Commit Graph

8530 Commits

Author SHA1 Message Date
Michael Tremer
331ba89bfd core158: Ship gnutls
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:47:34 +00:00
Adolf Belka
f5e719df3e gnutls: Update to 3.6.16
- Update from 3.6.14 to 3.6.16
- Update rootfile
- Changelog
   * Version 3.6.16 (released 2021-05-24)
     ** libgnutls: Fixed potential miscalculation of ECDSA/EdDSA code backported from
        Nettle.  In GnuTLS, as long as it is built and linked against the fixed
        version of Nettle, this only affects GOST curves.  [CVE-2021-20305]
     ** libgnutls: Fixed potential use-after-free in sending "key_share"
        and "pre_shared_key" extensions. When sending those extensions, the
        client may dereference a pointer no longer valid after
        realloc. This happens only when the client sends a large Client
        Hello message, e.g., when HRR is sent in a resumed session
        previously negotiated large FFDHE parameters, because the initial
        allocation of the buffer is large enough without having to call
        realloc (#1151).  [GNUTLS-SA-2021-03-10, CVSS: low]
   * Version 3.6.15 (released 2020-09-04)
     ** libgnutls: Fixed "no_renegotiation" alert handling at incorrect timing.
        The server sending a "no_renegotiation" alert in an unexpected timing,
        followed by an invalid second handshake was able to cause a TLS 1.3 client to
        crash via a null-pointer dereference. The crash happens in the application's
        error handling path, where the gnutls_deinit function is called after
        detecting a handshake failure (#1071).  [GNUTLS-SA-2020-09-04, CVSS: medium]
     ** libgnutls: If FIPS self-tests are failed, gnutls_fips140_mode_enabled() now
        indicates that with a false return value (!1306).
     ** libgnutls: Under FIPS mode, the generated ECDH/DH public keys are checked
        accordingly to SP800-56A rev 3 (!1295, !1299).
     ** libgnutls: gnutls_x509_crt_export2() now returns 0 upon success, rather than
        the size of the internal base64 blob (#1025). The new behavior aligns to the
        existing documentation.
     ** libgnutls: Certificate verification failue due to OCSP must-stapling is not
        honered is now correctly marked with the GNUTLS_CERT_INVALID flag
        (!1317). The new behavior aligns to the existing documentation.
     ** libgnutls: The audit log message for weak hashes is no longer printed twice
        (!1301).
     ** libgnutls: Fixed version negotiation when TLS 1.3 is enabled and TLS 1.2 is
        disabled in the priority string. Previously, even when TLS 1.2 is explicitly
        disabled with "-VERS-TLS1.2", the server still offered TLS 1.2 if TLS 1.3 is
        enabled (#1054).

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:46:43 +00:00
Peter Müller
f94fd54e0c python3-msgpack: update to 1.0.0
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:49:18 +00:00
Peter Müller
3e60ed14e2 Clean up whatever remained from ALGs in userspace
This patch removes translations, directives in LFS files, and ALG shared
object files which all became orphaned after we disabled ALGs due to NAT
Slipstreaming vulnerability in Core Update 155.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:16:30 +00:00
Peter Müller
2c8a20af47 Drop unmaintained add-on dpfhack
This package seems to be unmaintained for at least five years. It's
(former?) upstream traces back to https://section5.ch/index.php/2011/01/13/dpf-hacking/,
but download links to both dpfhack and a patched version of lcd4linux
point to http://localhost/.

http://tech.section5.ch/files/dpfhack-0.1alpha.tgz still serves
something apparently related to dpfhack, but it is unclear whether that
is a previous version than the "0.12devel" we know about, or a
successor. https://tech.section5.ch/files/dpfhack-0.1alpha.tgz, just to
have it noticed, comes with a X.509 certificate not issued for this
FQDN.

dpfhack is solely needed as a dependancy for lcd4linux, which appears to
be unmaintained as well, hence being dropped in a dedicated patch.

Given the status quo, bugs in dpfhack cannot be reported properly,
security issues won't be addressed (by anybody else then ourselves), and
technical questions cannot be clarified aside a reverse engineering
approach.

