Commit Graph

16332 Commits

Author SHA1 Message Date
Adolf Belka
ef1a5fc9cd libgpg-error: Update to 1.42
- Update from 1.41 to 1.42
- Update rootfile
- Changelog
   2021-03-22  Werner Koch  <wk@gnupg.org>
	core: Add GPG_ERR_SOURCE_TPM2D.
	+ commit 200bf2ed9d610219cc0b12a91dedb3bfd52d36b7
	* src/err-sources.h.in (GPG_ERR_SOURCE_TPM2D): New.
   2021-03-05  Werner Koch  <wk@gnupg.org>
	w32: Allow Unicode paths for the gettext domain.
	+ commit 618ce381f9d70f3a94e87f58f667a6138411018e
	* src/w32-gettext.c: Remove remaining WindowsCE support
	(load_domain): Use CreateFileW.
   2021-03-04  Werner Koch  <wk@gnupg.org>
	w32: Minor cleanup of w32-gettext.
	+ commit 3bf1de7b72be8e1d9fa78eb94730772d9cf61c44
	* src/w32-gettext.c: Include gpgrt.h instead gpg-error.h.
	(utf8_to_wchar): Use underscored function.
	(_gpg_w32_textdomain): Ditto.
   2021-02-18  NIIBE Yutaka  <gniibe@fsij.org>
	build: Support --disable-threads by gen-lock-obj.sh.
	+ commit 1fb90a7da186ee2ee098a666f6f3a35bb1720e59
	* configure.ac: Supply --disable-threads to gen-lock-obj.sh.
	Tighten the condition of using gen-lock-obj.sh for GNU/Linux.
	* src/gen-lock-obj.sh: Support --disable-threads.
   2021-02-16  NIIBE Yutaka  <gniibe@fsij.org>
	build: Fix gpgrt-config.
	+ commit ed3cd20de8d3eab92dd8fff02bcc214c55d08398
	* src/gpgrt-config.in: Remove delimiter variable.
	build: More fix for determining libdir for gpgrt-config.
	+ commit 28a21addc2e30b0756cdc6774c79f69070df8829
	* src/gpg-error.m4: Use CC -print-search-dirs for better support of
	GNU style cross prefix.
   2021-02-15  NIIBE Yutaka  <gniibe@fsij.org>
	build: Fix the previous change.
	+ commit d7fd25bbfb83cd445bc81aa695b2c6127c22fa59
	* src/gpg-error.m4: Fix test condition for GPGRT_CONFIG.
	Fix behaviour when there is no GPG_ERROR_CONFIG.
   2021-02-12  NIIBE Yutaka  <gniibe@fsij.org>
	build: Improve how to determine $libdir for gpgrt-config.
	+ commit 3cabbad4eec0e5bc6bdaa9f8626578934138adee
	* src/gpg-error.m4: Fix $gpgrt_libdir handling.
   2021-02-09  NIIBE Yutaka  <gniibe@fsij.org>
	Support cross-compiling on more platforms.
	+ commit 99ae862a96a569724f49a604ebb7d3f6d2c2d374
	* src/gen-lock-obj.sh (ECHO_C, ECHO_N): Portability fix.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:11:00 +00:00
Adolf Belka
d1878532f8 libexif: Update to 0.6.22
- Update from 0.6.21 (2012) to 0.6.22 (2020)
- Update rootfile
- Changelog
  * New translations: ms
  * Updated translations for most languages
  * Fixed C89 compatibility
  * Fixed warnings on recent versions of autoconf
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
  * Lots of fixes exposed by fuzzers like AFL, ClusterFuzz, OSSFuzz and others.
    * CVE-2018-20030: Fix for recursion DoS
    * CVE-2020-13114: Time consumption DoS when parsing canon array markers
    * CVE-2020-13113: Potential use of uninitialized memory
    * CVE-2020-13112: Various buffer overread fixes due to integer overflows in maker notes
    * CVE-2020-0093: read overflow
    * CVE-2019-9278: replaced integer overflow checks the compiler could optimize away by safer constructs
    * CVE-2020-12767: fixed division by zero
    * CVE-2016-6328: fixed integer overflow when parsing maker notes
    * CVE-2017-7544: fixed buffer overread

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:10:50 +00:00
Michael Tremer
2fb7e86825 core157: Ship libevent2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:10:35 +00:00
Adolf Belka
462a19b6f8 libevent2: Update to 2.1.12
- Update from 2.1.11 to 2.1.12
- Update rootfile
- Changelog
   Changes in version 2.1.12-stable (05 Jul 2020)
      This release contains mostly bug fixes (I decided not to port some features
      that can be ported even without ABI breakage, if you cannot find feature that
      you are interested in, please give us a note!)
      Since 2.1.12 libevent will use github actions as main CI, since
      it recommends itself better then travis/appveyor (and had been removed from
      upstream).
      Look carefully at "slightly touches the behaviour" section.
