Commit Graph

15531 Commits

Author SHA1 Message Date
Michael Tremer
7d8a116a41 core154: Ship ca-certificates
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-21 21:30:05 +00:00
Peter Müller
96adf682bc update ca-certificates CA bundle
Update the CA certificates list to what Mozilla NSS ships currently.

The original file can be retrieved from:
https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-21 21:29:38 +00:00
Michael Tremer
4af97be302 core154: Ship dhcp.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-21 16:48:51 +00:00
Adolf Belka
9dbf3c4936 Fix for bug 10743
This adds in the option to have "deny known clients" in dhcpd.conf
This is applied to the range command so applies to the dynamic addresses
given.
If you have just a range statement say in blue then if you are not using
vlans you could have the situation where a known host in green might end
up getting a lease from the blue range. Here a deny known-clients makes
sense. Your range in this case would be limited to only unknown clients if
deny known-clients was selected.
dhcp WUI has been modified to add in this command. Error message has been
added to check that a range has been specified if the deny unknown clients
checkbox has been selected.
Language files updated with additional items (English, German & Dutch).

For more information on the history of this please see the bugzilla entry
Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-21 16:48:01 +00:00
Adolf Belka
fef289cef7 dehydrated: Update to 0.7.0
- Update dehydrated from 0.6.5 to 0.7.0
- No changes to the rootfiles
- This update patch also addresses bug #12425
	The changes from the interim patch mentioned in bug #12425 are included into this update
- Changes for all releases can be found at https://github.com/dehydrated-io/dehydrated/releases
- Changes for this version update
    Added
	Support for external account bindings
	Special support for ZeroSSL
	Support presets for some CAs instead of requiring URLs
	Allow requesting preferred chain (--preferred-chain)
	Added method to show CAs current terms of service (--display-terms)
	Allow setting path to domains.txt using cli arguments (--domains-txt)
	Added new cli command --cleanupdelete which deletes old files instead of archiving them

    Fixed
	No more silent failures on broken hook-scripts
	Better error-handling with KEEP_GOING enabled
	Check actual order status instead of assuming it's valid
	Don't include keyAuthorization in challenge validation (RFC compliance)

    Changed
	Using EC secp384r1 as default certificate type
	Use JSON.sh to parse JSON
	Use account URL instead of account ID (RFC compliance)
	Dehydrated now has a new home: https://github.com/dehydrated-io/dehydrated
	Added OCSP_FETCH and OCSP_DAYS to per-certificate configurable options
	Cleanup now also removes dangling symlinks

Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-21 16:35:15 +00:00
Adolf Belka
9cea690a93 htop: Update to 3.0.3
- Update htop from 3.0.2 to 3.0.3
	See the Change Log for details of changes
	https://github.com/htop-dev/htop/blob/master/ChangeLog
- Rootfiles updated

Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-21 16:35:10 +00:00
Adolf Belka
9ee802c508 hplip: Update to 3.20.11
- Update from 3.18.6 to 3.20.11 (16 updates)
- See Release notes for bug fixes and support for additional printers
	https://sourceforge.net/p/hplip/news/
- Update of rootfile :-)

Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-20 09:47:04 +00:00
Matthias Fischer
34081d2f23 bind: Update to 9.11.26
For details see:
https://downloads.isc.org/isc/bind9/9.11.26/RELEASE-NOTES-bind-9.11.26.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-20 09:46:42 +00:00
Michael Tremer
60aab42a63 Revert "htop: Update to 3.0.3"
This reverts commit ce26b2a364.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-20 09:46:16 +00:00
Michael Tremer
8e3c15e687 Revert "dhcpcd: Update to 9.3.4"
This reverts commit 64dfe75142.

