Commit Graph

20837 Commits

Author SHA1 Message Date
Michael Tremer
fabc2e112e core180: Ship man pages index
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 16:38:25 +00:00
Jon Murphy
81feac13b1 manualpages: correct link to dns help page
- point the dns help link to "configuration/network/dns-server"

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 16:37:56 +00:00
Jon Murphy
34345ff1ef avahi-daemo: remove orange interface
- fix Bug 13202
- add non-default config file
- enable mDNS reflector
- remove IPv6

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 09:28:21 +00:00
Michael Tremer
c5487f8073 core180: Ship vnstat
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 09:27:57 +00:00
Matthias Fischer
4cdc4e4059 vnstat: Update to 2.11
For details see:
https://humdi.net/vnstat/CHANGES

"2.11 / 19-Aug-2023

 - Fixed
   - Database queries worked only if SQLite double-quoted string (DQS)
     feature (https://www.sqlite.org/quirks.html#dblquote) was enabled
   - Disabling data resolutions in data retention configuration didn't result
     in possibly existing database entries getting removed from the database
   - Disabling data resolutions in data retention configuration didn't result
     in the data resolution getting disabled but instead storing data forever
   - "expr: syntax error" during configure in BSD (pull request by namtsui)
   - Image output summary would show only "no data available" text in case of
     zero total traffic even when the historical data of no traffic could have
     been shown instead
   - Image output "-o -" content could get corrupted due to info, warning and
     error messages also using stdout, configuration file warnings being the
     most likely source, now uses stderr in image output
   - Configuration validation was too heavily limiting and enforcing image
     output 5 minute graph related configuration options for combinations that
     would have resulted in usable images
 - New
   - Database cleanup has been changed to interpret data retention
     configuration as number of entries to be kept instead of calendar time,
     this restores the behaviour to similar as it was up to version 1.18, the
     difference is visible only on systems that aren't powered all the time
   - Database is vacuumed during daemon startup and reload, behaviour is
     configurable using VacuumOnStartup and VacuumOnHUPSignal configuration
     options
   - Add configuration option InterfaceOrder for controlling the interface
     order in outputs with multiple interfaces
   - Used data retention configuration is made visible during daemon startup
     and after configuration reloads
   - Daemon will no longer start if all data resolutions have been disabled
     in the configuration file
   - SQLite version is visible in --version outputs
 - Notes
   - "Not enough data available yet." message has been replaced with
     "No data. Timestamp of last update is same YYYY-MM-DD HH:MM:SS as of
     database creation." to better explain the reason why there's nothing to
     show, this message is expected to disappear within configured
     SaveInterval if the interface is active"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 09:26:59 +00:00
Michael Tremer
8a3a3856ac core180: Ship index.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 09:26:43 +00:00
Adolf Belka
9149276b65 index.cgi: Add warning about reiserfs deprecation and removal if reiserfs used
- Reiserfs was stopped in IPFire in Core Update 167. It has been announced that reiserfs
   will be removed from the kernel in 2025.
- This patch gives a warning about this deprecation and removal if reiserfs is used. The
   warning also requests that the user does a re-installation using either ext4 or xfs
   filesystems.
- Tested out on a vm installation with reiserfs, ext4 and xfs. Messgae shown on system
   with reiserfs filesystem but nopt on the other two.
- Warning message added into the English language file and ./make.sh lang run.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 09:25:34 +00:00
Michael Tremer
5cfccb2c8c core180: Ship dhcpcd
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 09:25:07 +00:00
Adolf Belka
e11fc5273b dhcpcd: Update to version 10.0.2
- Update from version 10.0.1 to 10.0.2
- Update of rootfile not required
- Changelog
    10.0.2
       Major changes listed as:-
	    chore: Link to GitHub for the updated commit log by @frazar in #203
	    Additional DHCP options by @rrobgill in #214
	    risc-v fix vendor error by @Im-0xea in #213
	    compat sync by @tobhe in #226
       Commit list can be seen at
        https://github.com/NetworkConfiguration/dhcpcd/compare/v10.0.1...v10.0.2
        This includes two bug fixes for two situations causing segfaults

