Commit Graph

11666 Commits

Author SHA1 Message Date
Michael Tremer
8e111d6f03 core184: Ship squid
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 11:26:55 +00:00
Michael Tremer
498d5613d6 core184: Ship expat
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 11:25:19 +00:00
Adolf Belka
49b8893ff5 expat: Update to version 2.6.0
- Update from version 2.5.0 to 2.6.0
- Update of rootfile
- This update fixes two CVE's. Not sure if IPFire would be vulnerable or not but safer
   to update anyway.
- Changelog
    2.6.0
        Security fixes:
	      #789 #814  CVE-2023-52425 -- Fix quadratic runtime issues with big tokens
	                   that can cause denial of service, in partial where
	                   dealing with compressed XML input.  Applications
	                   that parsed a document in one go -- a single call to
	                   functions XML_Parse or XML_ParseBuffer -- were not affected.
	                   The smaller the chunks/buffers you use for parsing
	                   previously, the bigger the problem prior to the fix.
	                   Backporters should be careful to no omit parts of
	                   pull request #789 and to include earlier pull request #771,
	                   in order to not break the fix.
	           #777  CVE-2023-52426 -- Fix billion laughs attacks for users
	                   compiling *without* XML_DTD defined (which is not common).
	                   Users with XML_DTD defined have been protected since
	                   Expat >=2.4.0 (and that was CVE-2013-0340 back then).
        Bug fixes:
	            #753  Fix parse-size-dependent "invalid token" error for
	                    external entities that start with a byte order mark
	            #780  Fix NULL pointer dereference in setContext via
	                    XML_ExternalEntityParserCreate for compilation with
	                    XML_DTD undefined
	       #812 #813  Protect against closing entities out of order
        Other changes:
	            #723  Improve support for arc4random/arc4random_buf
	       #771 #788  Improve buffer growth in XML_GetBuffer and XML_Parse
	       #761 #770  xmlwf: Support --help and --version
	       #759 #770  xmlwf: Support custom buffer size for XML_GetBuffer and read
	            #744  xmlwf: Improve language and URL clickability in help output
	            #673  examples: Add new example "element_declarations.c"
	            #764  Be stricter about macro XML_CONTEXT_BYTES at build time
	            #765  Make inclusion to expat_config.h consistent
	       #726 #727  Autotools: configure.ac: Support --disable-maintainer-mode
	    #678 #705 ..
	  #706 #733 #792  Autotools: Sync CMake templates with CMake 3.26
	            #795  Autotools: Make installation of shipped man page doc/xmlwf.1
	                    independent of docbook2man availability
	            #815  Autotools|CMake: Add missing -DXML_STATIC to pkg-config file
	                    section "Cflags.private" in order to fix compilation
	                    against static libexpat using pkg-config on Windows
	       #724 #751  Autotools|CMake: Require a C99 compiler
	                    (a de-facto requirement already since Expat 2.2.2 of 2017)
	            #793  Autotools|CMake: Fix PACKAGE_BUGREPORT variable
	       #750 #786  Autotools|CMake: Make test suite require a C++11 compiler
	            #749  CMake: Require CMake >=3.5.0
	            #672  CMake: Lowercase off_t and size_t to help a bug in Meson
	            #746  CMake: Sort xmlwf sources alphabetically
	            #785  CMake|Windows: Fix generation of DLL file version info
	            #790  CMake: Build tests/benchmark/benchmark.c as well for
	                    a build with -DEXPAT_BUILD_TESTS=ON
	       #745 #757  docs: Document the importance of isFinal + adjust tests
	                    accordingly
	            #736  docs: Improve use of "NULL" and "null"
	            #713  docs: Be specific about version of XML (XML 1.0r4)
	                    and version of C (C99); (XML 1.0r5 will need a sponsor.)
	            #762  docs: reference.html: Promote function XML_ParseBuffer more
	            #779  docs: reference.html: Add HTML anchors to XML_* macros
	            #760  docs: reference.html: Upgrade to OK.css 1.2.0
	       #763 #739  docs: Fix typos
	            #696  docs|CI: Use HTTPS URLs instead of HTTP at various places
	    #669 #670 ..
	    #692 #703 ..
	       #733 #772  Address compiler warnings
	       #798 #800  Address clang-tidy warnings
	       #775 #776  Version info bumped from 9:10:8 (libexpat*.so.1.8.10)
	                    to 10:0:9 (libexpat*.so.1.9.0); see https://verbump.de/
	                    for what these numbers do
        Infrastructure:
	       #700 #701  docs: Document security policy in file SECURITY.md
	            #766  docs: Improve parse buffer variables in-code documentation
	    #674 #738 ..
	    #740 #747 ..
	  #748 #781 #782  Refactor coverage and conformance tests
	       #714 #716  Refactor debug level variables to unsigned long
	            #671  Improve handling of empty environment variable value
	                    in function getDebugLevel (without visible user effect)
	    #755 #774 ..
	    #758 #783 ..
	       #784 #787  tests: Improve test coverage with regard to parse chunk size
	  #660 #797 #801  Fuzzing: Improve fuzzing coverage
	       #367 #799  Fuzzing|CI: Start running OSS-Fuzz fuzzing regression tests
	       #698 #721  CI: Resolve some Travis CI leftovers
	            #669  CI: Be robust towards absence of Git tags
	       #693 #694  CI: Set permissions to "contents: read" for security
	            #709  CI: Pin all GitHub Actions to specific commits for security
	            #739  CI: Reject spelling errors using codespell
	            #798  CI: Enforce clang-tidy clean code
	    #773 #808 ..
	       #809 #810  CI: Upgrade Clang from 15 to 18
	            #796  CI: Start using Clang's Control Flow Integrity sanitizer
	  #675 #720 #722  CI: Adapt to breaking changes in GitHub Actions Ubuntu images
	            #689  CI: Adapt to breaking changes in Clang/LLVM Debian packaging
	            #763  CI: Adapt to breaking changes in codespell
	            #803  CI: Adapt to breaking changes in Cppcheck

