Commit Graph

21290 Commits

Author SHA1 Message Date
Adolf Belka
f18d969716 libidn: Update to version 1.42
- Update from version 1.41 to 1.42
- Update of rootfile
- Changelog
    1.42
	** Bump required gettext version to 0.19.8 for musl-libc.
	** Compiler warning improvements.
		As before, compiler warnings are enabled by default.  You may disable
		them using ./configure --disable-gcc-warnings or turn them into fatal
		errors using ./configure --enable-gcc-warnings=error to add -Werror
		and sensible -Wno-error='s.  Based on gnulib's manywarnings, see
		<https://www.gnu.org/software/gnulib//manual/html_node/manywarnings.html>.
	** Fix type confusion on LLP64/Windows platforms.
		While libidn has worked using cygwin libc, it has never worked on
		ucrt/msvcrt libc.  Report and tiny patch by Francesco Pretto in
		<https://lists.gnu.org/archive/html/help-libidn/2022-02/msg00000.html>.
	** tests: Added script tests/standalone.sh suitable for integrators.
		The main purpose is to test a system-installed libidn, suitable for
		distributor checking (a'la Debian's autopkgtest/debci).  It may also
		be used to test a newly built libidn outside the usual 'make check'
		infrastructure.  To check that your system libidn is working, invoke
		the script with `srcdir` as an environment variable indicating where
		it can be find the source code for libidn's tests/ directory (it will
		use the directory name where the script is by default):
			tests/standalone.sh
			 To check that a newly built static libidn behaves, invoke:
				env STANDALONE_CFLAGS="-Ilib lib/.libs/libidn.a"
				 tests/standalone.sh
			 To check that a newly built shared libidn behaves, invoke:
				env srcdir=tests STANDALONE_CFLAGS="-Ilib -Wl,-rpath
				 lib/.libs lib/.libs/libidn.so" tests/standalone.sh
			 If the libidn under testing is too old and has known bugs, that
			  should cause tests to fail, which is intentional.
	** Updated translations.
	** Update gnulib files and build fixes.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 14:00:08 +00:00
Michael Tremer
fbff621fac core184: Ship iputils
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:59:50 +00:00
Adolf Belka
57da7bed37 iputils: Update to version 20240117
- Update from version 20231222 to 20240117
- Update of rootfile not required
- Changelog
    20240117
	* ping
		- fix: Restore -i0 (commit: 7a51494, PR: #519, regression from 2a63b94)
	* localization
		- Updated Turkish and Indonesian
		- 100% translated: Chinese (Simplified), Czech, French, Georgian, German,
		  Korean, Portuguese (Brazil), Turkish, Ukrainian
		- > 90% translated: Finnish, Indonesian, Japanese

