Commit Graph

3531 Commits

Author SHA1 Message Date
Daniel Golle d0cd9f198d
Merge pull request #6124 from wigyori/for-15.05-freeradius2
CC: freeradius2: bump to 2.2.10
2018-06-15 16:02:27 +02:00
Philip Prindeville e39a0a9212
Merge pull request #6120 from wigyori/for-15.05-perl
CC: perl5: upgrade 3 CPAN packages to fix build
2018-05-29 19:00:15 -06:00
Thomas Heil 074bb2166e
Merge pull request #6126 from wigyori/for-15.05-pcre_nginx
CC: pcre: bump to 8.41 and fix CVEs
2018-05-25 13:52:53 +02:00
Zoltan HERPAI 1657a09a2d freeradius2: bump to 2.2.10
- Fix multiple security issues. See http://freeradius.org/security/fuzzer-2017.html Thanks to Guido Vranken for working with us to discover the issues and test the fixes.
 - FR-GV-207 Avoid zero-length malloc() in data2vp().
 - FR-GV-206 correct decoding of option 60.
 - FR-GV-205 check for "too long" WiMAX options.
 - FR-GV-204 free VP if decoding fails, so we don't leak memory.
 - FR-GV-203 fix memory leak when using decode_tlv().
 - FR-GV-202 check for "too long" attributes.
 - FR-GV-201 check input/output length in make_secret().
 - FR-AD-001 Use strncmp() instead of memcmp() for bounded data.
 - Disable in-memory TLS session caches due to OpenSSL API issues.
 - Allow issuer_cert to be empty.
 - Look for extensions using correct index.
 - Fix types.
 - Work around OpenSSL 1.0.2 problems, which cause failures in TLS-based EAP methods.
 - Revert RedHat contributed bug which removes run-time checks for OpenSSL consistency.
 - Allow OCSP responder URL to be later in the packet Fix by Ean Pasternak.
 - Catch empty subject and non-existent issuer cert in OCSP Fix by Ean Pasternak.
 - Allow non-FIPS for MD5 Fix by Ean Pasternak.

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2018-05-24 01:35:09 +02:00
Daniel Golle 520ac45ca8 freeradius2: update to version 2.2.9
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2018-05-24 01:35:06 +02:00
Thomas Heil 27133d6866 pcre: Added fix for CVE-2017-11164 by adding stack recursion limit
Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2018-05-24 01:32:52 +02:00
Thomas Heil 7ff17dd5a3 pcre: upgrade to version 8.41 - fixes security issues
Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2018-05-24 01:32:48 +02:00
Thomas Heil a83284d7bd fix CVE-2017-7186 Fix CVE-2017-7186 mentioned in https://bugs.exim.org/show_bug.cgi?id=2052
Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2018-05-24 01:32:44 +02:00
heil 5c64d6a6d3 package: pcre bump to version 8.40
Signed-off-by: heil <heil@terminal-consulting.de>
2018-05-24 01:32:40 +02:00
Zoltan HERPAI 9232d123e4 perl-uri: bump to 1.74
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2018-05-24 01:19:23 +02:00
Zoltan HERPAI 86f8d58ad0 perl-html-parser: bump to 3.72
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2018-05-24 01:19:20 +02:00
Zoltan HERPAI f0755b41ef perl-dbi: bump to 1.641
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2018-05-24 01:19:18 +02:00
Jiri Slachta 8d98c0501a
Merge pull request #5542 from micmac1/jiri-for-15.05
libssh2, libxslt, tiff: security bumps (for 15.05)
2018-01-30 20:00:45 +01:00
Sebastian Kemper bdfe75a5cd tiff: version bump to address open CVEs
- Bumps version to 4.0.9. Otherwise about two dozen packages would need
  to be backported. There were no ABI/API changes between 4.0.3 and
  4.0.9, so this is OK.
- Adds a patch from Jow that addresses a macro issue (already in
  master/lede-17.01)
- Adds patches copied from Debian for CVE-2017-18013 and CVE-2017-9935
  on top.

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2018-01-30 15:32:49 +01:00
Sebastian Kemper 7d2337a17f libxslt: revision bump to address open CVEs
- Add patches copied from Debian to address open CVEs
- Update mail address of maintainer
- Fix a typo
- Add --disable-silent-rules for verbose build output

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2018-01-30 15:28:35 +01:00
Sebastian Kemper f84cc525d6 libssh2: revision bump to fix CVE-2016-0787
- adds patch copied from Debian to address CVE
- fixes zlib detection
- changes http to https links
- updates maintainer's mail address

