Commit graph

10703 commits

Author SHA1 Message Date
Michael Heimpold
7aacf24236 php7: update to 7.2.16
Also refresh patch which does not apply cleanly anymore.

Run tested on Duckbill for mxs platform.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit 80cdd53134)
2019-03-26 20:21:04 +01:00
Michael Heimpold
27433fc3eb php7: fix cross compiling patch (fixes #8166)
Fixes: e148924a4 ("php7: update to 7.2.15")

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit 1d4081dd4c)
2019-03-26 20:20:57 +01:00
Michael Heimpold
00f6119bd2 php7: update to 7.2.15
Also refresh patch which does not apply cleanly anymore.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit e148924a4c)
2019-03-26 20:20:51 +01:00
Michael Heimpold
ef57201aa9 php7: update to 7.2.14
While at, add --with-pic to configure arguments. This prevents the following
build errors spotted by the build bots for i386 targets:

-snip-
...
ext/openssl/.libs/openssl.o: direct GOT relocation R_386_GOT32X against
`X509_REQ_free' without base register can not be used when making a shared object
...
-snap-

This parameter seems to make no difference on other targets, nor
improve or make worse the package size.

Run tested for i386 in VirtualBox VM and on Duckbill for mxs platform.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit 963c841463)
2019-03-26 20:20:43 +01:00
Michael Heimpold
e9271cf276 php7: update to 7.2.13
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit 794f8f8e94)
2019-03-26 20:20:36 +01:00
Michael Heimpold
1308ba92ce php7: update to 7.2.12
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit 2186fe821d)
2019-03-26 20:20:31 +01:00
Michael Heimpold
9e330d6e9d php7: update to 7.2.11
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit 797776a3b3)
2019-03-26 20:20:24 +01:00
Michael Heimpold
5e25be5353 php7: update to 7.2.10
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit c69af6717c)
2019-03-26 20:20:18 +01:00
Michael Heimpold
85c616557f php7: adjust load priority for openssl (fixes #6893)
This orders loading of openssl extension before extensions
which require openssl functions.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit 5afeb3f9c8)
2019-03-26 20:20:05 +01:00
Hannu Nyman
31d279c963 nano: update to 4.0
Update nano editor to version 4.0.

Release notes at
http://git.savannah.gnu.org/cgit/nano.git/plain/NEWS?h=v4.0

 2019.03.24 - GNU nano 4.0 "Thy Rope of Sands"
 * An overlong line is no longer automatically hard-wrapped.
 * Smooth scrolling (one line at a time) has become the default.
 * A newline character is no longer automatically added at end of buffer.
 * The line below the title bar is by default part of the editing space.
 * Option --breaklonglines (-b) turns automatic hard-wrapping back on.
 * Option --jumpyscrolling (-j) gives the chunky, half-screen scrolling.
 * Option --finalnewline (-f) brings back the automatic newline at EOF.
 * Option --emptyline (-e) leaves the line below the title bar unused.
 * <Alt+Up> and <Alt+Down> now do a linewise scroll instead of a findnext.
 * Any number of justifications can be undone (like all other operations).
 * When marked text is justified, it becomes a single, separate paragraph.
 * Option --guidestripe=<number> draws a vertical bar at the given column.
 * Option --fill=<number> no longer turns on automatic hard-wrapping.
 * When a line continues offscreen, it now ends with a highlighted ">".
 * The halfs of a split two-column character are shown as "[" and "]".
 * A line now scrolls horizontally one column earlier.
 * The bindable functions 'cutwordleft' and 'cutwordright' were renamed
   to 'chopwordleft' and 'chopwordright' as they don't use the cutbuffer.
 * The paragraph-jumping functions were moved from Search to Go-to-Line.
 * Option --rebinddelete is able to compensate for more misbindings.
 * Options --morespace and --smooth are obsolete and thus ignored.
 * The --disable-wrapping-as-root configure option was removed.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit f1d51dbf76)
2019-03-24 19:32:58 +02:00
Rosen Penev
e47fe43ea5 Jinja2: Update to 2.10
Switch URL to a deterministic one.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-03-19 00:19:46 +01:00
Luiz Angelo Daros de Luca
8d7e62d952 ruby: update to 2.5.5
2.5.5: Bug fix for a deadlock in multi-thread/multi-process (using Process.fork) applications, like for example Puma

2.5.4: Fixes multiple vulnerabilities:

CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors

Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
2019-03-18 14:39:28 -03:00
Luiz Angelo Daros de Luca
17a0279dd1 ruby: fix build for uclibc
Backporting upstream fix. Closes #8051.

Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
(cherry picked from commit f9b16dea51)
2019-03-18 14:39:21 -03:00
Daniel Gimpelevich
017b74d359 vpnc: fix IPv6-triggered inoperability
When the server hostname resolved to both IPv4 and IPv6 addresses,
connecting would fail with nothing in syslog. This corrects that oversight.

Signed-off-by: Daniel Gimpelevich <daniel@gimpelevich.san-francisco.ca.us>

(cherry picked from ca56324 and PKG_MIRROR_HASH removal from 494ce71)
2019-03-17 16:39:07 +02:00
Hannu Nyman
563aafceec postgresql: Revert adding build dependency to zlib/host
Revert the addition of build dependency in commit 2d1694ff7
to a non-existent host build of zlib.

The host build of zlib was removed already in April 2018 by
8dcd941d8b (diff-1ed408c61d79f9c6c5d197333e94ce8d)
which made zlib a build tool defined in /tools

The newly introduced build dependency causes always a warning like:
   WARNING: Makefile 'package/feeds/packages/postgresql/Makefile'
   has a build dependency on 'zlib/host', which does not exist

Not sure what was the error that 2d1694ff7 tried to fix,
but reference to a non-existent host build is not the solution.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit d8e61d49da)
2019-03-17 10:44:13 +02:00
Hannu Nyman
3323ebddfe
Merge pull request #8403 from BKPepe/transmission_openwrt-18.06
[OpenWrt 18.06] Transmission: update to version 2.94
2019-03-16 08:01:50 +02:00
Hannu Nyman
c0293cd999
Merge pull request #8402 from BKPepe/netdata_openwrt-18.06
[OpenWrt 18.06] Netdata: update to version 1.12.2
2019-03-16 08:00:39 +02:00
Hannu Nyman
9bb4bcc9b4
Merge pull request #8395 from EricLuehrsen/unbound_191_1806
[openwrt-18.06] unbound: update to 1.9.1
2019-03-13 17:24:28 +02:00
Rosen Penev
d444a910fe
transmission: update to version 2.94
Add LTO support

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-03-13 15:38:29 +01:00
Josef Schlehofer
99c3670bb1
Netdata: update to version 1.12.2
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2019-03-13 14:49:38 +01:00
Ted Hess
1e347beb3c libtalloc: Merge 2.1.14 from master (remove libbsd dependency)
Signed-off-by: Ted Hess <thess@kitschensync.net>
2019-03-13 08:39:17 -04:00
Eric Luehrsen
a476bf8d00 unbound: update to 1.9.1
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2019-03-12 21:26:53 -04:00
Hannu Nyman
060e59a285
Merge pull request #8386 from wvdakker/openwrt-18.06
Openwrt 18.06: Shorewall Bump to 5.2.0.5 (issue #8382)
2019-03-12 17:49:32 +02:00
W. van den Akker
86efe678a2
Shorewall6: Bump to 5.2.0.5.
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-03-11 20:47:54 +01:00
W. van den Akker
9cdc22eefe
Shorewall: Bump to 5.2.0.5.
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-03-11 20:47:54 +01:00
W. van den Akker
3669215b21
Shorewall6-lite: Bump to 5.2.0.5.
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-03-11 20:47:54 +01:00
W. van den Akker
762093fe72
Shorewall-lite: Bump to 5.2.0.5.
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-03-11 20:47:54 +01:00
W. van den Akker
1a97a8444f
Shorewall-core: Bump to 5.2.0.5.
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-03-11 20:47:21 +01:00
Daniel Golle
121072523c postgresql: add HOST_BUILD_DEPENDS:=zlib/host
spotted on buildbot trying postgresql/host build:
configure: error: zlib library not found

