Commit Graph

11483 Commits

Author SHA1 Message Date
Arne Fitzenreiter
95f9d9350d kernel: update to 6.6.2
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-05 17:15:48 +00:00
Michael Tremer
e36e826ad9 core183: Start Core Update 183
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-12-05 17:13:44 +00:00
Peter Müller
7f357884fc Core Update 182: Ship tor.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-04 22:34:24 +00:00
Erik Kapfer
7a1683e6cb update.sh: If 'ExitNode' is in usage, it will be changed to 'ExitNodes'
Signed-off-by: Erik Kapfer <erik.kapfer@ipfire.org>
2023-12-04 22:33:00 +00:00
Peter Müller
0b329e97da Core Update 182: Remove unused xfsprogs udev rule file
Housekeeping in case it has already been installed on a system that is
following the unstable Pakfire branch.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-04 22:31:04 +00:00
Peter Müller
3732c3725b xfsprogs: Do not ship unused udev rule file
As discussed in today's monthly video conference.

Cc: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-04 22:29:39 +00:00
Peter Müller
e53fbdc258 Core Update 182: Ship ca-certificates
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-04 22:29:03 +00:00
Peter Müller
95660247da ca-certificates: Update root CA certificates bundle
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-12-04 22:28:49 +00:00
Peter Müller
2005b34809 man: Comment out erroneously uncommented lines
See https://lists.ipfire.org/hyperkitty/list/development@lists.ipfire.org/message/HLCRQ4RRVZK5WL346HDF533KMRZVFK7C/

Cc: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-26 09:40:34 +00:00
Adolf Belka
4714b0890c man: Update to version 2.12.0
- Update from version 2.11.2 to 2.12.0
- Update of rootfile
- Changelog
    2.12.0
	Fixes:
	 * Fix some manual page portability issues with groff 1.23.0.
	 * Fix test failures when a working `iconv` is not available.
	 * Ensure that timestamps read from the database can go past the year 2038,
	   even on systems where this is not the default.
	 * Fix `manpath` not parsing `PATH` entries with trailing slash correctly
	   for guessing `MANPATH` entries.
	 * More accurately document the behaviour of passing file names as arguments
	   to `man` without the `-l`/`--local-file` option.
	 * Avoid duplicate cleanup of old cat pages by both `man-db.service` and
	   `systemd-tmpfiles-clean.service`.
	Improvements:
	 * Update system call lists in `seccomp` sandbox from `systemd`.
	 * Upgrade to Gnulib `stable-202307`.
	 * Work around the Firebuild accelerator in `seccomp` sandbox: if this is in
	   use then we need to allow some socket-related system calls.
	 * `man -K` now deduplicates search results that point to the same page.
	 * Warn if `mandb` drops to `--user-db` mode due to running as the wrong
	   user.
	 * Change section title recommendations in `man(1)` to mention `STANDARDS`
	   rather than `CONFORMING TO`, in line with `man-pages(7)`.
	 * Add a `STANDARDS` section to `man(1)` itself.
	 * Document that `man -K` may suffer from false negatives as well as false
	   positives.
	 * Take advantage of newer `groff` facilities to implement `man
	   --no-hyphenation` and `man --no-justification`, if available.
	 * `man -f` and `man -k` now pass any `-r`/`--regex` or `-w`/`--wildcard`
	   options on to `whatis` and `apropos` respectively.
	 * Always pass a line length to `nroff`, even if we believe that it matches
	   the default.
	 * Allow disabling `groff` warnings via `man --warnings`, by prefixing a
	   warning name with `!`.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-26 09:40:17 +00:00
Peter Müller
9f42af2453 Core Update 182: Ship dhcp.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-24 13:23:09 +00:00
Peter Müller
05730a8b48 Core Update 182: Ship connections.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-24 13:12:48 +00:00
Peter Müller
3b20134742 Core Update 182: Ship iproute2
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-24 13:08:50 +00:00
Adolf Belka
207a430a4c iproute2: Update to version 6.6.0
- Update from version 6.4.0 to 6.6.0
- Update of rootfile
- iproute2 has implemented stateless configuration pattern. This now puts all the files
   that were in /etc/iproute2 into /usr/lib/iproute2. Therefore command added to lfs to
   move /usr/lib/iproute2 to /etc/iproute2 to match the previous situation.
