Commit Graph

11531 Commits

Author SHA1 Message Date
Peter Müller
ec40d45d60 Core Update 183: Ship dhcp.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-03 21:03:17 +00:00
Arne Fitzenreiter
3920ba127f kernel: update to 6.6.9
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-02 09:54:10 +01:00
Peter Müller
dfae8b97b6 Core Update 183: Ship GnuTLS
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:39:53 +00:00
Adolf Belka
8cc92f5025 gnutls: Update to version 3.8.2
- Update from version 3.8.0 to 3.8.2
- Update of rootfile
- Changelog
    3.8.2 (released 2023-11-14)
	** libgnutls: Fix timing side-channel inside RSA-PSK key exchange.
	   [GNUTLS-SA-2023-10-23, CVSS: medium] [CVE-2023-5981]
	** libgnutls: Add API functions to perform ECDH and DH key agreement
	   The functionality has been there for a long time though they were
	   not available as part of the public API.  This enables applications
	   to implement custom protocols leveraging non-interactive key
	   agreement with ECDH and DH.
	** libgnutls: Added support for AES-GCM-SIV ciphers (RFC 8452)
	   The new algorithms GNUTLS_CIPHER_AES_128_SIV_GCM and
	   GNUTLS_CIPHER_AES_256_SIV_GCM have been added to be used through
	   the AEAD interface.  Note that, unlike
	   GNUTLS_CIPHER_AES_{128,256}_SIV_GCM, the authentication tag is
	   appended to the ciphertext, not prepended.
	** libgnutls: transparent KTLS support is extended to FreeBSD kernel
	   The kernel TLS feature can now be enabled on FreeBSD as well as
	   Linux when compiled with the --enable-ktls configure option.
	** gnutls-cli: New option --starttls-name
	   Depending on deployment, application protocols such as XMPP may
	   require a different origin address than the external address to be
	   presented prior to STARTTLS negotiation.  The --starttls-name can
	   be used to specify specify the addresses separately.
	** API and ABI modifications:
		gnutls_pubkey_import_dh_raw: New function
		gnutls_privkey_import_dh_raw: New function
		gnutls_pubkey_export_dh_raw: New function
		gnutls_privkey_export_dh_raw: New function
		gnutls_x509_privkey_import_dh_raw: New function
		gnutls_privkey_derive_secret: New function
		GNUTLS_KEYGEN_DH: New enum member of gnutls_keygen_types_t
		GNUTLS_CIPHER_AES_128_SIV_GCM: Added
		GNUTLS_CIPHER_AES_256_SIV_GCM: Added
    3.8.1 (released 2023-08-03)
	** libgnutls: ClientHello extensions are randomized by default
	   To make fingerprinting harder, TLS extensions in ClientHello
	   messages are shuffled. As this behavior may cause compatibility
	   issue with legacy applications that do not accept the last
	   extension without payload, the behavior can be reverted with the
	   %NO_SHUFFLE_EXTENSIONS priority keyword.
	** libgnutls: Add support for RFC 9258 external PSK importer.
	   This enables to deploy the same PSK across multiple TLS versions
	   (TLS 1.2 and TLS 1.3) in a secure manner. To use, the application
	   needs to set up a callback that formats the PSK identity using
	   gnutls_psk_format_imported_identity().
	** libgnutls: %GNUTLS_NO_EXTENSIONS has been renamed to
	   %GNUTLS_NO_DEFAULT_EXTENSIONS.
	** libgnutls: Add additional PBKDF limit checks in FIPS mode as
	   defined in SP 800-132. Minimum salt length is 128 bits and
	   minimum iterations bound is 1000 for PBKDF in FIPS mode.
	** libgnutls: Add a mechanism to control whether to enforce extended
	   master secret (RFC 7627). FIPS 140-3 mandates the use of TLS
	   session hash (extended master secret, EMS) in TLS 1.2. To enforce
	   this, a new priority keyword %FORCE_SESSION_HASH is added and if
	   it is set and EMS is not set, the peer aborts the connection. This
	   behavior is the default in FIPS mode, though it can be overridden
	   through the configuration file with the "tls-session-hash" option.
	   In either case non-EMS PRF is reported as a non-approved operation
	   through the FIPS service indicator.
	** New option --attime to specify current time.
	   To make testing with different timestamp to the system easier, the
	   tools doing certificate verification now provide a new option
	   --attime, which takes an arbitrary time.
	** API and ABI modifications:
		gnutls_psk_client_credentials_function3: New typedef
		gnutls_psk_server_credentials_function3: New typedef
		gnutls_psk_set_server_credentials_function3: New function
		gnutls_psk_set_client_credentials_function3: New function
		gnutls_psk_format_imported_identity: New function
		GNUTLS_PSK_KEY_EXT: New enum member of gnutls_psk_key_flags

