feed/packages.git
5 years agoMerge pull request #6124 from wigyori/for-15.05-freeradius2 for-15.05 20638/head 7275/head 9212/head
Daniel Golle [Fri, 15 Jun 2018 14:02:27 +0000 (16:02 +0200)]
Merge pull request #6124 from wigyori/for-15.05-freeradius2

CC: freeradius2: bump to 2.2.10
5 years agoMerge pull request #6120 from wigyori/for-15.05-perl
Philip Prindeville [Wed, 30 May 2018 01:00:15 +0000 (19:00 -0600)]
Merge pull request #6120 from wigyori/for-15.05-perl

CC: perl5: upgrade 3 CPAN packages to fix build
5 years agoMerge pull request #6126 from wigyori/for-15.05-pcre_nginx
Thomas Heil [Fri, 25 May 2018 11:52:53 +0000 (13:52 +0200)]
Merge pull request #6126 from wigyori/for-15.05-pcre_nginx

CC: pcre: bump to 8.41 and fix CVEs
5 years agofreeradius2: bump to 2.2.10 6124/head
Zoltan HERPAI [Mon, 21 May 2018 11:01:51 +0000 (13:01 +0200)]
freeradius2: bump to 2.2.10

 - Fix multiple security issues. See http://freeradius.org/security/fuzzer-2017.html Thanks to Guido Vranken for working with us to discover the issues and test the fixes.
 - FR-GV-207 Avoid zero-length malloc() in data2vp().
 - FR-GV-206 correct decoding of option 60.
 - FR-GV-205 check for "too long" WiMAX options.
 - FR-GV-204 free VP if decoding fails, so we don't leak memory.
 - FR-GV-203 fix memory leak when using decode_tlv().
 - FR-GV-202 check for "too long" attributes.
 - FR-GV-201 check input/output length in make_secret().
 - FR-AD-001 Use strncmp() instead of memcmp() for bounded data.
 - Disable in-memory TLS session caches due to OpenSSL API issues.
 - Allow issuer_cert to be empty.
 - Look for extensions using correct index.
 - Fix types.
 - Work around OpenSSL 1.0.2 problems, which cause failures in TLS-based EAP methods.
 - Revert RedHat contributed bug which removes run-time checks for OpenSSL consistency.
 - Allow OCSP responder URL to be later in the packet Fix by Ean Pasternak.
 - Catch empty subject and non-existent issuer cert in OCSP Fix by Ean Pasternak.
 - Allow non-FIPS for MD5 Fix by Ean Pasternak.

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
5 years agofreeradius2: update to version 2.2.9
Daniel Golle [Tue, 19 Apr 2016 10:26:32 +0000 (12:26 +0200)]
freeradius2: update to version 2.2.9

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
5 years agopcre: Added fix for CVE-2017-11164 by adding stack recursion limit 6126/head
Thomas Heil [Sun, 3 Sep 2017 13:03:56 +0000 (15:03 +0200)]
pcre: Added fix for CVE-2017-11164 by adding stack recursion limit

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
5 years agopcre: upgrade to version 8.41 - fixes security issues
Thomas Heil [Wed, 16 Aug 2017 23:18:45 +0000 (01:18 +0200)]
pcre: upgrade to version 8.41 - fixes security issues

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
5 years agofix CVE-2017-7186 Fix CVE-2017-7186 mentioned in https://bugs.exim.org/show_bug.cgi...
Thomas Heil [Mon, 27 Mar 2017 08:03:16 +0000 (10:03 +0200)]
fix CVE-2017-7186 Fix CVE-2017-7186 mentioned in https://bugs.exim.org/show_bug.cgi?id=2052

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
5 years agopackage: pcre bump to version 8.40
heil [Sun, 22 Jan 2017 20:09:54 +0000 (21:09 +0100)]
package: pcre bump to version 8.40

Signed-off-by: heil <heil@terminal-consulting.de>
5 years agoperl-uri: bump to 1.74 6120/head
Zoltan HERPAI [Wed, 23 May 2018 23:03:42 +0000 (01:03 +0200)]
perl-uri: bump to 1.74

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
5 years agoperl-html-parser: bump to 3.72
Zoltan HERPAI [Wed, 23 May 2018 23:03:11 +0000 (01:03 +0200)]
perl-html-parser: bump to 3.72

