Commit graph

24550 commits

Author SHA1 Message Date
Daniel Golle
4f7fcd9279
libsodium: include ed25519_core in minimal build
Functions from ed25519_core are needed for GNUnet to build.
Include them in the minimal build of libsodium so we don't need to
switch to the full build just for that.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 3da874371b)
2022-03-26 21:31:32 +00:00
Josef Schlehofer
c04905dd90
Merge pull request #18145 from hauke/samba4
[21.02] Samba4 backports from master (Fix CVEs)
2022-03-26 20:46:04 +01:00
Andy Walsh
7deecb5d9f samba4: update to 4.14.12
* update to 4.14.12
* fixes: CVE-2021-44142, CVE-2022-0336

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
(cherry picked from commit 1fa70d6a3c)
2022-03-25 12:12:07 +01:00
Andy Walsh
71734db270 samba4: update to 4.14.11; fix AD_DC build
* update to 4.14.11
* fix AD_DC build
* add vfs_widelinks to defaults
* refresh patches
* fixes: #16697, #17692
* fixes: CVE-2016-2124, CVE-2020-25717, CVE-2020-25718, CVE-2020-25719, CVE-2020-25721, CVE-2020-25722, CVE-2021-3738, CVE-2021-23192

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
(cherry picked from commit 7730a65d30)
[Do not add dependency to python3-markdown and python3-dns]
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2022-03-25 12:11:03 +01:00
Hannu Nyman
ee69afe6f1 nano: provide nano-full with most features enabled
Provide a new variant, nano-full, that enables almost
all functionality of nano. Only libmagic file type detection
has been left out.

Ship with a minimal /etc/nanorc that the user can modify.
nanorc documentation at
https://www.nano-editor.org/dist/latest/nanorc.5.html

Provide color highlighting for the uci config files.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit 6a51794638)
2022-03-24 20:31:46 +02:00
Daniel Golle
951ef67479
netatalk: update to version 3.1.13
Please update to this latest release as soon as possible as this
releases fixes the following major security issues: CVE-2021-31439,
CVE-2022-23121, CVE-2022-23122, CVE-2022-23123, CVE-2022-23124,
CVE-2022-23125 and CVE-2022-0194.

Local patch '010-gcc10.patch' has been applied upstream and was hence
removed.

For a summary of news and a detailed list of changes see the
ReleaseNotes[1].

[1]: https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2022-03-24 17:50:40 +00:00
Josef Schlehofer
08a442fe9f
Merge pull request #18125 from 1715173329/x2
[openwrt-21.02] xray-core: Update to 1.5.4
2022-03-24 08:40:00 +01:00
Josef Schlehofer
cfb44b1472
Merge pull request #18124 from 1715173329/y2
[openwrt-21.02] yq: Update to 4.23.1
2022-03-24 08:39:51 +01:00
Josef Schlehofer
cfc7069b3f
Merge pull request #18123 from jefferyto/python-3.9.11-openwrt-21.02
[openwrt-21.02] python3: Update to 3.9.11, refresh patches
2022-03-23 09:11:14 +01:00
Tianling Shen
c2aeec5ef1
xray-core: Update to 1.5.4
Updated geodata to latest version while at it.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit f8fa16f40d)
2022-03-21 23:34:07 +08:00
Tianling Shen
5eb1ab8a6d
yq: Update to 4.23.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 8d7b7fbfb4)
2022-03-21 23:32:04 +08:00
Jeffery To
a7a93cfcc8
python3: Update to 3.9.11, refresh patches
Includes fixes for:
* Windows builds updated to bzip2 1.0.8 to mitigate CVE-2016-3189 and
  CVE-2019-12900
* CVE-2022-26488: Escalation of privilege via Windows Installer

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2022-03-21 22:03:05 +08:00
David Bauer
762794d143 usteer: add package
This commits adds the new usteer package to the packages feed.

usteer is a daemon for steering wireless clients across frequency
bands as well as between multiple access points on a network.

Signed-off-by: David Bauer <mail@david-bauer.net>
2022-03-21 01:30:58 +01:00
Moritz Warning
89cea2a6e7 zerotier: update to 1.8.6
* remove upstreamed gcc10 and cerrno patches
* disable SSO and OIDC as it needs Rust/Cargo support

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Moritz Warning
f7554858ec zerotier: update to 1.8.4
Also remove patch to fix uClibc-ng,
since it is not in openwrt anymore.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Moritz Warning
7673192a9c zerotier: update to 1.8.3
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Moritz Warning
56c4570589 zerotier: update to 1.8.2
Update und switch back to release source package.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Oskari Rauta
614b4e003a zerotier: update to 1.8.1
Release notes:

1.8.0
 - Upgrade json.hpp dependency to version 3.10.2
 - Check if DNS servers need to be applied on macOS
 - Set MAC address before bringing up Linux TAP link
 - Stop binding to temporary IPv6 addresses
 - Fix for mistakenly using v6 source addresses for v4 routes on some platforms
 - Fix for MacOS MTU capping issue on feth devices
 - Implement a workaround for one potential source of a "coma" bug, which can occur if buggy NATs/routers stop allowing the service to communicate on a given port. ZeroTier now reassigns a new secondary port if it's offline for a while unless a secondary port is manually specified in local.conf. Working around crummy buggy routers is an ongoing effort.
 - A completely rewritten desktop UI for Mac and Windows!

