Commit Graph

21464 Commits

Author SHA1 Message Date
Stéphane Pautrel
4d7023105d lang: Update French translation
- Added strings concerning extrahd, hostile network logs and ids, Reiserfs deletion notification
- improvement of various existing strings

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-19 10:52:18 +00:00
Michael Tremer
1dbea7df56 core185: Ship ca-certificates
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-19 10:17:13 +00:00
Peter Müller
7e79a6c92e ca-certificates: Update root CA certificates bundle
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-19 10:17:13 +00:00
Arne Fitzenreiter
7275d72be3 cpufrequtils: hide output on disabled cores.
We disable cores if the are affected by some cpu vulnerabilities
this cores report errors if you try to change the settings.
So only print the output for core0 and hide it for all cores.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-18 11:38:29 +01:00
Peter Müller
5a1b6efa00 libloc: Embed more recent database
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:48:10 +00:00
Peter Müller
0b29422c93 Core Update 185: Remove orphaned uncritical non-library files
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:45:41 +00:00
Peter Müller
d6511c820d Core Update 185: Delete orphaned linux-firmware files
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:42:28 +00:00
Peter Müller
6336428ef8 Core Update 185: Ensure correct permissions of /etc/sudoers.d/
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:40:39 +00:00
Peter Müller
2038b640e6 Core Update 185: Ship forgotten linux-firmware files
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:39:41 +00:00
Peter Müller
b8f2d9da4c Core Update 185: Restart ntp
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:37:04 +00:00
Peter Müller
ef2846e46d Core Update 185: Ship libcap and all packages dependant on it
See: https://patchwork.ipfire.org/project/ipfire/patch/c21b6fed-28cd-47ce-8a99-b36b37672a15@ipfire.org/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-02-17 20:35:02 +00:00
Arne Fitzenreiter
1ec11ba515 rtl8812au: fix module compression
the kernel cannot load the compressed module so fix compression
parameters.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-17 19:46:34 +01:00
Arne Fitzenreiter
d36a58ef6b cpufrequtils: fix initskript for amd-pstate
the initskript loads a test-modul for amd-pstate (which traces on intel)
and off course reports errors if firmware settings are missing.

this also fix the error at start because also amd-pstate doesn't support
ondemand mode.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-16 16:17:47 +01:00
Adolf Belka
90e40b1948 ruleset-sources: removal of PT Attack & Secureworks + addition of ThreatFox
- The PT Attack ruleset has not been updated since 2021 and made read-only in 2022
   The PT Attack website no longer has any reference to Suricata Rulesets. The PT Attack
   ruleset is being removed.
- The Secureworks three rulesets are no longer available. The website path gives a 404
   error. No mention of Suricata rulesets in the Secureworks website. The Secureworks three
   rulesets are being removed.
- ThreatFox ruleset has been added to the list. Both a plain and archive version of the
   rules are available but the plain version is being regularly updated while the archive
   version was last updated 5 days ago. So this patch has implemented the plain version.
- All above was discussed in the January Developers Conference call.
- Tested out on my vm testbed. I had PT Attack selected as one of the providers. As
   mentioned by Stefan removing PT Attack means it is not available in the list of
   providers but the provider stays in the providers table but with the line shown in red.
   I will update the wiki to mention the red highlight and what it means.

Suggested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-16 12:29:15 +00:00
Michael Tremer
407548690c Merge branch 'master' into next 2024-02-16 12:29:05 +00:00
Adolf Belka
c9c9580c4e freeradius: Increment PAK_VER & ship freeradius to link to the updated libssl version
- OpenSSL was updated to 3.1.4 in CU181 and to 3.2.1 in CU183 but in both cases freeradius
   was not incremented to cause it to be shipped.
- This patch increments the freeradius PAK_VER to ensure it will be shipped.

