Commit Graph

9161 Commits

Author SHA1 Message Date
Matthias Fischer
bbd49cbcca clamav: Update to 1.2.1
For details see:
https://blog.clamav.net/2023/10/clamav-121-113-104-010311-patch.html

Excerpt:

"ClamAV 1.2.1 is a patch release with the following fixes:

    Eliminate security warning about unused "atty" dependency.

    Upgrade the bundled UnRAR library (libclamunrar) to version 6.2.12.

    Build system: Fix link error with Clang/LLVM/LLD version 17. Patch courtesy of Yasuhiro Kimura.

    Fix alert-exceeds-max feature for files > 2GB and < max-filesize."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:05:19 +00:00
Peter Müller
dfcdebc029 Core Update 182: Ship sqlite
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-21 19:03:38 +00:00
Peter Müller
307be8b016 Core Update 182: Ship qpdf
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-21 19:03:10 +00:00
Adolf Belka
4b64641b38 qpdf: Update to version 11.6.1
- Update from version 11.5.0 to 11.6.1
- Update of rootfile
- Changelog
    11.6.1: release
        * Fix a logic error introduced in 11.6.0 in the fix to
          copyForeignObject. The bug could result in some pages not being
          copied.
    11.6.0: release
        * ascii85 parser: ignore spaces everywhere including between ~
          and >. Fixes #973.
        * Bug fix: with --pages, if one of the external files had warnings
          but the main file did not, the warning was previously not taken
          into consideration when determining the exit status.
        * Put quotation marks around the command in completion output to
          better handle spaces in paths. It is not a perfect fix (ideally,
          full shell-compatible quoting should be used), but it handles more
          cases than the old code and should handle all reasonable cases of
          qpdf being in a directory with a space in its name, which is
          common in Windows. Fixes #1021.
        * Move check for random number device to runtime instead of
          compile time. Since, by default, the crypto provider provides
          random numbers, runtime determination of a random number device is
          usually not needed. Fixes #1022.
        * Maintain links to foreign pages when copying foreign objects.
          This allows hyperlinks in imported files to work. Fixes #1003.
        * Bug fix: Return a null object if an attempt is made to to copy a
          foreign /Pages object with copyForeignObject. This corrects a
          possible crash. Fixes #1010.
        * Bug fix: Return a null object if an attempt is made to to copy a
          foreign /Pages object with copyForeignObject. Fixes #1003.
        * Add /MediaBox to a page if absent. Thanks M. Holger.
        * Use std::vector internally for Pl_Buffer to
          avoid incompatibility with C++20. Thanks to Zoe Clifford. Fixes #1024.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:02:31 +00:00
Peter Müller
bde13ed56b Core Update 182: Ship jq
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-21 19:02:15 +00:00
Adolf Belka
f376da91aa jq: Update to version 1.7
- Update from version 1.6 to 1.7
- This project had little happen to it for 5 years but is now going again
   https://jqlang.github.io/jq/
- Update of rootfile
- Changelog
    1.7
	After a five year hiatus we're back with a GitHub organization, with new admins
         and new maintainers who have brought a great deal of energy to make a
         long-awaited and long-needed new release.  We're very grateful for all the new
         owners, admins, and maintainers.  Special thanks go to Owen Ou (@owenthereal)
         for pushing to set up a new GitHub organization for jq, Stephen Dolan (@stedolan)
         for transferring the jq repository to the new organization, @itchyny for doing a
         great deal of work to get the release done, Mattias Wadman (@wader) and Emanuele
         Torre (@emanuele6) for many PRs and code reviews.  Many others also contributed
         PRs, issues, and code reviews as well, and you can find their contributions in
         the Git log and on the [closed issues and PRs page]
         (https://github.com/jqlang/jq/issues?q=is%3Aclosed+sort%3Aupdated-desc).
	Since the last stable release many things have happened:
	- jq now lives at <https://github.com/jqlang>
	- New maintainers, admins, and owners have been recruited.
	  - A list of [current maintainers](https://github.com/jqlang/jq/blob/jq-1.7/AUTHORS#L4-L14)
	- NEWS file is replaced by NEWS.md with Markdown format. @wader #2599
	- CI, scan builds, release, website builds etc now use GitHub actions. @owenthereal @wader @itchyny #2596 #2603 #2620 #2723
	- Lots of documentation improvements and fixes.
