Commit Graph

20603 Commits

Author SHA1 Message Date
Peter Müller
8ebb8091d9 Core Update 177: Ship and restart ntp
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-01 19:09:20 +00:00
Adolf Belka
89d5a7b29f ntp: Update to version 4.2.8p17
- Update from version 4.2.8p15 to 4.2.8p17
- Update of rootfile not required
- Tested out on vm testbed. Time correctly updated every hour and pakfire was able to
   download and install various addons without any problems indicating that the time
   is working correctly.
- patch to enable build with glibc-2.34 no longer needed. ntp updated to work correctly
   with glibc-2.34 but IPFire running with version 2.37. Version 2.4.8p17 built without
   any problems without the patch.
- Changelog
    4.2.8p17 2023/06/06 Released by Harlan Stenn <stenn@ntp.org>
	* [Bug 3824] Spurious "ntpd: daemon failed to notify parent!" logged at
	             event_sync.  Reported by Edward McGuire.  <hart@ntp.org>
	* [Bug 3822] ntpd significantly delays first poll of servers specified by name.
	             <hart@ntp.org>  Miroslav Lichvar identified regression in 4.2.8p16.
	* [Bug 3821] 4.2.8p16 misreads hex authentication keys, won't interop with
	             4.2.8p15 or earlier.  Reported by Matt Nordhoff, thanks to
		     Miroslav Lichvar and Matt for rapid testing and identifying the
		     problem. <hart@ntp.org>
	* Add tests/libntp/digests.c to catch regressions reading keys file or with
	  symmetric authentication digest output.
    4.2.8p16 2023/05/31 Released by Harlan Stenn <stenn@ntp.org>
	* [Sec 3808] Assertion failure in ntpq on malformed RT-11 date <perlinger@ntp.org>
	* [Sec 3807] praecis_parse() in the Palisade refclock driver has a
	             hypothetical input buffer overflow. Reported by ... stenn@
	* [Sec 3806] libntp/mstolfp.c needs bounds checking <perlinger@ntp.org>
	  - solved numerically instead of using string manipulation
	* [Sec 3767] An OOB KoD RATE value triggers an assertion when debug is enabled.
	             <stenn@ntp.org>
	* [Bug 3819] Updated libopts/Makefile.am was missing NTP_HARD_* values. <stenn@>
	* [Bug 3817] Bounds-check "tos floor" configuration. <hart@ntp.org>
	* [Bug 3814] First poll delay of new or cleared associations miscalculated.
	             <hart@ntp.org>
	* [Bug 3802] ntp-keygen -I default identity modulus bits too small for
	             OpenSSL 3.  Reported by rmsh1216@163.com <hart@ntp.org>
	* [Bug 3801] gpsdjson refclock gps_open() device name mishandled. <hart@ntp.org>
	* [Bug 3800] libopts-42.1.17 does not compile with Microsoft C. <hart@ntp.org>
	* [Bug 3799] Enable libopts noreturn compiler advice for MSC. <hart@ntp.org>
	* [Bug 3797] Windows getaddrinfo w/AI_ADDRCONFIG fails for localhost when
	             disconnected, breaking ntpq and ntpdc. <hart@ntp.org>
	* [Bug 3795] pollskewlist documentation uses | when it shouldn't.
	  - ntp.conf manual page and miscopt.html corrections. <hart@ntp.org>
	* [Bug 3793] Wrong variable type passed to record_raw_stats(). <hart@ntp.org>
	  - Report and patch by Yuezhen LUAN <wei6410@sina.com>.
	* [Bug 3786] Timer starvation on high-load Windows ntpd. <hart@ntp.org>
	* [Bug 3784] high-load ntpd on Windows deaf after enough ICMP TTL exceeded.
	             <hart@ntp.org>
	* [Bug 3781] log "Unable to listen for broadcasts" for IPv4 <hart@ntp.org>
	* [Bug 3774] mode 6 packets corrupted in rawstats file <hart@ntp.org>
	  - Reported by Edward McGuire, fix identified by <wei6410@sina.com>.
	* [Bug 3758] Provide a 'device' config statement for refclocks <perlinger@ntp.org>
	* [Bug 3757] Improve handling of Linux-PPS in NTPD <perlinger@ntp.org>
	* [Bug 3741] 4.2.8p15 can't build with glibc 2.34 <perlinger@ntp.org>
	* [Bug 3725] Make copyright of clk_wharton.c compatible with Debian.
	             Philippe De Muyter <phdm@macqel.be>
	* [Bug 3724] ntp-keygen with openSSL 1.1.1 fails on Windows <perlinger@ntp.org>
	  - openssl applink needed again for openSSL-1.1.1
	* [Bug 3719] configure.ac checks for closefrom() and getdtablesize() missing.
	             Reported by Brian Utterback, broken in 2010 by <hart@ntp.org>
