Commit Graph

20971 Commits

Author SHA1 Message Date
Arne Fitzenreiter
64d0f1a074 grub: fix mkimage on riscv64 and fix cdrom
the riscv64 image needs more than 1.44MB

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:16:24 +00:00
Arne Fitzenreiter
16b6a6fd2c strip: exclude rust compiler
this fail on riscv64 because it is compiled with lvm and
we not need to strip not shipped buildtime deps.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:16:24 +00:00
Arne Fitzenreiter
e275a07b67 kernel: update to 6.1.56
this also builds the dtb files on riscv64

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:13:02 +00:00
Michael Tremer
7b9a3bb2d1 Merge branch 'master' into next 2023-10-09 08:12:40 +00:00
Arne Fitzenreiter
729fe58b12 boost: update x86_64 rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:12:13 +00:00
Michael Tremer
fd6dc213fb core181: Ship glibc again
This was updated in 180, but we want to make sure that even testing
users get the latest updates.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-04 13:00:39 +00:00
Michael Tremer
aabdf04299 Merge branch 'master' into next 2023-10-04 12:58:12 +00:00
Michael Tremer
b9215da1ed glibc: Import patches from upstream
This patch imports the latest patches from the 2.38 branch:

  https://git.ipfire.org/?p=thirdparty/glibc.git;a=shortlog;h=refs/heads/release/2.38/master

This includes a fix for a buffer overflow in the tunables code
(CVE-2023-4911) as well as  CVE-2023-4806 and CVE-2023-5156.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-04 12:54:17 +00:00
Stefan Schantl
6185c3b9ab extrahd.cgi: Add support for LVM and MDADM devices
This commit adds support for using LVM and mdadm based RAID devices
for the CGI page.

In case one or more drives/partitions are used by such a "grouped"
volume they still will displayed on the page, but can not be
configured/used. Instead the "master" volume of which the
drive/partition is part of is shown in the "mountpoint" input box.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-02 19:15:43 +00:00
Michael Tremer
c07f612e10 core180: Rewrite the SSH configuration on update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-02 18:13:38 +00:00
Michael Tremer
4afc081d83 core181: Ship extrahd.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-01 08:17:12 +00:00
Stefan Schantl
15d9c996f9 extrahd.cgi: Add support for LVM and MDADM devices
This commit adds support for using LVM and mdadm based RAID devices
for the CGI page.

In case one or more drives/partitions are used by such a "grouped"
volume they still will displayed on the page, but can not be
configured/used. Instead the "master" volume of which the
drive/partition is part of is shown in the "mountpoint" input box.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-01 08:16:17 +00:00
Michael Tremer
3a7b9b7a2e Merge branch 'master' into next 2023-09-28 10:43:48 +00:00
Adolf Belka
a98abe9290 libslirp: Add the slirp library as this is required for the net user backend in qemu
- Looking through some of the changelog and some mail list communications it looks like
   qemu decided they did noty want to maintain their own bundled version of libslirp when
   the majority of OS's had their own version now in place. Ubuntu 18.04 did not have
   libslirp but qemu stopped supporting that version from qemu-7.1
- So it looks like all OS's have a standard libslirp available now and qemu have taken
   the decision to no longer have their own version but to use the system version. That
   was always possible to do if use of the system version was explicitly defined but
   the default was to use the bundled version.
- No evidence that libslirp is deprecated.
- The last version of libslirp was released a year ago but it looks like every month or
   so there are a couple of commits merged. The last was a month ago.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 10:42:22 +00:00
Adolf Belka
89604acef2 qemu-ga: Update to version 8.1.1
- Update from version 8.0.3 to 8.1.1
- Update of rootfile not required
- Changelog
    8.1
	https://wiki.qemu.org/ChangeLog/8.1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 10:42:22 +00:00
Adolf Belka
a38402929e qemu: Update to version 8.1.1 and add libslirp for net user backend
- Update from version 8.0.3 to 8.1.1
- In CU179 the update of qemu caused at least one user to have a problem starting his
   qemu system as the qemu bundled slirp library used for the net user backend was removed
   in version 7.2. Unfortunately no user tested qemu in the CU179 Testing phase, or if they
   did they are not using the net user backend.
- This patch adds the --enable-slirp option to configure and installs libslirp in a
   separate patch.
- I can't test if this now works as I don't use qemu anywhere.
- Changelog is too large to include here.
    8.1
	https://wiki.qemu.org/ChangeLog/8.1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 10:42:22 +00:00
Michael Tremer
91fe9748c9 core181: Ship URLFilter changes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:39:56 +00:00
Adolf Belka
cb741b5a66 urlfilter.cgi: Fixes bug#10649 - calls urlfilterctrl with remove option if update disabled
- When the url filter update enable checkbox is unchecked then this patch calls
   urlfilterctrl with the remove option added in the otrher patch of this series.
- Tested on my vm testbed that this change does remove the urlfilter symlink from the
   fcron directories when the update is disabled.

