Commit Graph

17308 Commits

Author SHA1 Message Date
Arne Fitzenreiter
efcd60effb core162: add connections.cgi
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-24 08:56:23 +00:00
Arne Fitzenreiter
d4df452e1b connections.cgi: fix connection list if green interface is not present
if green interface not exist the cgi adds empty addresses to the arrays and
display nothing.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-24 07:54:47 +00:00
Arne Fitzenreiter
654eb3c3c5 core162: add unbound initskript
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-24 07:52:04 +00:00
Arne Fitzenreiter
cd26578fc9 unbound: initskript change server for dns test
if the system time is incorrect DNSSec validation fail but it fails sometimes for pool.ntp.org already but not for ping.ipfire.org.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-24 07:44:14 +00:00
Arne Fitzenreiter
90aa257477 kernel: update to 5.15.4
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-24 07:42:25 +00:00
Arne Fitzenreiter
2a8a964609 core162: apply local sshd config and restart
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-24 02:46:45 +00:00
Arne Fitzenreiter
d63838f4b9 core162: remove old kernel
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-24 02:43:47 +00:00
Arne Fitzenreiter
93b4cc6c91 core162: add changed files to updater
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-24 02:42:31 +00:00
Arne Fitzenreiter
2d62dd5fa6 start core162 (based on kerneltest-5.15)
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-23 18:08:39 +00:00
Arne Fitzenreiter
171c860f0f Merge remote-tracking branch 'arne_f/kernel-5.15' into next 2021-11-23 18:05:41 +00:00
Arne Fitzenreiter
6f6d66105a kernel: rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-21 19:31:49 +01:00
Arne Fitzenreiter
d4a6dc4270 kernel: update to 5.15.3
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-21 10:56:26 +00:00
Arne Fitzenreiter
521e8aa99d kernel: aarch64 enable ath5k wlan driver
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-20 23:38:06 +00:00
Michael Tremer
7091738a5c QoS: Do not try to unload any kernel modules
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2021-11-19 07:30:26 +01:00
Michael Tremer
1f9adf14a7 dnsdist: Update to 1.6.1
This patch makes this package available for aarch64. There are no
reasons why it shouldn't be.

Compiling has become more resource-hungry which is why the memory
consumption per process has been upped to 3GiB.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2021-11-19 07:20:07 +01:00
Leo-Andres Hofmann
fa7735b68e Fix translations and clean general-functions.pl
This patch fixes two wrong translations now used by the new
user manual links feature and removes an abandoned constant.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
2021-11-19 07:18:29 +01:00
Leo-Andres Hofmann
4edcd4b217 make.sh: Add check-manualpages function
This patch adds a function to verify the user manual links
configuration file at build time.
Run with "./make.sh check-manualpages"

