Commit Graph

4469 Commits

Author SHA1 Message Date
Michael Tremer
d4a8484eb1 mountfs: Remove excessive sync-ing before umount
The system should perform all write operations when sync is called and
only return when the write queues are empty.

There is no additional benefit for calling sync again as the buffers
should be empty. If data is still being lost, then that is a bug in
either the storage device or driver.

As the (re-)boot process is already so slow, I would like to get rid of
any unnecessary delays.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 09:48:35 +00:00
Michael Tremer
21d8c56c8a mountfs: Mount ExtraHD filesystems
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 09:47:25 +00:00
Peter Müller
311f04e46e squid-asnbl: Update to 0.2.5
This upstream release incorporates the patch added for resolving #13023.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 09:27:19 +00:00
Arne Fitzenreiter
cd78363404 Merge remote-tracking branch 'origin/master' into next
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-12 16:48:54 +02:00
Arne Fitzenreiter
41e3393152 initskript: smt: restore IPFire banner
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-12 09:58:56 +02:00
Arne Fitzenreiter
f41a54a2ea initskript: smt: disable smt on vulnerable cpu
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-12 09:11:52 +02:00
Arne Fitzenreiter
285740b926 linux-firmware: update to 20230804
also updated amd_familiy_19h patch which was not in 20230804 yet.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-11 21:12:45 +02:00
Arne Fitzenreiter
a04ae8c43b gcc: fix build on riscv64
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-10 06:35:11 +00:00
Adolf Belka
0d46ef0ce7 libloc: Update to version 0.9.17
- Update from version 0.9.16 to 0.9.17
- Update of rootfile
- Changelog
    0.9.17
	* The importer is now parsing Geofeeds where available. This helps us to create a
          database with better accuracy for large ISPs or cloud providers.
	* The database writer is trying to compress the database harder: It will now look
          for any duplicate networks and merge neighbouring networks which will reduce the
          size of the database by about half.
	* The importer has been improved so that it runs more efficient SQL queries to
          create the database faster.
	* Temuri Doghonadze contributed a Georgian translation.
	* Hans-Christoph Steiner contributed bash-completion for the location(8) command.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-10 06:34:27 +00:00
Matthias Fischer
692ad21dd0 squid: Update to 6.2
For details see:
https://github.com/squid-cache/squid/commits/v6

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-10 06:33:17 +00:00
Adolf Belka
0803c50f76 red: Fixes bug#13164 adjust pppoe plugin name in red initscript
- This patch goes together with the patch for the ppp update to 2.5.0
- The rp-pppoe.so option is no longer available. There is only the pppoe.so available now

Fixes: Bug#13164
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-07 14:12:55 +00:00
Adolf Belka
27a3ef9834 ppp: Fixes bug#13164 - Update to version 2.5.0
- Update from version 2.4.9 to 2.5.0
   This includes breaking changes for third-party plugins but as far as I can see IPFire
    is not using any third party plugins
- Update of rootfile
- Update of patches and sed commands
   - pcap-int.h and if_pppol2tp.h files have not been in source file since at least 2014
   - Some of the patches required updates as additional lines needing to be patched are
      now present. nThis was related to the O_CLOEXEC & SOCK_CLOEXEC related patches
   - connect-errors file location is now defined by a configure command --with-logfile-dir
- install-etcppp is no longer provided. However the install command in this version still
   has the same files available in /etc/ppp as previously. There is a new file,
   openssl.cnf, which I have commented out. If it is required in future it can always be
   uncommented in future releases.
- Build went without any problems with the updated patches.
- I cannot test this as I don't use ppp, however the original bug reporter has agreed to
   test this out when it is released into Testing unless anyone else is capable of testing
   it.
- Changelog
    What's new in ppp-2.5.0.
	The 2.5.0 release is a major release of pppd which contains breaking
	 changes for third-party plugins, a complete revamp of the build-system
	 and that allows for flexibility of configuring features as needed.
	In Summary:
		* Support for PEAP authentication by Eivind Næss and Rustam Kovhaev
		* Support for loading PKCS12 certificate envelopes
		* Adoption of GNU Autoconf / Automake build environment, by Eivind Næss
		  and others.
		* Support for pkgconfig tool has been added by Eivind Næss.
		* Bunch of fixes and cleanup to PPPoE and IPv6 support by Pali Rohár.
		* Major revision to PPPD's Plugin API by Eivind Næss.
		  - Defines in which describes what features was included in pppd
		  - Functions now prefixed with explicit ppp_* to indicate that
		    pppd functions being called.
		  - Header files were renamed to better align with their features,
		    and now use proper include guards
		  - A pppdconf.h file is supplied to allow third-party modules to use
		    the same feature defines pppd was compiled with.
		  - No extern declarations of internal variable names of pppd,
		    continued use of these extern variables are considered
		    unstable.
		* Lots of internal fixes and cleanups for Radius and PPPoE by Jaco Kroon
		* Dropped IPX support, as Linux has dropped support in version 5.15
		  for this protocol.
		* Many more fixes and cleanups.
		* Pppd is no longer installed setuid-root.
		* New pppd options:
		  - ipv6cp-noremote, ipv6cp-nosend, ipv6cp-use-remotenumber,
		    ipv6-up-script, ipv6-down-script
		  - -v, show-options
		  - usepeerwins, ipcp-no-address, ipcp-no-addresses, nosendip
		* On Linux, any baud rate can be set on a serial port provided the
		  kernel serial driver supports that.
	Note that if you have built and installed previous versions of this
	 package and you want to continue having configuration and TDB files in
	 /etc/ppp, you will need to use the --sysconfdir option to ./configure.
	For a list of the changes made during the 2.4 series releases of this
	 package, see the Changes-2.4 file.
	Compression methods.
		This package supports two packet compression methods: Deflate and
		 BSD-Compress.  Other compression methods which are in common use
		 include Predictor, LZS, and MPPC.  These methods are not supported for
		 two reasons - they are patent-encumbered, and they cause some packets
		 to expand slightly, which pppd doesn't currently allow for.
		 BSD-Compress and Deflate (which uses the same algorithm as gzip) don't
		 ever expand packets.

