Commit Graph

6158 Commits

Author SHA1 Message Date
Noah Meyerhans 35667c546e bind: bump to 9.16.37
Fixes multiple CVEs. Upstream changelog is
https://ftp.isc.org/isc/bind9/9.16.37/CHANGES

CVEs fixed:

CVE-2022-3924: Fix serve-stale crash when recursive clients soft quota
			is reached.

CVE-2022-3736: Handle RRSIG lookups when serve-stale is active.

CVE-2022-3094: An UPDATE message flood could cause named to exhaust all
			available memory. This flaw was addressed by adding a
			new "update-quota" statement that controls the number of
			simultaneous UPDATE messages that can be processed or
			forwarded. The default is 100. A stats counter has been
			added to record events when the update quota is
			exceeded, and the XML and JSON statistics version
			numbers have been updated.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2023-01-29 12:56:37 +02:00
Josef Schlehofer 72b0fb294a
bind: update to version 9.16.33
Changelog:
https://downloads.isc.org/isc/bind9/9.16.33/RELEASE-NOTES-bind-9.16.33.html

Fixes:
- multiple CVEs
(CVE-2022-2795, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-09-25 12:16:10 +02:00
Jan Hák 1a22460ec2
knot: update to 3.1.7
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit f30da8c572)
2022-09-07 14:22:36 +02:00
Jan Hák 5d26dbb16d
knot: update to 3.1.6
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 4de863e418)
2022-09-07 14:22:30 +02:00
Jan Hák 6b3df86555
knot: update to 3.1.5
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 2a56e478f5)
2022-09-07 14:22:25 +02:00
Jan Hák 3276368343
knot: update to 3.1.4
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 60a80b31fb)
2022-09-07 14:22:20 +02:00
Jan Hák 6d9ac1d6b9
knot: update to version 3.1.3
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 175087bf25)
2022-09-07 14:22:16 +02:00
Jan Hák 346b90d7f1
knot: update to version 3.1.2
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 2d2f1e5644)
2022-09-07 14:22:10 +02:00
Jan Hak 1e66309244
knot: update to version 3.1.1
Signed-off-by: Jan Hak <jan.hak@nic.cz>
(cherry picked from commit 7aee9d1308)
2022-09-07 14:22:04 +02:00
Michal Vasilek 7ac5407235
knot: update to version 3.1.0
* refresh patches

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 81e0fcb76f)
2022-09-07 14:21:58 +02:00
Jo-Philipp Wich ca195ccafa cgi-io: update to latest Git HEAD
901b0f0 main: fix two one-byte overreads in header_value()

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
(cherry picked from commit 443c6c1c17)
2022-08-10 23:55:37 +02:00
Josef Schlehofer e2ce67c8d4
bind: update to version 9.16.31
Release notes:
https://downloads.isc.org/isc/bind9/9.16.31/doc/arm/html/notes.html

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-08-02 16:43:23 +02:00
Josef Schlehofer f172d67c96
bind: update to version 9.16.30
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-06-24 11:46:35 +02:00
Šimon Bořek cc81050c66
netatalk: backport pending PR to fix segfaults
This commit backports pending PR, which solves segfaults:
- https://github.com/Netatalk/Netatalk/pull/174

To fix issues with segfaults described here:
- https://github.com/openwrt/packages/issues/18571
- https://github.com/Netatalk/Netatalk/issues/175

Signed-off-by: Šimon Bořek <simon.borek@nic.cz>
(cherry picked from commit ab768578cd)
2022-06-06 13:39:18 +02:00
Josef Schlehofer 1f7164ea83
Revert "Revert "netatalk: update to version 3.1.13""
This can be finally re-reverted, so we can use version 3.1.13, which
fixes multiple security vulnerabilities, but it segfaults almost
immediately. There is currently pending pull request, which fixes this,
and multiple users confirmed that it works on different GNU/Linux distributions.

This reverts commit bfe255064e.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-06-06 13:38:54 +02:00
Josef Schlehofer bfe255064e Revert "netatalk: update to version 3.1.13"
We received a report from Turris user on Turris support department that
netatalk version 3.1.13 does not work properly.

Process afpd says: INTERNAL ERROR Signal 11
because of that Apple Time Machine does not work as it should

This was already reported to netatalk by different people on various
GNU/Linux distributions like CentOS, AlmaLinux [1] [2]

netatalk developer states [3]:
```
Generally, at this point I can only advice to stop using Netatalk. There
are more pending CVEs that I currently don't have the bandwidth to work on.
```

[1] https://sourceforge.net/p/netatalk/bugs/669/
[2] https://sourceforge.net/p/netatalk/bugs/670/
[3] https://sourceforge.net/p/netatalk/mailman/message/37638871/

This reverts commit 165c5625a3.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-05-20 12:20:47 -07:00
Josef Schlehofer 9377a39b19
bind: update to version 9.16.28
Changelog:
https://downloads.isc.org/isc/bind9/9.16.28/RELEASE-NOTES-bind-9.16.28.html

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-04-24 15:15:19 +02:00
Daniel Golle 165c5625a3
netatalk: update to version 3.1.13
Please update to this latest release as soon as possible as this
releases fixes the following major security issues: CVE-2021-31439,
CVE-2022-23121, CVE-2022-23122, CVE-2022-23123, CVE-2022-23124,
CVE-2022-23125 and CVE-2022-0194.