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2021-11-19 07:18:25 +01:00
Leo-Andres Hofmann
b0323d1946 webinterface: Add links to the configuration wiki
This patch adds a little "help" icon to the page header.
If a manual entry exists for a configuration page, the icon
appears and offers a quick way to access the wiki.
Wiki pages can be configured in the "manualpages" file.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2021-11-19 07:18:20 +01:00
Adolf Belka
0ad924b1c1 libffi: Update to version 3.4.2
- Update from 3.3 to 3.4.2
- Update rootfile - No dependency issues due to so bump
- Changelog
   3.4.2 Jun-28-21
     Add static trampoline support for Linux on x86_64 and ARM64.
     Add support for Alibaba's CSKY architecture.
     Add support for Kalray's KVX architecture.
     Add support for Intel Control-flow Enforcement Technology (CET).
     Add support for ARM Pointer Authentication (PA).
     Fix 32-bit PPC regression.
     Fix MIPS soft-float problem.
     Enable tmpdir override with the $LIBFFI_TMPDIR environment variable.
     Enable compatibility with MSVC runtime stack checking.
     Reject float and small integer argument in ffi_prep_cif_var().
       Callers must promote these types themselves.
   3.3 Nov-23-19
     Add RISC-V support.
     New API in support of GO closures.
     Add IEEE754 binary128 long double support for 64-bit Power
     Default to Microsoft's 64-bit long double ABI with Visual C++.
     GNU compiler uses 80 bits (128 in memory) FFI_GNUW64 ABI.
     Add Windows on ARM64 (WOA) support.
     Add Windows 32-bit ARM support.
     Raw java (gcj) API deprecated.
     Add pre-built PDF documentation to source distribution.
     Many new test cases and bug fixes.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2021-11-19 07:16:19 +01:00
Adolf Belka
cf910913ab gawk: Update to version 5.1.1
- Update from 5.1.0 to 5.1.1
- Update rootfile
- Changelog is quite long and detailed so the following are the high level descriptions
   of the changes from the NEWS file in the source tarball. More details can be found in
   the ChangeLog file in the source tarball.
    Changes from 5.1.0 to 5.1.1
     1. Infrastructure upgrades: Bison 3.8, Gettext 0.20.2, Automake 1.16.4,
        and (will wonders never cease) Autoconf 2.71.
     2. asort and asorti now allow FUNCTAB and SYMTAB as the first argument if a
        second destination array is supplied. Similarly, using either array as
        the second argument is now a fatal error. Additionally, using either
        array as the destination for split(), match(), etc. also causes a
        fatal error.
     3. The new -I/--trace option prints a trace of the byte codes as they
        are executed.
     4. A number of subtle bugs relating to MPFR mode that caused differences
        between regular operation and MPFR mode have been fixed.
     5. The API now handles MPFR/GMP values slightly differently, requiring
        different memory management for those values. See the manual for the
        details if you have an extension using those values.  As a result,
        the minor version was incremented.
     6. $0 and the fields are now cleared before starting a BEGINFILE rule.
     7. The duplication of m4 and build-aux directories between the main
        directory and the extension directory has been removed. This
        simplifies the distribution.
     8. The test suite has been improved, making it easier to run the entire
        suite with -M. Use `GAWK_TEST_ARGS=-M make check' to do so.
     9. Profiling and pretty-printing output has been modified slightly so
        that functions are presented in a reasonable order with respect
        to the namespaces that contain them.
     10. Several example programs in the manual have been updated to their
         modern POSIX equivalents.
     11. A number of examples in doc/gawkinet.texi have been updated for
         current times. Thanks to Juergen Kahrs for the work.
