Commit Graph

21199 Commits

Author SHA1 Message Date
Arne Fitzenreiter
3920ba127f kernel: update to 6.6.9
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-02 09:54:10 +01:00
Peter Müller
dfae8b97b6 Core Update 183: Ship GnuTLS
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:39:53 +00:00
Adolf Belka
8cc92f5025 gnutls: Update to version 3.8.2
- Update from version 3.8.0 to 3.8.2
- Update of rootfile
- Changelog
    3.8.2 (released 2023-11-14)
	** libgnutls: Fix timing side-channel inside RSA-PSK key exchange.
	   [GNUTLS-SA-2023-10-23, CVSS: medium] [CVE-2023-5981]
	** libgnutls: Add API functions to perform ECDH and DH key agreement
	   The functionality has been there for a long time though they were
	   not available as part of the public API.  This enables applications
	   to implement custom protocols leveraging non-interactive key
	   agreement with ECDH and DH.
	** libgnutls: Added support for AES-GCM-SIV ciphers (RFC 8452)
	   The new algorithms GNUTLS_CIPHER_AES_128_SIV_GCM and
	   GNUTLS_CIPHER_AES_256_SIV_GCM have been added to be used through
	   the AEAD interface.  Note that, unlike
	   GNUTLS_CIPHER_AES_{128,256}_SIV_GCM, the authentication tag is
	   appended to the ciphertext, not prepended.
	** libgnutls: transparent KTLS support is extended to FreeBSD kernel
	   The kernel TLS feature can now be enabled on FreeBSD as well as
	   Linux when compiled with the --enable-ktls configure option.
	** gnutls-cli: New option --starttls-name
	   Depending on deployment, application protocols such as XMPP may
	   require a different origin address than the external address to be
	   presented prior to STARTTLS negotiation.  The --starttls-name can
	   be used to specify specify the addresses separately.
	** API and ABI modifications:
		gnutls_pubkey_import_dh_raw: New function
		gnutls_privkey_import_dh_raw: New function
		gnutls_pubkey_export_dh_raw: New function
		gnutls_privkey_export_dh_raw: New function
		gnutls_x509_privkey_import_dh_raw: New function
		gnutls_privkey_derive_secret: New function
		GNUTLS_KEYGEN_DH: New enum member of gnutls_keygen_types_t
		GNUTLS_CIPHER_AES_128_SIV_GCM: Added
		GNUTLS_CIPHER_AES_256_SIV_GCM: Added
    3.8.1 (released 2023-08-03)
	** libgnutls: ClientHello extensions are randomized by default
	   To make fingerprinting harder, TLS extensions in ClientHello
	   messages are shuffled. As this behavior may cause compatibility
	   issue with legacy applications that do not accept the last
	   extension without payload, the behavior can be reverted with the
	   %NO_SHUFFLE_EXTENSIONS priority keyword.
	** libgnutls: Add support for RFC 9258 external PSK importer.
	   This enables to deploy the same PSK across multiple TLS versions
	   (TLS 1.2 and TLS 1.3) in a secure manner. To use, the application
	   needs to set up a callback that formats the PSK identity using
	   gnutls_psk_format_imported_identity().
	** libgnutls: %GNUTLS_NO_EXTENSIONS has been renamed to
	   %GNUTLS_NO_DEFAULT_EXTENSIONS.
	** libgnutls: Add additional PBKDF limit checks in FIPS mode as
	   defined in SP 800-132. Minimum salt length is 128 bits and
	   minimum iterations bound is 1000 for PBKDF in FIPS mode.
	** libgnutls: Add a mechanism to control whether to enforce extended
	   master secret (RFC 7627). FIPS 140-3 mandates the use of TLS
	   session hash (extended master secret, EMS) in TLS 1.2. To enforce
	   this, a new priority keyword %FORCE_SESSION_HASH is added and if
	   it is set and EMS is not set, the peer aborts the connection. This
	   behavior is the default in FIPS mode, though it can be overridden
	   through the configuration file with the "tls-session-hash" option.
	   In either case non-EMS PRF is reported as a non-approved operation
	   through the FIPS service indicator.
	** New option --attime to specify current time.
	   To make testing with different timestamp to the system easier, the
	   tools doing certificate verification now provide a new option
	   --attime, which takes an arbitrary time.
	** API and ABI modifications:
		gnutls_psk_client_credentials_function3: New typedef
		gnutls_psk_server_credentials_function3: New typedef
		gnutls_psk_set_server_credentials_function3: New function
		gnutls_psk_set_client_credentials_function3: New function
		gnutls_psk_format_imported_identity: New function
		GNUTLS_PSK_KEY_EXT: New enum member of gnutls_psk_key_flags

