Commit Graph

35467 Commits

Author SHA1 Message Date
Yanase Yuki
5f88ca4aad lpc21isp: remove package
This software seems no longer maintained.
The latest upstream commit is 11 years ago,
and no package depends on this.

Signed-off-by: Yanase Yuki <dev@zpc.st>
2026-01-25 14:53:14 +02:00
Goetz Goerisch
ddf8518945 tayga: transfer maintainership
As suggested by Ondřej Caletka in
https://github.com/openwrt/packages/pull/28240
transfer maintainership to myself.

Signed-off-by: Goetz Goerisch <ggoerisch@gmail.com>
2026-01-25 14:51:58 +02:00
Goetz Goerisch
66c6763b92 tayga: update to 0.9.6
Release notes: https://github.com/apalrd/tayga/releases/tag/0.9.6

Manually refreshed patch 002-bigendian_wrong_checksum.patch

Signed-off-by: Goetz Goerisch <ggoerisch@gmail.com>
2026-01-25 14:51:58 +02:00
Javier Marcet
11ea9570a8 samba4: bump to 4.22.7
https://www.samba.org/samba/history/samba-4.22.7.html

Signed-off-by: Javier Marcet <javier@marcet.info>
2026-01-25 09:22:47 +02:00
Rosen Penev
e8e657d381 python-greenlet: update to 3.3.1
Removed MIPS16 hacks. They were fixed upstream and didn't work anyway.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2026-01-25 07:10:21 +02:00
Michael Heimpold
551e00c8fc php8: small maintainance cleanups
- align the config option names
- re-order the configuration options
- add some help text
- drop obsolete notes regarding older PHP versions and obsolete CONFLICT
- remove (meanwhile) unrecognized configure options

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2026-01-25 07:06:40 +02:00
Christian Lachner
df9b7923db haproxy: implement force_reload init option
- It will be used for acme-renew events
- Fixes issue #28038

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2026-01-25 07:03:57 +02:00
John Audia
88e75f45ab snort3: update to 3.10.2.0
New upstream release. Changelog:
appid: configurable midstream service discovery
appid: prefer QUIC client appid over SSL
appid: prevent out-of-bounds read in bootp option parsing
appid: prevent out-of-bounds read in sslv2 server-hello detection
control: refactor connection ownership model and improve thread safety
extractor: avoid reporting default values for missing SSL fields
file_api: coverity fix
flow: refactor dump_flows command to dump flow state in binary format
mime: fix compile issues
react: block flow when packets are not reset candidates
show_flows: implement utility program to convert dump_flows binary files to text Flow state data for each flow
smtp: handle split CRLF in multi-line response parsing
ssl: ssl client hello event is published with empty hostname

% snort --version
       ,,_     -*> Snort++ <*-
      o"  )~   Version 3.10.2.0
       ''''    By Martin Roesch & The Snort Team
               http://snort.org/contact#team
               Copyright (C) 2014-2025 Cisco and/or its affiliates. All rights reserved.
               Copyright (C) 1998-2013 Sourcefire, Inc., et al.
               Using DAQ version 3.0.24
               Using Vectorscan version 5.4.12 2026-01-11
               Using libpcap version 1.10.5 (with TPACKET_V3)
               Using LuaJIT version 2.1.0-beta3
               Using LZMA version 5.8.1
               Using OpenSSL 3.5.4 30 Sep 2025
               Using PCRE2 version 10.47 2025-10-21
               Using ZLIB version 1.3.1

