Sebastian Kemper [Tue, 30 Jan 2018 14:25:23 +0000 (15:25 +0100)]
libssh2: revision bump to fix CVE-2016-0787
- adds patch copied from Debian to address CVE
- fixes zlib detection
- changes http to https links
- updates maintainer's mail address
Signed-off-by: Sebastian Kemper <[email protected]>
Zoltan Herpai [Mon, 29 Jan 2018 08:20:09 +0000 (09:20 +0100)]
Merge pull request #5084 from wigyori/for-15.05-irssi
CC: net/irssi: upgrade irssi, update download URL
Zoltan Herpai [Mon, 29 Jan 2018 08:19:18 +0000 (09:19 +0100)]
Merge pull request #5102 from wigyori/for-15.05-xupnpd
CC: multimedia/xupnpd: move download source and upgrade to 2016-07-06
Zoltan Herpai [Mon, 29 Jan 2018 08:10:29 +0000 (09:10 +0100)]
Merge pull request #5151 from wigyori/for-15.05-bluez
CC: bluez: upgrade to 5.47
Marko Ratkaj [Wed, 24 Jan 2018 19:23:49 +0000 (20:23 +0100)]
Merge pull request #5114 from wigyori/for-15.05-squid
CC: squid: upgrade to 3.5.27
Zoltan Herpai [Thu, 7 Dec 2017 09:49:26 +0000 (10:49 +0100)]
Merge pull request #5233 from wigyori/for-15.05-bind
CC: bind: bump to 9.11.2
Zoltan HERPAI [Wed, 6 Dec 2017 20:23:07 +0000 (21:23 +0100)]
bind: bring back PKG_MD5SUM for CC
Signed-off-by: Zoltan HERPAI <[email protected]>
Philip Prindeville [Mon, 7 Aug 2017 18:01:56 +0000 (12:01 -0600)]
bind: version update to 9.11.2
Also refresh patches and dependencies.
Signed-off-by: Philip Prindeville <[email protected]>
Noah Meyerhans [Sun, 16 Jul 2017 15:53:59 +0000 (08:53 -0700)]
bind: Update to 9.10.5-P3
New upstream release includes fixes for the following security issues:
* CVE-2017-3140: With certain RPZ configurations, a response with TTL 0 could
cause named to go into an infinite query loop
* CVE-2017-3142: An error in TSIG handling could permit unauthorized zone
transfers or zone updates.
* CVE-2017-3143: An error in TSIG handling could permit unauthorized zone
transfers or zone updates.
Signed-off-by: Noah Meyerhans <[email protected]>
Sami Olmari [Mon, 5 Jun 2017 22:47:05 +0000 (01:47 +0300)]
bind: Include dnssec-settime in bind-dnssec/tool
<net/bind>
Maintainer: @nmeyerhans
Compile tested: x86_64, OpenWRT 50107
Run tested: x86 / 64, OpenWRT 50107
Description:
Added dnssec-settime into bind-dnssec and bind-tools
Signed-off-by: Sami Olmari <[email protected]>
Noah Meyerhans [Thu, 11 May 2017 05:06:46 +0000 (22:06 -0700)]
bind: Update to bind-9.10.5
This change includes fixes for several security issues:
* CVE-2017-3138: rndc "" could trigger an assertion failure in named.
* CVE-2017-3137: Some chaining (i.e., type CNAME or DNAME) responses to
upstream queries could trigger assertion failures.
* CVE-2017-3136: dns64 with break-dnssec yes; can result in an assertion
failure.
* CVE-2017-3135: If a server is configured with a response policy zone
(RPZ) that rewrites an answer with local data, and is also configured
for DNS64 address mapping, a NULL pointer can be read triggering a
server crash.
* CVE-2016-9444: named could mishandle authority sections with missing
RRSIGs, triggering an assertion failure.
* CVE-2016-9131: named mishandled some responses where covering RRSIG
records were returned without the requested data, resulting in an
assertion failure.
* CVE-2016-9131: named incorrectly tried to cache TKEY records which could
trigger an assertion failure when there was a class mismatch.
* CVE-2016-8864: It was possible to trigger assertions when processing
responses containing answers of type DNAME.
* CVE-2016-6170: Added the ability to specify the maximum number of
records permitted in a zone (max-records #;). This provides a mechanism
to block overly large zone transfers, which is a potential risk with
slave zones from other parties.