- Changelog is only provided by the git commits.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-24 13:08:30 +00:00
Peter Müller
e59bd86204 Core Update 182: Ship and reinstall grub
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-24 13:03:50 +00:00
Arne Fitzenreiter
3273f4796a grub: update to 2.12-rc1
this is the first version that support booting linux kernel on
riscv. The release of the final version was delayed again and again
so i have bootstrapped the rc1 from the git and fixed the path in 25_bli.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-11-24 12:53:51 +00:00
Peter Müller
35406f0101 Core Update 182: Ship intel-microcode
The initial ramdisks are already rebuilt during the update at this
stage.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-24 12:37:24 +00:00
Adolf Belka
166b3cf228 intel-microcode: Update to version 20231114
- Update from version 20230808 to 20231114
- Update of rootfile
- Changelog details can be found in the releasenote.md file from the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-11-24 12:36:35 +00:00
Arne Fitzenreiter
4bc2da437c Revert "update.sh: Remove superflous KVER variable"
the "xxxKVERxxx" placeholder is replaced by the buildsystem with the current build kernel
version. KVER is used a few lines later to build the arm initrd so this is needed.

This reverts commit bef1bf4526.
2023-11-23 07:06:36 +01:00
Peter Müller
bef1bf4526 update.sh: Remove superflous KVER variable
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-22 21:52:59 +00:00
Peter Müller
62f2f2ab9d Core Update 172: Ship u-boot and regenerate all initrds
This ensures the newly compiled mkimage is executed on the system.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-22 21:50:15 +00:00
Adolf Belka
9b9433f306 ffmpeg: Fix build problem from updated texinfo
- With the 7.1 version of texinfo function names have changed which caused ffmpeg to fail
   to build. There were some unofficial patches to fix ffmpeg to work with the new texinfo
   but the simplest solution was to stop the docs being built in the configure command.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-22 21:41:02 +00:00
Adolf Belka
2596a514b2 texinfo: Update to version 7.1
- Update from version 7.0.3 to 7.1
- Update of rootfile
- Changelog
    7.1 (18 October 2023)
	* Language
	 . new generic definition commands, @defblock, @defline and @deftypeline,
	   for definitions without automatic index entries
	 . new @linemacro facility eases use of generic definition commands
	 . new command @link creates plain links (supported output formats only)
	 . @cartouche takes an argument to specify the cartouche title
	 . you can use the new commands @nodedescription and @nodedescriptionblock
	   to give text to be used in menu descriptions in Info and HTML output
	* texi2any
	 . @itemx at the beginning of a @table is now an error, not a warning
	 . better validity checking of deeply nested commands
	 . check that @set and @clear only appear at the start of a line
	 . warn about missing menu entries even if CHECK_NORMAL_MENU_STRUCTURE is
	   not set.  you can turn this off by setting CHECK_MISSING_MENU_ENTRY to 0.
	 . no longer use --enable-encoding and --disable-encoding to determine
	   whether to output encoded characters (instead of entities or commands)
	   for HTML, XML, DocBook and LaTeX; instead, use the value of the
	   OUTPUT_CHARACTERS customization variable.
	 . stricter checks on input encoding, in particular more warnings and
	   errors with malformed UTF-8
	 . support any input file encoding if support exists in the operating
	   system, not just a selected list of encodings
	 . resolve an alias referring to another alias at definition time
	 . internally, use "source marks" to keep all Texinfo source information that
	   is not in the final tree (location of macros, values and included files
	   expansion, @if* blocks, DEL comment, and @ protecting end of line on @def*
	   lines)
	 . HTML output:
	    . format @subentry and index entries with @seealso or @seeentry in a more
	      similar way to printed output
	    . output @shortcontents before @contents by default
	    . omit colons after index entries by default.  this can still be
	      configured with INDEX_ENTRY_COLON.
	    . add @example syntax highlighting as a texi2any extension
	    . no more capitalization of @sc argument in HTML Cross-references
	    . change @point expansion to U+22C6 in HTML Cross-references
	    . if a @node is not associated with a sectioning command but is
	      followed by a heading command not usually associated to nodes
	      such as @heading and this command appears before other formatted
	      content, the heading command is assumed to supply the node heading.
	      you can customize this with USE_NEXT_HEADING_FOR_LONE_NODE.
	 . Info output:
	    . new variable ASCII_DASHES_AND_QUOTES, on by default,
	      outputs ASCII characters for literal quote or hyphen characters
	      in source, rather than UTF-8.  this makes it easier to search
	      Info files.
	    . new ASCII_GLYPH variable for using ASCII renditions for glyph
	      commands (like @bullet)
	    . ASCII_PUNCTUATION still includes the effect of these new variables.
