Commit Graph

2981 Commits

Author SHA1 Message Date
Adolf Belka
1b16f712c6 ipset: Update to version 7.15
- Update from 7.11 to 7.15
- Update of rootfile
- Changelog
	7.15
	    Kernel part changes
	        netfilter: ipset: Fix maximal range check in hash_ipportnet4_uadt()
	7.14
	    Userspace changes
	        Add missing function to libipset.map and bump library version
	    Kernel part changes
	        64bit division isn't allowed on 32bit, replace it with shift
	7.13
	    Userspace changes
	        When parsing protocols by number, do not check it in /etc/protocols.
	        Add missing hunk to patch "Allow specifying protocols by number"
	    Kernel part changes
	        Limit the maximal range of consecutive elements to add/delete fix
	7.12
	    Userspace changes
	        Allow specifying protocols by number
	        Fix example in ipset.8 manpage
	        tests: add tests ipset to nftables
	        add ipset to nftables translation infrastructur
	        lib: Detach restore routine from parser
	        lib: split parser from command execution
	        Fix patch "Parse port before trying by service name"
	    Kernel part changes
	        Limit the maximal range of consecutive elements to add/delete
	        Backport "netfilter: use nfnetlink_unicast()"
	        Backport "netfilter: nfnetlink: consolidate callback type"
	        Backport "netfilter: nfnetlink: add struct nfnl_info and pass it to
                 callbacks"
	        Backport "netfilter: add helper function to set up the nfnetlink header
                 and use it"