	* [Bug 3699] Problems handling drift file and restoring previous drifts <perlinger@ntp.org>
	  - command line options override config statements where applicable
	  - make initial frequency settings idempotent and reversible
	  - make sure kernel PLL gets a recovered drift componsation
	* [Bug 3695] Fix memory leak with ntpq on Windows Server 2019 <perlinger@ntp.org>
	* [Bug 3694] NMEA refclock seems to unnecessarily require location in messages
	  - misleading title; essentially a request to ignore the receiver status.
	    Added a mode bit for this. <perlinger@ntp.org>
	* [Bug 3693] Improvement of error handling key lengths <perlinger@ntp.org>
	  - original patch by Richard Schmidt, with mods & unit test fixes
	* [Bug 3692] /dev/gpsN requirement prevents KPPS <perlinger@ntp.org>
	  - implement/wrap 'realpath()' to resolve symlinks in device names
	* [Bug 3691] Buffer Overflow reading GPSD output
	  - original patch by matt<ntpbr@mattcorallo.com>
	  - increased max PDU size to 4k to avoid truncation
	* [Bug 3690] newline in ntp clock variable (parse) <perlinger@ntp.org>
	  - patch by Frank Kardel
	* [Bug 3689] Extension for MD5, SHA-1 and other keys <perlinger@ntp.org>
	  - ntp{q,dc} now use the same password processing as ntpd does in the key
	    file, so having a binary secret >= 11 bytes is possible for all keys.
	    (This is a different approach to the problem than suggested)
	* [Bug 3688] GCC 10 build errors in testsuite <perlinger@ntp.org>
	* [Bug 3687] ntp_crypto_rand RNG status not known <perlinger@ntp.org>
	  - patch by Gerry Garvey
	* [Bug 3682] Fixes for warnings when compiled without OpenSSL <perlinger@ntp.org>
	  - original patch by Gerry Garvey
	* [Bug 3677] additional peer events not decoded in associations listing <perlinger@ntp.org>
	  - original patch by Gerry Garvey
	* [Bug 3676] compiler warnings (CMAC, interrupt_buf, typo, fallthrough)
	  - applied patches by Gerry Garvey
	* [Bug 3675] ntpq ccmds[] stores pointer to non-persistent storage
	* [Bug 3674] ntpq command 'execute only' using '~' prefix <perlinger@ntp.org>
	  - idea+patch by Gerry Garvey
	* [Bug 3672] fix biased selection in median cut <perlinger@ntp.org>
	* [Bug 3666] avoid unlimited receive buffer allocation <perlinger@ntp.org>
	  - follow-up: fix inverted sense in check, reset shortfall counter
	* [Bug 3660] Revert 4.2.8p15 change to manycast. <hart@ntp.org>
	* [Bug 3640] document "discard monitor" and fix the code. <hart@ntp.org>
	  - fixed bug identified by Edward McGuire <perlinger@ntp.org>
	* [Bug 3626] (SNTP) UTC offset calculation needs dst flag <perlinger@ntp.org>
	  - applied patch by Gerry Garvey
	* [Bug 3428] ntpd spinning consuming CPU on Linux router with full table.
	             Reported by Israel G. Lugo. <hart@ntp.org>
	* [Bug 3103] libopts zsave_warn format string too few arguments <bkorb@gnu.org>
	* [Bug 2990] multicastclient incorrectly causes bind to broadcast address.
	             Integrated patch from Brian Utterback. <hart@ntp.org>
	* [Bug 2525] Turn on automake subdir-objects across the project. <hart@ntp.org>
	* [Bug 2410] syslog an error message on panic exceeded. <brian.utterback@oracle.com>
	* Use correct rounding in mstolfp(). perlinger/hart
	* M_ADDF should use u_int32.  <hart@ntp.org>
	* Only define tv_fmt_libbuf() if we will use it. <stenn@ntp.org>
	* Use recv_buffer instead of the longer recv_space.X_recv_buffer. hart/stenn
	* Make sure the value returned by refid_str() prints cleanly. <stenn@ntp.org>
	* If DEBUG is enabled, the startup banner now says that debug assertions
	  are in force and that ntpd will abort if any are violated. <stenn@ntp.org>
	* syslog valid incoming KoDs.  <stenn@ntp.org>
	* Rename a poorly-named variable.  <stenn@ntp.org>
	* Disable "embedded NUL in string" messages in libopts, when we can. <stenn@>
	* Use https in the AC_INIT URLs in configure.ac.  <stenn@ntp.org>
	* Implement NTP_FUNC_REALPATH.  <stenn@ntp.org>
	* Lose a gmake construct in ntpd/Makefile.am.  <stenn@ntp.org>
	* upgrade to: autogen-5.18.16
	* upgrade to: libopts-42.1.17
	* upgrade to: autoconf-2.71
	* upgrade to: automake-1.16.15
	* Upgrade to libevent-2.1.12-stable <stenn@ntp.org>
	* Support OpenSSL-3.0

