Commit Graph

17066 Commits

Author SHA1 Message Date
Adolf Belka
fbd7a03e78 p11-kit: New program required for python3 compatibility of ca-certificates
- creation of lfs and rootfile for implementation of p11-kit

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
40cdf8962a make.sh: Added p11-kit and libtasn1 for python3 based ca-certificates approach
- p11-kit required for certs extraction in building of python3 compatible ca-certificates
- p11-kit requires libtasn1 as a build dependency
- p11-kit and libtasn1 added to make.sh

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
043abb984b ca-certificates: Update to work with python3 version of certdata2pem.py
- Implement python3 version of certdata2pem.py script from fedora
- Modify build.sh to work with python3 script that uses p11-kit based on fedora
   approach - https://src.fedoraproject.org/rpms/ca-certificates/tree/rawhide
- Extraction of cert files now uses p11-kit which requires libtasn1 as a build
   dependency
- Updated rootfile
- Updated ca-certificates installed into a vm and confirmed to download a file from an
   https site with the same results as with existing ca-certfictaes system

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Arne Fitzenreiter
5b4fc4c849 core160: add ssh changes and stop/start ipsec at update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
c1418e6fc8 openssh: Update version to 8.7p1
- Update from 8.6p1 to 8.7p1
- Update of rootfile not required
- Changelog is too long to include here. Full details can be found in the ChangeLog file
   in the source tarball or at
   https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ChangeLog

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
6cc834c987 libssh: Update to version 0.9.6
- Update from 0.9.3 to 0.9.6
   0.9.4 and 0.9.6 are security releases
- Update rootfile
- Changelog
   libssh 0.9.6 security release
    This is a security release of libssh to address CVE-2021-3634 (moderate impact), a
    possible heap-buffer overflow when rekeying. A workaround exists. More details can be
    found in the advisory.
    In addition the 0.9.6 version addresses some memory leaks in error path, an AEAD
    handshake and some more.
      CVE-2021-3634: Fix possible heap-buffer overflow when rekeying with different key exchange mechanism
      Fix several memory leaks on error paths
      Reset pending_call_state on disconnect
      Fix handshake bug with AEAD ciphers and no HMAC overlap
      Use OPENSSL_CRYPTO_LIBRARIES in CMake
      Ignore request success and failure message if they are not expected
      Support more identity files in configuration
      Avoid setting compiler flags directly in CMake
      Support build directories with special characters
      Include stdlib.h to avoid crash in Windows
      Fix sftp_new_channel constructs an invalid object
      Fix Ninja multiple rules error
      Several tests fixes
   libssh 0.9.5
    The libssh team is happy to announce another bugfix release of libssh as version
    0.9.5. It offers bug fixes for several issues found by our users.
    This includes a fix for CVE-2020-16135, however we do not see how this would be
    exploitable at all. If you find a security bug in libssh please don’t just assign a
    CVE, talk to us first.
      CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232)
      Improve handling of library initialization (T222)
      Fix parsing of subsecond times in SFTP (T219)
      Make the documentation reproducible
      Remove deprecated API usage in OpenSSL
      Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN
      Define version in one place (T226)
      Prevent invalid free when using different C runtimes than OpenSSL (T229)
      Compatibility improvements to testsuite
   libssh 0.9.4 security release
    This is a security release of libssh to address CVE-2020-1730 (moderate impact), a
    possible Denial of Service (DoS) in client and server when handling AES-CTR keys with
    OpenSSL. A workaround exists. More details can be found in the advisory.
    In addition the this version addresses several memory leaks and adds support for
    diffie-hellman-group14-sha256 key exchange.
      Fixed CVE-2020-1730 (Possible DoS in client and server when handling AES-CTR keys with OpenSSL)
      Added diffie-hellman-group14-sha256
      Fixed several possible memory leaks