* CVE-2016-2776: It was possible to trigger an assertion when rendering a
message using a specially crafted request.
* CVE-2016-2775: Calling getrrsetbyname() with a non absolute name could
trigger an infinite recursion bug in lwresd or named with lwres
configured if, when combined with a search list entry from resolv.conf,
the resulting name is too long.
Signed-off-by: Noah Meyerhans <[email protected]>
Noah Meyerhans [Thu, 12 Jan 2017 06:01:53 +0000 (22:01 -0800)]
bind: update to bind-9.10.4-P5
This change fixes multiple denial-of-service vulnerabilities:
* CVE-2016-9131: A malformed response to an ANY query can cause an
assertion failure during recursion
* CVE-2016-9147: An error handling a query response containing
inconsistent DNSSEC information could cause an assertion failure
* CVE-2016-9444: An unusually-formed DS record response could cause
an assertion failure
* CVE-2016-9778: An error handling certain queries using the
nxdomain-redirect feature could cause a REQUIRE assertion failure
in db.c
Signed-off-by: Noah Meyerhans <[email protected]>
Stijn Tintel [Tue, 29 Nov 2016 11:26:05 +0000 (12:26 +0100)]
bind: disable libjson support
If libjson-c is detected during bind-libs configure phase, bind-libs
will be built with libjson support. This results in a missing dependency
error during install phase. Solve this by disabling libjson support.
Noah Meyerhans [Thu, 17 Nov 2016 14:19:55 +0000 (06:19 -0800)]
bind: set sysconfdir to /etc/bind
Signed-off-by: Noah Meyerhans <[email protected]>
Zoltan Herpai [Sat, 18 Nov 2017 20:18:41 +0000 (21:18 +0100)]
Merge pull request #5081 from wigyori/for-15.05-mxml3
CC: upgrade mxml, update download URL
Zoltan Herpai [Sat, 18 Nov 2017 20:14:31 +0000 (21:14 +0100)]
Merge pull request #5103 from wigyori/for-15.05-wifidog
CC: wifidog: upgrade to 1.3.0 to fix build
Hirokazu MORIKAWA [Fri, 22 Sep 2017 06:51:37 +0000 (15:51 +0900)]
bluez: bump to 5.47 fix CVE-2017-
1000250
http://www.bluez.org/release-of-bluez-5-47/
Signed-off-by: Hirokazu MORIKAWA <[email protected]>
Álvaro Fernández Rojas [Mon, 28 Mar 2016 12:53:35 +0000 (14:53 +0200)]
bluez: update to v5.38
Fixes https://github.com/openwrt/packages/issues/2523
Closes https://github.com/openwrt/packages/pull/2545
Signed-off-by: Álvaro Fernández Rojas <[email protected]>
Álvaro Fernández Rojas [Sun, 6 Mar 2016 15:20:24 +0000 (16:20 +0100)]
bluez: Add support for Raspberry Pi 3
- Adds bcm43xx-3wire variant.
- Resets UART speed after firmware download.
- Prints chip name when firmware isn't found for bcm43xx.
- Increases timeout for bcm43xx.
- Moves bcm43xx firmware to lib.
Signed-off-by: Álvaro Fernández Rojas <[email protected]>
Álvaro Fernández Rojas [Sun, 6 Mar 2016 15:13:37 +0000 (16:13 +0100)]
bluez: update to v5.37
Signed-off-by: Álvaro Fernández Rojas <[email protected]>
Hauke Mehrtens [Mon, 3 Aug 2015 20:35:56 +0000 (22:35 +0200)]
bluez: update to version 5.33
Signed-off-by: Hauke Mehrtens <[email protected]>
Hauke Mehrtens [Sat, 4 Jul 2015 22:27:56 +0000 (00:27 +0200)]
bluez: update to version 5.31
Signed-off-by: Hauke Mehrtens <[email protected]>
Hauke Mehrtens [Sat, 11 Jul 2015 20:58:08 +0000 (22:58 +0200)]
bluez: add btmgmt tool
The btmgmt tool is needed to activate BL LE support.
Currently it is not installed.
