Commit Graph

14669 Commits

Author SHA1 Message Date
Matthias Fischer
442717a127 nano: Update to 4.9.3
For details see:
https://www.nano-editor.org/news.php

"One more bug introduced in version 4.9 is fixed: a crash when
the terminal screen is resized while at a lock-file prompt."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-26 11:11:51 +00:00
Michael Tremer
91b23ce05b squidGuard: Fix generating databases with libdb >= 5
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-22 12:47:32 +00:00
Michael Tremer
7479c99349 ids-functions.pl: Quote array of subnets
Reported-by: Daniel Weismüller <daniel.weismueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-20 12:39:17 +00:00
Arne Fitzenreiter
76a1dedb4f move perl-DBI and perl-DBD-SQLite to core system
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-20 09:47:25 +00:00
Arne Fitzenreiter
b2896abb64 update credits.cgi
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-20 09:15:36 +00:00
Arne Fitzenreiter
1d3698fc00 core145: add bind
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-19 19:45:29 +00:00
Matthias Fischer
c7e79ba602 bind: Update to 9.11.19
For details see:
https://downloads.isc.org/isc/bind9/9.11.19/RELEASE-NOTES-bind-9.11.19.html

"Security Fixes

    To prevent exhaustion of server resources by a maliciously
    configured domain, the number of recursive queries that can be
    triggered by a request before aborting recursion has been further
    limited. Root and top-level domain servers are no longer exempt from
    the max-recursion-queries limit. Fetches for missing name server
    address records are limited to 4 for any domain. This issue was
    disclosed in CVE-2020-8616. [GL #1388]

    Replaying a TSIG BADTIME response as a request could trigger
    an assertion failure. This was disclosed in CVE-2020-8617. [GL
    #1703]

Feature Changes

    Message IDs in inbound AXFR transfers are now checked for
    consistency. Log messages are emitted for streams with inconsistent
    message IDs. [GL #1674]

Bug Fixes

    When running on a system with support for Linux capabilities, named
    drops root privileges very soon after system startup. This was
    causing a spurious log message, "unable to set effective uid to 0:
    Operation not permitted", which has now been silenced. [GL #1042]
    [GL #1090]

    When named-checkconf -z was run, it would sometimes incorrectly set
    its exit code. It reflected the status of the last view found;
    if zone-loading errors were found in earlier configured views but
    not in the last one, the exit code indicated success. Thanks
    to Graham Clinch. [GL #1807]

    When built without LMDB support, named failed to restart after
    a zone with a double quote (") in its name was added with rndc
    addzone. Thanks to Alberto Fernández. [GL #1695]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-19 19:45:02 +00:00
Arne Fitzenreiter
35d361d72e core145: stop/start suricata and squid
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-19 19:43:39 +00:00
Arne Fitzenreiter
1eba21f2a8 core145: restart squid
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-19 19:41:22 +00:00
Arne Fitzenreiter
996b64e513 core145: add unbound
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-19 19:39:30 +00:00
Matthias Fischer
82d0a71743 unbound: Update to 1.10.1
For details see:
https://lists.nlnetlabs.nl/pipermail/unbound-users/2020-May/006833.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-19 19:36:13 +00:00
Peter Müller
2bd5209d49 Tor: update to 0.4.3.5
Please refer to https://blog.torproject.org/node/1872 for release notes.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-19 19:36:02 +00:00
Arne Fitzenreiter
714ef1cf95 core145: add knot
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-18 20:21:21 +00:00
Matthias Fischer
d73e1c75c8 knot: Update to 2.9.4
For details see:
https://www.knot-dns.cz/2020-05-05-version-294.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-18 20:20:06 +00:00
Arne Fitzenreiter
177f79b692 core145: add ids-functions.pl
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-18 20:19:16 +00:00
Stefan Schantl
adb320bc4a ids-functions.pl: Fix generating of HOME_NET declaration
Fixes #12407.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-18 20:09:07 +00:00
Michael Tremer
5011657a7b de: Fix typo in "received"
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-18 20:08:49 +00:00
Stéphane Pautrel
1a2cc05fef fr: Add missing strings
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-18 20:08:33 +00:00
Michael Tremer
ba137dd898 make.sh: Add command to find dependencies
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 08:04:47 +00:00
Matthias Fischer
cb9fd5923b clamav: Update to 0.102.3
For details see:
https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html

"ClamAV 0.102.3 is a bug patch release to address the following issues.

- CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing module
in ClamAV 0.102.2 that could cause a Denial-of-Service (DoS) condition.
Improper bounds checking of an unsigned variable results in an
out-of-bounds read which causes a crash.

