Commit Graph

8600 Commits

Author SHA1 Message Date
Magnus Kessler
1a94de24a5 tailscale: update to version 1.24.2
Signed-off-by: Magnus Kessler <Magnus.Kessler@gmx.net>
(cherry picked from commit b557e9f0d1)
2022-11-07 12:48:21 +01:00
Wes Morgan
9e96244194 tailscale: update to 1.18.2
Signed-off-by: Wes Morgan <git@wesmorgan.me>
(cherry picked from commit efb908b032)
2022-11-07 12:47:45 +01:00
Tianling Shen
02bf1fd5b3 rclone: Update to 1.60.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 90e037b5e5)
2022-11-03 20:27:12 -07:00
Rosen Penev
f90a7c92da coova-chili: fix compilation with kernel 5.10
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit eba4abb65d)
2022-10-29 11:59:21 +02:00
Rosen Penev
1c2258e95f ptunnel-ng: fix compilation with kernel 5.15
Some header change requires to include musl's headers first.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 468863128f)
2022-10-29 06:47:58 +02:00
Rosen Penev
a91983bb2f coova-chilli: update to 1.6
Remove usptreamed patches.

Switch to AUTORELEASE for simplicity.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit c05077a499)
2022-10-29 06:40:47 +02:00
Rosen Penev
29cffa947d xtables-addons: update to 3.19
Fixes compilation with kernel 5.15.

Fixed changed binary name.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit e5af506795)
(cherry picked from commit 4a5633b6b5)
2022-10-29 05:57:55 +02:00
Christian Marangi
18aa13a251 atlas-probe: fix SIGSEGV error on 32bit system
Changes to time_t cause SIGSEGV error on 32bit system and cause ripe
atlas malfunction. (registration successful but no traffic)
Also introduce minor patch to fix some compilation warning.

While at it move PKG_RELEASE to AUTORELEASE macro.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
(cherry picked from commit 14c5dfe4c1)
2022-10-27 16:04:15 +02:00
Josef Schlehofer
480833d673 lighttpd: backport patch to fix dummy Sec-WebSocket-Key
It was requested in https://gitlab.nic.cz/turris/os/packages/-/issues/873

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit de49362d35)
2022-10-25 14:05:48 +02:00
Michal Vasilek
d16d6e58d2 ddns-scripts: fix cloudflare&digitalocean provides
Fixes mistake in dbe79e409d, the
cloudflare PROVIDES got mixed up with digitalocean.

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 001564ed83)
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
Remove PKG_RELEASE version bump
2022-10-18 15:52:26 +02:00
Michal Vasilek
687e137335 ddns-scripts: add PROVIDES for old package names
* ddns-scripts-services: provide ddns-scripts_service
* ddns-scripts-cloudflare: provide ddns-scripts_digitalocean.com-v2
* ddns-scripts-freedns: provide ddns-scripts_freedns_42_pl
* ddns-scripts-godaddy: provide ddns-scripts_godaddy.com-v1
* ddns-scripts-noip: provide ddns-scripts_no-ip_com
* ddns-scripts-nsupdate: provide ddns-scripts_nsupdate
* ddns-scripts-route53: provide ddns-scripts_route53-v1
* ddns-scripts-cnkuai: provide ddns-scripts_cnkuai_cn

https://github.com/openwrt/packages/pull/13509 renamed many ddns-scripts
packages, but didn't include a PROVIDES for the old package names to
make updates work well.

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit dbe79e409d)
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
Remove PKG_RELEASE version bump
2022-10-18 13:39:22 +02:00
Michal Vasilek
db71747697 tailscale: fix -version
tailscale version, tailscaled -version and the web UI reported the wrong
version number which doesn't cause any issues, but it can be confusing.

This is fixed by specifying the version in go ldflags similar to how
it's done in many other go packages and the official tailscale Dockerfile.

version.Long version can not be specified in GO_PKG_LDFLAGS_X because it
contains a space and GO_PKG_LDFLAGS_X is always split at a space.

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 738f44be4f)
2022-10-18 09:05:00 +02:00
Stijn Tintel
0b16e3f359 keepalived: fix build with IPVS disabled
The genhash binary is only built when IPVS is enabled, so make its
installation depend on IPVS being enabled.

