Commit graph

16681 commits

Author SHA1 Message Date
Florian Eckert
fbe7abcd57 collectd: update PKG_RELEASE
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 5afad91d36)
2020-09-19 19:42:58 +03:00
Florian Eckert
f53b79cedb collectd: fix ubi data source type
Currently the values are stored in the ubi plugin as data source type
`counter`. But this makes no sense, because the values change very slowly
and I don't want to know the rate of change. It is better to store the
value as data source type `gauge`. Then I can see the current value.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit e7054e7e79)
2020-09-19 19:42:25 +03:00
Florian Eckert
67a403bfe3 collectd: add ubi uci and plugin info
Add uci binding for ubi plugin.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit a481a2006c)
2020-09-19 19:42:25 +03:00
Florian Eckert
37335cf653 collectd: enable ubi plugin
Enable ubi plugin.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 46f2476875)
2020-09-19 19:40:51 +03:00
Rosen Penev
03425a0d2f
zmq: fix compilation when libbsd is present
Limit libbsd support to glibc.

Remove wrong python variable.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit bb9dd1468d)
2020-09-16 16:02:45 -07:00
W. Michael Petullo
8bb1d13a97
pigeonhole: update to 0.5.11
This fixes an error in the previous package when building against recent
OpenWrt releases:

In file included from /builder/shared-workdir/build/sdk/staging_dir/target-x86_64_musl/usr/include/dovecot/lib.h:50,
                 from ext-variables-common.c:4:
ext-variables-common.c: In function 'ext_variables_load':
ext-variables-common.c:91:14: error: expected ')' before 'PRIuSIZE_T'
       "(>= %"PRIuSIZE_T" bytes)",

Signed-off-by: W. Michael Petullo <mike@flyn.org>
(cherry picked from commit c502f261d3)
2020-09-15 18:53:21 -07:00
Jan Pavlinec
86da3bbeb4
zmq: update to version 4.3.3 (security fix)
Fixes
CVE-2020-15166

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
(cherry picked from commit c2ffadb928)
2020-09-15 18:39:01 -07:00
Rosen Penev
e72b474698
zmq: fix the installed files
the versioned so files are needed.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 183236698c)
2020-09-15 18:38:53 -07:00
Rosen Penev
48339ba105
zmq: fix pkgconfig file
It seems upstream broke it. This in turn broke depending packages.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 5bb13435b7)
2020-09-15 18:38:42 -07:00
Rosen Penev
ef30f8bf80
zmq: update to 4.3.2
Remove upstreamed patches.

Add uClibc++ patch for those that need it.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit e169e2f9c8)
2020-09-15 18:38:23 -07:00
Rosen Penev
a7d129fc2d
zmq: switch to building with CMake
Faster compilation.

Before:

time make package/zmq/compile -j 12
Executed in   24.98 secs   fish           external
   usr time   97.41 secs  263.00 micros   97.40 secs
   sys time   12.51 secs   34.00 micros   12.51 secs

After:

time make package/zmq/compile -j 12
Executed in   18.17 secs   fish           external
   usr time   85.22 secs  248.00 micros   85.22 secs
   sys time    9.23 secs   32.00 micros    9.23 secs

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit da3409bc3d)
2020-09-15 18:37:03 -07:00
Michael Heimpold
f69efea1d9
Merge pull request #13397 from ja-pa/libxml2-patch-19.07
[OpenWrt 19.07] libxml2: patch security issues
2020-09-15 19:26:13 +02:00
Jan Pavlinec
a4cbd04df9
libxml2: patch security issues
Fixes
CVE-2019-19956
CVE-2020-24977
CVE-2019-20388
CVE-2020-7595

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-09-15 10:47:25 +02:00
Michael Heimpold
c2c88df230
Merge pull request #13392 from etactica/u2pnpd-1907
[19.07] u2pnpd: convert to procd
2020-09-14 21:58:45 +02:00
Karl Palsson
207660987c net/u2pnpd: convert init to procd
Drops pid files, no longer needed with procd management.
Now properly reloads on reload_config after UCI changes.

