1
0
mirror of https://git.openwrt.org/feed/packages.git synced 2024-06-17 12:53:54 +02:00
Commit Graph

3834 Commits

Author SHA1 Message Date
Peter Stadler
d321db6409 django: bump version 4.1.3
fix CVE-2022-41323

Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
2022-12-08 08:35:31 +01:00
Hannu Nyman
d115eec84f
Merge pull request #19973 from julienmalik/borg
borgbackup: initial commit
2022-11-29 16:57:10 +02:00
Michael Heimpold
056051da49 php8: update to 8.1.13
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-11-28 07:43:50 +01:00
Julien Malik
2ad61a4529 borgbackup: add package for 1.2.2
Signed-off-by: Julien Malik <julien.malik@paraiso.me>
2022-11-26 15:24:05 +01:00
Julien Malik
17f58b94a7 python-pyfuse3: add package for 3.2.2
Signed-off-by: Julien Malik <julien.malik@paraiso.me>
2022-11-26 15:24:05 +01:00
Julien Malik
07e29c3782 python-trio: add package for 0.22.0
Signed-off-by: Julien Malik <julien.malik@paraiso.me>
2022-11-26 15:24:05 +01:00
Julien Malik
f35f4dace7 python-sniffio: add package for 1.3.0
Signed-off-by: Julien Malik <julien.malik@paraiso.me>
2022-11-26 15:24:04 +01:00
Julien Malik
750facea90 python-outcome: add package for 1.2.0
Signed-off-by: Julien Malik <julien.malik@paraiso.me>
2022-11-26 15:24:04 +01:00
Julien Malik
8fe1dab371 python-async-generator: add package for 1.10
Signed-off-by: Julien Malik <julien.malik@paraiso.me>
2022-11-26 15:24:04 +01:00
Julien Malik
a19f331b06 python-exceptiongroup: add package for 1.0.4
Signed-off-by: Julien Malik <julien.malik@paraiso.me>
2022-11-26 15:24:04 +01:00
Julien Malik
69655222fc python-sortedcontainers: add package for 2.4.0
Signed-off-by: Julien Malik <julien.malik@paraiso.me>
2022-11-26 15:24:03 +01:00
Tianling Shen
98e12e5860
Merge pull request #19652 from wormi4ok/lang-golang-update-1-19-2
golang: update to v1.19.2
2022-11-24 23:40:14 +08:00
Stanislav Petrashov
440dcd8d34
golang: update to v1.19.3
Signed-off-by: Stanislav Petrashov <s@petrashov.ru>
2022-11-23 22:06:14 +01:00
Michael Heimpold
59967db5f4 php8-pecl-xdebug: update to 3.1.6
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-11-16 15:43:28 +01:00
Stanislav Petrashov
0ad7a2fe18
golang: update to v1.19.2
Includes fixes for security vulnerabilities:
 * [CVE-2022-27664](https://github.com/advisories/GHSA-69cg-p879-7622) net/http: handle server errors after sending GOAWAY
 * [CVE-2022-32190](https://github.com/golang/go/issues/54385) net/url: JoinPath does not strip relative path components in all circumstances
 * [CVE-2022-2879](https://github.com/golang/go/issues/54853) archive/tar: unbounded memory consumption when reading headers
 * [CVE-2022-2880](https://github.com/golang/go/issues/54663) net/http/httputil: ReverseProxy should not forward unparseable query parameters
 * [CVE-2022-41715](https://github.com/golang/go/issues/55949) regexp/syntax: limit memory used by parsing regexps

Addresses the build failure:
* https://github.com/openwrt/packages/pull/19613

Signed-off-by: Stanislav Petrashov <s@petrashov.ru>
2022-11-14 20:23:44 +01:00
Josef Schlehofer
c33c2d8869 golang: update to version 1.18.8
Fixes following CVEs:
- CVE-2022-32189 (version 1.18.5 [1]]
- CVE-2022-27664 (version 1.18.6 [2])
- CVE-2022-32190 (version 1.18.6 [2])
- CVE-2022-2879 (version 1.18.7 [3])
- CVE-2022-2880 (version 1.18.7 [3])
- CVE-2022-41715 (version 1.18.7 [3])
- CVE-2022-41716 (version 1.18.8 [4])

and refreshed patch

[1] https://groups.google.com/g/golang-announce/c/YqYYG87xB10
[2] https://groups.google.com/g/golang-announce/c/x49AQzIVX-s
[3] https://groups.google.com/g/golang-announce/c/xtuG5faxtaU
[4] https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-11-10 09:15:41 +01:00
Stijn Tintel
b051bbcad8 luaexpat: trim trailing spaces
Found with modified Kconfiglib.

