Commit Graph

20383 Commits

Author SHA1 Message Date
Peter Müller
092ff6670a apr: Update rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-25 12:35:52 +00:00
Peter Müller
3380f8563b Core Update 175: Ship u-boot
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 19:02:23 +00:00
Peter Müller
87e90e2164 Fix typo in aarch64 linux rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 19:01:24 +00:00
Arne Fitzenreiter
acb3aa6abd kernel: add nanopi r2c patches
https://git.ipfire.org/?p=people/arne_f/kernel.git;a=commit;h=4a06c119e0065bf8794a98bd21a71ff6236d32d1
https://git.ipfire.org/?p=people/arne_f/kernel.git;a=commit;h=716f69f11cf3bf328453cc3e284d5bce7feb9a0e

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-04-24 19:00:45 +00:00
Arne Fitzenreiter
0a7f6097bc u-boot: add nanopi r2c support
this patch add nanopi r2c plus support.
if this u-boot is installed on the eMMC this is also
supported.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-04-24 19:00:34 +00:00
Peter Müller
7930119dda Core Update 175: Ship apr
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:59:40 +00:00
Matthias Fischer
a0a00fc06c apr: Update 1.7.2 => 1.7.4
For details see:
https://downloads.apache.org/apr/CHANGES-APR-1.7

"Changes for APR 1.7.4

  *) Fix a regression where writing to a file opened with both APR_FOPEN_APPEND
     and APR_FOPEN_BUFFERED did not properly append the data on Windows.
     (This regression was introduced in APR 1.7.3)  [Evgeny Kotkov]

Changes for APR 1.7.3

  *) apr-1-config: Fix crosscompiling detection in apr-1-config. PR 66510
     [Ruediger Pluem]

  *) configure: Add --enable-sysv-shm to use SysV shared memory (shmget) if
     available. [Ruediger Pluem]

  *) apr_socket_sendfile: Use WSAIoctl() to get TransmitFile function
     pointer on Windows. [Ivan Zhakov]

  *) apr_dir_read: Do not request short file names on Windows 7
     and later. [Ivan Zhakov]

  *) apr_file_gets: Optimize for buffered files on Windows.
     [Evgeny Kotkov]

  *) Fix a deadlock when writing to locked files opened with APR_FOPEN_APPEND
     on Windows. PR 50058. [Evgeny Kotkov]

  *) Don't seek to the end when opening files with APR_FOPEN_APPEND on Windows.
     [Evgeny Kotkov]

  *) apr_file_write: Optimize large writes to buffered files on Windows.
     [Evgeny Kotkov]