     12. Handling of Infinity and NaN values has been improved.
     13. There has been a general tightening up of the use of const and
         of types.
     14. The "no effect" lint warnings have been fixed up and now behave
         more sanely.
     15. The manual has been updated with much more information about what is
         and is not a bug, and the changes in the gawk mailing lists.
     16. The behavior of strongly-typed regexp constants when passed as the
         third argument to sub() or gsub() has been clarified in the code and
         in the manual.
     17. Similar to item #4 above, division by zero is now fatal in MPFR
         mode, as it is in regular mode.
     18. There have been numerous minor code cleanups and bug fixes. See the
         ChangeLog for details.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2021-11-19 07:16:02 +01:00
Adolf Belka
692c22519d libxcrypt: Update to version 4.4.26
- v2 version is to extend from 4.4.25 to 4.4.26
- Update from 4.4.23 to 4.4.26
- Update of rootfile not required
- Changelog
   Version 4.4.26
    * Fix compilation on systems with GCC >= 10, that do not support
      declarations with __attribute__((symver)).
   Version 4.4.25
    * Add support for Python 3.11 in the configure script.
    * Stricter checking of invalid salt characters (issue #135).
      Hashed passphrases are always entirely printable ASCII, and do
      not contain any whitespace or the characters ':', ';', '*', '!',
      or '\'.  (These characters are used as delimiters and special
      markers in the passwd(5) and shadow(5) files.)
   Version 4.4.24
    * Add hash group for Debian in lib/hashes.conf.
      Debian has switched to use the yescrypt hashing algorithm as
      the default for new user passwords, so we should add a group
      for this distribution.
    * Overhaul the badsalt test.
      Test patterns are now mostly generated rather than manually coded
      into a big table.  Not reading past the end of the “setting” part
      of the string is tested more thoroughly (this would have caught the
      sunmd5 $$ bug if it had been available at the time).
      Test logs are tidier.
    * Add ‘test-programs’ utility target to Makefile.
      It is sometimes useful to compile all the test programs but not run
      them.  Add a Makefile target that does this.
    * Fix incorrect bcrypt-related ifdeffage in test/badsalt.c.
      The four variants of bcrypt are independently configurable, but the
      badsalt tests for them were all being toggled by INCLUDE_bcrypt,
      which is only the macro for the $2b$ variant.
    * Fix bigcrypt-related test cases in test/badsalt.c.
      The test spec was only correct when both or neither of bigcrypt and
      descrypt were enabled.
    * Detect ASan in configure and disable incompatible tests.
      ASan’s “interceptors” for crypt and crypt_r have a semantic conflict
      with libxcrypt, requiring a few tests to be disabled for builds with
      -fsanitize-address.  See commentary in test/crypt-badargs.c for an
      explanation of the conflict, and the commentary in
      build-aux/zw_detect_asan.m4 for why a configure test is required.
    * Fix several issues found by Covscan in the testsuite.  These include:
      - CWE-170: String not null terminated (STRING_NULL)
      - CWE-188: Reliance on integer endianness (INCOMPATIBLE_CAST)
      - CWE-190: Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN)
      - CWE-569: Wrong sizeof argument (SIZEOF_MISMATCH)
      - CWE-573: Missing varargs init or cleanup (VARARGS)
      - CWE-687: Argument cannot be negative (NEGATIVE_RETURNS)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2021-11-19 07:14:18 +01:00
Stefan Schantl
0341e11fe1 fwhosts.cgi: Fix check to limit amount of ports in custom service groups.
iptables multiport only supports up to 15 elements for each protocol (TCP or UDP).
That can be single ports or portranges (they count doubble).

