Commit Graph

7285 Commits

Author SHA1 Message Date
Etienne Champetier 9ce3deb840 sqlite3: update to 3.19.3
fix possible database corruption
https://www.sqlite.org/releaselog/3_19_3.html

Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
2017-10-25 11:36:18 -07:00
Daniel Engberg 6bca857952 libs/sqlite3: Update to 3190200
Update sqlite to 3190200
Remove obsolete tarball hash variable

Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
2017-10-25 11:36:18 -07:00
Ian Leonard 0a279576a9 sqlite: update to 3.17.0
Signed-off-by: Ian Leonard <antonlacon@gmail.com>
2017-10-25 11:36:18 -07:00
Karl Palsson 58a1a733e5 libwebsockets: add PROVIDES to both variants
Fixed recently in master as part of upgrading, but the same issue
applies to 17.01.  The two variant packages both now PROVIDE
libwebsockets, the virtual package.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2017-10-25 11:15:12 +00:00
Hirokazu MORIKAWA e967fd8ca8 icu: fix CVE-2017-14952 Double-Free Vulnerability [lede-17.01]
http://www.sourcebrella.com/blog/double-free-vulnerability-international-components-unicode-icu/

https://security-tracker.debian.org/tracker/CVE-2017-14952

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2017-10-24 02:34:06 -05:00
Jo-Philipp Wich 3c29b149f5 Revert "Provides a way to acquire the list of installed packages without the"
This reverts commit 983819f3f0.
2017-10-20 15:08:54 +02:00
Jo-Philipp Wich 27bdc743ce Revert "add ubus call to perform a sysupgrade and acl file for the attended"
This reverts commit f6c287f1ee.
2017-10-20 15:08:54 +02:00
Jo-Philipp Wich cdcf6ad237 Revert "due to renaming .rpcd was forgotten in the Makefile"
This reverts commit 04cbc70c52.
2017-10-20 15:08:54 +02:00
Paul Spooren 04cbc70c52 due to renaming .rpcd was forgotten in the Makefile
Signed-off-by: Paul Spooren <paul@spooren.de>

(cherry picked from commit c98e9f3b18)
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2017-10-20 15:02:01 +02:00
Paul Spooren f6c287f1ee add ubus call to perform a sysupgrade and acl file for the attended
sysupgrade use case as well uci defaults.
Package is a part of the GSoC 17 project implementing easy
sysupgrade functionality.

Signed-off-by: Paul Spooren <paul@spooren.de>

(cherry picked from commit f9a6c81c11)
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2017-10-20 15:02:01 +02:00
Paul Spooren 983819f3f0 Provides a way to acquire the list of installed packages without the
need to have opkg available. It is being used for the GSoC 17 project
implementing easy sysupgrade functionality.

Signed-off-by: Paul Spooren <paul@spooren.de>

(cherry picked from commit 0d2e674aa1)
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2017-10-20 14:47:30 +02:00
Stijn Tintel cd5c448758 wireguard: drop package
WireGuard was added to LEDE core. See discussion at
https://github.com/lede-project/source/pull/1409

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2017-10-16 14:08:26 +03:00
Hannu Nyman 73c9ff9274 Merge pull request #4914 from zx2c4/lede-17.01
wireguard: bump to release 0.0.20171005 for 17.01
2017-10-10 17:54:20 +03:00
champtar 631309edbb Merge pull request #4916 from StevenHessing/noddos-lede-17.01
noddos: new backport of noddos from master branch
2017-10-08 08:45:34 -07:00
Steven Hessing 9040b270b5 noddos: new backport of noddos from master branch
Signed-off-by: Steven Hessing <steven.hessing@gmail.com>
2017-10-07 21:24:43 -07:00
Jason A. Donenfeld 72e886788a wireguard: bump to release 0.0.20171005 for 17.01
WireGuard is well documented for being an experimental project, not
currently ready to be stabilized. As such, it's important for packagers
to always keep the project up to date in all contexts.

However, it is common for some projects, such as LEDE/OpenWrt to have
stable branches, which don't expect a lot of churn or modification.

The WireGuard that happened to ship with 17.01 is broken and crufty and
shouldn't be used at all. It's highly unlikely that there's anybody out
there even using it; it won't work with anything else.

So, this commit updates the 17.01 package to the latest upstream
version. Because the 17.01 stable branch can't be updated all the time,
it's important that this bump here in this commit is a stable one.

I believe 0.0.20171005 to be a fairly stable snapshot, which should be
suitable for the 17.01 branch. As stated earlier, the 0.0.20170115
currently in this branch is highly problematic. 0.0.20171005 offers
extremely important changes.

