Commit Graph

20095 Commits

Author SHA1 Message Date
Arne Fitzenreiter
66e6b4542d strace: bump PAK_VER
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-01-08 10:08:33 +00:00
Arne Fitzenreiter
6535255270 kernel: update to 6.1.3
the kernel-6.1.x series should be the next lts series...
2023-01-08 10:08:33 +00:00
Arne Fitzenreiter
1641b60949 xradio: disabled build
im not sure if i can fix this next days, if not i will remove
the module. It only works on armv6l and is not widespread.
2023-01-08 10:08:33 +00:00
Arne Fitzenreiter
9c0582b2dc strace: update to 6.1
needed for kernel-6.1.x
2023-01-08 10:08:33 +00:00
Arne Fitzenreiter
aebf011248 rtl8821cu: update to 20210118-7b8c45a270454f05e2dbf3beeb4afcf817db65da
this is needed for kernel-6.1.x
2023-01-08 10:08:33 +00:00
Arne Fitzenreiter
d815ceed04 rtl8812au: update to 20210629-07ac856293e247347b891c5dbd13f3ab8321132d
this is needed for kernel-6.1.x
2023-01-08 10:08:33 +00:00
Arne Fitzenreiter
be88f0696e rtl8822bu: update to 20210702-2590672d717e2516dd2e96ed66f1037a6815bced
this is needed for kernel-6.1.x
2023-01-08 10:08:32 +00:00
Arne Fitzenreiter
f5be1e572f rtl8189fs: update to 476020109b3841421af289a7b78c7a25b0c45fac
this is needed for kernel 6.1.x
2023-01-08 10:08:32 +00:00
Arne Fitzenreiter
5cf1e265a9 rtl8189es: update to e58bd86c9d9408c648b1246a0dd76b16856ec172
this is needed for kernel 6.1.x
2023-01-08 10:08:32 +00:00
Arne Fitzenreiter
0c3838cb40 postfix: patch for build with kernel 6.x 2023-01-08 10:08:32 +00:00
Peter Müller
75650f7b32 Core Update 173: Ship openvpn-authenticator and restart OpenVPN
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-07 21:03:05 +00:00
Michael Tremer
3ee199871b openvpn-authenticator: Break read loop when daemon goes away
Fixes: #12963
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-07 21:01:48 +00:00
Michael Tremer
91abc6660a openvpn-authenticator: Avoid infinite loop when losing socket connection
This patch will gracefully terminate the daemon when it loses its
connection to the OpenVPN daemon.

Fixes: #12963
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-07 21:01:40 +00:00
Peter Müller
7214cdec29 Core Update 173: Ship relevant changes of linux-firmware
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 15:42:28 +00:00
Peter Müller
ed6310bc6a linux-firmware: Update to 20221214
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 15:31:32 +00:00
Peter Müller
0e18e19a87 linux: Update to 5.15.86
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 14:44:09 +00:00
Peter Müller
132e2f8f0c samba: Align 32-bit ARM rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 10:50:57 +00:00
Adolf Belka
a3e50a3f6c samba: Update to version 4.17.4
- Update from version 4.17.3 to 4.17.4
- Update of rootfile (Only the x86_64 rootfile updated with this patch)
- Changelog
    Release Notes for Samba 4.17.4
	This is the latest stable release of the Samba 4.17 release series.
	It also contains security changes in order to address the following defects:
		o CVE-2022-37966: This is the Samba CVE for the Windows Kerberos
		                  RC4-HMAC Elevation of Privilege Vulnerability
		                  disclosed by Microsoft on Nov 8 2022.
		                  A Samba Active Directory DC will issue weak rc4-hmac
		                  session keys for use between modern clients and servers
		                  despite all modern Kerberos implementations supporting
		                  the aes256-cts-hmac-sha1-96 cipher.