      Below you will find some of changes (this list has been cleaned up from the
      patches that touches only tests and similar):
    CI:
      o Backport github actions to 2.1 (be3acd7c Azat Khuzhin)
      o Merge branch 'event_rpcgen.py-cleanup' (f0ded5f3, 48e04887 Enji Cooper)
      o Add API/ABI checker (using LVC) (709210d4, 2af1f6cc yuangongji)
    test:
      o tinytest: support timeout on Windows (794e8f75 yuangongji)
      o Merge branch 'osx-clock' (e85afbe3 Azat Khuzhin)
      o test-ratelim: calculate timers bias (for slow CPUs) to avoid false-positive (8ad26d0b Azat Khuzhin)
    fixes:
      o buffer: do not pass NULL to memcpy() from evbuffer_pullup() (5b063049 Azat Khuzhin)
      o http: fix undefined-shift in EVUTIL_IS*_ helpers (6b8d02a7 Azat Khuzhin)
      o Check error code of evhttp_add_header_internal() in evhttp_parse_query_impl() (97e28f09 Azat Khuzhin)
      o http: fix EVHTTP_CON_AUTOFREE in case of timeout (and some else) (1be25938 Azat Khuzhin)
      o evdns: Add additional validation for values of dns options (c2972453 ayuseleznev)
      o There is typo in GetAdaptersAddresses windows library. It should be iphlpapi.dll (891adda9 Aleksandr-Melnikov)
      o Merge branch 'EV_CLOSED-and-EV_ET-fixes' (db2efdf5 Azat Khuzhin)
      o Fix memory corruption in EV_CLOSURE_EVENT_FINALIZE with debug enabled (8ccd8f56 Jan Kasiak)
      o increase segment refcnt only if evbuffer_add_file_segment() succeeds (30662a3c yuangongji)
      o evdns: fix a crash when evdns_base with waiting requests is freed (6f8e0e97 ayuseleznev)
      o event_base_once: fix potential null pointer threat (2e9ceb16 chenguolong)
      o http: do not assume body for CONNECT (1b42270b Azat Khuzhin)
      o evbuffer_add_file: fix freeing of segment in the error path (5f017bde Azat Khuzhin)
      o Fix checking return value of the evdns_base_resolv_conf_parse() (fc51bf2c Azat Khuzhin)
      o Merge branch 'fix-signal-leak' (poll/select now needs reinit) (1c9cc07b Azat Khuzhin)
    improvements:
      o evutil_time: improve evutil_gettimeofday on Windows (a8219143 Nick Grifka)
      o Support EV_CLOSED on linux for poll(2) (2530e7c6 Azat Khuzhin)
      o Parse IPv6 scope IDs. (f602211f Philip Homburg)
      o evutil_time: Implements usleep() using wait funtion on Windows (d42240d1 yuangongji)
      o evutil_time: detect and use _gmtime64_s()/_gmtime64() (f4a6152c yuangongji)
    slightly touches the behaviour:
      o bufferevent: allow setting priority on socket and openssl type (4dd3acdd Nicolas J. Bouliane)
      o Fix EV_CLOSED detection/reporting (epoll only) (1df324d4 Azat Khuzhin) (XXX)
      o Revert "Warn if forked from the event loop during event_reinit()" (71f5c0d3 Azat Khuzhin)
    samples:
      o https-client: load certificates from the system cert store on Windows (e9478640 yuangongji)
    build fixes:
      o Do not use sysctl.h on linux (it had been deprecated) (d2871a37 Azat Khuzhin)
      o cmake: avoid problems from use of CMAKE_USE_PTHREADS_INIT (a62ec765 Paul Osborne)
      o Update list of cmake files for autotools dist archive (2016f017 Azat Khuzhin)
      o LibeventConfig.cmake: restore CMAKE_FIND_LIBRARY_SUFFIXES and LIBEVENT_STATIC_LINK default (640f9cf6 Mario Emmenlauer)
      o cmake: fix getaddrinfo checking error (dea51c2e yuangongji)
      o autoconf: fix getaddrinfo checking errors on mingw (b9bf7fa7 yuangongji)
      o Do not use shared global structures on CYGWIN (8a9b5655 Azat Khuzhin)
      o Added uninstall target check to cmakelists (3f1fb1f9 Dimo Markov)
      o Fix compilation without OPENSSL_API_COMPAT (921bdcdd Azat Khuzhin)
      o cmake: improve package config file (1c047618, baec84f2 yuangongji)
      o Link with iphlpapi only on windows (976f7d34 Azat Khuzhin)
      o autotools: fails build when need but can not find openssl (93174bb5 yuangongji)
      o Merge branch 'http-connect' (e2424229 Azat Khuzhin)
      o Fix compat with NetBSD >= 10 (5febb4e1 Kamil Rytarowski)
      o cmake: fix getrandom() detection (e0e5f3bd Azat Khuzhin)
      o arc4random: replace sysctl() with getrandom (on linux) (66ec78fd Azat Khuzhin)
      o Upgrade autoconf (after upgrading minimum required to 2.67) (45da7d9d yuangongji)
      o eliminate some C4267 warnings in Windows (9e468c77 yuangongji)
      o autotools: attach doxygen target into all target (5d1e8570 yuangongji)
      o cmake: attach doxygen target into all target (7a85300a yuangongji)
      o Change the minimum version of automake to 1.13 and autoconf to 2.67 (fdb8fb66 ygj6)
      o Add Uninstall.cmake.in into dist archive (877f2355 Azat Khuzhin)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:10:13 +00:00
Michael Tremer
2fc44ff84d core157: Ship libedit
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:10:03 +00:00
Adolf Belka
0e3264160e libedit: Update to 20210419-3.1
- Update from 20190324-3.1 to 20210419-3.1
- Update rootfile
- Changelog - note source tarbal version uses date not the version-info
  in the changelog file
   2021-04-19 Jess Thrysoee
    * version-info: 0:65:0
    * all: sync with upstream source
    * src/getline.c,src/sys.h: Provide getline.c implementation if not available
	Patch by Claes Nästén
    * src/makelist: Use Posix locale; mainly to get ASCII character classes in e.g. `tr`
	Patch by Claes Nästén
   * examples/test_filecompletion.c, examples/wtc1.c: err.h not supported by
     Solaris
   2021-02-16 Jess Thrysoee
    * version-info: 0:64:0
    * all: sync with upstream source
   2019-12-31 Jess Thrysoee
    * version-info: 0:63:0
    * configure.ac: Support -ltinfo as split in newer ncurses
	The newer versions of ncurses support building terminfo routines as a split -ltinfo library.
