Commit Graph

9095 Commits

Author SHA1 Message Date
Matthias Fischer
bf85d30b58 suricata: Update to 6.0.15
Excerpt from changelog:

"6.0.15 -- 2023-10-18

Security #6363: mime: quadratic complexity in MimeDecAddEntity (6.0.x backport)
Bug #6407: email: disabled fields in suricata.yaml also get logged (6.0.x backport)
Bug #6403: detect: multi-level tunneling inspection fails (6.0.x backport)
Bug #6377: byte_jump with negative post_offset before start of buffer failure (6.0.x backport)
Task #6364: decode: add drop reason for stream reassembly memcap (6.0.x backport)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-20 08:44:02 +00:00
Matthias Fischer
5049433d91 apache: Update to 2.4.58
For details see:
https://dlcdn.apache.org/httpd/CHANGES_2.4.58

Excerpt from changelog:
"Changes with Apache 2.4.58

  *) SECURITY: CVE-2023-45802: Apache HTTP Server: HTTP/2 stream
     memory not reclaimed right away on RST (cve.mitre.org)
     When a HTTP/2 stream was reset (RST frame) by a client, there
     was a time window were the request's memory resources were not
     reclaimed immediately. Instead, de-allocation was deferred to
     connection close. A client could send new requests and resets,
     keeping the connection busy and open and causing the memory
     footprint to keep on growing. On connection close, all resources
     were reclaimed, but the process might run out of memory before
     that.
     This was found by the reporter during testing of CVE-2023-44487
     (HTTP/2 Rapid Reset Exploit) with their own test client. During
     "normal" HTTP/2 use, the probability to hit this bug is very
     low. The kept memory would not become noticeable before the
     connection closes or times out.
     Users are recommended to upgrade to version 2.4.58, which fixes
     the issue.
     Credits: Will Dormann of Vul Labs

  *) SECURITY: CVE-2023-43622: Apache HTTP Server: DoS in HTTP/2 with
     initial windows size 0 (cve.mitre.org)
     An attacker, opening a HTTP/2 connection with an initial window
     size of 0, was able to block handling of that connection
     indefinitely in Apache HTTP Server. This could be used to
     exhaust worker resources in the server, similar to the well
     known "slow loris" attack pattern.
     This has been fixed in version 2.4.58, so that such connection
     are terminated properly after the configured connection timeout.
     This issue affects Apache HTTP Server: from 2.4.55 through
     2.4.57.
     Users are recommended to upgrade to version 2.4.58, which fixes
     the issue.
     Credits: Prof. Sven Dietrich (City University of New York)

  *) SECURITY: CVE-2023-31122: mod_macro buffer over-read
     (cve.mitre.org)
     Out-of-bounds Read vulnerability in mod_macro of Apache HTTP
     Server.This issue affects Apache HTTP Server: through 2.4.57.
     Credits: David Shoon (github/davidshoon)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-20 08:42:05 +00:00
Matthias Fischer
e1a68c27a0 samba: Update to 4.19.2
For details see:

v4.19.1. => https://www.samba.org/samba/history/samba-4.19.1.html
"
                  ==============================
                  Release Notes for Samba 4.19.1
                  October 10, 2023
                  ==============================

This is a security release in order to address the following defects:

o CVE-2023-3961:  Unsanitized pipe names allow SMB clients to connect as root to
                  existing unix domain sockets on the file system.
                  https://www.samba.org/samba/security/CVE-2023-3961.html

o CVE-2023-4091:  SMB client can truncate files to 0 bytes by opening files with
                  OVERWRITE disposition when using the acl_xattr Samba VFS
                  module with the smb.conf setting
                  "acl_xattr:ignore system acls = yes"
                  https://www.samba.org/samba/security/CVE-2023-4091.html

o CVE-2023-4154:  An RODC and a user with the GET_CHANGES right can view all
                  attributes, including secrets and passwords.  Additionally,
                  the access check fails open on error conditions.
                  https://www.samba.org/samba/security/CVE-2023-4154.html

o CVE-2023-42669: Calls to the rpcecho server on the AD DC can request that the
                  server block for a user-defined amount of time, denying
                  service.
                  https://www.samba.org/samba/security/CVE-2023-42669.html

o CVE-2023-42670: Samba can be made to start multiple incompatible RPC
                  listeners, disrupting service on the AD DC.
                  https://www.samba.org/samba/security/CVE-2023-42670.html"

v4.19.2 => https://www.samba.org/samba/history/samba-4.19.2.html
"Changes since 4.19.1
--------------------

o  Jeremy Allison <jra@samba.org>
   * BUG 15423: Use-after-free in aio_del_req_from_fsp during smbd shutdown
     after failed IPC FSCTL_PIPE_TRANSCEIVE.
   * BUG 15426: clidfs.c do_connect() missing a "return" after a cli_shutdown()
     call.

