Commit Graph

9757 Commits

Author SHA1 Message Date
Peter Müller
74fe5c8673 libloc: Fix rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-13 11:32:48 +00:00
Peter Müller
9132bdd748 Core Update 167: Ship collectd initscript
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-13 09:24:15 +00:00
Michael Tremer
cad867506d c167: Ship vnstat
vnstat is linked against libgd which has had an SO bump and therefore
needs to be shipped again.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-13 08:10:16 +00:00
Peter Müller
cad2ce78dd Core Update 167: Replace /etc/mtab by symlink to /proc/self/mounts
mount, as updated via util-linux, no longer writes /etc/mtab, causing
programs to rely on this file's content (such as the check_disk Nagios
plugin) to stop working.

/proc/self/mounts contains all the necessary information, so it is fine
to replace /etc/mtab by a symlink to it.

Fixes: #12843

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 14:10:08 +00:00
Peter Müller
2506def0a6 Core Update 167: Export the location database again and reload the firewall
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 14:05:04 +00:00
Peter Müller
e0da038fc9 Core Update 167: Ship libloc
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 12:53:29 +00:00
Peter Müller
0db4fbe1b5 libloc: Update to 0.9.13
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 12:53:03 +00:00
Peter Müller
423e2e7f92 Core Update 167: Ship accidentally deleted Perl library again
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 11:57:07 +00:00
Peter Müller
1e0314afdf Merge branch 'next' of ssh://people.ipfire.org/pub/git/ipfire-2.x into next 2022-04-12 11:56:18 +00:00
Peter Müller
c8d047f562 Core Update 167: Do not delete a file that should not have been deleted
My fault, again.

Fixes: #12841

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 11:54:27 +00:00
Arne Fitzenreiter
95229400b3 core167: add code needed for kernel update
remove the old kernel and reconfigure bootscripts for arm boards
and run user scripts to switch to a new kernel.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-12 11:35:20 +02:00
Peter Müller
f4dca7f1af Core Update 167: Ship xz
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-11 19:02:43 +00:00
Arne Fitzenreiter
f1b0673572 kernel: arm rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-10 09:42:16 +02:00
Peter Müller
83c8662be8 Core Update 167: Ship gzip
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-09 07:39:45 +00:00
Peter Müller
5a9b650759 Core Update 167: Ship backupiso script
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 16:05:29 +00:00
Peter Müller
6238a7098d Core Update 167: Apply local SSH changes to configuration file
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 16:01:03 +00:00
Peter Müller
490e86f403 Core Update 167: Update linker config before calling GPG
This avoids log messages like:
ldconfig: /lib/ld-linux-x86-64.so.2 is not a symbolic link

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 15:59:25 +00:00
Peter Müller
c9b5a4756f Core Update 167: Ship and apply sysctl changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 15:58:41 +00:00
Arne Fitzenreiter
1d563665ed kernel: run make oldconfig
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-08 00:27:47 +02:00
Michael Tremer
855b46da2f core167: Ship coreutils
These have changed since they are now compiled with ACL/XATTR support

