Commit Graph

3747 Commits

Author SHA1 Message Date
Adolf Belka
a4c976bb2b perl-PDF-API2: Update of rootfiles due to perl version update
- Update of rootfiles due to perl update from 5.30.0 to 5.32.1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-02 15:50:03 +00:00
Adolf Belka
7be35d4c9b perl-Sort-Naturally: Update of rootfiles due to perl version update
- Update of rootfiles due to perl update from 5.30.0 to 5.32.1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-02 15:49:25 +00:00
Adolf Belka
7601e8207f perl-Switch: Update of rootfiles due to perl version update
- Update of rootfiles due to perl update from 5.30.0 to 5.32.1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-02 15:48:54 +00:00
Adolf Belka
a225186029 perl-Text-CSV_XS: Update of rootfiles due to perl version update
- Update of rootfiles due to perl update from 5.30.0 to 5.32.1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-02 15:46:08 +00:00
Adolf Belka
120196fea1 rrdtool: Update of rootfiles due to perl version update
- Update of rootfiles due to perl update from 5.30.0 to 5.32.1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-02 15:45:29 +00:00
Adolf Belka
18d277d67f perl: Update to 5.32.1
- Update from 5.30.0 to 5.32.1
- Update of rootfile carried out
- Removal of perl-5.30.0.fix.build.failure-against-gcc-10.patch as no
   longer required
- Changelog is too large to fit here.
   Full details for release 5.33.1 from 5.32.0 are in the source tarball
    in pod/perldelta.pod
   For the details of changes in previous releases, see the individual
    perlNNNdelta.pod files. For example, pod/perl588delta.pod describes the
    changes between versions 5.8.7 and 5.8.8.
- Updated iso from build of perl and all other changes has been installed
   in a vm testbed. All pages and graphs that have been looked at worked
   without any hiccups.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-02 15:38:46 +00:00
Matthias Fischer
2537d67546 Net-DNS (V2): Update to 1.29_02
For details see:
https://metacpan.org/changes/distribution/Net-DNS

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-30 10:07:41 +00:00
Michael Tremer
5e36a84b83 rust: Update rootfile for aarch64 + armv5tel
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-29 17:40:53 +00:00
Adolf Belka
1a5e319b5c gawk: Update to 5.1.0
- Update from 4.1.4 to 5.1.0
- Update of rootfile carried out
- Changelog is too long to fit in here.
   Changes for versions 5.0.0 and 5.1.0 can be found in the ChangeLog file
    in the source tarball
   Changes for versions 4.2.0 and 4.2.1 can be found in the ChangeLog.1
    file in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-29 12:55:40 +00:00
Adolf Belka
a71209a343 ed: Update to 1.17
- Update from 0.2 to 1.17
- Update of rootfile carried out
- ed-0.2-mkstemp-1.patch from LFS is no longer required in later versions
   of ed or LFS
- Changelog is a bit too long to add here.
   Full change log can be found by viewing ChangeLog file in tar sourceball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-29 12:54:50 +00:00
Adolf Belka
d315898acd bzip2: Update to 1.0.8
- Update from 1.0.6 to 1.0.8
- Update of rootfile
- Changelog
   1.0.8 (13 Jul 19)
    * Accept as many selectors as the file format allows.
      This relaxes the fix for CVE-2019-12900 from 1.0.7
      so that bzip2 allows decompression of bz2 files that
      use (too) many selectors again.
    * Fix handling of large (> 4GB) files on Windows.
    * Cleanup of bzdiff and bzgrep scripts so they don't use
      any bash extensions and handle multiple archives correctly.
    * There is now a bz2-files testsuite at
      https://sourceware.org/git/bzip2-tests.git
   1.0.7 (27 Jun 19)
    * Fix undefined behavior in the macros SET_BH, CLEAR_BH, & ISSET_BH
    * bzip2: Fix return value when combining --test,-t and -q.
    * bzip2recover: Fix buffer overflow for large argv[0]
    * bzip2recover: Fix use after free issue with outFile (CVE-2016-3189)
    * Make sure nSelectors is not out of range (CVE-2019-12900)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-29 12:53:09 +00:00
Matthias Fischer
395513f525 rust: Update to 1.51
For details see:
https://github.com/rust-lang/rust/blob/master/RELEASES.md

