- May 25, 2017
-
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Giuseppe Lippolis authored
This PR allow the 3G modem embedded in the DWR-512 to be managed by the wwan-ncm scripts. The modem will use the usb-option and usb-cdc-ether drivers. The DWR-512 DT is updated accordingly. Signed-off-by:
Giuseppe Lippolis <giu.lippolis@gmail.com>
-
- May 18, 2017
-
-
Giuseppe Lippolis authored
some modems needs to be enabled with CFUN=1 before to set the pin Signed-off-by:
Giuseppe Lippolis <giu.lippolis@gmail.com>
-
- May 16, 2017
-
-
Daniel Engberg authored
Update curl to 7.54.0 Update and fresh patches Signed-off-by:
Daniel Engberg <daniel.engberg.lists@pyret.net>
-
Daniel Engberg authored
Update ipset to 6.32 Signed-off-by:
Daniel Engberg <daniel.engberg.lists@pyret.net>
-
- May 02, 2017
-
-
Yousong Zhou authored
Signed-off-by:
Yousong Zhou <yszhou4tech@gmail.com>
-
Yousong Zhou authored
They will not be in conflict anymore ;) Signed-off-by:
Yousong Zhou <yszhou4tech@gmail.com>
-
- Apr 22, 2017
-
-
Ansuel Smith authored
The dep for the nftables support was wrong, if someone actually enable that option gain a compilation error. This fix this problem. Signed-off-by:
Ansuel Smith <ansuelsmth@gmail.com>
-
- Apr 12, 2017
-
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Ansuel Smith authored
Switch to git repo Removed musl patch Refreshed existing patch Signed-off-by:
Ansuel Smith <ansuelsmth@gmail.com> Signed-off-by: Felix Fietkau <nbd@nbd.name> [cleanup]
-
- Apr 08, 2017
-
-
Hans Dedecker authored
Commit f4e312dd adds libnetlink to staging dir but did not add the header files libgenl.h and ll_map.h which define functions belonging to libnetlink lib Signed-off-by:
Hans Dedecker <dedeckeh@gmail.com>
-
- Mar 25, 2017
-
-
Matthias Schiffer authored
Make scan output useful for 802.11s meshes. The common print_ssid function is used, so this doesn't add any additional code. Based-on-patch-by:
Jan-Tarek Butt <tarek@ring0.de> Signed-off-by:
Matthias Schiffer <mschiffer@universe-factory.net>
-
- Mar 22, 2017
-
-
Daniel Engberg authored
Add actual mirror and use main site as last resport Source: http://www.tcpdump.org/mirrors.html Signed-off-by:
Daniel Engberg <daniel.engberg.lists@pyret.net>
-
- Mar 20, 2017
-
-
Daniel Engberg authored
Update iperf3 to 3.1.7 Signed-off-by:
Daniel Engberg <daniel.engberg.lists@pyret.net>
-
- Mar 19, 2017
-
-
Yousong Zhou authored
The bug appeared in v4.1.0 and was fixed since v4.8.0 Fixes FS#620 Signed-off-by:
Yousong Zhou <yszhou4tech@gmail.com>
-
- Mar 15, 2017
-
-
Daniel Engberg authored
Update mirror list, add main site as last resort Source: https://github.com/curl/curl-www/blob/master/latest.pl Signed-off-by:
Daniel Engberg <daniel.engberg.lists@pyret.net>
-
- Mar 14, 2017
-
-
Felix Fietkau authored
Do not run another loop iteration before checking the stop flag Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
- Mar 13, 2017
-
-
Hauke Mehrtens authored
This fixes the following security problem: * CVE-2017-2629 SSL_VERIFYSTATUS ignored Signed-off-by:
Hauke Mehrtens <hauke@hauke-m.de>
-
- Mar 12, 2017
-
-
Felix Fietkau authored
The kernel unconditionally pulls in a header file that defines 'current', which conflicts with the lua extension code. Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
- Mar 02, 2017
-
-
Florian Fainelli authored
Pass down TARGET_CPPFLAGS for path to header files, and append the libraries we depend on in TARGET_LDFLAGS. Put TARGET_LDFLAGS at the end of the command line as is required by modern GCC/binutils. Signed-off-by:
Florian Fainelli <f.fainelli@gmail.com>
-
- Feb 28, 2017
-
-
Hsing-Wang Liao authored
Signed-off-by:
Hsing-Wang Liao <kuoruan@gmail.com>
-
- Feb 26, 2017
-
-
Kevin Darbyshire-Bryant authored
Drops a LEDE carried patch now upstream. Convert to autotools. A number of nits fixed upstream (dns & short packet handling most notable) Signed-off-by:
Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
-
- Feb 24, 2017
-
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
- Feb 15, 2017
-
-
Ansuel Smith authored
Refreshed patches Signed-off-by:
Ansuel Smith <ansuelsmth@gmail.com>
-
- Feb 11, 2017
-
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
- Feb 09, 2017
-
-
Daniel Engberg authored
Update to 3.1.6 Signed-off-by:
Daniel Engberg <daniel.engberg.lists@pyret.net>
-
- Feb 06, 2017
-
-
Hauke Mehrtens authored
