Commit Graph

17302 Commits

Author SHA1 Message Date
Tianling Shen 6df6880800
Merge pull request #21348 from jefferyto/python-3.7.17-openwrt-19.07
[openwrt-19.07] python3: Update to 3.7.17
2023-06-13 11:01:00 +08:00
Jeffery To f7a8607579
python3: Update to 3.7.17
This includes an updated patch for pip, as the bundled pip was also
updated with this release.

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-06-12 17:35:45 +08:00
Jeffery To 39ddffe42d
Merge pull request #20676 from jefferyto/python-3.7.16-openwrt-19.07
[openwrt-19.07] python3: Update to 3.7.16, refresh patches
2023-03-30 12:14:59 +08:00
Jeffery To 509f4e2f83
python3: Update to 3.7.16, refresh patches
Includes fixes:

* 3.7.14:
  * CVE-2020-10735: Prevent DoS by large int<->str conversions
  * CVE-2021-28861: http.server: Open Redirection if the URL path starts with //

* 3.7.16:
  * CVE-2022-45061: Slow IDNA decoding with large strings
  * CVE-2022-37454: Buffer overflow in the _sha3 module
  * CVE-2015-20107: mailcap.findmatch: document shell command Injection danger in filename parameter

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-03-16 15:05:35 +08:00
Noah Meyerhans 35667c546e bind: bump to 9.16.37
Fixes multiple CVEs. Upstream changelog is
https://ftp.isc.org/isc/bind9/9.16.37/CHANGES

CVEs fixed:

CVE-2022-3924: Fix serve-stale crash when recursive clients soft quota
			is reached.

CVE-2022-3736: Handle RRSIG lookups when serve-stale is active.

CVE-2022-3094: An UPDATE message flood could cause named to exhaust all
			available memory. This flaw was addressed by adding a
			new "update-quota" statement that controls the number of
			simultaneous UPDATE messages that can be processed or
			forwarded. The default is 100. A stats counter has been
			added to record events when the update quota is
			exceeded, and the XML and JSON statistics version
			numbers have been updated.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2023-01-29 12:56:37 +02:00
Josef Schlehofer e6ecebbfcc
libwebsockets: fix recursive dependency
While running `make menuconfig`, it was discovered then there is a
recursive dependency like this:
tmp/.config-package.in:59138:error: recursive dependency detected!
tmp/.config-package.in:59138:	symbol PACKAGE_libwebsockets-openssl is selected by PACKAGE_libwebsockets-mbedtls
tmp/.config-package.in:59122:	symbol PACKAGE_libwebsockets-mbedtls depends on PACKAGE_libwebsockets-openssl

It is not possible with the recently added conflicts that two packages
(OpenSSL and full variant, which uses OpenSSL as well), which are almost the same
provides the same named package libwebsockets as their conflict - Mbed
TLS.

Fixes: 676c5c72b5 ("libwebsockets: OpenSSL
and mbedTLS variants should conflict")

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit a4e8cbb89a)
2022-10-27 14:48:20 +02:00
Josef Schlehofer 7b1b79c505
libwebsockets: OpenSSL and mbedTLS variants should conflict
They provide the same files, but they don't conflict to each other, this
means that users can install them side by side.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 676c5c72b5)
2022-10-25 14:29:47 +02:00
Josef Schlehofer 13a3a415a9
libwebsockets: full variant provides OpenSSL
For some time, it is not possible to install ttyd and mosquitto-ssl at the
same time, so let's solve it that libwebsockets-full provides
libwebsockets-openssl. This allows to install ttyd and mosquitto at
the same time.

Also, we need to add conflict, because we should not have installed
libwebsockets-openssl and libwebsockets-full at the same time as they
provides the same files.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 77e682a11c)
2022-10-25 14:29:44 +02:00
Josef Schlehofer 1eeac014ad
nss: disable PKG_BUILD_PARALLEL
This is similar to commit f303e87a1e
("nss: update to 3.67") as there is something wrong with NSS build
system and otherwise this package fails to compile. Let's compile it
single threaded.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-09-26 20:39:07 +02:00
Josef Schlehofer 72b0fb294a
bind: update to version 9.16.33
Changelog:
https://downloads.isc.org/isc/bind9/9.16.33/RELEASE-NOTES-bind-9.16.33.html