We should not allow such an add-on to be installed on a firewall system.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:16:21 +00:00
Peter Müller
c62adbc448 Drop unmaintained add-on lcd4linux
This package has not received any updates or attention within the last
three years. It's sole known upstream URL (https://ssl.bulix.org/projects/lcd4linux/)
returns a HTTP error 404 nowadays, and the author was unable to locate
any upstream source that appears to be still maintained today.

Given the status quo, bugs in lcd4linux cannot be reported properly,
security issues won't be addressed (by anybody else then ourselves), and
technical questions cannot be clarified aside a reverse engineering
approach.

We should not allow such an add-on to be installed on a firewall system.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:16:13 +00:00
Michael Tremer
0b38fd75d4 core158: Ship dmidecode
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:15:15 +00:00
Peter Müller
740549d85a dmidecode: update to 3.3
Notable changes as per https://git.savannah.gnu.org/cgit/dmidecode.git/plain/NEWS:

Version 3.3 (Wed Oct 14 2020)
  - [BUILD] Allow overriding build settings from the environment.
  - [COMPATIBILITY] Document how the UUID fields are interpreted.
  - [PORTABILITY] Don't use memcpy on /dev/mem on arm64.
  - [PORTABILITY] Only scan /dev/mem for entry point on x86.
  - Support for SMBIOS 3.3.0. This includes new processor names, new port
    connector types, and new memory device form factors, types and
    technologies.
  - Add bios-revision, firmware-revision and system-sku-number to -s option.
  - Use the most appropriate unit for cache size.
  - Decode system slot base bus width and peers.
  - Important bug fixes:
    Fix Redfish Hostname print length
    Fix formatting of TPM table output
    Fix System Slot Information for PCIe SSD
    Don't choke on invalid processor voltage
  - Use the most appropriate unit for cache size.

Version 3.2 (Wed Sep 14 2018)
  - [COMPATIBILITY] The UUID is now displayed using lowercase letters, per
    RFC 4122 (#53569). You must ensure that any code parsing it is
    case-insensitive.
  - Support for SMBIOS 3.2.0. This includes new processor names, new socket
    and port connector types, new system slot state and property, and support
    for non-volatile memory (NVDIMM).
  - Support for Redfish management controllers.
  - A new command line option to query a specific structure by its handle.
  - A new command line option to query the system family string.
  - Support for 3 ThinkPad-specific structures (patch #9642).
  - Support for HPE's new company name.
  - Support UEFI on FreeBSD.
  - Important bug fixes:
    Fix firmware version of TPM device
    Fix the HPE UEFI feature flag check
  - (biosdecode) A new command line option to fully decode PIR information
    (support request #109339).

