Commit Graph

8809 Commits

Author SHA1 Message Date
Arne Fitzenreiter
757ed7dbc1 core175: ship libpcap
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-03 07:34:21 +00:00
Matthias Fischer
237b88914d libpcap: Update to 1.10.4
For details see:
https://git.tcpdump.org/libpcap/blob/HEAD:/CHANGES#l50

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-03 07:28:37 +00:00
Arne Fitzenreiter
c58a9c0347 samba: aarch64 rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-02 19:36:38 +00:00
Arne Fitzenreiter
edb153e209 kernel: arm64 rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-02 19:36:25 +00:00
Arne Fitzenreiter
37dee2c459 core175: ship led and partresize initskripts
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-02 19:35:27 +00:00
Arne Fitzenreiter
8b251380b6 u-boot: add OrangePi R1 Plus LTS
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-02 19:33:28 +00:00
Arne Fitzenreiter
2b1a701ec4 kernel: add OrangePi R1 Plus LTS
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-02 19:33:16 +00:00
Arne Fitzenreiter
f55ea781c3 core175: ship rules.pl
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-02 19:32:15 +00:00
Peter Müller
092ff6670a apr: Update rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-25 12:35:52 +00:00
Peter Müller
3380f8563b Core Update 175: Ship u-boot
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 19:02:23 +00:00
Peter Müller
87e90e2164 Fix typo in aarch64 linux rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 19:01:24 +00:00
Arne Fitzenreiter
acb3aa6abd kernel: add nanopi r2c patches
https://git.ipfire.org/?p=people/arne_f/kernel.git;a=commit;h=4a06c119e0065bf8794a98bd21a71ff6236d32d1
https://git.ipfire.org/?p=people/arne_f/kernel.git;a=commit;h=716f69f11cf3bf328453cc3e284d5bce7feb9a0e

