Commit Graph

4706 Commits

Author SHA1 Message Date
Michael Tremer
dc7d6b204d make.sh: Cleanup of polluted environment
The build environment is using a number of variables which
occasionally conflicted with some other build systems.

This patch cleans that up by renaming some variables and
later unexporting them in the lfs files.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 12:02:03 +01:00
Michael Tremer
174498ef96 cleanup-toolchain: Use TOOLCHAIN variable
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 12:01:51 +01:00
Michael Tremer
5d512a1f81 binutils: Drop modifying CFLAGS in PASS=1
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 12:01:41 +01:00
Michael Tremer
de1928cca7 glibc: Enable hard float abi when compiling for armv7hl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 12:01:34 +01:00
Michael Tremer
0c24d56d7c gcc: Build with hard floating point support on armv7hl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 12:01:27 +01:00
Michael Tremer
f65d817342 linux: Install ARM headers for armv7hl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 12:01:13 +01:00
Michael Tremer
6ef98fe9be toolchain: Drop first pass of cleanup-toolchain script
This is no longer necessary

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 12:00:31 +01:00
Michael Tremer
991d11d738 Cleanup makefiles by using the new TOOLCHAIN variable
No functional changes

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 12:00:19 +01:00
Michael Tremer
a74272d2bb binutils: Remove some unnecessary compiler options
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:59:56 +01:00
Michael Tremer
66dd71f298 gcc: Don't bootstrap in second pass
GCC does not need to be bootstrapped in the second pass
any more since the toolchain is not built hardened

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:59:40 +01:00
Michael Tremer
6f8f452267 gcc: Remove unnecessary compiler options
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:59:32 +01:00
Michael Tremer
e259f335ae toolchain: Build without hardening
The toolchain will be built without hardening which makes
the entire bootstrapping process way more complicated than
necessary and sometimes fail on some host distribution.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:59:00 +01:00
Michael Tremer
962ddd8d73 pkg-config: Remove accidentially commited line
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:58:53 +01:00
Michael Tremer
6b9f806e95 glibc: Update to 2.25
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:58:44 +01:00
Michael Tremer
7cefbe1c0d binutils: Update to version 2.28
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:58:36 +01:00
Michael Tremer
cfd39a32df gcc: Update to version 6.3.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:58:30 +01:00
Michael Tremer
9c59597ba4 pkg-config: Fix compilation with newer GCCs
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:58:22 +01:00
Michael Tremer
6323c4d0e2 gcc: Package doesn't support build in parallel
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:57:50 +01:00
Michael Tremer
8e48347732 gcc: Enable --with-float only on armv5tel
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:57:43 +01:00
Michael Tremer
42661bf875 cpio: Update to 2.12
FTBFS on aarch64

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:54:08 +01:00
Michael Tremer
8c31790a2f ccache: Cleanup makefile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:51:33 +01:00
Michael Tremer
fdfddd6462 kernel headers: Install correct headers for all architectures
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-18 11:50:37 +01:00
Michael Tremer
12b0a9da20 Merge remote-tracking branch 'origin/master' into next 2017-05-18 11:24:41 +01:00
Michael Tremer
59b2133892 tor: Update to 0.3.0.7
Fixes various security vulnerabilities of medium severity in
the relay component.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-16 11:33:40 +01:00
Matthias Fischer
057aaf42b6 BUG 11305: Suggested fix for '/var/log/btmp' permissions
Fixes BUG 11305, for details see:
https://bugzilla.ipfire.org/show_bug.cgi?id=11305

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-05-03 17:05:39 +01:00
Matthias Fischer
b5fe050fce unbound: Update to 1.6.2
For details see:
http://www.unbound.net/download.html

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-28 13:04:34 +01:00
Matthias Fischer
07002f2bca bind: Update to 9.11.1
For details see:
https://ftp.isc.org/isc/bind9/9.11.1/RELEASE-NOTES-bind-9.11.1.html

"Security Fixes

rndc "" could trigger an assertion failure in named. This flaw is disclosed
in (CVE-2017-3138). [RT #44924]

Some chaining (i.e., type CNAME or DNAME) responses to upstream queries could
trigger assertion failures. This flaw is disclosed in CVE-2017-3137. [RT #44734]

dns64 with break-dnssec yes; can result in an assertion failure. This flaw is
disclosed in CVE-2017-3136. [RT #44653]

If a server is configured with a response policy zone (RPZ) that rewrites an
answer with local data, and is also configured for DNS64 address mapping, a NULL
pointer can be read triggering a server crash. This flaw is disclosed in
CVE-2017-3135. [RT #44434]