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 09:23:49 +00:00
Matthias Fischer
03ed43bdd5 clamav: Update to 1.1.1
For details see:
https://blog.clamav.net/2023/07/2023-08-16-releases.html

Excerpts from changelog:
"ClamAV 1.1.1 is a critical patch release with the following fixes:

    CVE-2023-20197 Fixed a possible denial of service vulnerability
    in the HFS+ file parser. This issue affects versions 1.1.0,
    1.0.1 through 1.0.0, 0.105.2 through 0.105.0, 0.104.4 through
    0.104.0, and 0.103.8 through 0.103.0.

    Fixed a build issue when using the Rust nightly toolchain, which
    was affecting the oss-fuzz build environment used for regression tests.

    Fixed a build issue on Windows when using Rust version 1.70 or newer.

    CMake build system improvement to support compiling with OpenSSL 3.x on
    macOS with the Xcode toolchain. The official ClamAV installers and
    packages are now built with OpenSSL 3.1.1 or newer.

    Removed a warning message showing the HTTP response codes during the
    Freshclam database update process."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 09:23:29 +00:00
Michael Tremer
eef8486bdf core180: Ship ppp
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 09:23:14 +00:00
Adolf Belka
9a40c7fb0d ppp: Bug#13164 - Update configure options to have correct directory for pid
- The original poster of the bug#13164 has already tested out ppp-2.5.0 in CU179 (master)
   and identified that the startup could not find the directory /usr/var/run/. This is due
   to the change in use of the prefix command in 2.5.0 vs 2.4.9 so --localstatedir set to
   /var. runstatedir is then set to localstatedir/run ie /var/run which is then correct
   for IPFire.
- This fix needs to be implemented into CU179 so that the bug poster can test out the update
- Updated rootfile to remove additional empty line

Fixes: Bug#13164
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-21 09:22:58 +00:00
Michael Tremer
1edc79f4ba qrencode: Fix build on riscv64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-19 14:30:31 +00:00
Michael Tremer
0b0d4363cf core180: Ship toolchain
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-17 14:12:38 +00:00
Michael Tremer
85a0f2937a make.sh: Bump toolchain version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-17 14:07:44 +00:00
Michael Tremer
3bca8ae11f glibc: Update to 2.38
This update builds glibc with FORTIFY_SOURCE and disables building nscd
which has been unused in IPFire.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-17 14:07:44 +00:00
Michael Tremer
567ec7f41d binutils: Disable building gprof-ng in toolchain
This won't build against glibc 2.38. Since we don't need it, it is being
turned off.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-17 14:07:43 +00:00
Michael Tremer
e8bdca4d52 gcc: Update to 13.2.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-17 14:07:43 +00:00
Michael Tremer
fc0f09a833 binutils: Update to 2.41
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-17 14:07:43 +00:00
Michael Tremer
852324e2aa ipfire-netboot: Fix build with binutils 2.41
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-17 14:07:43 +00:00
Michael Tremer
29b41696bf ffmpeg: Fix build with binutils 2.41
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-17 14:07:42 +00:00
Michael Tremer
ee29f5647b Start Core Update 180
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-17 14:04:11 +00:00
Michael Tremer
c4710adcbc Update credits.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-16 15:04:02 +00:00
Michael Tremer
872619f5ec core179: Ask users to reboot after this update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-16 15:03:18 +00:00
Michael Tremer
959497f90f core179: Restart OpenVPN services during the update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-16 15:02:48 +00:00
Adolf Belka
c7e223e592 openvpn: Update to version 2.5.9
- Update from version 2.5.8 to 2.5.9 which is the last version in the 2.5 series
- Update of rootfile not required
- Tested openvpn-2.5.9 in my vm testbed. OpenVPN RW connection worked fine. Also tested
   OpenVPN N2N connection with CU179 & OpenVPN version 2.5.9 at one end and CU177 &
   OpenVPN version 2.5.8 at the other end. N2N connection worked with no problemns.
- Changelog
    2.5.9
      Implement optional cipher in --data-ciphers prefixed with ?
      Fix handling an optional invalid cipher at the end of data-ciphers
      Ensure that argument to parse_line has always space for final sentinel
      Improve documentation on user/password requirement and unicodize function
      Remove unused gc_arena
      Fix corner case that might lead to leaked file descriptor
      msvc: always call git-version.py
      git-version.py: proper support for tags
      Check if pkcs11_cert is NULL before freeing it
      Do not add leading space to pushed options
      pull-filter: ignore leading "spaces" in option names
      Do not include auth-token in pulled option digest

