Commit graph

27343 commits

Author SHA1 Message Date
Tianling Shen
9bdab0d797
v2ray-core: add new package
Project V is a set of network tools that help you to build your own computer network.
It secures your network connections and thus protects your privacy.

For more details, see https://www.v2fly.org/en_US/guide/faq.html

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 6461d1b055)
2022-10-09 23:50:18 +08:00
Alexandru Ardelean
088222c39d
Merge pull request #19553 from commodo/python-pytz-22.03
[22.03] python3-pytz: bump to version 2022.4
2022-10-09 08:07:48 +03:00
Tianling Shen
972fb7861b gg: Update to 0.2.13
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 891b87747a)
2022-10-08 15:37:09 +02:00
Tianling Shen
c243509b61 dnsproxy: Update to 0.45.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit b5ec852c54)
2022-10-08 15:36:32 +02:00
Tianling Shen
44034384aa dnsproxy: Update to 0.45.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 5b72dce338)
2022-10-08 15:36:32 +02:00
Stan Grishin
c29e56d76d
Merge pull request #19544 from stangri/openwrt-22.03-https-dns-proxy
[22.03] https-dns-proxy: update to 2022-08-12-1
2022-10-07 14:27:43 -07:00
Alexandru Ardelean
a1d8cd1727 python3-pytz: bump to version 2022.4
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-10-07 20:38:44 +03:00
Noah Meyerhans
d3a4c41a5a bind: bump to 9.18.7
Fixes multiple security issues:

CVE-2022-38178 - Fix memory leak in EdDSA verify processing

CVE-2022-3080 - Fix serve-stale crash that could happen when
			stale-answer-client-timeout was set to 0 and there was
			a stale CNAME in the cache for an incoming query

CVE-2022-2906 - Fix memory leaks in the DH code when using OpenSSL 3.0.0
			and later versions. The openssldh_compare(),
			openssldh_paramcompare(), and openssldh_todns()
			functions were affected

CVE-2022-2881 - When an HTTP connection was reused to get
			statistics from the stats channel, and zlib
			compression was in use, each successive
			response sent larger and larger blocks of memory,
			potentially reading past the end of the allocated
			buffer

CVE-2022-2795 - Prevent excessive resource use while processing large
			delegations

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit 58bcd3fad37eaf56d4dbeecc0c73abe464e7e987)
2022-10-07 09:20:12 -07:00
Stan Grishin
47e5343d59 https-dns-proxy: update to 2022-08-12-1
* update to upstream version 2022-08-12
* add ca_certs_file option for CA certs file for curl
* add procd_add_interface_trigger for wan6 (hopefully fixes
  https://github.com/openwrt/packages/issues/19531)

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 796a3dda80)
2022-10-07 06:33:46 +00:00
Eneas U de Queiroz
5df363db70
libgd: avoid recursive and redundant dependencies
Change the CONFLICTS line from the libgd-full to libgd to fix a
recursive dependency.

While at it, remove the redundant +LIBGD_TIFF:libtiff
+LIBGD_FREETYPE:libfreetype dependencies from Package/libgd/default.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit 085eb34fbf)
2022-10-06 11:45:42 +02:00
Nick Hainke
24ad5359fe tor: update to 0.4.7.10
Release Notes:
https://forum.torproject.net/t/urgent-stable-release-0-4-5-14-0-4-6-12-and-0-4-7-10

Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit b9cf0cdce6)
[fix commit title]
Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-10-05 23:31:02 +02:00
Nick Hainke
1a070a2899
expat: update to 2.4.9
Fixes CVE-2022-40674.

Release Notes:
- https://github.com/libexpat/libexpat/blob/R_2_4_8/expat/Changes
- https://github.com/libexpat/libexpat/blob/R_2_4_9/expat/Changes

Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit a8774f84e9)
2022-10-05 23:30:06 +02:00
Glenn Strauss
2f2989e3ea
lighttpd: remove deprecated modules
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
(cherry picked from commit 9d7e18fb25)
2022-10-05 23:29:52 +02:00
Hirokazu MORIKAWA
f9515613f9
node: bump to v16.17.1
The following CVEs are fixed in this release:
* CVE-2022-32212: DNS rebinding in --inspect on macOS (High)
    * Insufficient fix for macOS devices on v18.5.0
* CVE-2022-32222: Node 18 reads openssl.cnf from /home/iojs/build/ upon startup on MacOS (Medium)
* CVE-2022-32213: HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding (Medium)
    * Insufficient fix on v18.5.0
* CVE-2022-32215: HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (Medium)
    * Insufficient fix on v18.5.0
* CVE-2022-35256: HTTP Request Smuggling - Incorrect Parsing of Header Fields (Medium)
* CVE-2022-35255: Weak randomness in WebCrypto keygen
More detailed information on each of the vulnerabilities can be found in September 22nd 2022 Security Releases blog post.