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:39:38 +00:00
Peter Müller
e807011eba Core Update 183: Ship iptables
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:37:14 +00:00
Adolf Belka
c75d942a4d iptables: Update to version 1.8.10
- Update from version 1.8.9 to 1.8.10
- Update of rootfile not required
- Changelog
    1.8.10
      build: use pkg-config for libpcap
      iptables-test.py: make explicit use of python3
      xtables-eb: fix crash when opts isn't reallocated
      iptables-nft: make builtin tables static
      iptables-nft: remove unused function argument
      include: update nf_tables uapi header
      ebtables-nft: add broute table emulation
      nft-ruleparse: parse meta mark set as MARK target
      iptables: Fix setting of ipv6 counters
      iptables: Fix handling of non-existent chains
      xshared: dissolve should_load_proto
      nft: move processing logic out of asserts
      man: string: document BM false negatives
      ip6tables: Fix checking existence of rule
      nft: check for source and destination address in first place
      nft: use payload matching for layer 4 protocol
      nft-bridge: pass context structure to ops->add() to improve anonymous set support
      configure: Bump version for 1.8.10 release
      extensions: NAT: Fix for -Werror=format-security
      etc: Drop xtables.conf
      Proper fix for "unknown argument" error message
      ebtables: Refuse unselected targets' options
      ebtables-translate: Drop exec_style
      ebtables-translate: Use OPT_* from xshared.h
      ebtables-translate: Ignore '-j CONTINUE'
      ebtables-translate: Print flush command after parsing is finished
      tests: xlate: Support testing multiple individual files
      tests: CLUSTERIP: Drop test file
      nft-shared: Lookup matches in iptables_command_state
      nft-shared: Use nft_create_match() in one more spot
      nft-shared: Simplify using nft_create_match()
      tests: xlate: Properly split input in replay mode
      tests: xlate: Print file names even if specified
      extensions: libebt_redirect: Fix target translation
      extensions: libebt_redirect: Fix for wrong syntax in translation
      extensions: libebt_ip: Do not use 'ip dscp' for translation
      extensions: libebt_ip: Translation has to match on ether type
      ebtables: ip and ip6 matches depend on protocol match
      xtables-translate: Support insert with index
      include: Add missing linux/netfilter/xt_LOG.h
      nft-restore: Fix for deletion of new, referenced rule
      tests: shell: Test for false-positive rule check
      utils: nfbpf_compile: Replace pcap_compile_nopcap()
      nft-shared: Drop unused include
      arptables: Fix parsing of inverted 'arp operation' match
      arptables: Don't omit standard matches if inverted
      xshared: Fix parsing of option arguments in same word
      nft: Introduce nft-ruleparse.{c,h}
      nft: Extract rule parsing callbacks from nft_family_ops
      nft: ruleparse: Create family-specific source files
      tests: shell: Sanitize nft-only/0009-needless-bitwise_0
      nft: Special casing for among match in compare_matches()
      nft: More verbose extension comparison debugging
      nft: Do not pass nft_rule_ctx to add_nft_among()
      nft: Include sets in debug output
      *tables-restore: Enforce correct counters syntax if present
      *tables: Reject invalid chain names when renaming
      ebtables: Improve invalid chain name detection
      tests: shell: Fix and extend chain rename test
      iptables-restore: Drop dead code
      iptables-apply: Eliminate shellcheck warnings
      extensions: libipt_icmp: Fix confusion between 255/255 and any
      tests: libipt_icmp.t: Enable tests with numeric output
      man: iptables.8: Extend exit code description
      man: iptables.8: Trivial spelling fixes
      man: iptables.8: Fix intra page reference
      man: iptables.8: Clarify --goto description
      man: Use HTTPS for links to netfilter.org
      man: iptables.8: Trivial font fixes
      man: iptables-restore.8: Fix --modprobe description
      man: iptables-restore.8: Consistently document -w option
      man: iptables-restore.8: Drop -W option from synopsis
      man: iptables-restore.8: Put 'file' in italics in synopsis
      man: iptables-restore.8: Start paragraphs in upper-case
      man: Trivial: Missing space after comma
      man: iptables-save.8: Clarify 'available tables'
      man: iptables-save.8: Fix --modprobe description
      man: iptables-save.8: Start paragraphs in upper-case
      extensions: libip6t_icmp: Add names for mld-listener types
      nft-ruleparse: Introduce nft_create_target()
      tests: iptables-test: Fix command segfault reports
      nft: Create builtin chains with counters enabled
      Revert "libiptc: fix wrong maptype of base chain counters on restore"
      tests: shell: Test chain policy counter behaviour
      Use SOCK_CLOEXEC/O_CLOEXEC where available
      nft: Pass nft_handle to add_{target,action}()
      nft: Introduce and use bool nft_handle::compat
      Add --compat option to *tables-nft and *-nft-restore commands
      tests: Test compat mode
      Revert --compat option related commits
      tests: shell: Fix for ineffective 0007-mid-restore-flush_0
      nft: Fix for useless meta expressions in rule
      include: linux: Update kernel.h
      build: Bump dependency on libnftnl
      extensions: Fix checking of conntrack --ctproto 0
      doc: fix example of xt_cpu
      xt_sctp: add the missing chunk types in sctp_help

