Commit graph

17163 commits

Author SHA1 Message Date
Stan Grishin
c493a603cd vpn-policy-routing: downgrade to 0.2.1-13
* there are reports that newer versions don't work on 19.07.x
* revert to older README to describe this older version

Signed-off-by: Stan Grishin <stangri@melmac.net>
(cherry picked from commit 7bb2ccd4e1)
2021-10-17 14:30:52 +00:00
Stan Grishin
a669e1e6da
Merge pull request #16900 from stangri/openwrt-19.07
[19.07] simple-adblock: update to 1.8.8-1
2021-10-15 15:29:08 -07:00
Stan Grishin
a5de193e54 simple-adblock: update to 1.8.8-1
* update 'check' function

Signed-off-by: Stan Grishin <stangri@melmac.net>
(cherry picked from commit d11f310230)
2021-10-15 21:52:29 +00:00
Alexandru Ardelean
1afb4019fd
Merge pull request #16879 from turris-cz/19.07-zipp
python-zipp: pin setuptools-scm version
2021-10-14 10:50:19 +03:00
Stan Grishin
e1388e24e0
Merge pull request #16885 from stangri/openwrt-19.07
[19.07] https-dns-proxy: update to 2021-09-27
2021-10-13 22:08:32 -07:00
Stan Grishin
af3643f9b0 https-dns-proxy: update to 2021-09-27
* update to [2021-09-27](da2501f542)
* fixes https://github.com/aarond10/https_dns_proxy/issues/125
* restart instead of reload on interface hotplug
* fixes https://github.com/openwrt/packages/issues/16794
* produce output and log entries on service start/stop
* prevent unnecessary dnsmasq restarts if service has previously updated dnsmasq settings
* allow both named and typed dnsmasq instance settings to be updated
* update 010-fix-cmakelists patch file

Signed-off-by: Stan Grishin <stangri@melmac.net>
(cherry picked from commit f8d16338da)
2021-10-14 04:58:18 +00:00
Michal Vasilek
f2af6941fa tor: update to 0.4.5.10
* 0.4.4 is not an LTS series, people running tor relays with 0.4.4 will
  be evicted from the tor network. 0.4.5 is an LTS series
* fix building without OpenSSL engine support (from e30f0480c8)
* refresh patches

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2021-10-13 18:29:46 +03:00
Josef Schlehofer
746fa830c6
python-zipp: pin setuptools-scm version
The recent version of setuptools-scm depends on tomli, which has some build issues.
Older one works.

Suggested-by: Jeffery To <jeffery.to@gmail.com>
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-10-13 12:39:34 +02:00
Eneas U de Queiroz
70bb6f15e8 perl: perlmod.mk: use flock when hostpkg/perl used
Avoid parallel relinking and usage of the host perl binary by wrapping
its usage around flock calls.

Sometimes, two packages will try to relink the static host perl binary
at the same time.  Neither of them will have the other's module linked
in, and one of them will unavoidably clobber the other one's binary.

This will lead to errors when a package will not be able to find a
module that was supposed to be installed.

To fix that, an exclusive flock is used when relinking, with a 900
seconds timeout to avoid locking up the build process forever.

This is not enough because the binary may be concurrently used to build
another module package; perl is used in Configure, Compile, and Install
procedures.  If timing is right, a package will fail with a "permission
denied" error.

So a shared flock call is added in Configure, Compile, and Install
definitions for host and target, with a shorter, 300 seconds timeout.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit 1e18c4324f)
2021-10-08 09:48:01 -07:00
Hannu Nyman
15305d2f2e nano: update to 5.9
Update nano editor to version 5.9.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit 38143e6f8b)
(cherry picked from commit e155b3d293)
2021-10-08 18:37:02 +03:00
Hannu Nyman
ece1d7bfce haveged: update to 1.9.15
Update haveged to version 1.9.15.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit 1f3f63f5de)
2021-10-08 18:36:52 +03:00
Glenn Strauss
2d35019d6b lighttpd: update to lighttpd 1.4.55 release hash
update lighttpd in openwrt-19.07 branch from lighttpd 1.4.54 to 1.4.55

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2021-10-06 00:16:45 -07:00
Rosen Penev
dd89b28442
Merge pull request #16569 from turris-cz/19.07/tor-0.4.4.9
tor: update to version 0.4.4.9
2021-09-18 15:05:14 -07:00
Josef Schlehofer
8c3d6a2e17
Merge pull request #16196 from miska/snort3-19.07
net/snort3: Include default configs and snort2lua
2021-09-17 16:20:57 +02:00
Stijn Tintel
b101f744c2 tcpreplay: avoid host lib leakage
On hosts that have pcapnav-config installed, there is host lib leakage.
From config.log:

LNAVLIB='-L/usr/lib64 -lpcapnav -lpcap'
LNAV_CFLAGS='-I/usr/include'

Fix this by disabling pcapnav-config, which isn't available anyway.

