Commit Graph

3496 Commits

Author SHA1 Message Date
Jeffery To 2219ac4fde python-ubus: Update to 0.1.2
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 99d8554bcd)
2023-11-02 01:50:00 +01:00
Šimon Bořek 98a7ee05fe python-sentry-sdk: update to 1.5.4
changelog: f6d3adcb3d/CHANGELOG.md (154)

Signed-off-by: Šimon Bořek <borek@autobakterie.cz>
(cherry picked from commit 32e2a2fa2a)
2023-09-16 12:30:37 +02:00
Jeffery To 4f5cce5be4 python3: Update to 3.9.18
Includes fix for CVE-2023-40217 (Bypass TLS handshake on closed
sockets).

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-09-08 19:02:09 +08:00
Sergey V. Lobanov 5423228148 tcl: fix build on macos
configure script detects Darwin and uses flags incompatible with
Linux target build.

This patch uses fakeuname tool if host OS is MacOS to avoid Darwin
detection on target build.

Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
(cherry picked from commit 6e9c701050)
2023-09-02 15:50:14 +02:00
Michael Heimpold e76e8296ec php8: update to 8.0.30
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-08-13 11:47:04 +02:00
Michael Heimpold 0d98cdb6bf php8: update to 8.0.29
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-06-15 21:27:59 +02:00
Tianling Shen 0ba2e15c61
Merge pull request #21347 from jefferyto/python-3.9.17-openwrt-21.02
[openwrt-21.02] python3: Update to 3.9.17
2023-06-13 11:00:45 +08:00
Jeffery To 5661564a57
python3: Update to 3.9.17
This includes an updated patch for pip, as the bundled pip was also
updated with this release.

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-06-12 16:17:50 +08:00
Alexandru Ardelean 17f8c876bf django: bump to version 3.2.19
Fixes CVE-2023-31047
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-31047

Signed-off-by: Alexandru Ardelean <alex@shruggie.ro>
2023-05-26 13:17:58 +03:00
Michael Heimpold 3935ef65ea php8: update to 8.0.28
This fixes:
    - CVE-2023-0567
    - CVE-2023-0568
    - CVE-2023-0662

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-03-14 22:10:08 +01:00
Jeffery To 6df650e909
golang: Fix conditionals not stripped
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 86fd1ebbe4)
2023-03-09 18:24:44 +01:00
Eneas U de Queiroz 8c41503549
Merge pull request #20526 from nxhack/2102_node_14213
[21.02] node: bump to v14.21.3
2023-02-20 09:37:44 -03:00
Hirokazu MORIKAWA d57b35fa83 node: bump to v14.21.3
Thursday February 16 2023 Security Releases

Notable Changes
The following CVEs are fixed in this release:
* CVE-2023-23918: Node.js Permissions policies can be bypassed via process.mainModule (High)
* CVE-2023-23920: Node.js insecure loading of ICU data through ICU_DATA environment variable (Low)
More detailed information on each of the vulnerabilities can be found in February 2023 Security Releases blog post.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-02-19 15:07:45 +09:00
Alexandru Ardelean e7e30dfc8d django: bump to version 3.2.18
Fixes:
  https://nvd.nist.gov/vuln/detail/CVE-2023-23969

Signed-off-by: Alexandru Ardelean <alex@shruggie.ro>
2023-02-17 19:27:10 +02:00
Michael Heimpold e6b36ce4a3
Merge pull request #20270 from mhei/21.02-php8-update-8.0.27
[21.02] php8: update to 8.0.27
2023-01-22 23:51:56 +01:00
Tianling Shen 53570cfead golang: Update to 1.18.10
go1.18.10 (released 2023-01-10) includes fixes to cgo, the compiler,
the linker, and the crypto/x509, net/http, and syscall packages.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-01-14 15:02:49 +08:00
Michael Heimpold 0c7dc100de php8: update to 8.0.27
This fixes:
    - CVE-2022-31631

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-01-11 22:14:59 +01:00
Hirokazu MORIKAWA f01f54e34e node: bump to v14.21.2
Notable changes
* CVE-2022-43548: DNS rebinding in --inspect via invalid octal IP address (Medium)
* OpenSSL 1.1.1s
* Root certificates updated to NSS 3.85
* Time zone update to 2022f

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-12-25 08:03:22 +08:00
Josef Schlehofer 53e4788542
python3: update to version 3.9.16
Release notes:
https://www.python.org/downloads/release/python-3916/

Fixes:
CVE-2022-43680
CVE-2022-37454
CVE-2022-45061
CVE-2022-42919
CVE-2015-20107

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-12-21 00:03:19 +01:00
Luiz Angelo Daros de Luca 373e06019f ruby: update to 3.0.5
This release includes a security fix.

- CVE-2021-33621: HTTP response splitting in CGI

For more details:
- https://www.ruby-lang.org/en/news/2022/11/24/ruby-3-0-5-released/

Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
2022-12-12 23:31:58 +01:00
Tianling Shen 622c060f04
golang: Update to 1.18.9
go1.18.9 (released 2022-12-06) includes security fixes to the net/http
and os packages, as well as bug fixes to cgo, the compiler, the runtime,
and the crypto/x509 and os/exec packages.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-08 01:40:26 +08:00
Alexandru Ardelean 1c73006889 django: reset PKG_RELEASE to 1
Omitted during review.

Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-12-07 10:01:51 +02:00
Peter Stadler 70e59ae9c4 django: bump version 3.2.16
fix CVE-2022-41323

Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
2022-12-06 22:55:38 +01:00
Michael Heimpold e83faecb25
Merge pull request #19914 from mhei/21.02-php8-update-8.0.25
[21.02] php8: update to 8.0.25
2022-11-17 08:07:47 +01:00
Michael Heimpold 6e6c444638 php7: update to 7.4.33
This fixes:
    - CVE-2022-31630
    - CVE-2022-37454

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-11-16 15:31:56 +01:00
Michael Heimpold 223d461275 php8: update to 8.0.25
This fixes:
    - CVE-2022-31630
    - CVE-2022-37454

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-11-16 15:30:09 +01:00
Josef Schlehofer 90b2aa9371
golang: update to version 1.18.8
Fixes following CVEs:
- CVE-2022-32189 (version 1.18.5 [1]]
- CVE-2022-27664 (version 1.18.6 [2])
- CVE-2022-32190 (version 1.18.6 [2])
- CVE-2022-2879 (version 1.18.7 [3])
- CVE-2022-2880 (version 1.18.7 [3])
- CVE-2022-41715 (version 1.18.7 [3])
- CVE-2022-41716 (version 1.18.8 [4])

and refreshed patch

[1] https://groups.google.com/g/golang-announce/c/YqYYG87xB10
[2] https://groups.google.com/g/golang-announce/c/x49AQzIVX-s
[3] https://groups.google.com/g/golang-announce/c/xtuG5faxtaU
[4] https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit c33c2d8869)
2022-11-10 09:16:14 +01:00
Jeffery To aeeb0d7515
golang: Update to 1.18.4
Includes fixes for:

* CVE-2022-1705: net/http: improper sanitization of Transfer-Encoding
  header
* CVE-2022-1962: go/parser: stack exhaustion in all Parse* functions
* CVE-2022-28131: encoding/xml: stack exhaustion in Decoder.Skip
* CVE-2022-30630: io/fs: stack exhaustion in Glob
* CVE-2022-30631: compress/gzip: stack exhaustion in Reader.Read
* CVE-2022-30632: path/filepath: stack exhaustion in Glob
* CVE-2022-30633: encoding/xml: stack exhaustion in Unmarshal
* CVE-2022-30635: encoding/gob: stack exhaustion in Decoder.Decode
* CVE-2022-32148: net/http/httputil: NewSingleHostReverseProxy - omit
  X-Forwarded-For not working

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 60168651a2)
2022-11-09 14:46:06 +01:00
Jeffery To 2e6b8f0165
golang: Update to 1.18.3
Includes fix for CVE-2022-30634 (crypto/rand: Read hangs when passed
buffer larger than 1<<32 - 1).

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 112cf09031)
2022-11-09 14:46:02 +01:00
Jeffery To d53bb3ccc5
golang: Update to 1.18.2
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 659f87d5d4)
2022-11-09 14:45:58 +01:00
Jeffery To a084693cf1
golang: Update to 1.18.1
Includes fixes for:
* CVE-2022-24675 - encoding/pem: stack overflow
* CVE-2022-28327 - crypto/elliptic: generic P-256 panic when scalar has
  too many leading zeroes

This also adds -buildvcs=false to omit VCS information in Go programs.

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 8c0477a895)
2022-11-09 14:45:54 +01:00
Jeffery To 2c9cc2c9fb
golang: Update to 1.18, update patch
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 478666b00b)
2022-11-09 14:45:44 +01:00
Josef Schlehofer 6f98c3dba8 golang: update to version 1.17.13
Fixes:
CVE-2022-32189

Release notes:
https://groups.google.com/g/golang-announce/c/YqYYG87xB10?pli=1

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-11-09 14:31:49 +01:00
Josef Schlehofer f00b449d17 python3: update to version 3.9.15
Release notes:
- https://www.python.org/downloads/release/python-3915/

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-10-21 15:34:02 -07:00
Daniel Golle d80638646f
perl-net-dns: update to version 1.35
**** 1.35 Oct 4, 2022

    Improve SVCB error reporting.

Fix rt.cpan.org #144328
    accept_reply test fails with matched consecutive "random"
    generated packet->id

Fix rt.cpan.org #144299
    Spelling errors.

**** 1.34 May 30, 2022

    Improve robustness of EDNS option compose/decompose functions.
    Simplify code in Makefile.PL.

Fix rt.cpan.org #142426
    Avoid "Useless use of a constant in void context" warning.