Signed-off-by: John Audia <therealgraysky@proton.me>
2026-01-25 07:00:01 +02:00
John Audia
98148a4161 snort3: update to 3.10.1.0
New upstream release. Changelog:
alert_fast: ensure call_once definition doesn't collide in std vs glibc, thanks to krag on GitHub for suggesting this fix
alert_json: add support for logging appid, thanks to ssam18 on GitHub for suggesting this change
appid: add check to avoid setting brute force state for pending sessions that are pruned
appid: allow out-of-order packet inspection in third-party engine
appid: check for Lua table errors during initialization and cleanup
appid: enable out-of-order inspection by default
appid: fix client process regex mapping logic
appid: fix eve process handler event debug logging
appid: fix setting global ssh ignore flag
appid: fix size check in TFTP service detector
appid: mDNS TXT records parsing and deviceinfo event generation
appid: prevent multiple out-of-bounds reads in ssl
build: address compilation warnings
build: fix Coverity warnings in related components
cmake: fix pkg-config path for libdir, thanks to brianmcgillion on GitHub for submitting a similar fix
decoder: adding encode function for TransbridgeCodec
dns: add fix infinite recursion vulnerability
file: use new EVP functions rather than deprecated SHA functions
flow: add logs to show different ways a flow can fail to create
ftp_telnet: fix coverity errors and improve cmd_len configurability
ftp_telnet: fix ftp_cmd_pipe_index handling
ftp_telnet: Handle malformed traffic in ftp to generate alert
hash: update hashes to use new EVP functions, thanks to
http_inspect: add urlencoded to content-type list
http_inspect: fix coverity error
iec104: fix IEC 104 SQ0 bounds checks by removing duplicate asdu_size_map entries and using IO_GROUP sizes, preventing out-of-bounds reads
iec104: validate Type I length to prevent ASDU out-of-bounds read
ips_options: fix cursor position for byte_extract
ips_options: reset PCRE rule counts on new configuration loaded
main: update dioctl daqSnort latency common change
mime: add unit tests for data fitting memory limit
mime: add unit tests for data over memory limit
mime: add unit tests for file logging
mime: fix mime boundary parsing
mime: ignore field collection if not configured
mime: implement content parsing of multipart/form_data
mime: improve form-data collection for incomplete boundaries
mime: leave room for null-character in case of size limit hit
mime: remove unused forward-declaration
mime: rename class field to comply with the style
mime: return error code if cannot add headers for logging
pub_sub: add is_urlencoded method
sip: fix out-of-bounds reads in sip_parse_sdp_m
smb,dlp: update filename,filesize of FileInfo handling to enable dlp evaluation for repeated txns
smtp: usage of config cmds
snort2lua: fix failure in converting patterns containing commas
snort_ml: enable client body scanning by default
snort_ml: scan multipart form data
ssl: free certificate data if certificate length is 0
ssl: tls client hello check out of bounds fix
unified2: use proper API for obtaining VLAN ID from packet

% snort --version

   ,,_     -*> Snort++ <*-
  o"  )~   Version 3.10.1.0
   ''''    By Martin Roesch & The Snort Team
           http://snort.org/contact#team
           Copyright (C) 2014-2025 Cisco and/or its affiliates. All rights reserved.
           Copyright (C) 1998-2013 Sourcefire, Inc., et al.
           Using DAQ version 3.0.24
           Using Vectorscan version 5.4.12 2026-01-11
           Using libpcap version 1.10.5 (with TPACKET_V3)
           Using LuaJIT version 2.1.0-beta3
           Using LZMA version 5.8.1
           Using OpenSSL 3.5.4 30 Sep 2025
           Using PCRE2 version 10.47 2025-10-21
           Using ZLIB version 1.3.1

Signed-off-by: John Audia <therealgraysky@proton.me>
2026-01-25 07:00:01 +02:00
John Audia
084f023b82 libdaq3: update to 3.0.24
New upstream release. Changelog:
api: update dioctl daqSnort latency common changes

Signed-off-by: John Audia <therealgraysky@proton.me>
2026-01-25 07:00:01 +02:00
Vladimir Ermakov
61e495e574 go2rtc: update to 1.9.14
Release note: https://github.com/AlexxIT/go2rtc/releases/tag/v1.9.14

Signed-off-by: Vladimir Ermakov <vooon341@gmail.com>
2026-01-24 19:11:03 +02:00
Dirk Brenken
81891964ed adblock: update 4.5.0-2
* rework DNS reporting: more reliable, more information (request type), better performance
* fixed minor issues
* readme update
* LuCI: added new DNS page (incl. Allowed/Blocked canvas)

Signed-off-by: Dirk Brenken <dev@brenken.org>
2026-01-24 14:35:07 +01:00
Noah Meyerhans
11aee85513 bind: bump to 9.20.18
Fixes security issues:

 - CVE-2025-13878: Malformed BRID and HHIT records could trigger an
   assertion failure.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2026-01-24 10:05:56 +02:00
George Sapkin
ac5a4f132a boringssl: drop package
Package is not being used anywhere and the version in the repo has not
been updated in over four years.

