2136 Commits

Author SHA1 Message Date
AmadeusGhost
7436d6866f
openssl: bump to 1.1.1j (#6410)
This fixes 4 security vulnerabilities/bugs:

- CVE-2021-2839 - SSLv2 vulnerability. Openssl 1.1.1 does not support
  SSLv2, but the affected functions still exist. Considered just a bug.

- CVE-2021-2840 - calls EVP_CipherUpdate, EVP_EncryptUpdate and
  EVP_DecryptUpdate may overflow the output length argument in some
  cases where the input length is close to the maximum permissable
  length for an integer on the platform. In such cases the return value
  from the function call will be 1 (indicating success), but the output
  length value will be negative.

- CVE-2021-2841 - The X509_issuer_and_serial_hash() function attempts to
  create a unique hash value based on the issuer and serial number data
  contained within an X509 certificate. However it was failing to
  correctly handle any errors that may occur while parsing the issuer
  field (which might occur if the issuer field is maliciously
  constructed). This may subsequently result in a NULL pointer deref and
  a crash leading to a potential denial of service attack.

- Fixed SRP_Calc_client_key so that it runs in constant time. This could
  be exploited in a side channel attack to recover the password.

The 3 CVEs above are currently awaiting analysis.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>

Co-authored-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2021-02-21 12:25:02 +08:00
AmadeusGhost
73fdfdf6aa
v2ray-plugin: fix build with goproxy (#6391) 2021-02-17 23:47:14 +08:00
fliaping
91efc63019
fix ddns(dnspod) update I pv6和ipv4 (#6383)
1. 当一个域名同时有A记录和AAAA记录时,在不需要更新时去更新,接口返回错误导致的脚本挂掉的问题,
接口报错信息:Error message:[记录已经存在,无需再次添加]
2. 文案明显错误修改
2021-02-16 23:01:40 +08:00
AmadeusGhost
db3ec85639
goproxy: replace unavailable goproxy.io (#6371)
The currently used goproxy.io will redirect to proxy.golang.com.cn
and cause compilation failure.
2021-02-15 18:02:53 +08:00
acooler15
22cfbe7faa
add function extra_command (#6357) 2021-02-11 09:19:12 +08:00
小离
e922f4a778
luci-app-jd-dailybonus: Keep up to date from jerrykuku (#6350)
Fix issues:
- Fix permission denied
- Fix html tag mismatch in openwrt theme
2021-02-11 09:18:04 +08:00
然后七年
51a94cb899
Remove V2Ray: Xray-core will provide (#6327) 2021-02-08 17:17:00 +08:00
AmadeusGhost
5b1838d04d
kernel: bump 5.4 to 5.4.95 (#6340) 2021-02-08 17:13:28 +08:00
Mattraks
fbdca3d67e
microsocks:bump to 1.0.2 (#6320)
https://github.com/rofl0r/microsocks/releases/tag/v1.0.2
2021-02-04 16:27:47 +08:00
Mattraks
e33b848bb2
ipt2socks:bump to 1.1.3 (#6317)
https://github.com/zfl9/ipt2socks/releases/tag/v1.1.3
2021-02-03 12:40:47 +08:00
lean
9bc05c5ce3 Version update to R21.2.1 2021-02-01 11:22:35 +08:00
ricksuzade-maker
b61d7f5d5b
Bump npc to 0.26.9 (#6279)
Bump npc to the newest version
2021-02-01 11:16:48 +08:00
ricksuzade-maker
3da0060131
Bump wireguard to 1.0.20210124 (#6285) 2021-02-01 11:16:20 +08:00
pupie
96f26d716a
Add scramble option in options file. (#6287) 2021-01-31 14:49:19 +08:00
Beginner
4244e635c6
luci-app-jd-dailybonus: Keep up to date from jerrykuku (#6296) 2021-01-31 14:48:32 +08:00
xiaobaishu1
7daf3edcec
Update Makefile (#6290)
切换到正式版本
2021-01-31 14:48:11 +08:00
AmadeusGhost
b95ffef87f
Revert "dnsmasq: force sync with official code" (#6266)
Fixes: 9170d18d0da78b7e70b9f45d0bf7771feee90a25 ("dnsmasq: Update to 2.84test3")
2021-01-27 17:12:30 +08:00
EnnawYang
6ee0262477
luci-app-jd-dailybonus: merge upstream code (#6262) 2021-01-26 18:38:53 +08:00
Beginner
9170d18d0d
dnsmasq: Update to 2.84test3 (#6259) 2021-01-26 18:38:30 +08:00
Beginner
1de5883783
luci-app-jd-dailybonus: update v1.0.3 from jerrykuku (#6255) 2021-01-26 00:17:05 +08:00
Beginner
434b834160
luci-app-jd-dailybonus: Keep up to date from jerrykuku (#6253)
* luci-app-jd-dailybonus: Keep up to date from jerrykuku

