Commit Graph

31833 Commits

Author SHA1 Message Date
Michal Hrusecky 1131acf57f knot-resolver: Update to version 5.7.1
- Fixes CVE-2023-50868 and CVE-2023-50387
- Also, the resolver has not been called 'Knot DNS Resolver' for quite
some time, so fix that, too.

Signed-off-by: Michal Hrusecky <michal.hrusecky@turris.com>
2024-03-24 11:35:38 +01:00
Šimon Bořek a68397ff77 knot-resolver: enable dnstap module build by default
'dnstap' module will be built but not loaded by default at runtime
(configuration must be provided for it to be loaded). It is still possible to
disable dnstap build manually using menuconfig.

"The dnstap module supports logging DNS requests and responses to a unix socket
in dnstap format using fstrm framing library. This logging is useful if you need
effectively log all DNS traffic."[^1]

Adds dependency on 'protobuf', 'protobuf-c', 'libfstrm'. Listed packages are
available from OpenWrt packages, have uncomplicated manifests and
while 'protobuf-c' doesn't have a maintainer since spring 2020, all the
packages (including 'protobuf-c') seem to be maintained - the last
updates of all of them in autumn 2021.

As stated by Vladimír Čunát from Knot Resolver team they build dnstap
while packaging for majority of standard Linux distributions.
Therefore this change brings us closer to expected default.

[^1]: https://knot-resolver.readthedocs.io/en/stable/modules-dnstap.html

Signed-off-by: Šimon Bořek <simon.borek@nic.cz>
2024-03-24 11:35:28 +01:00
Šimon Bořek af521478f8 knot-resolver: do not overwrite -Ddnstap=enabled configuration
It was possible to enable dnstap in menuconfig, but the configuration
only added dependencies while leaving dnstap module build disabled.

Signed-off-by: Šimon Bořek <simon.borek@nic.cz>
2024-03-24 11:35:18 +01:00
Hauke Mehrtens 50dffb7424 snort3: Fix compilation with GCC 13
This fixes a compile problem with GCC 13.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2024-03-24 10:15:42 +01:00
Hauke Mehrtens d4ef5bb60d gost_engine: Update to version 3.0.3
This version contains minor bugfixes.
It fixes a compile problem with GCC 13.

Changes: https://github.com/gost-engine/engine/compare/v3.0.1...v3.0.3

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2024-03-23 22:35:50 -07:00
krant 5debfae868 imagemagick: update to 7.1.1.29
- Don't ignore version suffix (upstream 7.1.1-29 becomes 7.1.1.29)
- Avoid superfluous libstdcpp dependency

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-23 22:33:50 -07:00
krant 0ba53d3a0d giflib: update to 5.2.2
Drop upstreamed CVE patches.

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-23 22:30:51 -07:00
Ivan Pavlov 35ef370178 openvpn: update to 2.6.10
This is a bugfix release containing several security fixes specific to the Windows platform.

Bug fixes
---------
- Windows: if the win-dco driver is used (default) and the GUI requests
  use of a proxy server, the connection would fail.  Disable DCO in
  this case.

- Compression: minor bugfix in checking option consistency vs. compiled-in
  algorithm support

- systemd unit files: remove obsolete syslog.target

Security fixes
--------------
- CVE-2024-27459: Windows: fix a possible stack overflow in the
  interactive service component which might lead to a local privilege
  escalation.

- CVE-2024-24974: Windows: disallow access to the interactive service
  pipe from remote computers.

- CVE-2024-27903: Windows: disallow loading of plugins from untrusted
  installation paths, which could be used to attack openvpn.exe via
  a malicious plugin.

For details refer to https://github.com/OpenVPN/openvpn/blob/v2.6.10/Changes.rst

Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
2024-03-23 14:00:08 +01:00
Javier Marcet a7363a33ac docker-compose: Update to version 2.26.0
Signed-off-by: Javier Marcet <javier@marcet.info>
2024-03-23 13:59:41 +01:00
jiangslee b503f9f0df netbird: update to 0.26.3
Signed-off-by: jiangslee <jiangsili@qq.com>
2024-03-23 13:06:45 +08:00
Zephyr Lykos 8834608bc1 tailscale: Update to 1.62.0
https://github.com/tailscale/tailscale/releases/tag/v1.62.0

