Commit Graph

7928 Commits

Author SHA1 Message Date
Peter Müller
3110d7a98f module-init-tools: Delete orphaned LFS file
This was dropped 2013 in commit ba109afd0d,
but the LFS file remained there.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-24 19:06:47 +00:00
Peter Müller
37afa45661 zlib: Pick up upstream patch for memory corruption fix
See: https://www.openwall.com/lists/oss-security/2022/03/24/1

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-24 18:59:36 +00:00
Michael Tremer
77e3829dc1 linux-firmware: Compress firmware on disk
This patch enabled that we can compress any firmware files on disk. This
will save some space since /lib/firmware is becoming larger with every
release.

From formerly 828MiB, this is now using ~349MiB which is a saving of
about 480MiB on disk. This is helping us a lot fighting to contain the
distribution to 2GB on /.

Some other firmware that is installed in other packages is not
compressed with this patch which is a bit sad, but potentially not worth
the effort.

In order to ship this change with a Core Update, it might be intuitive
to remove /lib/firmware first and then extract the new update with all
new files. However, I do not know if this all will compress as well as
before since now the files are already individually compressed. It might
be a challenge to ship this.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 16:11:14 +00:00
Matthias Fischer
5019469505 bind: Update to 9.16.27
For details see:
https://downloads.isc.org/isc/bind9/9.16.27/doc/arm/html/notes.html#notes-for-bind-9-16-27

"Security Fixes

    The rules for acceptance of records into the cache have been
    tightened to prevent the possibility of poisoning if forwarders send
    records outside the configured bailiwick. (CVE-2021-25220)

    ISC would like to thank Xiang Li, Baojun Liu, and Chaoyi Lu from
    Network and Information Security Lab, Tsinghua University, and
    Changgen Zou from Qi An Xin Group Corp. for bringing this
    vulnerability to our attention. [GL #2950]

    TCP connections with keep-response-order enabled could leave the TCP
    sockets in the CLOSE_WAIT state when the client did not properly
    shut down the connection. (CVE-2022-0396) [GL #3112]

Feature Changes

    DEBUG(1)-level messages were added when starting and ending the BIND
    9 task-exclusive mode that stops normal DNS operation (e.g. for
    reconfiguration, interface scans, and other events that require
    exclusive access to a shared resource). [GL #3137]

Bug Fixes

    The max-transfer-time-out and max-transfer-idle-out options were not
    implemented when the BIND 9 networking stack was refactored in 9.16.
    The missing functionality has been re-implemented and outgoing zone
    transfers now time out properly when not progressing. [GL #1897]

    TCP connections could hang indefinitely if the other party did not
    read sent data, causing the TCP write buffers to fill. This has been
    fixed by adding a “write” timer. Connections that are hung while
    writing now time out after the tcp-idle-timeout period has elapsed.
    [GL #3132]

    The statistics counter representing the current number of clients
    awaiting recursive resolution results (RecursClients) could
    be miscalculated in certain resolution scenarios, potentially
    causing the value of the counter to drop below zero. This has been
    fixed. [GL #3147]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 09:42:41 +00:00
Matthias Fischer
24005371e1 rrdtool: Update to 1.8.0
For details see:
https://github.com/oetiker/rrdtool-1.x/releases/tag/v1.8.0

"Bugfixes

    python bindings: properly convert double values of rrd info
    failed to expand 'Py_UNUSED', Invalid usage when expanding 'Py_UNUSED'
    document --showtime in xport help output
    fix --use-nan-for-all-missing-data
    update rrdruby.pod
    add missing rrdruby.pod and rrdpython.pod to dist
    Set first_weekday to 0 (Sunday), when HAVE__NL_TIME_WEEK_1STDAY is not defined
    fix median calculation for all NaN inputs
    fix potential leak in xport during failure
    fix many warnings raised by Cppcheck
    fix many compiler warnings from latest gcc
    ensure proper initialization in rrd_daemon
    cleanup testsuite
    better testing
    avoid invalid read in rrd_client
    add symbols from rrdc to librrd
    Fix duplicate write_changes_to_disk() calls when HAVE_LIBRADOS is true and HAVE_MMAP is false
    documentation updates
    for SMIN example in docs
    fix for pyton3 compatibility
    freemem only for valid status <Christian Kr"oger>
    fix double meaning of time 0 as uninitialized value
    fix for zfs not supporting fallocate. this makes resize work on zfs
    add rrdrados.pod to dist
    fetch - do not call rrd_freemem on uninitialized pointers
    use separate pango fontmap per thread
    switch to python 3
    do not leak filename when opening a broken file
    fix leaks in rrdcached
    avoid segfault when flushing cache
    escape json in legend entries
    fix leak in xport
    make rrdcgi param parsing more robust
    fix race in journal_write"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 09:41:57 +00:00
Peter Müller
afd8dc466b Nmap: Update to 7.92
Please refer to https://nmap.org/changelog#7.92 for the changelog of
this version; it is too long to include it here.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-22 17:35:52 +00:00
Peter Müller
9d23bd75de strongSwan: Update to 5.9.5
Please refer to https://github.com/strongswan/strongswan/releases/tag/5.9.5 for this
versions' changelog.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 19:02:34 +00:00
Jon Murphy
b1c25d7a84 Nano: Move nano editor from packages to core system
- this will not change the default editor `vim`

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 19:01:43 +00:00
Peter Müller
1af1ea5585 Postfix: Update to 3.7.0
See https://www.postfix.org/announcements/postfix-3.7.0.html for this
version's release announcement.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-21 11:31:28 +00:00
Peter Müller
0b6d12adae Drop orphaned ovpn-ccd-convert script
This script appeared in the rootfiles for Core Updates 65 and 66, being
released in late 2012 and early 2013. It is not used elsewhere, and
there is no sense in keeping it around on IPFire installations.