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Arne Fitzenreiter
e9af24f34c core160: add IPSec changes (stongswan, vpnmain.cgi)
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Stefan Schantl
b5b19f370d vpnmain.cgi: Do not interpret $? as error code of move()
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Michael Tremer
aec1c53cf1 IPsec: Do not interpret $? as error code of move()
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Michael Tremer
6688e0bc7a IPsec: Fix extra whitespace in exported certificates
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
a41e24d414 strongswan: Update to version 5.9.3
- Update from 5.9.2 to 5.9.3
- Update of rootfile not required
- Changelog
   strongswan-5.9.3
    - Added AES_ECB, SHA-3 and SHAKE-256 support to wolfssl plugin.
    - Added AES_CCM and SHA-3 signature support to openssl plugin.
    - The x509 and openssl plugins now consider the authorityKeyIdentifier, if
      available, before verifying signatures, which avoids unnecessary signature
      verifications after a CA key rollover if both certificates are loaded.
    - The pkcs11 plugin better handles optional attributes like CKA_TRUSTED, which
      previously depended on a version check.
    - charon-nm now supports using SANs as client identities, not only full DNs.
    - charon-tkm now handles IKE encryption.
    - A MOBIKE update is sent again if a a change in the NAT mappings is detected
      but the endpoints stay the same.
    - Converted most of the test case scenarios to the vici interface

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
fd0e08feb9 ffmpeg: Update deps to use sdl2 in place of sdl
- This patch needs to go together with the patch updating sdl to sdl2
   https://patchwork.ipfire.org/project/ipfire/patch/20210824212848.1311257-1-adolf.belka@ipfire.org/
- Update deps line in lfs to use sdl2 in place of sdl
- Update rootfile

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
15c01e309d sdl2: Replace sdl with sdl2. Update to version 2.0.16
- Update from 1.2.15 (2013) to 2.0.16 (2021)
- Source file name changed from SDL to SDL2 so also deleted old sdl and created sdl2
   files for rootfile and lfs
- Changelog is too large to include here. Details can be found in the WhatsNew.txt file
   in the source tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
264cd5b03e sshfs: Add $(MAKETUNING) variable to ninja build
- $(MAKETUNING) variable added to ninja build

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
77e25390bc mpd: Add $(MAKETUNING) variable to ninja build
- $(MAKETUNING) variable added to ninja build

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
c20e5ec272 mpc: Add $(MAKETUNING) variable to ninja build
- $(MAKETUNING) variable added to ninja build

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
f9821c8531 libmpdclient: Add $(MAKETUNING) variable to ninja build
- $(MAKETUNING) variable added to ninja build

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
bf77aa2e30 libinih: Add $(MAKETUNING) variable to ninja build
- $(MAKETUNING) variable added to ninja build

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Adolf Belka
96ba695913 glib: Add $(MAKETUNING) variable to ninja build
- $(MAKETUNING) variable added to ninja build

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Peter Müller
37aa3a110c Postfix: update to 3.6.2
Please refer to http://www.postfix.org/announcements/postfix-3.6.2.html
for this version's release announcement.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Peter Müller
8885bc7672 Tor: update to 0.4.6.7
Full changelog as per https://gitweb.torproject.org/tor.git/plain/ChangeLog?h=tor-0.4.6.7:

Changes in version 0.4.6.7 - 2021-08-16
  This version fixes several bugs from earlier versions of Tor,
  including one that could lead to a denial-of-service attack. Everyone
  running an earlier version, whether as a client, a relay, or an onion
  service, should upgrade to Tor 0.3.5.16, 0.4.5.10, or 0.4.6.7.

  o Major bugfixes (cryptography, security):
    - Resolve an assertion failure caused by a behavior mismatch between
      our batch-signature verification code and our single-signature
      verification code. This assertion failure could be triggered
      remotely, leading to a denial of service attack. We fix this issue
      by disabling batch verification. Fixes bug 40078; bugfix on
      0.2.6.1-alpha. This issue is also tracked as TROVE-2021-007 and
      CVE-2021-38385. Found by Henry de Valence.

  o Minor feature (fallbackdir):
    - Regenerate fallback directories list. Close ticket 40447.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2021/08/12.

  o Minor bugfix (crypto):
    - Disable the unused batch verification feature of ed25519-donna.
      Fixes bug 40078; bugfix on 0.2.6.1-alpha. Found by Henry
      de Valence.