1.8.1
 - Fix an issue that could cause clobbering of MacOS IP route settings on restart.
 - Added additional hardening against address impersonation on networks (also in 1.6.6).
 - MacOS IPv6 no longer binds to temporary addresses as these can cause interruptions if they expire.
 - Remove support for REALLY ancient 1.1.6 or earlier network controllers.
 - Fix numerous UI issues from 1.8.0 (never fully released).

Changed to git as source and added $(AUTORELEASE)

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2022-03-21 00:25:10 +01:00
Chao Liu
52fcc9bf62 zerotier: add respawn procd param
Signed-off-by: Chao Liu <git@expiron.dev>
2022-03-21 00:25:10 +01:00
Moritz Warning
1e1d5f5d65 zerotier: add option to copy config
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Liangbin Lian
748d87c88e zerotier: fix cross compile in macOS
zerotier's Makefile use `uname` to detect target when cross compile
uname should always be 'linux'

Signed-off-by: Liangbin Lian <jjm2473@gmail.com>
2022-03-21 00:25:10 +01:00
Josef Schlehofer
921af7fdda
Merge pull request #18103 from BKPepe/21.02-haproxy
haproxy: update to version 2.2.22
2022-03-19 04:02:05 +01:00
Josef Schlehofer
ac99fde549
haproxy: update to version 2.2.22
Fixes:
CVE-2022-0711

Changelog:
https://git.haproxy.org/?p=haproxy-2.2.git;a=blob;f=CHANGELOG;h=bfc5d6495e39ace56581663ce820e6909039a286;hb=bfc5d6495e39ace56581663ce820e6909039a286

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-03-18 21:00:56 +01:00
John Audia
ee4267e97f
tree: bump to 2.0.2
Update to latest upstream release.

Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B

Signed-off-by: John Audia <graysky@archlinux.us>
(cherry picked from commit c333a5b8c5)
2022-03-18 20:49:57 +01:00
Chris Osgood
f01cf663b6 curl: Fix compiling curl wolfSSL IPv6 disabled
Fixes #18082

Signed-off-by: Chris Osgood <chris_github@functionalfuture.com>
(cherry picked from commit 4eb08bacf3)
2022-03-18 17:54:32 +01:00
Noah Meyerhans
185c5e365e bind: bump to 9.18.1
Fixes multiple security issues:

 * CVE-2022-0667 -- An assertion could occur in resume_dslookup() if the
                    fetch had been shut down earlier
 * CVE-2022-0635 -- Lookups involving a DNAME could trigger an INSIST when
                    "synth-from-dnssec" was enabled
 * CVE-2022-0396 -- A synchronous call to closehandle_cb() caused
                    isc__nm_process_sock_buffer() to be called recursively,
                    which in turn left TCP connections hanging in the CLOSE_WAIT
                    state blocking indefinitely when out-of-order processing was
                    disabled.
 * CVE-2021-25220 -- The rules for acceptance of records into the cache
                     have been tightened to prevent the possibility of
                     poisoning if forwarders send records outside the
                     configured bailiwick

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit 4c6ea5379c)
2022-03-18 08:25:18 -07:00
Rosen Penev
919dd80130
libnetfilter-log: update to 1.0.2
Remove all patches as they have been upstreamed.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 28c1c0d24c)
2022-03-17 23:29:36 +01:00
Michael Heimpold
56fbb7f85e
Merge pull request #18083 from mhei/21.02-libxml2-update
libxml2: update to 2.9.13
2022-03-17 21:06:52 +01:00
Michael Heimpold
8e9f102235 libxml2: update to 2.9.13
This fixes CVE-2022-23308.

Also switch to GNOME as download source and xz tarball.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit 81fd836f97)
2022-03-17 08:06:45 +01:00
Daniel Golle
793e7ee484 auc: don't segfault on invalid URL
Show error message instead of segfaulting in case of an invalid URL
being read from UCI config.