This version does not run in i686 as reported in #12552.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-18 16:57:29 +00:00
Adolf Belka
f6ede20a62 acpid: Update to 2.0.32
- Update acpid from 2.0.28 to 2.0.32
- Full changelog is available in the source file.
        2.0.29  2018-04-16  Ted Felix <ted@tedfelix.com>
          - 2.0.29 release
            (configure.ac)  (Ted Felix)
          - Decouple -d and -f options.  Bug #15.
            (acpid.8 acpid.c acpid.h log.c log.h TESTPLAN) (Casper Ti. Vector)
          - Rename acpid_debug -> debug_level.
            (acpid.c event.c log.c log.h) (Ted Felix)
          - Standards: man page command references.
            (acpid.8 kacpimon/kacpimon.8) (Ted Felix)
          - Log missing input layer as a warning.
            (inotify_handler.c) (Ted Felix)
        2.0.30  2018-07-18  Ted Felix <ted@tedfelix.com>
          - 2.0.30 release
            (configure.ac)  (Ted Felix)
          - configure: Don't use AC_FUNC_MALLOC, AC_FUNC_REALLOC.
            (configure.ac)  (Robin Gloster <mail@glob.in>)
          - samples: powerbtn: extend the list of known PMS
            (powerbtn.sh)  (Andrey Utkin <andrey_utkin@gentoo.org>)
          - samples: powerbtn: fix kde4 power management detection
            (powerbtn.sh)  (Andrey Utkin <andrey_utkin@gentoo.org>)
        2.0.31  2018-11-15  Ted Felix <ted@tedfelix.com>
          - 2.0.31 release
            (configure.ac)  (Ted Felix)
          - Add events for keyboard illumination up/down
            (input_layer.c)  (Lars-Dominik Braun)
          - kacpimon: Bump connection limit to 100
            Debian #909399
            (kacpimon/connection_list.c)  (Ted Felix)
        2.0.32  2019-08-15  Ted Felix <ted@tedfelix.com>
          - 2.0.32 release
            (configure.ac)  (Ted Felix)
          - Remove filename argument from --nosocket option
            Bug #17
            (acpid.c acpid.8)  (Ted Felix)
          - Fix race during startup
            Bug #18.  Debian #933230.
            (acpid.c input_layer.c)  (anomie)
- No change to rootfile

Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-18 16:57:29 +00:00
Adolf Belka
4714077564 bird: Update to 2.0.7
Update bird from 2.0.6 to 2.0.7
Changes from changelog
- BGP: Fix reconfiguration with import table
       *Change of some options requires route refresh, but when import table is
	active, channel reload is done from it instead of doing full route
	refresh. So in this case we request it internally.
- Doc: Minor documentation fixes
- Nest: Handle non-MPLS on MPLS case in recursive route update
       *When non-MPLS recursive route resolves to MPLS underlying route,
	then it should get MPLS labels from the the underlying route.
- Nest: Handle PtP links in recursive route update
       *Underlying (IGP) route may lead to PtP link, in this case it does not
	need gateway. Which is different than direct route without gateway.
       *When recursive (BGP) route uses PtP route, it should not use recursive
	next hop as immediate next hop, while for direct routes it should.
- Nest: Fix recursive route update
       *Missing cleanup can lead to dangling pointer to old next hops.

Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-18 09:50:11 +00:00
Adolf Belka
ce26b2a364 htop: Update to 3.0.3
Update htop from 3.0.2 to 3.0.3
See the Change Log for details of changes
	https://github[.]com/htop-dev/htop/blob/master/ChangeLog
Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-18 09:45:44 +00:00
Michael Tremer
d7f3843d67 core154: Ship sqlite
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-18 09:45:32 +00:00
Adolf Belka
58303fb9f0 sqlite: Update to 3.34.0
-Update sqlite from 3.26.0 to 3.34.0
	See https://sqlite[.]org/chronology[.]html for history between
	these releases.
-Have reviewed all release notes between these two releases and there
	are no deprecations.
-No change to rootfile.
Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-18 09:40:53 +00:00
Arne Fitzenreiter
7e09bcbc45 dracut: add hyperv-keyboard module to initrd.
the missing module should be the reason for not responding setup on some
hyper-v configurations.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-17 17:10:04 +00:00
Michael Tremer
e6575e1a58 Merge branch 'master' into next 2020-12-16 10:33:36 +00:00
Michael Tremer
c4f1f56157 Update contributors
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-16 10:33:23 +00:00
Arne Fitzenreiter
d310d24eef kernel: update to 4.14.212
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-16 10:03:45 +00:00
Matthias Fischer
78a45ae10a libhtp: Update to 0.5.36
For details see:
https://github.com/OISF/libhtp/releases

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-16 10:00:10 +00:00
Matthias Fischer
3b8e39553d suricata: Downgrade to 5.0.5
Triggered by https://lists.ipfire.org/pipermail/development/2020-December/008868.html

Workaround for https://bugzilla.ipfire.org/show_bug.cgi?id=12548

Downgrading to 'suricata 5.0.5' bypasses Bug #12548 for now,
but its only a temporary workaround...