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit 624d2278e7)
2022-10-15 14:23:39 +02:00
Florian Eckert
81af8d6703 keepalived: update to version 2.2.4
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 3f5b2d8cb3)
2022-10-15 14:23:15 +02:00
Florian Eckert
fba60ea134 keepalived: update to version 2.2.2
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit bdcb3d5905)
2022-10-15 14:23:09 +02:00
Petr Štetiar
a1d76d41c3 curl: error out if wolfSSL is not usable
When we explicitly declare, that we would like to have curl built with
wolfSSL support using `--with-wolfssl` configure option, then we should
make sure, that we either endup with curl having that support, or it
shouldn't be available at all, otherwise we risk, that we end up with
regressions like following:

  configure:25299: checking for wolfSSL_Init in -lwolfssl
  configure:25321: x86_64-openwrt-linux-musl-gcc -o conftest [snip]
  In file included from target-x86_64_musl/usr/include/wolfssl/wolfcrypt/dsa.h:33,
                   from target-x86_64_musl/usr/include/wolfssl/wolfcrypt/asn_public.h:35,
                  from target-x86_64_musl/usr/include/wolfssl/ssl.h:35,
                   from conftest.c:47:
  target-x86_64_musl/usr/include/wolfssl/wolfcrypt/integer.h:37:14: fatal error: wolfssl/wolfcrypt/sp_int.h: No such file or directory
       #include <wolfssl/wolfcrypt/sp_int.h>
                ^~~~~~~~~~~~~~~~~~~~~~~~~~~~
  compilation terminated.

and in the end thus produce curl without https support:

 curl: (1) Protocol "https" not supported or disabled in libcurl

So fix it, by making the working wolfSSL mandatory and error out in
configure step when that's not the case:

 checking for wolfSSL_Init in -lwolfssl... no
 configure: error: --with-wolfssl but wolfSSL was not found or doesn't work

References: #19005, #19547
Upstream-Status: Accepted [https://github.com/curl/curl/pull/9682]
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 9140f366ef)
2022-10-10 15:12:12 +00:00
Rosen Penev
f4cc6adcfe curl: fix compilation with wolfSSL
options.h header is needed after bump of libwolfssl to version 5.5.1,
otherwise libcurl autodetection for libwolfssl availability fails and
libcurl is then compiled without https support.

Fixes: #19547
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 317575755a)
(cherry picked from commit ef545e0317)
Signed-off-by: Petr Štetiar <ynezz@true.cz> [commit verbosity]
2022-10-07 14:23:46 +02:00
Petr Štetiar
5c73747ff6 Merge pull request #19536 from ynezz/ynezz/openwrt-21.02-wolfssl-CVE-2022-39173
[21.02] treewide: fix security issues by bumping all packages using libwolfssl
2022-10-06 13:34:38 +02:00
Nick Hainke
415118b6b3 tor: update to 0.4.7.10
Release Notes:
https://forum.torproject.net/t/urgent-stable-release-0-4-5-14-0-4-6-12-and-0-4-7-10

Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit b9cf0cdce6)
[fix commit title]
Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-10-05 23:31:28 +02:00
Petr Štetiar
c8447b8a38 treewide: fix security issues by bumping all packages using libwolfssl
As wolfSSL is having hard time maintaining ABI compatibility between
releases, we need to manually force rebuild of packages depending on
libwolfssl and thus force their upgrade. Otherwise due to the ABI
handling we would endup with possibly two libwolfssl libraries in the
system, including the patched libwolfssl-5.5.1, but still have
vulnerable services running using the vulnerable libwolfssl-5.4.0.

So in order to propagate update of libwolfssl to latest stable release
done in commit ec8fb542ec3e4 ("wolfssl: fix TLSv1.3 RCE in uhttpd by
using 5.5.1-stable (CVE-2022-39173)") which fixes several remotely
exploitable vulnerabilities, we need to bump PKG_RELEASE of all packages
using wolfSSL library.

Same bump has been done in buildroot in commit f1b7e1434f66 ("treewide:
fix security issues by bumping all packages using libwolfssl").

Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 845d81ca09)
(cherry picked from commit f624e41f38)
2022-10-05 21:37:47 +02:00
Karl Palsson
ac6980d6f3 mosquitto: bump to 2.0.15
Changelog: https://mosquitto.org/blog/2022/08/version-2-0-15-released/
Changelog: https://mosquitto.org/blog/2021/11/version-2-0-14-released/

2.0.15 is bigger security and bugfix release.  2.0.14 had a couple of
  minor changes and was skipped for OpenWrt.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2022-09-26 09:28:48 +00:00
Ptilopsis Leucotis
58befda000 mosquitto: add missing 'persistence' section in config
Section 'Persistence' in 'luci-app-mosquitto' is unusable without 'persistence'
section in config file.

