-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update adguard/adguardhome Docker tag to v0.107.55 #327
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/adguard-adguardhome-0.x
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.41
Update adguard/adguardhome Docker tag to v0.107.42
Dec 7, 2023
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
2 times, most recently
from
December 11, 2023 16:47
e0736d5
to
8d8748d
Compare
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.42
Update adguard/adguardhome Docker tag to v0.107.43
Dec 11, 2023
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.43
Update adguard/adguardhome Docker tag to v0.107.44
Feb 6, 2024
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
February 6, 2024 16:33
8d8748d
to
d29061c
Compare
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.44
Update adguard/adguardhome Docker tag to v0.107.45
Mar 6, 2024
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
March 6, 2024 17:47
d29061c
to
f03f894
Compare
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.45
Update adguard/adguardhome Docker tag to v0.107.46
Mar 20, 2024
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
March 20, 2024 18:04
f03f894
to
d3787ae
Compare
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
April 4, 2024 15:47
d3787ae
to
8f0b78f
Compare
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.46
Update adguard/adguardhome Docker tag to v0.107.47
Apr 4, 2024
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.47
Update adguard/adguardhome Docker tag to v0.107.48
Apr 5, 2024
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
April 5, 2024 17:29
8f0b78f
to
07cc776
Compare
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
May 21, 2024 20:01
07cc776
to
59a4b8e
Compare
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.48
Update adguard/adguardhome Docker tag to v0.107.49
May 21, 2024
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
May 23, 2024 17:01
59a4b8e
to
8a95a95
Compare
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.49
Update adguard/adguardhome Docker tag to v0.107.50
May 23, 2024
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
June 6, 2024 15:15
8a95a95
to
3ff7dd5
Compare
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.50
Update adguard/adguardhome Docker tag to v0.107.51
Jun 6, 2024
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
July 4, 2024 19:21
3ff7dd5
to
23bbcdb
Compare
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.51
Update adguard/adguardhome Docker tag to v0.107.52
Jul 4, 2024
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.52
Update adguard/adguardhome Docker tag to v0.107.53
Oct 3, 2024
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
October 3, 2024 16:27
23bbcdb
to
c2d34ed
Compare
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.53
Update adguard/adguardhome Docker tag to v0.107.54
Nov 6, 2024
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
November 6, 2024 16:09
c2d34ed
to
36457a4
Compare
renovate
bot
force-pushed
the
renovate/adguard-adguardhome-0.x
branch
from
December 11, 2024 16:15
36457a4
to
21209bb
Compare
renovate
bot
changed the title
Update adguard/adguardhome Docker tag to v0.107.54
Update adguard/adguardhome Docker tag to v0.107.55
Dec 11, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v0.107.40
->v0.107.55
Release Notes
AdguardTeam/AdGuardHome (adguard/adguardhome)
v0.107.55
Compare Source
See also the v0.107.55 GitHub milestone.
Security
The permission check and migration on Windows has been fixed to use the Windows security model more accurately (#7400).
Go version has been updated to prevent the possibility of exploiting the Go vulnerabilities fixed in 1.23.4.
The Windows executables are now signed.
Added
--no-permcheck
command-line option to disable checking and migration of permissions for the security-sensitive files and directories, which caused issues on Windows (#7400).Fixed
Setup guide styles in Firefox.
Goroutine leak during the upstream DNS server test (#7357).
Goroutine leak during configuration update resulting in increased response time ([#6818]).
v0.107.54
Compare Source
See also the v0.107.54 GitHub milestone.
Security
Changed
Fixed
AdGuard Home start (#7315).
v0.107.53
Compare Source
See also the v0.107.53 GitHub milestone.
Security
Previous versions of AdGuard Home allowed users to add any system file it had
access to as filters, exposing them to be world-readable. To prevent this,
AdGuard Home now allows adding filtering-rule list files only from files
matching the patterns enumerated in the
filtering.safe_fs_patterns
propertyin the configuration file.
We thank @itz-d0dgy for reporting this vulnerability, designated
CVE-2024-36814, to us.
Additionally, AdGuard Home will now try to change the permissions of its files
and directories to more restrictive ones to prevent similar vulnerabilities
as well as limit the access to the configuration.
We thank @go-compile for reporting this vulnerability, designated
CVE-2024-36586, to us.
Go version has been updated to prevent the possibility of exploiting the Go
vulnerabilities fixed in 1.23.2.
Added
Changed
the same rules as their domain specifications.
Configuration changes
In this release, the schema version has changed from 28 to 29.
filtering.safe_fs_patterns
contains glob patterns for paths offiles that can be added as local filtering-rule lists. The migration should
add list files that have already been added, as well as the default value,
$DATA_DIR/userfilters/*
.Fixed
clients.runtime_sources.dhcp
in the configuration file not takingeffect.
Known issues
Due to the complexity of the Windows permissions architecture and poor support
from the standard Go library, we have to postpone the proper automated Windows
fix until the next release.
Temporary workaround: Set the permissions of the
AdGuardHome
directoryto more restrictive ones manually. To do that:
AdGuardHome
directory.restricted.)
Full control
access to only the user which runsAdGuard Home. Typically,
Administrator
.v0.107.52
Compare Source
See also the v0.107.52 GitHub milestone.
Security
vulnerabilities fixed in Go 1.22.5.
Added
log.enabled
configurationproperty (#7079).