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-04-24 14:17:14 +00:00
Adolf Belka
f5ebb58ab4 harfbuzz: Update to version 4.2.0
- Update from 3.4.0 to 4.2.0
- Update of rootfile
- Changelog
   Overview of changes leading to 4.2.0
     Wednesday, March 30, 2022
	- Source code reorganization, splitting large hb-ot-layout files into smaller,
	  per-subtable ones under OT/Layout/*. Code for more tables will follow suit in
	  later releases. (Garret Rieger, Behdad Esfahbod)
	- Revert Indic shaper change in previous release that broke some fonts and
	  instead make per-syllable restriction of “GSUB” application limited to
	  script-specific Indic features, while applying them and discretionary
	  features in one go. (Behdad Esfahbod)
	- Fix decoding of private in gvar table. (Behdad Esfahbod)
	- Fix handling of contextual lookups that delete too many glyphs. (Behdad Esfahbod)
	- Make “morx” deleted glyphs don’t block “GPOS” application. (Behdad Esfahbod)
	- Various build fixes. (Chun-wei Fan, Khaled Hosny)
	- New API
	   +hb_set_next_many() (Andrew John)
   Overview of changes leading to 4.1.0
     Wednesday, March 23, 2022
	- Various OSS-Fuzz fixes. (Behdad Esfahbod)
	- Make fallback vertical-origin match FreeType’s. (Behdad Esfahbod)
	- Treat visible viramas like dependent vowels in USE shaper. (David Corbett)
	- Apply presentation forms features and discretionary features in one go in
	  Indic shaper, which seems to match Uniscribe and CoreText behaviour.
	  (Behdad Esfahbod, David Corbett)
	- Various bug fixes.
	- New API
	   +hb_set_add_sorted_array() (Andrew John)
   Overview of changes leading to 4.0.1
     Friday, March 11, 2022
	- Update OpenType to AAT mappings for “hist” and “vrtr” features.
	  (Florian Pircher)
	- Update IANA Language Subtag Registry to 2022-03-02. (David Corbett)
	- Update USE shaper to allow any non-numeric tail in a symbol cluster, and
	  remove obsolete data overrides. (David Corbett)
	- Fix handling of baseline variations to return correctly scaled values.
	  (Matthias Clasen)
	- A new experimental hb_subset_repack_or_fail() to repack an array of objects,
	  eliminating offset overflows. The API is not available unless HarfBuzz is
	  built with experimental APIs enabled. (Qunxin Liu)
	- New experimental API
	   +hb_link_t
	   +hb_object_t
	   +hb_subset_repack_or_fail()
   Overview of changes leading to 4.0.0
     Tuesday, March 1, 2022
	- New public API to create subset plan and gather information on things like
	  glyph mappings in the final subset. The plan can then be passed on to perform
	  the subsetting operation. (Garret Rieger)
	- Draw API for extracting glyph shapes have been extended and finalized and is
	  no longer an experimental API. The draw API supports glyf, CFF and CFF2
	  glyph outlines tables, and applies variation settings set on the font as well
	  as synthetic slant. The new public API is not backward compatible with the
	  previous, non-public, experimental API. (Behdad Esfahbod)
	- The hb-view tool will use HarfBuzz draw API to render the glyphs instead of
	  cairo-ft when compiled with Cairo 1.17.5 or newer, setting HB_DRAW
	  environment variable to 1 or 0 will force using or not use the draw API,
	  respectively. (Behdad Esfahbod)
	- The hb-shape and hb-view tools now default to using HarfBuzz’s own font
	  loading functions (ot) instead of FreeType ones (ft). They also have a new
	  option, --font-slant, to apply synthetic slant to the font. (Behdad Esfahbod)
	- HarfBuzz now supports more than 65535 (the OpenType limit) glyph shapes and
	  metrics. See https://github.com/be-fonts/boring-expansion-spec/issues/6 and
	  https://github.com/be-fonts/boring-expansion-spec/issues/7 for details.
	  (Behdad Esfahbod)
	- New API to get the dominant horizontal baseline tag for a given script.
	  (Behdad Esfahbod)
	- New API to get the baseline positions from the font, and synthesize missing
	  ones. As well as new API to get font metrics and synthesize missing ones.
	  (Matthias Clasen)
	- Improvements to finding dependencies on Windows when building with Visual
	  Studio. (Chun-wei Fan)
	- New buffer flag, HB_BUFFER_FLAG_PRODUCE_UNSAFE_TO_CONCAT, that must be set
	  during shaping for HB_GLYPH_FLAG_UNSAFE_TO_CONCAT flag to be reliably
	  produced. This is to limit the performance hit of producing this flag to when
	  it is actually needed. (Behdad Esfahbod)
	- Documentation improvements. (Matthias Clasen)
	- New API
	 - General:
	   +HB_BUFFER_FLAG_PRODUCE_UNSAFE_TO_CONCAT
	   +hb_var_num_t
	 - Draw:
	   +hb_draw_funcs_t
	   +hb_draw_funcs_create()
	   +hb_draw_funcs_reference()
	   +hb_draw_funcs_destroy()
	   +hb_draw_funcs_is_immutable()
	   +hb_draw_funcs_make_immutable()
	   +hb_draw_move_to_func_t
	   +hb_draw_funcs_set_move_to_func()
	   +hb_draw_line_to_func_t
	   +hb_draw_funcs_set_line_to_func()
	   +hb_draw_quadratic_to_func_t
	   +hb_draw_funcs_set_quadratic_to_func()
	   +hb_draw_cubic_to_func_t
	   +hb_draw_funcs_set_cubic_to_func()
	   +hb_draw_close_path_func_t
	   +hb_draw_funcs_set_close_path_func()
	   +hb_draw_state_t
	   +HB_DRAW_STATE_DEFAULT
	   +hb_draw_move_to()
	   +hb_draw_line_to()
	   +hb_draw_quadratic_to()
	   +hb_draw_cubic_to()
	   +hb_draw_close_path()
	   +hb_font_get_glyph_shape_func_t
	   +hb_font_funcs_set_glyph_shape_func()
	   +hb_font_get_glyph_shape()
	 - OpenType layout
	   +HB_OT_LAYOUT_BASELINE_TAG_IDEO_FACE_CENTRAL
	   +HB_OT_LAYOUT_BASELINE_TAG_IDEO_EMBOX_CENTRAL
	   +hb_ot_layout_get_horizontal_baseline_tag_for_script()
	   +hb_ot_layout_get_baseline_with_fallback()
	 - Metrics:
	   +hb_ot_metrics_get_position_with_fallback()
	 - Subset:
	   +hb_subset_plan_t
	   +hb_subset_plan_create_or_fail()
	   +hb_subset_plan_reference()
	   +hb_subset_plan_destroy()
	   +hb_subset_plan_set_user_data()
	   +hb_subset_plan_get_user_data()
	   +hb_subset_plan_execute_or_fail()
	   +hb_subset_plan_unicode_to_old_glyph_mapping()
	   +hb_subset_plan_new_to_old_glyph_mapping()
	   +hb_subset_plan_old_to_new_glyph_mapping()

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-04-24 14:15:19 +00:00
Adolf Belka
c35d3ac6a1 poppler: Update to version 22.04.0
- Update from 22.02.0 to 22.04.0
- Update of rootfile
- Changelog
    Release 22.04.0:
        core:
         * Fix underline sometimes being drawn only partially
         * Fix Adobe Reader not reading some of the contents we write correctly
         * Fix code that workarounds some broken-ish files
         * FoFiTrueType: Parse CFF2 fonts too
         * FoFiTrueType: Support cmap types 2 and 13
         * Fix a few small memory leaks
         * code improvements
        qt:
         * Handle SaveAs named action
         * Annotations: don't change the text color when changing the font
        utils:
         * pdftotext: print creation and modification date when using htmlmeta param
        glib:
         * Fix returning internal data of temporary strings
        cpp:
         * Fix code incompatibility with MSVC
        build system:
         * poppler internal library is no longer forced to static on MSVC
         * Error out if iconv is not available and the cpp frontend is enabled
         * Require FreeType 2.8
    Release 22.03.0:
        core:
         * Signature: Fix finding Signatures that are in Pages not not in the global the Forms object
         * Signature: Improve getting the path to the firefox certificate database
         * Splash: Fix rendering of some joints. Issue #1212
         * Fix get_poppler_localdir for relocatable Windows builds
         * Minor code improvements
        qt:
         * Minor code improvements
        utils:
         * pdfimages: Fix the wrong Stream being passed for drawMaskedImage
        build system:
         * Small code improvements