Should this patch be accepted, a corresponding 'rm' statement is
necessary in the update.sh script of the Core Update it will go into.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 08:50:30 +00:00
Peter Müller
2c76a05566 psmisc: Update to 23.4
Please refer to https://gitlab.com/psmisc/psmisc/-/tags for an overview
of the changes happened since version 22.2 .

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-20 15:20:52 +00:00
Peter Müller
3815512d05 libseccomp: Bump package version
Fixes: #12807

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-20 15:19:34 +00:00
Matthias Fischer
bfb19ad740 apache: Update to 2.4.53
For details see:
https://dlcdn.apache.org/httpd/CHANGES_2.4.53

Short summary of the most important SECURITY changes:

"Changes with Apache 2.4.53

  *) SECURITY: CVE-2022-23943: mod_sed: Read/write beyond bounds
     (cve.mitre.org)
     Out-of-bounds Write vulnerability in mod_sed of Apache HTTP
     Server allows an attacker to overwrite heap memory with possibly
     attacker provided data.
     This issue affects Apache HTTP Server 2.4 version 2.4.52 and
     prior versions.
     Credits: Ronald Crane (Zippenhop LLC)

  *) SECURITY: CVE-2022-22721: core: Possible buffer overflow with
     very large or unlimited LimitXMLRequestBody (cve.mitre.org)
     If LimitXMLRequestBody is set to allow request bodies larger
     than 350MB (defaults to 1M) on 32 bit systems an integer
     overflow happens which later causes out of bounds writes.
     This issue affects Apache HTTP Server 2.4.52 and earlier.
     Credits: Anonymous working with Trend Micro Zero Day Initiative

  *) SECURITY: CVE-2022-22720: HTTP request smuggling vulnerability
     in Apache HTTP Server 2.4.52 and earlier (cve.mitre.org)
     Apache HTTP Server 2.4.52 and earlier fails to close inbound
     connection when errors are encountered discarding the request
     body, exposing the server to HTTP Request Smuggling
     Credits: James Kettle <james.kettle portswigger.net>

  *) SECURITY: CVE-2022-22719: mod_lua Use of uninitialized value of
     in r:parsebody (cve.mitre.org)
     A carefully crafted request body can cause a read to a random
     memory area which could cause the process to crash.
     This issue affects Apache HTTP Server 2.4.52 and earlier.
     Credits: Chamal De Silva
     ..."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-17 16:43:30 +00:00
Michael Tremer
bac517874e openssl: Update to 1.1.1n
OpenSSL Security Advisory [15 March 2022]
============================================

Infinite loop in BN_mod_sqrt() reachable when parsing certificates
(CVE-2022-0778)
==================================================================================

Severity: High

The BN_mod_sqrt() function, which computes a modular square root,
contains
a bug that can cause it to loop forever for non-prime moduli.

Internally this function is used when parsing certificates that contain
elliptic curve public keys in compressed form or explicit elliptic curve
parameters with a base point encoded in compressed form.

It is possible to trigger the infinite loop by crafting a certificate
that
has invalid explicit curve parameters.

Since certificate parsing happens prior to verification of the
certificate
signature, any process that parses an externally supplied certificate
may thus
be subject to a denial of service attack. The infinite loop can also be
reached when parsing crafted private keys as they can contain explicit
elliptic curve parameters.

Thus vulnerable situations include:

 - TLS clients consuming server certificates
 - TLS servers consuming client certificates
 - Hosting providers taking certificates or private keys from customers
 - Certificate authorities parsing certification requests from
   subscribers
 - Anything else which parses ASN.1 elliptic curve parameters

Also any other applications that use the BN_mod_sqrt() where the
attacker
can control the parameter values are vulnerable to this DoS issue.

In the OpenSSL 1.0.2 version the public key is not parsed during initial
parsing of the certificate which makes it slightly harder to trigger
the infinite loop. However any operation which requires the public key
from the certificate will trigger the infinite loop. In particular the
attacker can use a self-signed certificate to trigger the loop during
verification of the certificate signature.

This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.  It was
addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022.

OpenSSL 1.0.2 users should upgrade to 1.0.2zd (premium support customers
only)
OpenSSL 1.1.1 users should upgrade to 1.1.1n
OpenSSL 3.0 users should upgrade to 3.0.2

This issue was reported to OpenSSL on the 24th February 2022 by Tavis
Ormandy
from Google. The fix was developed by David Benjamin from Google and
Tomáš Mráz
from OpenSSL.

Note
====

OpenSSL 1.0.2 is out of support and no longer receiving public updates.
Extended
support is available for premium support customers:
https://www.openssl.org/support/contracts.html

OpenSSL 1.1.0 is out of support and no longer receiving updates of any
kind.
It is affected by the issue.

Users of these versions should upgrade to OpenSSL 3.0 or 1.1.1.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20220315.txt

Note: the online version of the advisory may be updated with additional
details
over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/policies/secpolicy.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-15 17:51:13 +00:00
Michael Tremer
2b7c6f8e92 dracut: Remove hard-coded configuration from command line
This is now configured globally in dracut

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:18:21 +00:00
Michael Tremer
d8db858769 dracut: Install an IPFire system configuration file
This file contains our custom settings:

* Always load microcodes as early as possible

* We now compress the initrd using Zstandard which is substanstically
  faster than XZ, but offers better compression ratios

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:18:21 +00:00
Michael Tremer
2f74ea9347 dracut: Update to 056
This one was desperately in need of an upgrade, as dracut 038 was
released 8 YEARS ago. Hence, the changelog since is way too long to
include it here; refer to https://git.kernel.org/pub/scm/boot/dracut/dracut.git/tree/NEWS.md
for details.