  o Minor bugfixes (onion service):
    - Send back the extended SOCKS error 0xF6 (Onion Service Invalid
      Address) for a v2 onion address. Fixes bug 40421; bugfix
      on 0.4.6.2-alpha.

  o Minor bugfixes (relay):
    - Reduce the compression level for data streaming from HIGH to LOW
      in order to reduce CPU load on the directory relays. Fixes bug
      40301; bugfix on 0.3.5.1-alpha.

  o Minor bugfixes (timekeeping):
    - Calculate the time of day correctly on systems where the time_t
      type includes leap seconds. (This is not the case on most
      operating systems, but on those where it occurs, our tor_timegm
      function did not correctly invert the system's gmtime function,
      which could result in assertion failures when calculating voting
      schedules.) Fixes bug 40383; bugfix on 0.2.0.3-alpha.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Arne Fitzenreiter
b2ea81c323 core160: add udev
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Michael Tremer
8be8ac63ca udev: Enable ntuple offloading feature in supported NICs
We are using CPU-affinity and packet steering functions in various
places in IPFire, but packets might still be received on a random CPU
core.

This feature enables that packets that belong to the same connection
(i.e. have the save tuple) will be steered to the same queue. This will
increase cache locality and decrease locking which results in higher
throughput.

https://www.kernel.org/doc/Documentation/networking/scaling.txt

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Matthias Fischer
f7627d8687 clamav: Update to 0.104.0
For details see:
https://blog.clamav.net/2021/09/clamav-01040-released.html

New requirements and major changes:
"As of ClamAV 0.104, CMake is required to build ClamAV
...
The built-in LLVM for the bytecode runtime has been removed."

But since the current 'llvm 12.0.1' version refused to be build
"...you will need to supply the development libraries for LLVM
version 3.6.2" - which is ~6 years old - I gave up with 'llvm'
and stayed with the bytecode "interpreter".

Cited:
"The bytecode interpreter is the default runtime for bytecode
signatures just as it was in ClamAV 0.103.

@ALL:
In 'clamav 0.104.0' there is no appropriate cmake option for
"CONFIGURE_FLAGS = --disable-fanotify" for ARM buildings anymore.
Perhaps there is a kernel option for this?
=> https://docs.clamav.net/manual/OnAccess.html#requirements

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Arne Fitzenreiter
0783042c7f core160: add glibc
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:41:42 +00:00
Michael Tremer
b9a4368adb glibc: Fix CVE-2021-33574 and follow-up issue
The mq_notify function has a potential use-after-free issue when using a
notification type of SIGEV_THREAD and a thread attribute with a non-default
affinity mask.

The fix for this introduced a NULL pointer dereference.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:36:49 +00:00
Matthias Fischer
2664c94463 mc: Update to 7.8.27
For details see:
http://midnight-commander.org/wiki/NEWS-4.8.27

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:36:29 +00:00
Arne Fitzenreiter
5a69d44423 core160: add wireless-regdb and remove crda
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:34:35 +00:00
Arne Fitzenreiter
dba01cdc8e hostapd: bump package to ship updated wlanap.cgi
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:28:27 +00:00
Adolf Belka
15db822688 wlanap.cgi: Access db.txt in place of using regdbdump on regulatory.bin
- wlanap.cgi was using regdbdump from crda to create a text based list of the
   wireless settings by country database.
- With the removal of crda as part of the removal of python2 this option could not be
   used.
- wireless-regdb also has a text based database list in the source tarball and this
   patch makes wlanap.cgi read this list into the @countrylist_cmd variable
- This needs to be tested by someone that has an IPFire system with wifi that can access
   and evaluate wlanap.cgi to confirm that this change functions as expected.
- This version changes the name of the stored text file from db.txt to regulatorydb.txt
- The command to read the data from regulatorydb.txt into @countrylist_cmd has been
   corrected

