]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/log
people/pmueller/ipfire-2.x.git
18 months agoCore Update 172: Ship libxml2
Peter Müller [Tue, 8 Nov 2022 11:13:30 +0000 (11:13 +0000)] 
Core Update 172: Ship libxml2

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
18 months agolibxml2: Update to version 2.10.3
Adolf Belka [Mon, 7 Nov 2022 21:14:14 +0000 (22:14 +0100)] 
libxml2: Update to version 2.10.3

- Update from version 2.9.14 to 2.10.3
- Update of rootfile
- Changelog
    v2.10.3: Oct 14 2022
### Security
- [CVE-2022-40304] Fix dict corruption caused by entity reference cycles
- [CVE-2022-40303] Fix integer overflows with XML_PARSE_HUGE
- Fix overflow check in SAX2.c
### Portability
- win32: Fix build with VS2013
### Build system
- cmake: Set SOVERSION
    v2.10.2: Aug 29 2022
### Improvements
- Remove set-but-unused variable in xmlXPathScanName
- Silence -Warray-bounds warning
### Build system
- build: require automake-1.16.3 or later (Xi Ruoyao)
- Remove generated files from distribution
### Test suite
- Don't create missing.xml when running testapi
    v2.10.1: Aug 25 2022
### Regressions
- Fix xmlCtxtReadDoc with encoding
### Bug fixes
- Fix HTML parser with threads and --without-legacy
### Build system
- Fix build with Python 3.10
- cmake: Disable version script on macOS
- Remove Makefile rule to build testapi.c
### Documentation
- Switch back to HTML output for API documentation
- Port doc/examples/index.py to Python 3
- Fix order of exports in libxml2-api.xml
- Remove libxml2-refs.xml
    v2.10.0: Aug 17 2022
### Security
- [CVE-2022-2309] Reset nsNr in xmlCtxtReset
- Reserve byte for NUL terminator and report errors consistently in xmlBuf and
  xmlBuffer (David Kilzer)
- Fix missing NUL terminators in xmlBuf and xmlBuffer functions (David Kilzer)
- Fix integer overflow in xmlBufferDump() (David Kilzer)
- xmlBufAvail() should return length without including a byte for NUL
  terminator (David Kilzer)
- Fix ownership of xmlNodePtr & xmlAttrPtr fields in xmlSetTreeDoc() (David
  Kilzer)
- Use xmlNewDocText in xmlXIncludeCopyRange
- Fix use-after-free bugs when calling xmlTextReaderClose() before
  xmlFreeTextReader() on post-validating parser (David Kilzer)
- Use UPDATE_COMPAT() consistently in buf.c (David Kilzer)
- fix: xmlXPathParserContext could be double-delete in  OOM case. (jinsub ahn)
### Removals and deprecations
- Disable XPointer location support by default
- Remove outdated xml2Conf.sh
- Deprecate module init and cleanup functions
- Remove obsolete XML Software Autoupdate (XSA) file
- Remove DOCBparser
- Remove obsolete Python test framework
- Remove broken VxWorks support
- Remove broken Mac OS 9 support
- Remove broken bakefile support
- Remove broken Visual Studio 2010 support
- Remove broken Windows CE support
- Deprecate IDREF-related functions in valid.h
- Deprecate legacy functions
- Disable legacy support by default
- Deprecate all functions in nanoftp.h
- Disable FTP support by default
- Add XML_DEPRECATED macro
- Remove elfgcchack.h
### Regressions
- Skip incorrectly opened HTML comments
- Restore behavior of htmlDocContentDumpFormatOutput() (David Kilzer)
### Bug fixes
- Fix memory leak with invalid XSD
- Make XPath depth check work with recursive invocations
- Fix memory leak in xmlLoadEntityContent error path
- Avoid double-free if malloc fails in inputPush
- Properly fold whitespace around the QName value when validating an XSD
  schema. (Damjan Jovanovic)
- Add whitespace folding for some atomic data types that it's missing on.
  (Damjan Jovanovic)
- Don't add IDs containing unexpanded entity references
### Improvements
- Avoid calling xmlSetTreeDoc
- Simplify xmlFreeNode
- Don't reset nsDef when changing node content
- Fix unintended fall-through in xmlNodeAddContentLen
- Remove unused xmlBuf functions (David Kilzer)
- Implement xpath1() XPointer scheme
- Add configuration flag for XPointer locations support
- Fix compiler warnings in Python code
- Mark more static data as `const` (David Kilzer)
- Make xmlStaticCopyNode non-recursive
- Clean up encoding switching code
- Simplify recursive pthread mutex
- Use non-recursive mutex in dict.c
- Fix parser progress checks
- Avoid arithmetic on freed pointers
- Improve buffer allocation scheme
- Remove unneeded #includes
- Add support for some non-standard escapes in regular expressions. (Damjan