	Patch by Michał Górny
   2019-12-11 Jess Thrysoee
    * version-info: 0:62:0
    * all: sync with upstream source
   2019-10-25 Jess Thrysoee
    * version-info: 0:61:0
    * all: sync with upstream source

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:09:48 +00:00
Adolf Belka
0a300b724e libdvbpsi: Update to 1.3.3
- Update from 1.2.0 to 1.3.3
- Update rootfile
- Ran find-dependencies - nothing found
- Changelog
   Changes between 1.3.2 and 1.3.3:
    * Fix regression in dvbpsi_decoder_psi_section_add() set i_last_section_number
   Changes between 1.3.1 and 1.3.2:
    * Fix bug in dvbpsi_decoder_psi_section_add() set i_last_section_number
    * Fix bug in descriptor 0x8a that prevented it from being parsed properly
    * Fix bug in descriptor 0x56 generation with multiple teletext page entries
    * Fix bug in descriptor 0x41 correct maximum service count
   Changes between 1.3.0 and 1.3.1:
    * Fix bugs in table: EIT
    * Fix test_dr
   Changes between 1.2.0 and 1.3.0:
    * New descriptor:
      - 0x10 Smoothing Buffer
      - 0x11 STD descriptor
      - 0x12 IBP descriptor
      - 0x1b MPEG-4 video descriptor
      - 0x1c MPEG-4 audio descriptor
    * Fix bugs in descriptor: 0x02, 0x0a, 0x45, 0x48, 0x50, 0x56, 0x7c
    * Fix bugs in table: EIT, NIT
    * Fix bugs in demux.c
    * Build with mingw32
    * Generate descriptors: 0x83, 0xa1
    * Documentation fixes:
      - tables: NIT
      - descriptors: 0xa1

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:09:38 +00:00
Michael Tremer
13e56021b4 core157: Ship libcap-ng
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:09:28 +00:00
Adolf Belka
0c58de2952 libcap-ng: Update to 0.8.2
- Update from 0.7.9 to 0.8.2
- Update rootfile
- Changelog
   0.8.2
    - In capng_apply, if we blew up in bounding set, allow setting capabilities
    - If PR_CAP_AMBIENT is not available, do not build libdrop_ambient
    - Improve last_cap check
   0.8.1
    - If procfs is not available, leave last_cap as CAP_LAST_CAP
    - If bounding and ambient not found in status, try prctl method
    - In capng_apply, move ambient caps to the end of the transaction
    - In capng_apply, return errors more aggressively.
    - In capng_apply, if the action includes the bounding set,resync with the kernel
    - Fix signed/unsigned warning in cap-ng.c
    - In capng_apply, return a unique error code to diagnose any failure
    - In capng_have_capability, return 0 for failure
    - Add the libdrop_ambient admin tool
   0.8
    - Add vararg support to python bindings for capng_updatev
    - Add support for ambient capabilities
    - Add support for V3 filesystem capabilities
   0.7.11
    - Really clear bounding set if asked in capng_change_id
    - Add CAP_PERFMON, CAP_BPF, & CAP_CHECKPOINT_RESTORE
    - Avoid malloc/free in capng_apply (Natanael Copa)
    - If procfs is not available, get bounding set via prctl
    - Cleanup some compiler warnings
   0.7.10
    - Update capng_change_id man page
    - Add capng_have_permitted_capabilities function
    - Update filecap to output which set the capabilities are in
    - Fix filecap to not output an error when a file has no capabilities
    - Add udplite support to netcap
    - Fix usage of pthread_atfork (Joe Orton)
    - Mark processes in child user namespaces with * (Danila Kiver)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:08:53 +00:00
Michael Tremer
c9d57d87e0 core157: Ship libarchive
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:08:42 +00:00
Adolf Belka
d9cd055fa8 libarchive: Update to 3.5.1
- Update from 3.4.0 to 3.5.1
- Update rootfile
- Changelog
   Libarchive 3.5.1 Released: Dec 26, 2020
    Important bugfixes
     various compilation fixes
     fixed undefined behavior in a function in warc reader
     Windows binary uses xz 5.2.5
   Libarchive 3.5.0 Released: Dec 1, 2020
    New features
     mtree digest reader support
     completed support for UTF-8 encoding conversion
     minor API enhancements
     support for system extended attributes
     support for decompression of symbolic links in zipx archives
    Important bugfixes
     fixed extraction of archives with hard links pointing to itself
     fixed writing of cpio archives containing hardlinks without file type
     fixed rdev field in cpio format for device nodes
     fixed uninitialized size in rar5_read_data
     fixed memory leaks in error case of archive_write_open() functions
   Libarchive 3.4.3 Released: May 20, 2020
    New features
     support for pzstd compressed files
     support for RHT.security.selinux tar extended attribute
    Important bugfixes
     various zstd fixes and improvements child process
     handling fixes
   Libarchive 3.4.2 Released: Feb 11, 2020
    New features
     Atomic file extraction support (bsdtar -x --safe-writes)
     mbed TLS (PolarSSL) support
    Important bugfixes
     security fixes in RAR5 reader
     compression buffer fix in XAR writer
     fix for uname and gname longer than 32 characters in PAX writer
     fix segfault when archiving hard links in ISO9660 and XAR writers
     fix support for extracting 7z archive entries with Delta filter
   Libarchive 3.4.1 Released: Dec 30, 2019
    New features
     Unicode filename support for reading lha/lzh archives
     New pax write option "xattrhdr"
    Important bugfixes
     security fixes in wide string processing
     security fixes in RAR5 reader
     security fixes and optimizations to write filter logic
     security fix related to use of readlink(2)
     sparse file handling fixes

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:08:12 +00:00
Michael Tremer
acf4b732a8 wireless-tools: Rootfile update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:04:00 +00:00
Michael Tremer
4eb98cec2b make.sh: Actually remove mtools from the build
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 17:03:44 +00:00
Adolf Belka
8387e8456e haproxy: Change to PAK_VER to ensure lua library link updated
- lua library update had a sobump and therefore linked packages require
  to have that updated

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:24:14 +00:00
Adolf Belka
ac266d99ab dnsdist: Change to PAK_VER to ensure lua library link updated
- lua library update had a sobump and therefore linked packages require
  to have that updated

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:24:09 +00:00
Adolf Belka
8977cdc8ff lua: Update to 5.4.3
- v2 patch version has required libraries not commented
- v2 patch version has lua.pc file commented out in the rootfile
     pkgconfig file is only required for build or development and not
     for normal running of IPFire
- v2 patch version has make linux changed to make all
     INSTALL_TOP is required - default is /usr/local
     INSTALL_DATA is required - default results in an empty rootfile
     TO_LIB is required - default results in only lua.a in rootfile
- v2 patch version includes PAK_VER updates for dnsdist and haproxy due to
     sobump. These packages showed up as dependencies to the old lua library
     ncat was also linked but already had a PAK_VER change due to a package
     upgrade and so no longer showed up in the find-dependencies scan
- Update from 5.3.5 to 5.4.3
- Autotoolize patch not update since 5.3 series
   Based on input from Michael Tremer implemented build approach
   from BLFS. This approach also used by Arch Linux. Updated lfs in
   line with approach. Added pkgconfig file lua.pc as used in BLFS.