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-04-24 14:14:51 +00:00
Adolf Belka
ffe6661c0b pciutils: Update to version 3.8.0
- Update from 3.7.0 to 3.8.0
- Update of rootfile
- Changelog
   * Released as 3.8.0.
	* Filters can now match devices based on partially specified
	  class code and also on the programming interface.
	* Reporting of link speeds, power limits, and virtual function tags
	  has been updated to the current PCIe specification.
	* We decode the Data Object Exchange capability.
	* Bus mapping mode works in non-zero domains.
	* pci_fill_info() can fetch more fields: bridge bases, programming
	  interface, revision, subsystem vendor and device ID, OS driver,
	  and also parent bridge. Internally, the implementation was rewritten,
	  significantly reducing the number of corner cases to be handled.
	* The Windows port was revived and greatly improved by Pali Rohár.
	  It requires less magic to compile. More importantly, it runs on both
	  old and recent Windows systems (see README.Windows for details).
	* Added a new Windows back-end using the cfgmgr32 interface.
	  It does not provide direct access to the configuration space,
	  but basic information about the device is reported via pci_fill_info().
	  For back-ends of this type, we now provide an emulated read-only
	  config space.
	* If the configuration space is not readable for some reason
	  (e.g., the cfgmgr32 back-end, but also badly implemented sleep mode
	  of some devices), lspci prints only information provided by the OS.
	* The Hurd back-end was greatly improved thanks to Joan Lledó.
	* Various minor bug fixes and improvements.
	* We officially require a working C99 compiler. Sorry, MSVC.
	* As usually, updated pci.ids to the current snapshot of the database.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-24 14:07:03 +00:00
Matthias Fischer
ffa5629d06 bind: Update to 9.16.28
For details see:
https://downloads.isc.org/isc/bind9/9.16.28/doc/arm/html/notes.html#notes-for-bind-9-16-28

"Notes for BIND 9.16.28
New Features

    Add a new configuration option reuseport to disable load balancing
    on sockets in situations where processing of Response Policy Zones
    (RPZ), Catalog Zones, or large zone transfers can cause service
    disruptions. See the BIND 9 ARM for more detail. [GL #3249]

Bug Fixes

    Invalid dnssec-policy definitions, where the defined keys did not
    cover both KSK and ZSK roles for a given algorithm, were being
    accepted. These are now checked, and the dnssec-policy is rejected
    if both roles are not present for all algorithms in use. [GL #3142]

    Handling of TCP write timeouts has been improved to track the
    timeout for each TCP write separately, leading to a faster
    connection teardown in case the other party is not reading the data.
    [GL #3200]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2022-04-23 14:26:50 +00:00
Peter Müller
1f326847a3 Merge branch 'next' into temp-c168-development 2022-04-23 14:23:04 +00:00
Arne Fitzenreiter
9fa01e4276 kernel: update to 5.15.35
in kernel 5.15.32 the driver for ATH9K wlan cards is unstable.
This is one of the most used cards so we need this update before
releasing core167 final.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-22 12:48:32 +00:00
Adolf Belka
f9563f97c6 python3-tomli: Update to version 2.0.1
- Update from 2.0.0 to 2.0.1
- Update of rootfile
- Changelog
     2.0.1
	    Improve
	        Make bundling easier by using relative imports internally and adding
                 license and copyright notice to source files.
	        Make error messages more uniform
	        Raise a friendly TypeError for wrong file mode
	        Allow parse_float to return objects having the append attr
	        Eagerly raise an error if parse_float returns an illegal type
	    Packaging
	        Move from pytest testing framework to unittest and remove python-dateutil
                 test dependency. Tests now only require Python interpreter.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-04-18 21:10:09 +00:00
Adolf Belka
7eeeb60373 python3-setuptools-scm: Update to version 6.4.2
- Update from version 6.3.2 to 6.4.2
- Update rootfile
- Changelog
	v6.4.2
	   * fix #671 : NoReturn is not avaliable in painfully dead python 3.6
	v6.4.1
	   * fix regression #669: restore get_version signature
	   * fix #668: harden the selftest for distribution extras
	v6.4.0
	   * compatibility adjustments for setuptools >58
	   * only put minimal setuptools version into toml extra to warn people with old
             strict pins
	   * coorectly handle hg-git self-use
	   * better mercurial detection
	   * modernize packaging setup
	   * python 3.10 support
	   * better handling of setuptools install command deprecation
	   * consider ``pyproject.tomls`` when running as command
	   * use list in git describe command to avoid shell expansions while supporting
             both windows and posix
	   * add ``--strip-dev`` flag to ``python -m setuptools_scm`` to print the next
             guessed version cleanly
	   * ensure no-guess-dev will fail on bad tags instead of generating invalid
             versions
	   * ensure we use utc everywhere to avoid confusion

