Commit Graph

21274 Commits

Author SHA1 Message Date
Michael Tremer
ee4c8d28e4 core183: Ship suricata
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 14:15:32 +00:00
Michael Tremer
89941c3d13 suricata: Update to 6.0.16
https://redmine.openinfosecfoundation.org/versions/201

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 14:14:46 +00:00
Michael Tremer
456aad9443 libhtp: Update to 0.5.46
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 14:14:35 +00:00
Arne Fitzenreiter
8c43d1481a kernel: update to 6.6.15
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-02 07:52:09 +00:00
Arne Fitzenreiter
7f7cbd68b8 mympd: create/check config before first start
this create missing folders for webradio and state.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-02 07:51:48 +00:00
Arne Fitzenreiter
664eac8483 mympd: new addon to control mpd via WebGUI
myMPD is written in C and has a nice WebGUI to play
local music and also a WebRadio browser.
This is to replace the removec client175.

After install it can reached via
https://IP_OF_THE_IPFIRE:8800

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-02 07:51:07 +00:00
Arne Fitzenreiter
fdad4cf48f mpfire: fix initskript uninstall
the uninstall with rm /etc/rc*.d/*mpd remove not only the mpd initlinks.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-02 07:50:34 +00:00
Michael Tremer
83338946dc core184: Ship glibc
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 17:09:16 +00:00
Michael Tremer
38c1be257f glibc: Import latest patches from upstream
These include (amongst others) fixes for:

GLIBC-SA-2024-0001:
===================
syslog: Heap buffer overflow in __vsyslog_internal (CVE-2023-6246)

__vsyslog_internal did not handle a case where printing a SYSLOG_HEADER
containing a long program name failed to update the required buffer
size, leading to the allocation and overflow of a too-small buffer on
the heap.

GLIBC-SA-2024-0002:
===================
syslog: Heap buffer overflow in __vsyslog_internal (CVE-2023-6779)

__vsyslog_internal used the return value of snprintf/vsnprintf to
calculate buffer sizes for memory allocation.  If these functions (for
any reason) failed and returned -1, the resulting buffer would be too
small to hold output.

GLIBC-SA-2024-0003:
===================
syslog: Integer overflow in __vsyslog_internal (CVE-2023-6780)

__vsyslog_internal calculated a buffer size by adding two integers, but
did not first check if the addition would overflow.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 17:07:56 +00:00
Michael Tremer
31269e52cb core183: Ship vpnmain.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-30 17:42:53 +00:00
Michael Tremer
fc4b02df53 vpnmain.cgi: Fix parsing CN from certificates generated by OpenSSL 3.2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-30 17:42:37 +00:00
Michael Tremer
7e8fc770bd openssl: Update to 3.2.1
* A file in PKCS12 format can contain certificates and keys and may come from
   an untrusted source. The PKCS12 specification allows certain fields to be
   NULL, but OpenSSL did not correctly check for this case. A fix has been
   applied to prevent a NULL pointer dereference that results in OpenSSL
   crashing. If an application processes PKCS12 files from an untrusted source
   using the OpenSSL APIs then that application will be vulnerable to this
   issue prior to this fix.

   OpenSSL APIs that were vulnerable to this are: PKCS12_parse(),
   PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
   and PKCS12_newpass().

   We have also fixed a similar issue in SMIME_write_PKCS7(). However since this
   function is related to writing data we do not consider it security
   significant.

   ([CVE-2024-0727])

   *Matt Caswell*

 * When function EVP_PKEY_public_check() is called on RSA public keys,
   a computation is done to confirm that the RSA modulus, n, is composite.
   For valid RSA keys, n is a product of two or more large primes and this
   computation completes quickly. However, if n is an overly large prime,
   then this computation would take a long time.

   An application that calls EVP_PKEY_public_check() and supplies an RSA key
   obtained from an untrusted source could be vulnerable to a Denial of Service
   attack.

