Commit Graph

8298 Commits

Author SHA1 Message Date
Peter Müller
d62babe08e Core Update 171: Remove some orphaned files
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-26 19:18:51 +00:00
Peter Müller
4075ce139b Core Update 171: Ship ipblocklist/sources
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-26 08:54:36 +00:00
Peter Müller
1c154e5180 Core Update 171: Ship expat
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:43:27 +00:00
Adolf Belka
aa4d18a8fb expat: Update to version 2.4.9
- Update from version 2.4.8 to 2.4.9
- Update of rootfile
- Changelog
   Release 2.4.9 Tue September 20 2022
        Security fixes:
	       #629 #640  CVE-2022-40674 -- Heap use-after-free vulnerability in
	                    function doContent. Expected impact is denial of service
	                    or potentially arbitrary code execution.
        Bug fixes:
	       	    #634  MinGW: Fix mis-compilation for -D__USE_MINGW_ANSI_STDIO=0
	            #614  docs: Fix documentation on effect of switch XML_DTD on
	                    symbol visibility in doc/reference.html
        Other changes:
	            #638  MinGW: Make fix-xmltest-log.sh drop more Wine bug output
	       #596 #625  Autotools: Sync CMake templates with CMake 3.22
	            #608  CMake: Migrate from use of CMAKE_*_POSTFIX to
	                    dedicated variables EXPAT_*_POSTFIX to stop affecting
	                    other projects
	       #597 #599  Windows|CMake: Add missing -DXML_STATIC to test runners
	                    and fuzzers
	       #512 #621  Windows|CMake: Render .def file from a template to fix
	                    linking with -DEXPAT_DTD=OFF and/or -DEXPAT_ATTR_INFO=ON
	       #611 #621  MinGW|CMake: Apply MSVC .def file when linking
	       #622 #624  MinGW|CMake: Sync library name with GNU Autotools,
	                    i.e. produce libexpat-1.dll rather than libexpat.dll
	                    by default.  Filename libexpat.dll.a is unaffected.
	            #632  MinGW|CMake: Set missing variable CMAKE_RC_COMPILER in
	                    toolchain file "cmake/mingw-toolchain.cmake" to avoid
	                    error "windres: Command not found" on e.g. Ubuntu 20.04
	       #597 #627  CMake: Unify inconsistent use of set() and option() in
	                    context of public build time options to take need for
	                    set(.. FORCE) in projects using Expat by means of
	                    add_subdirectory(..) off Expat's users' shoulders
	       #626 #641  Stop exporting API symbols when building a static library
	            #644  Resolve use of deprecated "fgrep" by "grep -F"
	            #620  CMake: Make documentation on variables a bit more consistent
	            #636  CMake: Drop leading whitespace from a #cmakedefine line in
	                    file expat_config.h.cmake
	            #594  xmlwf: Fix harmless variable mix-up in function nsattcmp
	  #592 #593 #610  Address Cppcheck warnings
	            #643  Address Clang 15 compiler warnings
	       #642 #644  Version info bumped from 9:8:8 to 9:9:8;
	                    see https://verbump.de/ for what these numbers do
        Infrastructure:
	       #597 #598  CI: Windows: Start covering MSVC 2022
	            #619  CI: macOS: Migrate off deprecated macOS 10.15
	            #632  CI: Linux: Make migration off deprecated Ubuntu 18.04 work
	            #643  CI: Upgrade Clang from 14 to 15
	            #637  apply-clang-format.sh: Add support for BSD find
	            #633  coverage.sh: Exclude MinGW headers
		    #635  coverage.sh: Fix name collision for -funsigned-char

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:42:53 +00:00
Peter Müller
80305dd4d3 Core Update 171: Delete stale Bind 9.16.32 libraries
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:42:14 +00:00
Matthias Fischer
abb32f5e60 bind: Update to 9.16.33
For details see:
https://downloads.isc.org/isc/bind9/9.16.33/doc/arm/html/notes.html#notes-for-bind-9-16-33