Please note: I can only build on Intel 32bit and 64bit, rootfiles for 'aarch64'
and 'armv5tel' are still missing.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-29 10:30:46 +00:00
Leo-Andres Hofmann
6c958adf2f Remove unused snortupdateutility.js
This script doesn't seem to be maintained or used anywhere anymore.
The last reference to it was removed in commit 1772664.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-29 10:27:23 +00:00
Adolf Belka
79ee597553 parted: Update to 3.4
- Update from 3.2 to 3.4
- Updated rootfile
- parted-3.2-device-mapper.patch and parted-3.2-sysmacros.patch are no
   longer needed as changes are now included in the tarball
- Changelog is too large to put in here.
   11 bug fixes included in logs
   Full changelog can be viewed in the tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-22 10:42:07 +00:00
Adolf Belka
3fbe85e711 swig: Update to 4.0.2
- Update from 3.0.12 to 4.0.2
- Updated rootfile
- Changelog is too large to include here
   Full chagelog can be found in the tarball in CHANGES and CHANGES.current
    Large number of bugs fixed in the two versions between 3.0.12 and 4.0.2

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-22 10:40:15 +00:00
Matthias Fischer
788134d238 bind: Update to 9.11.29
For details see:
https://downloads.isc.org/isc/bind9/9.11.29/RELEASE-NOTES-bind-9.11.29.html

"Bug Fixes

An invalid direction field (not one of N, S, E, W) in a LOC record resulted
in an INSIST failure when a zone file containing such a record was loaded. [GL #2499]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-22 10:37:16 +00:00
Adolf Belka
27b249b8d4 attr: Update to 2.5.1
- Update from 2.4.48 to 2.5.1
- Update rootfile
- Changelog
   Version 2.5.1
    Fix libtool library versioning regression	Andreas Gruenbacher
   Version 2.4.48
    Update po files and German translation	Andreas Gruenbacher
    getfattr: Add --one-file-system option	Andreas Gruenbacher
    Move struct stat into struct walk_tree_args	Andreas Gruenbacher
    Move list of open directories into struct walk_tree_args	Andreas Gruenbacher
    Move walk_tree_rec arguments into a separate struct	Andreas Gruenbacher
    xattr.conf: Indicate afs metadata xattrs should be skipped when copying	David Howells
    Fix typos in manual pages	Samanta Navarro
    Update my email address	Andreas Gruenbacher
    man: add examples to setfattr.1	Achilles Gaikwad
    install-data: Don't remove unrelated empty directories	Andreas Gruenbacher
    attr: Replace bzero with memset	Rosen Penev
    getfattr: don't count terminating NULL in well_enough_printable	Jeff Layton
    attr_list, attr_listf: Guard against unterminated buffer	Andreas Gruenbacher
    attr_multi, attr_multif: Don't set errno to -EINVAL	Andreas Gruenbacher
    Switch back to syscall()	Andreas Gruenbacher
    attr_list.3: Fix the attributes.h include path	Andreas Gruenbacher
    getfattr.1: by default only user namespace attributes are dumped	Simon Ruderich
    Enable large-file support on systems that do not enable it by default	Dmitry V. Levin
    man: standardize AUTHORS section	Mike Frysinger
    man: fix bold style in SEE ALSO section	Mike Frysinger
    test: escape left brace in a regex in test/run	Troy Dawson

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-18 11:20:32 +00:00
Adolf Belka
8b048fec5e acl: Update to 2.3.1
- Update from 2.2.53 to 2.3.1
- Updated rootfile
- Changelog
   Version 2.3.1
    Fix libtool library versioning regression	Andreas Gruenbacher
   Version 2.3.0
    Update po files and German translation	Andreas Gruenbacher
    getfacl: fix indent in --help output	Valentin Vidic
    getfacl: Add --one-file-system optionnext	Pavel Polacek
    Move struct stat into struct walk_tree_args	Andreas Gruenbacher
    Move list of open directories into struct walk_tree_args	Andreas Gruenbacher
    Move walk_tree_rec arguments into a separate struct	Andreas Gruenbacher
    acl_from_mode, acl_copy_int: Fix segfault on allocation failure	Tavian Barnes
    __acl_create_entry_obj: do not break strict aliasing rules	Kamil Dudka
    Fix typo in getfacl(1) man page	Anthony Sottile