	- Website updated with new section search box, better section ids for linking, dark mode, etc. @itchyny #2628
	- Release builds for:
	  - Linux `amd64`, `arm64`, `armel`, `armhf`, `i386`, `mips`, `mips64`, `mips64el`, `mips64r6`, `mips64r6el`, `mipsel`, `mipsr6`, `mipsr6el`, `powerpc`, `ppc64el`, `riscv64` and `s390x`
	  - macOS `amd64` and `arm64`
	  - Windows `i386` and `amd64`
	  - Docker `linux/386`, `linux/amd64`, `linux/arm64`, `linux/mips64le`, `linux/ppc64le`, `linux/riscv64` and `linux/s390x`
	  - More details see @owenthereal #2665
	- Docker images are now available from `ghcr.io/jqlang/jq` instead of Docker Hub. @itchyny #2652 #2686
	- OSS-fuzz. @DavidKorczynski #2760 #2762
	Full commit log can be found at <https://github.com/jqlang/jq/compare/jq-1.6...jq-1.7> but here are some highlights:
      CLI changes
	- Make object key color configurable using `JQ_COLORS` environment variable. @itchyny @haguenau @ericpruitt #2703
	- Change the default color of null to Bright Black. @itchyny #2824
	- Respect `NO_COLOR` environment variable to disable color output. See <https://no-color.org> for details. @itchyny #2728
	- Improved `--help` output. Now mentions all options and nicer order. @itchyny @wader #2747 #2766 #2799
	- Fix multiple issues of exit code using `--exit-code`/`-e` option. @ryo1kato #1697
	- Add `--binary`/`-b` on Windows for binary output. To get `\n` instead of `\r\n` line endings. @nicowilliams 0dab2b1
	- Add `--raw-output0` for NUL (zero byte) separated output. @asottile @pabs3 @itchyny #1990 #2235 #2684
	- Fix assert crash and validate JSON for `--jsonarg`. @wader #2658
	- Remove deprecated `--argfile` option. @itchyny #2768
	- Enable stack protection. @nicowilliams #2801
      Language changes
	- Use decimal number literals to preserve precision. Comparison operations respects precision but arithmetic operations might truncate. @leonid-s-usov #1752
	- Adds new builtin `pick(stream)` to emit a projection of the input object or array. @pkoppstein #2656 #2779
	- Adds new builtin `debug(msgs)` that works like `debug` but applies a filter on the input before writing to stderr. @pkoppstein #2710
	- Adds new builtin `scan($re; $flags)`. Was documented but not implemented. @itchyny #1961
	- Adds new builtin `abs` to get absolute value. This potentially allows the literal value of numbers to be preserved as `length` and `fabs` convert to float. @pkoppstein #2767
	- Allow `if` without `else`-branch. When skipped the `else`-branch will be `.` (identity). @chancez @wader #1825 #2481
	- Allow use of `$binding` as key in object literals. @nicowilliams 8ea4a55
	- Allow dot between chained indexes when using `.["index"]` @nicowilliams #1168
	- Allow dot for chained value iterator `.[]`, `.[]?` @wader #2650
	- Fix try/catch catches more than it should. @nicowilliams #2750
	- Speed up and refactor some builtins, also remove `scalars_or_empty/0`. @muhmuhten #1845
	- Now `halt` and `halt_error` exit immediately instead of continuing to the next input. @emanuele6 #2667
	- Fix issue converting string to number after previous convert error. @thalman #2400
	- Fix issue representing large numbers on some platforms causing invalid JSON output. @itchyny #2661
	- Fix deletion using assigning empty against arrays. @itchyny #2133
	- Allow keywords to be used as binding name in more places. @emanuele6 #2681
	- Allow using `nan` as NaN in JSON. @emanuele6 #2712
	- Expose a module's function names in `modulemeta`. @mrwilson #2837
	- Fix `contains/1` to handle strings with NUL. @nicowilliams 61cd6db
	- Fix `stderr/0` to output raw text without any decoration. @itchyny #2751
	- Fix `nth/2` to emit empty on index out of range. @itchyny #2674
	- Fix `implode` to not assert and instead replace invalid unicode codepoints. @wader #2646
	- Fix `indices/1` and `rindex/1` in case of overlapping matches in strings. @emanuele6 #2718
	- Fix `sub/3` to resolve issues involving global search-and-replace (gsub) operations. @pkoppstein #2641
	- Fix `significand/0`, `gamma/0` and `drem/2` to be available on macOS. @itchyny #2756 #2775
	- Fix empty regular expression matches. @itchyny #2677
	- Fix overflow exception of the modulo operator. @itchyny #2629
	- Fix string multiplication by 0 (and less than 1) to emit empty string. @itchyny #2142
	- Fix segfault when using libjq and threads. @thalman #2546
	- Fix constant folding of division and reminder with zero divisor. @itchyny #2797
	- Fix `error/0`, `error/1` to throw null error. @emanuele6 #2823
	- Simpler and faster `transpose`. @pkoppstein #2758
	- Simple and efficient implementation of `walk/1`. @pkoppstein #2795
	- Remove deprecated filters `leaf_paths`, `recurse_down`. @itchyny #2666