"Security Fixes

    Previously, there was no limit to the number of database lookups
    performed while processing large delegations, which could be abused to
    severely impact the performance of named running as a recursive
    resolver. This has been fixed. (CVE-2022-2795)

    ISC would like to thank Yehuda Afek from Tel-Aviv University and Anat
    Bremler-Barr & Shani Stajnrod from Reichman University for bringing
    this vulnerability to our attention. [GL #3394]

    named running as a resolver with the stale-answer-client-timeout option
    set to 0 could crash with an assertion failure, when there was a stale
    CNAME in the cache for the incoming query. This has been fixed.
    (CVE-2022-3080) [GL #3517]

    A memory leak was fixed that could be externally triggered in the
    DNSSEC verification code for the ECDSA algorithm. (CVE-2022-38177) [GL
    #3487]

    Memory leaks were fixed that could be externally triggered in the
    DNSSEC verification code for the EdDSA algorithm. (CVE-2022-38178) [GL
    #3487]

Feature Changes

    Response Rate Limiting (RRL) code now treats all QNAMEs that are
    subject to wildcard processing within a given zone as the same name, to
    prevent circumventing the limits enforced by RRL. [GL #3459]

    Zones using dnssec-policy now require dynamic DNS or inline-signing to
    be configured explicitly. [GL #3381]

    A backward-compatible approach was implemented for encoding
    internationalized domain names (IDN) in dig and converting the domain
    to IDNA2008 form; if that fails, BIND tries an IDNA2003 conversion. [GL
    #3485]

Bug Fixes

    A serve-stale bug was fixed, where BIND would try to return stale data
    from cache for lookups that received duplicate queries or queries that
    would be dropped. This bug resulted in premature SERVFAIL responses,
    and has now been resolved. [GL #2982]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:41:10 +00:00
Peter Müller
a76f7d8224 Core Update 171: Ship manualpages
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:39:57 +00:00
Peter Müller
c073cb7f92 Core Update 171: Ship and rebuild crontab
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:39:04 +00:00
Peter Müller
c2993d5e58 Core Update 171: Ship log.dat
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:37:33 +00:00
Peter Müller
64fc136084 Core Update 171: Ship and restart Unbound
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:35:39 +00:00
Matthias Fischer
21236acd00 unbound: Update to 1.16.3
For details see:
https://lists.nlnetlabs.nl/pipermail/unbound-users/2022-September/007885.html

"This release fixes CVE-2022-3204 Non-Responsive Delegation
Attack. It was reported by Yehuda Afek from Tel-Aviv
University and Anat Bremler-Barr and Shani Stajnrod from
Reichman University.

This fixes for better performance when under load, by cutting
promiscuous queries for nameserver discovery and limiting the
number of times a delegation point can look in the cache for
missing records.