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-16 15:01:26 +00:00
Michael Tremer
a8af2483a1 core179: Ship vulnerabilities.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 16:50:00 +00:00
Michael Tremer
51203f20cc Run "./make.sh lang"
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 16:49:12 +00:00
Peter Müller
8494102aa8 vulnerabilities.cgi: Avoid superfluous line breaks by widening SMT configuration table
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 16:48:55 +00:00
Peter Müller
edc78459ef vulnerabilities.cgi: Add English and German translations for new flaws
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 16:48:55 +00:00
Adolf Belka
854c05bebd keepalived: Update to version 2.2.8
- Update from version 2.2.7 to 2.2.8
- Update of rootfile not required
- Changelog
    2.2.8 31th May 2023
	This release brings improvements and fix some minor issues reported. It add some
         new VRRP and BFD features as well.
	New
	    vrrp: Add support for Infiniband over IPv6. Github issue #2100 reported that
                  attempting to use IPv6 over Infinband was causing keepalived to segfault
                  It turned out that vrrp_ndisc.c had a comment that it still needed to be
                  implemented, which we have now been able to do with someone in a position
                  to test it. With many thanks for Itel Levy of NVIDIA, Israel for
                  reporting the issue and and testing the patch to confirm that it works.
	    vrrp: Add no_virtual_ipaddress keyword. This keyword suppresses warnings for
                  no virtual ipaddresses configured and allows none to be configured when
                  using VRRPv3.
	    vrrp: Add –enable-nm configure option. –enable-nm adds support for Keepalived
                  telling NetworkManager not to manage VMAC interfaces the keepalived
                  creates. Early versions of NM (i.e. at least up to v1.12, but resolved
                  at the latest by v1.18) would set the VMAC inerfaces as managed by
                  NetworkManager, and then if the underlying interface went down, NM
                  would down the VMAC interface and the VRRP instance would never recover
                  from fault state.
	    vrrp: add v3_checksum_as_v2 configuration option. RFC 5798 (the VRRPv3 RFC)
                  states regarging the checksum:
		    5.2.8. Checksum
		        The checksum field is used to detect data corruption in the VRRP
                         message. The checksum is the 16-bit one’s complement of the one’s
                         complement sum of the entire VRRP message starting with the
                         version field and a “pseudo-header” as defined in Section 8.1 of
                         [RFC2460]. The next header field in the “pseudo-header” should be
                         set to 112 (decimal) for VRRP. For computing the checksum, the
                         checksum field is set to zero. See RFC1071 for more detail
                        Some manufacturers (e.g. Cisco) interpret this to mean that the
                         pseudo- header is not included in the checksum calculation, since
                         RFC2460 only defines a pseudo-header for IPv6. RFC3768 (the last
                         VRRPv2 RFC) did not include a pseudo-header in the checksum.
                         However, keepalived has always included a pseudo-header in the
                         VRRPv3 IPv4 checksum, which is also consistent with the default
                         setting in Wireshark. In order to allow interoperation with
                         Cisco routers, and possibly other manufacturers, the
                         “v3_checksum_as_v2” keyword, when configured in global_defs to
                         set the default for all vrrp_instances, or in individual
                         vrrp_instances, causes those vrrp_instances to exclude the
                         pseudo- header from the checksum. The default action of including
                         the pseudo- header in the checksum remains unchanged.
