Commit Graph

9770 Commits

Author SHA1 Message Date
Adolf Belka
6fd8dd43b6 dbus: Update to version 1.14.0
- Update from 1.12.20 to 1.14.0
- Update of rootfile
- Changelog
   1.14.x is a new stable branch, superseding 1.12.x.
   Summary of major changes between 1.12.x and 1.14.0
     Dependencies:
	• dbus now requires at least a basic level of support for C99 variadic
	  macros, as implemented in gcc >= 3, all versions of Clang, and
	  MSVC >= 2005. In practice this requirement has existed since version
	  1.9.2, but it is now official.
	• dbus now requires a C99-compatible va_copy() macro (or a __va_copy()
	  macro with the same behaviour), except when building for Windows using
	  MSVC and CMake.
	• On Unix platforms, if getpwnam_r() and getgrnam_r() are implemented,
	  they must be POSIX-conformant. The non-POSIX signature seen in ancient
	  Solaris versions will no longer work.
	• All Windows builds now require Windows Vista or later.
	  (Note that we do not recommend or support use of dbus on operating
	  systems outside their vendor's security support lifetime, such as Vista.)
	• GLib >= 2.38 is required if full test coverage is enabled
	  (reduced from 2.40 in dbus 1.12.x.)
	• Building using CMake now requires CMake 3.4.
	• Building documentation using CMake now requires xsltproc, Docbook DTDs
	  (for example docbook-xml on Debian derivatives), and Docbook XSLT
	  stylesheets (for example docbook-xsl on Debian derivatives). Using
	  KDE's meinproc4 documentation processor is no longer supported.
     Build-time configuration changes:
	• Move CMake build system to top level, matching normal practice for
	  CMake projects
     Deprecations:
        **Looking through these I don't believe they will cause a problem as they are
          deprecations and not yet removed.In the future if needed we might need to set
          datadir to /etc to keep the location the same as with syscondir. This won't be
          needed if we don't use the system.d directory for dbus policies.
	• Third-party software should install default dbus policies for the system
	  bus into ${datadir}/dbus-1/system.d (this has been supported since dbus
	  1.10, released in August 2015). Installing default dbus policies in
	  ${sysconfdir}/dbus-1/system.d is now considered to be deprecated. Policy
	  files in ${sysconfdir}/dbus-1/system.d continue to be read, but this
	  directory should only be used by system administrators wishing to
	  override the default policies.
	  The ${datadir} applicable to dbus is usually /usr/share and the
	  ${sysconfdir} is usually /etc.
	• A similar pattern applies to the session bus policies in session.d.
	• The dbus-send(1) man page now documents --bus and --peer instead of
	  the old --address synonym for --peer, which has been deprecated since
	  the introduction of --bus and --peer in 1.7.6
	• The dbus-daemon man page now has scarier warnings about
	  <allow_anonymous/> and non-local TCP, which are insecure and should
	  not be used, particularly for the standard system and session buses
	• DBusServer (and hence the dbus-daemon) no longer accepts usernames
	  (login names) for the recommended EXTERNAL authentication mechanism,
	  only numeric user IDs or the empty string. See 1.13.0 release notes
	  for full details.
     New features:
	• On Linux 4.13 or later when built against a suitable glibc version,
	  GetConnectionCredentials() now includes UnixGroupIDs, the effective
	  group IDs of the initiator of the connection, taken from
	  SO_PEERGROUPS.
	• On Linux 4.13 or later, <policy group="…"> now uses the SO_PEERGROUPS
	  credentials-passing socket option to get the effective group IDs
	  of the initiator of the connection. See 1.13.4 release notes for details.
	• Add a --sender option to dbus-send, which requests a name and holds it
	  until the signal has been sent
	• dbus-daemon <allow> and <deny> rules can now specify a
	  send_destination_prefix attribute, which is like a combination of
	  send_destination and the arg0namespace keyword in match rules.
	  See 1.13.12 release notes for more details
	• The dbus-daemon now filters the messages that it relays, removing
	  header fields that it does not understand. Clients must not rely on
	  this behaviour unless they have confirmed that they are connected to
	  a suitable message bus implementation, for example by querying its
	  Features property.
