Commit Graph

21405 Commits

Author SHA1 Message Date
Michael Tremer
fced111d30 libhtp: Update to 0.5.46
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 11:33:23 +00:00
Michael Tremer
ef387142af suricata: Update to 6.0.16
https://redmine.openinfosecfoundation.org/versions/201

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 11:30:38 +00:00
Michael Tremer
8e111d6f03 core184: Ship squid
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 11:26:55 +00:00
Matthias Fischer
8c2109bc21 squid: Update to 6.7
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>

For details see:
https://github.com/squid-cache/squid/commits/v6

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 11:25:40 +00:00
Michael Tremer
498d5613d6 core184: Ship expat
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 11:25:19 +00:00
Adolf Belka
49b8893ff5 expat: Update to version 2.6.0
- Update from version 2.5.0 to 2.6.0
- Update of rootfile
- This update fixes two CVE's. Not sure if IPFire would be vulnerable or not but safer
   to update anyway.
- Changelog
    2.6.0
        Security fixes:
	      #789 #814  CVE-2023-52425 -- Fix quadratic runtime issues with big tokens
	                   that can cause denial of service, in partial where
	                   dealing with compressed XML input.  Applications
	                   that parsed a document in one go -- a single call to
	                   functions XML_Parse or XML_ParseBuffer -- were not affected.
	                   The smaller the chunks/buffers you use for parsing
	                   previously, the bigger the problem prior to the fix.
	                   Backporters should be careful to no omit parts of
	                   pull request #789 and to include earlier pull request #771,
	                   in order to not break the fix.
	           #777  CVE-2023-52426 -- Fix billion laughs attacks for users
	                   compiling *without* XML_DTD defined (which is not common).
	                   Users with XML_DTD defined have been protected since
	                   Expat >=2.4.0 (and that was CVE-2013-0340 back then).
        Bug fixes:
	            #753  Fix parse-size-dependent "invalid token" error for
	                    external entities that start with a byte order mark
	            #780  Fix NULL pointer dereference in setContext via
	                    XML_ExternalEntityParserCreate for compilation with
	                    XML_DTD undefined
	       #812 #813  Protect against closing entities out of order
        Other changes:
	            #723  Improve support for arc4random/arc4random_buf
	       #771 #788  Improve buffer growth in XML_GetBuffer and XML_Parse
	       #761 #770  xmlwf: Support --help and --version
	       #759 #770  xmlwf: Support custom buffer size for XML_GetBuffer and read
	            #744  xmlwf: Improve language and URL clickability in help output
	            #673  examples: Add new example "element_declarations.c"
	            #764  Be stricter about macro XML_CONTEXT_BYTES at build time
	            #765  Make inclusion to expat_config.h consistent
	       #726 #727  Autotools: configure.ac: Support --disable-maintainer-mode
	    #678 #705 ..
	  #706 #733 #792  Autotools: Sync CMake templates with CMake 3.26
	            #795  Autotools: Make installation of shipped man page doc/xmlwf.1
	                    independent of docbook2man availability
	            #815  Autotools|CMake: Add missing -DXML_STATIC to pkg-config file
	                    section "Cflags.private" in order to fix compilation
	                    against static libexpat using pkg-config on Windows
	       #724 #751  Autotools|CMake: Require a C99 compiler
	                    (a de-facto requirement already since Expat 2.2.2 of 2017)
	            #793  Autotools|CMake: Fix PACKAGE_BUGREPORT variable
	       #750 #786  Autotools|CMake: Make test suite require a C++11 compiler
	            #749  CMake: Require CMake >=3.5.0
	            #672  CMake: Lowercase off_t and size_t to help a bug in Meson
	            #746  CMake: Sort xmlwf sources alphabetically
	            #785  CMake|Windows: Fix generation of DLL file version info
	            #790  CMake: Build tests/benchmark/benchmark.c as well for
	                    a build with -DEXPAT_BUILD_TESTS=ON
	       #745 #757  docs: Document the importance of isFinal + adjust tests
	                    accordingly
	            #736  docs: Improve use of "NULL" and "null"
	            #713  docs: Be specific about version of XML (XML 1.0r4)
	                    and version of C (C99); (XML 1.0r5 will need a sponsor.)
	            #762  docs: reference.html: Promote function XML_ParseBuffer more
	            #779  docs: reference.html: Add HTML anchors to XML_* macros
	            #760  docs: reference.html: Upgrade to OK.css 1.2.0
	       #763 #739  docs: Fix typos
	            #696  docs|CI: Use HTTPS URLs instead of HTTP at various places
	    #669 #670 ..
	    #692 #703 ..
	       #733 #772  Address compiler warnings
	       #798 #800  Address clang-tidy warnings
	       #775 #776  Version info bumped from 9:10:8 (libexpat*.so.1.8.10)
	                    to 10:0:9 (libexpat*.so.1.9.0); see https://verbump.de/
	                    for what these numbers do
        Infrastructure:
	       #700 #701  docs: Document security policy in file SECURITY.md
	            #766  docs: Improve parse buffer variables in-code documentation
	    #674 #738 ..
	    #740 #747 ..
	  #748 #781 #782  Refactor coverage and conformance tests
	       #714 #716  Refactor debug level variables to unsigned long
	            #671  Improve handling of empty environment variable value
	                    in function getDebugLevel (without visible user effect)
	    #755 #774 ..
	    #758 #783 ..
	       #784 #787  tests: Improve test coverage with regard to parse chunk size
	  #660 #797 #801  Fuzzing: Improve fuzzing coverage
	       #367 #799  Fuzzing|CI: Start running OSS-Fuzz fuzzing regression tests
	       #698 #721  CI: Resolve some Travis CI leftovers
	            #669  CI: Be robust towards absence of Git tags
	       #693 #694  CI: Set permissions to "contents: read" for security
	            #709  CI: Pin all GitHub Actions to specific commits for security
	            #739  CI: Reject spelling errors using codespell
	            #798  CI: Enforce clang-tidy clean code
	    #773 #808 ..
	       #809 #810  CI: Upgrade Clang from 15 to 18
	            #796  CI: Start using Clang's Control Flow Integrity sanitizer
	  #675 #720 #722  CI: Adapt to breaking changes in GitHub Actions Ubuntu images
	            #689  CI: Adapt to breaking changes in Clang/LLVM Debian packaging
	            #763  CI: Adapt to breaking changes in codespell
	            #803  CI: Adapt to breaking changes in Cppcheck