	    vrrp: Add option to revert to backup if thread timer expires. If the VRRP
                  process is not scheduled for sufficiently long, another VRRP instance
                  may have taken over as master. For some users, minimising the number of
                  master switches is desired, and so if nopreempt is configured (if it is
                  not configured the highest priority instance will take over as master
                  again), and if it is too long after a thread timer expires before
                  keepalived is scheduled to run so that another instance will probably
                  have taken over as master, we will just revert to backup state rather
                  than sending further adverts. The keyword that configures this is
                  thread_timer_expired.
	    vrrp: Add optional new JSON format including track_process details. The
                  original JSON format did not allow for adding additional object types
                  other than the original vrrp instances. This commit adds a json_version
                  2, which puts the vrrp instances in a named array and adds an array of
                  the track_processes.
	    core: add option to check for malloc’s etc returning NULL. Configure option
                  –enable-malloc-check will cause the returned value of
                  malloc/realloc/strdup/strndup to be checked to ensure that they do not
                  return NULL. If any such call does return NULL a message will be logged
                  and the process will terminate. Unless sysctl vm.overcommit_memory == 2
                  (default is usually 0), or the malloc would cause the process virtual
                  address space to exceed the limit, malloc etc will not return NULL. It
                  is only once there is a write into the memory block that the memory is
                  actually allocated, and if there is insufficient memory (including swap
                  space), then the OOM killer will step in to either kill keepalived, or
                  kill another process. Consequently checking for NULL being returned is
                  generally a waste of time and program size.
	    ipvs: Add option to check OpenSSL mallocs/frees for validity.
	    ipvs: Add option to let SSL_GET shutdown comply with TLS spec.
	    bfd: Add multihop option to conform with RFC5883. RFCs 5881 and 5883 state
                 that port 3784 is used for single hop BFD and port 4784 is used for
                 multihop. The commit adds configuration option “multihop” to use port
                 4784 rather than port 3784.
	Improvements
	    vrrp: Don’t adjust vrrp receive timeout during delayed start. The timeout for
                  a vrrp instance to become master should not be changed if an advert is
                  received during the delayed start - the timeout is set to include the
                  delayed start and the (3 to 4) * advert int delay to take over as master.
	    vrrp: Remove redundant checks of snmp_option.
	    vrrp: deley freeing vrrp instances until all references are freed. Trackers
                  etc have lists for vrrp instances that are tracking them. Therefore the
                  trackers, and their references, must be freed before the vrrp instances
                  are freed.
	    vrrp: restore the vmac ipv6 link-local after flapping. The user is not
                  supposed to shutdown a vmac interface created by keepalived. However,
                  it can mistakenly happen. When the link is re-established, the
                  link-local has disappear (the kernel removes all IPv6 addresses on link
                  down except if keep_addr_on_down sysctl is on) and sending VRRP packet
                  is no nore possible. Restore the IPv6 Link-Local after a VMAC interface
                  flapping. A Link-Local is not set when the VRRP packets are sent from
                  the base interface (vmac-xmit-base). Note that the IPv6 Virtual
                  Addresses are also removed on link down which is the desired behavior.