This patch also features two new patches recommended by upstream, whose
online version can be retrieved at
https://git.savannah.gnu.org/cgit/dmidecode.git/commit/?id=1117390ccd9cea139638db6f460bb6de70e28f94
https://git.savannah.gnu.org/cgit/dmidecode.git/commit/?id=11e134e54d15e67a64c39a623f492a28df922517.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:14:21 +00:00
Michael Tremer
31faaf2b14 core158: Ship gzip
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:14:06 +00:00
Michael Tremer
c9dbf671d4 core158: Ship perl files with changed permissions
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-02 09:45:04 +00:00
Michael Tremer
0e734ef7a8 core158: Ship sshd_config
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:41:41 +00:00
Michael Tremer
97c76ea56f core158: Ship expat
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:41:00 +00:00
Adolf Belka
f8513e6f57 expat: Update to 2.4.1
- Update from 2.3.0 to 2.4.1
- Update rootfile
- Changelog (URL in changelog changed to https://verbump(dot)de as mail was
   rejected by IPFire mail system due to policy violation because URL was
   highlighted as a blacklisted addresss
   Release 2.4.1 Sun May 23 2021
        Bug fixes:
         #488 #490  Autotools: Fix installed header expat_config.h for multilib
                    systems; regression introduced in 2.4.0 by pull request #486
        Other changes:
         #491 #492  Version info bumped from 9:0:8 to 9:1:8;
                    see https://verbump(dot)de/ for what these numbers do
        Special thanks to:
            Gentoo's QA check "multilib_check_headers"
   Release 2.4.0 Sun May 23 2021
        Security fixes:
         #34 #466 #484  CVE-2013-0340/CWE-776 -- Protect against billion laughs attacks
                    (denial-of-service; flavors targeting CPU time or RAM or both,
                    leveraging general entities or parameter entities or both)
                    by tracking and limiting the input amplification factor
                    (<amplification> := (<direct> + <indirect>) / <direct>).
                    By conservative default, amplification up to a factor of 100.0
                    is tolerated and rejection only starts after 8 MiB of output bytes
                    (=<direct> + <indirect>) have been processed.
                    The fix adds the following to the API:
                    - A new error code XML_ERROR_AMPLIFICATION_LIMIT_BREACH to
                      signals this specific condition.
                    - Two new API functions ..
                      - XML_SetBillionLaughsAttackProtectionMaximumAmplification and
                      - XML_SetBillionLaughsAttackProtectionActivationThreshold
                      .. to further tighten billion laughs protection parameters
                      when desired.  Please see file "doc/reference.html" for details.
                      If you ever need to increase the defaults for non-attack XML
                      payload, please file a bug report with libexpat.
                    - Two new XML_FEATURE_* constants ..
                      - that can be queried using the XML_GetFeatureList function, and
                      - that are shown in "xmlwf -v" output.
                    - Two new environment variable switches ..
                      - EXPAT_ACCOUNTING_DEBUG=(0|1|2|3) and
                      - EXPAT_ENTITY_DEBUG=(0|1)
                      .. for runtime debugging of accounting and entity processing.
                      Specific behavior of these values may change in the future.
                    - Two new command line arguments "-a FACTOR" and "-b BYTES"
                      for xmlwf to further tighten billion laughs protection
                      parameters when desired.
                      If you ever need to increase the defaults for non-attack XML
                      payload, please file a bug report with libexpat.
        Bug fixes:
         #332 #470  For (non-default) compilation with -DEXPAT_MIN_SIZE=ON (CMake)
                    or CPPFLAGS=-DXML_MIN_SIZE (GNU Autotools): Fix segfault
                    for UTF-16 payloads containing CDATA sections.
         #485 #486  Autotools: Fix generated CMake files for non-64bit and
                    non-Linux platforms (e.g. macOS and MinGW in particular)
                    that were introduced with release 2.3.0
        Other changes:
         #468 #469  xmlwf: Improve help output and the xmlwf man page
              #463  xmlwf: Improve maintainability through some refactoring
              #477  xmlwf: Fix man page DocBook validity
         #458 #459  CMake: Support absolute paths for both CMAKE_INSTALL_LIBDIR
                    and CMAKE_INSTALL_INCLUDEDIR
         #471 #481  CMake: Add support for standard variable BUILD_SHARED_LIBS
              #457  Unexpose symbol _INTERNAL_trim_to_complete_utf8_characters
              #467  Resolve macro HAVE_EXPAT_CONFIG_H
              #472  Delete unused legacy helper file "conftools/PrintPath"
         #473 #483  Improve attribution
         #464 #465 #477  doc/reference.html: Fix XHTML validity
         #475 #478  doc/reference.html: Replace the 90s look by OK.css
              #479  Version info bumped from 8:0:7 to 9:0:8
                    due to addition of new symbols and error codes;
                    see https://verbump(dot)de/ for what these numbers do
        Infrastructure:
              #456  CI: Enable periodic runs
              #457  CI: Start covering the list of exported symbols
              #474  CI: Isolate coverage task
         #476 #482  CI: Adapt to breaking changes in image "ubuntu-18.04"
              #477  CI: Cover well-formedness and DocBook/XHTML validity
                    of doc/reference.html and doc/xmlwf.xml
        Special thanks to:
            Dimitry Andric
            Eero Helenius
            Nick Wellnhofer
            Rhodri James
            Tomas Korbar
            Yury Gribov and Clang LeakSan
            JetBrains
            OSS-Fuzz

