Hauke Mehrtens [Sun, 9 Jan 2022 18:45:49 +0000 (18:45 +0000)]
gpgme: Fix compile with glibc 2.34
This backports a patch from upstream gpgme to fix compilation with glibc 2.34.
It fixes the following build problem:
posix-io.c: In function '_gpgme_io_spawn':
posix-io.c:577:23: error: void value not ignored as it ought to be
577 | while ((i = closefrom (fd)) && errno == EINTR)
| ^
make[5]: *** [Makefile:947: posix-io.lo] Error 1
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
(cherry picked from commit
dafb96c14837bf133e5215cf65fc7ed1439a375a)
Daniel Golle [Thu, 6 Oct 2022 15:27:31 +0000 (16:27 +0100)]
gawk: update to version 5.2.0
For changes see ChangeLog file[1].
[1]: https://git.savannah.gnu.org/cgit/gawk.git/plain/ChangeLog?h=gawk-5.2.0
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit
cd20631bc7db1faf7b543656a265734adad0a6e2)
Daniel Golle [Thu, 25 Mar 2021 22:50:23 +0000 (22:50 +0000)]
exfatprogs: update to 1.1.3
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit
54b8e21fe7ba61fdd5fd60b6d9c211e27b7cd740)
(cherry picked from commit
97e87c471c4a8e03ff218f842ae37cbfd240cc96)
(cherry picked from commit
b1585a53756fac2dcc08b7ecec9260c29714bf5a)
(cherry picked from commit
3caf9ce16be0ce305acc289023b74c88abb16b01)
Daniel Golle [Wed, 7 Sep 2022 17:24:22 +0000 (18:24 +0100)]
exim: update to version 4.96
Exim version 4.96
-----------------
JH/01 Move the wait-for-next-tick (needed for unique message IDs) from
after reception to before a subsequent reception. This should
mean slightly faster delivery, and also confirmation of reception
to senders.
JH/02 Move from using the pcre library to pcre2. The former is no longer
being developed or supported (by the original developer).
JH/03 Constification work in the filters module required a major version
bump for the local-scan API. Specifically, the "headers_charset"
global which is visible via the API is now const and may therefore
not be modified by local-scan code.
JH/04 Fix ClamAV TCP use under FreeBSD. Previously the OS-specific shim for
sendfile() didi not account for the way the ClamAV driver code called it.
JH/05 Bug 2819: speed up command-line messages being read in. Previously a
time check was being done for every character; replace that with one
per buffer.
JH/06 Bug 2815: Fix ALPN sent by server under OpenSSL. Previously the string
sent was prefixed with a length byte.
JH/07 Change the SMTP feature name for pipelining connect to be compliant with
RFC 5321. Previously Dovecot (at least) would log errors during
submission.
JH/08 Remove stripping of the binaries from the FreeBSD build. This was added
in 4.61 without a reason logged. Binaries will be bigger, which might
matter on diskspace-constrained systems, but debug is easier.
JH/09 Fix macro-definition during "-be" expansion testing. The move to
write-protected store for macros had not accounted for these runtime
additions; fix by removing this protection for "-be" mode.
JH/10 Convert all uses of select() to poll(). FreeBSD 12.2 was found to be
handing out large-numbered file descriptors, violating the usual Unix
assumption (and required by Posix) that the lowest possible number will be
allocated by the kernel when a new one is needed. In the daemon, and any
child procesees, values higher than 1024 (being bigger than FD_SETSIZE)
are not useable for FD_SET() [and hence select()] and overwrite the stack.
Assorted crashes happen.
JH/11 Fix use of $sender_host_name in daemon process. When used in certain
main-section options or in a connect ACL, the value from the first ever
connection was never replaced for subsequent connections. Found by
Wakko Warner.
JH/12 Bug 2838: Fix for i32lp64 hard-align platforms. Found for SPARC Linux,
though only once PCRE2 was introduced: the memory accounting used under
debug offset allocations by an int, giving a hard trap in early startup.
Change to using a size_t. Debug and fix by John Paul Adrian Glaubitz.
JH/13 Bug 2845: Fix handling of tls_require_ciphers for OpenSSL when a value
with underbars is given. The write-protection of configuration introduced
in 4.95 trapped when normalisation was applied to an option not needing
expansion action.
JH/14 Bug 1895: TLS: Deprecate RFC 5114 Diffie-Hellman parameters.
JH/15 Fix a resource leak in *BSD. An off-by-one error resulted in the daemon
failing to close the certificates directory, every hour or any time it
was touched.
JH/16 Debugging initiated by an ACL control now continues through into routing
and transport processes. Previously debugging stopped any time Exim
re-execs, or for processing a queued message.
JH/17 The "expand" debug selector now gives more detail, specifically on the
result of expansion operators and items.
JH/18 Bug 2751: Fix include_directory in redirect routers. Previously a
bad comparison between the option value and the name of the file to
be included was done, and a mismatch was wrongly identified.
4.88 to 4.95 are affected.
JH/19 Support for Berkeley DB versions 1 and 2 is withdrawn.
JH/20 When built with NDBM for hints DB's check for nonexistence of a name
supplied as the db file-pair basename. Previously, if a directory
path was given, for example via the autoreply "once" option, the DB
file.pag and file.dir files would be created in that directory's
parent.
JH/21 Remove the "allow_insecure_tainted_data" main config option and the
"taint" log_selector. These were previously deprecated.
JH/22 Fix static address-list lookups to properly return the matched item.
Previously only the domain part was returned.
JH/23 Bug 2864: FreeBSD: fix transport hang after 4xx/5xx response. Previously
the call into OpenSSL to send a TLS Close was being repeated; this
resulted in the library waiting for the peer's Close. If that was never
sent we waited forever. Fix by tracking send calls.