  *) apr_file_read: Optimize large reads from buffered files on Windows.
     [Evgeny Kotkov]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-04-24 18:59:23 +00:00
Peter Müller
68a18ea0a9 Postfix: Update to 3.8.0
Please refer to https://www.postfix.org/announcements/postfix-3.8.0.html
for this versions' release announcement.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:58:25 +00:00
Peter Müller
905a77279b Core Update 175: Fix file permissions of /var/log/pakfire.log on existing installations
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:57:05 +00:00
Peter Müller
f79faeab5a Pakfire: Do not make /var/log/pakfire.log writable for "nobody"
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:56:07 +00:00
Adolf Belka
23320dc554 samba: Update to version 4.18.1
- Update from version 4.17.5 to 4.18.1
- Update of rootfile
   some libraries now use x86-64 instead of x86_64 but most are still left with x86_64
   Good thing that we create a separate version of the rootfile for each architecture
   because it is no longer just the arm version that is unique but also the x86_64 one.
- Since version 4.17.0 it has been possible to do a build excluding SMB1 server capability.
   As SMB1 is insecure and has known exploits including ransomeware based ones it seems
   reasonable to build samba without SMB1 server capability for use on a firewall.
   The option to build wiythout SMB1 server capability has been added to the LFS file.
- Changelog
    Release Notes for Samba 4.18.1
	This is a security release in order to address the following defects:
	   o CVE-2023-0225: An incomplete access check on dnsHostName allows authenticated
	                    but otherwise unprivileged users to delete this attribute from
	                    any object in the directory.
	                    https://www.samba.org/samba/security/CVE-2023-0225.html
	   o CVE-2023-0922: The Samba AD DC administration tool, when operating against a
	                    remote LDAP server, will by default send new or reset
	                    passwords over a signed-only connection.
	                    https://www.samba.org/samba/security/CVE-2023-0922.html
	   o CVE-2023-0614: The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919
	                    Confidential attribute disclosure via LDAP filters was
	                    insufficient and an attacker may be able to obtain
	                    confidential BitLocker recovery keys from a Samba AD DC.
	                    Installations with such secrets in their Samba AD should
	                    assume they have been obtained and need replacing.
	                    https://www.samba.org/samba/security/CVE-2023-0614.html
	   * BUG 15276: CVE-2023-0225.
	   * BUG 15270: CVE-2023-0614.
	   * BUG 15331: ldb wildcard matching makes excessive allocations.
	   * BUG 15332: large_ldap test is inefficient.
	   * BUG 15315: CVE-2023-0922.
	   * BUG 15270: CVE-2023-0614.
	   * BUG 15276: CVE-2023-0225.
    Release Notes for Samba 4.18.0
	    NEW FEATURES/CHANGES
	      SMB Server performance improvements
		The security improvements in recent releases
		(4.13, 4.14, 4.15, 4.16), mainly as protection against symlink races,
		caused performance regressions for metadata heavy workloads.
		While 4.17 already improved the situation quite a lot,
		with 4.18 the locking overhead for contended path based operations
		is reduced by an additional factor of ~ 3 compared to 4.17.
		It means the throughput of open/close
		operations reached the level of 4.12 again.
	     More succinct samba-tool error messages
		Historically samba-tool has reported user error or misconfiguration by
		means of a Python traceback, showing you where in its code it noticed
		something was wrong, but not always exactly what is amiss. Now it
		tries harder to identify the true cause and restrict its output to
		describing that. Particular cases include:
		 * a username or password is incorrect
		 * an ldb database filename is wrong (including in smb.conf)
		 * samba-tool dns: various zones or records do not exist
		 * samba-tool ntacl: certain files are missing
		 * the network seems to be down
		 * bad --realm or --debug arguments
	     Accessing the old samba-tool messages
		This is not new, but users are reminded they can get the full Python
		stack trace, along with other noise, by using the argument '-d3'.
		This may be useful when searching the web.
		The intention is that when samba-tool encounters an unrecognised
		problem (especially a bug), it will still output a Python traceback.
		If you encounter a problem that has been incorrectly identified by
		samba-tool, please report it on https://bugzilla.samba.org.
	     Colour output with samba-tool --color
		For some time a few samba-tool commands have had a --color=yes|no|auto
		option, which determines whether the command outputs ANSI colour
		codes. Now all samba-tool commands support this option, which now also
		accepts 'always' and 'force' for 'yes', 'never' and 'none' for 'no',
		and 'tty' and 'if-tty' for 'auto' (this more closely matches
		convention). With --color=auto, or when --color is omitted, colour
		codes are only used when output is directed to a terminal.
		Most commands have very little colour in any case. For those that
		already used it, the defaults have changed slightly.
		 * samba-tool drs showrepl: default is now 'auto', not 'no'
		 * samba-tool visualize: the interactions between --color-scheme,
		   --color, and --output have changed slightly. When --color-scheme is
		   set it overrides --color for the purpose of the output diagram, but
		   not for other output like error messages.
	     New samba-tool dsacl subcommand for deleting ACES
		The samba-tool dsacl tool can now delete entries in directory access
		control lists. The interface for 'samba-tool dsacl delete' is similar
		to that of 'samba-tool dsacl set', with the difference being that the
		ACEs described by the --sddl argument are deleted rather than added.
	     No colour with NO_COLOR environment variable
		With both samba-tool --color=auto (see above) and some other places
		where we use ANSI colour codes, the NO_COLOR environment variable will
		disable colour output. See https://no-color.org/ for a description of
		this variable. `samba-tool --color=always` will use colour regardless
		of NO_COLOR.
	     New wbinfo option --change-secret-at
		The wbinfo command has a new option, --change-secret-at=<DOMAIN CONTROLLER>
		which forces the trust account password to be changed at a specified domain
		controller. If the specified domain controller cannot be contacted the
		password change fails rather than trying other DCs.
	     New option to change the NT ACL default location
		Usually the NT ACLs are stored in the security.NTACL extended
		attribute (xattr) of files and directories. The new
		"acl_xattr:security_acl_name" option allows to redefine the default
		location. The default "security.NTACL" is a protected location, which
		means the content of the security.NTACL attribute is not accessible
		from normal users outside of Samba. When this option is set to use a
		user-defined value, e.g. user.NTACL then any user can potentially
		access and overwrite this information. The module prevents access to
		this xattr over SMB, but the xattr may still be accessed by other
		means (eg local access, SSH, NFS). This option must only be used when
		this consequence is clearly understood and when specific precautions
		are taken to avoid compromising the ACL content.
	     Azure Active Directory / Office365 synchronisation improvements
		Use of the Azure AD Connect cloud sync tool is now supported for
		password hash synchronisation, allowing Samba AD Domains to synchronise
		passwords with this popular cloud environment.
	    REMOVED FEATURES
	     smb.conf changes
		  Parameter Name                          Description     Default
		  acl_xattr:security_acl_name             New             security.NTACL
		  server addresses                        New
	    CHANGES SINCE 4.18.0rc4
		   * BUG 15314: streams_xattr is creating unexpected locks on folders.
		   * BUG 15310: New samba-dcerpc architecture does not scale gracefully.
	    CHANGES SINCE 4.18.0rc3
		   * BUG 15308: Avoid that tests fail because other tests didn't do cleanup on
		     failure.
		   * BUG 15311: fd_load() function implicitly closes the fd where it should not.
	    CHANGES SINCE 4.18.0rc2
		   * BUG 15301: Improve file_modtime() and issues around smb3 unix test.
		   * BUG 15299: Spotlight doesn't work with latest macOS Ventura.
		   * BUG 15298: Build failure on solaris with tevent 0.14.0 (and ldb 2.7.0).
		     (tevent 0.14.1 and ldb 2.7.1 are already released...)
		   * BUG 15307: vfs_ceph incorrectly uses fsp_get_io_fd() instead of
		     fsp_get_pathref_fd() in close and fstat.
		   * BUG 15291: test_chdir_cache.sh doesn't work with SMBD_DONT_LOG_STDOUT=1.
		   * BUG 15301: Improve file_modtime() and issues around smb3 unix test.
	    CHANGES SINCE 4.18.0rc1
		   * BUG 10635: Office365 azure Password Sync not working.
		   * BUG 15286: auth3_generate_session_info_pac leaks wbcAuthUserInfo.
		   * BUG 15293: With clustering enabled samba-bgqd can core dump due to use
		     after free.
    Release Notes for Samba 4.17.7
	This is a security release in order to address the following defects:
	   o CVE-2023-0225: An incomplete access check on dnsHostName allows authenticated
	                    but otherwise unprivileged users to delete this attribute from
	                    any object in the directory.
	                    https://www.samba.org/samba/security/CVE-2023-0225.html
	   o CVE-2023-0922: The Samba AD DC administration tool, when operating against a
	                    remote LDAP server, will by default send new or reset
	                    passwords over a signed-only connection.
	                    https://www.samba.org/samba/security/CVE-2023-0922.html
	   o CVE-2023-0614: The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919
	                    Confidential attribute disclosure via LDAP filters was
	                    insufficient and an attacker may be able to obtain
	                    confidential BitLocker recovery keys from a Samba AD DC.
	                    Installations with such secrets in their Samba AD should
	                    assume they have been obtained and need replacing.
	                  https://www.samba.org/samba/security/CVE-2023-0614.html
	   * BUG 15276: CVE-2023-0225.
	   * BUG 15270: CVE-2023-0614.
	   * BUG 15331: ldb wildcard matching makes excessive allocations.
	   * BUG 15332: large_ldap test is inefficient.
	   * BUG 15315: CVE-2023-0922.
	   * BUG 14810: CVE-2020-25720 [SECURITY] Create Child permission should not
	     allow full write to all attributes (additional changes).
	   * BUG 15270: CVE-2023-0614.
	   * BUG 15276: CVE-2023-0225.
    Release Notes for Samba 4.17.6
	   * BUG 15314: streams_xattr is creating unexpected locks on folders.
	   * BUG 10635: Use of the Azure AD Connect cloud sync tool is now supported for
	     password hash synchronisation, allowing Samba AD Domains to synchronise
	     passwords with this popular cloud environment.
	   * BUG 15299: Spotlight doesn't work with latest macOS Ventura.
	   * BUG 15310: New samba-dcerpc architecture does not scale gracefully.
	   * BUG 15307: vfs_ceph incorrectly uses fsp_get_io_fd() instead of
	     fsp_get_pathref_fd() in close and fstat.
	   * BUG 15293: With clustering enabled samba-bgqd can core dump due to use
	     after free.
	   * BUG 15311: fd_load() function implicitly closes the fd where it should not.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-24 18:54:55 +00:00
Peter Müller
bcf6760ab4 Core Update 175: Ship parted
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:54:28 +00:00
Adolf Belka
2336495142 parted: Update to version 3.6
- Update from version 3.5 to 3.6
- Update of rootfile
- Changelog
    Noteworthy changes in release 3.6 (2023-04-10) [stable]
	  Promoting alpha release to stable release 3.6
    Noteworthy changes in release 3.5.28 (2023-03-24) [alpha]
	New Features
	  Support GPT partition attribute bit 63 as no_automount flag.
	  Add type commands to set type-id on MS-DOS and type-uuid on GPT.
	  Add swap flag support to the dasd disklabel
	  Add display of GPT disk and partition UUIDs in JSON output
	Bug Fixes
	  Fix use of enums in flag limits by switching to using #define
	  Fix ending sector location when using kibi IEC suffix

