Commit graph

3500 commits

Author SHA1 Message Date
Marko Ratkaj
2543a12a60
Merge pull request #5114 from wigyori/for-15.05-squid
CC: squid: upgrade to 3.5.27
2018-01-24 20:23:49 +01:00
Zoltan Herpai
e5f16da2ec
Merge pull request #5233 from wigyori/for-15.05-bind
CC: bind: bump to 9.11.2
2017-12-07 10:49:26 +01:00
Zoltan HERPAI
2f28404a93 bind: bring back PKG_MD5SUM for CC
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2017-12-06 21:23:26 +01:00
Philip Prindeville
bc8a2ff329 bind: version update to 9.11.2
Also refresh patches and dependencies.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2017-11-19 17:36:53 +01:00
Noah Meyerhans
ed10cd0c39 bind: Update to 9.10.5-P3
New upstream release includes fixes for the following security issues:

 * CVE-2017-3140: With certain RPZ configurations, a response with TTL 0 could
   cause named to go into an infinite query loop
 * CVE-2017-3142: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.
 * CVE-2017-3143: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:34:15 +01:00
Sami Olmari
e2cd2f2b3c bind: Include dnssec-settime in bind-dnssec/tool
<net/bind>

Maintainer: @nmeyerhans
Compile tested: x86_64, OpenWRT 50107
Run tested: x86 / 64, OpenWRT 50107

Description:

Added dnssec-settime into bind-dnssec and bind-tools

Signed-off-by: Sami Olmari <sami+git@olmari.fi>
2017-11-19 17:34:05 +01:00
Noah Meyerhans
f648f3766f bind: Update to bind-9.10.5
This change includes fixes for several security issues:

  * CVE-2017-3138: rndc "" could trigger an assertion failure in named.
  * CVE-2017-3137: Some chaining (i.e., type CNAME or DNAME) responses to
    upstream queries could trigger assertion failures.
  * CVE-2017-3136: dns64 with break-dnssec yes; can result in an assertion
    failure.
  * CVE-2017-3135: If a server is configured with a response policy zone
    (RPZ) that rewrites an answer with local data, and is also configured
    for DNS64 address mapping, a NULL pointer can be read triggering a
    server crash.
  * CVE-2016-9444: named could mishandle authority sections with missing
    RRSIGs, triggering an assertion failure.
  * CVE-2016-9131: named mishandled some responses where covering RRSIG
    records were returned without the requested data, resulting in an
    assertion failure.
  * CVE-2016-9131: named incorrectly tried to cache TKEY records which could
    trigger an assertion failure when there was a class mismatch.
  * CVE-2016-8864: It was possible to trigger assertions when processing
    responses containing answers of type DNAME.
  * CVE-2016-6170: Added the ability to specify the maximum number of
    records permitted in a zone (max-records #;). This provides a mechanism
    to block overly large zone transfers, which is a potential risk with
    slave zones from other parties.
  * CVE-2016-2776: It was possible to trigger an assertion when rendering a
    message using a specially crafted request.
  * CVE-2016-2775: Calling getrrsetbyname() with a non absolute name could
    trigger an infinite recursion bug in lwresd or named with lwres
    configured if, when combined with a search list entry from resolv.conf,
    the resulting name is too long.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:33:49 +01:00
Noah Meyerhans
556c80b16f bind: update to bind-9.10.4-P5
This change fixes multiple denial-of-service vulnerabilities:
 * CVE-2016-9131: A malformed response to an ANY query can cause an
   assertion failure during recursion
 * CVE-2016-9147: An error handling a query response containing
   inconsistent DNSSEC information could cause an assertion failure
 * CVE-2016-9444: An unusually-formed DS record response could cause
   an assertion failure
 * CVE-2016-9778: An error handling certain queries using the
   nxdomain-redirect feature could cause a REQUIRE assertion failure
   in db.c