JH/24 The ${run} expansion item now expands its command string elements after
splitting. Previously it was before; the new ordering makes handling
zero-length arguments simpler. The old ordering can be obtained by
appending a new option "preexpand", after a comma, to the "run".
JH/25 Taint-check exec arguments for transport-initiated external processes.
Previously, tainted values could be used. This affects "pipe", "lmtp" and
"queryprogram" transport, transport-filter, and ETRN commands.
The ${run} expansion is also affected: in "preexpand" mode no part of
the command line may be tainted, in default mode the executable name
may not be tainted.
JH/26 Fix CHUNKING on a continued-transport. Previously the usabliility of
the the facility was not passed across execs, and only the first message
passed over a connection could use BDAT; any further ones using DATA.
JH/27 Support the PIPECONNECT facility in the smtp transport when the helo_data
uses $sending_ip_address and an interface is specified.
Previously any use of the local address in the EHLO name disabled
PIPECONNECT, the common case being to use the rDNS of it.
JH/28 OpenSSL: fix transport-required OCSP stapling verification under session
resumption. Previously verify failed because no certificate status is
passed on the wire for the restarted session. Fix by using the recorded
ocsp status of the stored session for the new connection.
JH/29 TLS resumption: the key for session lookup in the client now includes
more info that a server could potentially use in configuring a TLS
session, avoiding oferring mismatching sessions to such a server.
Previously only the server IP was used.
JH/30 Fix string_copyn() for limit greater than actual string length.
Previously the copied amount was the limit, which could result in a
overlapping memcpy for newly allocated destination soon after a
source string shorter than the limit. Found/investigated by KM.
JH/31 Bug 2886: GnuTLS: Do not free the cached creds on transport connection
close; it may be needed for a subsequent connection. This caused a
SEGV on primary-MX defer. Found/investigated by Gedalya & Andreas.
JH/32 Fix CHUNKING for a second message on a connection when the first was
rejected. Previously we did not reset the chunking-offered state, and
erroneously rejected the BDAT command. Investigation help from
Jesse Hathaway.
JH/33 Fis ${srs_encode ...} to handle an empty sender address, now returning
an empty address. Previously the expansion returned an error.
HS/01 Bug 2855: Handle a v4mapped sender address given us by a frontending
proxy. Previously these were misparsed, leading to paniclog entries.
Also contains commit
51be321b27 "Fix PAM auth. Bug 2813" addressing
CVE-2022-37451.
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit
f2763b95afc57b88dc9d494b3fbf3841ba38a314)
Daniel Golle [Wed, 7 Sep 2022 17:39:46 +0000 (18:39 +0100)]
cryptsetup: update to version 2.5.0
Update to new major release of cryptsetup. For details, please see
the release notes[1].
[1]: https://cdn.kernel.org/pub/linux/utils/cryptsetup/v2.5/v2.5.0-ReleaseNotes
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit
80439f802cc61e826277851aaeb30ba7a221195c)
Daniel Golle [Sat, 23 Jul 2022 08:37:28 +0000 (09:37 +0100)]
cryptsetup: fix library paths by calling autoreconf
Use PKG_FIXUP:=autoreconf when building cryptsetup to prevent
accidental linkage against host libraries.
Fixes: #19011
Reported-by: @dreirund
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit
ad0ac5198decbc15c57801509a3005c1608ecbce)
Daniel Golle [Fri, 18 Mar 2022 18:40:15 +0000 (18:40 +0000)]
ccid: update to version 1.5.0
1.5.0 - 27 January 2022, Ludovic Rousseau
- Add support of
- ACS ACR1281U
- Circle CCR7125 ICC
- Circle CIR125 ICC
- Circle CIR125-DOT ICC
- Circle CIR215 CL with iProduct 0x2100
- Circle CIR315 DI
- Circle CIR315 with idProduct: 0x0324
- Circle CIR315 with idProduct: 0x7004
- Circle CIR415 CL
- Circle CIR515 ICC
- Circle CIR615 CL
- Circle CIR615 CL & 1S
- ELYCTIS CL reader
- Nitrokey Nitrokey 3
- Thales Shield M4 Reader
- Add support of simultaneous slot access on multi slots readers
- Use FeliCa instead of Felica on SONY request
- Fix SafeNet eToken 5110 SC issue
- Allow vendor control commands for Omnikey 5427 CK
- always compute readTimeout to use a value greater than default 3 seconds
- Check the bSeq value when receiving a CCID frame
- Avoid logging errors when a reader is removed
- Some other minor improvements
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit
0dd218a2fb4a569ad61324ad6d57336453e1ef96)
Daniel Golle [Mon, 21 Mar 2022 10:53:25 +0000 (10:53 +0000)]
auc: update to 0.3.1
Sync auc with main branch.
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit
6c9ab0e426466ca3bb18a76f2f6b4645015a31e0)
(cherry picked from commit
f1969ab5849095dbfe85f34e9415988357ed53bf)
(cherry picked from commit
36525086ce468ba5f062f41be231be9f43d9488f)
(cherry picked from commit
fd36c91db869544df882de6812cf57dd5056c976)
Michal Vasilek [Mon, 10 Oct 2022 13:18:24 +0000 (15:18 +0200)]
python3: update to 3.9.14
* fixes CVE-2021-28861
* refresh patches
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
Stan Grishin [Mon, 10 Oct 2022 15:20:16 +0000 (08:20 -0700)]
Merge pull request #19581 from stangri/openwrt-21.02-curl
[21.02] curl: error out if wolfSSL is not usable
Petr Štetiar [Mon, 10 Oct 2022 08:47:55 +0000 (10:47 +0200)]
curl: error out if wolfSSL is not usable
When we explicitly declare, that we would like to have curl built with
wolfSSL support using `--with-wolfssl` configure option, then we should
make sure, that we either endup with curl having that support, or it
shouldn't be available at all, otherwise we risk, that we end up with
regressions like following:
configure:25299: checking for wolfSSL_Init in -lwolfssl
configure:25321: x86_64-openwrt-linux-musl-gcc -o conftest [snip]
In file included from target-x86_64_musl/usr/include/wolfssl/wolfcrypt/dsa.h:33,
from target-x86_64_musl/usr/include/wolfssl/wolfcrypt/asn_public.h:35,
from target-x86_64_musl/usr/include/wolfssl/ssl.h:35,
from conftest.c:47:
target-x86_64_musl/usr/include/wolfssl/wolfcrypt/integer.h:37:14: fatal error: wolfssl/wolfcrypt/sp_int.h: No such file or directory
#include <wolfssl/wolfcrypt/sp_int.h>
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
compilation terminated.
