Commit Graph

11158 Commits

Author SHA1 Message Date
Peter Müller
ee9476348b Core Update 177: Rebuild initial ramdisk to apply AMD microcode updates
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-03 17:50:36 +00:00
Peter Müller
5ea686072b Core Update 177: Ship relevant changes of linux-firmware and require a reboot
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-03 17:49:14 +00:00
Adolf Belka
6fb7d35b49 linux-firmware: Update to version 20230625
- Update from version 20230404 to 20230625
- Update of rootfile carried out based on Peter Mueller's description from last
   linux-firmware update.
- It would be good to have it checked that my results are in line with what they should be.
- Changelog
   For changes see the commits in the git repo
   https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-07-03 17:38:36 +00:00
Peter Müller
1842f3dccb Core Update 177: Ship squid-asnbl and restart Squid
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-01 19:31:45 +00:00
Peter Müller
81ed7573b1 Core Update 177: Ship util-linux
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-01 19:25:43 +00:00
Adolf Belka
230c81622a util-linux: Update to version 2.39.1
- Update from version 2.38.1 to 2.39.1
- Update of rootfile made for x86_64 but not for aarch64 or riscv64
- Changelog can only be reviewed by looking at the commits in the git repo
   https://github.com/util-linux/util-linux/commits/master

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-01 19:19:12 +00:00
Peter Müller
3dd626fefd Core Update 177: Ship iproute2
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-01 19:13:27 +00:00
Peter Müller
0cb1687b21 Core Update 177: Ship sudo
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-01 19:10:54 +00:00
Peter Müller
8ebb8091d9 Core Update 177: Ship and restart ntp
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-01 19:09:20 +00:00
Peter Müller
384302344c Start Core Update 177
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-07-01 18:55:36 +00:00
Michael Tremer
36ab906de4 core176: Re-ship libssh
This was also linked against OpenSSL 1.1.1.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-28 18:46:01 +00:00
Michael Tremer
87d0d07bbc core176: Re-ship lots of stuff that is still linked against OpenSSL 1.1.1
There are no functional changes in these files, but they are however
linked against OpenSSL 1.1.1 and need to be re-shipped before we remove
the legacy library.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-27 10:06:45 +00:00
Michael Tremer
08bd9a5a94 Revert "Core Update 176: Delete OpenSSL 1.1.1 files"
This reverts commit aa8a659ab7.

This cannot be done, yet, because an updated system still has hundreds
of files using the old libraries. Those will have to be re-shipped first
before we actually remove OpenSSL 1.1.1.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-27 09:46:48 +00:00
Peter Müller
3a86abcf49 Core Update 176: Ship and restart strongSwan
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 20:59:55 +00:00
Peter Müller
b35bbd2ba2 Core Update 176: Ship freetype
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 20:57:03 +00:00
Peter Müller
9270456fa2 freetype: Update to 2.13.1
Changelog is too long to include it here, please refer to the ChangeLog
file in the sourcecode tarball.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 20:53:42 +00:00
Peter Müller
955964d7a2 go: Update aarch64 rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 20:45:49 +00:00
Peter Müller
aa8a659ab7 Core Update 176: Delete OpenSSL 1.1.1 files
This step was announced in
https://blog.ipfire.org/post/ipfire-2-27-core-update-175-released .

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:55:55 +00:00
Peter Müller
17e30dbb84 Core Update 176: Ship proxy.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:53:02 +00:00
Adolf Belka
51e29a797e go: Update to version 1.20.4
- Update from version 1.15.4 to 1.20.4
- Update of x86_64 rootfile
   aarch64 rootfile needs to be created on a aarch64 build system
- Changelog is very large. For details see https://go.dev/doc/devel/release
   50 mentions of security fixes in the changes from 1.15.4 to 1.20.4