	    . new variables AUTO_MENU_DESCRIPTION_ALIGN_COLUMN and AUTO_MENU_MAX_WIDTH
	      control the format of descriptions in generated menus
	 . XML output:
	    . place menu leading text and menu separators in elements instead
	      of attributes
	* texi2dvi
	 . macro expansion with texi2any requires at least version 5.0 (only
	   happens with --expand option or with very old texinfo.tex)
	* texinfo.tex
	 . in @code, ` and ' output by default with backtick and undirected
	   single quote glyphs in the typewriter font.  you can still configure
	   this using the @codequoteundirected/@codequotebacktick commands.
	 . do not insert a space for @ def line continuation, matching the behavior
	   of texi2any
	 . align section titles in table of contents when more than 10 sections
	 . microtype is off by default, for speed
	 . page headings generation is no longer linked to the @titlepage command
	* info
	 . when going Up, position cursor on menu entry for current node
	 . allow mouse scrolling support regardless of termcap entries.  this
	   supports some more xterm configurations.
	 . do not use "/index" as a possible file extension for Info files
	* Distribution
	  . autoconf 2.71, automake 1.16.5, gettext 0.21

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-22 21:41:02 +00:00
Arne Fitzenreiter
ba1457912e u-boot: remove seperate mkinit pass
this is not needed anymore because the kernel is now build after
all other programs.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-11-22 21:38:11 +00:00
Peter Müller
a724c55b59 Core Update 182: Ship libsodium
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-22 21:37:05 +00:00
Adolf Belka
42f6ff94eb libsodium: Update to version 1.0.19
- Update from version 1.0.18 to 1.0.19
- Update of rootfile
- sobump so find-dependencies run. Identified dnsdist and shairport-sync to be shipped.
- Changelog
    1.0.19
	 - New AEADs: AEGIS-128L and AEGIS-256 are now available in the
	   `crypto_aead_aegis128l_*()` and `crypto_aead_aegis256_*()` namespaces.
	   AEGIS is a family of authenticated ciphers for high-performance applications,
	   leveraging hardware AES acceleration on `x86_64` and `aarch64`. In addition
	   to performance, AEGIS ciphers have unique properties making them easier and
	   safer to use than AES-GCM. They can also be used as high-performance MACs.
	 - The HKDF key derivation mechanism, required by many standard protocols, is
	   now available in the `crypto_kdf_hkdf_*()` namespace. It is implemented for
	   the SHA-256 and SHA-512 hash functions.
	 - The `osx.sh` build script was renamed to `macos.sh`.
	 - Support for android-mips was removed.
    1.0.18-stable
	 - Visual Studio: support for Windows/ARM64 builds has been added.
	 - Visual Studio: AVX512 implementations are enabled on supported CPUs.
	 - Visual Studio: an MSVC 2022 solution was added.
	 - Apple XCFramework: support for VisionOS was added.
	 - Apple XCFranework: support for Catalyst was added.
	 - Apple XCFramework: building the simulators is now optional.
	 - iOS: bitcode is not generated any more, as it was deprecated by Apple.
	 - watchOS: support for arm64 was added.
	 - The Zig toolchain can now be used as a modern build system to replace
	   autoconf/automake/libtool/make/ccache and the compiler. This enables faster
	   compilation times, easier cross compilation, and static libraries optimized
	   for any CPU.
	 - The Zig toolchain is now the recommended way to compile `libsodium`
	   to WebAssembly/WASI(X).
	 - libsodium can now be added as a dependency to Zig projects.
	 - Memory fences were added to remove some gadgets that could be used
	   alongside speculative loads.
	 - The AES-GCM implementation was completely rewritten. It is now faster,
	   and also available on aarch64, including Windows/ARM64.
	 - Compatibility with CET instrumentation / IBT / Shadow Stack was added.
	 - Emscripten: the `crypto_pwhash_*()` functions have been removed from Sumo
	   builds, as they reserve a substantial amount of JavaScript memory, even when
	   not used.
	 - Benchmarks now use `CLOCK_MONOTONIC` if possible.
	 - WebAssembly: tests can now run using Bun, WasmEdge, Wazero, wasm3 and
	   wasmer-js. Support for WAVM and Lucet have been removed, as these projects
	   have reached EOL.
	 - .NET: the minimum supported macOS version is now 1.0.15; this matches
	   Microsoft guidelines.
	 - .NET: all the packages are now built using Zig, on all platforms. This
	   allows us to easily match Microsoft's requirements, including supported glibc
	   versions. However, on x86_64, targets are expected to support at least the
	   AVX instruction set.
