Commit Graph

28065 Commits

Author SHA1 Message Date
Dirk Brenken
5b806c5c7f banip: update 0.8.9-2
* fix a corner case backup issue with empty feed downloads

Signed-off-by: Dirk Brenken <dev@brenken.org>
(cherry picked from commit 137045faa9)
2023-07-08 22:09:16 +02:00
Dirk Brenken
1691664f82 banip: release 0.8.9-1
* added HTTP ETag or entity tag support to download only ressources that have been updated on the server side,
  to save bandwith and speed up banIP reloads
* added 4 new feeds: binarydefense, bruteforceblock, etcompromised, ipblackhole (see readme)
* updated the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
(cherry picked from commit 68cdc3952d)
2023-07-08 22:09:03 +02:00
Tianling Shen
f0ef3925d4 dnslookup: Update to 1.9.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 65c9414e16)
2023-07-05 19:22:27 +08:00
Dirk Brenken
999c5b47a6 adblock: update to 4.1.5-8
* adapt adguard_tracking source changes

Signed-off-by: Dirk Brenken <dev@brenken.org>
(cherry picked from commit e1fa285f32)
2023-06-30 07:30:51 +02:00
Noah Meyerhans
b660c6e659 bind: bump to 9.18.16
Fixes CVEs:

- CVE-2023-2828: The overmem cleaning process has been improved, to
  prevent the cache from significantly exceeding the configured
  max-cache-size limit.
- CVE-2023-2911: A query that prioritizes stale data over lookup
  triggers a fetch to refresh the stale data in cache. If the fetch is
  aborted for exceeding the recursion quota, it was possible for named
  to enter an infinite callback loop and crash due to stack overflow.

The complete list of changes is available in the upstream release
notes at
https://ftp.isc.org/isc/bind9/cur/9.18/doc/arm/html/notes.html#notes-for-bind-9-18-16

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit 9ac79ad469)
2023-06-25 21:30:48 -07:00
Dirk Brenken
1c066e61f4 banip: update 0.8.8-2
* process local lists in strict sequential order to prevent possible race conditions
* support ranges in the IP search, too
* fix some minor search issues

Signed-off-by: Dirk Brenken <dev@brenken.org>
(cherry picked from commit c3084be415)
2023-06-24 22:28:32 +02:00
Dirk Brenken
6e8e34b95a banip: release 0.8.8-1
* Support MAC-/IPv4/IPv6 ranges in CIDR notation
* Support  concatenation of local MAC addresses with IPv4/IPv6 addresses, e.g. to enforce dhcp assignments (see readme)
* small fixes & cosmetics
* update readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
(cherry picked from commit b9bd6cdb0d)
2023-06-24 22:28:15 +02:00
Dirk Brenken
fac9edfe46 banip: release 0.8.7-1
* Optionally auto-add entire subnets to the blocklist Sets based on an additional RDAP request with the
   monitored suspicious IP, set 'ban_autoblocksubnet' accordingly (disabled by default).
   For more information regarding RDAP see
   https://www.ripe.net/manage-ips-and-asns/db/registration-data-access-protocol-rdap for reference.
* small fixes & cosmetics
* update readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
(cherry picked from commit 767d1ec663)
2023-06-24 22:27:56 +02:00
Hirokazu MORIKAWA
e061716ae0 c-ares: bump to 1.19.1
This is a security and bugfix release.

Security
o CVE-2023-32067. High. 0-byte UDP payload causes Denial of Service
o CVE-2023-31147. Moderate. Insufficient randomness in generation of DNS
query IDs
o CVE-2023-31130. Moderate. Buffer Underwrite in ares_inet_net_pton()
o CVE-2023-31124. Low. AutoTools does not set CARES_RANDOM_FILE during cross
compilation

