Sebastian Kemper [Tue, 30 Jan 2018 14:32:47 +0000 (15:32 +0100)]
tiff: version bump to address open CVEs
- Bumps version to 4.0.9. Otherwise about two dozen packages would need
to be backported. There were no ABI/API changes between 4.0.3 and
4.0.9, so this is OK.
- Adds a patch from Jow that addresses a macro issue (already in
master/lede-17.01)
- Adds patches copied from Debian for CVE-2017-18013 and CVE-2017-9935
on top.
Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
Sebastian Kemper [Tue, 30 Jan 2018 14:28:33 +0000 (15:28 +0100)]
libxslt: revision bump to address open CVEs
- Add patches copied from Debian to address open CVEs
- Update mail address of maintainer
- Fix a typo
- Add --disable-silent-rules for verbose build output
Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
Sebastian Kemper [Tue, 30 Jan 2018 14:25:23 +0000 (15:25 +0100)]
libssh2: revision bump to fix CVE-2016-0787
- adds patch copied from Debian to address CVE
- fixes zlib detection
- changes http to https links
- updates maintainer's mail address
Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
Zoltan Herpai [Mon, 29 Jan 2018 08:20:09 +0000 (09:20 +0100)]
Merge pull request #5084 from wigyori/for-15.05-irssi
CC: net/irssi: upgrade irssi, update download URL
Zoltan Herpai [Mon, 29 Jan 2018 08:19:18 +0000 (09:19 +0100)]
Merge pull request #5102 from wigyori/for-15.05-xupnpd
CC: multimedia/xupnpd: move download source and upgrade to 2016-07-06
Zoltan Herpai [Mon, 29 Jan 2018 08:10:29 +0000 (09:10 +0100)]
Merge pull request #5151 from wigyori/for-15.05-bluez
CC: bluez: upgrade to 5.47
Marko Ratkaj [Wed, 24 Jan 2018 19:23:49 +0000 (20:23 +0100)]
Merge pull request #5114 from wigyori/for-15.05-squid
CC: squid: upgrade to 3.5.27
Zoltan Herpai [Thu, 7 Dec 2017 09:49:26 +0000 (10:49 +0100)]
Merge pull request #5233 from wigyori/for-15.05-bind
CC: bind: bump to 9.11.2
Zoltan HERPAI [Wed, 6 Dec 2017 20:23:07 +0000 (21:23 +0100)]
bind: bring back PKG_MD5SUM for CC
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
Philip Prindeville [Mon, 7 Aug 2017 18:01:56 +0000 (12:01 -0600)]
bind: version update to 9.11.2
Also refresh patches and dependencies.
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
Noah Meyerhans [Sun, 16 Jul 2017 15:53:59 +0000 (08:53 -0700)]
bind: Update to 9.10.5-P3
New upstream release includes fixes for the following security issues:
* CVE-2017-3140: With certain RPZ configurations, a response with TTL 0 could
cause named to go into an infinite query loop
* CVE-2017-3142: An error in TSIG handling could permit unauthorized zone
transfers or zone updates.
* CVE-2017-3143: An error in TSIG handling could permit unauthorized zone
transfers or zone updates.
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
Sami Olmari [Mon, 5 Jun 2017 22:47:05 +0000 (01:47 +0300)]
bind: Include dnssec-settime in bind-dnssec/tool
<net/bind>
Maintainer: @nmeyerhans
Compile tested: x86_64, OpenWRT 50107
Run tested: x86 / 64, OpenWRT 50107
Description:
Added dnssec-settime into bind-dnssec and bind-tools
Signed-off-by: Sami Olmari <sami+git@olmari.fi>
Noah Meyerhans [Thu, 11 May 2017 05:06:46 +0000 (22:06 -0700)]
bind: Update to bind-9.10.5
This change includes fixes for several security issues:
* CVE-2017-3138: rndc "" could trigger an assertion failure in named.
* CVE-2017-3137: Some chaining (i.e., type CNAME or DNAME) responses to
upstream queries could trigger assertion failures.