	 - .NET: packages for ARM64 are now available.
	 - C23 `memset_explicit()` is now used, when available.
	 - Compilation now uses `-Ofast` or `-O3` instead of `-O2` by default.
	 - Portability improvements to help compile libsodium to modern game consoles.
	 - JavaScript: a default `unhandledRejection` handler is not set any more.
	 - Slightly faster 25519 operations.
	 - OpenBSD: leverage `MAP_CONCEAL`.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-22 21:35:32 +00:00
Peter Müller
2087214036 Core Update 182: Ship and restart OpenSSH
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-22 16:14:26 +00:00
Peter Müller
9052b9f42f Core Update 182: Remove acidentially shipped firmware files
Introduced in ee0ee29843 .

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-22 16:11:32 +00:00
Peter Müller
3bad7e44dc Core Update 182: Require a reboot
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-22 16:06:55 +00:00
Peter Müller
ad86d8070e Core Update 182: Ship relevant changes of linux-firmware
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-22 16:06:00 +00:00
Peter Müller
08b61fd75e linux-firmware: Fix rootfile
Cc: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-22 15:26:28 +00:00
Adolf Belka
f56b492193 linux-firmware: Updat6e to version 20231030
- Update from version 20230804 to 20231030
- Update of rootfile - process defined by Peter Mueller used on rootfile to identify
   changes and check if the entries were commented out in previous rootfile.
   This is second time that I have used this approach so probably still worthwhile for
   Peter to confirm I got it correct.
- Patch for amd family 19h removed as it is now included in the source tarball.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-22 15:19:38 +00:00
Peter Müller
54dbdf552c Core Update 182: Ship and restart strongSwan
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-22 14:56:09 +00:00
Adolf Belka
7c3540fa93 strongswan: Update to version 5.9.12
- Update from version 5.9.11 to 5.9.12
- Update of rootfile
- Changelog
    5.9.12
	Vulnerabilities
	    Fixed a vulnerability in charon-tkm (the TKM-backed version of the charon IKE
	     daemon) related to processing DH public values that can lead to a buffer
	     overflow and potentially remote code execution. This vulnerability has been
	     registered as CVE-2023-41913. Please refer to our blog for details.
	New Feature Additions
	    The new pki --ocsp command produces OCSP responses based on certificate status
	     information provided by implementations of the new ocsp_responder_t interface
	     (#1958).
	    Two sources are currently available, the openxpki plugin that directly
	     accesses the OpenXPKI database and the command's --index argument, which
	     reads certificate status information from OpenSSL-style index.txt files
	     (multiple CAs are supported concurrently).
	    The new cert-enroll script handles the initial enrollment of an X.509 host
	     certificate with a PKI server via the EST or SCEP protocols.
	    Run as a systemd timer or via a crontab entry, the script checks the
	     expiration date of the host certificate daily. When a given deadline is
	     reached, the host certificate is automatically renewed via EST or SCEP
	     re-enrollment based on the possession of the old private key and the
	     matching certificate.
	    Added a global option (charon.reject_trusted_end_entity) to prevent peers
	     from authenticating with certificates that are locally trusted, in
	     particular, our own local certificate, which safeguards against accidental
	     reuse of certificates on multiple peers. As the name suggests, all trusted
	     end-entity certificates are rejected if enabled, so peer certificates can't
	     be configured explicitly anymore (e.g. via remote.certs in swanctl.conf).
	    The --priv argument for charon-cmd allows the use of any type of private key
	     (previously, only RSA keys were supported).
	    The openssl plugin now supports the nameConstraints extension in X.509
	     certificates (#1990).
	    Support for nameConstraints of type iPAddress are now supported by the x509,
	     openssl and constraints plugins (#1991).
	    Support for encoding subjectAlternativeName extensions of type
	     uniformResourceIdentifier in X.509 certificates has been added via the uri:
	     prefix (e.g. for URNs, #1983).
	    Support for password-less PKCS#12 and PKCS#8 files has been added (#1955).
	Enhancements and Optimizations
	    Because of a relatively recent NIAP requirement (TD0527, Test 8b), loading of
	     certificates with ECDSA keys that explicitly encode the curve parameters is
	     rejected if possible. Explicit encoding is pretty rare to begin with and
	     e.g. wolfSSL already rejects such keys, by default. All crypto plugins that
	     support ECDSA enforce this by rejecting such public keys, except when using
	     older versions of OpenSSL (< 1.1.1h) or Botan (< 3.2.0) (#1949).
