Commit Graph

11576 Commits

Author SHA1 Message Date
Michael Tremer
ee4c8d28e4 core183: Ship suricata
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 14:15:32 +00:00
Arne Fitzenreiter
8c43d1481a kernel: update to 6.6.15
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-02 07:52:09 +00:00
Arne Fitzenreiter
664eac8483 mympd: new addon to control mpd via WebGUI
myMPD is written in C and has a nice WebGUI to play
local music and also a WebRadio browser.
This is to replace the removec client175.

After install it can reached via
https://IP_OF_THE_IPFIRE:8800

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-02 07:51:07 +00:00
Michael Tremer
83338946dc core184: Ship glibc
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 17:09:16 +00:00
Michael Tremer
31269e52cb core183: Ship vpnmain.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-30 17:42:53 +00:00
Michael Tremer
7e8fc770bd openssl: Update to 3.2.1
* A file in PKCS12 format can contain certificates and keys and may come from
   an untrusted source. The PKCS12 specification allows certain fields to be
   NULL, but OpenSSL did not correctly check for this case. A fix has been
   applied to prevent a NULL pointer dereference that results in OpenSSL
   crashing. If an application processes PKCS12 files from an untrusted source
   using the OpenSSL APIs then that application will be vulnerable to this
   issue prior to this fix.

   OpenSSL APIs that were vulnerable to this are: PKCS12_parse(),
   PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
   and PKCS12_newpass().

   We have also fixed a similar issue in SMIME_write_PKCS7(). However since this
   function is related to writing data we do not consider it security
   significant.

   ([CVE-2024-0727])

   *Matt Caswell*

 * When function EVP_PKEY_public_check() is called on RSA public keys,
   a computation is done to confirm that the RSA modulus, n, is composite.
   For valid RSA keys, n is a product of two or more large primes and this
   computation completes quickly. However, if n is an overly large prime,
   then this computation would take a long time.

   An application that calls EVP_PKEY_public_check() and supplies an RSA key
   obtained from an untrusted source could be vulnerable to a Denial of Service
   attack.

   The function EVP_PKEY_public_check() is not called from other OpenSSL
   functions however it is called from the OpenSSL pkey command line
   application. For that reason that application is also vulnerable if used
   with the "-pubin" and "-check" options on untrusted data.

   To resolve this issue RSA keys larger than OPENSSL_RSA_MAX_MODULUS_BITS will
   now fail the check immediately with an RSA_R_MODULUS_TOO_LARGE error reason.

   ([CVE-2023-6237])

   *Tomáš Mráz*

 * Restore the encoding of SM2 PrivateKeyInfo and SubjectPublicKeyInfo to
   have the contained AlgorithmIdentifier.algorithm set to id-ecPublicKey
   rather than SM2.

   *Richard Levitte*

 * The POLY1305 MAC (message authentication code) implementation in OpenSSL
   for PowerPC CPUs saves the contents of vector registers in different
   order than they are restored. Thus the contents of some of these vector
   registers is corrupted when returning to the caller. The vulnerable code is
   used only on newer PowerPC processors supporting the PowerISA 2.07
   instructions.

   The consequences of this kind of internal application state corruption can
   be various - from no consequences, if the calling application does not
   depend on the contents of non-volatile XMM registers at all, to the worst
   consequences, where the attacker could get complete control of the
   application process. However unless the compiler uses the vector registers
   for storing pointers, the most likely consequence, if any, would be an
   incorrect result of some application dependent calculations or a crash
   leading to a denial of service.

   ([CVE-2023-6129])

   *Rohan McLure*

 * Fix excessive time spent in DH check / generation with large Q parameter
   value.

   Applications that use the functions DH_generate_key() to generate an
   X9.42 DH key may experience long delays. Likewise, applications that use
   DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
   to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
   Where the key or parameters that are being checked have been obtained from
   an untrusted source this may lead to a Denial of Service.

   ([CVE-2023-5678])

   *Richard Levitte*

 * Disable building QUIC server utility when OpenSSL is configured with
   `no-apps`.