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-06-25 13:49:34 +00:00
Peter Müller
79e841bd57 Core Update 176: Ship extrahd.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:48:54 +00:00
Peter Müller
d4e96ad105 Core Update 176: Ship 69-dm-lvm.rules
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:48:09 +00:00
Adolf Belka
8c81964bc6 update.sh: Fixes bug-13151 - removes old 69-dm-lvm-metad.rules file
- In Core Update 175 lvm was updated and 69-dm-lvm-metad.rules was replaced with
   69-dm-lvm.rules in the lvm rootfile.
- That previous patch update did not remove the no longer existing 69-dm-lvm-metad.rules
   from existing installations. This patch corrects that.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-06-25 13:46:14 +00:00
Adolf Belka
afbb7db681 lvm: Fixes bug-13151 - update 69-dm-lvm.rules
- Redhat updated lvm udev rule 69-dm-lvm.rules to only work with systemd
- Update 69-dm-lvm.rules to work with IPFire based on input from @Daniel of what worked
   to mount an existing lvm volume

Suggested-by: Daniel Weismüller <daniel.weismueller@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-06-25 13:46:14 +00:00
Peter Müller
d71d12a32e Core Update 176: Ship parse-func.pl
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:43:46 +00:00
Michael Tremer
52d0a1e2db Revert "parse-func.pl: Adjust regular expression to changed 'tc' output"
This reverts commit ca06e817b8.

The incorrect output has been fixed in tc.

Fixes: #13150
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-25 13:42:51 +00:00
Peter Müller
21f50e4d16 Core Update 176: Ship changes related to updated toolchain
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-24 06:43:53 +00:00
Michael Tremer
f08637c587 gdb: Update to 13.2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-24 06:34:18 +00:00
Michael Tremer
df1a3f56cb gcc: Update to 13.1.0
This patch does not include the rootfile for riscv64 because GCC FTBFS.
Bug #13156 has been opened to address this.

But since we don't officially support IPFire riscv64, yet, this should
not delay this going into next.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-24 06:34:18 +00:00
Peter Müller
16c047b785 Core Update 176: Ship pciutils
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2023-06-22 21:28:27 +00:00
Adolf Belka
a57f632e78 pciutils: Update to version 3.10.0
- Update from version 3.9.0 to 3.10.0
- Update of rootfile
- version 3.9.0 failed to output some of the symbols. This was found as a bug in Fedora but
   also seen by some people in IPFire CU175 with flashrom where the version 3.3 symbol is
   provided.
   Fedora made a patch to resolve this issue for 3.9.0 but 3.10.0 has been released since
   then and Fedora removed the patch that was used for 2.9.0 as pciutils has had that bug
   fixed - see first item in changelog.
- Changelog
    Released as 3.10.0.
	Fixed bug in definition of versioned symbol aliases
	  in shared libpci, which made compiling with link-time
	  optimization fail.
	Filters now accept "0x..." syntax for backward compatibility.
	Windows: The cfgmgr32 back-end which provides the list of devices
	  can be combined with another back-end which provides access
	  to configuration space.
	ECAM (Enhanced Configuration Access Mechanism), which is defined
	  by the PCIe standard, is now supported. It requires root privileges,
	  access to physical memory, and also manual configuration on some
	  systems.
	lspci: Tree view now works on multi-domain systems. It now respects
	  filters properly.
	Last but not least, pci.ids were updated to the current snapshot
	  of the database. This includes overall cleanup of entries with
	  non-ASCII characters in their names -- such characters are allowed,
	  but only if they convey interesting information (e.g., umlauts
	  in German company names, but not the "registered trade mark" sign).

