Commit Graph

16591 Commits

Author SHA1 Message Date
Matthias Fischer
5ebf4bdbd2 tcpdump: Update to 4.99.1
For details see:
http://www.tcpdump.org/tcpdump-changes.txt

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-12 09:32:16 +00:00
Michael Tremer
053a582d3a ipsec-policy: Do no create DROP rules for on-demand mode
This is not necessary and gets in the way if users have SNAT rules or
other things that make the check be in the wrong place.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-11 16:15:37 +00:00
Peter Müller
c5d855492e Postfix: update to 3.6.0
Please refer to http://www.postfix.org/announcements/postfix-3.6.0.html
for this versions' release announcements.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-11 16:05:24 +00:00
Peter Müller
8dc908de4a update ca-certificates CA bundle
Update the CA certificates list to what Mozilla NSS ships currently.

The original file can be retrieved from:
https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-11 09:11:59 +00:00
Adolf Belka
3049ef008e perl-CGI: Update to 4.53
- Update from 4.52 to 4.53
- Update of rootfile not required
- Changelog
   4.53 2021-06-03
     - fix typo in passing of max-age to CGI::Cookie (GH #247)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 12:23:30 +00:00
Michael Tremer
189d41d200 core158: Ship nettle
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 12:23:12 +00:00
Adolf Belka
b4cb1ed58b nettle: Update to 3.7.3
- Update from 3.7.2 to 3.7.3
- Update rootfile
- Changelog
    2021-05-22  Niels Möller  <nisse@lysator.liu.se>
	* configure.ac: Bump package version, to 3.7.3.
	  (LIBNETTLE_MINOR): Bump minor number, to 8.4.
	  (LIBHOGWEED_MINOR): Bump minor number, to 6.4.
    2021-05-17  Niels Möller  <nisse@lysator.liu.se>
	* rsa-decrypt-tr.c (rsa_decrypt_tr): Check up-front that input is
	  in range.
	* rsa-sec-decrypt.c (rsa_sec_decrypt): Likewise.
	* rsa-decrypt.c (rsa_decrypt): Likewise.
	* testsuite/rsa-encrypt-test.c (test_main): Add tests with input > n.
    2021-05-14  Niels Möller  <nisse@lysator.liu.se>
	* rsa-sign-tr.c (rsa_sec_blind): Delete mn argument.
	  (_rsa_sec_compute_root_tr): Delete mn argument, instead require
	  that input size matches key size. Rearrange use of temporary
	  storage, to support in-place operation, x == m. Update all
	  callers.
	* rsa-decrypt-tr.c (rsa_decrypt_tr): Make zero-padded copy of
	  input, for calling _rsa_sec_compute_root_tr.
	* rsa-sec-decrypt.c (rsa_sec_decrypt): Likewise.
	* testsuite/rsa-encrypt-test.c (test_main): Test calling all of
	  rsa_decrypt, rsa_decrypt_tr, and rsa_sec_decrypt with zero input.
    2021-05-06  Niels Möller  <nisse@lysator.liu.se>
	* pkcs1-sec-decrypt.c (_pkcs1_sec_decrypt): Check that message
	  length is valid, for given key size.
	* testsuite/rsa-sec-decrypt-test.c (test_main): Add test cases for
	  calls to rsa_sec_decrypt specifying a too large message length.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 12:22:59 +00:00
Michael Tremer
3fbad7e512 core158: Ship libxcrypt
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 12:22:45 +00:00
Adolf Belka
eb408bb29c libxcrypt: Update to 4.4.22
- Update from 4.4.20 to 4.4.22
- Update of rootfile not required
- Changelog
   Version 4.4.22
    * The crypt_checksalt() function has been fixed to correctly return
      with 'CRYPT_SALT_INVALID', in case the setting, that is passed
      to be checked, represents an empty passphrase or an uncomputed
      setting for descrypt without any salt characters.
   Version 4.4.21
    * The crypt_checksalt() function will now return the value
      'CRYPT_SALT_METHOD_LEGACY' in case the setting, that is passed
      to be checked, uses a hashing method, which is considered to be
      too weak for use with new passphrases.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 12:22:09 +00:00
Adolf Belka
85d2bb767f libogg: Update to 1.3.5
- Update from 1.3.4 to 1.3.5
- Update rootfile
- Changelog
   Version 1.3.5 (2020 June 3)
    * Fix unsigned typedef problem on macOS.
    * Fix overflow check in ogg_sync_buffer.
    * Clean up cmake and autotools build files.
    * Remove Symbian and Apple XCode build files.
    * Fix documentation cross-reference links.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 12:21:56 +00:00
Michael Tremer
a906734840 core158: Ship libedit
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 12:21:38 +00:00
Adolf Belka
5be657270f libedit: Update to 20210522-3.1
- Update from 20210419-3.1 to 20210522-3.1
- Update rootfile
- Changelog
   2021-05-22 Jess Thrysoee
      * version-info: 0:66:0
      * all: sync with upstream source
      * src/el.c: editrc not read on systems without issetugid
            Patch by Trevor Cordes