Fixes: bug#13164
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-07 14:10:42 +00:00
Adolf Belka
e9c5d591e5 openldap: Update to version 2.6.5
- Update from version 2.6.1 to 2.6.5
- Update of rootfile not required
- Update of patch script from LFS
- Changelog
    2.6.5 Release (2023/07/10)
	Fixed libldap handling of TCP KEEPALIVE options (ITS#10015)
	Fixed libldap with async connections (ITS#10023)
	Fixed libldap openssl TLSv1.3 cipher suite handling (ITS#10035)
	Fixed slapd callback handling with overlays that do extended operations (ITS#9990)
	Fixed slapd conversion of pcache configurations (ITS#10031)
	Fixed slapd cn=config modification handling with abandon (ITS#10045)
	Fixed slapd-mdb online indexer termination and cleanup (ITS#9993)
	Fixed slapd-mdb online indexer when interrupted (ITS#10047)
	Fixed slapd-monitor connection cleanup (ITS#10042)
	Fixed slapo-constraint handling of push replication (ITS#9953)
	Fixed slapo-dynlist filter evaluation efficiency (ITS#10041)
	Fixed slapo-pcache handling of invalid schema (ITS#10032)
	Fixed slapo-ppolicy handling of push replication (ITS#9953)
	Fixed slapo-ppolicy handling of pwdMinDelay (ITS#10028)
	Fixed slapo-syncprov abandon handling (ITS#10016)
	Fixed slapo-translucent handling of invalid schema (ITS#10032)
	Fixed slapo-unique handling of push replication (ITS#9953)
	Fixed slapo-variant to improve regex handling (ITS#10048)
	Build Environment
		Fixed compatibility with stricter C99 compilers (ITS#10011)
		Keep .pc files during make clean (ITS#9989)
	Contrib
		Fixed slapo-variant handling of push replication (ITS#9953)
	Minor Cleanup
		ITS#9855
		ITS#9995
		ITS#9996
		ITS#9997
		ITS#9998
		ITS#9999
		ITS#10000
		ITS#10003
		ITS#10004
		ITS#10033
		ITS#10037
		ITS#10039
		ITS#10046
		ITS#10063
    2.6.4 Release (2023/02/08)
	Fixed client tools to remove 'h' and 'p' options (ITS#9917,ITS#8618)
	Fixed ldapsearch memory leak with paged results (ITS#9860)
	Fixed libldap ldif_open_urlto check for failure (ITS#9904)
	Fixed libldap ldap_url_parsehosts check for failure (ITS#9904)
	Fixed liblunicode UTF8bvnormalize buffer size (ITS#9955)
	Fixed lloadd memory leaks (ITS#9907)
	Fixed lloadd shutdown code to protect memory correctly (ITS#9913)
	Fixed lloadd race in epoch.c (ITS#9947)
	Fixed lloadd potential deadlock with cn=monitor (ITS#9951)
	Fixed lloadd to keep listener base around when not active (ITS#9984)
	Fixed lloadd object reclamation sequencing (ITS#9983)
	Fixed slapd memory leak with olcAuthIDRewrite (ITS#6035)
	Fixed slapd free of redundant cmdline option (ITS#9912)
	Fixed slapd transactions extended operations cleanup after write (ITS#9892)
	Fixed slapd deadlock with replicated cn=config (ITS#9930,ITS#8102)
	Fixed slapd connection close logic (ITS#9991)
	Fixed slapd bconfig locking of cn=config entries (ITS#9045)
	Fixed slapd-mdb max number of index databases to 256 (ITS#9895)
	Fixed slapd-mdb to always release entries from ADD operations (ITS#9942)
	Fixed slapd-mdb to fully init empty DN in tool_entry_get (ITS#9940)
	Fixed slapd-monitor memory leaks with lloadd (ITS#9906)
	Fixed slapd-monitor to free remembered cookies (ITS#9339)
	Fixed slapo-accesslog reqStart ordering matching rule (ITS#9880)
	Fixed slapo-deref memory leak (ITS#9924)
	Fixed slapo-dynlist to ignore irrelevant objectClasses (ITS#9897)
	Fixed slapo-dynlist to avoid unnecessary searches (ITS#9929)
	Fixed slapo-dynlist to mark internal searches as such (ITS#9960)
	Fixed slapo-pcache crash in consistency_check (ITS#9966)
	Fixed slapo-remoteauth memory leaks (ITS#9438)
	Fixed slapo-rwm memory leaks (ITS#9817)
	Build Environment
		Fixed ancient DOS related ifdef checks (ITS#9925)
		Fixed build process to not use gmake specific features (ITS#9894)
		Fixed source tree to remove symlinks (ITS#9926)
		Fixed slapo-otp testdir creation (ITS#9437)
		Fixed slapd-tester memory leak (ITS#9908)
		Fixed usage of non-standard C syntax (ITS#9898, ITS#9899, ITS#9901)
		Fixed usage of bashism (ITS#9900)
		Fixed test suite portability (ITS#9931)
	Documentation
		Fixed ldap_bind(3) to document ber_bvfree in ldap_sasl_bind (ITS#9976)
		Fixed slapo-asyncmeta(5) to clarify scheduling for target connections
                 (ITS#9941)
		Fixed slapo-dynlist(5) to clarify configuration settings (ITS#9957)
		Fixed slapo-unique(5) to clarify when quoting should be used (ITS#9915)
	Minor cleanup
		ITS#9935
		ITS#9336
		ITS#9337
		ITS#9985
    2.6.3 Release (2022/07/14)
	Fixed libldap to check for NULL ld (ITS#9157)
	Fixed libldap memory leaks (ITS#9876)
	Fixed lloadd to correctly tag Notice of Disconnection (ITS#9856)
