Commit Graph

6324 Commits

Author SHA1 Message Date
Peter Müller
7241878861 update ca-certificates CA bundle
Update the CA certificates list to what Mozilla NSS ships currently.

The original file can be retrieved from:
https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-27 14:26:39 +00:00
Matthias Fischer
ba036c14cb bind: Update to 9.11.20
For details see:
https://downloads.isc.org/isc/bind9/9.11.20/RELEASE-NOTES-bind-9.11.20.html

"Security Fixes

    It was possible to trigger an INSIST failure when a zone with
    an interior wildcard label was queried in a certain pattern. This
    was disclosed in CVE-2020-8619. [GL #1111] [GL #1718]

New Features

    dig and other tools can now print the Extended DNS Error (EDE)
    option when it appears in a request or a response. [GL #1835]

Bug Fixes

    When fully updating the NSEC3 chain for a large zone via IXFR,
    a temporary loss of performance could be experienced on the
    secondary server when answering queries for nonexistent data that
    required DNSSEC proof of non-existence (in other words, queries that
    required the server to find and to return NSEC3 data). The
    unnecessary processing step that was causing this delay has now been
    removed. [GL #1834]

    A data race in lib/dns/resolver.c:log_formerr() that could lead
    to an assertion failure was fixed. [GL #1808]

    Previously, provide-ixfr no; failed to return up-to-date responses
    when the serial number was greater than or equal to the current
    serial number. [GL #1714]

    named-checkconf -p could include spurious text in server-addresses
    statements due to an uninitialized DSCP value. This has been fixed.
    [GL #1812]

    The ARM has been updated to indicate that the TSIG session key is
    generated when named starts, regardless of whether it is needed. [GL
    #1842]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-27 14:23:57 +00:00
Arne Fitzenreiter
e21c068f33 linux-firmware: update to 20200519
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-20 08:55:06 +02:00
Adolf Belka
3b887740e8 bacula: Update to 9.6.5
- Update bacula from version 9.0.6 to 9.6.5
  Version 9.0.6 is over two and a half years old.
- Update config options in lfs to include bacula recommended smartalloc option.
  "This enables the inclusion of the Smartalloc orphaned buffer detection
  code. This option is highly recommended. Because we never build without this option,
  you may experience problems if it is not enabled. In this case, simply re-enable the
  option. We strongly recommend keeping this option enabled as it helps detect memory
  leaks. This configuration parameter is used while building Bacula"
- Add install, uninstall and update files in src/paks/bacula
- Updated backup/includes to backup the config file and the File Daemon state file.

Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:59 +00:00
Matthias Fischer
f84b8d7aae dhcpcd: Update to 9.1.2
For details see:
https://roy.marples.name/blog/dhcpcd-9-1-2-released.html

    "Fix installing dhcpcd-definitions.conf rather than embedding it
    NetBSD: free ARP state once IPv4LL address announced
    Linux: fix compile for older distros
    udev: disable plugin for non Linux OS's
    BSD: Mark RA dervied addresses as AUTOCONF on NetBSD-current
    BSD: Only mark static routes from dhcpcd.conf as static
    DHCP6: Ensure requested addresses are requested
    DHCP6: Fix prefix length calculation when no prefix specified
    privsep: Implement a resource limited sandbox [1]
    privsep: Remove inet and dns pledges from master process
    privsep: call getifaddrs when the BSD lacks SIOCGIFALIAS
    privsep: free getifaddrs the right way if from privsep or not

[1] You will see a control proxy process now. This is for the resource
limited sandbox so that we can isolate requests over the control socket.
For NetBSD, FreeBSD and derivatives such as DragonFlyBSD this is
a massive win as these OS now enjoy a similar level of protection
as Capsicum or Pledge, but without the syscall filtering."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:59 +00:00
Michael Tremer
736c3b182d squidGuard: Update to 1.6.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:59 +00:00
Michael Tremer
82db9e5945 squidGuard: Update to 1.6.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:59 +00:00
Matthias Fischer
b2742aebf1 squidguard: Update to 1.5-beta
Changelog:

"Release 1.5

2010-09-09 Fixed inconsistent blocking (bug 59).  Replaced defined routine
in sgDB.c

2010-09-08 Added Russian translation from Vladimir Ipatov to squidGuard.cgi.in.

2009-10-19 Fixed two bypass problems with URLs which length is close to the limit
defined by MAX_BUF. The resulting proxy line exceeds this limit and causes
either squid or squidGuard to properly block a site.

2009-10-15 Fixed a problem with very long URLs. SquidGuard will go into
emergency mode when a overlong URLs are encountered. The emergency mode causes an
entire stop of blocking. This is not appropriate in this situation.

2009-09-30 Added patch by beber and gentoo (thank you!) to fix a problem when cross
compiling (bug 56).

