<feed xmlns='http://www.w3.org/2005/Atom'>
<title>staging/pepe2k, branch v21.02.4</title>
<subtitle>Staging tree of Piotr Dymacz</subtitle>
<id>https://git.openwrt.org/openwrt/staging/pepe2k/atom?h=v21.02.4</id>
<link rel='self' href='https://git.openwrt.org/openwrt/staging/pepe2k/atom?h=v21.02.4'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/pepe2k/'/>
<updated>2022-10-09T17:13:29Z</updated>
<entry>
<title>OpenWrt v21.02.4: adjust config defaults</title>
<updated>2022-10-09T17:13:29Z</updated>
<author>
<name>Hauke Mehrtens</name>
</author>
<published>2022-10-09T17:13:29Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/pepe2k/commit/?id=66ee6c223193d08e5d8d6a903edbe393ffd945ce'/>
<id>urn:sha1:66ee6c223193d08e5d8d6a903edbe393ffd945ce</id>
<content type='text'>
Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</content>
</entry>
<entry>
<title>firmware: intel-microcode: update to 20220809</title>
<updated>2022-10-09T15:43:41Z</updated>
<author>
<name>Christian Lamparter</name>
</author>
<published>2022-08-22T08:35:28Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/pepe2k/commit/?id=82ebc173b3128205bd1b63e5ef8730cfecf469bf'/>
<id>urn:sha1:82ebc173b3128205bd1b63e5ef8730cfecf469bf</id>
<content type='text'>
Debian's changelog by Henrique de Moraes Holschuh &lt;hmh@debian.org&gt;:

  * New upstream microcode datafile 20220809
    * Fixes INTEL-SA-00657, CVE-2022-21233
      Stale data from APIC leaks SGX memory (AEPIC leak)
    * Fixes unspecified errata (functional issues) on Xeon Scalable
    * Updated Microcodes:
      sig 0x00050653, pf_mask 0x97, 2022-03-14, rev 0x100015e, size 34816
      sig 0x00050654, pf_mask 0xb7, 2022-03-08, rev 0x2006e05, size 44032
      sig 0x000606a6, pf_mask 0x87, 2022-04-07, rev 0xd000375, size 293888
      sig 0x000706a1, pf_mask 0x01, 2022-03-23, rev 0x003c, size 75776
      sig 0x000706a8, pf_mask 0x01, 2022-03-23, rev 0x0020, size 75776
      sig 0x000706e5, pf_mask 0x80, 2022-03-17, rev 0x00b2, size 112640
      sig 0x000806c2, pf_mask 0xc2, 2022-03-19, rev 0x0028, size 97280
      sig 0x000806d1, pf_mask 0xc2, 2022-03-28, rev 0x0040, size 102400
      sig 0x00090672, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064
      sig 0x00090675, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064
      sig 0x000906a3, pf_mask 0x80, 2022-06-15, rev 0x0421, size 216064
      sig 0x000906a4, pf_mask 0x80, 2022-06-15, rev 0x0421, size 216064
      sig 0x000a0671, pf_mask 0x02, 2022-03-17, rev 0x0054, size 103424
      sig 0x000b06f2, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064
      sig 0x000b06f5, pf_mask 0x03, 2022-06-07, rev 0x0022, size 216064

Signed-off-by: Christian Lamparter &lt;chunkeey@gmail.com&gt;
(cherry picked from commit bb73828b89def128f26ae1cdff0d08569d261f1b)
</content>
</entry>
<entry>
<title>wireless-regdb: update to 2022-08-12</title>
<updated>2022-10-09T14:31:48Z</updated>
<author>
<name>Nick Hainke</name>
</author>
<published>2022-09-17T06:05:47Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/pepe2k/commit/?id=2179d0670dd7441ce08a8dd88cbf67bab2eb32f4'/>
<id>urn:sha1:2179d0670dd7441ce08a8dd88cbf67bab2eb32f4</id>
<content type='text'>
Changes:
9dc9c89 wireless-regdb: update regulatory database based on preceding changes
442bc25 wireless-regdb: update 5 GHz rules for PK and add 60 GHz rule
daee7f3 wireless-regdb: add 5 GHz rules for GY