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 12:21:17 +00:00
Adolf Belka
5adf0ed40c elfutils: Update to 0.185
- Update from 0.184 to 0.185
- Update rootfile
- Changelog
   Version 0.185
     debuginfod-client: Simplify curl handle reuse so downloads which
                        return an error are retried.
     elfcompress: Always exit with code 0 when the operation succeeds (even
                  when nothing was done). On error the exit code is now always 1.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 12:21:03 +00:00
Leo-Andres Hofmann
9270497a6d Remove no longer needed texts, run "make.sh lang"
Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 09:13:00 +00:00
Michael Tremer
662b1d802e core158: Ship memory.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 09:12:40 +00:00
Leo-Andres Hofmann
43f20d6e5a memory.cgi: Fix memory usage table
procps 3.3.10 introduced a new output format for the "free" command.
This patch adapts the new format.

Fixes: #12628

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-10 09:12:15 +00:00
Michael Tremer
65171dc956 intel-microcode: Update to 20210608
Fixes various security vulnerabilities:

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-09 17:02:11 +00:00
Michael Tremer
52c84741cf Merge branch 'master' into next 2021-06-08 14:10:22 +00:00
Michael Tremer
abd5cc3cb7 Revert "collectd: Use libstatgrab for reading disk stats"
This reverts commit 86beff5f75.

This patch breaks reading statistics on systems running a 4.14 kernel.
It seems like it is not dependant on the kernel, though.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-08 14:08:44 +00:00
Michael Tremer
f8b0610c53 Update linux-firmware to 20210511
Core Update 158 specifically ships files that are new or have changed to
keep the size of the update down.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-08 13:38:15 +00:00
Michael Tremer
613db5c199 flash-image: Increase root partition size to 1600MB
This is necessary due to the increased size of the base OS which is
mostly driven by linux-firmware.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-08 13:37:33 +00:00
Michael Tremer
0aad67988b core158: Ship apache2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-07 11:15:34 +00:00
Matthias Fischer
0957a949db apache: Update to 2.4.48
apache: Update to 2.4.48

For details see:
https://mirror.synyx.de/apache//httpd/CHANGES_2.4.48

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-07 11:15:01 +00:00
Michael Tremer
a86c5df80d core158: Ship rng-tools
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-07 11:14:40 +00:00
Peter Müller
41749b748b rng-tools: update to 6.12
Please refer to https://github.com/nhorman/rng-tools/releases for a full
list of meaningful changes between 6.4 and 6.12. "--without-pkcs11" is
necessary to avoid additional dependencies, which do not make sense on
IPFire since there are no use-cases for it.

