Definition for flash w25q128 is wrong

2024-03-31 Thread e9hack
Hi, I'm using a TP-LINK WDR3600 with a bigger flash. Since some time the router hangs in an endless boot loop. I see the following message: ... [0.402716] spi-nor spi0.0: BFPT parsing failed. Please consider using SPI_NOR_SKIP_SFDP when declaring the flash [0.413217] spi-nor: probe of

Re: here we are again: real name 'discussion'

2024-03-31 Thread Paul D
(On my phone, Gmail mobile only sends html emails, sorry for that) As this is a legal issue, should we get SFC opinion first ? Since you deem it a legal issue, yes, get their opinion. ___ openwrt-devel mailing list

Re: OpenWrt HaLow Driver Job for Hire

2024-03-31 Thread Daniel Golle
Hi Sam, On Sun, Mar 31, 2024 at 03:32:59PM -0700, Sam Petrov wrote: > I have a project for work I'm shopping around: I have access to an > existing SDK from Morse Micro > (https://drive.google.com/drive/folders/18vAzb6E4E33axyx20E9QvXI0NfQVF6S8?usp=sharing). > I'm trying to get AHM26108D >

OpenWrt HaLow Driver Job for Hire

2024-03-31 Thread Sam Petrov
I have a project for work I'm shopping around: I have access to an existing SDK from Morse Micro (https://drive.google.com/drive/folders/18vAzb6E4E33axyx20E9QvXI0NfQVF6S8?usp=sharing). I'm trying to get AHM26108D (https://www.alfa.com.tw/products/ahm26108d?variant=39922067898440) to work with

Re: Conclusions from CVE-2024-3094 (libxz disaster)

2024-03-31 Thread Thibaut
> Le 31 mars 2024 à 19:06, Thibaut a écrit : >> Le 31 mars 2024 à 18:46, Daniel Golle a écrit : >> >> I've seen that, and by itself it does not present a security risk in >> the context libarchive is intended to be used. BTW in case that isn’t obvious, the deadliest exploits typically

[sdwalker/sdwalker.github.io] 03e547: This week's update

2024-03-31 Thread Stephen Walker via openwrt-devel
The sender domain has a DMARC Reject/Quarantine policy which disallows sending mailing list messages using the original "From" header. To mitigate this problem, the original message has been wrapped automatically by the mailing list software.--- Begin Message --- Branch: refs/heads/master

Re: Conclusions from CVE-2024-3094 (libxz disaster)

2024-03-31 Thread Thibaut
> Le 31 mars 2024 à 18:46, Daniel Golle a écrit : > > On Sun, Mar 31, 2024 at 12:05:03PM +0200, Thibaut wrote: >> >>> Le 31 mars 2024 à 01:07, Elliott Mitchell a écrit : >>> Normally upstream publishes release tarballs that are different than the automatically generated ones in

Re: Conclusions from CVE-2024-3094 (libxz disaster)

2024-03-31 Thread Daniel Golle
On Sun, Mar 31, 2024 at 12:05:03PM +0200, Thibaut wrote: > > > Le 31 mars 2024 à 01:07, Elliott Mitchell a écrit : > > > >> Normally upstream publishes release tarballs that are different than the > >> automatically generated ones in GitHub. In these modified tarballs, a > >> malicious version

Re: Conclusions from CVE-2024-3094 (libxz disaster)

2024-03-31 Thread Thibaut
> Le 31 mars 2024 à 01:07, Elliott Mitchell a écrit : > >> Normally upstream publishes release tarballs that are different than the >> automatically generated ones in GitHub. In these modified tarballs, a >> malicious version of build-to-host.m4 is included to execute a script >> during the

Re: Conclusions from CVE-2024-3094 (libxz disaster)

2024-03-31 Thread Oldřich Jedlička
Hi, ne 31. 3. 2024 v 1:07 odesílatel Elliott Mitchell napsal: > On Sat, Mar 30, 2024 at 10:54:00PM +0100, Oldřich Jedlička wrote: > > > > so 30. 3. 2024 v 16:31 odesílatel Daniel Golle > > napsal: > > > Hiding a malicious change in a commit is infinitely harder than hiding > > > it in a

Re: Conclusions from CVE-2024-3094 (libxz disaster)

2024-03-31 Thread Felix Fietkau
On 31.03.24 01:07, Elliott Mitchell wrote: On Sat, Mar 30, 2024 at 03:30:49PM +, Daniel Golle wrote: unchanged. Git has a lot of security built-in, and by using tarballs as a base for our package builds we are basically throwing all that away, for the sake of saving a negligible amount of