Bug Fixes
- Patch for CVE-2022-3204 Non-Responsive Delegation Attack."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-23 10:34:41 +00:00
Peter Müller
abb185bf5a linux: Align configurations and rootfiles for ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-21 13:36:59 +00:00
Peter Müller
423685839a Core Update 171: Ship kernel and regenerate initial ramdisks locally
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-20 10:39:08 +00:00
Peter Müller
ae185d6f9d linux: Update to 5.15.68
Please refer to https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.68
for the changelog of this release. Due to the lack of local build
hardware, ARM rootfile and configuration changes have been omitted.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-20 10:33:19 +00:00
Peter Müller
ae49226866 Core Update 171: Ship backupiso
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-19 12:37:45 +00:00
Peter Müller
ee1cfd760c Core Update 171: Ship libloc
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 20:27:12 +00:00
Peter Müller
b029818d1a Core Update 171: Stop and restart collectd
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 20:24:50 +00:00
Peter Müller
492c9fb64b Fix restarting Squid and OpenVPN during Core Update 171
My fault, again. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 20:21:24 +00:00
Peter Müller
79fb08749b Core Update 171: Stop Apache before applying the upgrade
Since we replace Perl, users most likely get to see some nasty "Internal
Server Error" messages during the upgrade. To suppres them, and to limit
the chance of side effects, stop Apache before applying the update, and
start it again afterwards.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 08:02:14 +00:00
Peter Müller
3ce996ffc3 Core Update 171: Only start services if they are actually enabled
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 08:01:18 +00:00
Peter Müller
78ba051486 Core Update 171: Ship and restart strongSwan
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 07:58:39 +00:00
Peter Müller
4943252194 strongSwan: Update to 5.9.7
Please refer to https://github.com/strongswan/strongswan/releases/tag/5.9.7
for the release notes of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-18 07:57:03 +00:00
Peter Müller
8017c5cf1f Core Update 171: Ship wireless-regdb
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-17 21:18:41 +00:00
Peter Müller
f114e95c1c Core Update 171: Ship ca-certificates
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-17 21:18:19 +00:00
Peter Müller
76d9ce6b11 Core Update 171: Ship libsodium
Fixes: #12929
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2022-09-17 21:18:00 +00:00
Peter Müller
da65b2892f Core Update 171: Do not ship obsolete Intel BT firmware
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-17 09:42:51 +00:00
Peter Müller
8f31296112 linux-firmware: Drop dedicated Bluetooth BLOBs
Since we disabled Bluetooth support in the kernel a long time ago due to
security reasons, these do not serve any purpose anymore. Therefore, do
not ship them and delete them on existing installations.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-17 09:41:06 +00:00
Peter Müller
3b01f08a3c Core Update 171: Ship linux-firmware changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-17 08:49:30 +00:00
Peter Müller
2862b0e73b linux-firmware: Update to 20220913
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-17 08:32:21 +00:00
Adolf Belka
b8098b5c47 lcdproc: Update to commit 0e2ce9b version - fixes bug#12920
- The lcd2usb portion of the hd44780 driver in in the latest release version of
   lcdproc (0.5.9) are only coded for libusb-0.1, which was removed from IPFire in recent
   times.
- Commits have been merged into the lcdproc repository that enable lcd2usb to work with
   the libusb-1.0 series but no release has been made since 2017.
- This patch downloaded a zip archive from the status of the lcdproc repository at commit
   0e2ce9b. This zip archive was then converted into a tar.gx archive. The lfs and
   rootfile have been updated in line with this.
- The lcdproc-0e2ce9b-4.ipfire file created by this build has been tested by the bug
   reporter, Rolf Schreiber, and confirmed to fix the issue raised with the bug.
- This patch brings lcdproc upto date with the 149 commits that have been made between
   2017 and Dec 2021, the date of the last commit.
- The version number has been defined as the last commit number.
- The -enable-libusb option has to be left in place as it turned out that
  -enable-libusb-1-0 only works if -enable-libusb is also set. It looks like this was
  identified in the lcdproc issues list but has not yet been fixed.

Fixes: Bug#12920
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-15 19:45:00 +00:00
Peter Müller
609f0e129b Core Update 171: Add missing changes related to Perl update
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-15 19:25:48 +00:00
Peter Müller
4446d9763e efivar: Update aarch64 rootfile as well
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-15 07:47:36 +00:00
Peter Müller
b415bb533e Merge branch 'next' into temp-c171-development 2022-09-13 11:43:06 +00:00
Peter Müller
1564096b51 Core Update 171: Delete stale efivar files
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 09:52:04 +00:00
Adolf Belka
f7384566ea mandoc: Build dependency for efivar version 38 onwards
- New build only dependency

