Commit Graph

8007 Commits

Author SHA1 Message Date
jerrykuku
e988e529b8
luci-app-jd-dailybonus: bump to 1.0.1
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-23 19:29:07 +08:00
vernesong
d2d2a0d6cb
OpenClash: add auto restart support
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-23 19:22:42 +08:00
jerrykuku
296e65d890
luci-app-vssr: bump to v1.22
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-23 18:48:17 +08:00
ardanzhu
77f6cfb52d dnsmasq: place 'OPT_FILTER_AAAA' before 'OPT_LAST' 2021-01-23 12:38:59 +08:00
hue715
e392642bdd
luci-app-speederv2: fix bin check
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-21 23:53:56 +08:00
CN_SZTL
38d81ee457
feeds: packages: sync with OpenWrt snapshot
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-21 23:45:26 +08:00
xiaorouji
849594d74f
luci-app-passwall: bump to 4-9
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-21 23:25:21 +08:00
AmadeusGhost
599e9680fe
dnsmasq: add missing definition
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-21 23:11:41 +08:00
AmadeusGhost
8bd397327c
dnsmasq: refresh patches
Fix: #260
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-21 23:11:33 +08:00
Hauke Mehrtens
734782df28
dnsmasq: Update to version 2.83
This fixes the following security problems in dnsmasq:
* CVE-2020-25681:
  Dnsmasq versions before 2.83 is susceptible to a heap-based buffer
  overflow in sort_rrset() when DNSSEC is used. This can allow a remote
  attacker to write arbitrary data into target device's memory that can
  lead to memory corruption and other unexpected behaviors on the target
  device.
* CVE-2020-25682:
  Dnsmasq versions before 2.83 is susceptible to buffer overflow in
  extract_name() function due to missing length check, when DNSSEC is
  enabled. This can allow a remote attacker to cause memory corruption
  on the target device.
* CVE-2020-25683:
  Dnsmasq version before 2.83 is susceptible to a heap-based buffer
  overflow when DNSSEC is enabled. A remote attacker, who can create
  valid DNS replies, could use this flaw to cause an overflow in a heap-
  allocated memory. This flaw is caused by the lack of length checks in
  rtc1035.c:extract_name(), which could be abused to make the code
  execute memcpy() with a negative size in get_rdata() and cause a crash
  in Dnsmasq, resulting in a Denial of Service.
* CVE-2020-25684:
  A lack of proper address/port check implemented in Dnsmasq version <
  2.83 reply_query function makes forging replies easier to an off-path
  attacker.
* CVE-2020-25685:
  A lack of query resource name (RRNAME) checks implemented in Dnsmasq's
  versions before 2.83 reply_query function allows remote attackers to
  spoof DNS traffic that can lead to DNS cache poisoning.
* CVE-2020-25686:
  Multiple DNS query requests for the same resource name (RRNAME) by
  Dnsmasq versions before 2.83 allows for remote attackers to spoof DNS
  traffic, using a birthday attack (RFC 5452), that can lead to DNS
  cache poisoning.
* CVE-2020-25687:
  Dnsmasq versions before 2.83 is vulnerable to a heap-based buffer
  overflow with large memcpy in sort_rrset() when DNSSEC is enabled. A
  remote attacker, who can create valid DNS replies, could use this flaw
  to cause an overflow in a heap-allocated memory. This flaw is caused
  by the lack of length checks in rtc1035.c:extract_name(), which could
  be abused to make the code execute memcpy() with a negative size in
  sort_rrset() and cause a crash in dnsmasq, resulting in a Denial of
  Service.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-21 23:11:00 +08:00
zxlhhyccc
60d63904de
naiveproxy: bump to 88.0.4324.96-1
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-21 13:35:31 +08:00
Adrian Schmutzler
83a2987c47 sunxi: tidy up cases in base-files
This removes unnecessary quotes in cases and applies alphabetic
order to members.

Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
2021-01-21 12:06:07 +08:00
Rogan Dawes
2e4457de4d
sunxi: add text referencing Allwinner H3 and H5 CPUs
This makes it a little easier to figure out which options to choose.

Signed-off-by: Rogan Dawes <rogan@dawes.za.net>
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-21 00:33:29 +08:00
ZhenYu
da8aa70efb uugamebooster & luci-app-uugamebooster (#6217)
* uugamebooster: rebuild startup service
* luci-app-uugamebooster: use standerd terms
* luci-app-uugamebooster: use inter-startup funcion
* luci-app-uugamebooster: fix typo
2021-01-20 12:09:41 +08:00
lean
1e52ee2da7 Add luci-app-uugamebooster for uuplugin 2021-01-20 12:08:54 +08:00
Nick Hainke
9a8c1fa2e2 owipcalc: remove clone in cidr_contains6
The "cidr_contains6" functions clones the given cidr. The contains4
does not clone the cidr. Both functions do not behave the same.

I see no reason to push the cidr. I think that we get only a negligible
performance gain, but it makes ipv4 and ipv6 equal again.

Signed-off-by: Nick Hainke <vincent@systemli.org>
2021-01-20 12:05:20 +08:00
Beginner
3a7d5224ca
kcptun: update to v20210103
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-19 23:08:00 +08:00
taowazi007
10e725ec6c
luci-app-ssrserver-python: add support for IPv6 and chacha20 cipher
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-19 23:07:16 +08:00
Mattraks
7d245fe3d4
luci-app-ssr-plus: bug fixes
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-19 23:01:34 +08:00
taowazi007
f0442438e8
luci-app-ssr-plus: add support for IPv6
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-19 18:18:22 +08:00
Rosen Penev
52285f6cc9 mbedtls: update to 2.16.9
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-18 12:06:31 +08:00
Rosen Penev
ddcdb89080 libusb: make InstallDev explicit
Helps to see what actually gets installed.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-18 12:05:59 +08:00
Rosen Penev
2397a49f16 libusb: cleanup PKG_ variables
Reordered for consistency between packages.

Fixed license information.

Change PKG_BUILD_PARALLEL to 1. This is no longer a problem.1

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-18 12:05:35 +08:00
Rosen Penev
02ac91f75e libusb: update to 1.0.24
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-18 12:05:15 +08:00
CN_SZTL
aa0568d912
luci-app-unblockneteasemusic: move to self-maintained repo
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-17 02:11:26 +08:00
CN_SZTL
0a81e6ef4f
sub-web: replace dead jsdelivr cdn with original git raw
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-17 00:26:26 +08:00
Etan Kissling
675e7b17bc
mbedtls: add config option to compile with hkdf
This adds a config option to allow compiling with HKDF algorithm support
to support applications that require this feature.

Signed-off-by: Etan Kissling <etan_kissling@apple.com>
2021-01-16 23:29:11 +08:00
CN_SZTL
ed2dc1c007
sunxi: move to kernel 4.19 and drop unusable devices
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-16 20:10:02 +08:00
Mattraks
33c2ee76ef
luci-app-ssr-plus: bump to 182-5
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-16 19:04:08 +08:00
ZhenYu
6f009e536b
uugamebooster: add new package
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-16 18:01:05 +08:00
Beginner
61503a43c6
xray: Update to v1.2.2
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-16 17:59:03 +08:00
xiaorouji
58af1052e4
luci-app-passwall: bump to 4-7
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-16 17:59:03 +08:00
jerrykuku
74ea455c1d
luci-app-vssr: bump to v1.21
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-16 17:59:01 +08:00
Hans Dedecker
b009692333 glibc: update to latest 2.32 commit (BZ #20019, BZ #27177, BZ #27130)
4c619b3eed x86: Check IFUNC definition in unrelocated executable [BZ #20019]
87450ecf8a x86: Set header.feature_1 in TCB for always-on CET [BZ #27177]
2b4f67c2b3 Update for [BZ #27130] fix
1a24bbd43e x86-64: Avoid rep movsb with short distance [BZ #27130]

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2021-01-16 12:22:57 +08:00
Nick Hainke
461004d633 owipcalc: use v6 in cidr_parse6 function
The cidr_parse6 function parses a string to an ipv6-address.
The cidr struct contains a union called buf for the ipv4 and ipv6
address. Since it is a char pointer and the struct is initialized with
the maximum size (so ipv6 string) it does not make any difference.
However, we should access the buffer using the v6 name, since it could
be confusing otherwise.