Signed-off-by: Hauke Mehrtens <[email protected]>
Bruno Randolf [Fri, 29 May 2015 13:58:29 +0000 (14:58 +0100)]
bluez: Add bluez-daemon package
Move bluetoothd and related programs and files from bluez-utils into
bluez-daemon package. The main motivation for this is to remove the dependency
to DBus from bluez-utils. The utilities like "hcitool" are useful without it.
Also add kmod-bluetooth dependency to bluez-utils, as the utils don't make much
sense without bluetooth support in the kernel.
Signed-off-by: Bruno Randolf <[email protected]>
Zoltan Herpai [Sat, 18 Nov 2017 11:58:16 +0000 (12:58 +0100)]
Merge pull request #5086 from wigyori/for-15.05-fdm2
CC: mail/fdm: update download URL
Zoltan Herpai [Sat, 18 Nov 2017 11:57:57 +0000 (12:57 +0100)]
Merge pull request #5099 from wigyori/for-15.05-taskwarrior
CC: utils/taskwarrior: upgrade to 2.4.4
Zoltan Herpai [Sat, 18 Nov 2017 11:57:41 +0000 (12:57 +0100)]
Merge pull request #5095 from wigyori/for-15.05-perl
CC: upgrade a couple perl packages
Zoltan Herpai [Sat, 18 Nov 2017 11:57:25 +0000 (12:57 +0100)]
Merge pull request #5101 from wigyori/for-15.05-tor
CC: net/tor: fix build and upgrade to 0.2.9.11
Michael Heimpold [Mon, 13 Nov 2017 19:18:55 +0000 (20:18 +0100)]
Merge pull request #5108 from wigyori/for-15.05-php
CC: php: upgrade to 5.6.32
LGTM2, thanks.
Thomas Heil [Mon, 13 Nov 2017 09:28:25 +0000 (10:28 +0100)]
Merge pull request #5111 from wigyori/for-15.05-nginx
CC: nginx: upgrade to 1.12.1
Zoltan Herpai [Mon, 13 Nov 2017 06:24:45 +0000 (07:24 +0100)]
Merge pull request #5080 from wigyori/for-15.05
CC: update download URLs for various packages
Zoltan Herpai [Mon, 13 Nov 2017 06:22:58 +0000 (07:22 +0100)]
Merge pull request #5078 from wigyori/for-15.05-neon
CC: upgrade libs/neon
Zoltan Herpai [Mon, 13 Nov 2017 06:20:47 +0000 (07:20 +0100)]
Merge pull request #5094 from wigyori/for-15.05-pianod
CC: fix pianod build
Marko Ratkaj [Tue, 19 Sep 2017 15:38:19 +0000 (17:38 +0200)]
squid: bump to 3.5.27
Bump Squid to version 3.5.27 and fix broken menuconfig menu.
Signed-off-by: Marko Ratkaj <[email protected]>
Adam Gensler [Sun, 8 Jan 2017 15:12:57 +0000 (10:12 -0500)]
net/squid: Allow squid to parse mime.conf
Copy mime.conf to temporary directory so squid process can properly read the file. Without it squid cannot access mime.conf and throws a warning during startup.
Signed-off by: Adam Gensler <
[email protected]>
Zoltan Herpai [Sun, 12 Nov 2017 21:50:48 +0000 (22:50 +0100)]
Merge pull request #5098 from wigyori/for-15.05-stunnel
CC: net/stunnel: fix download source and upgrade
Zoltan Herpai [Sun, 12 Nov 2017 20:57:56 +0000 (21:57 +0100)]
Merge pull request #5093 from wigyori/for-15.05-libupnpp
CC: upmpdcli/libupnpp upgrade
Zoltan Herpai [Sun, 12 Nov 2017 20:44:52 +0000 (21:44 +0100)]
Merge pull request #5112 from wigyori/for-15.05-sshfs
CC: sshfs: upgrade to 2.10
Zoltan HERPAI [Sun, 12 Nov 2017 19:57:16 +0000 (20:57 +0100)]
sshfs: upgrade to 2.10
Signed-off-by: Zoltan HERPAI <[email protected]>
Thomas Heil [Wed, 16 Aug 2017 23:05:46 +0000 (01:05 +0200)]
nginx: update lua-nginx to
cdd2ae921f67bf396c743406493127be496e57ce
- fixes lua compilation issue
Signed-off-by: Thomas Heil <[email protected]>
Uwe Arnold [Sun, 13 Aug 2017 16:40:38 +0000 (18:40 +0200)]
nginx: update to 1.12.1
Fixes: CVE-2017-7529
remove PKG_MD5SUM as it is deprecated
Signed-off-by: Uwe Arnold <[email protected]>
Val Kulkov [Wed, 24 May 2017 15:48:29 +0000 (11:48 -0400)]
nginx: update to 1.12.0, the latest stable version
This is a straightforward update to the latest stable version.