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:39:38 +00:00
Peter Müller
e807011eba Core Update 183: Ship iptables
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:37:14 +00:00
Peter Müller
342e5b6629 Core Update 183: Ship lcms2
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:33:53 +00:00
Adolf Belka
d5f617d057 lcms2: Update to version 2.16
- Update from version 2.14 to 2.16
- Update of rootfile
- Changelog
    2.16 Featured release
	New import .CUBE files as RGB devicelinks
	New Read/Write MHC2 tags for Windows GPU access
	New Support for UTF8 on multilocalized unicode functions
	New Suppot for OkLab color space, built-in and formatter.
	Improved floating point transforms float -> integer are now honored as float
	Improved MSYS2, mingw is now supported
	Improved proferred CMM, platform and creator now survives profile edition.
	Fixed tificc now can deal with Lab TIFF
	Fixed code can now be compiled by a C++17 compiler, "register" keywork use detected at compile time.
	Fixed Reverted postcript creation that corrupted some interpreters.
    2.15 Maintenance release
	New MESON build system, many thanks to amispark and Lovell Fuller for bringing this.
	Fixed a bug that caused memory corruption on colord
	cmsReadRawTag can read portions  of tags again. Removing this caused colord to segfault when dumping profiles
	Added more checks based of fuzzer discoveries.
	MSYS2 can now compile lcms2
	Checked on Apple Silicon M1 and M2
	Fixed a bug of fastfloat plug-in that affected Krita CMYK color selector

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 07:33:44 +00:00
Peter Müller
4488435573 Core Update 183: Ship libnl-3
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:31:11 +00:00
Peter Müller
2a90a6782d Core Update 183: Ship lmdb
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:30:38 +00:00
Peter Müller
6506b9f807 Core Update 183: Ship lsof
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:30:05 +00:00
Peter Müller
09e6a4fa16 Core Update 183: Ship p11-kit
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:26:18 +00:00
Adolf Belka
fefd0cb849 p11-kit: Update to version 0.25.3
- Update from version 0.25.2 to 0.25.3
- Update of rootfile
- Changelog
    0.25.3
	rpc: fix serialization of NULL mechanism pointer [PR#601]
	fix meson build failure in macOS (appleframeworks not found) [PR#603]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 07:25:59 +00:00
Peter Müller
acdb9df089 Core Update 183: Ship sudo
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:24:18 +00:00
Peter Müller
d1f75149cf Core Update 183: Ship firewalllog.dat
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:04:50 +00:00
Peter Müller
6ac85c116e Core Update 183: Ship bind
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:03:39 +00:00
Matthias Fischer
2ecefae295 bind: Update to 9.16.45
For details see:
https://downloads.isc.org/isc/bind9/9.16.45/doc/arm/html/notes.html#notes-for-bind-9-16-45

"Feature Changes

    The IP addresses for B.ROOT-SERVERS.NET have been updated to
    170.247.170.2 and 2801:1b8:10::b. [GL #4101]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2023-12-30 06:57:50 +00:00
Peter Müller
1bbf603475 Core Update 183: Ship and restart OpenSSH
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 06:57:03 +00:00
Peter Müller
6c4ecf6b0f Core Update 183: Ship OpenSSL
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 06:53:53 +00:00
Adolf Belka
c0dd2fd124 openssl: Update to version 3.2.0
- Update from version 3.1.4 to 3.2.0
- Update of rootfile
- Changelog
    3.2.0
	This release incorporates the following potentially significant or incompatible
	changes:
	  * The default SSL/TLS security level has been changed from 1 to 2.
	  * The `x509`, `ca`, and `req` apps now always produce X.509v3 certificates.
	  * Subject or issuer names in X.509 objects are now displayed as UTF-8 strings
	    by default.
	  From my understanding these above changes should not create any problem for
	   IPFire.
	This release adds the following new features:
	  * Support for client side QUIC, including support for
	    multiple streams (RFC 9000)
	  * Support for Ed25519ctx, Ed25519ph and Ed448ph in addition
	    to existing support for Ed25519 and Ed448 (RFC 8032)
	  * Support for deterministic ECDSA signatures (RFC 6979)
	  * Support for AES-GCM-SIV, a nonce-misuse-resistant AEAD (RFC 8452)
	  * Support for the Argon2 KDF, along with supporting thread pool
	    functionality (RFC 9106)
	  * Support for Hybrid Public Key Encryption (HPKE) (RFC 9180)
	  * Support for SM4-XTS
	  * Support for Brainpool curves in TLS 1.3
	  * Support for TLS Raw Public Keys (RFC 7250)
	  * Support for TCP Fast Open on Linux, macOS and FreeBSD,
	    where enabled and supported (RFC 7413)
	  * Support for TLS certificate compression, including library
	    support for zlib, Brotli and zstd (RFC 8879)
	  * Support for provider-based pluggable signature algorithms
	    in TLS 1.3 with supporting CMS and X.509 functionality
	    With a suitable provider this enables the use of post-quantum/quantum-safe
	    cryptography.
	  * Support for using the Windows system certificate store as a source of
	    trusted root certificates
	    This is not yet enabled by default and must be activated using an
	    environment variable. This is likely to become enabled by default
	    in a future feature release.
	  * Support for using the IANA standard names in TLS ciphersuite configuration
	  * Multiple new features and improvements to CMP protocol support
	The following known issues are present in this release and will be rectified
	in a future release:
	  * Provider-based signature algorithms cannot be configured using the
	    SignatureAlgorithms configuration file parameter (#22761)
	This release incorporates the following documentation enhancements:
	  * Added multiple tutorials on the OpenSSL library and in particular
	    on writing various clients (using TLS and QUIC protocols) with libssl