See also: #12773

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:18:21 +00:00
Michael Tremer
65030c233b Revert "aws-cli: Update to version 1.22.64"
This reverts commit e42665e594.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-11 16:34:36 +00:00
Daniel Weismueller
d6b2b662da Add backup/include for cups
To solve the behavior discribed in bug 12404 I added the path
 /var/ipfire/cups to the backup.

Signed-off-by: Daniel Weismueller <daniel.weismueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-11 15:54:40 +00:00
Arne Fitzenreiter
d814021aa5 u-boot: add OrangePi Zero Plus (Allwinner H5)
this u-boot should also work with NanoPi R1S H5

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:45:43 +00:00
Matthias Fischer
b13c41b9e4 wget: Update to 1.21.3
For details see:
https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00017.html

"This is a minor bugfix release.

...

* Noteworthy changes in release 1.21.3 (2022-02-26)

** Fix computation of total bytes downloaded during FTP transfers (#61277)

** Add option to select TLS 1.3 on the command line

** Fix HSTS build issues on some 64-bit big-endian systems

** Hide password during status report in --no-verbose

** Remove a spurious print statement that showed up even during --quiet

** Some more cleanups and bug-fixes"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:44:36 +00:00
Adolf Belka
fbba2fc84a perl-CGI: Update to version 4.54
- Update from 4.53 to 4.54
- Update of rootfile not required
- Changelog
   4.54 2022-02-03
       - fix use of cache when calling ->cookie (GH #252)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:42:37 +00:00
Adolf Belka
ec89353c7b pango: Update to version 1.50.4
- Update from 1.50.0 to 1.50.4
- Update of rootfile
- Changelog
   Overview of changes in 1.50.4, 09-02-2022
	* Tweak synthetic space sizes
	* itemize: Try harder to avoid NULL fonts
	* docs: Some additions
	* Pass synthetic slant to harfbuzz
	* Make sloped carets work with uneven scales
	* Fix serialiation on arm
	* Avoid an uninitialized variable warning
	* Reinstate previous behavior of pango_attr_list_splice
	* Deprecated pango_coverage_ref/unref
	* Fix serialization on non-glibc systems
	* Fix allow-breaks handling
   Overview of changes in 1.50.3, 21-12-2021
	* pango-view: Add --serialize-to option for easy bug reporting
	* Revert a transformation change that broke metrics for vertical text
	* Handle fonts without space glyph (such as icon fonts) better
	* Fix some corner cases of line width accounting
	* Fix line height with emulated Small Caps
   Overview of changes in 1.50.2, 16-12-2021
	* Fix a problem with font fallback for Arabic
	* Fix handling of fonts without a space glyph
	* Various documentation improvements
	* Fix build issues
   Overview of changes in 1.50.1, 10-12-2021
	* Fix a crash in tab handling
	* Fix tab positioning without line wrapping
	* Fix an assertion failure found by fuzzing
	* Make underlines work again for broken fonts

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:42:10 +00:00
Adolf Belka
6a221fadaa hplip: Update to version 3.22.2
- Update from 3.21.6 to 3.22.2
- Update of rootfile
- Changelog
   HPLIP 3.22.2 - This release has the following changes:
     Added support for following new Distro's:
	Elementary OS 6.1
	RHEL 8.5
	Linux Mint 20.3
     Added support for the following new Printers:
	HP LaserJet Tank MFP 1602a
	HP LaserJet Tank MFP 1602w
	HP LaserJet Tank MFP 1604w
	HP LaserJet Tank MFP 2602dn
	HP LaserJet Tank MFP 2602sdn
	HP LaserJet Tank MFP 2602sdw
	HP LaserJet Tank MFP 2602dw
	HP LaserJet Tank MFP 2604dw
	HP LaserJet Tank MFP 2604sdw
	HP LaserJet Tank MFP 2603dw
	HP LaserJet Tank MFP 2603sdw
	HP LaserJet Tank MFP 2605sdw
	HP LaserJet Tank MFP 2606dn
	HP LaserJet Tank MFP 2606sdn
	HP LaserJet Tank MFP 2606sdw
	HP LaserJet Tank MFP 2606dw
	HP LaserJet Tank MFP 2606dc
	HP LaserJet Tank MFP 1005
	HP LaserJet Tank MFP 1005w
	HP LaserJet Tank MFP 1005nw
	HP LaserJet Tank 1502a
	HP LaserJet Tank 1502w
	HP LaserJet Tank 1504w
	HP LaserJet Tank 2502dw
	HP LaserJet Tank 2502dn
	HP LaserJet Tank 2504dw
	HP LaserJet Tank 2503dw
	HP LaserJet Tank 2506dw
	HP LaserJet Tank 2506d
	HP LaserJet Tank 2506dn
	HP LaserJet Tank 1020
	HP LaserJet Tank 1020w
	HP LaserJet Tank 1020nw
   HPLIP 3.21.12- This release has the following changes:
     Added support for following new Distro's:
	MX Linux 21
	Elementary OS 6
	Fedora 35
   HPLIP 3.21.10 - This release has the following changes:
     Added support for following new Distro's:
	Ubuntu 21.10
	Debian 11
	Zorin 15
	Zorin 16
     Added support for the following new Printers:
	HP ENVY Inspire 7200e series
	HP ENVY Inspire 7900e series
	HP LaserJet MFP M140a
	HP LaserJet MFP M139a
	HP LaserJet MFP M141a
	HP LaserJet MFP M142a
	HP LaserJet MFP M140w
	HP LaserJet MFP M140we
	HP LaserJet MFP M139w
	HP LaserJet MFP M139we
	HP LaserJet MFP M141w
	HP LaserJet MFP M141we
	HP LaserJet MFP M142we
	HP LaserJet MFP M142w
	HP LaserJet M109a
	HP LaserJet M110a
	HP LaserJet M111a
	HP LaserJet M112a
	HP LaserJet M109w
	HP LaserJet M109we
	HP LaserJet M110w
	HP LaserJet M110we
	HP LaserJet M111w
	HP LaserJet M111we
	HP LaserJet M112we
	HP LaserJet M112w
	HP DesignJet Z6 Pro 64in
	HP DesignJet Z9 Pro 64in
	HP PageWide XL Pro 5200 PS MFP series
	HP PageWide XL Pro 8200 PS MFP series
	HP PageWide XL 3920 MFP
	HP PageWide XL 4200 Printer
	HP PageWide XL 4200 Multifunction Printer
	HP PageWide XL 4700 Printer
	HP PageWide XL 4700 Multifunction Printer
	HP PageWide XL 5200 Printer
	HP PageWide XL 5200 Multifunction Printer
	HP PageWide XL 8200 Printer
   HPLIP 3.21.8 - This release has the following changes:
     Added support for following new Distro's:
	Linux Mint 20.2
	RHEL 8.4
	Manjaro 21.0.7
     Added support for the following new Printers:
	HP Smart Tank 500 series
	HP Smart Tank 530 series
	HP Smart Tank Plus 570 series
	HP Smart Tank 7600
	HP Smart Tank 750
	HP Smart Tank 790
	HP Smart Tank Plus 710-720
	HP Smart Tank Plus 7000
	HP Smart Tank Plus 660-670
	HP Smart Tank Plus 6000
	HP DeskJet Ink Advantage Ultra 4800 All-in-One Printer series

