Commit Graph

17937 Commits

Author SHA1 Message Date
Adolf Belka
bf3df2b025 sqlite: Update to version 3370200
- Update from 3370000 to 3370200
- Update of rootfile not required
- Changelog
   Fix a bug introduced in version 3.35.0 (2021-03-12) that can cause database corruption
    if a SAVEPOINT is rolled back while in PRAGMA temp_store=MEMORY mode, and other
    changes are made, and then the outer transaction commits. Check-in 73c2b50211d3ae26
   Fix a long-standing problem with ON DELETE CASCADE and ON UPDATE CASCADE in which a
    cache of the bytecode used to implement the cascading change was not being reset
    following a local DDL change. Check-in 5232c9777fe4fb13.
   Other minor fixes that should not impact production builds.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-06 10:51:23 +00:00
Peter Müller
6e7bf934a7 Core Update 165: Ship lua
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-06 10:51:00 +00:00
Adolf Belka
3bdedafd20 lua: Update to version 5.4.4
- Update from 5.4.3 to 5.4.4
- Update of rootfile
- Update of pkgconfig file
- Changelog
   11 bugs from version 5.4.3 or earlier fixed
   See https://www.lua.org/bugs.html#5.4.3 for details

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-06 10:50:43 +00:00
Peter Müller
315fd0af9d Core Update 165: Ship libgpg-error
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-06 10:50:08 +00:00
Adolf Belka
d699173d0b libgpg-error: Update to version 1.44
- Update from 1.43 to 1.44
- Update of rootfile
- Changelog
   Noteworthy changes in version 1.44 (More details can be found in the ChangeLog file in
    the source tarball which lists each commit)
      * Fix dependency to gpg-error-config-test.sh.  [T5696]
      * Run the posix locking test only on supported platforms.  [T5699]
      * Detect Linux systems using musl.  [T5762]
      * Fix gpg-error-config-test for PKG_CONFIG_LIBDIR.  [T5740]
      * Fix returning of option attributes for options with args.  [T5799]
      * Add Turkish translations.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-06 10:49:58 +00:00
Peter Müller
0b423288e1 Core Update 165: Ship libcap
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-06 10:49:23 +00:00
Adolf Belka
949efe91ae libcap: Update to version 2.63
- Update from 2.61 to 2.63
- Update of rootfile
- Changelog
   Release notes for 2.63
    Restore errno to zero by the time main() is executed
        Bug reported by Yang Xu
    Consistent psx handling (a panic) for syscalls that return thread dependent status
        Inconsistend behavior noticed by Lorenz Bauer (Bug: 215283)
    Add a test case for a deadlock under investigation in golang #50113
        Bug reported by Weixiao Huang
    Trim some of the #include file use to make the tree compile more efficiently
   Release notes for 2.62
    Bug fix for Go package "cap" and launching:
        There was a race condition, reported by Lorenz Bauer (Bug: 215283)
    Build cleanups:
        David Seifert cleaned up warnings for 32-bit builds
        No longer use Perl in the libcap build process (Gentoo had a compelling reason to
         avoid this dependency)
    Documentation updates: cap_max_bits has a man page entry; Go module cap updates for
     Launch detail.
    Recognize default securebits as a libcap mode: HYBRID.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-06 10:49:07 +00:00
Peter Müller
7af7b67a81 Core Update 165: Ship toolchain changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 12:19:58 +00:00
Michael Tremer
bc79755735 make.sh: Bump toolchain version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:14:21 +00:00
Michael Tremer
fd34a1c888 glibc: Update to 2.35
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:14:11 +00:00
Michael Tremer
f84c2cda03 strip: Dereference path if it is a symlink
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:14:00 +00:00
Michael Tremer
bbedf54c52 Config: Globally permit using 32 bit time_t
This is required because some packages do not recommend building with
time_t when it is 32 bit (Y2038 problem).