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-04-18 21:10:09 +00:00
Adolf Belka
a790b01077 python3-setuptools-rust: Update to version 1.2.0
- Update from 1.1.2 to 1.2.0
- Update of rootfile
- Changelog
   ## 1.2.0 (2022-03-22)
	### Packaging
	   - Drop support for Python 3.6. [#209]
	### Added
	   - Add support for `kebab-case` executable names. [#205]
	   - Add support for custom cargo profiles. [#216]
	### Fixed
	   - Fix building macOS arm64 wheel with cibuildwheel. [#217]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-04-18 21:10:09 +00:00
Peter Müller
c74f7aa6d9 Merge branch 'next' into temp-c168-development 2022-04-18 16:38:47 +00:00
Peter Müller
74fe5c8673 libloc: Fix rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-13 11:32:48 +00:00
Peter Müller
0db4fbe1b5 libloc: Update to 0.9.13
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-12 12:53:03 +00:00
Adolf Belka
54fe871c83 expat: Update to version 2.4.8
- Update from 2.4.6 to 2.4.8
- Update of rootfile
- Changelog
   Release 2.4.8 Mon March 28 2022
        Other changes:
            #587  pkg-config: Move "-lm" to section "Libs.private"
            #587  CMake|MSVC: Fix pkg-config section "Libs"
            #55 #582  CMake|macOS: Start using linker arguments
                        "-compatibility_version <version>" and
                        "-current_version <version>" in a way compatible with
                        GNU Libtool
            #590 #591  Version info bumped from 9:7:8 to 9:8:8;
                         see https://verbump.de/ for what these numbers do
        Infrastructure:
            #589  CI: Upgrade Clang from 13 to 14
Release 2.4.7 Fri March 4 2022
        Bug fixes:
            #572 #577  Relax fix to CVE-2022-25236 (introduced with release 2.4.5)
                         with regard to all valid URI characters (RFC 3986),
                         i.e. the following set (excluding whitespace):
                         ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz
                         0123456789 % -._~ :/?#[]@ !$&'()*+,;=
        Other changes:
            #555 #570 #581  CMake|Windows: Store Expat version in the DLL
            #577  Document consequences of namespace separator choices not just
                    in doc/reference.html but also in header <expat.h>
            #577  Document Expat's lack of validation of namespace URIs against
                    RFC 3986, and that the XML 1.0r4 specification doesn't
                    require Expat to validate namespace URIs, and that Expat
                    may do more in that regard in future releases.
                    If you find need for strict RFC 3986 URI validation on
                    application level today, https://uriparser.github.io/ may
                    be of interest.
            #579  Fix documentation of XML_EndDoctypeDeclHandler in <expat.h>
            #575  Document that a call to XML_FreeContentModel can be done at
                    a later time from outside the element declaration handler
            #574  Make hardcoded namespace URIs easier to find in code
            #573  Update documentation on use of XML_POOR_ENTOPY on Solaris
            #569 #571  tests: Resolve use of macros NAN and INFINITY for GNU G++
                         4.8.2 on Solaris.
            #578 #580  Version info bumped from 9:6:8 to 9:7:8;
                         see https://verbump.de/ for what these numbers do