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-09 11:24:59 +00:00
Michael Tremer
b8c898b482 core184: Ship vpnmain.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:09:50 +00:00
Michael Tremer
9f01011570 vpnmain.cgi: Add option to regenerate the host certificate
This is necessary since we now have a much shorter lifetime for the host
certificate. However, it is complicated to do this is which is why we
are copying the previous certificate and generate a new CSR. This is
then signed.

A caveat of this patch is that we do not rollover the key.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:08:51 +00:00
Michael Tremer
08c20b8457 core184: Ship HOSTILE IN/OUT changes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:05:08 +00:00
Michael Tremer
7c9a6cf163 firewall: graphs: Add a line for the total number of hostile hits
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:41 +00:00
Adolf Belka
216d4bfc3d graphs.pl: Fixes bug12981 - Creates in and outgoing drop hostile graph entries
- This v3 version of the patch set splits the single hostile networks graph entry into
   incoming hostile networks and outgoing hostile networks entries.

Fixes: bug12981
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:18 +00:00
Adolf Belka
d2b423b1dc collectd.conf: Fix bug12981 - This creates in and out drop hostile data collection
- In this v3 version of the patch set the splitting of drop hostile logging into incoming
   and outgoing logging means that the data collection and graphs need to have drop hostile
   also split into incoming and outgoing.

Fixes: bug12981
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:18 +00:00
Adolf Belka
f23555a1c6 rules.pl: Fixes bug12981 - Add in and out specific actions for drop hostile
- This changes the action from HOSTILE_DROP to HOSTILE_DROP_IN for icnoming traffic and
   HOSTILE_DROP_OUT for outgoing traffic enabling logging decisions to be taken on each
   independently.

Fixes: bug12981
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Acked-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:02:17 +00:00
Michael Tremer
7d0f48668b elfutils: Don't ship tools
I don't think there is any point that we ship these.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 11:01:25 +00:00
Michael Tremer
fb7d13725f core184: Remove elfutils pakfire metadata (if installed)
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 10:58:21 +00:00
Adolf Belka
816af4dfb7 elfutils: Move from addon to core program. Required by suricata-7.0.2 for execution
- Updated lfs file to core program type
- Moved rootfile from packages to common
- Older suricata versions required elfutils only for building but suricata-7.0.2 fails to
   start if elfutils is not present due to libelf.so.1 being missing.
- The requirement for elfutils is not mentioned at all in the changelog.