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit e4b8fec79c)
2021-09-10 13:12:34 -07:00
Alexandru Ardelean
be17f97265 tcpreplay: bump to version 4.3.4
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
(cherry picked from commit 7436d944fa)
2021-09-10 13:12:34 -07:00
Rosen Penev
6e4e0d5e9d tcpreplay: add libdnet support
On Arch Linux, tcpreplay is picking up the host dnet-config and adding
OS paths, thereby breaking compilation. The easiest solution is to add
libdnet support as the previous commit fixes dnet-config on OpenWrt.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit f9f216a066)
2021-09-10 13:12:34 -07:00
Rosen Penev
e7167f4702 tcpreplay: fix compilation with Arch Linux
It tries to link to host libraries for some reason. Add autoreconf to
fix. Also remove redundant prefixes.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 87177eef75)
2021-09-10 13:12:34 -07:00
Alexandru Ardelean
668aa95dfb tcpreplay: bump to version 4.3.3
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
(cherry picked from commit c7153f22a7)
2021-09-10 13:12:34 -07:00
Michal Vasilek
6dc494fddf ntfs-3g: patch CVE-2019-9755
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2021-09-10 13:11:44 -07:00
Olivier Poitrey
02ce5303d5 nextdns: Update to version 1.37.2
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-09-09 12:48:00 -04:00
Jo-Philipp Wich
4b79a343fe
Merge pull request #16581 from jow-/openwrt-19.07
cgi-io: update to latest Git HEAD
2021-09-08 22:22:35 +02:00
Josef Schlehofer
7a7b8a257b bind: update to version 9.16.20
1. Fixes: CVE-2021-25218

2. Add patch to bump API version, which was forgotten by BIND devs
Related to https://kb.isc.org/docs/map-zone-format-incompatibility-in-bind-9-16-20-and-9-17-17
Pointed out in https://www.openwall.com/lists/oss-security/2021/08/20/2

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-09-08 13:19:09 -07:00
Jo-Philipp Wich
d8ef698a9f cgi-io: update to latest Git HEAD
98cef9d Retry splice() syscall on EINTR

Fixes: https://github.com/openwrt/luci/issues/5342
Fixes: https://bugs.openwrt.org/index.php?do=details&task_id=4006
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
(cherry picked from commit db8e0fdea4)
2021-09-08 22:13:08 +02:00
Petr Štetiar
6c5169b395 cgi-io: update to version 2020-10-27
Contains following list of changes:

 ab4c3471b261 tests: add cram based unit tests
 7b4e3241e1bd tests: add cgi-io built with clang sanitizers
 21831f45d16d Disable session ACLs during unit testing
 2f525417b5df Add initial GitLab CI support
 57f1c4f18cb6 Add .gitignore
 09f9ac5066ee Fix off-by-one in postdecode_fields
 ed8ce0d5d28b Add fuzzing of utility functions
 a61581819800 Add fuzzing of multipart_parser
 6b0615b728ed Refactor utility functions into static library
 a0ed2c9a7a72 Fix clang compiler errors
 232659da19a4 Fix possible NULL dereference
 8e5719b37a67 Fix warnings reported by clang-10 static analyzer
 b99aa8a64cca Remove Makefile

Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 351e4e01c5)
2021-09-08 22:13:08 +02:00
Petr Štetiar
daaacfd24e cgi-io: move into out of tree project
No functional changes, just moved the sources into out of tree
project[1] so it's going to be easier to do CI with unit testing,
fuzzing etc.

1. https://git.openwrt.org/?p=project/cgi-io.git;a=shortlog

Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 08be327942)
2021-09-08 22:13:08 +02:00
Christian Lachner
d5a7aa1861 haproxy: Update HAProxy to v2.0.25
- This update fixes CVE-2021-40346; see: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2021-09-08 07:33:31 -07:00
Josef Schlehofer
17f5a0cc83
python3: update to version 3.7.12
Fixes: CVE-2013-0340 (Windows and MacOS only) and smtplib multiple CRLF injection
Changelog: https://www.python.org/downloads/release/python-3712/

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-09-08 13:06:36 +02:00
Josef Schlehofer
dd6be653dd
tor: update to version 0.4.4.9
Fixes:
- CVE-2021-34548
- CVE-2021-34549
- CVE-2021-34550

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-09-08 11:54:19 +02:00
Rosen Penev
508c15acb7
irssi: update to 1.2.3
Switch to AUTORELEASE for simplicity.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 752656c6be)
2021-09-08 11:44:16 +02:00
Olivier Poitrey
93cfd1679a nextdns: Update to version 1.37.1
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-09-07 14:57:58 -07:00
Olivier Poitrey
6f3cd160d2 nextdns: Update to version 1.37.0
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-09-07 11:31:27 -07:00
Dennis Schüsselbauer
72f35e712e acme: Fix uhttpd restart to load new certificates
Fixes issue #16256

Bump PKG_RELEASE to 4.