	    Make the NetworkManager plugin (charon-nm) actually use the XFRM interface it
	     creates since 5.9.10. This involves setting interface IDs on SAs and
	     policies, and installing routes via the interface. To avoid routing loops if
	     the remote traffic selectors include the VPN server, IKE and ESP packets are
	     marked to bypass the routing table that contains the routes via XFRM
	     interface (69e0c11).
	    If available, the plugin now also adopts the interface name configured in
	     connection.interface-name in a *.nmconnection file as name for the XFRM
	     interface instead of generating one randomly (e8f8d32).
	    The resolve plugin tries to maintain the order of DNS servers it installs via
	     resolvconf or resolv.conf (6440975, 8238ad4).
	    The kernel-libipsec plugin now always installs routes to remote networks even
	     if no address is found in the local traffic selectors, which allows
	     forwarding traffic from networks the VPN host is not part of (190d8cb).
	    Increased the default receive buffer size for Netlink sockets to 8 MiB
	     (doubled by the kernel to account for overhead) and simplified the
	     configuration (no need for a separate option to force overriding rmem_max).
	     It's now also set for event sockets, which previously could cause issues on
	     hosts with e.g. lots of route changes (#1757).
	    When issuing certificates, the subjectKeyIdentifier of the issuing
	     certificate, if available, is now copied as authorityKeyIdentifier, instead
	     of always generating a SHA-1 hash of the issuer's subjectPublicKey
	     (#1992, 6941dcb).
	    Explicitly request permission to display notifications on Android 13+
	     (ddf84c1), also enabled hardware acceleration for the Android-specific
	     OpenSSL build.
	Fixes
	    Fixed issues while reestablishing multiple CHILD_SAs (e.g. after a DPD
	     timeout) that could cause a reqid to get assigned to multiple CHILD_SAs with
	     unrelated traffic selectors (#1855).
	    Fixed an issue in watcher_t with handling errors on sockets (e.g. if the
	     receive buffer is full), which caused an infinite loop if poll() only
	     signaled POLLERR as event (#1757).
	    Fixed an issue in the IKE_SA_INIT tracking code that was added with 5.9.6,
	     which did not correctly untrack invalid messages with non-zero message IDs
	     or SPIs (0b47357).
	    Fixed a regression introduced with 5.9.8 when handling IKE redirects during
	     IKE_AUTH (595fa07).
	    Fixed adding the XFRMA_REPLAY_ESN_VAL attribute twice when updating SAs in
	     the kernel-netlink plugin, which prevented MOBIKE updates if a large
	     anti-replay window was used (#1967).
	    Fixed a race condition in the kernel-pfroute plugin when adding virtual IPs
	     if the TUN device is activated after the address was already added
	     internally, which caused the installed route not to go via TUN device in
	     order to force the virtual IP as source address (#1807).
	    Fixed an issue in libtls that could cause the wrong ECDH group to get
	     instantiated (b5e4bf4).
	    Fixed the encoding of the CHILD_SA_NOT_FOUND notify if a CHILD_SA is not
	     found during rekeying. It was previously empty, now contains the SPI and
	     sets the protocol to the values received in the REKEY_SA notify (849c2c9).
	    Fixed a possible issue with MOBIKE in the Android client on certain devices
	     (#1691).
	For Developers
	    The new ocsp_responder_t interface can be implemented to provide certificate
	     status information to the pki --ocsp command. Responders can be
	     (un-)registered via the ocsp_responders_t instance at lib->ocsp.
	    For the watcher_t component, WATCHER_EXCEPT has been removed as there is no
	     way to explicitly listen for errors on sockets and poll() actually can
	     return POLLERR for any FD and it might even be the only signaled event
	     (which caused an infinite loop previously). Now we simply notify the
	     registered callbacks. The error is then reported by e.g. recvfrom(), which
	     was already the case before if POLLERR was returned together with
	     e.g. POLLIN.
	    The reqids allocated for CHILD_SAs (including trap policies) via
	     kernel_interface_t::alloc_reqid() are now refcounted. When recreating a
	     CHILD_SA, a reference to the reqid can be requested via
	     child_sa_t::get_reqid_ref(). If another reference is required afterwards,
	     one can be acquired directly via kernel_interface_t::ref_reqid(). Each
	     reference has to be released via kernel_interface_t::release_reqid(), whose
	     interface was simplified.
	    The testing environment is now based on Debian 12 (bookworm), by default.