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-24 18:54:21 +00:00
Peter Müller
3881852592 Core Update 175: Ship libgcrypt
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:53:27 +00:00
Adolf Belka
b47528525d libgcrypt: Update to version 1.10.2
- Update from version 1.10.1 to 1.10.2
- Update of rootfile
- Changelog
	Noteworthy changes in version 1.10.2 (2023-04-06)  [C24/A4/R2]
	 * Bug fixes:
	   - Fix Argon2 for the case output > 64.  [rC13b5454d26]
	   - Fix missing HWF_PPC_ARCH_3_10 in HW feature.  [rCe073f0ed44]
	   - Fix RSA key generation failure in forced FIPS mode.  [T5919]
	   - Fix gcry_pk_hash_verify for explicit hash.  [T6066]
	   - Fix a wrong result of gcry_mpi_invm.  [T5970]
	   - Allow building with --disable-asm for HPPA.  [T5976]
	   - Fix Jitter RNG for building native on Windows.  [T5891]
	   - Allow building with -Oz.  [T6432]
	   - Enable the fast path to ChaCha20 only when supported.  [T6384]
	   - Use size_t to avoid counter overflow in Keccak when directly
	     feeding more than 4GiB.  [T6217]
	 * Other:
	   - Do not use secure memory for a DRBG instance.  [T5933]
	   - Do not allow PKCS#1.5 padding for encryption in FIPS mode.
	     [T5918]
	   - Fix the behaviour for child process re-seeding in the DRBG.
	     [rC019a40c990]
	   - Allow verification of small RSA signatures in FIPS mode.  [T5975]
	   - Allow the use of a shorter salt for KDFs in FIPS mode.  [T6039]
	   - Run digest+sign self tests for RSA and ECC in FIPS mode.
	     [rC06c9350165]
	   - Add function-name based FIPS indicator function.
	     GCRYCTL_FIPS_SERVICE_INDICATOR_FUNCTION.  This is not considered
	     an ABI changes because the new FIPS features were not yet
	     approved.  [rC822ee57f07]
	   - Improve PCT in FIPS mode.  [rC285bf54b1a, rC4963c127ae, T6397]
	   - Use getrandom (GRND_RANDOM) in FIPS mode.  [rCcf10c74bd9]
	   - Disable RSA-OAEP padding in FIPS mode.  [rCe5bfda492a]
	   - Check minimum allowed key size in PBKDF in FIPS mode.
	     [T6039,T6219]
	   - Get maximum 32B of entropy at once in FIPS mode.  [rCce0df08bba]
	   - Prefer gpgrt-config when available.  [T5034]
	   - Mark AESWRAP as approved FIPS algorithm.  [T5512]
	   - Prevent usage of long salt for PSS in FIPS mode.  [rCfdd2a8b332]
	   - Prevent usage of X9.31 keygen in FIPS mode.  [rC392e0ccd25]
	   - Remove GCM mode from the allowed FIPS indicators.  [rC1540698389]
	   - Add explicit FIPS indicators for hash and MAC algorithms. [T6376]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-24 18:53:16 +00:00
Peter Müller
3b8c341807 Core Update 175: Ship libgpg-error
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:52:52 +00:00
Adolf Belka
71a5008927 libgpg-error: Update to version 1.47
- Update from version 1.46 to 1.47
- Update of rootfile
- Changelog
	Noteworthy changes in version 1.47 (2023-04-06) [C34/A34/R0]
	 * New error codes for PUKs and reset codes.  [T6421]
	 * Avoid segv in logging with improper use of the "socket://".
	   [rE68333be630]
	 * Fixed translation of argparse's internal option --help.
	   [rE885a287a57]
	 * Interface changes relative to the 1.46 release:
	 GPG_ERR_SOURCE_TKD             NEW.
	 GPG_ERR_BAD_PUK                NEW.
	 GPG_ERR_NO_RESET_CODE	        NEW.
	 GPG_ERR_BAD_RESET_CODE	        NEW.
	 GPGRT_SPAWN_KEEP_STDIN         NEW.
	 GPGRT_SPAWN_KEEP_STDOUT        NEW.
	 GPGRT_SPAWN_KEEP_STDERR        NEW.
	 GPGRT_SPAWN_INHERIT_FILE       NEW.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-24 18:52:37 +00:00
Arne Fitzenreiter
e50648971a pcengines-apu-firmwares: readd latest apu1 firmware to the package
If a user have missed the update a while the apu1 cannot updated because this
file is missing.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-04-24 18:51:53 +00:00
Michael Tremer
ffdc6fbba8 Increase size of /boot to 512 MiB
Is XFS is being selected as file system, the minimum size requirement is
300 MiB. In order to keep it to a round number, this patch increases the
size of /boot to 512 MiB.

To keep all systems consistent, we will also do this on systems that are
being formatted using different file systems.

Fixes: #13077 - xfs cannot installed anymore because boot is to small
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-04-24 18:51:12 +00:00
Matthias Fischer
d92134b818 unbound: Update to 1.17.1
For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-17-1

"Features

    Expose 'statistics-inhibit-zero' as a configuration option; the default
    value retains Unbound's behavior.
    Expose 'max-sent-count' as a configuration option; the default value
    retains Unbound's behavior.
    Merge #461 from Christian Allred: Add max-query-restarts option.
    Exposes an internal configuration but the default value retains
    Unbound's behavior.
    Merge #569 from JINMEI Tatuya: add keep-cache option to
    'unbound-control reload' to keep caches.