  Jovanovic)
- htmlParseComment: handle abruptly-closed comments (Mike Dalessio)
- Add let variable tag support (Oliver Diehl)
- Add value-of tag support (Oliver Diehl)
- Remove useless call to xmlRelaxNGCleanupTypes
- Don't include ICU headers in public headers
- Update `xmlStrlen()` to use POSIX / ISO C `strlen()` (Mike Dalessio)
- Fix unused variable warnings with disabled features
- Only warn on invalid redeclarations of predefined entities
- Remove unneeded code in xmlreader.c
- Rework validation context flags
### Portability
- Use NAN/INFINITY if available to init XPath NaN/Inf (Sergey Kosukhin)
- Fix Python tests on macOS
- Fix xmlCleanupThreads on Windows
- Fix reinitialization of library on Windows
- Don't mix declarations and code in runtest.c
- Use portable python shebangs (David Seifert)
- Use critical sections as mutex on Windows
- Don't set HAVE_WIN32_THREADS in win32config.h
- Use stdint.h with newer MSVC
- Remove cruft from win32config.h
- Remove isinf/isnan emulation in win32config.h
- Always fopen files with "rb"
- Remove __DJGPP__ checks
- Remove useless __CYGWIN__ checks
### Build system
- Don't autogenerate doc/examples/Makefile.am
- cmake: Install libxml.m4 on UNIX-like platforms (Daniel E)
- cmake: Use symbol versioning on UNIX-like platforms (Daniel E)
- Port genUnicode.py to Python 3
- Port gentest.py to Python 3
- cmake: Fix build without thread support
- cmake: Install documentation in CMAKE_INSTALL_DOCDIR
- cmake: Remove non needed files in docs dir (Daniel E)
- configure: move XML_PRIVATE_LIBS after WIN32_EXTRA_LIBADD is set
  (Christopher Degawa)
- Move local Autoconf macros into m4 directory
- Use XML_PRIVATE_LIBS in libxml2_la_LIBADD
- Update libxml-2.0-uninstalled.pc.in
- Remove LIBS from XML_PRIVATE_LIBS
- Add WIN32_EXTRA_LIBADD to XML_PRIVATE_LIBS
- Don't overlink executables
- cmake: Adjust paths for UNIX or UNIX-like target systems (Daniel Engberg)
- build: Make use of variables in libxml's pkg-config file (Daniel Engberg)
- Avoid obsolescent `test -a` constructs (David Seifert)
- Move AM_MAINTAINER_MODE to AM section
- configure.ac: make AM_SILENT_RULES([yes]) unconditional (David Seifert)
- Streamline documentation installation
- Don't try to recreate COPYING symlink
- Detect libm using libtool's macros (David Seifert)
- configure.ac: disable static libraries by default (David Seifert)
- python/Makefile.am: nest python docs in $(docdir) (David Seifert)
- python/Makefile.am: rely on global AM_INIT_AUTOMAKE (David Seifert)
- Makefile.am: install examples more idiomatically (David Seifert)
- configure.ac: remove useless AC_SUBST (David Seifert)
- Respect `--sysconfdir` in source files (David Seifert)
- Ignore configure backup file created by recent autoreconf too (Vadim Zeitlin)
- Only install *.html and *.c example files
- Remove --with-html-dir option
- Rework documentation build system
- Remove old website
- Use AM_PATH_PYTHON/PKG_CHECK_MODULES for python bindings (David Seifert)
- Update genChRanges.py
- Update build_glob.py
- Remove ICONV_CONST test
- Remove obsolete AC_HEADER checks
- Don't check for standard C89 library functions
- Don't check for standard C89 headers
- Remove special configuration for certain maintainers
### Test suite, CI
- Disable network in API tests
- testapi: remove leading slash from "/missing.xml" (Mike Gilbert)
- Build Autotools CI tests out of source tree (VPATH)
- Add --with-minimum build to CI tests
- Fix warnings when testing --with-minimum build
- cmake: Run all tests when threads are disabled
- Also build CI tests with -Werror
- Move doc/examples tests to new test suite
- Simplify 'make check' targets
- Fix schemas and relaxng tests
- Remove unused result files
- Allow missing result files in runtest
- Move regexp tests to runtest
- Move SVG tests to runtest.c
- Move testModule to new test suite
- Move testThreads to new test suite
- Remove major parts of old test suite
- Make testchar return an error on failure (Tony Tascioglu)
- Add CI job for static build
- python/tests: open() relative to test scripts (David Seifert)
- Port some test scripts to Python 3
### Documentation
- Improve documentation of tree manipulation API
- Update xml2-config man page
- Consolidate man pages
- Rename xmlcatalog_man.xml
- Make examples a standalone HTML page
- Fix documentation in entities.c
- Add note about optimization flags