Rootfiles did not change, our patch to use RDRDAND on i586 as well is
still valid.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-07 11:13:40 +00:00
Michael Tremer
6f8a114146 Revert "python3-msgpack: update to 1.0.0"
This reverts commit f94fd54e0c.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 15:26:16 +00:00
Adolf Belka
bf2891dc5b perl-TimeDate: Update to 2.33
- Update from 1.20(2009) to 2.33(2020)
- Update rootfile
- Changelog
   2.33 -- Wed May 19 11:34:00 MT 2020
     * Remove PAX Headers in tarball using GNU tar
   2.32 -- Wed Mar 04 14:41:00 MT 2020
    * Fix t/date.t to run on leap years [arc]
   2.31 -- Thu Jan 16 14:00:00 MT 2020
     * Fix year 2020 bug from t/getdate.t [Prajith]
     * Fix warnings from t/date.t
     * Fix pod issue in lib/Date/Parse.pm
     * Fix for French language using English day suffixes in %o [mitchjacksontech]
     * RT#84075: Fix Date::Parse::str2time century issue. [perlpilot]
     * Adds Occitan language. [Quenty31]
     * Migrate GitHub repo and bugtracker to atoomic/perl-TimeDate
   2.30 -- Mon Feb 18 13:31:03 CST 2013
     * Syncing distribution version number with Date::Parse, not functional changes