Fixes:
- multiple CVEs
(CVE-2022-2795, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-09-25 12:16:10 +02:00
Josef Schlehofer 850d2ca96b
syslog-ng: update to version 3.38.1
- Release notes:
https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-3.38.1

- Update the configuration file to use version 4.0 as mentioned in the
  release notes to try the latest changes

Fixes: CVE-2022-38725

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 34b7af9e08)
2022-09-08 09:59:02 +02:00
Jan Hak b4016afdd2
libedit: update to version 20210522-3.1
Signed-off-by: Jan Hak <jan.hak@nic.cz>
(cherry picked from commit 0b8f3ea81a)
2022-09-07 14:23:27 +02:00
Jan Hak 5ad19e5a40
libedit: update to version 20210419-3.1
Signed-off-by: Jan Hak <jan.hak@nic.cz>
(cherry picked from commit b0870d792b)
2022-09-07 14:23:22 +02:00
Jan Hák 1a22460ec2
knot: update to 3.1.7
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit f30da8c572)
2022-09-07 14:22:36 +02:00
Jan Hák 5d26dbb16d
knot: update to 3.1.6
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 4de863e418)
2022-09-07 14:22:30 +02:00
Jan Hák 6b3df86555
knot: update to 3.1.5
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 2a56e478f5)
2022-09-07 14:22:25 +02:00
Jan Hák 3276368343
knot: update to 3.1.4
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 60a80b31fb)
2022-09-07 14:22:20 +02:00
Jan Hák 6d9ac1d6b9
knot: update to version 3.1.3
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 175087bf25)
2022-09-07 14:22:16 +02:00
Jan Hák 346b90d7f1
knot: update to version 3.1.2
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 2d2f1e5644)
2022-09-07 14:22:10 +02:00
Jan Hak 1e66309244
knot: update to version 3.1.1
Signed-off-by: Jan Hak <jan.hak@nic.cz>
(cherry picked from commit 7aee9d1308)
2022-09-07 14:22:04 +02:00
Michal Vasilek 7ac5407235
knot: update to version 3.1.0
* refresh patches

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 81e0fcb76f)
2022-09-07 14:21:58 +02:00
Karel Kočí e2885b9ddd
vim: variants conflict with each other
This adds conflicts between the variants,
because they provide the same files, and it should not be
possible to install them side by side. Otherwise, it might happen that
half files would be from one variant and the other half from the
other.

Also, adds provides as if you request to install ``vim`` and
``vim-full``, then the request could be satisfied even they collide,
because ``vim-full`` provides ``vim`` package.

Signed-off-by: Karel Kočí <cynerd@email.cz>
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
[add commit message]
(cherry picked from commit 46c058468a)
2022-08-24 08:25:54 +02:00
Jo-Philipp Wich ca195ccafa cgi-io: update to latest Git HEAD
901b0f0 main: fix two one-byte overreads in header_value()

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
(cherry picked from commit 443c6c1c17)
2022-08-10 23:55:37 +02:00
Šimon Bořek f81c55e870
luajit: patch: PPC/e500 SPE: use soft float instead of failing
makes LuaJit builds for mpc85xx targets with SPE ISA extension
enabled possible

Quoting inner commit message:

This allows building LuaJit for systems with Power ISA SPE
extension[^1] support by using soft float on LuaJit side.

While e500 CPU cores support SPE instruction set extension
allowing them to perform floating point arithmetic natively,
this isn't required. They can function with software floating
point to integer arithmetic translation as well,
just like FPU-less PowerPC CPUs without SPE support.

Therefore I see no need to prevent them from running LuaJit
explicitly.

[^1]: https://www.nxp.com/docs/en/reference-manual/SPEPEM.pdf

Signed-off-by: Pali Rohár <pali@kernel.org>
Signed-off-by: Šimon Bořek <simon.borek@nic.cz>
(cherry picked from commit a4a484fbca)
2022-08-06 19:44:06 +02:00
Josef Schlehofer e2ce67c8d4
bind: update to version 9.16.31
Release notes:
https://downloads.isc.org/isc/bind9/9.16.31/doc/arm/html/notes.html

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-08-02 16:43:23 +02:00
Michael Heimpold 5a399f1448 cyrus-sasl: install pkg-config file and fine-tune installed files
Installing the .pc files helps other programs to detect
the presence of libsasl2.