I'll continue to send package bumps for 17.01, but only for snapshot
releases that I think fix an important bug or provide a noted increase
in stability, or have similar goals to this commit.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2017-10-08 01:24:29 +02:00
Hauke Mehrtens 21b2e3eb76 Merge pull request #4879 from nxhack/17_01-CVE-2017-1000250
[lede-17.01] bluez: fix CVE-2017-1000250
2017-10-03 11:24:11 +02:00
Hirokazu MORIKAWA de79f4c749 bluez: fix CVE-2017-1000250
Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>

bluez: fix CVE-2017-1000250

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2017-09-27 14:17:34 +09:00
Hauke Mehrtens b56e6504be tor: update to version 0.2.9.12
This fixes the TROVE-2017-008 (CVE-2017-0380) security problem.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-09-24 17:54:16 +02:00
Hauke Mehrtens c69b077483 tor: update to version 0.2.9.11
This fixes CVE-2017-0376

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2017-09-24 17:53:13 +02:00
champtar 3b3e2cbe95 Merge pull request #4862 from luizluca/17.01/ruby-2.4.2
[17.01] ruby: bump to 2.4.2 (backported from master)
2017-09-23 16:52:04 -07:00
Luiz Angelo Daros de Luca ea9ca5ed7e ruby: bump to 2.4.2
This release contains some security fixes.

 CVE-2017-0898: Buffer underrun vulnerability in Kernel.sprintf
 CVE-2017-10784: Escape sequence injection vulnerability in the Basic authentication of WEBrick
 CVE-2017-14033: Buffer underrun vulnerability in OpenSSL ASN1 decode
 CVE-2017-14064: Heap exposure in generating JSON
 Multiple vulnerabilities in RubyGems
 Update bundled libyaml to version 0.1.7.

And many other bugfix.

Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
(cherry picked from commit 699d9bef30)
2017-09-20 10:04:45 -03:00
Hannu Nyman fa3a118de8 collectd: uptime plugin: apply fix from upstream
Backport from master the fix for uptime plugin.
Adjust it for 5.5.3

  Uptime plugin fails to adjust for system time changes after boot.
  As Openwrt/LEDE routers usually do not have a RTC, the system time
  gets adjusted with NTP possibly after collectd has already started.
  But collectd continues to use the initial time set by 'sysfixtime',
  which can lead to incorrect uptime calculations.

  Apply a proposed fix from upstream that uses /proc/uptime

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2017-09-15 19:10:37 +03:00
Hannu Nyman a61d8060e1 Merge pull request #4834 from marcin1j/pr/20170911-mwan3-backport-lede17.01-66406f9
mwan3: fix interface-bound traffic when interface is offline
2017-09-15 15:49:40 +03:00
Marcin Jurkowski 4739584c24 mwan3: fix interface-bound traffic when interface is offline
This is a backport of 66406f9 to LEDE 17.01 and replaces hotfix 282e900.

Signed-off-by: Marcin Jurkowski <marcin1j@gmail.com>
2017-09-14 10:00:34 +02:00
Thomas Heil d61bf45c3c haproxy: update to 1.7.8 and pending patches
- fixes reload issue with hanging process

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2017-09-03 15:16:49 +02:00
Thomas Heil a6a44f91f3 pcre: Added fix for CVE-2017-11164 by adding stack recursion limit
Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2017-09-03 15:15:20 +02:00
Thomas Heil 1434dbdf55 pcre: upgrade to version 8.41
- fixes security issues

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
2017-09-03 15:15:20 +02:00
Stijn Tintel ad256bbfa7 strongswan: fix typo
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit 4660504c61)
2017-09-02 12:29:35 +03:00
Stijn Tintel a700729158 strongswan: add curve25519 plugin
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit a268689adc)
2017-09-02 12:29:13 +03:00
Stijn Tintel 1143cb9b2c strongswan: bump to 5.5.3
Fixes CVE-2017-9022, CVE-2017-9023.

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit 960006be50)
2017-09-02 12:28:42 +03:00
Stijn Tintel 384e89b3d7 strongswan: bump to 5.5.2
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit 18b076ab93)

Conflicts:
	net/strongswan/Makefile
2017-09-02 12:26:26 +03:00
champtar 4e845ad639 Merge pull request #4722 from TDT-GmbH/mwan3-fixes
net/mwan3: fixes for mwan3 (lede-17.01)
2017-08-25 14:10:45 -07:00
Florian Eckert fe233e3596 net/mwan3: update Makefile
- Update version
- Update maintainer to me

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2017-08-25 08:01:27 +02:00
Hannu Nyman 269b96d656 Merge pull request #4741 from EricLuehrsen/unbound_1_6_5
[LEDE-17.01] unbound: update to 1.6.5
2017-08-22 17:43:53 +03:00
Eric Luehrsen 42f465707f unbound: update to 1.6.5
This fixes the root.key file if created when unbound is installed between sep11 and oct11 2017

Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2017-08-21 23:45:42 -04:00
Florian Eckert a3c78648cb net/mwan3: remove lock file on mwan3 stop
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 5e123852bc)
2017-08-17 11:57:40 +02:00
Florian Eckert 282e90014e net/mwan3: fix ping issue if last interface recovers from failure
Even though error was fixed the interface checks still fails, if last_resort
was set to blackhole or unreachable.