This commit extends the check to calculate the amount of used TCP and/or
UDP ports of all existing entries in a group, by increasing the amount
for the service which should be added.

If the amount of ports for TCP or UDP ports become greater than the
limit of 15 the error message will be displayed.

Fixes #11323.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2021-11-19 07:13:42 +01:00
Stefan Schantl
fe6b3e502b ddns: Add upstream patch to fix a typo for FreeDNSAfraid.org provider
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Reported-by: Bernhard Bitsch <bbitsch@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
2021-11-19 07:13:13 +01:00
Adolf Belka
f877c07e4d openssh: Update to version 8.8p1
- Update from 8.7p1 to 8.8p1
- Update of rootfile not required
- Changelog
   OpenSSH 8.8p1
    Future deprecation notice
     A near-future release of OpenSSH will switch scp(1) from using the
      legacy scp/rcp protocol to using SFTP by default.
     Legacy scp/rcp performs wildcard expansion of remote filenames (e.g.
      "scp host:* .") through the remote shell. This has the side effect of
      requiring double quoting of shell meta-characters in file names
      included on scp(1) command-lines, otherwise they could be interpreted
      as shell commands on the remote side.
     This creates one area of potential incompatibility: scp(1) when using
      the SFTP protocol no longer requires this finicky and brittle quoting,
      and attempts to use it may cause transfers to fail. We consider the
      removal of the need for double-quoting shell characters in file names
      to be a benefit and do not intend to introduce bug- compatibility for
      legacy scp/rcp in scp(1) when using the SFTP protocol.
     Another area of potential incompatibility relates to the use of remote
      paths relative to other user's home directories, for example -
      "scp host:~user/file /tmp". The SFTP protocol has no native way to
      expand a ~user path. However, sftp-server(8) in OpenSSH 8.7 and later
      support a protocol extension "expand-path@openssh.com" to support
      this.
    Security
     sshd(8) from OpenSSH 6.2 through 8.7 failed to correctly initialise
      supplemental groups when executing an AuthorizedKeysCommand or
      AuthorizedPrincipalsCommand, where a AuthorizedKeysCommandUser or
      AuthorizedPrincipalsCommandUser directive has been set to run the
      command as a different user. Instead these commands would inherit
      the groups that sshd(8) was started with.
     Depending on system configuration, inherited groups may allow
      AuthorizedKeysCommand/AuthorizedPrincipalsCommand helper programs to
      gain unintended privilege.
     Neither AuthorizedKeysCommand nor AuthorizedPrincipalsCommand are
      enabled by default in sshd_config(5).
    Potentially-incompatible changes
     This release disables RSA signatures using the SHA-1 hash algorithm
     by default. This change has been made as the SHA-1 hash algorithm is
      cryptographically broken, and it is possible to create chosen-prefix
      hash collisions for <USD$50K [1]
     For most users, this change should be invisible and there is
      no need to replace ssh-rsa keys. OpenSSH has supported RFC8332
      RSA/SHA-256/512 signatures since release 7.2 and existing ssh-rsa keys
      will automatically use the stronger algorithm where possible.
    Changes since OpenSSH 8.7p1
      This release is motivated primarily by the above deprecation and
       security fix.
      New features
        * ssh(1): allow the ssh_config(5) CanonicalizePermittedCNAMEs
          directive to accept a "none" argument to specify the default
          behaviour.
      Bugfixes
        * scp(1): when using the SFTP protocol, continue transferring files
          after a transfer error occurs, better matching original scp/rcp
          behaviour.
        * ssh(1): fixed a number of memory leaks in multiplexing,
        * ssh-keygen(1): avoid crash when using the -Y find-principals
          command.
        * A number of documentation and manual improvements, including
          bz#3340, PR139, PR215, PR241, PR257
      Portability
        * ssh-agent(1): on FreeBSD, use procctl to disable ptrace(2)
        * ssh(1)/sshd(8): some fixes to the pselect(2) replacement
          compatibility code. bz#3345