Signed-off-by: George Sapkin <george@sapk.in>
2026-01-24 02:37:03 +02:00
Daniel F. Dickinson
a2685bfad2 zabbix: fix agentd default user and minor issues
The last PR (https://github.com/openwrt/packages/pull/28370) missed
including two needed changes, and had a minor packaging Makefile
mistake.

The Zabbix Agent needs to drop privileges to the zabbix-agent user.
Similarly, if run as root (not the default), the Zabbix server needs to
drop privileges to the zabbix-server user.

There are also, in the Makefile, three instances of using BUILD_VARIANT
instead of VARIANT in package definitions.

So we fix those issues.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-23 21:13:51 +01:00
Yanase Yuki
88a5c2cc28 banhostlist: remove package
The domains list which this script uses isn't
updated for 5 years. We can use adblock related
packages instead of this script, so let's drop this.

Signed-off-by: Yanase Yuki <dev@zpc.st>
2026-01-23 21:17:14 +02:00
Vladimir Ermakov
19dd33d120 coredns: update to 1.14.1
Release note: https://coredns.io/2026/01/15/coredns-1.14.-release/

Co-authored-by: George Sapkin <george@sapk.in>
Signed-off-by: Vladimir Ermakov <vooon341@gmail.com>
2026-01-23 20:32:27 +02:00
Jens Wagner
fcaf398736 perlbase-encode: added dependency on perlbase-storable
The Encode module uses the Storable module.

Signed-off-by: Jens Wagner <jens@wagner2013.de>
2026-01-22 13:02:25 -07:00
W. Michael Petullo
e05f524244 python-semanage: update to 3.9
Upstream list of changes is available at
https://github.com/SELinuxProject/selinux/releases/tag/3.9.

Signed-off-by: W. Michael Petullo <mike@flyn.org>
2026-01-22 21:47:39 +02:00
Hirokazu MORIKAWA
3cb4028f46 node: january 13, 2026 Security Releases
HOST BUILD ONLY

Update to 22.22.0
This is a security release.
Notable Changes

    (CVE-2025-59465) add TLSSocket default error handler
    (CVE-2025-55132) disable futimes when permission model is enabled
    lib,permission:
    (CVE-2025-55130) require full read and write to symlink APIs
    src:
    (CVE-2025-59466) rethrow stack overflow exceptions in async_hooks
    src,lib:
    (CVE-2025-55131) refactor unsafe buffer creation to remove zero-fill toggle
    tls:
    (CVE-2026-21637) route callback exceptions through error handlers

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2026-01-22 20:53:49 +02:00
W. Michael Petullo
5de77732b6 python-selinux: update to 3.9
Upstream list of changes is available at
https://github.com/SELinuxProject/selinux/releases/tag/3.9.

Signed-off-by: W. Michael Petullo <mike@flyn.org>
2026-01-22 20:52:28 +02:00
W. Michael Petullo
e56e3d8bdd semodule-utils: update to 3.9
Upstream list of changes is available at
https://github.com/SELinuxProject/selinux/releases/tag/3.9.

Signed-off-by: W. Michael Petullo <mike@flyn.org>
2026-01-22 20:52:02 +02:00
W. Michael Petullo
f69da9a1c2 selinux-python: update to 3.9
Upstream list of changes is available at
https://github.com/SELinuxProject/selinux/releases/tag/3.9.

Signed-off-by: W. Michael Petullo <mike@flyn.org>
2026-01-22 20:51:36 +02:00
Qingfang Deng
fea0a803de openvswitch: remove nf-conntrack6 dependency
nf-conntrack6 is now an empty package, so remove it.

Signed-off-by: Qingfang Deng <dqfext@gmail.com>
2026-01-22 17:17:22 +02:00
Qingfang Deng
b49c772886 jool: remove nf-conntrack6 dependency
nf-conntrack6 is now an empty package, so remove it.

Signed-off-by: Qingfang Deng <dqfext@gmail.com>
2026-01-22 17:17:22 +02:00
xiao bo
c2df4f3b63 sing-box: update to 1.12.17
changelog: https://github.com/SagerNet/sing-box/releases/tag/v1.12.17

Signed-off-by: xiao bo <peterwillcn@gmail.com>
2026-01-22 17:16:25 +02:00
Daniel F. Dickinson
3de4d24830 python-passlib: remove unmaintained package
passlib is unmaintained since 2020 and a maintained fork called libpass,
which is a drop-in replacement (even using the passlib module name), is
now available. https://github.com/Kozea/Radicale/issues/1952 has more
information.

