<feed xmlns='http://www.w3.org/2005/Atom'>
<title>staging/xback, branch v17.01.3</title>
<subtitle>Staging tree of Koen Vandeputte</subtitle>
<id>https://git.openwrt.org/openwrt/staging/xback/atom?h=v17.01.3</id>
<link rel='self' href='https://git.openwrt.org/openwrt/staging/xback/atom?h=v17.01.3'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/xback/'/>
<updated>2017-10-03T12:10:53Z</updated>
<entry>
<title>LEDE v17.01.3: adjust config defaults</title>
<updated>2017-10-03T12:10:53Z</updated>
<author>
<name>Stijn Tintel</name>
</author>
<published>2017-10-03T12:10:53Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/xback/commit/?id=df54a8f583a9afad356fb99a575d75b69c8c0dd4'/>
<id>urn:sha1:df54a8f583a9afad356fb99a575d75b69c8c0dd4</id>
<content type='text'>
Signed-off-by: Stijn Tintel &lt;stijn@linux-ipv6.be&gt;
</content>
</entry>
<entry>
<title>uhttp: update to latest version</title>
<updated>2017-10-03T11:03:27Z</updated>
<author>
<name>Adrian Panella</name>
</author>
<published>2017-09-12T18:29:09Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/xback/commit/?id=d0bf257c46aae0b0d2567c10d6c28c3b2d857f08'/>
<id>urn:sha1:d0bf257c46aae0b0d2567c10d6c28c3b2d857f08</id>
<content type='text'>
3fd58e9 2017-08-19 uhttpd: add manifest support
88c0b4b 2017-07-09 file: fix basic auth regression
99957f6 2017-07-02 file: remove unused "auth" member from struct
path_info
c0a569d 2017-07-02 proc: expose HTTP_AUTH_USER and HTTP_AUTH_PASS
ad93be7 2017-07-02 auth: store parsed username and password
fa51d7f 2017-07-02 proc: do not declare empty process variables
a8bf9c0 2017-01-26 uhttpd: Add TCP_FASTOPEN support
e6cfc91 2016-10-25 lua: ensure that PATH_INFO starts with a slash

Signed-off-by: Adrian Panella &lt;ianchi74@outlook.com&gt;
</content>
</entry>
<entry>
<title>odhcpd: don't enable server mode on non-static lan port</title>
<updated>2017-10-02T16:51:17Z</updated>
<author>
<name>Karl Palsson</name>
</author>
<published>2017-09-01T11:22:11Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/xback/commit/?id=783465d783b17a66b37e6dd7db732244e30e6913'/>
<id>urn:sha1:783465d783b17a66b37e6dd7db732244e30e6913</id>
<content type='text'>
Instead of blindly enabling the odhcpd v6 server and RA server on the
lan port, only do that if the lan port protocol is "static"

This prevents the unhelpful case of a device being a dhcpv4 client and
v6 server on the same ethernet port.

Signed-off-by: Karl Palsson &lt;karlp@etactica.com&gt;
[PKG_SOURCE_DATE increase; odhcpd.defaults script cleanup]
Signed-off-by: Hans Dedecker &lt;dedeckeh@gmail.com&gt;
</content>
</entry>
<entry>
<title>odhcpd: backport fixes from master branch (FS#402, FS#524)</title>
<updated>2017-10-02T16:46:24Z</updated>
<author>
<name>Hans Dedecker</name>
</author>
<published>2017-10-02T16:41:34Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/xback/commit/?id=c92c1894a53e034661bd4790328ca2ae764581e2'/>
<id>urn:sha1:c92c1894a53e034661bd4790328ca2ae764581e2</id>
<content type='text'>
336212c config: fix dhcpv4 server being started
336212c dhcpv6: assign all viable DHCPv6 addresses by default (FS#402, FS#524)

Signed-off-by: Hans Dedecker &lt;dedeckeh@gmail.com&gt;
</content>
</entry>
<entry>
<title>dnsmasq: bump to v2.78</title>
<updated>2017-10-02T16:36:21Z</updated>
<author>
<name>Kevin Darbyshire-Bryant</name>
</author>
<published>2017-10-02T14:28:32Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/xback/commit/?id=4b4a4af814e1602f7ef12c5d07ff15c4fa2570ca'/>
<id>urn:sha1:4b4a4af814e1602f7ef12c5d07ff15c4fa2570ca</id>
<content type='text'>
Fixes CVE-2017-14491, CVE-2017-14492, CVE-2017-14493, CVE-2017-14494, 2017-CVE-14495, 2017-CVE-14496

Signed-off-by: Kevin Darbyshire-Bryant &lt;ldir@darbyshire-bryant.me.uk&gt;
</content>
</entry>
<entry>
<title>base-files: create /etc/config/ directory</title>
<updated>2017-10-01T08:52:14Z</updated>
<author>
<name>Hauke Mehrtens</name>
</author>
<published>2017-09-30T11:50:44Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/xback/commit/?id=b8357e87d7cbc73e19073b4b8cd749e46e6b7fc2'/>
<id>urn:sha1:b8357e87d7cbc73e19073b4b8cd749e46e6b7fc2</id>
<content type='text'>
The /bin/config_generate script and some other scripts are assuming the
/etc/config directory exists in the image. This is true in case for
example the package firewall, dropbear or dnsmasq are included, which
are adding the files under /etc/config/. Without any of these package
the system will not boot up fully because the /etc/config/ directory is
missing and some init scripts just fail.