Fixes: Bug#13516
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-07 10:55:34 +00:00
Arne Fitzenreiter
437bfd6780 vdr_streamdev: update to 0.6.3
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-05 11:07:03 +01:00
Arne Fitzenreiter
6179f056da vdr_epgsearch: update to 2.4.2
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-05 11:06:29 +01:00
Arne Fitzenreiter
2c930773f5 vdr_eepg: update PLUGVER to new vdr
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-05 11:05:02 +01:00
Arne Fitzenreiter
bc4b8c4858 vdr_dvbapi: update pluginver for new vdr
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-05 11:03:33 +01:00
Arne Fitzenreiter
8fcd99355b borgbackup: fix rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-04 06:55:10 +00:00
Arne Fitzenreiter
9a003afb9d python3-pyfuse3: fix rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-04 06:54:38 +00:00
Arne Fitzenreiter
84a8b679cb python3-msgpack: fix rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-04 06:53:49 +00:00
Arne Fitzenreiter
d145574673 kernel: update to 6.6.15
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-02-02 07:33:38 +00:00
Michael Tremer
e95d12e5ee core184: Ship lzip
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:09:02 +00:00
Michael Tremer
7de5c351b5 core184: Ship gettext
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:07:39 +00:00
Adolf Belka
64aa5bf53e gettext: Update to version 0.22.4
- Update from version 0.22 to 0.22.4
- Update of rootfile
- Changelog
    0.22.4
	* Bug fixes:
	  - AM_GNU_GETTEXT now recognizes a statically built libintl on macOS and AIX.
	  - Build fixes on AIX.
    0.22.3
	* Portability:
	  - The libintl library now works on macOS 14.  (Older versions of libintl
	    crash on macOS 14, due to an incompatible change in macOS.)
    0.22.2
	* Bug fixes:
	  - The libintl shared library now exports again some symbols that were
	    accidentally missing.
	    <https://savannah.gnu.org/bugs/index.php?64323>
	    This bug was introduced in version 0.22.
    0.22.1
	* Bug fixes:
	  - xgettext's processing of large Perl files may have led to errors
	    <https://savannah.gnu.org/bugs/index.php?64552>
	  - "xgettext --join-existing" could encounter errors.
	    <https://savannah.gnu.org/bugs/index.php?64490>
	  These bugs were introduced in version 0.22.
	* Portability:
	  - Building on Android is now supported.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:07:15 +00:00
Michael Tremer
2b2453568d core184: Ship ed
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:07:01 +00:00
Michael Tremer
4975883833 core184: Ship diffutils
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-02-01 16:06:10 +00:00
Michael Tremer
08fb3034d0 core184: Ship readline
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 17:06:33 +00:00
Michael Tremer
c749cee1e5 core184: Ship iana-etc
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 17:06:09 +00:00
Michael Tremer
43894a9bab core184: Ship file
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 17:05:30 +00:00
Michael Tremer
2240d08312 core184: Ship updated glibc
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 11:11:41 +00:00
Michael Tremer
eadffeb43f core184: Ship updated collectd init script
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 10:30:47 +00:00
Michael Tremer
c1d60341d5 core184: Ship zlib
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 10:30:01 +00:00
Adolf Belka
91ddb27aa1 zlib: Update to version 1.3.1
- Update from version 1.3 to 1.3.1
- Update of rootfile
- Changelog
    1.3.1
	- Reject overflows of zip header fields in minizip
	- Fix bug in inflateSync() for data held in bit buffer
	- Add LIT_MEM define to use more memory for a small deflate speedup
	- Fix decision on the emission of Zip64 end records in minizip
	- Add bounds checking to ERR_MSG() macro, used by zError()
	- Neutralize zip file traversal attacks in miniunz
	- Fix a bug in ZLIB_DEBUG compiles in check_match()
	- Various portability and appearance improvements