		                  On Samba Active Directory DCs and members
		                  'kerberos encryption types = legacy' would force
		                  rc4-hmac as a client even if the server supports
		                  aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
		                  https://www.samba.org/samba/security/CVE-2022-37966.html
		o CVE-2022-37967: This is the Samba CVE for the Windows
		                  Kerberos Elevation of Privilege Vulnerability
		                  disclosed by Microsoft on Nov 8 2022.
		                  A service account with the special constrained
		                  delegation permission could forge a more powerful
		                  ticket than the one it was presented with.
		                  https://www.samba.org/samba/security/CVE-2022-37967.html
		o CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the
		                  same algorithms as rc4-hmac cryptography in Kerberos,
		                  and so must also be assumed to be weak.
		                  https://www.samba.org/samba/security/CVE-2022-38023.html
		Note that there are several important behavior changes
		included in this release, which may cause compatibility problems
		interacting with system still expecting the former behavior.
		Please read the advisories of CVE-2022-37966,
		CVE-2022-37967 and CVE-2022-38023 carefully!
	samba-tool got a new 'domain trust modify' subcommand
		This allows "msDS-SupportedEncryptionTypes" to be changed
		on trustedDomain objects. Even against remote DCs (including Windows)
		using the --local-dc-ipaddress= (and other --local-dc-* options).
		See 'samba-tool domain trust modify --help' for further details.
	smb.conf changes
		  Parameter Name                               Description             Default
		  --------------                               -----------             -------
		  allow nt4 crypto                             Deprecated              no
		  allow nt4 crypto:COMPUTERACCOUNT             New
		  kdc default domain supported enctypes        New (see manpage)
		  kdc supported enctypes                       New (see manpage)
		  kdc force enable rc4 weak session keys       New                     No
		  reject md5 clients                           New Default, Deprecated Yes
		  reject md5 servers                           New Default, Deprecated Yes
		  server schannel                              Deprecated              Yes
		  server schannel require seal                 New, Deprecated         Yes
		  server schannel require seal:COMPUTERACCOUNT New
		  winbind sealed pipes                         Deprecated              Yes
    Changes since 4.17.3
	o  Jeremy Allison <jra@samba.org>
	   * BUG 15224: pam_winbind uses time_t and pointers assuming they are of the
	     same size.
	o  Andrew Bartlett <abartlet@samba.org>
	   * BUG 14929: CVE-2022-44640 [SECURITY] Upstream Heimdal free of
	     user-controlled pointer in FAST.
	   * BUG 15219: Heimdal session key selection in AS-REQ examines wrong entry.
	   * BUG 15237: CVE-2022-37966.
	   * BUG 15258: filter-subunit is inefficient with large numbers of knownfails.
	o  Ralph Boehme <slow@samba.org>
	   * BUG 15240: CVE-2022-38023.
	   * BUG 15252: smbd allows setting FILE_ATTRIBUTE_TEMPORARY on directories.
	o  Stefan Metzmacher <metze@samba.org>
	   * BUG 13135: The KDC logic arround msDs-supportedEncryptionTypes differs from
	     Windows.
	   * BUG 14611: CVE-2021-20251 [SECURITY] Bad password count not incremented
	     atomically.
	   * BUG 15203: CVE-2022-42898 [SECURITY] krb5_pac_parse() buffer parsing
	     vulnerability.
	   * BUG 15206: libnet: change_password() doesn't work with
	     dcerpc_samr_ChangePasswordUser4().
	   * BUG 15219: Heimdal session key selection in AS-REQ examines wrong entry.
	   * BUG 15230: Memory leak in snprintf replacement functions.
	   * BUG 15237: CVE-2022-37966.
	   * BUG 15240: CVE-2022-38023.