Bug Fixes

    Merge #768 from fobser: Arithmetic on a pointer to void is a GNU
    extension.
    In unit test, print python script name list correctly.
    testcode/dohclient sets log identity to its name.
    Clarify the use of MAX_SENT_COUNT in the iterator code.
    Fix that cachedb does not store failures in the external cache.
    Merge #767 from jonathangray: consistently use IPv4/IPv6 in
    unbound.conf.5.
    Fix to ignore tcp events for closed comm points.
    Fix to make sure to not read again after a tcp comm point is closed.
    Fix #775: libunbound: subprocess reap causes parent process reap to
    hang.
    iana portlist update.
    Complementary fix for distutils.sysconfig deprecation in Python 3.10 to
    commit 62c5039ab9da42713e006e840b7578e01d66e7f2.
    Fix #779: [doc] Missing documention in ub_resolve_event() for callback
    parameter was_ratelimited.
    Ignore expired error responses.
    Merge #720 from jonathangray: fix use after free when WSACreateEvent()
    fails.
    Fix for the ignore of tcp events for closed comm points, preserve the
    use after free protection features.
    Fix #782: Segmentation fault in stats.c:404.
    Add SVCB and HTTPS to the types removed by 'unbound-control flush'.
    Clear documentation for interactivity between the subnet module and the
    serve-expired and prefetch configuration options.
    Fix #773: When used with systemd-networkd, unbound does not start until
    systemd-networkd-wait-online.service times out.
    Merge #808: Wrap Makefile script's directory variables in quotes.
    Fix to wrap Makefile scripts directory in quotes for uninstall.
    Fix windows compile for libunbound subprocess reap comm point closes.
    Update github workflows to use checkout v3.
    Fix wildcard in hyperlocal zone service degradation, reported by Sergey
    Kacheev."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-04-24 18:46:36 +00:00
Peter Müller
2739210a03 Core Update 175: Ship firewall initscript and restart firewall
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:45:53 +00:00
Michael Tremer
aac0baea15 firewall: Drop legacy rules for PPPoE/PPTP
These rules where created to permit any local traffic to the firewall
when using a PPP connection that utilised Ethernet as transport.

This is however nonsensical and a security issue for any other
connection methods that call the RED interface "red0" and use PPP (e.g.
QMI).

Since PPPoE packets do not flow through iptables, these rules can be
dropped safely. We do not know whether PPTP works at all these days.

Fixes: #13088 - firewall: INPUT accepts all packets when using QMI for dial-in
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-04-24 18:44:39 +00:00
Michael Tremer
ef59185bf3 hostapd: Enable QCA vendor extensions to nl80211
This should allow hostapd to utilize some vendor-specific features in
Qualcomm/Atheros cards. I am not sure what my card supports, but it is
all running fine.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-04-24 18:42:25 +00:00
Michael Tremer
bf4da9c80f dnsdist: Update to 1.8.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-04-24 18:42:10 +00:00
Michael Tremer
a4abc923d1 installer: Fix ISO download URL
The filename has been changed a while ago but the installer still tried
to find the ISO image under the old filename. This patch updates the
patch.

Fixes: #13078
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-24 18:41:52 +00:00
Peter Müller
1b85b0195f Core Update 175: Ship and restart Apache
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:41:09 +00:00
Matthias Fischer
f54e9dc398 apache: Update to 2.4.57
For details see:
https://dlcdn.apache.org/httpd/CHANGES_2.4.57

"Changes with Apache 2.4.57

  *) mod_proxy: Check before forwarding that a nocanon path has not been
     rewritten with spaces during processing.  [Yann Ylavic]

  *) mod_proxy: In case that AllowEncodedSlashes is set to NoDecode do not
     double encode encoded slashes in the URL sent by the reverse proxy to the
     backend. [Ruediger Pluem]

  *) mod_http2: fixed a crash during connection termination. See PR 66539.
     [Stefan Eissing]

  *) mod_rewrite: Fix a 2.4.56 regression for substitutions ending
     in a question mark. PR66547. [Eric Covener]

  *) mod_rewrite: Add "BCTLS" and "BNE" RewriteRule flags. Re-allow encoded
     characters on redirections without the "NE" flag.
     [Yann Ylavic, Eric Covener]

  *) mod_proxy: Fix double encoding of the uri-path of the request forwarded
     to the origin server, when using mapping=encoded|servlet.  [Yann Ylavic]

  *) mod_mime: Do not match the extention against possible query string
     parameters in case ProxyPass was used with the nocanon option.
     [Ruediger Pluem]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-04-24 18:38:55 +00:00
Peter Müller
20d7057fb7 Core Update 175: Remove powertop add-on, if installed
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:38:13 +00:00
Adolf Belka
149cd8971a powertop: Remove this addon as it does not work without debug_fs enabled
- powertop requires debug_fs to be enabled in the kernel for it to function. In Core
   Update 171 debug_fs was disabled as a security risk for a firewall application.
- Based on the above powertop has stopped functioning since Core Update 171. Discussed
   at IPFire Developers monthly conf call for April and agreed to remove the addon as
   debug_fs will not be re-enabled.
- removal of lfs and rootfiles and removal of powertop line in make.sh

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2023-04-24 18:37:01 +00:00
Peter Müller
68f3cd5502 NRPE: Bump package version
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:23:35 +00:00
Peter Müller
4f83b8c452 Tor: Bump package version
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:23:24 +00:00
Peter Müller
cfdd96e798 Core Update 175: Ship packages depending on OpenSSL
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:22:25 +00:00
Peter Müller
653c04a9db freeradius: Update to 3.0.26
This is necessary for updating OpenSSL to 3.1.x

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:13:12 +00:00
Peter Müller
3873bf9bc1 Core Update 175: Ship OpenSSL
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:11:45 +00:00
Peter Müller
489e0494dc OpenSSL: Update to 3.1.0
In a future Core Update, the following remnants of OpenSSL 1.1.1 need to
be removed:

/usr/lib/engines-1.1/afalg.so
/usr/lib/engines-1.1/capi.so
/usr/lib/engines-1.1/padlock.so
/usr/lib/libcrypto.so.1.1
/usr/lib/libssl.so.1.1