- Update of shared_library patch obtained from BLFS
- Update of rootfile
- Removal of old lua-5.3.5 patches
- Changelog
   Main changes
     new generational mode for garbage collection
     to-be-closed variables
     const variables
     userdata can have multiple user values
     new implementation for math.random
     warning system
     debug information about function arguments and returns
     new semantics for the integer 'for' loop
     optional 'init' argument to 'string.gmatch'
     new functions 'lua_resetthread' and 'coroutine.close'
     string-to-number coercions moved to the string library
     allocation function allowed to fail when shrinking a memory block
     new format '%p' in 'string.format'
     utf8 library accepts codepoints up to 2^31

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:23:55 +00:00
Adolf Belka
e8a936c165 libupnp: Update to 1.14.6
- Update from 1.14.5 to 1.14.6
- Update of rootfile
- Changelog
   2021-04-19 Marcelo Roberto Jimenez <mroberto(at)users.sourceforge.net>
        Fix for a DNS Rebind exploit. A special thanks for the collaboration
        of the following people:
        - Alaric Senat
        - Fabrice Fontaine
        - Gabriel Corona
        - Ian Whyman
        - Jean-Francois Dockes
        - Marvin Scholz
        - Werner Mahr
   2021-04-06 Marcelo Roberto Jimenez <mroberto(at)users.sourceforge.net>
        Fix for Github #250:
        When upnp uses ixml to parse SOAP messages which contains too many
        node, services are unavailable.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:12:04 +00:00
Adolf Belka
4a83e28087 libtiff: Update to 4.3.0
- Update from 4.1.0 to 4.3.0
- Update of rootfile
- Changelog is too large to include here
   Full details can be found in ChangeLog file in source tarball
   49 bug fixes implemented between 4.1.0 and 4.3.0

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:11:49 +00:00
Michael Tremer
8061e4ba46 core157: Ship libjpeg
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:11:40 +00:00
Adolf Belka
dd58f381fa libjpeg: Update to 2.1.0
- Update from 2.0.4 to 2.1.0
- Update rootfile
- Changelog is too large to include here
   Full details can be found in ChangeLog.md file in source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:10:42 +00:00
Adolf Belka
5f588d60a0 libid3tag: Correction - comment out libid3tag.pc file in rootfile
- In previous patch libid3tag.pc file was left uncommented in the rootfile
   The pkg-config files are only required during the build or for
   development not for the normal operation of IPFire

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:09:54 +00:00
Michael Tremer
85f41901d9 core157: Ship xfsprogs
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:08:11 +00:00
Adolf Belka
ca3c7945b5 xfsprogs: Update to 5.9.0
- Update from 5.7.0 to 5.9.0
- Update of rootfile
- Changelog
   xfsprogs-5.9.0 (20 Oct 2020)
	- No further changes
   xfsprogs-5.9.0-rc1 (13 Oct 2020)
	- mkfs.xfs: disallow creation of RT files from proto file (Darrick Wong)
	- mkfs.xfs: fix ASSERT on small device with stripe geom (Pavel Reichl)
	- xfs_repair: more fixes from fuzz-testing (Darrick Wong)
	- libhandle: fix potential unterminated string problem (Darrick Wong)
	- libhandle: libfrog: fix a potential null pointer deref (Darrick Wong)
	- man: install all manpages that redirect to another page (Darrick Wong)
	- man: fix ioctl_xfs_geometry manpage naming (Eric Sandeen)
	- xfsprogs: various realtime related fixes (Darrick Wong)
	- xfsprogs: ignore autofs mount table entries (Ian Kent)
   xfsprogs-5.9.0-rc0 (17 Sep 2020)
	- libxfs changes merged from kernel 5.9
	- libxfs: make buffers track the per-ag structures (Darrick Wong)
   xfsprogs-5.8.0 (04 Sep 2020)
	- xfs_db: set b_ops to NULL for types without verifiers (Eric Sandeen)
   xfsprogs-5.8.0-rc1 (26 Aug 2020)
	- mkfs: allow setting dax flag on root directory (Darrick Wong)
	- xfs_quota: improve reporting and messages (Bill O'Donnell)
	- xfs_db: use correct inode to set inode type (Zorro Lang)
	- xfs_db: fix nlink usage in check (Darrick Wong)
	- xfs_db: report the inode dax flag (Darrick Wong)
	- man: update mkfs.xfs inode flag option documentation (Darrick Wong)
	- xfsprogs: move custom interface def'ns to new header (Eric Sandeen)
   xfsprogs-5.8.0-rc0 (10 Aug 2020)
	- xfs_repair: check quota counters (Darrick Wong)
	- xfs_io: fix -D vs -R handling (Xiao Yang)
	- libxfs changes merged from kernel 5.8

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:07:56 +00:00
Adolf Belka
dfbd7d4906 sqlite: Update to 3.35.5
- Update from 3.35.4 to 3.35.5
- Update of rootfile not required
- Changelog
   Fix defects in the new ALTER TABLE DROP COLUMN feature that could
    corrupt the database file.
   Fix an obscure query optimizer problem that might cause an incorrect
    query result.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:07:27 +00:00
Adolf Belka
31daeebd00 samba: Update to 4.14.3
- Update from 4.13.7 to 4.14.3
   Change to Samba 4.14 release series
    4.13 is now in maintenance mode
    4.14 is now the current stable release series
- Update of x86_64 rootfile
- Checked library changes with find-dependencies
   No linked programs found
- Changelog
   o  Trever L. Adams <trever.adams@gmail.com>
      * BUG 14671: s3:modules:vfs_virusfilter: Recent New_VFS changes break
        vfs_virusfilter_openat.
   o  Andrew Bartlett <abartlet@samba.org>
      * BUG 14586: build: Notice if flex is missing at configure time.
   o  Ralph Boehme <slow@samba.org>
      * BUG 14672: Fix smbd panic when two clients open same file.
      * BUG 14675: Fix memory leak in the RPC server.