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-18 11:19:43 +00:00
Michael Tremer
103950e0a5 More rootfile updates
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-12 14:46:18 +00:00
Michael Tremer
7ba3706b0f Drop python3-setuptools
This package comes with the Python 3 distribution

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-11 14:58:43 +00:00
Michael Tremer
a82e1eabc9 Update rootfiles
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-11 14:57:21 +00:00
Adolf Belka (ipfire)
7bfc46c582 sqlite: Update to 3.34.1
- Update sqlite from 3.34.0 to 3.34.1
- Update rootfile
- Changelog
   Fix a potential use-after-free bug when processing a a subquery with
    both a correlated WHERE clause and a "HAVING 0" clause and where the
    parent query is an aggregate.
   Fix documentation typos
   Fix minor problems in extensions.

Signed-off-by: Adolf Belka (ipfire) <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-10 13:59:29 +00:00
Adolf Belka (ipfire)
1c91415ce3 qpdf: Update to 10.3.0
- Update qpdf from 10.1.0 to 10.3.0
- Updated rootfile
- Changelog is too long to fully include here
   See ChangeLog file in source tarball
  Bug fixes in 10.3.0
	* The last several changes are in support of fixing more complex
	cases of keeping form fields working properly through page copying
	operations. Fixes #509.
  Bug fixes in 10.2.0
	* From qpdf CLI, --pages and --split-pages will properly preserve
	interactive form functionality. Fixes #340.
	* From qpdf CLI, --overlay and --underlay will copy annotations
	and form fields from overlay/underlay file. Fixes #395.
	* Add new option --password-file=file for reading the decryption
	password from a file. file may be "-" to read from standard input.
	Fixes #499.
	* By default, give an error if a user attempts to encrypt a file
	with a 256-bit key, a non-empty user password, and an empty owner
	password. Such files are insecure since they can be opened with no
	password. To allow explicit creation of files like this, pass the
	new --allow-insecure option. Thanks to github user RobK88 for a
	detailed analysis and for reporting this issue. Fixes #501.
	* Bug fix: if a form XObject lacks a resources dictionary,
	consider any names in that form XObject to be referenced from the
	containing page. This is compliant with older PDF versions. Also
	detect if any form XObjects have any unresolved names and, if so,
	don't remove unreferenced resources from them or from the page
	that contains them. Fixes #494.
	* Give warnings instead of segfaulting if a QPDF operation is
	attempted after calling closeInputSource(). Fixes #495.

Signed-off-by: Adolf Belka (ipfire) <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-10 13:58:39 +00:00
Adolf Belka (ipfire)
0a622d2013 iproute2: Update to 5.11.0
- Update iproute2 from 5.10.0 to 5.11.0
- Updated rootfile
- Changelog extracted from commits
lib/fs: Fix single return points for get_cgroup2_*	Andrea Claudi
lib/fs: avoid double call to mkdir on make_path()	Andrea Claudi
lib/bpf: Fix and simplify bpf_mnt_check_target()	Andrea Claudi
lib/namespace: fix ip -all netns return code	Andrea Claudi
ip: lwtunnel: seg6: bail out if table ids are invalid	Andrea Claudi
tc: m_gate: use SPRINT_BUF when needed	Andrea Claudi
man8/bridge.8: be explicit that "flood" is an egress setting	Vladimir Oltean
man8/bridge.8: explain self vs master for "bridge fdb add"	Vladimir Oltean
man8/bridge.8: fix which one of self/master is default for "bridge fdb"	Vladimir Oltean
man8/bridge.8: explain what a local FDB entry is	Vladimir Oltean
man8/bridge.8: document that "local" is default for "bridge fdb add"	Vladimir Oltean
man8/bridge.8: document the "permanent" flag for "bridge fdb add"	Vladimir Oltean
rdma: Fix statistics bind/unbing argument handling	Ido Kalir
uapi: pick up rpl.h fix	Stephen Hemminger
iproute: force rtm_dst_len to 32/128	Luca Boccassi
ss: Add clarification about host conditions with multiple familes to man	Thayne McCombs
Add documentation of ss filter to man page	Thayne McCombs
iplink: print warning for missing VF data	Edwin Peer
ss: do not emit warn while dumping MPTCP on old kernels	Paolo Abeni
man: tc-taprio.8: document the full offload feature	Vladimir Oltean
iplink_bareudp: cleanup help message and man page	Guillaume Nault
vrf: fix ip vrf exec with libbpf	Luca Boccassi
vrf: print BPF log buffer if bpf_program_load fails	Luca Boccassi
build: Fix link errors on some systems	Roi Dayan
tc: flower: fix json output with mpls lse	Guillaume Nault
dcb: Change --Netns/-N to --netns/-n	Petr Machata
dcb: Plug a leaking DCB socket buffer	Petr Machata
dcb: Set values with RTM_SETDCB type	Petr Machata
uapi: update if_link.h from upstream	Stephen Hemminger
include: uapi: Carry dcbnl.h	Petr Machata
uapi: update kernel headers to 5.11 pre rc1