* luci-app-jd-dailybonus: Keep up to date from jerrykuku
2021-01-25 22:32:23 +08:00
eSir
b927a69df8
Upgrade OpenVPN to 2.5.0 & Add xorpatch as a scramble option (#6249) 2021-01-25 16:33:40 +08:00
xiaobaishu1
e780247bf7
Update DNSMASQ (#6250) 2021-01-25 16:31:52 +08:00
EnnawYang
3a50f6d523
luci-app-jd-dailybonus:bump to v1.0.2 (#6247) 2021-01-25 09:54:03 +08:00
AmadeusGhost
1c271cdd2c
dnsmasq: Update to version 2.83 (#6245)
This fixes the following security problems in dnsmasq:
* CVE-2020-25681:
  Dnsmasq versions before 2.83 is susceptible to a heap-based buffer
  overflow in sort_rrset() when DNSSEC is used. This can allow a remote
  attacker to write arbitrary data into target device's memory that can
  lead to memory corruption and other unexpected behaviors on the target
  device.
* CVE-2020-25682:
  Dnsmasq versions before 2.83 is susceptible to buffer overflow in
  extract_name() function due to missing length check, when DNSSEC is
  enabled. This can allow a remote attacker to cause memory corruption
  on the target device.
* CVE-2020-25683:
  Dnsmasq version before 2.83 is susceptible to a heap-based buffer
  overflow when DNSSEC is enabled. A remote attacker, who can create
  valid DNS replies, could use this flaw to cause an overflow in a heap-
  allocated memory. This flaw is caused by the lack of length checks in
  rtc1035.c:extract_name(), which could be abused to make the code
  execute memcpy() with a negative size in get_rdata() and cause a crash
  in Dnsmasq, resulting in a Denial of Service.
* CVE-2020-25684:
  A lack of proper address/port check implemented in Dnsmasq version <
  2.83 reply_query function makes forging replies easier to an off-path
  attacker.
* CVE-2020-25685:
  A lack of query resource name (RRNAME) checks implemented in Dnsmasq's
  versions before 2.83 reply_query function allows remote attackers to
  spoof DNS traffic that can lead to DNS cache poisoning.
* CVE-2020-25686:
  Multiple DNS query requests for the same resource name (RRNAME) by
  Dnsmasq versions before 2.83 allows for remote attackers to spoof DNS
  traffic, using a birthday attack (RFC 5452), that can lead to DNS
  cache poisoning.
* CVE-2020-25687:
  Dnsmasq versions before 2.83 is vulnerable to a heap-based buffer
  overflow with large memcpy in sort_rrset() when DNSSEC is enabled. A
  remote attacker, who can create valid DNS replies, could use this flaw
  to cause an overflow in a heap-allocated memory. This flaw is caused
  by the lack of length checks in rtc1035.c:extract_name(), which could
  be abused to make the code execute memcpy() with a negative size in
  sort_rrset() and cause a crash in dnsmasq, resulting in a Denial of
  Service.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>