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:50:14 +00:00
Michael Tremer
84f7176501 core158: Ship pcre2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:50:01 +00:00
Adolf Belka
7112adbc86 pcre2: Update to 10.37
- Update from 10.36 to 10.37
- Update rootfile
- find-dependencies run to check impact of so lib bump
   No issues found
- Changelog
   Version 10.37 26-May-2021
    1. Change RunGrepTest to use tr instead of sed when testing with binary
       zero bytes, because sed varies a lot from system to system and has problems
       with binary zeros. This is from Bugzilla #2681. Patch from Jeremie
       Courreges-Anglas via Nam Nguyen. This fixes RunGrepTest for OpenBSD. Later:
       it broke it for at least one version of Solaris, where tr can't handle binary
       zeros. However, that system had /usr/xpg4/bin/tr installed, which works OK, so
       RunGrepTest now checks for that command and uses it if found.
    2. Compiling with gcc 10.2's -fanalyzer option showed up a hypothetical problem
       with a NULL dereference. I don't think this case could ever occur in practice,
       but I have put in a check in order to get rid of the compiler error.
    3. An alternative patch for CMakeLists.txt because 10.36 #4 breaks CMake on
       Windows. Patch from email@cs-ware.de fixes bugzilla #2688.
    4. Two bugs related to over-large numbers have been fixed so the behaviour is
       now the same as Perl.
       (a) A pattern such as /\214748364/ gave an overflow error instead of being
           treated as the octal number \214 followed by literal digits.
       (b) A sequence such as {65536 that has no terminating } so is not a
           quantifier was nevertheless complaining that a quantifier number was too big.
    5. A run of autoconf suggested that configure.ac was out-of-date with respect
       to the lastest autoconf. Running autoupdate made some valid changes, some valid
       suggestions, and also some invalid changes, which were fixed by hand. Autoconf
       now runs clean and the resulting "configure" seems to work, so I hope nothing
       is broken. Later: the requirement for autoconf 2.70 broke some automatic test
       robots. It doesn't seem to be necessary: trying a reduction to 2.60.
    6. The pattern /a\K.(?0)*/ when matched against "abac" by the interpreter gave
       the answer "bac", whereas Perl and JIT both yield "c". This was because the
       effect of \K was not propagating back from the full pattern recursion. Other
       recursions such as /(a\K.(?1)*)/ did not have this problem.
    7. Restore single character repetition optimization in JIT. Currently fewer
       character repetitions are optimized than in 10.34.
    8. When the names of the functions in the POSIX wrapper were changed to
       pcre2_regcomp() etc. (see change 10.33 #4 below), functions with the original
       names were left in the library so that pre-compiled programs would still work.
       However, this has proved troublesome when programs link with several libraries,
       some of which use PCRE2 via the POSIX interface while others use a native POSIX
       library. For this reason, the POSIX function names are removed in this release.
       The macros in pcre2posix.h should ensure that re-compiling fixes any programs
       that haven't been compiled since before 10.33.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:49:47 +00:00
Adolf Belka
c372d43950 netsnmpd: Update to 5.9.1
- Update from 5.8 to 5.9.1
- Update rootfile
- find-dependencies run to check impact of so lib bump
   no issues found
- Changelog - for more details on the Many bug fixes for 5.9.1 see the
   ChangeLog file in the source tarball
   The following is from the CHANGES file in the source tarball
   *5.9.1*:
     General: Many bug fixes
   *5.9*
     snmplib:
      - Add IPv6 support to DTLSUDP transport
      - use new netsnmp_sockaddr_storage in netsnmp_addr_pair
      - add base_transport ptr for tunneled transports
      - Add support for OpenSSL 1.1.1
      - Dtls: overhaul of debug
      - Remove inline versions of container funcs
     snmpd:
      - Use ETHTOOL_GLINKSETTINGS when available Newer Linux kernels
	support ETHTOOL_GLINKSETTINGS. Use it when available instead of the
	older and deprecated ETHTOOL_GSET. This patch avoids that the Linux
	kernel reports the following kernel warning: warning: 'snmpd' uses
	legacy ethtool link settings API, link modes are only partially
	reported See also https://sourceforge.net/p/net-snmp/patches/1387/.
	[bvanassche: reworked this patch significantly]
      - Reduce the time needed to execute "pass" scripts on BSD systems See
	also https://github.com/net-snmp/net-snmp/issues/8.
      - [BUG 2926]: Make it possible to set agentXPingInterval for a
	subagent - register agentXPingInterval for the subagent list
	handler, before it was registered for snmp - added agentxTimeout to
	the subagent list handler. It's now possible to set for snmpd and
	the subagent. See 'man snmpd.conf' - added agentxRetries to the
	subagent list handler. See 'man snmpd.conf'. It's never used in the
	subagent, but it's now following the documentation Signed-off-by:
	Anders Wallin <wallinux@gmail.com>
     snmptrap:
      - BUG: 2899: Patch from Drew Roedersheimer to set library
	engineboots/time values before sending
     snmptrapd:
      - Add support for the latest libmysqlclient version
     libsnmp:
      - Scan MIB directories in alphabetical order This guarantees that
	e.g. mibs/RFC1213-MIB.txt is read before mibs/SNMPv2-MIB.txt. The
	order in which these MIBs is read matters because both define
	sysLocation but with different attributes.
     unspecified:
      - [BUG 2930]: Fix a Solaris hrSWInst crash Avoid that snmpd crashes
	on Solaris when querying software packages with an empty CATEGORY
	field. See also https://sourceforge.net/p/net-snmp/bugs/2930/. See
	also https://sourceforge.net/p/net-snmp/patches/1390/.
     FreeBSD:
      - Fix first byte of IF-MIB::ifPhysAddress   Don't write past the
	interface name, and use temporary copy instead. This fixes the
	first byte of ifPhysAddress always being 0 on FreeBSD. See also
	https://sourceforge.net/p/net-snmp/code/merge-requests/20/. [
	bvanassche: edited patch title / added test for malloc() result /
	reduced number of free(if_name) calls ]
     Win32:
      - BUG: 2779541 Fixed handle leak in pass_persist.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:49:31 +00:00
Michael Tremer
b2c32cae42 core158: Ship libnl-3
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:49:17 +00:00
Adolf Belka
0f12e034f0 libnl-3: Update to 3.5.0
- Update from 3.2.25 (2014) to 3.5.0 (2019)
- Update rootfile
- Added --disable-static to ./configure
- Added --bindir=/usr/sbin otherwise binaries were installed in /usr/bin
   Previous version installed the binaries in /usr/sbin without any command
   This maintains location of binaries the same across the versions
- Changelog is no longer provided. Changes have to be found by reading
   through the commits. https://github.com/thom311/libnl/releases
    This is too large to include here.
    There are 664 commits across 7 releases