Signed-off-by: Val Kulkov <[email protected]>
Val Kulkov [Wed, 1 Feb 2017 05:25:57 +0000 (00:25 -0500)]
nginx: update to 1.10.3, add new module options
Update nginx to version 1.10.3.
Add new configuration options to enable the following optional
modules (disabled by default):
- http_auth_request_module
- http_v2_module
- http_realip_module
- http_secure_link_module
Signed-off-by: Val Kulkov <[email protected]>
heil [Tue, 20 Dec 2016 15:37:53 +0000 (16:37 +0100)]
nginx: bump version to latest stable 1.10.2
Signed-off-by: heil <[email protected]>
Xotic750 [Tue, 31 May 2016 23:36:50 +0000 (01:36 +0200)]
nginx: Bumped nginx-naxsi to v0.54
Signed-off-by: Graham Fairweather <[email protected]>
Xotic750 [Tue, 31 May 2016 20:54:26 +0000 (22:54 +0200)]
nginx: Bumped to v1.10.1
fixes NULL pointer dereference while writing client request body vulnerability (CVE-2016-4450).
Signed-off-by: Graham Fairweather <[email protected]>
Dirk Feytons [Tue, 10 May 2016 13:54:27 +0000 (15:54 +0200)]
nginx: change start level to 80
Signed-off-by: Dirk Feytons <[email protected]>
Dirk Feytons [Mon, 9 May 2016 16:09:41 +0000 (18:09 +0200)]
nginx: correct
f3c7cc6
Signed-off-by: Dirk Feytons <[email protected]>
heil [Mon, 9 May 2016 12:25:18 +0000 (14:25 +0200)]
nginx: correct errors from previous merge
Signed-off-by: heil <[email protected]>
Dirk Feytons [Fri, 29 Apr 2016 14:00:50 +0000 (16:00 +0200)]
nginx: upstep to 1.10.0, add Lua module, footprint optimizations
Signed-off-by: Dirk Feytons <[email protected]>
heil [Wed, 30 Mar 2016 12:28:40 +0000 (14:28 +0200)]
nginx: bump to version 1.9.13
Signed-off-by: heil <[email protected]>
heil [Mon, 25 Jan 2016 15:57:07 +0000 (16:57 +0100)]
nginx: add naxsi module
- this brings back naxsi support aka WAF for nginx
Signed-off-by: heil <[email protected]>
Dirk Feytons [Thu, 10 Dec 2015 15:24:00 +0000 (16:24 +0100)]
nginx: upstep to 1.9.9
Signed-off-by: Dirk Feytons <[email protected]>
Luka Perkov [Sat, 10 Oct 2015 16:20:10 +0000 (18:20 +0200)]
nginx: bump to 1.9.6
In this bump as agreed with Thomas we are dropping out all the nginx 3rd party
addons. In case you would like to see your 3rd party addon included please send
a pull request and make sure it works with newest version.
Signed-off-by: Luka Perkov <[email protected]>
Paul Fertser [Tue, 1 Sep 2015 05:15:26 +0000 (08:15 +0300)]
nginx: add support for SPNEGO authentication
This adds a module suitable for Kerberos SSO, e.g. for integrating
into Active Directory domains.