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:37:04 +00:00
Peter Müller
342e5b6629 Core Update 183: Ship lcms2
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:33:53 +00:00
Adolf Belka
d5f617d057 lcms2: Update to version 2.16
- Update from version 2.14 to 2.16
- Update of rootfile
- Changelog
    2.16 Featured release
	New import .CUBE files as RGB devicelinks
	New Read/Write MHC2 tags for Windows GPU access
	New Support for UTF8 on multilocalized unicode functions
	New Suppot for OkLab color space, built-in and formatter.
	Improved floating point transforms float -> integer are now honored as float
	Improved MSYS2, mingw is now supported
	Improved proferred CMM, platform and creator now survives profile edition.
	Fixed tificc now can deal with Lab TIFF
	Fixed code can now be compiled by a C++17 compiler, "register" keywork use detected at compile time.
	Fixed Reverted postcript creation that corrupted some interpreters.
    2.15 Maintenance release
	New MESON build system, many thanks to amispark and Lovell Fuller for bringing this.
	Fixed a bug that caused memory corruption on colord
	cmsReadRawTag can read portions  of tags again. Removing this caused colord to segfault when dumping profiles
	Added more checks based of fuzzer discoveries.
	MSYS2 can now compile lcms2
	Checked on Apple Silicon M1 and M2
	Fixed a bug of fastfloat plug-in that affected Krita CMYK color selector

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 07:33:44 +00:00
Peter Müller
4488435573 Core Update 183: Ship libnl-3
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:31:11 +00:00
Adolf Belka
7ca5fc5eb0 libnl-3: Update to version 3.9.0
- Update from version 3.8.0 to 3.9.0
- Update of rootfile not required
- Changelog is not produced. Changes can be seen from the commits in the github repo
   https://github.com/thom311/libnl/commits/main

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 07:31:01 +00:00
Peter Müller
2a90a6782d Core Update 183: Ship lmdb
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:30:38 +00:00
Adolf Belka
cc6762db84 lmdb: Update to version 0.9.31
- Update from version 0.9.30 to 0.9.31
- Update of rootfile not required
- Changelog
    0.9.31 Release (2023/07/10)
	ITS#8447 - Fix cursor_put(MDB_CURRENT) on DUPSORT DB with different sized data