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 10:29:47 +00:00
Michael Tremer
45d5af80a2 core184: Ship xz
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 10:29:31 +00:00
Adolf Belka
aff5c27567 xz: Update to version 5.4.6
- Update from version 5.4.5 to 5.4.6
- Update of rootfile
- Changelog
    5.4.6
	    * Fixed a bug involving internal function pointers in liblzma not
	      being initialized to NULL. The bug can only be triggered if
	      lzma_filters_update() is called on a LZMA1 encoder, so it does
	      not affect xz or any application known to us that uses liblzma.
	    * xz:
	        - Fixed a regression introduced in 5.4.2 that caused encoding
	          in the raw format to unnecessarily fail if --suffix was not
	          used. For instance, the following command no longer reports
	          that --suffix must be used:
	              echo foo | xz --format=raw --lzma2 | wc -c
	        - Fixed an issue on MinGW-w64 builds that prevented reading
	          from or writing to non-terminal character devices like NUL.
	    * Added a new test.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 10:29:13 +00:00
Michael Tremer
b26696ebdf core184: Ship libpng
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 10:28:48 +00:00
Adolf Belka
8066b4773b libpng: Update to version 1.6.41
- Update from 1.6.39 to 1.6.41
- Update of rootfile
- Changelog
    1.6.41
	  Added SIMD-optimized code for the Loongarch LSX hardware.
	    (Contributed by GuXiWei, JinBo and ZhangLixia)
	  Fixed the run-time discovery of MIPS MSA hardware.
	    (Contributed by Sui Jingfeng)
	  Fixed an off-by-one error in the function `png_do_check_palette_indexes`,
	    which failed to recognize errors that might have existed in the first
	    column of a broken palette-encoded image. This was a benign regression
	    accidentally introduced in libpng-1.6.33. No pixel was harmed.
	    (Contributed by Adam Richter; reviewed by John Bowler)
	  Fixed, improved and modernized the contrib/pngminus programs, i.e.,
	    png2pnm.c and pnm2png.c
	  Removed old and peculiar portability hacks that were meant to silence
	    warnings issued by gcc version 7.1 alone.
	    (Contributed by John Bowler)
	  Fixed and modernized the CMake file, and raised the minimum required
	    CMake version from 3.1 to 3.6.
	    (Contributed by Clinton Ingram, Timothy Lyanguzov, Tyler Kropp, et al.)
	  Allowed the configure script to disable the building of auxiliary tools
	    and tests, thus catching up with the CMake file.
	    (Contributed by Carlo Bramini)
	  Fixed a build issue on Mac.
	    (Contributed by Zixu Wang)
	  Moved the Autoconf macro files to scripts/autoconf.
	  Moved the CMake files (except for the main CMakeLists.txt) to
	    scripts/cmake and moved the list of their contributing authors to
	    scripts/cmake/AUTHORS.md
	  Updated the CI configurations and scripts.
	  Relicensed the CI scripts to the MIT License.
	  Improved the test coverage.
	    (Contributed by John Bowler)
    1.6.40
	  Fixed the eXIf chunk multiplicity checks.
	  Fixed a memory leak in pCAL processing.
	  Corrected the validity report about tRNS inside png_get_valid().
	  Fixed various build issues on *BSD, Mac and Windows.
	  Updated the configurations and the scripts for continuous integration.
	  Cleaned up the code, the build scripts, and the documentation.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 10:28:33 +00:00
Michael Tremer
4acdd39e35 core184: Ship bash
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 10:27:55 +00:00
Michael Tremer
b9fb3495a8 core184: Ship acl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 10:27:30 +00:00
Adolf Belka
f5000d47b7 acl: Update to version 2.3.2
- Update from version 2.3.1 to 2.3.2
- Update of rootfile
- Changelog is only available from reviewing the git commits
   https://git.savannah.nongnu.org/cgit/acl.git/log/

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-31 10:27:12 +00:00
Michael Tremer
0742f6eda5 core184: Ship vnstat
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-30 17:51:11 +00:00
Matthias Fischer
10851f7ffa mc: Update to 4.8.31
For details see:
https://midnight-commander.org/wiki/NEWS-4.8.31

"Major changes since 4.8.30

Core
    Minimal version of GLib is 2.32.0.

VFS
    fish: drop support of native FISH server and protocol. Rename VFS to shell (#4232)
    extfs;
        uc1541 extfs: update up to 3.6 version (#4511)
        s3+: port to Python3 (#4324)
    Support for LZO/LZOP compression format (#4509)

...

    Skins: add color for non-printable characters in editor (#4433)