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:09:50 +00:00
Peter Müller
3274424ad9 Core Update 175: Ship relevant changes of linux-firmware
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-19 13:46:59 +00:00
Peter Müller
962c7bf244 linux-firmware: Update to 20230404
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-19 13:46:29 +00:00
Peter Müller
0179bff8ea Core Update 175: Ship kernel and regenerate initial ramdisks locally
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-19 10:21:34 +00:00
Adolf Belka
15041d628c kernel.config.aarch64-ipfire: Fix bug#12856 - Add Armada 38X RTC module to be loadable.
Fixes: Bug#12856
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-19 09:34:06 +00:00
Peter Müller
6aa0837d24 linux: Update to 6.1.24
Compiling the kernel has automatically introduced
CONFIG_INIT_STACK_ALL_ZERO=y and removed GCC's structleak plugin (not to
be confused with its stackleak counterpart). However, according to
related documentation, this neither introduces a security nor
performance disadvantage.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-04-19 09:33:38 +00:00
Adolf Belka
094bbe083b pmacct: Update to version 1.7.8
- Update from version 1.7.6 to 1.7.8
- Update of rootfile not required
- patch to remove Werror no longer required as the build with this version of pmacct
   had no problems with errors being flagged as warnings anymore unlike with the
   previous version.
- Changelog
     The keys used are:
	  !: fixed/modified feature, -: deleted feature, +: new feature
     1.7.8 -- 31-12-2022
	  + Introduced support for eBPF for all daemons: if SO_REUSEPORT is
	    supported by the OS and eBPF support is compiled in, this allows
	    to load a custom load-balancer. To load-share, daemons have to
	    be part of the same cluster_name and each be configured with a
	    distinct cluster_id.
	  + Introduced support for listening on VRF interfaces on Linux for
	    all daemons. The feature can be enabled via nfacctd_interface,
	    bgp_daemon_interface and equivalent knobs. Many thanks to
	    Marcel Menzel ( @WRMSRwasTaken ) for this contribution.
	  + pre_tag_map: introduced limited tagging / labelling support for
	    BGP (pmbgpd), BMP (pmbmpd), Streaming Telemetry (pmtelemetryd)
	    daemons. ip, set_tag, set_label keys being currently supported.
	  + pre_tag_map: defined a new pre_tag_label_encode_as_map config
	    knob to encode the output 'label' value as a map for JSON and
	    Apache Avro encodings, ie. in JSON "label": { "key1": "value1",
	    "key2": "value2" }. For keys and values to be correctly mapped,
	    the '%' delimiter is used when composing a pre_tag_map, ie.
	    "set_label=key1%value1,key2%value2 ip=0.0.0.0/0". Thanks to
	    Salvatore Cuzzilla ( @scuzzilla ) for this contribution.
	  + pre_tag_map: introduced support for IP prefixes for src_net
	    and dst_net keys for indexed maps (maps_index set to true).
	    Indexing being an hash map, this feature currently tests data
	    against all defined IP prefix lenghts in the map for a match
	    (first defined matching prefix wins).
	  + pre_tag_map: introduced two new 'is_nsel', 'is_nel' keys to
	    check for the presence of firewallEvent field (233) and
	    natEvent field (230) in NetFlow/IPFIX respectively in order
	    to infer whether data is NSEL / NEL. If set to 'true' this
	    does match NSEL / NEL data, if set to 'false' it does match
	    non NSEL / NEL data respectively.
	  + Introduced a new mpls_label_stack primitive, encoded as a
	    string and includes a comma-separated list of integers (label
	    values). Thanks to Salvatore Cuzzilla ( @scuzzilla ) for this
	    contribution.
	  + Introduced a new fw_event primitive, to support NetFlow v9/
	    IPFIX firewallEvent 233 Information Element.
	  + Introduced a new tunnel_tcp_flags primitive for pmacctd and
	    sfacctd to record TCP flags for the inner layer of a tunneled
	    technology (ie. VXLAN). Also tunnel_dst_port decoding was
	    fixed for sfacctd.
	  + Introduced support for in/out VLAN support for sfacctd. To be
	    savy, 'in_vlan' and 'vlan' were muxed onto the same primitive
	    depending on the daemon being used. Thanks to Jim Westfall
	    ( @jwestfall69 ) for this contribution.
	  + Introduced a new mpls_label_stack_encode_as_array config knob
	    to encode the MPLS label stack as an array for JSON and Apache
	    Avro encodings, ie. in JSON "mpls_label_stack": [ "0-label0",
	    "1-label1", "2-label2", "3-label3", "4-label4", "5-label5" ]
	    and in Avro "name": "mpls_label_stack", "type": { "type":
	    "array", "items": { "type": "string" } }. Thanks to Salvatore
	    Cuzzilla ( @scuzzilla ) for this contribution.
	  + Introduced a new tcpflags_encode_as_array config knob to encode
	    TCP flags as an array for JSON and Apache Avro, ie. in JSON
	    "tcp_flags": [ "URG", "ACK", "PSH", "RST", "SYN", "FIN" ] and
	    in Avro "name": "tcp_flags", "type": { "type": "array",
	    "items": { "type": "string" } }. Thanks to Salvatore Cuzzilla
	    ( @scuzzilla ) for this contribution.
	  + Introduced a new fwd_status_encode_as_string config knob to
	    encode the 'fwd_status' primitive in human-readable format
	    like described by RFC-7270 Section 4.12 when JSON or Avro
	    formats are selected for output. Thanks to Salvatore Cuzzilla
	    ( @scuzzilla ) for this contribution.
	  + Introduced a new protos_file to define a list of (known/
	    interesting/meaningful) IP protocols. Both protocol names, ie.
	    "tcp", and protocol numbers, ie. 1 (for icmp), are accepted.
	    IANA reserved protocol value 255 is used to bucket as 'others'
	    those IP protocols not matching the ones defined in the list.
	  + Introduced a new tos_file to define a list of (meaningful) IP
	    ToS values; if tos_encode_as_dscp is set to true then DSCP
	    values are expected as part of the file. The directive uses
	    value 255 to bucket as 'others' those ToS/DSCP values not
	    matching the ones defined in the list.
	  + A new tos_encode_as_dscp config knob makes pmacct to honour
	    only the 6 bits used by DSCP and report only on those.
	  + BGP, BMP, Streaming Telemetry daemons: introduced a new
	    dump_time_slots config knob to spread the load deriving by
	    dumps over the configured refresh time interval. The interval
	    is divided into time slots and nodes are assigned to such
	    slots. The slot for each node is determined using its IP
	    address. Thanks to Raphael Barazzutti ( @rbarazzutti ) for
	    this contribution.
	  + BGP, BMP daemons: End-of-RIB messages are now being exposed
	    in the output feed in order to facilitate tracking their
	    arrival (or not!).
	  + pmtelemetryd: aligned daemon to the latest Unyte UDP-Notif API
	    (0.6.1) and related standardization draft-ietf-netconf-udp-notif
	  + RPKI daemon: added case for input "asn" value being integer (ie.
	    "asn" : 2914) on top of the string case (ie. "asn" : "AS2914").
	  + Kafka, amqp plugins: introduced a new writer_id_string config
	    knob to allow to customize the the "writer_id" field value. A
	    few variables are supported along with static text definitions.
	  + Added a new aggregate_unknown_etype config knob to account also
	    frames with EtherTypes for which there is no decoding support
	    and allow to aggregate them by the available Ethernet L2 fields
	    (ie. 'src_mac', 'dst_mac', 'vlan', 'cos', 'etype'). Thanks to
	    @singularsyntax for this contribution.
	  + Added a new bgp_daemon_add_path_ignore config knob to ignore
	    (do not advertise back) the ADD-PATH capability advertised by
	    remote BGP peers.
	  + nfacctd, sfacctd: extended the possibility to run daemons from
	    a user with non root privileges to these daemons.
	  + nfacctd: if Information Element 90 (MPLS VPN RD) is present in
	    NetFlow v9/IPFIX, make it available for BGP/BMP correlation.
