Commit Graph

3531 Commits

Author SHA1 Message Date
Zoltan Herpai bb39456e41
Merge pull request #5098 from wigyori/for-15.05-stunnel
CC: net/stunnel: fix download source and upgrade
2017-11-12 22:50:48 +01:00
Zoltan Herpai de8dc83895
Merge pull request #5093 from wigyori/for-15.05-libupnpp
CC: upmpdcli/libupnpp upgrade
2017-11-12 21:57:56 +01:00
Zoltan Herpai 4b422023d7
Merge pull request #5112 from wigyori/for-15.05-sshfs
CC: sshfs: upgrade to 2.10
2017-11-12 21:44:52 +01:00
Zoltan HERPAI 942ad75e91 sshfs: upgrade to 2.10
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2017-11-12 20:57:16 +01:00
Thomas Heil 5db5399040 nginx: update lua-nginx to cdd2ae921f67bf396c743406493127be496e57ce
- fixes lua compilation issue

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2017-11-12 19:25:00 +01:00
Uwe Arnold 5837dfeb11 nginx: update to 1.12.1
Fixes: CVE-2017-7529

remove PKG_MD5SUM as it is deprecated

Signed-off-by: Uwe Arnold <donvipre@gmail.com>
2017-11-12 19:15:49 +01:00
Val Kulkov 90075956d2 nginx: update to 1.12.0, the latest stable version
This is a straightforward update to the latest stable version.

Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
2017-11-12 19:15:45 +01:00
Val Kulkov 066f648fb1 nginx: update to 1.10.3, add new module options
Update nginx to version 1.10.3.

Add new configuration options to enable the following optional
modules (disabled by default):
   - http_auth_request_module
   - http_v2_module
   - http_realip_module
   - http_secure_link_module

Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
2017-11-12 19:15:39 +01:00
heil a7ee240daa nginx: bump version to latest stable 1.10.2
Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 19:15:33 +01:00
Xotic750 055ac44d0b nginx: Bumped nginx-naxsi to v0.54
Signed-off-by: Graham Fairweather <xotic750@gmail.com>
2017-11-12 19:15:27 +01:00
Xotic750 15c041ac25 nginx: Bumped to v1.10.1
fixes NULL pointer dereference while writing client request body vulnerability (CVE-2016-4450).

Signed-off-by: Graham Fairweather <xotic750@gmail.com>
2017-11-12 19:15:20 +01:00
Dirk Feytons 63037f9ae4 nginx: change start level to 80
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 19:15:14 +01:00
Dirk Feytons 8fdd1db9d3 nginx: correct f3c7cc6
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 19:15:07 +01:00
heil a529b679a3 nginx: correct errors from previous merge
Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 19:14:26 +01:00
Dirk Feytons 0912175ec1 nginx: upstep to 1.10.0, add Lua module, footprint optimizations
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 19:14:14 +01:00
heil a387117a2a nginx: bump to version 1.9.13
Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 18:43:10 +01:00
heil 67a9f67cc4 nginx: add naxsi module
- this brings back naxsi support aka WAF for nginx

Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 18:43:05 +01:00
Dirk Feytons 13021781b4 nginx: upstep to 1.9.9
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
2017-11-12 18:42:59 +01:00
Luka Perkov d44b07c279 nginx: bump to 1.9.6
In this bump as agreed with Thomas we are dropping out all the nginx 3rd party
addons. In case you would like to see your 3rd party addon included please send
a pull request and make sure it works with newest version.

Signed-off-by: Luka Perkov <luka@openwrt.org>
2017-11-12 18:42:54 +01:00
Paul Fertser 3c7b3d57dd nginx: add support for SPNEGO authentication
This adds a module suitable for Kerberos SSO, e.g. for integrating
into Active Directory domains.

Signed-off-by: Paul Fertser <fercerpav@gmail.com>
2017-11-12 18:42:49 +01:00
heil ec14ed490a nginx: fix musl compatibility
- include Patches according to issue #1129
 - refresh Makefile

Signed-off-by: heil <heil@terminal-consulting.de>
2017-11-12 18:42:45 +01:00
Nuno Goncalves b4b69ca9c5 rtklib: fix repository and bump version (fixes #3212)
Signed-off-by: Nuno Goncalves <nunojpg@gmail.com>
2017-11-12 09:38:00 +01:00
Nuno Goncalves 2930345a7b rtklib: bump version to 2.4.2 p11, close #1624
Signed-off-by: Nuno Goncalves <nunojpg@gmail.com>
2017-11-12 09:38:00 +01:00
Zoltan HERPAI 4273641178 php5: bump to 5.6.32
Fixes since 5.6.26:
 - ton of bugs
 - CVE-2016-9933
 - CVE-2016-9934
 - CVE-2016-9935
 - CVE-2016-10158
 - CVE-2016-10167
 - CVE-2016-10168
 - CVE-2016-10159
 - CVE-2016-10160
 - CVE-2016-10161
 - CVE-2017-7890
 - CVE-2017-9224
 - CVE-2017-9226
 - CVE-2017-9227
 - CVE-2017-9228
 - CVE-2017-9229
 - CVE-2016-1283

Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2017-11-10 22:12:34 +01:00
Michael Heimpold b8a8d398de php5: update to 5.6.26
This fixes the following CVEs:
 - in intl: CVE-2016-7416
 - in mysqlnd: CVE-2016-7412
 - in phar: CVE-2016-7414
 - in spl: CVE-2016-7417
 - in standard: CVS-2016-7411
 - in wddx: CVE-2016-7413, CVE-2016-7418