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 07:30:29 +00:00
Peter Müller
6506b9f807 Core Update 183: Ship lsof
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:30:05 +00:00
Adolf Belka
6220917d87 lsof: Update to version 4.99.3
- Update from version 4.98.0 to 4.99.3
- Update of rootfile not required
- Changelog
    4.99.3
	Fix a spaces vs. tabs issue in 00DIST.
    4.99.2
	Fix version file for CI
    4.99.1
        Fix compilation error when HASIPv6 is not defined. (@chenrui333)
        Add configure option --disable-liblsof to disable installation
         of liblsof. (@subnut, #300)
        [freebsd] fix segfault from fs info (FreeBSD bug 267760)
    4.99.0
	[netbsd] Get device numer of tmpfs instead of reporting zero
	[openbsd] Rewrite OpenBSD support because OpenBSD disallows
	 kernel memory access and lsof has to switch to user mode API.
	 Currently, most features are working, but file path reporting
	 and lock status are not working for lack of kernel support.
	 As a consequence, OpenBSD dialect is separated in a new folder.
	[darwin] Remove /dev/kmem backend because it no longer exists on
	 current macOS releases. Use libproc backend instead.
	[linux] Do not hard-code fd numbers in epoll test, fixing tests
	 on Void Linux
	[freebsd] Use kf_file_nlink if provided by kernel instead of
	 stat(). This commit requires kernel with
	 https://reviews.freebsd.org/D38169. It brings back the ability
	 to list deleted files via `lsof +L1`. Closes #264.
	[linux] Add --with-selinux configure option.
	[solaris] Re-introduce support for recent Solaris & OpenIndiana
	 releases.
	[darwin] Display kern ctl info, learned from apple lsof version.
	[linux] Improve performance by using closefrom(). Closes #281.
	[aix] Fix compilation on AIX 7.2 and add autotools build system
	 support for AIX.
	[aix] Suppress warnings properly on AIX version greater than
	 5.0. Closes #187.
	Introduce alpha version of liblsof which allows users to use
	 lsof functionality via C functions instead of spawning a
	 subprocess and parsing the output. This version may contain BUGs
	 and memory leaks, and the API may change before it stablizes.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 07:29:51 +00:00
Peter Müller
09e6a4fa16 Core Update 183: Ship p11-kit
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:26:18 +00:00
Adolf Belka
fefd0cb849 p11-kit: Update to version 0.25.3
- Update from version 0.25.2 to 0.25.3
- Update of rootfile
- Changelog
    0.25.3
	rpc: fix serialization of NULL mechanism pointer [PR#601]
	fix meson build failure in macOS (appleframeworks not found) [PR#603]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 07:25:59 +00:00
Adolf Belka
17cad1e885 samba: Update to version 4.19.3
- Update from version 4.19.2 to 4.19.3
- Update of rootfile not required
- I don't believe that the CVE from this version will affect IPFire users as Samba on
   IPFire is not run as an Active Directory Domain Controller. That functionality was
   removed some time ago.
- Changelog
    4.19.3
	This is the latest stable release of the Samba 4.19 release series.
	It contains the security-relevant bugfix CVE-2018-14628:
	    Wrong ntSecurityDescriptor values for "CN=Deleted Objects"
	    allow read of object tombstones over LDAP
	    (Administrator action required!)
	    https://www.samba.org/samba/security/CVE-2018-14628.html
	Description of CVE-2018-14628
		All versions of Samba from 4.0.0 onwards are vulnerable to an
		 information leak (compared with the established behaviour of
		 Microsoft's Active Directory) when Samba is an Active Directory Domain
		 Controller.
		When a domain was provisioned with an unpatched Samba version,
		 the ntSecurityDescriptor is simply inherited from Domain/Partition-HEAD-Object
		 instead of being very strict (as on a Windows provisioned domain).
		This means also non privileged users can use the
		 LDAP_SERVER_SHOW_DELETED_OID control in order to view,
		 the names and preserved attributes of deleted objects.
		No information that was hidden before the deletion is visible, but in
		 with the correct ntSecurityDescriptor value in place the whole object
		 is also not visible without administrative rights.
		There is no further vulnerability associated with this error, merely an
		 information disclosure.
	Action required in order to resolve CVE-2018-14628!
		The patched Samba does NOT protect existing domains!
		The administrator needs to run the following command
		 (on only one domain controller)
		 in order to apply the protection to an existing domain:
		  samba-tool dbcheck --cross-ncs --attrs=nTSecurityDescriptor --fix
		The above requires manual interaction in order to review the
		 changes before they are applied. Typicall question look like this:
		  Reset nTSecurityDescriptor on CN=Deleted Objects,DC=samba,DC=org back to provision default?
		        Owner mismatch: SY (in ref) DA(in current)
		        Group mismatch: SY (in ref) DA(in current)
		        Part dacl is different between reference and current here is the detail:
		                (A;;LCRPLORC;;;AU) ACE is not present in the reference
		                (A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY) ACE is not present in the reference
		                (A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;DA) ACE is not present in the reference
		                (A;;CCDCLCSWRPWPSDRCWDWO;;;SY) ACE is not present in the current
		                (A;;LCRP;;;BA) ACE is not present in the current
		   [y/N/all/none] y
		  Fixed attribute 'nTSecurityDescriptor' of 'CN=Deleted Objects,DC=samba,DC=org'
		The change should be confirmed with 'y' for all objects starting with
		 'CN=Deleted Objects'.
Changes since 4.19.2
   * BUG 15520: sid_strings test broken by unix epoch > 1700000000.
   * BUG 15487: smbd crashes if asked to return full information on close of a
     stream handle with delete on close disposition set.
   * BUG 15521: smbd: fix close order of base_fsp and stream_fsp in
     smb_fname_fsp_destructor().
   * BUG 15499: Improve logging for failover scenarios.
   * BUG 15093: Files without "read attributes" NFS4 ACL permission are not
     listed in directories.
   * BUG 13595: CVE-2018-14628 [SECURITY] Deleted Object tombstones visible in
     AD LDAP to normal users.
   * BUG 15492: Kerberos TGS-REQ with User2User does not work for normal
     accounts.
   * BUG 15507: vfs_gpfs stat calls fail due to file system permissions.
   * BUG 15513: Samba doesn't build with Python 3.12

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 07:25:05 +00:00
Peter Müller
acdb9df089 Core Update 183: Ship sudo
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:24:18 +00:00
Adolf Belka
68fe599aed sudo: Update to version 1.9.15p4
- Update from version 1.9.15p2 to 1.9.15p4
- Update of rootfile not required
- Changelog
    1.9.15p4
	 * Fixed a bug introduced in sudo 1.9.15 that could prevent a user's
	   privileges from being listed by "sudo -l" if the sudoers entry
	   in /etc/nsswitch.conf contains "[SUCCESS=return]".  This did not
	   affect the ability to run commands via sudo.  Bug #1063.
    1.9.15p3
	 * Always disable core dumps when sudo sends itself a fatal signal.
	   Fixes a problem where sudo could potentially dump core dump when
	   it re-sends the fatal signal to itself.  This is only an issue
	   if the command received a signal that would normally result in
	   a core dump but the command did not actually dump core.
	 * Fixed a bug matching a command with a relative path name when
	   the sudoers rule uses shell globbing rules for the path name.
	   Bug #1062.
	 * Permit visudo to be run even if the local host name is not set.
	   GitHub issue #332.
	 * Fixed an editing error introduced in sudo 1.9.15 that could
	   prevent sudoreplay from replaying sessions correctly.
	   GitHub issue #334.
	 * Fixed a bug introduced in sudo 1.9.15 where "sudo -l > /dev/null"
	   could hang on Linux systems.  GitHub issue #335.
	 * Fixed a bug introduced in sudo 1.9.15 where Solaris privileges
	   specified in sudoers were not applied to the command being run.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:23:56 +00:00
Peter Müller
ac225ec698 firewalllog.dat: Update copyright header
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:05:49 +00:00
Peter Müller
d1f75149cf Core Update 183: Ship firewalllog.dat
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:04:50 +00:00
Adolf Belka
f02adfbc74 firewalllog.dat: Fix for bug#13492 - include chain in the exported output
- The regex code does not extract out the chain and so it is missed off from the log output
   when it is exported.
- Changed code tested out on my vm testbed and confirmed to work and include the chain in
   the output.