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:01:29 +00:00
Adolf Belka
b8894582a7 dbus: Update to version 1.14.10
- Update from version 1.14.6 to 1.14.10
- Update of rootfile
- Changelog
    dbus 1.14.10 (2023-09-01)
      Bug fixes:
	• Avoid a dbus-daemon crash if re-creating a connection's policy fails.
	  If it isn't possible to re-create its policy (for example if it belongs
	  to a user account that has been deleted or if the Name Service Switch is
	  broken, on a system not supporting SO_PEERGROUPS), we now log a warning,
	  continue to use its current policy, and continue to reload other
	  connections' policies. (dbus#343; Peter Benie, Simon McVittie)
	• If getting the groups from a user ID fails, report the error correctly,
	  instead of logging "(null)" (dbus#343, Simon McVittie)
	• Return the primary group ID in GetConnectionCredentials()' UnixGroupIDs
	  field for processes with a valid-but-empty supplementary group list
	  (dbus!422, cptpcrd)
    dbus 1.14.8 (2023-06-06)
      Denial-of-service fixes:
	• Fix an assertion failure in dbus-daemon when a privileged Monitoring
	  connection (dbus-monitor, busctl monitor, gdbus monitor or similar)
	  is active, and a message from the bus driver cannot be delivered to a
	  client connection due to <deny> rules or outgoing message quota. This
	  is a denial of service if triggered maliciously by a local attacker.
	  (dbus#457; hongjinghao, Simon McVittie)
      Other fixes:
	• Fix compilation on compilers not supporting __FUNCTION__
	  (dbus!404, Barnabás Pőcze)
	• Fix some memory leaks on out-of-memory conditions
	  (dbus!403, Barnabás Pőcze)
	• Documentation:
	  · Fix syntax of a code sample in dbus-api-design
	    (dbus!396; Yen-Chin, Lee)
      Tests and CI enhancements:
	• Fix CI pipelines after freedesktop/freedesktop#540
	  (dbus!405, dbus#456; Simon McVittie)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:01:09 +00:00
Adolf Belka
270a3c534d alsa: Update to version 1.2.10
- Update alsa-lib, alsa-utils & alsa-ucn-conf from version 1.2.9 to 1.2.10
- Update of rootfile
- Changelog is too large to include here. Details can be found at
   https://www.alsa-project.org/wiki/Changes_v1.2.9_v1.2.10