	     Also, when copying files to guests, the guest-specific files are now copied
	     after the default files, which allows overriding files per guest (fixes an
	     issue with winnetou's /etc/fstab and mounting the test results).
	Refer to the 5.9.12 milestone for a list of all closed issues and pull requests.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-11-22 14:50:25 +00:00
Adolf Belka
62bbb4e876 minicom: Update to version 2.9
- Update from version 2.8 to 2.9
- Update of rootfile
- Changelog
	This file (NEWS) lists the most important changes to
	 the previous released version. For a full list of changes
	 please refer to the ChangeLog file.
    New for version 2.9:
	 - Change Hardware Flow Control Default to No.
	 - Timestamping mode is now saved and restored.
	 - Split "Screen and Keyboard" menu into two menus.
	 - Update to gettext-0.21.
	 - Change return values of --help and --version to success.
	 - Support higher baud rates on MacOS
	 - Save character send delay to config file
	 - Save newline send delay to config file
	 - Update translations: Romanian, German, French, Norwegian/Bookmal, Polish,
	                        Serbian, Swedish
	 - New translation: Georgian, Korean

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:31:28 +00:00
Adolf Belka
93d9052216 meson: Update to version 1.2.3
- Update from version 1.2.0 to 1.2.3
- Update of rootfile
- Changelog
   The meson changelog is defined only at the 1.2 level. So what changes are related in
    going from 1.2.0 to 1.2.3 can not be determined.
   The changes have to be reviewed from the 1.2 branch of commits
    https://github.com/mesonbuild/meson/commits/1.2

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:30:42 +00:00
Peter Müller
c4a9658346 Core Update 182: Ship lua
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-21 19:28:27 +00:00
Adolf Belka
ed1c441faa lua: Update to version 5.4.6
- Update from version 5.4.4 to 5.4.6
- Update of rootfile
- Updated version number in shared library patch
- Changelog
    5.4.6
	read overflow in 'l_strcmp'. Reported by Xmilia Hermit on 09 Jun 2023. existed
	 since 5.0 (at least). fixed in github.
	Call hook may be called twice when count hook yields. Reported by G.k Ray on
	 20 Jul 2023. existed since 5.4.0 (at least). fixed in github.
	Wrong line number for function calls. Reported by Thadeu de Paula on 20 Aug 2023.
	 existed since 5.2. fixed in github.
    5.4.5
	Changing the signature of 'lua_resetthread' broke ABI. Reported by Andrew Gierth
	 on 29 Apr 2023. fixed in 5.4.6. fixed in github

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:27:56 +00:00
Peter Müller
63ac685b97 Core Update 182: Ship xz
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-21 19:27:16 +00:00
Adolf Belka
19d67c8202 xz: Update to version 5.4.5
- Update from version 5.4.0 to 5.4.5
- Update of rootfile
- Changelog
    5.4.5 (2023-11-01)
	    * liblzma:
	        - Use __attribute__((__no_sanitize_address__)) to avoid address
	          sanitization with CRC64 CLMUL. It uses 16-byte-aligned reads
	          which can extend past the bounds of the input buffer and
	          inherently trigger address sanitization errors. This isn't
	          a bug.
	        - Fixed an assertion failure that could be triggered by a large
	          unpadded_size argument. It was verified that there was no
	          other bug than the assertion failure.
	        - Fixed a bug that prevented building with Windows Vista
	          threading when __attribute__((__constructor__)) is not
	          supported.
	    * xz now properly handles special files such as "con" or "nul" on
	      Windows. Before this fix, the following wrote "foo" to the
	      console and deleted the input file "con_xz":
	          echo foo | xz > con_xz
	          xz --suffix=_xz --decompress con_xz
	    * Build systems:
	        - Allow builds with Windows win95 threading and small mode when
	          __attribute__((__constructor__)) is supported.
	        - Added a new line to liblzma.pc for MSYS2 (Windows):
	              Cflags.private: -DLZMA_API_STATIC
	          When compiling code that will link against static liblzma,
	          the LZMA_API_STATIC macro needs to be defined on Windows.
	        - CMake specific changes:
	            * Fixed a bug that allowed CLOCK_MONOTONIC to be used even
	              if the check for it failed.
	            * Fixed a bug where configuring CMake multiple times
	              resulted in HAVE_CLOCK_GETTIME and HAVE_CLOCK_MONOTONIC
	              not being set.