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
5 years agoperl-dbi: bump to 1.641
Zoltan HERPAI [Wed, 23 May 2018 23:02:31 +0000 (01:02 +0200)]
perl-dbi: bump to 1.641

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
6 years agoMerge pull request #5542 from micmac1/jiri-for-15.05
Jiri Slachta [Tue, 30 Jan 2018 19:00:45 +0000 (20:00 +0100)]
Merge pull request #5542 from micmac1/jiri-for-15.05

libssh2, libxslt, tiff: security bumps (for 15.05)

6 years agotiff: version bump to address open CVEs 5542/head
Sebastian Kemper [Tue, 30 Jan 2018 14:32:47 +0000 (15:32 +0100)]
tiff: version bump to address open CVEs

- Bumps version to 4.0.9. Otherwise about two dozen packages would need
  to be backported. There were no ABI/API changes between 4.0.3 and
  4.0.9, so this is OK.
- Adds a patch from Jow that addresses a macro issue (already in
  master/lede-17.01)
- Adds patches copied from Debian for CVE-2017-18013 and CVE-2017-9935
  on top.

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
6 years agolibxslt: revision bump to address open CVEs
Sebastian Kemper [Tue, 30 Jan 2018 14:28:33 +0000 (15:28 +0100)]
libxslt: revision bump to address open CVEs

- Add patches copied from Debian to address open CVEs
- Update mail address of maintainer
- Fix a typo
- Add --disable-silent-rules for verbose build output

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
6 years agolibssh2: revision bump to fix CVE-2016-0787
Sebastian Kemper [Tue, 30 Jan 2018 14:25:23 +0000 (15:25 +0100)]
libssh2: revision bump to fix CVE-2016-0787

- adds patch copied from Debian to address CVE
- fixes zlib detection
- changes http to https links
- updates maintainer's mail address

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
6 years agoMerge pull request #5084 from wigyori/for-15.05-irssi
Zoltan Herpai [Mon, 29 Jan 2018 08:20:09 +0000 (09:20 +0100)]
Merge pull request #5084 from wigyori/for-15.05-irssi

CC: net/irssi: upgrade irssi, update download URL
6 years agoMerge pull request #5102 from wigyori/for-15.05-xupnpd
Zoltan Herpai [Mon, 29 Jan 2018 08:19:18 +0000 (09:19 +0100)]
Merge pull request #5102 from wigyori/for-15.05-xupnpd

CC: multimedia/xupnpd: move download source and upgrade to 2016-07-06
6 years agoMerge pull request #5151 from wigyori/for-15.05-bluez
Zoltan Herpai [Mon, 29 Jan 2018 08:10:29 +0000 (09:10 +0100)]
Merge pull request #5151 from wigyori/for-15.05-bluez

CC: bluez: upgrade to 5.47
6 years agoMerge pull request #5114 from wigyori/for-15.05-squid
Marko Ratkaj [Wed, 24 Jan 2018 19:23:49 +0000 (20:23 +0100)]
Merge pull request #5114 from wigyori/for-15.05-squid

CC: squid: upgrade to 3.5.27
6 years agoMerge pull request #5233 from wigyori/for-15.05-bind
Zoltan Herpai [Thu, 7 Dec 2017 09:49:26 +0000 (10:49 +0100)]
Merge pull request #5233 from wigyori/for-15.05-bind

CC: bind: bump to 9.11.2
6 years agobind: bring back PKG_MD5SUM for CC 5233/head
Zoltan HERPAI [Wed, 6 Dec 2017 20:23:07 +0000 (21:23 +0100)]
bind: bring back PKG_MD5SUM for CC

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
6 years agobind: version update to 9.11.2
Philip Prindeville [Mon, 7 Aug 2017 18:01:56 +0000 (12:01 -0600)]
bind: version update to 9.11.2

Also refresh patches and dependencies.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
6 years agobind: Update to 9.10.5-P3
Noah Meyerhans [Sun, 16 Jul 2017 15:53:59 +0000 (08:53 -0700)]
bind: Update to 9.10.5-P3

New upstream release includes fixes for the following security issues:

 * CVE-2017-3140: With certain RPZ configurations, a response with TTL 0 could
   cause named to go into an infinite query loop
 * CVE-2017-3142: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.
 * CVE-2017-3143: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
6 years agobind: Include dnssec-settime in bind-dnssec/tool
Sami Olmari [Mon, 5 Jun 2017 22:47:05 +0000 (01:47 +0300)]
bind: Include dnssec-settime in bind-dnssec/tool

<net/bind>

Maintainer: @nmeyerhans
Compile tested: x86_64, OpenWRT 50107
Run tested: x86 / 64, OpenWRT 50107

Description:

Added dnssec-settime into bind-dnssec and bind-tools

Signed-off-by: Sami Olmari <sami+git@olmari.fi>
6 years agobind: Update to bind-9.10.5
Noah Meyerhans [Thu, 11 May 2017 05:06:46 +0000 (22:06 -0700)]
bind: Update to bind-9.10.5

This change includes fixes for several security issues:

  * CVE-2017-3138: rndc "" could trigger an assertion failure in named.
  * CVE-2017-3137: Some chaining (i.e., type CNAME or DNAME) responses to
    upstream queries could trigger assertion failures.
  * CVE-2017-3136: dns64 with break-dnssec yes; can result in an assertion
    failure.
  * CVE-2017-3135: If a server is configured with a response policy zone
    (RPZ) that rewrites an answer with local data, and is also configured
    for DNS64 address mapping, a NULL pointer can be read triggering a
    server crash.
  * CVE-2016-9444: named could mishandle authority sections with missing
    RRSIGs, triggering an assertion failure.
  * CVE-2016-9131: named mishandled some responses where covering RRSIG
    records were returned without the requested data, resulting in an
    assertion failure.
  * CVE-2016-9131: named incorrectly tried to cache TKEY records which could
    trigger an assertion failure when there was a class mismatch.
  * CVE-2016-8864: It was possible to trigger assertions when processing
    responses containing answers of type DNAME.
  * CVE-2016-6170: Added the ability to specify the maximum number of
    records permitted in a zone (max-records #;). This provides a mechanism
    to block overly large zone transfers, which is a potential risk with
    slave zones from other parties.
  * CVE-2016-2776: It was possible to trigger an assertion when rendering a
    message using a specially crafted request.
  * CVE-2016-2775: Calling getrrsetbyname() with a non absolute name could
    trigger an infinite recursion bug in lwresd or named with lwres
    configured if, when combined with a search list entry from resolv.conf,
    the resulting name is too long.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
6 years agobind: update to bind-9.10.4-P5
Noah Meyerhans [Thu, 12 Jan 2017 06:01:53 +0000 (22:01 -0800)]
bind: update to bind-9.10.4-P5

This change fixes multiple denial-of-service vulnerabilities:
 * CVE-2016-9131: A malformed response to an ANY query can cause an
   assertion failure during recursion
 * CVE-2016-9147: An error handling a query response containing
   inconsistent DNSSEC information could cause an assertion failure
 * CVE-2016-9444: An unusually-formed DS record response could cause
   an assertion failure
 * CVE-2016-9778: An error handling certain queries using the
   nxdomain-redirect feature could cause a REQUIRE assertion failure
   in db.c

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
6 years agobind: disable libjson support
Stijn Tintel [Tue, 29 Nov 2016 11:26:05 +0000 (12:26 +0100)]
bind: disable libjson support

If libjson-c is detected during bind-libs configure phase, bind-libs
will be built with libjson support. This results in a missing dependency
error during install phase. Solve this by disabling libjson support.

6 years agobind: set sysconfdir to /etc/bind
Noah Meyerhans [Thu, 17 Nov 2016 14:19:55 +0000 (06:19 -0800)]
bind: set sysconfdir to /etc/bind

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
6 years agoMerge pull request #5081 from wigyori/for-15.05-mxml3
Zoltan Herpai [Sat, 18 Nov 2017 20:18:41 +0000 (21:18 +0100)]
Merge pull request #5081 from wigyori/for-15.05-mxml3

CC: upgrade mxml, update download URL
6 years agoMerge pull request #5103 from wigyori/for-15.05-wifidog
Zoltan Herpai [Sat, 18 Nov 2017 20:14:31 +0000 (21:14 +0100)]
Merge pull request #5103 from wigyori/for-15.05-wifidog