Signed-off-by: Ptilopsis Leucotis <PtilopsisLeucotis@yandex.com>
2022-09-26 09:28:25 +00:00
Noah Meyerhans
894e2763ac bind: bump to 9.18.7
Fixes multiple security issues:

CVE-2022-38178 - Fix memory leak in EdDSA verify processing

CVE-2022-3080 - Fix serve-stale crash that could happen when
			stale-answer-client-timeout was set to 0 and there was
			a stale CNAME in the cache for an incoming query

CVE-2022-2906 - Fix memory leaks in the DH code when using OpenSSL 3.0.0
			and later versions. The openssldh_compare(),
			openssldh_paramcompare(), and openssldh_todns()
			functions were affected

CVE-2022-2881 - When an HTTP connection was reused to get
			statistics from the stats channel, and zlib
			compression was in use, each successive
			response sent larger and larger blocks of memory,
			potentially reading past the end of the allocated
			buffer

CVE-2022-2795 - Prevent excessive resource use while processing large
			delegations

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit 58bcd3fad3)
2022-09-23 18:06:44 -07:00
Glenn Strauss
f3ab672f40 lighttpd: update to lighttpd 1.4.67 release hash
* update to lighttpd 1.4.67 release hash

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
(cherry picked from commit f750089d26)
2022-09-23 13:42:24 -07:00
Glenn Strauss
c7e8e074d0 lighttpd: update to lighttpd 1.4.66 release hash
* update to lighttpd 1.4.66 release hash

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
(cherry picked from commit 5eaf000c83)
2022-09-23 13:42:24 -07:00
Michal Vasilek
79fc23ce05 knot-resolver: update to 5.5.3
* fixes CVE-2022-40188

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 5d2fd88693)
2022-09-23 00:43:29 +02:00
Jan Hák
0e72180bb2 knot: update to version 3.2.1
Signed-off-by: Jan Hák <jan.hak@nic.cz>
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 023df0992a)
2022-09-19 13:43:56 +02:00
Rafał Miłecki
d7c47ba5ed ksmbd-tools: add package with hotplug.d script for auto sharing
One of common use cases for SMB3 server in routers is sharing hotplugged
drives. Users make many attempts setting that up which often are not
optimal.

This script handles it in the cleanest way by using:
1. hotplug.d mount subsystem
2. runtime config in the /var/run/config/

It provides a working basic solution that can be later adjusted by
modifying provided hotplug script.

A pretty much idential solution was part of the samba36 package. It was
added in the OpenWrt commit ef1efa756e0d0 ("samba36: add package with
hotplug.d script for auto sharing") as an answer for feature required by
the Rosinson company.

Cc: Jo-Philipp Wich <jo@mein.io>
Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
(cherry picked from commit d0406d4c95)
2022-09-10 16:05:51 +02:00
Rafał Miłecki
065ea581b8 ksmbd-tools: append config from /var/run/config/ for runtime shares
Dynamically created shares shouldn't be stored in the /etc/config/
because of:
1. Flash wearing
2. Risk of inconsistent state on reboots

With this change all automation/hotplug.d scripts can store runtime in
the /var/run/config/samba. It's useful e.g. for USB drives that user
wants to be automatically shared.

Also: automated scripts should never call "uci [foo] commit" as that
could flush incomplete config. This problem also gets solved.

Identical feature was added to samba36 in the OpenWrt commit
5a59e2c059866 ("samba36: append config from /var/run/config/ for runtime
shares") but wasn't ported to ksmbd until now.