	  + pmacctd, sfacctd: introduced basic support for QinQ, 802.1AD.
	  + [print|kafka|amqp]_preprocess: added suppport for 'maxp',
	    'maxb' and 'maxf' keys when preprocessing aggregates of non-
	    SQL plugins. Thanks to Andrew R. Lake ( @arlake228 ) for this
	    contribution.
	  + nDPI: newer versions of the library (ie. >= 4.0) bring changes
	    to the API. pmacct is now aligned to compile against these. At
	    the same time support for nDPI 3.x was dropped.
	  ! fix, plugin_common.[ch]: when stitching feature was enabled,
	    ie. nfacctd_stitching, timestamp_min was never reset. Also both
	    timestamp_min and timestamp_max were clamped to sec granularity.
	  ! fix, BGP, BMP daemons: added a tmp_bgp_daemon_origin_type_int to
	    print out BGP "origin" field as int (legacy behaviour) instead
	    of string (current behaviour). In a future major release the
	    legacy behaviour will be dropped.
	  ! fix, BGP, BMP daemons: MPLS labels are now encoded in both JSON
	    and Apache Avro as 'mpls_label' instead of 'label'. This is to
	    align behaviour with pre_tag_map where 'label' has a different
	    semantic.
	  ! fix, BGP, BMP daemons: resolved memory leak when encoding log
	    messaging (logmsg) in Avro format with Schema Registry support.
	  ! fix, BGP daemon: improved handling of ADD-PATH capability,
	    making it per-AF (as it is supposed to be) and not global.
	  ! fix, BMP daemon: now checking that ADD-PATH capability is
	    enabled at both ends of the monitored session (check both BGP
	    OPEN in a Peer Up message) in order to infer that the capability
	    exchange was successful. Also some heuristics were added to
	    conciliate BGP Open vs BGP Update 4-bytes ASN reality.
	  ! fix, nfacctd: improved parsing of NetFlow v9 Options data
	    particularly when multiple IEs are packed as part of a flowset.
	  ! fix, nfacctd: corrected parsing of Information Element 351
	    (layer2SegmentId).
	  ! fix, pmacctd: improved processing of pcap_interfaces_map for
	    cases where the same interface is present multiple times (maybe
	    with different directions). Also, if the map is empty then bail
	    out at startup.
	  ! fix, pmacctd: SEGV when ICMP/ICMPv6 traffic was processed and
	    'flows' primitive was enabled.
	  ! fix, pmacctd: sampling_rate primitive value was not reported
	    correctly when 'sampling_rate' config directive was specified.
	  ! fix, pmbgpd, pmpmbd, pmtelemtryd: changed SIGCHLD handler to
	    prevent zombification of last spawned data dump writer.
	  ! fix, Kafka plugin: moved the schema registration from the dump
	    writer to the plugin process in order to register the schemas
	    only once at plugin startup and not on every start of a writer
	    process. Thanks to Uwe Storbeck ( @ustorbeck ) for this
	    contribution.
	  ! fix, Kafka plugin: a check for kafka_partition was missing,
	    leading the plugin to always use the default partitioner
	    instead of sending data to the configured fixed partition.
	    Thanks to Martin Pels ( @rodecker ) for this contribution.
	  ! fix, nfprobe plugin: BGP data enrichment was not working due to
	    a mistakenly moved pointer.
	  ! fix, sfprobe plugin: AS-PATH was being populated even when null;
	    added a check to see if the destination AS is not zero in order
	    to put the destination AS into the AS-PATH for sFlow packets.
	    Thanks to Marcel Menzel ( @WRMSRwasTaken ) for this contribution.
	  ! fix, networks_file: remove_dupes() was making partial commits
	    of valid rows hence creating data inconsistencies.
	  ! fix, pre_tag_map: resolved a potential string overflow that was
	    being triggered in pretag_append_label() when data would be
	    assigned more than one single label. Also now allow ',' chars
	    in set_label.
	  ! fix, maps_index: uninitialized var could cause SEGV in case no
	    results are found in the map index. Also introduced support for
	    catch-all rules, ie. "set_label=unknown".
	  ! fix, maps_index: optimized the case of no 'ip' key specified
	    (for nfacctd and sfacctd): when indexing is enabled, prevent
	    recirculation from happening, ie. test v4 first then v6, since
	    the 'ip' key is not going to be part of the hash serializer.
	  ! fix, pretag.c: allow to allocate maps greater than 2GB in size.
	    Also several optimizations were carried out yelding to a better
	    memory utilization for allocated maps along with improved times
	    to resolve JEQs.
	  ! fix, pre_tag_label_filter: optimized and improved runtime
	    evaluation part of this feature, avoiding a costly strdup() and
	    returning immediately on certain basic mismatch conditions.
	  ! fix, kafka_common.[ch]: a new p_kafka_produce_data_and_free()
	    is invoked to optimize memory allocations and releases.
	  ! fix, plugin_cmn_avro.c: when a schema registry is being defined,
	    ie. kafka_avro_schema_registry, the logic to generate the schema
	    name has been changed: use topic plus record name as the schema
	    name, use underscore as separator within the record name, stop
	    adding a "-value" suffix. Thanks to Uwe Storbeck ( @ustorbeck )
	    for this contribution.
	  ! fix, util.c: roundoff_time() to reason always with the locally
	    configured time, like for the rest of functional (as in non-data)
	    timestamps, ie. refresh time, deadline, etc.
	  ! fix, log.c: when log messages are longer than message buffer,
	    the message gets cut off. As the trailing newline also gets cut
	    off the message will be concatenated with the following message
	    which makes the log hard to read. Thanks to Uwe Storbeck
	    ( @ustorbeck ) for this contribution.
	  - Completed the retirement of legacy packet classification based
	    on home-grown code (Shared Objects) and the L7 layer project.
	  - Removed the mpls_stck_depth primitive due to the introduction
	    of the mpls_label_stack primitive.
     1.7.7 -- 07-11-2021
	  + BGP, BMP, Streaming Telemetry daemons: introduced parallelization
	    of dump events via a configurable amount of workers where the unit
	    of parallelization is the exporter (BGP, BMP, telemetry exporter),
	    ie. in a scenario where there are 4 workers and 4 exporters each
	    worker is assigned one exporter data to dump.
	  + pmtelemetryd: added support for draft-ietf-netconf-udp-notif:
	    a UDP-based notification mechanism to collect data from networking
	    devices. A shim header is proposed to facilitate the data streaming
	    directly from the publishing process on network processor of line
	    cards to receivers. The objective is a lightweight approach to
	    enable higher frequency and less performance impact on publisher
	    and receiver process compared to already established notification
	    mechanisms. Many thanks to Alex Huang Feng ( @ahuangfeng ) and the
	    whole Unyte team.
	  + BGP, BMP, Streaming Telemetry daemons: now correctly honouring the
	    supplied Kafka partition key for BGP, BMP and Telemetry msg logs
	    and dump events.
	  + BGP, BMP daemons: a new "rd_origin" field is added to output log/
	    dump to specify the source of Route Distinguisher information (ie.
	    flow vs BGP vs BMP).
	  + pre_tag_map: added ability to tag new NetFlow/IPFIX and sFlow
	    sample_type types: "flow-ipv4", "flow-ipv6", "flow-mpls-ipv4" and
	    "flow-mpls-ipv6". Also added a new "is_bi_flow" true/false key to
	    tag (or exclude) NSEL bidirectional flows. Added as well a new
	    "is_multicast" true/false config key to tag (or exclude) IPv4/IPv6
	    multicast destinations.
	  + maps_index: enables indexing of maps to increase lookup speeds on
	    large maps and/or sustained lookup rates. The feature has been
	    remplemented using stream-lined structures from libcdada. This is
	    a major work that helps preventing the unpredictable behaviours
	    caused by the homegrown map indexing mechanism. Many thanks to
