Commit Graph

1004 Commits

Author SHA1 Message Date
Bernhard Voelker
2a31bef783 utils/findutils: update to 4.9.0
* utils/findutils/Makefile (PKG_VERSION): Update to latest.
(PKG_HASH): Update.

Signed-off-by: Bernhard Voelker <mail@bernhard-voelker.de>
2022-02-04 14:29:38 +00:00
ImmortalWrt AutoUpdate Bot
1a9fded4cf mosdns: Update to 3.1.1
Signed-off-by: ImmortalWrt AutoUpdate Bot <github-bot@immortalwrt.org>
2022-02-04 14:25:53 +00:00
Josef Schlehofer
9fc1179632 apache2: security update to version 2.4.52
Fixes CVEs:
- CVE-2021-44790
- CVE-2021-44224

Refreshed patches

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-02-02 16:30:38 +00:00
Sebastian Kemper
ccf7ba709e apache: fixup apxs
apxs is used to get information about the apache installation when
building external modules. Currently there are issues:

1.

./staging_dir/target-mips_24kc_musl/usr/bin/apxs -q TARGET
apache2
apxs:Error: ./staging_dir/target-mips_24kc_musl/home/sk/tmp/openwrt/staging_dir/target-mips_24kc_musl/usr/bin/apr-1-config not found!.

This error is fixed by sed script #2.

2.

./staging_dir/target-mips_24kc_musl/usr/bin/apxs -q TARGET
cannot open ./staging_dir/target-mips_24kc_musl/home/sk/tmp/openwrt/staging_dir/target-mips_24kc_musl/usr/share/apache2/build/config_vars.mk: No such file or directory at ./staging_dir/target-mips_24kc_musl/usr/bin/apxs line 213.

This error is fixed by sed scipt #1.

Both sed scripts taken from buildroot (see [1]).

[1] https://github.com/buildroot/buildroot/blob/master/package/apache/apache.mk

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2022-02-02 16:30:30 +00:00
Sebastian Kemper
d0fe124486 apache: security bump to 2.4.51
Fixes (see [1] for details):

  CVE-2021-33193
  CVE-2021-41524
  CVE-2021-41773
  CVE-2021-42013

[1] https://httpd.apache.org/security/vulnerabilities_24.html

Patch 020-openssl-deprecated.patch refreshed.

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2022-02-02 16:30:22 +00:00
Rosen Penev
f7afe3f3a6 apache: update to 2.4.48
Refreshed patch.

Fixes:

CVE-2019-17567
CVE-2020-13938
CVE-2020-13950
CVE-2020-35452
CVE-2021-26690
CVE-2021-26691
CVE-2021-30641
CVE-2021-31618

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-02-02 16:30:14 +00:00
James White
831fe84174 adguardhome: Bump adguardhome to v0.107.3 stable
Signed-off-by: James White <james@jmwhite.co.uk>
2022-02-02 16:28:27 +00:00
Philip Prindeville
b2d6ec2b8e strongswan: Update to 5.9.5
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-02-02 12:05:36 +00:00
Beginner
15edebb992
Merge pull request #356 from Beginner-Go/libuhttpd
libuhttpd: update to 3.14.1
2022-02-02 19:44:24 +08:00
Beginner-Go
a724d91708 libuhttpd: update to 3.14.1 2022-02-02 11:43:01 +00:00
Sergey V. Lobanov
e4d341b7e3 libuhttpd: add compatibility for wolfssl >= 5.0
NTRU support has been removed in wolfssl 5.0 so it is required to
mask NTRU specific code if wolfssl >= 5.0

Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
2022-02-02 11:37:29 +00:00
Rosen Penev
3133a599c0 libuhttp: don't build examples
Speeds up compilation and potentially fixes it.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-02-02 11:37:19 +00:00
Beginner-Go
e6edb492c9 Revert "libuhttpd: update to 3.13.0"
revert: 9de4575621
2022-02-02 11:30:02 +00:00
Sergey V. Lobanov
b348597ae7 rtty: add compatibility for wolfssl >= 5.0
NTRU support has been removed in wolfssl 5.0 so it is required to
mask NTRU specific code if wolfssl >= 5.0

Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
2022-02-02 06:54:05 +00:00
Jianhui Zhao
7a36273578 rtty: update to 8.0.0
Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
2022-02-02 06:53:54 +00:00
Beginner
67d51b22d2
yq: update to 4.18.1 2022-02-02 13:49:34 +08:00
Noah Meyerhans
bee5f05a4e bind: bump to 9.18.0
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-02-01 19:21:58 +00:00
Noah Meyerhans
812cc478a0 bind: bump to 9.17.20
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-02-01 19:21:50 +00:00
Philip Prindeville
9ed5c9bab4 bind: created /var/run/named directory
Side-effect of dropping capabilities(7) with last commit is now we
need the `/var/run/named/` directory created for us at startup.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-02-01 19:21:40 +00:00
Philip Prindeville
b299b7ee67 bind: Bump to 9.17.19
The following CVE updates are included:

* CVE-2021-25219: The "lame-ttl" option is now forcibly set to 0. This
  effectively disables the lame server cache, as it could previously be
  abused by an attacker to significantly degrade resolver performance.

* CVE-2021-25218: An assertion failure occurred when named attempted
  to send a UDP packet that exceeded the MTU size, if Response Rate
  Limiting (RRL) was enabled.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-02-01 19:21:31 +00:00
Philip Prindeville
96cf1b9e6e bind: detect new interfaces when they come up
Reload the service when interfaces flap; note that libcap support
is required to open new sockets on interfaces coming up during
a reload, otherwise a full restart would be needed.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-02-01 19:21:22 +00:00
Philip Prindeville
2697a62a6d bind: deprecate managed-keys
This has been replaced with the "trust-anchors" keyword, per
section 8.21.1 New Features of the Bind 9 Administrator Reference
Manual:

• In order to clarify the configuration of DNSSEC keys, the trusted-keys and managed-keys statements have been deprecated, and the new trust-anchors statement should now be used for both types of key.
  When used with the keyword initial-key, trust-anchors has the same behavior as managed-keys, i.e., it configures a trust anchor that is to be maintained via RFC 5011.
  When used with the new keyword static-key, trust-anchors has the same behavior as trusted-keys, i.e., it configures a permanent trust anchor that will not automatically be updated. (This usage is not recommended for the root key.) [GL #6]

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-02-01 19:21:10 +00:00
Andy Walsh
a0088b9c86 samba4: update to 4.14.12
* update to 4.14.12
* fixes: CVE-2021-44142, CVE-2022-0336

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2022-02-01 19:19:34 +00:00
Andy Walsh
5d2d8710c1 samba4: update to 4.14.11; fix AD_DC build
* update to 4.14.11
* fix AD_DC build
* add vfs_widelinks to defaults
* refresh patches
* fixes: #16697, #17692
* fixes: CVE-2016-2124, CVE-2020-25717, CVE-2020-25718, CVE-2020-25719, CVE-2020-25721, CVE-2020-25722, CVE-2021-3738, CVE-2021-23192

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2022-02-01 19:19:24 +00:00
Sergey V. Lobanov
74e272e1ce softethervpn: fix build on macos
host-compile fails on macos due to several reasons:
1. host-compile Makefile always selected for linux
2. macos host cc (clang) fails due to implicit-function-declaration
3. ar and ranlib tools are hardcoded in softethervpn Makefiles

All three issues are fixed by this patch

Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
2022-02-01 19:17:24 +00:00
Ivan Pavlov
5d046a364f openvpn: update to 2.5.5
Maintainer: me / @mkrkn
Compile tested: ramips/mt7620 TP-Link Archer C50 v1, ramips/mt7621 Xiaomi Mi router 3 Pro, ath79/generic TP-Link WDR-3500
Run tested: ramips/mt7620 TP-Link Archer C50 v1, ramips/mt7621 Xiaomi Mi router 3 Pro, ath79/generic TP-Link WDR-3500

openvpn: update to 2.5.5

use of CFG Spectre-mitigations in MSVC builds
bring back OpenSSL config loading to Windows builds
several build fixes, refer to https://github.com/OpenVPN/openvpn/blob/release/2.5/Changes.rst

Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
2022-01-31 16:15:51 +00:00
Hannu Nyman
9aff273bb7 nano: Add a plus variant with more features
Nano is by default built as "tiny" with most features disabled.
That is suitable for basic tasks in routers with small flash.