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-11-21 19:00:55 +00:00
Peter Müller
1d552885c7 Start Core Update 182
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-11-21 18:59:47 +00:00
Michael Tremer
81b3cf237c core181: Package the correct udev files for riscv64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-11-03 14:28:19 +00:00
Michael Tremer
d0b43f4cc4 udev: Update riscv64 rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-11-01 10:43:34 +00:00
Michael Tremer
775a1055a5 core181: Remove old udev files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-30 09:59:19 +00:00
Stefan Schantl
e174a9594b udev: Switch to udev from systemd
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-30 09:53:48 +00:00
Stefan Schantl
c6b5e0cfe2 python3-Jinja2: New package
This is a build dependency of udev (systemd)

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-30 09:53:48 +00:00
Stefan Schantl
e6453de73e python3-MarkupSafe: New package
This is a build dependency for udev (systemd)

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-30 09:53:48 +00:00
Peter Müller
4d14892646 linux: Update x86_64 rootfile
My fault to provide this ahead of time, again. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-10-30 06:44:50 +00:00
Arne Fitzenreiter
1d1694c7e5 kernel: update aarch64 rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-27 08:43:41 +00:00
Michael Tremer
026eafd586 core181: Ship OpenSSL
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-26 08:57:31 +00:00
Michael Tremer
6fa97f2c97 openssl: Update to 3.1.4
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-26 08:57:20 +00:00
Michael Tremer
2cfcb06430 samba: Update rootfile on aarch64 + riscv64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-25 10:59:38 +00:00
Michael Tremer
7a6cf8276d core181: Ship apache2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-20 08:43:07 +00:00
Matthias Fischer
e1a68c27a0 samba: Update to 4.19.2
For details see:

v4.19.1. => https://www.samba.org/samba/history/samba-4.19.1.html
"
                  ==============================
                  Release Notes for Samba 4.19.1
                  October 10, 2023
                  ==============================

This is a security release in order to address the following defects:

o CVE-2023-3961:  Unsanitized pipe names allow SMB clients to connect as root to
                  existing unix domain sockets on the file system.
                  https://www.samba.org/samba/security/CVE-2023-3961.html

o CVE-2023-4091:  SMB client can truncate files to 0 bytes by opening files with
                  OVERWRITE disposition when using the acl_xattr Samba VFS
                  module with the smb.conf setting
                  "acl_xattr:ignore system acls = yes"
                  https://www.samba.org/samba/security/CVE-2023-4091.html

o CVE-2023-4154:  An RODC and a user with the GET_CHANGES right can view all
                  attributes, including secrets and passwords.  Additionally,
                  the access check fails open on error conditions.
                  https://www.samba.org/samba/security/CVE-2023-4154.html

o CVE-2023-42669: Calls to the rpcecho server on the AD DC can request that the
                  server block for a user-defined amount of time, denying
                  service.
                  https://www.samba.org/samba/security/CVE-2023-42669.html

o CVE-2023-42670: Samba can be made to start multiple incompatible RPC
                  listeners, disrupting service on the AD DC.
                  https://www.samba.org/samba/security/CVE-2023-42670.html"

v4.19.2 => https://www.samba.org/samba/history/samba-4.19.2.html
"Changes since 4.19.1
--------------------

o  Jeremy Allison <jra@samba.org>
   * BUG 15423: Use-after-free in aio_del_req_from_fsp during smbd shutdown
     after failed IPC FSCTL_PIPE_TRANSCEIVE.
   * BUG 15426: clidfs.c do_connect() missing a "return" after a cli_shutdown()
     call.

o  Ralph Boehme <slow@samba.org>
   * BUG 15463: macOS mdfind returns only 50 results.

o  Volker Lendecke <vl@samba.org>
   * BUG 15481: GETREALFILENAME_CACHE can modify incoming new filename with
     previous cache entry value.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 15464: libnss_winbind causes memory corruption since samba-4.18,
     impacts sendmail, zabbix, potentially more.