Fix this by adding zlib/host to HOST_BUILD_DEPENDS.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry-picked from commit 2d1694ff7c)
2019-03-11 02:27:24 +01:00
Daniel Golle
daef6665b4 gnurl: update to version 7.64.0
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry-picked from commit 78adac5930)
2019-03-11 02:26:09 +01:00
Daniel Golle
5fff804725 libgabe: add package
cherry-pick and squash commits from master for GNUnet
 04eb431cb libgabe: add package
 7831fb63b libgabe: update to shared library version

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-07 03:21:21 +01:00
Daniel Golle
cb253649a0 libpbc: add new package
cherry-pick commit 4c5d25458 libpbc: add new package
from master as GNUnet started to depend on libgabe which depends on
libpbc.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-07 01:39:24 +01:00
Daniel Golle
f03acaa391
Merge pull request #8346 from Cynerd/jinja2-missing-dep-18.06
Jinja2: add missing dependency on markupsafe
2019-03-05 19:05:35 +01:00
Karel Kočí
2324d341ea
Jinja2: add missing dependency on markupsafe
Signed-off-by: Karel Kočí <karel.koci@nic.cz>
2019-03-05 17:20:36 +01:00
Daniel Golle
0ba0e0d1b5 gnunet: revert accidentally applied libmicrohttpd changes
revert 7b2bf511c gnunet: Specify libmicrohttpd-ssl dependency
which was accidentally merged from master while the rename of the
libmicrohttpd* packages has happened only on master.
Revert it for openwrt-18.06.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-05 02:02:36 +01:00
Daniel Golle
799c409d37 gnunet-secushare: add package (replacing gnunet-social package)
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-03 03:02:19 +01:00
Daniel Golle
d70e35ba10 gnunet: GNUnet v0.11.0 release
Backport and squash the following commits from master:
 4dcd1d4d0 gnunet: update to 0.12 pre-release snapshot
 acc59d3a0 gnunet: fix uclibc build issue
 f546ac9b8 gnunet: remove iconv hack
 b5b271a39 gnunet: update to gnunet 0.11 release candidate source as of 20180929
 1459c3513 gnunet: update source
 0b548cb73 gnunet: adapt uci-defaults to renamed namestore-flat -> -heap
 effc8b5bf gnunet: update to source to 20190128
 7b2bf511c gnunet: Specify libmicrohttpd-ssl dependency
 1d5af8f9e gnunet: fix PKG_MIRROR_HASH
 77191eddb gnunet: GNUnet v0.11 release
 1c658e5f3 gnunet-secushare: auto-configure database backend

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-03 03:02:12 +01:00
Daniel Golle
799f553b2a postgresql: update to version 9.6.12
Backport and squash the following commits from master:
 43ec390bd postgresql: security bump to 9.6.10
 845aab78a postgresql: Update to 9.6.11
 fe6597dd7 postgresql: update to version 9.6.12

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-03 03:02:07 +01:00
Daniel Golle
257dfbb55b libextractor: update to version 1.9
Backport and squash the following commits from master:
 853e9d1c3 libextractor: Update to 1.7
 1a23de5db libextractor: update to version 1.8
 a50f26941 libextractor: fix PKG_HASH
 6709d9b82 libextractor: update to version 1.9
2019-03-03 03:02:01 +01:00
Daniel Golle
6c2266acff gnurl: update to version 7.63.0
Backport and squash the following commits from master:
 af06f6fd5 gnurl: update to version 7.61.1
 7cdbb7569 gnurl: build without libpsl
 d34eda733 gnurl: update to version 7.63.0

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2019-03-03 03:01:48 +01:00
Yousong Zhou
3e6d392e02 openvswitch: bump to version 2.8.5
Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2019-02-27 10:31:44 +00:00
Stijn Tintel
5de163d67c vallumd: bump to 0.1.4
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit d89cd30a79)
2019-02-17 18:28:56 +02:00
Hannu Nyman
383019fdff
Merge pull request #8207 from commodo/18.06-CVE-2018-20406
[18.06] python3: fix [CVE-2018-20406]
2019-02-14 18:25:51 +02:00
Karl Palsson
b8c2c2b1bb mosquitto: update to 1.5.7
This is a minor bugfix release. Full changelog available at:
https://mosquitto.org/blog/2019/02/version-1-5-7-released/