Cc: Jo-Philipp Wich <jo@mein.io>
Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
(cherry picked from commit c9cba61989)
2022-09-10 16:05:36 +02:00
Josef Schlehofer
51077c1094 Merge pull request #19219 from ErwanMAS/backport_modifications_master
tinc: backport  from master modifications
2022-08-30 16:17:20 +02:00
Erwan MAS
b9f45b9ded tinc: add creation of hosts directory for each network configuration
Signed-off-by: Erwan MAS <erwan@mas.nom.fr>
(cherry picked from commit fb99d50c1e)
2022-08-30 10:50:56 +02:00
Etienne Champetier
4af55248a4 tinc: use 'uci_get_state' instead of 'uci -P /var/state get'
Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
(cherry picked from commit 440d3c0450)
2022-08-30 10:50:46 +02:00
Jan Hák
0e633485cf knot: update to version 3.2.0
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 74e2bfdd27)
2022-08-22 14:23:21 +02:00
Marko Ratkaj
edf1bf7ef0 squid: bump to 4.17
Signed-off-by: Marko Ratkaj <markoratkaj@gmail.com>
(cherry picked from commit 15132b85b7)
2022-08-21 19:28:48 +02:00
Rosen Penev
2fed0daa7f squid: update to 4.16
Fixes compilation with GCC11.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit ad4c04283e)
2022-08-21 19:28:44 +02:00
Fabian Lipken
8b198ed582 dnscrypt-proxy2: update to version 2.1.2
Signed-off-by: Fabian Lipken <dynasticorpheus@gmail.com>
(cherry picked from commit 2c617bbe22)
2022-08-21 16:31:56 +02:00
Tianling Shen
7c4018dcf1 rclone: Update to 1.59.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 5c4b54de56)
2022-08-18 19:53:29 -07:00
Jan Hák
4740fd060b knot: update to 3.1.9
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 39a08a7aaf)
2022-08-17 23:28:26 +02:00
Liangbin Lian
5b5685f90a rclone: fix init script on CIDR format ipaddr
Signed-off-by: Liangbin Lian <jjm2473@gmail.com>
(cherry picked from commit 7af716f12d)
2022-08-13 11:35:14 +02:00
Lucian Cristian
baad17e96f libreswan: update to 4.6
this update also fixes a CVE

Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
(cherry picked from commit ec252c20cc)
2022-08-12 05:49:20 +02:00
Lucian Cristian
f47ecdc42f libreswan: update to 4.5
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
(cherry picked from commit b2efa063d2)
2022-08-12 05:49:12 +02:00
Jo-Philipp Wich
b6b777ef5b cgi-io: update to latest Git HEAD
901b0f0 main: fix two one-byte overreads in header_value()

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
(cherry picked from commit 443c6c1c17)
2022-08-10 23:54:52 +02:00
ZiMing Mo
2b03f2baef rclone: update to 1.59.0
Release note: https://rclone.org/changelog/#v1-59-0-2022-07-09

Signed-off-by: ZiMing Mo <msylgj@immortalwrt.org>
(cherry picked from commit 05df1fe4f1)
2022-08-03 20:33:27 +02:00
Rosen Penev
ca85d7742d ksmbd-tools: update to 3.4.5
Major changes are:

Add support for Heimdal as the Kerberos 5 implementation.
Add smbd max io size parameter.
Accept global share options.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-08-02 11:01:06 +02:00
Rosen Penev
9c6950e518 ksmbd-tools: update to 3.4.4
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-08-02 11:01:06 +02:00
Fritz D. Ansel
a5c7be289f ksmbd: set stoplevel
to allow graceful stop of the daemon

Signed-off-by: Fritz D. Ansel <fdansel@yandex.ru>
(cherry picked from commit 28ed2b82c5)
2022-08-02 11:01:06 +02:00
Jan Hák
5e6363ada4 knot: update to 3.1.8
- Release notes:
https://www.knot-dns.cz/2022-04-28-version-318.html

- Refreshed patch to avoid offset

Signed-off-by: Jan Hák <jan.hak@nic.cz>
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
[added commit message, refresh patch]
(cherry picked from commit db12181940)
2022-07-25 16:49:26 +02:00
Nick Hainke
40d9e5a45c dawn: update to 2022-07-24
edca4d2 network: rework network status callbacks

Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit 28ca76d29b)
2022-07-24 13:18:21 +02:00
Nick Hainke
0c15d77f89 dawn: update to 2022-07-22
10fb043 network: dump detail on ping pong received

Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit 1f60c23296)
2022-07-22 21:55:07 +02:00
Nick Hainke
412a04b488 dawn: update to 2022-07-21
bb362db datastorage: fix ap_array_unlink_entry always returns NULL
47e98ef network: ping pong keepalive for tcp connections
eba0354 network: add timeout for client connections

In the dawn config the con_timeout needs to be added:
  option con_timeout '60'

Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit 204fd77bbc)
2022-07-21 18:45:49 +02:00