Commit Graph

1135 Commits

Author SHA1 Message Date
Daniel Golle d0cd9f198d
Merge pull request #6124 from wigyori/for-15.05-freeradius2
CC: freeradius2: bump to 2.2.10
2018-06-15 16:02:27 +02:00
Zoltan HERPAI 1657a09a2d freeradius2: bump to 2.2.10
- Fix multiple security issues. See http://freeradius.org/security/fuzzer-2017.html Thanks to Guido Vranken for working with us to discover the issues and test the fixes.
 - FR-GV-207 Avoid zero-length malloc() in data2vp().
 - FR-GV-206 correct decoding of option 60.
 - FR-GV-205 check for "too long" WiMAX options.
 - FR-GV-204 free VP if decoding fails, so we don't leak memory.
 - FR-GV-203 fix memory leak when using decode_tlv().
 - FR-GV-202 check for "too long" attributes.
 - FR-GV-201 check input/output length in make_secret().
 - FR-AD-001 Use strncmp() instead of memcmp() for bounded data.
 - Disable in-memory TLS session caches due to OpenSSL API issues.
 - Allow issuer_cert to be empty.
 - Look for extensions using correct index.
 - Fix types.
 - Work around OpenSSL 1.0.2 problems, which cause failures in TLS-based EAP methods.
 - Revert RedHat contributed bug which removes run-time checks for OpenSSL consistency.
 - Allow OCSP responder URL to be later in the packet Fix by Ean Pasternak.
 - Catch empty subject and non-existent issuer cert in OCSP Fix by Ean Pasternak.
 - Allow non-FIPS for MD5 Fix by Ean Pasternak.

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2018-05-24 01:35:09 +02:00
Daniel Golle 520ac45ca8 freeradius2: update to version 2.2.9
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2018-05-24 01:35:06 +02:00
Zoltan Herpai 2b8f946204
Merge pull request #5084 from wigyori/for-15.05-irssi
CC: net/irssi: upgrade irssi, update download URL
2018-01-29 09:20:09 +01:00
Marko Ratkaj 2543a12a60
Merge pull request #5114 from wigyori/for-15.05-squid
CC: squid: upgrade to 3.5.27
2018-01-24 20:23:49 +01:00
Zoltan Herpai e5f16da2ec
Merge pull request #5233 from wigyori/for-15.05-bind
CC: bind: bump to 9.11.2
2017-12-07 10:49:26 +01:00
Zoltan HERPAI 2f28404a93 bind: bring back PKG_MD5SUM for CC
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2017-12-06 21:23:26 +01:00
Philip Prindeville bc8a2ff329 bind: version update to 9.11.2
Also refresh patches and dependencies.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2017-11-19 17:36:53 +01:00
Noah Meyerhans ed10cd0c39 bind: Update to 9.10.5-P3
New upstream release includes fixes for the following security issues:

 * CVE-2017-3140: With certain RPZ configurations, a response with TTL 0 could
   cause named to go into an infinite query loop
 * CVE-2017-3142: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.
 * CVE-2017-3143: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:34:15 +01:00
Sami Olmari e2cd2f2b3c bind: Include dnssec-settime in bind-dnssec/tool
<net/bind>

Maintainer: @nmeyerhans
Compile tested: x86_64, OpenWRT 50107
Run tested: x86 / 64, OpenWRT 50107

Description:

Added dnssec-settime into bind-dnssec and bind-tools

Signed-off-by: Sami Olmari <sami+git@olmari.fi>
2017-11-19 17:34:05 +01:00
Noah Meyerhans f648f3766f bind: Update to bind-9.10.5
This change includes fixes for several security issues:

  * CVE-2017-3138: rndc "" could trigger an assertion failure in named.
  * CVE-2017-3137: Some chaining (i.e., type CNAME or DNAME) responses to
    upstream queries could trigger assertion failures.
  * CVE-2017-3136: dns64 with break-dnssec yes; can result in an assertion
    failure.
  * CVE-2017-3135: If a server is configured with a response policy zone
    (RPZ) that rewrites an answer with local data, and is also configured
    for DNS64 address mapping, a NULL pointer can be read triggering a
    server crash.
  * CVE-2016-9444: named could mishandle authority sections with missing
    RRSIGs, triggering an assertion failure.
  * CVE-2016-9131: named mishandled some responses where covering RRSIG
    records were returned without the requested data, resulting in an
    assertion failure.
  * CVE-2016-9131: named incorrectly tried to cache TKEY records which could
    trigger an assertion failure when there was a class mismatch.
  * CVE-2016-8864: It was possible to trigger assertions when processing
    responses containing answers of type DNAME.
  * CVE-2016-6170: Added the ability to specify the maximum number of
    records permitted in a zone (max-records #;). This provides a mechanism
    to block overly large zone transfers, which is a potential risk with
    slave zones from other parties.
  * CVE-2016-2776: It was possible to trigger an assertion when rendering a
    message using a specially crafted request.
  * CVE-2016-2775: Calling getrrsetbyname() with a non absolute name could
    trigger an infinite recursion bug in lwresd or named with lwres
    configured if, when combined with a search list entry from resolv.conf,
    the resulting name is too long.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:33:49 +01:00
Noah Meyerhans 556c80b16f bind: update to bind-9.10.4-P5
This change fixes multiple denial-of-service vulnerabilities:
 * CVE-2016-9131: A malformed response to an ANY query can cause an
   assertion failure during recursion
 * CVE-2016-9147: An error handling a query response containing
   inconsistent DNSSEC information could cause an assertion failure
 * CVE-2016-9444: An unusually-formed DS record response could cause
   an assertion failure
 * CVE-2016-9778: An error handling certain queries using the
   nxdomain-redirect feature could cause a REQUIRE assertion failure
   in db.c

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:33:33 +01:00
Stijn Tintel bd048aabb8 bind: disable libjson support
If libjson-c is detected during bind-libs configure phase, bind-libs
will be built with libjson support. This results in a missing dependency
error during install phase. Solve this by disabling libjson support.
2017-11-19 17:32:03 +01:00
Noah Meyerhans cc6555e1d9 bind: set sysconfdir to /etc/bind
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:31:47 +01:00
Zoltan Herpai 5fe8c6140e
Merge pull request #5103 from wigyori/for-15.05-wifidog
CC: wifidog: upgrade to 1.3.0 to fix build
2017-11-18 21:14:31 +01:00
Zoltan Herpai b017b246df
Merge pull request #5101 from wigyori/for-15.05-tor
CC: net/tor: fix build and upgrade to 0.2.9.11
2017-11-18 12:57:25 +01:00
Thomas Heil 5df3860f23
Merge pull request #5111 from wigyori/for-15.05-nginx
CC: nginx: upgrade to 1.12.1
2017-11-13 10:28:25 +01:00
Zoltan Herpai 9faf1ea30c
Merge pull request #5080 from wigyori/for-15.05
CC: update download URLs for various packages
2017-11-13 07:24:45 +01:00
Marko Ratkaj 9b772a50db squid: bump to 3.5.27
Bump Squid to version 3.5.27 and fix broken menuconfig menu.

Signed-off-by: Marko Ratkaj <marko.ratkaj@sartura.hr>
2017-11-12 23:38:23 +01:00
Adam Gensler 3e972a57c6 net/squid: Allow squid to parse mime.conf
Copy mime.conf to temporary directory so squid process can properly read the file. Without it squid cannot access mime.conf and throws a warning during startup.

Signed-off by: Adam Gensler <openwrt@a.gnslr.us>
2017-11-12 23:14:26 +01:00
Zoltan Herpai bb39456e41
Merge pull request #5098 from wigyori/for-15.05-stunnel
CC: net/stunnel: fix download source and upgrade
2017-11-12 22:50:48 +01:00
Zoltan HERPAI 942ad75e91 sshfs: upgrade to 2.10
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2017-11-12 20:57:16 +01:00
Thomas Heil 5db5399040 nginx: update lua-nginx to cdd2ae921f67bf396c743406493127be496e57ce
- fixes lua compilation issue

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2017-11-12 19:25:00 +01:00
Uwe Arnold 5837dfeb11 nginx: update to 1.12.1
Fixes: CVE-2017-7529

remove PKG_MD5SUM as it is deprecated

Signed-off-by: Uwe Arnold <donvipre@gmail.com>
2017-11-12 19:15:49 +01:00
Val Kulkov 90075956d2 nginx: update to 1.12.0, the latest stable version
This is a straightforward update to the latest stable version.

Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
2017-11-12 19:15:45 +01:00
Val Kulkov 066f648fb1 nginx: update to 1.10.3, add new module options
Update nginx to version 1.10.3.