o  Ralph Boehme <slow@samba.org>
   * BUG 15463: macOS mdfind returns only 50 results.

o  Volker Lendecke <vl@samba.org>
   * BUG 15481: GETREALFILENAME_CACHE can modify incoming new filename with
     previous cache entry value.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 15464: libnss_winbind causes memory corruption since samba-4.18,
     impacts sendmail, zabbix, potentially more.

o  Martin Schwenke <mschwenke@ddn.com>
   * BUG 15479: ctdbd: setproctitle not initialized messages flooding logs.

o  Joseph Sutton <josephsutton@catalyst.net.nz>
   * BUG 15491: CVE-2023-5568 Heap buffer overflow with freshness tokens in the
     Heimdal KDC in Samba 4.19
   * BUG 15477: The heimdal KDC doesn't detect s4u2self correctly when fast is
     in use."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-20 08:41:59 +00:00
Arne Fitzenreiter
6c829050c8 dnsdist: disabled on riscv64 again
dnsdist build on my builder fine but it fails on the buildserver
via qemu-user.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-13 08:13:16 +00:00
Arne Fitzenreiter
554e339b9e kernel: update to 6.1.57
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-13 08:13:12 +00:00
Peter Müller
41ac2cd531 Tor: Update to 0.4.8.7
Changes in version 0.4.8.7 - 2023-09-25
  This version fixes a single major bug in the Conflux subsystem on the client
  side. See below for more information. The upcoming Tor Browser 13 stable will
  pick this up.

  o Major bugfixes (conflux):
    - Fix an issue that prevented us from pre-building more conflux sets
      after existing sets had been used. Fixes bug 40862; bugfix
      on 0.4.8.1-alpha.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on September 25, 2023.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2023/09/25.

Changes in version 0.4.8.6 - 2023-09-18
  This version contains an important fix for onion service regarding congestion
  control and its reliability. Apart from that, uneeded BUG warnings have been
  suppressed especially about a compression bomb seen on relays. We strongly
  recommend, in particular onion service operators, to upgrade as soon as
  possible to this latest stable.

  o Major bugfixes (onion service):
    - Fix a reliability issue where services were expiring their
      introduction points every consensus update. This caused
      connectivity issues for clients caching the old descriptor and
      intro points. Bug reported and fixed by gitlab user
      @hyunsoo.kim676. Fixes bug 40858; bugfix on 0.4.7.5-alpha.

  o Minor features (debugging, compression):
    - Log the input and output buffer sizes when we detect a potential
      compression bomb. Diagnostic for ticket 40739.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on September 18, 2023.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2023/09/18.

  o Minor bugfix (defensive programming):
    - Disable multiple BUG warnings of a missing relay identity key when
      starting an instance of Tor compiled without relay support. Fixes
      bug 40848; bugfix on 0.4.3.1-alpha.

  o Minor bugfixes (bridge authority):
    - When reporting a pseudo-networkstatus as a bridge authority, or
      answering "ns/purpose/*" controller requests, include accurate
      published-on dates from our list of router descriptors. Fixes bug
      40855; bugfix on 0.4.8.1-alpha.

  o Minor bugfixes (compression, zstd):
    - Use less frightening language and lower the log-level of our run-
      time ABI compatibility check message in our Zstd compression
      subsystem. Fixes bug 40815; bugfix on 0.4.3.1-alpha.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-13 08:12:54 +00:00
Michael Tremer
0f7cdd7661 Merge branch 'master' into next 2023-10-11 07:50:21 +00:00
Michael Tremer
c48872ef76 curl: Fix CVE-2023-38545
https://curl.se/docs/CVE-2023-38545.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-11 07:47:47 +00:00
Adolf Belka
ebcfcd1003 udev: Update to version 3.2.14
- Update from version 3.2.12 to 3.2.14
- Update of rootfile not required
- This version update includes the patches previously used to add the dummies for tags
   and to update to udev version 251 which is bugfix #253
- Changelog
    3.2.14
	    Clear sysattr cache if a null pointer is passed by @NaofumiHonda in #255
	    Add /usr/local/lib/udev/rules.d by @bbonev in #260
	    Fix := not preventing further assignments to RUN by @bbonev in #257
	    Let libudev find hwdb.bin under UDEV_HWDB_BIN by
	     @vivien-consider-dropping-github in #264
	    Add a generic --output argument to udevadm hwdb by
	     @vivien-consider-dropping-github in #263
	    Dynamically get the udevadm hwdb files with a path variable by
	     @vivien-consider-dropping-github in #262
	    More wording fixes for the manual page for udev by
	     @vivien-consider-dropping-github in #265
	    Add missing API from 247 by @bbonev in #253
	    Ensure that standard file descriptors are open by @bbonev in #266