CC: wifidog: upgrade to 1.3.0 to fix build
6 years agobluez: bump to 5.47 fix CVE-2017-1000250 5151/head
Hirokazu MORIKAWA [Fri, 22 Sep 2017 06:51:37 +0000 (15:51 +0900)]
bluez: bump to 5.47 fix CVE-2017-1000250

http://www.bluez.org/release-of-bluez-5-47/

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
6 years agobluez: update to v5.38
Álvaro Fernández Rojas [Mon, 28 Mar 2016 12:53:35 +0000 (14:53 +0200)]
bluez: update to v5.38

Fixes https://github.com/openwrt/packages/issues/2523
Closes https://github.com/openwrt/packages/pull/2545

Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
6 years agobluez: Add support for Raspberry Pi 3
Álvaro Fernández Rojas [Sun, 6 Mar 2016 15:20:24 +0000 (16:20 +0100)]
bluez: Add support for Raspberry Pi 3

- Adds bcm43xx-3wire variant.
- Resets UART speed after firmware download.
- Prints chip name when firmware isn't found for bcm43xx.
- Increases timeout for bcm43xx.
- Moves bcm43xx firmware to lib.

Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
6 years agobluez: update to v5.37
Álvaro Fernández Rojas [Sun, 6 Mar 2016 15:13:37 +0000 (16:13 +0100)]
bluez: update to v5.37

Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
6 years agobluez: update to version 5.33
Hauke Mehrtens [Mon, 3 Aug 2015 20:35:56 +0000 (22:35 +0200)]
bluez: update to version 5.33

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agobluez: update to version 5.31
Hauke Mehrtens [Sat, 4 Jul 2015 22:27:56 +0000 (00:27 +0200)]
bluez: update to version 5.31

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agobluez: add btmgmt tool
Hauke Mehrtens [Sat, 11 Jul 2015 20:58:08 +0000 (22:58 +0200)]
bluez: add btmgmt tool

The btmgmt tool is needed to activate BL LE support.
Currently it is not installed.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agobluez: Add bluez-daemon package
Bruno Randolf [Fri, 29 May 2015 13:58:29 +0000 (14:58 +0100)]
bluez: Add bluez-daemon package

Move bluetoothd and related programs and files from bluez-utils into
bluez-daemon package. The main motivation for this is to remove the dependency
to DBus from bluez-utils. The utilities like "hcitool" are useful without it.

Also add kmod-bluetooth dependency to bluez-utils, as the utils don't make much
sense without bluetooth support in the kernel.

Signed-off-by: Bruno Randolf <br1@einfach.org>
6 years agoMerge pull request #5086 from wigyori/for-15.05-fdm2
Zoltan Herpai [Sat, 18 Nov 2017 11:58:16 +0000 (12:58 +0100)]
Merge pull request #5086 from wigyori/for-15.05-fdm2

CC: mail/fdm: update download URL
6 years agoMerge pull request #5099 from wigyori/for-15.05-taskwarrior
Zoltan Herpai [Sat, 18 Nov 2017 11:57:57 +0000 (12:57 +0100)]
Merge pull request #5099 from wigyori/for-15.05-taskwarrior

CC: utils/taskwarrior: upgrade to 2.4.4
6 years agoMerge pull request #5095 from wigyori/for-15.05-perl
Zoltan Herpai [Sat, 18 Nov 2017 11:57:41 +0000 (12:57 +0100)]
Merge pull request #5095 from wigyori/for-15.05-perl

CC: upgrade a couple perl packages
6 years agoMerge pull request #5101 from wigyori/for-15.05-tor
Zoltan Herpai [Sat, 18 Nov 2017 11:57:25 +0000 (12:57 +0100)]
Merge pull request #5101 from wigyori/for-15.05-tor

CC: net/tor: fix build and upgrade to 0.2.9.11
6 years agoMerge pull request #5108 from wigyori/for-15.05-php
Michael Heimpold [Mon, 13 Nov 2017 19:18:55 +0000 (20:18 +0100)]
Merge pull request #5108 from wigyori/for-15.05-php

CC: php: upgrade to 5.6.32
LGTM2, thanks.