Fixing libcares.pc
 The pkg-config file libcares.pc in version 1.19.1 has been changed to be unsuitable for OpenWrt
 and causes build errors with Openwrt packages that use libcares.
 For this reason, libcares.pc was replaced.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
(cherry picked from commit 4c4d3b9001)
2023-06-22 22:26:17 +08:00
Tianling Shen
3d45b0e2c4 cloudflared: Update to 2023.6.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 1aa41e92ac)
2023-06-22 01:43:27 +08:00
Tianling Shen
1b1edcc253 v2ray-geodata: Update to latest version
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit e4a22284cb)
2023-06-22 01:43:27 +08:00
Tianling Shen
40fe28ce21 xray-core: update to 1.8.3
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit c912e2bced)
2023-06-22 01:43:26 +08:00
Tianling Shen
33621d873d cloudflared: Update to 2023.6.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 194cf52a82)
2023-06-22 01:43:26 +08:00
Scott McKenzie
57677dc651 cloudflared: support setting tunnel token
Allows user to provide a token for Cloudflare tunnel.
When provided along with credentials, this will take precedence.

Signed-off-by: Scott McKenzie <scott@noizyland.net>
(cherry picked from commit 61106a8df2)
2023-06-22 01:43:23 +08:00
Hirokazu MORIKAWA
5657f77c09 node: June 20 2023 Security Releases
Update to v16.20.1

The following CVEs are fixed in this release:
* CVE-2023-30581: mainModule.__proto__ Bypass Experimental Policy Mechanism (High)
* CVE-2023-30585: Privilege escalation via Malicious Registry Key manipulation during Node.js installer repair process (Medium)
* CVE-2023-30588: Process interuption due to invalid Public Key information in x509 certificates (Medium)
* CVE-2023-30589: HTTP Request Smuggling via Empty headers separated by CR (Medium)
* CVE-2023-30590: DiffieHellman does not generate keys after setting a private key (Medium)

* OpenSSL Security Releases  (Depends on shared library provided by OpenWrt)
    * OpenSSL security advisory 28th March.
    * OpenSSL security advisory 20th April.
    * OpenSSL security advisory 30th May

* c-ares vulnerabilities:  (Depends on shared library provided by OpenWrt)
    * GHSA-9g78-jv2r-p7vc
    * GHSA-8r8p-23f3-64c2
    * GHSA-54xr-f67r-4pc4
    * GHSA-x6mf-cxr9-8q6v

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-06-21 20:48:54 +08:00
ValdikSS ValdikSS
129b7c367c nmap: fix ncat proxy mode with upstream patches
ncat utility from nmap package has a bug in 7.90 and 7.91 version which
prevent it from working via proxy.

Signed-off-by: ValdikSS ValdikSS <iam@valdikss.org.ru>
2023-06-20 17:00:42 +01:00
Stan Grishin
506ac7a6c3 Merge pull request #21412 from stangri/openwrt-22.03-https-dns-proxy
[22.03] https-dns-proxy: update to 2023-05-25-2
2023-06-20 09:58:09 -06:00
Stan Grishin
23d6768487 Merge pull request #21283 from stangri/openwrt-22.03-curl
[22.03] curl: update to 8.1.2
2023-06-19 20:59:57 -06:00
Stan Grishin
82a01e3c8c https-dns-proxy: update to 2023-05-25-2
bugfix: proper mdns object creation
bugfix: prevent fw errors by allowing custom interfaces in config

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit a31640ac7c)
2023-06-20 02:10:16 +00:00
Robert Marko
516e306650 mhz: add new package
mhz is a tool for mathematically calculating the current CPU frequency, it
has proven to be a really good help while developing CPU frequency scaling
solutions as it allows to independently prove that scaling actually works.

Now that the author has added a license we can package it for the all to
use.

Signed-off-by: Robert Marko <robimarko@gmail.com>
(cherry picked from commit 89123b308f)
2023-06-18 08:44:27 +02:00
Michael Heimpold
1dbd21eb94 Merge pull request #21382 from mhei/22.03-php8-update-to-8.1.20
[22.03] php8: update to 8.1.20
2023-06-16 08:07:26 +02:00
Michael Heimpold
65bc480e85 php8: update to 8.1.20
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-06-15 21:24:26 +02:00
Tianling Shen
52c11cf2ff cloudreve: Update to 3.8.0
- Fixed packing web frontend assets
- Enabled build for riscv64

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 27e6796a83)
[removed unavailable riscv64 from supported arches]
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-06-14 13:52:11 +08:00
Tianling Shen
dc647cc8a4 dnsproxy: Update to 0.50.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit eda669c819)
2023-06-14 13:51:45 +08:00
Tianling Shen
f482e5d97c Merge pull request #21346 from jefferyto/python-3.10.12-openwrt-22.03
[openwrt-22.03] python3: Update to 3.10.12
2023-06-13 11:00:35 +08:00
Nick Hainke
3580c81aa5 tunneldigger: add package for establishing L2TPv3 tunnels over UDP
In the previous commit we already added tunneldigger-broker. Add the
corresponding client.