      * BUG 14679: s3: smbd: fix deferred renames.
   o  Samuel Cabrero <scabrero@samba.org>
      * BUG 14675: s3-iremotewinspool: Set the per-request memory context.
   o  Volker Lendecke <vl@samba.org>
      * BUG 14675: Fix memory leak in the RPC server.
   o  Stefan Metzmacher <metze@samba.org>
      * BUG 11899: third_party: Update socket_wrapper to version 1.3.2.
      * BUG 14640: third_party: Update socket_wrapper to version 1.3.3.
   o  David Mulder <dmulder@suse.com>
      * BUG 14665: samba-gpupdate: Test that sysvol paths download in
        case-insensitive way.
   o  Sachin Prabhu <sprabhu@redhat.com>
      * BUG 14662: smbd: Ensure errno is preserved across fsp destructor.
   o  Christof Schmitt <cs@samba.org>
      * BUG 14663: idmap_rfc2307 and idmap_nss return wrong mapping for uid/gid
        conflict.
   o  Martin Schwenke <martin@meltin.net>
      * BUG 14288: build: Only add -Wl,--as-needed when supported.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:06:43 +00:00
Michael Tremer
729bea6838 Drop mtools
We are no longer generating any floppy disk images.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:06:03 +00:00
Adolf Belka
97650f4466 mtools: Update to 4.0.27
- Update from 3.9.10 (2007) to 4.0.27 (2021)
- Update of rootfile
- Changelog is too large to put here
   Full details can be found in the changelog file in the debian
   subdirectory of the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:03:38 +00:00
Michael Tremer
3a98973f01 core157: Ship libgcrypt
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:03:19 +00:00
Adolf Belka
01fea78b30 libgcrypt: Update to 1.9.3
- Update from 1.9.2 to 1.9.3
- Update of rootfile
- Changelog is too long to put here.
   Full details can be found in the ChangeLog file in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:02:51 +00:00
Michael Tremer
13efd70abd core157: Ship less
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:02:34 +00:00
Adolf Belka
04a654b4c5 less: Update to version 581
- Update from 563 to 581
- Update of rootfile not required
- Changelog
    Change ESC-u command to toggle, not disable, highlighting per man page.
    Add ESC-U command.
    Add ctrl-W search modifier for wrapping search.
    F command can be interrupted by ^X.
    Support OSC 8 hyperlinks when -R is in effect.
    g command with no number will ignore -j and put first line at top of screen.
    Multiple + or -p command line options are handled better.
    Add the --incsearch option.
    Add the --line-num-width option.
    Add the --status-col-width option.
    Add the --use-color and --color options.
    Display -w highlight even if highlighted line is empty.
    If search result is in a long line, scroll to ensure it is visible.
    Editing the same file under different names now creates only one entry in the file list.
    Make visual bell more visible on some terminals.
    Ring end-of-file bell no more than once per second.
    Build can use either Python or Perl for Makefile.aut operations.
    Fix crash when using the @ search modifier.
    Fix crash in the 's' command due to duplicate free.
    Fix realpath crash on Darwin.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-26 10:02:19 +00:00
Michael Tremer
f6babd950b openvmtools: Update rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 12:28:35 +00:00
Michael Tremer
16b587ca2e Drop python3-llfuse
See https://bugzilla.ipfire.org/show_bug.cgi?id=12611

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 12:14:34 +00:00
Michael Tremer
6a8be3e1f7 Config: Break when packaged files are missing
Fixes: #12609
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 11:52:43 +00:00
Michael Tremer
a7492c0f0d make.sh: Actually build Canary-Stability
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 11:52:24 +00:00
Michael Tremer
54836670fa core157: Ship pixman
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:10:13 +00:00
Adolf Belka
ea88fa90d3 pixman: Update to 0.40.0
- Update from 0.34.0 to 0.40.0
- Update of rootfile
- Changelog
   The ChangeLog and NEWS files in the source tarball are empty
   The only info on the changes is the git repository.
   https://cgit.freedesktop.org/pixman/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:09:59 +00:00
Michael Tremer
7d898984a3 core157: Ship openssh
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:09:49 +00:00
Adolf Belka
7fc236b40e openssh: Update to 8.6p1
- Update from 8.5p1 to 8.6p1
- Update of rootfile not needed
- Changelog
Future deprecation notice
It is now possible[1] to perform chosen-prefix attacks against the
SHA-1 algorithm for less than USD$50K.
In the SSH protocol, the "ssh-rsa" signature scheme uses the SHA-1
hash algorithm in conjunction with the RSA public key algorithm.
OpenSSH will disable this signature scheme by default in the near
future.
Note that the deactivation of "ssh-rsa" signatures does not necessarily
require cessation of use for RSA keys. In the SSH protocol, keys may be
capable of signing using multiple algorithms. In particular, "ssh-rsa"
keys are capable of signing using "rsa-sha2-256" (RSA/SHA256),
"rsa-sha2-512" (RSA/SHA512) and "ssh-rsa" (RSA/SHA1). Only the last of
these is being turned off by default.
This algorithm is unfortunately still used widely despite the
existence of better alternatives, being the only remaining public key
signature algorithm specified by the original SSH RFCs that is still
enabled by default.
The better alternatives include:
 * The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These
   algorithms have the advantage of using the same key type as
   "ssh-rsa" but use the safe SHA-2 hash algorithms. These have been
   supported since OpenSSH 7.2 and are already used by default if the
   client and server support them.
 * The RFC8709 ssh-ed25519 signature algorithm. It has been supported
   in OpenSSH since release 6.5.
 * The RFC5656 ECDSA algorithms: ecdsa-sha2-nistp256/384/521. These
   have been supported by OpenSSH since release 5.7.
To check whether a server is using the weak ssh-rsa public key
algorithm, for host authentication, try to connect to it after
removing the ssh-rsa algorithm from ssh(1)'s allowed list:
    ssh -oHostKeyAlgorithms=-ssh-rsa user@host
If the host key verification fails and no other supported host key
types are available, the server software on that host should be
upgraded.
OpenSSH recently enabled the UpdateHostKeys option by default to assist
the client by automatically migrating to better algorithms.