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:20:22 +00:00
Adolf Belka
2a8de00c6f libgcrypt: Update to version 1.10.1
- Update from 1.9.4 to 1.10.1
- Update of rootfile
- Changelog
   Noteworthy changes in version 1.10.1 (2022-03-28)  [C24/A4/R1]
       * Bug fixes:
	   - Fix minor memory leaks in FIPS mode.
	   - Build fixes for MUSL libc.  [rCffaef0be61]
       * Other:
	   - More portable integrity check in FIPS mode.  [rC9fa4c8946a,T5835]
	   - Add X9.62 OIDs to sha256 and sha512 modules.  [rC52fd2305ba]
   Noteworthy changes in version 1.10.0 (2022-02-01)  [C24/A4/R0]
       * New and extended interfaces:
	   - New control codes to check for FIPS 140-3 approved algorithms.
	   - New control code to switch into non-FIPS mode.
	   - New cipher modes SIV and GCM-SIV as specified by RFC-5297.
	   - Extended cipher mode AESWRAP with padding as specified by
	     RFC-5649.  [T5752]
	   - New set of KDF functions.
	   - New KDF modes Argon2 and Balloon.
	   - New functions for combining hashing and signing/verification.  [T4894]
       * Performance:
	   - Improved support for PowerPC architectures.
	   - Improved ECC performance on zSeries/s390x by using accelerated
	     scalar multiplication.
	   - Many more assembler performance improvements for several
	     architectures.
       * Bug fixes:
	   - Fix Elgamal encryption for other implementations.
	     [R5328,CVE-2021-40528]
	   - Fix alignment problem on macOS.  [T5440]
	   - Check the input length of the point in ECDH.  [T5423]
	   - Fix an abort in gcry_pk_get_param for "Curve25519".  [T5490]
       * Other features:
	   - The control code GCRYCTL_SET_ENFORCED_FIPS_FLAG is ignored
	     because it is useless with the FIPS 140-3 related changes.
	   - Update of the jitter entropy RNG code.  [T5523]
	   - Simplification of the entropy gatherer when using the getentropy
	     system call.
       * Interface changes relative to the 1.10.0 release:
	   GCRYCTL_SET_DECRYPTION_TAG            NEW control code.
	   GCRYCTL_FIPS_SERVICE_INDICATOR_CIPHER NEW control code.
	   GCRYCTL_FIPS_SERVICE_INDICATOR_KDF    NEW control code.
	   GCRYCTL_NO_FIPS_MODE = 83             NEW control code.
	   GCRY_CIPHER_MODE_SIV                  NEW mode.
	   GCRY_CIPHER_MODE_GCM_SIV              NEW mode.
	   GCRY_CIPHER_EXTENDED                  NEW flag.
	   GCRY_SIV_BLOCK_LEN                    NEW macro.
	   gcry_cipher_set_decryption_tag        NEW macro.
	   GCRY_KDF_ARGON2                       NEW constant.
	   GCRY_KDF_BALLOON                      NEW constant.
	   GCRY_KDF_ARGON2D                      NEW constant.
	   GCRY_KDF_ARGON2I                      NEW constant.
	   GCRY_KDF_ARGON2ID                     NEW constant.
	   gcry_kdf_hd_t                         NEW type.
	   gcry_kdf_job_fn_t                     NEW type.
	   gcry_kdf_dispatch_job_fn_t            NEW type.
	   gcry_kdf_wait_all_jobs_fn_t           NEW type.
	   struct gcry_kdf_thread_ops            NEW struct.
	   gcry_kdf_open                         NEW function.
	   gcry_kdf_compute                      NEW function.
	   gcry_kdf_final                        NEW function.
	   gcry_kdf_close                        NEW function.
	   gcry_pk_hash_sign                     NEW function.
	   gcry_pk_hash_verify                   NEW function.
	   gcry_pk_random_override_new           NEW function.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:20:01 +00:00
Adolf Belka
411cd0ca9c libnl: Removal from IPFire
- This is the legacy version of libnl - 1.1.4 and was released in 2013
- libnl-3 is the running stable version - 3.5.0
- Nothing in IPFire has libnl as a dependency. Large number of programs have libnl-3 as
   a dependency
- libnl developer indicates that libnl-3 should be used if in any way possible and that
   the legacy version is for situations that fail to work with libnl-3
- As everything in IPFire looks to already be using libnl-3 this patch is to remove the
   legacy version

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:12:08 +00:00
Adolf Belka
e2e51070a1 libevent: Remove from IPFire
- Build worked without libevent without problems
- Nothing shows up as dependent on the libevent (legacy) libraries
- Lots of dependencies on the the libevent2 libraries

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 09:50:25 +00:00
Adolf Belka
a6d966e1b7 sdparm: Removal from IPFire
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-10 09:45:59 +00:00
Adolf Belka
9624937d91 pigz: Removal from IPFire
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-10 09:45:59 +00:00
Adolf Belka
03216bd01c libdnet: Removal from IPFire
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-10 09:45:58 +00:00
Adolf Belka
758162bdc4 libart: Removal from IPFire
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-10 09:45:58 +00:00
Arne Fitzenreiter
f1b0673572 kernel: arm rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-10 09:42:16 +02:00
Peter Müller
3f65e4996b kernel: Align rootfile again due to forgotten hardening patch
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 20:18:22 +00:00
Peter Müller
4fb7569811 linux: Update rootfile to reflect kernel hardening changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-05 08:42:00 +00:00
Peter Müller
d52a6280ec Revert "dvb-firmwares: Don't ship firmware that comes from linux-firmware"
This reverts commit 7ce3223dd8.

https://wiki.ipfire.org/devel/telco/2022-04-04
2022-04-04 20:06:31 +00:00
Peter Müller
d95b4c94db Drop rfkill
It has been obsoleted by util-linux.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-02 07:42:59 +00:00
Peter Müller
c60f6b3847 Core Update 166: Drop orphaned convert-ovpn script
This script only appeared in conjunction with Core Update 75, released
January 2014. Although it is still being executed while restoring a
backup, it would only be effective if anyone tried to restore a backup
created before C75.

I don't think there is a realistic need to carry this script along any
further. In doubt, it might be better to start from scratch again rather
than trying to restore an 8 year old backup, expecting everything to be
peachy and vanilla with it.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-31 09:50:59 +00:00
Peter Müller
8a4780de64 Revert "linux-firmware: Compress firmware on disk"
This reverts commit 77e3829dc1.

For the time being, shipping this was found to be too difficult, since
we cannot get linux-firmware down to an acceptable size limit.
Compressing the firmware on installations would work, but takes about 4
minutes on an Intel Xenon CPU alone, hence it is an unacceptable
workload to do for IPFire installation running on weaker hardware.