   The function EVP_PKEY_public_check() is not called from other OpenSSL
   functions however it is called from the OpenSSL pkey command line
   application. For that reason that application is also vulnerable if used
   with the "-pubin" and "-check" options on untrusted data.

   To resolve this issue RSA keys larger than OPENSSL_RSA_MAX_MODULUS_BITS will
   now fail the check immediately with an RSA_R_MODULUS_TOO_LARGE error reason.

   ([CVE-2023-6237])

   *Tomáš Mráz*

 * Restore the encoding of SM2 PrivateKeyInfo and SubjectPublicKeyInfo to
   have the contained AlgorithmIdentifier.algorithm set to id-ecPublicKey
   rather than SM2.

   *Richard Levitte*

 * The POLY1305 MAC (message authentication code) implementation in OpenSSL
   for PowerPC CPUs saves the contents of vector registers in different
   order than they are restored. Thus the contents of some of these vector
   registers is corrupted when returning to the caller. The vulnerable code is
   used only on newer PowerPC processors supporting the PowerISA 2.07
   instructions.

   The consequences of this kind of internal application state corruption can
   be various - from no consequences, if the calling application does not
   depend on the contents of non-volatile XMM registers at all, to the worst
   consequences, where the attacker could get complete control of the
   application process. However unless the compiler uses the vector registers
   for storing pointers, the most likely consequence, if any, would be an
   incorrect result of some application dependent calculations or a crash
   leading to a denial of service.

   ([CVE-2023-6129])

   *Rohan McLure*

 * Fix excessive time spent in DH check / generation with large Q parameter
   value.

   Applications that use the functions DH_generate_key() to generate an
   X9.42 DH key may experience long delays. Likewise, applications that use
   DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
   to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
   Where the key or parameters that are being checked have been obtained from
   an untrusted source this may lead to a Denial of Service.

   ([CVE-2023-5678])

   *Richard Levitte*

 * Disable building QUIC server utility when OpenSSL is configured with
   `no-apps`.

   *Vitalii Koshura*

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-30 17:41:53 +00:00
Michael Tremer
b4880b752e web-user-interface: Force browsers to reload the changed CSS
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-25 10:22:18 +00:00
Arne Fitzenreiter
02aa0f99b1 web-user-interface: rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-21 21:42:13 +01:00
Arne Fitzenreiter
0722f42ed2 kernel: update to 6.6.13
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-21 19:10:22 +01:00
Michael Tremer
0742747e6d core183: Ship firewall initscript
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-19 16:38:12 +00:00
Erik Kapfer
e5a77641f3 Firewall initscript: Restore Tor IPTable rules by manual firewall restart
If the firewall will be manually restart via '/etc/init.d/firewall restart',
the IPTable rules for the Tor relay will be deleted since 'iptables_init' only
flushes and creates inbound and unbound chains for Tor but does not restore the
ruleset from Tor initscript.

For reference and tests please see -->
https://community.ipfire.org/t/tor-stop-working-without-stop-the-process-or-give-an-error-message/10697

Signed-off-by: Erik Kapfer <erik.kapfer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-19 16:37:44 +00:00
Michael Tremer
b87cd867f7 network: Only try to restart collectd if it is running
This updated version of this script avoids any errors if collectd is not
running (yet) which might happen during the boot process.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-19 16:37:24 +00:00
Michael Tremer
295af8f766 core183: Ship the updated theme
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-19 16:32:24 +00:00
Michael Tremer
c981c48b2d Merge remote-tracking branch 'ms/theme' into next 2024-01-19 16:29:46 +00:00
Arne Fitzenreiter
6094f35b5a core183: generate new rsa before apache start
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-19 06:10:26 +00:00
Arne Fitzenreiter
36c16c71ed core183: replace https rsa key if it is too small
new openssl need at least 2048 bit rsa keys for apache.
So if the existing is smaller a new 4096 bit key is generated.

fixes #13527

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-18 18:02:10 +01:00
Peter Müller
bca096b453 linux: Forbid legacy TIOCSTI usage
To quote from the kernel documentation:

> Historically the kernel has allowed TIOCSTI, which will push
> characters into a controlling TTY. This continues to be used
> as a malicious privilege escalation mechanism, and provides no
> meaningful real-world utility any more. Its use is considered
> a dangerous legacy operation, and can be disabled on most
> systems.
>
> Say Y here only if you have confirmed that your system's
> userspace depends on this functionality to continue operating
> normally.
>
> Processes which run with CAP_SYS_ADMIN, such as BRLTTY, can
> use TIOCSTI even when this is set to N.
>
> This functionality can be changed at runtime with the
> dev.tty.legacy_tiocsti sysctl. This configuration option sets
> the default value of the sysctl.

This patch therefore proposes to no longer allow legacy TIOCSTI usage
in IPFire, given its security implications and the apparent lack of
legitimate usage.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-16 15:46:37 +00:00
Peter Müller
254dcbaac8 Core Update 183: Fix permissions of /etc/sudoers.d/, again
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-16 12:36:50 +00:00
Matthias Fischer
601664309b htop: Update to 3.3.0
For details see:
https://github.com/htop-dev/htop/blob/main/ChangeLog

"What's new in version 3.3.0

* Multiple refactorings and code improvements
* Shorten docker container IDs to 12 characters
* Settings: preserve empty header
* Fix execlp() argument without pointer cast
* OpenFilesScreen: Make column sizing dynamic for file size, offset and inode
* Add support for "truss" (FreeBSD equivalent of "strace")
* Darwin: add NetworkIOMeter support
* HeaderLayout: add "3 columns - 40/30/30", "... 30/40/30" & "... 30/30/40"
* Meter: use correct unicode characters for digit '9'
* Note in manual re default memory units of KiB
* Add column for process container name
* Add logic to filter the container name (+type) from the CGroup name
* Change NetworkIOMeter value unit from KiB/s to bytes/second
* Cap DiskIOMeter "utilisation" percentage at 100%
* PCP platform implementation of frontswap and zswap accounting
* Shorten podman/libpod container IDs to 12 characters
* Write configuration to temporary file first
* Incorporate shared memory in bar text
* Move shared memory next to used memory
* Correct order of memory meter in help
* Add recalculate to Ctrl-L refresh
* Update process list on thread visibility toggling
* Support dynamic screens with 'top-most' entities beyond processes
* Introduce Row and Table classes for screens beyond top-processes
* Rework ZramMeter and remove MeterClass.comprisedValues
* More robust logic for CPU process percentages (Linux & PCP)
* Show year as start time for processes older than a year
* Short-term fix for docker container detection
* default color preset: use bold blue for better visibility
* Document 'O' keyboard shortcut
* Implement logic for '--max-iterations'
* Update F5 key label on tab switch (Tree <-> List)
* Force re-sorting of the process list view after switching between list/treeview mode
* Linux: (hack) work around the fact that Zswapped pages may be SwapCached
* Linux: implement zswap support
* {Memory,Swap}Meter: add "compressed memory" metrics
* Darwin: add DiskIOMeter support
* Fix scroll relative to followed process
* ZramMeter: update bar mode
* Use shared real memory on FreeBSD
* Increase Search and Filter max string length to 128
* Improve CPU computation code
* Remove LXC special handling for the CPU count
* Create new File Descriptor meter
* PCP: add IRQ PSI meter
* Linux: add IRQ PSI meter
* Linux: highlight username if process has elevated privileges
* Add support for scheduling policies
* Add a systemd user meter to monitor user units.
* FreeBSD: remove duplicate zfs ARC size subtraction"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2024-01-16 12:35:30 +00:00
Michael Tremer
091988ad27 core183: Ship /etc/rc.d/init.d/mountfs
This script has been modified when we touched ExtraHD in Core Update
179/180, but has been forgotten to be shipped.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-16 12:25:04 +00:00
Arne Fitzenreiter
a93525c0ca kernel: update to 6.6.12
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-16 12:41:08 +01:00
Peter Müller
d2e2c945a9 Core Update 183: Ship 60-collectd
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-14 16:05:12 +00:00
Michael Tremer
f2d7d4ec16 collectd: Restart is required after reconnect
The "ping" plugin does not re-resolve the gateway IP address after
pinging it for the first time. For most people this won't be a big
problem, but if the default gateway changes, the latency graph won't
work any more.