	Fixed slapd kqueue support (ITS#9847)
	Fixed slapd delta-sync DN leak on ADD ops (ITS#9866)
	Fixed slapd replication with back-glue (ITS#9868)
	Fixed slapd lastbind replication with chaining (ITS#9863)
	Fixed slapd-ldap to correctly set authzid (ITS#9863)
	Fixed slapd-mdb to check for stale readers on MDB_READERS_FULL (ITS#7165)
	Fixed slapd-mdb indexer task with replicated config (ITS#9858)
	Fixed slapo-accesslog onetime memory leak (ITS#9864)
	Fixed slapo-ppolicy interaction with slapo-rwm (ITS#9871)
	Fixed slapo-rwm to handle escaping special characters (ITS#9817)
	Fixed slapo-syncprov memory leaks (ITS#9867)
	Fixed slapo-syncprov fallback in delta-sync mode (ITS#9823)
	Fixed slapo-unique to not release NULL entry (ITS#8245)
	Build Environment
		Added slapd-watcher -c contextDN option (ITS#9865)
		Fixed librewrite declaration of calloc (ITS#9841)
		Fixed parallel builds (ITS#9840)
		Fixed test020 to skip back-wt (ITS#9859)
		Fixed slapd-watcher SID handling with single URI (ITS#9850)
		Fixed test043 with workaround for ITS#9878
	Contrib
		Added slapo-emptyds contrib module (ITS#8882)
		Added slapo-ciboolean contrib module (ITS#9855)
		Fixed slapo-autogroup backwards compat (ITS#9020)
		Update ppm module to the 2.2 release (ITS#9846)
	Documentation
		Fixed ldap_get_option(3) to clarify ldap_get/set_option restrictions
                 (ITS#9824)
		Fixed slapd-ldap(5),slapd-meta(5) missing bold tag on authz parameter
                 (ITS#9872)
    2.6.2 Release (2022/05/04)
	Added libldap support for OpenSSL 3.0 (ITS#9436)
	Added slapd support for OpenSSL 3.0 (ITS#9436)
	Fixed ldapdelete to prune LDAP subentries (ITS#9737)
	Fixed libldap to drop connection when non-LDAP data is received (ITS#9803)
	Fixed libldap to allow newlines at end of included file (ITS#9811)
	Fixed slapd slaptest conversion of olcLastBind (ITS#9808)
	Fixed slapd to correctly init global_host earlier (ITS#9787)
	Fixed slapd bconfig locking for cn=config replication (ITS#9584)
	Fixed slapd usage of thread local counters (ITS#9789)
	Fixed slapd to clear runqueue task correctly (ITS#9785)
	Fixed slapd idletimeout handling (ITS#9820)
	Fixed slapd syncrepl handling of new sessions (ITS#9584)
	Fixed slapd to clear connections on bind (ITS#9799)
	Fixed slapd to correctly advance connections index (ITS#9831)
	Fixed slapd syncrepl ODSEE replication of unknown attr (ITS#9801)
	Fixed slapd-asyncmeta memory leak in keepalive setting (ITS#9802)
	Fixed slapd-ldap memory leak in keepalive setting (ITS#9802)
	Fixed slapd-meta SEGV on config rewrite (ITS#9802)
	Fixed slapd-meta ordering on config rewrite (ITS#9802)
	Fixed slapd-meta memory leak in keepalive setting (ITS#9802)
	Fixed slapd-monitor SEGV on shutdown (ITS#9809)
	Fixed slapd-monitor crash when hitting sizelimit (ITS#9832)
	Fixed slapd-sql to properly escape filter value (ITS#9815)
	Added slapo-autoca support for OpenSSL 3.0 (ITS#9436)
	Added slapo-otp support for OpenSSL 3.0 (ITS#9436)
	Fixed slapo-dynlist dynamic group regression (ITS#9825)
	Fixed slapo-pcache SEGV on shutdown (ITS#9809)
	Fixed slapo-ppolicy operation handling to be consistent (ITS#9794)
	Fixed slapo-translucent to correctly duplicate substring filters (ITS#9818)
	Build Environment
		Add ability to override default compile time paths (ITS#9675)
		Fix compilation with certain versions of gcc (ITS#9790)
		Fix compilation with openssl exclusions (ITS#9791)
		Fix warnings from make jobserver (ITS#9788)
	Contrib
		Update ppm module to the 2.1 release (ITS#9814)
	Documentation
		admin26 Document new lloadd features (ITS#9780)
		Fixed slapd.conf(5)/slapd-config(5) syncrepl sizelimit/timelimit
                 documentation (ITS#9804)
		Fixed slapd-sock(5) to clarify "sockresps result" behavior (ITS#8255)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-07 09:19:13 +00:00
Adolf Belka
63fb1beb81 procps: Add patch to fix errors that prevent build with gettext-0.22
- Gettext earlier than 0.21 would still build when it found errors in language files etc.
   With gettext-0.22 if it finds any errors it now stops.
- There were two lines in the french po file in procps that had erros in them. procps have
   raised a commit to fix those. The patch included here carries out that commit.
- Update of rootfile not required.
- This patch will not be needed when the next update of procps occurs.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-02 09:17:48 +00:00
Michael Tremer
6ed00db36f Merge branch 'master' into next 2023-08-02 09:11:40 +00:00
Michael Tremer
91443f9234 udev: Drop hwrng rules
This is another fragment of rngd - the gift that keeps giving.