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-01 19:08:20 +00:00
Peter Müller
384302344c Start Core Update 177
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-01 18:55:36 +00:00
Michael Tremer
36ab906de4 core176: Re-ship libssh
This was also linked against OpenSSL 1.1.1.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-28 18:46:01 +00:00
Michael Tremer
87d0d07bbc core176: Re-ship lots of stuff that is still linked against OpenSSL 1.1.1
There are no functional changes in these files, but they are however
linked against OpenSSL 1.1.1 and need to be re-shipped before we remove
the legacy library.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-27 10:06:45 +00:00
Michael Tremer
08bd9a5a94 Revert "Core Update 176: Delete OpenSSL 1.1.1 files"
This reverts commit aa8a659ab7.

This cannot be done, yet, because an updated system still has hundreds
of files using the old libraries. Those will have to be re-shipped first
before we actually remove OpenSSL 1.1.1.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-27 09:46:48 +00:00
Peter Müller
6a7a635ff4 Run ./make.sh update-contributors
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 21:08:22 +00:00
Peter Müller
79da0b3159 CUPS: Update to 2.4.6
Several security-relevant bugs have been fixed since version 2.4.2,
please refer to https://github.com/OpenPrinting/cups/releases for the
respective changelogs.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 21:04:19 +00:00
Peter Müller
71245ad02a Postfix: Update to 3.8.1
Please refer to https://www.postfix.org/announcements/postfix-3.8.1.html
for the release announcement of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 21:01:09 +00:00
Peter Müller
3a86abcf49 Core Update 176: Ship and restart strongSwan
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 20:59:55 +00:00
Peter Müller
854d5e777e strongswan: Update to 5.9.11
Please refer to
https://github.com/strongswan/strongswan/releases/tag/5.9.11 for the
release notes of this update.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 20:58:17 +00:00
Peter Müller
b35bbd2ba2 Core Update 176: Ship freetype
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 20:57:03 +00:00
Peter Müller
9270456fa2 freetype: Update to 2.13.1
Changelog is too long to include it here, please refer to the ChangeLog
file in the sourcecode tarball.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 20:53:42 +00:00
Peter Müller
955964d7a2 go: Update aarch64 rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 20:45:49 +00:00
Stéphane Pautrel
8fdcc35cfc fr.pl: Update French translation
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 20:37:48 +00:00
Peter Müller
aa8a659ab7 Core Update 176: Delete OpenSSL 1.1.1 files
This step was announced in
https://blog.ipfire.org/post/ipfire-2-27-core-update-175-released .