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-04-24 19:00:45 +00:00
Arne Fitzenreiter
0a7f6097bc u-boot: add nanopi r2c support
this patch add nanopi r2c plus support.
if this u-boot is installed on the eMMC this is also
supported.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-04-24 19:00:34 +00:00
Peter Müller
7930119dda Core Update 175: Ship apr
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:59:40 +00:00
Peter Müller
905a77279b Core Update 175: Fix file permissions of /var/log/pakfire.log on existing installations
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:57:05 +00:00
Adolf Belka
23320dc554 samba: Update to version 4.18.1
- Update from version 4.17.5 to 4.18.1
- Update of rootfile
   some libraries now use x86-64 instead of x86_64 but most are still left with x86_64
   Good thing that we create a separate version of the rootfile for each architecture
   because it is no longer just the arm version that is unique but also the x86_64 one.
- Since version 4.17.0 it has been possible to do a build excluding SMB1 server capability.
   As SMB1 is insecure and has known exploits including ransomeware based ones it seems
   reasonable to build samba without SMB1 server capability for use on a firewall.
   The option to build wiythout SMB1 server capability has been added to the LFS file.
- Changelog
    Release Notes for Samba 4.18.1
	This is a security release in order to address the following defects:
	   o CVE-2023-0225: An incomplete access check on dnsHostName allows authenticated
	                    but otherwise unprivileged users to delete this attribute from
	                    any object in the directory.
	                    https://www.samba.org/samba/security/CVE-2023-0225.html
	   o CVE-2023-0922: The Samba AD DC administration tool, when operating against a
	                    remote LDAP server, will by default send new or reset
	                    passwords over a signed-only connection.
	                    https://www.samba.org/samba/security/CVE-2023-0922.html
	   o CVE-2023-0614: The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919
	                    Confidential attribute disclosure via LDAP filters was
	                    insufficient and an attacker may be able to obtain
	                    confidential BitLocker recovery keys from a Samba AD DC.
	                    Installations with such secrets in their Samba AD should
	                    assume they have been obtained and need replacing.
	                    https://www.samba.org/samba/security/CVE-2023-0614.html
	   * BUG 15276: CVE-2023-0225.
	   * BUG 15270: CVE-2023-0614.
	   * BUG 15331: ldb wildcard matching makes excessive allocations.
	   * BUG 15332: large_ldap test is inefficient.
	   * BUG 15315: CVE-2023-0922.
	   * BUG 15270: CVE-2023-0614.
	   * BUG 15276: CVE-2023-0225.
    Release Notes for Samba 4.18.0
	    NEW FEATURES/CHANGES
	      SMB Server performance improvements
		The security improvements in recent releases
		(4.13, 4.14, 4.15, 4.16), mainly as protection against symlink races,
		caused performance regressions for metadata heavy workloads.
		While 4.17 already improved the situation quite a lot,
		with 4.18 the locking overhead for contended path based operations
		is reduced by an additional factor of ~ 3 compared to 4.17.
		It means the throughput of open/close
		operations reached the level of 4.12 again.
	     More succinct samba-tool error messages
		Historically samba-tool has reported user error or misconfiguration by
		means of a Python traceback, showing you where in its code it noticed
		something was wrong, but not always exactly what is amiss. Now it
		tries harder to identify the true cause and restrict its output to
		describing that. Particular cases include:
		 * a username or password is incorrect
		 * an ldb database filename is wrong (including in smb.conf)
		 * samba-tool dns: various zones or records do not exist
		 * samba-tool ntacl: certain files are missing
		 * the network seems to be down
		 * bad --realm or --debug arguments
	     Accessing the old samba-tool messages