Signed-off-by: Paul Fertser <[email protected]>
heil [Sun, 21 Jun 2015 19:41:17 +0000 (21:41 +0200)]
nginx: fix musl compatibility
- include Patches according to issue #1129
- refresh Makefile
Signed-off-by: heil <[email protected]>
Nuno Goncalves [Fri, 23 Sep 2016 11:29:23 +0000 (13:29 +0200)]
rtklib: fix repository and bump version (fixes #3212)
Signed-off-by: Nuno Goncalves <[email protected]>
Nuno Goncalves [Sun, 23 Aug 2015 13:29:46 +0000 (14:29 +0100)]
rtklib: bump version to 2.4.2 p11, close #1624
Signed-off-by: Nuno Goncalves <[email protected]>
Zoltan HERPAI [Fri, 10 Nov 2017 21:12:34 +0000 (22:12 +0100)]
php5: bump to 5.6.32
Fixes since 5.6.26:
- ton of bugs
- CVE-2016-9933
- CVE-2016-9934
- CVE-2016-9935
- CVE-2016-10158
- CVE-2016-10167
- CVE-2016-10168
- CVE-2016-10159
- CVE-2016-10160
- CVE-2016-10161
- CVE-2017-7890
- CVE-2017-9224
- CVE-2017-9226
- CVE-2017-9227
- CVE-2017-9228
- CVE-2017-9229
- CVE-2016-1283
Signed-off-by: Zoltan HERPAI <[email protected]>
Michael Heimpold [Wed, 21 Sep 2016 19:52:43 +0000 (21:52 +0200)]
php5: update to 5.6.26
This fixes the following CVEs:
- in intl: CVE-2016-7416
- in mysqlnd: CVE-2016-7412
- in phar: CVE-2016-7414
- in spl: CVE-2016-7417
- in standard: CVS-2016-7411
- in wddx: CVE-2016-7413, CVE-2016-7418
Signed-off-by: Michael Heimpold <[email protected]>
Michael Heimpold [Sat, 27 Aug 2016 22:10:42 +0000 (00:10 +0200)]
php5: update to 5.6.25
Signed-off-by: Michael Heimpold <[email protected]>
Michael Heimpold [Tue, 19 Jul 2016 21:14:33 +0000 (23:14 +0200)]
php5: update to 5.6.23
This fixes the following CVEs:
- in GD: CVE-2015-8874, CVE-2016-5766, CVE-2016-5767
- in mbstring: CVE-2016-5768
- in mcrypt: CVE-2016-5769
- in SPL: CVE-2016-5770, CVE-2016-5771
- in WDDX: CVE-2016-5772
- in zip: CVE-2016-5773
Signed-off-by: Michael Heimpold <[email protected]>
Michael Heimpold [Sat, 21 May 2016 20:12:25 +0000 (22:12 +0200)]
php5: update to 5.6.21
This fixes the following CVEs:
- in BCMath: CVE-2016-4537, CVE-2016-4538
- in EXIF: CVE-2016-4542, CVE-2016-4543, CVE-2016-4544
- in GD: CVE-2016-3074
- in Intl: CVE-2016-4540, CVE-2016-4541
- in XML: CVE-2016-4539
Signed-off-by: Michael Heimpold <[email protected]>
Michael Heimpold [Sun, 24 Apr 2016 20:40:53 +0000 (22:40 +0200)]
php5: add mod_intl (resolves #2620)
Signed-off-by: Michael Heimpold <[email protected]>
Michael Heimpold [Wed, 23 Mar 2016 20:13:55 +0000 (21:13 +0100)]
php5: update to 5.6.19
Signed-off-by: Michael Heimpold <[email protected]>
Michael Heimpold [Sat, 6 Feb 2016 22:26:07 +0000 (23:26 +0100)]
php5: update to 5.6.18
Note: Upstream tagged this as security release.
Signed-off-by: Michael Heimpold <[email protected]>
Álvaro Fernández Rojas [Mon, 5 Sep 2016 07:23:58 +0000 (09:23 +0200)]
xupnpd: update to latest version
Signed-off-by: Álvaro Fernández Rojas <[email protected]>
kuoruan [Sun, 29 May 2016 06:43:39 +0000 (14:43 +0800)]
xupnpd: Update to 2016-05-11
* Change source url to GitHub
* Update to 2016-05-11
* Add LICENSE
* Edit Makefile
Signed-off-by: Hsing-Wang Liao <[email protected]>
Signed-off-by: Álvaro Fernández Rojas <[email protected]>
Michael Haas [Sun, 25 Oct 2015 08:56:55 +0000 (09:56 +0100)]
wifidog: Bump to 1.3.0
* Updates wifidog to latest upstream release.