Add new configuration options to enable the following optional
modules (disabled by default):
   - http_auth_request_module
   - http_v2_module
   - http_realip_module
   - http_secure_link_module

Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
2017-11-12 19:15:39 +01:00
heil a7ee240daa nginx: bump version to latest stable 1.10.2
Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 19:15:33 +01:00
Xotic750 055ac44d0b nginx: Bumped nginx-naxsi to v0.54
Signed-off-by: Graham Fairweather <xotic750@gmail.com>
2017-11-12 19:15:27 +01:00
Xotic750 15c041ac25 nginx: Bumped to v1.10.1
fixes NULL pointer dereference while writing client request body vulnerability (CVE-2016-4450).

Signed-off-by: Graham Fairweather <xotic750@gmail.com>
2017-11-12 19:15:20 +01:00
Dirk Feytons 63037f9ae4 nginx: change start level to 80
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 19:15:14 +01:00
Dirk Feytons 8fdd1db9d3 nginx: correct f3c7cc6
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 19:15:07 +01:00
heil a529b679a3 nginx: correct errors from previous merge
Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 19:14:26 +01:00
Dirk Feytons 0912175ec1 nginx: upstep to 1.10.0, add Lua module, footprint optimizations
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 19:14:14 +01:00
heil a387117a2a nginx: bump to version 1.9.13
Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 18:43:10 +01:00
heil 67a9f67cc4 nginx: add naxsi module
- this brings back naxsi support aka WAF for nginx

Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 18:43:05 +01:00
Dirk Feytons 13021781b4 nginx: upstep to 1.9.9
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 18:42:59 +01:00
Luka Perkov d44b07c279 nginx: bump to 1.9.6
In this bump as agreed with Thomas we are dropping out all the nginx 3rd party
addons. In case you would like to see your 3rd party addon included please send
a pull request and make sure it works with newest version.

Signed-off-by: Luka Perkov <luka@openwrt.org>
2017-11-12 18:42:54 +01:00
Paul Fertser 3c7b3d57dd nginx: add support for SPNEGO authentication
This adds a module suitable for Kerberos SSO, e.g. for integrating
into Active Directory domains.

Signed-off-by: Paul Fertser <fercerpav@gmail.com>
2017-11-12 18:42:49 +01:00
heil ec14ed490a nginx: fix musl compatibility
- include Patches according to issue #1129
 - refresh Makefile

Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 18:42:45 +01:00
Michael Haas 3df25df858 wifidog: Bump to 1.3.0
* Updates wifidog to latest upstream release.
* Removes patches/100-musl-compat.patch as that's included in 1.3.0

Signed-off-by: Michael Haas <haas@computerlinguist.org>
2017-11-10 18:39:13 +01:00
Jo-Philipp Wich eb0de8f114 wifidog: fix musl compatibility
- Fix missing `fcntl.h` in `protocol.c`
 - Replace nonstandard `sys/unistd.h` includes with `unistd.h` ones

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
2017-11-10 18:39:08 +01:00
Hauke Mehrtens e37a60ef3a tor: update to version 0.2.9.11
This fixes CVE-2017-0376

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:07:34 +01:00
Hauke Mehrtens 7d5da97506 tor: update to version 0.2.9.10
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:07:29 +01:00
Hauke Mehrtens 83dba23e0a tor: update to version 0.2.9.9
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:07:22 +01:00
Hauke Mehrtens b05cb4e4bd tor: log to syslog by default
Make tor log to syslog by default instead of stdout.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:07:13 +01:00
Hauke Mehrtens e6ea3339fe tor: add tor-gencert, tor-resolve and torify
These are some additional applications build by the tor package.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:07:04 +01:00
Hauke Mehrtens 5228fe11d8 tor: add geoip6 to tor-geoip
This add the IPv6 addresses to the tor-geoip6 package.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:06:56 +01:00
Hauke Mehrtens 4001649ed5 tor: preserve tor keys over sysupgrade
Mark the directories containing the keys for hidden services as
conffiles to preserve them over sysupgrade.

Fixes: #2247

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:06:47 +01:00
Hauke Mehrtens 88e4f98f2c tor: update to version 0.2.9.8
In addition update some configure options and use EXTRA_CFLAGS.
Setting RunAsDaemon to 1 will be overwritten by the init script option
"--runasdaemon 0" anyway and we want it in foreground for procd.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:06:32 +01:00
Hauke Mehrtens 030c7796ef tor: update to version 0.2.8.11
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:05:50 +01:00