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 11:24:59 +00:00
Michael Tremer
3757d24e47 libvirt: Don't build for riscv64
There seems to be some problem that this package does not build from
source, but as we don't currently have any hardware that supports thise,
there is no point in debugging it.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:21:49 +00:00
Michael Tremer
b8c898b482 core184: Ship vpnmain.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:09:50 +00:00
Michael Tremer
9f01011570 vpnmain.cgi: Add option to regenerate the host certificate
This is necessary since we now have a much shorter lifetime for the host
certificate. However, it is complicated to do this is which is why we
are copying the previous certificate and generate a new CSR. This is
then signed.

A caveat of this patch is that we do not rollover the key.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:08:51 +00:00
Michael Tremer
aa07e1bb3e vpnmain.cgi: Return the entire error message if OpenSSL fails
The function did not evaluate the return code which is why it used a
hack to figure out if some output is an error or not.

This is being fixed in this commit and the entire output is being
returned if the return code is non-zero.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:07:53 +00:00
Michael Tremer
182743310c vpnmain.cgi: Do not use a bad source for randomness
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:07:53 +00:00
Michael Tremer
08c20b8457 core184: Ship HOSTILE IN/OUT changes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:05:08 +00:00
Michael Tremer
3dfc748946 firewall: Improve labelling of hostile networks hits
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:53 +00:00
Michael Tremer
7c9a6cf163 firewall: graphs: Add a line for the total number of hostile hits
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:41 +00:00
Adolf Belka
b4f6962c4d optionsfw.cgi: Move Firewall Options Drop commands to before the logging section
- Moved the Firewall Options Drop commands to before the logging section, as discussed
   at January 2024 Video Call.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:18 +00:00
Adolf Belka
216d4bfc3d graphs.pl: Fixes bug12981 - Creates in and outgoing drop hostile graph entries
- This v3 version of the patch set splits the single hostile networks graph entry into
   incoming hostile networks and outgoing hostile networks entries.