This PR is just a refactoring of the already existing opkg package from
wlanslovenija [0].

[0] - https://github.com/wlanslovenija/firmware-packages-opkg/tree/master/net/tunneldigger

Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit bd2b4f311a)
2023-06-12 16:57:55 +02:00
Nick Hainke
43a6898165 tunneldigger-broker: add broker for tunneldigger
In mesh communities, tunneldigger is widely used to create L2TPv3 tunnels
and mesh via them. Since the broker is typically installed on other
distributions, the openwrt broker package has not received any
maintenance in recent years [0]. I  take now care of the further maintaince
of this package. Furthermore, I consulted with the maintainers to ensure
that they were comfortable with the change [1].

This PR is just a refactoring of the already existing opkg package from
wlanslovenija. It fixes config parsing and in general the config, adapts
to the new python syntax and fixes dependency handling.

- [0] https://github.com/wlanslovenija/firmware-packages-opkg/tree/master/net/tunneldigger-broker
- [1] https://github.com/wlanslovenija/firmware-packages-opkg/issues/24

Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit 8298ce8234)
2023-06-12 16:57:55 +02:00
Tianling Shen
4d295277b1 Merge pull request #21343 from jefferyto/golang-1.19.10-openwrt-22.03
[openwrt-22.03] golang: Update to 1.19.10
2023-06-12 18:21:13 +08:00
Jeffery To
4d2aad0995 python3: Update to 3.10.12
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-06-12 15:17:41 +08:00
Jeffery To
a452cf0343 golang: Update to 1.19.10
Includes fixes for:

* CVE-2023-29402: cmd/go: cgo code injection
* CVE-2023-29403: runtime: unexpected behavior of setuid/setgid binaries
* CVE-2023-29404: cmd/go: improper sanitization of LDFLAGS
* CVE-2023-29405: cmd/go: improper sanitization of LDFLAGS

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-06-12 12:25:43 +08:00
Hirokazu MORIKAWA
9bc26cef1a avahi: Import patches for security fixes
Imported patches included in debian and other package.

* 200-Fix-NULL-pointer-crashes-from-175.patch
  CVE-2021-3502
   A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.

* 201-Avoid-infinite-loop-in-avahi-daemon-by-handling-HUP-event.patch
  CVE-2021-3468
   A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.

* 202-avahi_dns_packet_consume_uint32-fix-potential-undefined-b.patch
   avahi_dns_packet_consume_uint32 left shifts uint8_t values by 8, 16 and 24 bits to combine them into a 32-bit value. This produces an undefined behavior warning with gcc -fsanitize when fed input values of 128 or 255 however in testing no actual unexpected behavior occurs in practice and the 32-bit uint32_t is always correctly produced as the final value is immediately stored into a uint32_t and the compiler appears to handle this "correctly".
Cast the intermediate values to uint32_t to prevent this warning and ensure the intended result is explicit.

* 203-Do-not-disable-timeout-cleanup-on-watch-cleanup.patch
   This was causing timeouts to never be removed from the linked list that tracks them, resulting in both memory and CPU usage to grow larger over time.

* 204-Emit-error-if-requested-service-is-not-found.patch
   It currently just crashes instead of replying with error. Check return
value and emit error instead of passing NULL pointer to reply.

* 205-conf-file-line-lengths.patch
   Allow avahi-daemon.conf file to have lines longer than 256 characters (new limit 1024).