Therefore, we do not proceed with this at the moment.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-31 09:33:53 +00:00
Peter Müller
d8d50f95f9 zlib: Update to 1.2.12
Full changelog, as retrieved from https://www.zlib.net/ChangeLog.txt :

Changes in 1.2.12 (27 Mar 2022)
- Cygwin does not have _wopen(), so do not create gzopen_w() there
- Permit a deflateParams() parameter change as soon as possible
- Limit hash table inserts after switch from stored deflate
- Fix bug when window full in deflate_stored()
- Fix CLEAR_HASH macro to be usable as a single statement
- Avoid a conversion error in gzseek when off_t type too small
- Have Makefile return non-zero error code on test failure
- Avoid some conversion warnings in gzread.c and gzwrite.c
- Update use of errno for newer Windows CE versions
- Small speedup to inflate [psumbera]
- Return an error if the gzputs string length can't fit in an int
- Add address checking in clang to -w option of configure
- Don't compute check value for raw inflate if asked to validate
- Handle case where inflateSync used when header never processed
- Avoid the use of ptrdiff_t
- Avoid an undefined behavior of memcpy() in gzappend()
- Avoid undefined behaviors of memcpy() in gz*printf()
- Avoid an undefined behavior of memcpy() in _tr_stored_block()
- Make the names in functions declarations identical to definitions
- Remove old assembler code in which bugs have manifested
- Fix deflateEnd() to not report an error at start of raw deflate
- Add legal disclaimer to README
- Emphasize the need to continue decompressing gzip members
- Correct the initialization requirements for deflateInit2()
- Fix a bug that can crash deflate on some input when using Z_FIXED
- Assure that the number of bits for deflatePrime() is valid
- Use a structure to make globals in enough.c evident
- Use a macro for the printf format of big_t in enough.c
- Clean up code style in enough.c, update version
- Use inline function instead of macro for index in enough.c
- Clarify that prefix codes are counted in enough.c
- Show all the codes for the maximum tables size in enough.c
- Add gznorm.c example, which normalizes gzip files
- Fix the zran.c example to work on a multiple-member gzip file
- Add tables for crc32_combine(), to speed it up by a factor of 200
- Add crc32_combine_gen() and crc32_combine_op() for fast combines
- Speed up software CRC-32 computation by a factor of 1.5 to 3
- Use atomic test and set, if available, for dynamic CRC tables
- Don't bother computing check value after successful inflateSync()
- Correct comment in crc32.c
- Add use of the ARMv8 crc32 instructions when requested
- Use ARM crc32 instructions if the ARM architecture has them
- Explicitly note that the 32-bit check values are 32 bits
- Avoid adding empty gzip member after gzflush with Z_FINISH
- Fix memory leak on error in gzlog.c
- Fix error in comment on the polynomial representation of a byte
- Clarify gz* function interfaces, referring to parameter names
- Change macro name in inflate.c to avoid collision in VxWorks
- Correct typo in blast.c
- Improve portability of contrib/minizip
- Fix indentation in minizip's zip.c
- Replace black/white with allow/block. (theresa-m)
- minizip warning fix if MAXU32 already defined. (gvollant)
- Fix unztell64() in minizip to work past 4GB. (Daniël Hörchner)
- Clean up minizip to reduce warnings for testing
- Add fallthrough comments for gcc
- Eliminate use of ULL constants
- Separate out address sanitizing from warnings in configure
- Remove destructive aspects of make distclean
- Check for cc masquerading as gcc or clang in configure
- Fix crc32.c to compile local functions only if used

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-31 09:29:38 +00:00
Michael Tremer
f5ffdb75ce util-linux: Update to 2.38
This patch also enables building hardlink(8)

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:53 +00:00
Michael Tremer
f43db7d6fa linux-firmware: Don't ship some Qualcomm AI/5G firmware
This is not needed on IPFire and saves about 13 MiB of compressed
firmware.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:53 +00:00
Michael Tremer
19b535b9b6 linux-firmware: Don't ship Mellanox Spectrum Switch Firmware
This is probably not usable on IPFire and saves us about 47 MiB.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:53 +00:00
Michael Tremer
5df7c89924 linux-firmware: Don't ship Marvell Prestera Firmware
This firmware is required for a switch ASIC which we build the kernel
module for, but which is probably not usable with IPFire.

This saves about 40 MiB of compressed firmware space.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:58:53 +00:00
Michael Tremer
7ce3223dd8 dvb-firmwares: Don't ship firmware that comes from linux-firmware
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-30 13:57:07 +00:00
Michael Tremer
77e3829dc1 linux-firmware: Compress firmware on disk
This patch enabled that we can compress any firmware files on disk. This
will save some space since /lib/firmware is becoming larger with every
release.

From formerly 828MiB, this is now using ~349MiB which is a saving of
about 480MiB on disk. This is helping us a lot fighting to contain the
distribution to 2GB on /.