[1] "SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and
    Application to the PGP Web of Trust" Leurent, G and Peyrin, T
    (2020) https://eprint.iacr.org/2020/014.pdf
Security
 * sshd(8): OpenSSH 8.5 introduced the LogVerbose keyword. When this
   option was enabled with a set of patterns that activated logging
   in code that runs in the low-privilege sandboxed sshd process, the
   log messages were constructed in such a way that printf(3) format
   strings could effectively be specified the low-privilege code.
   An attacker who had sucessfully exploited the low-privilege
   process could use this to escape OpenSSH's sandboxing and attack
   the high-privilege process. Exploitation of this weakness is
   highly unlikely in practice as the LogVerbose option is not
   enabled by default and is typically only used for debugging. No
   vulnerabilities in the low-privilege process are currently known
   to exist.
   Thanks to Ilja Van Sprundel for reporting this bug.
Changes since OpenSSH 8.5
This release contains mostly bug fixes.
New features
 * sftp-server(8): add a new limits@openssh.com protocol extension
   that allows a client to discover various server limits, including
   maximum packet size and maximum read/write length.
 * sftp(1): use the new limits@openssh.com extension (when available)
   to select better transfer lengths in the client.
 * sshd(8): Add ModuliFile keyword to sshd_config to specify the
   location of the "moduli" file containing the groups for DH-GEX.
 * unit tests: Add a TEST_SSH_ELAPSED_TIMES environment variable to
   enable printing of the elapsed time in seconds of each test.
Bugfixes
 * ssh_config(5), sshd_config(5): sync CASignatureAlgorithms lists in
   manual pages with the current default. GHPR174
 * ssh(1): ensure that pkcs11_del_provider() is called before exit.
   GHPR234
 * ssh(1), sshd(8): fix problems in string->argv conversion. Multiple
   backslashes were not being dequoted correctly and quoted space in
   the middle of a string was being incorrectly split. GHPR223
 * ssh(1): return non-zero exit status when killed by signal; bz#3281
 * sftp-server(8): increase maximum SSH2_FXP_READ to match the maximum
   packet size. Also handle zero-length reads that are not explicitly
   banned by the spec.
Portability
 * sshd(8): don't mistakenly exit on transient read errors on the
   network socket (e.g. EINTR, EAGAIN); bz3297
 * Create a dedicated contrib/gnome-ssk-askpass3.c source instead of
   building it from the same file as used for GNOME2. Use the GNOME3
   gdk_seat_grab() to manage keyboard/mouse/server grabs for better
   compatibility with Wayland.
 * Fix portability build errors bz3293 bz3292 bz3291 bz3278
 * sshd(8): soft-disallow the fstatat64 syscall in the Linux
   seccomp-bpf sandbox. bz3276
 * unit tests: enable autoopt and misc unit tests that were
   previously skipped

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:09:12 +00:00
Adolf Belka
a6f4a466e8 nmap: Update to 7.91
- Update from 7.80 to 7.91
- Update of rootfile
- Changelog is too long to include here
   Full details can be found in the CHANGELOG file in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:09:06 +00:00
Adolf Belka
ee3b6ba0c7 ncat: Update to 7.91
- Update from 7.80 to 7.91
- Update of rootfile
- Changelog is too long to include here
   Full details can be found in the CHANGELOG file in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:08:59 +00:00
Michael Tremer
5f4ba90586 core157: Ship fuse
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:08:50 +00:00
Adolf Belka
6a2d0484ca fuse: Update to 3.10.3
- Update from 3.10.1 to 3.10.3
- Update of rootfile
- Changelog
   libfuse 3.10.3 (2021-04-12)
     * Fix returning d_ino and d_type from readdir(3) in non-plus mode
   libfuse 3.10.2 (2021-02-05)
     * Allow "nonempty" as a mount option, for backwards compatibility with fusermount 2. The
       option has no effect since mounting over non-empty directories is allowed by default.
     * Fix returning inode numbers from readdir() in offset==0 mode.
     * FUSE filesystems can now be mounted underneath EXFAT mountpoints.
     * Various minor bugfixes.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:08:15 +00:00
Michael Tremer
d8cb7ecaa0 core157: Ship Digest
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:08:06 +00:00
Adolf Belka
694e21bb13 Digest: Update to 1.19
- Update from 1.08 to 1.19
- Update of rootfile
- Changelog
   1.19 Tue 2020-10-13
     - Merge blead change: Remove . from @INC when loading optional modules.
   1.18 Tue 2020-10-13
     - Correct documentation for add_bits
     - Explain $args,... in constructor prototypes
     - Add base64_padded_digest method
     - Add support for the SHA3 digests
     - Update .gitignore and get make manifest working
     - Github CI
     - Move Digest to a more modern directory tree layout
     - Enable strict/warnings for code and tests
     - Drop use vars
     - Provide a consistent tidy to the code base
     - Get rid of the use of bareword file handles
     - Modernize the changelog
     - Use File::Temp for temporary test files
   1.17 Sun 2011-10-02
     - Less noisy 'git status' output - Gisle Aas
     - Merge pull request #1 from schwern/bug/require_eval - Gisle Aas
     - Don't clobber $@ in Digest->new [RT#50663] - Gisle Aas
     - More meta info added to Makefile.PL - Gisle Aas
     - Fix typo in RIPEMD160 [RT#50629] - Gisle Aas
     - Add schwern's test files - Gisle Aas
     - Turn on strict. - Michael G. Schwern
     - Convert tests to use Test::More - Michael G. Schwern
     - Untabify - Michael G. Schwern
     - Turn Digest::Dummy into a real file which exercises the Digest->new() require logic. - Michael G. Schwern
     - Close the eval "require $module" security hole in Digest->new($algorithm) - Michael G. Schwern
   1.16 Tue 2009-06-09
     - For SHA-1 try Digest::SHA before tryign Digest::SHA1 as suggested by Adam Trickett - Gisle Aas
     - Support Digest->new("RIPEMD-160") as suggested by Zefram - Gisle Aas
     - Use 3-arg open for fewer surprises - Gisle Aas
     - Sync up with EBCDIC changes from core perl - Jarkko Hietaniemi
   1.15 Mon 2006-03-20
     - Improved documentation.
   1.14 Sat 2005-11-26
     - Documentation tweaks.