Add a new nano-plus variant that enables selected additional
features in the build config:
 * multiple files (multibuffer)
 * Unicode/utf8
 * justify
 * .nanorc support
 * help
 * also some key bindings get enabled as "tiny" configure option
   is removed.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2022-01-31 16:14:56 +00:00
Rosen Penev
60a7e12307 bridge-utils: update to 1.7.1
Added missing limits header for PATH_MAX.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-01-31 16:14:55 +00:00
Beginner
6c81ec0f90
dnsproxy: Update to 0.41.0 2022-01-27 18:25:21 +08:00
Michael Heimpold
f548d1bd02 php8: update to 8.1.2
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-01-26 16:26:59 +00:00
Hirokazu MORIKAWA
a44650e994 node: January 10th 2022 Security Releases
Update to v14.18.3

January 10th 2022 Security Releases:
Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531)
Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532)
Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533)
Prototype pollution via console.table properties (Low)(CVE-2022-21824)

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-01-25 17:34:54 +00:00
ImmortalWrt AutoUpdate Bot
d9efce3c27 mosdns: Update to 3.1.0
Signed-off-by: ImmortalWrt AutoUpdate Bot <github-bot@immortalwrt.org>
2022-01-25 17:34:54 +00:00
Beginner
cc9aad5db2
dnsproxy: update to 0.40.6 2022-01-25 00:08:38 +08:00
Beginner
f68f179311
yq: update to 4.17.2 2022-01-22 23:33:13 +08:00
Beginner
a93b2375ac
dnsproxy: update to 0.40.5 2022-01-21 02:14:09 +08:00
Matthew Hagan
533a52d815 davfs2: add secrets file to conffiles definition
davfs2 username and password information is typically stored in
/etc/davfs2/secrets. This information should be kept across sysupgrades.

Signed-off-by: Matthew Hagan <mnhagan88@gmail.com>
2022-01-19 11:19:44 +00:00
Rosen Penev
790ad33af0 davfs2: update to 1.6.1
Refreshed patches.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-01-19 11:19:38 +00:00
Espen Jürgensen
df270e73c1 libunistring: update to 1.0
Signed-off-by: Espen Jürgensen <espenjurgensen+openwrt@gmail.com>
2022-01-19 06:48:16 +00:00
Josef Schlehofer
2a87af4a87 cryptsetup: update to version 2.4.3
Fixes: CVE-2021-4122

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-01-19 06:46:24 +00:00
Daniel Golle
2185ad7622 cryptsetup: update to version 2.4.1
Package new experimental SSH token authenticator plugin as new package
'cryptsetup-ssh'.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2022-01-19 06:46:15 +00:00
Javier Marcet
af591a7f30 cryptsetup: update to version 2.3.6
Signed-off-by: Javier Marcet <javier@marcet.info>
2022-01-19 06:46:07 +00:00
Josef Schlehofer
99c3cb79fa git: update to version 2.34.1
- Refreshed patches

- Release notes 2.34.0:
2ae0a9cb82/Documentation/RelNotes/2.34.0.txt

- Release notes 2.34.1:
2ae0a9cb82/Documentation/RelNotes/2.34.1.txt

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-01-19 06:44:54 +00:00
Lucian Cristian
aff45a37d6 frr: update to latest
also fix mips compile

Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2022-01-19 06:43:43 +00:00
Lucian Cristian
e908defbba frr: update to 8.1.0
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2022-01-19 06:43:32 +00:00
Lucian Cristian
94fa51e482 frr: fixes and update to latest
ospf running in instance mod will keep cpu to 100% so revert offending commit
if daemon is disabled in the file while running also close that daemon
also add the pythontools to support reload

Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2022-01-19 06:43:25 +00:00
Jo-Philipp Wich
422630b991 nlbwmon: update to latest Git HEAD
d82c910 nfnetlink: warn if the requested recv buffer size surpasses rmem_max

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2022-01-19 06:40:10 +00:00
Nick Hainke
eda98eae9c dawn: update to 2022-01-17
877e2dc iwinfo: fix get_bandwidth_iwinfo
9ce01ec datastorage: fix multi-SSID
9187665 treewide: improve maintaince
6bf9b6d memory: Tighten up some memory handling to help spot errors
4df0c98 treewide: improve logging

Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-01-18 09:19:20 +00:00
Rosen Penev
3036ba6b6a diffutils: update to 3.8
Fixes compilation with newer glibc.

Ported gnulib patch from m4.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-01-18 09:19:20 +00:00
Beginner
3ba5d741c1
dnsproxy: update to 0.40.4 2022-01-17 23:54:25 +08:00
Beginner
a0af7b178b
Merge pull request #354 from Beginner-Go/apparmor
* apparmor: cleanup
* apparmor: use $(PYTHON3_VERSION)
* apparmor: update to 3.0.3
* apparmor: fix include path
* apparmor: add missing parser.conf
* apparmor: fix packaging
2022-01-14 20:07:02 +08:00