In order to do re-resolve "gateway", the only way is to restart
collectd.

Fixes: #13522
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-14 16:04:03 +00:00
Peter Müller
4c7266a39e Core Update 183: Ship libssh
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:59:18 +00:00
Peter Müller
31167fb3bb libssh: Update to 0.10.6
Please refer to https://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/
for this version's release announcement.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:59:09 +00:00
Peter Müller
2958c8c1e0 Core Update 183: Ship libgcrypt
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:58:51 +00:00
Peter Müller
d4c0426903 libgcrypt: Update to 1.10.3
Refer to https://dev.gnupg.org/T6817 for release information concerning
this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:58:34 +00:00
Peter Müller
6d95c33018 Core Update 183: Ship kmod
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:58:17 +00:00
Peter Müller
de2b71f385 kmod: Update to 31
According to the source tarball's NEWS file:

- Improvements

        - Allow passing a path to modprobe so the module is loaded from
          anywhere from the filesystem, but still handling the module
          dependencies recorded in the indexes. This is mostly intended for kernel
          developers to speedup testing their kernel modules without having to load the
          dependencies manually or override the module in /usr/lib/modules/.
          Now it's possible to do:

                # modprobe ./drivers/gpu/drm/i915/i915.ko

          As long as the dependencies didn't change, this should do the right thing

        - Use in-kernel decompression if available. This will check the runtime support
          in the kernel for decompressing modules and use it through finit_module().
          Previously kmod would fallback to the older init_module() when using
          compressed modules since there wasn't a way to instruct the kernel to
          uncompress it on load or check if the kernel supported it or not.
          This requires a recent kernel (>= 6.4) to have that support and
          in-kernel decompression properly working in the kernel.

        - Make modprobe fallback to syslog when stderr is not available, as was
          documented in the man page, but not implemented

        - Better explaing `modprobe -r` and how it differentiates from rmmod

        - depmod learned a `-o <dir>` option to allow using a separate output
          directory. With this, it's possible to split the output files from
          the ones used as input from the kernel build system

        - Add compat with glibc >= 2.32.9000 that dropped __xstat

        - Improve testsuite to stop skipping tests when sysconfdir is something
          other than /etc

        - Build system improvements and updates

        - Change a few return codes from -ENOENT to -ENODATA to avoid confusing output
          in depmod when the module itself lacks a particular ELF section due to e.g.
          CONFIG_MODVERSIONS=n in the kernel.

- Bug Fixes

        - Fix testsuite using uninitialized memory when testing module removal
          with --wait

        - Fix testsuite not correctly overriding the stat syscall on 32-bit
          platforms. For most architectures this was harmless, but for MIPS it
          was causing some tests to fail.

        - Fix handling unknown signature algorithm

        - Fix linking with a static liblzma, libzstd or zlib

        - Fix memory leak when removing module holders

        - Fix out-of-bounds access when using very long paths as argument to rmmod

        - Fix warnings reported by UBSan

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:57:59 +00:00
Peter Müller
738bc25c94 Core Update 183: Ship cpio
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:57:39 +00:00
Peter Müller
b8a149cc40 cpio: Update to 2.14
Noteworthy changes in this release, according to
https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00001.html :

* New option --ignore-dirnlink

Valid in copy-out mode, it instructs cpio to ignore the actual number
of links reported for each directory member and always store 2
instead.

* Changes in --reproducible option

The --reproducible option implies --ignore-dirlink.  In other words,
it is equivalent to --ignore-devno --ignore-dirnlink --renumber-inodes.