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2021-11-19 07:12:14 +01:00
Adolf Belka
f97e922c51 openvpn: Update to version 2.5.4
- Update from 2.5.0 to 2.5.4
- Update rootfile
- Tested new version in vm testbed. Openvpn server successfully started.
   Client connections working with 2.5.0 also successfully worked with 2.5.4
- Changelog
   Overview of changes in 2.5.4
    Bugfixes
     - fix prompting for password on windows console if stderr redirection
       is in use - this breaks 2.5.x on Win11/ARM, and might also break
       on Win11/adm64 when released.
     - fix setting MAC address on TAP adapters (--lladdr) to use sitnl
       (was overlooked, and still used "ifconfig" calls)
     - various improvements for man page building (rst2man/rst2html etc)
     - minor bugfix with IN6_IS_ADDR_UNSPECIFIED() use (breaks build on
       at least one platform strictly checking this)
     - fix minor memory leak under certain conditions in add_route() and
       add_route_ipv6()
    User-visible Changes
     - documentation improvements
     - copyright updates where needed
     - better error reporting when win32 console access fails
    New features
     - also build man page on Windows builds
   Overview of changes in 2.5.3
    Bugfixes
     - CVE-2121-3606
       see https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements
       OpenVPN windows builds could possibly load OpenSSL Config files from
       world writeable locations, thus posing a security risk to OpenVPN.
       As a fix, disable OpenSSL config loading completely on Windows.
     - disable connect-retry backoff for p2p (--secret) instances
       (Trac #1010, #1384)
     - fix build with mbedtls w/o SSL renegotiation support
     - Fix SIGSEGV (NULL deref) receiving push "echo" (Trac #1409)
     - MSI installers: properly schedule reboot in the end of installation
     - fix small memory leak in free_key_ctx for auth_token
    User-visible Changes
     - update copyright messages in files and --version output
    New features
     - add --auth-token-user option (for --auth-token deployments without
       --auth-user-pass in client config)
     - improve MSVC building for Windows
     - official MSI installers will now contain arm64 drivers and binaries
       (x86, amd64, arm64)
   Overview of changes in 2.5.2
    Bugfixes
     - CVE-2020-15078
       see https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements
       This bug allows - under very specific circumstances - to trick a
       server using delayed authentication (plugin or management) into
       returning a PUSH_REPLY before the AUTH_FAILED message, which can
       possibly be used to gather information about a VPN setup.
       In combination with "--auth-gen-token" or an user-specific token auth
       solution it can be possible to get access to a VPN with an
       otherwise-invalid account.
     - restore pushed "ping" settings correctly on a SIGUSR1 restart
     - avoid generating unecessary mbed debug messages - this is actually
       a workaround for an mbedTLS 2.25 bug when using Curve25519 and Curve448
       ED curves - mbedTLS crashes on preparing debug infos that we do not
       actually need unless running with "--verb 8"
     - do not print inlined (<dh>...</dh>) Diffie Hellman parameters to log file
     - fix Linux/SITNL default route lookup in case of multiple routing tables
       with more than one default route present (always use "main table" for now)
     - Fix CRL file handling in combination with chroot
    User-visible Changes
     - OpenVPN will now refuse to start if CRL file is not present at startup
       time.  At "reload time" absense of the CRL file is still OK (and the
       in memory copy is used) but at startup it is now considered an error.
    New features
     - printing of the TLS ciphers negotiated has been extended, especially
       displaying TLS 1.3 and EC certificates more correctly.
   Overview of changes in 2.5.1
    New features
     - "echo msg" support, to enable the server to pushed messages that are
       then displayed by the client-side GUI.  See doc/gui-notes.txt and
       doc/management-notes.txt.
       Supported by the Windows GUI shipped in 2.5.1, not yet supported by
       Tunnelblick and the Android GUI.
    User-visible Changes
     - make OPENVPN_PLUGIN_ENABLE_PF plugin failures FATAL - if a plugin offers
       to set the "openvpn packet filter", and returns a failure when requested
       to, OpenVPN 2.5.0 would crash trying to clean up not-yet-initialized
       structure members.  Since PF is going away in 2.6.0, this is just turning
       the crash into a well-defined program abort, and no further effort has
       been spent in rewriting the PF plugin error handling (see trac #1377).
    Documentation
     - rework sample-plugins/defer/simple.c - this is an extensive rewrite
       of the plugin to bring code quality to acceptable standards and add
       documentation on the various plugin API aspects.  Since it's just
       example code, filed under "Documentation", not under "Bugfix".
     - various man page improvements.
     - clarify ``--block-ipv6`` intent and direction
    Bugfixes
     - fix installation of openvpn.8 manpage on systems without docutils.
     - Windows: fix DNS search list setup for domains with "-" chars.
     - Fix tls-auth mismatch OCC message when tls-cryptv2 is used.
     - Windows: Skip DHCP renew with Wintun adapter (Wintun does not support
       DHCP, so this was just causing an - harmless - error and needless delay).
     - Windows: Remove 1 second delay before running netsh - speeds up
       interface init for wintun setups not using the interactive service.
     - Windows: Fix too early argv freeing when registering DNS - this would
       cause a client side crash on Windows if ``register-dns`` is used,
       and the interactive service is not used.
     - Android: Zero initialise msghdr prior to calling sendmesg.
     - Fix line number reporting on config file errors after <inline> segments
       (see Trac #1325).
     - Fix port-share option with TLS-Crypt v2.
     - tls-crypt-v2: also preload tls-crypt-v2 keys (if --persist-key), otherwise
       dropping privs on the server would fail.
     - tls-crypt-v2: fix server memory leak (about 600 bytes per connecting
       client with tls-crypt-v2)
     - rework handling of server-pushed ``--auth-token`` in combination with
       ``--auth-nocache`` on reconnection / TLS renegotiation events.  This
       used to "forget" to update new incoming token after a reconnection event
       (leading to failure to reauth some time later) and now works in all
       tested cases.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2021-11-19 07:11:50 +01:00
Adolf Belka
acbd6ff4db ovpnmain.cgi: Bug 12574 - OpenVPN Internal server error when returning after generating root/host certificates
- Option "--secret" was deprecated in OpenVPN 2.4 and removed in OpenVPN 2.5
   It was replaced by "secret". If "--secret" is used with genkey then a user warning is
   printed and this is what gives the Internal server error.
- Patch was defined by Erik Kapfer but currently he does not have a build environment
   so I have submitted the patch on his behalf.
- Patch tested on a vm testbed running Core Update 160. Confirmed that without patch the
   error still occurs and with patch everything runs smoothly.