Fixes: #17971
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit c0d2c82528)
2022-03-14 21:29:50 +00:00
Daniel Golle
31e2e7ccb8 auc: fall back to 'sdcard' image
Fallback to use 'sdcard' image in case there is neither 'sysupgrade'
nor 'combined' image available.
This allows using 'auc' on targets where 'sdcard' image is also used
for sysupgrade (such as some mvebu-based devices with eMMC).

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 6b041752a0)
2022-03-14 21:29:50 +00:00
Daniel Golle
8999b60db9 auc: accept both 'y' and 'Y' as confirmation from user
Accept both 'y' and 'Y' as positive confirmation when asking the user
if auc should proceed with requesting and installing an upgrade.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit d27ecdcc49)
2022-03-14 21:29:50 +00:00
Daniel Golle
1adcda368e auc: add '-n' parameter for dry-run
Add option to allow only requesting an image but not actually download
or sysupgrade anything.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 19c135685f)
2022-03-14 21:29:50 +00:00
Paul Spooren
facfdaca20 attendedsysupgrade-common: update to 2021
* Use SPDX
* Use CA (ucert) public key
* Update repo link
* Update maintainer email
* Format description

Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit a54b9570ad)
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2022-03-14 21:29:50 +00:00
Stan Grishin
44e763c62e
Merge pull request #18010 from stangri/openwrt-21.02-curl
[21.02] curl: update to 7.82.0
2022-03-14 14:29:14 -07:00
Josef Schlehofer
85b7d29c3e
Merge pull request #18037 from M95D/openwrt-21.02
tvheadend: bind to LAN IP by default
2022-03-14 17:57:29 +01:00
Tianling Shen
aa41482d38 yq: Update to 4.22.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit b31615c63c)
2022-03-13 00:01:46 -08:00
Tianling Shen
8518b2d5d4 yq: Update to 4.21.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 5529031602)
2022-03-13 00:01:46 -08:00
Josef Schlehofer
f550d90660
syslog-ng: update to version 3.36.1
- Bump version in config file

Release notes:
https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-3.36.1

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 110d46eb37)
2022-03-12 06:51:24 +01:00
Marius Dinu
b2ec8c84fd tvheadend: bind to LAN IP by default
If config parameter is not set, tvheadend will bind to LAN IP address by default.
Fixes issue #16500 without requiring user modifications to config file. It's also more secure if firewall becomes disabled.

Signed-off-by: Marius Dinu <m95d+git@psihoexpert.ro>
(cherry picked from commit 95cbfe893b)
2022-03-10 10:43:44 +02:00
Liang Yang
e061d8eff4 dockerd: fix compilation with glibc
Signed-off-by: Liang Yang <ggg17226@gmail.com>
2022-03-09 02:15:07 -08:00
Liang Yang
fd30ce33f4 docker: fix compilation with glibc
Signed-off-by: Liang Yang <ggg17226@gmail.com>
2022-03-09 02:14:45 -08:00
George Iv
a11359b889 yggdrasil: bump to 0.4.3
Signed-off-by: George Iv <zhoreeq@users.noreply.github.com>
(cherry picked from commit ed49a0bd3a5b482bf35310c9dfdcbb9bf8cefd26)
2022-03-08 22:02:05 -08:00
R4SAS I2P
1d7d46db04 i2pd: Update package
* Update to 2.41.0
* Added use AUTORELEASE

Signed-off-by: R4SAS I2P <r4sas@i2pmail.org>
(cherry picked from commit c08bb2df62)
2022-03-08 21:59:33 -08:00
R4SAS I2P
c384dbb19b i2pd: add service reload support
Signed-off-by: R4SAS I2P <r4sas@i2pmail.org>
(cherry picked from commit b9000cf231)
2022-03-08 21:59:33 -08:00
Thibaut VARÈNE
938187fa2e coova-chilli: remove kmod dep on binary package
There is no reason for the kmod to depend on the binary package
itself, neither for building nor for installing.

That dependency prevents phase1 from building the kmod even though
support is enabled in the binary.

Signed-off-by: Thibaut VARÈNE <hacks@slashdirt.org>
(cherry picked from commit 385923321b)
2022-03-08 21:58:59 -08:00
Gerard Ryan
109f2770a1 cache-domains: Fixed hotplug script not running
Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
2022-03-08 21:55:35 -08:00
Stan Grishin
6df8f76efc
Merge pull request #18019 from rs/nextdns-1.37.10-openwrt-21.02
[21.02] nextdns: Update to version 1.37.10
2022-03-07 13:35:41 -08:00
Josef Schlehofer
aef82c58d2
Merge pull request #18012 from jefferyto/golang-1.17.8-openwrt-21.02
[openwrt-21.02] golang: Update to 1.17.8
2022-03-07 21:40:24 +01:00
Olivier Poitrey
5562cef265 nextdns: Update to version 1.37.10
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2022-03-07 19:48:05 +00:00