   *Vitalii Koshura*

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-30 17:41:53 +00:00
Arne Fitzenreiter
02aa0f99b1 web-user-interface: rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-21 21:42:13 +01:00
Arne Fitzenreiter
0722f42ed2 kernel: update to 6.6.13
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-21 19:10:22 +01:00
Michael Tremer
0742747e6d core183: Ship firewall initscript
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-19 16:38:12 +00:00
Michael Tremer
295af8f766 core183: Ship the updated theme
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-19 16:32:24 +00:00
Michael Tremer
c981c48b2d Merge remote-tracking branch 'ms/theme' into next 2024-01-19 16:29:46 +00:00
Arne Fitzenreiter
6094f35b5a core183: generate new rsa before apache start
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-19 06:10:26 +00:00
Arne Fitzenreiter
36c16c71ed core183: replace https rsa key if it is too small
new openssl need at least 2048 bit rsa keys for apache.
So if the existing is smaller a new 4096 bit key is generated.

fixes #13527

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-18 18:02:10 +01:00
Peter Müller
bca096b453 linux: Forbid legacy TIOCSTI usage
To quote from the kernel documentation:

> Historically the kernel has allowed TIOCSTI, which will push
> characters into a controlling TTY. This continues to be used
> as a malicious privilege escalation mechanism, and provides no
> meaningful real-world utility any more. Its use is considered
> a dangerous legacy operation, and can be disabled on most
> systems.
>
> Say Y here only if you have confirmed that your system's
> userspace depends on this functionality to continue operating
> normally.
>
> Processes which run with CAP_SYS_ADMIN, such as BRLTTY, can
> use TIOCSTI even when this is set to N.
>
> This functionality can be changed at runtime with the
> dev.tty.legacy_tiocsti sysctl. This configuration option sets
> the default value of the sysctl.

This patch therefore proposes to no longer allow legacy TIOCSTI usage
in IPFire, given its security implications and the apparent lack of
legitimate usage.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-16 15:46:37 +00:00
Peter Müller
254dcbaac8 Core Update 183: Fix permissions of /etc/sudoers.d/, again
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-16 12:36:50 +00:00
Michael Tremer
091988ad27 core183: Ship /etc/rc.d/init.d/mountfs
This script has been modified when we touched ExtraHD in Core Update
179/180, but has been forgotten to be shipped.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-16 12:25:04 +00:00
Arne Fitzenreiter
a93525c0ca kernel: update to 6.6.12
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-16 12:41:08 +01:00
Peter Müller
d2e2c945a9 Core Update 183: Ship 60-collectd
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-14 16:05:12 +00:00
Michael Tremer
f2d7d4ec16 collectd: Restart is required after reconnect
The "ping" plugin does not re-resolve the gateway IP address after
pinging it for the first time. For most people this won't be a big
problem, but if the default gateway changes, the latency graph won't
work any more.

In order to do re-resolve "gateway", the only way is to restart
collectd.

Fixes: #13522
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-14 16:04:03 +00:00
Peter Müller
4c7266a39e Core Update 183: Ship libssh
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:59:18 +00:00
Peter Müller
31167fb3bb libssh: Update to 0.10.6
Please refer to https://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/
for this version's release announcement.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:59:09 +00:00
Peter Müller
2958c8c1e0 Core Update 183: Ship libgcrypt
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:58:51 +00:00
Peter Müller
d4c0426903 libgcrypt: Update to 1.10.3
Refer to https://dev.gnupg.org/T6817 for release information concerning
this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:58:34 +00:00
Peter Müller
6d95c33018 Core Update 183: Ship kmod
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:58:17 +00:00
Peter Müller
de2b71f385 kmod: Update to 31
According to the source tarball's NEWS file:

- Improvements

        - Allow passing a path to modprobe so the module is loaded from
          anywhere from the filesystem, but still handling the module
          dependencies recorded in the indexes. This is mostly intended for kernel
          developers to speedup testing their kernel modules without having to load the
          dependencies manually or override the module in /usr/lib/modules/.
          Now it's possible to do:

                # modprobe ./drivers/gpu/drm/i915/i915.ko

          As long as the dependencies didn't change, this should do the right thing

        - Use in-kernel decompression if available. This will check the runtime support
          in the kernel for decompressing modules and use it through finit_module().
          Previously kmod would fallback to the older init_module() when using
          compressed modules since there wasn't a way to instruct the kernel to
          uncompress it on load or check if the kernel supported it or not.
          This requires a recent kernel (>= 6.4) to have that support and
          in-kernel decompression properly working in the kernel.