Fixes: Bug #12574
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by : Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2021-11-19 07:11:08 +01:00
Michael Tremer
ced15fdfaf installer: Bind-mount /sys/firmware/efi/efivars into chroot
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2021-11-19 07:08:57 +01:00
Michael Tremer
27944cdc4a installer: Setup efivarfs when possible
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2021-11-19 07:08:53 +01:00
Michael Tremer
76050bdcf2 mountkernfs: Mount /sys/firmware/efi/efivars on EFI systems
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2021-11-19 07:08:48 +01:00
Matthias Fischer
0b2aa5173d Patch 'log.dat' to show 'monit' messages in system logs
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2021-11-19 07:07:48 +01:00
Matthias Fischer
e8c75ca765 knot: Update to 3.1.1
For changes since 3.0.7, see:
https://gitlab.nic.cz/knot/knot-dns/raw/v3.1.1/NEWS

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2021-11-19 07:07:18 +01:00
Matthias Fischer
59bf369edc unbound: Update to 1.13.2
For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-13-2

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2021-11-19 07:06:43 +01:00
Matthias Fischer
5391e72295 clamav: Update to 0.104.1
For details see:
https://blog.clamav.net/2021/11/clamav-01034-and-01041-patch-releases.html

"ClamAV 0.104.1 is a critical patch release..."

[Changelog is too long to include here.]

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2021-11-19 07:05:32 +01:00
Peter Müller
06fe9baec7 Coreutils: update to 9.0
Please refer to https://lists.gnu.org/archive/html/coreutils/2021-09/msg00113.html
for this version's release announcement.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2021-11-19 07:03:31 +01:00
Peter Müller
970e8547be location-functions.pl: Recognise XD / LOC_NETWORK_FLAG_DROP
This enables creating firewall rules using the special country code "XD"
for hostile networks safe to drop and ipinfo.cgi to display a meaningful
text for IP addresses having this flag set.

At the moment, the "LOC_NETWORK_FLAG_DROP" is not yet populated, but
will be in the future (as soon as libloc 0.9.9 is released and running
in production).

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2021-11-19 07:02:43 +01:00
Peter Müller
73efd9b7dc libloc: update to 0.9.8
Please refer to
https://git.ipfire.org/?p=location/libloc.git;a=commit;h=a138fbfec116981407588c05127b8e7c02e29ae5
for further information on this release.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2021-11-19 07:02:23 +01:00
Arne Fitzenreiter
96c83b21b3 kernel: update to 5.15.2
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-13 15:25:39 +00:00
Arne Fitzenreiter
67ad8f7ed0 util-linux: aarch64 rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-12 06:03:41 +00:00
Arne Fitzenreiter
c460b2652d kernel: aarch64 rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-11 18:18:49 +00:00
Arne Fitzenreiter
e196a73096 kernel: update aarch64 config
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-11 18:18:23 +00:00
Arne Fitzenreiter
db8199076d kernel: increase CMA size to 24MB
mmc ports need this for DMA transfers.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-10 21:58:44 +00:00
Arne Fitzenreiter
50fe4e50f3 xradio: update get mac address from dts function
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-10 07:04:58 +00:00
Arne Fitzenreiter
4290323c4d util-linux: armv6 rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-10 07:04:23 +00:00
Arne Fitzenreiter
dc48869767 kernel: armv6 rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-10 07:03:38 +00:00
Arne Fitzenreiter
9f3286a9c1 kernel: updated armv6 config
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-10 07:02:58 +00:00
Arne Fitzenreiter
cb9c6cfbd7 kernel: update to 5.15.1
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-09 18:24:26 +01:00
Arne Fitzenreiter
24ff52a2e4 kernel: i586 rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-06 10:01:32 +01:00
Arne Fitzenreiter
757e5d4e1f kernel: update i586 config
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-06 09:57:30 +01:00
Arne Fitzenreiter
d6f982720f util-linux: rootfile update i586
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-06 08:00:58 +01:00
Arne Fitzenreiter
c0cb2605d7 kernel: x86_64 rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-11-05 18:03:02 +01:00