* Removes patches/100-musl-compat.patch as that's included in 1.3.0
Signed-off-by: Michael Haas <[email protected]>
Jo-Philipp Wich [Wed, 17 Jun 2015 17:38:55 +0000 (19:38 +0200)]
wifidog: fix musl compatibility
- Fix missing `fcntl.h` in `protocol.c`
- Replace nonstandard `sys/unistd.h` includes with `unistd.h` ones
Signed-off-by: Jo-Philipp Wich <[email protected]>
Daniel Golle [Fri, 10 Nov 2017 17:26:32 +0000 (18:26 +0100)]
Merge pull request #5100 from wigyori/for-15.05-tracertools
CC: tracertools: use new git HEAD
Daniel Golle [Tue, 23 Feb 2016 08:38:16 +0000 (10:38 +0200)]
tracertools: use new git HEAD
gitorious archive became available, so I could import the project
history from there into the new repo on github. Rebasing the changes
made since 2014 on top of the original git tree obviously caused
the commit hashes to differ.
Signed-off-by: Daniel Golle <[email protected]>
Daniel Golle [Mon, 18 Jan 2016 00:22:52 +0000 (01:22 +0100)]
tracertools: update source, fixes bug on little-endian systems
and improves collectd support
Signed-off-by: Daniel Golle <[email protected]>
Daniel Golle [Sat, 26 Dec 2015 04:05:03 +0000 (05:05 +0100)]
tracertools: update source
Signed-off-by: Daniel Golle <[email protected]>
Hauke Mehrtens [Mon, 3 Jul 2017 21:00:29 +0000 (23:00 +0200)]
tor: update to version 0.2.9.11
This fixes CVE-2017-0376
Signed-off-by: Hauke Mehrtens <[email protected]>
Hauke Mehrtens [Mon, 13 Mar 2017 21:31:21 +0000 (22:31 +0100)]
tor: update to version 0.2.9.10
Signed-off-by: Hauke Mehrtens <[email protected]>
Hauke Mehrtens [Tue, 31 Jan 2017 22:44:00 +0000 (23:44 +0100)]
tor: update to version 0.2.9.9
Signed-off-by: Hauke Mehrtens <[email protected]>
Hauke Mehrtens [Sat, 14 Jan 2017 16:40:43 +0000 (17:40 +0100)]
tor: log to syslog by default
Make tor log to syslog by default instead of stdout.
Signed-off-by: Hauke Mehrtens <[email protected]>
Hauke Mehrtens [Sat, 14 Jan 2017 14:38:14 +0000 (15:38 +0100)]
tor: add tor-gencert, tor-resolve and torify
These are some additional applications build by the tor package.
Signed-off-by: Hauke Mehrtens <[email protected]>
Hauke Mehrtens [Sat, 14 Jan 2017 14:26:41 +0000 (15:26 +0100)]
tor: add geoip6 to tor-geoip
This add the IPv6 addresses to the tor-geoip6 package.
Signed-off-by: Hauke Mehrtens <[email protected]>
Hauke Mehrtens [Sat, 14 Jan 2017 14:29:19 +0000 (15:29 +0100)]
tor: preserve tor keys over sysupgrade
Mark the directories containing the keys for hidden services as
conffiles to preserve them over sysupgrade.
Fixes: #2247
Signed-off-by: Hauke Mehrtens <[email protected]>
Hauke Mehrtens [Sat, 14 Jan 2017 14:28:02 +0000 (15:28 +0100)]
tor: update to version 0.2.9.8
In addition update some configure options and use EXTRA_CFLAGS.
Setting RunAsDaemon to 1 will be overwritten by the init script option
"--runasdaemon 0" anyway and we want it in foreground for procd.
Signed-off-by: Hauke Mehrtens <[email protected]>
Hauke Mehrtens [Sun, 11 Dec 2016 22:56:19 +0000 (23:56 +0100)]
tor: update to version 0.2.8.11
Signed-off-by: Hauke Mehrtens <[email protected]>
Nima Fatemi [Wed, 26 Oct 2016 16:54:44 +0000 (16:54 +0000)]
Tor: update to 0.2.8.9
- update to 0.2.8.9
- use sha256 instead of md5 for integrity check
- add dependency: libcap
signed-off-by: Nima Fatemi <
[email protected]>
Felix Fietkau [Sun, 24 Jul 2016 12:55:45 +0000 (14:55 +0200)]
tor: add missing zlib dependency
Signed-off-by: Felix Fietkau <[email protected]>
Karl Palsson [Tue, 24 May 2016 09:01:38 +0000 (09:01 +0000)]
tor: correct URL for dist downloads
Original url was 404.