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:41:57 +00:00
Adolf Belka
e42665e594 aws-cli: Update to version 1.22.64
- Update from 1.18.188 to 1.22.64
- Update of rootfile
- Ran aws in shell and got help response so it is working in principle
- Changelog is too large, with nearly 1700 lines, to include here as there appears to be
   a new release nearly every day. so there are a huge number of releases between 1.18.188
   from Dec 2nd 2020 to 1.22.64 from Feb 28 2022. It appears that only at weekends no
   releases are done. Full changelog can be viewed at
   https://github.com/aws/aws-cli/blob/develop/CHANGELOG.rst

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:41:38 +00:00
Adolf Belka
b09ef37023 ntfs-3g: Update to version 2021.8.22
- Update from 2017.3.23 to 2021.8.22
- Update of rootfile
- Added link to mkfs.ntfs in lfs to provide the binary in sbin as the new package places it
   in usr/sbin
- Ran find-dependencies and no problems flagged up.
- Changelog
	Stable Version 2021.8.22 (August 30, 2021)
	    Fixed compile error when building with libfuse < 2.8.0
	    Fixed obsolete macros in configure.ac
	    Signalled support of UTIME_OMIT to external libfuse2
	    Fixed an improper macro usage in ntfscp.c
	    Updated the repository change in the README
	    Fixed vulnerability threats caused by maliciously tampered NTFS partitions
	Stable Version 2017.3.23AR.6 (February 1, 2021)
	    Used kernel cacheing on read-only mounts or with lowntfs-3g
	    Avoided information leak when processing garbled compressed data
	    Defined option posix_nlink to compute a Posix compliant st_nlink
	    Recovered space when an index root is shortened
	    Replaced ENODATA with ENOATTR in xattrs functions for macOS
	    Added support for 'position' argument in macOS xattr functions
	    Changed default xattr access method to 'openxattr' for macOS builds
	    Allowed redefining the target location of the ntfsprogs tools
	    Fixed updating the allocated size when attribute lies in an extent
	    Enabled actions on directories in reparse plugins
	    Inserted the reparse tag in the bad reparse symlink
	    Supported use of WSL special files
	    Dropped rejecting having both EA and reparse data
	    Enabled Creating special files the same way as WSL
	    Checked the locations of MFT and MFTMirr at startup
	Stable Version 2017.3.23AR.5 (April 1, 2020)
	    Processed the request argument of ioctl() as unsigned
	    Accepted alternative recording of cluster size
	    Fixed a poorly sized string in ntfsinfo
	    Fixed ntfsfallocate on a void file
	    Decoded execlink reparse points
	    Fixed object type returned in readdir() for reparse points
	    Exported the translations of Windows paths to current ones
	Stable Version 2017.3.23AR.4 (March 1, 2019)
	    Fixed reporting an error when failed to build the mountpoint
	    Reverted accessing reparse directory through internal plugins
	    Cleaned object ids beyond the updated part
	    Fixed reacting to missing plugin
	    Returned a low level error when an ioctl fails
	    Truncated SSD trimming zones to granularity supported by the device
	Stable Version 2017.3.23AR.3 (September 1, 2018)
	    Made sure log file buffers are properly aligned
	    Made reparse directories visible through internal plugins
	    Added an option to ntfscp to copy the modification time
	    Renamed undeleted files to avoid overwriting existing ones
	    Extended the allowed cluster size to 2MB
	    Allocated full clusters for reading and rescuing in ntfsclone
	    Prevented locally defined headers from interfering with ntfs-3g ones
	    Attempted mounting read-only after failed permission to read-write
	    Fixed collecting the label argument in mkntfs
	Stable Version 2017.3.23AR.2 (March 1, 2018)
	    Made sure log file buffers are properly aligned
	    Checked log file blocks more recent than temporary ones
	    Processed redo log actions associated to undoing a CompensationlogRecord
	    Allowed setting a file object id without defining its birth ids
	    Documented read-only mount when Windows is hibernated
	    Stopped checking matches of MFTMirr against MFT at record 16
	    Filtered out reparse flags for selecting plugins
	    Delayed updating the MFT runlist when resizing in read-only mode
	    Double-checked whether record 15 is an extent of MFT
	    Checked whether the device to mount was forced read-only
	Stable Version 2017.3.23AR.1 (October 1, 2017)
	    Bypassed cluster allocation errors using --ignore-fs-check in ntfsclone
	    Upgraded ntfsrecover to support log files for Windows 10
	    Fixed the computation of highest_vcn when applying a runlist fixup
	    Fixed updating the vcn of subtree in ntfsrecover
	    Relaxed checks on security descriptors
	    Enabled directory operations in plugins
	    Decoded more reparse tags in ntfsinfo
	    Logged falling back to mounting read-only
	    Fixed compiling on MacOSX (Erik Larsson)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:40:37 +00:00
Adolf Belka
309726a454 libdnet: Update to version 1.14
- Update from 1.11 (2005) to 1.14 (2020)
- Update of rootfile
- find-dependencies run and no problems flagged
- Package was originally provided by Dug Song in source forge and with a github repository
  No response was received from Dug Song to requests for updates and fixes so Oliver Falk
  forked the repository and has been working on it and now the Dug Song repository is no
  longer present and the old repoistory url redirects to the new ofalk repository
  https://github.com/ofalk/libdnet
- Issues raised in this new repository are being actively responded to