        - Make modprobe fallback to syslog when stderr is not available, as was
          documented in the man page, but not implemented

        - Better explaing `modprobe -r` and how it differentiates from rmmod

        - depmod learned a `-o <dir>` option to allow using a separate output
          directory. With this, it's possible to split the output files from
          the ones used as input from the kernel build system

        - Add compat with glibc >= 2.32.9000 that dropped __xstat

        - Improve testsuite to stop skipping tests when sysconfdir is something
          other than /etc

        - Build system improvements and updates

        - Change a few return codes from -ENOENT to -ENODATA to avoid confusing output
          in depmod when the module itself lacks a particular ELF section due to e.g.
          CONFIG_MODVERSIONS=n in the kernel.

- Bug Fixes

        - Fix testsuite using uninitialized memory when testing module removal
          with --wait

        - Fix testsuite not correctly overriding the stat syscall on 32-bit
          platforms. For most architectures this was harmless, but for MIPS it
          was causing some tests to fail.

        - Fix handling unknown signature algorithm

        - Fix linking with a static liblzma, libzstd or zlib

        - Fix memory leak when removing module holders

        - Fix out-of-bounds access when using very long paths as argument to rmmod

        - Fix warnings reported by UBSan

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:57:59 +00:00
Peter Müller
738bc25c94 Core Update 183: Ship cpio
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:57:39 +00:00
Peter Müller
b8a149cc40 cpio: Update to 2.14
Noteworthy changes in this release, according to
https://lists.gnu.org/archive/html/info-gnu/2023-05/msg00001.html :

* New option --ignore-dirnlink

Valid in copy-out mode, it instructs cpio to ignore the actual number
of links reported for each directory member and always store 2
instead.

* Changes in --reproducible option

The --reproducible option implies --ignore-dirlink.  In other words,
it is equivalent to --ignore-devno --ignore-dirnlink --renumber-inodes.

* Use GNU ls algorithm for deciding timestamp format in -tv mode

* Bugfixes

** Fix cpio header verification.

** Fix handling of device numbers on copy out.

** Fix calculation of CRC in copy-out mode.

** Rewrite the fix for CVE-2015-1197.

** Fix combination of --create --append --directory.

** Fix appending to archives bigger than 2G.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:57:25 +00:00
Peter Müller
3b2e37af22 Core Update 183: Ship and restart strongSwan
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:57:05 +00:00
Arne Fitzenreiter
19e66d7e2b kernel: update to 6.6.11
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-11 10:30:13 +01:00
Arne Fitzenreiter
e437405158 core183: fix typo at install-bootloader
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-10 17:11:16 +01:00
Michael Tremer
0e415928b7 web-user-interface: Replace the old tux logo with out new word mark
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-10 12:23:15 +00:00
Michael Tremer
dbf1d1634b web-user-interface: Update interface design
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-10 12:13:04 +00:00
Arne Fitzenreiter
a2af8c7186 kernel: aarch64: enable CONFIG_SHADOW_CALL_STACK
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-10 06:26:25 +00:00
Arne Fitzenreiter
ed5e80eb62 grub: update to 2.12 (final release version)
this should fix problems on systems installed on xfs

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-10 07:22:59 +01:00
Peter Müller
c4f03017a5 Core Update 183: Ship proxy.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-08 18:35:25 +00:00
Arne Fitzenreiter
d303f7c154 kernel: update to 6.6.10
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-07 16:08:31 +01:00
Peter Müller
8f0f0d6d2a Core Update 183: Ship bash
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-07 14:06:14 +00:00
Adolf Belka
1e2f989fbd libplist: Update to version 2.3.0
- Update from version 2.2.0 to 2.3.0
- Update of rootfile
    2.3.0
	- Changes:
	  * Rename PLIST_UINT to PLIST_INT and add plist_new_int() and plist_get_int_val()
	  * Add support for JSON format
	  * Add support for OpenStep format
	  * Introduce error codes and format constants
	  * Add return value to import/export functions to allow returning error codes
	  * Add new plist_sort function
	  * Add several human-readable output-only formats
	  * Add new plist_write_to_string/_stream/_file functions
	  * Add new plist_print function
	  * Add new plist_read_from_file function
	  * Add new plist_mem_free() function
	  * Add a few C++ methods
	  * Add C++ interface test
	  * Add PLIST_NULL type
	  * Some code housekeeping (mostly clang-tidy)
	- Breaking:
	  * plist_from_memory() gets additional parameter
	- Bugfixes:
	  * Fix multiple bugs in all of the parsers
	  * Fix handling of PLIST_UID nodes