	   * BUG 15253: RODC doesn't reset badPwdCount reliable via an RWDC
	     (CVE-2021-20251 regression).
	o  Noel Power <noel.power@suse.com>
	   * BUG 15224: pam_winbind uses time_t and pointers assuming they are of the
	     same size.
	o  Anoop C S <anoopcs@samba.org>
	   * BUG 15198: Prevent EBADF errors with vfs_glusterfs.
	o  Andreas Schneider <asn@samba.org>
	   * BUG 15237: CVE-2022-37966.
	   * BUG 15243: %U for include directive doesn't work for share listing
	     (netshareenum).
	   * BUG 15257: Stack smashing in net offlinejoin requestodj.
	o  Joseph Sutton <josephsutton@catalyst.net.nz>
	   * BUG 15197: Windows 11 22H2 and Samba-AD 4.15 Kerberos login issue.
	   * BUG 15219: Heimdal session key selection in AS-REQ examines wrong entry.
	   * BUG 15231: CVE-2022-37967.
	   * BUG 15237: CVE-2022-37966.
	o  Nicolas Williams <nico@twosigma.com>
	   * BUG 14929: CVE-2022-44640 [SECURITY] Upstream Heimdal free of
	     user-controlled pointer in FAST.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:49:21 +00:00
Adolf Belka
40f45315b3 iperf: Update to version 2.1.8
- Update from version 2.1.7 to 2.1.8
- Update of rootfile not required
- Changelog
        2.1.8 (as of August 5th, 2022)
            o Add support for --bounceback to perform a repsonsiveness test (see man page for other options)
            o add support for working loads with --bounceback
            o Fix to wait_tick with Mac OS X
            o Various python pyflows commits
            o add support for client side tcp-write-time histograms and mean/min/max
            o add support for human readable dscp or -T values (see man page)
            o udp_accept no longer accepts packets from a previous run as a new connection, this can occur with long network delays
            o multiple isoch bug fixes for both UDP and TCP
            o isoch server provides mean/min/max/stdev for both frames and packets
            o UDP max MTU discovery, requires configure.ac will support --enable-discover-defaultlen prior to compile

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 10:48:21 +00:00
Adolf Belka
43692f1f2e iperf3: Update to version 3.12
- Update from version 3.10.1 to 3.12
- Update of rootfile not required
- patch to remove pg flag no longer needed. Source code no longer has pg flag set
   in CFLAGS
- Changelog
        iperf-3.12 2022-09-30
            * Notable user-visible changes
              * cJSON has been updated to version 1.7.15 (#1383).
              * The --bind <host>%<dev> option syntax now works properly (#1360 /
                #1371).
              * A server-side file descriptor leak with the --logfile option has
                been fixed (#1369 / #1360 / #1369 / #1389 / #1393).
              * A bug that caused some large values from TCP_INFO to be misprinted
                as negative numbers has been fixed (#1372).
              * Using the -k or -n flags with --reverse no longer leak into future
                tests (#1363 / #1364).
              * There are now various debug level options available with the
                --debug option. These can be used to adjust the amount of
                debugging output (#1327).
              * A new --snd-timeout option has been added to set a termination
                timeout for idle TCP connections (#1215 / #1282).
              * iperf3 is slightly more robust to out-of-order packets during UDP
                connection setup in --reverse mode (#914 / #1123 / #1182 / #1212 /
                #1260).
              * iperf3 will now use different ports for each direction when the
                --cport and --bdir options are set (#1249 / #1259).
              * The iperf3 server will now exit if it can't open its log file
                (#1225 / #1251).
              * Various help message and output fixes have been made (#1299 /
                #1330 / #1345 / #1350).
              * Various compiler warnings have been fixed (#1211 / #1316).
            * Developer-visible changes
              * Operation of bootstrap.sh has been fixed and simplified (#1335 /
                #1325).
              * Flow label support / compatibility under Linux has been improved
                (#1310).
              * Various minor memory leaks have been fixed (#1332 / #1333).