Fixes: Bug#13590
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-16 12:28:55 +00:00
Michael Tremer
c73a75cb70 Merge remote-tracking branch 'origin/next' into next 2024-02-14 19:07:30 +00:00
Michael Tremer
5db2b07c89 Merge branch 'master' into next 2024-02-14 19:06:35 +00:00
Adolf Belka
dd24668627 files: Ship collectd.conf for bug#12981
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:06:20 +00:00
Michael Tremer
c5b441a4e6 core185: Ship unbound and BIND again
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:04:48 +00:00
Michael Tremer
64300f2212 Merge branch 'master' into next 2024-02-14 19:03:52 +00:00
Adolf Belka
2071b2964f graphs.pl: Fixes graph failure when the DROP_HOSTILE directory is missing
- If a fresh install is done then only the DROP_HOSTILE_IN & DROP_HOSTILE_OUT
   rrd directories are created.
- With the DROP_HOSTILE directory missing then when the fwhits graph is updated an error
   message is caused by the inability to open the required files.
- This patch adds an if/else loop into the fwhits graph code to deal with the two cases
   of the DROP_HOSTILE being present or not depending on the history and if a backup with
   logs has been restored from when DROP_HOSTILE was in use.
- Tested on vm testbed and created a historical line for the hostile data when it was not
   split
- There might be a simpler or better approach than this but it was the only option I
   could identify. I couldn't find anything about being able to use if loops within the
   RRD::Graph loop

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:01:44 +00:00
Michael Tremer
f3d7ce3b5d core184: Ship unbound
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:01:25 +00:00
Matthias Fischer
4fb7b18843 unbound: Update to 1.19.1
For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-19-1

"Bug Fixes

    Fix CVE-2023-50387, DNSSEC verification complexity can be exploited
    to exhaust CPU resources and stall DNS resolvers.
    Fix CVE-2023-50868, NSEC3 closest encloser proof can exhaust CPU."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:00:36 +00:00
Matthias Fischer
e705636a85 unbound 1.19.1: Fix for forgotten rootfile
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:00:30 +00:00
Michael Tremer
0698daa3fb core184: Ship bind
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 19:00:03 +00:00
Matthias Fischer
de9e44e82d bind: Update to 9.16.48
For details see:
https://downloads.isc.org/isc/bind9/9.16.48/doc/arm/html/notes.html#notes-for-bind-9-16-48

Fixes several CVEs.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 18:59:48 +00:00
Michael Tremer
935da8b7a2 The IPFire time service has moved to time.ipfire.org
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 11:52:36 +00:00
Michael Tremer
b6d47f727a make.sh: Bump toolchain version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-14 11:51:33 +00:00
Arne Fitzenreiter
a4f29a5347 transmission: add menuentry to transmission webgui
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-11 13:33:39 +01:00
Arne Fitzenreiter
761e73230f mympd: update to 14.0.1
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-11 11:27:48 +01:00
Michael Tremer
1b57f838f1 make.sh: Compile with minimal debug information
In IPFire 2, we don't make any use out of the debug information.
Therefore we can tell the compiler to generate as minimal debug
information as possible in order to have a faster compilation process.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 14:23:59 +00:00
Michael Tremer
cecad543cb make.sh: Build with _FORTIFY_SOURCE=3
This will require that we re-ship everything.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 14:23:48 +00:00
Michael Tremer
900e1c5722 vim: Don't try to build with custom _FORTIFY_SOURCE
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 14:23:40 +00:00
Michael Tremer
be60a304dd mympd: Don't overwrite our own hardening flags
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 14:23:32 +00:00
Michael Tremer
691a64130f multipath-tools: Don't overwrite our hardening flags
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 14:23:23 +00:00
Arne Fitzenreiter
394405b1dd vdr: add menu entry for vdr website
we had discussed this on december telco but it is not so
easy because our menusystem only shows entry's existing cgi's.
so i add a cgi redirect to http://$ENV{SERVER_ADDR}:3000
this add the entry under pakfire and also to service page.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 12:00:18 +00:00
Michael Tremer
65c1901411 core185: Ship suricata
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 11:59:03 +00:00
Michael Tremer
87a0bf6fb2 suricata: Update to 7.0.3
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 11:58:18 +00:00
Adolf Belka
e8972095c6 suricata: Update to version 7.0.2
- Update from version 6.0.15 to 7.0.2
- Update of rootfile
- suricata 7.0.2 requires libhtp >= 0.5.45
   it also requires libelf.so.1 for execution. Previous suricata versions only required
   libelf for building. libelf or elfutils are not mentioned anywhere in the changelog
- Without elfutils available during starting then suricata fails to start due to
   libelf.so.1 not being available.
- Tested out suricata7 with elfutils on my vm testbed and it successfully started.
- The suricata-5.0.8 patch has been removed as it got applied to configure.ac but this
   is not available in suricata-7.0.2. It looks like that patch was never actually used in
   suricata as all the builds I checked used the configure file from the source tarball
   and the configure was never created by running autoconf on the configure.ac
- Changelog is too large to include here. Details can be found in the ChangeLog file in
   the source tarball

