Bump buildroot to 2020.11-rc1 (#985)
* Update buildroot-patches for 2020.11-rc1 buildroot * Update buildroot to 2020.11-rc1 Signed-off-by: Stefan Agner <stefan@agner.ch> * Don't rely on sfdisk --list-free output The --list-free (-F) argument does not allow machine readable mode. And it seems that the output format changes over time (different spacing, using size postfixes instead of raw blocks). Use sfdisk json output and calculate free partition space ourselfs. This works for 2.35 and 2.36 and is more robust since we rely on output which is meant for scripts to parse. * Migrate defconfigs for Buildroot 2020.11-rc1 In particular, rename BR2_TARGET_UBOOT_BOOT_SCRIPT(_SOURCE) to BR2_PACKAGE_HOST_UBOOT_TOOLS_BOOT_SCRIPT(_SOURCE). * Rebase/remove systemd patches for systemd 246 * Drop apparmor/libapparmor from buildroot-external * hassos-persists: use /run as directory for lockfiles The U-Boot tools use /var/lock by default which is not created any more by systemd by default (it is under tmpfiles legacy.conf, which we no longer install). * Disable systemd-update-done.service The service is not suited for pure read-only systems. In particular the service needs to be able to write a file in /etc and /var. Remove the service. Note: This is a static service and cannot be removed using systemd-preset. * Disable apparmor.service for now The service loads all default profiles. Some might actually cause problems. E.g. the profile for ping seems not to match our setup for /etc/resolv.conf: [85503.634653] audit: type=1400 audit(1605286002.684:236): apparmor="DENIED" operation="open" profile="ping" name="/run/resolv.conf" pid=27585 comm="ping" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
This commit is contained in:
@@ -1,24 +0,0 @@
|
||||
# HG changeset patch
|
||||
# User Haelwenn Monnier <contact+github.com@hacktivis.me>
|
||||
# Date 1590411269 -7200
|
||||
# Mon May 25 14:54:29 2020 +0200
|
||||
# Node ID 087c2804147074c95b6a3f35137b4f4b726b1452
|
||||
# Parent 009d52ae26d35f3381c801e02318fa9be34be93c
|
||||
scp.c: Port OpenSSH CVE-2018-20685 fix (#80)
|
||||
|
||||
[backport from 2020.79 to 2019.78 for Buildroot 2020.02.x]
|
||||
Signed-off-by: Thomas De Schampheleire <thomas.de_schampheleire@nokia.com>
|
||||
|
||||
diff --git a/scp.c b/scp.c
|
||||
--- a/scp.c
|
||||
+++ b/scp.c
|
||||
@@ -935,7 +935,8 @@ sink(int argc, char **argv)
|
||||
size = size * 10 + (*cp++ - '0');
|
||||
if (*cp++ != ' ')
|
||||
SCREWUP("size not delimited");
|
||||
- if ((strchr(cp, '/') != NULL) || (strcmp(cp, "..") == 0)) {
|
||||
+ if (*cp == '\0' || strchr(cp, '/') != NULL ||
|
||||
+ strcmp(cp, ".") == 0 || strcmp(cp, "..") == 0) {
|
||||
run_err("error: unexpected filename: %s", cp);
|
||||
exit(1);
|
||||
}
|
||||
@@ -1,5 +1,7 @@
|
||||
# From https://matt.ucc.asn.au/dropbear/releases/SHA256SUM.asc
|
||||
sha256 525965971272270995364a0eb01f35180d793182e63dd0b0c3eb0292291644a4 dropbear-2019.78.tar.bz2
|
||||
sha256 48235d10b37775dbda59341ac0c4b239b82ad6318c31568b985730c788aac53b dropbear-2020.81.tar.bz2
|
||||
|
||||
# License file, locally computed
|
||||
sha256 cfa32d49e9022265375e533a4a5ef9e37d4aaa604119d612c46816aa1e59fe52 LICENSE
|
||||
sha256 a99ce657d790b761c132ee7e0de18edb437ae6361e536d991c6a12f36e770445 LICENSE
|
||||
sha256 8f196cb13afd271f5e267fd29543fc454596382ad580e7592709492843996ac8 libtomcrypt/LICENSE
|
||||
sha256 2fa64b163659f41965c9815882a8296d3d03ff546b76153e11445f9bdecf955a libtommath/LICENSE
|
||||
|
||||
@@ -4,10 +4,10 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
DROPBEAR_VERSION = 2019.78
|
||||
DROPBEAR_VERSION = 2020.81
|
||||
DROPBEAR_SITE = https://matt.ucc.asn.au/dropbear/releases
|
||||
DROPBEAR_SOURCE = dropbear-$(DROPBEAR_VERSION).tar.bz2
|
||||
DROPBEAR_LICENSE = MIT, BSD-2-Clause, BSD-3-Clause
|
||||
DROPBEAR_LICENSE = MIT, BSD-2-Clause, Public domain
|
||||
DROPBEAR_LICENSE_FILES = LICENSE
|
||||
DROPBEAR_TARGET_BINS = dropbearkey dropbearconvert scp
|
||||
DROPBEAR_PROGRAMS = dropbear $(DROPBEAR_TARGET_BINS)
|
||||
@@ -56,11 +56,15 @@ endef
|
||||
DROPBEAR_POST_EXTRACT_HOOKS += DROPBEAR_SVR_PASSWORD_AUTH
|
||||
endif
|
||||
|
||||
ifneq ($(BR2_PACKAGE_DROPBEAR_LEGACY_CRYPTO),y)
|
||||
ifeq ($(BR2_PACKAGE_DROPBEAR_LEGACY_CRYPTO),y)
|
||||
define DROPBEAR_ENABLE_LEGACY_CRYPTO
|
||||
echo '#define DROPBEAR_3DES 1' >> $(@D)/localoptions.h
|
||||
echo '#define DROPBEAR_ENABLE_CBC_MODE 1' >> $(@D)/localoptions.h
|
||||
echo '#define DROPBEAR_SHA1_96_HMAC 1' >> $(@D)/localoptions.h
|
||||
endef
|
||||
DROPBEAR_POST_EXTRACT_HOOKS += DROPBEAR_ENABLE_LEGACY_CRYPTO
|
||||
else
|
||||
define DROPBEAR_DISABLE_LEGACY_CRYPTO
|
||||
echo '#define DROPBEAR_3DES 0' >> $(@D)/localoptions.h
|
||||
echo '#define DROPBEAR_ENABLE_CBC_MODE 0' >> $(@D)/localoptions.h
|
||||
echo '#define DROPBEAR_SHA1_96_HMAC 0' >> $(@D)/localoptions.h
|
||||
echo '#define DROPBEAR_DSS 0' >> $(@D)/localoptions.h
|
||||
echo '#define DROPBEAR_DH_GROUP1 0' >> $(@D)/localoptions.h
|
||||
endef
|
||||
@@ -75,6 +79,8 @@ DROPBEAR_POST_EXTRACT_HOOKS += DROPBEAR_ENABLE_REVERSE_DNS
|
||||
endif
|
||||
|
||||
ifeq ($(BR2_PACKAGE_DROPBEAR_SMALL),y)
|
||||
DROPBEAR_LICENSE += , Unlicense, WTFPL
|
||||
DROPBEAR_LICENSE_FILES += libtommath/LICENSE libtomcrypt/LICENSE
|
||||
DROPBEAR_CONF_OPTS += --disable-zlib --enable-bundled-libtom
|
||||
else
|
||||
define DROPBEAR_BUILD_FEATURED
|
||||
|
||||
Reference in New Issue
Block a user