		This is not new, but users are reminded they can get the full Python
		stack trace, along with other noise, by using the argument '-d3'.
		This may be useful when searching the web.
		The intention is that when samba-tool encounters an unrecognised
		problem (especially a bug), it will still output a Python traceback.
		If you encounter a problem that has been incorrectly identified by
		samba-tool, please report it on https://bugzilla.samba.org.
	     Colour output with samba-tool --color
		For some time a few samba-tool commands have had a --color=yes|no|auto
		option, which determines whether the command outputs ANSI colour
		codes. Now all samba-tool commands support this option, which now also
		accepts 'always' and 'force' for 'yes', 'never' and 'none' for 'no',
		and 'tty' and 'if-tty' for 'auto' (this more closely matches
		convention). With --color=auto, or when --color is omitted, colour
		codes are only used when output is directed to a terminal.
		Most commands have very little colour in any case. For those that
		already used it, the defaults have changed slightly.
		 * samba-tool drs showrepl: default is now 'auto', not 'no'
		 * samba-tool visualize: the interactions between --color-scheme,
		   --color, and --output have changed slightly. When --color-scheme is
		   set it overrides --color for the purpose of the output diagram, but
		   not for other output like error messages.
	     New samba-tool dsacl subcommand for deleting ACES
		The samba-tool dsacl tool can now delete entries in directory access
		control lists. The interface for 'samba-tool dsacl delete' is similar
		to that of 'samba-tool dsacl set', with the difference being that the
		ACEs described by the --sddl argument are deleted rather than added.
	     No colour with NO_COLOR environment variable
		With both samba-tool --color=auto (see above) and some other places
		where we use ANSI colour codes, the NO_COLOR environment variable will
		disable colour output. See https://no-color.org/ for a description of
		this variable. `samba-tool --color=always` will use colour regardless
		of NO_COLOR.
	     New wbinfo option --change-secret-at
		The wbinfo command has a new option, --change-secret-at=<DOMAIN CONTROLLER>
		which forces the trust account password to be changed at a specified domain
		controller. If the specified domain controller cannot be contacted the
		password change fails rather than trying other DCs.
	     New option to change the NT ACL default location
		Usually the NT ACLs are stored in the security.NTACL extended
		attribute (xattr) of files and directories. The new
		"acl_xattr:security_acl_name" option allows to redefine the default
		location. The default "security.NTACL" is a protected location, which
		means the content of the security.NTACL attribute is not accessible
		from normal users outside of Samba. When this option is set to use a
		user-defined value, e.g. user.NTACL then any user can potentially
		access and overwrite this information. The module prevents access to
		this xattr over SMB, but the xattr may still be accessed by other
		means (eg local access, SSH, NFS). This option must only be used when
		this consequence is clearly understood and when specific precautions
		are taken to avoid compromising the ACL content.
	     Azure Active Directory / Office365 synchronisation improvements
		Use of the Azure AD Connect cloud sync tool is now supported for
		password hash synchronisation, allowing Samba AD Domains to synchronise
		passwords with this popular cloud environment.
	    REMOVED FEATURES
	     smb.conf changes
		  Parameter Name                          Description     Default
		  acl_xattr:security_acl_name             New             security.NTACL
		  server addresses                        New
	    CHANGES SINCE 4.18.0rc4
		   * BUG 15314: streams_xattr is creating unexpected locks on folders.
		   * BUG 15310: New samba-dcerpc architecture does not scale gracefully.
	    CHANGES SINCE 4.18.0rc3
		   * BUG 15308: Avoid that tests fail because other tests didn't do cleanup on
		     failure.
		   * BUG 15311: fd_load() function implicitly closes the fd where it should not.