* Use GNU ls algorithm for deciding timestamp format in -tv mode

* Bugfixes

** Fix cpio header verification.

** Fix handling of device numbers on copy out.

** Fix calculation of CRC in copy-out mode.

** Rewrite the fix for CVE-2015-1197.

** Fix combination of --create --append --directory.

** Fix appending to archives bigger than 2G.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:57:25 +00:00
Peter Müller
3b2e37af22 Core Update 183: Ship and restart strongSwan
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:57:05 +00:00
Peter Müller
05d0278bf7 strongSwan: Update to 5.9.13
Please refer to https://github.com/strongswan/strongswan/releases/tag/5.9.13
for the changelog of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:55:59 +00:00
Arne Fitzenreiter
19e66d7e2b kernel: update to 6.6.11
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-11 10:30:13 +01:00
Arne Fitzenreiter
e437405158 core183: fix typo at install-bootloader
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-10 17:11:16 +01:00
Michael Tremer
9d30f138f9 index.cgi: Remove some custom CSS styling that broke the design
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-10 12:25:33 +00:00
Michael Tremer
0e415928b7 web-user-interface: Replace the old tux logo with out new word mark
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-10 12:23:15 +00:00
Michael Tremer
dbf1d1634b web-user-interface: Update interface design
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-10 12:13:04 +00:00
Arne Fitzenreiter
a2af8c7186 kernel: aarch64: enable CONFIG_SHADOW_CALL_STACK
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-10 06:26:25 +00:00
Arne Fitzenreiter
ed5e80eb62 grub: update to 2.12 (final release version)
this should fix problems on systems installed on xfs

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-10 07:22:59 +01:00
Peter Müller
c4f03017a5 Core Update 183: Ship proxy.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-08 18:35:25 +00:00
Michael Tremer
a1bb2fb585 Revert "proxy.cgi: Fix for Bug #12826 'squid >=5 crashes on literal IPv6 addresses'"
This reverts commit e0be9eab47.

This change is now producing problems on IPv6-enabled systems as it will
deny access to any website that is IPv6-enabled as well, even if the
client connected using IPv4.

I have tested if squid is now running on fine on systems where IPv6 is
disabled and can confirm that its running just fine.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-08 18:34:58 +00:00
Adolf Belka
cfb6d9c7fd postfix: Update to version 3.8.4 + prevent smtp smuggling
- Update from version 3.8.3 to 3.8.4
- Update of rootfile not required
- Permanent fix for smtp smuggling will be in version 3.9. However the fix has been
   backported into version 3.8.4 but with the default for the parameter of "no".
- This patch sets the defaults for all the main.cf parameters highlighted by Wietse
   Venema in http://www.postfix.org/smtp-smuggling.html
- Additionally the implementation of smtpd_forbid_bare_newline = yes has been added to
   the install.sh pak for postfix so that it will be included into any main.cf file being
   restored from backup. This parameter is available for the first time in 3.8.4 so will
   not be in any backup prior to this release and can therefore be safely applied to
   restored versions of main.cf.
- This fix in install.sh will be able to be removed when version 3.9 is released early
   in 2024 as the default for that parameter in that version onwards will then be "yes"
- Changelog
    3.8.4
	Security: with "smtpd_forbid_bare_newline = yes" (default
	 "no" for Postfix < 3.9), reply with "Error: bare <LF>
	 received" and disconnect when an SMTP client sends a line
	 ending in <LF>, violating the RFC 5321 requirement that
	 lines must end in <CR><LF>. This prevents SMTP smuggling
	 attacks that target a recipient at a Postfix server. For
	 backwards compatibility, local clients are excluded by
	 default with "smtpd_forbid_bare_newline_exclusions =
	 $mynetworks". Files: mantools/postlink, proto/postconf.proto,
	 global/mail_params.h, global/smtp_stream.c, global/smtp_stream.h,
	 smtpd/smtpd.c.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-08 10:00:02 +00:00
Arne Fitzenreiter
d303f7c154 kernel: update to 6.6.10
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-07 16:08:31 +01:00