6 years agoMerge pull request #5111 from wigyori/for-15.05-nginx
Thomas Heil [Mon, 13 Nov 2017 09:28:25 +0000 (10:28 +0100)]
Merge pull request #5111 from wigyori/for-15.05-nginx

CC: nginx: upgrade to 1.12.1
6 years agoMerge pull request #5080 from wigyori/for-15.05
Zoltan Herpai [Mon, 13 Nov 2017 06:24:45 +0000 (07:24 +0100)]
Merge pull request #5080 from wigyori/for-15.05

CC: update download URLs for various packages
6 years agoMerge pull request #5078 from wigyori/for-15.05-neon
Zoltan Herpai [Mon, 13 Nov 2017 06:22:58 +0000 (07:22 +0100)]
Merge pull request #5078 from wigyori/for-15.05-neon

CC: upgrade libs/neon
6 years agoMerge pull request #5094 from wigyori/for-15.05-pianod
Zoltan Herpai [Mon, 13 Nov 2017 06:20:47 +0000 (07:20 +0100)]
Merge pull request #5094 from wigyori/for-15.05-pianod

CC: fix pianod build
6 years agosquid: bump to 3.5.27 5114/head
Marko Ratkaj [Tue, 19 Sep 2017 15:38:19 +0000 (17:38 +0200)]
squid: bump to 3.5.27

Bump Squid to version 3.5.27 and fix broken menuconfig menu.

Signed-off-by: Marko Ratkaj <marko.ratkaj@sartura.hr>
6 years agonet/squid: Allow squid to parse mime.conf
Adam Gensler [Sun, 8 Jan 2017 15:12:57 +0000 (10:12 -0500)]
net/squid: Allow squid to parse mime.conf

Copy mime.conf to temporary directory so squid process can properly read the file. Without it squid cannot access mime.conf and throws a warning during startup.

Signed-off by: Adam Gensler <openwrt@a.gnslr.us>

6 years agoMerge pull request #5098 from wigyori/for-15.05-stunnel
Zoltan Herpai [Sun, 12 Nov 2017 21:50:48 +0000 (22:50 +0100)]
Merge pull request #5098 from wigyori/for-15.05-stunnel

CC: net/stunnel: fix download source and upgrade
6 years agoMerge pull request #5093 from wigyori/for-15.05-libupnpp
Zoltan Herpai [Sun, 12 Nov 2017 20:57:56 +0000 (21:57 +0100)]
Merge pull request #5093 from wigyori/for-15.05-libupnpp

CC: upmpdcli/libupnpp upgrade
6 years agoMerge pull request #5112 from wigyori/for-15.05-sshfs
Zoltan Herpai [Sun, 12 Nov 2017 20:44:52 +0000 (21:44 +0100)]
Merge pull request #5112 from wigyori/for-15.05-sshfs

CC: sshfs: upgrade to 2.10
6 years agosshfs: upgrade to 2.10 5112/head
Zoltan HERPAI [Sun, 12 Nov 2017 19:57:16 +0000 (20:57 +0100)]
sshfs: upgrade to 2.10

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
6 years agonginx: update lua-nginx to cdd2ae921f67bf396c743406493127be496e57ce 5111/head
Thomas Heil [Wed, 16 Aug 2017 23:05:46 +0000 (01:05 +0200)]
nginx: update lua-nginx to cdd2ae921f67bf396c743406493127be496e57ce
 - fixes lua compilation issue

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
6 years agonginx: update to 1.12.1
Uwe Arnold [Sun, 13 Aug 2017 16:40:38 +0000 (18:40 +0200)]
nginx: update to 1.12.1
Fixes: CVE-2017-7529
remove PKG_MD5SUM as it is deprecated

Signed-off-by: Uwe Arnold <donvipre@gmail.com>
6 years agonginx: update to 1.12.0, the latest stable version
Val Kulkov [Wed, 24 May 2017 15:48:29 +0000 (11:48 -0400)]
nginx: update to 1.12.0, the latest stable version

This is a straightforward update to the latest stable version.

Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
6 years agonginx: update to 1.10.3, add new module options
Val Kulkov [Wed, 1 Feb 2017 05:25:57 +0000 (00:25 -0500)]
nginx: update to 1.10.3, add new module options

Update nginx to version 1.10.3.