* CVE-2017-3136: dns64 with break-dnssec yes; can result in an assertion
failure.
* CVE-2017-3135: If a server is configured with a response policy zone
(RPZ) that rewrites an answer with local data, and is also configured
for DNS64 address mapping, a NULL pointer can be read triggering a
server crash.
* CVE-2016-9444: named could mishandle authority sections with missing
RRSIGs, triggering an assertion failure.
* CVE-2016-9131: named mishandled some responses where covering RRSIG
records were returned without the requested data, resulting in an
assertion failure.
* CVE-2016-9131: named incorrectly tried to cache TKEY records which could
trigger an assertion failure when there was a class mismatch.
* CVE-2016-8864: It was possible to trigger assertions when processing
responses containing answers of type DNAME.
* CVE-2016-6170: Added the ability to specify the maximum number of
records permitted in a zone (max-records #;). This provides a mechanism
to block overly large zone transfers, which is a potential risk with
slave zones from other parties.
* CVE-2016-2776: It was possible to trigger an assertion when rendering a
message using a specially crafted request.
* CVE-2016-2775: Calling getrrsetbyname() with a non absolute name could
trigger an infinite recursion bug in lwresd or named with lwres
configured if, when combined with a search list entry from resolv.conf,
the resulting name is too long.
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
Noah Meyerhans [Thu, 12 Jan 2017 06:01:53 +0000 (22:01 -0800)]
bind: update to bind-9.10.4-P5
This change fixes multiple denial-of-service vulnerabilities:
* CVE-2016-9131: A malformed response to an ANY query can cause an
assertion failure during recursion
* CVE-2016-9147: An error handling a query response containing
inconsistent DNSSEC information could cause an assertion failure
* CVE-2016-9444: An unusually-formed DS record response could cause
an assertion failure
* CVE-2016-9778: An error handling certain queries using the
nxdomain-redirect feature could cause a REQUIRE assertion failure
in db.c
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
Stijn Tintel [Tue, 29 Nov 2016 11:26:05 +0000 (12:26 +0100)]
bind: disable libjson support
If libjson-c is detected during bind-libs configure phase, bind-libs
will be built with libjson support. This results in a missing dependency
error during install phase. Solve this by disabling libjson support.
Noah Meyerhans [Thu, 17 Nov 2016 14:19:55 +0000 (06:19 -0800)]
bind: set sysconfdir to /etc/bind
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
Zoltan Herpai [Sat, 18 Nov 2017 20:18:41 +0000 (21:18 +0100)]
Merge pull request #5081 from wigyori/for-15.05-mxml3
CC: upgrade mxml, update download URL
Zoltan Herpai [Sat, 18 Nov 2017 20:14:31 +0000 (21:14 +0100)]
Merge pull request #5103 from wigyori/for-15.05-wifidog
CC: wifidog: upgrade to 1.3.0 to fix build
Hirokazu MORIKAWA [Fri, 22 Sep 2017 06:51:37 +0000 (15:51 +0900)]
bluez: bump to 5.47 fix CVE-2017-
1000250
http://www.bluez.org/release-of-bluez-5-47/
Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
Álvaro Fernández Rojas [Mon, 28 Mar 2016 12:53:35 +0000 (14:53 +0200)]
bluez: update to v5.38
Fixes https://github.com/openwrt/packages/issues/2523
Closes https://github.com/openwrt/packages/pull/2545
Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
Álvaro Fernández Rojas [Sun, 6 Mar 2016 15:20:24 +0000 (16:20 +0100)]
bluez: Add support for Raspberry Pi 3
- Adds bcm43xx-3wire variant.
- Resets UART speed after firmware download.
- Prints chip name when firmware isn't found for bcm43xx.
- Increases timeout for bcm43xx.
- Moves bcm43xx firmware to lib.
Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
Álvaro Fernández Rojas [Sun, 6 Mar 2016 15:13:37 +0000 (16:13 +0100)]
bluez: update to v5.37
Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
Hauke Mehrtens [Mon, 3 Aug 2015 20:35:56 +0000 (22:35 +0200)]
bluez: update to version 5.33
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Hauke Mehrtens [Sat, 4 Jul 2015 22:27:56 +0000 (00:27 +0200)]
bluez: update to version 5.31
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Hauke Mehrtens [Sat, 11 Jul 2015 20:58:08 +0000 (22:58 +0200)]
bluez: add btmgmt tool
The btmgmt tool is needed to activate BL LE support.
Currently it is not installed.
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Bruno Randolf [Fri, 29 May 2015 13:58:29 +0000 (14:58 +0100)]
bluez: Add bluez-daemon package
Move bluetoothd and related programs and files from bluez-utils into
bluez-daemon package. The main motivation for this is to remove the dependency
to DBus from bluez-utils. The utilities like "hcitool" are useful without it.
Also add kmod-bluetooth dependency to bluez-utils, as the utils don't make much
sense without bluetooth support in the kernel.
Signed-off-by: Bruno Randolf <br1@einfach.org>
Zoltan Herpai [Sat, 18 Nov 2017 11:58:16 +0000 (12:58 +0100)]
Merge pull request #5086 from wigyori/for-15.05-fdm2
CC: mail/fdm: update download URL
Zoltan Herpai [Sat, 18 Nov 2017 11:57:57 +0000 (12:57 +0100)]
Merge pull request #5099 from wigyori/for-15.05-taskwarrior
CC: utils/taskwarrior: upgrade to 2.4.4
Zoltan Herpai [Sat, 18 Nov 2017 11:57:41 +0000 (12:57 +0100)]
Merge pull request #5095 from wigyori/for-15.05-perl
CC: upgrade a couple perl packages
Zoltan Herpai [Sat, 18 Nov 2017 11:57:25 +0000 (12:57 +0100)]
Merge pull request #5101 from wigyori/for-15.05-tor
CC: net/tor: fix build and upgrade to 0.2.9.11
Michael Heimpold [Mon, 13 Nov 2017 19:18:55 +0000 (20:18 +0100)]
Merge pull request #5108 from wigyori/for-15.05-php
CC: php: upgrade to 5.6.32
LGTM2, thanks.
Thomas Heil [Mon, 13 Nov 2017 09:28:25 +0000 (10:28 +0100)]
Merge pull request #5111 from wigyori/for-15.05-nginx
CC: nginx: upgrade to 1.12.1
Zoltan Herpai [Mon, 13 Nov 2017 06:24:45 +0000 (07:24 +0100)]
Merge pull request #5080 from wigyori/for-15.05
CC: update download URLs for various packages
Zoltan Herpai [Mon, 13 Nov 2017 06:22:58 +0000 (07:22 +0100)]
Merge pull request #5078 from wigyori/for-15.05-neon
CC: upgrade libs/neon
Zoltan Herpai [Mon, 13 Nov 2017 06:20:47 +0000 (07:20 +0100)]
Merge pull request #5094 from wigyori/for-15.05-pianod
CC: fix pianod build
Marko Ratkaj [Tue, 19 Sep 2017 15:38:19 +0000 (17:38 +0200)]
squid: bump to 3.5.27
Bump Squid to version 3.5.27 and fix broken menuconfig menu.
Signed-off-by: Marko Ratkaj <marko.ratkaj@sartura.hr>
Adam Gensler [Sun, 8 Jan 2017 15:12:57 +0000 (10:12 -0500)]
net/squid: Allow squid to parse mime.conf
Copy mime.conf to temporary directory so squid process can properly read the file. Without it squid cannot access mime.conf and throws a warning during startup.