- CVE-2020-3341: Fix a vulnerability in the PDF parsing module in ClamAV
0.101 - 0.102.2 that could cause a Denial-of-Service (DoS) condition.
Improper size checking of a buffer used to initialize AES decryption
routines results in an out-of-bounds read which may cause a crash. Bug
found by OSS-Fuzz.

- Fix "Attempt to allocate 0 bytes" error when parsing some PDF
documents.

- Fix a couple of minor memory leaks.

- Updated libclamunrar to UnRAR 5.9.2."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:58:37 +00:00
Arne Fitzenreiter
dde7e22c44 core145: add pci id database
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:57:45 +00:00
Peter Müller
bd0feb32e3 hwdata: update PCI database
PCI IDs: 2020-05-07 03:15:02

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:55:07 +00:00
Erik Kapfer
3f6b25de59 tshark: Update to version 3.2.3
This update includes several bugfixes but also updated protocols.
For a full overview, in here -->
https://www.wireshark.org/docs/relnotes/wireshark-3.2.3.html the
changelog can be found.

Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:54:30 +00:00
Erik Kapfer
8e1149afd4 libseccomp: Update to version 2.4.3
- Add list of authorized release signatures to README.md
- Fix multiplexing issue with s390/s390x shm* syscalls
- Remove the static flag from libseccomp tools compilation
- Add define for __SNR_ppoll
- Update our Travis CI configuration to use Ubuntu 18.04
- Disable live python tests in Travis CI
- Use default python, rather than nightly python, in TravisCI
- Fix potential memory leak identified by clang in the scmp_bpf_sim too

The changelog can be found in here https://github.com/seccomp/libseccomp/blob/master/CHANGELOG .

Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:53:48 +00:00
Michael Tremer
b61a9a2716 shairport-sync: Update to 3.3.6
This patch also fixes the backup.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:53:25 +00:00
Erik Kapfer
4728e44c51 update.sh: Stop|Start OpenVPN for update
Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:53:04 +00:00
Erik Kapfer
3460ff86a2 OpenVPN: Update to version 2.4.9
Beneath several smaller fixes, this version fixes also some OpenSSL problems but also CVE-2020-11810.
The full changelog can be found in here https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24 .

Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:52:52 +00:00
Arne Fitzenreiter
e3226328ea core145: update rng init
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:51:32 +00:00
Michael Tremer
97b1857ba4 random: Initialise the kernel's PRNG earlier
Since more processes depend on good randomness, we need to
make sure that the kernel's PRNG is initialized as early as
possible.

For systems without a HWRNG, we will need to fall back to our
noisy loop and wait until we have enough randomness.

This patch also removes saving and restoring the seed. This
is no longer useful because the kernel's PRNG only takes any
input after it has successfully been seeded from other sources.

Hence adding this seed does not increase its randomness.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:46:32 +00:00
Michael Tremer
65cb935200 random: Launch rngd earlier in the boot process
We should initialise the kernel's PRNG as early as we can.

Starting rngd very early will seed the random number generator
when RDRAND or other hardware random number generators are available.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:45:30 +00:00
Arne Fitzenreiter
80a2765de5 core145: add files linked against new libpng, libdb
also bump cups-filters, ghostscript, minidlna and qemu

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-13 20:44:43 +00:00
Arne Fitzenreiter
bd61ace39b core145: add gnupg, squid and bump cups
they are linked against updated openldap

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-13 18:46:04 +00:00
Arne Fitzenreiter
289a86a320 rootfiles: change MACHINE to xxxMACHINExxx
berkeley has a file that nane contain MACHINE wich should not
replaced by the build architecture.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-10 17:27:28 +00:00
Arne Fitzenreiter
c6744d67f0 mtools: update rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-10 07:36:12 +00:00
Arne Fitzenreiter
22fe6d6f6e berkelay-compat: fix build on aarch64
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 21:11:25 +00:00
Arne Fitzenreiter
d1e20e8ca7 core145: fix firewall rules.pl path
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 19:27:02 +00:00
Arne Fitzenreiter
4c1d6ed23b berkeley: fix typo
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 19:20:02 +00:00
Arne Fitzenreiter
d561f0d83b berkeley: update automake before build
without build fails on aarch64

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 15:21:27 +00:00
Matthias Fischer
ff7fd5e444 nano: Update to 4.9.2
For details see:
https://www.nano-editor.org/news.php

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:29:20 +00:00
Arne Fitzenreiter
098f5bbc07 pcengines-apu-firmware: update to 4.11.0.6
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:29:04 +00:00
Arne Fitzenreiter
63decf77c7 clamav: fix database present check
the mame of main.cvd has changed to main.cld on my system.
Add both types and also ad bytecode.c?d

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:28:51 +00:00
Arne Fitzenreiter
2e00633faf core145: add suricata and libhtp
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:27:50 +00:00
Peter Müller
d6d2019fae Suricata: update to 5.0.3
Release notes (https://suricata-ids.org/2020/04/28/suricata-5-0-3-released/, truncated):

    This is the first release after Suricata joined the Oss-Fuzz program, leading to
    discovery of a number of (potential) security issues. We expect that in the coming
    months we’ll fix more such issues, as the fuzzers increase their coverage and we
    continue to improve the seed corpus.