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 09:48:21 +00:00
Adolf Belka
922747b205 efivar: Update to version 38
- Update from version 37 to 38
- Update of rootfile
- mandoc is now a build dependency for efivar
- Old compile fixes patches are no longer required with version 38
- Details for lfs build of version 38 obtained from Beyond Linux From Scratch
- Changelog
   bug fixes
    Rework some makefile bits to make overriding some options simpler. by @vathpela in #140
    Handle /sys/devices/virtual/{nvme-fabrics,nvme-subsystem} devices by @vathpela in #139
    guids.S: Include <cet.h> when CET is enabled by @hjl-tools in #149
    Fix /sys/block sysfs parsing for eMMC-s by @jwrdegoede in #150
    Properly check mmap return error by @hannob in #152
    Fix s{yt,ty}le typo in efi_get_variable(3) by @nabijaczleweli in #162
    Handle NULL set_variable() by @lcp in #159
    Fix parsing for nvme-subsystem devices by @dannf in #158
    Attempt to fix the identified thread safety bugs by @vathpela in #155
    Make thread-test depend on libefivar.so by @hjl-tools in #176
    Upstream a local patch from rawhide by @frozencemetery in #177
    Fix conversion from UTF8 to UCS2 by @freedge in #171
    efivar: make docs match current code for 'efivar -A' by @vathpela in #178
    Migrate CI to Github actions by @frozencemetery in #179
    Add code of conduct by @frozencemetery in #180
    Misc minor fixes by @vathpela in #182
    Add efi_time_t declarations and helper functions. by @vathpela in #183
    More misc fixes by @vathpela in #185
    Run CI on more targets by @vathpela in #187
    Coverity fixes 20211208 by @vathpela in #189
    CI: run abicheck by @frozencemetery in #190
    Fix linux virtual root device parsing by @vathpela in #188
    efivar.spec.in: fix license to be valid SPDX by @frozencemetery in #192
    Add efisecdb tooling by @vathpela in #184
    Fix linker string comparison for dash by @frozencemetery in #194
   Full changelog diff between version 37 and 38 is available in github repo
    https://github.com/rhboot/efivar/compare/37...38