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2018-01-30 15:25:25 +01:00
Zoltan Herpai 2b8f946204
Merge pull request #5084 from wigyori/for-15.05-irssi
CC: net/irssi: upgrade irssi, update download URL
2018-01-29 09:20:09 +01:00
Zoltan Herpai f3e4493e0b
Merge pull request #5102 from wigyori/for-15.05-xupnpd
CC: multimedia/xupnpd: move download source and upgrade to 2016-07-06
2018-01-29 09:19:18 +01:00
Zoltan Herpai 318af6607d
Merge pull request #5151 from wigyori/for-15.05-bluez
CC: bluez: upgrade to 5.47
2018-01-29 09:10:29 +01:00
Marko Ratkaj 2543a12a60
Merge pull request #5114 from wigyori/for-15.05-squid
CC: squid: upgrade to 3.5.27
2018-01-24 20:23:49 +01:00
Zoltan Herpai e5f16da2ec
Merge pull request #5233 from wigyori/for-15.05-bind
CC: bind: bump to 9.11.2
2017-12-07 10:49:26 +01:00
Zoltan HERPAI 2f28404a93 bind: bring back PKG_MD5SUM for CC
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2017-12-06 21:23:26 +01:00
Philip Prindeville bc8a2ff329 bind: version update to 9.11.2
Also refresh patches and dependencies.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2017-11-19 17:36:53 +01:00
Noah Meyerhans ed10cd0c39 bind: Update to 9.10.5-P3
New upstream release includes fixes for the following security issues:

 * CVE-2017-3140: With certain RPZ configurations, a response with TTL 0 could
   cause named to go into an infinite query loop
 * CVE-2017-3142: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.
 * CVE-2017-3143: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:34:15 +01:00
Sami Olmari e2cd2f2b3c bind: Include dnssec-settime in bind-dnssec/tool
<net/bind>

Maintainer: @nmeyerhans
Compile tested: x86_64, OpenWRT 50107
Run tested: x86 / 64, OpenWRT 50107

Description:

Added dnssec-settime into bind-dnssec and bind-tools

Signed-off-by: Sami Olmari <sami+git@olmari.fi>
2017-11-19 17:34:05 +01:00
Noah Meyerhans f648f3766f bind: Update to bind-9.10.5
This change includes fixes for several security issues:

  * CVE-2017-3138: rndc "" could trigger an assertion failure in named.
  * CVE-2017-3137: Some chaining (i.e., type CNAME or DNAME) responses to
    upstream queries could trigger assertion failures.
  * CVE-2017-3136: dns64 with break-dnssec yes; can result in an assertion
    failure.
  * CVE-2017-3135: If a server is configured with a response policy zone
    (RPZ) that rewrites an answer with local data, and is also configured
    for DNS64 address mapping, a NULL pointer can be read triggering a
    server crash.
  * CVE-2016-9444: named could mishandle authority sections with missing
    RRSIGs, triggering an assertion failure.
  * CVE-2016-9131: named mishandled some responses where covering RRSIG
    records were returned without the requested data, resulting in an
    assertion failure.
  * CVE-2016-9131: named incorrectly tried to cache TKEY records which could
    trigger an assertion failure when there was a class mismatch.
  * CVE-2016-8864: It was possible to trigger assertions when processing
    responses containing answers of type DNAME.
  * CVE-2016-6170: Added the ability to specify the maximum number of
    records permitted in a zone (max-records #;). This provides a mechanism
    to block overly large zone transfers, which is a potential risk with
    slave zones from other parties.
  * CVE-2016-2776: It was possible to trigger an assertion when rendering a
    message using a specially crafted request.
  * CVE-2016-2775: Calling getrrsetbyname() with a non absolute name could
    trigger an infinite recursion bug in lwresd or named with lwres
    configured if, when combined with a search list entry from resolv.conf,
    the resulting name is too long.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:33:49 +01:00
Noah Meyerhans 556c80b16f bind: update to bind-9.10.4-P5
This change fixes multiple denial-of-service vulnerabilities:
 * CVE-2016-9131: A malformed response to an ANY query can cause an
   assertion failure during recursion
 * CVE-2016-9147: An error handling a query response containing
   inconsistent DNSSEC information could cause an assertion failure
 * CVE-2016-9444: An unusually-formed DS record response could cause
   an assertion failure
 * CVE-2016-9778: An error handling certain queries using the
   nxdomain-redirect feature could cause a REQUIRE assertion failure
   in db.c