Co-authored-by: Hauke Mehrtens <hauke@hauke-m.de>
2021-01-25 01:37:23 +08:00
big fox tail
d3d861a729
random generate openvpn cert at first run (#6207) 2021-01-24 20:30:53 +08:00
lean
0ef46ab96b move xray to feeds 2021-01-23 19:29:53 +08:00
Beginner
dbc39c527b
Xray : Update V1.2.3 (#6232) 2021-01-23 19:23:31 +08:00
AmadeusGhost
e0d3229487
luci-app-jd-dailybonus: fix depends and install error (#6230) 2021-01-22 18:23:21 +08:00
lean
95dfd326ad luci-app-jd-dailybonus: bump version 2021-01-22 11:27:27 +08:00
AmadeusGhost
c83233b052
kernel: bump 5.4 to 5.4.91 (#6225) 2021-01-21 20:51:19 +08:00
lean
8fa535c668 luci-app-uugamebooster: update qcode image 2021-01-20 22:33:19 +08:00
lean
b9f45263fe luci-app-uugamebooster: add qcode 2021-01-20 18:55:01 +08:00
lean
dfbb519764 Revert "uugamebooster & luci-app-uugamebooster: (#6217)"
This reverts commit f60d3ea9c9865bb3a0e8d30463c2e0c570b6359e.
2021-01-20 18:26:52 +08:00
ZhenYu
f60d3ea9c9
uugamebooster & luci-app-uugamebooster: (#6217)
* uugamebooster: rebuild startup service
* luci-app-uugamebooster: use standerd terms
* luci-app-uugamebooster: use inter-startup funcion
* luci-app-uugamebooster: fix typo
2021-01-19 23:42:00 +08:00
taowazi007
3fedff6615
ssrs ipv6 chacha20 support (#6199)
* Update ssrs

config ipv6 support

* Update ssrs.lua
2021-01-18 15:53:45 +08:00
Beginner
2c91a30820
kcptun : update v20210103 (#6214) 2021-01-18 15:52:25 +08:00
lean
7b043f5cfa Merge branch 'master' of https://github.com/coolsnowwolf/lede 2021-01-18 15:30:48 +08:00
lean
3ac7bea729 add luci-app-jd-dailybonus from jerrykuku 2021-01-18 15:30:32 +08:00
AmadeusGhost
69f46989e2
mac80211: update to 5.8.18-1 (#6200)
ath10k-ct-firmware: update to 2020-11-08
ath10k-ct: update to 2020-12-24
mt76: update to 2020-12-18
wireless-regdb: update to version 2020.11.20
2021-01-18 13:06:03 +08:00
Beginner
1f87014d58
Xray : Update V1.2.2 (#6203) 2021-01-18 13:05:46 +08:00
lean
332fe57a37 Version update to R21.1.18 2021-01-18 13:04:32 +08:00
lean
121548b153 Add luci-app-uugamebooster for uuplugin 2021-01-18 12:53:23 +08:00
ZhenYu
faf254aedd
uugamebooster: fix missing depends & file conflict (#6196)
* uugamebooster: fix missing depends & file conflict

* uugamebooster: optimize program running

* uugamebooster: delete extra space
2021-01-14 14:32:45 +08:00
ZhenYu
d75c037bd9
package : add UU gamebooster package (#6191) 2021-01-13 12:08:38 +08:00
Beginner
223448316c
Xray : Update V1.2.1 (#6179) 2021-01-11 12:32:02 +08:00
S4kura0ne
c1d469ca06
fix WGET_SSL var for wget in ddns-script (#6177)
* Update update_aliyun_com.sh

* Update update_dnspod_cn.sh

* Update update_dnspod_com.sh
2021-01-10 14:51:06 +08:00
CN_SZTL
9a742cfb4e
luci-app-ssrserver-python: improve status check (#6167)
Running `ps` via luci.exec directly will cause no output
to compare as `ps` cannot detect the size of screen, adding
`-w` to solve this.

Fixes: 0e285c3037c3481d0c1b7a7c672a6ca5692ef35f ("add lean's package")
2021-01-08 23:11:45 +08:00
Beginner
622af09a79
V2ray : Update V4.34.0 (#6150)
* V2ray : Update V4.34.0

* v2ray-plugin : update v1.8.0
2021-01-07 14:02:22 +08:00
ricksuzade-maker
ea0cbd65c9
Bump v2ray-plugin to 1.8.0 (#6155) 2021-01-07 14:02:02 +08:00