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:33:33 +01:00
Stijn Tintel
bd048aabb8 bind: disable libjson support
If libjson-c is detected during bind-libs configure phase, bind-libs
will be built with libjson support. This results in a missing dependency
error during install phase. Solve this by disabling libjson support.
2017-11-19 17:32:03 +01:00
Noah Meyerhans
cc6555e1d9 bind: set sysconfdir to /etc/bind
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:31:47 +01:00
Zoltan Herpai
e6ff63036d
Merge pull request #5081 from wigyori/for-15.05-mxml3
CC: upgrade mxml, update download URL
2017-11-18 21:18:41 +01:00
Zoltan Herpai
5fe8c6140e
Merge pull request #5103 from wigyori/for-15.05-wifidog
CC: wifidog: upgrade to 1.3.0 to fix build
2017-11-18 21:14:31 +01:00
Zoltan Herpai
49f5ad1706
Merge pull request #5086 from wigyori/for-15.05-fdm2
CC: mail/fdm: update download URL
2017-11-18 12:58:16 +01:00
Zoltan Herpai
765b738db7
Merge pull request #5099 from wigyori/for-15.05-taskwarrior
CC: utils/taskwarrior: upgrade to 2.4.4
2017-11-18 12:57:57 +01:00
Zoltan Herpai
51a5745910
Merge pull request #5095 from wigyori/for-15.05-perl
CC: upgrade a couple perl packages
2017-11-18 12:57:41 +01:00
Zoltan Herpai
b017b246df
Merge pull request #5101 from wigyori/for-15.05-tor
CC: net/tor: fix build and upgrade to 0.2.9.11
2017-11-18 12:57:25 +01:00
Michael Heimpold
345cb4d509
Merge pull request #5108 from wigyori/for-15.05-php
CC: php: upgrade to 5.6.32

LGTM2, thanks.
2017-11-13 20:18:55 +01:00
Thomas Heil
5df3860f23
Merge pull request #5111 from wigyori/for-15.05-nginx
CC: nginx: upgrade to 1.12.1
2017-11-13 10:28:25 +01:00
Zoltan Herpai
9faf1ea30c
Merge pull request #5080 from wigyori/for-15.05
CC: update download URLs for various packages
2017-11-13 07:24:45 +01:00
Zoltan Herpai
330f86da51
Merge pull request #5078 from wigyori/for-15.05-neon
CC: upgrade libs/neon
2017-11-13 07:22:58 +01:00
Zoltan Herpai
d2a404bf3c
Merge pull request #5094 from wigyori/for-15.05-pianod
CC: fix pianod build
2017-11-13 07:20:47 +01:00
Marko Ratkaj
9b772a50db squid: bump to 3.5.27
Bump Squid to version 3.5.27 and fix broken menuconfig menu.

Signed-off-by: Marko Ratkaj <marko.ratkaj@sartura.hr>
2017-11-12 23:38:23 +01:00
Adam Gensler
3e972a57c6 net/squid: Allow squid to parse mime.conf
Copy mime.conf to temporary directory so squid process can properly read the file. Without it squid cannot access mime.conf and throws a warning during startup.

Signed-off by: Adam Gensler <openwrt@a.gnslr.us>
2017-11-12 23:14:26 +01:00
Zoltan Herpai
bb39456e41
Merge pull request #5098 from wigyori/for-15.05-stunnel
CC: net/stunnel: fix download source and upgrade
2017-11-12 22:50:48 +01:00
Zoltan Herpai
de8dc83895
Merge pull request #5093 from wigyori/for-15.05-libupnpp
CC: upmpdcli/libupnpp upgrade
2017-11-12 21:57:56 +01:00
Zoltan Herpai
4b422023d7
Merge pull request #5112 from wigyori/for-15.05-sshfs
CC: sshfs: upgrade to 2.10
2017-11-12 21:44:52 +01:00
Zoltan HERPAI
942ad75e91 sshfs: upgrade to 2.10
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2017-11-12 20:57:16 +01:00
Thomas Heil
5db5399040 nginx: update lua-nginx to cdd2ae921f67bf396c743406493127be496e57ce
- fixes lua compilation issue

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2017-11-12 19:25:00 +01:00
Uwe Arnold
5837dfeb11 nginx: update to 1.12.1
Fixes: CVE-2017-7529

remove PKG_MD5SUM as it is deprecated

Signed-off-by: Uwe Arnold <donvipre@gmail.com>
2017-11-12 19:15:49 +01:00
Val Kulkov
90075956d2 nginx: update to 1.12.0, the latest stable version
This is a straightforward update to the latest stable version.

Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
2017-11-12 19:15:45 +01:00
Val Kulkov
066f648fb1 nginx: update to 1.10.3, add new module options
Update nginx to version 1.10.3.