To fix this issue do not remove failure interface from iptables change on
down event.

Reported-by: Colby Whitney <colby.whitney@luxul.com>
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 6d99b602fd)
2017-08-17 11:51:15 +02:00
Florian Eckert 94a5233619 net/mwan3: fix ipset generation in hotplug script with an lock
Fix critical section during hotplug events.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit a4fbc7eba6)
2017-08-17 11:49:01 +02:00
Florian Eckert 822bc96b7c net/mwan3: add lock for mwan3 hotplug script
If more then one interface get up/down at once mwan3 could be in a
undefined state, because more then one mwan3 hotplug script are running
and editing the iptables.

Lock the critical section should solve this issue.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit b6e9debc1b)
2017-08-17 11:46:27 +02:00
Florian Eckert 70d96f5dcc net/mwan3: add connected network regardless of mwan3 interface enable state
If netifd set an interface up/down which is not tracked by mwan3 the
connected network of that interface should regardless be added/removed to the
mwan3_connected ipset.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit f94975b71f)
2017-08-17 11:46:27 +02:00
Florian Eckert 8a111b5b27 net/mwan3: mwan3track interrupt sleep on signal (trap) event
Sleep will be aborted if a signal is send to this process.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 7e80e83dfd)
2017-08-17 11:31:23 +02:00
Florian Eckert eefc65b014 net/mwan3: fix hotplug on ACTION ifdown
On dynamic interface proto (dhcp/pppoe) the hotplug will not execude (exit 9)
because the gateway is already released. The check will now only be made
on a ifup ACTION event.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 28c8b664e4)
2017-08-17 11:25:30 +02:00
Karl Palsson 7fb33ad6b6 mosquitto: properly use localhost instead of ipv4
On some environments, connecting to localhost was resolving to ::1,
which didn't match the bind to the explicit 127.0.0.1.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2017-08-16 15:02:17 +00:00
Karl Palsson 75f50611ce mosquitto: support more config options in UCI
Added many more UCI config options, particularly for bridge connections

The recently introduced username/password options for bridges are kept,
even though they have been deprecated upstream for a while.  In keeping
with this, while support is kept in UCI, the generated mosquitto.conf
file will always generate the "modern" remote_username/remote_password
options preferred by mosquitto instead.

Likewise for bridge clientid and remote_clientid options.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2017-08-16 15:02:17 +00:00
Toke Høiland-Jørgensen 956ef7a855 acme: Make sure postrm script doesn't fail
Fixes #4716.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2017-08-16 01:10:55 +02:00
Daniel H 788f17e98d acme: Fix for curl linked against mbed TLS. (#4254)
Use newest acme.sh release (2.6.8).
Remove dependency on ca-certificates and add dependency on ca-bundle.
Update environment variable.

Signed-off-by: Daniel Halmschlager <da@halms.at>

Backport to 17.01 for compatibility with 17.01.2, but keep the old envvar so
it'll hopefully keep working for users who haven't upgraded.

Closes #4579, closes #4699.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2017-08-13 22:15:10 +02:00
Jo-Philipp Wich 5383fd42e9 nlbwmon: update to latest version
Changes since last update:

32fc092 build: remove extraneous _GNU_SOURCE defines
096aaa3 build: compile with -D_GNU_SOURCE
76487b5 transform to source-only repository

Fixes build with uClibc and eglibc toolchains.

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2017-08-05 14:23:52 +02:00
Jo-Philipp Wich 29fb31fe83 nlbwmon: add package
This commit introduces nlbwmon, the lightweight NetLink BandWidth Montor.

The nlbwmon daemon gathers per-host traffic statistics by querying netlink
accounting data. Due to this approach, the executable is very small and does
not rely on libpcap and CPU intensive raw sockets to monitor traffic.

Besides raw per-host traffic counters, nlbwmon also support rudimentary
traffic classification by observing IP protocols and used port numbers.

Gathered accounting data is stored into a series of database files which
are regularily committed to persistent storage.

Refresh, commit and accounting intervals are freely configurable as well
as the layer7 protocol mapping rules and observed source subnets.

This package also bundles a cli client which can be used to dump the
gathered traffic data as JSON, CSV or plaintext data. A pull request to
add a graphical LuCI frontend for nlbwmon is pending.

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2017-08-05 14:23:52 +02:00
Karl Palsson ce5ff27473 mosquitto: update to 1.4.14
Fixes a regression due to the CVE fix in the recently released 1.4.13.

https://mosquitto.org/2017/07/version-1-4-14-released/

Signed-off-by: Karl Palsson <karlp@etactica.com>
2017-07-11 13:22:50 +00:00