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:27:46 +00:00
Adolf Belka
424464c2ad wireless-regdb: Use db.txt file for wlanap.cgi
- db.txt is the text file version of the wireless settings by country database
- Using db.txt means that regdbdump from crda is not required by wlanap.cgi
- This patch copies the db.txt file from the source tarball to /lib/firmware/ where
   it can be read by wlanap.cgi
- This version of the patch renames the db.txt file to regulatorydb.txt
- Updated rootfile to include regulatorydb.txt

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:27:23 +00:00
Adolf Belka
07e45272a0 ipaddr: Removal of this python2 module.
- python3 has this functionality built in with ipaddress.py

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:27:00 +00:00
Adolf Belka
b0e28c2db7 python-setuptools: Removal of this python2 module.
- With the removal of python-m2crypto then this module is not longer required as a
   dependency.
- python3-setuptools was already released into Core Update 157

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:26:37 +00:00
Adolf Belka
233c8b28f5 python-typing: Removal of this python2 module.
- With the removal of python-m2crypto then python-typing is no longer rerquired as a
   dependency.
- The functionality of the python2 typing module is built in to python3.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:26:26 +00:00
Adolf Belka
b439abec1c python-m2crypto: removal of python2 module
- A python3 version of this module is not required as python-m2crypto is only used for
   the build of crda.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:26:11 +00:00
Adolf Belka
1212763b87 crda: removal from kernel 4.15 and onwards.
- From kernel 4.15 and onwards the function of what crda does is built into the kernel.
- Tested the removal of crda with kernel 4.14.232 and kernel 5.10.45
   Country code set by "iw reg set NL" was recognised with kernel 5.10.45 and set at
   the global value of 00 with kernel 4.14.232 confirming the kernel built in option is
   working without the prescence of crda

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:25:53 +00:00
Adolf Belka
0c54777895 make.sh: Remove crda and remaining python2 modules
- crda only works with python2 version of m2crypto
   python-m2crypto requires python-setuptools and python-typing
- With Linux kernel 4.15 and later the country code status check that crda did is built
   into the kernel.
- So from kernel 4.15, crda can be removed, which allows removal of m2crypto, setuptools
   and typing.
- python-typing is built into python3 so no additional python3 module required.
- python3 version of python-setuptools has already been installed.
- python3 version of python-m2crypto is not required. python-m2crypto is only used for the
   build of crda.
- ipaddr can be removed as the function of this python2 module is built into python3 with
   ipaddress.py
- removal of crda tested with 5.10.45 kernel and the setting of a country code was
   recognised. If this test carried out with crda removed and 4.14.232 kernel then country
   code stays defined as the global code "00".
- wlanap.cgi uses regdbdump from crda to create a text based list of the
   wireless settings by country database. With the removal of crda a modification is
   required to wireless-reg to copy the db.txt file to a specific location that wlan.cgi
   can then access. db.txt is the text file version of the wireless settings by country
   database.
- This series version copies the db.txt file and renames it regulatorydb.txt and places it in
   /lib/firmware/
- This series version also corrects the loading command from regulatorydb.txt into the
   @countrylist_cmd variable

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:24:16 +00:00
Arne Fitzenreiter
55cb5e9324 Revert "lynis: Update to version 3.0.6"
This reverts commit d78fd31bb3.
downloads gives every time a different checksum
lookls like packetstorm never send the same file.

[root@helena cache]# wget https://packetstormsecurity.com/files/download/163629/lynis-3.0.6.tar.gz
--2021-09-05 18:29:39--  https://packetstormsecurity.com/files/download/163629/lynis-3.0.6.tar.gz
Resolving packetstormsecurity.com... 198.84.60.198
Connecting to packetstormsecurity.com|198.84.60.198|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/html]
Saving to: 'lynis-3.0.6.tar.gz.1'

lynis-3.0.6.tar.gz.     [ <=>                ]  20.27K  --.-KB/s    in 0s

2021-09-05 18:29:40 (164 MB/s) - 'lynis-3.0.6.tar.gz.1' saved [20753]