This fixes the following 41 security problems: + CVE-2016-7922: buffer overflow in print-ah.c:ah_print(). + CVE-2016-7923: buffer overflow in print-arp.c:arp_print(). + CVE-2016-7924: buffer overflow in print-atm.c:oam_print(). + CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print(). + CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print(). + CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print(). + CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print(). + CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header(). + CVE-2016-7930: buffer overflow in print-llc.c:llc_print(). + CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print(). + CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum(). + CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print(). + CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print(). + CVE-2016-7935: buffer overflow in print-udp.c:rtp_print(). + CVE-2016-7936: buffer overflow in print-udp.c:udp_print(). + CVE-2016-7937: buffer overflow in print-udp.c:vat_print(). + CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame(). + CVE-2016-7939: buffer overflow in print-gre.c, multiple functions. + CVE-2016-7940: buffer overflow in print-stp.c, multiple functions. + CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions. + CVE-2016-7974: buffer overflow in print-ip.c, multiple functions. + CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print(). + CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print(). + CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print(). + CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print(). + CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions. + CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print(). + CVE-2016-7993: a bug in util-print.c:relts_print() could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM). + CVE-2016-8574: buffer overflow in print-fr.c:frf15_print(). + CVE-2016-8575: buffer overflow in print-fr.c:q933_print(). + CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print(). + CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print(). + CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print(). + CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print(). + CVE-2017-5341: buffer overflow in print-otv.c:otv_print(). + CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print(). + CVE-2017-5482: buffer overflow in print-fr.c:q933_print(). + CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse(). + CVE-2017-5484: buffer overflow in print-atm.c:sig_print(). + CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap(). + CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print(). The size of the package is only incread very little: new size: 306430 tcpdump_4.9.0-1_mips_24kc.ipk 130324 tcpdump-mini_4.9.0-1_mips_24kc.ipk old size: 302782 tcpdump_4.8.1-1_mips_24kc.ipk 129033 tcpdump-mini_4.8.1-1_mips_24kc.ipk Signed-off-by:
Hauke Mehrtens <hauke@hauke-m.de>
-
- Feb 01, 2017
-
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
- Jan 30, 2017
-
-
Kevin Darbyshire-Bryant authored
Updated cake's tc patch to match the official cake repository formatting. Signed-off-by:
Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
-
- Jan 26, 2017
-
-
Kevin Darbyshire-Bryant authored
Add 'mpu' minimum length packet size parameter for scheduling/bandwidth accounting. Signed-off-by:
Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
-
- Jan 16, 2017
-
-
Stijn Segers authored
Backport an upstream change to fix HTTPS timeouts with OpenSSL. Upstream curl bug #1174. Signed-off-by:
Stijn Segers <francesco.borromini@inventati.org> [Jo-Philipp Wich: reword commit message, rename patch to 001-*] Signed-off-by:
Jo-Philipp Wich <jo@mein.io>
-
- Jan 13, 2017
-
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
- Jan 11, 2017
-
-
Felix Fietkau authored
This reverts the following commits: fbe522d1 278ad007 863888e4 96daf635 cfd83555 This seems to trigger some mconf bugs when built with all feeds packages, so I will try to find a less intrusive solution before the release. Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
- Jan 10, 2017
-
-
Stijn Tintel authored
Signed-off-by:
Stijn Tintel <stijn@linux-ipv6.be> Acked-by:
Jo-Philipp Wich <jo@mein.io>
-
- Jan 05, 2017
-
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-