- Changelog comment is
   Finally release 1.14 with latest fixes included.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:39:49 +00:00
Adolf Belka
4e52721aa2 harfbuzz: Update to version 3.4.0
- Update from 3.1.2 to 3.4.0
- Update of rootfile
- Changelog
	3.4.0
	    Perform sanity checks on shaping results is now part of “harfbuzz” library and can be enabled by setting the buffer flag HB_BUFFER_FLAG_VERIFY. (Behdad Esfahbod)
	    Arabic Mark Transient Reordering Algorithm have been updated to revision 6. (Khaled Hosny)
	    ISO 15924 code for mathematical notation, ‘Zmth’, now maps to the OpenType ‘math’ tag. (Alexis King)
	    It is now possible to get at once all math kerning values for a given glyph at a given corner. (Alexis King)
	    Fix locale_t portability issues on systems the typedef’s it to a void pointer. (Behdad Esfahbod)
	  New API:
	    +HB_BUFFER_FLAG_VERIFY
	    +HB_OT_TAG_MATH_SCRIPT
	    +HB_SCRIPT_MATH
	    +hb_ot_math_kern_entry_t
	    +hb_ot_math_get_glyph_kernings
	  Deprecated API
	    +HB_OT_MATH_SCRIPT
	3.3.2
	  Revert splitting of pair positioning values introduced in 3.3.0 as it proved problematic. (Behdad Esfahbod)
	3.3.1
	  Fix heap-use-after-free in harfbuzz-subset introduced in previous release. (Garret Rieger)
	3.3.0
	    Improved documentation. (Matthias Clasen)
	    Internal code cleanup, using C++ standard library more. (Behdad Esfahbod)
	    The low 16-bits of face index will be used by hb_face_create() to select a face inside a font collection file format, while the high 16-bits will be used by hb_font_create() to load the named instance. (Behdad Esfahbod)
	    Glyph positions and other font metrics now apply synthetic slant set by hb_font_set_synthetic_slant(), for improved positioning for synthetically slanted fonts. (Behdad Esfahbod)
	    Fixed unintentional locale dependency in hb_variation_to_string() for decimal point representation. (Matthias Clasen)
	    When applying pair positioning (kerning) the positioning value is split between the two sides of the pair for improved cursor positioning between such pairs. (Behdad Esfahbod)
	    Introduced new HB_GLYPH_FLAG_UNSAFE_TO_CONCAT, to be used in conjunction with HB_GLYPH_FLAG_UNSAFE_TO_BREAK for optimizing re-shaping during line breaking. Check the documentation for further details. (Behdad Esfahbod)
	    Improved handling of macrolanguages when mapping BCP 47 codes to OpenType tags. (David Corbett)
	    New API:
	    +HB_GLYPH_FLAG_UNSAFE_TO_CONCAT
	    +hb_segment_properties_overlay()
	    +hb_buffer_create_similar()
	    +hb_font_set_synthetic_slant()
	    +hb_font_get_synthetic_slant()
	    +hb_font_get_var_coords_design()
	3.2.0
	  harfbuzz library improvements:
	    Fixed shaping of Apple Color Emoji flags in right-to-left context. (Behdad Esfahbod)
	    Fixed positioning of CFF fonts in HB_TINY profile. (Behdad Esfahbod)
	    OpenType 1.9 language tags update. (David Corbett)
	    Add HB_NO_VERTICAL config option. (Behdad Esfahbod)
	    Add HB_CONFIG_OVERRIDE_H for easier configuration. (Behdad Esfahbod)
	  harfbuzz-subset library improvements:
	    Improved packing of cmap, loca, and Ligature tables. (Garret Rieger)
	    Significantly improved overflow-resolution strategy in the repacker. (Garret Rieger)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:38:57 +00:00
Adolf Belka
85bcede302 wireless-regdb: Update to version 2022.02.18
- Update from 2020.11.20 to 2022.02.18
- Update of rootfile not required
- Changelog
   There is no changelog provided for this file.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:38:24 +00:00
Adolf Belka
0ea4f2942f sqlite: Update to version 3380000
- Update from version 3370200 to 3380000
- Update of rootfile not required
- Changelog
   SQLite Release 3.38.0 On 2022-02-22
    Added the -> and ->> operators for easier processing of JSON. The new operators are
     compatible with MySQL and PostgreSQL.
    The JSON functions are now built-ins. It is no longer necessary to use the
     -DSQLITE_ENABLE_JSON1 compile-time option to enable JSON support. JSON is on by
     default. Disable the JSON interface using the new -DSQLITE_OMIT_JSON compile-time
     option.
    Enhancements to date and time functions:
        Added the unixepoch() function.
        Added the auto modifier and the julianday modifier.
    Rename the printf() SQL function to format() for better compatibility. The original
     printf() name is retained as an alias for backwards compatibility.
    Added the sqlite3_error_offset() interface, which can sometimes help to localize an
     SQL error to a specific character in the input SQL text, so that applications can
     provide better error messages.
    Enhanced the interface to virtual tables as follows:
        Added the sqlite3_vtab_distinct() interface.
        Added the sqlite3_vtab_rhs_value() interface.
        Added new operator types SQLITE_INDEX_CONSTRAINT_LIMIT and
         SQLITE_INDEX_CONSTRAINT_OFFSET.
        Added the sqlite3_vtab_in() interface (and related) to enable a virtual table to
         process IN operator constraints all at once, rather than processing each value of
         the right-hand side of the IN operator separately.
    CLI enhancements:
        Columnar output modes are enhanced to correctly handle tabs and newlines embedded
         in text.
        Added options like "--wrap N", "--wordwrap on", and "--quote" to the columnar
         output modes.
        Added the .mode qbox alias.
        The .import command automatically disambiguates column names.
        Use the new sqlite3_error_offset() interface to provide better error messages.