llhttp updated to 6.0.10
llhttp is updated to 6.0.10 which includes fixes for the following vulnerabilities.
* HTTP Request Smuggling - CVE-2022-32213 bypass via obs-fold mechanic (Medium)(CVE-2022-32213 ): The llhttp parser in the http module does not correctly parse and validate Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
* HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (Medium)(CVE-2022-32215): The llhttp parser in the http module does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
* HTTP Request Smuggling - Incorrect Parsing of Header Fields (Medium)(CVE-35256): The llhttp parser in the http does not correctly handle header fields that are not terminated with CLRF. This can lead to HTTP Request Smuggling (HRS).

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
(cherry picked from commit 658621bf5e)
2022-10-05 23:29:43 +02:00
Petr Štetiar
698323d467
Merge pull request #19521 from ynezz/ynezz/openwrt-22.03-wolfssl-CVE-2022-39173
[22.03] treewide: fix security issues by bumping all packages using libwolfssl
2022-10-05 21:30:52 +02:00
Stan Grishin
4af0bb1a10
Merge pull request #19528 from stangri/openwrt-22.03-https-dns-proxy
[22.03] https-dns-proxy: add settings for canary domains
2022-10-04 23:41:12 -07:00
Stan Grishin
7869127db7 https-dns-proxy: add settings for canary domains
* add setting to enable/disable blocking access to iCloud Private Relay resolvers
* add setting to enable/disable blocking access to Mozilla resolvers
* rename variables loaded from config in the init script

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 4ff71d8e4c)
2022-10-04 22:20:35 +00:00
Stan Grishin
62c0e0fc11
Merge pull request #19526 from stangri/openwrt-22.03-https-dns-proxy
[22.03] https-dns-proxy: bugfix: prevent canary domains duplicates
2022-10-04 15:06:15 -07:00
Stan Grishin
a4a6411e13 https-dns-proxy: bugfix: prevent canary domains duplicates
Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit f99ada410f)
2022-10-04 21:31:33 +00:00
Michael Heimpold
127e4e1478
Merge pull request #19516 from mhei/22.03-php8-update-8.1.11
[22.03] php8: update to 8.1.11
2022-10-04 17:35:04 +02:00
Petr Štetiar
f624e41f38 treewide: fix security issues by bumping all packages using libwolfssl
As wolfSSL is having hard time maintaining ABI compatibility between
releases, we need to manually force rebuild of packages depending on
libwolfssl and thus force their upgrade. Otherwise due to the ABI
handling we would endup with possibly two libwolfssl libraries in the
system, including the patched libwolfssl-5.5.1, but still have
vulnerable services running using the vulnerable libwolfssl-5.4.0.

So in order to propagate update of libwolfssl to latest stable release
done in commit ec8fb542ec3e4 ("wolfssl: fix TLSv1.3 RCE in uhttpd by
using 5.5.1-stable (CVE-2022-39173)") which fixes several remotely
exploitable vulnerabilities, we need to bump PKG_RELEASE of all packages
using wolfSSL library.

Same bump has been done in buildroot in commit f1b7e1434f66 ("treewide:
fix security issues by bumping all packages using libwolfssl").

Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 845d81ca09)
2022-10-04 10:22:40 +02:00
Petr Štetiar
ea8108a319 Revert "treewide: fix security issues by bumping all packages using libwolfssl"
This reverts commit 0ddec62e69 as it was
backport too soon, we need to first wait for fixed libwolfssl being
available.

Signed-off-by: Petr Štetiar <ynezz@true.cz>
2022-10-04 10:14:07 +02:00
Petr Štetiar
0ddec62e69 treewide: fix security issues by bumping all packages using libwolfssl
As wolfSSL is having hard time maintaining ABI compatibility between
releases, we need to manually force rebuild of packages depending on
libwolfssl and thus force their upgrade. Otherwise due to the ABI
handling we would endup with possibly two libwolfssl libraries in the
system, including the patched libwolfssl-5.5.1, but still have
vulnerable services running using the vulnerable libwolfssl-5.4.0.

So in order to propagate update of libwolfssl to latest stable release
done in commit ec8fb542ec3e4 ("wolfssl: fix TLSv1.3 RCE in uhttpd by
using 5.5.1-stable (CVE-2022-39173)") which fixes several remotely
exploitable vulnerabilities, we need to bump PKG_RELEASE of all packages
using wolfSSL library.