Signed-off by: Adam Gensler <openwrt@a.gnslr.us>
Zoltan Herpai [Sun, 12 Nov 2017 21:50:48 +0000 (22:50 +0100)]
Merge pull request #5098 from wigyori/for-15.05-stunnel
CC: net/stunnel: fix download source and upgrade
Zoltan Herpai [Sun, 12 Nov 2017 20:57:56 +0000 (21:57 +0100)]
Merge pull request #5093 from wigyori/for-15.05-libupnpp
CC: upmpdcli/libupnpp upgrade
Zoltan Herpai [Sun, 12 Nov 2017 20:44:52 +0000 (21:44 +0100)]
Merge pull request #5112 from wigyori/for-15.05-sshfs
CC: sshfs: upgrade to 2.10
Zoltan HERPAI [Sun, 12 Nov 2017 19:57:16 +0000 (20:57 +0100)]
sshfs: upgrade to 2.10
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
Thomas Heil [Wed, 16 Aug 2017 23:05:46 +0000 (01:05 +0200)]
nginx: update lua-nginx to
cdd2ae921f67bf396c743406493127be496e57ce
- fixes lua compilation issue
Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
Uwe Arnold [Sun, 13 Aug 2017 16:40:38 +0000 (18:40 +0200)]
nginx: update to 1.12.1
Fixes: CVE-2017-7529
remove PKG_MD5SUM as it is deprecated
Signed-off-by: Uwe Arnold <donvipre@gmail.com>
Val Kulkov [Wed, 24 May 2017 15:48:29 +0000 (11:48 -0400)]
nginx: update to 1.12.0, the latest stable version
This is a straightforward update to the latest stable version.
Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
Val Kulkov [Wed, 1 Feb 2017 05:25:57 +0000 (00:25 -0500)]
nginx: update to 1.10.3, add new module options
Update nginx to version 1.10.3.
Add new configuration options to enable the following optional
modules (disabled by default):
- http_auth_request_module
- http_v2_module
- http_realip_module
- http_secure_link_module
Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
heil [Tue, 20 Dec 2016 15:37:53 +0000 (16:37 +0100)]
nginx: bump version to latest stable 1.10.2
Signed-off-by: heil <heil@terminal-consulting.de>
Xotic750 [Tue, 31 May 2016 23:36:50 +0000 (01:36 +0200)]
nginx: Bumped nginx-naxsi to v0.54
Signed-off-by: Graham Fairweather <xotic750@gmail.com>
Xotic750 [Tue, 31 May 2016 20:54:26 +0000 (22:54 +0200)]
nginx: Bumped to v1.10.1
fixes NULL pointer dereference while writing client request body vulnerability (CVE-2016-4450).
Signed-off-by: Graham Fairweather <xotic750@gmail.com>
Dirk Feytons [Tue, 10 May 2016 13:54:27 +0000 (15:54 +0200)]
nginx: change start level to 80
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
Dirk Feytons [Mon, 9 May 2016 16:09:41 +0000 (18:09 +0200)]
nginx: correct
f3c7cc6
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
heil [Mon, 9 May 2016 12:25:18 +0000 (14:25 +0200)]
nginx: correct errors from previous merge
Signed-off-by: heil <heil@terminal-consulting.de>
Dirk Feytons [Fri, 29 Apr 2016 14:00:50 +0000 (16:00 +0200)]
nginx: upstep to 1.10.0, add Lua module, footprint optimizations
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
heil [Wed, 30 Mar 2016 12:28:40 +0000 (14:28 +0200)]
nginx: bump to version 1.9.13
Signed-off-by: heil <heil@terminal-consulting.de>
heil [Mon, 25 Jan 2016 15:57:07 +0000 (16:57 +0100)]
nginx: add naxsi module
- this brings back naxsi support aka WAF for nginx
Signed-off-by: heil <heil@terminal-consulting.de>
Dirk Feytons [Thu, 10 Dec 2015 15:24:00 +0000 (16:24 +0100)]
nginx: upstep to 1.9.9
Signed-off-by: Dirk Feytons <dirk.feytons@gmail.com>
Luka Perkov [Sat, 10 Oct 2015 16:20:10 +0000 (18:20 +0200)]
nginx: bump to 1.9.6
In this bump as agreed with Thomas we are dropping out all the nginx 3rd party
addons. In case you would like to see your 3rd party addon included please send
a pull request and make sure it works with newest version.