The udev rules file contains a lot of stuff for a prototype which never
went into production. So, that can be dropped.

It would have been left with one rule that starts rngd whenever a HWRNG
is being found. That is however no longer needed as rngd is being
started in the init process. We no longer need to initialize it as early
as possible to seed the kernel's PRNG.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-07-31 13:47:31 +00:00
Adolf Belka
1f26a78259 mpfr: Update to version 4.2.0p12
- Update from version 4.2.0p9 to 4.2.0p12
- Update of rootfile not required
- Changelog - additional patches from 10 to 12 over previous update
    10 - GCC 12 emits a spurious "may be used uninitialized" warning on tests/tfpif.c
         with -O1, and GCC 13 has the same issue also with -O2 (GCC bug 106155). This can
         make some test scripts fail for the developers. The gcc-pr106155-workaround
         patch provides a workaround for this bug in GCC.
         Corresponding changeset in the 4.2 branch: c0031f1af.
    11 - The mpfr_inp_str function does not handle the '\0' character correctly when it
         is not a whitespace character (which is almost always the case in practice, or
         really always the case). For instance, if the word is the sequence
         { '1', '\0', '2' }, the string "1" is passed to mpfr_set_str because '\0' is
         regarded as a terminating null character, and one gets a valid number (1) while
         '\0' in a word is necessarily invalid. This is fixed by the inp_str-nullchar
         patch. The testcase in the repository cannot be provided in the patch because of
         the null character in one of the files.
         Corresponding changeset in the 4.2 branch: 6a68387b2.
    12 - When '\0' is a whitespace character, i.e. when isspace(0) is true in the current
         locale (as allowed by ISO C for non-"C" locales), the mpfr_strtofr function
         regards a '\0' in the leading whitespace sequence as a whitespace. This is
         incorrect, since from the definition of a string, the first '\0' is the
         terminating null character (before the notion of whitespace is involved). In
         such locales, this is a vulnerability, because characters after the terminating
         null character are read to determine the result; however, such locales are rare
         or nonexistent (Mutt's lib.h suggests that some systems have such locales, but
         this was in 1998). This is fixed by the strtofr-nullchar patch.
         Corresponding changeset in the 4.2 branch: 964fbaa31.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-07-31 09:20:09 +00:00
Michael Tremer
ef7ae3fd1d Merge branch 'master' into next 2023-07-28 16:57:15 +00:00
Arne Fitzenreiter
0bb82a95dd initskripts: remove buggy remount at halt and reboot
mount -f does nothing and also the sync calls should do nothing
on a already ro mounted filesystem.

fixes: #13195

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-07-28 16:06:54 +00:00
Adolf Belka
85c32fb394 ebtables: Update to version 2.0.11
- Update from version 2.0.10-4 (Sep 2014) to 2.0.11 (Dec 2019)
- Update of rootfile
- Deletion of patch to prevent installing in usr/local as new tarball now has a ./configure
   file that enables setting prefix to /usr and sysconfdir to /etc

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-07-26 16:08:59 +00:00
Michael Tremer
5c4faba67b linux-firmware: Fix AMD microcode updates for Zenbleed
https://lock.cmpxchg8b.com/zenbleed.html

Fixes: CVE-2023-20593
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-07-25 11:15:45 +00:00
Arne Fitzenreiter
f2d5cb7c99 kernel: update to 6.1.39
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-07-21 09:34:12 +00:00
Michael Tremer
607d3a26d8 fireinfo: Fix SEGV in detect_hypervisor()
Fixes: #13155 - _fireinfo.detect_hypervisor() rises Segmentation fault
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-13 14:25:22 +00:00
Jon Murphy
525e575e04 pmacct: fix bug 13159
- changes `interface` to `pcap_interface` in pmacct.conf file.
- thank you to @iptom for finding and reporting the issue and
   to many others for pitching in and helping debug!

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
2023-07-13 14:22:04 +00:00
Adolf Belka
a87bea7d39 cups: Remove 5 minutes delay in start_service line in install.sh paks file
- When cups is installed (including when doing a Core Update that includes a cups update)
   the 5 min delay for starting cups means that it has not restarted by the time that the
   reboot for the CU has been started. There are then error messages that say that cups
   couldn't be stopped as it was not running.
- When a normal reboot is carried out withoutr any update of cups then the startup has
   no delay and it starts without any trouble.
- This patch removes the 300 secs delay from the start_service line in the install.sh paks
   file.
- The PAK_VER is bumped to ensure that this change is shipped

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-09 15:07:36 +00:00
Adolf Belka
a6039dc9d1 squidclamav: Remove package from IPFire as agreed in dev video call 3rd Jul 2023
- Removal of lfs file
- Removal of rootfile
- Removal of backup includes file
- Removal of three patches
- Removal of paks files
- Adjustment of make.sh to remove squidclamav