and in the end thus produce curl without https support:
curl: (1) Protocol "https" not supported or disabled in libcurl
So fix it, by making the working wolfSSL mandatory and error out in
configure step when that's not the case:
checking for wolfSSL_Init in -lwolfssl... no
configure: error: --with-wolfssl but wolfSSL was not found or doesn't work
References: #19005, #19547
Upstream-Status: Accepted [https://github.com/curl/curl/pull/9682]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit
9140f366ef91c6eeb04ca39347c40deecaf56419)
Josef Schlehofer [Sun, 9 Oct 2022 19:37:09 +0000 (21:37 +0200)]
Merge pull request #19569 from
1715173329/y2
[openwrt-21.02] yq: Update to 4.28.1
Tianling Shen [Sat, 8 Oct 2022 06:25:38 +0000 (14:25 +0800)]
yq: Update to 4.28.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit
40f0e263bf63068ff8c4e1adeaf4e807498d95f5)
Hirokazu MORIKAWA [Fri, 7 Oct 2022 07:18:29 +0000 (16:18 +0900)]
node: bump to v14.20.1
The following CVEs are fixed in this release:
* CVE-2022-32212: DNS rebinding in --inspect on macOS (High)
* CVE-2022-32213: bypass via obs-fold mechanic (Medium)
* CVE-2022-35256: HTTP Request Smuggling Due to Incorrect Parsing of Header Fields (Medium)
More detailed information on each of the vulnerabilities can be found in September 22nd 2022 Security Releases blog post.
Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
Stan Grishin [Sat, 8 Oct 2022 00:33:43 +0000 (17:33 -0700)]
Merge pull request #19548 from ynezz/ynezz/openwrt-21.02-fix-broken-libcurl
[21.02] fix broken libcurl by backporting curl: fix compilation with wolfSSL
Rosen Penev [Wed, 20 Jul 2022 02:24:19 +0000 (19:24 -0700)]
curl: fix compilation with wolfSSL
options.h header is needed after bump of libwolfssl to version 5.5.1,
otherwise libcurl autodetection for libwolfssl availability fails and
libcurl is then compiled without https support.
Fixes: #19547
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit
317575755a83fe21888439f1fd9adccca9e0f36e)
(cherry picked from commit
ef545e0317e06cb388eec33c9dc4292f09473fdb)
Signed-off-by: Petr Štetiar <ynezz@true.cz> [commit verbosity]
Petr Štetiar [Thu, 6 Oct 2022 11:34:38 +0000 (13:34 +0200)]
Merge pull request #19536 from ynezz/ynezz/openwrt-21.02-wolfssl-CVE-2022-39173
[21.02] treewide: fix security issues by bumping all packages using libwolfssl
Eneas U de Queiroz [Wed, 14 Sep 2022 21:32:47 +0000 (18:32 -0300)]
libgd: avoid recursive and redundant dependencies
Change the CONFLICTS line from the libgd-full to libgd to fix a
recursive dependency.
While at it, remove the redundant +LIBGD_TIFF:libtiff
+LIBGD_FREETYPE:libfreetype dependencies from Package/libgd/default.
Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit
085eb34fbf7c7aaa20da35ebe2f493601c5f19b2)
Nick Hainke [Sat, 24 Sep 2022 15:59:40 +0000 (17:59 +0200)]
tor: update to 0.4.7.10
Release Notes:
https://forum.torproject.net/t/urgent-stable-release-0-4-5-14-0-4-6-12-and-0-4-7-10
Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit
b9cf0cdce6ee56778a0b7ecd3d5ed520b3e2dbac)
[fix commit title]
Signed-off-by: Nick Hainke <vincent@systemli.org>
Petr Štetiar [Mon, 3 Oct 2022 17:03:15 +0000 (19:03 +0200)]
treewide: fix security issues by bumping all packages using libwolfssl
As wolfSSL is having hard time maintaining ABI compatibility between
releases, we need to manually force rebuild of packages depending on
libwolfssl and thus force their upgrade. Otherwise due to the ABI
handling we would endup with possibly two libwolfssl libraries in the
system, including the patched libwolfssl-5.5.1, but still have
vulnerable services running using the vulnerable libwolfssl-5.4.0.
So in order to propagate update of libwolfssl to latest stable release
done in commit
ec8fb542ec3e4 ("wolfssl: fix TLSv1.3 RCE in uhttpd by
using 5.5.1-stable (CVE-2022-39173)") which fixes several remotely
exploitable vulnerabilities, we need to bump PKG_RELEASE of all packages
using wolfSSL library.
Same bump has been done in buildroot in commit
f1b7e1434f66 ("treewide:
fix security issues by bumping all packages using libwolfssl").
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit
845d81ca0976c82829addc23e9e8b95885c910ee)
(cherry picked from commit
f624e41f38e82e3b2df83e309e7bb00b68ad0091)
Michael Heimpold [Tue, 4 Oct 2022 15:35:32 +0000 (17:35 +0200)]
Merge pull request #19518 from mhei/21.02-php8-update-8.0.24
[21.02] php8: update to 8.0.24
Michael Heimpold [Tue, 4 Oct 2022 15:35:16 +0000 (17:35 +0200)]
Merge pull request #19517 from mhei/21.02-php7-update-7.4.32
[21.02] php7: update to 7.4.32
Michael Heimpold [Tue, 4 Oct 2022 05:45:10 +0000 (07:45 +0200)]
php8: update to 8.0.24
This fixes:
- CVE-2022-31629
- CVE-2022-31628
Also refresh patch to apply cleanly.