Signed-off-by: Luka Perkov <luka@openwrt.org>
Paul Fertser [Tue, 1 Sep 2015 05:15:26 +0000 (08:15 +0300)]
nginx: add support for SPNEGO authentication
This adds a module suitable for Kerberos SSO, e.g. for integrating
into Active Directory domains.
Signed-off-by: Paul Fertser <fercerpav@gmail.com>
heil [Sun, 21 Jun 2015 19:41:17 +0000 (21:41 +0200)]
nginx: fix musl compatibility
- include Patches according to issue #1129
- refresh Makefile
Signed-off-by: heil <heil@terminal-consulting.de>
Nuno Goncalves [Fri, 23 Sep 2016 11:29:23 +0000 (13:29 +0200)]
rtklib: fix repository and bump version (fixes #3212)
Signed-off-by: Nuno Goncalves <nunojpg@gmail.com>
Nuno Goncalves [Sun, 23 Aug 2015 13:29:46 +0000 (14:29 +0100)]
rtklib: bump version to 2.4.2 p11, close #1624
Signed-off-by: Nuno Goncalves <nunojpg@gmail.com>
Zoltan HERPAI [Fri, 10 Nov 2017 21:12:34 +0000 (22:12 +0100)]
php5: bump to 5.6.32
Fixes since 5.6.26:
- ton of bugs
- CVE-2016-9933
- CVE-2016-9934
- CVE-2016-9935
- CVE-2016-10158
- CVE-2016-10167
- CVE-2016-10168
- CVE-2016-10159
- CVE-2016-10160
- CVE-2016-10161
- CVE-2017-7890
- CVE-2017-9224
- CVE-2017-9226
- CVE-2017-9227
- CVE-2017-9228
- CVE-2017-9229
- CVE-2016-1283
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
Michael Heimpold [Wed, 21 Sep 2016 19:52:43 +0000 (21:52 +0200)]
php5: update to 5.6.26
This fixes the following CVEs:
- in intl: CVE-2016-7416
- in mysqlnd: CVE-2016-7412
- in phar: CVE-2016-7414
- in spl: CVE-2016-7417
- in standard: CVS-2016-7411
- in wddx: CVE-2016-7413, CVE-2016-7418
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
Michael Heimpold [Sat, 27 Aug 2016 22:10:42 +0000 (00:10 +0200)]
php5: update to 5.6.25
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
Michael Heimpold [Tue, 19 Jul 2016 21:14:33 +0000 (23:14 +0200)]
php5: update to 5.6.23
This fixes the following CVEs:
- in GD: CVE-2015-8874, CVE-2016-5766, CVE-2016-5767
- in mbstring: CVE-2016-5768
- in mcrypt: CVE-2016-5769
- in SPL: CVE-2016-5770, CVE-2016-5771
- in WDDX: CVE-2016-5772
- in zip: CVE-2016-5773
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
Michael Heimpold [Sat, 21 May 2016 20:12:25 +0000 (22:12 +0200)]
php5: update to 5.6.21
This fixes the following CVEs:
- in BCMath: CVE-2016-4537, CVE-2016-4538
- in EXIF: CVE-2016-4542, CVE-2016-4543, CVE-2016-4544
- in GD: CVE-2016-3074
- in Intl: CVE-2016-4540, CVE-2016-4541
- in XML: CVE-2016-4539
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
Michael Heimpold [Sun, 24 Apr 2016 20:40:53 +0000 (22:40 +0200)]
php5: add mod_intl (resolves #2620)
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
Michael Heimpold [Wed, 23 Mar 2016 20:13:55 +0000 (21:13 +0100)]
php5: update to 5.6.19
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
Michael Heimpold [Sat, 6 Feb 2016 22:26:07 +0000 (23:26 +0100)]
php5: update to 5.6.18
Note: Upstream tagged this as security release.