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:13:43 +00:00
Michael Tremer
1c74bc461d make.sh: Set correct PATH in stage1
We did not use any of the tools that we were building which made the
build fail when cross-building on a different architecture.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:13:32 +00:00
Michael Tremer
0ce11c680d make.sh: Add CUSTOM_PATH option to lfsmake1
This is required so that we use the host's tools to perform the
stripping.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:13:21 +00:00
Michael Tremer
52e947f7f2 stripper: Actually use the path we want
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:13:11 +00:00
Michael Tremer
e7f76a9bf2 make.sh: Bump toolchain date
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:12:56 +00:00
Michael Tremer
a63f91a65a expect: Update automake to fix build on aarch64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:12:45 +00:00
Michael Tremer
786ed505df make.sh: Include /tools/sbin in search path
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:12:32 +00:00
Michael Tremer
19054331c5 make.sh: Refactor stripper
This should *actually* exclude everything we want to exclude and
*actually* strip everything to the maximum.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:12:22 +00:00
Michael Tremer
f35f213850 pciutils: Do not make headers executable
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:12:11 +00:00
Michael Tremer
c0c6e19f6f hyperscan: Enable release build and disable examples
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:11:59 +00:00
Michael Tremer
c16a83df5a binutils/gcc: Explicitely declare host and build architecture tuple
This will fix cross-compiling the toolchain which I broke before.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:11:46 +00:00
Michael Tremer
fdb587deca flash-images: Increase size of root partition to 1800 MB
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:11:35 +00:00
Michael Tremer
21c54d5524 make.sh: Bump toolchain version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:11:25 +00:00
Michael Tremer
c1d646bfb2 make.sh: Make BUILDTARGET consistent for all architectures
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:11:13 +00:00
Michael Tremer
be975dab58 binutils: Update to 2.37
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:11:00 +00:00
Michael Tremer
92cff3948f libnfsidmap: Drop package
This is now bundled in nfs-utils.

This patch needs a rootfile update for nfs

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:10:48 +00:00
Michael Tremer
8d02d167a6 postfix: Fix FTBFS with glibc 2.34
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:10:37 +00:00
Michael Tremer
9c7de6603f ntp: Fix FTBFS with glibc 2.34
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:10:27 +00:00
Michael Tremer
b7fca3c49b texinfo: Fix FTBFS with glibc-2.34
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:10:09 +00:00
Michael Tremer
0250d332e4 make.sh: Build zstd after second pass of GCC
zstd requires libatomic on riscv64 which isn't available, yet

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:09:57 +00:00
Michael Tremer
e111b836b3 binutils+gcc: Fix that the toolchain compiler is trying to link against host libraries
Binutils and GCC were misconfigured and used host libraries to build
toolchain programs. That resulted in that those programs were correctly
linked, but could not be executed, because the runtime linker did not
search in the host system.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:09:40 +00:00
Michael Tremer
173a4d546d glibc: Enable memory tagging on aarch64
https://lwn.net/Articles/834289/

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:09:29 +00:00
Michael Tremer
cf557eca9c glibc: Enable CET
Enable Intel Control-flow Enforcement Technology (CET) support
to protect the library with indirect branch tracking (IBT) and
shadow stack (SHSTK).