Fixes: bug12981
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:18 +00:00
Adolf Belka
d2b423b1dc collectd.conf: Fix bug12981 - This creates in and out drop hostile data collection
- In this v3 version of the patch set the splitting of drop hostile logging into incoming
   and outgoing logging means that the data collection and graphs need to have drop hostile
   also split into incoming and outgoing.

Fixes: bug12981
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:18 +00:00
Adolf Belka
6aa450ec3b en.pl: Fixes bug12981 - adds english language input for choice of drop hostile logging
- In this v3 version have added translations for hostile networks in and hostile
   networks out and log drop hostile in and log drop hostile out.

Fixes: bug12981
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:18 +00:00
Adolf Belka
37c5b4b62e firewall: Fixes bug12981 - add if loop to log or not log dropped hostile traffic
- This v3 version now has two if loops allowing logging of incoming drop hostile or
   outgoing drop hostile or both or neither.
- Dependent on the choice in optionsfw.cgi this loop will either log or not log the
   dropped hostile traffic.

Fixes: bug12981
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:17 +00:00
Adolf Belka
f23555a1c6 rules.pl: Fixes bug12981 - Add in and out specific actions for drop hostile
- This changes the action from HOSTILE_DROP to HOSTILE_DROP_IN for icnoming traffic and
   HOSTILE_DROP_OUT for outgoing traffic enabling logging decisions to be taken on each
   independently.

Fixes: bug12981
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Acked-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:17 +00:00
Adolf Belka
89645d1bbf optionsfw.cgi: Fix bug12981 - Add option to log or not log dropped hostile traffic
- This v3 version has split the logging choice for drop hostile to separate the logging of
   incoming drop hostile and outgoing drop hostile.
- The bug originator had no port forwards so all hostile would be dropped normally anyway.
   However the logs were being swamped by the logging of drop hostile making analysis
   difficult. So incoming drop hostile was desired to not be logged. However logging of
   outgoing drop hostile was desired to identify if clients on the internal lan were
   infected with malware trying to reach home.
- Added option with drop hostile section to decide if the dropped traffic should be
   logged or not.

Fixes: bug12981
Tested-by: Adolf Belka <adolf.belka@ipfire.org
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:17 +00:00
Michael Tremer
7d0f48668b elfutils: Don't ship tools
I don't think there is any point that we ship these.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:01:25 +00:00
Michael Tremer
fb7d13725f core184: Remove elfutils pakfire metadata (if installed)
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 10:58:21 +00:00
Adolf Belka
0e16c27908 strace: elfutils moved from addon dependency to core program
Fixes: Bug#13516
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 10:56:08 +00:00
Adolf Belka
4b1254520a qemu: elfutils moved from addon dependency to core program
Fixes: Bug#13516
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 10:56:03 +00:00
Adolf Belka
c09d232447 ltrace: elfutils moved from addon dependency to core program
Fixes: Bug#13516
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 10:55:52 +00:00
Adolf Belka
30dc4c0248 frr: elfutils moved from addon dependency to core program
Fixes: Bug#13516
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 10:55:46 +00:00
Adolf Belka
816af4dfb7 elfutils: Move from addon to core program. Required by suricata-7.0.2 for execution
- Updated lfs file to core program type
- Moved rootfile from packages to common
- Older suricata versions required elfutils only for building but suricata-7.0.2 fails to
   start if elfutils is not present due to libelf.so.1 being missing.
- The requirement for elfutils is not mentioned at all in the changelog.