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:59:39 +00:00
Michael Tremer
0dc494f5e5 core184: Ship iproute2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:59:26 +00:00
Adolf Belka
35d55995c4 iproute2: Update to version 6.7.0
- Update from version 6.6.0 to 6.7.0
- Update of rootfile not required
- Changelog only available from git repo commits
   https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:58:51 +00:00
Michael Tremer
f51f33d24b core184: Ship GnuTLS
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:58:38 +00:00
Adolf Belka
fa3b0964b6 gnutls: Update to version 3.8.3
- Update from version 3.8.2 to 3.8.3
- Update of rootfile
- Changelog
    3.8.3
	- libgnutls: Fix more timing side-channel inside RSA-PSK key exchange
	   [GNUTLS-SA-2024-01-14, CVSS: medium] [CVE-2024-0553]
	- libgnutls: Fix assertion failure when verifying a certificate chain with a
	   cycle of cross signatures
	   [GNUTLS-SA-2024-01-09, CVSS: medium] [CVE-2024-0567]
	- libgnutls: Fix regression in handling Ed25519 keys stored in PKCS#11 token
	   certtool was unable to handle Ed25519 keys generated on PKCS#11
	   with pkcs11-tool (OpenSC). This is a regression introduced in 3.8.2.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:58:10 +00:00
Michael Tremer
bdf5de6dd2 core184: Ship attr
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:57:53 +00:00
Adolf Belka
a7a4f0ce73 attr: Update to version 2.5.2
- Update from version 2.5.1 to 2.5.2
- Update of rootfile
- Changelog is no longer updated in the source tarball. Only source for changes is the git
   repository commits from https://git.savannah.nongnu.org/cgit/attr.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:57:29 +00:00
Adolf Belka
2d79832a54 wavemon: Update to version 0.9.5
- Update from version 0.9.4 to 0.9.5
- Update of rootfile not required
- force-netlink-include-path patch updated due to chganges in file in source tarball
- Changelog
    0.9.5
	Info Screen:
	    improve format of percentages (use fixed format rather than auto-format).
	Configuration:
	    fix ncurses support for white backgrounds (#119),
	    configuration file now either in $XDG_CONFIG_HOME/wavemon/wavemonrc or in
	     $HOME/.config/wavemon/wavemonrc (#106).
	Miscellaneous
	    avoid including include linux/if.h (#109),
	    check and set support for C99 standard (#108),
	    updated README (#107),
	    configuration file can now be located in XDG_CONFIG_HOME (#105),
	    added portable implementation of asprintf(3),
	    updated copied nl80211 header file,
	    make -Wpedantic the default when building.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:57:03 +00:00
Adolf Belka
b9fec739fd transmission: Update to version 4.0.5
- Update from version 4.0.4 to 4.0.5
- Update of rootfile
- Changelog
    4.0.5
	Highlights
	    Fixed 4.0.0 bug where the IP address field in UDP announces were not encoded
	     in network byte order. [BEP-15]. (#6132)
	    Fixed a bug that incorrectly escaped JSON strings in some locales.
	     (#6005, #6133)
	    Fixed 4.0.4 decreased download speeds for people who set a low upload
	     bandwidth limit. (#6134)
	All Platforms
	    Fixed bug that prevented editing trackers on magnet links. (#5957)
	    Fixed HTTP tracker announces and scrapes sometimes failing after adding a
	     torrent file by HTTPS URL. (#5969)
	    In RPC responses, change the default sort order of torrents to match
	     Transmission 3.00. (#5604)
	    Fixed tr_sys_path_copy() behavior on some Synology Devices. (#5974)
	macOS Client
	    Support Sonoma when building from sources. (#6016, #6051)
	    Fixed early truncation of long group names in groups list. (#6104)
	Qt Client
	    Fix: only append .added suffix to watchdir files. (#5705)
	GTK Client
	    Fixed crash when opening torrent file from "Recently used" section in
	     GTK 4. (#6131, #6142)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:56:51 +00:00
Adolf Belka
ab5113ae07 stunnel: Update to version 5.71
- Update from vesrion 5.69 to 5.71
- Update of rootfile not required
- Changelog
    5.71, 2023.09.19, urgency: MEDIUM
	 Security bugfixes
	  - OpenSSL DLLs updated to version 3.1.3.
	 Bugfixes
	  - Fixed the console output of tstunnel.exe.
	 Features sponsored by SAE IT-systems
	  - OCSP stapling is requested and verified in the client mode.
	  - Using "verifyChain" automatically enables OCSP
	    stapling in the client mode.
	  - OCSP stapling is always available in the server mode.
	  - An inconclusive OCSP verification breaks TLS negotiation.
	    This can be disabled with "OCSPrequire = no".
	  - Added the "TIMEOUTocsp" option to control the maximum
	    time allowed for connecting an OCSP responder.
	 Features
	  - Added support for Red Hat OpenSSL 3.x patches.
    5.70, 2023.07.12, urgency: HIGH
	 Security bugfixes
	  - OpenSSL DLLs updated to version 3.0.9.
	  - OpenSSL FIPS Provider updated to version 3.0.8.
	 Bugfixes
	  - Fixed TLS socket EOF handling with OpenSSL 3.x.
	    This bug caused major interoperability issues between
	    stunnel built with OpenSSL 3.x and Microsoft's
	    Schannel Security Support Provider (SSP).
	  - Fixed reading certificate chains from PKCS#12 files.
	 Features
	  - Added configurable delay for the "retry" option.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:56:42 +00:00
Michael Tremer
b0ef2af113 core184: Ship poppler
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:56:30 +00:00
Adolf Belka
d8209b5a9c poppler: Update to version 24.01.0
- Update from version 23.08.0 to 24.01.0
- Update of rootfile
- Changelog
	24.01.0:
	        core:
	         * Don't crash on certain documents on the NSS signature backend
	         * Fix infinite loop in some annotation code if there's not space for
		   even one character
	         * Fix build on Android with generic font configuration
	         * Small internal code cleanup
	23.12.0:
	        core:
	         * Rewrite FoFiType1::parse to be more flexible. Issue #1422
	         * Small internal code refactoring
	23.11.0:
	        core:
	         * CairoOutputDev: Use internal downscaling algorithm if image exceeds
		   Cairo's maximum dimensions.
	         * Internal code improvements
	         * Fix crash on malformed files
	        utils:
	         * pdftocairo: Add option to document logical structure if output is pdf
	         * pdftocairo: EPS output should not contain %%PageOrientation
	23.10.0:
	        core:
	         * cairo: update type 3 fonts for cairo 1.18 api
	         * Fix crash on malformed files
	        build system:
	         * Make a few more dependencies soft-mandatory
	         * Add more supported gnupg releases
	         * Check if linker supports version scripts
	23.09.0:
	        core:
	         * Add Android-specific font matching functionality
	         * Fix digital signatures for NeedAppearance=true
	         * Forms: Don't look up same glyph multiple times
	         * Provide the key location for certificates you can sign with
	         * Add ToUnicode support for similarequal
	         * Fix crash on malformed files
	        qt5:
	         * Provide the key location for certificates you can sign with
	         * Allow to force a rasterized overprint preview during PS conversion
	        qt6:
	         * Provide the key location for certificates you can sign with
	         * Allow to force a rasterized overprint preview during PS conversion
	        pdfsig:
	         * Provide the key location for certificates you can sign with

