Commit Graph

28040 Commits

Author SHA1 Message Date
Tianling Shen
2fd3caba44 Merge pull request #22084 from jefferyto/golang-1.19.13-openwrt-22.03
[openwrt-22.03] golang: Update to 1.19.13
2023-09-11 09:55:44 +08:00
Jeffery To
ef6064771b golang: Update to 1.19.13
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-09-11 04:06:34 +08:00
Jeffery To
99f9e68f7b python3: Update to 3.10.13
Includes fix for CVE-2023-40217 (Bypass TLS handshake on closed
sockets).

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-09-08 19:01:59 +08:00
Liangbin Lian
9f1f0665ca transmission: add syscalls to seccomp filter
Add missing syscalls found using `/etc/init.d/transmission trace`.

fix crash on adding torrent on x86_64 platform

Signed-off-by: Liangbin Lian <jjm2473@gmail.com>
2023-09-07 19:26:48 -07:00
Moritz Warning
f88ff7f861 zerotier: update to 1.12.1
* split up "fix makefile" patch logical distinct parts
* add libatomic dependency needed for prometheus-cpp-lite-1.0
* refresh patch series
* improve warning message in init script

Signed-off-by: Moritz Warning <moritzwarning@web.de>
(cherry picked from commit 6cf39ba626)
2023-09-04 14:30:32 +08:00
Oskari Rauta
419374b406 zerotier: do not allow executable stack
zerotier as default has executable stack.
[   11.343143] process '/usr/bin/zerotier-one' started with executable stack

executable stacks are not recommend, possibly provide a threat and there
seems to be no advantage of executable stack with zerotier-one - so let's
build it without instead.

Stack is executable on x86_64, but not on all archs, such as ramips.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
(cherry picked from commit 56f30520f2)
2023-09-04 14:30:32 +08:00
Moritz Warning
41048a79f9 zerotier: update to 1.10.4
Signed-off-by: Moritz Warning <moritzwarning@web.de>
(cherry picked from commit b5cde91594)
2023-09-04 14:30:32 +08:00
Jan Hoffmann
1657fdb869 vnstat2: update to version 2.11
This release breaks the noexit patch, because the code for removing old
now returns an error when no interfaces are configured. As it is run on
startup, the daemon exits in this case. To avoid this, add an additional
check so an error is only returned in an actual error case.

Signed-off-by: Jan Hoffmann <jan@3e8.eu>
(cherry picked from commit 9871979707)
2023-09-04 14:30:05 +08:00
Jan Hoffmann
fc76c3e9fe vnstat2: update to version 2.10
Signed-off-by: Jan Hoffmann <jan@3e8.eu>
(cherry picked from commit 4edbd1afe7)
2023-09-04 14:30:05 +08:00
Stan Grishin
708ec95903 Merge pull request #22018 from stangri/openwrt-22.03-https-dns-proxy
[22.03] https-dns-proxy: fix dns resolution not working on boot
2023-09-03 18:03:07 -07:00
Stan Grishin
8819ac9f48 https-dns-proxy: fix dns resolution not working on boot
* fix dns resolution not working on boot
* add hotplug-online script
* reorganizes files/ and Makefile to reflect files destinations

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 9a2c5ae18c)
2023-09-03 20:37:46 +00:00
Leon M. Busch-George
4e2cd2ced5 wget: use pcre2
Pcre (1) is unmaintained and reached its end of life in 2021.
The base system provides pcre2 exclusively since May.

Signed-off-by: Leon M. Busch-George <leon@georgemail.eu>
(cherry picked from commit 379946951c)
2023-09-03 10:52:06 +02:00
Josef Schlehofer
5800425cb0 knot-resolver: update to version 5.7.0
Changelog:
https://www.knot-resolver.cz/2023-01-26-knot-resolver-5.6.0.html
https://www.knot-resolver.cz/2023-08-22-knot-resolver-5.7.0.html