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:09:18 +00:00
Michael Tremer
1c3905afa6 glibc: Update to version 2.34
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:08:58 +00:00
Michael Tremer
7c6bf38c05 gcc: toolchain stage 2: Set sysroot to /tools_${arch}
The stage 2 compiler was looking for libraries outside the bootstrapped
toolchain environment which causes that linked programs cannot be
executied because the runtime linker only looks for libraries inside the
toolchain environment.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 12:08:42 +00:00
Peter Müller
f31be321f5 Core Update 165: Ship style.css
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 12:06:37 +00:00
Leo-Andres Hofmann
d235c1fd79 style.css: Add positive "z-index" to drop-down menu
Some input fields interfere with the menu items and block their use.
A z-index ensures that the menu is always rendered in the foreground.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 12:06:16 +00:00
Peter Müller
6bdcd8866e Core Update 165: Ship poppler
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 12:03:02 +00:00
Adolf Belka
55d52244b4 poppler: Update to version 22.02.0
- Update from 21.11.0 to 22.02.0
- Update of rootfile
- Changelog
    Release 22.02.0:
        core:
         * Signature: Add a way to detect unsigned FormFieldSignature
         * Signature: Suport background image when using left and right text
         * Signature: Fix path where to search for Firefox NSS in Windows
         * Signature: Fix NSS code to work correctly in Windows/Android
         * Count only signature fields in PDFDoc::getNumSignatureFields
         * Minor code improvements
        qt:
         * Allow signing unsigned signature fields
         * Allow passing a background image for the signature when signing
         * Allow passing the document password when signing
         * Fix leftFontSize being ignored when signing
        glib:
         * try with utf8 password if latin1 fails
         * New method for getting all signature fields of a document
         * Fix compile with MSVC
        utils:
         * pdfsig: Fix compile with MSVC
        build system:
         * Fix NSS cmake check for MSVC
    Release 22.01.0:
        core:
         * Allow local (relative to dll) fonts dir on Windows
         * TextOutputDev: require more spacing between columns. Issue #1093
         * Fix crash in Splash::gouraudTriangleShadedFill. Issue #1183
         * Fix crash when calling Form::reset()
         * GfxSeparationColorSpace: Check validity of colorspace and function. Issue #1184
         * Minor code improvements
        glib:
         * Include glib.h before using defines from it
         * Close file descriptors on error
         * Plug some memory leaks
         * Replace use of deprecated g_memdup/g_time_zone_new
         * Remove FD-taking functions on windows
        utils:
         * pdfsig: Add support for documents with passwords
         * pdfsig: Fix signing with -sign if nss password is needed
    Release 21.12.0:
        core:
         * Add API to add images
         * CairoOutputDev: Fix de-duping of Flate images
         * Fix crash on broken files when using non-default ENABLE_ZLIB_UNCOMPRESS. Issue #393
         * Minor code improvements
        glib:
         * Add API for validation of signatures
         * Add API to read/save to file descriptor
        utils:
         * pdftohtml: Reduce sensitivity of duplicate detection. Issue #1117
        build system:
         * Increase C++ standard to 17

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 12:02:53 +00:00
Adolf Belka
61d7aaa3ef samba: Update to version 4.15.5
- Update from 4.14.6 to 4.15.5
- Update of rootfile
- Changelog is too long to include everything. Full details can be found in the
   WHATSNEW.txt file in the source tarball. The following highlights those releases
    that were security releases. The other releases had a range of bug fixes.
    4.15.5 is a security release and includes the following CVE fixes
      o CVE-2021-44141: UNIX extensions in SMB1 disclose whether the outside target
                  of a symlink exists.
                  https://www.samba.org/samba/security/CVE-2021-44141.html
      o CVE-2021-44142: Out-of-Bound Read/Write on Samba vfs_fruit module.
                  https://www.samba.org/samba/security/CVE-2021-44142.html
      o CVE-2022-0336:  Re-adding an SPN skips subsequent SPN conflict checks.
                  https://www.samba.org/samba/security/CVE-2022-0336.html
    4.15.2 was a security release and included the following CVE fixes
      o CVE-2016-2124:  SMB1 client connections can be downgraded to plaintext
                  authentication.
                  https://www.samba.org/samba/security/CVE-2016-2124.html
      o CVE-2020-25717: A user on the domain can become root on domain members.
                  https://www.samba.org/samba/security/CVE-2020-25717.html
                  (PLEASE READ! There are important behaviour changes described)
      o CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets issued
                  by an RODC.
                  https://www.samba.org/samba/security/CVE-2020-25718.html
      o CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in Kerberos
                  tickets.
                  https://www.samba.org/samba/security/CVE-2020-25719.html
      o CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers
                  (eg objectSid).
                  https://www.samba.org/samba/security/CVE-2020-25721.html
      o CVE-2020-25722: Samba AD DC did not do suffienct access and conformance
                  checking of data stored.
                  https://www.samba.org/samba/security/CVE-2020-25722.html
      o CVE-2021-3738:  Use after free in Samba AD DC RPC server.
                  https://www.samba.org/samba/security/CVE-2021-3738.html
      o CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
                  https://www.samba.org/samba/security/CVE-2021-23192.html
    4.14.12 was a security release and included the following CVE fixes
      o CVE-2021-44142: Out-of-Bound Read/Write on Samba vfs_fruit module.
                  https://www.samba.org/samba/security/CVE-2021-44142.html
      o CVE-2022-0336:  Re-adding an SPN skips subsequent SPN conflict checks.
                  https://www.samba.org/samba/security/CVE-2022-0336.html
    4.14.10 was a security release and included the following CVE fixes
      o CVE-2016-2124:  SMB1 client connections can be downgraded to plaintext
                  authentication.
                  https://www.samba.org/samba/security/CVE-2016-2124.html
      o CVE-2020-25717: A user on the domain can become root on domain members.
                  https://www.samba.org/samba/security/CVE-2020-25717.html
                  (PLEASE READ! There are important behaviour changes described)
      o CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets issued
                  by an RODC.
                  https://www.samba.org/samba/security/CVE-2020-25718.html
      o CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in Kerberos
                  tickets.
                  https://www.samba.org/samba/security/CVE-2020-25719.html
      o CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers
                  (eg objectSid).
                  https://www.samba.org/samba/security/CVE-2020-25721.html
      o CVE-2020-25722: Samba AD DC did not do suffienct access and conformance
                  checking of data stored.
                  https://www.samba.org/samba/security/CVE-2020-25722.html
      o CVE-2021-3738:  Use after free in Samba AD DC RPC server.
                  https://www.samba.org/samba/security/CVE-2021-3738.html
      o CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
                  https://www.samba.org/samba/security/CVE-2021-23192.html