   1.13 Tue 2005-10-18
     - Fixed documentation typo.
   1.12 Thu 2005-09-29
     - Fix documentation typo.  Patch by <steve@fisharerojo.org>.
   1.11 Sun 2005-09-11
     - Make Digest->new("SHA-224") work.  Patch by Mark Shelor <shelor@cpan.org>.
   1.10 Mon 2004-11-08
     - Added Digest::file module which provide convenience functions that calculate digests of files.
   1.09 Fri 2004-11-05
     - Fix trivial documentation typo.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:07:51 +00:00
Michael Tremer
0030b84c82 core157: Ship dejavu-fonts-ttf
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:07:04 +00:00
Adolf Belka
ea84e5ef34 dejavu-fonts-ttf: Update to 2.37
- Update from 2.33 to 2.37
- Update of rootfile
- Changelog
Changes from 2.35 to 2.36
  * Fix issue with empty glyphs in condensed typefaces in the released source files.
  * Math: added DejaVu Math Tex Gyre by B. Jackowski, P. Strzelczyk and
    P. Pianowski (on behalf of TeX users groups)
  * Sans: removed dot of U+06BA in all forms
  * Sans: fixed position of three dots of U+06BD in init and medi forms (by
    Denis Jacquerye)
  * Sans: corrected direction of contours in U+05E7 (by Lior Halphon)
  * Sans: added U+1F643  (by Olleg Samoylov)
  * Serif: moved up U+0360-0361 (by Gee Fung Sit 薛至峰)
  * Serif: increased spacing of Roman numerals U+2161-2163, U+2165-2168,
    U+216A-216B (by Gee Fung Sit 薛至峰)
  * Serif: fixed anchor position of U+00E6 (by Gee Fung Sit 薛至峰)
  * Sans: fixed vertical position of U+20BA (by Gee Fung Sit 薛至峰)
  * Sans, Serif: fixed glyph height of Block Elements (by Gee Fung Sit 薛至峰)
  * Sans, Serif: added U+A698-A699 (by Gee Fung Sit 薛至峰)
  * Sans, Mono, Serif: added U+037F (by Gee Fung Sit 薛至峰)
  * Mono: added U+0376-0377, U+037B-037D (by Gee Fung Sit 薛至峰)
  * Serif: removed duplicate point from U+1D05 (by Gee Fung Sit 薛至峰)
  * Mono: added U+20BA, U+20BD (by Gee Fung Sit 薛至峰)
  * Sans: added moon symbols U+1F311-1F318 (by Ben Laenen)
Changes from 2.34 to 2.35
  * Sans, SansMono, Serif: added U+0E3F, U+A7F8-U+A7F9 (by Gee Fung Sit 薛至峰)
  * Sans, SansMono, Serif: moved inverted marks U+00A1, U+00BF, U+2E18 to x-height
    and added 'case' feature using original glyphs+hints (by Gee Fung Sit 薛至峰)
  * Sans, SansMono, Serif: fixed glyph heights in Box Drawing block (by Gee Fung
    Sit 薛至峰)
  * SansMono, Serif: adjusted U+016E to prevent cut-off (by Gee Fung Sit 薛至峰)
  * Sans: added U+269E-U+269F (by Lars Næsbye Christensen)
  * Sans: added U+06C7-U+06C8, U+06CB, U+06D0 and their presentation forms
    U+FBD7-U+FBD8, U+FBDB-U+FBDC, U+FBDE-U+FBDF, U+FBE4-U+FBE7 (by MihailJP)
  * Sans: added isolated, initial and stretched forms in the Arabic Mathematical
    Alphabetic Symbols block, U+1EE00 et seq. (by Gee Fung Sit 薛至峰)
  * Sans: restored GSUB tables for Hebrew (by Gee Fung Sit 薛至峰)
  * Sans: fixed U+1D301-U+1D303 (bug 73532) (by Gee Fung Sit 薛至峰)
  * Sans: fixed instructions for U+0394, U+039B in Bold (bug 16442) (by Gee Fung
    Sit 薛至峰)
  * Sans: minor improvements/fixes to U+07D4, U+203D, U+20A6, U+20BA, U+2E18,
    U+A782-U+A783 (by Gee Fung Sit 薛至峰)
  * Sans: moved U+2E1F to correct code point, was off by one (by Gee Fung Sit
    薛至峰)
  * SansExtraLight: added U+0184-U+0185, U+019B, U+01B7-U+01B9, U+01EE-U+01EF,
    U+0292, U+0298, U+0E3F, U+04E0-U+04E1, U+0516-U+0519 (by Gee Fung Sit 薛至峰)
  * SansMono: added U+203F, U+2150-U+2151, U+2189, U+220E, U+2210, U+2223,
    U+228D-U+228E, U+2293-U+2294, U+22B2-U+22B5, U+22B8, U+22C2-U+22C3,
    U+22CE-U+22D1, U+27DC, U+27EA-U+27EB, U+27F5-U+27F7, U+2987-U+2988,
    U+2997-U+2998, U+2A00 (by Gee Fung Sit 薛至峰)
  * SansMono: minor improvements/fixes to U+018C and U+018D, U+026F-U+0270 (by
    Gee Fung Sit 薛至峰)
  * SansMono: fixed glyph heights in Block Elements block (bug 14316) (by Gee
    Fung Sit 薛至峰)
  * Serif: replaced inverted breve on U+0202, U+0206, U+020A, U+020E, U+0212,
    U+0216 with its case form to prevent cut-off (by Gee Fung Sit 薛至峰)
  * Serif: redesigned/redrawn U+01E5, U+025E, U+0262, U+0277-U+0278,
    U+029A-U+029B (by Gee Fung Sit 薛至峰)
  * Serif: minor improvements/fixes to U+00DF, U+017B, U+01E4, U+0265,
    U+026F-U+0270, U+0280-U+0281, U+0294-U+0297, U+029F, U+02A1-U+02A2, U+03FB,
    U+1D0C, U+20A6, U+20B8, U+A731 (by Gee Fung Sit 薛至峰)
  * Serif: added stylistic alternatives for U+0110-U+0111, U+01E4-U+01E5 (by Gee
    Fung Sit 薛至峰)
  * Serif: added or adjusted anchors for U+0294, U+0256, U+041D (by Denis
    Jacquerye)