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-09 15:05:06 +00:00
Adolf Belka
df30842927 squid-asnbl: Fix for bug#13023 - squid-asnbl-helper segfaulting and shutdown squid
- Patch provided by bug reporter. Here is the description of the problem from the bug.
   First I discovered that the helper only sometimes throwing the error and quits even
   for the same values and queries. Also the timespan until the error happens was quite
   different for every restart of squid  (minutes to hours). And it does not depend on
   the traffic on the proxy, even one connection could cause a crash while ten or
   hundrets won't. After a few days of testing different solutions and done a lot of
   debugging, redesigning the function did not fully solve the problem. Such standard
   things like checking the result variable for NULL (or it's equivalent "is None" in
   python) before evaluating it's subfunction produces the exact same error message. But
   with that knowledge it more and more turns out that python3 sometimes 'detects' the
   local return variable if it was a misused global. So for a full fix, the return
   variable also has to be initialized that python3 won't detect it's usage as an
   'UnboundLocalError' to succesfully fix this bug.
- LFS file updated to run patch before copying helper into place.
- Update of rootfile not needed.
- Bug reporter has been requested to raise this issue at the git repo for squid-asnbl.

Fixes: Bug#13023
Tested-by: Nicolas Pӧhlmann <business@hardcoretec.com>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-07-01 19:30:03 +00:00
Adolf Belka
89d5a7b29f ntp: Update to version 4.2.8p17
- Update from version 4.2.8p15 to 4.2.8p17
- Update of rootfile not required
- Tested out on vm testbed. Time correctly updated every hour and pakfire was able to
   download and install various addons without any problems indicating that the time
   is working correctly.
- patch to enable build with glibc-2.34 no longer needed. ntp updated to work correctly
   with glibc-2.34 but IPFire running with version 2.37. Version 2.4.8p17 built without
   any problems without the patch.
- Changelog
    4.2.8p17 2023/06/06 Released by Harlan Stenn <stenn@ntp.org>
	* [Bug 3824] Spurious "ntpd: daemon failed to notify parent!" logged at
	             event_sync.  Reported by Edward McGuire.  <hart@ntp.org>
	* [Bug 3822] ntpd significantly delays first poll of servers specified by name.
	             <hart@ntp.org>  Miroslav Lichvar identified regression in 4.2.8p16.
	* [Bug 3821] 4.2.8p16 misreads hex authentication keys, won't interop with
	             4.2.8p15 or earlier.  Reported by Matt Nordhoff, thanks to
		     Miroslav Lichvar and Matt for rapid testing and identifying the
		     problem. <hart@ntp.org>
	* Add tests/libntp/digests.c to catch regressions reading keys file or with
	  symmetric authentication digest output.
    4.2.8p16 2023/05/31 Released by Harlan Stenn <stenn@ntp.org>
	* [Sec 3808] Assertion failure in ntpq on malformed RT-11 date <perlinger@ntp.org>
	* [Sec 3807] praecis_parse() in the Palisade refclock driver has a
	             hypothetical input buffer overflow. Reported by ... stenn@
	* [Sec 3806] libntp/mstolfp.c needs bounds checking <perlinger@ntp.org>
	  - solved numerically instead of using string manipulation
	* [Sec 3767] An OOB KoD RATE value triggers an assertion when debug is enabled.
	             <stenn@ntp.org>
	* [Bug 3819] Updated libopts/Makefile.am was missing NTP_HARD_* values. <stenn@>
	* [Bug 3817] Bounds-check "tos floor" configuration. <hart@ntp.org>
	* [Bug 3814] First poll delay of new or cleared associations miscalculated.
	             <hart@ntp.org>
	* [Bug 3802] ntp-keygen -I default identity modulus bits too small for
	             OpenSSL 3.  Reported by rmsh1216@163.com <hart@ntp.org>
	* [Bug 3801] gpsdjson refclock gps_open() device name mishandled. <hart@ntp.org>
	* [Bug 3800] libopts-42.1.17 does not compile with Microsoft C. <hart@ntp.org>
	* [Bug 3799] Enable libopts noreturn compiler advice for MSC. <hart@ntp.org>
	* [Bug 3797] Windows getaddrinfo w/AI_ADDRCONFIG fails for localhost when
	             disconnected, breaking ntpq and ntpdc. <hart@ntp.org>
	* [Bug 3795] pollskewlist documentation uses | when it shouldn't.
	  - ntp.conf manual page and miscopt.html corrections. <hart@ntp.org>
	* [Bug 3793] Wrong variable type passed to record_raw_stats(). <hart@ntp.org>
	  - Report and patch by Yuezhen LUAN <wei6410@sina.com>.
	* [Bug 3786] Timer starvation on high-load Windows ntpd. <hart@ntp.org>
	* [Bug 3784] high-load ntpd on Windows deaf after enough ICMP TTL exceeded.
	             <hart@ntp.org>
	* [Bug 3781] log "Unable to listen for broadcasts" for IPv4 <hart@ntp.org>
	* [Bug 3774] mode 6 packets corrupted in rawstats file <hart@ntp.org>
	  - Reported by Edward McGuire, fix identified by <wei6410@sina.com>.
	* [Bug 3758] Provide a 'device' config statement for refclocks <perlinger@ntp.org>
	* [Bug 3757] Improve handling of Linux-PPS in NTPD <perlinger@ntp.org>
	* [Bug 3741] 4.2.8p15 can't build with glibc 2.34 <perlinger@ntp.org>
	* [Bug 3725] Make copyright of clk_wharton.c compatible with Debian.
	             Philippe De Muyter <phdm@macqel.be>