                  Enabling keep_addr_on_down sysctl would keep the link-local without
                  this patch but would break this behavior.
	    doc: Man pages and documentation updates. Add explanation of why unicast
                 VRRPv3 checksum changed.
	    configure: Add systemd auto option. fix default config file with ${prefix}
                       use. use back-ticks rather than $(…) for commmands. Improve
                       checking for ${prefix}.
	    ipvs: Don’t report HTTP_CHECK when it is an SSL_CHECK.
	    ipvs: Work around OpenSSL memory leak in versions 3.0.0 to 3.0.4. The memory
                  leak was observed with OpenSSL 3.0.1, and it is resolved by version
                  3.0.5. Also the leak is not observed in v1.1.1n.
	    ipvs: Simplify SSL_GET handling code.
	Fixes
	    rpm: Fix RPM spec file to use kmod-lib and kmod-devel rather than libkmod.
	    vrrp: Fix NFT support to properly handle build with L4PROTO support.
	    vrrp: Resolve segfault when enable_snmp_vrrp is added at a reload.
	    vrrp: workaround GCC LTO bug causing incorrect VRRPv3 checksum. The problem
                  was observed with GCC versions 11.2, 11.3.1 and 12.1.1, on Ubuntu 22.04,
                  Fedora 34, Fedora 36 and Fedora 37 (Rawhide). The problem did not occur
                  when not using LTO, nor when using clang, even with LTO.
	    vrrp: fix ipv6 vrrp in fault state because no ipv4 address. Setting an IPv6
                  VRRP virtual address on an interface that has no IPv4 address results
                  in a persistent FAULT state.
	    core: Fix segfault when receive netlink message for static default route added.
	    build: Fix order of -lssl -lcrypto. This needs to be correct in order to be
                   able to use static library linking on Alpine Linux.
	    build: Fix build with libressl. SSL_set0_rbio is provided by libressl since
                   version 3.4.0 and libressl/openbsd@c99939f but SSL_set0_wbio is not
                   provided resulting in build failure.
	    build: Fix out of tree builds. Fix build error with –disable-track-process.
	    build: Fix building with –disable-vmac.
	    build: Fix compiler warning when building without VRRP authentication.
	    parser: Fix segfault caused by extra ‘}’ and other parser fixes. If there was
                    a configuration error in a block, e.g. a vrrp_instance, keepalived
                    would apply the configuration in the rest of the block to the
                    previous object of that type, e.g. the previous vrrp instance. If
                    there had been no previous instance, keepalived would probably
                    segfault. This commit changes the way the parser works. A new
                    instance of an object, e.g. a VRRP instance or a virtual server, is
                    only added to the list of those objects once the configuration of
                    that object is complete. In particular it no longer applies the
                    configuration to the last entry on the list of the relevant object
                    type, but keeps a point to the object currently being configured.
	    parser: Optimise fixing recalculating updated line length.
	    ipvs: Fix memory leaks when configuration is repeated. Use last entry if
                  duplicate definition.
	    lib: Fix malloc check code for CPUs without unaligned memory access.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-08-15 16:46:57 +00:00
Matthias Fischer
3e4e65dd28 monit: Fix for Bug #13246 - No such file or directory '/etc/monit.d'
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 16:46:49 +00:00
Michael Tremer
9f1636bf11 core179: Migrate old ExtraHD entries in /etc/fstab
The rewritten version of ExtraHD no longer stores entries in /etc/fstab
which is why they have to be removed during the update.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 10:18:38 +00:00
Michael Tremer
d4a8484eb1 mountfs: Remove excessive sync-ing before umount
The system should perform all write operations when sync is called and
only return when the write queues are empty.