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2024-01-03 21:26:40 +00:00
Adolf Belka
26c65649ae meson: Update to version 1.3.1
- Update from version 1.2.3 to 1.3.1
- Update of rootfile
- Changelog is too large to include here. See details at
   https://mesonbuild.com/Release-notes.html

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-03 21:21:38 +00:00
Adolf Belka
9a2ebf9077 libseccomp: Update to version 2.5.5
- Update from version 2.5.4 to 2.5.5
- Update of rootfile
- Changelog
    2.5.5 - December 1, 2023
	* Update the syscall table for Linux v6.7-rc3

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-03 21:19:41 +00:00
Peter Müller
bb9acf6731 Core Update 183: Ship iputils
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-03 21:17:19 +00:00
Peter Müller
519fef8ed2 Core Update 183: Ship fontconfig
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-03 21:12:21 +00:00
Adolf Belka
8c8aee9655 fontconfig: Update to version 2.15.0
- Update from version 2.14.1 to 2.15.0
- Update of rootfile
- Autogen no longer required
- fcobjshash.h is no longer in tarball from version 2.13.1
- Changelog
    2.15
	      Do not change the order of orth files
	      Convert tabs to spaces
	      Convert more tabs to spaces in docs
	      src/meson.build: Store correct paths to fontconfig.pc.
	      Fix a typo in description for HAVE_STDATOMIC_PRIMITIVES
	      Report more detailed logs instead of assertion.
	      Add some missing constant names for weight.
	      Adujst indentation between programlisting in fontconfig-user.sgml
	      Bump version to 2.14.2
	      Clean up unused code
	      Add another test case for flatpak
	      Update 65-nonlatin.conf for macOS
	      Change the order of the properties to the order of fontconfig cache format
	      Add missing property descriptions
	      Add namedinstance property
	      Remove the problematic language from code and doc
	      Fix a typo
	      Fix a typo for FcCharSetDelChar doc
	      Fix a typo in scalable property
	      Use 'outline' instead of 'scalable' for bitmaps
	      Add more docs about selectfont
	      Rework CI implementation
	      Fix a typo
	      Rework CI implementation v2
	      Apply a fix of ci-templates
	      Fix uninitialized memory access when failing memory allocation.
	      Create a symlink with relative path
	      Fix an error of "initializer element is not constant"
	      Update CaseFolding.txt to Unicode 15.1
	      Update the encoding table for Simplified Chinese
	      Retry to decode strings in the name table as UTF-16BE in some cases.
	      Work around decoding strings in Macintosh encoding for the name table.
	      Add iconv detection for meson build
	      .gitlab-ci: Update
	      CI: Update
	      CI: static build only for rawhide
	      Use memmove instead of memcpy
	      Rename README to NEWS and add README.md
	      Update so version
	      Fix leak of `reason` in _FcConfigParse when not complaining
	      Ignore LC_CTYPE if set to "UTF-8"
	      Some doc clarifications
	      Add FC_FONT_WRAPPER
	      Detect standalone CFF fonts for FC_FONT_WRAPPER
	      Add anp.orth, bhb.orth, hif.orth, mag.orth, raj.orth, and the.orth
	      Add {agr,ayc,bem,ckb,cmn,dsb,hak,lij,lzh,mfe,mhr,miq,mjw,mnw,nan,nhn,niu,rif,sgs,shn,szl,tcy,tpi,unm,wae,yue,yuw}.orth
	      Change index type to 16 bit and bump cache version to 9
	      Expand ~ in glob
	      Add optional 11-lcdfilter-none configuration
	      Fix filepaths added when scanning with sysroot
	      Fix false-positive CFI failure
	      In fcfreetype.c, `GetScriptTags`: fix `use_of_uninitialized_value` and return the correct number of parsed tags in case the font file contains less tags than indicated.
	      meson: Support any compiler with gcc or msvc argument syntax
	      fix typo
	      Reload MM/VF metadata for each font face in font collection
	      fixed typos in fc-conflist.sgml
	      Add aliases for Helvetica LT Std
    2.14.2
	      Fix the build issue on meson when -g option is added to c_args
	      Store artifacts for meson windows CI
	      Add FC_DESKTOP_NAME property
	      Add --with-default-sub-pixel-rendering option
	      Update po-conf/POTFILES.in
	      Ignore null pointer on Fc*Destroy functions
	      Convert tabs to spaces
	      Convert more tabs to spaces in docs
	      src/meson.build: Store correct paths to fontconfig.pc.
	      Fix a typo in description for HAVE_STDATOMIC_PRIMITIVES
	      Report more detailed logs instead of assertion.
	      Add some missing constant names for weight.
	      Adujst indentation between programlisting in fontconfig-user.sgml
	      meson: modify gperf test to remove sh dependency
	      meson: Update freetype2 git repository to upstream
	      Ignore LC_CTYPE if set to "UTF-8"
	      Expand ~ in glob
	      fix typo

