Commit Graph

27 Commits

Author SHA1 Message Date
Peter Müller
9a7e4d8506 Switch checksums from MD5 to BLAKE2
Historically, the MD5 checksums in our LFS files serve as a protection
against broken downloads, or accidentally corrupted source files.

While the sources are nowadays downloaded via HTTPS, it make sense to
beef up integrity protection for them, since transparently intercepting
TLS is believed to be feasible for more powerful actors, and the state
of the public PKI ecosystem is clearly not helping.

Therefore, this patch switches from MD5 to BLAKE2, updating all LFS
files as well as make.sh to deal with this checksum algorithm. BLAKE2 is
notably faster (and more secure) than SHA2, so the performance penalty
introduced by this patch is negligible, if noticeable at all.

In preparation of this patch, the toolchain files currently used have
been supplied with BLAKE2 checksums as well on
https://source.ipfire.org/.

Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremeripfire.org>
2022-04-02 14:19:25 +00:00
Matthias Fischer
b13c41b9e4 wget: Update to 1.21.3
For details see:
https://lists.gnu.org/archive/html/info-gnu/2022-02/msg00017.html

"This is a minor bugfix release.

...

* Noteworthy changes in release 1.21.3 (2022-02-26)

** Fix computation of total bytes downloaded during FTP transfers (#61277)

** Add option to select TLS 1.3 on the command line

** Fix HSTS build issues on some 64-bit big-endian systems

** Hide password during status report in --no-verbose

** Remove a spurious print statement that showed up even during --quiet

** Some more cleanups and bug-fixes"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:44:36 +00:00
Adolf Belka
3203d975e3 wget: Update to version 1.21.2
- Update from 1.21.1 to 1.21.2
- Update of rootfile not required
- Changelog
   Noteworthy changes in release 1.21.2 (2021-09-07) - (user visible changes)
     * Support for autoconf 2.71
     * Fix a double free in FTP when using an absolute path
     * Release tarballs no longer have a dependency on Python.
     * --page-requisites will now also download links marked as "alternate
       stylesheet" or "icon"
   Full changelog is too long to include here but can be viewed in the ChangeLog file in
    the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2021-12-03 22:35:16 +01:00
Matthias Fischer
dff84c4fa3 wget: Update to 1.21.1
Sorry, no changelog found, only:
https://fossies.org/linux/wget/ChangeLog

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 16:48:45 +00:00
Matthias Fischer
888a21f928 wget: Update to 1.21
Sorry, no changelog found, only:
https://fossies.org/linux/wget/ChangeLog

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-01-03 11:18:23 +00:00
Matthias Fischer
ee44d509b6 wget: Update to 1.20.3
For details see:
https://fossies.org/linux/wget/ChangeLog

Excerpt from "NEWS":

"2019-04-05  Tim Ruehsen  <tim.ruehsen@gmx.de>

Fix a buffer overflow vulnerability
* src/iri.c(do_conversion): Reallocate the output buffer to a larger
  size if it is already full"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-06 16:08:53 +01:00
Matthias Fischer
7dd8193684 wget: Update to 1.20.2
For details see:
https://fossies.org/linux/wget/ChangeLog

Excerpt from "NEWS":

* Changes in Wget 1.20.2
** NTLM authentication will retry under certain cases
** Fixed a buffer overflow vulnerability"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-04 02:07:01 +01:00
Matthias Fischer
49deea707b wget: Update to 1.20.1
This is a bugfix release:

"due to some privacy issues in default settings of Wget, we introduce
this bugfix release.

The --xattr option (saving original URL and Referer into extended file
attributes) was introduced and enabled by default since Wget 1.19.
It possibly saved - possibly unrecognized by the user - credentials,
access tokes etc that were included in the requested URL.

We changed three details as a countermeasure, see below in the NEWS section.

With Best Regards, Tim

...

NEWS

* Changes in Wget 1.20.1

** --xattr is no longer default since it introduces privacy issues.

** --xattr saves the Referer as scheme/host/port,
user/pw/path/query/fragment
   are no longer saved to prevent privacy issues.

   ** --xattr saves the Original URL without user/password to prevent
      privacy issues."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-12-31 00:35:50 +00:00
Michael Tremer
de4f303186 core127: Ship updated unbound
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-12-11 19:46:10 +00:00
Matthias Fischer
c2e008880c wget: Update to 1.19.5
Hi,

Excerpts from official announcement:

"This version fixes CVE-2018-0494 (Cookie injection vulnerability) found
by Harry Sintonen.
This version fixes several issues, mostly found by OSS-Fuzz.
It also introduces TLS1.3 with OpenSSL, a new option --ciphers and
updates the CSS grammar to version 2.2.
...
Noteworthy changes:

* Fix cookie injection (CVE-2018-0494)
* Enable TLS1.3 with recent OpenSSL environment
* New option --ciphers to set GnuTLS / OpenSSL ciphers directly
* Updated CSS grammar to CSS 2.2
* Fixed several memleaks found by OSS-Fuzz
* Fixed several buffer overflows found by OSS-Fuzz
* Fixed several integer overflows found by OSS-Fuzz
* Several minor bug fixes"

