Skip to content
Snippets Groups Projects
  1. Oct 22, 2023
  2. Oct 20, 2023
  3. Jul 16, 2023
  4. Jul 14, 2023
  5. Jul 11, 2023
  6. Jul 10, 2023
  7. Jun 15, 2023
  8. May 11, 2023
    • Paul Spooren's avatar
      build: generate index.json · 491b7841
      Paul Spooren authored
      
      The index.json file lies next to Packages index files and contains a
      json dict with the package architecture and a dict of package names and
      versions.
      
      This can be used for downstream project to know what packages in which
      versions are available.
      
      Signed-off-by: default avatarPaul Spooren <mail@aparcar.org>
      (cherry picked from commit 218ce40c)
      491b7841
  9. Apr 27, 2023
  10. Apr 17, 2023
    • Eneas U de Queiroz's avatar
      openssl: fix CVE-2023-464 and CVE-2023-465 · f8282da1
      Eneas U de Queiroz authored
      
      Apply two patches fixing low-severity vulnerabilities related to
      certificate policies validation:
      
      - Excessive Resource Usage Verifying X.509 Policy Constraints
        (CVE-2023-0464)
        Severity: Low
        A security vulnerability has been identified in all supported versions
        of OpenSSL related to the verification of X.509 certificate chains
        that include policy constraints.  Attackers may be able to exploit
        this vulnerability by creating a malicious certificate chain that
        triggers exponential use of computational resources, leading to a
        denial-of-service (DoS) attack on affected systems.
        Policy processing is disabled by default but can be enabled by passing
        the `-policy' argument to the command line utilities or by calling the
        `X509_VERIFY_PARAM_set1_policies()' function.
      
      - Invalid certificate policies in leaf certificates are silently ignored
        (CVE-2023-0465)
        Severity: Low
        Applications that use a non-default option when verifying certificates
        may be vulnerable to an attack from a malicious CA to circumvent
        certain checks.
        Invalid certificate policies in leaf certificates are silently ignored
        by OpenSSL and other certificate policy checks are skipped for that
        certificate.  A malicious CA could use this to deliberately assert
        invalid certificate policies in order to circumvent policy checking on
        the certificate altogether.
        Policy processing is disabled by default but can be enabled by passing
        the `-policy' argument to the command line utilities or by calling the
        `X509_VERIFY_PARAM_set1_policies()' function.
      
      Note: OpenSSL also released a fix for low-severity security advisory
      CVE-2023-466.  It is not included here because the fix only changes the
      documentation, which is not built nor included in any OpenWrt package.
      
      Due to the low-severity of these issues, there will be not be an
      immediate new release of OpenSSL.
      
      Signed-off-by: default avatarEneas U de Queiroz <cotequeiroz@gmail.com>
      f8282da1
  11. Apr 15, 2023
  12. Apr 13, 2023
  13. Apr 09, 2023
  14. Mar 30, 2023
  15. Mar 29, 2023
Loading