2009-09-27 Added patch by gentoo to fix alocal warnings (bug 57).

2009-09-15 Added a feature to send log messages to syslog based on the patch from
Jun Jiang (thank you). (bug 42) In order to use syslog you have to run
configure with the new option "--with-syslog". In the configuration file you need to add a
line "syslog enable". If any other value but "enable" is used syslog is disabled and logging
to squidGuard.log takes place as usual. The following log level are used: DEBUG, NOTICE,
WARN, ERROR and EMERG. The local4 syslog facility is used by default. If you want to change
this, use the configure option "--with-syslog-facility=<facility>".

2009-09-12 Anonymized passwords (for connecting to the ldap or mysql server) written
to logfiles when squidGuard is starting. Added two configure options for choosing
different location for the LDAP include and library files.

2009-08-25 Added patch to check IP addresses against LDAP. Patch by Denis Bonnenfant
(bug 41) - thank you.

2009-08-23 Added patch to allow quoted strings in the configuration file (bug 53).
For more information see README.QuotedStrings. Thanks to Iain Fothergill for providing
the patch. Removed the fix for usernames starting with a number because it breaks the
time declarations.

2009-05-08 Added patch by INL to enable blocking against DNS based blacklists (bug 55).
Fixed re-opened bug 12: a problem with regular expressions. An entry like "www\.google\.de"
did not block www.google.de which it was supposed to do.
Solving this issue solved bug 46 as well.

2009-03-08 Fixed bug 52: Sometimes squidGuard crashes with an overflow
error message for vsprintf. Thanks to Dirk Schoebel for suggesting the proper fix.
Fixed bug 49: Using numeric username made squidGuard goes into emergency mode. This
has been fixed. Usernames can now start with a number, be numeric and can additionally
contain the following characters: @,à,é,è,ñ,á,ì,í,ò,ó,ù,ú."

Signed-off-by: Matthias Fischer <matthias.fischer at ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:59 +00:00
Michael Tremer
8365bd1aaa strace: This package now links against elfutils
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:59 +00:00
Matthias Fischer
d289d6fb5c iproute2: Update to 5.7.0
For details see:
https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/?h=v5.7.0

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:59 +00:00
Matthias Fischer
8b245523e5 joe: Update to 4.6
For details see:
https://joe-editor.sourceforge.io/NEWS.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:59 +00:00
Matthias Fischer
a5427e456c libgpg-error: Update to 1.38
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:58 +00:00
Matthias Fischer
2944c59ea9 libassuan: Update to 2.5.3
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:58 +00:00
Matthias Fischer
acef0b81d3 libgcrypt: Update to 1.8.5
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:58 +00:00
Matthias Fischer
32e4819b77 gmp 6.2.0: Fixed lfs for i586
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:58 +00:00
Matthias Fischer
63eacedabc gmp: Update to 6.2.0
Needed for gnutls 3.6.14

For details see:
https://gmplib.org/gmp6.2

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:58 +00:00
Matthias Fischer
44d2f538e1 gnutls: Update to 3.6.14
For details see:
https://lists.gnupg.org/pipermail/gnutls-help/2020-June/004648.html

"** libgnutls: Fixed insecure session ticket key construction, since 3.6.4.
   The TLS server would not bind the session ticket encryption key with a
   value supplied by the application until the initial key rotation, allowing
   attacker to bypass authentication in TLS 1.3 and recover previous
   conversations in TLS 1.2 (#1011).
   [GNUTLS-SA-2020-06-03, CVSS: high]

** libgnutls: Fixed handling of certificate chain with cross-signed
   intermediate CA certificates (#1008).

** libgnutls: Fixed reception of empty session ticket under TLS 1.2 (#997).

** libgnutls: gnutls_x509_crt_print() is enhanced to recognizes commonName
   (2.5.4.3), decodes certificate policy OIDs (!1245), and prints Authority
   Key Identifier (AKI) properly (#989, #991).

** certtool: PKCS #7 attributes are now printed with symbolic names (!1246).

** libgnutls: Added several improvements on Windows Vista and later releases
   (!1257, !1254, !1256). Most notably the system random number generator now
   uses Windows BCrypt* API if available (!1255).

** libgnutls: Use accelerated AES-XTS implementation if possible (!1244).
   Also both accelerated and non-accelerated implementations check key block
   according to FIPS-140-2 IG A.9 (!1233).