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-16 09:58:56 +00:00
Michael Tremer
b954ae2750 core154: Ship libhtp
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-14 09:35:37 +00:00
Matthias Fischer
ea7a9a4b2f libhtp: Update to 0.5.36
For details see:
https://github.com/OISF/libhtp/releases

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-14 09:35:19 +00:00
Michael Tremer
a410004c61 shairport-sync: Update to 3.3.7
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 13:18:26 +00:00
Michael Tremer
c840462153 core154: Ship PAM
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 13:04:38 +00:00
ummeegge
904b8b6259 Pam: Update to version 1.5.1
Several fixes and improvements since the current available 1.3.1 version are included.
CVE-2020-27780 has also been fixed.
For a full release overview --> https://github.com/linux-pam/linux-pam/releases .

Signed-off-by: ummeegge <erik.kapfer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 13:03:18 +00:00
Michael Tremer
babe229390 core154: Ship unbound
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 13:03:07 +00:00
Matthias Fischer
5fd8c3e1f5 unbound: Update to 1.13.0
For details see:
https://lists.nlnetlabs.nl/pipermail/unbound-users/2020-December/007102.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 13:02:21 +00:00
Michael Tremer
ebbda8ed86 core154: Ship dhcpcd
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 13:01:45 +00:00
Matthias Fischer
64dfe75142 dhcpcd: Update to 9.3.4
For details see:
https://roy.marples.name/blog/dhcpcd-9-3-4-released.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 13:01:05 +00:00
Michael Tremer
8d3135455f core154: Ship bind
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 13:00:51 +00:00
Matthias Fischer
fde5772fde bind: Update to 9.11.25
For details see:
https://downloads.isc.org/isc/bind9/9.11.25/RELEASE-NOTES-bind-9.11.25.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 13:00:29 +00:00
Michael Tremer
d7f93218b1 core154: Ship services.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 13:00:06 +00:00
Adolf Belka
d978558809 Fix for bug 12539
The installer recognises cups and cups-filters both as cups and puts
two instances of cups in the add-on services table.
Based on input from Michael Tremer this patch replaces the command
returning the second element between hyphens with one that takes
what comes after "meta-" using Perl code rather than a shell command.
The second find command was changed as per Michael's suggestion.

Tested in my ipfire test bed system and only results in one cups
entry.
Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 12:59:42 +00:00
ummeegge
50752f1b61 kerberos: Update to version 1.18.3
Since version 1.15.2 several fixes and enhancements has been introduced.
For a full overview the release notes can be found in the next lines.

https://web.mit.edu/kerberos/krb5-1.16/
https://web.mit.edu/kerberos/krb5-1.17/
https://web.mit.edu/kerberos/krb5-1.18/

Signed-off-by: ummeegge <erik.kapfer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 12:32:11 +00:00
ummeegge
14baf8472a tshark: Update to version 3.4.0
- Since tshark uses since 3.4.0 an always enabled asynchronous DNS
resolution, c-ares is a needed dependency.
- Since the current actual version 3.2.6 a lot of bug fixes, fixed
vulnerabilities, updated features, new protocols but also updated
protocols has been integrated.
A full overview of all changes can be found in here -->
Update to version 3.2.7:
https://www.wireshark.org/docs/relnotes/wireshark-3.2.7.html
Update to version 3.2.8:
https://www.wireshark.org/docs/relnotes/wireshark-3.2.8.html
Update to version 3.4.0
https://www.wireshark.org/docs/relnotes/wireshark-3.4.0.html

Signed-off-by: ummeegge <erik.kapfer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 12:31:15 +00:00
ummeegge
d44ce7d4c2 c-ares: New package. Needed as tshark Dependency
- Since tshark uses with version 3.4.0 an always enabled asynchronous DNS
resolution c-ares is a needed dependency.
- Since curl can also use c-ares --> https://c-ares.haxx.se/ it has been
placed in make.sh before curl even no compiletime options has been set
to enable this. c-ares has also been placed in packages and not in common
which would be needed if it should be used for curl too.