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 06:53:26 +00:00
Peter Müller
b0478069c4 Core Update 183: Ship qpdf
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 06:50:22 +00:00
Adolf Belka
93137ccb86 qpdf: Update to version 11.7.0
- Update from version 11.6.1 to 11.7.0
- Update of rootfile
- Changelog
    11.7.0
	* Define CPACK_NSIS_MODIFY_PATH for the Windows builds so the
	official installers will offer to modify PATH when installing
	qpdf. Fixes #1054.
	* Add QPDFAcroFormDocumentHelper::disableDigitalSignatures, which
	disables any digital signature fields, leaving their visual
	representations intact. The --remove-restrictions command-line
	argument now calls this. Fixes #1015.
	* Generate a more complete qpdf "man page" from the same source as
	qpdf --help. Fixes #1064.
	* Allow the syntax "--encrypt --user-password=user-password
	--owner-password=owner-password --bits={40,128,256}" when
	encrypting PDF files. This is an alternative to the syntax
	"--encrypt user-password owner-password {40,128,256}", which will
	continue to be supported. The new syntax works better with shell
	completion and allows creation of passwords that start with "-".
	Fixes #874.
	* When setting a check box value, allow any value other than /Off
	to mean checked. This is permitted by the spec. Previously, any
	value other than /Yes or /Off was rejected. Fixes #1056.
	* Fix to QPDF JSON: a floating point number that appears in
	scientific notation will be converted to fixed-point notation,
	rounded to six digits after the decimal point. Fixes #1079.
	* Fix to QPDF JSON: the syntax "n:/pdf-syntax" is now accepted as
	an alternative way to represent names. This can be used for any
	name (e.g. "n:/text#2fplain"), but it is necessary when the name
	contains binary characters. For example, /one#a0two must be
	represented as "n:/one#a0two" since the single byte a0 is not
	valid in JSON. Fixes #1072.
	* From M. Holger: Refactor QPDFParser for performance. See #1059
	for a discussion.
	* Update code and tests so that qpdf's test suite no longer
	depends on the output of any specific zlib implementation. This
	makes it possible to get a fully passing test suite with any
	API-compatible zlib library. CI tests with the default zlib as
	well as zlib-ng (including verifying that zlib-ng is not the
	default), but any zlib implementation should work. Fixes #774.
	* Bug fix: with --compress-streams=n, don't compress object, XRef,
	or linearization hint streams.
	* Add new C++ functions "qpdf_c_get_qpdf" and "qpdf_c_wrap" to
	qpdf-c.h that make it possible to write your own extern "C"
	functions in C++ that interoperate with the C API. See
	examples/extend-c-api for more information.
	* Bug fix from M. Holger: the default for /Columns in PNG filter
	is 1, but libqpdf was acting like it was 0.
	* Enhancement from M. Holger: add methods to Buffer to work more
	easily with std::string.
    11.6.4
	* Install fix: include cmake files with the dev component.
	* Build AppImage with an older Linux distribution to support AWS
	Lambda. Fixes #1086.
    11.6.3
        * Tweak linearization code to better handle files between 2 GB and
        4 GB in size. Fixes #1023.
        * Fix data loss bug: qpdf could discard a the character after an
        escaped octal string consisting of less than three digits. For
        content, this would only happen with QDF or when normalizing
        content. Outside of content, it could have happened in any binary
        string, such as /ID, if the encoding software used octal escape
        strings with less than three digits. This bug was introduced
        between 10.6.3 and 11.0.0. Fixes #1050.
    11.6.2
        * Bug fix: when piping stream data, don't call finish on failure
        if the failure was caused by a previous call to finish. Fixes
        #1042.
        * Push .idea directory with the beginning of a sharable JetBrains
        CLion configuration.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-12-30 06:50:03 +00:00
Peter Müller
ca7bd37aee Core Update 183: Ship tzdata
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 06:44:07 +00:00
Arne Fitzenreiter
591ba49c03 Merge remote-tracking branch 'origin/master' into next 2023-12-22 10:41:54 +00:00
Arne Fitzenreiter
aa892602dd core182: ship index.cgi
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-22 10:20:27 +00:00
Arne Fitzenreiter
bf92e55968 kernel: update to 6.6.8
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-21 13:50:59 +01:00
Arne Fitzenreiter
92d969d8ad Merge remote-tracking branch 'origin/master' into next 2023-12-21 09:53:50 +01:00
Arne Fitzenreiter
26c98d0904 core182: remove old udev binary and rules
they are the reason for boot fails with scsi controllers in core 181.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-21 09:51:47 +01:00
Arne Fitzenreiter
7e35b9b9bb core182: add more files from stage2 that are updated
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-21 09:51:05 +01:00
Michael Tremer
1604674b51 Merge branch 'master' into next 2023-12-20 10:58:13 +00:00
Arne Fitzenreiter
276fe09afc core182: ship libgcc_s.so.1
we have not shipped the gcc lib since core119