Signed-off-by: Dennis Schüsselbauer <scde@users.noreply.github.com>

(cherry picked from commit d69534751e)
2021-09-06 14:29:41 -07:00
Josef Schlehofer
684b71f0cd
click: update to version 7.0
- Change URL of the website and for PKG_SOURCE_URL
- Change TITLE and description
- Remove PKG_BUILD_DEPENDS, PKG_UNPACK as they are not necessary
- Add src package

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 25e8b2cda2)
2021-09-05 14:16:26 +02:00
Eneas U de Queiroz
5bd73795e8
dnsdist: fix default SSL lib spelling
This is cosmetic only, since openssl is the first one being defined, but
it avoids a warning in scripts/config, after upgrading to kconfig-v5.6:
tmp/.config-package.in:102839:warning: choice default symbol
'DNSDIST_OPENSSSL' is not contained in the choice

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit dbe11776ed)
2021-09-02 12:12:58 +02:00
Rosen Penev
4006aeabad
Merge pull request #16518 from jefferyto/golang-packages-remove-strip-ldflags-openwrt-19.07
[openwrt-19.07] treewide: Remove GO_PKG_LDFLAGS for stripping binaries
2021-09-01 17:16:20 -07:00
Jeffery To
1dd040f9ca
treewide: Remove GO_PKG_LDFLAGS for stripping binaries
The "-s -w" flags in GO_PKG_LDFLAGS tells the Go compiler to strip the
binaries it produces. Since the default Go package build process will
strip binaries when CONFIG_USE_STRIP or CONFIG_USE_SSTRIP are selected,
these flags are unnecessary.

When CONFIG_NO_STRIP is selected, these flags override the user's
intention of building unstripped packages.

This removes these flags for all relevant packages.

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2021-09-02 06:36:01 +08:00
Peter Stadler
82a3613ec8 nginx: add PROVIDES nginx-ssl to nginx-all-module
fix issue when installing luci-ssl-nginx

Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
2021-09-01 14:25:17 -07:00
Josef Schlehofer
b35c3984e1
Revert "net/miniupnpd: ext_ip_reserved_ignore support"
This patch is causing several issues [1], which then were reported to
upstream [2] and it was not accepted by upstream [3]. This results that
nobody maintain this custom patch and it is not useful as it is changing
addr_is_reserved behavior.

[1] https://github.com/openwrt/packages/issues/15258
[2] https://github.com/miniupnp/miniupnp/issues/542
[3] https://github.com/miniupnp/miniupnp/pull/511

This reverts commit b76aa99194.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 107f3376b5)
2021-08-28 09:05:30 +02:00
Rosen Penev
857e98768f
Merge pull request #16410 from paper42/git-2.26.3-19
[19.07] git: update to 2.26.3
2021-08-27 01:05:32 -07:00
Michal Vasilek
72d806d181
apr: patch CVE-2021-35940
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 0777e40b74)
2021-08-25 06:06:48 +02:00
Rosen Penev
844cde96b8
Merge pull request #16444 from paper42/postgresql-fix-hardening
[19.07] postgresql: disable PIC
2021-08-24 19:04:13 -07:00
Stan Grishin
a7691fdfb0
Merge pull request #16455 from rs/nextdns-1.36.0-openwrt-19.07
[19.07] nextdns: Update to version 1.36.0
2021-08-24 17:07:57 -07:00
Olivier Poitrey
9d3ad065b2 nextdns: Update to version 1.36.0
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-08-24 23:40:31 +00:00
Michal Vasilek
4b091361ef
postgresql: disable PIC
with PIC enabled, build fails with
ld: access/gist/gistproc.o: in function `rtree_internal_consistent':
gistproc.c:(.text+0x188): relocation truncated to fit: R_AARCH64_LD64_GOTPAGE_LO15 against symbol `DirectFunctionCall2Coll' defined in .text section in utils/fmgr/fmgr.o
ld: gistproc.c:(.text+0x188): warning: too many GOT entries for -fpic, please recompile with -fPIC
ld: final link failed: symbol needs debug section which does not exist
collect2: error: ld returned 1 exit status

Related-to: 8e9ad7bb51
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2021-08-24 12:48:19 +02:00
Rosen Penev
9da0165a7d
Merge pull request #16411 from paper42/file-5.38-19
[19.07] file: update to 5.38
2021-08-23 05:58:04 -07:00
Michal Vasilek
0573fb59ab
file: update to 5.38
* fixes CVE-2019-18218

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2021-08-23 12:25:13 +02:00
Josef Schlehofer
5982af9ed5
Merge pull request #16412 from paper42/tar-cve-19
[19.07] tar: fix CVE-2021-20193
2021-08-22 09:34:58 +02:00
Etienne Champetier
b03fe54e0e https-dns-proxy: patch CMakeList.txt to use OpenWrt CFLAGS
This fixes compilation issues with ASLR PIE enabled

We were compiling with '-g -DDEBUG'

https-dns-proxy_2021-07-29-*_arm_cortex-a9_vfpv3-d16.ipk
shrink from 19514 to 19095

Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
(cherry picked from commit 374e1dd56e)
2021-08-20 21:04:03 -04:00
Michal Vasilek
8ff2671b22
tar: fix CVE-2021-20193
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2021-08-20 16:17:56 +02:00