Fixes: Bug#10649
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:39:26 +00:00
Adolf Belka
01ed9ff321 urlfilterctrl: Fix bug#10649 - add option to remove urlfilter from fcron directories
- Currently if the urlfilter update is enabled then autoupdate.pl is renamed urlfilter and
   added into either the daily, weekly or monthly fcron directoiries. If the update is
   disabled then the urlfilter update script stays in the directory and is not removed.
- This patch adds in the option of remove to the urlfilterctrl program. The first part
   of the urlfilterctrl.c code removes any existing symlinks so all that needs to be done
   for the remove option is to not add any symlinks to the fcron directories.
- Confirmed in a vm testbed that the current approach leaves the symlink in place. Installed
   the changes from this and the previous patch and confirmed that when the url update is
   disabled the symlink is removed.

Fixes: Bug#10649
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:39:26 +00:00
Michael Tremer
94845e08bc core181: Fix arch-dependendant filelists
I created those in a wrong place :(

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:36:54 +00:00
Michael Tremer
461ad995ae core181: Ship OpenVPN changes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:35:33 +00:00
Adolf Belka
f8648b9563 update.sh: Adds code to update an existing ovpnconfig with pass or no-pass
- The code checks first if ovpnconfig exists and is not empty.
- Then it makes all net2net connections no-pass since they do not use encryption
- Then it cycles through all .p12 files and checks with openssl if a password exists or not.
   If a password is present then pass is added to index 41 and if not then no-pass is added
   to index 41
- I had to add a blank line to the top of the ovpnconfig file otherwise the awk code
   treated the first line as a blank line and missed it out of the update. This was the
   problem that was discovered during the previous Testing Release evaluation.
   Tested out this time with several existing entries both encrypted and insecure and with
   additional entries of both added in afterwards and all connection entries were
   maintained - road warrior and net2net.
- This code should be left in update.sh for future Core Updates in case people don't update
   with Core Update 175 but leave it till later. This code works fine on code that already
   has pass or no-pass entered into index 41 in ovpnconfig

Fixes: Bug#11048
Suggested-by: Erik Kapfer <ummeegge@ipfire.org>
Suggested-by: Adolf Belka <adolf.belka@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:34:23 +00:00
Adolf Belka
8e6bf12f14 web-user-interface: Addition of new icon for secure connection certificate download
- This uses a padlock icon from https://commons.wikimedia.org/wiki/File:Encrypted.png
- The license for this image is the following:-
   This library is free software; you can redistribute it and/or modify it under the terms
   of the GNU Lesser General Public License as published by the Free Software Foundation;
   either version 2.1 of the License, or (at your option) any later version. This library
   is distributed in the hope that it will be useful, but without any warranty; without
   even the implied warranty of merchantability or fitness for a particular purpose. See
   version 2.1 and version 3 of the GNU Lesser General Public License for more details.
- Based on the above license I believe it can be used by IPFire covered by the GNU General
   Public License that is used for it.
- The icon image was made by taking the existing openvpn.png file and superimposing the
   padlock icon on top of it as a 12x12 pixel format and naming it openvpn_encrypted.png