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
Álvaro Fernández Rojas [Mon, 5 Sep 2016 07:23:58 +0000 (09:23 +0200)]
xupnpd: update to latest version
Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
kuoruan [Sun, 29 May 2016 06:43:39 +0000 (14:43 +0800)]
xupnpd: Update to 2016-05-11
* Change source url to GitHub
* Update to 2016-05-11
* Add LICENSE
* Edit Makefile
Signed-off-by: Hsing-Wang Liao <kuoruan@gmail.com>
Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
Michael Haas [Sun, 25 Oct 2015 08:56:55 +0000 (09:56 +0100)]
wifidog: Bump to 1.3.0
* Updates wifidog to latest upstream release.
* Removes patches/100-musl-compat.patch as that's included in 1.3.0
Signed-off-by: Michael Haas <haas@computerlinguist.org>
Jo-Philipp Wich [Wed, 17 Jun 2015 17:38:55 +0000 (19:38 +0200)]
wifidog: fix musl compatibility
- Fix missing `fcntl.h` in `protocol.c`
- Replace nonstandard `sys/unistd.h` includes with `unistd.h` ones
Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
Daniel Golle [Fri, 10 Nov 2017 17:26:32 +0000 (18:26 +0100)]
Merge pull request #5100 from wigyori/for-15.05-tracertools
CC: tracertools: use new git HEAD
Daniel Golle [Tue, 23 Feb 2016 08:38:16 +0000 (10:38 +0200)]
tracertools: use new git HEAD
gitorious archive became available, so I could import the project
history from there into the new repo on github. Rebasing the changes
made since 2014 on top of the original git tree obviously caused
the commit hashes to differ.
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
Daniel Golle [Mon, 18 Jan 2016 00:22:52 +0000 (01:22 +0100)]
tracertools: update source, fixes bug on little-endian systems
and improves collectd support
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
Daniel Golle [Sat, 26 Dec 2015 04:05:03 +0000 (05:05 +0100)]
tracertools: update source
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
Hauke Mehrtens [Mon, 3 Jul 2017 21:00:29 +0000 (23:00 +0200)]
tor: update to version 0.2.9.11
This fixes CVE-2017-0376
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Hauke Mehrtens [Mon, 13 Mar 2017 21:31:21 +0000 (22:31 +0100)]
tor: update to version 0.2.9.10
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Hauke Mehrtens [Tue, 31 Jan 2017 22:44:00 +0000 (23:44 +0100)]
tor: update to version 0.2.9.9
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Hauke Mehrtens [Sat, 14 Jan 2017 16:40:43 +0000 (17:40 +0100)]
tor: log to syslog by default
Make tor log to syslog by default instead of stdout.
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Hauke Mehrtens [Sat, 14 Jan 2017 14:38:14 +0000 (15:38 +0100)]
tor: add tor-gencert, tor-resolve and torify
These are some additional applications build by the tor package.
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Hauke Mehrtens [Sat, 14 Jan 2017 14:26:41 +0000 (15:26 +0100)]
tor: add geoip6 to tor-geoip
This add the IPv6 addresses to the tor-geoip6 package.
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Hauke Mehrtens [Sat, 14 Jan 2017 14:29:19 +0000 (15:29 +0100)]
tor: preserve tor keys over sysupgrade
Mark the directories containing the keys for hidden services as
conffiles to preserve them over sysupgrade.
Fixes: #2247
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Hauke Mehrtens [Sat, 14 Jan 2017 14:28:02 +0000 (15:28 +0100)]
tor: update to version 0.2.9.8
In addition update some configure options and use EXTRA_CFLAGS.
Setting RunAsDaemon to 1 will be overwritten by the init script option
"--runasdaemon 0" anyway and we want it in foreground for procd.
