Commit Graph

7702 Commits

Author SHA1 Message Date
Peter Müller
af791343c7 Core Update 167: Ship sudo
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:15:02 +00:00
Peter Müller
e831404295 Core Update 167: Ship curl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:14:14 +00:00
Adolf Belka
94e8598ff3 ghostscript: Update to version 9.56.1
- Update from 9.55.0 to 9.56.1
- Update of rootfile
- Changelog
   Version 9.56.0 (2022-02-22)
     Highlights in this release include:
	    New PDF Interpreter: This is an entirely new implementation written in C
             (rather than PostScript, as before). For a full discussion of this change
             and reasons for it see: Changes Coming to the PDF Interpreter.
	    In this (9.56.0) release, the new PDF interpreter is now ENABLED by default
             in Ghostscript, but the old PDF interpreter can be used as a fallback by
             specifying -dNEWPDF=false. We've provided this so users that encounter
             issues with the new interpreter can keep working while we iron out those
             issues, the option will not be available in the long term.
	    This also allows us to offer a new executable (gpdf, or gpdfwin??.exe on
             Windows) which is purely for PDF input. For this release, those new binaries
             are not included in the "install" make targets, nor in the Windows installers.
	    Calling Ghostscript via the GS API is now thread safe. The one limitation is
             that the X11 devices for Unix-like systems (x11, x11alpha, x11cmyk, x11cmyk2,
             x11cmyk4, x11cmyk8, x11gray2, x11gray4 and x11mono) cannot be made thread
             safe, due to their interaction with the X11 server, those devices have been
             modified to only allow one instance in an executable.
	    The PSD output device now writes ICC profiles to their output files, for
             improved color fidelity.
	    Our efforts in code hygiene and maintainability continue.
	    The usual round of bug fixes, compatibility changes, and incremental
             improvements.
     Included below are incompatible changes from recent releases (the specific release
      in question is listed in parentheses). We include these, for now, as we are aware
      that not everyone upgrades with every release.
	    (9.55.0) Changes to the device API. This will affect developers and
                      maintainers of Ghostscript devices. Firstly, and most importantly,
                      the way device-specific "procs" are specified has been rewritten
                      to make it (we think!) clearer and less confusing. See The
                      Interface between Ghostscript and Device Drivers and The Great
                      Device Rework Of 2021 for more details.
	    (9.55.0) The command line options -sGraphicsICCProfile=___,
                      -dGraphicsIntent=#, -dGraphicsBlackPt=#, -dGraphicsKPreserve=# have
                      been changed to -sVectorICCProfile=___, -dVectorIntent=#,
                      -dVectorBlackPt=#, -dVectorKPreserve=#.
	    (9.53.0) As of 9.53.0, we have (re-)introduced the patch level to the
                      version number, this helps facilitate a revised policy on handling
                      security-related issues.
	    Note for GSView Users: The patch level addition breaks GSView 5 (it is
             hardcoded to check for versions 704-999. It is possible, but not guaranteed
             that a GSView update might be forthcoming to resolve this.
	    (9.52) -dALLOWPSTRANSPARENCY: The transparency compositor (and related
                    features), whilst we are improving it, remains sensitive to being
                    driven correctly, and incorrect use can have unexpected/undefined
                    results. Hence, as part of improving security, we limited access to
                    these operators, originally using the -dSAFER feature. As we made
                    "SAFER" the default mode, that became unacceptable, hence the new
                    option -dALLOWPSTRANSPARENCY which enables access to the operators.
	    (9.50) There are a couple of subtle incompatibilities between the old and
                    new SAFER implementations. Firstly, as mentioned in the 9.50 release
                    notes, SAFER now leaves standard PostScript functionality unchanged
                    (except for the file access limitations). Secondly, the interaction
                    with save/restore operations has changed. See SAFER.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:13:51 +00:00
Peter Müller
70a5c36be5 Core Update 167: Ship iproute2
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:13:14 +00:00
Peter Müller
51fa79c613 Core Update 167: Ship collectd-/graphs-related changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:05:35 +00:00
Peter Müller
4fb7569811 linux: Update rootfile to reflect kernel hardening changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-05 08:42:00 +00:00
Peter Müller
1218b6a8b7 Core Update 167: Ship ddns
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-05 05:55:21 +00:00
Peter Müller
1b6f3fc548 Core Update 167: Ship smartmontools
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 20:17:14 +00:00
Peter Müller
be94980ab1 Core Update 167: Ship DHCP advoptions related files
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 20:10:23 +00:00
Peter Müller
6c8e6c0b8f Core Update 167: Ship unbound-dhcp-leases-bridge
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 20:08:41 +00:00
Peter Müller
d52a6280ec Revert "dvb-firmwares: Don't ship firmware that comes from linux-firmware"
This reverts commit 7ce3223dd8.