Fixes: Bug13492
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfre.org>
2023-12-30 07:04:02 +00:00
Peter Müller
6ac85c116e Core Update 183: Ship bind
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:03:39 +00:00
Matthias Fischer
2ecefae295 bind: Update to 9.16.45
For details see:
https://downloads.isc.org/isc/bind9/9.16.45/doc/arm/html/notes.html#notes-for-bind-9-16-45

"Feature Changes

    The IP addresses for B.ROOT-SERVERS.NET have been updated to
    170.247.170.2 and 2801:1b8:10::b. [GL #4101]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-12-30 06:57:50 +00:00
Peter Müller
1bbf603475 Core Update 183: Ship and restart OpenSSH
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 06:57:03 +00:00
Adolf Belka
ec4c98baa2 openssh: Update to version 9.6p1
- Update from version 9.5p1 to 9.6p1
- Update of rootfile not required
- Changelog is too large to include here. See details in the file ChangeLog in the
   source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 06:56:01 +00:00
Peter Müller
6c4ecf6b0f Core Update 183: Ship OpenSSL
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 06:53:53 +00:00
Adolf Belka
c0dd2fd124 openssl: Update to version 3.2.0
- Update from version 3.1.4 to 3.2.0
- Update of rootfile
- Changelog
    3.2.0
	This release incorporates the following potentially significant or incompatible
	changes:
	  * The default SSL/TLS security level has been changed from 1 to 2.
	  * The `x509`, `ca`, and `req` apps now always produce X.509v3 certificates.
	  * Subject or issuer names in X.509 objects are now displayed as UTF-8 strings
	    by default.
	  From my understanding these above changes should not create any problem for
	   IPFire.
	This release adds the following new features:
	  * Support for client side QUIC, including support for
	    multiple streams (RFC 9000)
	  * Support for Ed25519ctx, Ed25519ph and Ed448ph in addition
	    to existing support for Ed25519 and Ed448 (RFC 8032)
	  * Support for deterministic ECDSA signatures (RFC 6979)
	  * Support for AES-GCM-SIV, a nonce-misuse-resistant AEAD (RFC 8452)
	  * Support for the Argon2 KDF, along with supporting thread pool
	    functionality (RFC 9106)
	  * Support for Hybrid Public Key Encryption (HPKE) (RFC 9180)
	  * Support for SM4-XTS
	  * Support for Brainpool curves in TLS 1.3
	  * Support for TLS Raw Public Keys (RFC 7250)
	  * Support for TCP Fast Open on Linux, macOS and FreeBSD,
	    where enabled and supported (RFC 7413)
	  * Support for TLS certificate compression, including library
	    support for zlib, Brotli and zstd (RFC 8879)
	  * Support for provider-based pluggable signature algorithms
	    in TLS 1.3 with supporting CMS and X.509 functionality
	    With a suitable provider this enables the use of post-quantum/quantum-safe
	    cryptography.
	  * Support for using the Windows system certificate store as a source of
	    trusted root certificates
	    This is not yet enabled by default and must be activated using an
	    environment variable. This is likely to become enabled by default
	    in a future feature release.
	  * Support for using the IANA standard names in TLS ciphersuite configuration
	  * Multiple new features and improvements to CMP protocol support
	The following known issues are present in this release and will be rectified
	in a future release:
	  * Provider-based signature algorithms cannot be configured using the
	    SignatureAlgorithms configuration file parameter (#22761)
	This release incorporates the following documentation enhancements:
	  * Added multiple tutorials on the OpenSSL library and in particular
	    on writing various clients (using TLS and QUIC protocols) with libssl