Same bump has been done in buildroot in commit f1b7e1434f66 ("treewide:
fix security issues by bumping all packages using libwolfssl").

Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 845d81ca09)
2022-10-04 01:03:35 -07:00
Ivan Pavlov
2d061d1cba openvpn: explicitly disable engine parameter for openssl variant
Engine support is deprecated in OpenSSL 3.0 and for OpenSSL 3.0 the default
is to disable engine support as engine support is deprecated. For ath79 architecture
build with autodetection engine support fails, so explicitly set off for now.

Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
(cherry picked from commit 62e909e845)
2022-10-04 01:00:49 -07:00
Ivan Pavlov
0c670f870e openvpn: update to 2.5.7
Added limited support for OpenSSL 3.0
Fixed some bugs

Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
(cherry picked from commit 45b751dd85)
2022-10-04 01:00:49 -07:00
Ivan Pavlov
50ae0353af openvpn: update to 2.5.6
Maintainer: me / @mkrkn

Compile tested: ramips/mt7620 TP-Link Archer C50 v1, ramips/mt7621 Xiaomi Mi router 3 Pro, ath79/generic TP-Link WDR-3500
Run tested: ramips/mt7620 TP-Link Archer C50 v1, ramips/mt7621 Xiaomi Mi router 3 Pro, ath79/generic TP-Link WDR-3500

bugfix release including one security fix ("Disallow multiple deferred authentication plug-ins.", CVE: 2022-0547)

several build fixes, refer to https://github.com/OpenVPN/openvpn/blob/release/2.5/Changes.rst

Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
(cherry picked from commit 172795b858)
2022-10-04 01:00:49 -07:00
Jianhui Zhao
8377e516e9 rtty: update to 8.0.1
Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
(cherry picked from commit 0ea357c164)
2022-10-04 01:00:13 -07:00
Michael Heimpold
7acb460010 php8: update to 8.1.11
This fixes:
    - CVE-2022-31628
    - CVE-2022-31629

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit e0db68ef0a)
2022-10-04 07:30:19 +02:00
Stan Grishin
0756af3c9e
Merge pull request #19502 from stangri/openwrt-22.03-simple-adblock
[22.03] simple-adblock: allow domains bugfix & canary domains support
2022-10-03 20:59:56 -07:00
Marc Benoit
52ddf2f0b5 nextdns: initialize nextdns from /etc/uci-defaults
Signed-off-by: Marc Benoit <marcb62185@gmail.com>
(cherry picked from commit e54247a6fa)
2022-10-02 08:57:22 -07:00
Tianling Shen
eddc92a17d dnslookup: Update to 1.8.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 671e794db1)
2022-10-02 17:35:47 +02:00
Stan Grishin
356534dd42 simple-adblock: allow domains bugfix & canary domains support
* fix bug in download_lists and adb_allow to prevent unintended exclisions from
  the block-lists of domains containing allowed domain. Fixes issue:
  https://github.com/stangri/source.openwrt.melmac.net/issues/160
* add support for returning NXDOMAIN/blocking iCloud & Mozilla canary domains,
  disabled by default

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 9156ef6507)
2022-10-01 23:19:23 +00:00
Stan Grishin
d9341ee80c
Merge pull request #19490 from stangri/openwrt-22.03-https-dns-proxy
[22.03] https-dns-proxy: uci wrappers & iCloud canary domains
2022-10-01 16:01:43 -07:00
Stan Grishin
a219e0635e
Merge pull request #19469 from stangri/openwrt-22.03-simple-adblock
[22.03] simple-adblock: update to 1.9.1-1
2022-10-01 16:01:22 -07:00
Stan Grishin
de00aad596 https-dns-proxy: uci wrappers & iCloud canary domains
* switch to using uci wrappers instead of direct uci calls
* add support for iCloud canary domains
  https://developer.apple.com/support/prepare-your-network-for-icloud-private-relay

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 749b03ffbf)
2022-09-30 00:09:49 +00:00
Rosen Penev
b0e6930926 bandwidthd: fix format warnings
Should fix crashing errors under musl 1.2

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit e62158b6f8)
2022-09-29 16:37:18 -07:00
Josef Schlehofer
a9423d8946
unbound: update to version 1.16.3
Changelog: https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-16-3
- Fixes: CVE-2022-3204