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Hauke Mehrtens [Sun, 11 Dec 2016 22:56:19 +0000 (23:56 +0100)]
tor: update to version 0.2.8.11
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Nima Fatemi [Wed, 26 Oct 2016 16:54:44 +0000 (16:54 +0000)]
Tor: update to 0.2.8.9
- update to 0.2.8.9
- use sha256 instead of md5 for integrity check
- add dependency: libcap
signed-off-by: Nima Fatemi <nima@torproject.org>
Felix Fietkau [Sun, 24 Jul 2016 12:55:45 +0000 (14:55 +0200)]
tor: add missing zlib dependency
Signed-off-by: Felix Fietkau <nbd@nbd.name>
Karl Palsson [Tue, 24 May 2016 09:01:38 +0000 (09:01 +0000)]
tor: correct URL for dist downloads
Original url was 404.
Fixes Github issue #2284
Jeffery To [Thu, 17 Mar 2016 13:13:01 +0000 (21:13 +0800)]
tor: remove tor-fw-helper
The "internal pure-C" tor-fw-helper was removed in 0.2.7.5. This removes
the tor-fw-helper package and references to its dependencies.
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
Luka Perkov [Wed, 13 May 2015 10:48:18 +0000 (12:48 +0200)]
taskwarrior: update to 2.4.4
Signed-off-by: Luka Perkov <luka@openwrt.org>
Zoltan HERPAI [Fri, 10 Nov 2017 12:19:14 +0000 (13:19 +0100)]
stunnel: use archive/ as download source
Anything below 5.43 is archived, update download source
to use paths accordingly.
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
Felix Fietkau [Sun, 24 Jul 2016 12:52:50 +0000 (14:52 +0200)]
stunnel: add missing zlib dependency
Signed-off-by: Felix Fietkau <nbd@nbd.name>
Michael Haas [Sat, 25 Jul 2015 07:24:39 +0000 (09:24 +0200)]
stunnel: Update from 5.14 to 5.20
* 010_fix_getnameinfo.patch is no longer needed
* 011-cron-without-pthread-fix.patch added, fixes incorrect
ifdef when building without pthreads
Signed-off-by: Michael Haas <haas@computerlinguist.org>
Zoltan HERPAI [Fri, 10 Nov 2017 11:05:20 +0000 (12:05 +0100)]
stm32flash: move download source
code.google is not available anymore, move to use SF.
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
Zoltan HERPAI [Fri, 10 Nov 2017 11:04:19 +0000 (12:04 +0100)]
net/sslh: move download source
The old download source was pulled from the net, move to github.
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
Dirk Neukirchen [Thu, 11 Feb 2016 08:16:56 +0000 (09:16 +0100)]
squid: disable krb5
- fix build error reported by buildbot by disabling krb5
- libcom_err from krb5 is used - configure output:
configure: WARNING: library 'com_err' is required for Heimdal Kerberos
- krb5 has its own libcom_err (see krb5 package) with its own symbols
- linking with wrong libcom_err from libext2fs produces errors during
libgssapi_krb5.so: undefined reference to `error_message@com_err_3_MIT'
libgssapi_krb5.so: undefined reference to `remove_error_table@com_err_3_MIT'
libgssapi_krb5.so: undefined reference to `add_error_table@com_err_3_MIT'
-> remove libext2fs dependency (wasnt working anyway - no PKG_BUILD_DEP)
Signed-off-by: Dirk Neukirchen <dirkneukirchen@web.de>
Daniel Golle [Wed, 13 Jan 2016 23:07:53 +0000 (00:07 +0100)]
squid: build-depend on libext2fs
squid uses libcom_err, a static library provided by libext2fs
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
Zoltan HERPAI [Thu, 9 Nov 2017 21:54:14 +0000 (22:54 +0100)]
snort: update download source
2.9.7.2 was moved into the archive section, update
source accordingly until someone upgrades it.
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
Noah Meyerhans [Wed, 2 Nov 2016 05:29:58 +0000 (22:29 -0700)]
bind: update to 9.10.4-p4
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
Noah Meyerhans [Fri, 30 Sep 2016 03:32:49 +0000 (20:32 -0700)]
bind: Set PKG_USE_MIPS16:=0