              * A getter/setter has been added for the bind_port parameter
                (--cport option). (#1303, #1305)
              * Various internal documentation improvements (#1265 / #1285 / #1304).
        iperf-3.11 2022-01-31
            * Notable user-visible changes
              * Update links to Discussions in documentation
              * Fix DSCP so that TOS = DSCP * 4 (#1162)
              * Fix --bind-dev for TCP streams (#1153)
              * Fix interface specification so doesn't overlap with IPv6 link-local
                addresses for -c and -B (#1157, #1180)
              * Add get/set test_unit_format function declaration to iperf_api.h
              * Auto adjustment of test-end condition for file transfers (-F), if no end
                condition is set, it will automatically adjust it to file size in bytes
              * Exit if idle time expires waiting for a connection in one-off mode (#1187,
                #1197)
              * Support zerocopy by reverse mode (#1204)
              * Update help and manpage text for #1157, support bind device
              * Consistently print target_bandwidth in JSON start section (#1177)
              * Test bitrate added to JSON output (#1168)
              * Remove fsync call after every write to receiving --file (#1176, #1159)
              * Update documentation for -w (#1175)
              * Fix for #952, different JSON object names for bidir reverse channel

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 10:48:10 +00:00
Peter Müller
76ac29d973 Core Update 173: Ship ipset
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 10:47:51 +00:00
Adolf Belka
a3fc79f127 ipset: Update to version 7.17
- Update from version 7.15 to 7.17
- Update of rootfile
- Changelog
        7.17
              - Tests: When verifying comments/timeouts, make sure entries don't expire
              - Tests: Make sure the internal batches add the correct number of elements
              - Tests: Verify that hash:net,port,net type can handle 0/0 properly
              - Makefile: Create LZMA-compressed dist-files (Phil Sutter)
        7.16
              - Add new ipset_parse_bitmask() function to the library interface
              - test: Make sure no more than 64 clashing elements can be added
                to hash:net,iface sets
              - netfilter: ipset: add tests for the new bitmask feature (Vishwanath Pai)
              - netfilter: ipset: Update the man page to include netmask/bitmask options
                (Vishwanath Pai)
              - netfilter: ipset: Add bitmask support to hash:netnet (Vishwanath Pai)
              - netfilter: ipset: Add bitmask support to hash:ipport (Vishwanath Pai)
              - netfilter: ipset: Add bitmask support to hash:ip (Vishwanath Pai)
              - netfilter: ipset: Add support for new bitmask parameter (Vishwanath Pai)
              - ipset-translate: allow invoking with a path name (Quentin Armitage)
              - Fix IPv6 sets nftables translation (Pablo Neira Ayuso)
              - Fix typo in ipset-translate man page (Bernhard M. Wiedemann)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 10:47:40 +00:00
Peter Müller
f91f287ccd Core Update 173: Ship iputils
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 10:47:15 +00:00
Adolf Belka
42b0bb0d7a iputils: Update to version 20221126
- Update from version 20210202 to 20221126
- Update of rootfile - none of the removed tools were in the rootfile
- Changelog
    20221126
	* removed tools (issue: #363)
		- ninfod (commit: 8f0d897, reason: experimental unused protocol)
		- rarpd  (commit: fba7b62, reason: superseded by DHCP protocol)
		- rdisc  (commit: 7447806, reason: superseded by DHCP protocol)
	* license
		- use SPDX identifiers for license names
	* tree
		- make _GNU_SOURCE mandatory (commit: 2410ed1, PR: #402)
	* arping
		- fix: exit 0 if running in deadline mode and we see replies (commit: 854873b,
		  PR: #395)
		- fix: check correct variable (commit: 8a6a2ce, PR: #395)