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
Michael Heimpold [Tue, 4 Oct 2022 05:41:38 +0000 (07:41 +0200)]
php7: update to 7.4.32
This fixes:
- CVE-2022-31628
- CVE-2022-31629
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
Karl Palsson [Fri, 23 Sep 2022 12:01:25 +0000 (12:01 +0000)]
libs/cjson: bump to 1.7.15
This is a bugfix release.
Full release notes available at: https://github.com/DaveGamble/cJSON/releases/tag/v1.7.15
Signed-off-by: Karl Palsson <karlp@etactica.com>
Karl Palsson [Mon, 19 Sep 2022 11:45:13 +0000 (11:45 +0000)]
mosquitto: bump to 2.0.15
Changelog: https://mosquitto.org/blog/2022/08/version-2-0-15-released/
Changelog: https://mosquitto.org/blog/2021/11/version-2-0-14-released/
2.0.15 is bigger security and bugfix release. 2.0.14 had a couple of
minor changes and was skipped for OpenWrt.
Signed-off-by: Karl Palsson <karlp@etactica.com>
Ptilopsis Leucotis [Sun, 15 May 2022 04:02:40 +0000 (07:02 +0300)]
mosquitto: add missing 'persistence' section in config
Section 'Persistence' in 'luci-app-mosquitto' is unusable without 'persistence'
section in config file.
Signed-off-by: Ptilopsis Leucotis <PtilopsisLeucotis@yandex.com>
Noah Meyerhans [Wed, 21 Sep 2022 18:57:50 +0000 (11:57 -0700)]
bind: bump to 9.18.7
Fixes multiple security issues:
CVE-2022-38178 - Fix memory leak in EdDSA verify processing
CVE-2022-3080 - Fix serve-stale crash that could happen when
stale-answer-client-timeout was set to 0 and there was
a stale CNAME in the cache for an incoming query
CVE-2022-2906 - Fix memory leaks in the DH code when using OpenSSL 3.0.0
and later versions. The openssldh_compare(),
openssldh_paramcompare(), and openssldh_todns()
functions were affected
CVE-2022-2881 - When an HTTP connection was reused to get
statistics from the stats channel, and zlib
compression was in use, each successive
response sent larger and larger blocks of memory,
potentially reading past the end of the allocated
buffer
CVE-2022-2795 - Prevent excessive resource use while processing large
delegations
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit
58bcd3fad37eaf56d4dbeecc0c73abe464e7e987)
Tianling Shen [Mon, 19 Sep 2022 02:33:32 +0000 (10:33 +0800)]
yq: Update to 4.27.5
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit
fca4f1b8301917cb4eb64d0f5e9bfb4836d3d8e8)
Glenn Strauss [Sun, 18 Sep 2022 07:02:40 +0000 (03:02 -0400)]
lighttpd: update to lighttpd 1.4.67 release hash
* update to lighttpd 1.4.67 release hash
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
(cherry picked from commit
f750089d26422557280ddfda1788f2491d15f701)
Glenn Strauss [Mon, 8 Aug 2022 06:04:22 +0000 (02:04 -0400)]
lighttpd: update to lighttpd 1.4.66 release hash
* update to lighttpd 1.4.66 release hash
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
(cherry picked from commit
5eaf000c837612df72c9207e225a2911a190f86f)
Michal Vasilek [Thu, 22 Sep 2022 17:47:41 +0000 (19:47 +0200)]
knot-resolver: update to 5.5.3
* fixes CVE-2022-40188
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit
5d2fd886930a95d14df02ca8fbaf6f3814df3c01)
Tianling Shen [Sat, 3 Sep 2022 09:34:58 +0000 (17:34 +0800)]
libtorrent-rasterbar: Update to 2.0.7
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit
c741bf64cdac2ac1059c0e545e1afd842820c8c1)
Josef Schlehofer [Wed, 21 Sep 2022 07:38:56 +0000 (09:38 +0200)]
Merge pull request #19408 from paper42/knot-3.2.1-21
[21.02] knot: update to version 3.2.1
Jan Hák [Tue, 13 Sep 2022 12:46:11 +0000 (14:46 +0200)]
knot: update to version 3.2.1
Signed-off-by: Jan Hák <jan.hak@nic.cz>
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit
023df0992a8b3fff97eb9dd8c36708114ac0f1a7)
Michal Vasilek [Fri, 16 Sep 2022 10:48:19 +0000 (12:48 +0200)]
python-flask-socketio: update to 5.3.1
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit
7fd9d010a29173705241e2ade2172a28429234ca)
Rafał Miłecki [Wed, 10 Aug 2022 12:23:44 +0000 (14:23 +0200)]
ksmbd-tools: add package with hotplug.d script for auto sharing
One of common use cases for SMB3 server in routers is sharing hotplugged
drives. Users make many attempts setting that up which often are not
optimal.
This script handles it in the cleanest way by using:
1. hotplug.d mount subsystem
2. runtime config in the /var/run/config/
It provides a working basic solution that can be later adjusted by
modifying provided hotplug script.
A pretty much idential solution was part of the samba36 package. It was
added in the OpenWrt commit
ef1efa756e0d0 ("samba36: add package with
hotplug.d script for auto sharing") as an answer for feature required by
the Rosinson company.