Signed-off-by: Karl Palsson <karlp@etactica.com>

[ Fixed two shellcheck warnings and bump PKG_RELEASE ]
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2020-09-14 17:00:17 +00:00
Josef Schlehofer
f99f60d7b7
Merge pull request #13385 from odmdas/odmdas-freeradius3-radtest-19.07
[19.07] freeradius3: enable radtest utility and adapt it to OpenWrt
2020-09-14 04:52:37 +02:00
Alexey Dobrovolsky
2d410422c5 freeradius3: fix hostname invocation in radtest
Canonical radtest start results in an error:

$ radtest bob hello localhost 0 testing123
/usr/bin/radtest: line 1: hostname: not found
(0) Error parsing "stdin": Failed to get value

hostname command is not present in OpenWrt.
Instead, hostname can be obtained from file /proc/sys/kernel/hostname.

added: 005-get-hostname-from-proc-in-radtest.patch

(backported from commit 8b2792a)
Signed-off-by: Alexey Dobrovolsky <dobrovolskiy.alexey@gmail.com>
2020-09-14 01:36:30 +03:00
Alexey Dobrovolsky
066ac03921 freeradius3: enable radtest utility
radtest utility is used in many manuals to check the operation of
radius server.

At the moment all parameters must be specified at startup, for example:

$ radtest bob hello localhost 0 testing123 0 localhost

(backported from commit 6480acd)
Signed-off-by: Alexey Dobrovolsky <dobrovolskiy.alexey@gmail.com>
2020-09-14 00:32:08 +03:00
Rosen Penev
7c618f7dee
Merge pull request #13382 from Andy2244/samba_4-11-12
[19.07] samba4: update to 4.11.12
2020-09-13 13:07:52 -07:00
Andy Walsh
338fa663ca samba4: update to 4.11.12
* update to 4.11.12
* fix optional modules not included on module build (vfs_btrfs, vfs_linux_xfs_sgid)

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2020-09-13 18:22:21 +02:00
Josef Schlehofer
399e1a0bf4
youtube-dl: update to version 2020.9.6
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit b4eafd5009)
2020-09-12 18:39:37 +02:00
Josef Schlehofer
7825df65f6
msmtp: update to version 1.8.12
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit dd0ba4a55b)
2020-09-12 18:39:27 +02:00
Jan Pavlinec
eb8130508e
dovecot: disable zstd
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
(cherry picked from commit a5c9ef50dc)
2020-09-12 11:57:05 +02:00
Josef Schlehofer
538647a261
syslog-ng: update to version 3.29.1
Changelog: https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-3.29.1

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 06f3ac21b4)
2020-09-12 11:44:39 +02:00
Michael Heimpold
473ca554f5 php7: update to 7.2.33
This fixes:
  - CVE-2020-7068

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2020-09-10 20:52:44 +02:00
Hannu Nyman
0fca98812b
Merge pull request #13356 from rs/nextdns-1.8.3-openwrt-19.07
[19.07] nextdns: Update to version 1.8.3
2020-09-10 20:35:21 +03:00
Olivier Poitrey
62171036b2 nextdns: Update to version 1.8.3
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2020-09-10 17:25:37 +00:00
Jan Pavlinec
953de3ca85 gnutls: update to version 3.6.15 (security fix)
Fixes:
CVE-2020-24659

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-09-09 23:24:06 +02:00
Rosen Penev
154d6b954c
Merge pull request #13336 from rs/nextdns-1.8.2-openwrt-19.07
[19.07] nextdns: Update to version 1.8.2
2020-09-08 22:47:10 -07:00
Josef Schlehofer
bddc3186c2
Merge pull request #13334 from ja-pa/python-rsa-fix-19.07
[OpenWrt 19.07] python-rsa: downgrade to version 4.5 for python2
2020-09-08 16:03:20 +02:00
Jan Pavlinec
d515d9c353
dovecot: update to version 2.3.11.3 (security fix)
Fixes:
CVE-2020-12100
CVE-2020-12673
CVE-2020-12674

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
(cherry picked from commit 8ae394430a)
2020-09-08 15:54:04 +02:00
Olivier Poitrey
a2634c2646 nextdns: Update to version 1.8.2
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2020-09-08 10:33:53 +00:00
Jan Pavlinec
1cf41a88c5
python-rsa: downgrade to version 4.5 for python2
Note:
This fixes error introduced in 7af8eaad11
Version 4.6 doesn't support python2

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-09-08 12:16:38 +02:00
Rosen Penev
eae1bb397f
Merge pull request #13310 from EricLuehrsen/unbound_20200904_1907
[19.07] unbound: improve odhcpd rapid update robustness
2020-09-05 13:26:47 -07:00
Eric Luehrsen
54847cc7c1 unbound: improve odhcpd rapid update robustness
cherry-pick: bce5f44f5af6510db484389b8cc0636f6de08877
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2020-09-05 10:19:38 -04:00
John Audia
d17720f042 htop: update to 3.0.1-1
Build-tested: x86/64
Run-tested: ipq806x (R7800)

Signed-off-by: John Audia <graysky@archlinux.us>
(cherry picked from commit 1d989fc64d)
2020-09-04 18:52:55 +03:00
John Audia
d953d80bf2 htop: update to 3.0.0-1
new upstream, new release taken from ChangeLog[1]:
 New maintainers - after a prolonged period of inactivity from Hisham,
 the creator and original maintainer, a team of community maintainers
 have volunteered to take over a fork at https://htop.dev and
 https://github.com/htop-dev to keep the project going.