	* [Bug 3724] ntp-keygen with openSSL 1.1.1 fails on Windows <perlinger@ntp.org>
	  - openssl applink needed again for openSSL-1.1.1
	* [Bug 3719] configure.ac checks for closefrom() and getdtablesize() missing.
	             Reported by Brian Utterback, broken in 2010 by <hart@ntp.org>
	* [Bug 3699] Problems handling drift file and restoring previous drifts <perlinger@ntp.org>
	  - command line options override config statements where applicable
	  - make initial frequency settings idempotent and reversible
	  - make sure kernel PLL gets a recovered drift componsation
	* [Bug 3695] Fix memory leak with ntpq on Windows Server 2019 <perlinger@ntp.org>
	* [Bug 3694] NMEA refclock seems to unnecessarily require location in messages
	  - misleading title; essentially a request to ignore the receiver status.
	    Added a mode bit for this. <perlinger@ntp.org>
	* [Bug 3693] Improvement of error handling key lengths <perlinger@ntp.org>
	  - original patch by Richard Schmidt, with mods & unit test fixes
	* [Bug 3692] /dev/gpsN requirement prevents KPPS <perlinger@ntp.org>
	  - implement/wrap 'realpath()' to resolve symlinks in device names
	* [Bug 3691] Buffer Overflow reading GPSD output
	  - original patch by matt<ntpbr@mattcorallo.com>
	  - increased max PDU size to 4k to avoid truncation
	* [Bug 3690] newline in ntp clock variable (parse) <perlinger@ntp.org>
	  - patch by Frank Kardel
	* [Bug 3689] Extension for MD5, SHA-1 and other keys <perlinger@ntp.org>
	  - ntp{q,dc} now use the same password processing as ntpd does in the key
	    file, so having a binary secret >= 11 bytes is possible for all keys.
	    (This is a different approach to the problem than suggested)
	* [Bug 3688] GCC 10 build errors in testsuite <perlinger@ntp.org>
	* [Bug 3687] ntp_crypto_rand RNG status not known <perlinger@ntp.org>
	  - patch by Gerry Garvey
	* [Bug 3682] Fixes for warnings when compiled without OpenSSL <perlinger@ntp.org>
	  - original patch by Gerry Garvey
	* [Bug 3677] additional peer events not decoded in associations listing <perlinger@ntp.org>
	  - original patch by Gerry Garvey
	* [Bug 3676] compiler warnings (CMAC, interrupt_buf, typo, fallthrough)
	  - applied patches by Gerry Garvey
	* [Bug 3675] ntpq ccmds[] stores pointer to non-persistent storage
	* [Bug 3674] ntpq command 'execute only' using '~' prefix <perlinger@ntp.org>
	  - idea+patch by Gerry Garvey
	* [Bug 3672] fix biased selection in median cut <perlinger@ntp.org>
	* [Bug 3666] avoid unlimited receive buffer allocation <perlinger@ntp.org>
	  - follow-up: fix inverted sense in check, reset shortfall counter
	* [Bug 3660] Revert 4.2.8p15 change to manycast. <hart@ntp.org>
	* [Bug 3640] document "discard monitor" and fix the code. <hart@ntp.org>
	  - fixed bug identified by Edward McGuire <perlinger@ntp.org>
	* [Bug 3626] (SNTP) UTC offset calculation needs dst flag <perlinger@ntp.org>
	  - applied patch by Gerry Garvey
	* [Bug 3428] ntpd spinning consuming CPU on Linux router with full table.
	             Reported by Israel G. Lugo. <hart@ntp.org>
	* [Bug 3103] libopts zsave_warn format string too few arguments <bkorb@gnu.org>
	* [Bug 2990] multicastclient incorrectly causes bind to broadcast address.
	             Integrated patch from Brian Utterback. <hart@ntp.org>
	* [Bug 2525] Turn on automake subdir-objects across the project. <hart@ntp.org>
	* [Bug 2410] syslog an error message on panic exceeded. <brian.utterback@oracle.com>
	* Use correct rounding in mstolfp(). perlinger/hart
	* M_ADDF should use u_int32.  <hart@ntp.org>
	* Only define tv_fmt_libbuf() if we will use it. <stenn@ntp.org>
	* Use recv_buffer instead of the longer recv_space.X_recv_buffer. hart/stenn
	* Make sure the value returned by refid_str() prints cleanly. <stenn@ntp.org>
	* If DEBUG is enabled, the startup banner now says that debug assertions
	  are in force and that ntpd will abort if any are violated. <stenn@ntp.org>
	* syslog valid incoming KoDs.  <stenn@ntp.org>
	* Rename a poorly-named variable.  <stenn@ntp.org>
	* Disable "embedded NUL in string" messages in libopts, when we can. <stenn@>
	* Use https in the AC_INIT URLs in configure.ac.  <stenn@ntp.org>
	* Implement NTP_FUNC_REALPATH.  <stenn@ntp.org>
	* Lose a gmake construct in ntpd/Makefile.am.  <stenn@ntp.org>
	* upgrade to: autogen-5.18.16
	* upgrade to: libopts-42.1.17
	* upgrade to: autoconf-2.71
	* upgrade to: automake-1.16.15
	* Upgrade to libevent-2.1.12-stable <stenn@ntp.org>
	* Support OpenSSL-3.0

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-01 19:08:20 +00:00
Peter Müller
79da0b3159 CUPS: Update to 2.4.6
Several security-relevant bugs have been fixed since version 2.4.2,
please refer to https://github.com/OpenPrinting/cups/releases for the
respective changelogs.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 21:04:19 +00:00
Michael Tremer
f08637c587 gdb: Update to 13.2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-24 06:34:18 +00:00
Michael Tremer
ed1a24686c misc-progs: setuid: Return exit code from called process
This patch will return the exit code from the called process which has
not been done before. This made it more difficult to catch any
unsuccessful calls from the web UI.