Signed-off-by: Zephyr Lykos <git@mochaa.ws>
2024-03-23 13:05:17 +08:00
Stan Grishin 44f1f1184a pbr: prepare migration to APK
* remove dependencies/references to opkg
* simplify wan/wan6 discovery

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2024-03-23 01:03:59 +00:00
Stan Grishin 19bba88ab2
Merge pull request #23684 from stangri/master-pbr
pbr: update to 1.1.4-5
2024-03-22 19:03:04 -06:00
Stan Grishin 9cb2dbd23c nebula: prepare migration to APK
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2024-03-23 01:02:48 +00:00
Stan Grishin 706592edcc adblock-fast: prepare migration to APK
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2024-03-23 01:02:05 +00:00
krant 6c3db5d603 opus: update to 1.5.1
- Switch to Meson build system
- Update patch with Meson build fixes

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:09:21 +08:00
Maxim Storchak 1b7cedfdc2 tgt: update to 1.0.91
Signed-off-by: Maxim Storchak <m.storchak@gmail.com>
2024-03-22 16:08:56 +08:00
krant b9836b0151 libstrophe: update to 0.13.1
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:08:34 +08:00
krant d4538b5fff minisatip: update to 1.3.4
- Configure option 'dvbaes' renamed to 'dvbca'

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:08:23 +08:00
krant 24825f0eed minizip: update to 4.0.5
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:08:12 +08:00
krant 0da2cb5266 squid: update to 6.8
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:08:00 +08:00
krant a8820671e4 libdeflate: update to 1.19
- Use proper tarball URL.

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:07:31 +08:00
krant 24b838da69 hwdata: update to 0.380
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:06:55 +08:00
krant b9d26c893b mpg123: update to 1.32.5
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:06:47 +08:00
krant 0cc5590999 unrar: update to 7.0.7
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:06:37 +08:00
krant 7a7a87dfbd git-lfs: update to 3.5.1
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:06:25 +08:00
krant 6a0beb0ba0 git: update to 2.44.0
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:06:14 +08:00
krant 4cdbedc5f2 erlang: update to 26.2.3
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:05:20 +08:00
krant 8db49729c3 expat: update to 2.6.2
Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-22 16:04:54 +08:00
Russell Senior 09e9dcb047 pulseaudio: update to 17.0
changes:
  remove meson_gio patch, already applied upstream
  move pulseaudio-system.conf following upsteam change in e96d278bfc5:
    "daemon/meson.build: Install dbus policy in /usr, not /etc"

Signed-off-by: Russell Senior <russell@personaltelco.net>
2024-03-22 16:04:38 +08:00
Florian Eckert 8bbc9c7d79
Merge pull request #23693 from TDT-AG/pr/20240319-rrdtool1
rrdtool1: add license information
2024-03-21 10:22:26 +01:00
Florian Eckert d758eab46b rrdtool1: change download URL to https
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2024-03-21 10:04:34 +01:00
Florian Eckert 694dfdb5c2 rrdtool1: add license information
See the license information on the rrdtool homepage.
https://oss.oetiker.ch/rrdtool/license.en.html

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2024-03-21 09:59:48 +01:00
Tianling Shen 4448d9f4a1
dnsproxy: Update to 0.66.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2024-03-21 15:05:52 +08:00
Tianling Shen bcb7553385
cloudflared: Update to 2024.3.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2024-03-21 15:05:52 +08:00
Tianling Shen 7cb8ac0966
v2ray-geodata: Update to latest version
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2024-03-21 15:05:52 +08:00
Tianling Shen b627928682
v2ray-core: Update to 5.15.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2024-03-21 15:05:51 +08:00
Tianling Shen 09c4a4b1ba
xray-core: Update to 1.8.9
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2024-03-21 15:05:51 +08:00
Ozan Göktan 544e4a9061 microsocks: update to 1.0.4
Signed-off-by: Ozan Göktan <ozan@goktan.site>
2024-03-21 14:51:58 +08:00
Michael Heimpold 8742b6c340
Merge pull request #23695 from mhei/php8-update-to-8.3.4
php8: update to 8.3.4
2024-03-21 07:42:15 +01:00
Peter van Dijk bd337ef2e6 dnsdist: update to 1.9.1 and add maintainer
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2024-03-21 14:40:39 +08:00
Peter van Dijk 987be5cf23 pdns: update to 4.9.0 and add maintainer
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2024-03-21 14:37:20 +08:00
Peter Liedholm 39dc7da2d8 telldus-mqtt: bump to 0.3
Signed-off-by: Peter Liedholm <peterfromswe884@gmail.com>
2024-03-21 14:10:31 +08:00
Josef Schlehofer 8b7040b6de lualanes: update to version 3.16.3 and use tarball
1. Update it to version 3.16.3
Release notes: https://github.com/LuaLanes/lanes/releases/tag/v3.16.3

2. Change to download tarball instead of checking out Git sources
In the previous commit (in the Fixes tag), it was changed to Git sources without any reason. Let's revert it back. Let's use again tagged release.