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 12:02:36 +00:00
Adolf Belka
6ba00f50c4 sdl2: Update to version 2.0.20
- Update from 2.0.18 to 2.0.20
- Update of rootfile
- Changelog
   2.0.20:
    General:
     * SDL_RenderGeometryRaw() takes a pointer to SDL_Color, not int. You can cast color
       data in SDL_PIXELFORMAT_RGBA32 format (SDL_PIXELFORMAT_ABGR8888 on little endian
       systems) for this parameter.
     * Improved accuracy of horizontal and vertical line drawing when using OpenGL or
       OpenGLES
     * Added the hint SDL_HINT_RENDER_LINE_METHOD to control the method of line drawing
       used, to select speed, correctness, and compatibility.
    Windows:
     * Fixed size of custom cursors
    Linux:
     * Fixed hotplug controller detection, broken in 2.0.18

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 12:02:21 +00:00
Peter Müller
909732dd80 Core Update 165: Ship zstd
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 12:01:57 +00:00
Adolf Belka
0c18a79b9a zstd: Update to version 1.5.2
- Update from 1.5.1 to 1.5.2
- Update of rootfile
- Changelog
   v1.5.2 (Jan, 2022)
     perf: Regain Minimal memset()-ing During Reuse of Compression Contexts (@Cyan4973, #2969)
     build: Build Zstd with `noexecstack` on All Architectures (@felixhandte, #2964)
     doc: Clarify Licensing (@terrelln, #2981)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 12:01:49 +00:00
Peter Müller
87d4ed3ec6 Core Update 165: Ship manualpages
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 12:00:47 +00:00
Adolf Belka
2b3a9bed2d manualpages: Update to include addon help links for addons with menu entries
- Some addons have menu entries and currentlky these do not have any links to their
   help pages
- Ran check_manualpages and confirmed that all links to wiki pages are existing.

- Tested for guardian and wio

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 11:59:59 +00:00
Peter Müller
59b79db94b Core Update 165: Ship OpenSSL
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 11:59:32 +00:00
Peter Müller
cab3054288 OpenSSL: Update to 1.1.1m
Full changelog as per https://www.openssl.org/news/cl111.txt :

 Changes between 1.1.1l and 1.1.1m [14 Dec 2021]

  *) Avoid loading of a dynamic engine twice.

     [Bernd Edlinger]

  *) Fixed building on Debian with kfreebsd kernels

     [Mattias Ellert]

  *) Prioritise DANE TLSA issuer certs over peer certs

     [Viktor Dukhovni]

  *) Fixed random API for MacOS prior to 10.12

     These MacOS versions don't support the CommonCrypto APIs

     [Lenny Primak]

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-05 11:59:24 +00:00
Roberto Peña
b9e613e405 wio: Add Spanish language file
- Update of lfs
- Update of rootfile
- Addition of Spanish file provided by Roberto Peña (listed as author)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2022-02-05 11:59:04 +00:00
Peter Müller
8ed905e612 Core Update 165: Ship p11-kit
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-05 11:58:28 +00:00