1. https://github.com/htop-dev/htop/blob/master/ChangeLog

Signed-off-by: John Audia <graysky@archlinux.us>
(cherry picked from commit acbdaf863f)
2020-09-04 18:52:45 +03:00
Rosen Penev
af4cd94a2e htop: fix compilation with GCC10
Patch taken from upstream.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit de6471014a)
2020-09-04 18:52:34 +03:00
Jan Pavlinec
7af8eaad11
python-rsa: update to version 4.6 (security fix)
Fixes CVE-2020-13757

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
(cherry picked from commit 4e211927f3)
2020-09-03 13:35:34 -07:00
Jan Hak
8b0457c55e
knot: update to version 2.9.6
Signed-off-by: Jan Hak <jan.hak@nic.cz>
(cherry picked from commit 60a35cd1c6)
2020-09-02 13:27:44 +02:00
Rosen Penev
8e384b5eea
Merge pull request #13269 from ja-pa/git-security-update-19.07
[OpenWrt 19.07] git: update to version 2.26.2 (security fix)
2020-09-01 07:09:08 -07:00
Jan Pavlinec
f2edf8c537
git: update to version 2.26.2 (security fix)
Fixes CVE-2020-11008

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-09-01 14:09:32 +02:00
Rosen Penev
59078a0982
Merge pull request #13266 from jefferyto/pip-locked-openwrt-19.07
[openwrt-19.07] python,python3: Use locked for host pip
2020-08-31 14:09:00 -07:00
Jeffery To
99d0878d0a
python,python3: Use locked for host pip
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2020-08-31 23:23:41 +08:00
Hannu Nyman
791e0bc764 nano: update to 5.2
Update nano editor to version 5.2.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit 3ce7595136)
2020-08-25 23:06:05 +03:00
Jan Pavlinec
3c6b45ab38
clamav: update to version 0.102.4 (security fix)
Fixes
CVE-2020-3481

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
(cherry picked from commit 5d7164aaba)
2020-08-24 13:28:58 +02:00
Jan Pavlinec
0202fdc277
clamav: update to version 0.102.3 (security fix)
Fixes:
CVE-2020-3341
CVE-2020-3327

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
(cherry picked from commit 168efe753d)
2020-08-24 13:28:40 +02:00
Lucian Cristian
c5c0e2e337
clamav: update to 0.102.2
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
(cherry picked from commit 24eeea366d)
2020-08-24 13:27:55 +02:00
Noah Meyerhans
9700cea704
bind: New upstream version 9.16.6
Several security issures are addressed:

 - CVE-2020-8620 It was possible to trigger an assertion failure by sending
   a specially crafted large TCP DNS message.
 - CVE-2020-8621 named could crash after failing an assertion check in
   certain query resolution scenarios where QNAME minimization and
   forwarding were both enabled. To prevent such crashes, QNAME minimization is
   now always disabled for a given query resolution process, if forwarders are
   used at any point.
 - CVE-2020-8622 It was possible to trigger an assertion failure when
   verifying the response to a TSIG-signed request.
 - CVE-2020-8623 When BIND 9 was compiled with native PKCS#11 support, it
   was possible to trigger an assertion failure in code determining the
   number of bits in the PKCS#11 RSA public key with a specially crafted
   packet.
 - CVE-2020-8624 update-policy rules of type subdomain were incorrectly
   treated as zonesub rules, which allowed keys used in subdomain rules to
   update names outside of the specified subdomains. The problem was fixed by
   making sure subdomain rules are again processed as described in the ARM.

Full release notes are available at
https://ftp.isc.org/isc/bind9/9.16.6/doc/arm/html/notes.html#notes-for-bind-9-16-6

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit cf61f7f8ef)
2020-08-24 10:33:04 +02:00
Tiago Gaspar
256a631d9c
bind: update to 9.16.4
This update fixes the following CVE's:
- CVE-2020-8618
- CVE-2020-8619

More info on bug fixes and feature changes in:
https://downloads.isc.org/isc/bind9/9.16.4/doc/arm/html/notes.html

Signed-off-by: Tiago Gaspar <tiagogaspar8@gmail.com>
(cherry picked from commit b8f8af8a30)
2020-08-24 10:32:59 +02:00