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-06-22 21:28:05 +00:00
Michael Tremer
943c5e7e3c core176: Ship suricata
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 15:57:42 +00:00
Matthias Fischer
dbd7bafb4d suricata: Update to 6.0.13
Excerpt from changelog:

"6.0.13 -- 2023-06-15

Security #6119: datasets: absolute path in rules can overwrite arbitrary files (6.0.x backport)
Bug #6138: Decode-events of IPv6 packets are not triggered (6.0.x backport)
Bug #6136: suricata-update: dump-sample-configs: configuration files not found (6.0.x backport)
Bug #6125: http2: cpu overconsumption in rust moving/memcpy in http2_parse_headers_blocks (6.0.x backport)
Bug #6113: ips: txs still logged for dropped flow (6.0.x backport)
Bug #6056: smtp: long line discard logic should be separate for server and client (6.0.x backport)
Bug #6055: ftp:  long line discard logic should be separate for server and client (6.0.x backport)
Bug #5990: smtp: any command post a long command gets skipped (6.0.x backport)
Bug #5982: smtp: Long DATA line post boundary is capped at 4k Bytes (6.0.x backport)
Bug #5809: smb: convert transaction list to vecdeque (6.0.x backport)
Bug #5604: counters: tcp.syn, tcp.synack, tcp.rst depend on flow (6.0.x backport)
Bug #5550: dns: allow dns messages with invalid opcodes (6.0.x backport)
Task #5984: libhtp 0.5.44 (6.0.x backport)
Documentation #6134: userguide: add instructions/explanation for (not) running suricata with root (6.0.x backport)
Documentation #6121: datasets: 6.0.x work-arounds for dataset supply chain attacks"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 15:56:53 +00:00
Michael Tremer
dfbbc534be core176: Ship vpnmain.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 09:23:46 +00:00
Michael Tremer
a71450b6fa core176: Ship intel-microcode and regenerate all initramdisks
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 09:22:17 +00:00
Adolf Belka
6f22b0ac4d intel-microcode: Update to version 20230613
- Updated from version 20230214 to 20230512-rev2 where the source tarball is named version
   20230613
- Update of rootfile
- Changelog details for versions 20230512 and 20230512-rev2 can be found at
   https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-16 09:20:06 +00:00
Adolf Belka
a06f2fa02e transmission: Update to version 4.0.3
- Update from version 3.00 to 4.0.3
- This v2 version has usr/share/transmission directory uncommented.
- Update of rootfile
- Build changed from autotools configure to cmake
- Changelog is very large. For details see
   https://github.com/transmission/transmission/releases/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:40:33 +00:00
Michael Tremer
863858b0b7 core176: Ship all misc-progs again
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:39:39 +00:00
Adolf Belka
db9c7fb826 wavemon: Update to version 0.9.4
- Update from version 0.7.5 to 0.9.4
- Update of rootfile
- wavemon would not build because it could not find the netlink include files. wavemon was
   still looking in include/netlink/ as for libnl version 1 but with libnl3 the include
   files are in include/libnl3/netlink/
- Based on an issue entry in the wavemon github repo I created the patch to force wavemon
   to look in the correct place.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:39:10 +00:00
Michael Tremer
87cd2c4135 core176: Ship mpfr
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:38:01 +00:00
Michael Tremer
67557306b2 core176: Ship pam
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:36:59 +00:00
Adolf Belka
5a7fe40a6a pam: Update to version 1.5.3
- Update from version 1.5.2 to 1.5.3
- Update of rootfile
- Changelog
Release 1.5.3
	* configure: added options to configure stylesheets.
	* configure: added --enable-logind option to use logind instead of utmp
	  in pam_issue and pam_timestamp.
	* pam_modutil_getlogin: changed to use getlogin() from libc instead of parsing
          utmp.
	* Added libeconf support to pam_env and pam_shells.
	* Added vendor directory support to pam_access, pam_env, pam_group, pam_faillock,
	  pam_limits, pam_namespace, pam_pwhistory, pam_sepermit, pam_shells, and pam_time.
	* pam_limits: changed to not fail on missing config files.
	* pam_pwhistory: added conf= option to specify config file location.
	* pam_pwhistory: added file= option to specify password history file location.
	* pam_shells: added shells.d support when libeconf and vendordir are enabled.
	* Deprecated pam_lastlog: this module is no longer built by default because
	  it uses utmp, wtmp, btmp and lastlog, but none of them are Y2038 safe,
	  even on 64bit architectures.
	  pam_lastlog will be removed in one of the next releases, consider using
	  pam_lastlog2 (from https://github.com/thkukuk/lastlog2) and/or
	  pam_wtmpdb (from https://github.com/thkukuk/wtmpdb) instead.
	* Deprecated _pam_overwrite(), _pam_overwrite_n(), and _pam_drop_reply() macros
	  provided by _pam_macros.h; the memory override performed by these macros can
	  be optimized out by the compiler and therefore can no longer be relied upon.
	* Multiple minor bug fixes, portability fixes, documentation improvements,
	  and translation updates.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:36:39 +00:00
Michael Tremer
10c3fc94d2 core176: Ship nettle
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:36:19 +00:00
Adolf Belka
68b8b5fa81 nettle: Update to version 3.9
- Update from version 3.8.1 to 3.9
- Update of rootfile
- Changelog
NEWS for the Nettle 3.9 release
	This release includes bug fixes, several new features, a few
	performance improvements, and one performance regression
	affecting GCM on certain platforms.
	The new version is intended to be fully source and binary
	compatible with Nettle-3.6. The shared library names are
	libnettle.so.8.7 and libhogweed.so.6.7, with sonames
	libnettle.so.8 and libhogweed.so.6.
	This release includes a rewrite of the C implementation of
	GHASH (dating from 2011), as well as the plain x86_64 assembly
	version, to use precomputed tables in a different way, with
	tables always accessed in the same sequential manner.
	This should make Nettle's GHASH implementation side-channel
	silent on all platforms, but considerably slower on platforms
	without carry-less mul instructions. E.g., benchmarks of the C
	implementation on x86_64 showed a slowdown of 3 times.
	Bug fixes:
		* Fix bug in ecdsa and gostdsa signature verify operation, for
		  the unlikely corner case that point addition really is point
		  duplication.
		* Fix for chacha on Power7, nettle's assembly used an
		  instruction only available on later processors. Fixed by
		  Mamone Tarsha.
		* GHASH implementation should now be side-channel silent on
		  all architectures.
		* A few portability fixes for *BSD.
	New features:
		* Support for the SM4 block cipher, contributed by Tianjia
	          Zhang.
		* Support for the Balloon password hash, contributed by Zoltan
	          Fridrich.
		* Support for SIV-GCM authenticated encryption mode,
	          contributed by Daiki Ueno.
		* Support for OCB authenticated encryption mode.
		* New exported functions md5_compress, sha1_compress,
		  sha256_compress, sha512_compress, based on patches from
		  Corentin Labbe.
	Optimizations:
		* Improved sha256 performance, in particular for x86_64 and
		  s390x.
		* Use GMP's mpn_sec_tabselect, which is implemented in
		  assembly on many platforms, and delete the similar nettle
		  function. Gives a modest speedup to all ecc operations.
		* Faster poly1305 for x86_64 and ppc64. New ppc code
		  contributed by Mamone Tarsha.
	Miscellaneous:
		* New ASM_FLAGS variable recognized by configure.
		* Delete all arcfour assembly code. Affects 32-bit x86, 32-bit
		  and 64-bit sparc.
	Known issues:
		* Version 6.2.1 of GNU GMP (the most recent GMP release as of
		  this writing) has a known issue for MacOS on 64-bit ARM: GMP
		  assembly files use the reserved x18 register. On this
		  platform it is recommended to use a GMP snapshot where this
		  bug is fixed, and upgrade to a later GMP release when one
		  becomes available.
		* Also on MacOS, Nettle's testsuite may still break due to
		  DYLD_LIBRARY_PATH being discarded under some circumstances.
		  As a workaround, use
		* make check EMULATOR='env DYLD_LIBRARY_PATH=$(TEST_SHLIB_DIR)'

