Skip to content
Snippets Groups Projects
  1. Mar 02, 2017
  2. Feb 28, 2017
  3. Feb 26, 2017
  4. Feb 25, 2017
  5. Feb 24, 2017
  6. Feb 23, 2017
    • Hans Dedecker's avatar
      odhcpd: update to git HEAD version (FS#397) (FS#481) · ea24d87e
      Hans Dedecker authored
      
      1b630f8 router: don't announce prefixes with valid lifetime equal to 0
      ba0cac0 router: fix arithmetic exception fault
      3495f17 router: allow RA prefix lifetime being set to leasetime value (FS#397)
      e437ce9 treewide: simplify dhcp leasetime checking
      942fb33 router: support ra_mininterval and ra_lifetime uci parameters (FS#397)
      f913337 router.h: fix alignment style
      4dc7edb Revert "odhcpd.h: fix alignment style"
      62ea54f odhcpd.h: fix alignment style
      a898ee5 config: make loglevel configurable via uci (FS#481)
      51c756c odhcpd: display correct default log level in usage text
      68ee0b5 treewide: define and use macro IN6_IS_ADDR_ULA
      fa57225 ndp: deregister netlink event socket for non recoverable errors
      ac70d28 odhcpd: fix white space errors
      
      Signed-off-by: default avatarHans Dedecker <dedeckeh@gmail.com>
      ea24d87e
    • Ben Kelly's avatar
      swconfig: Bugfix switch_port uci option parsing · df9e7b1b
      Ben Kelly authored
      
      When not defining 'device' or 'vlan' in relevant switch_port uci
      sections, behaviour is inconsistent due to *devn, *port and *vlan
      pointers not being zero initialized.
      
      Signed-off-by: default avatarBen Kelly <ben@benjii.net>
      df9e7b1b
    • Felix Fietkau's avatar
      netifd: fix stopping netifd + interfaces · 942ac18c
      Felix Fietkau authored
      
      stop() is overwritten by rc.common, so implement stop_service instead.
      While at it, remove the now unnecessary restart() override
      
      Signed-off-by: default avatarFelix Fietkau <nbd@nbd.name>
      942ac18c
  7. Feb 22, 2017
  8. Feb 20, 2017
  9. Feb 19, 2017
  10. Feb 17, 2017
  11. Feb 15, 2017
  12. Feb 13, 2017
  13. Feb 12, 2017
  14. Feb 11, 2017
  15. Feb 10, 2017
  16. Feb 09, 2017
  17. Feb 08, 2017
  18. Feb 06, 2017
    • Hauke Mehrtens's avatar
      tcpdump: update to version 4.9.0 · 985c90d1
      Hauke Mehrtens authored
      
      This fixes the following 41 security problems:
       + CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
       + CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
       + CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
       + CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
       + CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
       + CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print().
       + CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
       + CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
       + CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
       + CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
       + CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
       + CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
       + CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
       + CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
       + CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
       + CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
       + CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
       + CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
       + CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
       + CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
       + CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
       + CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
       + CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
       + CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
       + CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
       + CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
       + CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
       + CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
            buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
            lightweight resolver protocol, PIM).
       + CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
       + CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
       + CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
       + CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
       + CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
       + CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
       + CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
       + CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
            OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
            print-ether.c:ether_print().
       + CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
       + CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
       + CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
       + CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
       + CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
      
      The size of the package is only incread very little:
      new size:
      306430 tcpdump_4.9.0-1_mips_24kc.ipk
      130324 tcpdump-mini_4.9.0-1_mips_24kc.ipk
      
      old size:
      302782 tcpdump_4.8.1-1_mips_24kc.ipk
      129033 tcpdump-mini_4.8.1-1_mips_24kc.ipk
      
      Signed-off-by: default avatarHauke Mehrtens <hauke@hauke-m.de>
      985c90d1
  19. Feb 05, 2017
  20. Feb 03, 2017
  21. Feb 01, 2017
    • Hannu Nyman's avatar
      ccache, samba36: fix samba.org addresses to use https · eaf3fef9
      Hannu Nyman authored
      
      samba.org has started to enforce https and
      currently plain http downloads with curl/wget fail,
      so convert samba.org download links to use https.
      
      Modernise links at the same time.
      
      Also convert samba.org URL fields to have https.
      