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-20 09:48:26 +01:00
Arne Fitzenreiter
73b04029c9 dracut: fix early_microcode put into ramdisk
the kernel has no CONFIG_MICROCODE_{AMD|INTEL} anymore so this patch change the check
to CONFIG_MICROCODE.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-20 08:44:10 +01:00
Arne Fitzenreiter
0348f6b23f Merge remote-tracking branch 'origin/master' into next 2023-12-19 17:55:21 +01:00
Arne Fitzenreiter
0108697131 kernel: update to 6.6.6
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-12 21:12:37 +01:00
Arne Fitzenreiter
5109f8ee7f kernel: update to 6.6.5
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-08 16:12:17 +01:00
Arne Fitzenreiter
935e7e115e core183: update disk-space/size check
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-07 10:07:07 +01:00
Arne Fitzenreiter
365306f5e5 core183: ship kbd
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-07 08:11:08 +01:00
Arne Fitzenreiter
e3544476b9 kbd: imclude eurlatgr font
this font is now default for european languages.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-07 08:08:05 +01:00
Arne Fitzenreiter
8064dce996 alsa: update rootfile and bump version
some files are removed from linux-firmware so we need
to install alsa again.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-06 13:40:14 +00:00
Arne Fitzenreiter
1513ac8814 core182: dont delete firmware of common soundcards.
We still have alsa and mediaplayers so this is needed!

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-06 13:29:34 +00:00
Arne Fitzenreiter
71070690da core182: dont remove libs in update
this will delete the current liblzma library.

Unused libs removed by filesystem cleanup later.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-06 13:27:11 +00:00
Michael Tremer
e4176557f0 core181: Ship apache initscript
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-12-06 11:18:29 +00:00
Arne Fitzenreiter
afede937d1 backupiso: bump IPFire version
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-06 11:06:01 +01:00
Michael Tremer
43d72238cb core183: Re-add commands needed for the kernel update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-12-05 18:20:12 +00:00
Arne Fitzenreiter
a7c9eca495 kernel: update to 6.6.4
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-05 17:17:40 +00:00
Arne Fitzenreiter
941190cb3a kernel: update to 6.6.3
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2023-12-05 17:17:35 +00:00
Michael Tremer
0bf8678f06 core183: Ship kernel
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-12-05 17:16:48 +00:00
Arne Fitzenreiter
95f9d9350d kernel: update to 6.6.2
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-12-05 17:15:48 +00:00
Michael Tremer
e36e826ad9 core183: Start Core Update 183
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-12-05 17:13:44 +00:00
Michael Tremer
19471f2951 Merge remote-tracking branch 'origin/next' 2023-12-05 08:31:33 +00:00
Peter Müller
7f357884fc Core Update 182: Ship tor.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-04 22:34:24 +00:00