Some other firmware that is installed in other packages is not
compressed with this patch which is a bit sad, but potentially not worth
the effort.

In order to ship this change with a Core Update, it might be intuitive
to remove /lib/firmware first and then extract the new update with all
new files. However, I do not know if this all will compress as well as
before since now the files are already individually compressed. It might
be a challenge to ship this.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 16:11:14 +00:00
Matthias Fischer
5019469505 bind: Update to 9.16.27
For details see:
https://downloads.isc.org/isc/bind9/9.16.27/doc/arm/html/notes.html#notes-for-bind-9-16-27

"Security Fixes

    The rules for acceptance of records into the cache have been
    tightened to prevent the possibility of poisoning if forwarders send
    records outside the configured bailiwick. (CVE-2021-25220)

    ISC would like to thank Xiang Li, Baojun Liu, and Chaoyi Lu from
    Network and Information Security Lab, Tsinghua University, and
    Changgen Zou from Qi An Xin Group Corp. for bringing this
    vulnerability to our attention. [GL #2950]

    TCP connections with keep-response-order enabled could leave the TCP
    sockets in the CLOSE_WAIT state when the client did not properly
    shut down the connection. (CVE-2022-0396) [GL #3112]

Feature Changes

    DEBUG(1)-level messages were added when starting and ending the BIND
    9 task-exclusive mode that stops normal DNS operation (e.g. for
    reconfiguration, interface scans, and other events that require
    exclusive access to a shared resource). [GL #3137]

Bug Fixes

    The max-transfer-time-out and max-transfer-idle-out options were not
    implemented when the BIND 9 networking stack was refactored in 9.16.
    The missing functionality has been re-implemented and outgoing zone
    transfers now time out properly when not progressing. [GL #1897]

    TCP connections could hang indefinitely if the other party did not
    read sent data, causing the TCP write buffers to fill. This has been
    fixed by adding a “write” timer. Connections that are hung while
    writing now time out after the tcp-idle-timeout period has elapsed.
    [GL #3132]

    The statistics counter representing the current number of clients
    awaiting recursive resolution results (RecursClients) could
    be miscalculated in certain resolution scenarios, potentially
    causing the value of the counter to drop below zero. This has been
    fixed. [GL #3147]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 09:42:41 +00:00
Matthias Fischer
24005371e1 rrdtool: Update to 1.8.0
For details see:
https://github.com/oetiker/rrdtool-1.x/releases/tag/v1.8.0

"Bugfixes

    python bindings: properly convert double values of rrd info
    failed to expand 'Py_UNUSED', Invalid usage when expanding 'Py_UNUSED'
    document --showtime in xport help output
    fix --use-nan-for-all-missing-data
    update rrdruby.pod
    add missing rrdruby.pod and rrdpython.pod to dist
    Set first_weekday to 0 (Sunday), when HAVE__NL_TIME_WEEK_1STDAY is not defined
    fix median calculation for all NaN inputs
    fix potential leak in xport during failure
    fix many warnings raised by Cppcheck
    fix many compiler warnings from latest gcc
    ensure proper initialization in rrd_daemon
    cleanup testsuite
    better testing
    avoid invalid read in rrd_client
    add symbols from rrdc to librrd
    Fix duplicate write_changes_to_disk() calls when HAVE_LIBRADOS is true and HAVE_MMAP is false
    documentation updates
    for SMIN example in docs
    fix for pyton3 compatibility
    freemem only for valid status <Christian Kr"oger>
    fix double meaning of time 0 as uninitialized value
    fix for zfs not supporting fallocate. this makes resize work on zfs
    add rrdrados.pod to dist
    fetch - do not call rrd_freemem on uninitialized pointers
    use separate pango fontmap per thread
    switch to python 3
    do not leak filename when opening a broken file
    fix leaks in rrdcached
    avoid segfault when flushing cache
    escape json in legend entries
    fix leak in xport
    make rrdcgi param parsing more robust
    fix race in journal_write"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 09:41:57 +00:00
Peter Müller
90f03efea5 Core Update 166: Introduce new 2022 Pakfire key
Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 17:34:30 +00:00
Peter Müller
5a33fd9bc6 Nano: Braindead me overlooked the rootfiles were misplaced
This was introduced in b1c25d7a84, and
subsequently broke the nightly builds, and I failed to spot this in the
first place. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 07:51:17 +00:00
Peter Müller
219a998412 Core Update 166: Drop old 2007 Pakfire key, and remove it from existing installations
It is not necessary to have this key present on IPFire systems anymore,
since it has not been in use for years, and we can expect systems to be
sufficiently up-to-date, so they no longer need to rely on old updates
or add-ons signed with this key.