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:17:26 +00:00
Adolf Belka
375d921d00 sysvinit: Update to version 3.08
- Update from version 3.00 to 3.08
- Update of rootfile
- All the other patches and sed modifications are now built mintyo the source tarball,
   except for the mountpoint patch which is stilol needed
- Changelog
    3.08
	This release focuses on three changes which are basically imports of patches from Gentoo. Special thanks to floppym for supplying these.
	    Applied a patch from floppm which adds kexec option to the halt command. This can be used as "halt -k".
	    floppym provided patch which causes the halt command to call "shutdown -h -H" instead of "shutdown -h" when halt is invoked without parameters. This forces the shutdown command to set the INIT_HALT variable and assume, unless other conditions apply, that the "halt" call really wants to halt the machine and INIT_HALT should be set. In other words we assume halt wants to halt unless told otherwise.
	     Addresses downstream Gentoo bug ID 911257.
	    Updated halt documentation and help output to display parameters in alphabetical order.
    3.07
	The 3.07 release of SysV init mostly introduces fixes and improvements for the
	 killall5 and pidof programs. (These are actually the same program, but are
	 invoked with two different names, which result in different behaviour. The main
	 highlights in this release are:
		Fixed killall5 so that processes in the omit list are not sent any
		 signals, including SIGSTOP.
		Fixed usage message for killall5 to be more accurate.
		pidof was not returning PIDs of programs which were launched using a
		 symbolic link. This has been fixed so programs run from a symbolic link
		 show up in process lists.
    3.06
	    Mark Hindley fixed typo in es.po
	    Mark Hindley cleaned up translation code in src/Makefile.
	    Drop sulogin from Debian build. Removed libcrypt-dev dependency.
	    Fixed pt translation pages which were failing due to mis-matched open/close
	     tags.
	    Makefile now respects ROOT prefix when setting up pidof-to-killall5 symbolic
	     link.
	    Removed redundant translation files from man directory.
	    Makefile now respects DESTDIR. User can specify either ROOT= or DESTDIR= to
	     set install prefix.
    3.05
	This release (3.05) focuses on two things:
	    Updating the translation framework.
	    Fixing compiling issues on various systems.
	The second point, compiling, encompasses a few minor changes to get SysV init to
	 build properly on GNU Hurd, systems without certain GNU assumptions, and systems
	 running the latest glibc library (2.36 at time of writing).
    3.04
	This release contains one minor fix which allows the bootlogd code to properly
	 compile on Debian's GNU Hurd branch.
    3.03
	This release includes two minor changes. One is fixing a typo in the init manual
	 page (init.8). this fix was offered by Mark hindley.
	Mark, and a few other people, also pointed out that a fix in 3.02 for bootlogd
	 introduced reliance on a defined PATH_MAX constant. This is used elsewhere in
	 the code, but is not explicitly defined in bootlogd, which caused bootlogd to
	 not build properly on GNU Hurd and musl C systems. This has been fixed.
    3.02
	    Added q and Q flags to synopsis in shutdown manual page.
	    Applied fixes for markup and spacing in manual pages.
	     Patch provided by Mario Blattermann.
	    Added translation framework (po4a) from Mario Blttermann.
	    Added Makefile for man/ directory. Will handle translations
	     and substitutions.
	    Applied new translations for multiple languages from Mario Blattermann.
	    Added ability to use "@" symbol in command named in the inittab file. This
	     treats commands as literal and does not launch a shell to interpret them.
	    Updated inittab manual page to include overview of symbols which trigger
	     a shell interpretor and how to disable them using the @ symbol.
	    Introduced change which adds error checking in bootlogd when performing
	     chdir(). - Provided by Alexander Vickberg
	    Add check for console using TIOCGDEV on Linux systems in bootlogd to
	     make finding console more robust. - Provided by Alexander Vickberg
    3.01
	    Default to showing processes in the uninterruptable state (D).
	     The -z flag no longer affects whether processes in D state are shown.
	     The -z flag does still toggle whether zombie (Z) processes are shown.
	    Removed unnecessary check which is always true from init tab parsing.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:17:23 +00:00
Peter Müller
d04d5ff4d2 Lynis: Update to 3.0.9
Changelog according to https://cisofy.com/changelog/lynis/#309:

- DBS-1820 - Added newer style format for Mongo authorization setting
- FILE-6410 - Locations added for plocate
- SSH-7408 - Only test Compression if sshd version < 7.4
- Improved fetching timestamp
- Minor changes such as typos