Add new configuration options to enable the following optional
modules (disabled by default):
   - http_auth_request_module
   - http_v2_module
   - http_realip_module
   - http_secure_link_module

Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
6 years agonginx: bump version to latest stable 1.10.2
heil [Tue, 20 Dec 2016 15:37:53 +0000 (16:37 +0100)]
nginx: bump version to latest stable 1.10.2

Signed-off-by: heil <heil@terminal-consulting.de>
6 years agonginx: Bumped nginx-naxsi to v0.54
Xotic750 [Tue, 31 May 2016 23:36:50 +0000 (01:36 +0200)]
nginx: Bumped nginx-naxsi to v0.54

Signed-off-by: Graham Fairweather <xotic750@gmail.com>
6 years agonginx: Bumped to v1.10.1
Xotic750 [Tue, 31 May 2016 20:54:26 +0000 (22:54 +0200)]
nginx: Bumped to v1.10.1
fixes NULL pointer dereference while writing client request body vulnerability (CVE-2016-4450).

Signed-off-by: Graham Fairweather <xotic750@gmail.com>
6 years agonginx: change start level to 80
Dirk Feytons [Tue, 10 May 2016 13:54:27 +0000 (15:54 +0200)]
nginx: change start level to 80

Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
6 years agonginx: correct f3c7cc6
Dirk Feytons [Mon, 9 May 2016 16:09:41 +0000 (18:09 +0200)]
nginx: correct f3c7cc6

Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
6 years agonginx: correct errors from previous merge
heil [Mon, 9 May 2016 12:25:18 +0000 (14:25 +0200)]
nginx: correct errors from previous merge

Signed-off-by: heil <heil@terminal-consulting.de>
6 years agonginx: upstep to 1.10.0, add Lua module, footprint optimizations
Dirk Feytons [Fri, 29 Apr 2016 14:00:50 +0000 (16:00 +0200)]
nginx: upstep to 1.10.0, add Lua module, footprint optimizations

Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
6 years agonginx: bump to version 1.9.13
heil [Wed, 30 Mar 2016 12:28:40 +0000 (14:28 +0200)]
nginx: bump to version 1.9.13

Signed-off-by: heil <heil@terminal-consulting.de>
6 years agonginx: add naxsi module
heil [Mon, 25 Jan 2016 15:57:07 +0000 (16:57 +0100)]
nginx: add naxsi module

 - this brings back naxsi support aka WAF for nginx

Signed-off-by: heil <heil@terminal-consulting.de>
6 years agonginx: upstep to 1.9.9
Dirk Feytons [Thu, 10 Dec 2015 15:24:00 +0000 (16:24 +0100)]
nginx: upstep to 1.9.9

Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
6 years agonginx: bump to 1.9.6
Luka Perkov [Sat, 10 Oct 2015 16:20:10 +0000 (18:20 +0200)]
nginx: bump to 1.9.6

In this bump as agreed with Thomas we are dropping out all the nginx 3rd party
addons. In case you would like to see your 3rd party addon included please send
a pull request and make sure it works with newest version.

Signed-off-by: Luka Perkov <luka@openwrt.org>
6 years agonginx: add support for SPNEGO authentication
Paul Fertser [Tue, 1 Sep 2015 05:15:26 +0000 (08:15 +0300)]
nginx: add support for SPNEGO authentication

This adds a module suitable for Kerberos SSO, e.g. for integrating
into Active Directory domains.

Signed-off-by: Paul Fertser <fercerpav@gmail.com>
6 years agonginx: fix musl compatibility
heil [Sun, 21 Jun 2015 19:41:17 +0000 (21:41 +0200)]
nginx: fix musl compatibility

 - include Patches according to issue #1129
 - refresh Makefile

Signed-off-by: heil <heil@terminal-consulting.de>
6 years agortklib: fix repository and bump version (fixes #3212)
Nuno Goncalves [Fri, 23 Sep 2016 11:29:23 +0000 (13:29 +0200)]
rtklib: fix repository and bump version (fixes #3212)

Signed-off-by: Nuno Goncalves <nunojpg@gmail.com>
6 years agortklib: bump version to 2.4.2 p11, close #1624
Nuno Goncalves [Sun, 23 Aug 2015 13:29:46 +0000 (14:29 +0100)]
rtklib: bump version to 2.4.2 p11, close #1624