	• The dbus-daemon now emits a signal, ActivatableServicesChanged, when
	  the list of activatable services may have changed. Support for this
	  signal can be discovered by querying the Features property.
	• It is now possible to disable traditional (non-systemd) service
	  activation at build-time (Autotools: --disable-traditional-activation,
	  CMake: -DENABLE_TRADITIONAL_ACTIVATION=OFF). See 1.13.10 release notes
	  for details.
	• The API reference manual can be built as a Qt compiled help file if
	  qhelpgenerator(-qt5) is available. See 1.13.16 release notes for details.
     Miscellaneous behaviour changes:
	• When using the "user bus" (--enable-user-session), put the dbus-daemon
	  in the session slice
	• Several environment variables set by systemd are no longer passed
	  on to activated services
	• If the dbus-daemon is compiled for Linux with systemd support, it
	  now informs systemd that it is ready for use via the sd_notify()
	  mechanism
	• Tarball releases no longer contain pre-2007 changelogs and are now
	  compressed with xz, making them around 35% smaller.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-04-10 10:56:35 +00:00
Peter Müller
77be7ab63b Core Update 168: Ship expat
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:20:31 +00:00
Adolf Belka
54fe871c83 expat: Update to version 2.4.8
- Update from 2.4.6 to 2.4.8
- Update of rootfile
- Changelog
   Release 2.4.8 Mon March 28 2022
        Other changes:
            #587  pkg-config: Move "-lm" to section "Libs.private"
            #587  CMake|MSVC: Fix pkg-config section "Libs"
            #55 #582  CMake|macOS: Start using linker arguments
                        "-compatibility_version <version>" and
                        "-current_version <version>" in a way compatible with
                        GNU Libtool
            #590 #591  Version info bumped from 9:7:8 to 9:8:8;
                         see https://verbump.de/ for what these numbers do
        Infrastructure:
            #589  CI: Upgrade Clang from 13 to 14
Release 2.4.7 Fri March 4 2022
        Bug fixes:
            #572 #577  Relax fix to CVE-2022-25236 (introduced with release 2.4.5)
                         with regard to all valid URI characters (RFC 3986),
                         i.e. the following set (excluding whitespace):
                         ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz
                         0123456789 % -._~ :/?#[]@ !$&'()*+,;=
        Other changes:
            #555 #570 #581  CMake|Windows: Store Expat version in the DLL
            #577  Document consequences of namespace separator choices not just
                    in doc/reference.html but also in header <expat.h>
            #577  Document Expat's lack of validation of namespace URIs against
                    RFC 3986, and that the XML 1.0r4 specification doesn't
                    require Expat to validate namespace URIs, and that Expat
                    may do more in that regard in future releases.
                    If you find need for strict RFC 3986 URI validation on
                    application level today, https://uriparser.github.io/ may
                    be of interest.
            #579  Fix documentation of XML_EndDoctypeDeclHandler in <expat.h>
            #575  Document that a call to XML_FreeContentModel can be done at
                    a later time from outside the element declaration handler
            #574  Make hardcoded namespace URIs easier to find in code
            #573  Update documentation on use of XML_POOR_ENTOPY on Solaris
            #569 #571  tests: Resolve use of macros NAN and INFINITY for GNU G++
                         4.8.2 on Solaris.
            #578 #580  Version info bumped from 9:6:8 to 9:7:8;
                         see https://verbump.de/ for what these numbers do

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:20:22 +00:00
Peter Müller
9c4e7e3b49 Core Update 168: Ship libgcrypt
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:20:11 +00:00
Adolf Belka
2a8de00c6f libgcrypt: Update to version 1.10.1
- Update from 1.9.4 to 1.10.1
- Update of rootfile
- Changelog
   Noteworthy changes in version 1.10.1 (2022-03-28)  [C24/A4/R1]
       * Bug fixes:
	   - Fix minor memory leaks in FIPS mode.
