Skip to content
  1. Apr 16, 2024
  2. Apr 07, 2024
  3. Apr 06, 2024
  4. Apr 05, 2024
  5. Mar 24, 2024
  6. Mar 23, 2024
  7. Feb 05, 2024
  8. Feb 03, 2024
  9. Dec 23, 2023
  10. Nov 28, 2023
    • Rob White's avatar
      opennds: update to version 10.2.0 · a5ec54ae
      Rob White authored
      Maintainer: Rob White rob@blue-wave.net
      
      Compile tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64
      
      Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64; on snapshot, 23.05, 22.03
      
      Description:
      opennds (10.2.0) - This version is a minor upgrade that introduces some significant additional functionality.
      In addition it includes numerous enhancements bug fixes and cosmetic fixes.
      
      Additional functionality includes:
      
       * Pre-emptive Client Lists
       * Autonomous Block Lists
       * Internet hosted https FAS support for resource limited routers
       * Fair Usage Policy
      
      Details can be found here:
      https://github.com/openNDS/openNDS/releases/tag/v10.2.0
      
      
      
      Signed-off-by: default avatarRob White <rob@blue-wave.net>
      2 tags
      a5ec54ae
  11. Nov 17, 2023
  12. Oct 29, 2023
  13. Oct 23, 2023
  14. Oct 16, 2023
  15. Oct 10, 2023
  16. Sep 29, 2023
  17. Aug 28, 2023
    • Rob White's avatar
      opennds: update to version 10.1.3 · 88c98c91
      Rob White authored
      
      
      Maintainer: Rob White rob@blue-wave.net
      
      Compile tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64
      
      Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64; on snapshot, 23.05, 22.03
      
      Description:
      opennds (10.1.3)
      
      Security Advisory. This version contains fixes for multiple potential security vulnerabilities
      Credit - Stanislav Dashevskyi - standash.github.io [standash]
      It also contains some minor bug fixes
      
        * Fix - Buffer overflow causing segfault - CVE-2023-41101 [bluewavenet]
        * Fix - Memory leaks due to passing allocated buffer into safe_asprintf() - CVE-2023-41102 [bluewavenet]
        * Fix - Remove deprecated preauth option [bluewavenet]
        * Fix - missing free in show_preauth_page if MHD does not respond [bluewavenet]
        * Fix - more safe_asprintf memory leaks [bluewavenet]
        * Fix - missing free for mark_auth [bluewavenet]
        * Fix - memory leak after starting authmon daemon [bluewavenet]
        * Fix - memory leak in encode_and_redirect_to_splashpage [bluewavenet]
        * Fix - Community themespec, voucher css and logo image [bluewavenet]
        * Fix - ThemeSpec, path to logo in page footer [bluewavenet]
        * Fix - ensure gatewayurl is urldecoded to fix broken css and images in themespec [bluewavenet]
        * Add - set default fas remote fqdn to disabled [bluewavenet]
      
      Signed-off-by: default avatarRob White <rob@blue-wave.net>
      2 tags
      88c98c91
  18. Aug 23, 2023
  19. Aug 22, 2023
    • Sven Eckelmann's avatar
      batman-adv: Fix lock assert after fragmentation change · 364379c0
      Sven Eckelmann authored
      The automatic recalculation of the maximum allowed MTU is usually triggered
      by code sections which are already rtnl lock protected by callers outside
      of batman-adv. But when the fragmentation setting is changed via
      batman-adv's own batadv genl family, then the rtnl lock is not yet taken.
      
      But dev_set_mtu requires that the caller holds the rtnl lock because it
      uses netdevice notifiers. And this code will then fail the check for this
      lock:
      
        RTNL: assertion failed at net/core/dev.c (1953)
      
      Fixes: e7ee4c55
      
       ("batman-adv: update to version 2023.2")
      Signed-off-by: default avatarSven Eckelmann <sven@narfation.org>
      364379c0
  20. Aug 18, 2023
  21. Aug 05, 2023
    • Rob White's avatar
      mesh11sd: Release v2.0.0 · 5beb3be9
      Rob White authored
      
      
      Maintainer: Rob White rob@blue-wave.net
      Compile tested: All
      Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64, on 21.02, 22.03 and snapshot.
      
      Description:
      mesh11sd (2.0.0)
      
      This release contains new functionality.
      
      Autonomous portal mode is introduced. This simplifies the rollout of meshnodes allowing a common configuration to be used on all nodes.
      Remote administration is introduced, allowing files to be copied and terminal sessions to be opened on established meshnodes, identifying remote nodes by mac address.
      
       * Add - Update config file [bluewavenet]
       * Add - implementation of remote copy [bluewavenet]
       * Add - implementation of remote connect [bluewavenet]
       * Add - Autonomous portal mode [bluewavenet]
      
      -- Rob White dot@blue-wave.net Mon, 31 Jul 2023 16:59:52 +0000
      
      
      Signed-off-by: default avatarRob White <rob@blue-wave.net>
  22. Jul 31, 2023
    • Rob White's avatar
      opennds: Release v10.1.2 · e4a53c13
      Rob White authored
      
      
      Reinstate CONFLICTS:=nodogsplash
      
      Signed-off-by: default avatarRob White <rob@blue-wave.net>
      e4a53c13
    • Rob White's avatar
      opennds: Release v10.1.2 · 3eb9aa30
      Rob White authored
      
      
      Maintainer: Rob White rob@blue-wave.net
      
      Compile tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64
      
      Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64; on snapshot, 23.05, 22.03
      
      Description:
      opennds (10.1.2)
      
      Security Advisory. This version contains fixes for multiple potential security vulnerabilities
      Credit - Stanislav Dashevskyi - standash.github.io [standash]
      It also contains some minor bug fixes
        * Fix - Generate unique sha256 faskey if not set in config - CVE-2023-38324 [bluewavenet]
        * Fix - NULL pointer dereference if user_agent is NULL - CVE-2023-38320, CVE-2023-38322 [bluewavenet]
        * Fix - NULL pointer dereference if authdir is called with an incomplete or missing query string - CVE-2023-38313, CVE-2023-38314, CVE-2023-38315 [bluewavenet]
        * Fix - remove deprecated and non-functioning unescape callback - CVE-2023-38316 [bluewavenet]
        * Fix - prevent potential recursive dependency and detect if conflicting package is installed [bluewavenet]
      
      
      Signed-off-by: default avatarRob White <rob@blue-wave.net>
      3eb9aa30