    Query planner enhancements:
        Use a Bloom filter to speed up large analytic queries.
        Use a balanced merge tree to evaluate UNION or UNION ALL compound SELECT
         statements that have an ORDER BY clause.
    The ALTER TABLE statement is changed to silently ignores entries in the sqlite_schema
     table that do not parse when PRAGMA writable_schema=ON.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:37:46 +00:00
Adolf Belka
6c6b663085 openssh: Update to version 8.9p1
- Update from 8.8p1 to 8.9p1
- Update of rootfile not required
- Changelog
 OpenSSH 8.9 was released on 2022-02-23. It is available from the
  mirrors listed at https://www.openssh.com/.
 OpenSSH is a 100% complete SSH protocol 2.0 implementation and
  includes sftp client and server support.
Future deprecation notice
 A near-future release of OpenSSH will switch scp(1) from using the
  legacy scp/rcp protocol to using SFTP by default.
 Legacy scp/rcp performs wildcard expansion of remote filenames (e.g.
  "scp host:* .") through the remote shell. This has the side effect of
  requiring double quoting of shell meta-characters in file names
  included on scp(1) command-lines, otherwise they could be interpreted
  as shell commands on the remote side.
 This creates one area of potential incompatibility: scp(1) when using
  the SFTP protocol no longer requires this finicky and brittle quoting,
  and attempts to use it may cause transfers to fail. We consider the
  removal of the need for double-quoting shell characters in file names
  to be a benefit and do not intend to introduce bug-compatibility for
  legacy scp/rcp in scp(1) when using the SFTP protocol.
 Another area of potential incompatibility relates to the use of remote
  paths relative to other user's home directories, for example -
  "scp host:~user/file /tmp". The SFTP protocol has no native way to
  expand a ~user path. However, sftp-server(8) in OpenSSH 8.7 and later
  support a protocol extension "expand-path@openssh.com" to support
  this.
Security Near Miss
 * sshd(8): fix an integer overflow in the user authentication path
   that, in conjunction with other logic errors, could have yielded
   unauthenticated access under difficult to exploit conditions.
   This situation is not exploitable because of independent checks in
   the privilege separation monitor. Privilege separation has been
   enabled by default in since openssh-3.2.2 (released in 2002) and
   has been mandatory since openssh-7.5 (released in 2017). Moreover,
   portable OpenSSH has used toolchain features available in most
   modern compilers to abort on signed integer overflow since
   openssh-6.5 (released in 2014).
   Thanks to Malcolm Stagg for finding and reporting this bug.
Potentially-incompatible changes
 * sshd(8), portable OpenSSH only: this release removes in-built
   support for MD5-hashed passwords. If you require these on your
   system then we recommend linking against libxcrypt or similar.
 * This release modifies the FIDO security key middleware interface
   and increments SSH_SK_VERSION_MAJOR.
Changes since OpenSSH 8.8
This release includes a number of new features.
New features
 * ssh(1), sshd(8), ssh-add(1), ssh-agent(1): add a system for
   restricting forwarding and use of keys added to ssh-agent(1)
   A detailed description of the feature is available at
   https://www.openssh.com/agent-restrict.html and the protocol
   extensions are documented in the PROTOCOL and PROTOCOL.agent
   files in the source release.
 * ssh(1), sshd(8): add the sntrup761x25519-sha512@openssh.com hybrid
   ECDH/x25519 + Streamlined NTRU Prime post-quantum KEX to the
   default KEXAlgorithms list (after the ECDH methods but before the
   prime-group DH ones). The next release of OpenSSH is likely to
   make this key exchange the default method.
 * ssh-keygen(1): when downloading resident keys from a FIDO token,
   pass back the user ID that was used when the key was created and
   append it to the filename the key is written to (if it is not the
   default). Avoids keys being clobbered if the user created multiple
   resident keys with the same application string but different user
   IDs.
 * ssh-keygen(1), ssh(1), ssh-agent(1): better handling for FIDO keys
   on tokens that provide user verification (UV) on the device itself,
   including biometric keys, avoiding unnecessary PIN prompts.
 * ssh-keygen(1): add "ssh-keygen -Y match-principals" operation to
   perform matching of principals names against an allowed signers
   file. To be used towards a TOFU model for SSH signatures in git.
 * ssh-add(1), ssh-agent(1): allow pin-required FIDO keys to be added
   to ssh-agent(1). $SSH_ASKPASS will be used to request the PIN at
   authentication time.
 * ssh-keygen(1): allow selection of hash at sshsig signing time
   (either sha512 (default) or sha256).
 * ssh(1), sshd(8): read network data directly to the packet input
   buffer instead of indirectly via a small stack buffer. Provides a
   modest performance improvement.
 * ssh(1), sshd(8): read data directly to the channel input buffer,
   providing a similar modest performance improvement.
 * ssh(1): extend the PubkeyAuthentication configuration directive to
   accept yes|no|unbound|host-bound to allow control over one of the
   protocol extensions used to implement agent-restricted keys.
Bugfixes
 * sshd(8): document that CASignatureAlgorithms, ExposeAuthInfo and
   PubkeyAuthOptions can be used in a Match block. PR277.
 * sshd(8): fix possible string truncation when constructing paths to
   .rhosts/.shosts files with very long user home directory names.