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
18 months agoCore Update 172: Ship expat
Peter Müller [Tue, 8 Nov 2022 11:12:28 +0000 (11:12 +0000)] 
Core Update 172: Ship expat

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
18 months agoexpat: Update to version 2.5.0
Adolf Belka [Mon, 7 Nov 2022 21:13:58 +0000 (22:13 +0100)] 
expat: Update to version 2.5.0

- Update from version 2.4.9 to 2.5.0
- Update of rootfile.
- Changelog
    Release 2.5.0 Tue October 25 2022
        Security fixes:
  #616 #649 #650  CVE-2022-43680 -- Fix heap use-after-free after overeager
                    destruction of a shared DTD in function
                    XML_ExternalEntityParserCreate in out-of-memory situations.
                    Expected impact is denial of service or potentially
                    arbitrary code execution.
        Bug fixes:
       #612 #645  Fix curruption from undefined entities
       #613 #654  Fix case when parsing was suspended while processing nested
                    entities
  #616 #652 #653  Stop leaking opening tag bindings after a closing tag
                    mismatch error where a parser is reset through
                    XML_ParserReset and then reused to parse
            #656  CMake: Fix generation of pkg-config file
            #658  MinGW|CMake: Fix static library name
        Other changes:
            #663  Protect header expat_config.h from multiple inclusion
            #666  examples: Make use of XML_GetBuffer and be more
                    consistent across examples
            #648  Address compiler warnings
       #667 #668  Version info bumped from 9:9:8 to 9:10:8;
                    see https://verbump.de/ for what these numbers do

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
18 months agoCore Update 172: Ship zlib
Peter Müller [Tue, 8 Nov 2022 11:11:40 +0000 (11:11 +0000)] 
Core Update 172: Ship zlib

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
18 months agozlib: Update to version 1.2.13
Adolf Belka [Mon, 7 Nov 2022 21:14:28 +0000 (22:14 +0100)] 
zlib: Update to version 1.2.13

- Update from version 1.2.12 to 1.2.13
- Update of rootfile
- Patches for CVE-2022-37434 removed as they are now integarted in the source tarball
- Changelog
    Changes in 1.2.13 (13 Oct 2022)
- Fix configure issue that discarded provided CC definition
- Correct incorrect inputs provided to the CRC functions
- Repair prototypes and exporting of new CRC functions
- Fix inflateBack to detect invalid input with distances too far
- Have infback() deliver all of the available output up to any error
- Fix a bug when getting a gzip header extra field with inflate(CVE-2022-37434)
- Fix bug in block type selection when Z_FIXED used
- Tighten deflateBound bounds
- Remove deleted assembler code references
- Various portability and appearance improvements