Signed-off-by: Nuno Goncalves <nunojpg@gmail.com>
6 years agophp5: bump to 5.6.32 5108/head
Zoltan HERPAI [Fri, 10 Nov 2017 21:12:34 +0000 (22:12 +0100)]
php5: bump to 5.6.32

Fixes since 5.6.26:
 - ton of bugs
 - CVE-2016-9933
 - CVE-2016-9934
 - CVE-2016-9935
 - CVE-2016-10158
 - CVE-2016-10167
 - CVE-2016-10168
 - CVE-2016-10159
 - CVE-2016-10160
 - CVE-2016-10161
 - CVE-2017-7890
 - CVE-2017-9224
 - CVE-2017-9226
 - CVE-2017-9227
 - CVE-2017-9228
 - CVE-2017-9229
 - CVE-2016-1283

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
6 years agophp5: update to 5.6.26
Michael Heimpold [Wed, 21 Sep 2016 19:52:43 +0000 (21:52 +0200)]
php5: update to 5.6.26

This fixes the following CVEs:
 - in intl: CVE-2016-7416
 - in mysqlnd: CVE-2016-7412
 - in phar: CVE-2016-7414
 - in spl: CVE-2016-7417
 - in standard: CVS-2016-7411
 - in wddx: CVE-2016-7413, CVE-2016-7418

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
6 years agophp5: update to 5.6.25
Michael Heimpold [Sat, 27 Aug 2016 22:10:42 +0000 (00:10 +0200)]
php5: update to 5.6.25

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
6 years agophp5: update to 5.6.23
Michael Heimpold [Tue, 19 Jul 2016 21:14:33 +0000 (23:14 +0200)]
php5: update to 5.6.23

This fixes the following CVEs:
 - in GD: CVE-2015-8874, CVE-2016-5766, CVE-2016-5767
 - in mbstring: CVE-2016-5768
 - in mcrypt: CVE-2016-5769
 - in SPL: CVE-2016-5770, CVE-2016-5771
 - in WDDX: CVE-2016-5772
 - in zip: CVE-2016-5773

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
6 years agophp5: update to 5.6.21
Michael Heimpold [Sat, 21 May 2016 20:12:25 +0000 (22:12 +0200)]
php5: update to 5.6.21

This fixes the following CVEs:
 - in BCMath: CVE-2016-4537, CVE-2016-4538
 - in EXIF: CVE-2016-4542, CVE-2016-4543, CVE-2016-4544
 - in GD: CVE-2016-3074
 - in Intl: CVE-2016-4540, CVE-2016-4541
 - in XML: CVE-2016-4539

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
6 years agophp5: add mod_intl (resolves #2620)
Michael Heimpold [Sun, 24 Apr 2016 20:40:53 +0000 (22:40 +0200)]
php5: add mod_intl (resolves #2620)

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
6 years agophp5: update to 5.6.19
Michael Heimpold [Wed, 23 Mar 2016 20:13:55 +0000 (21:13 +0100)]
php5: update to 5.6.19

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
6 years agophp5: update to 5.6.18
Michael Heimpold [Sat, 6 Feb 2016 22:26:07 +0000 (23:26 +0100)]
php5: update to 5.6.18

Note: Upstream tagged this as security release.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
6 years agoxupnpd: update to latest version 5102/head
Álvaro Fernández Rojas [Mon, 5 Sep 2016 07:23:58 +0000 (09:23 +0200)]
xupnpd: update to latest version

Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
6 years agoxupnpd: Update to 2016-05-11
kuoruan [Sun, 29 May 2016 06:43:39 +0000 (14:43 +0800)]
xupnpd: Update to 2016-05-11

* Change source url to GitHub
* Update to 2016-05-11
* Add LICENSE
* Edit Makefile

Signed-off-by: Hsing-Wang Liao <kuoruan@gmail.com>
Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
6 years agowifidog: Bump to 1.3.0 5103/head
Michael Haas [Sun, 25 Oct 2015 08:56:55 +0000 (09:56 +0100)]
wifidog: Bump to 1.3.0

* Updates wifidog to latest upstream release.
* Removes patches/100-musl-compat.patch as that's included in 1.3.0

Signed-off-by: Michael Haas <haas@computerlinguist.org>
6 years agowifidog: fix musl compatibility
Jo-Philipp Wich [Wed, 17 Jun 2015 17:38:55 +0000 (19:38 +0200)]
wifidog: fix musl compatibility