 * ssh-keysign(1): unbreak for KEX algorithms that use SHA384/512
   exchange hashes
 * ssh(1): don't put the TTY into raw mode when SessionType=none,
   avoids ^C being unable to kill such a session. bz3360
 * scp(1): fix some corner-case bugs in SFTP-mode handling of
   ~-prefixed paths.
 * ssh(1): unbreak hostbased auth using RSA keys. Allow ssh(1) to
   select RSA keys when only RSA/SHA2 signature algorithms are
   configured (this is the default case). Previously RSA keys were
   not being considered in the default case.
 * ssh-keysign(1): make ssh-keysign use the requested signature
   algorithm and not the default for the key type. Part of unbreaking
   hostbased auth for RSA/SHA2 keys.
 * ssh(1): stricter UpdateHostkey signature verification logic on
   the client- side. Require RSA/SHA2 signatures for RSA hostkeys
   except when RSA/SHA1 was explicitly negotiated during initial
   KEX; bz3375
 * ssh(1), sshd(8): fix signature algorithm selection logic for
   UpdateHostkeys on the server side. The previous code tried to
   prefer RSA/SHA2 for hostkey proofs of RSA keys, but missed some
   cases. This will use RSA/SHA2 signatures for RSA keys if the
   client proposed these algorithms in initial KEX. bz3375
 * All: convert all uses of select(2)/pselect(2) to poll(2)/ppoll(2).
   This includes the mainloops in ssh(1), ssh-agent(1), ssh-agent(1)
   and sftp-server(8), as well as the sshd(8) listen loop and all
   other FD read/writability checks. On platforms with missing or
   broken poll(2)/ppoll(2) syscalls a select(2)-based compat shim is
   available.
 * ssh-keygen(1): the "-Y find-principals" command was verifying key
   validity when using ca certs but not with simple key lifetimes
   within the allowed signers file.
 * ssh-keygen(1): make sshsig verify-time argument parsing optional
 * sshd(8): fix truncation in rhosts/shosts path construction.
 * ssh(1), ssh-agent(1): avoid xmalloc(0) for PKCS#11 keyid for ECDSA
   keys (we already did this for RSA keys). Avoids fatal errors for
   PKCS#11 libraries that return empty keyid, e.g. Microchip ATECC608B
   "cryptoauthlib"; bz#3364
 * ssh(1), ssh-agent(1): improve the testing of credentials against
   inserted FIDO: ask the token whether a particular key belongs to
   it in cases where the token supports on-token user-verification
   (e.g. biometrics) rather than just assuming that it will accept it.
   Will reduce spurious "Confirm user presence" notifications for key
   handles that relate to FIDO keys that are not currently inserted in at
   least some cases. bz3366
 * ssh(1), sshd(8): correct value for IPTOS_DSCP_LE. It needs to
   allow for the preceding two ECN bits. bz#3373
 * ssh-keygen(1): add missing -O option to usage() for the "-Y sign"
   option.
 * ssh-keygen(1): fix a NULL deref when using the find-principals
   function, when matching an allowed_signers line that contains a
   namespace restriction, but no restriction specified on the
   command-line
 * ssh-agent(1): fix memleak in process_extension(); oss-fuzz
   issue #42719
 * ssh(1): suppress "Connection to xxx closed" messages when LogLevel
   is set to "error" or above. bz3378
 * ssh(1), sshd(8): use correct zlib flags when inflate(3)-ing
   compressed packet data. bz3372
 * scp(1): when recursively transferring files in SFTP mode, create the
   destination directory if it doesn't already exist to match scp(1) in
   legacy RCP mode behaviour.
 * scp(1): many improvements in error message consistency between scp(1)
   in SFTP mode vs legacy RCP mode.
 * sshd(8): fix potential race in SIGTERM handling PR289
 * ssh(1), ssh(8): since DSA keys are deprecated, move them to the
   end of the default list of public keys so that they will be tried
   last. PR295
 * ssh-keygen(1): allow 'ssh-keygen -Y find-principals' to match
   wildcard principals in allowed_signers files
Portability
 * ssh(1), sshd(8): don't trust closefrom(2) on Linux. glibc's
   implementation does not work in a chroot when the kernel does not
   have close_range(2). It tries to read from /proc/self/fd and when
   that fails dies with an assertion of sorts. Instead, call
   close_range(2) directly from our compat code and fall back if
   that fails.  bz#3349,
 * OS X poll(2) is broken; use compat replacement. For character-
   special devices like /dev/null, Darwin's poll(2) returns POLLNVAL
   when polled with POLLIN. Apparently this is Apple bug 3710161 -
   not public but a websearch will find other OSS projects
   rediscovering it periodically since it was first identified in
   2005.
 * Correct handling of exceptfds/POLLPRI in our select(2)-based
   poll(2)/ppoll(2) compat implementation.
 * Cygwin: correct checking of mbstowcs() return value.
 * Add a basic SECURITY.md that refers people to the openssh.com
   website.
 * Enable additional compiler warnings and toolchain hardening flags,
   including -Wbitwise-instead-of-logical, -Wmisleading-indentation,
   -fzero-call-used-regs and -ftrivial-auto-var-init.
 * HP/UX. Use compat getline(3) on HP-UX 10.x, where the libc version
   is not reliable.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:36:50 +00:00
Stefan Schantl
cd3e5923fe libloc: Update to 0.9.11
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-09 15:41:49 +00:00
Arne Fitzenreiter
5643fd8a90 rtl8189fs: add realtek wlan driver
this chip is the successor of the rtl8189es look some boards has
silently switched to the new chip.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-09 15:22:38 +00:00
Michael Tremer
32ce7ab402 linux: Fix for CVE-2022-0847 aka Dirty Pipe
https://dirtypipe.cm4all.com