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:40:44 +00:00
Michael Tremer
8c06bb2df9 core158: Ship curl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:40:34 +00:00
Adolf Belka
abcabf673e curl: Update to 7.77.0
- Update from 7.76.1 to 7.77.0
- Update rootfile
- Changelog is too large to include here. It can be accesed at
   https://curl.se/changes.html
   There are 5 changes and 133 bug fixes of which 3 are related to CVE's

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:40:11 +00:00
Michael Tremer
b9714c0eee core158: Ship zstd
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:39:47 +00:00
Adolf Belka
2a2219ae9b zstd: Update to 1.5.0
- Update from 1.4.9 to 1.5.0
- Update of rootfile
- Changelog
    v1.5.0  (May 11, 2021)
     api: Various functions promoted from experimental to stable API: (#2579-2581, @senhuang42)
       `ZSTD_defaultCLevel()`
       `ZSTD_getDictID_fromCDict()`
     api: Several experimental functions have been deprecated and will emit a compiler warning (#2582, @senhuang42)
       `ZSTD_compress_advanced()`
       `ZSTD_compress_usingCDict_advanced()`
       `ZSTD_compressBegin_advanced()`
       `ZSTD_compressBegin_usingCDict_advanced()`
       `ZSTD_initCStream_srcSize()`
       `ZSTD_initCStream_usingDict()`
       `ZSTD_initCStream_usingCDict()`
       `ZSTD_initCStream_advanced()`
       `ZSTD_initCStream_usingCDict_advanced()`
       `ZSTD_resetCStream()`
     api: ZSTDMT_NBWORKERS_MAX reduced to 64 for 32-bit environments (@Cyan4973)
     perf: Significant speed improvements for middle compression levels (#2494, @senhuang42 @terrelln)
     perf: Block splitter to improve compression ratio, enabled by default for high compression levels (#2447, @senhuang42)
     perf: Decompression loop refactor, speed improvements on `clang` and for `--long` modes (#2614 #2630, @Cyan4973)
     perf: Reduced stack usage during compression and decompression entropy stage (#2522 #2524, @terrelln)
     bug: Improve setting permissions of created files (#2525, @felixhandte)
     bug: Fix large dictionary non-determinism (#2607, @terrelln)
     bug: Fix non-determinism test failures on Linux i686 (#2606, @terrelln)
     bug: Fix various dedicated dictionary search bugs (#2540 #2586, @senhuang42 @felixhandte)
     bug: Ensure `ZSTD_estimateCCtxSize*() `monotonically increases with compression level (#2538, @senhuang42)
     bug: Fix --patch-from mode parameter bound bug with small files (#2637, @occivink)
     bug: Fix UBSAN error in decompression (#2625, @terrelln)
     bug: Fix superblock compression divide by zero bug (#2592, @senhuang42)
     bug: Make the number of physical CPU cores detection more robust (#2517, @PaulBone)
     doc: Improve `zdict.h` dictionary training API documentation (#2622, @terrelln)
     doc: Note that public `ZSTD_free*()` functions accept NULL pointers (#2521, @animalize)
     doc: Add style guide docs for open source contributors (#2626, @Cyan4973)
     tests: Better regression test coverage for different dictionary modes (#2559, @senhuang42)
     tests: Better test coverage of index reduction (#2603, @terrelln)
     tests: OSS-Fuzz coverage for seekable format (#2617, @senhuang42)
     tests: Test coverage for ZSTD threadpool API (#2604, @senhuang42)
     build: Dynamic library built multithreaded by default (#2584, @senhuang42)
     build: Move  `zstd_errors.h`  and  `zdict.h`  to  `lib/`  root (#2597, @terrelln)
     build: Allow `ZSTDMT_JOBSIZE_MIN` to be configured at compile-time, reduce default to 512KB (#2611, @Cyan4973)
     build: Single file library build script moved to `build/` directory (#2618, @felixhandte)
     build: `ZBUFF_*()` is no longer built by default (#2583, @senhuang42)
     build: Fixed Meson build (#2548, @SupervisedThinking @kloczek)
     build: Fix excessive compiler warnings with clang-cl and CMake (#2600, @nickhutchinson)
     build: Detect presence of `md5` on Darwin (#2609, @felixhandte)
     build: Avoid SIGBUS on armv6 (#2633, @bmwiedmann)
     cli: `--progress` flag added to always display progress bar (#2595, @senhuang42)