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2024-01-03 21:11:57 +00:00
Peter Müller
2508d606a9 Core Update 183: Ship lixml, and restart Apache
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-03 21:10:08 +00:00
Adolf Belka
55d134a365 libxml2: Update to version 2.12.3
- Update from version 2.11.4 to 2.12.3
- Update of rootfile
- Changelog
    2.12.3: Dec 12 2023
	### Regressions
		- parser: Fix namespaces redefined from default attributes
	### Build fixes
		- include: Rename XML_EMPTY helper macro
		- include: Move declaration of xmlInitGlobals
		- include: Add missing includes
		- include: Move globals from xmlsave.h to parser.h
		- include: Readd circular dependency between tree.h and parser.h
    2.12.2: Dec 5 2023
	### Regressions
		- parser: Fix invalid free in xmlParseBalancedChunkMemoryRecover
		- globals: Disable TLS in static Windows builds
		- html: Reenable buggy detection of XML declarations
		- tree: Fix regression when copying DTDs
		- parser: Make CRLF increment line number
	### Build fixes
		- build: Disable compiler TLS by default
		- cmake: Update config.h.cmake.in
		- tests: Fix tests --with-valid --without-xinclude
    2.12.1: Nov 23 2023
	### Regressions
		- hash: Fix deletion of entries during scan
		- parser: Only enable SAX2 if there are SAX2 element handlers
	### Build fixes
		- autotools: Stop checking for snprintf
		- dict: Fix '__thread' before 'static'
		- fix: pthread weak references in globals.c (Mike Dalessio)
		- tests: Fix build with older MSVC
    2.12.0: Nov 16 2023
	### Major changes
		Most of the known issues leading to quadratic behavior in the XML parser
		 were fixed. Internal hash tables were rewritten to reduce memory
		 consumption.
		Starting with this release, it should be enough to add the --with-legacy
		 configuration option to provide maximum ABI compatibility. For example,
		 if a code module was removed from the default configuration, the option
		 will add stubs for the removed symbols.
		libxml2 will now store global variables in thread-local storage if supported
		 by the compiler. This avoids allocating the data lazily which can result in
		 a fatal error condition. A new API function xmlCheckThreadLocalStorage
		 was added so the allocation can be checked earlier if compiler TLS is not
		 supported. To prepare for future improvements, some API functions now expect
		 or return a const xmlError struct.
		Several cyclic dependencies in public header files were fixed. As a result,
		 certain headers won't include other headers as before.
		Refactoring of the encoding code has been mostly completed. Calling
		 xmlSwitchEncoding from client code is now fully supported, for example to
		 override the encoding for the push parser.
		When parsing data from memory, libxml2 will now stream data chunk by chunk
		 instead of copying the whole buffer (possibly twice with encodings),
		 reducing peak memory consumption considerably.
		A new API function xmlCtxtSetMaxAmplification was added to allow parsing
		 of files that would otherwise trigger the billion laughs protection.
		Several bugs in the regex determinism checks were fixed. Invalid XML
		 Schemas which previous versions erroneously accepted will now be
		 rejected.
	### Deprecations
		- globals: Deprecate xmlLastError
		- parser: Deprecate global parser options
		- win32: Deprecate old Windows build system
	### Bug fixes
		- parser: Stop switching to ISO-8859-1 on encoding errors
		- parser: Support encoded external PEs in entity values