A coding error in the nxdomain-redirect feature could lead to an assertion failure
if the redirection namespace was served from a local authoritative data source such
as a local zone or a DLZ instead of via recursive lookup. This flaw is disclosed in
CVE-2016-9778. [RT #43837]

named could mishandle authority sections with missing RRSIGs, triggering an
assertion failure. This flaw is disclosed in CVE-2016-9444. [RT #43632]

named mishandled some responses where covering RRSIG records were returned without
the requested data, resulting in an assertion failure. This flaw is disclosed in
CVE-2016-9147. [RT #43548]

named incorrectly tried to cache TKEY records which could trigger an assertion failure
when there was a class mismatch. This flaw is disclosed in CVE-2016-9131. [RT #43522]

It was possible to trigger assertions when processing responses containing answers of
type DNAME. This flaw is disclosed in CVE-2016-8864. [RT #43465]

Added the ability to specify the maximum number of records permitted in a zone
(max-records #;). This provides a mechanism to block overly large zone transfers, which
is a potential risk with slave zones from other parties, as described in CVE-2016-6170.
[RT #42143]

Bug Fixes

A synthesized CNAME record appearing in a response before the associated DNAME could be
cached, when it should not have been. This was a regression introduced while addressing
CVE-2016-8864. [RT #44318]

named could deadlock if multiple changes to NSEC/NSEC3 parameters for the same zone were
being processed at the same time. [RT #42770]

named could trigger an assertion when sending NOTIFY messages. [RT #44019]

Referencing a nonexistent zone in a response-policy statement could cause an assertion
failure during configuration. [RT #43787]

rndc addzone could cause a crash when attempting to add a zone with a type other than
master or slave. Such zones are now rejected. [RT #43665]

named could hang when encountering log file names with large apparent gaps in version
number (for example, when files exist called "logfile.0", "logfile.1", and
"logfile.1482954169"). This is now handled correctly. [RT #38688]

If a zone was updated while named was processing a query for nonexistent data, it could
return out-of-sync NSEC3 records causing potential DNSSEC validation failure. [RT #43247]"

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-28 13:04:26 +01:00
Matthias Fischer
abd12bd073 nano: Update to 2.8.1
For details see:
https://www.nano-editor.org/news.php

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-28 13:04:23 +01:00
Matthias Fischer
3d5c499e0c logrotate: Update to 3.12.1
For details see:
https://github.com/logrotate/logrotate/blob/master/ChangeLog.md

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-28 13:04:19 +01:00
Matthias Fischer
0e8f275e80 vnstat: Update to 1.17
For details see:
http://humdi.net/vnstat/CHANGES

Please note - this commit is based on:
http://git.ipfire.org/?p=people/mfischer/ipfire-2.x.git;a=commit;h=f92c3ef6b97d4bd5e3db9c6c783ab0059016b211

1.15 was running here since then, upgrading to 1.17 showed no problems so far.

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-24 11:13:31 +01:00
Matthias Fischer
d55d05b6cb vnstat: Update to 1.15
Changelog:
http://humdi.net/vnstat/CHANGES

I had to add some 'configure'-lines to build this - nevertheless: its
working. ;-)

'vnstat.conf' needed some additional 'sed'-lines, too.

Please review, test and confirm.

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-24 11:13:29 +01:00
Matthias Fischer
723d1d911f unbound 1.6.1: Linking against libevent2
Hi,

this was triggered by unbound-users@unbound.net - it seems that the
'configure'-option '--with-libevent-support' is not enough:

***SNIP***
...
When building unbound with --with-libevent support, the make
install phase should also call make unbound-event-install or else
unbound-event.h does not get installed and the header file for
using the unbound event functionality is not available.
...
This install is triggered by the option --enable-event-api. Just
enabling --with-libevent does not trigger the install by itself.

Best regards,
Wouter
...
***SNAP***

I built 'unbound' this way - its running without any problems so far.

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-24 10:18:42 +01:00
Matthias Fischer
1e645047b2 libevent2: Update to 2.1.8-stable
Contains lots of build- and bugfixes since 2.0.22 - for details see:
https://raw.githubusercontent.com/libevent/libevent/release-2.1.8-stable/ChangeLog

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-20 11:50:21 +01:00
Matthias Fischer
4d37698216 Revert "gdbm: update to 1.13"
This reverts commit dc539daf88.

With "gdbm-Update to 1.13", 'php 5.3.27' failed to build.

Best,
Matthias

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-19 18:38:09 +01:00
Matthias Fischer
b7d071af81 php 5.3.27: Source format improvements
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-19 09:52:03 +01:00
Matthias Fischer
2a77d2a2ce cups-filters: Fix for lfs-file (dropped avahi package)
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-18 22:11:35 +01:00
Michael Tremer
aa6ee515c5 avahi: Drop package
The daemon locks up when starting up in avahi_log_info() and
probably the other logging functions, too.