  * Sans, Serif: added OpenType MATH table (by Frédéric Wang)
  * Sans, Serif: added displaystyle math operators (by Frédéric Wang)
  * Serif: added italic mathematical alphanumeric characterd (by Frédéric Wang)
  * Serif: added construction for stretchy radical symbol (by Frédéric Wang)
  * Serif: added stylistic ssty variants for prime symbols
  * Sans, Serif: fixed incorrect glyph for U+22C4 (by Gee Fung Sit 薛至峰)
  * SansMono: added U+22C4 (by Gee Fung Sit 薛至峰)
  * SansMono: added to U+2336, U+233F-U+2340, U+2345-U+2346, U+234A,
    U+234E-U+234F, U+2351, U+2355-U+2356, U+235D, U+2361-U+2362, U+2366-U+2367,
    U+236A, U+2371-U+2372 (by Sami Tarazi)
  * Serif: added U+20BA (by Gee Fung Sit 薛至峰)
  * Sans, Serif: added U+20BD (by Gee Fung Sit 薛至峰)
Changes from 2.33 to 2.34
  * Sans, SansMono, Serif: unlinked references of U+2596 for bug 50848
    (by Denis Jacquerye)
  * Sans, SansMono, Serif: added U+A7AA (by Denis Jacquerye)
  * Sans, SansMono, Serif: added U+2A6A, U+2A6B, U+2E1F based on U+223B
    (by Denis Jacquerye)
  * Sans, Serif: removed superfluous ligature definitions for ffl und ffi
    (bug 55363) (by Gee Fung Sit 薛至峰)
  * Sans, Serif: swapped glyphs for U+25D2 and U+25D3 (bug 55197)
    (by Gee Fung Sit 薛至峰)
  * Sans, Serif: added U+A740, U+A741 (by Denis Jacquerye)
  * Sans: added U+20BA Turkish Lira sign (by Denis Jacquerye)
  * Sans: replaced Georgian Asomtavruli U+10A0-U+10C5 and Mkhedruli U+10D0-U+10FC
     with new version (by Besarion Gugushvili)
  * Sans: added Georgian Nuskhuri U+2D00-U+U+2D25 (by Besarion Gugushvili)
  * Sans: added Private Use Area glyphs for Georgian U+F400-U+F441
    (by Besarion Gugushvili)
  * Sans: tweaked U+0250, U+0254 (by Denis Jacquerye)
  * Sans: adjusted hinting of U+032C-U+032D, avoiding problem on some platforms
    (by Denis Jacquerye)
  * Sans: added U+A7A0-U+A7A9, pre-1921 Latvian letters with oblique stroke
    (by Denis Jacquerye)
  * Sans: added anchors to U+2C6D (by Denis Jacquerye)
  * Sans: added cedilla anchor to some Latin characters (by Denis Jacquerye)
  * Sans: added ogonek anchor to A, E, O, U, Y (by Denis Jacquerye)
  * Sans: adjusted ogonek reference in U+0172, U+01EA, U+01EB
    (by Denis Jacquerye)
  * Sans: added anchors to U+0104, U+0105 (by Denis Jacquerye)
  * Sans: added U+1F600, U+1F611, U+1F615, U+1F617, U+1F619, U+1F61B, U+1F61F,
    U+1F626-U+1F627, U+1F62E-U+1F62F, U+1F634 (by Gee Fung Sit 薛至峰)
  * Sans: replaced U+27A1 with mirror image of U+2B05 for consistency
    (by Gee Fung Sit 薛至峰)
  * Sans: copied hints from U+14A3, U+14A7 to U+2142-U+2143
    (by Gee Fung Sit 薛至峰)
  * Sans: added Lisu block (by Gee Fung Sit 薛至峰)
  * Sans: typographical improvements to U+0166-U+0167, U+02A6, U+02AA
    (by Gee Fung Sit 薛至峰)
  * Sans: slightly change hinting of "2" to fix bug 37395 (by Ben Laenen)
  * Sans: fixed U+1444 which had wrong top dot that shouldn't be there
    (by Denis Jacquerye)
  * Sans: added anchors for diacritics to U+01B7, U+01B8, U+01B9, U+0292
    (by Denis Jacquerye)
  * Sans: added U+01B7, U+01B8 to context for case diacritics above
  * SansMono: fixed U+0574 (by Ruben Hakobian)
  * SansMono: added U+2016, U+27C2 (by Yoshiki Ohshima)
  * SansMono: added U+02CE, U+02CF (by Denis Jacquerye)
  * SansMono: added U+2148, U+27E6-U+27E7, U+2B05-U+2B0D, U+1D55A
    (by Gee Fung Sit 薛至峰)
  * Serif: added U+02BA, U+02C2-U+02C5, U+02CA-U+02CB, U+02D7, U+02F3, U+02F7,
    U+046C-U+046D, U+0476-U+0477, U+1D7C-U+1D7F, U+20B8, U+2132, U+214E, U+2C7B
    to Serif (by Gee Fung Sit 薛至峰)
  * Serif: typographic improvements to U+0194, U+01B1, U+0263, U+028A, U+02A6,
    U+02A8, U+02AA, U+02E0, U+03DC, U+1D3B, U+1D7B (by Gee Fung Sit 薛至峰)
  * Serif: added small cap versions of q, x (in italic styles), delta, theta, xi,
    sigma, phi, omega, not wired in yet (by Gee Fung Sit 薛至峰)
  * Serif: added anchors to U+0234-U+0236 (by Gee Fung Sit 薛至峰)
  * Serif: added U+02EC, U+02EF, U+02F0, U+0360 (by Denis Jacquerye)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:06:45 +00:00
Michael Tremer
f8e8b5307f core157: Ship curl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:06:35 +00:00
Adolf Belka
d5b6dfba96 curl: Update to 7.76.1
- Update from 7.75.0 to 7.76.1
- Update of rootfile
- Changelog is too large to include here.
   Full details can be found in the CHANGES file in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:06:16 +00:00
Michael Tremer
43988191e6 core157: Crypt-PasswdMD5
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-20 09:05:57 +00:00