AES-XTS on 64 bit ARM,
the application is affected. This is fairly unlikely making this issue a
Low severity one.

1. https://www.openssl.org/news/secadv/20230420.txt

Signed-off-by: Eneas U de Queiroz &lt;cotequeiroz@gmail.com&gt;
</content>
</entry>
<entry>
<title>libpcap: update to 1.10.4</title>
<updated>2023-04-22T00:35:19Z</updated>
<author>
<name>Nick Hainke</name>
</author>
<published>2023-04-14T13:17:28Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/dedeckeh/commit/?id=b64c471b8ee3dd7ddfa3b11bf3f1414258c41c94'/>
<id>urn:sha1:b64c471b8ee3dd7ddfa3b11bf3f1414258c41c94</id>
<content type='text'>
Changes:
https://git.tcpdump.org/libpcap/blob/104271ba4a14de6743e43bcf87536786d8fddea4:/CHANGES

Signed-off-by: Nick Hainke &lt;vincent@systemli.org&gt;
</content>
</entry>
<entry>
<title>uclient: update to Git version 2023-04-13</title>
<updated>2023-04-13T18:51:05Z</updated>
<author>
<name>Matthias Schiffer</name>
</author>
<published>2023-04-13T18:51:05Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/dedeckeh/commit/?id=4f1c2e8deef10e9ca34ceff5a096e62aaa668e90'/>
<id>urn:sha1:4f1c2e8deef10e9ca34ceff5a096e62aaa668e90</id>
<content type='text'>
007d94546749 uclient: cancel state change timeout in uclient_disconnect()
644d3c7e13c6 ci: improve wolfSSL test coverage
dc54d2b544a1 tests: add certificate check against letsencrypt.org

Signed-off-by: Matthias Schiffer &lt;mschiffer@universe-factory.net&gt;
</content>
</entry>
<entry>
<title>mbedtls: Update to version 2.28.3</title>
<updated>2023-04-10T11:36:26Z</updated>
<author>
<name>Hauke Mehrtens</name>
</author>
<published>2023-04-02T22:52:52Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/dedeckeh/commit/?id=d679b15d31bd0b68dd88c3cf4d084cce02903627'/>
<id>urn:sha1:d679b15d31bd0b68dd88c3cf4d084cce02903627</id>
<content type='text'>
This only fixes minor problems.
Changelog: https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.3

The 100-fix-compile.patch patch was merged upstream, see:
https://github.com/Mbed-TLS/mbedtls/issues/6243
https://github.com/Mbed-TLS/mbedtls/pull/7013

The code style of all files in mbedtls 2.28.3 was changed. I took a new
version of the 100-x509-crt-verify-SAN-iPAddress.patch patch from this
pull request: https://github.com/Mbed-TLS/mbedtls/pull/6475

Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</content>
</entry>
<entry>
<title>libcap: update to 2.68</title>
<updated>2023-04-08T13:52:56Z</updated>
<author>
<name>Nick Hainke</name>
</author>
<published>2023-04-02T21:38:57Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/dedeckeh/commit/?id=0c53801968d9fb7f36ba855f0e6e227cabba44f2'/>
<id>urn:sha1:0c53801968d9fb7f36ba855f0e6e227cabba44f2</id>
<content type='text'>
Release Notes:
https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.vdh3d47czmle

Signed-off-by: Nick Hainke &lt;vincent@systemli.org&gt;
</content>
</entry>
<entry>
<title>openssl: fix CVE-2023-464 and CVE-2023-465</title>
<updated>2023-04-07T09:26:26Z</updated>
<author>
<name>Eneas U de Queiroz</name>
</author>
<published>2023-04-04T18:39:56Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/dedeckeh/commit/?id=c3cb2d48da781f4e254ef526e1b44ae5a68248d7'/>
<id>urn:sha1:c3cb2d48da781f4e254ef526e1b44ae5a68248d7</id>
<content type='text'>
Apply two patches fixing low-severity vulnerabilities related to
certificate policies validation:

- Excessive Resource Usage Verifying X.509 Policy Constraints
  (CVE-2023-0464)
  Severity: Low
  A security vulnerability has been identified in all supported versions
  of OpenSSL related to the verification of X.509 certificate chains
  that include policy constraints.  Attackers may be able to exploit
  this vulnerability by creating a malicious certificate chain that
  triggers exponential use of computational resources, leading to a
  denial-of-service (DoS) attack on affected systems.
  Policy processing is disabled by default but can be enabled by passing
  the `-policy' argument to the command line utilities or by calling the
  `X509_VERIFY_PARAM_set1_policies()' function.

- Invalid certificate policies in leaf certificates are silently ignored
  (CVE-2023-0465)
  Severity: Low
  Applications that use a non-default option when verifying certificates
  may be vulnerable to an attack from a malicious CA to circumvent
  certain checks.
  Invalid certificate policies in leaf certificates are silently ignored
  by OpenSSL and other certificate policy checks are skipped for that
  certificate.  A malicious CA could use this to deliberately assert
  invalid certificate policies in order to circumvent policy checking on
  the certificate altogether.
  Policy processing is disabled by default but can be enabled by passing
  the `-policy' argument to the command line utilities or by calling the
  `X509_VERIFY_PARAM_set1_policies()' function.

Note: OpenSSL also released a fix for low-severity security advisory
CVE-2023-466.  It is not included here because the fix only changes the
documentation, which is not built nor included in any OpenWrt package.

Due to the low-severity of these issues, there will be not be an
immediate new release of OpenSSL.