Most relevant to OpenWrt are probably:
* fixing persistent store bloat
* fix sorting of included config files
* fix errors related to per_listener_settings

Signed-off-by: Karl Palsson <karlp@etactica.com>
2019-02-14 11:14:13 +00:00
Peter Wagner
8a2d566849 irssi: update to 1.2.0
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-02-13 23:05:54 +01:00
Alexandru Ardelean
d0f5ae180c [18.06] python3: fix [CVE-2018-20406]
Link to Python bug:
  https://bugs.python.org/issue34656

Upstream commit:
  71a9c65e74

OpenWrt 18.06 contains version Python 3.6.5, which doesn't contain this
fix.
Python 2.7 is not affected.

Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2019-02-13 10:27:22 +02:00
Yousong Zhou
dad217d34c shadowsocks-libev: flush ss rules on entry
Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2019-02-11 13:30:43 +00:00
Karl Palsson
bbc2e68ede mosquitto: bump to 1.5.6
This is a bugfix and security release.

CVE-2018-12551: If Mosquitto is configured to use a password file for
authentication, any malformed data in the password file will be
treated as valid. This typically means that the malformed data becomes
a username and no password. If this occurs, clients can circumvent
authentication and get access to the broker by using the malformed
username. In particular, a blank line will be treated as a valid empty
username. Other security measures are unaffected.

=> Users who have only used the mosquitto_passwd utility to create and
modify their password files are unaffected by this vulnerability.

CVE-2018-12550: If an ACL file is empty, or has only blank lines or
comments, then mosquitto treats the ACL file as not being defined,
which means that no topic access is denied. Although denying access to
all topics is not a useful configuration, this behaviour is unexpected
and could lead to access being incorrectly granted in some
circumstances.

CVE-2018-12546. If a client publishes a retained message to a topic
that they have access to, and then their access to that topic is
revoked, the retained message will still be delivered to future
subscribers. This behaviour may be undesirable in some applications,
so a configuration option `check_retain_source` has been introduced to
enforce checking of the retained message source on publish.

Plus the following bugfixes:
* wills not sent to websocket clients
* spaces now allowed in bridge usernames
* durable clients not receiving offline messages with
per_listener_settings==true
* compilation with openssl without deprecated apis
* TLS working over SOCKS
* better comment handling in config files

Full changelog available at: https://github.com/eclipse/mosquitto/blob/fixes/ChangeLog.txt#L1

Signed-off-by: Karl Palsson <karlp@etactica.com>
2019-02-08 11:55:04 +00:00
Hannu Nyman
1127ef99b7
Merge pull request #8143 from micmac1/18.06-bump-maria38
mariadb: security bump to 10.1.38
2019-02-07 20:49:29 +02:00
Sebastian Kemper
9ffcfea198 mariadb: bump to 10.1.38
Upstream Release Notes:

- MDEV-17475: Maximum value of table_definition_cache is now 2097152
- MDEV-13671: InnoDB should use case-insensitive column name comparisons
  like the rest of the server
- ALTER TABLE fixes: MDEV-17230, MDEV-16499, MDEV-17904, MDEV-17833,
  MDEV-17470, MDEV-18237, MDEV-18016
- Improvements to InnoDB page checksum, recovery, and Mariabackup:
  MDEV-17957, MDEV-12112, MDEV-18025, MDEV-18279, MDEV-18183
- Galera
  - MDEV-15740: Galera durability fix
  - New configuration variable wsrep_certification_rules, used for
    controlling whether to use new/optimized
    (--wsrep_certification_rules=optimized) certification rules or the
    old/classic ones (--wsrep_certification_rules=strict). Setting the
    variable to strict can cause more certification failures.

- Fixes for the following security vulnerabilities:
  - CVE-2019-2537
  - CVE-2019-2529

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2019-02-06 23:36:27 +01:00