[root@helena cache]# wget https://packetstormsecurity.com/files/download/163629/lynis-3.0.6.tar.gz
--2021-09-05 18:29:43--  https://packetstormsecurity.com/files/download/163629/lynis-3.0.6.tar.gz
Resolving packetstormsecurity.com... 198.84.60.198
Connecting to packetstormsecurity.com|198.84.60.198|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/html]
Saving to: 'lynis-3.0.6.tar.gz.2'

lynis-3.0.6.tar.gz.     [ <=>                ]  20.27K  --.-KB/s    in 0s

2021-09-05 18:29:44 (177 MB/s) - 'lynis-3.0.6.tar.gz.2' saved [20753]

[root@helena cache]# md5sum lynis-3.0.6.tar.gz*
a13bad1e6ef81708a86f65d0f317eef6  lynis-3.0.6.tar.gz
841d1f2004220f78a13a702835c906fc  lynis-3.0.6.tar.gz.1
3d6435e94955da9f14d824a1618038c1  lynis-3.0.6.tar.gz.2
[root@helena cache]#
2021-09-05 18:32:50 +00:00
Arne Fitzenreiter
675ca14c50 core160: add header.pl and proxy.cgi
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 18:03:37 +00:00
Michael Tremer
bc464ecd5c proxy.cgi: Use sane check for subnet
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 18:01:54 +00:00
Michael Tremer
ee4b5bbb2d proxy.cgi: Support running proxy without GREEN
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 18:01:36 +00:00
Michael Tremer
2d56b4869a No longer disable proxy when GREEN isn't present
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 18:01:10 +00:00
Adolf Belka
6d11cd4375 client175: Convert python2 modules in source tarball to python3
- Patch created to convert all python modules to python3 compatibility that need it.
   2to3 converter used for this.
- Start initscript changed to use python3
- No change required in rootfile
- Execution of patch added to lfs file
- Tested in vm machine. WUI page showed the same as with the python version.
   scan of directory for mp3 (.flac) files was successful. Could not test actual audio
   playing capability as my vm testbed does not have any audio setup at this time.
  I believe that the purpose of client175 is to provide the WUI page and for that my
   testing seemed to show everything working as expected.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 18:00:25 +00:00
Arne Fitzenreiter
92c3ba8c9d core160: add graphs.pl and getrrdimage.cgi
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 17:55:00 +00:00
Leo-Andres Hofmann
fd7a022630 rrd graphs: Switch to SVG output format
The vector graphics can be scaled without becoming blurred.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 17:52:16 +00:00
Adolf Belka
999b71cf47 ncat: Update to 7.91 and fix #12647 ncat segfault if virtmanager try to connect libvirt
- Update from 7.80 to 7.91
- Update of rootfile
- Changelog is too long to include here
   Full details can be found in the CHANGELOG file in the source tarball
- Added patch to fix segfault - https://github.com/nmap/nmap/issues/2154
- Ran with unpatched 7.91 version
   $ touch /tmp/foo
   $ nc -U /tmp/foo
   Segmentation fault - flagged problem in #12647
- Ran with patched 7.91 version
   $ touch /tmp/foo
   $ nc -U /tmp/foo
   Ncat: Connection refused. - Expected behaviour