	   - Build fixes for MUSL libc.  [rCffaef0be61]
       * Other:
	   - More portable integrity check in FIPS mode.  [rC9fa4c8946a,T5835]
	   - Add X9.62 OIDs to sha256 and sha512 modules.  [rC52fd2305ba]
   Noteworthy changes in version 1.10.0 (2022-02-01)  [C24/A4/R0]
       * New and extended interfaces:
	   - New control codes to check for FIPS 140-3 approved algorithms.
	   - New control code to switch into non-FIPS mode.
	   - New cipher modes SIV and GCM-SIV as specified by RFC-5297.
	   - Extended cipher mode AESWRAP with padding as specified by
	     RFC-5649.  [T5752]
	   - New set of KDF functions.
	   - New KDF modes Argon2 and Balloon.
	   - New functions for combining hashing and signing/verification.  [T4894]
       * Performance:
	   - Improved support for PowerPC architectures.
	   - Improved ECC performance on zSeries/s390x by using accelerated
	     scalar multiplication.
	   - Many more assembler performance improvements for several
	     architectures.
       * Bug fixes:
	   - Fix Elgamal encryption for other implementations.
	     [R5328,CVE-2021-40528]
	   - Fix alignment problem on macOS.  [T5440]
	   - Check the input length of the point in ECDH.  [T5423]
	   - Fix an abort in gcry_pk_get_param for "Curve25519".  [T5490]
       * Other features:
	   - The control code GCRYCTL_SET_ENFORCED_FIPS_FLAG is ignored
	     because it is useless with the FIPS 140-3 related changes.
	   - Update of the jitter entropy RNG code.  [T5523]
	   - Simplification of the entropy gatherer when using the getentropy
	     system call.
       * Interface changes relative to the 1.10.0 release:
	   GCRYCTL_SET_DECRYPTION_TAG            NEW control code.
	   GCRYCTL_FIPS_SERVICE_INDICATOR_CIPHER NEW control code.
	   GCRYCTL_FIPS_SERVICE_INDICATOR_KDF    NEW control code.
	   GCRYCTL_NO_FIPS_MODE = 83             NEW control code.
	   GCRY_CIPHER_MODE_SIV                  NEW mode.
	   GCRY_CIPHER_MODE_GCM_SIV              NEW mode.
	   GCRY_CIPHER_EXTENDED                  NEW flag.
	   GCRY_SIV_BLOCK_LEN                    NEW macro.
	   gcry_cipher_set_decryption_tag        NEW macro.
	   GCRY_KDF_ARGON2                       NEW constant.
	   GCRY_KDF_BALLOON                      NEW constant.
	   GCRY_KDF_ARGON2D                      NEW constant.
	   GCRY_KDF_ARGON2I                      NEW constant.
	   GCRY_KDF_ARGON2ID                     NEW constant.
	   gcry_kdf_hd_t                         NEW type.
	   gcry_kdf_job_fn_t                     NEW type.
	   gcry_kdf_dispatch_job_fn_t            NEW type.
	   gcry_kdf_wait_all_jobs_fn_t           NEW type.
	   struct gcry_kdf_thread_ops            NEW struct.
	   gcry_kdf_open                         NEW function.
	   gcry_kdf_compute                      NEW function.
	   gcry_kdf_final                        NEW function.
	   gcry_kdf_close                        NEW function.
	   gcry_pk_hash_sign                     NEW function.
	   gcry_pk_hash_verify                   NEW function.
	   gcry_pk_random_override_new           NEW function.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:20:01 +00:00
Peter Müller
bf1defce55 Core Update 168: Ship libnml
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:18:50 +00:00
Peter Müller
88e01ab855 Core Update 168: Remove netbpm add-on, if installed
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:18:01 +00:00
Peter Müller
00c31b2918 Core Update 168: Remove libnl files
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:13:32 +00:00
Adolf Belka
8841ef1968 netpbm: Removal from IPFire
- This is an addon whose purpose is defined as :-
   Netpbm is a toolkit for manipulation of graphic images, including conversion of images
   between a variety of different formats. There are over 300 separate tools in the
   package including converters for about 100 graphics formats. Examples of the sort of
   image manipulation we're talking about are: Shrinking an image by 10%; Cutting the top
   half off of an image; Making a mirror image; Creating a sequence of images that fade
   from one image to another.