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:33:21 +00:00
Adolf Belka
475fd9e73a nl.pl: Change language text for secure icon wording
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:33:21 +00:00
Adolf Belka
e0efec97ca en.pl: Change language text for secure icon wording
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:33:21 +00:00
Adolf Belka
b725a6990f de.pl: Change language text for secure icon wording
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:33:21 +00:00
Adolf Belka
8c5e71db2a ovpnmain.cgi: Fix for bug#11048 - insecure download icon shown for connections with a password
- At long last I have re-visited the patch submission for bug #11048 and fixed the issues
   that caused the problems last time I evaluated it in Testing.
- The insecure package download icon is shown if entry 41 in /var/ipfire/ovpn/ovpnconfig
   is set to no-pass. The code block on ovpnmain.cgi that deals with this checks if the
   connection is a host and if the first password entry is a null. Then it adds no-pass
   to ovpnconfig.
- The same block of code is also used for when he connection is edited. However at this
   stage the password entry is back to null because the password value is only kept until
   the connection has been saved. Therefore doing an edit results in the password value
   being taken as null even for connections with a password.
- This fix enters no-pass if the connection type is host and the password is null, pass if
   the connection type is host and the password has characters. If the connection type is
   net then no-pass is used as net2net connections dop not have encrypted certificates.
- The code has been changed to show a different icon for unencrypted and encrypted
   certificates.
- Separate patches are provided for the language file change, the provision of a new icon
   and the code for the update.sh script for the Core Update to update all existing
   connections, if any exist, to have either pass or no-pass in index 41.
- This patch set was a joint collaboration between Erik Kapfer and Adolf Belka
- Patch set, including the code for the Core Update 180 update.sh script has been tested
   on a vm testbed

Fixes: Bug#11048
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Suggested-by: Adolf Belka <adolf.belka@ipfire.org>
Suggested-by: Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:33:21 +00:00
Arne Fitzenreiter
e5ad33d9ee kernel: update 6.1.53
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:29:29 +00:00
Arne Fitzenreiter
14bd32221e kernel: update to 6.1.52
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:29:23 +00:00
Michael Tremer
db1ffe0f5f Start Core Update 181 (with a kernel)
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:25:35 +00:00
Michael Tremer
4322d0c727 core180: Ship bind
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:19:07 +00:00
Matthias Fischer
0f334f0ef3 bind: Update to 9.16.44
For details see:
https://downloads.isc.org/isc/bind9/9.16.44/doc/arm/html/notes.html#notes-for-bind-9-16-44

Changes since 9.16.40:

9.16.44:
"Previously, sending a specially crafted message
over the control channel could cause the packet-parsing
code to run out of available stack memory, causing named
to terminate unexpectedly. This has been fixed. (CVE-2023-3341)"

9.16.43:
"Processing already-queued queries received over TCP could cause
an assertion failure, when the server was reconfigured at the
same time or the cache was being flushed. This has been fixed."

9.16.42:
"The overmem cleaning process has been improved, to prevent the
cache from significantly exceeding the configured max-cache-size
limit. (CVE-2023-2828)

A query that prioritizes stale data over lookup triggers a fetch
to refresh the stale data in cache. If the fetch is aborted for
exceeding the recursion quota, it was possible for named to enter
an infinite callback loop and crash due to stack overflow. This
has been fixed. (CVE-2023-2911)

Previously, it was possible for a delegation from cache to be
returned to the client after the stale-answer-client-timeout
duration. This has been fixed."

9.16.41:
"When removing delegations from an opt-out range, empty-non-terminal
NSEC3 records generated by those delegations were not cleaned up.
This has been fixed."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:18:47 +00:00
Michael Tremer
6d5aecef8c core180: Ship extrahd.pl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:18:12 +00:00
Arne Fitzenreiter
90147c2c33 extrahd: add forgotten udev_event handler to mount partitions via udev
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:17:46 +00:00
Michael Tremer
7f782be5e3 core180: Ship suricata
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-19 11:08:28 +00:00
Matthias Fischer
c7e583d0f2 suricata: Update to 6.0.14
Excerpt from changelog:

"6.0.14 -- 2023-09-13

Security #6289: Crash in SMTP parser during parsing of email (6.0.x backport)
Security #6196: process exit in hyperscan error handling  (6.0.x backport)
Security #6156: dcerpc: max-tx config parameter, also for UDP (6.0.x backport)
Bug #6285: community-id: Fix IPv6 address sorting not respecting byte order (6.0.x backport)
Bug #6248: Multi-tenancy: crash under test mode when tenant signature load fails (6.0.x backport)
Bug #6245: tcp: RST with data used in reassembly (6.0.x backport)
Bug #6236: if protocol dcerpc first packet type is Alter_context, it will not parse dcerpc (6.0.x backport)
Bug #6228: ips/af-packet: crash when copy-iface is the same as the interface (6.0.x backport)
Bug #6227: windows: lua script path truncated (6.0.x backport)
Bug #6226: Decode-events of IPv6 GRE are not triggered (6.0.x backport)
Bug #6224: base64: complete support for RFC2045 (6.0.x backport)
Bug #6220: Backport tenant_id conversion to uint32_t
Bug #6213: file.magic: rule reload can lead to crashes (6.0.x backport)
Bug #6193: smtp: Attachment not being md5 matched (6.0.x backport)
Bug #6192: smtp: use every byte to compute email.body_md5 (6.0.x backport)
Bug #6182: log-pcap: fix segfault on lz4 compressed pcaps (6.0.x backport)
Bug #6181: eve/alert: deprecated fields can have unexpected side affects (6.0.x backport)
Bug #6174: FTP bounce detection doesn't work for big-endian platforms (6.0.x backport)
Bug #6166: http2: fileinfo events log http2 object instead of http object as alerts and http2 do (6.0.x backport)
Bug #6139: smb: wrong offset when parse SMB_COM_WRITE_ANDX record (6.0.x backport)
Bug #6082: pcap: device reopen broken (6.0.x backport)
Bug #6068: pcap: memory leaks (6.0.x backport)
Bug #6045: detect: multi-tenancy leaks memory if more than 1 tenant registered (6.0.x backport)
Bug #6035: stream.midstream: if enabled breaks exception policy (6.0.x backport)
Bug #5915: rfb: parser returns error on unimplemented record types (6.0.x backport)
Bug #5794: eve: if alert and drop rules match for a packet, "alert.action" is ambigious (6.0.x backport)
Bug #5439: Invalid certificate when Issuer is not present.
Optimization #6229: Performance impact of Cisco Fabricpath (6.0.x backport)
Optimization #6203: detect: modernize filename fileext filemagic (6.0.x backport)
Optimization #6153: suricatasc: Gracefully handle unsupported commands (6.0.x backport)
Feature #6282: dns/eve: add 'HTTPS' type logging (6.0.x backport)
Feature #5935: ips: add 'master switch' to enable dropping on traffic (handling) exceptions (6.0.x backport)
Documentation #6234: userguide: add installation from Ubuntu PPA section (6.0.x backport)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-19 11:06:24 +00:00
Arne Fitzenreiter
f3d26496ac Merge remote-tracking branch 'origin/master' into next
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-09-17 12:25:01 +00:00
Arne Fitzenreiter
d1b4c380ef core179: add extrahd changes
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-09-17 12:14:56 +00:00
Arne Fitzenreiter
7c9f5f9882 extrahd: use udev rule to mount extrahd partitions
the previous patches for
https://bugzilla.ipfire.org/show_bug.cgi?id=12863
introduce a new bug that slow devices are not mounted
at boot. So now udev calls the extrahd script with
the uuid.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-09-17 12:10:42 +00:00
Peter Müller
13b04e6998 Tor: Do not attempt to establish connections via IPv6
To quote from the changelog of Tor 0.4.8.4:

  o Minor feature (client, IPv6):
    - Make client able to pick IPv6 relays by default now meaning
      ClientUseIPv6 option now defaults to 1. Closes ticket 40785.

In order to avoid any malfunctions on IPFire installations,
set this option to "0" explicitly.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-15 06:56:21 +00:00
Peter Müller
55f19d7eb1 Tor: Update to 0.4.8.5
Changes in version 0.4.8.5 - 2023-08-30
  Quick second release after the first stable few days ago fixing minor
  annoying bugfixes creating log BUG stacktrace. We also fix BSD compilation
  failures and PoW unit test.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on August 30, 2023.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2023/08/30.

  o Minor bugfix (NetBSD, compilation):
    - Fix compilation issue on NetBSD by avoiding an unnecessary
      dependency on "huge" page mappings in Equi-X. Fixes bug 40843;
      bugfix on 0.4.8.1-alpha.

  o Minor bugfix (NetBSD, testing):
    - Fix test failures in "crypto/hashx" and "slow/crypto/equix" on
      x86_64 and aarch64 NetBSD hosts, by adding support for
      PROT_MPROTECT() flags. Fixes bug 40844; bugfix on 0.4.8.1-alpha.

  o Minor bugfixes (conflux):
    - Demote a relay-side warn about too many legs to ProtocolWarn, as
      there are conditions that it can briefly happen during set
      construction. Also add additional set logging details for all
      error cases. Fixes bug 40841; bugfix on 0.4.8.1-alpha.
    - Prevent non-fatal assert stacktrace caused by using conflux sets
      during their teardown process. Fixes bug 40842; bugfix
      on 0.4.8.1-alpha.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-15 06:56:21 +00:00
Michael Tremer
636c25c0a7 core180: Ship logrotate.conf
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-15 06:54:39 +00:00
Peter Müller
b8769ed95b logrotate: Rotate wtmp files monthly, and keep them for a year
This prevents "last" being rendered unusable, and allows
for better and faster auditing of previous logins.