     cli: Allow reading from block devices with `--force` (#2613, @felixhandte)
     cli: Fix CLI filesize display bug (#2550, @Cyan4973)
     cli: Fix windows CLI `--filelist` end-of-line bug (#2620, @Cyan4973)
     contrib: Various fixes for linux kernel patch (#2539, @terrelln)
     contrib: Seekable format - Decompression hanging edge case fix (#2516, @senhuang42)
     contrib: Seekable format - New seek table-only API  (#2113 #2518, @mdittmer @Cyan4973)
     contrib: Seekable format - Fix seek table descriptor check when loading (#2534, @foxeng)
     contrib: Seekable format - Decompression fix for large offsets, (#2594, @azat)
     misc: Automatically published release tarballs available on Github (#2535, @felixhandte)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:39:33 +00:00
Michael Tremer
66c55e6cb0 core158: Ship zd1211-firmware
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:39:01 +00:00
Michael Tremer
a0112ac028 core158: Ship perl-XML-Parser
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:38:23 +00:00
Adolf Belka
567e5e85e5 XML-Parser: Update to 2.46
- Update from 2.34 to 2.46
- Update rootfile
- Changelog
    2.46 2019-09-24 (by Todd Rinaldo)
        - use foreach not for for loops
        - produce README.md so travis will show up on github
        - remove use vars and switch to our.
        - travis-ci testing from 5.8..5.28
        - Convert XML::Parser to use 3 arg opens with no barewords.
        - Migrate tracker to github
        - Switch to XSLoader
        - Fix a buffer overwrite in parse_stream()
    2.44 2015-01-12 (by Todd Rinaldo)
        - RT 99098 - Revert "Add more useful error message on parse to Expat". It breaks
          XML::Twig. Calling code will need to do this if it's needed.
        - RT 100959 - Add use FileHandle to t/astress.t - Make perl 5.10.0 happy.
    2.43 2014-12-11 (by Todd Rinaldo)
        - POD patch to man from Debian via Nicholas Bamber
        - POD patch from Debian via gregor herrmann.
        - Add more useful error message on parse to Expat
        - Fix LWP dependency to be LWP::Useragent
        - Bump to 2.43 for overdue release to CPAN.
    2.42_01 2013-07-12 (by Todd Rinaldo)
        - Added instructions to README for OSX
        - XS changes: stop using SvPV(string, PL_na)
        - Fix documentation typos
    2.41 2011-06-01 (by Todd Rinaldo)
        - Tests are cleaned. promoting to stable. No changes since 2.40_02
    2.40_02 2011-05-31 (by Todd Rinaldo)
        - TODO some tests which fail in Free BSD due to improper expat CVE patch
          http://www.freebsd.org/cgi/query-pr.cgi?pr=157469
    2.40_01 2011-05-24 (by Todd Rinaldo)
        - better installation instructions
        - Small spelling patches from Debian package - Thanks Nicholas Bamber
        - RT 68399 - Upgrade Devel::CheckLib to 0.93 to make it
          perl 5.14 compliant - qw()
        - RT 67207 - Stop doing tied on globs - Thanks sprout
        - RT 31319 - Fix doc links in POD for XML/Parser.pm
    2.40  2010-09-16 (by Alexandr Ciornii)
        - Add windows-1251.enc, ibm866.enc, koi8-r.enc (Russian)
        - Add windows-1255.enc (Hebrew)
        - Update iso-8859-7.enc (RT#40712)
        - Use Devel::CheckLib
        - Better description of expat packages
        - Better Perl style in both code and docs
    2.36
        - Fix for Carp::Heavy bugs
    2.35   (mostly by Alexandr Ciornii)
        - Works in 5.10 (Andreas J. Koenig)
        - Added license in Makefile.PL (Alexandr Ciornii)
        - Makefile.PL also searches for expat in C:/lib/Expat-2.0.0 (Alexandr Ciornii)
        - No longer uses variable named 'namespace' in Expat.xs (Jeff Hunter)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:38:04 +00:00
Michael Tremer
c12f3d9726 core158: Ship knot
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:37:49 +00:00
Michael Tremer
df85d2dca8 core158: Ship pakfire
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:52:59 +00:00
Michael Tremer
f0996ee643 core158: Ship libusb
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:51:33 +00:00
Peter Müller
937d8dbcb1 libusb: update to 1.0.24
Full changelog as per CHANGELOG file:

2020-12-09: v1.0.24
* Add new platform abstraction (#252)
* Add Null POSIX backend
* Add support for eventfd
* Add support for thread IDs on Haiku, NetBSD and Solaris
* New API libusb_hotplug_get_user_data()
* Darwin (macOS): Fix race condition that results in segmentation fault (#701)
* Darwin (macOS): Fix stale descriptor information post reset (#733)
* Darwin (macOS): use IOUSBDevice as darwin_device_class explicitly (#693)
* Linux: Drop support for kernel older than 2.6.32
* Linux: Provide an event thread name (#689)
* Linux: Wait until all USBs have been reaped before freeing them (#607)
* NetBSD: Recognize device timeouts (#710)
* OpenBSD: Allow opening ugen devices multiple times (#763)
* OpenBSD: Support libusb_get_port_number() (#764)
* SunOS: Fix a memory leak (#756)
* SunOS: Various fixes (#627, #628, #629)
* Windows: Add Visual Studio 2019 support
* Windows: Drop support for WinCE and Visual Studio older than 2013
* Windows: Drop support for Windows XP
* Windows: Support building all examples using Visual Studio (#151)
* Documentation fixes and improvements
* Various other bug fixes and improvements

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:51:20 +00:00
Michael Tremer
76af560cc9 core158: Ship iputils
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:50:05 +00:00
Peter Müller
cf4b5b40a1 iputils: update to 20210202
The changelog between version "s20160803" is too large to include it
here, please refer to https://github.com/iputils/iputils/releases for a
human-readable version.

Due to build system changes, single binaries cannot be compiled by
running "make [program]" anymore, updated rootfiles to reflect that
change.

20210202's version of /usr/bin/ping is bug-compatible to s20160803's
one, hence does not cause trouble in ~/src/ppp/ip-up. Tested, works.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:49:21 +00:00
Michael Tremer
bf1ea6966b Merge branch 'master' into next 2021-05-25 09:46:50 +00:00
Michael Tremer
5987732fd4 core158: Ship bind
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:46:41 +00:00
Matthias Fischer
be1bf24bb0 bind: Update to 9.11.32
For details see:
https://downloads.isc.org/isc/bind9/9.11.31/RELEASE-NOTES-bind-9.11.32.html

"Notes for BIND 9.11.32
Feature Changes

    DNSSEC responses containing NSEC3 records with iteration counts
    greater than 150 are now treated as insecure. [GL #2445]

    The maximum supported number of NSEC3 iterations that can be
    configured for a zone has been reduced to 150. [GL #2642]

    The implementation of the ZONEMD RR type has been updated to match
    RFC 8976. [GL #2658]

Notes for BIND 9.11.31
Security Fixes

    A malformed incoming IXFR transfer could trigger an assertion
    failure in named, causing it to quit abnormally. (CVE-2021-25214)

    ISC would like to thank Greg Kuechle of SaskTel for bringing this
    vulnerability to our attention. [GL #2467]

    named crashed when a DNAME record placed in the ANSWER section
    during DNAME chasing turned out to be the final answer to a client
    query. (CVE-2021-25215)

    ISC would like to thank Siva Kakarla for bringing this vulnerability
    to our attention. [GL #2540]