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:17:20 +00:00
Peter Müller
b0894a954c Postfix: Update to 3.8.2
Refer to https://www.postfix.org/announcements/postfix-3.8.2.html for
the changelog of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:17:11 +00:00
Arne Fitzenreiter
4d4f665ab3 riscv64: enable some disabled addons
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:16:53 +00:00
Arne Fitzenreiter
64d0f1a074 grub: fix mkimage on riscv64 and fix cdrom
the riscv64 image needs more than 1.44MB

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:16:24 +00:00
Arne Fitzenreiter
16b6a6fd2c strip: exclude rust compiler
this fail on riscv64 because it is compiled with lvm and
we not need to strip not shipped buildtime deps.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:16:24 +00:00
Arne Fitzenreiter
e275a07b67 kernel: update to 6.1.56
this also builds the dtb files on riscv64

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-09 08:13:02 +00:00
Michael Tremer
aabdf04299 Merge branch 'master' into next 2023-10-04 12:58:12 +00:00
Michael Tremer
b9215da1ed glibc: Import patches from upstream
This patch imports the latest patches from the 2.38 branch:

  https://git.ipfire.org/?p=thirdparty/glibc.git;a=shortlog;h=refs/heads/release/2.38/master

This includes a fix for a buffer overflow in the tunables code
(CVE-2023-4911) as well as  CVE-2023-4806 and CVE-2023-5156.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-10-04 12:54:17 +00:00
Michael Tremer
3a7b9b7a2e Merge branch 'master' into next 2023-09-28 10:43:48 +00:00
Adolf Belka
a98abe9290 libslirp: Add the slirp library as this is required for the net user backend in qemu
- Looking through some of the changelog and some mail list communications it looks like
   qemu decided they did noty want to maintain their own bundled version of libslirp when
   the majority of OS's had their own version now in place. Ubuntu 18.04 did not have
   libslirp but qemu stopped supporting that version from qemu-7.1
- So it looks like all OS's have a standard libslirp available now and qemu have taken
   the decision to no longer have their own version but to use the system version. That
   was always possible to do if use of the system version was explicitly defined but
   the default was to use the bundled version.
- No evidence that libslirp is deprecated.
- The last version of libslirp was released a year ago but it looks like every month or
   so there are a couple of commits merged. The last was a month ago.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 10:42:22 +00:00
Adolf Belka
89604acef2 qemu-ga: Update to version 8.1.1
- Update from version 8.0.3 to 8.1.1
- Update of rootfile not required
- Changelog
    8.1
	https://wiki.qemu.org/ChangeLog/8.1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 10:42:22 +00:00
Adolf Belka
a38402929e qemu: Update to version 8.1.1 and add libslirp for net user backend
- Update from version 8.0.3 to 8.1.1
- In CU179 the update of qemu caused at least one user to have a problem starting his
   qemu system as the qemu bundled slirp library used for the net user backend was removed
   in version 7.2. Unfortunately no user tested qemu in the CU179 Testing phase, or if they
   did they are not using the net user backend.
- This patch adds the --enable-slirp option to configure and installs libslirp in a
   separate patch.
- I can't test if this now works as I don't use qemu anywhere.
- Changelog is too large to include here.
    8.1
	https://wiki.qemu.org/ChangeLog/8.1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 10:42:22 +00:00
Arne Fitzenreiter
e5ad33d9ee kernel: update 6.1.53
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:29:29 +00:00
Arne Fitzenreiter
14bd32221e kernel: update to 6.1.52
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:29:23 +00:00
Matthias Fischer
0f334f0ef3 bind: Update to 9.16.44
For details see:
https://downloads.isc.org/isc/bind9/9.16.44/doc/arm/html/notes.html#notes-for-bind-9-16-44

Changes since 9.16.40:

9.16.44:
"Previously, sending a specially crafted message
over the control channel could cause the packet-parsing
code to run out of available stack memory, causing named
to terminate unexpectedly. This has been fixed. (CVE-2023-3341)"

9.16.43:
"Processing already-queued queries received over TCP could cause
an assertion failure, when the server was reconfigured at the
same time or the cache was being flushed. This has been fixed."

9.16.42:
"The overmem cleaning process has been improved, to prevent the
cache from significantly exceeding the configured max-cache-size
limit. (CVE-2023-2828)

A query that prioritizes stale data over lookup triggers a fetch
to refresh the stale data in cache. If the fetch is aborted for
exceeding the recursion quota, it was possible for named to enter
an infinite callback loop and crash due to stack overflow. This
has been fixed. (CVE-2023-2911)

Previously, it was possible for a delegation from cache to be
returned to the client after the stale-answer-client-timeout
duration. This has been fixed."