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:55:55 +00:00
Peter Müller
17e30dbb84 Core Update 176: Ship proxy.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:53:02 +00:00
Michael Tremer
80c04308de proxy: Skip VPNs that route everything for proxy.pac
The function tries to figure out which networks are connected locally,
but VPN tunnels that use 0.0.0.0 and GRE/VTI interfaces will be
considered local and the proxy is being disabled for everyone.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-25 13:52:41 +00:00
Adolf Belka
51e29a797e go: Update to version 1.20.4
- Update from version 1.15.4 to 1.20.4
- Update of x86_64 rootfile
   aarch64 rootfile needs to be created on a aarch64 build system
- Changelog is very large. For details see https://go.dev/doc/devel/release
   50 mentions of security fixes in the changes from 1.15.4 to 1.20.4

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-06-25 13:49:34 +00:00
Peter Müller
79e841bd57 Core Update 176: Ship extrahd.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:48:54 +00:00
Jon Murphy
236e89ae87 extrahd.cgi: Fix for Bug #12863
-Fixes remove entries in 'extrahd' via the webinterface for extrahd.cgi file.

Suggested-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2023-06-25 13:48:30 +00:00
Peter Müller
d4e96ad105 Core Update 176: Ship 69-dm-lvm.rules
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:48:09 +00:00
Adolf Belka
8c81964bc6 update.sh: Fixes bug-13151 - removes old 69-dm-lvm-metad.rules file
- In Core Update 175 lvm was updated and 69-dm-lvm-metad.rules was replaced with
   69-dm-lvm.rules in the lvm rootfile.
- That previous patch update did not remove the no longer existing 69-dm-lvm-metad.rules
   from existing installations. This patch corrects that.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-06-25 13:46:14 +00:00
Adolf Belka
afbb7db681 lvm: Fixes bug-13151 - update 69-dm-lvm.rules
- Redhat updated lvm udev rule 69-dm-lvm.rules to only work with systemd
- Update 69-dm-lvm.rules to work with IPFire based on input from @Daniel of what worked
   to mount an existing lvm volume

Suggested-by: Daniel Weismüller <daniel.weismueller@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-06-25 13:46:14 +00:00
Peter Müller
d71d12a32e Core Update 176: Ship parse-func.pl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:43:46 +00:00
Michael Tremer
52d0a1e2db Revert "parse-func.pl: Adjust regular expression to changed 'tc' output"
This reverts commit ca06e817b8.

The incorrect output has been fixed in tc.

Fixes: #13150
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:42:51 +00:00
Peter Müller
bca9e13911 libloc: Update location database shipped on new installations
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:42:13 +00:00
Peter Müller
21f50e4d16 Core Update 176: Ship changes related to updated toolchain
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-24 06:43:53 +00:00
Michael Tremer
f08637c587 gdb: Update to 13.2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-24 06:34:18 +00:00
Michael Tremer
df1a3f56cb gcc: Update to 13.1.0
This patch does not include the rootfile for riscv64 because GCC FTBFS.
Bug #13156 has been opened to address this.

But since we don't officially support IPFire riscv64, yet, this should
not delay this going into next.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-24 06:34:18 +00:00
Michael Tremer
4c792a73df make.sh: Bump toolchain version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-24 06:34:17 +00:00
Peter Müller
16c047b785 Core Update 176: Ship pciutils
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-22 21:28:27 +00:00
Adolf Belka
a57f632e78 pciutils: Update to version 3.10.0
- Update from version 3.9.0 to 3.10.0
- Update of rootfile
- version 3.9.0 failed to output some of the symbols. This was found as a bug in Fedora but
   also seen by some people in IPFire CU175 with flashrom where the version 3.3 symbol is
   provided.
   Fedora made a patch to resolve this issue for 3.9.0 but 3.10.0 has been released since
   then and Fedora removed the patch that was used for 2.9.0 as pciutils has had that bug
   fixed - see first item in changelog.
- Changelog
    Released as 3.10.0.
	Fixed bug in definition of versioned symbol aliases
	  in shared libpci, which made compiling with link-time
	  optimization fail.
	Filters now accept "0x..." syntax for backward compatibility.
	Windows: The cfgmgr32 back-end which provides the list of devices
	  can be combined with another back-end which provides access
	  to configuration space.
	ECAM (Enhanced Configuration Access Mechanism), which is defined
	  by the PCIe standard, is now supported. It requires root privileges,
	  access to physical memory, and also manual configuration on some
	  systems.
	lspci: Tree view now works on multi-domain systems. It now respects
	  filters properly.
	Last but not least, pci.ids were updated to the current snapshot
	  of the database. This includes overall cleanup of entries with
	  non-ASCII characters in their names -- such characters are allowed,
	  but only if they convey interesting information (e.g., umlauts
	  in German company names, but not the "registered trade mark" sign).