Partly Fixes: #12863
Tested-by: Jon Murphy <jon.murphy@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:39:28 +00:00
Adolf Belka
db9c7fb826 wavemon: Update to version 0.9.4
- Update from version 0.7.5 to 0.9.4
- Update of rootfile
- wavemon would not build because it could not find the netlink include files. wavemon was
   still looking in include/netlink/ as for libnl version 1 but with libnl3 the include
   files are in include/libnl3/netlink/
- Based on an issue entry in the wavemon github repo I created the patch to force wavemon
   to look in the correct place.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:39:10 +00:00
Adolf Belka
8e498000ec mpfr: Update with latest bug patches
- Update version 4.2.0 from 4 bug patches to 9 bug patches
- Update of rootfile not required
- Bug fix changelog
5	The mpfr_reldiff function, which computes |b−c|/b, is buggy on special values,
         e.g. on the following (b,c) values: (+Inf,+Inf) gives ±0 instead of NaN (like
         NaN/Inf); (+0,+0) gives 1 instead of NaN (like 0/0); (+0,1) gives 1 instead of
         Inf (like 1/0). Moreover, the sign of 0 for (+Inf,+Inf) or (−Inf,−Inf) is not
         set, i.e. it is just the sign of the destination before the call; as a
	 consequence, results are not even consistent. These bugs are fixed by the
	 reldiff patch.
	Corresponding changeset in the 4.2 branch: 81e4d4427.
6	The reuse tests are incomplete: the sign of a result zero is not checked, so
	 that it can miss bugs (one of the mpfr_reldiff bugs mentioned above, in
	 particular). The tests-reuse patch adds a check of the sign of zero and
	 contains other minor improvements.
	Corresponding changeset in the 4.2 branch: e6d47b8f5.
7	The general code for the power function (mpfr_pow_general internal function) has
	 two bugs in particular cases: the first one is an incorrect computation of the
	 error bound when there has been an intermediate underflow or overflow (in such
	 a case, the computation is performed again with a rescaling, thus with an
	 additional error term, but there is a bug in the computation of this term), so
	 that the result may be rounded incorrectly (in particular, a spurious overflow
	 is possible); the second one occurs in a corner case (destination precision 1,
	 rounding to nearest, and where the rounded result assuming an unbounded
	 exponent range would be 2emin−2 and the exact result is larger than this value),
	 with the only consequence being a missing underflow exception (the underflow
	 flag is not set). These two bugs are fixed by the pow_general patch, which also
	 provides testcases.
	Note: The second bug was introduced by commit 936df8ef6 in MPFR 4.1.0 (the code
	 simplification was incorrect, and there were no associated tests in the
	 testsuite).
	Corresponding changesets in the 4.2 branch: 85bc7331c, 5fa407a6c, 9a16c173e.
8	The mpfr_compound_si function can take a huge amount of memory and time in some
	 cases (when the argument x is a large even integer and xn is represented exactly
	 in the target precision) and does not correctly detect overflows and underflows.
	 This is fixed by the compound patch, which also provides various tests.
	Corresponding changesets in the 4.2 branch: 7635c4a35, 74d86a61f, 952fb0f5c,
	 a4894f68d, 7bb748775, f5cb40571, d87459969.
9	MPFR can crash when a formatted output function is called with %.2147483648Rg in
	 the format string. For instance: mpfr_snprintf (NULL, 0, "%.2147483648Rg\n", x);
	 This is fixed by the printf_large_prec_for_g patch, which also provides
	 testcases.
	Corresponding changesets in the 4.2 branch: 686f82776, 769ad91a6.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:37:47 +00:00
Adolf Belka
aec620df45 minidlna: Update to version 1.3.2
- Update from version 1.3.0 to 1.3.2
- Update of rootfile not required
- Patch for CVE-2022-26505 is now built into the source tarball
- Changelog
1.3.2 - Released 30-Aug-2022
	- Improved DNS rebinding attack protection.
	- Added Samsung Neo QLED series (2021) support.
	- Added webm/rm/rmvb support.
1.3.1 - Released 11-Feb-2022
	- Fixed a potential crash in SSDP request parsing.
	- Fixed a configure script failure on some platforms.
	- Protect against DNS rebinding attacks.
	- Fix an socket leakage issue on some platforms.
	- Minor bug fixes.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:37:33 +00:00
Adolf Belka
e031838684 dhcpcd: Update to version 10.0.1
- Update from version 9.4.1 to 10.0.1
- Update of rootfile not required
- Changelog is no longer provided. For details of changes you have to look at the commits
   log - https://github.com/NetworkConfiguration/dhcpcd/commits

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:26:56 +00:00
Arne Fitzenreiter
f24ce4558a partresize: enable journal on ssd's and vm's
the flashimage is build without journal to not destroy
usb thumbdrives or sd cards. On real ssd's and virtual
machines it should enabled for higher data security.