Signed-off-by: Nick Hainke &lt;vincent@systemli.org&gt;
(cherry picked from commit 1d2d69c810261308652a577fc136e7327e0e1358)
</content>
</entry>
<entry>
<title>wireless-regdb: bump to 2022.06.06</title>
<updated>2022-10-09T14:31:41Z</updated>
<author>
<name>Stijn Tintel</name>
</author>
<published>2022-06-06T16:11:33Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/pepe2k/commit/?id=c028078e0b5bd2bed7c080e0df5a9a5726eb3249'/>
<id>urn:sha1:c028078e0b5bd2bed7c080e0df5a9a5726eb3249</id>
<content type='text'>
  902b321 wireless-regdb: Update regulatory rules for Israel (IL)
  20f6f34 wireless-regdb: add missing spaces for US S1G rules
  25652b6 wireless-regdb: Update regulatory rules for Australia (AU)
  081873f wireless-regdb: update regulatory database based on preceding changes
  166fbdd wireless-regdb: add db files missing from previous commit
  e3f03f9 Regulatory update for 6 GHz operation in Canada (CA)
  888da5f Regulatory update for 6 GHz operation in United States (US)
  647bcaa Regulatory update for 6 GHz operation in FI
  c6b079d wireless-regdb: update regulatory rules for Bulgaria (BG) on 6GHz
  2ed39be wireless-regdb: Remove AUTO-BW from 6 GHz rules
  7a6ad1a wireless-regdb: Unify 6 GHz rules for EU contries
  68a8f2f wireless-regdb: update regulatory database based on preceding changes

Signed-off-by: Stijn Tintel &lt;stijn@linux-ipv6.be&gt;
(cherry picked from commit e3e9eb31a281643737142e8e80c6f49204b5ba18)
</content>
</entry>
<entry>
<title>wireless-regdb: update to version 2022.02.18</title>
<updated>2022-10-09T14:31:30Z</updated>
<author>
<name>Sungbo Eo</name>
</author>
<published>2022-02-19T01:46:01Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/pepe2k/commit/?id=93f60510b452c71e582dd3e77ddb98b7498f8846'/>
<id>urn:sha1:93f60510b452c71e582dd3e77ddb98b7498f8846</id>
<content type='text'>
e061299 wireless-regdb: Raise DFS TX power limit to 250 mW (24 dBm) for the US
2ce78ed wireless-regdb: Update regulatory rules for Croatia (HR) on 6GHz
0d39f4c wireless-regdb: Update regulatory rules for South Korea (KR)
acad231 wireless-regdb: Update regulatory rules for France (FR) on 6 and 60 GHz
ea83a82 wireless-regdb: add support for US S1G channels
4408149 wireless-regdb: add 802.11ah bands to world regulatory domain
5f3cadc wireless-regdb: Update regulatory rules for Spain (ES) on 6GHz
e0ac69b Revert "wireless-regdb: Update regulatory rules for South Korea (KR)"
40e5e80 wireless-regdb: Update regulatory rules for South Korea (KR)
e427ff2 wireless-regdb: Update regulatory rules for China (CN)
0970116 wireless-regdb: Update regulatory rules for the Netherlands (NL) on 6GHz
4dac44b wireless-regdb: update regulatory database based on preceding changes

Signed-off-by: Sungbo Eo &lt;mans0n@gorani.run&gt;
(cherry picked from commit 19a90262df89f8419b058cf9a00dc9e8d465088b)
</content>
</entry>
<entry>
<title>build: add support for python3.11 and higher</title>
<updated>2022-10-05T20:21:18Z</updated>
<author>
<name>Oscar Molnar</name>
</author>
<published>2022-08-06T15:13:41Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/pepe2k/commit/?id=830b07f08e7dfde0d5c44b6659dfa3d9af44e208'/>
<id>urn:sha1:830b07f08e7dfde0d5c44b6659dfa3d9af44e208</id>
<content type='text'>
python3.11 beta is out but fails to run the makefile currently
this supports python versions from 3.6 to 3.99 with the python3 binary
it also checks specifically for 3.11 as it is the latest version out

Signed-off-by: Oscar Molnar &lt;oscar@tymscar.com&gt;
(cherry picked from commit a9e8eec221874e5840d659aed3f68850ff1d9982)
Signed-off-by: Michal Vasilek &lt;michal.vasilek@nic.cz&gt; [rebase for 21.02]
</content>
</entry>
<entry>
<title>kernel: bump 5.4 to 5.4.215</title>
<updated>2022-10-05T19:46:38Z</updated>
<author>
<name>Hauke Mehrtens</name>
</author>
<published>2022-10-03T18:40:59Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/pepe2k/commit/?id=084a8a2fafbaecb821cfa71f0e1c9b8464f23a80'/>
<id>urn:sha1:084a8a2fafbaecb821cfa71f0e1c9b8464f23a80</id>
<content type='text'>
Compile-tested: x86/64
Run-tested: x86/64

Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</content>
</entry>
<entry>
<title>treewide: fix security issues by bumping all packages using libwolfssl</title>
<updated>2022-10-05T19:09:50Z</updated>
<author>
<name>Petr Štetiar</name>
</author>
<published>2022-09-29T16:45:40Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/pepe2k/commit/?id=8444302a92e601a1e05cb8468aaffa140d5a5b80'/>
<id>urn:sha1:8444302a92e601a1e05cb8468aaffa140d5a5b80</id>
<content type='text'>
As wolfSSL is having hard time maintaining ABI compatibility between
releases, we need to manually force rebuild of packages depending on
libwolfssl and thus force their upgrade. Otherwise due to the ABI
handling we would endup with possibly two libwolfssl libraries in the
system, including the patched libwolfssl-5.5.1, but still have
vulnerable services running using the vulnerable libwolfssl-5.4.0.

So in order to propagate update of libwolfssl to latest stable release
done in commit ec8fb542ec3e4 ("wolfssl: fix TLSv1.3 RCE in uhttpd by
using 5.5.1-stable (CVE-2022-39173)") which fixes several remotely
exploitable vulnerabilities, we need to bump PKG_RELEASE of all
packages using wolfSSL library.

Signed-off-by: Petr Štetiar &lt;ynezz@true.cz&gt;
(cherry picked from commit f1b7e1434f66a3cb09cb9e70b40add354a22e458)
(cherry picked from commit 562894b39da381264a34ce31e9334c8a036fa139)
</content>
</entry>
<entry>
<title>wolfssl: fix TLSv1.3 RCE in uhttpd by using 5.5.1-stable (CVE-2022-39173)</title>
<updated>2022-10-05T19:09:48Z</updated>
<author>
<name>Petr Štetiar</name>
</author>
<published>2022-09-28T09:28:06Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/pepe2k/commit/?id=914d91274162ba7e125fcfc781b1128b7c42a856'/>
<id>urn:sha1:914d91274162ba7e125fcfc781b1128b7c42a856</id>
<content type='text'>
Fixes denial of service attack and buffer overflow against TLS 1.3
servers using session ticket resumption. When built with
--enable-session-ticket and making use of TLS 1.3 server code in
wolfSSL, there is the possibility of a malicious client to craft a
malformed second ClientHello packet that causes the server to crash.

This issue is limited to when using both --enable-session-ticket and TLS
1.3 on the server side. Users with TLS 1.3 servers, and having
--enable-session-ticket, should update to the latest version of wolfSSL.

Thanks to Max at Trail of Bits for the report and "LORIA, INRIA, France"
for research on tlspuffin.

Complete release notes https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.1-stable

Fixes: CVE-2022-39173
Fixes: https://github.com/openwrt/luci/issues/5962
References: https://github.com/wolfSSL/wolfssl/issues/5629
Tested-by: Kien Truong &lt;duckientruong@gmail.com&gt;
Reported-by: Kien Truong &lt;duckientruong@gmail.com&gt;
Signed-off-by: Petr Štetiar &lt;ynezz@true.cz&gt;
(cherry picked from commit ec8fb542ec3e4f584444a97de5ac05dbc2a9cde5)
(cherry picked from commit ce59843662961049a28033077587cabdc5243b15)
</content>
</entry>
<entry>
<title>wolfssl: bump to 5.5.0</title>
<updated>2022-10-05T19:09:47Z</updated>
<author>
<name>Ivan Pavlov</name>
</author>
<published>2022-08-31T05:04:42Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/pepe2k/commit/?id=4be7eb7735453a6b1f578942afccc5f742c9d8d8'/>
<id>urn:sha1:4be7eb7735453a6b1f578942afccc5f742c9d8d8</id>
<content type='text'>
Remove upstreamed: 101-update-sp_rand_prime-s-preprocessor-gating-to-match.patch

Some low severity vulnerabilities fixed
OpenVPN compatibility fixed (broken in 5.4.0)
Other fixes &amp;&amp; improvements

Signed-off-by: Ivan Pavlov &lt;AuthorReflex@gmail.com&gt;
(cherry picked from commit 3d88f26d74f7771b808082cef541ed8286c40491)
(cherry picked from commit 0c8425bf11590afb0c6f1545b328ecb6ed4aee87)
</content>
</entry>
</feed>