Signed-off-by: Adolf Belka (ipfire) <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-10 13:57:00 +00:00
Michael Tremer
9ff0b07dd9 python3: Update rootfile on armv5tel
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-10 11:32:56 +00:00
Michael Tremer
198443e60c suricata: Disable build on riscv64 for lack of Rust
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-06 11:14:51 +00:00
Michael Tremer
ee7f87807b python3: I didn't realise that i586 had a separate rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-04 10:49:18 +00:00
Michael Tremer
e2cc8e4e9b python3: Update to 3.8.7
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 16:45:57 +00:00
Michael Tremer
870c02a5e8 libffi: Update to 3.3
This contains a version bump which requires us to ship Python 2 and
Python 3 again.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 13:32:28 +00:00
Matthias Fischer
a9285618b9 suricata: Update to 5.0.6
For details see:
https://forum.suricata.io/t/suricata-6-0-2-and-5-0-6-released/1170

and

https://redmine.openinfosecfoundation.org/versions/164

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-03 13:27:03 +00:00
Michael Tremer
69b3d63b82 e2fsprogs: Disable libraries provided by util-linux
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-02 17:40:34 +00:00
Michael Tremer
e1f33fdcec rust: Update rootfiles for aarch64 and armv5tel
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-25 17:56:11 +00:00
Michael Tremer
d7005ce842 rust: Remove LLVM tools
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-25 13:55:16 +00:00
Matthias Fischer
a471762fb0 rust: Update to 1.50
For details see:
https://github.com/rust-lang/rust/blob/master/RELEASES.md

Unfortunately I can only build with 32bit and 64bit, this is why I
couldn't upload the rootfiles for 'aarch64' and 'armv5tel'.

Tested here with 'suricata 5.0.5' - running without seen problems.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-24 17:27:36 +00:00
Matthias Fischer
70b43b54c9 libxcrypt 4.4.17: Fix for rootfile
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-22 11:28:11 +00:00
Matthias Fischer
e9b3b1489c libgcrypt: Update to 1.9.2
For details see:
https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000457.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-22 11:26:29 +00:00
Matthias Fischer
dd42ea2c5e nettle: Update to 3.7.1
For details see:

Annonce for 3.7.1:
http://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009434.html

Announce for 3.6:
http://lists.lysator.liu.se/pipermail/nettle-bugs/2020/008967.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-22 11:25:50 +00:00
Matthias Fischer
482634a1d3 bind: Update to 9.11.28
For details see:
https://downloads.isc.org/isc/bind9/9.11.28/RELEASE-NOTES-bind-9.11.28.html

"Notes for BIND 9.11.28
Security Fixes

When tkey-gssapi-keytab or tkey-gssapi-credential was configured,
a specially crafted GSS-TSIG query could cause a buffer overflow in the
ISC implementation of SPNEGO (a protocol enabling negotiation of the
security mechanism to use for GSSAPI authentication). This flaw could
be exploited to crash named. Theoretically, it also enabled remote code
execution, but achieving the latter is very difficult in real-world
conditions. (CVE-2020-8625)

This vulnerability was responsibly reported to us as ZDI-CAN-12302
by Trend Micro Zero Day Initiative. [GL #2354]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-19 19:32:28 +00:00
Michael Tremer
d338e55ce5 libjpeg-compat: Drop package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-17 16:25:14 +00:00
Michael Tremer
8ea237077d readline-compat: Drop package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-17 16:23:17 +00:00
Michael Tremer
c47c054877 berkeley-compat: Drop package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-17 16:21:24 +00:00
Michael Tremer
ed5ef20850 gmp-compat: Drop package
This is no longer required because everything should be linked against
the current version.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-17 16:18:30 +00:00
Michael Tremer
6dc206ab69 Drop /usr/lib/sse2
This is now unused