- None of the above seems to be a purpose related to a Firewall. Additionally it is
   available in a huge number of distributions, including Linux, BSD,Windows,
   MacOS X/Darwin, Solaris, AIX etc
- This package seems to be better used on a system in the lan protected by IPFire than
   used on IPFire itself

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:13:28 +00:00
Adolf Belka
411cd0ca9c libnl: Removal from IPFire
- This is the legacy version of libnl - 1.1.4 and was released in 2013
- libnl-3 is the running stable version - 3.5.0
- Nothing in IPFire has libnl as a dependency. Large number of programs have libnl-3 as
   a dependency
- libnl developer indicates that libnl-3 should be used if in any way possible and that
   the legacy version is for situations that fail to work with libnl-3
- As everything in IPFire looks to already be using libnl-3 this patch is to remove the
   legacy version

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:12:08 +00:00
Peter Müller
22ac250b37 Core Update 168: Ship perl-libwww
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:05:38 +00:00
Peter Müller
6ac573bd8f Core Update 168: Ship whois
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 10:04:42 +00:00
Peter Müller
da8ca3b121 Core Update 168: Ship changed networking initscripts
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 09:56:44 +00:00
Adolf Belka
18ed846002 python3-pyparsing: Update to version 3.0.7
- Update from 3.0.6 to 3.0.7
- Update of rootfile
- Changelog
	Version 3.0.7 -
	- Fixed bug #345, in which delimitedList changed expressions in place
	  using expr.streamline(). Reported by Kim Gräsman, thanks!
	- Fixed bug #346, when a string of word characters was passed to WordStart
	  or WordEnd instead of just taking the default value. Originally posted
	  as a question by Parag on StackOverflow, good catch!
	- Fixed bug #350, in which White expressions could fail to match due to
	  unintended whitespace-skipping. Reported by Fu Hanxi, thank you!
	- Fixed bug #355, when a QuotedString is defined with characters in its
	  quoteChar string containing regex-significant characters such as ., *,
	  ?, [, ], etc.
	- Fixed bug in ParserElement.run_tests where comments would be displayed
	  using with_line_numbers.
	- Added optional "min" and "max" arguments to `delimited_list`. PR
	  submitted by Marius, thanks!
	- Added new API change note in `whats_new_in_pyparsing_3_0_0`, regarding
	  a bug fix in the `bool()` behavior of `ParseResults`.
	  Prior to pyparsing 3.0.x, the `ParseResults` class implementation of
	  `__bool__` would return `False` if the `ParseResults` item list was empty,
	  even if it contained named results. In 3.0.0 and later, `ParseResults` will
	  return `True` if either the item list is not empty *or* if the named
	  results dict is not empty.
	    # generate an empty ParseResults by parsing a blank string with
	    # a ZeroOrMore
	      result = Word(alphas)[...].parse_string("")
	      print(result.as_list())
	      print(result.as_dict())
	      print(bool(result))
	  Prints:
	      []
	      {}
	      False
	    # add a results name to the result
	      result["name"] = "empty result"
	      print(result.as_list())
	      print(result.as_dict())
	      print(bool(result))
	  Prints:
	      []
	      {'name': 'empty result'}
	      True
	  In previous versions, the second call to `bool()` would return `False`.
	- Minor enhancement to Word generation of internal regular expression, to
	  emit consecutive characters in range, such as "ab", as "ab", not "a-b".
	- Fixed character ranges for search terms using non-Western characters
	  in booleansearchparser, PR submitted by tc-yu, nice work!