9.16.41:
"When removing delegations from an opt-out range, empty-non-terminal
NSEC3 records generated by those delegations were not cleaned up.
This has been fixed."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-28 09:18:47 +00:00
Matthias Fischer
c7e583d0f2 suricata: Update to 6.0.14
Excerpt from changelog:

"6.0.14 -- 2023-09-13

Security #6289: Crash in SMTP parser during parsing of email (6.0.x backport)
Security #6196: process exit in hyperscan error handling  (6.0.x backport)
Security #6156: dcerpc: max-tx config parameter, also for UDP (6.0.x backport)
Bug #6285: community-id: Fix IPv6 address sorting not respecting byte order (6.0.x backport)
Bug #6248: Multi-tenancy: crash under test mode when tenant signature load fails (6.0.x backport)
Bug #6245: tcp: RST with data used in reassembly (6.0.x backport)
Bug #6236: if protocol dcerpc first packet type is Alter_context, it will not parse dcerpc (6.0.x backport)
Bug #6228: ips/af-packet: crash when copy-iface is the same as the interface (6.0.x backport)
Bug #6227: windows: lua script path truncated (6.0.x backport)
Bug #6226: Decode-events of IPv6 GRE are not triggered (6.0.x backport)
Bug #6224: base64: complete support for RFC2045 (6.0.x backport)
Bug #6220: Backport tenant_id conversion to uint32_t
Bug #6213: file.magic: rule reload can lead to crashes (6.0.x backport)
Bug #6193: smtp: Attachment not being md5 matched (6.0.x backport)
Bug #6192: smtp: use every byte to compute email.body_md5 (6.0.x backport)
Bug #6182: log-pcap: fix segfault on lz4 compressed pcaps (6.0.x backport)
Bug #6181: eve/alert: deprecated fields can have unexpected side affects (6.0.x backport)
Bug #6174: FTP bounce detection doesn't work for big-endian platforms (6.0.x backport)
Bug #6166: http2: fileinfo events log http2 object instead of http object as alerts and http2 do (6.0.x backport)
Bug #6139: smb: wrong offset when parse SMB_COM_WRITE_ANDX record (6.0.x backport)
Bug #6082: pcap: device reopen broken (6.0.x backport)
Bug #6068: pcap: memory leaks (6.0.x backport)
Bug #6045: detect: multi-tenancy leaks memory if more than 1 tenant registered (6.0.x backport)
Bug #6035: stream.midstream: if enabled breaks exception policy (6.0.x backport)
Bug #5915: rfb: parser returns error on unimplemented record types (6.0.x backport)
Bug #5794: eve: if alert and drop rules match for a packet, "alert.action" is ambigious (6.0.x backport)
Bug #5439: Invalid certificate when Issuer is not present.
Optimization #6229: Performance impact of Cisco Fabricpath (6.0.x backport)
Optimization #6203: detect: modernize filename fileext filemagic (6.0.x backport)
Optimization #6153: suricatasc: Gracefully handle unsupported commands (6.0.x backport)
Feature #6282: dns/eve: add 'HTTPS' type logging (6.0.x backport)
Feature #5935: ips: add 'master switch' to enable dropping on traffic (handling) exceptions (6.0.x backport)
Documentation #6234: userguide: add installation from Ubuntu PPA section (6.0.x backport)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-19 11:06:24 +00:00
Arne Fitzenreiter
f3d26496ac Merge remote-tracking branch 'origin/master' into next
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-09-17 12:25:01 +00:00
Arne Fitzenreiter
7c9f5f9882 extrahd: use udev rule to mount extrahd partitions
the previous patches for
https://bugzilla.ipfire.org/show_bug.cgi?id=12863
introduce a new bug that slow devices are not mounted
at boot. So now udev calls the extrahd script with
the uuid.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-09-17 12:10:42 +00:00
Peter Müller
55f19d7eb1 Tor: Update to 0.4.8.5
Changes in version 0.4.8.5 - 2023-08-30
  Quick second release after the first stable few days ago fixing minor
  annoying bugfixes creating log BUG stacktrace. We also fix BSD compilation
  failures and PoW unit test.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on August 30, 2023.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2023/08/30.

  o Minor bugfix (NetBSD, compilation):
    - Fix compilation issue on NetBSD by avoiding an unnecessary
      dependency on "huge" page mappings in Equi-X. Fixes bug 40843;
      bugfix on 0.4.8.1-alpha.

  o Minor bugfix (NetBSD, testing):
    - Fix test failures in "crypto/hashx" and "slow/crypto/equix" on
      x86_64 and aarch64 NetBSD hosts, by adding support for
      PROT_MPROTECT() flags. Fixes bug 40844; bugfix on 0.4.8.1-alpha.