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-16 18:00:16 +00:00
Michael Tremer
44558ee19c openssl: Drop SSE2-optimized version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-16 17:55:29 +00:00
Michael Tremer
a810c2ae8f gmp: Drop SSE2-optimized version on i586
The next version of glibc has removed support for this and this patch
removes it.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-16 17:43:12 +00:00
Michael Tremer
1bffb208e8 openssl: Update to 1.1.1j
Null pointer deref in X509_issuer_and_serial_hash() (CVE-2021-23841)
====================================================================

Severity: Moderate

The OpenSSL public API function X509_issuer_and_serial_hash() attempts to
create a unique hash value based on the issuer and serial number data contained
within an X509 certificate. However it fails to correctly handle any errors
that may occur while parsing the issuer field (which might occur if the issuer
field is maliciously constructed). This may subsequently result in a NULL
pointer deref and a crash leading to a potential denial of service attack.

The function X509_issuer_and_serial_hash() is never directly called by OpenSSL
itself so applications are only vulnerable if they use this function directly
and they use it on certificates that may have been obtained from untrusted
sources.

OpenSSL versions 1.1.1i and below are affected by this issue. Users of these
versions should upgrade to OpenSSL 1.1.1j.

OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL
1.0.2 is out of support and no longer receiving public updates. Premium support
customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade
to 1.1.1j.

This issue was reported to OpenSSL on 15th December 2020 by Tavis Ormandy from
Google. The fix was developed by Matt Caswell.

Incorrect SSLv2 rollback protection (CVE-2021-23839)
====================================================

Severity: Low

OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a
server that is configured to support both SSLv2 and more recent SSL and TLS
versions then a check is made for a version rollback attack when unpadding an
RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are
supposed to use a special form of padding. A server that supports greater than
SSLv2 is supposed to reject connection attempts from a client where this special
form of padding is present, because this indicates that a version rollback has
occurred (i.e. both client and server support greater than SSLv2, and yet this
is the version that is being requested).

The implementation of this padding check inverted the logic so that the
connection attempt is accepted if the padding is present, and rejected if it
is absent. This means that such as server will accept a connection if a version
rollback attack has occurred. Further the server will erroneously reject a
connection if a normal SSLv2 connection attempt is made.

Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this
issue. In order to be vulnerable a 1.0.2 server must:

1) have configured SSLv2 support at compile time (this is off by default),
2) have configured SSLv2 support at runtime (this is off by default),
3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite
  list)

OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to
this issue. The underlying error is in the implementation of the
RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING
padding mode used by various other functions. Although 1.1.1 does not support
SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the
RSA_SSLV23_PADDING padding mode. Applications that directly call that function
or use that padding mode will encounter this issue. However since there is no
support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a
security issue in that version.

OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium
support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should
upgrade to 1.1.1j.

This issue was reported to OpenSSL on 21st January 2021 by D. Katz and Joel
Luellwitz from Trustwave. The fix was developed by Matt Caswell.

Integer overflow in CipherUpdate (CVE-2021-23840)
=================================================

Severity: Low

Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow
the output length argument in some cases where the input length is close to the
maximum permissable length for an integer on the platform. In such cases the
return value from the function call will be 1 (indicating success), but the
output length value will be negative. This could cause applications to behave
incorrectly or crash.

OpenSSL versions 1.1.1i and below are affected by this issue. Users of these
versions should upgrade to OpenSSL 1.1.1j.

OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL
1.0.2 is out of support and no longer receiving public updates. Premium support
customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade
to 1.1.1j.