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-07 09:14:08 +00:00
Peter Müller
3f65e4996b kernel: Align rootfile again due to forgotten hardening patch
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 20:18:22 +00:00
Peter Müller
8e1a464d12 Kernel: Enable LSM support and set security level to "integrity"
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-06 20:04:04 +00:00
Peter Müller
afb2d2a23d Core Update 167: Ship getrrdimage.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:16:59 +00:00
Peter Müller
df76e77cfb Core Update 167: Ship header.pl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:16:15 +00:00
Leo-Andres Hofmann
4c19f2158e header.pl: Add translation to DHCP leases table
Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:15:50 +00:00
Peter Müller
af791343c7 Core Update 167: Ship sudo
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:15:02 +00:00
Peter Müller
e831404295 Core Update 167: Ship curl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:14:14 +00:00
Adolf Belka
94e8598ff3 ghostscript: Update to version 9.56.1
- Update from 9.55.0 to 9.56.1
- Update of rootfile
- Changelog
   Version 9.56.0 (2022-02-22)
     Highlights in this release include:
	    New PDF Interpreter: This is an entirely new implementation written in C
             (rather than PostScript, as before). For a full discussion of this change
             and reasons for it see: Changes Coming to the PDF Interpreter.
	    In this (9.56.0) release, the new PDF interpreter is now ENABLED by default
             in Ghostscript, but the old PDF interpreter can be used as a fallback by
             specifying -dNEWPDF=false. We've provided this so users that encounter
             issues with the new interpreter can keep working while we iron out those
             issues, the option will not be available in the long term.
	    This also allows us to offer a new executable (gpdf, or gpdfwin??.exe on
             Windows) which is purely for PDF input. For this release, those new binaries
             are not included in the "install" make targets, nor in the Windows installers.
	    Calling Ghostscript via the GS API is now thread safe. The one limitation is
             that the X11 devices for Unix-like systems (x11, x11alpha, x11cmyk, x11cmyk2,
             x11cmyk4, x11cmyk8, x11gray2, x11gray4 and x11mono) cannot be made thread
             safe, due to their interaction with the X11 server, those devices have been
             modified to only allow one instance in an executable.
	    The PSD output device now writes ICC profiles to their output files, for
             improved color fidelity.
	    Our efforts in code hygiene and maintainability continue.
	    The usual round of bug fixes, compatibility changes, and incremental
             improvements.
     Included below are incompatible changes from recent releases (the specific release
      in question is listed in parentheses). We include these, for now, as we are aware
      that not everyone upgrades with every release.
	    (9.55.0) Changes to the device API. This will affect developers and
                      maintainers of Ghostscript devices. Firstly, and most importantly,
                      the way device-specific "procs" are specified has been rewritten
                      to make it (we think!) clearer and less confusing. See The
                      Interface between Ghostscript and Device Drivers and The Great
                      Device Rework Of 2021 for more details.
	    (9.55.0) The command line options -sGraphicsICCProfile=___,
                      -dGraphicsIntent=#, -dGraphicsBlackPt=#, -dGraphicsKPreserve=# have
                      been changed to -sVectorICCProfile=___, -dVectorIntent=#,
                      -dVectorBlackPt=#, -dVectorKPreserve=#.
	    (9.53.0) As of 9.53.0, we have (re-)introduced the patch level to the
                      version number, this helps facilitate a revised policy on handling
                      security-related issues.
	    Note for GSView Users: The patch level addition breaks GSView 5 (it is
             hardcoded to check for versions 704-999. It is possible, but not guaranteed
             that a GSView update might be forthcoming to resolve this.
	    (9.52) -dALLOWPSTRANSPARENCY: The transparency compositor (and related
                    features), whilst we are improving it, remains sensitive to being
                    driven correctly, and incorrect use can have unexpected/undefined
                    results. Hence, as part of improving security, we limited access to
                    these operators, originally using the -dSAFER feature. As we made
                    "SAFER" the default mode, that became unacceptable, hence the new
                    option -dALLOWPSTRANSPARENCY which enables access to the operators.
	    (9.50) There are a couple of subtle incompatibilities between the old and
                    new SAFER implementations. Firstly, as mentioned in the 9.50 release
                    notes, SAFER now leaves standard PostScript functionality unchanged
                    (except for the file access limitations). Secondly, the interaction
                    with save/restore operations has changed. See SAFER.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:13:51 +00:00
Peter Müller
70a5c36be5 Core Update 167: Ship iproute2
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:13:14 +00:00
Peter Müller
51fa79c613 Core Update 167: Ship collectd-/graphs-related changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:05:35 +00:00
Bernhard Bitsch
d4ea277285 graphs.pl: Change directory name to replace HOSTILE with HOSTILE_DROP - fixes bug#12838
- The directory name for the hostile data was using HOSTILE while the chain was called
   HOSTILE_DROP. This resulted in the files in the directory not being updated.