  o Minor bugfixes (conflux):
    - Demote a relay-side warn about too many legs to ProtocolWarn, as
      there are conditions that it can briefly happen during set
      construction. Also add additional set logging details for all
      error cases. Fixes bug 40841; bugfix on 0.4.8.1-alpha.
    - Prevent non-fatal assert stacktrace caused by using conflux sets
      during their teardown process. Fixes bug 40842; bugfix
      on 0.4.8.1-alpha.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-15 06:56:21 +00:00
Adolf Belka
7de4ba0c8f sdl2: Update to version 2.28.3
- Update from version 2.28.1 to 2.28.3
- Update of rootfile
- Changelog
    2.28.3
       This is a stable bugfix release, with the following changes:
	    Added a gamepad mapping for the G-Shark GS-GP702
	    Fixed touchpad events for the Razer Wolverine V2 Pro in PS5 mode
	    Fixed getting key events from TV remotes on Android
	    Updated to Android minSdkVersion 19 and targetSdkVersion 34 to meet Google
	     Play Store requirements
    2.28.2
       This is a stable bugfix release, with the following changes:
	    Fixed occasionally failing to open the clipboard on Windows
	    Fixed crash at shutdown when using the D3D11 renderer
	    Fixed setting the viewport when using the D3D12 renderer
	    Fixed crash using SDL event functions before initializing SDL on Windows
	    Fixed Xbox controller trigger motion events on Windows
	    Fixed Xbox controller rumble in the background on Windows
	    Added the hint SDL_HINT_JOYSTICK_WGI to control whether to use
	     Windows.Gaming.Input for controllers
	    Fixed 8BitDo gamepad mapping when in XInput mode on Linux
	    Fixed controller lockup initializing some unofficial PS4 replica controllers
	    Fixed video initialization on headless Linux systems using VNC
	    Fixed large mouse jump when changing relative mouse mode on macOS
	    Fixed hardware keyboard text input on iPadOS

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:21:20 +00:00
Adolf Belka
d78109c511 samba: Update to version 4.19.0
- Update from version 2.18.5 to 2.19.0
- Update of rootfile for x86_64
- Changelog is too large to include here
    4.19.0
	See the WHATSNEW.txt file in the soiurce tarball
    4.18.6
	   * BUG 15420: reply_sesssetup_and_X() can dereference uninitialized tmp
			pointer.
	   * BUG 15430: Missing return in reply_exit_done().
	   * BUG 15289: post-exec password redaction for samba-tool is more reliable for
			fully random passwords as it no longer uses regular expressions
			containing the password value itself.
	   * BUG 9959:	Windows client join fails if a second container CN=System exists
			somewhere.
	   * BUG 15342: Spotlight sometimes returns no results on latest macOS.
	   * BUG 15417: Renaming results in NT_STATUS_SHARING_VIOLATION if previously
			attempted to remove the destination.
	   * BUG 15427: Spotlight results return wrong date in result list.
	   * BUG 15414: "net offlinejoin provision" does not work as non-root user.
	   * BUG 15400: rpcserver no longer accepts double backslash in dfs pathname.
	   * BUG 15433: cm_prepare_connection() calls close(fd) for the second time.
	   * BUG 15346: 2-3min delays at reconnect with smb2_validate_sequence_number:
			bad message_id 2.
	   * BUG 15441: samba-tool ntacl get segfault if aio_pthread appended.
	   * BUG 15446: DCERPC_PKT_CO_CANCEL and DCERPC_PKT_ORPHANED can't be parsed.
	   * BUG 15390: Python tarfile extraction needs change to avoid a warning
			(CVE-2007-4559 mitigation).
	   * BUG 15435: Regression DFS not working with widelinks = true.
	   * BUG 9959:	Windows client join fails if a second container CN=System exists
			somewhere.
	   * BUG 15441: samba-tool ntacl get segfault if aio_pthread appended.
	   * BUG 15449: mdssvc: Do an early talloc_free() in _mdssvc_open().