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:48:35 +00:00
Michael Tremer
f8ac400cb8 core158: Ship libcap
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:48:17 +00:00
Adolf Belka
179f3ec082 libcap: Update to 2.50
- Update from 2.49 to 2.50
- Update rootfile
- Version 2.50 failed to install capsh - bug raised for this
   https://bugzilla.kernel.org/show_bug.cgi?id=213261
   patch to fix this bug created and used in this build
- Changelog
   Release notes for 2.50
    2021-05-24 12:05:16 -0700
      Some new capsh features:
          --explain=cap_foo: describe what cap_foo does (Bug 212451)
          --suggest=phrase: search all the cap descriptions and describe those that match the phrase
      Add "keepcaps" module argument support to pam_cap.so (reported by Zoltan Fridrich. Bug 212945)
          extend libcap to include cap_prctl() and cap_prctlw() functions to regain feature parity with Go "cap" package. These are only needed when linking against -lpsx for keepcaps POSIX semantics.
          this likely requires substantial application changes to make Ambient capability support usable in general, but doing our part for the admin.
      Add a test case for recent kernel fix (Bug 212737)
      Go pragma fix for convenience functions in "cap" module (reported by Lorenz Bauer. Bug 212321)
      Minor man documentation updates
      Minor build tree improvements (mostly for maintainer)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:47:48 +00:00
Michael Tremer
331ba89bfd core158: Ship gnutls
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:47:34 +00:00
Adolf Belka
f5e719df3e gnutls: Update to 3.6.16
- Update from 3.6.14 to 3.6.16
- Update rootfile
- Changelog
   * Version 3.6.16 (released 2021-05-24)
     ** libgnutls: Fixed potential miscalculation of ECDSA/EdDSA code backported from
        Nettle.  In GnuTLS, as long as it is built and linked against the fixed
        version of Nettle, this only affects GOST curves.  [CVE-2021-20305]
     ** libgnutls: Fixed potential use-after-free in sending "key_share"
        and "pre_shared_key" extensions. When sending those extensions, the
        client may dereference a pointer no longer valid after
        realloc. This happens only when the client sends a large Client
        Hello message, e.g., when HRR is sent in a resumed session
        previously negotiated large FFDHE parameters, because the initial
        allocation of the buffer is large enough without having to call
        realloc (#1151).  [GNUTLS-SA-2021-03-10, CVSS: low]
   * Version 3.6.15 (released 2020-09-04)
     ** libgnutls: Fixed "no_renegotiation" alert handling at incorrect timing.
        The server sending a "no_renegotiation" alert in an unexpected timing,
        followed by an invalid second handshake was able to cause a TLS 1.3 client to
        crash via a null-pointer dereference. The crash happens in the application's
        error handling path, where the gnutls_deinit function is called after
        detecting a handshake failure (#1071).  [GNUTLS-SA-2020-09-04, CVSS: medium]
     ** libgnutls: If FIPS self-tests are failed, gnutls_fips140_mode_enabled() now
        indicates that with a false return value (!1306).
     ** libgnutls: Under FIPS mode, the generated ECDH/DH public keys are checked
        accordingly to SP800-56A rev 3 (!1295, !1299).
     ** libgnutls: gnutls_x509_crt_export2() now returns 0 upon success, rather than
        the size of the internal base64 blob (#1025). The new behavior aligns to the
        existing documentation.
     ** libgnutls: Certificate verification failue due to OCSP must-stapling is not
        honered is now correctly marked with the GNUTLS_CERT_INVALID flag
        (!1317). The new behavior aligns to the existing documentation.
     ** libgnutls: The audit log message for weak hashes is no longer printed twice
        (!1301).
     ** libgnutls: Fixed version negotiation when TLS 1.3 is enabled and TLS 1.2 is
        disabled in the priority string. Previously, even when TLS 1.2 is explicitly
        disabled with "-VERS-TLS1.2", the server still offered TLS 1.2 if TLS 1.3 is
        enabled (#1054).