    Feature #3481: GRE ERSPAN Type 1 Support
    Feature #3613: Teredo port configuration
    Feature #3673: datasets: add ‘dataset-remove’ unix command
    Bug #3240: Dataset hash-size or prealloc invalid value logging
    Bug #3241: Dataset reputation invalid value logging
    Bug #3342: Suricata 5.0 crashes while parsing SMB data
    Bug #3450: signature with sticky buffer with subsequent pcre check in a different buffer loads but will never match
    Bug #3491: Backport 5 BUG_ON(strcasecmp(str, “any”) in DetectAddressParseString
    Bug #3507: rule parsing: memory leaks
    Bug #3526: 5.0.x Kerberos vulnerable to TCP splitting evasion
    Bug #3534: Skip over ERF_TYPE_META records
    Bug #3552: file logging: complete files sometimes marked ‘TRUNCATED’
    Bug #3571: rust: smb compile warnings
    Bug #3573: TCP Fast Open – Bypass of stateless alerts
    Bug #3574: Behavior for tcp fastopen
    Bug #3576: Segfault when facing malformed SNMP rules
    Bug #3577: SIP: Input not parsed when header values contain trailing spaces
    Bug #3580: Faulty signature with two threshold keywords does not generate an error and never match
    Bug #3582: random failures on sip and http-evader suricata-verify tests
    Bug #3585: htp: asan issue
    Bug #3592: Segfault on SMTP TLS
    Bug #3598: rules: memory leaks in pktvar keyword
    Bug #3600: rules: bad address block leads to stack exhaustion
    Bug #3602: rules: crash on ‘internal’-only keywords
    Bug #3604: rules: missing ‘consumption’ of transforms before pkt_data would lead to crash
    Bug #3606: rules: minor memory leak involving pcre_get_substring
    Bug #3609: ssl/tls: ASAN issue in SSLv3ParseHandshakeType
    Bug #3610: defrag: asan issue
    Bug #3612: rules/bsize: memory issue during parsing
    Bug #3614: build-info and configure wrongly display libnss status
    Bug #3644: Invalid memory read on malformed rule with Lua script
    Bug #3646: rules: memory leaks on failed rules
    Bug #3649: CIDR Parsing Issue
    Bug #3651: FTP response buffering against TCP stream
    Bug #3653: Recursion stack-overflow in parsing YAML configuration
    Bug #3660: Multiple DetectEngineReload and bad insertion into linked list lead to buffer overflow
    Bug #3665: FTP: Incorrect ftp_memuse calculation.
    Bug #3667: Signature with an IP range creates one IPOnlyCIDRItem by signe IP address
    Bug #3669: Rules reload with Napatech can hang Suricata UNIX manager process
    Bug #3672: coverity: data directory handling issues
    Bug #3674: Protocol detection evasion by packet splitting
    Optimization #3406: filestore rules are loaded without warning when filestore is not enabled
    Task #3478: libhtp 0.5.33
    Task #3514: SMTP should place restraints on variable length items (e.g., filenames)
    Documentation #3543: doc: add ipv4.hdr and ipv6.hdr
    Bundled libhtp 0.5.33
    Bundled Suricata-Update 1.1.2

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:26:11 +00:00
Peter Müller
257c9b114c libhtp: update to 0.5.33
(Scanty) release notes:

0.5.33 (27 April 2020)
----------------------
- compression bomb protection
- memory handling issue found by Oss-Fuzz
- improve handling of anomalies in traffic

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:26:00 +00:00
Stephan Feddersen
f3a5a90d74 WIO: wiographs.cgi - New position for back image
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:25:32 +00:00
Stephan Feddersen
eebbe98186 WIO: wio-lib.pl - Patch Bug 12284 - IPSec Connected since information was added
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:25:22 +00:00
Stephan Feddersen
953882ff49 WIO: wio.cgi - Patch Bug 12284 - IPSec Connected since information was added
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:25:07 +00:00
Stephan Feddersen
19b568f119 WIO: wio.fr.pl - some typos were correct by Stéphane Pautrel
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:24:56 +00:00
Stephan Feddersen
b6cfb70a08 New WIO PAK_ver
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:24:46 +00:00
Peter Müller
f250bb04e2 Postfix: update to 3.5.1
Please refer to http://www.postfix.org/announcements/postfix-3.5.1.html
for further information.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 12:24:31 +00:00