There is no additional benefit for calling sync again as the buffers
should be empty. If data is still being lost, then that is a bug in
either the storage device or driver.

As the (re-)boot process is already so slow, I would like to get rid of
any unnecessary delays.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 09:48:35 +00:00
Michael Tremer
21d8c56c8a mountfs: Mount ExtraHD filesystems
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 09:47:25 +00:00
Michael Tremer
9bfe4848bc core179: Ship ca-certificates
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 09:28:25 +00:00
Peter Müller
991ea18ebb ca-certificates: Update to 20230814
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 09:28:09 +00:00
Michael Tremer
02ecc13baa core179: Ship squid-asnbl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 09:27:39 +00:00
Peter Müller
311f04e46e squid-asnbl: Update to 0.2.5
This upstream release incorporates the patch added for resolving #13023.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 09:27:19 +00:00
Peter Müller
33d4586cb8 Tor: Update to 0.4.7.14
Full changelog:

Changes in version 0.4.7.14 - 2023-07-26
  This version contains several minor fixes and one major bugfix affecting
  vanguards (onion service). As usual, we recommend upgrading to this version
  as soon as possible.

  o Major bugfixes (vanguards):
    - Rotate to a new L2 vanguard whenever an existing one loses the
      Stable or Fast flag. Previously, we would leave these relays in
      the L2 vanguard list but never use them, and if all of our
      vanguards end up like this we wouldn't have any middle nodes left
      to choose from so we would fail to make onion-related circuits.
      Fixes bug 40805; bugfix on 0.4.7.1-alpha.

  o Minor feature (CI):
    - Update CI to use Debian Bullseye for runners.

  o Minor feature (lzma):
    - Fix compiler warnings for liblzma >= 5.3.1. Closes ticket 40741.

  o Minor features (directory authorities):
    - Directory authorities now include their AuthDirMaxServersPerAddr
      config option in the consensus parameter section of their vote.
      Now external tools can better predict how they will behave.
      Implements ticket 40753.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on July 26, 2023.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2023/07/26.

  o Minor bugfix (relay, logging):
    - The wrong max queue cell size was used in a protocol warning
      logging statement. Fixes bug 40745; bugfix on 0.4.7.1-alpha.

  o Minor bugfixes (compilation):
    - Fix all -Werror=enum-int-mismatch warnings. No behavior change.
      Fixes bug 40824; bugfix on 0.3.5.1-alpha.

  o Minor bugfixes (metrics):
    - Decrement hs_intro_established_count on introduction circuit
      close. Fixes bug 40751; bugfix on 0.4.7.12.

  o Minor bugfixes (sandbox):
    - Allow membarrier for the sandbox. And allow rt_sigprocmask when
      compiled with LTTng. Fixes bug 40799; bugfix on 0.3.5.1-alpha.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-15 09:27:09 +00:00
Michael Tremer
8406848030 Merge branch 'master' into next 2023-08-14 16:02:12 +00:00
Michael Tremer
5ca80b3b8f Bump PAK_VER for haproxy/keepalived/monit/nmap
This is required as older versions might be linked against older
versions of OpenSSL.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-08-14 15:54:35 +00:00
Arne Fitzenreiter
cd78363404 Merge remote-tracking branch 'origin/master' into next
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-12 16:48:54 +02:00
Arne Fitzenreiter
41e3393152 initskript: smt: restore IPFire banner
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-12 09:58:56 +02:00
Arne Fitzenreiter
f41a54a2ea initskript: smt: disable smt on vulnerable cpu
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-12 09:11:52 +02:00
Arne Fitzenreiter
ee0ee29843 core178: insert urgent core update for new cpu vulnerability mitigations
this contain kernel-6.1.45, intel-microcode-20230808, linux-firmware-20230804 + fam19h patches and a fix
for early microcode load from initramdisk.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-11 23:32:01 +02:00
Arne Fitzenreiter
6e16017fc0 vulnerabilities.cgi: add new gather_data_sampling and spec_rstack_overfow
this not add details and translation strings yet.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-11 23:29:26 +02:00
Arne Fitzenreiter
162a068448 kernel: update to 6.1.45
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-11 23:25:37 +02:00
Arne Fitzenreiter
285740b926 linux-firmware: update to 20230804
also updated amd_familiy_19h patch which was not in 20230804 yet.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-11 21:12:45 +02:00
Arne Fitzenreiter
20ad6285d6 intel-microcode: update to 20230808
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2023-08-11 16:51:42 +02:00