Add new configuration options to enable the following optional
modules (disabled by default):
   - http_auth_request_module
   - http_v2_module
   - http_realip_module
   - http_secure_link_module

Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
2017-11-12 19:15:39 +01:00
heil
a7ee240daa nginx: bump version to latest stable 1.10.2
Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 19:15:33 +01:00
Xotic750
055ac44d0b nginx: Bumped nginx-naxsi to v0.54
Signed-off-by: Graham Fairweather <xotic750@gmail.com>
2017-11-12 19:15:27 +01:00
Xotic750
15c041ac25 nginx: Bumped to v1.10.1
fixes NULL pointer dereference while writing client request body vulnerability (CVE-2016-4450).

Signed-off-by: Graham Fairweather <xotic750@gmail.com>
2017-11-12 19:15:20 +01:00
Dirk Feytons
63037f9ae4 nginx: change start level to 80
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 19:15:14 +01:00
Dirk Feytons
8fdd1db9d3 nginx: correct f3c7cc6
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 19:15:07 +01:00
heil
a529b679a3 nginx: correct errors from previous merge
Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 19:14:26 +01:00
Dirk Feytons
0912175ec1 nginx: upstep to 1.10.0, add Lua module, footprint optimizations
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 19:14:14 +01:00
heil
a387117a2a nginx: bump to version 1.9.13
Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 18:43:10 +01:00
heil
67a9f67cc4 nginx: add naxsi module
- this brings back naxsi support aka WAF for nginx

Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 18:43:05 +01:00
Dirk Feytons
13021781b4 nginx: upstep to 1.9.9
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 18:42:59 +01:00
Luka Perkov
d44b07c279 nginx: bump to 1.9.6
In this bump as agreed with Thomas we are dropping out all the nginx 3rd party
addons. In case you would like to see your 3rd party addon included please send
a pull request and make sure it works with newest version.

Signed-off-by: Luka Perkov <luka@openwrt.org>
2017-11-12 18:42:54 +01:00
Paul Fertser
3c7b3d57dd nginx: add support for SPNEGO authentication
This adds a module suitable for Kerberos SSO, e.g. for integrating
into Active Directory domains.

Signed-off-by: Paul Fertser <fercerpav@gmail.com>
2017-11-12 18:42:49 +01:00
heil
ec14ed490a nginx: fix musl compatibility
- include Patches according to issue #1129
 - refresh Makefile

Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 18:42:45 +01:00
Nuno Goncalves
b4b69ca9c5 rtklib: fix repository and bump version (fixes #3212)
Signed-off-by: Nuno Goncalves <nunojpg@gmail.com>
2017-11-12 09:38:00 +01:00
Nuno Goncalves
2930345a7b rtklib: bump version to 2.4.2 p11, close #1624
Signed-off-by: Nuno Goncalves <nunojpg@gmail.com>
2017-11-12 09:38:00 +01:00
Zoltan HERPAI
4273641178 php5: bump to 5.6.32
Fixes since 5.6.26:
 - ton of bugs
 - CVE-2016-9933
 - CVE-2016-9934
 - CVE-2016-9935
 - CVE-2016-10158
 - CVE-2016-10167
 - CVE-2016-10168
 - CVE-2016-10159
 - CVE-2016-10160
 - CVE-2016-10161
 - CVE-2017-7890
 - CVE-2017-9224
 - CVE-2017-9226
 - CVE-2017-9227
 - CVE-2017-9228
 - CVE-2017-9229
 - CVE-2016-1283

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2017-11-10 22:12:34 +01:00
Michael Heimpold
b8a8d398de php5: update to 5.6.26
This fixes the following CVEs:
 - in intl: CVE-2016-7416
 - in mysqlnd: CVE-2016-7412
 - in phar: CVE-2016-7414
 - in spl: CVE-2016-7417
 - in standard: CVS-2016-7411
 - in wddx: CVE-2016-7413, CVE-2016-7418

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2017-11-10 20:31:31 +01:00
Michael Heimpold
0897526541 php5: update to 5.6.25
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2017-11-10 20:31:25 +01:00
Michael Heimpold
48b402eb65 php5: update to 5.6.23
This fixes the following CVEs:
 - in GD: CVE-2015-8874, CVE-2016-5766, CVE-2016-5767
 - in mbstring: CVE-2016-5768
 - in mcrypt: CVE-2016-5769
 - in SPL: CVE-2016-5770, CVE-2016-5771
 - in WDDX: CVE-2016-5772
 - in zip: CVE-2016-5773

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2017-11-10 20:31:20 +01:00