mirror of
https://github.com/openwrt/openwrt.git
synced 2024-12-27 01:11:14 +00:00
d868d0a5d7
This version fixes 3 low-severity vulnerabilities: - CVE-2019-1547: ECDSA remote timing attack - CVE-2019-1549: Fork Protection - CVE-2019-1563: Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey Patches were refreshed. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
26 lines
973 B
Diff
26 lines
973 B
Diff
From 559fbff13af9ce2fbc0b9bc5727a7323e1db6217 Mon Sep 17 00:00:00 2001
|
|
From: Eneas U de Queiroz <cote2004-github@yahoo.com>
|
|
Date: Thu, 27 Sep 2018 08:29:21 -0300
|
|
Subject: Do not use host kernel version to disable AFALG
|
|
|
|
This patch prevents the Configure script from using the host kernel
|
|
version to disable building the AFALG engine on openwrt targets.
|
|
|
|
Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
|
|
|
|
diff --git a/Configure b/Configure
|
|
index 5a699836f3..74d057c219 100755
|
|
--- a/Configure
|
|
+++ b/Configure
|
|
@@ -1532,7 +1532,9 @@ unless ($disabled{"crypto-mdebug-backtrace"})
|
|
|
|
unless ($disabled{afalgeng}) {
|
|
$config{afalgeng}="";
|
|
- if (grep { $_ eq 'afalgeng' } @{$target{enable}}) {
|
|
+ if ($target =~ m/openwrt$/) {
|
|
+ push @{$config{engdirs}}, "afalg";
|
|
+ } elsif (grep { $_ eq 'afalgeng' } @{$target{enable}}) {
|
|
my $minver = 4*10000 + 1*100 + 0;
|
|
if ($config{CROSS_COMPILE} eq "") {
|
|
my $verstr = `uname -r`;
|