 - Fix missing `fcntl.h` in `protocol.c`
 - Replace nonstandard `sys/unistd.h` includes with `unistd.h` ones

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
6 years agoMerge pull request #5100 from wigyori/for-15.05-tracertools
Daniel Golle [Fri, 10 Nov 2017 17:26:32 +0000 (18:26 +0100)]
Merge pull request #5100 from wigyori/for-15.05-tracertools

CC: tracertools: use new git HEAD
6 years agotracertools: use new git HEAD 5100/head
Daniel Golle [Tue, 23 Feb 2016 08:38:16 +0000 (10:38 +0200)]
tracertools: use new git HEAD

gitorious archive became available, so I could import the project
history from there into the new repo on github. Rebasing the changes
made since 2014 on top of the original git tree obviously caused
the commit hashes to differ.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
6 years agotracertools: update source, fixes bug on little-endian systems
Daniel Golle [Mon, 18 Jan 2016 00:22:52 +0000 (01:22 +0100)]
tracertools: update source, fixes bug on little-endian systems

and improves collectd support

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
6 years agotracertools: update source
Daniel Golle [Sat, 26 Dec 2015 04:05:03 +0000 (05:05 +0100)]
tracertools: update source

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
6 years agotor: update to version 0.2.9.11 5101/head
Hauke Mehrtens [Mon, 3 Jul 2017 21:00:29 +0000 (23:00 +0200)]
tor: update to version 0.2.9.11

This fixes CVE-2017-0376

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agotor: update to version 0.2.9.10
Hauke Mehrtens [Mon, 13 Mar 2017 21:31:21 +0000 (22:31 +0100)]
tor: update to version 0.2.9.10

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agotor: update to version 0.2.9.9
Hauke Mehrtens [Tue, 31 Jan 2017 22:44:00 +0000 (23:44 +0100)]
tor: update to version 0.2.9.9

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agotor: log to syslog by default
Hauke Mehrtens [Sat, 14 Jan 2017 16:40:43 +0000 (17:40 +0100)]
tor: log to syslog by default

Make tor log to syslog by default instead of stdout.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agotor: add tor-gencert, tor-resolve and torify
Hauke Mehrtens [Sat, 14 Jan 2017 14:38:14 +0000 (15:38 +0100)]
tor: add tor-gencert, tor-resolve and torify

These are some additional applications build by the tor package.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agotor: add geoip6 to tor-geoip
Hauke Mehrtens [Sat, 14 Jan 2017 14:26:41 +0000 (15:26 +0100)]
tor: add geoip6 to tor-geoip

This add the IPv6 addresses to the tor-geoip6 package.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agotor: preserve tor keys over sysupgrade
Hauke Mehrtens [Sat, 14 Jan 2017 14:29:19 +0000 (15:29 +0100)]
tor: preserve tor keys over sysupgrade

Mark the directories containing the keys for hidden services as
conffiles to preserve them over sysupgrade.

Fixes: #2247
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agotor: update to version 0.2.9.8
Hauke Mehrtens [Sat, 14 Jan 2017 14:28:02 +0000 (15:28 +0100)]
tor: update to version 0.2.9.8

In addition update some configure options and use EXTRA_CFLAGS.
Setting RunAsDaemon to 1 will be overwritten by the init script option
"--runasdaemon 0" anyway and we want it in foreground for procd.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agotor: update to version 0.2.8.11
Hauke Mehrtens [Sun, 11 Dec 2016 22:56:19 +0000 (23:56 +0100)]
tor: update to version 0.2.8.11

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
6 years agoTor: update to 0.2.8.9
Nima Fatemi [Wed, 26 Oct 2016 16:54:44 +0000 (16:54 +0000)]
Tor: update to 0.2.8.9

    - update to 0.2.8.9
    - use sha256 instead of md5 for integrity check
    - add dependency: libcap

signed-off-by: Nima Fatemi <nima@torproject.org>

6 years agotor: add missing zlib dependency
Felix Fietkau [Sun, 24 Jul 2016 12:55:45 +0000 (14:55 +0200)]
tor: add missing zlib dependency

Signed-off-by: Felix Fietkau <nbd@nbd.name>