		- string: Fix UTF-8 validation in xmlGetUTF8Char
		- SAX2: Allow multiple top-level elements
		- parser: Update line number after coalescing text nodes
		- parser: Check for truncated multi-byte sequences
	### Improvements
		- error: Make more xmlError structs constant
		- parser: Remove redundant IS_CHAR check in xmlCurrentChar
		- parser: Fix stack handling in xmlParseTryOrFinish
		- parser: Protect against quadratic default attribute expansion
		- parser: Missing checks for disableSAX
		- entities: Make xmlFreeEntity public
		- examples: Don't use sprintf
		- encoding: Suppress -Wcast-align warnings
		- parser: Use hash tables to avoid quadratic behavior
		- parser: Don't skip CR in xmlCurrentChar
		- dict: Rewrite dictionary hash table code
		- hash: Rewrite hash table code
		- malloc-fail: Report malloc failure in xmlFARegExec
		- malloc-fail: Report malloc failure in xmlRegEpxFromParse
		- parser: Simplify xmlStringCurrentChar
		- regexp: Fix status codes and handle invalid UTF-8
		- error: Make xmlGetLastError return a const error
		- html: Fix logic in htmlAutoClose
		- globals: Move globals back to correct header files
		- globals: Use thread-local storage if available
		- globals: Rework global state destruction on Windows
		- globals: Define globals using macros
		- globals: Introduce xmlCheckThreadLocalStorage
		- globals: Make xmlGlobalState private
		- threads: Move library initialization code to threads.c
		- debug: Remove debugging code
		- globals: Move code from threads.c to globals.c
		- parser: Avoid undefined behavior in xmlParseStartTag2
		- schemas: Fix memory leak of annotations in notations
		- dict: Update hash function
		- dict: Use thread-local storage for PRNG state
		- dict: Use xoroshiro64** as PRNG
		- xmllint: Fix error messages
		- parser: Fix detection of null bytes
		- parser: Improve error handling in push parser
		- parser: Don't check inputNr in xmlParseTryOrFinish
		- parser: Remove push parser debugging code
		- tree: Fix copying of DTDs
		- legacy: Add stubs for disabled modules
		- parser: Allow to set maximum amplification factor
		- entities: Don't change doc when encoding entities
		- parser: Never use UTF-8 encoding handler
		- encoding: Remove debugging code
		- malloc-fail: Fix unsigned integer overflow in xmlTextReaderPushData
		- html: Remove encoding hack in htmlCreateFileParserCtxt
		- parser: Decode all data in xmlCharEncInput
		- parser: Stream data when reading from memory
		- parser: Optimize xmlLoadEntityContent
		- parser: Don't overwrite EOF parser state
		- parser: Simplify input pointer updates
		- parser: Don't reinitialize parser input members
		- encoding: Move rawconsumed accounting to xmlCharEncInput
		- parser: Rework encoding detection
		- parser: Always create UTF-8 in xmlParseReference
		- html: Remove some debugging code in htmlParseTryOrFinish
		- malloc-fail: Fix memory leak in xmlCompileAttributeTest
		- parser: Recover more input from encoding errors
		- malloc-fail: Handle malloc failures in xmlAddEncodingAlias
		- malloc-fail: Fix null-deref with xmllint --copy
		- xpath: Ignore entity ref nodes when computing node hash
		- malloc-fail: Fix null deref after xmlXIncludeNewRef
		- SAX: Always validate xml:ids
		- Stop using sprintf
		- Fix compiler warning on GCC < 8
		- regexp: Fix determinism checks
		- regexp: Fix checks for eliminated transitions
		- regexp: Simplify xmlFAReduceEpsilonTransitions
		- regexp: Fix cycle check in xmlFAReduceEpsilonTransitions