Fixes
    FTBFS on FreeBSD with ext2fs attribute support (#4493)
    Broken stickchars (-a) mode (#4498)
    Wrong timestamp after resuming of file copy operation (#4499)
    Editor: wrong deletion of marked column (#3761)
    Diff viewer: segfault when display of line numbers is enabled (#4500)
    Tar VFS: broken handling of hard links (#4494)
    Sftp VFS: failure establishing SSH session due hashed host names in ~/.ssh/known_hosts (#4506)
    Shell VFS: incorrect file names with cyrillic or diacritic symbols (#4507)
    mc.ext.ini: incorrect description of of how multiple sections and keys with same names are processed (#4497)
    mc.ext.ini: unescaped backslash \ is treated as invalid escape sequence in glib-2.77.3 and glib-2.79 (#4502)
    mc.ext.ini: file "Makefile.zip" is handled as Makefile not as zip-arhive (#4419)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-30 17:49:46 +00:00
Michael Tremer
65f2f43b0a Merge branch 'master' into next 2024-01-30 17:43:10 +00:00
Michael Tremer
31269e52cb core183: Ship vpnmain.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-30 17:42:53 +00:00
Michael Tremer
7e8fc770bd openssl: Update to 3.2.1
* A file in PKCS12 format can contain certificates and keys and may come from
   an untrusted source. The PKCS12 specification allows certain fields to be
   NULL, but OpenSSL did not correctly check for this case. A fix has been
   applied to prevent a NULL pointer dereference that results in OpenSSL
   crashing. If an application processes PKCS12 files from an untrusted source
   using the OpenSSL APIs then that application will be vulnerable to this
   issue prior to this fix.

   OpenSSL APIs that were vulnerable to this are: PKCS12_parse(),
   PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
   and PKCS12_newpass().

   We have also fixed a similar issue in SMIME_write_PKCS7(). However since this
   function is related to writing data we do not consider it security
   significant.

   ([CVE-2024-0727])

   *Matt Caswell*

 * When function EVP_PKEY_public_check() is called on RSA public keys,
   a computation is done to confirm that the RSA modulus, n, is composite.
   For valid RSA keys, n is a product of two or more large primes and this
   computation completes quickly. However, if n is an overly large prime,
   then this computation would take a long time.

   An application that calls EVP_PKEY_public_check() and supplies an RSA key
   obtained from an untrusted source could be vulnerable to a Denial of Service
   attack.

   The function EVP_PKEY_public_check() is not called from other OpenSSL
   functions however it is called from the OpenSSL pkey command line
   application. For that reason that application is also vulnerable if used
   with the "-pubin" and "-check" options on untrusted data.

   To resolve this issue RSA keys larger than OPENSSL_RSA_MAX_MODULUS_BITS will
   now fail the check immediately with an RSA_R_MODULUS_TOO_LARGE error reason.

   ([CVE-2023-6237])

   *Tomáš Mráz*

 * Restore the encoding of SM2 PrivateKeyInfo and SubjectPublicKeyInfo to
   have the contained AlgorithmIdentifier.algorithm set to id-ecPublicKey
   rather than SM2.

   *Richard Levitte*

 * The POLY1305 MAC (message authentication code) implementation in OpenSSL
   for PowerPC CPUs saves the contents of vector registers in different
   order than they are restored. Thus the contents of some of these vector
   registers is corrupted when returning to the caller. The vulnerable code is
   used only on newer PowerPC processors supporting the PowerISA 2.07
   instructions.

   The consequences of this kind of internal application state corruption can
   be various - from no consequences, if the calling application does not
   depend on the contents of non-volatile XMM registers at all, to the worst
   consequences, where the attacker could get complete control of the
   application process. However unless the compiler uses the vector registers
   for storing pointers, the most likely consequence, if any, would be an
   incorrect result of some application dependent calculations or a crash
   leading to a denial of service.

   ([CVE-2023-6129])

   *Rohan McLure*

 * Fix excessive time spent in DH check / generation with large Q parameter
   value.

   Applications that use the functions DH_generate_key() to generate an
   X9.42 DH key may experience long delays. Likewise, applications that use
   DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
   to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
   Where the key or parameters that are being checked have been obtained from
   an untrusted source this may lead to a Denial of Service.

   ([CVE-2023-5678])

   *Richard Levitte*

 * Disable building QUIC server utility when OpenSSL is configured with
   `no-apps`.

   *Vitalii Koshura*

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-30 17:41:53 +00:00
Michael Tremer
0bbbac7934 core184: Ship OpenSSL
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-30 17:41:07 +00:00
Michael Tremer
54387ef143 openssl: Update to 3.2.1
* A file in PKCS12 format can contain certificates and keys and may come from
   an untrusted source. The PKCS12 specification allows certain fields to be
   NULL, but OpenSSL did not correctly check for this case. A fix has been
   applied to prevent a NULL pointer dereference that results in OpenSSL
   crashing. If an application processes PKCS12 files from an untrusted source
   using the OpenSSL APIs then that application will be vulnerable to this
   issue prior to this fix.