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 06:53:26 +00:00
Peter Müller
b0478069c4 Core Update 183: Ship qpdf
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 06:50:22 +00:00
Adolf Belka
93137ccb86 qpdf: Update to version 11.7.0
- Update from version 11.6.1 to 11.7.0
- Update of rootfile
- Changelog
    11.7.0
	* Define CPACK_NSIS_MODIFY_PATH for the Windows builds so the
	official installers will offer to modify PATH when installing
	qpdf. Fixes #1054.
	* Add QPDFAcroFormDocumentHelper::disableDigitalSignatures, which
	disables any digital signature fields, leaving their visual
	representations intact. The --remove-restrictions command-line
	argument now calls this. Fixes #1015.
	* Generate a more complete qpdf "man page" from the same source as
	qpdf --help. Fixes #1064.
	* Allow the syntax "--encrypt --user-password=user-password
	--owner-password=owner-password --bits={40,128,256}" when
	encrypting PDF files. This is an alternative to the syntax
	"--encrypt user-password owner-password {40,128,256}", which will
	continue to be supported. The new syntax works better with shell
	completion and allows creation of passwords that start with "-".
	Fixes #874.
	* When setting a check box value, allow any value other than /Off
	to mean checked. This is permitted by the spec. Previously, any
	value other than /Yes or /Off was rejected. Fixes #1056.
	* Fix to QPDF JSON: a floating point number that appears in
	scientific notation will be converted to fixed-point notation,
	rounded to six digits after the decimal point. Fixes #1079.
	* Fix to QPDF JSON: the syntax "n:/pdf-syntax" is now accepted as
	an alternative way to represent names. This can be used for any
	name (e.g. "n:/text#2fplain"), but it is necessary when the name
	contains binary characters. For example, /one#a0two must be
	represented as "n:/one#a0two" since the single byte a0 is not
	valid in JSON. Fixes #1072.
	* From M. Holger: Refactor QPDFParser for performance. See #1059
	for a discussion.
	* Update code and tests so that qpdf's test suite no longer
	depends on the output of any specific zlib implementation. This
	makes it possible to get a fully passing test suite with any
	API-compatible zlib library. CI tests with the default zlib as
	well as zlib-ng (including verifying that zlib-ng is not the
	default), but any zlib implementation should work. Fixes #774.
	* Bug fix: with --compress-streams=n, don't compress object, XRef,
	or linearization hint streams.
	* Add new C++ functions "qpdf_c_get_qpdf" and "qpdf_c_wrap" to
	qpdf-c.h that make it possible to write your own extern "C"
	functions in C++ that interoperate with the C API. See
	examples/extend-c-api for more information.
	* Bug fix from M. Holger: the default for /Columns in PNG filter
	is 1, but libqpdf was acting like it was 0.
	* Enhancement from M. Holger: add methods to Buffer to work more
	easily with std::string.
    11.6.4
	* Install fix: include cmake files with the dev component.
	* Build AppImage with an older Linux distribution to support AWS
	Lambda. Fixes #1086.
    11.6.3
        * Tweak linearization code to better handle files between 2 GB and
        4 GB in size. Fixes #1023.
        * Fix data loss bug: qpdf could discard a the character after an
        escaped octal string consisting of less than three digits. For
        content, this would only happen with QDF or when normalizing
        content. Outside of content, it could have happened in any binary
        string, such as /ID, if the encoding software used octal escape
        strings with less than three digits. This bug was introduced
        between 10.6.3 and 11.0.0. Fixes #1050.
    11.6.2
        * Bug fix: when piping stream data, don't call finish on failure
        if the failure was caused by a previous call to finish. Fixes
        #1042.
        * Push .idea directory with the beginning of a sharable JetBrains
        CLion configuration.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 06:50:03 +00:00
Adolf Belka
e49c0a4297 git: Update to version 2.43.0
- Update from version 2.42.1 to 2.43.0
- Update of rootfile not required
- Changelog
    2.43.0
      Backward Compatibility Notes
	 * The "--rfc" option of "git format-patch" used to be a valid way to
	   override an earlier "--subject-prefix=<something>" on the command
	   line and replace it with "[RFC PATCH]", but from this release, it
	   merely prefixes the string "RFC " in front of the given subject
	   prefix.  If you are negatively affected by this change, please use
	   "--subject-prefix=PATCH --rfc" as a replacement.
	 * In Git 2.42, "git rev-list --stdin" learned to take non-revisions
	   (like "--not") from the standard input, but the way such a "--not" was
	   handled was quite confusing, which has been rethought.  The updated
	   rule is that "--not" given from the command line only affects revs
	   given from the command line that comes but not revs read from the
	   standard input, and "--not" read from the standard input affects
	   revs given from the standard input and not revs given from the
	   command line.
      UI, Workflows & Features
	 * A message written in olden time prevented a branch from getting
	   checked out, saying it is already checked out elsewhere. But these
	   days, we treat a branch that is being bisected or rebased just like
	   a branch that is checked out and protect it from getting modified
	   with the same codepath.  The message has been rephrased to say that
	   the branch is "in use" to avoid confusion.
	 * Hourly and other schedules of "git maintenance" jobs are randomly
	   distributed now.
	 * "git cmd -h" learned to signal which options can be negated by
	   listing such options like "--[no-]opt".
	 * The way authentication related data other than passwords (e.g.,
	   oauth token and password expiration data) are stored in libsecret
	   keyrings has been rethought.
	 * Update the libsecret and wincred credential helpers to correctly
	   match which credential to erase; they erased the wrong entry in
	   some cases.
      Git GUI updates.
	 * "git format-patch" learned a new "--description-file" option that
	   lets cover letter description to be fed; this can be used on
	   detached HEAD where there is no branch description available, and
	   also can override the branch description if there is one.
	 * Use of the "--max-pack-size" option to allow multiple packfiles to
	   be created is now supported even when we are sending unreachable
	   objects to cruft packs.
	 * "git format-patch --rfc --subject-prefix=<foo>" used to ignore the
	   "--subject-prefix" option and used "[RFC PATCH]"; now we will add
	   "RFC" prefix to whatever subject prefix is specified.
	 * "git log --format" has been taught the %(decorate) placeholder for
	   further customization over what the "--decorate" option offers.
	 * The default log message created by "git revert", when reverting a
	   commit that records a revert, has been tweaked, to encourage people
	   to describe complex "revert of revert of revert" situations better in
	   their own words.
	 * The command-line completion support (in contrib/) learned to
	   complete "git commit --trailer=" for possible trailer keys.
	 * "git update-index" learned the "--show-index-version" option to
	   inspect the index format version used by the on-disk index file.
	 * "git diff" learned the "diff.statNameWidth" configuration variable,
	   to give the default width for the name part in the "--stat" output.
	 * "git range-diff --notes=foo" compared "log --notes=foo --notes" of
	   the two ranges, instead of using just the specified notes tree,
	   which has been corrected to use only the specified notes tree.
	 * The command line completion script (in contrib/) can be told to
	   complete aliases by including ": git <cmd> ;" in the alias to tell
	   it that the alias should be completed in a similar way to how "git
	   <cmd>" is completed.  The parsing code for the alias has been
	   loosened to allow ';' without an extra space before it.
	 * "git for-each-ref" and friends learned to apply mailmap to
	   authorname and other fields in a more flexible way than using
	   separate placeholder letters like %a[eElL] every time we want to
	   come up with small variants.
	 * "git repack" machinery learned to pay attention to the "--filter="
	   option.
	 * "git repack" learned the "--max-cruft-size" option to prevent cruft
	   packs from growing without bounds.
	 * "git merge-tree" learned to take strategy backend specific options
	   via the "-X" option, like "git merge" does.
	 * "git log" and friends learned the "--dd" option that is a
	   short-hand for "--diff-merges=first-parent -p".
	 * The attribute subsystem learned to honor the "attr.tree"
	   configuration variable that specifies which tree to read the
	   .gitattributes files from.
	 * "git merge-file" learns a mode to read three variants of the
	   contents to be merged from blob objects.
      Performance, Internal Implementation, Development Support etc.
	 * "git check-attr" has been taught to work better with sparse-index.
	 * It may be tempting to leave the help text NULL for a command line
	   option that is either hidden or too obvious, but "git subcmd -h"
	   and "git subcmd --help-all" would have segfaulted if done so.  Now
	   the help text is truly optional.
	 * Tests that are known to pass with LSan are now marked as such.
	 * Flaky "git p4" tests, as well as "git svn" tests, are now skipped
	   in the (rather expensive) sanitizer CI job.
	 * Tests with LSan from time to time seem to emit harmless messages
	   that make our tests unnecessarily flaky; we work around it by
	   filtering the uninteresting output.
	 * Unused parameters to functions are marked as such, and/or removed,
	   in order to bring us closer to "-Wunused-parameter" clean.
	 * The code to keep track of existing packs in the repository while
	   repacking has been refactored.
	 * The "streaming" interface used for bulk-checkin codepath has been
	   narrowed to take only blob objects for now, with no real loss of
	   functionality.
	 * GitHub CI workflow has learned to trigger Coverity check.
	 * Test coverage for trailers has been improved.
	 * The code to iterate over loose references has been optimized to
	   reduce the number of lstat() system calls.
	 * The codepaths that read "chunk" formatted files have been corrected
	   to pay attention to the chunk size and notice broken files.
	 * Replace macos-12 used at GitHub CI with macos-13.
	   (merge 682a868f67 js/ci-use-macos-13 later to maint).