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2017-11-10 20:31:31 +01:00
Michael Heimpold 0897526541 php5: update to 5.6.25
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2017-11-10 20:31:25 +01:00
Michael Heimpold 48b402eb65 php5: update to 5.6.23
This fixes the following CVEs:
 - in GD: CVE-2015-8874, CVE-2016-5766, CVE-2016-5767
 - in mbstring: CVE-2016-5768
 - in mcrypt: CVE-2016-5769
 - in SPL: CVE-2016-5770, CVE-2016-5771
 - in WDDX: CVE-2016-5772
 - in zip: CVE-2016-5773

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2017-11-10 20:31:20 +01:00
Michael Heimpold 01e3a2fe18 php5: update to 5.6.21
This fixes the following CVEs:
 - in BCMath: CVE-2016-4537, CVE-2016-4538
 - in EXIF: CVE-2016-4542, CVE-2016-4543, CVE-2016-4544
 - in GD: CVE-2016-3074
 - in Intl: CVE-2016-4540, CVE-2016-4541
 - in XML: CVE-2016-4539

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2017-11-10 20:31:15 +01:00
Michael Heimpold eb71734dba php5: add mod_intl (resolves #2620)
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2017-11-10 20:31:08 +01:00
Michael Heimpold 9b44ecc86f php5: update to 5.6.19
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2017-11-10 20:31:00 +01:00
Michael Heimpold 11ed11780d php5: update to 5.6.18
Note: Upstream tagged this as security release.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2017-11-10 20:30:55 +01:00
Álvaro Fernández Rojas db651ddd85 xupnpd: update to latest version
Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
2017-11-10 20:09:30 +01:00
kuoruan cdf268a8be xupnpd: Update to 2016-05-11
* Change source url to GitHub
* Update to 2016-05-11
* Add LICENSE
* Edit Makefile

Signed-off-by: Hsing-Wang Liao <kuoruan@gmail.com>
Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
2017-11-10 20:09:21 +01:00
Michael Haas 3df25df858 wifidog: Bump to 1.3.0
* Updates wifidog to latest upstream release.
* Removes patches/100-musl-compat.patch as that's included in 1.3.0

Signed-off-by: Michael Haas <haas@computerlinguist.org>
2017-11-10 18:39:13 +01:00
Jo-Philipp Wich eb0de8f114 wifidog: fix musl compatibility
- Fix missing `fcntl.h` in `protocol.c`
 - Replace nonstandard `sys/unistd.h` includes with `unistd.h` ones

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
2017-11-10 18:39:08 +01:00
Daniel Golle 481a8850ff
Merge pull request #5100 from wigyori/for-15.05-tracertools
CC: tracertools: use new git HEAD
2017-11-10 18:26:32 +01:00
Daniel Golle 0f854ba5fe tracertools: use new git HEAD
gitorious archive became available, so I could import the project
history from there into the new repo on github. Rebasing the changes
made since 2014 on top of the original git tree obviously caused
the commit hashes to differ.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2017-11-10 14:53:26 +01:00
Daniel Golle 852570e41e tracertools: update source, fixes bug on little-endian systems
and improves collectd support

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2017-11-10 14:53:08 +01:00
Daniel Golle b4b62a17e7 tracertools: update source
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2017-11-10 14:53:02 +01:00
Hauke Mehrtens e37a60ef3a tor: update to version 0.2.9.11
This fixes CVE-2017-0376

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:07:34 +01:00
Hauke Mehrtens 7d5da97506 tor: update to version 0.2.9.10
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:07:29 +01:00
Hauke Mehrtens 83dba23e0a tor: update to version 0.2.9.9
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:07:22 +01:00
Hauke Mehrtens b05cb4e4bd tor: log to syslog by default
Make tor log to syslog by default instead of stdout.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:07:13 +01:00
Hauke Mehrtens e6ea3339fe tor: add tor-gencert, tor-resolve and torify
These are some additional applications build by the tor package.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:07:04 +01:00
Hauke Mehrtens 5228fe11d8 tor: add geoip6 to tor-geoip
This add the IPv6 addresses to the tor-geoip6 package.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:06:56 +01:00
Hauke Mehrtens 4001649ed5 tor: preserve tor keys over sysupgrade
Mark the directories containing the keys for hidden services as
conffiles to preserve them over sysupgrade.

Fixes: #2247

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:06:47 +01:00
Hauke Mehrtens 88e4f98f2c tor: update to version 0.2.9.8
In addition update some configure options and use EXTRA_CFLAGS.
Setting RunAsDaemon to 1 will be overwritten by the init script option
"--runasdaemon 0" anyway and we want it in foreground for procd.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:06:32 +01:00
Hauke Mehrtens 030c7796ef tor: update to version 0.2.8.11
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-11-10 14:05:50 +01:00
Nima Fatemi aa224c9ae1 Tor: update to 0.2.8.9
- update to 0.2.8.9
    - use sha256 instead of md5 for integrity check
    - add dependency: libcap

signed-off-by: Nima Fatemi <nima@torproject.org>
2017-11-10 14:05:39 +01:00
Felix Fietkau e02b4a7793 tor: add missing zlib dependency
Signed-off-by: Felix Fietkau <nbd@nbd.name>
2017-11-10 14:05:25 +01:00