	- Additional type annotations on public methods.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 09:51:56 +00:00
Peter Müller
b86bd4f90a Core Update 168: Remove libevent files
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 09:51:22 +00:00
Adolf Belka
e2e51070a1 libevent: Remove from IPFire
- Build worked without libevent without problems
- Nothing shows up as dependent on the libevent (legacy) libraries
- Lots of dependencies on the the libevent2 libraries

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 09:50:25 +00:00
Peter Müller
943ce57701 Core Update 168: Ship libnfnetlink
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 09:49:55 +00:00
Peter Müller
d258332f5b Core Update 168: Remove orphaned files
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 09:49:02 +00:00
Adolf Belka
a6d966e1b7 sdparm: Removal from IPFire
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-10 09:45:59 +00:00
Adolf Belka
9624937d91 pigz: Removal from IPFire
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-10 09:45:59 +00:00
Adolf Belka
8596753472 libsolv: Removal from IPFire
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-10 09:45:59 +00:00
Adolf Belka
adee552866 libpri: Removal from IPFire
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-10 09:45:58 +00:00
Adolf Belka
03216bd01c libdnet: Removal from IPFire
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-10 09:45:58 +00:00
Adolf Belka
758162bdc4 libart: Removal from IPFire
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-10 09:45:58 +00:00
Peter Müller
77c3824f28 Start Core Update 168
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-10 09:42:56 +00:00
Arne Fitzenreiter
f1b0673572 kernel: arm rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-10 09:42:16 +02:00
Peter Müller
83c8662be8 Core Update 167: Ship gzip
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-09 07:39:45 +00:00
Peter Müller
5a9b650759 Core Update 167: Ship backupiso script
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 16:05:29 +00:00
Peter Müller
6238a7098d Core Update 167: Apply local SSH changes to configuration file
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 16:01:03 +00:00
Peter Müller
490e86f403 Core Update 167: Update linker config before calling GPG
This avoids log messages like:
ldconfig: /lib/ld-linux-x86-64.so.2 is not a symbolic link

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 15:59:25 +00:00
Peter Müller
c9b5a4756f Core Update 167: Ship and apply sysctl changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-08 15:58:41 +00:00
Arne Fitzenreiter
1d563665ed kernel: run make oldconfig
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-04-08 00:27:47 +02:00
Michael Tremer
855b46da2f core167: Ship coreutils
These have changed since they are now compiled with ACL/XATTR support

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-07 09:14:08 +00:00
Peter Müller
3f65e4996b kernel: Align rootfile again due to forgotten hardening patch
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 20:18:22 +00:00
Peter Müller
8e1a464d12 Kernel: Enable LSM support and set security level to "integrity"
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-06 20:04:04 +00:00
Peter Müller
afb2d2a23d Core Update 167: Ship getrrdimage.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:16:59 +00:00
Peter Müller
df76e77cfb Core Update 167: Ship header.pl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:16:15 +00:00
Leo-Andres Hofmann
4c19f2158e header.pl: Add translation to DHCP leases table
Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:15:50 +00:00
Peter Müller
af791343c7 Core Update 167: Ship sudo
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:15:02 +00:00
Peter Müller
e831404295 Core Update 167: Ship curl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:14:14 +00:00
Adolf Belka
94e8598ff3 ghostscript: Update to version 9.56.1
- Update from 9.55.0 to 9.56.1
- Update of rootfile
- Changelog
   Version 9.56.0 (2022-02-22)
     Highlights in this release include:
	    New PDF Interpreter: This is an entirely new implementation written in C
             (rather than PostScript, as before). For a full discussion of this change
             and reasons for it see: Changes Coming to the PDF Interpreter.
	    In this (9.56.0) release, the new PDF interpreter is now ENABLED by default
             in Ghostscript, but the old PDF interpreter can be used as a fallback by
             specifying -dNEWPDF=false. We've provided this so users that encounter
             issues with the new interpreter can keep working while we iron out those
             issues, the option will not be available in the long term.
	    This also allows us to offer a new executable (gpdf, or gpdfwin??.exe on
             Windows) which is purely for PDF input. For this release, those new binaries
             are not included in the "install" make targets, nor in the Windows installers.
	    Calling Ghostscript via the GS API is now thread safe. The one limitation is
             that the X11 devices for Unix-like systems (x11, x11alpha, x11cmyk, x11cmyk2,
             x11cmyk4, x11cmyk8, x11gray2, x11gray4 and x11mono) cannot be made thread
             safe, due to their interaction with the X11 server, those devices have been
             modified to only allow one instance in an executable.