	    CHANGES SINCE 4.18.0rc2
		   * BUG 15301: Improve file_modtime() and issues around smb3 unix test.
		   * BUG 15299: Spotlight doesn't work with latest macOS Ventura.
		   * BUG 15298: Build failure on solaris with tevent 0.14.0 (and ldb 2.7.0).
		     (tevent 0.14.1 and ldb 2.7.1 are already released...)
		   * BUG 15307: vfs_ceph incorrectly uses fsp_get_io_fd() instead of
		     fsp_get_pathref_fd() in close and fstat.
		   * BUG 15291: test_chdir_cache.sh doesn't work with SMBD_DONT_LOG_STDOUT=1.
		   * BUG 15301: Improve file_modtime() and issues around smb3 unix test.
	    CHANGES SINCE 4.18.0rc1
		   * BUG 10635: Office365 azure Password Sync not working.
		   * BUG 15286: auth3_generate_session_info_pac leaks wbcAuthUserInfo.
		   * BUG 15293: With clustering enabled samba-bgqd can core dump due to use
		     after free.
    Release Notes for Samba 4.17.7
	This is a security release in order to address the following defects:
	   o CVE-2023-0225: An incomplete access check on dnsHostName allows authenticated
	                    but otherwise unprivileged users to delete this attribute from
	                    any object in the directory.
	                    https://www.samba.org/samba/security/CVE-2023-0225.html
	   o CVE-2023-0922: The Samba AD DC administration tool, when operating against a
	                    remote LDAP server, will by default send new or reset
	                    passwords over a signed-only connection.
	                    https://www.samba.org/samba/security/CVE-2023-0922.html
	   o CVE-2023-0614: The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919
	                    Confidential attribute disclosure via LDAP filters was
	                    insufficient and an attacker may be able to obtain
	                    confidential BitLocker recovery keys from a Samba AD DC.
	                    Installations with such secrets in their Samba AD should
	                    assume they have been obtained and need replacing.
	                  https://www.samba.org/samba/security/CVE-2023-0614.html
	   * BUG 15276: CVE-2023-0225.
	   * BUG 15270: CVE-2023-0614.
	   * BUG 15331: ldb wildcard matching makes excessive allocations.
	   * BUG 15332: large_ldap test is inefficient.
	   * BUG 15315: CVE-2023-0922.
	   * BUG 14810: CVE-2020-25720 [SECURITY] Create Child permission should not
	     allow full write to all attributes (additional changes).
	   * BUG 15270: CVE-2023-0614.
	   * BUG 15276: CVE-2023-0225.
    Release Notes for Samba 4.17.6
	   * BUG 15314: streams_xattr is creating unexpected locks on folders.
	   * BUG 10635: Use of the Azure AD Connect cloud sync tool is now supported for
	     password hash synchronisation, allowing Samba AD Domains to synchronise
	     passwords with this popular cloud environment.
	   * BUG 15299: Spotlight doesn't work with latest macOS Ventura.
	   * BUG 15310: New samba-dcerpc architecture does not scale gracefully.
	   * BUG 15307: vfs_ceph incorrectly uses fsp_get_io_fd() instead of
	     fsp_get_pathref_fd() in close and fstat.
	   * BUG 15293: With clustering enabled samba-bgqd can core dump due to use
	     after free.
	   * BUG 15311: fd_load() function implicitly closes the fd where it should not.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-24 18:54:55 +00:00
Peter Müller
bcf6760ab4 Core Update 175: Ship parted
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:54:28 +00:00
Adolf Belka
2336495142 parted: Update to version 3.6
- Update from version 3.5 to 3.6
- Update of rootfile
- Changelog
    Noteworthy changes in release 3.6 (2023-04-10) [stable]
	  Promoting alpha release to stable release 3.6
    Noteworthy changes in release 3.5.28 (2023-03-24) [alpha]
	New Features
	  Support GPT partition attribute bit 63 as no_automount flag.
	  Add type commands to set type-id on MS-DOS and type-uuid on GPT.
	  Add swap flag support to the dasd disklabel
	  Add display of GPT disk and partition UUIDs in JSON output
	Bug Fixes
	  Fix use of enums in flag limits by switching to using #define
	  Fix ending sector location when using kibi IEC suffix