Changed
Frontend rewritten in TypeScript.
The
systemd
-based service now usesjournal
for logging by default. Italso doesn't create the
/var/log/
directory anymore (#7053).NOTE: With an installed service for changes to take effect, you need to
reinstall the service using
-r
flag of the install scriptor via the CLI (with root privileges):
Don't forget to backup your configuration file and other important data before
reinstalling the service.
Deprecated
Fixed
file (#7069).
/etc/hosts
file changes causing panics within particularfilesystems on start (#7076).
v0.107.51
Compare Source
See also the v0.107.51 GitHub milestone.
Security
vulnerabilities fixed in Go 1.22.4.
Changed
to match the one used by AdGuard Home's HTTP client to fetch filtering-list
data (#7041).
v0.107.50
Compare Source
See also the v0.107.50 GitHub milestone.
Fixed
(#7013).
v0.107.49
Compare Source
See also the v0.107.49 GitHub milestone.
Security
vulnerabilities fixed in Go 1.22.3.
Added
Changed
SOA
andNS
requests (#6882).Deprecated
when reading them from the configuration file. This behaviour is deprecated
and will cause errors on startup in a future release.
Fixed
section on client settings on the [Wiki page][wiki-config].
unqualified domains (#6744).
fe80::/16
, as client identifiers(#6312).
(#6422).
fe80::/16
, in the access settings(#6192).
server not starting.
in-addr.arpa
andip6.arpa
containing zero-length prefixincorrectly considered invalid when specified for private rDNS upstream
servers (#6854).
(#6875).
v0.107.48
Compare Source
See also the v0.107.48 GitHub milestone.
Fixed
v0.107.47
Compare Source
See also the v0.107.47 GitHub milestone.
Security
vulnerabilities fixed in Go 1.22.2.
Changed
the request came from a trusted proxy (#5829).
Deprecated
filtering-rule lists on startup. This feature is deprecated, and invalid IDs
will cause errors on startup in a future version.
Fixed
file upon startup on FreeBSD (#6717).
Removed
v0.107.46
Compare Source
See also the v0.107.46 GitHub milestone.
Added
resolution (#6610).
statistics (#5992).
Changed
Private rDNS resolution (
dns.use_private_ptr_resolvers
in YAMLconfiguration) now requires a valid "Private reverse DNS servers", when
enabled (#6820).
NOTE: Disabling private rDNS resolution behaves effectively the same as if
no private reverse DNS servers provided by user and by the OS.
Fixed
v0.107.45
Compare Source
See also the v0.107.45 GitHub milestone.
Security
vulnerabilities fixed in Go 1.21.8.
Added
list (#6679).
Changed
Starting with this release our scripts are using Go's forward compatibility
mechanism for updating the Go version.
Important note for porters: This change means that if your
go
versionis 1.21+ but is different from the one required by AdGuard Home, the
go
toolwill automatically download the required version.
If you want to use the version installed on your builder, run:
go get go@$YOUR_VERSION go mod tidy
and call
make
withGOTOOLCHAIN=local
.Deprecated
Fixed
lists.
Removed
v0.107.44
Compare Source
See also the [v0.107.44 GitHub milestone][ms-v0.107.44].
Added
AdGuardHome
(orAdGuardHome.exe
) with-v --version
command-line options([#6545]).
already used ([#1660]).
Changed
the bootstrap DNS response ([#6321]).
error
instead ofdebug
([#6574])."upstream_mode"
inPOST /control/dns_config
andGET /control/dns_info
HTTP APIs now acceptsload_balance
value. Checkopenapi/CHANGELOG.md
for more details.Configuration changes
In this release, the schema version has changed from 27 to 28.
The new property
clients.persistent.*.uid
, which is a unique identifier ofthe persistent client.
The properties
dns.all_servers
anddns.fastest_addr
were removed, theirvalues migrated to newly added field
dns.upstream_mode
that describes thelogic through which upstreams will be used. See also a [Wiki
page][wiki-config].
v0.107.43
Compare Source
See also the v0.107.43 GitHub milestone.
Fixed
address on some machines (#6510).
v0.107.42
Compare Source
See also the v0.107.42 GitHub milestone.
Security
CVE-2023-39326, CVE-2023-45283, and CVE-2023-45285 Go vulnerabilities fixed in
Go 1.20.12.
Added
encrypted protocol is already enabled (#1660).
Changed
Configuration changes
dns.serve_plain_dns
has been added to the configurationfile (#1660).
dns.bogus_nxdomain
is now validated more strictly.clients.persistent.*.upstreams_cache_enabled
andclients.persistent.*.upstreams_cache_size
that describe cache configurationfor each client's custom upstream configuration.
Fixed
ipset
entries family validation (#6420).v0.107.41
Compare Source
See also the v0.107.41 GitHub milestone.
Security
CVE-2023-45283 and CVE-2023-45284 Go vulnerabilities fixed in
Go 1.20.11.
Added
limiting requests, in the configuration file (#6368).
[/domain1/../domain2/]upstream1 upstream2 .. upstreamN
(#4977).Changed
Configuration changes
dns.ratelimit_subnet_len_ipv4
anddns.ratelimit_subnet_len_ipv6
have been added to the configuration file(#6368).
Fixed
$important,dnsrewrite
rules not overriding allowlist rules (#6204).Configuration
📅 Schedule: Branch creation - "every weekend" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.