Signed-off-by: ummeegge <erik.kapfer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 12:30:24 +00:00
Matthias Fischer
ca4ce96800 nano: Update to 5.4
For details see:
https://www.nano-editor.org/news.php

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 12:30:12 +00:00
Matthias Fischer
0f4d1a8e6b monit: Update to 5.27.1
For details see:
https://mmonit.com/monit/changes/

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 12:29:15 +00:00
Adolf Belka
c2f02d9d59 bacula: Update to use IPFire initscript
Bacula install used the bacula initscript for starting and stopping bacula.
This works fine but results in no pid or memory input in the addons table
under services.
Using the IPFire initscript also successfully starts and stops bacula with
no problems but also provides the pid and memory information in the services
addons table.
- rootfiles adjusted to remove the reference to bacula-ctl-fd
- lfs/bacula adjusted to remove the init.d/bacula link generation
             remove the "rm -f /root/.rnd" command. This file is not present
             and I have not seen this command in any other lfs file that I
             have looked at.
- new bacula initscript created

Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 12:28:58 +00:00
Michael Tremer
86a7c165a1 Start Core Update 154
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 12:28:12 +00:00
Arne Fitzenreiter
eaa9032166 core153: add ddns.cgi to update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-08 17:40:57 +00:00
Stefan Schantl
00e1105b92 ddns.cgi: Drop static provider list for token based auth.
This is really hard to maintain when adding new or altering existing
providers.

Reference #12415.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-08 17:40:03 +00:00
Arne Fitzenreiter
a99b73211a core153: add openssl to updater
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-08 18:33:47 +01:00
Arne Fitzenreiter
591738dc5c openssl: update to 1.1.1i
fix: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)

Severity: High

The X.509 GeneralName type is a generic type for representing different types
of names. One of those name types is known as EDIPartyName. OpenSSL provides a
function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME
to see if they are equal or not. This function behaves incorrectly when both
GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash
may occur leading to a possible denial of service attack.

OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes:
1) Comparing CRL distribution point names between an available CRL and a CRL
   distribution point embedded in an X509 certificate
2) When verifying that a timestamp response token signer matches the timestamp
   authority name (exposed via the API functions TS_RESP_verify_response and
   TS_RESP_verify_token)

If an attacker can control both items being compared then that attacker could
trigger a crash. For example if the attacker can trick a client or server into
checking a malicious certificate against a malicious CRL then this may occur.
Note that some applications automatically download CRLs based on a URL embedded
in a certificate. This checking happens prior to the signatures on the
certificate and CRL being verified. OpenSSL's s_server, s_client and verify
tools have support for the "-crl_download" option which implements automatic
CRL downloading and this attack has been demonstrated to work against those
tools.

Note that an unrelated bug means that affected versions of OpenSSL cannot parse
or construct correct encodings of EDIPARTYNAME. However it is possible to
construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence
trigger this attack.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-08 18:27:00 +01:00
Arne Fitzenreiter
4aae5f819a kernel: update to 4.14.211
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-08 18:26:37 +01:00
Arne Fitzenreiter
8372d89000 vdr: version 2.4.4 still use plugin API 2.4.3
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-05 10:09:03 +00:00
Arne Fitzenreiter
4e5a35c123 Merge branch 'next' into master
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-03 12:56:02 +00:00
Arne Fitzenreiter
e1253a4d34 rootfile-check: exclude gdb
gdb always contain aarch64 in a syscall list.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-12-03 07:50:41 +01:00
Arne Fitzenreiter
b689391f27 Merge branch 'next' of git.ipfire.org:/pub/git/ipfire-2.x into next 2020-12-02 23:43:15 +01:00