		- man: Mention IPv4 only and ndisc6(8) (commit: 6becbb3)
	* clockdiff
		- setcap-setuid.sh: Add cap_sys_nice for clockdiff (commit: 9139397, issue:
		  #326, #422)
		- document CAP_SYS_NICE requirement (PR: #416)
	* ping
		- feature: add option -C to call connect() before sending/receiving - useful
		  when using Path MTU Discovery (commit: 07eca4a, PR: #391)
		- feature: add option -e to set Identifier field for ICMP ECHO_REQUEST (commit:
		  43e38f2, PR: #426)
		- feature: print various debug info on -v (issue: #411)
		- feature: print config options on -V (PR: #432)
		- fix: -m (SO_MARK) in 32-bit archs (commit: fecf335, PR: #394, more fixes will
		  come next release)
		- fix: potential memory leakage on -p option (commit: 626ea66, PR: #409)
		- fix: socket error reporting (commit: bbe451f, issue: #406)
		- fix: make ping_rts struct static - fix occasional segfault (commit: 7861af9,
		  issue: #423)
		- fix: add SA_RESTART to sa_flags - avoid missing output in write on aarch64
		  (commit: 09f1b37, issue: #424)
		- security: drop capabilities for IPv4 (commit: 5990843, PR: #400)
		- print warning on missing '%'-notation (commit: c4b8b44, issue: #398, PR: #405)
		- man: add "IPV6 LINK-LOCAL DESTINATIONS" section (PR: #405)
		- man: use "ICMP datagram socket" (PR: #405)
	* CI
		- Debian: unstable -> testing (stability)
		- Ubuntu: xenial -> bionic, groovy -> jammy (EOL)
		- remove CentOS 8 (EOL, commit: 931504a)
	* localization
		- new translations: Georgian (by Temuri Doghonadze)
		- many updates
		- 100% translated: Czech, Finnish, Georgian, Korean, Turkish, Ukrainian
	* tests
		- don't fail when ip binary missing (issue: #383, PR: #390)
    20211215
	* removed tools (issue: #363)
		- tftpd: removing commit: 341975a, PR: #369
		  replacement:
		  - tftp-hpa (https://git.kernel.org/pub/scm/network/tftp/tftp-hpa.git)
		  - dnsmasq (https://thekelleys.org.uk/dnsmasq/doc.html)
		- traceroute6: removing commit: a139421, PR: #362
		  replacement:
		  - mtr (https://www.bitwizard.nl/mtr/)
		  - traceroute (http://traceroute.sourceforge.net/)
		  - tracepath (https://github.com/iputils/iputils/blob/master/tracepath.c)
		  WARNING: More tools (ninfod, rarpd, rdisc) are going to be removed in next
		  release, see issue: #363
	* Meson build system
		- require version 0.40 (due multiple install_dir for custom_target; commit: 65941ab)
	* arping
		- fix: ARP protocol field for AX.25 and NETROM (PR: #360)
	* clockdiff
		- fix man: remove duplicated word (PR: #384)
	* ninfod
		- fix: build with -DNINFOD_MESSAGES=false (commit: a0b3917)
		- systemd unit: add ProtectHostname, ProtectKernelLogs (PR: #375)
	* ping
		- fix: remove 'unsupported IPv6' warning on disabled IPv6 (issue: #293, PR: #370)
		- fix: ping6 binding to VRF and address (PR: #344)
		- fix: print reply from Subnet-Router anycast address (issue: #371)
		- fix: print reply with wrong source with warning (issue: #371)
		- fix: set mark (SO_MARK) on probe socket (PR: #340)
		- fix: man: update lowered minimum ping interval (issue: #367)
		- fix: mark is unsigned int, not signed (PR: #345)
	* rarpd
		- systemd unit: add ProtectHostname, ProtectKernelLogs (PR: #375)
	* rdisc
		- systemd unit: add ProtectHostname, ProtectKernelLogs (PR: #375)
	* localization
		- fix: add missing cs, id, ko languages (commit: be8f704)
		- new translations: Finnish, Korean
		- updated translations: German, Japanese, Turkish, Ukrainian
	* CI
		- add build with some non-default options (commit: c4a5373)
		- remove Tumbleweed (not only ocassional bugs: 086de3c, b19df68, but the way
		  how repos are published often breaks using it)
		- add latest CentOS (currently CentOS 8, commit: 5f3711e)
	* tests
		- add -V test for all binaries (commit: 802fade)
		- make tests optional with -DSKIP_TESTS=true (PR: #359)
    20210722
	* Meson build system
		- enable NO_SETCAP_OR_SUID by default
	* clockdiff
		- fix missing new line
	* ping
		- lower minimal interval for flooding to 2 (issue: #317)
		- revert f7710a1 ("Add strict pattern matching on response when pattern was