Also, given the current key was generated in 2018, we should consider a
Pakfire key rollover soon.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 11:46:36 +00:00
Adolf Belka
a1e9afcbaf sysvinit: Update rootfile to fix bug 12797
- In sysvinit-2.97 (Dec2020) a patch was added which allows init to load configuration data
   from files stored in /etc/inittab.d/
   This modification would have come in with Core Update 155.
- When sysvinit was updated from 2.88dsf to 2.98 the /etc/inittab.d/ directory in the
   rootfile was commented out.
  Sysvinit looks to see if there are any files in inittab.d but as that directory does not
   exist then the message "No inittab.d directory found" is written during the boot and is
   also shown in the log summary.
- This patch uncomments the directory so that it will be present. No files will be placed
   in it but its prescence will stop the error message being shown during boot.

Fixes: Bug #12797
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 08:51:22 +00:00
Peter Müller
0b6d12adae Drop orphaned ovpn-ccd-convert script
This script appeared in the rootfiles for Core Updates 65 and 66, being
released in late 2012 and early 2013. It is not used elsewhere, and
there is no sense in keeping it around on IPFire installations.

Should this patch be accepted, a corresponding 'rm' statement is
necessary in the update.sh script of the Core Update it will go into.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 08:50:30 +00:00
Peter Müller
2c76a05566 psmisc: Update to 23.4
Please refer to https://gitlab.com/psmisc/psmisc/-/tags for an overview
of the changes happened since version 22.2 .

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-20 15:20:52 +00:00
Michael Tremer
b1b1cb344b reiserfsprogs: Drop redundant rootfile for aarch64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-16 15:42:16 +00:00
Michael Tremer
bac517874e openssl: Update to 1.1.1n
OpenSSL Security Advisory [15 March 2022]
============================================

Infinite loop in BN_mod_sqrt() reachable when parsing certificates
(CVE-2022-0778)
==================================================================================

Severity: High

The BN_mod_sqrt() function, which computes a modular square root,
contains
a bug that can cause it to loop forever for non-prime moduli.

Internally this function is used when parsing certificates that contain
elliptic curve public keys in compressed form or explicit elliptic curve
parameters with a base point encoded in compressed form.

It is possible to trigger the infinite loop by crafting a certificate
that
has invalid explicit curve parameters.

Since certificate parsing happens prior to verification of the
certificate
signature, any process that parses an externally supplied certificate
may thus
be subject to a denial of service attack. The infinite loop can also be
reached when parsing crafted private keys as they can contain explicit
elliptic curve parameters.

Thus vulnerable situations include:

 - TLS clients consuming server certificates
 - TLS servers consuming client certificates
 - Hosting providers taking certificates or private keys from customers
 - Certificate authorities parsing certification requests from
   subscribers
 - Anything else which parses ASN.1 elliptic curve parameters

Also any other applications that use the BN_mod_sqrt() where the
attacker
can control the parameter values are vulnerable to this DoS issue.

In the OpenSSL 1.0.2 version the public key is not parsed during initial
parsing of the certificate which makes it slightly harder to trigger
the infinite loop. However any operation which requires the public key
from the certificate will trigger the infinite loop. In particular the
attacker can use a self-signed certificate to trigger the loop during
verification of the certificate signature.

This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.  It was
addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022.

OpenSSL 1.0.2 users should upgrade to 1.0.2zd (premium support customers
only)
OpenSSL 1.1.1 users should upgrade to 1.1.1n
OpenSSL 3.0 users should upgrade to 3.0.2

This issue was reported to OpenSSL on the 24th February 2022 by Tavis
Ormandy
from Google. The fix was developed by David Benjamin from Google and
Tomáš Mráz
from OpenSSL.

Note
====

OpenSSL 1.0.2 is out of support and no longer receiving public updates.
Extended
support is available for premium support customers:
https://www.openssl.org/support/contracts.html

OpenSSL 1.1.0 is out of support and no longer receiving updates of any
kind.
It is affected by the issue.

Users of these versions should upgrade to OpenSSL 3.0 or 1.1.1.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20220315.txt

Note: the online version of the advisory may be updated with additional
details
over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/policies/secpolicy.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-15 17:51:13 +00:00
Michael Tremer
46b8eb9e7f rebuild-initrd: Drop unused script
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:18:21 +00:00
Michael Tremer
d8db858769 dracut: Install an IPFire system configuration file
This file contains our custom settings:

* Always load microcodes as early as possible

* We now compress the initrd using Zstandard which is substanstically
  faster than XZ, but offers better compression ratios

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:18:21 +00:00
Michael Tremer
2f74ea9347 dracut: Update to 056
This one was desperately in need of an upgrade, as dracut 038 was
released 8 YEARS ago. Hence, the changelog since is way too long to
include it here; refer to https://git.kernel.org/pub/scm/boot/dracut/dracut.git/tree/NEWS.md
for details.

See also: #12773

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:18:21 +00:00
Michael Tremer
a17d3aaaea stage2: Update rootfiles
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-11 16:04:09 +00:00
Arne Fitzenreiter
d814021aa5 u-boot: add OrangePi Zero Plus (Allwinner H5)
this u-boot should also work with NanoPi R1S H5

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:45:43 +00:00