<feed xmlns='http://www.w3.org/2005/Atom'>
<title>staging/mkresin/tools, branch master</title>
<subtitle>Staging tree of Mathias Kresin</subtitle>
<id>https://git.openwrt.org/openwrt/staging/mkresin/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/openwrt/staging/mkresin/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/'/>
<updated>2022-04-27T18:29:37Z</updated>
<entry>
<title>firmware-utils: bump to git HEAD</title>
<updated>2022-04-27T18:29:37Z</updated>
<author>
<name>Sander Vanheule</name>
</author>
<published>2022-04-27T15:27:28Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=0f207ade12fdfffae3554c6a7214aa670a8d6854'/>
<id>urn:sha1:0f207ade12fdfffae3554c6a7214aa670a8d6854</id>
<content type='text'>
Includes image support for new TP-Link devices:

  ddc3e00e314d tplink-safeloader: add TP-Link EAP265 HD support
  ceea1a7fe56e tplink-safeloader: add TP-Link Deco M4R v1 and v2 support

Signed-off-by: Sander Vanheule &lt;sander@svanheule.net&gt;
</content>
</entry>
<entry>
<title>firmware-utils: bump to git HEAD</title>
<updated>2022-04-23T19:58:46Z</updated>
<author>
<name>Hauke Mehrtens</name>
</author>
<published>2022-04-23T19:57:09Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=36790ca6940b84dede450c54df9f75500454b92b'/>
<id>urn:sha1:36790ca6940b84dede450c54df9f75500454b92b</id>
<content type='text'>
05fd700 tplink-safeloader: TP-Link RE650 v2 support

Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</content>
</entry>
<entry>
<title>mtools: update to version 4.0.39</title>
<updated>2022-04-15T00:18:28Z</updated>
<author>
<name>Daniel Golle</name>
</author>
<published>2022-04-15T00:15:26Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=08ebc3881d3f351d2d4ca9202ca446c96b38a1e1'/>
<id>urn:sha1:08ebc3881d3f351d2d4ca9202ca446c96b38a1e1</id>
<content type='text'>
Improvements since the 4.0.38 release are:
 - Rename strtoi to strosi (string to signed int). The strtoi
   function on BSD does something else (returns an intmax, not
   an int)

Signed-off-by: Daniel Golle &lt;daniel@makrotopia.org&gt;
</content>
</entry>
<entry>
<title>tools/meson: update to 0.61.4</title>
<updated>2022-04-09T13:56:04Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2022-03-16T23:18:07Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=19f3fcc884cab348cfba823f1175baf7aa4de15f'/>
<id>urn:sha1:19f3fcc884cab348cfba823f1175baf7aa4de15f</id>
<content type='text'>
Override python to use the one in host instead of hostpkg. There's no
need to use the latter.

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
</content>
</entry>
<entry>
<title>tools/cmake: fix download url</title>
<updated>2022-04-09T13:56:04Z</updated>
<author>
<name>leo chung</name>
</author>
<published>2022-03-31T02:58:29Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=56f091d4677feb693d37959a3fa4af845dcce82e'/>
<id>urn:sha1:56f091d4677feb693d37959a3fa4af845dcce82e</id>
<content type='text'>
fix the cmake.org download url

Signed-off-by: leo chung &lt;gewalalb@gmail.com&gt;
</content>
</entry>
<entry>
<title>tools: SOURCE_DATE_EPOCH handling for mkfs.fat</title>
<updated>2022-03-30T23:56:34Z</updated>
<author>
<name>Paul Spooren</name>
</author>
<published>2022-03-30T22:36:38Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=5959c4645605ae759a331b6b700f2d9bf8547705'/>
<id>urn:sha1:5959c4645605ae759a331b6b700f2d9bf8547705</id>
<content type='text'>
Backport upstream patch to have reproducible FAT signatures.
This should enable reproducibility for x86 EFI images.

Signed-off-by: Paul Spooren &lt;mail@aparcar.org&gt;
</content>
</entry>
<entry>
<title>tools/zlib: bump to latest stable release 1.2.12 (CVE-2018-25032)</title>
<updated>2022-03-28T07:27:56Z</updated>
<author>
<name>Petr Štetiar</name>
</author>
<published>2022-03-28T06:43:41Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=9d8f620679df7f6f58ba1452311400da088a404b'/>
<id>urn:sha1:9d8f620679df7f6f58ba1452311400da088a404b</id>
<content type='text'>
List of changes since previous release from 2018 is quite long:

 * Fix crc32.c to compile local functions only if used.
 * Check for cc masquerading as gcc or clang in configure.
 * Remove destructive aspects of make distclean.
 * Separate out address sanitizing from warnings in configure.
 * Eliminate use of ULL constants.
 * Add fallthrough comments for gcc.
 * Clean up minizip to reduce warnings for testing.
 * Fix unztell64() in minizip to work past 4GB. (Daniël Hörchner)
 * minizip warning fix if MAXU32 already defined. (gvollant)
 * Replace black/white with allow/block. (theresa-m)
 * Fix indentation in minizip's zip.c.
 * Improve portability of contrib/minizip.
 * Correct typo in blast.c.
 * Change macro name in inflate.c to avoid collision in VxWorks.
 * Clarify gz* function interfaces, referring to parameter names.
 * Fix error in comment on the polynomial representation of a byte.
 * Fix memory leak on error in gzlog.c.
 * Avoid adding empty gzip member after gzflush with Z_FINISH.
 * Explicitly note that the 32-bit check values are 32 bits.
 * Use ARM crc32 instructions if the ARM architecture has them.
 * Add use of the ARMv8 crc32 instructions when requested.
 * Correct comment in crc32.c.
 * Don't bother computing check value after successful inflateSync().
 * Use atomic test and set, if available, for dynamic CRC tables.
 * Speed up software CRC-32 computation by a factor of 1.5 to 3.
 * Add crc32_combine_gen() and crc32_combine_op() for fast combines.
 * Add tables for crc32_combine(), to speed it up by a factor of 200.
 * Fix the zran.c example to work on a multiple-member gzip file.
 * Add gznorm.c example, which normalizes gzip files.
 * Show all the codes for the maximum tables size in enough.c.
 * Clarify that prefix codes are counted in enough.c.
 * Use inline function instead of macro for index in enough.c.
 * Clean up code style in enough.c, update version.
 * Use a macro for the printf format of big_t in enough.c.
 * Use a structure to make globals in enough.c evident.
 * Assure that the number of bits for deflatePrime() is valid.
 * Fix a bug that can crash deflate on some input when using Z_FIXED.
 * Correct the initialization requirements for deflateInit2().
 * Emphasize the need to continue decompressing gzip members.
 * Add legal disclaimer to README.
 * Fix deflateEnd() to not report an error at start of raw deflate.
 * Remove old assembler code in which bugs have manifested.
 * Make the names in functions declarations identical to definitions.
 * Avoid an undefined behavior of memcpy() in _tr_stored_block().
 * Avoid undefined behaviors of memcpy() in gz*printf().
 * Avoid an undefined behavior of memcpy() in gzappend().
 * Avoid the use of ptrdiff_t.
 * Handle case where inflateSync used when header never processed.
 * Don't compute check value for raw inflate if asked to validate.
 * Add address checking in clang to -w option of configure.
 * Return an error if the gzputs string length can't fit in an int.
 * Small speedup to inflate [psumbera].
 * Update use of errno for newer Windows CE versions.
 * Avoid some conversion warnings in gzread.c and gzwrite.c.
 * Have Makefile return non-zero error code on test failure.
 * Avoid a conversion error in gzseek when off_t type too small.
 * Fix CLEAR_HASH macro to be usable as a single statement.
 * Fix bug when window full in deflate_stored().
 * Limit hash table inserts after switch from stored deflate.
 * Permit a deflateParams() parameter change as soon as possible.
 * Cygwin does not have _wopen(), so do not create gzopen_w() there.

Removed 006-fix-compressor-crash-on-certain-inputs.patch which was
hotfix for CVE-2018-25032 and is now included in this release.

This release is not available on @SF (yet?) so the sources are now
pulled from GitHub.

Fixes: CVE-2018-25032
Signed-off-by: Petr Štetiar &lt;ynezz@true.cz&gt;
</content>
</entry>
<entry>
<title>zlib: backport security fix for a reproducible crash in compressor</title>
<updated>2022-03-24T07:15:24Z</updated>
<author>
<name>Petr Štetiar</name>
</author>
<published>2022-03-24T05:45:04Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=b3aa2909a79aeff20d594160b207a89dc807c033'/>
<id>urn:sha1:b3aa2909a79aeff20d594160b207a89dc807c033</id>
<content type='text'>
Tavis has just reported, that he was recently trying to track down a
reproducible crash in a compressor. Believe it or not, it really was a
bug in zlib-1.2.11 when compressing (not decompressing!) certain inputs.

Tavis has reported it upstream, but it turns out the issue has been
public since 2018, but the patch never made it into a release. As far as
he knows, nobody ever assigned it a CVE.

Suggested-by: Tavis Ormandy &lt;taviso@gmail.com&gt;
References: https://www.openwall.com/lists/oss-security/2022/03/24/1
Signed-off-by: Petr Štetiar &lt;ynezz@true.cz&gt;
</content>
</entry>
<entry>
<title>tools/ccache: update to 4.6</title>
<updated>2022-03-13T18:24:13Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2022-03-07T04:46:22Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=9c290ad498326c06a8e9dabe19dfb1b1c709e651'/>
<id>urn:sha1:9c290ad498326c06a8e9dabe19dfb1b1c709e651</id>
<content type='text'>
Full changelog: https://ccache.dev/releasenotes.html#_ccache_4_6

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
</content>
</entry>
<entry>
<title>tools/fakeroot: update to 1.28</title>
<updated>2022-03-13T18:24:13Z</updated>
<author>
<name>Rosen Penev</name>
</author>
<published>2022-03-07T04:53:47Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=9a44bc78b4413673f15a425e066d5c771b8054c6'/>
<id>urn:sha1:9a44bc78b4413673f15a425e066d5c771b8054c6</id>
<content type='text'>
Refreshed patches.

Upstream says there's only a bugfix for GNU Hurd.

Signed-off-by: Rosen Penev &lt;rosenp@gmail.com&gt;
</content>
</entry>
</feed>