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:36:10 +00:00
Michael Tremer
dc60a4256a core176: Ship libcap
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:35:49 +00:00
Adolf Belka
177c2c3f35 libcap: Update to version 2.69
- Update from version 2.67 to 2.69
- Update of rootfile
- Changelog
Release notes for 2.69
	2023-05-14 19:10:04 -0700
	    An audit was performed on libcap and friends by https://x41-dsec.de/
             https://x41-dsec.de/news/2023/05/15/libcap-source-code-audit/
             The audit (final report, 2023-05-10)
              https://drive.google.com/file/d/1lsuC_tQbQ5pCE2Sy_skw0a7hTzQyQh2C/view?usp=sharing
              was sponsored by the the Open Source Technology Improvement Fund,
              https://ostif.org/ (blog). Five issues were found. Four of them are
              addressed in this release. Each issue was labeled in the audit results as
              follows:
	        LCAP-CR-23-01 (SEVERITY) LOW (CVE-2023-2602) - found by David Gstir
	        LCAP-CR-23-02 (SEVERITY) MEDIUM (CVE-2023-2603) - found by Richard Weinberger
	        LCAP-CR-23-100 (SEVERITY) NONE
	        LCAP-CR-23-101 (SEVERITY) NONE
	    Man page style improvement from Emanuele Torre
	    Partially revive the ability to build the binaries fully statically.
	        This was needed to make bleeding edge kernel debugging/testing via
                 qemu+busybox work again. Addressing an issue I realized only when I
                 tried to answer this stackexchange question.
                 https://unix.stackexchange.com/questions/741532/launch-process-with-limited-capabilities-on-minimal-busybox-based-system
Release notes for 2.68
	2023-03-25 17:03:17 -0700
	    Force libcap internal functions to be hidden outside the library (Bug 217014)
	    Expanded the list of man page (links) to all of the supported API functions.
	        fixed some formatting issues with the libpsx(3) manpage.
	    Add support for a markdown preamble and postscript when generating .md
             versions of the man pages (Bug 217007)
	    psx package clean up
	        fix some copy-paste errors with TestShared()
	        added a more complete psx testing into this test as well
	    cap package clean up
	        drop an unnecessary use of ", _" in the sources
	        cleaned up cap.NamedCount documentation
	    Converted goapps/web/README to .md format and fixed the instructions to
             indicate go mod tidy is needed.
	    cap_compare test binary now cleans up after itself (Bug 217018)
	    Figured out how to cross compile Go programs for arm (i.e. RPi) that use C
             code, don't use cgo but do use the psx package (all part of investigating
             bug 216610).
	    Eliminate use of vendor directory