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 06:49:41 +00:00
Peter Müller
ca7bd37aee Core Update 183: Ship tzdata
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 06:44:07 +00:00
Adolf Belka
109e5217a6 tzdata: Update to version 2023d
- Update from version 2023c to 2023d
- Update of rootfile not required
- Changelog
    2023d
	  Briefly:
	    Ittoqqortoormiit, Greenland changes time zones on 2024-03-31.
	    Vostok, Antarctica changed time zones on 2023-12-18.
	    Casey, Antarctica changed time zones five times since 2020.
	    Code and data fixes for Palestine timestamps starting in 2072.
	    A new data file zonenow.tab for timestamps starting now.
	  Changes to future timestamps
	    Ittoqqortoormiit, Greenland (America/Scoresbysund) joins most of
	     the rest of Greenland's timekeeping practice on 2024-03-31, by
	     changing its time zone from -01/+00 to -02/-01 at the same moment
	     as the spring-forward transition.  Its clocks will therefore not
	     spring forward as previously scheduled.  The time zone change
	     reverts to its common practice before 1981.
	    Fix predictions for DST transitions in Palestine in 2072-2075,
	     correcting a typo introduced in 2023a.
	  Changes to past and future timestamps
	    Vostok, Antarctica changed to +05 on 2023-12-18.  It had been at
	     +07 (not +06) for years.  (Thanks to Zakhary V. Akulov.)
	    Change data for Casey, Antarctica to agree with timeanddate.com,
	     by adding five time zone changes since 2020.  Casey is now at +08
	     instead of +11.
	  Changes to past tm_isdst flags
	    Much of Greenland, represented by America/Nuuk, changed its
	     standard time from -03 to -02 on 2023-03-25, not on 2023-10-28.
	     This does not affect UTC offsets, only the tm_isdst flag.
	     (Thanks to Thomas M. Steenholdt.)
	  New data file
	    A new data file zonenow.tab helps configure applications that use
	     timestamps dated from now on.  This simplifies configuration,
	     since users choose from a smaller Zone set.  The file's format is
	     experimental and subject to change.
	  Changes to code
	    localtime.c no longer mishandles TZif files that contain a single
	     transition into a DST regime.  Previously, it incorrectly assumed
	     DST was in effect before the transition too.  (Thanks to Alois
	     Treindl for debugging help.)
	    localtime.c's timeoff no longer collides with OpenBSD 7.4.
	    The C code now uses _Generic only if __STDC_VERSION__ says the
	     compiler is C11 or later.
	    tzselect now optionally reads zonenow.tab, to simplify when
	     configuring only for timestamps dated from now on.
	    tzselect no longer creates temporary files.
	    tzselect no longer mishandles the following:
	      Spaces and most other special characters in BUGEMAIL, PACKAGE,
	       TZDIR, and VERSION.
	      TZ strings when using mawk 1.4.3, which mishandles regular
	       expressions of the form /X{2,}/.
	      ISO 6709 coordinates when using an awk that lacks the GNU
	       extension of newlines in -v option-arguments.
	      Non UTF-8 locales when using an iconv command that lacks the GNU
	       //TRANSLIT extension.
	    zic no longer mishandles data for Palestine after the year 2075.
	     Previously, it incorrectly omitted post-2075 transitions that are
	     predicted for just before and just after Ramadan.  (Thanks to Ken
	     Murchison for debugging help.)
	    zic now works again on Linux 2.6.16 and 2.6.17 (2006).
	     (Problem reported by Rune Torgersen.)
	  Changes to build procedure
	    The Makefile is now more compatible with POSIX:
	     * It no longer defines AR, CC, CFLAGS, LDFLAGS, and SHELL.
	     * It no longer uses its own 'cc' in place of CC.
	     * It now uses ARFLAGS, with default specified by POSIX.
	     * It does not use LFLAGS incompatibly with POSIX.
	     * It uses the special .POSIX target.
	     * It quotes special characters more carefully.
	     * It no longer mishandles builds in an ISO 8859 locale.
	    Due to the CC changes, TZDIR is now #defined in a file tzfile.h
	     built by 'make', not in a $(CC) -D option.  Also, TZDEFAULT is
	     now treated like TZDIR as they have similar roles.
	  Changes to commentary
	     Limitations and hazards of the optional support for obsolescent
	      C89 platforms are documented better, along with a tentative
	      schedule for removing this support.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 06:43:39 +00:00
Arne Fitzenreiter
591ba49c03 Merge remote-tracking branch 'origin/master' into next 2023-12-22 10:41:54 +00:00
Arne Fitzenreiter
7270984c46 update-contributors
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-22 10:30:45 +00:00
Arne Fitzenreiter
aa892602dd core182: ship index.cgi
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-22 10:20:27 +00:00
Sebastien GISLAIN
0a60842a28 index.cgi: correct gpl-accepted in gpl_accepted
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-22 10:19:44 +00:00
Arne Fitzenreiter
bf92e55968 kernel: update to 6.6.8
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-21 13:50:59 +01:00
Arne Fitzenreiter
92d969d8ad Merge remote-tracking branch 'origin/master' into next 2023-12-21 09:53:50 +01:00
Arne Fitzenreiter
26c98d0904 core182: remove old udev binary and rules
they are the reason for boot fails with scsi controllers in core 181.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-21 09:51:47 +01:00
Arne Fitzenreiter
7e35b9b9bb core182: add more files from stage2 that are updated
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-21 09:51:05 +01:00
Michael Tremer
1604674b51 Merge branch 'master' into next 2023-12-20 10:58:13 +00:00
Matthias Fischer
cdbaf83bb6 squid: Update to 6.6
For details see:
https://github.com/squid-cache/squid/commits/v6