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-24 18:54:21 +00:00
Peter Müller
3881852592 Core Update 175: Ship libgcrypt
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:53:27 +00:00
Adolf Belka
b47528525d libgcrypt: Update to version 1.10.2
- Update from version 1.10.1 to 1.10.2
- Update of rootfile
- Changelog
	Noteworthy changes in version 1.10.2 (2023-04-06)  [C24/A4/R2]
	 * Bug fixes:
	   - Fix Argon2 for the case output > 64.  [rC13b5454d26]
	   - Fix missing HWF_PPC_ARCH_3_10 in HW feature.  [rCe073f0ed44]
	   - Fix RSA key generation failure in forced FIPS mode.  [T5919]
	   - Fix gcry_pk_hash_verify for explicit hash.  [T6066]
	   - Fix a wrong result of gcry_mpi_invm.  [T5970]
	   - Allow building with --disable-asm for HPPA.  [T5976]
	   - Fix Jitter RNG for building native on Windows.  [T5891]
	   - Allow building with -Oz.  [T6432]
	   - Enable the fast path to ChaCha20 only when supported.  [T6384]
	   - Use size_t to avoid counter overflow in Keccak when directly
	     feeding more than 4GiB.  [T6217]
	 * Other:
	   - Do not use secure memory for a DRBG instance.  [T5933]
	   - Do not allow PKCS#1.5 padding for encryption in FIPS mode.
	     [T5918]
	   - Fix the behaviour for child process re-seeding in the DRBG.
	     [rC019a40c990]
	   - Allow verification of small RSA signatures in FIPS mode.  [T5975]
	   - Allow the use of a shorter salt for KDFs in FIPS mode.  [T6039]
	   - Run digest+sign self tests for RSA and ECC in FIPS mode.
	     [rC06c9350165]
	   - Add function-name based FIPS indicator function.
	     GCRYCTL_FIPS_SERVICE_INDICATOR_FUNCTION.  This is not considered
	     an ABI changes because the new FIPS features were not yet
	     approved.  [rC822ee57f07]
	   - Improve PCT in FIPS mode.  [rC285bf54b1a, rC4963c127ae, T6397]
	   - Use getrandom (GRND_RANDOM) in FIPS mode.  [rCcf10c74bd9]
	   - Disable RSA-OAEP padding in FIPS mode.  [rCe5bfda492a]
	   - Check minimum allowed key size in PBKDF in FIPS mode.
	     [T6039,T6219]
	   - Get maximum 32B of entropy at once in FIPS mode.  [rCce0df08bba]
	   - Prefer gpgrt-config when available.  [T5034]
	   - Mark AESWRAP as approved FIPS algorithm.  [T5512]
	   - Prevent usage of long salt for PSS in FIPS mode.  [rCfdd2a8b332]
	   - Prevent usage of X9.31 keygen in FIPS mode.  [rC392e0ccd25]
	   - Remove GCM mode from the allowed FIPS indicators.  [rC1540698389]
	   - Add explicit FIPS indicators for hash and MAC algorithms. [T6376]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-24 18:53:16 +00:00
Peter Müller
3b8c341807 Core Update 175: Ship libgpg-error
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:52:52 +00:00
Adolf Belka
71a5008927 libgpg-error: Update to version 1.47
- Update from version 1.46 to 1.47
- Update of rootfile
- Changelog
	Noteworthy changes in version 1.47 (2023-04-06) [C34/A34/R0]
	 * New error codes for PUKs and reset codes.  [T6421]
	 * Avoid segv in logging with improper use of the "socket://".
	   [rE68333be630]
	 * Fixed translation of argparse's internal option --help.
	   [rE885a287a57]
	 * Interface changes relative to the 1.46 release:
	 GPG_ERR_SOURCE_TKD             NEW.
	 GPG_ERR_BAD_PUK                NEW.
	 GPG_ERR_NO_RESET_CODE	        NEW.
	 GPG_ERR_BAD_RESET_CODE	        NEW.
	 GPGRT_SPAWN_KEEP_STDIN         NEW.
	 GPGRT_SPAWN_KEEP_STDOUT        NEW.
	 GPGRT_SPAWN_KEEP_STDERR        NEW.
	 GPGRT_SPAWN_INHERIT_FILE       NEW.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-24 18:52:37 +00:00
Arne Fitzenreiter
e50648971a pcengines-apu-firmwares: readd latest apu1 firmware to the package
If a user have missed the update a while the apu1 cannot updated because this
file is missing.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-04-24 18:51:53 +00:00
Matthias Fischer
d92134b818 unbound: Update to 1.17.1
For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-17-1