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-06-22 21:28:05 +00:00
Adolf Belka
30dc340714 ovpnmain.cgi: Fix Bug#13136 - Allow spaces when editing a static ip address pool name
- This was fixed for creating a static ip address pool name in bug#12865 but was not
   applied to the case when the static ip address pool name was being edited.
- This fix corrects that oversight.

Fixes: Bug#13136
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-06-22 21:28:03 +00:00
Michael Tremer
943c5e7e3c core176: Ship suricata
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 15:57:42 +00:00
Matthias Fischer
7af2d42cbf libhtp: Update to 0.5.44
For details see:
https://github.com/OISF/libhtp/releases/tag/0.5.44

"0.5.44 (13 June 2023)
---------------------

- response: only trim spaces at headers names end
- response: skips lines before response line
- headers: log a warning for chunks extension"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 15:56:53 +00:00
Matthias Fischer
dbd7bafb4d suricata: Update to 6.0.13
Excerpt from changelog:

"6.0.13 -- 2023-06-15

Security #6119: datasets: absolute path in rules can overwrite arbitrary files (6.0.x backport)
Bug #6138: Decode-events of IPv6 packets are not triggered (6.0.x backport)
Bug #6136: suricata-update: dump-sample-configs: configuration files not found (6.0.x backport)
Bug #6125: http2: cpu overconsumption in rust moving/memcpy in http2_parse_headers_blocks (6.0.x backport)
Bug #6113: ips: txs still logged for dropped flow (6.0.x backport)
Bug #6056: smtp: long line discard logic should be separate for server and client (6.0.x backport)
Bug #6055: ftp:  long line discard logic should be separate for server and client (6.0.x backport)
Bug #5990: smtp: any command post a long command gets skipped (6.0.x backport)
Bug #5982: smtp: Long DATA line post boundary is capped at 4k Bytes (6.0.x backport)
Bug #5809: smb: convert transaction list to vecdeque (6.0.x backport)
Bug #5604: counters: tcp.syn, tcp.synack, tcp.rst depend on flow (6.0.x backport)
Bug #5550: dns: allow dns messages with invalid opcodes (6.0.x backport)
Task #5984: libhtp 0.5.44 (6.0.x backport)
Documentation #6134: userguide: add instructions/explanation for (not) running suricata with root (6.0.x backport)
Documentation #6121: datasets: 6.0.x work-arounds for dataset supply chain attacks"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 15:56:53 +00:00
Michael Tremer
665ab5a1f9 cups: Depend on libexif
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 14:13:35 +00:00
Michael Tremer
dfbbc534be core176: Ship vpnmain.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 09:23:46 +00:00
Adolf Belka
0746122a16 vpnmain.cgi: unique_subject = yes in index.txt.attr for first attempt with fresh install
- The patches for Bug#13138
   https://patchwork.ipfire.org/project/ipfire/patch/20230603140541.13834-1-adolf.belka@ipfire.org/
   https://patchwork.ipfire.org/project/ipfire/patch/20230606104050.8290-1-adolf.belka@ipfire.org/
   work for an update to Core Update 175 but a fresh install of CU175 will still fail with
   the error when creating the root/host certificate set for the first time.
- This patch ensures that the unique_subject = yes line is addeed to index.txt.attr
   when the root/host certificate set is attempted to be created or is uploaded also for
   the first attempt.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 09:23:05 +00:00
Michael Tremer
a71450b6fa core176: Ship intel-microcode and regenerate all initramdisks
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 09:22:17 +00:00
Adolf Belka
6f22b0ac4d intel-microcode: Update to version 20230613
- Updated from version 20230214 to 20230512-rev2 where the source tarball is named version
   20230613
- Update of rootfile
- Changelog details for versions 20230512 and 20230512-rev2 can be found at
   https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 09:20:06 +00:00
Adolf Belka
a06f2fa02e transmission: Update to version 4.0.3
- Update from version 3.00 to 4.0.3
- This v2 version has usr/share/transmission directory uncommented.
- Update of rootfile
- Build changed from autotools configure to cmake
- Changelog is very large. For details see
   https://github.com/transmission/transmission/releases/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:40:33 +00:00
Michael Tremer
863858b0b7 core176: Ship all misc-progs again
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:39:39 +00:00
Michael Tremer
ed1a24686c misc-progs: setuid: Return exit code from called process
This patch will return the exit code from the called process which has
not been done before. This made it more difficult to catch any
unsuccessful calls from the web UI.