** libgnutls: Added support for AES-SIV ciphers (#463).

** libgnutls: Added support for 192-bit AES-GCM cipher (!1267).

** libgnutls: No longer use internal symbols exported from Nettle (!1235)

** API and ABI modifications:
GNUTLS_CIPHER_AES_128_SIV: Added
GNUTLS_CIPHER_AES_256_SIV: Added
GNUTLS_CIPHER_AES_192_GCM: Added
gnutls_pkcs7_print_signature_info: Added"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:58 +00:00
Matthias Fischer
c9f49bc693 borgbackup: Update to 1.1.13
For details see:
https://borgbackup.readthedocs.io/en/stable/changes.html#changelog

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:58 +00:00
Matthias Fischer
ea791f45b4 haproxy: Update to 2.1.7
For details see:
http://www.haproxy.org/download/2.1/src/CHANGELOG

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:58 +00:00
Matthias Fischer
3a40d33583 squid: Update to 4.12
For details see:
http://www.squid-cache.org/Versions/v4/changesets/

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:58 +00:00
Michael Tremer
4e58ab4bbf aws-functions.pl: Drop file and move functions to general-functions.pl
There is not enough stuff that it is justified to have an own file.

This patch therefore merges everything into general-functions.pl.

There are no functional changes.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-06-19 17:14:58 +00:00
Arne Fitzenreiter
4d43b3dcb1 intel-microcode: update to 20200609
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-12 17:47:29 +02:00
Arne Fitzenreiter
f3a59d63e2 kernel: update to 4.14.184
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-12 16:04:48 +02:00
Arne Fitzenreiter
8a86d257cf squid-accounting: remove deps that are moved to core
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-05 20:43:58 +00:00
Arne Fitzenreiter
a43b370411 kernel: update to 4.14.183
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-04 08:37:00 +02:00
Arne Fitzenreiter
b923dd3de0 kernel: backport "random: try to actively add entropy"
this backports https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/char/random.c?id=50ee7529ec4500c88f8664560770a7a1b65db72b
to gather enough entropy for initialise the crng faster.
Of some machines like the APU it will need forever if
the machine only wait for entropy without doing anything else.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-03 08:03:01 +00:00
Arne Fitzenreiter
5b0c35e092 drop xen-inage-builder
this depends on linux-pae and has failed to boot
since a while.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-02 18:37:22 +02:00
Arne Fitzenreiter
83d5892a86 kernel: drop extra i586-pae kernel
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-02 18:34:44 +02:00
Michael Tremer
371661367c netatalk: Add krb5 as a dependency
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-29 10:27:15 +00:00
Matthias Fischer
fead20a917 knot: Update to 2.9.5
For details see:
https://www.knot-dns.cz/2020-05-25-version-295.html

"Bugfixes:

 Old ZSK can be withdrawn too early during a ZSK rollover if maximum
 zone TTL is computed automatically
 Server responds SERVFAIL to ANY queries on empty non-terminal nodes

Improvements:

 Also module onlinesign returns minimized responses to ANY queries
 Linking against libcap-ng can be disabled via a configure option"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-27 11:07:55 +00:00
Matthias Fischer
ca33424de5 minidlna: Update to 1.2.1
For details see:
https://sourceforge.net/projects/minidlna/files/minidlna/1.2.1/

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-26 11:13:06 +00:00
Matthias Fischer
6e670b9c9d ffmpeg: Update to 4.2.3
For details see:
http://ffmpeg.org/download.html#release_4.2

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-26 11:12:51 +00:00
Matthias Fischer
442717a127 nano: Update to 4.9.3
For details see:
https://www.nano-editor.org/news.php

"One more bug introduced in version 4.9 is fixed: a crash when
the terminal screen is resized while at a lock-file prompt."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-26 11:11:51 +00:00
Michael Tremer
91b23ce05b squidGuard: Fix generating databases with libdb >= 5
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-22 12:47:32 +00:00
Arne Fitzenreiter
76a1dedb4f move perl-DBI and perl-DBD-SQLite to core system
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-20 09:47:25 +00:00
Matthias Fischer
c7e79ba602 bind: Update to 9.11.19
For details see:
https://downloads.isc.org/isc/bind9/9.11.19/RELEASE-NOTES-bind-9.11.19.html

"Security Fixes

    To prevent exhaustion of server resources by a maliciously
    configured domain, the number of recursive queries that can be
    triggered by a request before aborting recursion has been further
    limited. Root and top-level domain servers are no longer exempt from
    the max-recursion-queries limit. Fetches for missing name server
    address records are limited to 4 for any domain. This issue was
    disclosed in CVE-2020-8616. [GL #1388]

    Replaying a TSIG BADTIME response as a request could trigger
    an assertion failure. This was disclosed in CVE-2020-8617. [GL
    #1703]

Feature Changes

    Message IDs in inbound AXFR transfers are now checked for
    consistency. Log messages are emitted for streams with inconsistent
    message IDs. [GL #1674]

Bug Fixes

    When running on a system with support for Linux capabilities, named
    drops root privileges very soon after system startup. This was
    causing a spurious log message, "unable to set effective uid to 0:
    Operation not permitted", which has now been silenced. [GL #1042]
    [GL #1090]