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:33:33 +01:00
Stijn Tintel bd048aabb8 bind: disable libjson support
If libjson-c is detected during bind-libs configure phase, bind-libs
will be built with libjson support. This results in a missing dependency
error during install phase. Solve this by disabling libjson support.
2017-11-19 17:32:03 +01:00
Noah Meyerhans cc6555e1d9 bind: set sysconfdir to /etc/bind
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:31:47 +01:00
Zoltan Herpai e6ff63036d
Merge pull request #5081 from wigyori/for-15.05-mxml3
CC: upgrade mxml, update download URL
2017-11-18 21:18:41 +01:00
Zoltan Herpai 5fe8c6140e
Merge pull request #5103 from wigyori/for-15.05-wifidog
CC: wifidog: upgrade to 1.3.0 to fix build
2017-11-18 21:14:31 +01:00
Hirokazu MORIKAWA e19f2e5c97 bluez: bump to 5.47 fix CVE-2017-1000250
http://www.bluez.org/release-of-bluez-5-47/

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2017-11-18 13:05:28 +01:00
Álvaro Fernández Rojas 8b99eb30b7 bluez: update to v5.38
Fixes https://github.com/openwrt/packages/issues/2523
Closes https://github.com/openwrt/packages/pull/2545

Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
2017-11-18 13:03:31 +01:00
Álvaro Fernández Rojas 506b35e97d bluez: Add support for Raspberry Pi 3
- Adds bcm43xx-3wire variant.
- Resets UART speed after firmware download.
- Prints chip name when firmware isn't found for bcm43xx.
- Increases timeout for bcm43xx.
- Moves bcm43xx firmware to lib.

Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
2017-11-18 13:03:26 +01:00
Álvaro Fernández Rojas f325fafa21 bluez: update to v5.37
Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
2017-11-18 13:03:22 +01:00
Hauke Mehrtens b4a4c1e4bf bluez: update to version 5.33
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-18 13:03:18 +01:00
Hauke Mehrtens f4665c4ae4 bluez: update to version 5.31
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-18 13:03:11 +01:00
Hauke Mehrtens c2fb968f02 bluez: add btmgmt tool
The btmgmt tool is needed to activate BL LE support.
Currently it is not installed.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-18 13:03:06 +01:00
Bruno Randolf dde94d75d1 bluez: Add bluez-daemon package
Move bluetoothd and related programs and files from bluez-utils into
bluez-daemon package. The main motivation for this is to remove the dependency
to DBus from bluez-utils. The utilities like "hcitool" are useful without it.

Also add kmod-bluetooth dependency to bluez-utils, as the utils don't make much
sense without bluetooth support in the kernel.

Signed-off-by: Bruno Randolf <br1@einfach.org>
2017-11-18 13:03:00 +01:00
Zoltan Herpai 49f5ad1706
Merge pull request #5086 from wigyori/for-15.05-fdm2
CC: mail/fdm: update download URL
2017-11-18 12:58:16 +01:00
Zoltan Herpai 765b738db7
Merge pull request #5099 from wigyori/for-15.05-taskwarrior
CC: utils/taskwarrior: upgrade to 2.4.4
2017-11-18 12:57:57 +01:00
Zoltan Herpai 51a5745910
Merge pull request #5095 from wigyori/for-15.05-perl
CC: upgrade a couple perl packages
2017-11-18 12:57:41 +01:00
Zoltan Herpai b017b246df
Merge pull request #5101 from wigyori/for-15.05-tor
CC: net/tor: fix build and upgrade to 0.2.9.11
2017-11-18 12:57:25 +01:00
Michael Heimpold 345cb4d509
Merge pull request #5108 from wigyori/for-15.05-php
CC: php: upgrade to 5.6.32

LGTM2, thanks.
2017-11-13 20:18:55 +01:00
Thomas Heil 5df3860f23
Merge pull request #5111 from wigyori/for-15.05-nginx
CC: nginx: upgrade to 1.12.1
2017-11-13 10:28:25 +01:00
Zoltan Herpai 9faf1ea30c
Merge pull request #5080 from wigyori/for-15.05
CC: update download URLs for various packages
2017-11-13 07:24:45 +01:00
Zoltan Herpai 330f86da51
Merge pull request #5078 from wigyori/for-15.05-neon
CC: upgrade libs/neon
2017-11-13 07:22:58 +01:00
Zoltan Herpai d2a404bf3c
Merge pull request #5094 from wigyori/for-15.05-pianod
CC: fix pianod build
2017-11-13 07:20:47 +01:00
Marko Ratkaj 9b772a50db squid: bump to 3.5.27
Bump Squid to version 3.5.27 and fix broken menuconfig menu.

Signed-off-by: Marko Ratkaj <marko.ratkaj@sartura.hr>
2017-11-12 23:38:23 +01:00
Adam Gensler 3e972a57c6 net/squid: Allow squid to parse mime.conf
Copy mime.conf to temporary directory so squid process can properly read the file. Without it squid cannot access mime.conf and throws a warning during startup.

Signed-off by: Adam Gensler <openwrt@a.gnslr.us>
2017-11-12 23:14:26 +01:00