Partly Fixes: #12863
Tested-by: Jon Murphy <jon.murphy@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:39:28 +00:00
Adolf Belka
db9c7fb826 wavemon: Update to version 0.9.4
- Update from version 0.7.5 to 0.9.4
- Update of rootfile
- wavemon would not build because it could not find the netlink include files. wavemon was
   still looking in include/netlink/ as for libnl version 1 but with libnl3 the include
   files are in include/libnl3/netlink/
- Based on an issue entry in the wavemon github repo I created the patch to force wavemon
   to look in the correct place.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:39:10 +00:00
Adolf Belka
8ad61512ef tmux: Update to version 3.3a
- Update from version 3.3 to 3.3a
- Update of rootfile not required
- Changelog
CHANGES FROM 3.3 TO 3.3a
	* Do not crash when run-shell produces output from a config file.
	* Do not unintentionally turn off all mouse mode when button mode is also
	  present.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:38:56 +00:00
Adolf Belka
ec05e6c6bf stunnel: Update to version 5.69
- Update from version 5.63 to 5.69
- Update of rootfile not required
- Changelog
Version 5.69, 2023.03.04, urgency: MEDIUM
	* New features
	  - Improved logging performance with the "output" option.
	  - Improved file read performance on the WIN32 platform.
	  - DH and kDHEPSK ciphersuites removed from FIPS defaults.
	  - Set the LimitNOFILE ulimit in stunnel.service to allow
	    for up to 10,000 concurrent clients.
	* Bugfixes
	  - Fixed the "CApath" option on the WIN32 platform by
	    applying https://github.com/openssl/openssl/pull/20312.
	  - Fixed stunnel.spec used for building rpm packages.
	  - Fixed tests on some OSes and architectures by merging
	    Debian 07-tests-errmsg.patch (thx to Peter Pentchev).
Version 5.68, 2023.02.07, urgency: HIGH
	* Security bugfixes
	  - OpenSSL DLLs updated to version 3.0.8.
	* New features
	  - Added the new 'CAengine' service-level option
	    to load a trusted CA certificate from an engine.
	  - Added requesting client certificates in server
	    mode with 'CApath' besides 'CAfile'.
	  - Improved file read performance.
	  - Improved logging performance.
	* Bugfixes
	  - Fixed EWOULDBLOCK errors in protocol negotiation.
	  - Fixed handling TLS errors in protocol negotiation.
	  - Prevented following fatal TLS alerts with TCP resets.
	  - Improved OpenSSL initialization on WIN32.
	  - Improved testing suite stability.
Version 5.67, 2022.11.01, urgency: HIGH
	* Security bugfixes
	  - OpenSSL DLLs updated to version 3.0.7.
	* New features
	  - Provided a logging callback to custom engines.
	* Bugfixes
	  - Fixed "make cert" with OpenSSL older than 3.0.
	  - Fixed the code and the documentation to use conscious
	    language for SNI servers (thx to Clemens Lang).
Version 5.66, 2022.09.11, urgency: MEDIUM
	* New features
	  - OpenSSL 3.0 FIPS Provider support for Windows.
	* Bugfixes
	  - Fixed building on machines without pkg-config.
	  - Added the missing "environ" declaration for
	    BSD-based operating systems.
	  - Fixed the passphrase dialog with OpenSSL 3.0.
Version 5.65, 2022.07.17, urgency: HIGH
	* Security bugfixes
	  - OpenSSL DLLs updated to version 3.0.5.
	* Bugfixes
	  - Fixed handling globally enabled FIPS.
	  - Fixed openssl.cnf processing in WIN32 GUI.
	  - Fixed a number of compiler warnings.
	  - Fixed tests on older versions of OpenSSL.
Version 5.64, 2022.05.06, urgency: MEDIUM
	* Security bugfixes
	  - OpenSSL DLLs updated to version 3.0.3.
	* New features
	  - Updated the pkcs11 engine for Windows.
	* Bugfixes
	  - Removed the SERVICE_INTERACTIVE_PROCESS flag in
	    "stunnel -install".