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
(cherry picked from commit 779af4d40c)
2023-06-10 15:27:10 +08:00
Toke Høiland-Jørgensen
10a27f92ae net/acme: Bump acme.sh to v3.0.6
Important security fix.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2023-06-09 19:57:03 +02:00
S. Brusch
76c19152fb crowdsec: new upstream release version 1.5.2
Update crowdsec to latest upstream release version 1.5.2

Signed-off-by: S. Brusch <ne20002@gmx.ch>

Maintainer: Kerma Gérald <gandalf@gk2.net>
Run tested: ipq40xx/generic, Fritzbox 4040, Openwrt 22.03.5

Description: update to latest version of upstream
(cherry picked from commit 1813bf2c6e)
2023-06-09 09:41:13 +08:00
Stan Grishin
31c32b5228 curl: update to 8.1.2
* https://curl.se/changes.html#8_1_2

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 5afd8e088a)
2023-06-05 19:39:15 +00:00
Dengfeng Liu
ba197b2549 xfrpc: update to 2.6.633
support socks5

Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
2023-06-05 01:02:11 +08:00
Maxim Storchak
82f6aa5a21 collectd: enable AllPortsSummary for tcpconns plugin
Signed-off-by: Maxim Storchak <m.storchak@gmail.com>
(cherry picked from commit 8270bd173e)
[remove AUTORELEASE at the same time]
2023-06-02 17:53:18 +03:00
Tianling Shen
7c4ce83613 dnsproxy: Update to 0.49.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit d717bace8d)
2023-06-02 21:18:20 +08:00
Tianling Shen
7dd3897220 v2ray-geodata: Update to latest version
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 56de9f91fd)
2023-06-02 21:17:54 +08:00
Tianling Shen
665a08f6b8 v2ray-geodata: Update to latest version
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit b8d7376411)
2023-06-02 21:17:50 +08:00
Tianling Shen
3a372dec63 yq: Update to 4.34.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 2ecf76e27d)
2023-06-02 21:17:24 +08:00
Tianling Shen
f6d0fc339c v2ray-core: Update to 5.7.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit b95ec1db56)
2023-06-02 21:17:24 +08:00
Tianling Shen
c0af419624 cloudflared: Update to 2023.5.1
Fixed build issue with Go 1.20.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 0625f038b3)
2023-06-02 21:17:24 +08:00
Dengfeng Liu
f98da3b6fc apfree-wifidog: Update to 6.02.1939
1. support fw4
2. support openssl3.0

Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
2023-06-02 12:39:44 +08:00
Stan Grishin
5d1c4522d9 Merge pull request #21204 from stangri/openwrt-22.03-curl-8.1.1
[22.03] curl: update to 8.1.1
2023-05-31 11:38:23 -06:00
Glenn Strauss
5433c7f0bb lighttpd: update to lighttpd 1.4.71 release hash
remove patches included upstream

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
(cherry picked from commit 19291ee195)
2023-05-28 15:42:56 +03:00
Stan Grishin
8679706e27 curl: update to 8.1.1
* https://curl.se/changes.html#8_1_1

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit b126e765cc)
2023-05-28 04:53:37 +00:00
Alexandru Ardelean
49a7b86bef Merge pull request #21156 from jefferyto/python-3.10.11-openwrt-22.03
[openwrt-22.03] python3: Update to 3.10.11, refresh/restore patches; cherry pick fixes
2023-05-27 21:16:35 +03:00
Stan Grishin
8c30ba5de0 Merge pull request #21146 from stangri/openwrt-22.03-curl
[22.03] curl: update to 8.1.0
2023-05-27 00:46:07 -06:00
Alexandru Ardelean
e3b4c4fc1a Merge pull request #21178 from stangri/openwrt-22.03-https-dns-proxy
[22.03] https-dns-proxy: update to 2023-05-25-1
2023-05-27 09:26:54 +03:00
Stan Grishin
dcaeabbcc0 https-dns-proxy: update to 2023-05-25-1
* update to a new upstream commit, fixes #19366
* update patches/010-cmakelists-remove-cflags.patch as upstream file was update
* remove patches/020-cmakelists-add-version.patch as version is now set elsewhere
* add patches/020-src-options.c-add-version.patch to set the version information
* adjust PROCD START time to 95

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit eb40aa1b5d)
2023-05-26 08:33:29 +00:00