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
18 months agoCore Update 172: Ship (o|)vpnmain.cgi
Peter Müller [Thu, 3 Nov 2022 16:51:19 +0000 (16:51 +0000)] 
Core Update 172: Ship (o|)vpnmain.cgi

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
18 months agoIPsec/OpenVPN: Use 4,096-bit RSA for host certificates as well
Peter Müller [Thu, 3 Nov 2022 15:29:32 +0000 (15:29 +0000)] 
IPsec/OpenVPN: Use 4,096-bit RSA for host certificates as well

We already moved away from 2048-MODP in Core Update 170. Similarly,
German Federal Office for Information Security (BSI) recommends shifting
away from RSA keys below 3,000 bits by the end of 2022 at the latest.

The only place left in IPFire 2.x where we generate such keys is for
IPsec and OpenVPN host certificates. This patch increases their key
sizes to 4,096 bits as well - CA certificates already have this length.

Existing VPN connections cannot be migrated automatically. However, only
the respective host certificate has to be regenerated - thanks to the CA
certificates' key length being sufficient, there is no need to replace
the entire VPN CA.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
18 months agoCore Update 172: Ship wirelessctrl
Peter Müller [Thu, 3 Nov 2022 15:14:01 +0000 (15:14 +0000)] 
Core Update 172: Ship wirelessctrl

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
18 months agomisc-progs: wirelessctrl: Fix missing whitespace for log prefix
Michael Tremer [Wed, 2 Nov 2022 10:30:06 +0000 (10:30 +0000)] 
misc-progs: wirelessctrl: Fix missing whitespace for log prefix

Fixes: #12978
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
18 months agoCore Update 172: Ship rules.pl
Peter Müller [Sat, 29 Oct 2022 09:04:07 +0000 (09:04 +0000)] 
Core Update 172: Ship rules.pl

This file should have been shipped with Core Update 171, but that was
omitted by mistake. Core Update 172 therefore finally fixes #12934 on
existing installations.

Fixes: #12934
Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
18 months agoCore Update 171: Ship changes related to services.cgi
Peter Müller [Sat, 29 Oct 2022 08:58:00 +0000 (08:58 +0000)] 
Core Update 171: Ship changes related to services.cgi

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
18 months agoservices.cgi: add link to addon config if ui exists for it
Robin Roevens [Tue, 11 Oct 2022 22:01:57 +0000 (00:01 +0200)] 
services.cgi: add link to addon config if ui exists for it

* If a cgi file exists with the same name as an addon, the
  displayed service will be a link to that cgi file.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
18 months agoservices.cgi: add restart action and restrict action usage
Robin Roevens [Tue, 11 Oct 2022 22:01:56 +0000 (00:01 +0200)] 
services.cgi: add restart action and restrict action usage

* Add restart action to services.
* Only display available actions for a service:
  Start when service is stopped or Stop and Restart when a service
  is running.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
18 months agoservices.cgi: minor cosmetics
Robin Roevens [Tue, 11 Oct 2022 22:01:55 +0000 (00:01 +0200)] 
services.cgi: minor cosmetics

* Singular 'Service' instead of plural 'Services' as column header of
  services table
* Sort list of services

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
18 months agoservices.cgi: Fix status/actions on services with name != addon name
Robin Roevens [Tue, 11 Oct 2022 22:01:54 +0000 (00:01 +0200)] 
services.cgi: Fix status/actions on services with name != addon name

* addonctrl's new functionality to control explicit addon services was
  implemented.
* Change 'Addon' column header to 'Addon Service' to be clear that
  it's not addons but services listed here.
* Services not matching the name of the addon now display the addon
  name between parentheses, so the user knows where the service comes
  from.
* When no valid runlevel symlink is found by addonctrl for a service,
  the 'enable on boot' checkbox is replaced by a small exclamation point
  with alt-text "No valid runlevel symlink was found for the initscript of
  this service." to inform user why a service can't be enabled.
* Added German and Dutch translation for above message.