https://wiki.ipfire.org/devel/telco/2022-04-04
2022-04-04 20:06:31 +00:00
Peter Müller
9c3052d09d Revert "alsa: Do not ship compressed firmware again"
This reverts commit f0dc569d79.

https://wiki.ipfire.org/devel/telco/2022-04-04
2022-04-04 20:06:14 +00:00
Peter Müller
e121ee227e Core Update 167: Ship the Linux kernel
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 20:05:36 +00:00
Peter Müller
88a7b2d34b Core Update 167: Ship ca-certificates
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 19:58:25 +00:00
Peter Müller
1433ff8e18 Revert "Core Update 167: Ship qos.cgi"
This reverts commit dcb3c4aaac.

https://lists.ipfire.org/pipermail/development/2022-April/013014.html
2022-04-04 18:10:43 +00:00
Peter Müller
dcb3c4aaac Core Update 167: Ship qos.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 05:36:06 +00:00
Peter Müller
7ab7066f74 Core Update 167: Ship nano
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 05:35:41 +00:00
Peter Müller
c2058ff641 Core Update 167: Ship location-block.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-03 09:58:25 +00:00
Peter Müller
b7098581bd Core Update 167: Ship PCI and USB IDs
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-03 09:58:25 +00:00
Peter Müller
d95b4c94db Drop rfkill
It has been obsoleted by util-linux.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-02 07:42:59 +00:00
Peter Müller
c60f6b3847 Core Update 166: Drop orphaned convert-ovpn script
This script only appeared in conjunction with Core Update 75, released
January 2014. Although it is still being executed while restoring a
backup, it would only be effective if anyone tried to restore a backup
created before C75.

I don't think there is a realistic need to carry this script along any
further. In doubt, it might be better to start from scratch again rather
than trying to restore an 8 year old backup, expecting everything to be
peachy and vanilla with it.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-31 09:50:59 +00:00
Peter Müller
8a4780de64 Revert "linux-firmware: Compress firmware on disk"
This reverts commit 77e3829dc1.

For the time being, shipping this was found to be too difficult, since
we cannot get linux-firmware down to an acceptable size limit.
Compressing the firmware on installations would work, but takes about 4
minutes on an Intel Xenon CPU alone, hence it is an unacceptable
workload to do for IPFire installation running on weaker hardware.

Therefore, we do not proceed with this at the moment.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-31 09:33:53 +00:00
Peter Müller
d8d50f95f9 zlib: Update to 1.2.12
Full changelog, as retrieved from https://www.zlib.net/ChangeLog.txt :

Changes in 1.2.12 (27 Mar 2022)
- Cygwin does not have _wopen(), so do not create gzopen_w() there
- Permit a deflateParams() parameter change as soon as possible
- Limit hash table inserts after switch from stored deflate
- Fix bug when window full in deflate_stored()
- Fix CLEAR_HASH macro to be usable as a single statement
- Avoid a conversion error in gzseek when off_t type too small
- Have Makefile return non-zero error code on test failure
- Avoid some conversion warnings in gzread.c and gzwrite.c
- Update use of errno for newer Windows CE versions
- Small speedup to inflate [psumbera]
- Return an error if the gzputs string length can't fit in an int
- Add address checking in clang to -w option of configure
- Don't compute check value for raw inflate if asked to validate
- Handle case where inflateSync used when header never processed
- Avoid the use of ptrdiff_t
- Avoid an undefined behavior of memcpy() in gzappend()
- Avoid undefined behaviors of memcpy() in gz*printf()
- Avoid an undefined behavior of memcpy() in _tr_stored_block()
- Make the names in functions declarations identical to definitions
- Remove old assembler code in which bugs have manifested
- Fix deflateEnd() to not report an error at start of raw deflate
- Add legal disclaimer to README
- Emphasize the need to continue decompressing gzip members
- Correct the initialization requirements for deflateInit2()
- Fix a bug that can crash deflate on some input when using Z_FIXED
- Assure that the number of bits for deflatePrime() is valid
- Use a structure to make globals in enough.c evident
- Use a macro for the printf format of big_t in enough.c
- Clean up code style in enough.c, update version
- Use inline function instead of macro for index in enough.c
- Clarify that prefix codes are counted in enough.c
- Show all the codes for the maximum tables size in enough.c
- Add gznorm.c example, which normalizes gzip files
- Fix the zran.c example to work on a multiple-member gzip file
- Add tables for crc32_combine(), to speed it up by a factor of 200
- Add crc32_combine_gen() and crc32_combine_op() for fast combines
- Speed up software CRC-32 computation by a factor of 1.5 to 3
- Use atomic test and set, if available, for dynamic CRC tables
- Don't bother computing check value after successful inflateSync()
- Correct comment in crc32.c
- Add use of the ARMv8 crc32 instructions when requested
- Use ARM crc32 instructions if the ARM architecture has them
- Explicitly note that the 32-bit check values are 32 bits
- Avoid adding empty gzip member after gzflush with Z_FINISH
- Fix memory leak on error in gzlog.c
- Fix error in comment on the polynomial representation of a byte
- Clarify gz* function interfaces, referring to parameter names
- Change macro name in inflate.c to avoid collision in VxWorks
- Correct typo in blast.c
- Improve portability of contrib/minizip
- Fix indentation in minizip's zip.c
- Replace black/white with allow/block. (theresa-m)
- minizip warning fix if MAXU32 already defined. (gvollant)
- Fix unztell64() in minizip to work past 4GB. (Daniël Hörchner)
- Clean up minizip to reduce warnings for testing
- Add fallthrough comments for gcc
- Eliminate use of ULL constants
- Separate out address sanitizing from warnings in configure
- Remove destructive aspects of make distclean
- Check for cc masquerading as gcc or clang in configure
- Fix crc32.c to compile local functions only if used