o  Martin Schwenke <mschwenke@ddn.com>
   * BUG 15479: ctdbd: setproctitle not initialized messages flooding logs.

o  Joseph Sutton <josephsutton@catalyst.net.nz>
   * BUG 15491: CVE-2023-5568 Heap buffer overflow with freshness tokens in the
     Heimdal KDC in Samba 4.19
   * BUG 15477: The heimdal KDC doesn't detect s4u2self correctly when fast is
     in use."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-20 08:41:59 +00:00
Michael Tremer
d03f03e24c core181: Ship backup.pl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-20 08:41:35 +00:00
Arne Fitzenreiter
554e339b9e kernel: update to 6.1.57
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-13 08:13:12 +00:00
Michael Tremer
82551c04d2 core181: Ship cURL
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-11 07:50:32 +00:00
Michael Tremer
0f7cdd7661 Merge branch 'master' into next 2023-10-11 07:50:21 +00:00
Michael Tremer
a85e9d4eb1 core180: Ship cURL
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-11 07:48:53 +00:00
Michael Tremer
4bcceb83f9 core181: Ship udev
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:18:43 +00:00
Michael Tremer
97bbd49a70 core181: Ship sysvinit
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:17:48 +00:00
Adolf Belka
375d921d00 sysvinit: Update to version 3.08
- Update from version 3.00 to 3.08
- Update of rootfile
- All the other patches and sed modifications are now built mintyo the source tarball,
   except for the mountpoint patch which is stilol needed
- Changelog
    3.08
	This release focuses on three changes which are basically imports of patches from Gentoo. Special thanks to floppym for supplying these.
	    Applied a patch from floppm which adds kexec option to the halt command. This can be used as "halt -k".
	    floppym provided patch which causes the halt command to call "shutdown -h -H" instead of "shutdown -h" when halt is invoked without parameters. This forces the shutdown command to set the INIT_HALT variable and assume, unless other conditions apply, that the "halt" call really wants to halt the machine and INIT_HALT should be set. In other words we assume halt wants to halt unless told otherwise.
	     Addresses downstream Gentoo bug ID 911257.
	    Updated halt documentation and help output to display parameters in alphabetical order.
    3.07
	The 3.07 release of SysV init mostly introduces fixes and improvements for the
	 killall5 and pidof programs. (These are actually the same program, but are
	 invoked with two different names, which result in different behaviour. The main
	 highlights in this release are:
		Fixed killall5 so that processes in the omit list are not sent any
		 signals, including SIGSTOP.
		Fixed usage message for killall5 to be more accurate.
		pidof was not returning PIDs of programs which were launched using a
		 symbolic link. This has been fixed so programs run from a symbolic link
		 show up in process lists.
    3.06
	    Mark Hindley fixed typo in es.po
	    Mark Hindley cleaned up translation code in src/Makefile.
	    Drop sulogin from Debian build. Removed libcrypt-dev dependency.
	    Fixed pt translation pages which were failing due to mis-matched open/close
	     tags.
	    Makefile now respects ROOT prefix when setting up pidof-to-killall5 symbolic
	     link.
	    Removed redundant translation files from man directory.
	    Makefile now respects DESTDIR. User can specify either ROOT= or DESTDIR= to
	     set install prefix.
    3.05
	This release (3.05) focuses on two things:
	    Updating the translation framework.
	    Fixing compiling issues on various systems.
	The second point, compiling, encompasses a few minor changes to get SysV init to
	 build properly on GNU Hurd, systems without certain GNU assumptions, and systems
	 running the latest glibc library (2.36 at time of writing).
    3.04
	This release contains one minor fix which allows the bootlogd code to properly
	 compile on Debian's GNU Hurd branch.
    3.03
	This release includes two minor changes. One is fixing a typo in the init manual
	 page (init.8). this fix was offered by Mark hindley.
	Mark, and a few other people, also pointed out that a fix in 3.02 for bootlogd
	 introduced reliance on a defined PATH_MAX constant. This is used elsewhere in
	 the code, but is not explicitly defined in bootlogd, which caused bootlogd to
	 not build properly on GNU Hurd and musl C systems. This has been fixed.
    3.02
	    Added q and Q flags to synopsis in shutdown manual page.
	    Applied fixes for markup and spacing in manual pages.
	     Patch provided by Mario Blattermann.
	    Added translation framework (po4a) from Mario Blttermann.
	    Added Makefile for man/ directory. Will handle translations
	     and substitutions.
	    Applied new translations for multiple languages from Mario Blattermann.
	    Added ability to use "@" symbol in command named in the inittab file. This
	     treats commands as literal and does not launch a shell to interpret them.
	    Updated inittab manual page to include overview of symbols which trigger
	     a shell interpretor and how to disable them using the @ symbol.
	    Introduced change which adds error checking in bootlogd when performing
	     chdir(). - Provided by Alexander Vickberg
	    Add check for console using TIOCGDEV on Linux systems in bootlogd to
	     make finding console more robust. - Provided by Alexander Vickberg
    3.01
	    Default to showing processes in the uninterruptable state (D).
	     The -z flag no longer affects whether processes in D state are shown.
	     The -z flag does still toggle whether zombie (Z) processes are shown.
	    Removed unnecessary check which is always true from init tab parsing.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:17:23 +00:00
Arne Fitzenreiter
4d4f665ab3 riscv64: enable some disabled addons
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:16:53 +00:00
Arne Fitzenreiter
e275a07b67 kernel: update to 6.1.56
this also builds the dtb files on riscv64