**** 1.33 Dec 16, 2021
Fix rt.cpan.org #137768
    Test t/05-SVCB.t on Perl 5.18.0 fails with deep recursion.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 93a7806578)
(cherry picked from commit b9338331be)
2022-10-13 20:41:16 +01:00
Michal Vasilek ed66ae5f08 python3: update to 3.9.14
* fixes CVE-2021-28861
* refresh patches

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2022-10-11 17:55:28 +02:00
Hirokazu MORIKAWA 82629531b7 node: bump to v14.20.1
The following CVEs are fixed in this release:
* CVE-2022-32212: DNS rebinding in --inspect on macOS (High)
* CVE-2022-32213: bypass via obs-fold mechanic (Medium)
* CVE-2022-35256: HTTP Request Smuggling Due to Incorrect Parsing of Header Fields (Medium)
More detailed information on each of the vulnerabilities can be found in September 22nd 2022 Security Releases blog post.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-10-08 06:16:28 +02:00
Michael Heimpold 0b9b8e5ae6
Merge pull request #19518 from mhei/21.02-php8-update-8.0.24
[21.02] php8: update to 8.0.24
2022-10-04 17:35:32 +02:00
Michael Heimpold 0498d79d74 php8: update to 8.0.24
This fixes:
    - CVE-2022-31629
    - CVE-2022-31628

Also refresh patch to apply cleanly.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-10-04 12:33:48 +02:00
Michael Heimpold 64f2ed8fbf php7: update to 7.4.32
This fixes:
    - CVE-2022-31628
    - CVE-2022-31629

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-10-04 07:41:38 +02:00
Michal Vasilek 690d8dfab5
python-flask-socketio: update to 5.3.1
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 7fd9d010a2)
2022-09-16 14:45:45 +02:00
Josef Schlehofer df67597ab6
python-uci: update to version 0.9.0
- Release notes:
https://gitlab.nic.cz/turris/pyuci/-/tags/v0.9.0
- Update copyright while at it.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit e340fe8a12)
2022-08-26 16:56:01 +02:00
Alexandru Ardelean ec98bccb1d django: bump to version 3.2.15
Fixes: https://nvd.nist.gov/vuln/detail/CVE-2022-36359

Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-08-22 09:27:42 +03:00
Alexandru Ardelean 7b6094381a
numpy: bump to version 1.20.2
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
(cherry picked from commit 731bb0265d)
2022-08-13 12:34:45 +02:00
Josef Schlehofer da99ae7ec5
python-websockets: update to version 10.3
- Update copyright

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit ce1679a07f)
2022-08-13 07:57:10 +02:00
Šimon Bořek ec0bd2b964
luajit: patch: PPC/e500 SPE: use soft float instead of failing
makes LuaJit builds for mpc85xx targets with SPE ISA extension
enabled possible

Quoting inner commit message:

This allows building LuaJit for systems with Power ISA SPE
extension[^1] support by using soft float on LuaJit side.

While e500 CPU cores support SPE instruction set extension
allowing them to perform floating point arithmetic natively,
this isn't required. They can function with software floating
point to integer arithmetic translation as well,
just like FPU-less PowerPC CPUs without SPE support.

Therefore I see no need to prevent them from running LuaJit
explicitly.

[^1]: https://www.nxp.com/docs/en/reference-manual/SPEPEM.pdf

Signed-off-by: Pali Rohár <pali@kernel.org>
Signed-off-by: Šimon Bořek <simon.borek@nic.cz>
(cherry picked from commit a4a484fbca)
2022-08-06 19:43:34 +02:00
Alexandru Ardelean 72147f3b94
Merge pull request #18965 from commodo/django-update-21-02
[21.02] django: bump to version 3.2.14
2022-07-22 14:44:32 +03:00
Jeffery To 8a03e65655 golang: Update to 1.17.12
Includes fixes for:

* CVE-2022-1705: net/http: improper sanitization of Transfer-Encoding
  header
* CVE-2022-1962: go/parser: stack exhaustion in all Parse* functions
* CVE-2022-28131: encoding/xml: stack exhaustion in Decoder.Skip
* CVE-2022-30630: io/fs: stack exhaustion in Glob
* CVE-2022-30631: compress/gzip: stack exhaustion in Reader.Read
* CVE-2022-30632: path/filepath: stack exhaustion in Glob
* CVE-2022-30633: encoding/xml: stack exhaustion in Unmarshal
* CVE-2022-30635: encoding/gob: stack exhaustion in Decoder.Decode
* CVE-2022-32148: net/http/httputil: NewSingleHostReverseProxy - omit
  X-Forwarded-For not working

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2022-07-20 02:38:16 -07:00
Alexandru Ardelean c45f72086c django: bump to version 3.2.14
Fixes https://nvd.nist.gov/vuln/detail/CVE-2022-34265

Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-07-18 17:42:45 +03:00
Hirokazu MORIKAWA 2ac03c2372 node: July 7th 2022 Security Releases
Update to v14.20.0

Release for the following issues:
HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding (Medium)(CVE-2022-32213)
HTTP Request Smuggling - Improper Delimiting of Header Fields (Medium)(CVE-2022-32214)
HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (Medium)(CVE-2022-32215)
DNS rebinding in --inspect via invalid IP addresses (High)(CVE-2022-32212)

https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-07-10 22:38:30 +02:00