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit a531468114)
2023-09-03 10:03:51 +02:00
Jan Hák
a8575f7084 knot: enable QUIC support
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit dea3e7acb6)
2023-09-01 22:08:55 +02:00
Jan Hák
3159348b04 knot: update to version 3.3.0
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit e79e441513)
2023-09-01 22:08:47 +02:00
Jan Hák
47e25fd7ac knot: update to version 3.2.9
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit f6aa1198eb)
2023-09-01 22:08:37 +02:00
Jan Hák
94e1621abc knot: update to version 3.2.8
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 9517ef080a)
2023-09-01 22:08:28 +02:00
Jan Hák
4465026738 knot: update to version 3.2.7
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 439694a012)
2023-09-01 22:08:19 +02:00
Jan Hák
dca5104967 knot: update to version 3.2.6
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit bb946a19cd)
2023-09-01 22:08:08 +02:00
Tianling Shen
981dbdf9c4 tmate: fix build against msgpack-c 6.0
This patch is taken from
https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 928710813b)
2023-09-01 22:07:17 +02:00
Tianling Shen
6f180964af msgpack-c: Update to 6.0.0
Removed 010-no-gtest.patch as upstream no longer detects it.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 394cc366b3)
2023-09-01 22:06:35 +02:00
Tianling Shen
6c43ff614c tmate-ssh-server: fix build against msgpack-c 6.0
This patch is taken from
https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit c49a1dad52)
2023-09-01 22:06:10 +02:00
Nikos Mavrogiannopoulos
c30b106576 tang: do not require bash and curl (backport from 23.05)
Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2023-08-31 18:45:39 +02:00
Nikos Mavrogiannopoulos
5918cb1143 tang: corrected hash for v14
Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2023-08-30 09:27:27 +02:00
Ray Wang
e1a2aa82c9 natmap: update to 20230820
Signed-off-by: Ray Wang <r@hev.cc>
(cherry picked from commit d5b99f9e8a)
2023-08-30 09:48:31 +08:00
Nikos Mavrogiannopoulos
cb1b1ad987 tang: updated to v14
Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2023-08-29 20:32:24 +02:00
Nikos Mavrogiannopoulos
68cae7981d tang: create user tang
Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2023-08-28 18:24:15 +02:00
Nikos Mavrogiannopoulos
ed5a5979ba tang: use sbin instead of libexec
Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2023-08-28 18:23:48 +02:00
Nikos Mavrogiannopoulos
a6265258f8 tang: remove post-installation key generation
The keys will be generated on startup.

Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2023-08-28 18:23:12 +02:00
Nikos Mavrogiannopoulos
16391a06eb tang: updated to version 12
This version enables standalone operation.

Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2023-08-28 18:23:06 +02:00
Jo-Philipp Wich
7b6f573fed strongswan: fix compilation against updated WolfSSL 5.6.3
After OpenWrt base updated WolfSSL to version 5.6.3, the strongswan wolfssl
plugin fails to compile due to a header conflict.

The error reported by the builders is:

    In file included from .../usr/include/wolfssl/openssl/asn1.h:27,
                     from .../usr/include/wolfssl/ssl.h:4123,
                     from wolfssl_common.h:64,
                     from wolfssl_ec_private_key.c:23:
    ../../../../src/libstrongswan/asn1/asn1.h:43:9: error: 'WOLFSSL_ASN1_STRING' redeclared as different kind of symbol
       43 |         ASN1_UTF8STRING =               0x0C,
          |         ^~~~~~~~~~~~~~~
    In file included from wolfssl_common.h:64,
                     from wolfssl_ec_private_key.c:23:
    .../usr/include/wolfssl/ssl.h:212:41: note: previous declaration of 'WOLFSSL_ASN1_STRING' with type 'WOLFSSL_ASN1_STRING'
      212 | typedef struct WOLFSSL_ASN1_STRING      WOLFSSL_ASN1_STRING;
          |                                         ^~~~~~~~~~~~~~~~~~~
    make[9]: *** [Makefile:621: wolfssl_ec_private_key.lo] Error 1

Solve this issue by adding a local path that remaps `ASN1_UTF8STRING`
during wolfssl header inclusion, like it is done already for other
conflicting defines.

Ref: https://forum.openwrt.org/t/x/169580
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2023-08-25 10:46:44 +02:00
Karl Palsson
201a7c81d6 net/mosquitto: bump to 2.0.17
This is a security and bug fix release.

Security:
- CVE-2023-28366: Fix memory leak in broker when clients send multiple QoS 2
  messages with the same message ID, but then never respond to the PUBREC
  commands.
- CVE-2023-0809: Fix excessive memory being allocated based on malicious
  initial packets that are not CONNECT packets.
- CVE-2023-3592: Fix memory leak when clients send v5 CONNECT packets with a
  will message that contains invalid property types.
- Broker will now reject Will messages that attempt to publish to $CONTROL/.
- Broker now validates usernames provided in a TLS certificate or TLS-PSK
  identity are valid UTF-8.
- Fix potential crash when loading invalid persistence file.
- Library will no longer allow single level wildcard certificates, e.g. *.com

Bugfixes of note or relevance to OpenWrt:
- Fix bridges with non-matching cleansession/local_cleansession being expired
  on start after restoring from persistence. Closes #2634.
Client library:
- Use CLOCK_BOOTTIME when available, to keep track of time. This solves the
  problem of the client OS sleeping and the client hence not being able to
  calculate the actual time for keepalive purposes. Closes #2760.