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-31 09:29:38 +00:00
Peter Müller
f1f4250c14 Core Update 167: Ship network-hotplug-bridges udev script
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-31 09:28:42 +00:00
Peter Müller
ca4822a145 Core Update 167: Hardlink any identical firmware files on existing installations as well
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-31 09:27:12 +00:00
Peter Müller
7827c5fb9a Core Update 167: Delete dropped firmware files as well
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-31 09:22:40 +00:00
Peter Müller
1091a629ea Core Update 167: Add new Pakfire key after extracting the files
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-31 09:20:50 +00:00
Michael Tremer
13eaaa5657 core167: Ship util-linux
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 14:01:16 +00:00
Michael Tremer
f5ffdb75ce util-linux: Update to 2.38
This patch also enables building hardlink(8)

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:53 +00:00
Michael Tremer
f43db7d6fa linux-firmware: Don't ship some Qualcomm AI/5G firmware
This is not needed on IPFire and saves about 13 MiB of compressed
firmware.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:53 +00:00
Michael Tremer
19b535b9b6 linux-firmware: Don't ship Mellanox Spectrum Switch Firmware
This is probably not usable on IPFire and saves us about 47 MiB.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:53 +00:00
Michael Tremer
5df7c89924 linux-firmware: Don't ship Marvell Prestera Firmware
This firmware is required for a switch ASIC which we build the kernel
module for, but which is probably not usable with IPFire.

This saves about 40 MiB of compressed firmware space.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:53 +00:00
Michael Tremer
7ce3223dd8 dvb-firmwares: Don't ship firmware that comes from linux-firmware
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:57:07 +00:00
Michael Tremer
f0dc569d79 alsa: Do not ship compressed firmware again
This package installs some firmware files. Since linux-firmware is now
compressed, files will no longer be overwritten, but this package will
put the uncompressed files next to the compressed ones.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:57:07 +00:00
Michael Tremer
31102a28b3 core167: Ship backup includes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:55:36 +00:00
Michael Tremer
12cb09eb5e core167: Increment release version in update.sh
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:53:23 +00:00
Michael Tremer
e546e1038a Merge branch 'master' into next 2022-03-30 13:51:38 +00:00
Michael Tremer
916ca6d476 Rename Core Update 166 into 167
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:48:09 +00:00
Michael Tremer
21de246ef7 core166: Ship zlib
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:46:01 +00:00
Michael Tremer
c68ecc0251 core166: Ship misc-progs
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:44:31 +00:00
Michael Tremer
b7fc708ffc core166: Ship backup script
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:43:25 +00:00
Michael Tremer
b7771d5861 core166: Start a new Core Update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:43:19 +00:00
Peter Müller
4eb92c5ab1 Core Update 166: Delete leftovers from LFS rootfile updates
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-24 19:05:35 +00:00
Peter Müller
729b27da0d Core Update 166: Ship zlib
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-24 18:59:48 +00:00
Michael Tremer
77e3829dc1 linux-firmware: Compress firmware on disk
This patch enabled that we can compress any firmware files on disk. This
will save some space since /lib/firmware is becoming larger with every
release.