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-08 09:59:43 +00:00
Peter Müller
65808f8478 update ca-certificates CA bundle
Update the CA certificates list to what Mozilla NSS ships currently.

The original file can be retrieved from:
https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt

Please note that the certdata.txt file only appears to drop MD5
checksums in favour of SHA256, so there is no need in shipping
ca-certificates with the next Core Update.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-05 14:31:02 +00:00
Peter Müller
975a000753 Tor: Update to 0.4.6.10
Full changelog as per https://gitweb.torproject.org/tor.git/plain/ChangeLog?h=tor-0.4.6.10 :

Changes in version 0.4.6.10 - 2022-02-04
  This version contains minor bugfixes but one in particular is that relays
  don't advertise onion service v2 support at the protocol version level.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on February 04, 2022.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2022/02/04.

  o Minor bugfix (logging):
    - Update a log notice dead URL to a working one. Fixes bug 40544;
      bugfix on 0.3.5.1-alpha.

  o Minor bugfix (relay):
    - Remove the HSDir and HSIntro onion service v2 protocol versions so
      relay stop advertising that they support them. Fixes bug 40509;
      bugfix on 0.3.5.17.

  o Minor bugfixes (MetricsPort, Prometheus):
    - Add double quotes to the label values of the onion service
      metrics. Fixes bug 40552; bugfix on 0.4.5.1-alpha.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-05 14:30:52 +00:00
Michael Tremer
dcd8a86b03 oci-python-sdk: Depend on python3-certifi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-23 15:52:16 +00:00
Michael Tremer
7cdd550577 dhcpcd: Allow freely setting MTU
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-23 15:46:45 +00:00
Michael Tremer
9c68992498 dhcpcd: Remove old MTU setting script
This is being replaced by adding the MTU option to any routes that
dhcpcd installs.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-23 15:46:45 +00:00
Peter Müller
8fa66ce750 Revert "gcc: Compile without ZSTD"
https://lists.ipfire.org/pipermail/development/2022-February/012544.html

This reverts commit 0b6ba4a0ca.
2022-02-23 15:36:25 +00:00
Michael Tremer
9b1f666eae Config: Disable parallel builds for Cargo on riscv64
There seems to be some problem where Cargo deadlocks during the build
when running on mutliple cores simulteneously.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-22 19:41:39 +00:00
Michael Tremer
1432531ac8 strip: Do not try to strip QEMU
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-22 19:41:39 +00:00
Michael Tremer
9fa3eed00a boost: Enable build on all architectures
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-22 19:41:39 +00:00
Michael Tremer
a7834bcf10 suricata: Fix check for level one cache line size
riscv64 does not return any value on our machine (maybe because it is
emulated?). "undefined" is however seen as a valid value, which makes
the build fail.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-22 19:41:39 +00:00
Michael Tremer
1bcf3c2a81 liburcu: Update automake to build on riscv64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-22 19:41:39 +00:00
Michael Tremer
5c1a1094ed kernel: Add a basic configuration for riscv64
This kernel configuration is a copy of our kernel configuration for
x86_64 on which I ran "make olddefconfig" which will set any unknown
values to their defaults.

This exists so that we have some kernel (which I did not try to boot) to
complete the build process.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-22 19:41:39 +00:00
Michael Tremer
d1283a8047 rust: Package for riscv64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-22 19:41:39 +00:00
Michael Tremer
5fec125684 rust: Rust's arch for riscv64 is called riscv64gc
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-22 19:41:39 +00:00
Michael Tremer
1c49332fa3 jq: Update autotools
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-22 19:41:39 +00:00
Michael Tremer
0b6ba4a0ca gcc: Compile without ZSTD
GCC can use ZSTD to compress debugging/LTO information in binary
objects. However, on riscv64, compiling zstd requires libatomic which is
not available at this point.

In order to make the build work, we explicitely disable ZSTD in GCC and
build ZSTD after libatomic is available.

Although ZSTD offers great compression, we won't have any disadvantages
through this change since we do not ship any debugging information and
at this point in time to not use LTO.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-22 19:41:39 +00:00