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2022-11-03 09:45:09 +01:00
Michael Heimpold
58b47869c0 php8: update to 8.1.12
This fixes:
    - CVE-2022-31630
    - CVE-2022-37454

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-11-02 07:21:20 +01:00
Alexandru Ardelean
69f5e34a65 python3-pytz: bump to version 2022.5
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-10-30 21:32:06 +01:00
Alexandru Ardelean
b8e20215a2 pillow: bump to version 9.3.0
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-10-30 21:32:06 +01:00
Hirokazu MORIKAWA
5851aa8062 node: bump to v16.18.0
Update to v16.18.0

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-10-23 18:35:47 +02:00
Eneas U de Queiroz
ec93df9f52 python-certifi: bump to 2022.9.24
This version updates the CA bundle, and needs urllib as dependency.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2022-10-21 15:10:00 -07:00
Eneas U de Queiroz
4a16e5eb8c python-docutils: bump to version 0.19
Package does not currently build because of distutil dependency.  Fix
this by updating to the latest version.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2022-10-21 15:03:31 -07:00
Alexandru Ardelean
7a6a6540b6 django-restframework: bump to version 3.14.0
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-10-11 19:16:18 +03:00
Michal Vasilek
e9ddc479f9
python3: update to 3.10.7
* fixes CVE-2021-28861
* adjust pip and setuptools versions
* refresh patches

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2022-10-10 16:59:12 +02:00
Alexandru Ardelean
a88277b101
Merge pull request #19554 from commodo/numpy
numpy: bump to version 1.23.3
2022-10-09 08:08:19 +03:00
Alexandru Ardelean
feaf88ddc5
Merge pull request #19552 from commodo/python-pytz
python3-pytz: bump to version 2022.4
2022-10-09 08:07:55 +03:00
David Bauer
193ffa68c1
Merge pull request #19529 from blocktrron/qcsuper
qcsuper: add Package w/ necessary dependencies
2022-10-08 04:00:50 +02:00
Alexandru Ardelean
5b9a66cd7c numpy: bump to version 1.23.3
Also bump Cython version to 0.29.32

And yeeeey: zip -> tar.gz

And they fixed the Intel AVX extension stuff/detection.
Which is why I deferred updating it until now.

Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-10-07 21:19:36 +03:00
Alexandru Ardelean
ad03d09c7f python3-pytz: bump to version 2022.4
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-10-07 10:34:15 +03:00
Daniel Golle
b9338331be
perl-net-dns: update to version 1.35
**** 1.35 Oct 4, 2022

    Improve SVCB error reporting.

Fix rt.cpan.org #144328
    accept_reply test fails with matched consecutive "random"
    generated packet->id

Fix rt.cpan.org #144299
    Spelling errors.

**** 1.34 May 30, 2022

    Improve robustness of EDNS option compose/decompose functions.
    Simplify code in Makefile.PL.

Fix rt.cpan.org #142426
    Avoid "Useless use of a constant in void context" warning.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2022-10-07 02:11:55 +01:00
David Bauer
e956e733c3 python-pycrate: add package
Signed-off-by: David Bauer <mail@david-bauer.net>
2022-10-06 12:16:14 +02:00
David Bauer
341b07f92e python-crcmod: add package
Signed-off-by: David Bauer <mail@david-bauer.net>
2022-10-06 12:16:14 +02:00
Alexandru Ardelean
3468dda484 django: bump to version 4.1.1
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-10-06 11:36:47 +02:00
Michael Heimpold
864db40722
Merge pull request #19534 from mhei/php8-pecl-http-update-4.2.3
php8-pecl-http: update to 4.2.3
2022-10-06 07:40:56 +02:00
Hirokazu MORIKAWA
658621bf5e node: bump to v16.17.1
The following CVEs are fixed in this release:
* CVE-2022-32212: DNS rebinding in --inspect on macOS (High)
    * Insufficient fix for macOS devices on v18.5.0
* CVE-2022-32222: Node 18 reads openssl.cnf from /home/iojs/build/ upon startup on MacOS (Medium)
* CVE-2022-32213: HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding (Medium)
    * Insufficient fix on v18.5.0
* CVE-2022-32215: HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (Medium)
    * Insufficient fix on v18.5.0
* CVE-2022-35256: HTTP Request Smuggling - Incorrect Parsing of Header Fields (Medium)
* CVE-2022-35255: Weak randomness in WebCrypto keygen
More detailed information on each of the vulnerabilities can be found in September 22nd 2022 Security Releases blog post.

llhttp updated to 6.0.10
llhttp is updated to 6.0.10 which includes fixes for the following vulnerabilities.
* HTTP Request Smuggling - CVE-2022-32213 bypass via obs-fold mechanic (Medium)(CVE-2022-32213 ): The llhttp parser in the http module does not correctly parse and validate Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
* HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (Medium)(CVE-2022-32215): The llhttp parser in the http module does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
* HTTP Request Smuggling - Incorrect Parsing of Header Fields (Medium)(CVE-35256): The llhttp parser in the http does not correctly handle header fields that are not terminated with CLRF. This can lead to HTTP Request Smuggling (HRS).