For a summary of news and a detailed list of changes see the
ReleaseNotes[1].

[1]: https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 951ef67479)
2022-03-24 18:20:59 +00:00
Sungbo Eo 7b9c8fd487
coova-chilli: add dependency for miniportal
If miniportal option is enabled, some haserl scripts are provided which
present a simple login web page. To make it functional haserl is required.

Signed-off-by: Sungbo Eo <mans0n@gorani.run>
(cherry picked from commit 532088818a)
2022-03-23 10:27:22 +01:00
Sungbo Eo 6732d0573d
coova-chilli: clean up Makefile
- add missing configs to PKG_CONFIG_DEPENDS and sort it
- remove redundant INSTALL_DIR

Signed-off-by: Sungbo Eo <mans0n@gorani.run>
(cherry picked from commit 2c71fb2065)
2022-03-23 10:27:16 +01:00
Sungbo Eo 6ac4167c73
coova-chilli: remove dnslog option
dnslog feature has been removed since v1.4.

Signed-off-by: Sungbo Eo <mans0n@gorani.run>
(cherry picked from commit 95954b84f5)
2022-03-23 10:27:12 +01:00
Rosen Penev 384c9dc68f
coova-chili: Fix version
Upstream was sloppy when cutting the release.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit df20377ee9)
2022-03-23 10:26:51 +01:00
Rosen Penev 944bae08d0
coova-chilli: Update to 1.5
Remove upstreamed patches.

Added patch to fix compilation.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 68b5a71883)
2022-03-23 10:26:40 +01:00
Noah Meyerhans e8dc42753c bind: bump to 9.16.27
Fixes security issues:

 * CVE-2022-0396 -- A synchronous call to closehandle_cb() caused
			isc__nm_process_sock_buffer() to be called recursively,
			which in turn left TCP connections hanging in the
			CLOSE_WAIT state blocking indefinitely when
			out-of-order processing was disabled.

 * CVE-2021-25220 -- The rules for acceptance of records into the cache
			have been tightened to prevent the possibility of
			poisoning if forwarders send records outside
			the configured bailiwick.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-03-18 10:39:38 -07:00
Jo-Philipp Wich 31098bd6b2
htpdate: drop www.freebsd.org from default server list
The FreeBSD project stopped publishing HTTP date headers and seeks to
limit further resource taxing by distributed htpdate clients using the
www.freebsd.org host as default time source.

Fixes: #17924
Reported-by: Allan Jude <allanjude@freebsd.org>
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
(cherry picked from commit e871318002)
2022-02-23 23:09:29 +01:00
Josef Schlehofer c0c89af7c4
bind: update to version 9.16.25
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-02-02 18:47:36 +01:00
Josef Schlehofer 0af741cd16
prosody: update to version 0.11.13
Fixes CVEs:
- CVE-2022-0217
- CVE-2021-37601
- CVE-2021-32918
- CVE-2021-32920
- CVE-2021-32921
- CVE-2021-32917
- CVE-2021-32919

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit dcedbe8027)
2022-01-31 00:07:19 +01:00
Rosen Penev 20e42ca81e
prosody: fix shellcheck warnings
Remove paxctl stuff. pax is not packaged in OpenWrt.

Add reload support.

Install lua cfg file as 644. It's needed to be readable as prosody user

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit eb46e231cd)
2022-01-31 00:07:13 +01:00
Rosen Penev 0319712eda
prosody: update to 0.11.7
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 68a3a06e98)
2022-01-31 00:07:07 +01:00
Vieno Hakkerinen 22a3a54a9c
prosody: update to 0.11.5
Signed-off-by: Vieno Hakkerinen <vieno@hakkerinen.eu>
(cherry picked from commit bc500293e3)
2022-01-31 00:07:01 +01:00
Sergio E. Nemirowski 199860fa3a
prosody: /etc/prosody permissions fix
Signed-off-by: Sergio E. Nemirowski <sergio@outerface.net>
(cherry picked from commit 838306cb37)
2022-01-31 00:06:56 +01:00
Rosen Penev 498bcd4e25
prosody: Update to 0.11.3
Several Makefile rearrangements for consistency between packages.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 73d29b9fd7)
2022-01-31 00:06:51 +01:00
Sebastian Kemper 6317eabad7
apache: security bump to 2.4.51
Fixes (see [1] for details):