Signed-off-by: Nick Hainke <vincent@systemli.org>
2021-01-16 12:06:56 +08:00
Paul Spooren
47c5f0c98f scripts: target-metadata don't add PROFILES twice
Since 4ee3cf2b5a profiles with alternative vendor names may appear
multiple times in `tmp/.targetinfo` or `.targetinfo` (for
ImageBuilders).

The `target-metadata.pl` script adds these profiles then twice to
`PROFILE_NAMES` and the ImageBuilder show the profile twice when running
`make info`.

This patch removes duplicate profile IDs and only adds them once to
`.profiles.mk`.

Signed-off-by: Paul Spooren <mail@aparcar.org>
2021-01-16 12:05:05 +08:00
AmadeusGhost
9b340aa3d4 treewide: drop packages which already in feeds 2021-01-15 19:38:07 +08:00
AmadeusGhost
0485ef53bc tinyfecVPN/tinyPortMapper: add packages 2021-01-15 19:35:42 +08:00
Rosen Penev
a75ff31357 glibc: add arc700 patch
glibc does not officially support ARC700 so this adds the missing
pieces. I looked at uClibc-ng and a patch by Synopsis for glibc.

ran make toolchain/glibc/refresh to clean up fuzz.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-15 12:08:37 +08:00
Felix Fietkau
2b9026997c tools/fakeroot: fix build regression on macOS
AT_EMPTY_PATH and AT_NO_AUTOMOUNT does not exist there

Signed-off-by: Felix Fietkau <nbd@nbd.name>
2021-01-15 12:06:39 +08:00
David Bauer
aa3c691da5 zstd: fix package source
It looks like GitHub changed the URL path for release tarballs, thus the
download for the zstd package was always falling back to the OpenWrt
sources mirror.

Fix the GitHub URL for one which works. The file hash remains unchanged.

Signed-off-by: David Bauer <mail@david-bauer.net>
2021-01-14 12:08:12 +08:00
CN_SZTL
31b9dfcb61
Revert "ramips: mt7621 OC 1000 MHz"
This hack is not stable and causes some devices against to boot,
users should make oc via their u-boot but not kernel hacks.

This reverts commit 5c6eeab752.

Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-13 12:34:09 +08:00
Thomas Nixon
06a274c76a
tools/ccache: find libzstd using rpath
Previously, ccache would end up using the system libzstd, which is not
supposed to be a build requirement.

Signed-off-by: Thomas Nixon <tom@tomn.co.uk>
2021-01-11 20:58:10 +08:00
xiaorouji
2376c863d6
luci-app-passwall: bug fixes
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-11 20:26:03 +08:00
CN_SZTL
548764d282
treewide: replace wrong PKG_ARCH with PKGARCH
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-11 20:19:27 +08:00
CN_SZTL
34a40287a7
sub-web: add examples from ACL4SSR and Subconverter
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-11 19:58:44 +08:00
CN_SZTL
8f592ca694
sub-web: fix display issue when it is deployed at a sub-path
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-11 19:33:21 +08:00
CN_SZTL
c82870a6e6
sub-web: marked as a general package for all arch 2021-01-11 18:49:30 +08:00
CN_SZTL
51f30d134e
sub-web: add new package
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2021-01-11 18:43:59 +08:00
CN_SZTL
b1107b633d
subconverter: fix init 2021-01-11 18:42:52 +08:00