	            * Fixed the build with MinGW-w64-based Clang/LLVM 17.
	              llvm-windres now has more accurate GNU windres emulation
	              so the GNU windres workaround from 5.4.1 is needed with
	              llvm-windres version 17 too.
	            * The import library on Windows is now properly named
	              "liblzma.dll.a" instead of "libliblzma.dll.a"
	            * Fixed a bug causing the Ninja Generator to fail on
	              UNIX-like systems. This bug was introduced in 5.4.0.
	            * Added a new option to disable CLMUL CRC64.
	            * A module-definition (.def) file is now created when
	              building liblzma.dll with MinGW-w64.
	            * The pkg-config liblzma.pc file is now installed on all
	              builds except when using MSVC on Windows.
	            * Added large file support by default for platforms that
	              need it to handle files larger than 2 GiB. This includes
	              MinGW-w64, even 64-bit builds.
	    * Small fixes and improvements to the tests.
	    * Updated translations: Chinese (simplified) and Esperanto.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:26:44 +00:00
Peter Müller
63b6cf30ff Core Update 182: Ship xfsprogs
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-21 19:24:52 +00:00
Adolf Belka
04c56231bd xfsprogs: Update to version 6.5.0
- Update from version 6.4.0 to 6.5.0
- Update of rootfile
- Changelog is not separately available. Details of changes can be seen by reviewing the
   git commits https://git.kernel.org/pub/scm/fs/xfs/xfsprogs-dev.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:24:39 +00:00
Peter Müller
2d07d98cf7 Core Update 182: Ship usbutils
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-21 19:24:21 +00:00
Adolf Belka
224649ce8e usbutils: Update to version 017
- Update from version 015 to 017
- Update of rootfile
- Changelog
    017
      lsusb: fix up [unknown] vendor and product strings.
      lsusb: fix build warning for dump_billboard_alt_mode_capability_desc()
      lsusb: add fallback names for 'lsusb -v' output
      names: simplify get_vendor_product_with_fallback() a bit
      Honor system libdir and includedir
    016
      usbutils: lsusb-t: print entries for devices with no interfaces
      Fix a typo in usb-spec.h
      lsusb.py.in: Display (device) power/wakeup via -w option.
      Fix an incorrect length value in hid descriptor.
      Fix misalignments in hid device descripptor.
      Use bigger buffer to place speed value string
      lsusb -h returns an error
      lsusb -h fixups
      lsusb -t: sort in bus order, not reverse order
      lsusb -t: print ports and busses and devices with same width
      lsusb -t: assign_interface_to_parent() fixups
      lsusb.8.in: fix up missing '-' in text
      README.md: add source location
      lsusb.py: fix up wakeup logic for devices that do not support it
      lsusb.py.in: add another default path for usb.ids
      names.c: if a string can not be found in the usb.ids file, return [unknown]
      lsusb-t: if a driver is not bound to an interface, report "[none]"
      Generate usbutils.pc pkgconfig file
      usbreset: Allow idProduct and idVendor to be 0
      usb-devices: make shellcheck happy
      lsusb: Add function that sorts the output by device ID.
      lsusb: Additional sorting by bus number.
      lsusb: This is a more compact implementation of the device list sort implemented
	within this pull request. The output remains the same as the one demonstrated in
	the previous commit.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:23:58 +00:00
Peter Müller
a96f4600e2 Core Update 182: Ship sudo
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-21 19:23:33 +00:00
Adolf Belka
62c2ba58b4 sudo: Update to version 1.9.15p2
- Update from version 1.9.14p2 to 1.9.15p2
- Update of rootfile
- Changelog
    1.9.15p2
	 * Fixed a bug on BSD systems where sudo would not restore the
	   terminal settings on exit if the terminal had parity enabled.
	   GitHub issue #326.
    1.9.15p1
	 * Fixed a bug introduced in sudo 1.9.15 that prevented LDAP-based
	   sudoers from being able to read the ldap.conf file.
	   GitHub issue #325.
    1.9.15
	 * Fixed an undefined symbol problem on older versions of macOS
	   when "intercept" or "log_subcmds" are enabled in sudoers.
	   GitHub issue #276.
	 * Fixed "make check" failure related to getpwent(3) wrapping
	   on NetBSD.
	 * Fixed the warning message for "sudo -l command" when the command
	   is not permitted.  There was a missing space between "list" and
	   the actual command due to changes in sudo 1.9.14.
	 * Fixed a bug where output could go to the wrong terminal if
	   "use_pty" is enabled (the default) and the standard input, output
	   or error is redirected to a different terminal.  Bug #1056.