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 09:48:04 +00:00
Peter Müller
c6e683d07d Core Update 171: Ship nettle
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 09:44:05 +00:00
Adolf Belka
0f4ecb9fc3 nettle: Update to version 3.8.1
- Update from version 3.7.3 to 3.8.1
- Update of rootfile
- Changelog
   3.8.1 release
	This is a bugfix release, fixing a few portability issues
	reported for Nettle-3.8.
	Bug fixes:
	* Avoid non-posix m4 argument references in the chacha
	  implementation for arm64, powerpc64 and s390x. Reported by
	  Christian Weisgerber, fix contributed by Mamone Tarsha.
	* Use explicit .machine pseudo-ops where needed in s390x
	  assembly files. Bug report by Andreas K. Huettel, fix
	  contributed by Mamone Tarsha.
	Optimizations:
	* Implemented runtime detection of cpu features for OpenBSD on
	  arm64. Contributed by Christian Weisgerber.
	The new version is intended to be fully source and binary
	compatible with Nettle-3.6. The shared library names are
	libnettle.so.8.6 and libhogweed.so.6.6, with sonames
	libnettle.so.8 and libhogweed.so.6.
   3.8 release
	This release includes a couple of new features, and many
	performance improvements. It adds assembly code for two more
	architectures: ARM64 and S390x.
	The new version is intended to be fully source and binary
	compatible with Nettle-3.6. The shared library names are
	libnettle.so.8.5 and libhogweed.so.6.5, with sonames
	libnettle.so.8 and libhogweed.so.6.
	New features:
	* AES keywrap (RFC 3394), contributed by Nicolas Mora.
	* SM3 hash function, contributed by Tianjia Zhang.
	* New functions cbc_aes128_encrypt, cbc_aes192_encrypt,
	  cbc_aes256_encrypt.
	  On processors where AES is fast enough, e.g., x86_64 with
	  aesni instructions, the overhead of using Nettle's general
	  cbc_encrypt can be significant. The new functions can be
	  implemented in assembly, to do multiple blocks with reduced
	  per-block overhead.
	  Note that there's no corresponding new decrypt functions,
	  since the general cbc_decrypt doesn't suffer from the same
	  performance problem.
	Bug fixes:
	* Fix fat builds for x86_64 windows, these appear to never
          have worked.
	Optimizations:
	* New ARM64 implementation of AES, GCM, Chacha, SHA1 and
	  SHA256, for processors supporting crypto extensions. Great
	  speedups, and fat builds are supported. Contributed by
	  Mamone Tarsha.
	* New s390x implementation of AES, GCM, Chacha, memxor, SHA1,
	  SHA256, SHA512 and SHA3. Great speedups, and fat builds are
	  supported. Contributed by Mamone Tarsha.
	* New PPC64 assembly for ecc modulo/redc operations,
	  contributed by Amitay Isaacs, Martin Schwenke and Alastair
	  D´Silva.
	* The x86_64 AES implementation using aesni instructions has
	  been reorganized with one separate function per key size,
	  each interleaving the processing of two blocks at a time
	  (when the caller processes multiple blocks with each call).
	  This gives a modest performance improvement on some
	  processors.
	* Rewritten and faster x86_64 poly1305 assembly.
	Known issues:
	* Nettle's testsuite doesn't work out-of-the-box on recent
	  MacOS, due to /bin/sh discarding the DYLD_LIBRARY_PATH
	  environment variable. Nettle's test scripts handle this in
	  some cases, but currently fails the test cases that are
	  themselves written as /bin/sh scripts. As a workaround, use
	  make check EMULATOR='env DYLD_LIBRARY_PATH=$(TEST_SHLIB_DIR)'
	Miscellaneous:
	* Updated manual to current makeinfo conventions, with no
	  explicit node pointers. Generate pdf version with texi2pdf,
	  to get working hyper links.
	* Added square root functions for NIST ecc curves, as a
	  preparation for supporting compact point representation.
	* Reworked internal GCM/ghash interfaces, simplifying assembly
	  implementations. Deleted unused GCM C implementation
	  variants with less than 8-bit lookup table.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 09:43:25 +00:00
Peter Müller
fa100fdd54 Core Update 171: Ship iproute2
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 09:43:05 +00:00
Adolf Belka
085446d6fb iproute2: Update to version 5.19.0
- Update from 5.17.0 to 5.19.0
- Update of rootfile
- Changelog is only available as the lsit fo commits from the git repository
   https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 09:42:54 +00:00
Adolf Belka
c46d6ee4ab elfutils: Update to version 0.187
- Update from version 0.186 to 0.187
- Update of rootfile
- Changelog
   0.187
     * NEWS *
	debuginfod: Support -C option for connection thread pooling.
	debuginfod-client: Negative cache file are now zero sized instead of
	                   no-permission files.
	addr2line: The -A, --absolute option, which shows file names including
	           the full compilation directory is now the default.  To get the
	           old behavior use the new option --relative.
	readelf, elflint: Recognize FDO Packaging Metadata ELF notes
	libdw, debuginfo-client: Load libcurl lazily only when files need to
	                         be fetched remotely. libcurl is now never
	                         loaded when DEBUGINFOD_URLS is unset. And when
	                         DEBUGINFOD_URLS is set, libcurl is only loaded
	                         when the debuginfod_begin function is called.
     * GIT SHORTLOG *
	  debuginfod: Include "IPv4 IPv6" in server startup message
	  PR29022: 000-permissions files cause problems for backups
	  debuginfod: Use the debuginfod-size response header
	  debuginfod: ensure X-DEBUGINFOD-SIZE contains file size
	  config: simplify profile.*sh.in
	  debuginfod/debuginfod-client.c: use long for cache time configurations
	  readelf: Don't consider padding DT_NULL as dynamic section entry
	  debuginfod: correct concurrency bug in fdcache metrics
	  PR28661: debuginfo connection thread pool support
	  man debuginfod-client-config.7: Elaborate $DEBUGINFOD_URLS
	  PR28708: debuginfod: use MHD_USE_EPOLL for microhttpd threads
	  debuginfod: use single ipv4+ipv6 microhttpd daemon configuration
	  AUTHORS: Use generator script & git mailmap
	  libebl: recognize FDO Packaging Metadata ELF note
	  tests: Don't set DEBUGINFOD_TIMEOUT
	  tests: Add -rdynamic to dwfl_proc_attach_LDFLAGS
	  debuginfod: Use gmtime_r instead of gmtime to avoid data race
	  debuginfod: sqlite3_sharedprefix_fn should not compare past end of string
	  debuginfod: Fix some memory leaks on debuginfod-client error paths.
	  debuginfod: Clear and reset debuginfod_client winning_headers on reuse
	  libdwfl: Don't read beyond end of file in dwfl_segment_report_module
	  debuginfod: Check result of calling MHD_add_response_header.
	  readelf: Workaround stringop-truncation error
	  tests: varlocs workaround format-overflow errors
	  debuginfod: Fix debuginfod_pool leak
	  configure: Add --enable-sanitize-address
	  debuginfod: Don't format clog using 'right' or 'setw(20)'.
	  libdwfl: Don't try to convert too many bytes in dwfl_link_map_report
	  libdwfl: Make sure we know the phdr entry size before searching phdrs.
	  libdwfl: Don't trust e_shentsize in dwfl_segment_report_module
	  libdwfl: Don't install an Elf handle in a Dwfl_Module twice
	  libdwfl: Don't try to convert too many dyns in dwfl_link_map_report
	  libdwfl: Don't allocate more than SIZE_MAX in dwfl_segment_report_module.
	  libelf: Use offsetof to get field of unaligned
	  libdwfl: Make sure phent is sane and there is at least one phdr
	  libdwfl: Add overflow check while iterating in dwfl_segment_report_module
	  tests: Use /bin/sh instead of /bin/ls as always there binary
	  libdwfl: Make sure there is at least one dynamic entry
	  libdwfl: Make sure there is at least one phdr
	  libdwfl: Make sure note data is properly aligned.
	  libdwfl: Make dwfl_segment_report_module aware of maximum Elf size
	  libdwfl: Make sure the note len increases each iteration
	  libelf: Only set shdr state when there is at least one shdr
	  libdwfl: Make sure that ph_buffer_size has room for at least one phdr
	  libdwfl: Make sure dyn_filesz has a sane size
	  libdwfl: Rewrite GElf_Nhdr reading in dwfl_segment_report_module
	  libdwfl: Handle unaligned Ehdr in dwfl_segment_report_module
	  libdwfl: Handle unaligned Phdr in dwfl_segment_report_module
	  libdwfl: Handle unaligned Nhdr in dwfl_segment_report_module
	  libdwfl: Always clean up build_id.memory
	  libdwfl: Make sure dwfl_elf_phdr_memory_callback returns at least minread
	  libdwfl: Call xlatetom on aligned buffers in dwfl_link_map_report
	  libdwfl: Calculate addr to read by hand in link_map.c read_addrs.
	  libdwfl: Fix overflow check in link_map.c read_addrs
	  libdwfl: Handle unaligned Dyns in dwfl_segment_report_module
	  libdwfl: Declare possible zero sized arrays only when non-zero
	  backends: Use PTRACE_GETREGSET for ppc_set_initial_registers_tid
	  configure: Test for _FORTIFY_SOURCE=3 support.
	  addr2line: Make --absolute the default, add --relative option.
	  configure: Use AS_HELP_STRING instead of AC_HELP_STRING.
	  libelf: Take map offset into account for Shdr alignment check in elf_begin
	  libelf: Make sure ar_size starts with a digit before calling atol.
	  libelf: Check alignment of Verdef, Verdaux, Verneed and Vernaux offsets
	  libdwfl: Close ar members when they cannot be processed.
	  libdwfl: Use memcpy to assign image header field values
	  libelf: Don't overflow offsets in elf_cvt_Verneed and elf_cvt_Verdef
	  libelf: Correct alignment of ELF_T_GNUHASH data for ELFCLASS64
	  tests: Check addsections test binary is 64bit for run-large-elf-file.sh
	  configure: Don't check whether -m64 works for 32bit host biarch check
	  libelf: Sync elf.h from glibc.
	  elflint: Recognize NT_FDO_PACKAGING_METADATA
	  Introduce error_exit as a noreturn variant of error (EXIT_FAILURE, ...)
	  libelf: Also copy/convert partial datastructures in xlate functions
	  libelf: Return already gotten Elf_Data from elf_getdata_rawchunk
	  config: Add versioned requires on libs/libelf for debuginfod-client
	  libdw: Add DWARF5 package file section identifiers, DW_SECT_*
	  tests: Don't try to corrupt sqlite database during test.
	  libdw: Remove unused atomics.h include from libdwP.h
	  readelf: Define dyn_mem outside the while loop.
	  tests: Lower parallel lookups in run-debuginfod-webapi-concurrency.sh
	  debuginfod: Use MHD_USE_ITC in MHD_start_daemon flags
	  elfclassify: Fix --no-stdin flag
	  libelf: Check for mremap, elf_update needs it for ELF_C_RDWR_MMAP
	  debuginfod, libdwfl: Initialize libcurl and dlopen debuginfod-client lazily
	  dwfl: fix potential overflow when reporting on kernel modules
	  debuginfod: fix compilation on platforms without <error.h>