Therefore we remove the python-passlib package from this repo.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-22 13:57:48 +07:00
Daniel F. Dickinson
7af729700b radicale3: bump to version 3.6.0
This eliminates a dependency on the unmaintained passlib
(python3-passlib) package and add a dependency on libpass, a maintained
fork of passlib: https://github.com/Kozea/Radicale/pull/1953

In addition Radicale auth type 'autodetect' for `htpasswd` auth has
been improved by upstream.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-22 13:57:48 +07:00
Daniel F. Dickinson
ead09d5fd9 python-libpass: add replacement for passlib
passlib has not be updated since 2020 and is therefore a dead project.
Radicale (used in this repo as radicale3) has updated to use libpass (a
maintained fork of passlib): https://github.com/Kozea/Radicale/pull/1953
therefore add python3-libpass to provide libpass, a drop-in replacement
for passlib, and a dependency for Radicale v3.6.0.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-22 13:57:48 +07:00
Michael Heimpold
4fd9971c59 mmc-utils: update to upstream's 8f41ccbb40b8 commit
Summary of upstream's highlight changes:
- recognize ext_csd_rev 9
- fix CID manufacturing date decoding
- add ability to flush optional eMMC cache
- upcoming versioning
- RPMB handling refactoring
- improved FFU support
- doc/help refactoring/cleanups

This also requires updating our patch for fortify-ing and
we need to add a flag to disable a call to 'sparse' tool.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2026-01-21 18:54:04 +01:00
Juan Antonio
afd01e3034 ddns-scripts: fix luci XHR timeout when restarting ddns service
Redirect stdout and stderr to /dev/null when starting/restarting the ddns
service in the background. Without this redirection, file descriptors are
inherited by the child process, preventing proper process detachment and
causing luci's XHR requests to timeout.
2026-01-21 08:00:39 +01:00
Daniel F. Dickinson
c199e37415 radicale3: make the empty uci config consistent
We update the missing sections defaults to match the upstream default,
which are also our defaults when there is an UCI configuration, and
are also the defaults for the LuCI app.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-21 07:42:10 +02:00
Daniel F. Dickinson
9e33952b60 radicale3: add better reload handling
We update the initscript to rebuild the radicale3 target configuration
file and then HUP the radicale3 process to reload it, on a reload
event, rather than the default which does not regenerate the target
configuration.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-21 07:42:10 +02:00
Daniel F. Dickinson
78cf89d7d3 radicale3: update initial uci config
With recent changes to the proposed PR
(https://github.com/openwrt/luci/pull/8216) for the LuCI app for
radicale3, it is not longer necessary that uncommented configuration
be present in /etc/config/radicale3 for the LuCI app to work.

Therefore make the initial uci config commented sample only.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-21 07:42:10 +02:00
Daniel F. Dickinson
ecf9fb51db radicale3: fix permissions on ssl cert/key
When LuCI uploads files like the SSL key and certificate, it makes the
files readable only by root. Since radicale is running as a
non-privileged user it is unable to access a certificate and key
uploaded by LuCI, therefore when SSL cert and key (and optional CA) are
configured, make them group radicale3 and group readable, so the
radicale server can use them.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-21 07:42:10 +02:00
Stijn Tintel
6b58aa69ca kea: create /var/lib/kea directory in init script
This is required to fix the following error:

kea-dhcp4: ERROR [kea-dhcp4.dhcpsrv.548449842384] DHCPSRV_MEMFILE_FAILED_TO_OPEN Could not open lease file: invalid path specified: '/var', supported path is '/var/lib/kea'

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2026-01-20 13:19:17 -07:00
Stijn Tintel
e4f965537d kea: fix /var/run/kea permissions
This is required to fix the following error:

kea-dhcp-ddns[3115]: 2026-01-15 20:00:36.776 FATAL [kea-dhcp-ddns.dctl/3115.547785590368] DCTL_CONFIG_FILE_LOAD_FAIL DhcpDdns reason: 'socket-name' is invalid: socket path:/var/run/kea does not exist or does not have permssions = 750

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2026-01-20 13:19:17 -07:00
Ray Wang
47a3e4d935 hev-socks5-tunnel: update to 2.14.3
Upstream changelog:
https://github.com/heiher/hev-socks5-tunnel/releases/tag/2.14.3