    When named-checkconf -z was run, it would sometimes incorrectly set
    its exit code. It reflected the status of the last view found;
    if zone-loading errors were found in earlier configured views but
    not in the last one, the exit code indicated success. Thanks
    to Graham Clinch. [GL #1807]

    When built without LMDB support, named failed to restart after
    a zone with a double quote (") in its name was added with rndc
    addzone. Thanks to Alberto Fernández. [GL #1695]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-19 19:45:02 +00:00
Matthias Fischer
82d0a71743 unbound: Update to 1.10.1
For details see:
https://lists.nlnetlabs.nl/pipermail/unbound-users/2020-May/006833.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-19 19:36:13 +00:00
Peter Müller
2bd5209d49 Tor: update to 0.4.3.5
Please refer to https://blog.torproject.org/node/1872 for release notes.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-19 19:36:02 +00:00
Matthias Fischer
d73e1c75c8 knot: Update to 2.9.4
For details see:
https://www.knot-dns.cz/2020-05-05-version-294.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-18 20:20:06 +00:00
Matthias Fischer
cb9fd5923b clamav: Update to 0.102.3
For details see:
https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html

"ClamAV 0.102.3 is a bug patch release to address the following issues.

- CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing module
in ClamAV 0.102.2 that could cause a Denial-of-Service (DoS) condition.
Improper bounds checking of an unsigned variable results in an
out-of-bounds read which causes a crash.

- CVE-2020-3341: Fix a vulnerability in the PDF parsing module in ClamAV
0.101 - 0.102.2 that could cause a Denial-of-Service (DoS) condition.
Improper size checking of a buffer used to initialize AES decryption
routines results in an out-of-bounds read which may cause a crash. Bug
found by OSS-Fuzz.

- Fix "Attempt to allocate 0 bytes" error when parsing some PDF
documents.

- Fix a couple of minor memory leaks.

- Updated libclamunrar to UnRAR 5.9.2."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:58:37 +00:00
Erik Kapfer
3f6b25de59 tshark: Update to version 3.2.3
This update includes several bugfixes but also updated protocols.
For a full overview, in here -->
https://www.wireshark.org/docs/relnotes/wireshark-3.2.3.html the
changelog can be found.

Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:54:30 +00:00
Erik Kapfer
8e1149afd4 libseccomp: Update to version 2.4.3
- Add list of authorized release signatures to README.md
- Fix multiplexing issue with s390/s390x shm* syscalls
- Remove the static flag from libseccomp tools compilation
- Add define for __SNR_ppoll
- Update our Travis CI configuration to use Ubuntu 18.04
- Disable live python tests in Travis CI
- Use default python, rather than nightly python, in TravisCI
- Fix potential memory leak identified by clang in the scmp_bpf_sim too

The changelog can be found in here https://github.com/seccomp/libseccomp/blob/master/CHANGELOG .

Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:53:48 +00:00
Michael Tremer
b61a9a2716 shairport-sync: Update to 3.3.6
This patch also fixes the backup.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:53:25 +00:00
Erik Kapfer
3460ff86a2 OpenVPN: Update to version 2.4.9
Beneath several smaller fixes, this version fixes also some OpenSSL problems but also CVE-2020-11810.
The full changelog can be found in here https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24 .

Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:52:52 +00:00
Michael Tremer
97b1857ba4 random: Initialise the kernel's PRNG earlier
Since more processes depend on good randomness, we need to
make sure that the kernel's PRNG is initialized as early as
possible.

For systems without a HWRNG, we will need to fall back to our
noisy loop and wait until we have enough randomness.

This patch also removes saving and restoring the seed. This
is no longer useful because the kernel's PRNG only takes any
input after it has successfully been seeded from other sources.

Hence adding this seed does not increase its randomness.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:46:32 +00:00
Michael Tremer
65cb935200 random: Launch rngd earlier in the boot process
We should initialise the kernel's PRNG as early as we can.

Starting rngd very early will seed the random number generator
when RDRAND or other hardware random number generators are available.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-17 07:45:30 +00:00
Arne Fitzenreiter
80a2765de5 core145: add files linked against new libpng, libdb
also bump cups-filters, ghostscript, minidlna and qemu

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-13 20:44:43 +00:00
Arne Fitzenreiter
bd61ace39b core145: add gnupg, squid and bump cups
they are linked against updated openldap

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-13 18:46:04 +00:00
Arne Fitzenreiter
289a86a320 rootfiles: change MACHINE to xxxMACHINExxx
berkeley has a file that nane contain MACHINE wich should not
replaced by the build architecture.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-10 17:27:28 +00:00
Arne Fitzenreiter
22fe6d6f6e berkelay-compat: fix build on aarch64
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-09 21:11:25 +00:00