  CVE-2021-33193
  CVE-2021-41524
  CVE-2021-41773
  CVE-2021-42013

[1] https://httpd.apache.org/security/vulnerabilities_24.html

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
(cherry picked from commit da4b1ca8d6)
2022-01-13 10:11:55 +01:00
Josef Schlehofer 0e3869c2ad
Merge pull request #17476 from BKPepe/buildonly
treewide: add missing BUILDONLY
2022-01-03 19:58:33 +01:00
Rosen Penev f299c29a45
treewide: add missing BUILDONLY
Fixes Makefile warnings:

WARNING: skipping X -- package has no install section

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 5a7148d112)
2022-01-02 10:02:23 +01:00
Martin Pecka e1feccd5ae
ddns-scripts: Fix wrong whitespace in preinst and postinst scripts
Signed-off-by: Martin Pecka <peckama2@fel.cvut.cz>
2021-11-26 08:34:12 +01:00
Josef Schlehofer c559096e03 bind: update to version 9.16.23
Changelog:
https://downloads.isc.org/isc/bind9/9.16.23/RELEASE-NOTES-bind-9.16.23.html

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-11-18 08:40:52 -08:00
Noah Meyerhans 9abe24fb49 bind: Bump to 9.16.22
The following CVEs are addressed:

* CVE-2021-25219: The "lame-ttl" option is now forcibly set to 0. This
  effectively disables the lame server cache, as it could previously
  be abused by an attacker to significantly degrade resolver performance.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-10-28 21:15:16 -07:00
Josef Schlehofer 18af9b9e21 bind: update to version 9.16.21
- Remove patch, which is part of this release, it was backported from
  upstream

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-10-24 20:37:33 -07:00
Olivier Poitrey bb0ed00885 nextdns: Update to version 1.37.3
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-10-22 10:13:59 -07:00
Stan Grishin c493a603cd vpn-policy-routing: downgrade to 0.2.1-13
* there are reports that newer versions don't work on 19.07.x
* revert to older README to describe this older version

Signed-off-by: Stan Grishin <stangri@melmac.net>
(cherry picked from commit 7bb2ccd4e1)
2021-10-17 14:30:52 +00:00
Stan Grishin a5de193e54 simple-adblock: update to 1.8.8-1
* update 'check' function

Signed-off-by: Stan Grishin <stangri@melmac.net>
(cherry picked from commit d11f310230)
2021-10-15 21:52:29 +00:00
Stan Grishin af3643f9b0 https-dns-proxy: update to 2021-09-27
* update to [2021-09-27](da2501f542)
* fixes https://github.com/aarond10/https_dns_proxy/issues/125
* restart instead of reload on interface hotplug
* fixes https://github.com/openwrt/packages/issues/16794
* produce output and log entries on service start/stop
* prevent unnecessary dnsmasq restarts if service has previously updated dnsmasq settings
* allow both named and typed dnsmasq instance settings to be updated
* update 010-fix-cmakelists patch file

Signed-off-by: Stan Grishin <stangri@melmac.net>
(cherry picked from commit f8d16338da)
2021-10-14 04:58:18 +00:00
Michal Vasilek f2af6941fa tor: update to 0.4.5.10
* 0.4.4 is not an LTS series, people running tor relays with 0.4.4 will
  be evicted from the tor network. 0.4.5 is an LTS series
* fix building without OpenSSL engine support (from e30f0480c8)
* refresh patches

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2021-10-13 18:29:46 +03:00
Glenn Strauss 2d35019d6b lighttpd: update to lighttpd 1.4.55 release hash
update lighttpd in openwrt-19.07 branch from lighttpd 1.4.54 to 1.4.55

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2021-10-06 00:16:45 -07:00
Rosen Penev dd89b28442
Merge pull request #16569 from turris-cz/19.07/tor-0.4.4.9
tor: update to version 0.4.4.9
2021-09-18 15:05:14 -07:00
Josef Schlehofer 8c3d6a2e17
Merge pull request #16196 from miska/snort3-19.07
net/snort3: Include default configs and snort2lua
2021-09-17 16:20:57 +02:00
Stijn Tintel b101f744c2 tcpreplay: avoid host lib leakage
On hosts that have pcapnav-config installed, there is host lib leakage.
From config.log:

LNAVLIB='-L/usr/lib64 -lpcapnav -lpcap'
LNAV_CFLAGS='-I/usr/include'

Fix this by disabling pcapnav-config, which isn't available anyway.

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit e4b8fec79c)
2021-09-10 13:12:34 -07:00
Alexandru Ardelean be17f97265 tcpreplay: bump to version 4.3.4
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
(cherry picked from commit 7436d944fa)
2021-09-10 13:12:34 -07:00
Rosen Penev 6e4e0d5e9d tcpreplay: add libdnet support
On Arch Linux, tcpreplay is picking up the host dnet-config and adding
OS paths, thereby breaking compilation. The easiest solution is to add
libdnet support as the previous commit fixes dnet-config on OpenWrt.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit f9f216a066)
2021-09-10 13:12:34 -07:00