Fixes: #13322
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-15 06:53:43 +00:00
Michael Tremer
938f048b90 samba: Update aarch64 rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-13 18:18:49 +00:00
Stefan Schantl
fe2fd95a9e extrahd.cgi: Fix broken UUID check
This check was totaly broken and resulted into not beeing able to
configure/mount more than one extra harddrive.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-13 09:56:57 +00:00
Michael Tremer
492d197449 boost: Update aarch64 rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-13 09:31:21 +00:00
Stefan Schantl
66cb52cb0d extrahd.cgi: Fix broken UUID check
This check was totaly broken and resulted into not beeing able to
configure/mount more than one extra harddrive.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-13 09:28:25 +00:00
Adolf Belka
7de4ba0c8f sdl2: Update to version 2.28.3
- Update from version 2.28.1 to 2.28.3
- Update of rootfile
- Changelog
    2.28.3
       This is a stable bugfix release, with the following changes:
	    Added a gamepad mapping for the G-Shark GS-GP702
	    Fixed touchpad events for the Razer Wolverine V2 Pro in PS5 mode
	    Fixed getting key events from TV remotes on Android
	    Updated to Android minSdkVersion 19 and targetSdkVersion 34 to meet Google
	     Play Store requirements
    2.28.2
       This is a stable bugfix release, with the following changes:
	    Fixed occasionally failing to open the clipboard on Windows
	    Fixed crash at shutdown when using the D3D11 renderer
	    Fixed setting the viewport when using the D3D12 renderer
	    Fixed crash using SDL event functions before initializing SDL on Windows
	    Fixed Xbox controller trigger motion events on Windows
	    Fixed Xbox controller rumble in the background on Windows
	    Added the hint SDL_HINT_JOYSTICK_WGI to control whether to use
	     Windows.Gaming.Input for controllers
	    Fixed 8BitDo gamepad mapping when in XInput mode on Linux
	    Fixed controller lockup initializing some unofficial PS4 replica controllers
	    Fixed video initialization on headless Linux systems using VNC
	    Fixed large mouse jump when changing relative mouse mode on macOS
	    Fixed hardware keyboard text input on iPadOS

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:21:20 +00:00
Adolf Belka
d78109c511 samba: Update to version 4.19.0
- Update from version 2.18.5 to 2.19.0
- Update of rootfile for x86_64
- Changelog is too large to include here
    4.19.0
	See the WHATSNEW.txt file in the soiurce tarball
    4.18.6
	   * BUG 15420: reply_sesssetup_and_X() can dereference uninitialized tmp
			pointer.
	   * BUG 15430: Missing return in reply_exit_done().
	   * BUG 15289: post-exec password redaction for samba-tool is more reliable for
			fully random passwords as it no longer uses regular expressions
			containing the password value itself.
	   * BUG 9959:	Windows client join fails if a second container CN=System exists
			somewhere.
	   * BUG 15342: Spotlight sometimes returns no results on latest macOS.
	   * BUG 15417: Renaming results in NT_STATUS_SHARING_VIOLATION if previously
			attempted to remove the destination.
	   * BUG 15427: Spotlight results return wrong date in result list.
	   * BUG 15414: "net offlinejoin provision" does not work as non-root user.
	   * BUG 15400: rpcserver no longer accepts double backslash in dfs pathname.
	   * BUG 15433: cm_prepare_connection() calls close(fd) for the second time.
	   * BUG 15346: 2-3min delays at reconnect with smb2_validate_sequence_number:
			bad message_id 2.
	   * BUG 15441: samba-tool ntacl get segfault if aio_pthread appended.
	   * BUG 15446: DCERPC_PKT_CO_CANCEL and DCERPC_PKT_ORPHANED can't be parsed.
	   * BUG 15390: Python tarfile extraction needs change to avoid a warning
			(CVE-2007-4559 mitigation).
	   * BUG 15435: Regression DFS not working with widelinks = true.
	   * BUG 9959:	Windows client join fails if a second container CN=System exists
			somewhere.
	   * BUG 15441: samba-tool ntacl get segfault if aio_pthread appended.
	   * BUG 15449: mdssvc: Do an early talloc_free() in _mdssvc_open().

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:20:01 +00:00
Michael Tremer
b7bf0462c6 core180: Ship procps
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:19:13 +00:00