Refreshed one patch

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 027533f9a2)
2022-09-29 07:11:55 +02:00
Stan Grishin
d053da000e simple-adblock: update to 1.9.1-1
* remove obsolete block-lists from config
* add removal of obsolete lists to config-update
* add AdGuard team's block-list to config
* improve allow command
* improve nftset support
* move config load to uci_load_validate, which required some code refactoring which
  looks dramatic, but isn't
* always use dnsmasq_restart instead of dnsmasq_hup for all dns resolution options
  for dnsmasq

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit f8c5fd93e7)
2022-09-27 10:38:33 +00:00
Stan Grishin
8d62d37724
Merge pull request #19466 from stangri/openwrt-22.03-curl
[22.03] curl: bugfix: github source url
2022-09-26 13:34:50 -07:00
Stan Grishin
bc15988929 curl: bugfix: github source url
* fixes https://github.com/openwrt/packages/issues/19456

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit c812153f8d)
2022-09-26 19:08:30 +00:00
Peter van Dijk
eed717e6e0
pdns-recursor: update to 4.7.3
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
(cherry picked from commit 8e234be1e7)
2022-09-26 13:30:01 +02:00
Karl Palsson
8df44cb6ef libs/cjson: bump to 1.7.15
This is a bugfix release.
Full release notes available at: https://github.com/DaveGamble/cJSON/releases/tag/v1.7.15

Signed-off-by: Karl Palsson <karlp@etactica.com>
2022-09-26 09:39:15 +00:00
Karl Palsson
44f898f98b pagekite: add patchs for 64bit time
Source: https://github.com/pagekite/libpagekite/pull/78

Signed-off-by: Karl Palsson <karlp@etactica.com>
2022-09-26 09:39:15 +00:00
Karl Palsson
d5aa9d76ea mosquitto: bump to 2.0.15
Changelog: https://mosquitto.org/blog/2022/08/version-2-0-15-released/
Changelog: https://mosquitto.org/blog/2021/11/version-2-0-14-released/

2.0.15 is bigger security and bugfix release.  2.0.14 had a couple of
  minor changes and was skipped for OpenWrt.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2022-09-26 09:39:15 +00:00
Ptilopsis Leucotis
4419a76baf mosquitto: add missing 'persistence' section in config
Section 'Persistence' in 'luci-app-mosquitto' is unusable without 'persistence'
section in config file.

Signed-off-by: Ptilopsis Leucotis <PtilopsisLeucotis@yandex.com>
2022-09-26 09:39:15 +00:00
David Bauer
376f1afddd poemgr: update to latest HEAD
8988247 Makefile: Enable warnings as errors (-Werror)
aea39ca Makefile: Respect the CFLAGS and LDFLAGS that have been passed in
189594f poemgr: Fix compiler warnings in poemgr.c
0e1a8cf pd69104: Avoid self-induced pointer casts
2d53298 uswflex: Remove unused variables and declarations
d345441 poemgr: Reorganize poemgr.h to remove forward declarations
df1a7bc contrib: remove unneccessary functions.sh loading
056a6a9 poemgr: Fix name based profile selection
b8f8f23 poemgr: prolong the power budget detection delay
9e8344a poemgr: configure power_budget to override detected limit

Signed-off-by: David Bauer <mail@david-bauer.net>
(cherry picked from commit 255c4e6c80)
2022-09-25 21:25:27 +02:00
Stijn Tintel
1eea84cca3 poemgr: fix conffiles path
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit 33927a51c8)
2022-09-25 21:25:27 +02:00
Dirk Brenken
5092dbd147
adblock: update 4.1.4-5
* auto-whitelist ext. dns lookup domain
* add public doh server blocklist source
* whitespace fixes in adblock.sources

Signed-off-by: Dirk Brenken <dev@brenken.org>
(cherry picked from commit 5603ed9237)
2022-09-25 21:03:07 +02:00
James McGuire
3f9a88d21b
adblock: add lightswitch05 blocklist source
Signed-off-by: James McGuire <jamesm51@gmail.com>
(cherry picked from commit b971cdc79b)
2022-09-25 21:02:47 +02:00
Alexander E. Patrakov
0247d720ea hping3: add new package
The new package would help measuring one-way delays using ICMP type 13
packets. This is important for various scripts that automatically adjust
CAKE shaper bandwidth based on the observed bufferbloat. They need to
understand whether the delay is on the way up or on the way down, so
that they can adjust the bandwidth of the proper part of the shaper.

https://forum.openwrt.org/t/cake-w-adaptive-bandwidth-historic/108848
https://forum.openwrt.org/t/cake-w-adaptive-bandwidth/135379

V2: refreshed patches

Signed-off-by: Alexander E. Patrakov <patrakov@gmail.com>
(cherry picked from commit 688a5413d0)
2022-09-25 02:10:01 -07:00