	    The PSD output device now writes ICC profiles to their output files, for
             improved color fidelity.
	    Our efforts in code hygiene and maintainability continue.
	    The usual round of bug fixes, compatibility changes, and incremental
             improvements.
     Included below are incompatible changes from recent releases (the specific release
      in question is listed in parentheses). We include these, for now, as we are aware
      that not everyone upgrades with every release.
	    (9.55.0) Changes to the device API. This will affect developers and
                      maintainers of Ghostscript devices. Firstly, and most importantly,
                      the way device-specific "procs" are specified has been rewritten
                      to make it (we think!) clearer and less confusing. See The
                      Interface between Ghostscript and Device Drivers and The Great
                      Device Rework Of 2021 for more details.
	    (9.55.0) The command line options -sGraphicsICCProfile=___,
                      -dGraphicsIntent=#, -dGraphicsBlackPt=#, -dGraphicsKPreserve=# have
                      been changed to -sVectorICCProfile=___, -dVectorIntent=#,
                      -dVectorBlackPt=#, -dVectorKPreserve=#.
	    (9.53.0) As of 9.53.0, we have (re-)introduced the patch level to the
                      version number, this helps facilitate a revised policy on handling
                      security-related issues.
	    Note for GSView Users: The patch level addition breaks GSView 5 (it is
             hardcoded to check for versions 704-999. It is possible, but not guaranteed
             that a GSView update might be forthcoming to resolve this.
	    (9.52) -dALLOWPSTRANSPARENCY: The transparency compositor (and related
                    features), whilst we are improving it, remains sensitive to being
                    driven correctly, and incorrect use can have unexpected/undefined
                    results. Hence, as part of improving security, we limited access to
                    these operators, originally using the -dSAFER feature. As we made
                    "SAFER" the default mode, that became unacceptable, hence the new
                    option -dALLOWPSTRANSPARENCY which enables access to the operators.
	    (9.50) There are a couple of subtle incompatibilities between the old and
                    new SAFER implementations. Firstly, as mentioned in the 9.50 release
                    notes, SAFER now leaves standard PostScript functionality unchanged
                    (except for the file access limitations). Secondly, the interaction
                    with save/restore operations has changed. See SAFER.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:13:51 +00:00
Peter Müller
70a5c36be5 Core Update 167: Ship iproute2
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:13:14 +00:00
Peter Müller
51fa79c613 Core Update 167: Ship collectd-/graphs-related changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-06 17:05:35 +00:00
Bernhard Bitsch
d4ea277285 graphs.pl: Change directory name to replace HOSTILE with HOSTILE_DROP - fixes bug#12838
- The directory name for the hostile data was using HOSTILE while the chain was called
   HOSTILE_DROP. This resulted in the files in the directory not being updated.

Fixes: bug#12838
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-04-06 17:04:23 +00:00
Bernhard Bitsch
918ee09b3b collectd.conf: Change chain from HOSTILE to HOSTILE_DROP - fixes bug#12838
- Chain that was specified was HOSTILE but actual used is HOSTILE_DROP
- Using HOSTILE caused no update fro the hostile data used in the Firewall Hits graph

Fixes: bug#12838
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Acked-by: Bernhard Bitsch <bbitsch@ipfire.org>
2022-04-06 17:04:23 +00:00
Peter Müller
4fb7569811 linux: Update rootfile to reflect kernel hardening changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-05 08:42:00 +00:00
Peter Müller
1218b6a8b7 Core Update 167: Ship ddns
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-05 05:55:21 +00:00
Peter Müller
1b6f3fc548 Core Update 167: Ship smartmontools
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 20:17:14 +00:00
Peter Müller
be94980ab1 Core Update 167: Ship DHCP advoptions related files
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-04 20:10:23 +00:00
Adolf Belka
00a7a727d0 advoptions-list: Add domain-search to options - bug#12819
Fixes: bug#12819
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-04-04 20:09:41 +00:00