Cc: Jo-Philipp Wich <jo@mein.io>
Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
(cherry picked from commit
d0406d4c956e92f979802640832180eedd1a6efe)
Rafał Miłecki [Wed, 10 Aug 2022 12:23:40 +0000 (14:23 +0200)]
ksmbd-tools: append config from /var/run/config/ for runtime shares
Dynamically created shares shouldn't be stored in the /etc/config/
because of:
1. Flash wearing
2. Risk of inconsistent state on reboots
With this change all automation/hotplug.d scripts can store runtime in
the /var/run/config/samba. It's useful e.g. for USB drives that user
wants to be automatically shared.
Also: automated scripts should never call "uci [foo] commit" as that
could flush incomplete config. This problem also gets solved.
Identical feature was added to samba36 in the OpenWrt commit
5a59e2c059866 ("samba36: append config from /var/run/config/ for runtime
shares") but wasn't ported to ksmbd until now.
Cc: Jo-Philipp Wich <jo@mein.io>
Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
(cherry picked from commit
c9cba619898d7bf87fc8277e57b473923d912c32)
Josef Schlehofer [Wed, 7 Sep 2022 10:00:59 +0000 (12:00 +0200)]
syslog-ng: update to version 3.38.1
- Release notes:
https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-3.38.1
- Update the configuration file to use version 4.0 as mentioned in the
release notes to try the latest changes
Fixes: CVE-2022-38725
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit
34b7af9e0859418bb85e7d3ca131101dd912ae53)
Tianling Shen [Tue, 30 Aug 2022 06:48:07 +0000 (14:48 +0800)]
yq: Update to 4.27.3
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit
90a76f6467c85157fabf1b614958f873b2169690)
Josef Schlehofer [Tue, 30 Aug 2022 14:17:20 +0000 (16:17 +0200)]
Merge pull request #19219 from ErwanMAS/backport_modifications_master
tinc: backport from master modifications
Erwan MAS [Sat, 5 Mar 2022 21:00:21 +0000 (16:00 -0500)]
tinc: add creation of hosts directory for each network configuration
Signed-off-by: Erwan MAS <erwan@mas.nom.fr>
(cherry picked from commit
fb99d50c1edd4be765bef6d55bee26bfb90576b6)
Etienne Champetier [Thu, 12 Aug 2021 20:41:05 +0000 (16:41 -0400)]
tinc: use 'uci_get_state' instead of 'uci -P /var/state get'
Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
(cherry picked from commit
440d3c04505719df09e39706e6af7c470a49d458)
Petr Štetiar [Tue, 9 Aug 2022 08:28:43 +0000 (10:28 +0200)]
syslog-ng: fix OOM issues by adding support for logrotate
With heavy system logging which goes by default into `/var/log/messages`
log file which is usually placed in tmpfs/RAM one can trigger OOM killer
fairly easily, thus killing random processes and in some cases making
system unusable.
This is likely happening due to the fact, that Linux by default uses 1/2
of available RAM for tmpfs, which might be for example an issue on low
RAM devices with ath10k wireless.
So let's fix it by adding logrotate functionality which should limit the
size of `/var/log/messages` log file to 1M by default, but could be
tweaked by config knob if needed be.
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit
660fa63faf2881d69f903a589568b72fbd4d61f5)
Josef Schlehofer [Thu, 25 Aug 2022 14:45:53 +0000 (16:45 +0200)]
python-uci: update to version 0.9.0
- Release notes:
https://gitlab.nic.cz/turris/pyuci/-/tags/v0.9.0
- Update copyright while at it.
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit
e340fe8a124d1dcda2768ce3dfbcbaaf30fac44e)
Alexandru Ardelean [Wed, 24 Aug 2022 09:27:40 +0000 (12:27 +0300)]
Merge pull request #19223 from commodo/django-21.02
[21.02] django: bump to version 3.2.15
Josef Schlehofer [Mon, 22 Aug 2022 12:58:19 +0000 (14:58 +0200)]
libgd: add conflicts to each other
The full variant should conflict with the default variant. This prevents that
libgd and libgd-full could be installed side by side, and also, the full
variant should provide the libgd. Otherwise, if you install libgd-full,
you can not install vnstat.
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit
42b36b7180a1859502d72a42dcd6e9ef80519c55)
Karel Kočí [Mon, 22 Aug 2022 12:31:21 +0000 (14:31 +0200)]
vim: variants conflict with each other
This adds conflicts between the variants,
because they provide the same files, and it should not be
possible to install them side by side. Otherwise, it might happen that
half files would be from one variant and the other half from the
other.
Also, adds provides as if you request to install ``vim`` and
``vim-full``, then the request could be satisfied even they collide,
because ``vim-full`` provides ``vim`` package.