"Features

    Expose 'statistics-inhibit-zero' as a configuration option; the default
    value retains Unbound's behavior.
    Expose 'max-sent-count' as a configuration option; the default value
    retains Unbound's behavior.
    Merge #461 from Christian Allred: Add max-query-restarts option.
    Exposes an internal configuration but the default value retains
    Unbound's behavior.
    Merge #569 from JINMEI Tatuya: add keep-cache option to
    'unbound-control reload' to keep caches.

Bug Fixes

    Merge #768 from fobser: Arithmetic on a pointer to void is a GNU
    extension.
    In unit test, print python script name list correctly.
    testcode/dohclient sets log identity to its name.
    Clarify the use of MAX_SENT_COUNT in the iterator code.
    Fix that cachedb does not store failures in the external cache.
    Merge #767 from jonathangray: consistently use IPv4/IPv6 in
    unbound.conf.5.
    Fix to ignore tcp events for closed comm points.
    Fix to make sure to not read again after a tcp comm point is closed.
    Fix #775: libunbound: subprocess reap causes parent process reap to
    hang.
    iana portlist update.
    Complementary fix for distutils.sysconfig deprecation in Python 3.10 to
    commit 62c5039ab9da42713e006e840b7578e01d66e7f2.
    Fix #779: [doc] Missing documention in ub_resolve_event() for callback
    parameter was_ratelimited.
    Ignore expired error responses.
    Merge #720 from jonathangray: fix use after free when WSACreateEvent()
    fails.
    Fix for the ignore of tcp events for closed comm points, preserve the
    use after free protection features.
    Fix #782: Segmentation fault in stats.c:404.
    Add SVCB and HTTPS to the types removed by 'unbound-control flush'.
    Clear documentation for interactivity between the subnet module and the
    serve-expired and prefetch configuration options.
    Fix #773: When used with systemd-networkd, unbound does not start until
    systemd-networkd-wait-online.service times out.
    Merge #808: Wrap Makefile script's directory variables in quotes.
    Fix to wrap Makefile scripts directory in quotes for uninstall.
    Fix windows compile for libunbound subprocess reap comm point closes.
    Update github workflows to use checkout v3.
    Fix wildcard in hyperlocal zone service degradation, reported by Sergey
    Kacheev."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-04-24 18:46:36 +00:00
Peter Müller
2739210a03 Core Update 175: Ship firewall initscript and restart firewall
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:45:53 +00:00
Michael Tremer
bf4da9c80f dnsdist: Update to 1.8.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-04-24 18:42:10 +00:00
Peter Müller
1b85b0195f Core Update 175: Ship and restart Apache
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:41:09 +00:00
Peter Müller
20d7057fb7 Core Update 175: Remove powertop add-on, if installed
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:38:13 +00:00
Adolf Belka
149cd8971a powertop: Remove this addon as it does not work without debug_fs enabled
- powertop requires debug_fs to be enabled in the kernel for it to function. In Core
   Update 171 debug_fs was disabled as a security risk for a firewall application.
- Based on the above powertop has stopped functioning since Core Update 171. Discussed
   at IPFire Developers monthly conf call for April and agreed to remove the addon as
   debug_fs will not be re-enabled.
- removal of lfs and rootfiles and removal of powertop line in make.sh