Fixes: Bug#13516
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 10:55:34 +00:00
Arne Fitzenreiter
437bfd6780 vdr_streamdev: update to 0.6.3
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-05 11:07:03 +01:00
Arne Fitzenreiter
6179f056da vdr_epgsearch: update to 2.4.2
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-05 11:06:29 +01:00
Arne Fitzenreiter
2c930773f5 vdr_eepg: update PLUGVER to new vdr
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-05 11:05:02 +01:00
Arne Fitzenreiter
bc4b8c4858 vdr_dvbapi: update pluginver for new vdr
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-05 11:03:33 +01:00
Arne Fitzenreiter
cbf32e7dd2 vdr: update to 2.6.6
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-05 11:02:25 +01:00
Arne Fitzenreiter
8fcd99355b borgbackup: fix rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-04 06:55:10 +00:00
Arne Fitzenreiter
9a003afb9d python3-pyfuse3: fix rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-04 06:54:38 +00:00
Arne Fitzenreiter
84a8b679cb python3-msgpack: fix rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-04 06:53:49 +00:00
Arne Fitzenreiter
cd5d0b7658 checkrootfiles: fix search for wrong rootfiles
Im not sure when the grep syntax has changed but
grep -r not like/ignore the leading "/" anymore.
2024-02-03 14:47:41 +00:00
Arne Fitzenreiter
d145574673 kernel: update to 6.6.15
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-02 07:33:38 +00:00
Michael Tremer
e95d12e5ee core184: Ship lzip
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:09:02 +00:00
Adolf Belka
f7520e0add lzip: Update to version 1.24
- Update from version 1.23 to 1.24
- Update of rootfile not required
- Changelog
    1.24
	The option '--empty-error', which forces exit status 2 if any empty member
	  is found, has been added.
	The option '--marking-error', which forces exit status 2 if the first LZMA
	  byte is non-zero in any member, has been added.
	File diagnostics have been reformatted as 'PROGRAM: FILE: MESSAGE'.
	Diagnostics caused by invalid arguments to command-line options now show the
	  argument and the name of the option.
	The option '-o, --output' now preserves dates, permissions, and ownership of
	  the file when (de)compressing exactly one file.
	The option '-o, --output' now creates missing intermediate directories when
	  writing to a file.
	The variable MAKEINFO has been added to configure and Makefile.in.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:08:42 +00:00
Michael Tremer
7de5c351b5 core184: Ship gettext
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:07:39 +00:00
Adolf Belka
64aa5bf53e gettext: Update to version 0.22.4
- Update from version 0.22 to 0.22.4
- Update of rootfile
- Changelog
    0.22.4
	* Bug fixes:
	  - AM_GNU_GETTEXT now recognizes a statically built libintl on macOS and AIX.
	  - Build fixes on AIX.
    0.22.3
	* Portability:
	  - The libintl library now works on macOS 14.  (Older versions of libintl
	    crash on macOS 14, due to an incompatible change in macOS.)
    0.22.2
	* Bug fixes:
	  - The libintl shared library now exports again some symbols that were
	    accidentally missing.
	    <https://savannah.gnu.org/bugs/index.php?64323>
	    This bug was introduced in version 0.22.
    0.22.1
	* Bug fixes:
	  - xgettext's processing of large Perl files may have led to errors
	    <https://savannah.gnu.org/bugs/index.php?64552>
	  - "xgettext --join-existing" could encounter errors.
	    <https://savannah.gnu.org/bugs/index.php?64490>
	  These bugs were introduced in version 0.22.
	* Portability:
	  - Building on Android is now supported.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:07:15 +00:00
Michael Tremer
2b2453568d core184: Ship ed
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:07:01 +00:00
Adolf Belka
da63a6cc46 ed: Update to version 1.20
- Update from version 1.19 to 1.20
- Update of rootfile not required
- Changelog
    1.20
	New command-line options '+line', '+/RE', and '+?RE' have been implemented to
	  set the current line to the line number specified or to the first or last line
	  matching the regular expression 'RE'.
	  (Suggested by Matthew Polk and John Cowan).
	File names containing control characters 1 to 31 are now rejected unless they
	  are allowed with the command-line option '--unsafe-names'.
	File names containing control characters 1 to 31 are now printed using octal
	  escape sequences.
	Ed now rejects file names ending with a slash.
	Intervening commands that don't set the modified flag no longer make a second
	  'e' or 'q' command fail with a 'buffer modified' warning.
	Tilde expansion is now performed on file names supplied to commands; if a file
	  name starts with '~/', the tilde (~) is expanded to the contents of the
	  variable HOME. (Suggested by John Cowan).
	Ed now warns the first time that a command modifies a buffer loaded from a
	  read-only file. (Suggested by Dan Jacobson).
	Ed now creates missing intermediate directories when writing to a file.
	It has been documented that 'e' creates an empty buffer if file does not exist.
	It has been documented that 'f' sets the default filename, whether or not its
	  argument names an existing file.
	The description of the exit status has been improved in '--help' and in the
	  manual.
	The variable MAKEINFO has been added to configure and Makefile.in.
	It has been documented in INSTALL that when choosing a C standard, the POSIX
	  features need to be enabled explicitly:
	   ./configure CFLAGS+='--std=c99 -D_POSIX_C_SOURCE=2'