Signed-off-by: Eneas U de Queiroz &lt;cotequeiroz@gmail.com&gt;
</content>
</entry>
<entry>
<title>openssl: add legacy provider</title>
<updated>2023-04-05T11:24:49Z</updated>
<author>
<name>Eneas U de Queiroz</name>
</author>
<published>2023-03-10T20:53:25Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/dedeckeh/commit/?id=0dc5fc8fa53be55c3adc59055e7f6f150a5ab1ad'/>
<id>urn:sha1:0dc5fc8fa53be55c3adc59055e7f6f150a5ab1ad</id>
<content type='text'>
This adapts the engine build infrastructure to allow building providers,
and packages the legacy provider.  Providers are the successors of
engines, which have been deprecated.

The legacy provider supplies OpenSSL implementations of algorithms that
have been deemed legacy, including DES, IDEA, MDC2, SEED, and Whirlpool.

Even though these algorithms are implemented in a separate package,
their removal makes the regular library smaller by 3%, so the build
options will remain to allow lean custom builds.  Their defaults will
change to 'y' if not bulding for a small flash, so that the regular
legacy package will contain a complete set of algorithms.

The engine build and configuration structure was changed to accomodate
providers, and adapt to the new style of openssl.cnf in version 3.0.

There is not a clean upgrade path for the /etc/ssl/openssl.cnf file,
installed by the openssl-conf package.  It is recommended to rename or
remove the old config file when flashing an image with the updated
openssl-conf package, then apply the changes manually.

An old openssl.cnf file will silently work, but new engine or provider
packages will not be enabled.  Any remaining engine config files under
/etc/ssl/engines.cnf.d can be removed.

On the build side, the include file used by engine packages was renamed
to openssl-module.mk, so the engine packages in other feeds need to
adapt.

Signed-off-by: Eneas U de Queiroz &lt;cotequeiroz@gmail.com&gt;
</content>
</entry>
<entry>
<title>openssl: make UCI config aware of built-in engines</title>
<updated>2023-04-05T11:24:49Z</updated>
<author>
<name>Eneas U de Queiroz</name>
</author>
<published>2023-03-14T21:51:45Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/dedeckeh/commit/?id=0b70d55a64c39da4144cc15aa7d6de70a3957ccb'/>
<id>urn:sha1:0b70d55a64c39da4144cc15aa7d6de70a3957ccb</id>
<content type='text'>
Engines that are built into the main libcrypto OpenSSL library can't be
disabled through UCI.  Add a 'builtin' setting to signal that the engine
can't be disabled through UCI, and show a message explaining this in
case buitin=1 and enabled=0.

Signed-off-by: Eneas U de Queiroz &lt;cotequeiroz@gmail.com&gt;
</content>
</entry>
<entry>
<title>openssl: avoid OPENSSL_SMALL_FOOTPRINT, no-asm</title>
<updated>2023-04-05T11:24:49Z</updated>
<author>
<name>Eneas U de Queiroz</name>
</author>
<published>2023-03-10T20:21:11Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/dedeckeh/commit/?id=975036f6f9c8b12fbf82854ea006b4951c5be783'/>
<id>urn:sha1:975036f6f9c8b12fbf82854ea006b4951c5be783</id>
<content type='text'>
Building openssl with OPENSSL_SMALL_FOOTPRINT yelds only from 1% to 3%
decrease in size, dropping performance from 2% to 91%, depending on the
target and algorithm.

For example, using AES256-GCM with 1456-bytes operations, X86_64 appears
to be the least affected with 2% performance penalty and 1% reduction in
size; mips drops performance by 13%, size by 3%;  Arm drops 29% in
performance, 2% in size.

On aarch64, it slows down ghash so much that I consider it broken
(-91%).  SMALL_FOOTPRINT will reduce AES256-GCM performance by 88%, and
size by only 1%.  It makes an AES-capable CPU run AES128-GCM at 35% of
the speed of Chacha20-Poly1305:

Block-size=1456 bytes   AES256-GCM   AES128-GCM  ChaCha20-Poly1305
SMALL_FOOTPRINT           62014.44     65063.23          177090.50
regular                  504220.08    565630.28          182706.16

OpenSSL 1.1.1 numbers are about the same, so this should have been
noticed a long time ago.

This creates an option to use OPENSSL_SMALL_FOOTPRINT, but it is turned
off by default unless SMALL_FLASH or LOW_MEMORY_FOOTPRINT is used.

Compiling with -O3 instead of -Os, for comparison, will increase size by
about 14-15%, with no measureable effect on AES256-GCM performance, and
about 2% increase in Chacha20-Poly1305 performance on Aarch64.

There are no Arm devices with the small flash feature, so drop the
conditional default.  The package is built on phase2, so even if we
include an Arm device with small flash later, a no-asm library would
have to be built from source anyway.

Signed-off-by: Eneas U de Queiroz &lt;cotequeiroz@gmail.com&gt;
</content>
</entry>
<entry>
<title>libnl-tiny: update to the latest version</title>
<updated>2023-04-02T00:25:16Z</updated>
<author>
<name>Hauke Mehrtens</name>
</author>
<published>2023-04-02T00:24:15Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/dedeckeh/commit/?id=18d516a649175a91d334e584fac51e64ff8dd9bf'/>
<id>urn:sha1:18d516a649175a91d334e584fac51e64ff8dd9bf</id>
<content type='text'>
f5d9b7e libnl-tiny: fix duplicated branch in family.h
11b7c5f attr: add NLA_S* definitions

Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</content>
</entry>
</feed>