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:13:02 +00:00
Michael Tremer
7b9a3bb2d1 Merge branch 'master' into next 2023-10-09 08:12:40 +00:00
Arne Fitzenreiter
729fe58b12 boost: update x86_64 rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:12:13 +00:00
Michael Tremer
fd6dc213fb core181: Ship glibc again
This was updated in 180, but we want to make sure that even testing
users get the latest updates.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-04 13:00:39 +00:00
Michael Tremer
aabdf04299 Merge branch 'master' into next 2023-10-04 12:58:12 +00:00
Michael Tremer
c07f612e10 core180: Rewrite the SSH configuration on update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-02 18:13:38 +00:00
Michael Tremer
4afc081d83 core181: Ship extrahd.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-01 08:17:12 +00:00
Michael Tremer
3a7b9b7a2e Merge branch 'master' into next 2023-09-28 10:43:48 +00:00
Adolf Belka
a98abe9290 libslirp: Add the slirp library as this is required for the net user backend in qemu
- Looking through some of the changelog and some mail list communications it looks like
   qemu decided they did noty want to maintain their own bundled version of libslirp when
   the majority of OS's had their own version now in place. Ubuntu 18.04 did not have
   libslirp but qemu stopped supporting that version from qemu-7.1
- So it looks like all OS's have a standard libslirp available now and qemu have taken
   the decision to no longer have their own version but to use the system version. That
   was always possible to do if use of the system version was explicitly defined but
   the default was to use the bundled version.
- No evidence that libslirp is deprecated.
- The last version of libslirp was released a year ago but it looks like every month or
   so there are a couple of commits merged. The last was a month ago.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 10:42:22 +00:00
Adolf Belka
a38402929e qemu: Update to version 8.1.1 and add libslirp for net user backend
- Update from version 8.0.3 to 8.1.1
- In CU179 the update of qemu caused at least one user to have a problem starting his
   qemu system as the qemu bundled slirp library used for the net user backend was removed
   in version 7.2. Unfortunately no user tested qemu in the CU179 Testing phase, or if they
   did they are not using the net user backend.
- This patch adds the --enable-slirp option to configure and installs libslirp in a
   separate patch.
- I can't test if this now works as I don't use qemu anywhere.
- Changelog is too large to include here.
    8.1
	https://wiki.qemu.org/ChangeLog/8.1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 10:42:22 +00:00
Michael Tremer
91fe9748c9 core181: Ship URLFilter changes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:39:56 +00:00
Michael Tremer
94845e08bc core181: Fix arch-dependendant filelists
I created those in a wrong place :(