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 09:41:11 +00:00
Peter Müller
0892c58e0c Core Update 171: This update needs a reboot
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 06:09:22 +00:00
Adolf Belka
af9cd948b3 libarchive: Update to version 3.6.1
- Update from version 3.6.0 to 3.6.1
- Update of rootfile
- Changelog
	Libarchive 3.6.1 is a bugfix and security release.
	  Security fixes:
	    7zip reader: fix PPMD read beyond boundary (#1671)
	    ZIP reader: fix possible out of bounds read (OSS-Fuzz 38766 #1672)
	    ISO reader: fix possible heap buffer overflow in read_children() (OSS-Fuzz 38764, #1685)
	    RARv4 redaer: fix multiple issues in RARv4 filter code (introduced in libarchive 3.6.0)
	        fix heap use after free in archive_read_format_rar_read_data() (OSS-Fuzz 44547, 52efa50)
	        fix null dereference in read_data_compressed() (OSS-Fuzz 44843, 1271f77)
	        fix heap user after free in run_filters() (OSS-Fuzz 46279, #1715)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 06:08:49 +00:00
Peter Müller
e955dbdca3 Core Update 171: Ship and restart OpenVPN
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 06:08:25 +00:00
Peter Müller
c49899dc54 Core Update 171: Ship sqlite
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 06:07:41 +00:00
Peter Müller
4c4953a0d0 Core Update 171: Delete orphaned Bind libraries
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 06:07:03 +00:00
Peter Müller
ef0e70ee44 Core Update 171: Ship util-linux
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 06:05:42 +00:00
Peter Müller
a6178c7ce7 Core Update 171: Ship Bind
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 06:04:36 +00:00
Matthias Fischer
ceff14d956 bind: Update to 9.16.32
For details see:
https://downloads.isc.org/isc/bind9/9.16.32/doc/arm/html/notes.html#notes-for-bind-9-16-32