	 * The visudo utility will no longer create an empty file when the
	   specified sudoers file does not exist and the user exits the
	   editor without making any changes.  GitHub issue #294.
	 * The AIX and Solaris sudo packages on www.sudo.ws now support
	   "log_subcmds" and "intercept" with both 32-bit and 64-bit
	   binaries.  Previously, they only worked when running binaries
	   with the same word size as the sudo binary.  GitHub issue #289.
	 * The sudoers source is now logged in the JSON event log.  This
	   makes it possible to tell which rule resulted in a match.
	 * Running "sudo -ll command" now produces verbose output that
	   includes matching rule as well as the path to the sudoers file
	   the matching rule came from.  For LDAP sudoers, the name of the
	   matching sudoRole is printed instead.
	 * The embedded copy of zlib has been updated to version 1.3.
	 * The sudoers plugin has been modified to make it more resilient
	   to ROWHAMMER attacks on authentication and policy matching.
	   This addresses CVE-2023-42465.
	 * The sudoers plugin now constructs the user time stamp file path
	   name using the user-ID instead of the user name.  This avoids a
	   potential problem with user names that contain a path separator
	   ('/') being interpreted as part of the path name.  A similar
	   issue in sudo-rs has been assigned CVE-2023-42456.
	 * A path separator ('/') in a user, group or host name is now
	   replaced with an underbar character ('_') when expanding escapes
	   in @include and @includedir directives as well as the "iolog_file"
	   and "iolog_dir" sudoers Default settings.
	 * The "intercept_verify" sudoers option is now only applied when
	   the "intercept" option is set in sudoers.  Previously, it was
	   also applied when "log_subcmds" was enabled.  Sudo 1.9.14
	   contained an incorrect fix for this.  Bug #1058.
	 * Changes to terminal settings are now performed atomically, where
	   possible.  If the command is being run in a pseudo-terminal and
	   the user's terminal is already in raw mode, sudo will not change
	   the user's terminal settings.  This prevents concurrent sudo
	   processes from restoring the terminal settings to the wrong values.
	   GitHub issue #312.
	 * Reverted a change from sudo 1.9.4 that resulted in PAM session
	   modules being called with the environment of the command to be
	   run instead of the environment of the invoking user.
	   GitHub issue #318.
	 * New Indonesian translation from translationproject.org.
	 * The sudo_logsrvd server will now raise its open file descriptor
	   limit to the maximum allowed value when it starts up.  Each
	   connection can require up to nine open file descriptors so the
	   default soft limit may be too low.
	 * Better log message when rejecting a command if the "intercept"
	   option is enabled and the "intercept_allow_setid" option is
	   disabled.  Previously, "command not allowed" would be logged and
	   the user had no way of knowing what the actual problem was.
	 * Sudo will now log the invoking user's environment as "submitenv"
	   in the JSON logs.  The command's environment ("runenv") is no
	   longer logged for commands rejected by the sudoers file or an
	   approval plugin.
    1.9.14p3
	 * Fixed a crash with Python 3.12 when the sudo Python plugin is
	   unloaded.  This only affects "make check" for the Python plugin.
	 * Adapted the sudo Python plugin test output to match Python 3.12.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:23:18 +00:00
Peter Müller
bd0893113d Core Update 182: Ship shadow
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-21 19:21:56 +00:00
Adolf Belka
b7d83e90e9 sdl2: Update to version 2.18.5
- Update from version 2.28.3 to 2.28.5
- Update of rootfile
- Changelog
    2.28.5
	This is a stable bugfix release, with the following changes:
	    Added support for the HP HyperX Clutch Gladiate controller
	    Fixed a crash if a controller is disconnected while SDL is opening it
	    Fixed a crash on Linux if XInput2 isn't available at runtime
    2.28.4
	This is a stable bugfix release, with the following changes:
	    Enable clipping for zero sized rectangles in the SDL renderer
	    Notify X11 clipboard managers when the clipboard changes
	    Fixed sensor timestamps for third-party PS5 controllers
	    Added detection for Logitech and Simagic racing wheels

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:21:16 +00:00
Adolf Belka
314baa5831 nut: Update to version 2.8.1
- Update from 2.8.0 to 2.8.1
- Update of rootfile
- Disable creating docs i9n configure statement
- Changelog is too large to include here (~500 lines). For more details read the NEWS.adoc
   file in thye source tarball.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:20:19 +00:00
Peter Müller
dca3d1a5e8 Core Update 182: Ship hwdata
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-21 19:19:58 +00:00