	    Marc Sune ( @msune ).
	  + maps_index: support for indexing src_net and dst_net keywords has
	    been added.
	  + Added <daemon_name>_ipv6_only config directives to optionally
	    enable the IPV6_V6ONLY socket option. Also changed the wrong
	    setsockopt() IPV6_BINDV6ONLY id to IPV6_V6ONLY.
	  + Added log function to libserdes to debug transactions with the
	    Schema Registry when kafka_avro_schema_registry is set.
	  + nDPI: newer versions of the library (ie. >= 3.5) bring changes
	    to the API. pmacct is now aligned to compile against these.
	  + pmacctd: added pcap_arista_trailer_offset config directive since
	    Arista has changed the structure of the trailer format in recent
	    releases of EOS. Thanks to Jeremiah Millay ( @floatingstatic )
	    for his patch.
	  + More improvements carried out on the Continuous Integration
	    (CI) side by migrating from Travis CI to GitHub Actions. Huge
	    thanks to Marc Sune ( @msune ) to make all of this possible.
	  + More improvements also carried out in the space of the Docker
	    images being created: optimized image size and a better layered
	    pipeline. Thanks to Marc Sune ( @msune ) and Daniel Caballero
	    ( @dcaba ) to make all of this possible.
	  + libcdada shipped with pmacct was upgraded to version 0.3.5. Many
	    thanks Marc Sune ( @msune ) for his work with libcdada.
	  ! build system: several improvements carried out in this area,
	    ie. improved MySQL checks, introduced pcap-config tool for
	    libpcap, compiling on BSD/old compilers, etc. Monumental thanks
	    to Marc Sune ( @msune ) for his continued help.
	  ! fix, nfacctd: improved euristics to support the case of flows
	    with both IPv4 and IPv6 source / destination addresses (either
	    or populated). Also improved euristics to distinguish event data
	    vs traffic data in NetFlow v9/IPFIX from Cisco 9300/9500, ASA
	    firewalls and Cisco 4500X.
	  ! fix, nfacctd: improved support for initiatorOctets (IE #231) and
	    responderOctets (IE #232). Thanks to Esben Laursen ( @hyberdk )
	    for reporting the issue.
	  ! fix, nfacctd: in NF_mpls_vpn_id_handler() double ntohl() calls
	    were applied for the case of 'vrfid'-encoded mpls_vpn_rd field.
	  ! fix, sfacctd: wrong ethertype set for VLAN-tagged, MPLS-labelled
	    IPv6 traffic. Impacting BGP resolution among others. Thanks to
	    Jeremiah Millay ( @floatingstatic ) for his help resolving the
	    problem.
	  ! fix, BGP, BMP daemons: parsing improvements: added a check for
	    BGP Open message and BGP Open Options lengths. Strengthened
	    parsing of Peer Up, Route Monitoring and Peer Down v4 messages.
	  ! fix, BGP, BMP daemon: when using Avro encoding and Avro Schema
	    Registry, attempt to reconnect if serdes schemas are voided.
	    Also now checking for serdes schema definitions before doing a
	    serdes_schema_serialize_avro() to avoid triggering a SEGV.
	    Finally improved serdes logging.
	  ! fix, BGP, Streaming Telemetry daemons: in daemon logs, summary
	    counters for amount of tables / entries dumped were wrong.
	  ! fix, BGP daemon: distinguish among null and zero value AIGP
	    and Prefix SID attributes. Same applies for Local Preference
	    and MED attributes.
	  ! fix, BMP daemon: resolved a memory leak in bgp_peers_free().
	    Thanks to Pether Pothier ( @pothier-peter ) for his patch. Also
	    resolved a leak caused by an invalid BGP message contained in a
	    BMP Route Message v4.
	  ! fix, BMP daemon: correctly setting peer_ip and peer_tcp_port
	    JSON fields for Term messages. Also the correct bmp_router
	    value when bmp_daemon_parse_proxy_header feature is enabled.
	  ! fix, BMP daemon: several encoding issues when using Apache Avro
	    ie. u_int64_t now correctly encoded with avro_value_set_long(),
	    certain u_int32_t fields switched to avro_value_set_long() due
	    to lack of unsignedness in Avro encoding, improved various
	    aspectes of Avro-JSON format output, etc.
	  ! fix, pmtelemetryd: wrong parsing of pm_tfind() output was
	    leading to mistaken data attribution of UDP-based peers (always
	    first peer to connect was being picked).
	  ! fix, pmtelemetryd: when set, the pidfile config directive was
	    not being correctly honoured.
	  ! fix, RPKI: the RTR PDU element for maxLength is uint8, therefore
	    it might have been possible to transmit incorrect RTR data.
	    Thanks to Job Snijders ( @job ) for his patch.
	  ! fix, SQL plugins: amended the text composition of SQL queries
	    that are involving latitude and longitude keys.
	  ! fix, MySQL plugin: check for 'unix:' prefix string only when a
	    sql_host configuration directive is specified.
	  ! fix, nfprobe: modernized Application Information export. Until
	    the previous release pmacct was adhering to aging NBAR model
	    whereas now NBAR2 has been implemented. Thanks to Rob Cowart
	    ( @robcowart ) for helping out resolving this issue.
	  ! fix, tee plugin: restored usefulness of tee_source_ip which was
	    broken in 1.7.6. Thanks to Jeremiah Millay ( @floatingstatic )
	    for reporting the issue.
	  ! fix, maps_index: indexing of mpls_pw_id was broken. Also now,
	    when the feature is enabled, actual data is being referenced in
	    the index structure instead of creating a copy of it; thanks to
	    Sander van Delden ( @SanderDelden ) for reporting the memory
	    leak that was resulting from the copy.
	  ! fix, kafka_common.c: solved memory leak in p_kafka_set_topic()
	    when Kafka session was getting in down state. Many thanks to
	    Peter Pothier ( @pothier-peter ) for nailing the issue.
	  ! fix, net_aggr.[ch]: when a networks_file is specified in the
	    config, gracefully handle max memory structure depth; added
	    also de-duplication of entries.
	  ! fix, pmacct-defines.h: if PCAP_NETMASK_UNKNOWN is not defined,
	    ie. in libpcap < 1.1.0, let's define it.
	  ! fix, SO_REUSEPORT feature was being restricted to Linux only in
	    previous releases: now it has been unlocked to all other OS that
	    do support the feature.
	  ! fix, split SO_REUSEPORT and SO_REUSEADDR setsockopt() calls.
	    Thanks to @eduarrrd for reporting and resolving the issue.
	  ! fix, several code warnings catched gcc9 and clang.
	  - Obsoleted sql_history_since_epoch, pre_tag_map_entries and
	    refresh_maps configuration directives.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:25:03 +00:00
Peter Müller
c9130cbf1c Core Update 175: Ship xfsprogs
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-18 21:24:43 +00:00
Adolf Belka
39399715f6 xfsprogs: Update to version 6.2.0
- Update from version 6.1.1 to 6.2.0
- Update of rootfile not required
- Changelog
   There is no changelog in the source tarball or in the kernel site where the source
   tarballs are available from. The only sourec of change info is the git commit log
   https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:24:31 +00:00
Peter Müller
8cffa30021 Core Update 175: Remove any orphaned menue files on existing installations
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-18 21:23:50 +00:00
Adolf Belka
d330a6803e housekeeping: removal of menu items for no longer available addons
- removal of EX-addonsvc.menu entry in config/menu/ as the lfs file for this could not be
   found in the IPFire git repo all the way back to CU30
- removal of EX-addonsvc.menu, EX-asterisk.menu and EX-bluetooth.menu which are no longer
   in IPfire for two years or longer.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:21:58 +00:00
Adolf Belka
821fef53bd bird: Update to version 2.0.12
- Update from version 2.0.11 to 2.0.12
- Update of rootfile
- Changelog
Version 2.0.12 (2023-01-23)
  o Filter: New 'onlink' route attribute
  o Compile-time option to use 4-way tries instead of 16-way ones
  o BSD: Support for kernel route metric and other improvements
  o Important bugfixes