Signed-off-by: Ray Wang <git@hev.cc>
2026-01-19 20:55:04 +02:00
Dirk Brenken
389baa9d00 adblock: release 4.5.0-1
* added firewall rules based on nftables in a separate isolated nftables table (inet adblock)
  and chains (prerouting), with MAC addresses stored in an nftables set.
  Implemented the following firewall‑integrated features:
  * external DNS Routing (unfiltered): routes DNS queries from selected devices or interfaces
    to an external unfiltered DNS resolver
  * external DNS Routing (filtered): routes DNS queries from selected devices or interfaces
    to an external filtered DNS resolver
  * force DNS: blocks or redirects all external DNS traffic from selected interfaces
    to ensure that clients use the local resolver
* removed the optional generation of an additional jail list (only supported bydnsmasq),
  use the new, resolver independent ext. DNS routing instead
* removed the pz-client-ip feature (only supported by bind),
  use the new, resolver independent ext. DNS routing instead
* removed the obsolete, hardcoded fw4 rules for DNS enforcement
  existing rules will be removed via uci-defaults script after adblock update
* changed the Jail mode to a simple allowlist-only mode
* fixed minor issues in the mail template
* readme update
* LuCI: added a new config tab "Firewall Settings"
* LuCI: fixed minor usability issues

Signed-off-by: Dirk Brenken <dev@brenken.org>
2026-01-18 23:36:26 +01:00
monokoo
ae659deb40 ddns-scripts: add multiple DNS records support for aliyun ddns
Added logic to extract and match DNS record ID from parameters,
with fallback to default selection if no match is found.

Signed-off-by: QiLei Niu <qilei.niu@gmail.com>
2026-01-18 17:11:00 +01:00
Tianling Shen
cd4e1a0bd1 v2ray-geodata: Update to latest version
Update all geodata.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2026-01-18 14:51:48 +08:00
Tianling Shen
7e6e847f0a v2ray-core: Update to 5.44.1
Release note:
- https://github.com/v2fly/v2ray-core/releases/tag/v5.43.0
- https://github.com/v2fly/v2ray-core/releases/tag/v5.44.1

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2026-01-18 14:48:43 +08:00
Til Kaiser
ae97873974 madplay: fix compilation with GCC 15
Define __GNU_LIBRARY__ for a proper getopt
declaration when building with GCC 15.

Signed-off-by: Til Kaiser <mail@tk154.de>
2026-01-18 07:35:21 +02:00
Othmar Truniger
b2146d5952 knxd: bump to version 0.14.75
new upstream version 0.14.75
remove obsolete patch 0110-configure.ac.patch

Signed-off-by: Othmar Truniger <github@truniger.ch>
2026-01-18 07:34:15 +02:00
Niklas Thorild
64e9681a10 telegraf: update to 1.37.1
- Update Telegraf to v1.37.1

Signed-off-by: Niklas Thorild <niklas@thorild.se>
2026-01-18 07:33:47 +02:00
Jan Hák
40234e5b58 knot: update to version 3.5.3
Release notes: https://www.knot-dns.cz/2026-01-16-version-353.html

Signed-off-by: Jan Hák <jan.hak@nic.cz>
2026-01-18 07:33:20 +02:00
Daniel F. Dickinson
8ab5a3d7c3 zabbix: avoid unnecessary configure/compile
For items which are only copied from the source code, avoid the
prepare, configure, and compile steps, while preserving the special
behaviour of the mac80211 addon, which has a unique prepare and
compile.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-18 07:21:18 +02:00
Daniel F. Dickinson
f798e17379 zabbix: deduplicate zabbix-agentd Makefile parts
Avoid unnecessary duplication on zabbix-agentd package definitions by
using a common zabbix-agentd/Default and extending it for different
zabbix-agentd flavours.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-18 07:21:18 +02:00
Daniel F. Dickinson
907e9c6b1e zabbix: use separate users for agent and server
For security, per upstream recommendations, use a separate user for the
agent daemon and the server daemon.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-18 07:21:18 +02:00
Daniel F. Dickinson
1f3251545d zabbix: bump to 7.0.22 LTS
Bump Zabbix to the latest released 7.0.x LTS version.

Signed-off-by: Daniel F. Dickinson <dfdpublic@wildtechgarden.ca>
2026-01-18 07:21:18 +02:00