		- schemas: Fix filename in xmlSchemaValidateFile
		- schemas: Fix line numbers in streaming validation
		- writer: Add error check in xmlTextWriterEndDocument
		- encoding: Stop calling xmlEncodingErr
		- xmlIO: Remove some calls to xmlIOErr
		- parser: Improve handling of encoding and IO errors
		- parser: Move xmlFatalErr to parserInternals.c
		- encoding: Rework error codes
		- .gitignore: Split up and rearrange .gitignore files
		- .gitignore: Add runsuite.log
		- Stop calling xmlMemoryDump
		- examples: Don't call xmlCleanupParser and xmlMemoryDump
		- xpath: Remove remaining references to valueFrame
	### Portability
		- python: Make it compatible with python3.12 (Daniel Garcia Moreno)
	### Build systems
		- cmake: Check whether static linking dependencies found in config files
		  (James Le Cuirot)
		- autotools: Make --with-minimum disable lzma support
		- build: Remove some GCC warnings
		- Handle NOCONFIG case when setting locations from CMake target properties
		  (Markus Rickert)
		- cmake: Generate better pkg-config file for SYSROOT builds under CMake
		  (James Le Cuirot)
		- autoconf: Include non-pkg-config dependency flags in the pkg-config file
		  (James Le Cuirot)
		- autoconf: Don't bake build time CFLAGS into pkg-config file (James Le Cuirot)
		- build: Generate better pkg-config files for static-only builds (James
		  Le Cuirot)
		- build: Generate better pkg-config file for SYSROOT builds (James Le Cuirot)
		- autoconf: Allow custom --with-icu configure option
	### Tests
		- tests: Also test xmlNextChar in testchar.c
		- tests: Start with testparser.c for extra tests
		- fuzz: Raise rss_limit_mb
		- fuzz: Test xmlTextReaderRead after EOF or failure
		- fuzz: Test XML_PARSE_XINCLUDE | XML_PARSE_VALID
		- tests: Handle entities in SAX tests
		- fuzz: Disable XML_PARSE_SAX1 option in xml fuzzer
		- tests: Add more tests for redefined attributes
		- hash: Add hash table tests
		- tests: Add ATTRIBUTE_NO_SANITIZE_INTEGER macro
		- fuzz: Allow to fuzz without push, reader or output modules
		- gitlab-ci: Add a "medium" config build
		- python: Fix tests on MinGW
		- test: Add push parser test with overridden encoding
		- testapi: test_xmlSAXDefaultVersion() leaves xmlSAX2DefaultVersionValue set
		  to 1 with LIBXML_SAX1_ENABLED (David Kilzer)
		- gitlab-ci: Lower _XOPEN_SOURCE value
		- testapi: Don't set http_proxy environment variable
		- test: Add push parser tests for split UTF-8 sequences
		- xinclude: Lower initial table size when fuzzing
		- tests: Test streaming schema validation
		- runtest: Skip element name in schema error messages
	### Documentation
		- doc: Add notes about runtest to MAINTAINERS.md
		- doc: Don't document internal macros in xmlversion.h
		- doc: Allow 'unsigned' without 'int'
		- doc: Improve documentation of configuration options
    2.11.6: Nov 16 2023
	### Regressions
		- threads: Fix --with-thread-alloc
		- xinclude: Fix 'last' pointer in xmlXIncludeCopyNode
	### Bug fixes
		- parser: Fix potential use-after-free in xmlParseCharDataInternal
    2.11.5: Aug 9 2023
	### Regressions
		- parser: Make xmlSwitchEncoding always skip the BOM
		- autotools: Improve iconv check
	### Bug fixes
		- valid: Fix c1->parent pointer in xmlCopyDocElementContent
		- encoding: Always call ucnv_convertEx with flush set to false
	### Portability
		- autotools: fix Python module file ext for cygwin/msys2 (Christoph Reiter)
	### Tests
		- runtest: Fix compilation without LIBXML_HTML_ENABLED