Fixes: Bug#13516
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 11:56:23 +00:00
Matthias Fischer
bb25f15cf9 clamav: Update to 1.3.0
For details see:
https://blog.clamav.net/2023/11/clamav-130-122-105-released.html

Excerpts from changelog:

"Major changes

    Added support for extracting and scanning attachments found in
    Microsoft OneNote section files. OneNote parsing will be enabled by
    default, but may be optionally disabled using one of the following
    options:
    a. The clamscan command line option: --scan-onenote=no,
    b. The clamd.conf config option: ScanOneNote no,
    c. The libclamav scan option options.parse &= ~CL_SCAN_PARSE_ONENOTE;,
    d. A signature change to the daily.cfg dynamic configuration (DCONF).

Other improvements

    Fixed issue when building ClamAV on the Haiku (BeOS-like) operating
    system. Patch courtesy of Luca D'Amico

    ClamD: When starting, ClamD will now check if the directory specified
    by TemporaryDirectory in clamd.conf exists. If it doesn't, ClamD will
    print an error message and will exit with exit code 1. Patch courtesy
    of Andrew Kiggins.

    CMake: If configured to build static libraries, CMake will now also
    install the libclamav_rust, libclammspack, libclamunrar_iface, and
    libclamunrar static libraries required by libclamav.
    Note: These libraries are all linked into the clamscan, clamd, sigtool,
    and freshclam programs, which is why they did not need to be installed
    to function. However, these libraries would be required if you wish to
    build some other program that uses the libclamav static library.
    Added file type recognition for compiled Python (`.pyc`) files.

      The file type appears as a string parameter for these callback
      functions:

      - clcb_pre_cache
      - clcb_pre_scan
      - clcb_file_inspection

      When scanning a `.pyc` file, the `type` parameter will now show

      "CL_TYPE_PYTHON_COMPILED" instead of "CL_TYPE_BINARY_DATA".

    Improved support for decrypting PDFs with empty passwords.

    Assorted minor improvements and typo fixes.

Bug fixes

    Fixed a warning when scanning some HTML files.

    Fixed an issue decrypting some PDF's with an empty password.

    ClamOnAcc: Fixed an infinite loop when a watched directory does not
    exist.

    ClamOnAcc: Fixed an infinite loop when a file has been deleted before a
    scan.
    Patch courtesy of gsuehiro.

    Fixed a possible crash when processing VBA files on HP-UX/IA 64bit.
    Patch courtesy of Albert Chin-A-Young.

    ClamConf: Fixed an issue printing `MaxScanSize` introduced with the
    change to allow a `MaxScanSize` greater than 4 GB.
    Fix courtesy of teoberi.

    Fixed an issue building a ClamAV RPM in some configurations.
    The issue was caused by faulty CMake logic that intended to create an
    empty database directory during the installation."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 11:52:39 +00:00
Michael Tremer
448a98dc81 core185: Ship glibc
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 11:51:54 +00:00
Michael Tremer
f4b059a771 glibc: Update to 2.39
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 11:50:54 +00:00
Michael Tremer
4fde42d7ec core185: Ship binutils
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 11:49:23 +00:00
Michael Tremer
e56ca17e9b binutils: Update to 2.42
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 11:48:19 +00:00
Michael Tremer
c4fd8911d3 ipfire-netboot: Update iPXE to version 0cc0f47
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 11:48:07 +00:00
Michael Tremer
24dbe4eaf2 Start Core Update 185
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-10 11:47:13 +00:00
Michael Tremer
4a9fe2eaaa Merge branch 'next' 2024-02-10 11:43:56 +00:00
Michael Tremer
ee4c8d28e4 core183: Ship suricata
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 14:15:32 +00:00
Michael Tremer
89941c3d13 suricata: Update to 6.0.16
https://redmine.openinfosecfoundation.org/versions/201

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 14:14:46 +00:00