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2023-04-24 18:37:01 +00:00
Peter Müller
cfdd96e798 Core Update 175: Ship packages depending on OpenSSL
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:22:25 +00:00
Peter Müller
653c04a9db freeradius: Update to 3.0.26
This is necessary for updating OpenSSL to 3.1.x

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:13:12 +00:00
Peter Müller
3873bf9bc1 Core Update 175: Ship OpenSSL
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:11:45 +00:00
Peter Müller
489e0494dc OpenSSL: Update to 3.1.0
In a future Core Update, the following remnants of OpenSSL 1.1.1 need to
be removed:

/usr/lib/engines-1.1/afalg.so
/usr/lib/engines-1.1/capi.so
/usr/lib/engines-1.1/padlock.so
/usr/lib/libcrypto.so.1.1
/usr/lib/libssl.so.1.1

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-24 18:09:50 +00:00
Peter Müller
3274424ad9 Core Update 175: Ship relevant changes of linux-firmware
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-19 13:46:59 +00:00
Peter Müller
962c7bf244 linux-firmware: Update to 20230404
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-19 13:46:29 +00:00
Peter Müller
0179bff8ea Core Update 175: Ship kernel and regenerate initial ramdisks locally
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-19 10:21:34 +00:00
Peter Müller
6aa0837d24 linux: Update to 6.1.24
Compiling the kernel has automatically introduced
CONFIG_INIT_STACK_ALL_ZERO=y and removed GCC's structleak plugin (not to
be confused with its stackleak counterpart). However, according to
related documentation, this neither introduces a security nor
performance disadvantage.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-04-19 09:33:38 +00:00
Peter Müller
c9130cbf1c Core Update 175: Ship xfsprogs
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-18 21:24:43 +00:00
Peter Müller
8cffa30021 Core Update 175: Remove any orphaned menue files on existing installations
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-18 21:23:50 +00:00
Adolf Belka
d330a6803e housekeeping: removal of menu items for no longer available addons
- removal of EX-addonsvc.menu entry in config/menu/ as the lfs file for this could not be
   found in the IPFire git repo all the way back to CU30
- removal of EX-addonsvc.menu, EX-asterisk.menu and EX-bluetooth.menu which are no longer
   in IPfire for two years or longer.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:21:58 +00:00
Peter Müller
b566f40d47 Core Update 175: Ship bash
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-18 21:21:07 +00:00
Adolf Belka
cf2d231d36 aws-cli: Update to version 1.27.100
- Update from version 1.23.12 to 1.27.100
- Update of rootfile
- Changelog is over 2000 lines long. For details please see the CHNGELOG.rst file in the
   source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:20:11 +00:00
Adolf Belka
931324b1a4 ghostscript: Update to version 10.01.1
- Update from version 10.0.0 to 10.01.1
- Update of rootfile
- Changelog highlights is only shown in the website. For more details of the changes made
   you bhave to go and look at the commit log
   https://git.ghostscript.com/?p=ghostpdl.git;a=shortlog;h=refs/heads/master
Version 10.01.0 (2023-03-22)
   Highlights in this release include:
	    We've continued to improve the performance of the PDF interpreter written in
             C and improve it's behaviour in edge and out-of-specification cases.
	    Our efforts in code hygiene and maintainability continue.
	    The usual round of bug fixes, compatibility changes, and incremental
             improvements.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:19:38 +00:00
Peter Müller
d78c4b07c0 Core Update 175: Ship arping
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-18 21:19:06 +00:00
Peter Müller
ed0d38cf62 Core Update 175: Ship aprutil and restart Apache
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-18 21:18:30 +00:00
Adolf Belka
ece70b1fcc aprutil: Update to version 1.6.3
- Update from version 1.6.1 to 1.6.3
- Update of rootfile
- Changelog
1.6.3
  *) Correct a packaging issue in 1.6.2. The contents of the release were
     correct, but the top level directory was misnamed.
1.6.2
  *) SECURITY: CVE-2022-25147 (cve.mitre.org)
     Integer Overflow or Wraparound vulnerability in apr_base64 functions
     of Apache Portable Runtime Utility (APR-util) allows an attacker to
     write beyond bounds of a buffer.
  *) Teach configure how to find and build against MariaDB 10.2. PR 61517
     [Kris Karas <bugs-a17 moonlit-rail.com>]
  *) apr_crypto_commoncrypto: Remove stray reference to -lcrypto that
     prevented commoncrypto being enabled. [Graham Leggett]
  *) Add --tag=CC to libtool invocations. PR 62640. [Michael Osipov]
  *) apr_dbm_gdbm: Fix handling of error codes. This makes gdbm 1.14 work.
     apr_dbm_gdbm will now also return error codes starting with
     APR_OS_START_USEERR, as apr_dbm_berkleydb does, instead of always
     returning APR_EGENERAL. [Stefan Fritsch]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:17:23 +00:00
Peter Müller
9d18cb65b2 Core Update 175: Ship acpid
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-18 21:16:53 +00:00
Adolf Belka
dd5a9f733a acpid: Update to version 2.0.34
- Update from version 2.0.32 to 2.0.34
- Update of rootfile
- Changelog
2.0.34  2022-09-15  Ted Felix <ted@tedfelix.com>
  - 2.0.34 release
    (configure.ac)  (Ted Felix)
  - Add MSG_CMSG_CLOEXEC for systems that are missing it.
    (libnetlink.h libnetlink.c kacpimon/libnetlink.h
    kacpimon/libnetlink.c)
    (Fabrice Fontaine <fontaine.fabrice@gmail.com>)
  - Fix a bug with input layer event table not working on 32-bit builds
    with 64-bit time types.  (input_layer.c)  (Ted Felix)
  - Use binary search to find input layer events in the table.
    (input_layer.c)  (Ted Felix)
  - Use AC_PROG_CC instead of the obsolete AC_PROG_CC_STDC.
    (configure.ac)  (Ted Felix)
  - Add support for more input layer events.  (input_layer.c)
    (Ted Felix)
2.0.33  2021-09-15  Ted Felix <ted@tedfelix.com>
  - 2.0.33 release
    (configure.ac)  (Ted Felix)
  - Detect newer GNOME power manager.
    (powerbtn.sh)  (Andrey Utkin <andrey_utkin@gentoo.org>)
  - openrc-shutdown: Set shutdown time to 'now'.
    (powerbtn.sh)  (Jonathan Davies <jpds@protonmail.com>)
  - Attempt to open input layer devices whose permissions have changed.
    (inotify_handler.c)  (Torsten Hilbrich <torsten.hilbrich@secunet.com>)
  - Comments added.
    (TESTPLAN inotify_handler.c)  (Ted Felix)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:16:24 +00:00
Adolf Belka
077a55f4f9 7zip: Update to version 17.05
- Update from version 17.04 to 17.05
- Update of rootfile
- Changelog
Version 17.05
	- add UTF-8 support for Client7z
	- fix issue 130

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-04-18 21:16:10 +00:00
Peter Müller
626069cb9b Core Update 175: Ship slang
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-04-18 21:15:50 +00:00