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2024-01-03 21:07:37 +00:00
Peter Müller
ec40d45d60 Core Update 183: Ship dhcp.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-03 21:03:17 +00:00
Arne Fitzenreiter
3920ba127f kernel: update to 6.6.9
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-02 09:54:10 +01:00
Peter Müller
dfae8b97b6 Core Update 183: Ship GnuTLS
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:39:53 +00:00
Adolf Belka
8cc92f5025 gnutls: Update to version 3.8.2
- Update from version 3.8.0 to 3.8.2
- Update of rootfile
- Changelog
    3.8.2 (released 2023-11-14)
	** libgnutls: Fix timing side-channel inside RSA-PSK key exchange.
	   [GNUTLS-SA-2023-10-23, CVSS: medium] [CVE-2023-5981]
	** libgnutls: Add API functions to perform ECDH and DH key agreement
	   The functionality has been there for a long time though they were
	   not available as part of the public API.  This enables applications
	   to implement custom protocols leveraging non-interactive key
	   agreement with ECDH and DH.
	** libgnutls: Added support for AES-GCM-SIV ciphers (RFC 8452)
	   The new algorithms GNUTLS_CIPHER_AES_128_SIV_GCM and
	   GNUTLS_CIPHER_AES_256_SIV_GCM have been added to be used through
	   the AEAD interface.  Note that, unlike
	   GNUTLS_CIPHER_AES_{128,256}_SIV_GCM, the authentication tag is
	   appended to the ciphertext, not prepended.
	** libgnutls: transparent KTLS support is extended to FreeBSD kernel
	   The kernel TLS feature can now be enabled on FreeBSD as well as
	   Linux when compiled with the --enable-ktls configure option.
	** gnutls-cli: New option --starttls-name
	   Depending on deployment, application protocols such as XMPP may
	   require a different origin address than the external address to be
	   presented prior to STARTTLS negotiation.  The --starttls-name can
	   be used to specify specify the addresses separately.
	** API and ABI modifications:
		gnutls_pubkey_import_dh_raw: New function
		gnutls_privkey_import_dh_raw: New function
		gnutls_pubkey_export_dh_raw: New function
		gnutls_privkey_export_dh_raw: New function
		gnutls_x509_privkey_import_dh_raw: New function
		gnutls_privkey_derive_secret: New function
		GNUTLS_KEYGEN_DH: New enum member of gnutls_keygen_types_t
		GNUTLS_CIPHER_AES_128_SIV_GCM: Added
		GNUTLS_CIPHER_AES_256_SIV_GCM: Added
    3.8.1 (released 2023-08-03)
	** libgnutls: ClientHello extensions are randomized by default
	   To make fingerprinting harder, TLS extensions in ClientHello
	   messages are shuffled. As this behavior may cause compatibility
	   issue with legacy applications that do not accept the last
	   extension without payload, the behavior can be reverted with the
	   %NO_SHUFFLE_EXTENSIONS priority keyword.
	** libgnutls: Add support for RFC 9258 external PSK importer.
	   This enables to deploy the same PSK across multiple TLS versions
	   (TLS 1.2 and TLS 1.3) in a secure manner. To use, the application
	   needs to set up a callback that formats the PSK identity using
	   gnutls_psk_format_imported_identity().
	** libgnutls: %GNUTLS_NO_EXTENSIONS has been renamed to
	   %GNUTLS_NO_DEFAULT_EXTENSIONS.
	** libgnutls: Add additional PBKDF limit checks in FIPS mode as
	   defined in SP 800-132. Minimum salt length is 128 bits and
	   minimum iterations bound is 1000 for PBKDF in FIPS mode.
	** libgnutls: Add a mechanism to control whether to enforce extended
	   master secret (RFC 7627). FIPS 140-3 mandates the use of TLS
	   session hash (extended master secret, EMS) in TLS 1.2. To enforce
	   this, a new priority keyword %FORCE_SESSION_HASH is added and if
	   it is set and EMS is not set, the peer aborts the connection. This
	   behavior is the default in FIPS mode, though it can be overridden
	   through the configuration file with the "tls-session-hash" option.
	   In either case non-EMS PRF is reported as a non-approved operation
	   through the FIPS service indicator.
	** New option --attime to specify current time.
	   To make testing with different timestamp to the system easier, the
	   tools doing certificate verification now provide a new option
	   --attime, which takes an arbitrary time.
	** API and ABI modifications:
		gnutls_psk_client_credentials_function3: New typedef
		gnutls_psk_server_credentials_function3: New typedef
		gnutls_psk_set_server_credentials_function3: New function
		gnutls_psk_set_client_credentials_function3: New function
		gnutls_psk_format_imported_identity: New function
		GNUTLS_PSK_KEY_EXT: New enum member of gnutls_psk_key_flags

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:39:38 +00:00
Peter Müller
e807011eba Core Update 183: Ship iptables
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-12-30 07:37:14 +00:00