So this patch add the journal is drive support smart.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:25:59 +00:00
Arne Fitzenreiter
36a19f2b39 partresize: remove buggy code
DRV is not defined so this code is useless.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:25:59 +00:00
Matthias Fischer
bf0aa7f25b suricata: Update to 6.0.12
"6.0.12 -- 2023-05-08

Bug #6040: tcp: failed assertion ASSERT: !(ssn->state != TCP_SYN_SENT) (6.0.x backport)
Bug #6039: TCP resets have incorrect len, nh in IPv6 (6.0.x backport)
Bug #6034: time: integer comparison with different signs (6.0.x backport)
Bug #6031: af-packet: reload not occurring until packets are seen (6.0.x backport)
Bug #6020: smtp: fuzz debug assertion trigger (6.0.x backport)
Bug #6018: scan-build warning for mime decoder (6.0.x backport)
Bug #6017: scan-build warnings for ac implementations (6.0.x backport)
Bug #6016: scan-build warnings in radix implementation (6.0.x backport)
Bug #6015: scan-build warning for detect sigordering (6.0.x backport)
Bug #6014: scan-build warnings for detect address handling (6.0.x backport)
Bug #6013: scan-build warning for detect port handling (6.0.x backport)
Bug #6007: Unexpected behavior of `endswith` in combination with negated content matches (6.0.x backport)
Bug #5999: exception/policy: make work with simulated flow memcap (6.0.x backport)
Bug #5997: perf shows excessive time in IPOnlyMatchPacket (6.0.x backport)
Bug #5980: rust: warning for future compile errors
Bug #5961: smb: wrong endian conversion when parse NTLM Negotiate Flags (6.0.x backport)
Bug #5958: bpf: postpone IPS check after IPS runmode is determined from the configuration file (6.0.x backport)
Bug #5934: app-layer-htp: Condition depending on enabled IPS mode never true (6.0.x backport)
Optimization #6033: detect using uninitialized engine mode (6.0.x backport)
Feature #5996: Add support for 'inner' PF_RING clustering modes (6.0.x backport)
Task #6052: github-ci: add windows + windivert build (6.0.x backport)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-05-29 06:47:09 +00:00
Adolf Belka
745fd50e66 wio: remove unneeded or incorrect commands
- the helper programs in misc-progs get the correct permissions and ownerships
   automatically so adjustment not required in this script.
- permissions of menus in menu.d are provided automatically. Historically, these were
   root:root but were changed a while back but did not get applied to wio as it was
   modified by this script.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:47 +00:00
Adolf Belka
b1584da093 wio: moved files from src/wio directory to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:47 +00:00
Adolf Belka
1ee6f37fb4 wio: move files from src/wio/main/ to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Adolf Belka
b637cb23c8 wio: move addon language files to standard IPFire location
- This location used by guardian addon

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Adolf Belka
5a6134e2a6 wio: move cgi files to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Adolf Belka
1d666a6b3b wio: relocate wio menu item to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Adolf Belka
4e908f84c7 wio: images moved to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Adolf Belka
addb1b2fe1 wio: Move backup/includes file to standard IPFire location
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-18 09:47:46 +00:00
Arne Fitzenreiter
6a005bd9aa kernel: update to 6.1.28
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-05-16 18:53:01 +00:00
Peter Müller
ca9b4dec63 Zut alors, archive.files needs to be executable
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-05-12 14:47:28 +00:00
Peter Müller
3486440720 Housekeeping: Only mark files as executable if they have to be
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-05-11 20:19:20 +00:00
Adolf Belka
b2e7b0a28b mpfr: Update to include the latest four bug patches
- The base version has not changed but patches to fix 4 bugs have been released.
- Update to rootfile not required.
- Bug fix changelog
	1    A test of the thousands separator in tsprintf.c is based on the output from
              the GNU C Library up to 2.36, which is incorrect. The output has changed in
              2.37 (partly fixed), so that tsprintf fails with glibc 2.37. The
              tsprintf-thousands patch modifies the test to conform to POSIX and also
              avoid the buggy case in 2.36 and below. However, this new test, which was
              expected to succeed, triggers a serious bug in 2.37
              (bug 30068 / CVE-2023-25139). We did not modify the test again since this
              bug affects MPFR's mpfr_sprintf function, with a possible buffer overflow
              in particular cases. This bug has been fixed in the 2.37 branch. In short,
              this patch is useful (and needed) for a fixed glibc 2.37 and some other
              libraries, depending on the current locales.
	     Corresponding changesets in the 4.2 branch: 4f03d40b5, 78ff7526d, e66bb7121.
	2    The mpfr_ui_pow_ui function has infinite loop in case of overflow. This can
              affect mpfr_log10, which uses this function (this is how this bug was
              found). This bug is fixed by the ui_pow_ui-overflow patch (with testcases).
	     Corresponding changeset in the 4.2 branch: 0216f40ed.
	3    The tfprintf and tprintf tests may fail in locales where decimal_point has
              several bytes, such as ps_AF. This is fixed by the multibyte-decimal_point
              patch, which makes the tests aware of the length of decimal_point.
	     Corresponding changeset in the 4.2 branch: 0383bea85.
	4    In particular cases that are very hard to round, mpfr_rec_sqrt may yield a
              stack overflow due to many small allocations in the stack, based on alloca().
              This is due to the fact that the working precision is increased each step
              (Ziv loop) by 32 or 64 bits only, until the approximate result can be
              rounded (thus we have an arithmetic progression here, while a geometric
              progression is used for the other functions), and that at each iteration,
              the previous allocations in the stack cannot be freed. Individual
              allocations in the stack are limited to 16384 bytes, so that the issue can
              occur only when there are many iterations in working precisions that are
              not too large, which is possible with an arithmetic progression. This bug
              is fixed by the rec_sqrt-zivloop patch, which changes the Ziv loop to use
              the standard MPFR_ZIV_* macros; the patch also provides a testcase obtained
              by a function that constructs a hard-to-round case involving large enough
              precisions (this function is commonly used in the MPFR testsuite, but not
              with so large precisions). This bug was originally reported by Fredrik
              Johansson.
	     Corresponding changeset in the 4.2 branch: 934dd8842.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-05-11 20:10:38 +00:00