    When a server's configuration set the tkey-gssapi-keytab
    or tkey-gssapi-credential option, a specially crafted GSS-TSIG query
    could cause a buffer overflow in the ISC implementation of SPNEGO
    (a protocol enabling negotiation of the security mechanism used for
    GSSAPI authentication). This flaw could be exploited to crash named
    binaries compiled for 64-bit platforms, and could enable remote code
    execution when named was compiled for 32-bit platforms.
    (CVE-2021-25216)

    This vulnerability was reported to us as ZDI-CAN-13347 by Trend
    Micro Zero Day Initiative. [GL #2604]

Feature Changes

    The ISC implementation of SPNEGO was removed from BIND 9 source
    code. Instead, BIND 9 now always uses the SPNEGO implementation
    provided by the system GSSAPI library when it is built with GSSAPI
    support. All major contemporary Kerberos/GSSAPI libraries contain
    an implementation of the SPNEGO mechanism. [GL #2607]

Notes for BIND 9.11.30

The BIND 9.11.30 release was withdrawn after a backporting bug was
discovered during pre-release testing. ISC would like to acknowledge the
assistance of Natan Segal of Bluecat Networks.2"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:46:28 +00:00
Michael Tremer
7704b31320 core158: Ship vnstat
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:46:10 +00:00
Michael Tremer
3d79695465 core158: Ship backup.pl script
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:44:20 +00:00
Adolf Belka
e5f3e0397c backup.pl: Fix #12626 backup/include.user entries will not override backup/exclude
- Current situation is that any restrictions in the exclude file will not
   be overwritten by the include.user file
- For example the global exclude file has *.tmp preventing any tmp files
   being backed up from the globally included IPFire files
   If a user has some specific tmp files they want to backup and include
   them in the include.user file they will not override the global
   exclude file.
- This fix does the backup of the global and user backups as two separate
   events and then appends them. This means that any tmp files in the
   include.user file will be backed up.
- The backups are created as a global tar file and then have the user
   tar file appended and then the combined file gzipped and given the .ipf
   suffix. This has to be done this was as gzipped files can not be
   appended to each other whereas tar files can.

Fixes: 12626
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:43:57 +00:00
Peter Müller
2b51f53cfd Icinga: Do not ship event handlers for Nagios
These are owned (hence being writable) by "nobody", posing a potential
security risk. Since the files itself were already exluded from being
shipped, their parent directory should be as well.

This patch should reduce the amount of executable files being owned by
nobody to zero after upgrading to Core Update 157. Due to complexity
reasons, not all applications available in Pakfire could be tested,
though, so your mileage may vary.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:43:09 +00:00
Peter Müller
488e29e033 Core Update 157: Delete shared object files leftover from pppd 2.4.8
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:42:55 +00:00
Peter Müller
7ae9f22122 pppd: Explicitly ship pppd shared object files
These are needed by pppd, but were not previously shipped as such.
Instead, since their parent directory at /usr/lib/pppd/${version}/ was
not commented out, we implicitly shipped the entire directory.

This patch does not change our behaviour in the end, but makes things
more transparent to developers.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:42:35 +00:00
Peter Müller
3359061d68 Core Update 157: Ship backup package to apply changed permissions
This is required as "backup" itself does not gets updated automatically,
contrary to it's LFS file suggesting by having a "PAK_VER" number.

In order to fix #12619, it is therefore necessary to ship the backup
files with Core Update 157.

Partially fixes: #12619

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:42:30 +00:00
Peter Müller
a66fe2a791 Core Update 157: Apply changed SSH configurations
This is necessary to fix SSH not starting after upgrading to Core Update
157 unless it's settings are manually written via the WebUI.

Reported-by: Erik Kapfer <ummeegge@ipfire.org>
Reported-by: Tom Rymes <tom@rymes.net>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:42:22 +00:00
Michael Tremer
7849bdd2af core158: Ship ca-certificates
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-21 08:53:16 +00:00
Peter Müller
fd61df2a86 update ca-certificates CA bundle
Update the CA certificates list to what Mozilla NSS ships currently.