Since avahi is not really used a lot in the distribution,
has been in testing for four years and has virtually no users
I am going to drop it instead of wasting time on fixing this.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-18 22:11:09 +01:00
Marcel Lorenz
4c6b203492 git: update to 2.12.1
Signed-off-by: Marcel Lorenz <marcel.lorenz@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-18 14:01:59 +01:00
Matthias Fischer
ac69a292a8 libevent2-compat: newpackage
Keeps older packages that have been linked
against this version of libevent2 working.

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-18 11:22:15 +01:00
Jonatan Schlag
52883a8e9e Build python3-libvirt only on i586 and x86_64
Libvirt is build only on these arches and the bindings make only with
libvirt sense so we should build them only on these two arches too.

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-17 12:35:03 +01:00
Jonatan Schlag
fd15f250e8 Add package python3-libvirt
This new package provides the python3 bindings for libvirt.

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-17 12:35:00 +01:00
Marcel Lorenz
dc539daf88 gdbm: update to 1.13
Signed-off-by: Marcel Lorenz <marcel.lorenz@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-17 12:31:20 +01:00
Jonatan Schlag
ae3b38d473 Update python3 to 3.6.1
Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-16 17:57:00 +01:00
Matthias Fischer
6db4671211 ipset: Update to 6.32
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-16 17:33:37 +01:00
Matthias Fischer
e1fb40529c coreutils: Update to 8.27
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-16 17:33:35 +01:00
Jonatan Schlag
8e5116af26 Update libvirt to 3.1.0
This patch update the libvirt library to version 3.1.0
We can not update to the latest version in the moment because version
3.2.0 has a annoying bug.

Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-16 17:29:11 +01:00
Matthias Fischer
91c35e4838 bind: Update to 9.11.0-P5
For details see:
https://ftp.isc.org/isc/bind9/9.11.0-P5/RELEASE-NOTES-bind-9.11.0-P5.html

"BIND 9.11.0-P5 addresses the security issues described in CVE-2017-3136,
CVE-2017-3137, and CVE-2017-3138, and updates the built-in trusted keys for the root zone.

Security Fixes

rndc "" could trigger an assertion failure in named. This flaw is disclosed in
(CVE-2017-3138). [RT #44924]

Some chaining (i.e., type CNAME or DNAME) responses to upstream queries could
trigger assertion failures. This flaw is disclosed in CVE-2017-3137. [RT #44734]

dns64 with break-dnssec yes; can result in an assertion failure. This flaw is
disclosed in CVE-2017-3136. [RT #44653]

If a server is configured with a response policy zone (RPZ) that rewrites an
answer with local data, and is also configured for DNS64 address mapping, a NULL
pointer can be read triggering a server crash. This flaw is disclosed in CVE-2017-3135.
[RT #44434]

A coding error in the nxdomain-redirect feature could lead to an assertion failure if
the redirection namespace was served from a local authoritative data source such as a
local zone or a DLZ instead of via recursive lookup. This flaw is disclosed in
CVE-2016-9778. [RT #43837]

named could mishandle authority sections with missing RRSIGs, triggering an assertion
failure. This flaw is disclosed in CVE-2016-9444. [RT #43632]

named mishandled some responses where covering RRSIG records were returned without the
requested data, resulting in an assertion failure. This flaw is disclosed in
CVE-2016-9147. [RT #43548]

named incorrectly tried to cache TKEY records which could trigger an assertion failure
when there was a class mismatch. This flaw is disclosed in CVE-2016-9131. [RT #43522]

It was possible to trigger assertions when processing responses containing answers of
type DNAME. This flaw is disclosed in CVE-2016-8864. [RT #43465]

Bug Fixes

A synthesized CNAME record appearing in a response before the associated DNAME could be
cached, when it should not have been. This was a regression introduced while addressing
CVE-2016-8864. [RT #44318]

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-16 17:23:57 +01:00
Matthias Fischer
4d8d78169f cups-filters: Fix for lfs-file (dropped avahi package)
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-13 12:00:37 +01:00
Michael Tremer
076ad71576 avahi: Drop package
The daemon locks up when starting up in avahi_log_info() and
probably the other logging functions, too.

Since avahi is not really used a lot in the distribution,
has been in testing for four years and has virtually no users
I am going to drop it instead of wasting time on fixing this.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-12 17:49:45 +01:00
Michael Tremer
f0c71e72b0 ltrace: New package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-11 14:23:54 +01:00