Signed-off-by: Karel Kočí <cynerd@email.cz>
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
[add commit message]
(cherry picked from commit
46c058468aeaf7747c2e94e579020aa7f595c649)
Josef Schlehofer [Sun, 21 Aug 2022 08:44:33 +0000 (10:44 +0200)]
pciutils: backport patch to fix compilation with older binutils
While building pciutils 3.8.0 for OpenWrt 21.02 includes target
mvebu/cortex-a9, mvebu/cortex-a53 and powerpc/8540, it fails because of
this error:
-I<turris1x/ws/build/staging_dir/toolchain-powerpc_8548_gcc-8.4.0_musl/include> -c -o filter.o filter.c
{standard input}: Assembler messages:
{standard input}:6: Error: multiple versions [`pci_filter_init@@LIBPCI_3.8'|`pci_filter_init@LIBPCI_3.3'] for symbol `pci_filter_init_v38'
{standard input}:8: Error: multiple versions [`pci_filter_parse_slot@@LIBPCI_3.8'|`pci_filter_parse_slot@LIBPCI_3.3'] for symbol `pci_filter_parse_slot_v38'
{standard input}:10: Error: multiple versions [`pci_filter_parse_id@@LIBPCI_3.8'|`pci_filter_parse_id@LIBPCI_3.3'] for symbol `pci_filter_parse_id_v38'
{standard input}:12: Error: multiple versions [`pci_filter_match@@LIBPCI_3.8'|`pci_filter_match@LIBPCI_3.3'] for symbol `pci_filter_match_v38'
make[4]: *** [<builtin>: filter.o] Error 1
make[4]: Leaving directory '<turris1x/ws/build/build_dir/target-powerpc_8548_musl/pciutils-3.8.0/lib'>
make[3]: *** [Makefile:70: lib/libpci.so.3.8.0] Error 2
make[3]: Leaving directory '<turris1x/ws/build/build_dir/target-powerpc_8548_musl/pciutils-3.8.0'>
make[2]: *** [Makefile:88: <turris1x/ws/build/build_dir/target-powerpc_8548_musl/pciutils-3.8.0/.built]> Error 2
make[2]: Leaving directory '<turris1x/ws/build/feeds/packages/utils/pciutils'>
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit
f08dadd517e4ecd5c15d4016dd6261d9fee3d41b)
Jan Hák [Mon, 22 Aug 2022 08:51:40 +0000 (10:51 +0200)]
liburcu: update to version 0.13.2
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit
754ba8920b1d5a61250897e146d1ad50778a7567)
Jan Hák [Mon, 22 Aug 2022 08:56:18 +0000 (10:56 +0200)]
knot: update to version 3.2.0
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit
74e2bfdd27bbf3625498ede40e357c8d409fbe91)
Alexandru Ardelean [Mon, 22 Aug 2022 06:27:39 +0000 (09:27 +0300)]
django: bump to version 3.2.15
Fixes: https://nvd.nist.gov/vuln/detail/CVE-2022-36359
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
Paul Spooren [Fri, 5 Mar 2021 09:16:00 +0000 (23:16 -1000)]
CI: checkout HEAD commit rather than merge commit
GitHub CI actions/checkout uses a merge commit which isn't compatible
with our formality checks. Instead checkout the pull request HEAD.
Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit
13c1f2bcda33ab8fc17ede1f43f60e0aac8b7cab)
Paul Spooren [Fri, 5 Mar 2021 02:52:35 +0000 (16:52 -1000)]
CI: migrate formal checks from CircleCI to GitHub
Run the formal checks like SoB message via the GitHub CI.
Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit
1b46af0e594858c7df17f00ee8c3a42e32a76215)
Marko Ratkaj [Wed, 30 Mar 2022 13:29:13 +0000 (15:29 +0200)]
squid: bump to 4.17
Signed-off-by: Marko Ratkaj <markoratkaj@gmail.com>
(cherry picked from commit
15132b85b76409108c441470998c79d1b8d37814)
Rosen Penev [Wed, 7 Jul 2021 03:37:25 +0000 (20:37 -0700)]
squid: update to 4.16
Fixes compilation with GCC11.
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit
ad4c04283ec55f307db5fa5931157385315cafb7)
Fabian Lipken [Tue, 16 Aug 2022 07:34:23 +0000 (09:34 +0200)]
dnscrypt-proxy2: update to version 2.1.2
Signed-off-by: Fabian Lipken <dynasticorpheus@gmail.com>
(cherry picked from commit
2c617bbe224ab2e6878e86c5cd61dbfa59440500)
Lucian Cristian [Wed, 1 Jun 2022 14:55:00 +0000 (14:55 +0000)]
pciutils: update to 3.8.0
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
(cherry picked from commit
c5ec5c70b3bcb053fea8441f028dfac0c3a18d56)
Tianling Shen [Wed, 10 Aug 2022 09:03:25 +0000 (17:03 +0800)]
rclone: Update to 1.59.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit
5c4b54de567847f05d25260d4991bfa4ebe97c6e)
Jonathan Pagel [Thu, 18 Aug 2022 05:14:35 +0000 (07:14 +0200)]
telegraf: Update to version 1.23.4
Signed-off-by: Jonathan Pagel <jonny_tischbein@systemli.org>
(cherry picked from commit
e4555e03ee86ef62cf09ce1436c865d5eb472960)
Signed-off-by: Jonathan Pagel <jonny_tischbein@systemli.org>
Jonathan Pagel [Tue, 9 Aug 2022 05:27:45 +0000 (07:27 +0200)]
telegraf: Add influxdb2 output plugin to package version small
Signed-off-by: Jonathan Pagel <jonny_tischbein@systemli.org>
(cherry picked from commit
a5e96189c3dadabb3e20d8139638bbb6da6773bf)
Signed-off-by: Jonathan Pagel <jonny_tischbein@systemli.org>
Jan Hák [Mon, 15 Aug 2022 12:50:23 +0000 (14:50 +0200)]
knot: update to 3.1.9
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit
39a08a7aaf18a7b4a4a12f46006238336bd5dba3)
Alexandru Ardelean [Mon, 29 Mar 2021 06:51:56 +0000 (09:51 +0300)]
numpy: bump to version 1.20.2
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
(cherry picked from commit
731bb0265da381b49e23fff9b1879a0a1d40f47e)
Liangbin Lian [Fri, 5 Aug 2022 08:20:32 +0000 (16:20 +0800)]
rclone: fix init script on CIDR format ipaddr
Signed-off-by: Liangbin Lian <jjm2473@gmail.com>
(cherry picked from commit
7af716f12d7aeaef48ccc3f025927808af0bf461)
Josef Schlehofer [Sat, 13 Aug 2022 08:08:32 +0000 (10:08 +0200)]
Merge pull request #19140 from BKPepe/gcc-21.02
gcc: update to allow compiling different versions
Josef Schlehofer [Fri, 12 Aug 2022 19:35:25 +0000 (21:35 +0200)]
python-websockets: update to version 10.3
- Update copyright
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit
ce1679a07fab643b85217b35f8c7857a9e3199c1)
Lucian Cristian [Tue, 18 Jan 2022 03:20:34 +0000 (05:20 +0200)]
libreswan: update to 4.6
this update also fixes a CVE
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
(cherry picked from commit
ec252c20cc635fb65f972facfcdc8756099a21dd)
Lucian Cristian [Sun, 12 Sep 2021 10:00:42 +0000 (13:00 +0300)]
libreswan: update to 4.5
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
(cherry picked from commit
b2efa063d2c244fcf4f1defb635ece6e6460a8b3)
Rosen Penev [Wed, 7 Jul 2021 03:02:49 +0000 (20:02 -0700)]
nss: update to 3.67
Switch to AUTORELEASE for simplicity.