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-10-05 23:28:49 +02:00
Michael Heimpold
ccc3b06724 php8-pecl-http: update to 4.2.3
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-10-05 20:52:38 +02:00
Petr Štetiar
845d81ca09 treewide: fix security issues by bumping all packages using libwolfssl
As wolfSSL is having hard time maintaining ABI compatibility between
releases, we need to manually force rebuild of packages depending on
libwolfssl and thus force their upgrade. Otherwise due to the ABI
handling we would endup with possibly two libwolfssl libraries in the
system, including the patched libwolfssl-5.5.1, but still have
vulnerable services running using the vulnerable libwolfssl-5.4.0.

So in order to propagate update of libwolfssl to latest stable release
done in commit ec8fb542ec3e4 ("wolfssl: fix TLSv1.3 RCE in uhttpd by
using 5.5.1-stable (CVE-2022-39173)") which fixes several remotely
exploitable vulnerabilities, we need to bump PKG_RELEASE of all packages
using wolfSSL library.

Same bump has been done in buildroot in commit f1b7e1434f66 ("treewide:
fix security issues by bumping all packages using libwolfssl").

Signed-off-by: Petr Štetiar <ynezz@true.cz>
2022-10-04 00:58:29 -07:00
Michael Heimpold
cc6bf5f71e
Merge pull request #19512 from mhei/php8-update-8.1.11
php8: update to 8.1.11
2022-10-04 07:25:06 +02:00
Javier Marcet
e6cc43a7f0 python-stem: update to v1.8.1
Signed-off-by: Javier Marcet <javier@marcet.info>
2022-10-03 15:04:06 -07:00
Michael Heimpold
e0db68ef0a php8: update to 8.1.11
This fixes:
    - CVE-2022-31628
    - CVE-2022-31629

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-10-03 11:08:08 +02:00
Michael Heimpold
91462f9034 php8-pecl-sodium: drop package, replaced by php8-mod-sodium (refs #18997)
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-09-30 20:42:09 +02:00
Michael Heimpold
8b1b6caedf php8: add sodium extensions (refs #18997)
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-09-30 20:42:09 +02:00
Rosen Penev
d09844e395 python3: use tools/expat for host build
Oversight from when the expat host build was removed.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-09-28 00:58:17 -07:00
Eneas U de Queiroz
d9275521f1 lua-eco: adapt SSL choice to libwolfsslcpu-crypto
libwolfsslcpu-crypto has to be taken into consideration when selecting
the default SSL backend.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2022-09-26 09:30:25 -03:00
Karl Palsson
5a511e25ad lang: lua-penlight: update to 1.13.1
These are bugfix and feature releases.

Changes from 1.11->1.12:
https://github.com/lunarmodules/Penlight/blob/master/CHANGELOG.md#1120-2022-jan-10
Changes from 1.12->1.13:
https://github.com/lunarmodules/Penlight/blob/master/CHANGELOG.md#1130-2022-jul-22

Signed-off-by: Karl Palsson <karlp@etactica.com>
2022-09-26 09:38:00 +00:00
Michael Heimpold
61f84e17f9 php8-pecl-xdebug: add package (refs 19424)
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2022-09-24 09:50:28 +02:00
Javier Marcet
6c553c35b3 python-jsonschema: Update to 4.16.0
- Improve the base URI behavior when resolving a $ref to a resolution
 URI which is different from the resolved schema's declared $id.
 - Accessing jsonschema.draftN_format_checker is deprecated. Instead,
 if you want access to the format checker itself, it is exposed as
 jsonschema.validators.DraftNValidator.FORMAT_CHECKER on any
 jsonschema.protocols.Validator.

Signed-off-by: Javier Marcet <javier@marcet.info>
2022-09-17 12:58:04 -07:00
Javier Marcet
617efbc02e python-jsonschema: Update to 4.15.0, broken since 4.6.0
Signed-off-by: Javier Marcet <javier@marcet.info>
2022-09-17 12:58:04 -07:00
Michal Vasilek
7fd9d010a2
python-flask-socketio: update to 5.3.1
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2022-09-16 12:51:06 +02:00