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:56:08 +00:00
Michael Tremer
3e32f30ba6 core184: Ship pixman
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:55:33 +00:00
Adolf Belka
52d2ca0d49 pixman: Update to version 43.0
- Update from versionj 42.2 to 43.0
- Update of rootfile
- Changelog
   The NEWS and ChangeLog files in the source tarball are empty.
   For details of changes see the commits log
   https://cgit.freedesktop.org/pixman/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:55:14 +00:00
Michael Tremer
ad9d1c7594 core184: Ship memtest
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:54:58 +00:00
Adolf Belka
a99747a53c memtest: Update to version 7.00
- Update from version 6.20 to 7.00
- Update of rootfile not required
- Changelog
    7.00
	    IMC polling for live DRAM settings
	    Preliminary support for ECC polling
	    Add support for MMIO UART
	    Add debugging options
	    Bug fixes & optimizations

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:54:10 +00:00
Adolf Belka
b66e42ddcf lshw: Update to version B.02.20
- Update from version B.02.19.2 to B.02.20
- Update of rootfile
- Changelog
    B.02.20
	bug fixes
	code cleanup
    For more details see the git repo
     https://ezix.org/src/pkg/lshw/compare/B.02.19...B.02.20

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:53:58 +00:00
Adolf Belka
3f22b83096 libvirt: Update to version 10.0.0
- Update from version 8.10.0 to 10.0.0
- Update of rootfile
- Changelog is too large to include here. Details can be found in the NEWS.rst file in the
   source tarball
    CVE-2023-3750 was fixed in version 9.6.0
	Fix race condition in storage driver leading to a crash
	    In **libvirt-8.3** a bug was introduced which in rare cases could cause
	    ``libvirtd`` or ``virtstoraged`` to crash if multiple clients attempted to
	    look up a storage volume by key, path or target path, while other clients
	    attempted to access something from the same storage pool.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:53:47 +00:00
Adolf Belka
525bdbafb2 libtalloc: Update to version 2.4.1
- Update from version 2.3.4 to 2.4.1
- Update of rootfile
- Changelog
    2.4.1 (2023-07-20)
	No change information available anywhere that I could find
    2.4.0 (2023-01-18)
	No change information available anywhere that I could find

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:53:38 +00:00
Michael Tremer
d6b51f9c04 core184: Ship ipset
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:53:12 +00:00
Adolf Belka
43acdeb8a0 ipset: Update to version 7.19
- Update from version 7.17 to 7.19
- Update of nrootfile not required
- Changelog
7.19
  - build: Fix the double-prefix in pkgconfig (Sam James)