		  provided") to fix broken report of truncated packets (issue: #320, PR: #331)
	* rdisc
		- systemd unit: remove PrivateUsers=yes from systemd service file (issue: #314)
		- systemd unit: support /etc/default/rdisc environment file (for Debian, PR: #356)
		- systemd unit: Add DynamicUser=yes (PR: #358)
		- systemd unit: add CAP_NET_ADMIN capability (PR: #351)
		- Add support for capability/setuid (PR: #347, #348) NOTE: This is strongly
		  discouraged as normal uses could possibly modify routing tables, recommended
		  way is to run it as systemd service which does not require it to be enabled.
		  It's added just for non-systemd users, which should run allow it to run just
		  for dedicated user.
		- set correct caps in setcap-setuid.sh
	* traceroute6
		- mention -V in usage() (PR: #323)
	* localization
		- new translations: Czech (100%), Indonesian (94%)
		- updated translations: Portuguese (Brazil, 95%), Indonesian (94%), French:
		  (58%), Chinese (Simplified, 53%)
		- fully translated languages in this release: Czech, Turkish, Ukrainian
	* CI
		- migrate from Travis CI to GitHub Actions (PR: #336)
		- add very basic ping testing (issue: #338, PR: #243)
		- skip tests on Ubuntu Xenial (commit: 9833cae)
		- various build.sh improvements
	* tests
		- skip tests on disabled IPv6 (commit: f10bfd8)
		- fix: flood ping test should pass on root (commit: 3dff080)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 10:47:09 +00:00
Peter Müller
e84dcf0603 Core Update 173: Ship iw
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 10:46:48 +00:00
Adolf Belka
4425ffbf92 iw: Update to version 5.19
- Update from version 5.9 to 5.19
- Update of rootfile not required
- Changelog is not avaqilable in the source tarball or on the iw website. Details of
   changes only available by reviewing all commits between the two versions in the git
   repository
   https://git.kernel.org/pub/scm/linux/kernel/git/jberg/iw.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 10:46:36 +00:00
Peter Müller
00ab0f1cc7 Core Update 173: Ship json-c and things depending on it
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-01-05 10:41:34 +00:00
Adolf Belka
dceaa04f00 vdr_streamdev: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
bcea7b84fd vdr: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
f57daa573e tshark: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
f805230df6 samba: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
a1c0f7fa9c qemu: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
884e65b54e python3-urllib3: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
90a7005ead pmacct: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
100ba375ab oci-python-sdk: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
d3cd3427f4 oci-cli: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
afd1db6670 nmap: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
2c659b0580 nagios-plugins: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
3227129d7b libvirt: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
4b3d3c9fa4 libusbredir: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
eb0054fa5d keepalived: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
a743b8eccc icinga: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
b493875f9e hostapd: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Adolf Belka
3da462d2d3 gnump3d: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:58 +00:00
Adolf Belka
c055f0cd91 ghostscript: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:58 +00:00
Adolf Belka
d14dc41b70 frr: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:58 +00:00
Adolf Belka
b760be6597 freeradius: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:58 +00:00
Adolf Belka
261e3f9563 cups-filters: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:58 +00:00
Adolf Belka
275f0fb7e5 cups: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:58 +00:00
Adolf Belka
da3e277493 clamav: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:58 +00:00