   OpenSSL APIs that were vulnerable to this are: PKCS12_parse(),
   PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
   and PKCS12_newpass().

   We have also fixed a similar issue in SMIME_write_PKCS7(). However since this
   function is related to writing data we do not consider it security
   significant.

   ([CVE-2024-0727])

   *Matt Caswell*

 * When function EVP_PKEY_public_check() is called on RSA public keys,
   a computation is done to confirm that the RSA modulus, n, is composite.
   For valid RSA keys, n is a product of two or more large primes and this
   computation completes quickly. However, if n is an overly large prime,
   then this computation would take a long time.

   An application that calls EVP_PKEY_public_check() and supplies an RSA key
   obtained from an untrusted source could be vulnerable to a Denial of Service
   attack.

   The function EVP_PKEY_public_check() is not called from other OpenSSL
   functions however it is called from the OpenSSL pkey command line
   application. For that reason that application is also vulnerable if used
   with the "-pubin" and "-check" options on untrusted data.

   To resolve this issue RSA keys larger than OPENSSL_RSA_MAX_MODULUS_BITS will
   now fail the check immediately with an RSA_R_MODULUS_TOO_LARGE error reason.

   ([CVE-2023-6237])

   *Tomáš Mráz*

 * Restore the encoding of SM2 PrivateKeyInfo and SubjectPublicKeyInfo to
   have the contained AlgorithmIdentifier.algorithm set to id-ecPublicKey
   rather than SM2.

   *Richard Levitte*

 * The POLY1305 MAC (message authentication code) implementation in OpenSSL
   for PowerPC CPUs saves the contents of vector registers in different
   order than they are restored. Thus the contents of some of these vector
   registers is corrupted when returning to the caller. The vulnerable code is
   used only on newer PowerPC processors supporting the PowerISA 2.07
   instructions.

   The consequences of this kind of internal application state corruption can
   be various - from no consequences, if the calling application does not
   depend on the contents of non-volatile XMM registers at all, to the worst
   consequences, where the attacker could get complete control of the
   application process. However unless the compiler uses the vector registers
   for storing pointers, the most likely consequence, if any, would be an
   incorrect result of some application dependent calculations or a crash
   leading to a denial of service.

   ([CVE-2023-6129])

   *Rohan McLure*

 * Fix excessive time spent in DH check / generation with large Q parameter
   value.

   Applications that use the functions DH_generate_key() to generate an
   X9.42 DH key may experience long delays. Likewise, applications that use
   DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
   to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
   Where the key or parameters that are being checked have been obtained from
   an untrusted source this may lead to a Denial of Service.

   ([CVE-2023-5678])

   *Richard Levitte*

 * Disable building QUIC server utility when OpenSSL is configured with
   `no-apps`.