Disable parallel compilation as there's something wrong with NSS' build
system. Reliably fails with make -j 12 on a ryzen 3600.
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit
1b9e2047007b675d8f40565f3586589f3bedc29c)
Lucian Cristian [Thu, 20 May 2021 21:06:23 +0000 (00:06 +0300)]
nss: update to 3.65
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
(cherry picked from commit
0f5eadf362ab3cbd3c89a5aa6828265bcc3bc1cd)
Jo-Philipp Wich [Wed, 10 Aug 2022 21:52:19 +0000 (23:52 +0200)]
cgi-io: update to latest Git HEAD
901b0f0 main: fix two one-byte overreads in header_value()
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
(cherry picked from commit
443c6c1c17e29466cc81f44504602d66d993bf86)
W. Michael Petullo [Wed, 18 May 2022 22:06:25 +0000 (17:06 -0500)]
gcc: update to allow compiling different versions
This is based on the toolchain GCC, and aims to share as much of its
Makefile and patches with that definition. The package requires one
additional patch:
(1) 003-dont-choke-when-building-32bit-on-64bit.patch, which fixes the
`error: size of array 'test_real_width' is negative` error that occurs
when building a 32-bit GCC on a 64-bit host. (Search the Internet for
examples of this error appearing.)
Signed-off-by: W. Michael Petullo <mike@flyn.org>
(cherry picked from commit
ceaa6e840e0b57c1b47c784997187044e3311d23)
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
[added gcc version 9.3.0, downgraded gcc to 10.2.0, removed gcc version
11.3.0 as it is now in sync with OpenWrt 21.02]
Tianling Shen [Sat, 6 Aug 2022 16:29:35 +0000 (00:29 +0800)]
yq: Update to 4.27.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit
82a45b28b736642d263038e0b596c620fa5102e7)
Eneas U de Queiroz [Thu, 23 Sep 2021 20:40:08 +0000 (17:40 -0300)]
gcc: enable parallel building
Even though PKG_BUILD_PARALLEL is set for the package, the package calls
$(MAKE) without $(PKG_JOBS), so it was always built with only one job.
Fix this by adding $(PKG_JOBS) to the $(MAKE) call, and calling make
install only after make all is finished.
Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit
1f91016ac35ee4ef007578b0d4bbe78eaeb9db67)
Dirk Neukirchen [Thu, 4 Mar 2021 17:50:02 +0000 (18:50 +0100)]
gcc: add cc symlink
fixes #14755
Signed-off-by: Dirk Neukirchen <plntyk.lede@plntyk.name>
(cherry picked from commit
55cb4d1aee0055e26f19b968beaed83a2668ee51)
Johnny Vogels [Tue, 2 Mar 2021 18:11:45 +0000 (19:11 +0100)]
Pulseaudio: update to 14.2; avahi-variant: Restore Bluez functionality
Signed-off-by: Johnny Vogels <35307256+jmv2009@users.noreply.github.com>
Pulseaudio: update to 14.2; avahi-variant: Restore Bluez functionality
Signed-off-by: Johnny Vogels <35307256+jmv2009@users.noreply.github.com>
Josef Schlehofer [Sat, 6 Aug 2022 18:03:49 +0000 (20:03 +0200)]
Merge pull request #19121 from autobakterie/libgpg-error_1-45
libgpg-error: update to 1.45
Šimon Bořek [Sat, 16 Jul 2022 16:56:32 +0000 (18:56 +0200)]
luajit: patch: PPC/e500 SPE: use soft float instead of failing
makes LuaJit builds for mpc85xx targets with SPE ISA extension
enabled possible
Quoting inner commit message:
This allows building LuaJit for systems with Power ISA SPE
extension[^1] support by using soft float on LuaJit side.
While e500 CPU cores support SPE instruction set extension
allowing them to perform floating point arithmetic natively,
this isn't required. They can function with software floating
point to integer arithmetic translation as well,
just like FPU-less PowerPC CPUs without SPE support.
Therefore I see no need to prevent them from running LuaJit
explicitly.
[^1]: https://www.nxp.com/docs/en/reference-manual/SPEPEM.pdf
Signed-off-by: Pali Rohár <pali@kernel.org>
Signed-off-by: Šimon Bořek <simon.borek@nic.cz>
(cherry picked from commit
a4a484fbca5c185456cf5ac26e6f47c03ca426e9)
W. Michael Petullo [Tue, 10 May 2022 19:49:18 +0000 (14:49 -0500)]
libgpg-error: update to 1.45
Signed-off-by: W. Michael Petullo <mike@flyn.org>
(cherry picked from commit
c4842bdd2081748dbb8d12dd8856e870f73a3108)
W. Michael Petullo [Sun, 12 Dec 2021 20:15:20 +0000 (14:15 -0600)]
libgpg-error: update to 1.43
Signed-off-by: W. Michael Petullo <mike@flyn.org>
(cherry picked from commit
d6000af907b9f517f27deef8b303e3474ee63f37)
ZiMing Mo [Thu, 28 Jul 2022 07:54:34 +0000 (15:54 +0800)]
rclone: update to 1.59.0
Release note: https://rclone.org/changelog/#v1-59-0-2022-07-09
Signed-off-by: ZiMing Mo <msylgj@immortalwrt.org>
(cherry picked from commit
05df1fe4f170342ffb0e8cbd5e1414ecf737469f)
Hannu Nyman [Tue, 2 Aug 2022 12:32:10 +0000 (15:32 +0300)]
nano: update to 6.4
Update nano editor to version 6.4.
Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit
0aed2021800de9f567f2301716287f225220e1ba)
Rosen Penev [Mon, 6 Jun 2022 02:54:57 +0000 (19:54 -0700)]
ksmbd: update to 3.4.5
Major changes are:
Add support for smbd-direct multi-desctriptor.
Add support for dkms.
Add support for key exchange.
Fix seveal bugs.
Signed-off-by: Rosen Penev <rosenp@gmail.com>
Rosen Penev [Fri, 3 Jun 2022 23:48:12 +0000 (16:48 -0700)]
ksmbd-tools: update to 3.4.5
Major changes are:
Add support for Heimdal as the Kerberos 5 implementation.
Add smbd max io size parameter.
Accept global share options.
Signed-off-by: Rosen Penev <rosenp@gmail.com>
Rosen Penev [Tue, 15 Feb 2022 02:31:34 +0000 (18:31 -0800)]
ksmbd-tools: update to 3.4.4
Signed-off-by: Rosen Penev <rosenp@gmail.com>
Fritz D. Ansel [Thu, 12 Aug 2021 05:01:30 +0000 (07:01 +0200)]
ksmbd: set stoplevel
to allow graceful stop of the daemon
Signed-off-by: Fritz D. Ansel <fdansel@yandex.ru>
(cherry picked from commit
28ed2b82c5f6f73f2e41357b39a89714959d2a82)
Jonathan Pagel [Mon, 25 Jul 2022 18:11:36 +0000 (20:11 +0200)]
telegraf: Update to version 1.23.3
Signed-off-by: Jonathan Pagel <jonny_tischbein@systemli.org>
(cherry picked from commit
281d156a35830003e3844af6f195958715731dfb)
Signed-off-by: Jonathan Pagel <jonny_tischbein@systemli.org>
Jan Hák [Fri, 29 Apr 2022 12:27:07 +0000 (14:27 +0200)]
knot: update to 3.1.8
- Release notes:
https://www.knot-dns.cz/2022-04-28-version-318.html
- Refreshed patch to avoid offset
Signed-off-by: Jan Hák <jan.hak@nic.cz>
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
[added commit message, refresh patch]
(cherry picked from commit
db12181940e0136adaa20edb8923e90166847e3a)
Gerard Ryan [Sun, 24 Jul 2022 05:31:43 +0000 (15:31 +1000)]
dockerd: Update to v20.10.17
Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
Gerard Ryan [Sun, 24 Jul 2022 05:29:28 +0000 (15:29 +1000)]
docker: Update to v20.10.17
Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
Gerard Ryan [Sun, 24 Jul 2022 05:25:00 +0000 (15:25 +1000)]
libnetwork: Update to
f6ccccb for Docker v20.10.17
Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
Gerard Ryan [Sun, 24 Jul 2022 05:17:03 +0000 (15:17 +1000)]
containerd: Update to v1.6.6 for Docker v20.10.17
Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
Gerard Ryan [Sun, 24 Jul 2022 05:10:50 +0000 (15:10 +1000)]
runc: Update to v1.1.2 for Docker v20.10.17
Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
Nick Hainke [Sun, 24 Jul 2022 10:52:26 +0000 (12:52 +0200)]
dawn: update to 2022-07-24
edca4d2 network: rework network status callbacks
Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit
28ca76d29bc0703474fd44815ceca6bd7b28efe6)
Nick Hainke [Fri, 22 Jul 2022 19:21:32 +0000 (21:21 +0200)]
dawn: update to 2022-07-22
10fb043 network: dump detail on ping pong received
Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit
1f60c232966b12b2f6e35a2705dc63883eec61c2)
Alexandru Ardelean [Fri, 22 Jul 2022 11:44:32 +0000 (14:44 +0300)]
Merge pull request #18965 from commodo/django-update-21-02
[21.02] django: bump to version 3.2.14
Nick Hainke [Thu, 21 Jul 2022 15:02:49 +0000 (17:02 +0200)]
dawn: update to 2022-07-21
bb362db datastorage: fix ap_array_unlink_entry always returns NULL
47e98ef network: ping pong keepalive for tcp connections
eba0354 network: add timeout for client connections
In the dawn config the con_timeout needs to be added:
option con_timeout '60'
Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit
204fd77bbc810e64602bbd758af4bef6c76844b1)
Jeffery To [Mon, 18 Jul 2022 12:16:34 +0000 (20:16 +0800)]
golang: Update to 1.17.12
Includes fixes for:
* CVE-2022-1705: net/http: improper sanitization of Transfer-Encoding
header
* CVE-2022-1962: go/parser: stack exhaustion in all Parse* functions
* CVE-2022-28131: encoding/xml: stack exhaustion in Decoder.Skip
* CVE-2022-30630: io/fs: stack exhaustion in Glob
* CVE-2022-30631: compress/gzip: stack exhaustion in Reader.Read
* CVE-2022-30632: path/filepath: stack exhaustion in Glob
* CVE-2022-30633: encoding/xml: stack exhaustion in Unmarshal
* CVE-2022-30635: encoding/gob: stack exhaustion in Decoder.Decode
* CVE-2022-32148: net/http/httputil: NewSingleHostReverseProxy - omit
X-Forwarded-For not working
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
Tianling Shen [Mon, 18 Jul 2022 03:42:39 +0000 (11:42 +0800)]
yq: Update to 4.26.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit
4df4b8eae7f65960ca18c364b37f089b018a8dce)
Tianling Shen [Mon, 18 Jul 2022 03:46:10 +0000 (11:46 +0800)]
xray-core: Update to 1.5.9
Updated geodata to latest version while at it.
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit
25922c6afdc344e2e402e482d3318219006451c5)