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 17:50:40 +00:00
Arne Fitzenreiter
a21e5bbca3 core160: add e2fsprogs
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 17:49:28 +00:00
Adolf Belka
9566f57327 e2fsprogs: Update to version 1.46.3
- Update from 1.44.4 to 1.46.3
- Update of rootfile
- Changelog from 1.44.4 to 1.46.3 is too long to display.
   Full details can be found at http://e2fsprogs.sourceforge.net/e2fsprogs-release.html
   Most of the 14 version updates have bug fixes in them.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 17:48:28 +00:00
Adolf Belka
e170aabc85 faad2: Update to version 2.10.0
- Update from 2.8.8 to 2.10.0
- Update of rootfile carried out
- Changelog
   2.10.0:
     [ tatsuz ]
	* updated Visual Studio projects to VS 2019 (#54)
     [ Fabian Greffrath ]
	* mp4read.c: fix stack-buffer-overflow in stringin()/ftypin()
	* fix heap-buffer-overflow in mp4read.c
     [ Clayton Smith ]
	* Remove non-ASCII characters
	* Remove trailing whitespace
     [ Andrew Wesie ]
	* Check return value of ltp_data.
	* Restrict SBR frame length to 960 and 1024 samples.
	* Support object type 29.
	* Support implicit SBR signaling in frontend.
	* Fix PNS decoding when only right channel is noise.
	* Initialize element_id array with an invalid id.
	* Fix NULL pointer dereferences.
	* Fix infinite loop in adts_parse.
	* Fix infinite loop in huffman_getescape.
	* Check for error after each channel decode.
	* Check for inconsistent number of channels.
   2.9.2:
     [ Michał Janiszewski ]
	* Only use x86-assembly when explicitly on x86
	* Use unsigned integers correctly
	* Initialize pointers that might otherwise not be
     [ Fabian Greffrath ]
	* update README esp. WRT directory structure
     [ Rosen Penev ]
	* fix compilation without SBR/PS_DEC (#48)
	* fix compilation with LC_ONLY_DECODER (#47)
     [ Fabian Greffrath ]
	* fix "inline function 'cfftf1' declared but never defined" compiler warning
	* fix some inconsistencies in the frontend output
	* mp4read_open: add check for failed frame buffer allocation
	* stszin: add check for allocation error and integer overflow
	* add a pkg-config file
     [ Stefan Pöschel ]
	* frontend: address compile warning + add missing LF (#50)
     [ François Cartegnie ]
	* library name is faad (#52)
	* Unbreak PS audio (#51)
   2.9.1:
     [ Fabian Greffrath ]
	* Include stdio.h in libfaad/ps_dec.c for stderr (Michael Fink)
	* Fix Tille -> Title typo in frontend/mp4read.c (Alexander Thomas)
   2.9.0:
     [ Krzysztof Nikiel ]
	* Build system fixes and code clean-up
     [ LoRd_MuldeR ]
	* Fix compiler warnings and code indentation
	* Fix compilation with GCC <= 4.7.3
	* MSVC solution file clean-up
     [ Cameron Cawley ]
	* Fix compilation with GCC 4.7.4
	* Fix compilation with MinGW
     [ Michael Fink ]
	* MSVC 2017 project file update
     [ Hugo Lefeuvre ]
	* Fix crash with unsupported MP4 files (NULL pointer dereference,
	  division by zero)
	* CVE-2019-6956: ps_dec: sanitize iid_index before mixing
	* CVE-2018-20196: sbr_fbt: sanitize sbr->M (should not exceed MAX_M)
	* CVE-2018-20199, CVE-2018-20360: specrec: better handle unexpected
	  parametric stereo (PS)
	* CVE-2018-20362, CVE-2018-19504, CVE-2018-20195, CVE-2018-20198,
	  CVE-2018-20358: syntax.c: check for syntax element inconsistencies
	* CVE-2018-20194, CVE-2018-19503, CVE-2018-20197, CVE-2018-20357,
	  CVE-2018-20359, CVE-2018-20361: sbr_hfadj: sanitize frequency band
	  borders
     [ Hugo Beauzée-Luyssen ]
	* CVE-2019-15296, CVE-2018-19502: Fix a couple buffer overflows
     [ Filip Roséen ]
	* Prevent crash on SCE followed by CPE
     [ Gianfranco Costamagna ]
	* Fix linking with GCC 9 and "-Wl,--as-needed"
     [ Fabian Greffrath ]
	* Enable the frontend to be built reproducibly

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 17:46:41 +00:00
Adolf Belka
6c6e7a94e0 ncdu: Update to version 1.16
- Update from 1.15.1 to 1.16
- Update of rootfile not required
- Changelog
   1.16 - 2021-07-02
	- Increase width of size bar depending on terminal size (Christian Göttsche)
	- Set/increment $NCDU_LEVEL variable when spawning a shell
	- Indicate whether apparent size or disk usage is being displayed
	- Display setuid, setgid and sticky bits in file flags in extended mode
	- Fix error handling while reading --exclude-from file
	- Improve JSON import to allow for several future extensions to the format
	- Export link count in JSON dumps
	- Don't export inode in JSON dumps for non-hardlinks

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-05 17:46:14 +00:00