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:20:01 +00:00
Adolf Belka
ef320681e9 procps: Update to version v4.0.4
- Update from version v4.0.3 to v4.0.4
- Update of rootfile
- Removal of patch to fix build failures with gettext-0.22 as this has been incorporated
   into the source tarball.
- Changelog
    procps-ng-4.0.4
	  * library (API & ABI unchanged)
	    increment revision: 0:2:0
	    tolerates all potential 'cpuinfo' formats              issue #272
	    restore the proper main thread tics valuations         issue #280
	    Remove myself from proc count                          merge #193
	    Refactor the escape code                               Debian #1035649
	  * free: -L one line output                               issue #156
	  * pgrep: Use only --signal option for signal             Debian #1031765
	  * pgrep: suppress >15 warning if using regex             Debian #1037450
	  * pidof: Add -t option to show threads                   merge #190
	  * pmap: Reset totals between processes                   issue #298
	  * ps: fixed missing or corrupted fields with -m option   Debian #1036631, issue #279
	  * ps: Fix buffer overflow in -C option CVE-2023-4016     Debian #1042887, issue #297
	  * ps: Add --signames to show signal names in masks       merge #98
	  * sysctl: -N show names                                  merge #198, RH #2222056
	  * tests: dont compare floats with ==                     issue #271
	  * tests: skips tests if maps missing                     merge #197, Gentoo #583036
	  * top: bad command line arguments yield EXIT_FAILURE     issue #273
	  * top: avoids keystroke induced '%Cpu' distortions
	  * top: includes VM (guest) tics in 'system' overhead     issue #274
	  * top: includes VM (guest) tics with '!' toggle          merge #179
	  * top: lessen summary cpu distortions on first display   merge #180
	  * top: better backspace handling wtth line edits         issue #278
	  * vmstat: Print guest time in non-wide mode
	  * w: Fix musl UT_HOSTSIZE issue
	  * watch: Add color support at compile time               issue #296

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:18:08 +00:00
Adolf Belka
7be1763250 ncdu: Update to version 1.18.1
- Update from 1.17 to 1.18.1
- Update of rootfile not required
- Changelog
    1.18.1 - 2023-02-12
	- Fix build on non-Linux platforms
    1.18 - 2022-12-06
	- Fix 'dark-bg' color scheme to actually have a dark background
	- Backport configuration file support from 2.x
	- Backport many new CLI options from 2.x
	- Negation of existing flags: --no-si, --no-confirm-quit, --no-follow-symlinks, --include-caches, --include-kernfs
	- --[no-]extended in addition to -e
	- --one-file-system and --cross-file-system in addition to -x
	- --slow-ui-updates, --fast-ui-updates in addition to -q
	- Column visibility options: --(show|hide)-(hidden|itemcount|mtime|graph|percent)
	- Sorting: --sort, --[no-]group-directories-first
	- Feature selection: --(enable|disable)-(shell|delete|refresh)
	- Deletion confirmation: --[no-]confirm-delete
	- Hidden file visibility: --show-hidden, --hide-hidden
	- Size display: --apparent-size, --disk-usage

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:17:48 +00:00
Adolf Belka
ccdc9fdd19 libtiff: Update to version 4.5.1
- Update from 4.5.0 to 4.5.1
- Update of rootfile
- Changelog is much too long to include here. See the ChangeLog file in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:15:41 +00:00
Adolf Belka
8c757fc107 libnl-3: Update to version 3.8.0
- Update from 3.5.0 to 3.8.0
- Update of rootfile
- Changelog is no longer provided. Changes are available by reviewing the github commits
    https://github.com/thom311/libnl/commits/main

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:14:53 +00:00
Adolf Belka
4c08ab84ea libedit: Update to version 20230828-3.1
- Update from version 20221030-3.1 to 20230828-3.1
- Update of rootfile
- Changelog
	2023-08-28 Jess Thrysoee
	   * src/chartype.c: Add missing stdint.h
	   Reported by Rui Chen
	2023-08-27 Jess Thrysoee
	   * all: sync with upstream source
	See also NetBSD changelog:
		http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libedit

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:14:32 +00:00
Adolf Belka
e7334c599a gzip: Update to version 1.13
- Update from version 1.12 to 1.13
- Update of rootfile not required
- Changelog
    Noteworthy changes in release 1.13 (2023-08-19) [stable]
	Changes in behavior
	  zless now diagnoses gzip failures, if using less 623 or later.
	  When SIGPIPE is ignored, gzip now exits with status 2 (warning)
	   instead of status 1 (error) when writing to a broken pipe.  This is
	   more useful with programs like 'less' that treat gzip exit status 2
	   as a non-failure.
	Bug fixes
	  'gzip -d' no longer fails to report invalid compressed data
	   that uses a dictionary distance outside the input window.
	   [bug present since the beginning]
	  Port to C23, which does not allow K&R-style function definitions
	   with parameters, and which does not define __alignas_is_defined.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:13:34 +00:00
Adolf Belka
df4996c9d9 freetype: Update to version 2.13.2
- Update from 2.13.1 to 2.13.2
- Update of rootfile
- Changelog is too large to include here. See the ChangeLog file in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:12:53 +00:00
Adolf Belka
f97508f4e1 boost: Update to version 1_83_0
- Update from 1_81_0 to 1_83_0
- Update of rootfile for x86_64
- Changelog is a bit long to include here so providing links to the pages with changes
    1_82_0
	https://www.boost.org/users/history/version_1_82_0.html
    1_83_0
	https://www.boost.org/users/history/version_1_83_0.html