Full changelog available at: https://github.com/eclipse/mosquitto/blob/v2.0.16/ChangeLog.txt
plus: https://github.com/eclipse/mosquitto/blob/v2.0.17/ChangeLog.txt
(2.0.17 fixes regressions from the 2.0.16 release)

Signed-off-by: Karl Palsson <karlp@tweak.au>
2023-08-23 22:04:01 +00:00
Perry Melange
fc4d143cf3 tunneldigger-broker: update to v0.4.0
Include new hook script to build

Signed-off-by: Perry Melange <isprotejesvalkata@gmail.com>
(cherry picked from commit 93a102e21a)
2023-08-23 13:46:32 +02:00
Perry Melange
be07e79e68 tunneldigger-broker: add rate-limit hook
Signed-off-by: Perry Melange <isprotejesvalkata@gmail.com>
(cherry picked from commit 0d1085fe9e)
2023-08-23 13:46:32 +02:00
Perry Melange
930223cf4b tunneldigger-broker: add option to isolate bridge ports
Add new option to a config bridge section to indicate
if a bridge port added to the bridge should be isolated
or not.  The default is 0 (no isolation).

example

config bridge
     option interface 'br-mybridge1446'
     option mtu '1446'
     option isolate '1' # default '0'

Signed-off-by: Perry Melange <isprotejesvalkata@gmail.com>
(cherry picked from commit 49cdf15da4)
2023-08-23 13:46:32 +02:00
Perry Melange
855f7f0e03 tunneldigger-broker: update lib functions
Use config_foreach instead of config_cb

Signed-off-by: Perry Melange <isprotejesvalkata@gmail.com>
(cherry picked from commit ab2b1ade27)
2023-08-23 13:46:32 +02:00
Perry Melange
e4224e3f76 tunneldigger-broker: update config file and init for v0.4.0
Signed-off-by: Perry Melange <isprotejesvalkata@gmail.com>
(cherry picked from commit 99dfea7730)
2023-08-23 13:46:32 +02:00
Stan Grishin
5b032f7f6e Merge pull request #21829 from stangri/openwrt-22.03-simple-adblock
[22.03] simple-adblock: bugfixes for uci_load_validate
2023-08-16 13:42:42 -07:00
Stan Grishin
65f4d3a0b4 simple-adblock: bugfixes for uci_load_validate
* fix validation for force_dns_port when missing in config
* fix validation for dns_instance when * or - are used

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit ad8aa084c1)
2023-08-15 16:33:48 +00:00
Michael Heimpold
f165ad9979 Merge pull request #21818 from mhei/22.03-php8-update-to-8.1.22
[22.03] php8: update to 8.1.22
2023-08-15 07:40:12 +02:00
Michael Heimpold
addaa5e0b6 php8: update to 8.1.22
This fixes:
    - CVE-2023-3823
    - CVE-2023-3824

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-08-13 11:55:49 +02:00
Hirokazu MORIKAWA
9ddc94bbe2 node: August 2023 Security Releases
Update to v16.20.2
This is a security release.

Notable Changes
The following CVEs are fixed in this release:
* CVE-2023-32002: Policies can be bypassed via Module._load (High)
* CVE-2023-32006: Policies can be bypassed by module.constructor.createRequire (Medium)
* CVE-2023-32559: Policies can be bypassed via process.binding (Medium)
* OpenSSL Security Releases  (Depends on shared library provided by OpenWrt)
    * OpenSSL security advisory 14th July.
    * OpenSSL security advisory 19th July.
    * OpenSSL security advisory 31st July

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-08-10 20:03:16 +03:00
Stan Grishin
76fccd9ead Merge pull request #21762 from stangri/openwrt-22.03-simple-adblock
[22.03] simple-adblock: force_dns_port validation bugfix
2023-08-08 13:15:40 -07:00
Stan Grishin
6f936f07b9 Merge pull request #21694 from stangri/openwrt-22.03-curl
[22.03] curl: update to 8.2.1
2023-08-08 13:15:23 -07:00
Stan Grishin
af7b0f9eff simple-adblock: force_dns_port validation bugfix
Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 173d163f09)
2023-08-08 09:33:18 +00:00
Tianling Shen
af603bd12a v2fly-geodata: Update to latest version
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 1003f84ead)
2023-08-08 06:36:16 +08:00
Tianling Shen
9f8a407659 v2raya: Update to 2.1.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 4faa0e88fe)
2023-08-08 06:36:12 +08:00
Tianling Shen
9ebf145a10 cloudreve: Update to 3.8.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit d1f4f875fa)
2023-08-08 06:36:04 +08:00
R4SAS I2P
bf65da62e7 i2pd: update to version 2.48.0
Signed-off-by: R4SAS I2P <r4sas@i2pmail.org>
(cherry picked from commit d7b0d3f83d)
2023-08-07 16:53:22 +08:00
Tianling Shen
36beb7d058 Merge pull request #21740 from jefferyto/golang-1.19.12-openwrt-22.03
[openwrt-22.03] golang: Update to 1.19.12
2023-08-07 08:40:23 +08:00