7.18
  - Add json output to list command (Thomas Oberhammer)
  - tests: hash:ip,port.t: Replace VRRP by GRE protocol (Phil Sutter)
  - tests: hash:ip,port.t: 'vrrp' is printed as 'carp' (Phil Sutter)
  - tests: cidr.sh: Add ipcalc fallback (Phil Sutter)
  - tests: xlate: Make test input valid (Phil Sutter)
  - tests: xlate: Test built binary by default (Phil Sutter)
  - xlate: Drop dead code (Phil Sutter)
  - xlate: Fix for fd leak in error path (Phil Sutter)
  - configure.ac: fix bashisms (Sam James)
  - lib/Makefile.am: fix pkgconfig dir (Sam James)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 13:52:57 +00:00
Adolf Belka
7ae9d20aad haproxy: Update to version 2.9.2
- Update from version 2.8.5 to 2.9.2
- Update of rootfile not required
- Changelog is too large to include here. Details can be found in the CHANGELOG file in the
   source tarball.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 11:37:02 +00:00
Adolf Belka
c23ca819d9 fmt: Update to version 10.2.1
- Update from version 10.0.0 to 10.2.1
- Update of rootfile
- Changelog is a bit too large to include here. Details can be found in ChangeLog.md file
   in source tarball.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 11:36:51 +00:00
Michael Tremer
df46bb241b core184: Ship dmidecode (x86_64)
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 11:36:08 +00:00
Adolf Belka
330f38dabe dmidecode: Update to version 3.5
- Update from version 3.3 to 3.5
- Update of rootfile not required
- Two patches no longer required as fixes are now in source tarball
- Changelog
    3.5 (Tue Mar 14 2023)
          - Decode HPE OEM records 216, 224, 230, 238 and 242.
          - Fortify entry point length checks.
          - Add a --no-quirks option.
          - Drop the CPUID exception list.
          - Do not let --dump-bin overwrite an existing file.
          - Ensure /dev/mem is a character device file.
          - Bug fixes:
            Fix segmentation fault in HPE OEM record 240
          - Minor improvements:
            Typo fixes
            Write the whole dump file at once
            Fix a build warning when USE_MMAP isn't set
    3.4 (Mon Jun 27 2022)
          - Support for SMBIOS 3.4.0. This includes new memory device types, new
            processor upgrades, new slot types and characteristics, decoding of memory
            module extended speed, new system slot types, new processor characteristics
            and new format of Processor ID.
          - Support for SMBIOS 3.5.0. This includes new processor upgrades, BIOS
            characteristics, new slot characteristics, new on-board device types, new
            pointing device interface types, and a new record type (type 45 -
            Firmware Inventory Information).
          - Decode HPE OEM records 194, 199, 203, 236, 237, 238 and 240.
          - Bug fixes:
            Fix OEM vendor name matching
            Fix ASCII filtering of strings
            Fix crash with option -u
          - Minor improvements:
            Skip details of uninstalled memory modules
            Don't display the raw CPU ID in quiet mode
            Improve the formatting of the manual pages