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:36:54 +00:00
Michael Tremer
461ad995ae core181: Ship OpenVPN changes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:35:33 +00:00
Adolf Belka
f8648b9563 update.sh: Adds code to update an existing ovpnconfig with pass or no-pass
- The code checks first if ovpnconfig exists and is not empty.
- Then it makes all net2net connections no-pass since they do not use encryption
- Then it cycles through all .p12 files and checks with openssl if a password exists or not.
   If a password is present then pass is added to index 41 and if not then no-pass is added
   to index 41
- I had to add a blank line to the top of the ovpnconfig file otherwise the awk code
   treated the first line as a blank line and missed it out of the update. This was the
   problem that was discovered during the previous Testing Release evaluation.
   Tested out this time with several existing entries both encrypted and insecure and with
   additional entries of both added in afterwards and all connection entries were
   maintained - road warrior and net2net.
- This code should be left in update.sh for future Core Updates in case people don't update
   with Core Update 175 but leave it till later. This code works fine on code that already
   has pass or no-pass entered into index 41 in ovpnconfig

Fixes: Bug#11048
Suggested-by: Erik Kapfer <ummeegge@ipfire.org>
Suggested-by: Adolf Belka <adolf.belka@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:34:23 +00:00
Adolf Belka
8e6bf12f14 web-user-interface: Addition of new icon for secure connection certificate download
- This uses a padlock icon from https://commons.wikimedia.org/wiki/File:Encrypted.png
- The license for this image is the following:-
   This library is free software; you can redistribute it and/or modify it under the terms
   of the GNU Lesser General Public License as published by the Free Software Foundation;
   either version 2.1 of the License, or (at your option) any later version. This library
   is distributed in the hope that it will be useful, but without any warranty; without
   even the implied warranty of merchantability or fitness for a particular purpose. See
   version 2.1 and version 3 of the GNU Lesser General Public License for more details.
- Based on the above license I believe it can be used by IPFire covered by the GNU General
   Public License that is used for it.
- The icon image was made by taking the existing openvpn.png file and superimposing the
   padlock icon on top of it as a 12x12 pixel format and naming it openvpn_encrypted.png

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:33:21 +00:00
Arne Fitzenreiter
14bd32221e kernel: update to 6.1.52
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:29:23 +00:00
Michael Tremer
db1ffe0f5f Start Core Update 181 (with a kernel)
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:25:35 +00:00
Michael Tremer
4322d0c727 core180: Ship bind
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:19:07 +00:00
Matthias Fischer
0f334f0ef3 bind: Update to 9.16.44
For details see:
https://downloads.isc.org/isc/bind9/9.16.44/doc/arm/html/notes.html#notes-for-bind-9-16-44

Changes since 9.16.40:

9.16.44:
"Previously, sending a specially crafted message
over the control channel could cause the packet-parsing
code to run out of available stack memory, causing named
to terminate unexpectedly. This has been fixed. (CVE-2023-3341)"

9.16.43:
"Processing already-queued queries received over TCP could cause
an assertion failure, when the server was reconfigured at the
same time or the cache was being flushed. This has been fixed."

9.16.42:
"The overmem cleaning process has been improved, to prevent the
cache from significantly exceeding the configured max-cache-size
limit. (CVE-2023-2828)

A query that prioritizes stale data over lookup triggers a fetch
to refresh the stale data in cache. If the fetch is aborted for
exceeding the recursion quota, it was possible for named to enter
an infinite callback loop and crash due to stack overflow. This
has been fixed. (CVE-2023-2911)

Previously, it was possible for a delegation from cache to be
returned to the client after the stale-answer-client-timeout
duration. This has been fixed."

9.16.41:
"When removing delegations from an opt-out range, empty-non-terminal
NSEC3 records generated by those delegations were not cleaned up.
This has been fixed."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:18:47 +00:00