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-05-07 11:34:24 +01:00
Michael Tremer
c2646dff80 Revert "wget: Link against GnuTLS instead of OpenSSL"
This reverts commit a46b159a8d.

wget 1.19.4 supports linking against OpenSSL 1.1.0.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-02-21 12:55:36 +00:00
Michael Tremer
a46b159a8d wget: Link against GnuTLS instead of OpenSSL
This version does not seem to be compatible with OpenSSL 1.1
and might be changed back to OpenSSL when ever it will compile.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-02-11 22:19:45 +00:00
Matthias Fischer
c5845b096d wget: Update to 1.9.4
Excerpts from changelog (Details => http://git.savannah.gnu.org/cgit/wget.git):

"Switch off compression by default

	Gzip compression has a number of bugs which need to be ironed out before we can support it
	by default. Some of these stem from a misunderstanding of the HTTP spec, but a lot of them
	are also due to many web servers not
	being compliant with RFC 7231.

	With this commit, I am marking GZip compression support as experimental
	in GNU Wget pending further investigation and the addition of tests.

	* src/http.c (gethttp): Fix bug that prevented all files from being decompressed

	* src/host.c (sufmatch): Fix to domain matching

	Replace HTTP urls with HTTPS where valid

	Avoid redirecting output to file when tcgetpgrp fails
	* src/log.c (check_redirect_output): tcgetpgrp can return -1 (ENOTTY),
	be sure to check whether a valid controlling terminal exists before
	redirecting. (Fixes: #51181)

	Fix heap overflow in HTTP protocol handling (CVE-2017-13090)

	Fix stack overflow in HTTP protocol handling (CVE-2017-13089)"

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-01-24 16:06:53 +00:00
Michael Tremer
770c2c5222 wget: Update file extension
Upstream does not distribute XZ compressed tarballs any more

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-11-02 15:38:11 +00:00
Michael Tremer
a016c0ce6a wget: Update to 1.19.2
Fixes CVE-2017-13089

A stack-based buffer overflow when processing chunked, encoded HTTP
responses was found in wget. By tricking an unsuspecting user into
connecting to a malicious HTTP server, an attacker could exploit
this flaw to potentially execute arbitrary code.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-10-29 18:33:03 +00:00
Matthias Fischer
ef784313d1 wget: Update to 1.19.1
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-02-15 09:29:18 +00:00
Matthias Fischer
6c31e0993c wget: Update to 1.19
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-02-03 18:08:57 +00:00
Matthias Fischer
e072f094e6 wget: Update to 1.18
Excerpt from annoncement:

"This version fixes a security vulnerability (CVE-2016-4971) present in
all old versions of wget.  The vulnerability was discovered by Dawid
Golunski which were reported to us by Beyond Security's SecuriTeam.

On a server redirect from HTTP to a FTP resource, wget would trust the
HTTP server and uses the name in the redirected URL as the destination
filename.
This behaviour was changed and now it works similarly as a redirect from
HTTP to another HTTP resource so the original name is used as
the destination file.  To keep the previous behaviour the user must
provide --trust-server-names."

Best,
Mat-backfromholidays-thias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-06-16 09:26:35 +01:00
Matthias Fischer
6118218c19 wget: Update to 1.17.1
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-06-16 09:26:31 +01:00
Matthias Fischer
9d1da799fa wget: Update to 1.16 2014-11-06 23:53:01 +01:00
Erik Kapfer
55e16317fd wget: Update to 1.14. 2013-12-26 14:03:31 +01:00
Michael Tremer
b7d60471a2 Remove tons of old uClibc/installer system related stuff. 2012-08-11 18:13:23 -04:00
ms
70df830214 Ein Paar Dateien fuer die GPLv3 angepasst.
git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@853 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2007-08-29 13:25:32 +00:00
ms
c78a77ebeb Alten PCMCIA Code aus dem Installer entfernt.
Unattended Installation bearbeitet.
HTTP/FTP-Installation nun moeglich.


git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@449 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2007-03-17 21:14:34 +00:00
ms
fd3e7da032 Zwischencommit fuer LFS.
git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@324 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-10-15 20:25:07 +00:00
ms
7a98bae5d3 Quellenupdate:
* tcpdump/glibc/wget/libpng/vlan/expect/vim
Programmupdate:
  * libpng 1.2.8 --> 1.2.12
  * dnsmasq 2.22 --> 2.33
Geandert:
  * Packager fuer Pakfire angepasst. (Namen mit Unterstrich)
  * Squid mit 2 Patches versehen.
  * Konsolentyp: xterm-color
Hinzugefuegt:
  * Subversion 1.3.1
  * IPTraf 3.0.0


git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@250 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-08-19 11:04:41 +00:00
ms
1fe6c87bf3 Update Squid to 2.5STABLE13.
Added WGET/HDDTEMP/BRIDGE-UTILS.
SCSI-GRUB-Konfiguration angepasst.



git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@85 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-03-26 18:46:32 +00:00