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:10:14 +00:00
Adolf Belka
32ca0c71a9 libgudev: Update to version 238
- Update from version 237 to 238
- Update of rootfile not required.
- With patches applied to eudev tarball, libgudev built without any problems. Testing
   will need to focus on use of QMI to ensure that it executes with no problems with this
   fix.
- Changelog
    238:
        * Fix newline stripping
        * Add g_udev_device_get_current_tags()
        * Add a number of tests, and devel docs
        * Fix devhelp not being able to find the docs
        * Skip locale test with locale isn't available

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:06:26 +00:00
Adolf Belka
99446eac45 udev: Apply patches to update to version 251 and add dummies for current tags
- eudev-3.2.12 has udev version 243 and this causes the build of libgudev to fail as
   it requires a newer version of udev.
- Just changing the version in eudev from 243 to 251 is insufficient as libgudev also
   expects to see current tags which have been introduced in a more recent version of
   systemd udev.
- Two patches applied from the eudev github issue #249 covering this problem.
- With the two patches applied libgudev built without any problems.
- Update to rootfile not required.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-12 16:06:26 +00:00
Adolf Belka
849ed299c1 bacula: Update to version 11.0.6
- Update from version 9.6.7 to 11.0.6
- Update of rootfile
- Ran find-dependencies for the sobump. All libraries are only linked into bacula
- All of the versions from 9.6.7 to 11.0.6 and up to 13.0.3 have no bug fixes relatred to
   the bacula-fd daemon. With bacula-fd running on a separate machine to the bacula-dir and
   bacula-sd daemons, older versions of bacula-fd will work with no bug issues with a newer
   bacula-dir and bacula-sd.
- If we put a very new version of bacula-fd on IPFire then it will not work with older
   versions of bacula-dir and bacula-sd.
- A new feature in the bacula 11 series is that communication between daemons will
   automatically use TLS if OpenSSL is installed on the machines running bacula.
  Therefore having a bacula 11 based bacula-fd on IPFire will automatically, with no user
   configuration required, use TLS for communication to the IPFire bacula-fd from the other
   bacula daemons on other machines.
- This has been shown to automatically work between the bacula-fd daemons on my laptop and
   desktop machines and the bacula-dir/bacula-sd on my server machine.
  Currently communication between mu bacula-dir/bacuila-sd daemons and the IPFire bacula-fd
   daemon communication is still unencrypted.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-06 09:33:23 +00:00
Arne Fitzenreiter
b0fcbe414f qemu: bump PAK_VER
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-06 07:19:46 +02:00
Arne Fitzenreiter
3a95423680 qemu: depends on elfutils
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-09-06 07:19:17 +02:00
Jonatan Schlag
b007476d2e Remove Start/Stop links for client175
This was dropped a while ago

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-05 15:15:53 +00:00
Adolf Belka
b2c4ea1cc2 hwdata: Update pci.ids to version 2023-08-12 and usb.ids to version 2023-08-24
- Update pci.ids from version 2023-01-18 to 2023-08-12
- Update usb.ids from version 2023-01-16 to 2023-08-24
- Update of rootfile not required
- No changelog available.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-05 15:15:53 +00:00
Arne Fitzenreiter
eecc693bd1 qemu: bump PAK_VER
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-05 15:15:53 +00:00
Adolf Belka
9a4946cfa9 apcupsd: Make apcupsd link in services page access its apcupsd WUI menu.
- In the services WUI page any addon that has a WUI menu page defined, such as Samba,
   Guardian etc, has the addon name shown in underlined red which is a link to the addon
   cgi page. This works for the other addons as the addon cgi name is the same as the
   addon name. I have identified that this is not the case for apcupsd, because the cgi
   page is called upsstats.cgi
- This patch adjusts the cgi name to allow apcupsd to also be shown in underlined red.
- The lfs file copies the upsstats.cgi file to one named apcupsd.cgi
- The apcupsd menu file has the cgi name changed from upsstats.cgi to apcupsd.cgi
- The rootfile is updated to also include the apcupsd.cgi file with the others.
- Tested in my vm testbed by making the above changes in the code and the apcupsd addon
   was then shown in underlined red, which acted as a link to the apcupsd status WUI page.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-05 15:15:53 +00:00
Matthias Fischer
6cef538a02 squid: Update to 6.3
For details see:
https://github.com/squid-cache/squid/commits/v6

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-09-05 15:15:53 +00:00
Arne Fitzenreiter
cbb044291c qemu: depends on elfutils
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-09-04 20:44:13 +02:00