Fixes Github issue #2284
Jeffery To [Thu, 17 Mar 2016 13:13:01 +0000 (21:13 +0800)]
tor: remove tor-fw-helper
The "internal pure-C" tor-fw-helper was removed in 0.2.7.5. This removes
the tor-fw-helper package and references to its dependencies.
Signed-off-by: Jeffery To <[email protected]>
Luka Perkov [Wed, 13 May 2015 10:48:18 +0000 (12:48 +0200)]
taskwarrior: update to 2.4.4
Signed-off-by: Luka Perkov <[email protected]>
Zoltan HERPAI [Fri, 10 Nov 2017 12:19:14 +0000 (13:19 +0100)]
stunnel: use archive/ as download source
Anything below 5.43 is archived, update download source
to use paths accordingly.
Signed-off-by: Zoltan HERPAI <[email protected]>
Felix Fietkau [Sun, 24 Jul 2016 12:52:50 +0000 (14:52 +0200)]
stunnel: add missing zlib dependency
Signed-off-by: Felix Fietkau <[email protected]>
Michael Haas [Sat, 25 Jul 2015 07:24:39 +0000 (09:24 +0200)]
stunnel: Update from 5.14 to 5.20
* 010_fix_getnameinfo.patch is no longer needed
* 011-cron-without-pthread-fix.patch added, fixes incorrect
ifdef when building without pthreads
Signed-off-by: Michael Haas <[email protected]>
Zoltan HERPAI [Fri, 10 Nov 2017 11:05:20 +0000 (12:05 +0100)]
stm32flash: move download source
code.google is not available anymore, move to use SF.
Signed-off-by: Zoltan HERPAI <[email protected]>
Zoltan HERPAI [Fri, 10 Nov 2017 11:04:19 +0000 (12:04 +0100)]
net/sslh: move download source
The old download source was pulled from the net, move to github.
Signed-off-by: Zoltan HERPAI <[email protected]>
Dirk Neukirchen [Thu, 11 Feb 2016 08:16:56 +0000 (09:16 +0100)]
squid: disable krb5
- fix build error reported by buildbot by disabling krb5
- libcom_err from krb5 is used - configure output:
configure: WARNING: library 'com_err' is required for Heimdal Kerberos
- krb5 has its own libcom_err (see krb5 package) with its own symbols
- linking with wrong libcom_err from libext2fs produces errors during
libgssapi_krb5.so: undefined reference to `error_message@com_err_3_MIT'
libgssapi_krb5.so: undefined reference to `remove_error_table@com_err_3_MIT'
libgssapi_krb5.so: undefined reference to `add_error_table@com_err_3_MIT'
-> remove libext2fs dependency (wasnt working anyway - no PKG_BUILD_DEP)
Signed-off-by: Dirk Neukirchen <[email protected]>
Daniel Golle [Wed, 13 Jan 2016 23:07:53 +0000 (00:07 +0100)]
squid: build-depend on libext2fs
squid uses libcom_err, a static library provided by libext2fs
Signed-off-by: Daniel Golle <[email protected]>
Zoltan HERPAI [Thu, 9 Nov 2017 21:54:14 +0000 (22:54 +0100)]
snort: update download source
2.9.7.2 was moved into the archive section, update
source accordingly until someone upgrades it.
Signed-off-by: Zoltan HERPAI <[email protected]>
Noah Meyerhans [Wed, 2 Nov 2016 05:29:58 +0000 (22:29 -0700)]
bind: update to 9.10.4-p4
Signed-off-by: Noah Meyerhans <[email protected]>
Noah Meyerhans [Fri, 30 Sep 2016 03:32:49 +0000 (20:32 -0700)]
bind: Set PKG_USE_MIPS16:=0
Noah Meyerhans [Wed, 28 Sep 2016 05:22:05 +0000 (22:22 -0700)]
bind: Update to 9.9.9-p3 for CVE-2016-2776
Signed-off-by: Noah Meyerhans <[email protected]>
Zoltan HERPAI [Thu, 9 Nov 2017 19:59:27 +0000 (20:59 +0100)]
net/bind: PKG_RELEASE increased
Signed-off-by: DonkZZ <[email protected]>