      Signed-off-by: default avatarHannu Nyman <hannu.nyman@iki.fi>
      eaf3fef9
    • Eric Luehrsen's avatar
      dnsmasq: make DHCPv6 viable for standalone dnsmasq install · 9525743c
      Eric Luehrsen authored
      
      dnsmasq has sufficient services to meet the needs of DHCP
      and RA with IP6 for single router router users. This is
      the most common use for consumer routers. Its reenforced
      as most ISP tend to only DHCP-PD /64. dnsmasq has year
      over year demonstrated great flexibility in its option
      set, and support for off-standard DHCP clients.
      
      odhcpd has enhanced capabilities focused on IP6 such
      as DHCP/RA relay and NDP proxy. However, it is not as
      flexible in its option set. odhcpd is not as forgiving
      with off-standard DHCP clients. Some points may represent
      a long term TODO list, but it is the state currently.
      
      These changes make any such combination possible. Already
      odhcpd can be set as the main dhcp server. Now odhcpd
      can be removed or disabled and dnsmasq will take over
      if DHCPv6 compiled in. The existing DHCPv6 and RA UCI
      are translated into dnsmasq.conf. The changes focus on
      '--dhcp-range', '--dhcp-host', and '--dhcp-options'.
      
      DHCP host ID is least 16 bits [::1000-::FFFF], but
      leaves low range for typical infrastructure assignments.
      dnsmasq accepts DHCPv6 options in the tranditional
      '--dhcp-option' put they must be prefixed 'option6:'.
      dnsmasq will also discover SLAAC DNS entries from DHCPv4
      clients MAC, and confirm with a ping at least renew.
      
      Long term TODO include improving use of dnsmasq relay
      options for DHCPv4 and DHCPv6 in parallel. It would also
      be possible to preconfigure DHCP-PD in host-with-options
      records for fixed infrastructure.
      
      Signed-off-by: default avatarEric Luehrsen <ericluehrsen@hotmail.com>
      [Jo-Philipp Wich: emit proper IPv6 hostid format in dhcp-host directive]
      Signed-off-by: default avatarJo-Philipp Wich <jo@mein.io>
      9525743c
    • Eric Luehrsen's avatar
      dnsmasq: expand 'add_local_hostname' fexibility including FQDN · 1b4e3eda
      Eric Luehrsen authored
      
      ref commit 612e2276
      ref commit ec63e3bf
      
      'option add_local_hostname' scripted implementation statically assigns
      this host in auto generated host file at init. If IFUP or other signals
      do not occur, then address changes are not tracked. The script doesn't
      apply all the addresses at an interface. This may make logs obscure.
      The script only puts the bare host name (maybe not FQDN) in host file,
      but if '--exapandhosts' is enabled, then /etc/hosts entries will be
      suffixed, and "127.0.0.1 localhost" becomes "localhost.lan".
      
      dnsmasq provides an option to perform this function, but it is rather
      greedy. '--interface-name=<name>,<iface>' will assign the name to all
      IP on the specified interface (except link local). This is a useful
      feature, but some setups depend on the original restrictive behavior.
      
      'option add_local_fqdn' is added to enhance the feature set, but
      if not entered or empty string, then it will default to original
      option and behavior. This new option has a few settings. At each
      increased setting the most detailed name becomes the PTR record:
      0 - same as add_local_hostname 0 or disabled
      1 - same as add_local_hostname 1
      2 - assigns the bare host name to all IP w/ --dnsmasq-interface
      3 - assigns the FQDN and host to all IP w/ --dnsmasq-interface
      4 - assigns <iface>.<host>.<domain> and above w/ --dnsmasq-nterface
      
      'option add_wan_fqdn' is added to run the same procedure on
      inferred WAN intefaces. If an interface has 'config dhcp' and
      'option ignore 1' set, then it is considered WAN. The original
      option would only run on DHCP serving interfaces.
      
      Signed-off-by: default avatarEric Luehrsen <ericluehrsen@hotmail.com>
      1b4e3eda
    • Hans Dedecker's avatar
      odhcp6c: fix PKG_SOURCE_URL · 26923ab1
      Hans Dedecker authored
      
      Signed-off-by: default avatarHans Dedecker <dedeckeh@gmail.com>
      26923ab1
Loading