Excerpt from changelog:

"5934.	[func]		Improve fetches-per-zone fetch limit logging to log
			the final allowed and spilled values of the fetch
			counters before the counter object gets destroyed.
			[GL #3461]

5933.	[port]		Automatically disable RSASHA1 and NSEC3RSASHA1 in
			named on Fedorda 33, Oracle Linux 9 and RHEL9 when
			they are disabled by the security policy. [GL #3469]

5932.	[bug]		Fix rndc dumpdb -expired and always include expired
			RRsets, not just for RBTDB_VIRTUAL time window.
			[GL #3462]

5929.	[bug]		The "max-zone-ttl" option in "dnssec-policy" was
			not fully effective; it was used for timing key
			rollovers but did not actually place an upper limit
			on TTLs when loading a zone. This has been
			corrected, and the documentation has been clarified
			to indicate that the old "max-zone-ttl" zone option
			is now ignored when "dnssec-policy" is in use.
			[GL #2918]

5924.	[func]		When it's necessary to use AXFR to respond to an
			IXFR request, a message explaining the reason
			is now logged at level info. [GL #2683]

5923.	[bug]		Fix inheritance for dnssec-policy when checking for
			inline-signing. [GL #3438]

5922.	[bug]		Forwarding of UPDATE message could fail with the
			introduction of netmgr. This has been fixed. [GL #3389]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-09-12 06:04:21 +00:00
Michael Tremer
b5f3c54b19 Merge remote-tracking branch 'origin/next' 2022-09-11 09:42:17 +00:00