Fixes: bug#12838
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-04-06 17:04:23 +00:00
Bernhard Bitsch
918ee09b3b collectd.conf: Change chain from HOSTILE to HOSTILE_DROP - fixes bug#12838
- Chain that was specified was HOSTILE but actual used is HOSTILE_DROP
- Using HOSTILE caused no update fro the hostile data used in the Firewall Hits graph

Fixes: bug#12838
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Acked-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-04-06 17:04:23 +00:00
Peter Müller
4fb7569811 linux: Update rootfile to reflect kernel hardening changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-05 08:42:00 +00:00
Peter Müller
1218b6a8b7 Core Update 167: Ship ddns
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-05 05:55:21 +00:00
Peter Müller
1b6f3fc548 Core Update 167: Ship smartmontools
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 20:17:14 +00:00
Peter Müller
be94980ab1 Core Update 167: Ship DHCP advoptions related files
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 20:10:23 +00:00
Adolf Belka
00a7a727d0 advoptions-list: Add domain-search to options - bug#12819
Fixes: bug#12819
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-04 20:09:41 +00:00
Peter Müller
6c8e6c0b8f Core Update 167: Ship unbound-dhcp-leases-bridge
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 20:08:41 +00:00
Michael Tremer
1918174dbb unbound-dhcp-leases-bridge: Don't open stderr on daemonization
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-04 20:07:15 +00:00
Michael Tremer
f961135513 unbound-dhcp-leases-bridge: Initialize logging after daemonization
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-04 20:07:15 +00:00
Michael Tremer
091cb62ada unbound-dhcp-leases-bridge: Read configuration only once
This saves some resources when we re-read the same configuration file
too often.

Suggested-by: Anthony Heading <ajrh@ajrh.net>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-04 20:07:15 +00:00
Michael Tremer
6d6e7949cf unbound-dhcp-leases-bridge: Fix inotify handling
This patch changes that the script will listen to changes to the
directory instead of the file which got complicated when files got
renamed.

It also processes all changes at the same time and tries finding out
what actions have to be performed in order to avoid unnecessary
iterations.

The script is also limited to process any changes only once every five
seconds to keep resource usage in check on busy systems.

Suggested-by: Anthony Heading <ajrh@ajrh.net>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-04 20:07:15 +00:00
Michael Tremer
29a3603610 unbound-dhcp-leases-bridge: Improve logging
This improves logging and enables logging to the console.

Suggested-by: Anthony Heading <ajrh@ajrh.net>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-04 20:07:15 +00:00
Peter Müller
d52a6280ec Revert "dvb-firmwares: Don't ship firmware that comes from linux-firmware"
This reverts commit 7ce3223dd8.

https://wiki.ipfire.org/devel/telco/2022-04-04
2022-04-04 20:06:31 +00:00
Peter Müller
9c3052d09d Revert "alsa: Do not ship compressed firmware again"
This reverts commit f0dc569d79.

https://wiki.ipfire.org/devel/telco/2022-04-04
2022-04-04 20:06:14 +00:00
Peter Müller
e121ee227e Core Update 167: Ship the Linux kernel
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 20:05:36 +00:00
Peter Müller
11925d6f9f Kernel: Enable SVA support for both Intel and AMD CPUs
Since running virtual machines is one of our legitimate use cases, it
makes sense to provide Qemu with the ability of taking advantage of
IOMMU support for safer virtuall memory allocation, if available.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-04 19:59:46 +00:00
Peter Müller
4f4422cc1c Kernel: Do not automatically load TTY line disciplines, only if necessary
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 19:59:39 +00:00
Peter Müller
bf2d8cb8a0 Kernel: Disable support for tracing block I/O actions
This is not needed on IPFire systems, and grsecurity recommends to turn
this off.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-04 19:59:15 +00:00
Peter Müller
26ca63592d Kernel: Set CONFIG_ARCH_MMAP_RND_BITS to 32 bits
This follows a recommendation by ClipOS, making ASLR bypassing attempts
harder.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-04 19:59:08 +00:00