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:21:27 +00:00
Peter Müller
b566f40d47 Core Update 175: Ship bash
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-18 21:21:07 +00:00
Adolf Belka
7ea6cba07a bash: Update version to 5.2 with patches 1 to 15
- Update from version 5.2 patches 1-9 to 5.2 patches 1-15
- Update of rootfile not required
- Changelog
bash52-015
	There are several cases where bash is too aggressive when optimizing out forks
	in subshells. For example, `eval' and traps should never be optimized.
bash52-014
	Bash defers processing additional terminating signals when running the
	EXIT trap while exiting due to a terminating signal. This patch allows the
	new terminating signal to kill the shell immediately.
bash52-013
	Bash can leak memory when referencing a non-existent associative array
	element.
bash52-012
	When running in bash compatibility mode, nested command substitutions can
	leave the `extglob' option enabled.
bash52-011
	Using timeouts and readline editing with the `read' builtin (read -e -t) can
	leave the readline timeout enabled, potentially resulting in an erroneous
	timeout on the next call.
bash52-010
	Bash-5.2 checks the first 128 characters of an executable file that execve()
	refuses to execute to see whether it's a binary file before trying to
	execute it as a shell script. This defeats some previously-supported use
	cases like "self-executing" jar files or "self-uncompressing" scripts.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:20:24 +00:00
Adolf Belka
cf2d231d36 aws-cli: Update to version 1.27.100
- Update from version 1.23.12 to 1.27.100
- Update of rootfile
- Changelog is over 2000 lines long. For details please see the CHNGELOG.rst file in the
   source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:20:11 +00:00
Adolf Belka
ccae603c72 automake: Update to version 1.16.5
- Update from version 1.16.3 to 1.16.5
- Update of rootfile not required
- Chyangelog
New in 1.16.5:
	* Bugs fixed
	  - PYTHON_PREFIX and PYTHON_EXEC_PREFIX are now set according to
	    Python's sys.* values only if the new configure option
	    --with-python-sys-prefix is specified. Otherwise, GNU default values
	    are used, as in the past. (The change in 1.16.3 was too incompatible.)
	  - consistently depend on install-libLTLIBRARIES.
	* Distribution
	  - use const for yyerror declaration in bison/yacc tests.
New in 1.16.4:
	* New features added
	  - The PYTHON_PREFIX and PYTHON_EXEC_PREFIX variables are now set from
	    Python's sys.prefix and sys.exec_prefix; use the new configure options
	    --with-python_prefix and --with-python_exec_prefix to specify explicitly.
	  - Common top-level files can be provided as .md; the non-md version is
	    used if both are present:
	      AUTHORS ChangeLog INSTALL NEWS README README-alpha THANKS
	  - CTAGS, ETAGS, SCOPE variables can be set via configure.
	  - Silent make output for custom link commands.
	  - New option "no-dist-built-sources" skips generating $(BUILT_SOURCES)
	    before building the tarball as part of "make dist", that is,
	    omits the dependency of $(distdir): $(BUILT_SOURCES).
	* Bugs fixed
	  - automake output more reproducible.
	  - test-driver less likely to clash with tests writing to the same file.
	  - DejaGnu tests always use the directory name, testsuite/, for
	    compatibility with the newer dejagnu-1.6.3 and with prior versions.
	* Distribution
	  - config.sub and config.guess updates include restoration of `...`
	    for maximum portability.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:19:49 +00:00