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:46:43 +00:00
Michael Tremer
e027e094cb Revert "~/src/patches/: Clean up orphaned patches, duplicates and application patches outside existing directory structures"
This reverts commit 5adde58cd5.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-04 10:46:30 +00:00
Peter Müller
5adde58cd5 ~/src/patches/: Clean up orphaned patches, duplicates and application patches outside existing directory structures
This patch represents the first batch of various patches we do not use
anymore, hence there is no sense in keeping them, polluting ~/src/patches/.

Two coreutils patches have been moved into the already existing
coreutils folder, while one libloc patch has been a duplicate to that
one already existing in ~/src/patches/libloc/.

Cleaning up this dump remains a non-exhaustive attempt, though. There
are several other patches I could not locate in LFS files in the first
place, which means that the amount of files we can drop from this
directory is likely to be greater than this patch currently covers.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:49:29 +00:00
Peter Müller
f94fd54e0c python3-msgpack: update to 1.0.0
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:49:18 +00:00
Peter Müller
3e60ed14e2 Clean up whatever remained from ALGs in userspace
This patch removes translations, directives in LFS files, and ALG shared
object files which all became orphaned after we disabled ALGs due to NAT
Slipstreaming vulnerability in Core Update 155.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:16:30 +00:00
Peter Müller
2c8a20af47 Drop unmaintained add-on dpfhack
This package seems to be unmaintained for at least five years. It's
(former?) upstream traces back to https://section5.ch/index.php/2011/01/13/dpf-hacking/,
but download links to both dpfhack and a patched version of lcd4linux
point to http://localhost/.

http://tech.section5.ch/files/dpfhack-0.1alpha.tgz still serves
something apparently related to dpfhack, but it is unclear whether that
is a previous version than the "0.12devel" we know about, or a
successor. https://tech.section5.ch/files/dpfhack-0.1alpha.tgz, just to
have it noticed, comes with a X.509 certificate not issued for this
FQDN.

dpfhack is solely needed as a dependancy for lcd4linux, which appears to
be unmaintained as well, hence being dropped in a dedicated patch.

Given the status quo, bugs in dpfhack cannot be reported properly,
security issues won't be addressed (by anybody else then ourselves), and
technical questions cannot be clarified aside a reverse engineering
approach.

We should not allow such an add-on to be installed on a firewall system.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:16:21 +00:00
Peter Müller
c62adbc448 Drop unmaintained add-on lcd4linux
This package has not received any updates or attention within the last
three years. It's sole known upstream URL (https://ssl.bulix.org/projects/lcd4linux/)
returns a HTTP error 404 nowadays, and the author was unable to locate
any upstream source that appears to be still maintained today.

Given the status quo, bugs in lcd4linux cannot be reported properly,
security issues won't be addressed (by anybody else then ourselves), and
technical questions cannot be clarified aside a reverse engineering
approach.

We should not allow such an add-on to be installed on a firewall system.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:16:13 +00:00
Michael Tremer
0b38fd75d4 core158: Ship dmidecode
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:15:15 +00:00
Peter Müller
740549d85a dmidecode: update to 3.3
Notable changes as per https://git.savannah.gnu.org/cgit/dmidecode.git/plain/NEWS:

Version 3.3 (Wed Oct 14 2020)
  - [BUILD] Allow overriding build settings from the environment.
  - [COMPATIBILITY] Document how the UUID fields are interpreted.
  - [PORTABILITY] Don't use memcpy on /dev/mem on arm64.
  - [PORTABILITY] Only scan /dev/mem for entry point on x86.
  - Support for SMBIOS 3.3.0. This includes new processor names, new port
    connector types, and new memory device form factors, types and
    technologies.
  - Add bios-revision, firmware-revision and system-sku-number to -s option.
  - Use the most appropriate unit for cache size.
  - Decode system slot base bus width and peers.
  - Important bug fixes:
    Fix Redfish Hostname print length
    Fix formatting of TPM table output
    Fix System Slot Information for PCIe SSD
    Don't choke on invalid processor voltage
  - Use the most appropriate unit for cache size.

Version 3.2 (Wed Sep 14 2018)
  - [COMPATIBILITY] The UUID is now displayed using lowercase letters, per
    RFC 4122 (#53569). You must ensure that any code parsing it is
    case-insensitive.
  - Support for SMBIOS 3.2.0. This includes new processor names, new socket
    and port connector types, new system slot state and property, and support
    for non-volatile memory (NVDIMM).
  - Support for Redfish management controllers.
  - A new command line option to query a specific structure by its handle.
  - A new command line option to query the system family string.
  - Support for 3 ThinkPad-specific structures (patch #9642).
  - Support for HPE's new company name.
  - Support UEFI on FreeBSD.
  - Important bug fixes:
    Fix firmware version of TPM device
    Fix the HPE UEFI feature flag check
  - (biosdecode) A new command line option to fully decode PIR information
    (support request #109339).

This patch also features two new patches recommended by upstream, whose
online version can be retrieved at
https://git.savannah.gnu.org/cgit/dmidecode.git/commit/?id=1117390ccd9cea139638db6f460bb6de70e28f94
https://git.savannah.gnu.org/cgit/dmidecode.git/commit/?id=11e134e54d15e67a64c39a623f492a28df922517.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:14:21 +00:00
Michael Tremer
31faaf2b14 core158: Ship gzip
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:14:06 +00:00
Peter Müller
0ebe81821f gzip: update to 1.10
Relevant excerpt from Changelog as per
https://savannah.gnu.org/forum/forum.php?forum_id=9339:

NEWS

* Noteworthy changes in release 1.10 (2018-12-29) [stable]

** Changes in behavior

  Compressed gzip output no longer contains the current time as a
  timestamp when the input is not a regular file.  Instead, the output
  contains a null (zero) timestamp.  This makes gzip's behavior more
  reproducible when used as part of a pipeline.  (As a reminder, even
  regular files will use null timestamps after the year 2106, due to a
  limitation in the gzip format.)

** Bug fixes

  A use of uninitialized memory on some malformed inputs has been fixed.
  [bug present since the beginning]

  A few theoretical race conditions in signal handers have been fixed.
  These bugs most likely do not happen on practical platforms.
  [bugs present since the beginning]

In addition, gzip 1.10 comes with the GNU library patch applied, so
there is no need to carry this file around any more.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-03 09:13:00 +00:00
Michael Tremer
c9dbf671d4 core158: Ship perl files with changed permissions
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-02 09:45:04 +00:00
Peter Müller
55f0bafb7b configroot: prevent any Perl file within /var/ipfire/ from being owned by nobody
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-02 09:42:50 +00:00
Michael Tremer
839451c527 dnsdist: Improve initscript to prevent reload on config error
start, restart and reload will now be prohibited if the configuration
file has an incorrect syntax. This avoids killing a running daemon and
is showing an indication to the user instead of having the daemon dying
silently in the background.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-01 11:39:09 +02:00
Matthias Fischer
ceb5733c59 Deleted no longer used 'if' clauses (ALG) from firewall init
In https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=ffafaa71a6970a8c3d0942247feb37facfe24d25
all ALGs were removed from UI.

But they remained - somehow - in the initscript (firewall).

I tried to remove the remnants - hopefully in the correct way.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-31 12:41:52 +00:00