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:38:46 +00:00
Adolf Belka
c7c1f0e345 stress: Update to version 1.0.7
- Update from version 1.0.5 to 1.0.7
- Update of rootfile not required
- Changelog
	Version 1.0.7
	  * Check for sys/prctl.h availability, because non-Linux
	    architectures don't provide <sys/prctl.h>.
	  * Improved GitHub CI:
	      - Added CI test for macOS.
	      - Added a check for stress command.
	      - Added a test for 'make dist-bzip2'.
	  * Moved manpage from doc/ to man/.
	Version 1.0.6
	  * Register parent termination signal in child processes.
	  * Added 'make dist' check in CI test.
	  * Added rights for Vratislav Bendel.
	  * Re-organized src/stress.c via astyle command.
	  * Updated GPL-2 license text for src/stress.c.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:38:39 +00:00
Adolf Belka
b776a9403a strace: Update to version 6.3
- Update from version 6.1 to 6.3
- Update of rootfile not required
- Changelog
Noteworthy changes in release 6.3 (2023-05-08)
	* Improvements
	  * Implemented --trace-fds=set option for filtering only the syscalls
	    that operate on the specified set of file descriptors.
	  * Implemented --decode-fds=signalfd option for decoding of signal masks
	    associated with signalfd file descriptors.
	  * Implemented --syscall-limit option to automatically detach tracees
	    after capturing the specified number of syscalls.
	  * Implemented --argv0 option to set argv[0] of the command being executed.
	  * Implemented decoding of PR_GET_MDWE and PR_SET_MDWE operations of prctl
	    syscall.
	  * Implemented decoding of IP_LOCAL_PORT_RANGE socket option.
	  * Implemented decoding of IFLA_BRPORT_MCAST_N_GROUPS,
	    IFLA_BRPORT_MCAST_MAX_GROUPS, IFLA_GSO_IPV4_MAX_SIZE,
	    IFLA_GRO_IPV4_MAX_SIZE, and TCA_EXT_WARN_MSG netlink attributes.
	  * Updated lists of F_SEAL_*, IFLA_*, IORING_*, MFD_*, NFT_*, TCA_*,
	    and V4L2_PIX_FMT_* constants.
	  * Updated lists of ioctl commands from Linux 6.3.
	* Bug fixes
	  * Fixed build on hppa with uapi headers from Linux >= 6.2.
	  * Fixed --status filtering when -c option is in use.
Noteworthy changes in release 6.2 (2023-02-26)
	* Improvements
	  * Implemented collision resolution for overlapping ioctl commands
	    from tty and snd subsystems.
	  * Implemented decoding of IFLA_BRPORT_MAB and IFLA_DEVLINK_PORT
	    netlink attributes.
	  * Updated lists of ALG_*, BPF_*, IFLA_*, KEY_*, KVM_*, LANDLOCK_*,
	    MEMBARRIER_*, NFT_*, NTF_*, and V4L2_* constants.
	  * Updated lists of ioctl commands from Linux 6.2.
	* Bug fixes
	  * Fixed build on alpha architecture.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:38:26 +00:00