Fixes: Bug#12935
Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
18 months agomisc-progs: addonctrl: Add support for 'Services' metadata
Robin Roevens [Tue, 11 Oct 2022 22:01:53 +0000 (00:01 +0200)] 
misc-progs: addonctrl: Add support for 'Services' metadata

* Addonctrl will now check in addon metadata for the exact initscript
  names (Services). If more than one initscript is defined for an addon,
  the requested action will be performed on all listed initscripts.
* Added posibility to perform action on a specific initscript of an
  addon instead of on all initscripts of the addon.
* New action 'list-services' to display a list of services related to
  an addon.
* New action 'boot-status' to display wether service(s) are enabled
  to start on boot or not.
* More error checking and cleaner error reporting to user
* General cleanup and code restructuring to avoid code duplication
* Updated and made usage instructions more verbose.

Fixes: Bug#12935
Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
18 months agoSamba: Update ARM rootfiles
Peter Müller [Sat, 29 Oct 2022 08:55:58 +0000 (08:55 +0000)] 
Samba: Update ARM rootfiles

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agolibloc: Update rootfile
Peter Müller [Mon, 24 Oct 2022 12:39:47 +0000 (12:39 +0000)] 
libloc: Update rootfile

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agosamba: Update to 4.17.0
Matthias Fischer [Sat, 8 Oct 2022 17:55:47 +0000 (19:55 +0200)] 
samba: Update to 4.17.0

For details see:
https://www.samba.org/samba/latest_news.html#4.17.0

This "just came my way" and I found the CVEs listed on
https://www.samba.org/samba/history/security.html which
address "All versions of Samba prior to 4.16.4" or
"All versions of Samba" rather long.

The 'glibc_headers' patch is now included.

Sad to say, due to the lack of hardware I can only include
the rootfile for x86_64.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
19 months agoCore Update 172: Ship changes related to OpenVPN CRL handling
Peter Müller [Mon, 24 Oct 2022 09:07:18 +0000 (09:07 +0000)] 
Core Update 172: Ship changes related to OpenVPN CRL handling

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoopenvpnctrl: Update CRL before starting the client daemon
Michael Tremer [Fri, 7 Oct 2022 14:50:17 +0000 (14:50 +0000)] 
openvpnctrl: Update CRL before starting the client daemon

If the CRL is outdated for some reason (e.g. a backup restored from ISO
where we don't run the migration scripts), this will update it on
reboot/restart of the service.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agobackup: Update OpenVPN CRL
Michael Tremer [Fri, 7 Oct 2022 14:50:16 +0000 (14:50 +0000)] 
backup: Update OpenVPN CRL

After a backup is restored, the CRL might be out of data and client
won't be able to connect to the server any more.

This will immediately update the CRL should it require an update.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agoCore Update 172: Delete orphaned strongSwan files
Peter Müller [Mon, 24 Oct 2022 09:05:23 +0000 (09:05 +0000)] 
Core Update 172: Delete orphaned strongSwan files

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoCore Update 172: Ship and restart Unbound
Peter Müller [Mon, 24 Oct 2022 09:04:29 +0000 (09:04 +0000)] 
Core Update 172: Ship and restart Unbound

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agounbound: Update to 1.17.0
Matthias Fischer [Fri, 14 Oct 2022 19:09:35 +0000 (21:09 +0200)] 
unbound: Update to 1.17.0

For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-17-0

"Features

    Merge #753: ACL per interface. (New interface-* configuration options).

    Merge #760: PROXYv2 downstream support. (New proxy-protocol-port configuration option).