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-12-20 10:57:14 +00:00
Arne Fitzenreiter
276fe09afc core182: ship libgcc_s.so.1
we have not shipped the gcc lib since core119

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-20 09:48:26 +01:00
Arne Fitzenreiter
73b04029c9 dracut: fix early_microcode put into ramdisk
the kernel has no CONFIG_MICROCODE_{AMD|INTEL} anymore so this patch change the check
to CONFIG_MICROCODE.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-20 08:44:10 +01:00
Arne Fitzenreiter
0348f6b23f Merge remote-tracking branch 'origin/master' into next 2023-12-19 17:55:21 +01:00
Arne Fitzenreiter
d3b2b04672 alsa: bump package version
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-19 11:45:26 +01:00
Arne Fitzenreiter
6c85ffbfd4 alsa: remove kernel module unload at uninstall
this sometimes result in unstable/crashing kernel.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-19 11:44:03 +01:00
Arne Fitzenreiter
cb58d049e0 alsa: don't report failed module loads
this will stop pakfire if the kernel was updated before the alsa update.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-19 11:35:53 +01:00
Arne Fitzenreiter
0108697131 kernel: update to 6.6.6
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-12 21:12:37 +01:00
Arne Fitzenreiter
5109f8ee7f kernel: update to 6.6.5
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-08 16:12:17 +01:00