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 11:35:15 +00:00
Adolf Belka
b15de7ba52 bird: Update to version 2.14
- Update from version 2.0.12 to 2.14
- Update of rootfile not required
- Changelog
    2.14 (2023-10-06)
	  o MPLS subsystem
	  o L3VPN: BGP/MPLS VPNs (RFC 4364)
	  o BGP: Access to unknown route attributes
	  o RAdv: Custom options
	  o Babel: RTT metric extension
	  o BMP: Refactored route monitoring
	  o BMP: Multiple instances of BMP protocol
	  o BMP: Both pre-policy and post-policy monitoring
	  o Experimental route aggregation
	  o Filter: Method framework
	  o Filter: Functions have return type statements
	  o Filter: New bytestring data type
	  o Kernel: Option to learn kernel routes
	  o Many bugfixes and improvements
	Notes:
	  User-defined filter functions that return values now should have return type
	   statements. We still accept functions without such statement, if they could be
	   properly typed.
	  For loops allowed to use both existing iterator variables or ones defined in
	   the for statement. We no longer support the first case, all iterator variables
	   must be defined in the for statement (e.g. 'for int i in bgp_path ...').
	  Due to oversight, VRF interfaces were not included in respective VRFs, this is
	   fixed now.
    2.13.1 (2023-06-23)
	  o BGP: Fix role check when no capability option is present
	  o Filter: Fixed segfault when a case option had an empty block
	  This is a bugfix version.
    2.13 (2023-04-21)
	  o Babel: IPv4 via IPv6 extension (RFC 9229)
	  o Babel: Improve authentication on lossy networks
	  o BGP: New 'allow bgp_med' option
	  o BSD: Support for IPv4 routes with IPv6 nexthop on FreeBSD
	  o Experimental BMP protocol implementation
	  o Important bugfixes
	Notes:
	  We changed versioning scheme from <epoch>.<major>.<minor> to more common
	   <major>.<minor>.<patch> . From now on, you may expect that BIRD 2.13.x will be
	   strictly only fixing bugs found in 2.13, whereas BIRD 2.14 will also contain
	   new features.
	  This BIRD version contains an alpha release of BMP protocol implementation.
	   It is not ready for production usage and therefore it is not compiled by
	   default and have to be enabled during installation.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 11:34:45 +00:00
Michael Tremer
ffe528be28 Start Core Update 184
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-23 11:33:43 +00:00
Arne Fitzenreiter
02aa0f99b1 web-user-interface: rootfile update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-21 21:42:13 +01:00
Arne Fitzenreiter
0722f42ed2 kernel: update to 6.6.13
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-21 19:10:22 +01:00
Michael Tremer
0742747e6d core183: Ship firewall initscript
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-19 16:38:12 +00:00
Erik Kapfer
e5a77641f3 Firewall initscript: Restore Tor IPTable rules by manual firewall restart
If the firewall will be manually restart via '/etc/init.d/firewall restart',
the IPTable rules for the Tor relay will be deleted since 'iptables_init' only
flushes and creates inbound and unbound chains for Tor but does not restore the
ruleset from Tor initscript.

For reference and tests please see -->
https://community.ipfire.org/t/tor-stop-working-without-stop-the-process-or-give-an-error-message/10697

Signed-off-by: Erik Kapfer <erik.kapfer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-19 16:37:44 +00:00
Michael Tremer
b87cd867f7 network: Only try to restart collectd if it is running
This updated version of this script avoids any errors if collectd is not
running (yet) which might happen during the boot process.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-19 16:37:24 +00:00
Michael Tremer
295af8f766 core183: Ship the updated theme
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-19 16:32:24 +00:00
Michael Tremer
c981c48b2d Merge remote-tracking branch 'ms/theme' into next 2024-01-19 16:29:46 +00:00
Arne Fitzenreiter
6094f35b5a core183: generate new rsa before apache start
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-19 06:10:26 +00:00
Arne Fitzenreiter
36c16c71ed core183: replace https rsa key if it is too small
new openssl need at least 2048 bit rsa keys for apache.
So if the existing is smaller a new 4096 bit key is generated.

fixes #13527

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-18 18:02:10 +01:00
Peter Müller
bca096b453 linux: Forbid legacy TIOCSTI usage
To quote from the kernel documentation:

> Historically the kernel has allowed TIOCSTI, which will push
> characters into a controlling TTY. This continues to be used
> as a malicious privilege escalation mechanism, and provides no
> meaningful real-world utility any more. Its use is considered
> a dangerous legacy operation, and can be disabled on most
> systems.
>
> Say Y here only if you have confirmed that your system's
> userspace depends on this functionality to continue operating
> normally.
>
> Processes which run with CAP_SYS_ADMIN, such as BRLTTY, can
> use TIOCSTI even when this is set to N.
>
> This functionality can be changed at runtime with the
> dev.tty.legacy_tiocsti sysctl. This configuration option sets
> the default value of the sysctl.