From formerly 828MiB, this is now using ~349MiB which is a saving of
about 480MiB on disk. This is helping us a lot fighting to contain the
distribution to 2GB on /.

Some other firmware that is installed in other packages is not
compressed with this patch which is a bit sad, but potentially not worth
the effort.

In order to ship this change with a Core Update, it might be intuitive
to remove /lib/firmware first and then extract the new update with all
new files. However, I do not know if this all will compress as well as
before since now the files are already individually compressed. It might
be a challenge to ship this.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 16:11:14 +00:00
Peter Müller
e68cfdb140 Core Update 166: Ship bind
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-23 09:42:57 +00:00
Matthias Fischer
5019469505 bind: Update to 9.16.27
For details see:
https://downloads.isc.org/isc/bind9/9.16.27/doc/arm/html/notes.html#notes-for-bind-9-16-27

"Security Fixes

    The rules for acceptance of records into the cache have been
    tightened to prevent the possibility of poisoning if forwarders send
    records outside the configured bailiwick. (CVE-2021-25220)

    ISC would like to thank Xiang Li, Baojun Liu, and Chaoyi Lu from
    Network and Information Security Lab, Tsinghua University, and
    Changgen Zou from Qi An Xin Group Corp. for bringing this
    vulnerability to our attention. [GL #2950]

    TCP connections with keep-response-order enabled could leave the TCP
    sockets in the CLOSE_WAIT state when the client did not properly
    shut down the connection. (CVE-2022-0396) [GL #3112]

Feature Changes

    DEBUG(1)-level messages were added when starting and ending the BIND
    9 task-exclusive mode that stops normal DNS operation (e.g. for
    reconfiguration, interface scans, and other events that require
    exclusive access to a shared resource). [GL #3137]

Bug Fixes

    The max-transfer-time-out and max-transfer-idle-out options were not
    implemented when the BIND 9 networking stack was refactored in 9.16.
    The missing functionality has been re-implemented and outgoing zone
    transfers now time out properly when not progressing. [GL #1897]

    TCP connections could hang indefinitely if the other party did not
    read sent data, causing the TCP write buffers to fill. This has been
    fixed by adding a “write” timer. Connections that are hung while
    writing now time out after the tcp-idle-timeout period has elapsed.
    [GL #3132]

    The statistics counter representing the current number of clients
    awaiting recursive resolution results (RecursClients) could
    be miscalculated in certain resolution scenarios, potentially
    causing the value of the counter to drop below zero. This has been
    fixed. [GL #3147]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 09:42:41 +00:00
Peter Müller
b889a5004a Core Update 166: Ship rrdtool
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-23 09:42:17 +00:00
Matthias Fischer
24005371e1 rrdtool: Update to 1.8.0
For details see:
https://github.com/oetiker/rrdtool-1.x/releases/tag/v1.8.0

"Bugfixes

    python bindings: properly convert double values of rrd info
    failed to expand 'Py_UNUSED', Invalid usage when expanding 'Py_UNUSED'
    document --showtime in xport help output
    fix --use-nan-for-all-missing-data
    update rrdruby.pod
    add missing rrdruby.pod and rrdpython.pod to dist
    Set first_weekday to 0 (Sunday), when HAVE__NL_TIME_WEEK_1STDAY is not defined
    fix median calculation for all NaN inputs
    fix potential leak in xport during failure
    fix many warnings raised by Cppcheck
    fix many compiler warnings from latest gcc
    ensure proper initialization in rrd_daemon
    cleanup testsuite
    better testing
    avoid invalid read in rrd_client
    add symbols from rrdc to librrd
    Fix duplicate write_changes_to_disk() calls when HAVE_LIBRADOS is true and HAVE_MMAP is false
    documentation updates
    for SMIN example in docs
    fix for pyton3 compatibility
    freemem only for valid status <Christian Kr"oger>
    fix double meaning of time 0 as uninitialized value
    fix for zfs not supporting fallocate. this makes resize work on zfs
    add rrdrados.pod to dist
    fetch - do not call rrd_freemem on uninitialized pointers
    use separate pango fontmap per thread
    switch to python 3
    do not leak filename when opening a broken file
    fix leaks in rrdcached
    avoid segfault when flushing cache
    escape json in legend entries
    fix leak in xport
    make rrdcgi param parsing more robust
    fix race in journal_write"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 09:41:57 +00:00
Peter Müller
afd8dc466b Nmap: Update to 7.92
Please refer to https://nmap.org/changelog#7.92 for the changelog of
this version; it is too long to include it here.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-22 17:35:52 +00:00