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:35:38 +00:00
Michael Tremer
d6531fb525 core176: Ship harfbuzz
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:35:21 +00:00
Adolf Belka
da63874c75 harfbuzz: Update to version 7.3.0
- Update from 7.2.0 to 7.3.0
- Update of rootfile
- Changelog
Overview of changes leading to 7.3.0
    Tuesday, May 9, 2023
	- Speedup applying glyph variation in VarComposites fonts (over 40% speedup).
	  (Behdad Esfahbod)
	- Speedup instancing some fonts (over 20% speedup in instancing RobotoFlex).
	  (Behdad Esfahbod)
	- Speedup shaping some fonts (over 30% speedup in shaping Roboto).
	  (Behdad Esfahbod)
	- Support subsetting VarComposites and beyond-64k fonts. (Behdad Esfahbod)
	- New configuration macro HB_MINIMIZE_MEMORY_USAGE to favor optimizing memory
	  usage over speed. (Behdad Esfahbod)
	- Supporting setting the mapping between old and new glyph indices during
	  subsetting. (Garret Rieger)
	- Various fixes and improvements.
	  (Behdad Esfahbod, Denis Rochette, Garret Rieger, Han Seung Min, Qunxin Liu)
	- New API:
		+hb_subset_input_old_to_new_glyph_mapping()

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:35:11 +00:00
Michael Tremer
036889a8d2 core176: Ship ethtool
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:34:55 +00:00
Michael Tremer
9d189d0f07 core176: Ship curl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:34:23 +00:00