This patch therefore proposes to no longer allow legacy TIOCSTI usage
in IPFire, given its security implications and the apparent lack of
legitimate usage.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-16 15:46:37 +00:00
Peter Müller
254dcbaac8 Core Update 183: Fix permissions of /etc/sudoers.d/, again
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-16 12:36:50 +00:00
Matthias Fischer
601664309b htop: Update to 3.3.0
For details see:
https://github.com/htop-dev/htop/blob/main/ChangeLog

"What's new in version 3.3.0

* Multiple refactorings and code improvements
* Shorten docker container IDs to 12 characters
* Settings: preserve empty header
* Fix execlp() argument without pointer cast
* OpenFilesScreen: Make column sizing dynamic for file size, offset and inode
* Add support for "truss" (FreeBSD equivalent of "strace")
* Darwin: add NetworkIOMeter support
* HeaderLayout: add "3 columns - 40/30/30", "... 30/40/30" & "... 30/30/40"
* Meter: use correct unicode characters for digit '9'
* Note in manual re default memory units of KiB
* Add column for process container name
* Add logic to filter the container name (+type) from the CGroup name
* Change NetworkIOMeter value unit from KiB/s to bytes/second
* Cap DiskIOMeter "utilisation" percentage at 100%
* PCP platform implementation of frontswap and zswap accounting
* Shorten podman/libpod container IDs to 12 characters
* Write configuration to temporary file first
* Incorporate shared memory in bar text
* Move shared memory next to used memory
* Correct order of memory meter in help
* Add recalculate to Ctrl-L refresh
* Update process list on thread visibility toggling
* Support dynamic screens with 'top-most' entities beyond processes
* Introduce Row and Table classes for screens beyond top-processes
* Rework ZramMeter and remove MeterClass.comprisedValues
* More robust logic for CPU process percentages (Linux & PCP)
* Show year as start time for processes older than a year
* Short-term fix for docker container detection
* default color preset: use bold blue for better visibility
* Document 'O' keyboard shortcut
* Implement logic for '--max-iterations'
* Update F5 key label on tab switch (Tree <-> List)
* Force re-sorting of the process list view after switching between list/treeview mode
* Linux: (hack) work around the fact that Zswapped pages may be SwapCached
* Linux: implement zswap support
* {Memory,Swap}Meter: add "compressed memory" metrics
* Darwin: add DiskIOMeter support
* Fix scroll relative to followed process
* ZramMeter: update bar mode
* Use shared real memory on FreeBSD
* Increase Search and Filter max string length to 128
* Improve CPU computation code
* Remove LXC special handling for the CPU count
* Create new File Descriptor meter
* PCP: add IRQ PSI meter
* Linux: add IRQ PSI meter
* Linux: highlight username if process has elevated privileges
* Add support for scheduling policies
* Add a systemd user meter to monitor user units.
* FreeBSD: remove duplicate zfs ARC size subtraction"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
2024-01-16 12:35:30 +00:00
Michael Tremer
091988ad27 core183: Ship /etc/rc.d/init.d/mountfs
This script has been modified when we touched ExtraHD in Core Update
179/180, but has been forgotten to be shipped.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-16 12:25:04 +00:00
Arne Fitzenreiter
a93525c0ca kernel: update to 6.6.12
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-16 12:41:08 +01:00
Peter Müller
d2e2c945a9 Core Update 183: Ship 60-collectd
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-14 16:05:12 +00:00
Michael Tremer
f2d7d4ec16 collectd: Restart is required after reconnect
The "ping" plugin does not re-resolve the gateway IP address after
pinging it for the first time. For most people this won't be a big
problem, but if the default gateway changes, the latency graph won't
work any more.

In order to do re-resolve "gateway", the only way is to restart
collectd.

Fixes: #13522
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-14 16:04:03 +00:00
Peter Müller
4c7266a39e Core Update 183: Ship libssh
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:59:18 +00:00
Peter Müller
31167fb3bb libssh: Update to 0.10.6
Please refer to https://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/
for this version's release announcement.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:59:09 +00:00
Peter Müller
2958c8c1e0 Core Update 183: Ship libgcrypt
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:58:51 +00:00
Peter Müller
d4c0426903 libgcrypt: Update to 1.10.3
Refer to https://dev.gnupg.org/T6817 for release information concerning
this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:58:34 +00:00
Peter Müller
6d95c33018 Core Update 183: Ship kmod
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:58:17 +00:00