This issue was reported to OpenSSL on 13th December 2020 by Paul Kehrer. The fix
was developed by Matt Caswell.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-16 17:32:28 +00:00
Adolf Belka
59bbf418ca sysvinit: Update to 2.98
- Update sysvinit from 2.88dsf to 2.98
- From version 2.89 mounpoint build was not enabled as standard
- Patch created to modify Makefile to define mountpoint to be built
- Update of rootfiles
- Changelog is ~400 lines long from 2.88dsf to 2.98
- For details see the Changelog in the doc directory in the tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-15 13:12:47 +00:00
Adolf Belka
e7fadafc55 attr: Update to 2.4.48
- Update attr from 2.4.47 (2013) to 2.4.48 (2018)
- Update rootfiles
- Changelog in tarball only goes up to 2.4.44 so extracted changes
from commits between 2.4.47 and release of 2.4.48
v2.4.48
attr: Fix segmentation fault	Andreas Gruenbacher
po: update	Andreas Gruenbacher
setfacl: Include errno.h	Andreas Gruenbacher
copy_action: drop unused alloca.h include	Mike Frysinger
include: add uninstall target to fix distcheck	Mike Frysinger
attr_copy_{fd,file}: sync changes between the files	Mike Frysinger
xattr.conf: do not copy security.evm	Stefan Berger
Cleanup visibility of API functions	Yury Usishchev
Cleanup config.h usage	Yury Usishchev
Use stdint types consistently	Felix Janda
walk_tree_rec: Add parentheses to clarify code	Andreas Gruenbacher
Reintroduce symbols that used to be syscall wrappers	Dmitry V. Levin
Do not export symbols that are not supposed to be exported	Dmitry V. Levin
Add explicit symbol versioning for attr_copy_action	Dmitry V. Levin
ignore configure.lineno	Mike Frysinger
walk_tree: mark internal variables as static	Dmitry V. Levin
Remove the attr.5 man page (moved to man-pages)	Andreas Gruenbacher
Remove <attr/xattr.h> and the syscall wrappers	Andreas Gruenbacher
Remove the section 2 man pages	Andreas Gruenbacher
Remove outdated tests from test/attr.test	Andreas Gruenbacher
Remove test/ext/fs.test	Andreas Gruenbacher
Add setfattr --raw option	Andreas Gruenbacher
Properly set and report empty attribute values	Andreas Gruenbacher
Man pages: Minor fixes	Andreas Gruenbacher
build: unbreak attr_copy_fd() and attr_copy_file().	Nick Alcock
attr: Don't report a NULL attribute name when -l (list) fails	Andreas Gruenbacher
attr_list / attr_listf: Fix cursor off-by-one error	Andreas Gruenbacher
Portability fix: <alloca.h> is Linux specific	Emmanuel Dreyfus
Portability fixes	Emmanuel Dreyfus
telldir return value and seekdir second parameters are of type long	Cristian Rodríguez
License fixes	Andreas Gruenbacher
test: fix cleanup & running as root	Mike Frysinger
include examples/ in dist tarball	Mike Frysinger
build: ship a pkgconfig file for libattr	Jan Engelhardt
build: make use of an aux-dir to stow away helper scripts	Jan Engelhardt
avoid glibc-specific DECLS defines	Mike Frysinger
build: drop attrincludedir, use pkgincludedir	Jan Engelhardt
disable installation of man(2) pages by default	Mike Frysinger
po: regenerate files after move	Mike Frysinger
modernize build system	Mike Frysinger
test: make running parallel/out-of-tree safe	Mike Frysinger
move gettext logic into misc.h	Mike Frysinger
punt debian/rpm packaging logic	Mike Frysinger
Suppress deprecation warnings when building attr and libattr	Andreas Gruenbacher
Add a default /etc/xattr.conf file	Andreas Gruenbacher
Mark the Irix compatibility functions as deprecated	Andreas Gruenbacher
Make attr_get and attr_getf behave as described in the man page	Andreas Gruenbacher
Use autoreconf rather than autoconf to regenerate the files.	Fabrice Bauzac
.gitignore: ignore *~ and config.h.in.	Fabrice Bauzac
Fix ATTR_OP_REMOVE operation in attr_multi()
Makefile: rename configure.in to configure.ac

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-12 11:55:58 +00:00
Adolf Belka
18baaf4666 autoconf: Update to 2.71
- Update autoconf from 2.69 to 2.71
- Updated rootfile
- Changelog
Large amount of changes, especially in 2.70 - too many to add in here.
Details of changes can be found in the NEWS file in the tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-12 11:54:42 +00:00
Matthias Fischer
5987dd2004 unbound: Update to 1.13.1
For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-13-1

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-12 11:53:56 +00:00