The original file can be retrieved from:
https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-21 08:52:54 +00:00
Peter Müller
0bbf388799 Clean up various files left from dropped add-ons and packages
Since I only ran "find . -type f -name ...", I missed mostly directories
containing configuration and initscripts of recently dropped add-ons and
packages.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-21 08:52:45 +00:00
Adolf Belka
495cf3e0b4 python-pyparsing: Update to 2.4.7 and migrate to python3
- Update from 2.2.0 to 2.4.7
- Migrate from python2 to python3
- Move the rootfile from common to packages as pyparsing is an addon

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-20 10:05:09 +00:00
Peter Müller
2feefae21a config/elinks/elinks.conf does not have to be executable
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-20 10:01:50 +00:00
Adolf Belka
398669f7c9 python3-setuptools: Create a python3 version of python-setuptools
- python3-setuptools works with python3-daemon but not with
   python-m2crypto. m2crypto has to stay with python2 because crda
   will not find the python3 version of m2crypto.
- python-m2crypto only works with python-setuptools so both the
   python2 and python3 versions of setuptools need to stay in place.
- Therefore this patch only creates python3-setuptools, it does not
   remove python-setuptools

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-20 09:48:22 +00:00
Michael Tremer
e689de3365 core158: Ship ethtool
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-20 09:47:57 +00:00
Adolf Belka
19465bc094 ethtool: Update to 5.12
- Update from 3.16 (2014) to 5.12 (2021)
- Update of rootfile
- Changelog is too large to include here. Changelog details are available
   at https://git.kernel.org/pub/scm/network/ethtool/ethtool.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-20 09:47:41 +00:00
Michael Tremer
530e1e7637 core158: Ship qpdf
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-20 09:47:26 +00:00
Adolf Belka
e4b8c09391 qpdf: Update to 10.3.2
- Update from 10.3.0 to 10.3.2
- Update rootfiles
- Changelog
   * 10.3.2: release
     * Fix problem that caused the generated manual from being included
       in the Windows distributions. Fixes #521.
     * Fix 11-year-old bug of leaving unreferenced objects in preserved
       object streams. Fixes #520.
     * Portability fix: use tm_gmtoff rather than global timezone
       variable if available to get timezone offset. This fixes
       compilation on BSD and also results in a daylight saving
       time-aware offset for Linux or other GNU systems. Fixes #515.
     * When adding a page, if the page already exists, make a shallow
       copy of the page instead of throwing an exception. This makes the
       behavior of adding a page from the library consistent with what
       the CLI does and also with what the library does if it starts with
       a file that already has a duplicated page. Note that this means
       that, in some cases, the page you pass to addPage or addPageAt
       (either in QPDF or QPDFPageDocumentHelper) will not be the same
       object that actually gets added. (This has actually always been
       the case.) That means that, if you are going to do subsequent
       modification on the page, you should retrieve it again.
   * 10.3.1: release
     * Bug fix: allow /DR to be direct in /AcroForm

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-20 09:47:11 +00:00
Michael Tremer
e6681e3d44 core158: Ship perl-CGI
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-20 09:47:00 +00:00
Michael Tremer
f8cd37cb1c core158: Ship glib
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-20 09:46:36 +00:00
Adolf Belka
19c0bc43c0 glib: Update to 2.68.2
- Update from 2.68.1 to 2.68.2
- Update rootfiles
- Changelog
   Overview of changes in GLib 2.68.2
    * Fix building third-party projects against GLib on CentOS 7 (work by
      Ignacio Casal Quinteiro) (#2387)
    * Bugs fixed:
      - #2387 json-glib does not build with glib 2.68.1
      - !2060 gmacros: check that __cplusplus or _MSC_VER is defined
      - !2068 gmacros: missing check if __STDC_VERSION__ is defined
      - !2079 Backport !2078 “gthreadedresolver: don't ignore flags in lookup_by_name_with_flags” to glib-2-68
    * Translation updates:
      - Nepali
      - Serbian

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-20 09:46:18 +00:00