While at, reduce the glob pattern a little bit to not
include unneeded symlinks.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit c9ce769b1a)
2022-07-18 14:41:32 +02:00
Michal Vasilek c14c054328
postfix: fix download failure
cdn.postfix.johnriley.me serves a certificate for a different domain
name.

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit d4feef97e6)
2022-07-17 15:04:04 +02:00
Petr Štetiar 0bab8ae2a7 libarchive: fix ext2fs build race error condition
libarchive looks for ext2fs headers during configure, and if it finds
them it will expect to find them during compile, or on the rare occasion
when they aren't it will fail:

 libarchive/archive_entry.c:59:55: fatal error: ext2fs/ext2_fs.h: No such file or directory

As we just need headers for some type constants, let's re-use headers
from tools/e2fsprogs package which are always available.

Reported-by: Adam Dov <adov@maxlinear.com>
Suggested-by: Paul Eggleton <paul.eggleton@linux.intel.com>
References: https://git.yoctoproject.org/poky/commit/?id=f0b9a7cf9f80be1917e45266fa201f464a28c1e5
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 797945dfaa)
2022-07-13 08:47:54 +02:00
Florian Eckert 742ef3c120
Merge pull request #18846 from nemesisdesign/monitoring-openwrt-19
[19.07] openwisp-monitoring: added 0.1.1
2022-07-04 09:09:05 +02:00
Federico Capoano 3ecffb63c7 openwisp-monitoring: added 0.1.1
Signed-off-by: Federico Capoano <f.capoano@openwisp.io>
(cherry picked from commit 0419a797ae)
2022-07-01 18:50:08 -04:00
Hannu Nyman 5cc4212d7f
haveged: update to 1.9.18
Update haveged to version 1.9.18

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit 8579494bbb)
2022-07-01 19:01:29 +02:00
Florian Eckert cdc90be2f8
Merge pull request #18829 from nemesisdesign/openwrt-19.07
[19.07] openwisp-config: update to 1.0.1
2022-07-01 10:18:11 +02:00
Federico Capoano f645f5b3a2 openwisp-monitoring: added 0.1.1
Signed-off-by: Federico Capoano <f.capoano@openwisp.io>
(cherry picked from commit 0419a797ae)
2022-06-30 13:58:47 -04:00
Josef Schlehofer 7d08804e27
syslog-ng: update to version 3.37.1
- Changelog:
https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-3.37.1

- Bump config version

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit ae7aefe111)
2022-06-25 06:52:17 +02:00
Stijn Tintel cf0d586c7f
Revert "lxc: export systemd cgroups after install"
The postinst script is sourced during image build, which causes the
follow failure:
/home/stijn/Development/OpenWrt/openwrt/build_dir/target-x86_64_musl/root-x86/etc/init.d/lxc-auto: line 3: /lib/functions.sh: No such file or directory
postinst script ./usr/lib/opkg/info/lxc-auto.postinst has failed with exit code 1

Sourcing /lib/functions.sh is not needed, as /etc/rc.common does so
already. Unfortunately removing that line from the init script is not
enough to fix the problem. The postinst script should also check
IPKG_INSTROOT. As these two changes are unrelated, they should go in
separate commits, and the solution to the image build problem is to
revert the commit that introduced the breakage.

This reverts commit 2cde10b950.

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2022-06-24 12:20:43 +02:00
Michal Vasilek 70b0ff8a48
lxc: export systemd cgroups after install
otherwise, a user would have to either manually run /etc/init.d/lxc-auto
boot or reboot the system to start using lxc.

originally committed in 2cde10b950
reverted in 039912dec5

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 7da7356539)
2022-06-24 12:19:14 +02:00
Josef Schlehofer f172d67c96
bind: update to version 9.16.30
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-06-24 11:46:35 +02:00
Michal Vasilek 90ff2ed162 libgd: install pkgconfig file
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2022-06-23 12:35:30 -06:00
Rosen Penev c6a780c7bf
luajit: backport softfloat ppc support
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 24c0007ea2)
2022-06-23 05:08:17 +02:00
Sergey V. Lobanov 998fac7cfa
luajit: fix build on macos (ldconfig issue)
fix ldconfig build issue. This patch is a backport from upstream:
18c9cf7d37

Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
(cherry picked from commit 42c4d25455)
2022-06-22 14:38:23 +02:00
W. Michael Petullo f08dae84f8
openldap: drop use of HTTP in favor of HTTPS
Signed-off-by: W. Michael Petullo <mike@flyn.org>
(cherry picked from commit bab2f020ee)
2022-06-10 13:56:56 +02:00
Josef Schlehofer 685893c968
beep: change git repository to fix CVE-2018-0492 and CVE-2018-1000532
1. Changed Git repository, which is used for Fedora packaging
https://github.com/johnath/beep/issues/11#issuecomment-450277122

Fixed CVEs:
CVE-2018-0492 - https://nvd.nist.gov/vuln/detail/CVE-2018-0492
CVE-2018-1000532 - https://nvd.nist.gov/vuln/detail/CVE-2018-1000532

2. Fixed SPDX License Identifier

3. Add patch to comment out -D_FORTIFY_SOURCE
Otherwise, it can not be built by default.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 6488eaf250)
2022-06-10 13:54:51 +02:00
Yanase Yuki e0a2e6f41c
beep: restore a dependency definition to the previous one on x86 target
Commit 9bcea2de2c causes a dependency
problem with some out-of-tree packages which expect "DEPENDS:=+kmod-pcspkr".

To fix this problem, this commit restores a dependency definition to
the previous one on x86 target.

Signed-off-by: Yanase Yuki <dev@zpc.sakura.ne.jp>
(cherry picked from commit 8b1216fb49)
2022-06-10 13:54:49 +02:00
Yanase Yuki 02d4a7161e
beep: fix dependency to support non-x86 target and kmod-gpio-beeper
Beep is a target-independent software that can handle buzzers controlled by kmod-gpio-beeper.

This change is useful for some non-x86 enterprise APs and development boards
that have a buzzer connected to GPIO.

Compile-tested: ath79, ELECOM WAB-I1750-PS, 3fab4ac + device support patch
Run-tested: ath79, ELECOM WAB-I1750-PS, 3fab4ac + device support patch

Signed-off-by: Yanase Yuki <dev@zpc.sakura.ne.jp>
(cherry picked from commit 9bcea2de2c)
2022-06-10 13:54:45 +02:00
Yanase Yuki 21ee1aa46a
beep: add missing PKG_MIRROR_HASH
Signed-off-by: Yanase Yuki <dev@zpc.sakura.ne.jp>
(cherry picked from commit ac52356c0b)
2022-06-10 13:54:40 +02:00
Josef Schlehofer b4f1cdbdd6
Merge pull request #18696 from BKPepe/netatalk-1907
[19.07] netatalk: re-introduce 3.1.13 and backport pending fixes
2022-06-08 17:30:21 +02:00
Šimon Bořek cc81050c66
netatalk: backport pending PR to fix segfaults
This commit backports pending PR, which solves segfaults:
- https://github.com/Netatalk/Netatalk/pull/174

To fix issues with segfaults described here:
- https://github.com/openwrt/packages/issues/18571
- https://github.com/Netatalk/Netatalk/issues/175

Signed-off-by: Šimon Bořek <simon.borek@nic.cz>
(cherry picked from commit ab768578cd)
2022-06-06 13:39:18 +02:00
Josef Schlehofer 1f7164ea83
Revert "Revert "netatalk: update to version 3.1.13""
This can be finally re-reverted, so we can use version 3.1.13, which
fixes multiple security vulnerabilities, but it segfaults almost
immediately. There is currently pending pull request, which fixes this,
and multiple users confirmed that it works on different GNU/Linux distributions.

This reverts commit bfe255064e.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-06-06 13:38:54 +02:00
Michael Heimpold 1f7513c2fb
Merge pull request #18671 from turris-cz/libxml_2.9.14_backport
libxml2: backport 2.9.14 version bump
2022-06-02 21:28:55 +02:00
Michael Heimpold 1ad2e67d4c
libxml2: update to 2.9.14
This fixes CVE-2022-29824.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit c12e1cfcab)
Signed-off-by: Šimon Bořek <simon.borek@nic.cz>
2022-06-02 15:27:28 +02:00