Make sure all images with the base-files contain a /etc/config/
directory.

Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
Acked-by: John Crispin &lt;john@phrozen.org&gt;
</content>
</entry>
<entry>
<title>sunxi: clean up modules definitions</title>
<updated>2017-10-01T08:04:12Z</updated>
<author>
<name>Matthias Schiffer</name>
</author>
<published>2017-05-04T05:00:06Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/xback/commit/?id=3350137bd3db25a24ebba62835333a456cc448b2'/>
<id>urn:sha1:3350137bd3db25a24ebba62835333a456cc448b2</id>
<content type='text'>
Module definitions for kmod-wdt-sunxi and kmod-eeprom-sunxi are removed
(wdt-sunxi was builtin anyways; nvmem-sunxi, which is the new name of
eeprom-sunxi is changed to builtin). As kmod-eeprom-sunxi was specified
in DEFAULT_PACKAGES, but not available on kernel 4.4, it was breaking the
image builder.

Support for kmod-sunxi-ir is added for kernel 4.4 (it is unclear why it
was disable before, it builds fine with with kernel 4.4).

Condtionals only relevant for pre-4.4 kernels are removed from modules.mk,
as sunxi does't support older kernels anymore.

Fixes FS#755.

Signed-off-by: Matthias Schiffer &lt;mschiffer@universe-factory.net&gt;
</content>
</entry>
<entry>
<title>ltq-vdsl-mei: revert disable optimized firmware download</title>
<updated>2017-09-30T18:37:33Z</updated>
<author>
<name>Mathias Kresin</name>
</author>
<published>2017-09-29T06:45:13Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/xback/commit/?id=a881323cb2e78c9f25935f6ae90feaaf5606969e'/>
<id>urn:sha1:a881323cb2e78c9f25935f6ae90feaaf5606969e</id>
<content type='text'>
This reverts commit b428f45c062dc8ca8c2f35f491fa467dc5b85519.

If the optimized firmware download is disabled, the xdsl subsystem
hangs in the "idle request" state after physically disconnecting and
reconnecting the xdsl modem from the line.

It might fix the failing line init on boot as well.

Signed-off-by: Mathias Kresin &lt;dev@kresin.me&gt;
</content>
</entry>
<entry>
<title>curl: fix security problems</title>
<updated>2017-09-30T13:27:29Z</updated>
<author>
<name>Hauke Mehrtens</name>
</author>
<published>2017-09-30T13:23:07Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/xback/commit/?id=f483a35f08741ff0ca373236e6ad1d93edb1ba75'/>
<id>urn:sha1:f483a35f08741ff0ca373236e6ad1d93edb1ba75</id>
<content type='text'>
This fixes the following security problems:
 * CVE-2017-1000100 TFTP sends more than buffer size
 * CVE-2017-1000101 URL globbing out of bounds read

Signed-off-by: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
</content>
</entry>
<entry>
<title>mbedtls: update to 2.6.0 CVE-2017-14032</title>
<updated>2017-09-30T13:24:52Z</updated>
<author>
<name>Kevin Darbyshire-Bryant</name>
</author>
<published>2017-09-01T18:04:29Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/xback/commit/?id=e232c6754d6e0cbde3892aa1fa243f4707d7ad5e'/>
<id>urn:sha1:e232c6754d6e0cbde3892aa1fa243f4707d7ad5e</id>
<content type='text'>
Fixed an authentication bypass issue in SSL/TLS. When the TLS
authentication mode was set to 'optional',
mbedtls_ssl_get_verify_result() would incorrectly return 0 when the
peer's X.509 certificate chain had more than
MBEDTLS_X509_MAX_INTERMEDIATE_CA intermediates (default: 8), even when
it was not trusted. This could be triggered remotely on both the client
and server side. (Note, with the authentication mode set by
mbedtls_ssl_conf_authmode()to be 'required' (the default), the handshake
was correctly aborted).

Signed-off-by: Kevin Darbyshire-Bryant &lt;kevin@darbyshire-bryant.me.uk&gt;
Tested-by: Magnus Kroken &lt;mkroken@gmail.com&gt;
</content>
</entry>
</feed>