   *Vitalii Koshura*

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-30 17:40:51 +00:00
Michael Tremer
fc37ab7a51 libvirt: Fix rootfile for riscv64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-29 16:08:11 +00:00
Adolf Belka
c3863ea14d python3-trio: Update to version 0.23.1
- Update from version 0.22.0 to 0.23.1
- Update of rootfile
- Changelog
    0.23.0
	Headline features
	    Add type hints. (#543)
	Features
	    When exiting a nursery block, the parent task always waits for child tasks
	     to exit. This wait cannot be cancelled. However, previously, if you tried
	     to cancel it, it would inject a Cancelled exception, even though it wasn’t
	     cancelled. Most users probably never noticed either way, but injecting a
	     Cancelled here is not really useful, and in some rare cases caused
	     confusion or problems, so Trio no longer does that. (#1457)
	    If called from a thread spawned by trio.to_thread.run_sync,
	     trio.from_thread.run and trio.from_thread.run_sync now reuse the task and
	     cancellation status of the host task; this means that context variables and
	     cancel scopes naturally propagate ‘through’ threads spawned by Trio. You
	     can also use trio.from_thread.check_cancelled to efficiently check for
	     cancellation without reentering the Trio thread. (#2392)
	    trio.lowlevel.start_guest_run() now does a bit more setup of the guest run
	     before it returns to its caller, so that the caller can immediately make
	     calls to trio.current_time(), trio.lowlevel.spawn_system_task(),
	     trio.lowlevel.current_trio_token(), etc. (#2696)
	Bugfixes
	    When a starting function raises before calling trio.TaskStatus.started(),
	     trio.Nursery.start() will no longer wrap the exception in an undocumented
	     ExceptionGroup. Previously, trio.Nursery.start() would incorrectly raise an
	     ExceptionGroup containing it when using trio.run(...,
	     strict_exception_groups=True). (#2611)
	Deprecations and removals
	    To better reflect the underlying thread handling semantics, the keyword
	     argument for trio.to_thread.run_sync that was previously called cancellable
	     is now named abandon_on_cancel. It still does the same thing – allow the
	     thread to be abandoned if the call to trio.to_thread.run_sync is
	     cancelled – but since we now have other ways to propagate a cancellation
	     without abandoning the thread, “cancellable” has become somewhat of a
	     misnomer. The old cancellable name is now deprecated. (#2841)
	    Deprecated support for math.inf for the backlog argument in
	     open_tcp_listeners, making its docstring correct in the fact that only
	     TypeError is raised if invalid arguments are passed. (#2842)
	Removals without deprecations
	    Drop support for Python3.7 and PyPy3.7/3.8. (#2668)
	    Removed special MultiError traceback handling for IPython. As of version
	     8.15 ExceptionGroup is handled natively. (#2702)
	Miscellaneous internal changes
	    Trio now indicates its presence to sniffio using the sniffio.thread_local
	     interface that is preferred since sniffio v1.3.0. This should be less
	     likely than the previous approach to cause sniffio.current_async_library()
	     to return incorrect results due to unintended inheritance of contextvars.
	     (#2700)
	    On windows, if SIO_BASE_HANDLE failed and SIO_BSP_HANDLE_POLL didn’t return
	     a different socket, runtime error will now raise from the OSError that
	     indicated the issue so that in the event it does happen it might help with
	     debugging. (#2807)
    0.22.2
	Bugfixes
	    Fix PermissionError when importing trio due to trying to access pthread.
	     (#2688)
    0.22.1
	Breaking changes
	    Timeout functions now raise ValueError if passed math.nan. This includes
	     trio.sleep, trio.sleep_until, trio.move_on_at, trio.move_on_after,
	     trio.fail_at and trio.fail_after. (#2493)
	Features
	    Added support for naming threads created with trio.to_thread.run_sync,
	     requires pthreads so is only available on POSIX platforms with glibc
	     installed. (#1148)
	    trio.socket.socket now prints the address it tried to connect to upon
	     failure. (#1810)
	Bugfixes
	    Fixed a crash that can occur when running Trio within an embedded Python
	     interpreter, by handling the TypeError that is raised when trying to
	     (re-)install a C signal handler. (#2333)
	    Fix sniffio.current_async_library() when Trio tasks are spawned from a
	     non-Trio context (such as when using trio-asyncio). Previously, a regular
	     Trio task would inherit the non-Trio library name, and spawning a system
	     task would cause the non-Trio caller to start thinking it was Trio. (#2462)
	    Issued a new release as in the git tag for 0.22.0, trio.__version__ is
	     incorrectly set to 0.21.0+dev. (#2485)
	Improved documentation
	    Documented that Nursery.start_soon does not guarantee task ordering. (#970)

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-29 16:03:31 +00:00
Adolf Belka
74c8dc3548 python3-pyfuse3: Update to version 3.3.0
- Update from version 3.2.2 to 3.3.0
- Update of rootfile
- Changelog
    3.3.0
	    Note: This is the first pyfuse3 release compatible with Cython 3.0.0 release.
	     Cython 0.29.x is also still supported.
	    Cythonized with latest Cython 3.0.0.
	    Drop Python 3.6 and 3.7 support and testing, #71.
	    CI: also test python 3.12. test on cython 0.29 and cython 3.0.
	    Tell Cython that callbacks may raise exceptions, #80.
	    Fix lookup in examples/hello.py, similar to #16.
	    Misc. CI, testing, build and sphinx related fixes.
    3.2.3
	    cythonize with latest Cython 0.29.34 (brings Python 3.12 support)
	    add a minimal pyproject.toml, require setuptools
	    tests: fix integer overflow on 32-bit arches, fixes #47
	    test: Use shutil.which() instead of external which(1) program
	    setup.py: catch more generic OSError when searching Cython, fixes #63
	    setup.py: require Cython >= 0.29
	    fix basedir computation in setup.py (fix pip install -e .)
	    use sphinx < 6.0 due to compatibility issues with more recent versions

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-01-29 16:03:31 +00:00