Fixes: b93e5b45b1 ("lualanes: Version bump to v3.16.2")

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2024-03-21 14:09:57 +08:00
krant 1cef352d28 xz: update to 5.6.1
- Change source URL to the up-to-date one

Signed-off-by: krant <aleksey.vasilenko@gmail.com>
2024-03-21 14:05:16 +08:00
Tianling Shen 6aa843b2f3
Merge pull request #23475 from mcha-forks/go-1.22
golang: update to 1.22.1
2024-03-21 13:55:34 +08:00
Stan Grishin 790753f6a6 pbr: update to 1.1.4-5
This update includes the following changes:
1. Makefile
  * update copyright
  * attempt to implement the proper variants to avoid luci-app dependency on both variants
  * quietly stop service on uninstall

2. Config-file
  * add the list of dnsmasq instances to target in supported dnsmasq modes
  * for default pbr variant, set the `resolver_set` to `dnsmasq.nftset`
  * for iptables pbr variant, set the `resolver_set` to `dnsmasq.ipset`
  * add the `nft_file_support` (disabled by default)
  * introduce `procd_boot_delay` to delay service start on boot
  * introduce the following nft set creation options:
    * nft_set_auto_merge
    * nft_set_counter
    * nft_set_flags_interval
    * nft_set_flags_timeout
    * nft_set_gc_interval
    * nft_set_policy
    * nft_set_timeout
  * add the pbr.user.wg_server_and_client custom user script to allow running wg server and
    client at the same time
  * add the "Ignore Local Requests" sample policy

3. Hotplug firewall/interface scripts
  * better logged messages

4. The pbr and pbr-iptables uci defaults script
  * use functions from the init script
  * improve vpn-policy-routing migration

5. The pbr-netifd uci defaults script
  * use functions from the init script
  * improve uci operations

6. Introduce the firewall.include file

7. Improve pbr.user.aws custom user script

8. Improve pbr.user.netflix custom user script

9. Introduce pbr.user.wg_server_and_client custom user script

10. Update the init file:
  * refactor some code to allow the init script file to be sourced by the uci defaults scripts
    and the luci rpcd script for shared functions
  * add support for `nft_file_mode` in which service prepares the fw4-compatible atomic nft/include
    file for faster operations on service reload
  * improve Tor support (nft mode only)
  * implement support for nft set options
  * update validation functions for new options/parameters

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2024-03-20 19:10:45 +00:00
Andreas Gnau 3b13b08ad9 nginx: Fix compilation with LTO
When CONFIG_USE_LTO=y, the int-size detection script will fail because a
variable gets optimised out. Mark it as volatile to fix the issue.

Signed-off-by: Andreas Gnau <andreas.gnau@iopsys.eu>
2024-03-20 11:36:08 -07:00
Toke Høiland-Jørgensen d701cae191 net/acme-common: Fix example config
Make sure we quote all strings, and add missing "option" in second example.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2024-03-20 17:18:45 +01:00
Zephyr Lykos 456fa1f1b6
golang: Update to 1.22.1
Go 1.22.1 contains the following security fixes:

- CVE-2024-24783:
  crypto/x509: Verify panics on certificates with an unknown public key
  algorithm
- CVE-2023-45290
  net/http: memory exhaustion in Request.ParseMultipartForm
- CVE-2023-45289
  net/http, net/http/cookiejar: incorrect forwarding of sensitive headers
  and cookies on HTTP redirect
- CVE-2024-24785
  html/template: errors returned from MarshalJSON methods may break
  template escaping
- CVE-2024-24784
  net/mail: comments in display names are incorrectly handled

https://go.dev/doc/devel/release#go1.22.1
https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg

Signed-off-by: Zephyr Lykos <git@mochaa.ws>
2024-03-20 17:25:09 +08:00