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:06:40 +00:00
Michael Tremer
4975883833 core184: Ship diffutils
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:06:10 +00:00
Adolf Belka
fa96ada3a2 diffutils: Update to version 3.10
- Update from version 3.9 to 3.10
- Update of rootfile not required
- Changelog
    3.10
	Bug fixes
	  cmp/diff can again work with file dates past Y2K38
	   [bug introduced in 3.9]
	  diff -D no longer fails to output #ifndef lines.
	   [bug#61193 introduced in 3.9]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:05:44 +00:00
Arne Fitzenreiter
88b6ad8112 mympd: create/check config before first start
this create missing folders for webradio and state.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-01-31 21:09:14 +01:00
Adolf Belka
72a5fff634 sqlite: Update to version 3450100
- Update from version 3450000 to 3450100
- Update of rootfile not required
- Changelog
    3.45.1
	Restore the JSON BLOB input bug, and promise to support the anomaly in subsequent
	 releases, for backward compatibility.
	Fix the PRAGMA integrity_check command so that it works on read-only databases
	 that contain FTS3 and FTS5 tables. This resolves an issue introduced in version
	 3.44.0 but was undiscovered until after the 3.45.0 release.
	Fix issues associated with processing corrupt JSONB inputs:
	    Prevent exponential runtime when converting a corrupt JSONB into text.
	    Fix a possible read of one byte past the end of the JSONB blob when
	     converting a corrupt JSONB into text.
	    Enhanced testing using jfuzz to prevent any future JSONB problems such as the
	     above.
	Fix a long-standing bug in which a read of a few bytes past the end of a
	 memory-mapped segment might occur when accessing a craftily corrupted database
	 using memory-mapped database.
	Fix a long-standing bug in which a NULL pointer dereference might occur in the
	 bytecode engine due to incorrect bytecode being generated for a class of SQL
	 statements that are deliberately designed to stress the query planner but which
	 are otherwise pointless.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 17:06:43 +00:00
Michael Tremer
08fb3034d0 core184: Ship readline
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 17:06:33 +00:00
Adolf Belka
e9ba050b69 readline: Update patches to patch 1 to patch 10
- Update from version 8.2 with patch 1 to 8.2 with patches 1 to 10
- Update of rootfile not required
- Changelog
    Patch 10
	Fix the case where text to be completed from the line buffer (quoted) is
	compared to the common prefix of the possible matches (unquoted) and the
	quoting makes the former appear to be longer than the latter. Readline
	assumes the match doesn't add any characters to the word and doesn't display
	multiple matches.
    Patch 9
	Fix issue where the directory name portion of the word to be completed (the
	part that is passed to opendir()) requires both tilde expansion and dequoting.
	Readline only performed tilde expansion in this case, so filename completion
	would fail.
    Patch 8
	Add missing prototypes for several function declarations.
    Patch 7
	If readline is called with no prompt, it should display a newline if return
	is typed on an empty line. It should still suppress the final newline if
	return is typed on the last (empty) line of a multi-line command.
    Patch 6
	This is a variant of the same issue as the one fixed by patch 5. In this
	case, the signal arrives and is pending before readline calls rl_getc().
	When this happens, the pending signal will be handled by the loop, but may
	alter or destroy some state that the callback uses. Readline needs to treat
	this case the same way it would if a signal interrupts pselect/select, so
	compound operations like searches and reading numeric arguments get cleaned
	up properly.
    Patch 5
	If an application is using readline in callback mode, and a signal arrives
	after readline checks for it in rl_callback_read_char() but before it
	restores the application's signal handlers, it won't get processed until the
	next time the application calls rl_callback_read_char(). Readline needs to
	check for and resend any pending signals after restoring the application's
	signal handlers.
    Patch 4
	There are systems that supply one of select or pselect, but not both.
    Patch 3
	The custom color prefix that readline uses to color possible completions
	must have a leading `.'.
    Patch 2
	It's possible for readline to try to zero out a line that's not null-
	terminated, leading to a memory fault.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 17:06:19 +00:00