Bug Fixes

    Fix #728: alloc_reg_obtain() core dump. Stop double alloc_reg_release
    when serviced_create fails.
    Fix edns subnet so that scope 0 answers only match sourcemask 0 queries
    for answers from cache if from a query with sourcemask 0.
    Fix unittest for edns subnet change.
    Merge #730 from luisdallos: Fix startup failure on Windows 8.1 due to
    unsupported IPV6_USER_MTU socket option being set.
    Fix ratelimit inconsistency, for ip-ratelimits the value is the amount
    allowed, like for ratelimits.
    Fix #734 [FR] enable unbound-checkconf to detect more (basic) errors.
    Fix to log accept error ENFILE and EMFILE errno, but slowly, once per
    10 seconds. Also log accept failures when no slow down is used.
    Fix to avoid process wide fcntl calls mixed with nonblocking operations
    after a blocked write.
    Patch from Vadim Fedorenko that adds MSG_DONTWAIT to receive
    operations, so that instruction reordering does not cause mistakenly
    blocking socket operations.
    Fix to wait for blocked write on UDP sockets, with a timeout if it
    takes too long the packet is dropped.
    Fix for wait for udp send to stop when packet is successfully sent.
    Fix #741: systemd socket activation fails on IPv6.
    Fix to update config tests to fix checking if nonblocking sockets work
    on OpenBSD.
    Slow down log frequency of write wait failures.
    Fix to set out of file descriptor warning to operational verbosity.
    Fix to log a verbose message at operational notice level if a thread is
    not responding, to stats requests. It is logged with thread
    identifiers.
    Remove include that was there for debug purposes.
    Fix to check pthread_t size after pthread has been detected.
    Convert tdir tests to use the new skip_test functionality.
    Remove unused testcode/mini_tpkg.sh file.
    Better output for skipped tdir tests.
    Fix doxygen warning in respip.h.
    Fix to remove erroneous TC flag from TCP upstream.
    Fix test tdir skip report printout.
    Fix windows compile, the identifier interface is defined in headers.
    Fix to close errno block in comm_point_tcp_handle_read outside of ifdef.
    Fix static analysis report to remove dead code from the
    rpz_callback_from_iterator_module function.
    Fix to clean up after the acl_interface unit test.
    Merge #764: Leniency for target discovery when under load (for
    NRDelegation changes).
    Use DEBUG_TDIR from environment in mini_tdir.sh for debugging.
    Fix string comparison in mini_tdir.sh.
    Make ede.tdir test more predictable by using static data.
    Fix checkconf test for dnscrypt and proxy port.
    Fix dnscrypt compile for proxy protocol code changes.
    Fix to stop responses with TC flag from resulting in partial responses.
    It retries to fetch the data elsewhere, or fails the query and in depth
    fix removes the TC flag from the cached item.
    Fix proxy length debug output printout typecasts.
    Fix to stop possible loops in the tcp reuse code (write_wait list and
    tcp_wait list). Based on analysis and patch from Prad Seniappan and
    Karthik Umashankar.
    Fix PROXYv2 header read for TCP connections when no proxied addresses
    are provided."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agoCore Update 172: Ship and restart OpenSSH
Peter Müller [Mon, 24 Oct 2022 09:03:08 +0000 (09:03 +0000)] 
Core Update 172: Ship and restart OpenSSH

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoOpenSSH: Update to 9.1p1
Peter Müller [Sat, 15 Oct 2022 15:47:51 +0000 (15:47 +0000)] 
OpenSSH: Update to 9.1p1

Please refer to https://www.openssh.com/releasenotes.html#9.1 for the
release announcement of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agoCore Update 172: Ship tzdata
Peter Müller [Mon, 24 Oct 2022 08:59:09 +0000 (08:59 +0000)] 
Core Update 172: Ship tzdata

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agotzdata: Update to 2022e
Peter Müller [Sat, 15 Oct 2022 15:51:05 +0000 (15:51 +0000)] 
tzdata: Update to 2022e

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agoCore Update 172: Ship libloc
Peter Müller [Mon, 24 Oct 2022 08:58:51 +0000 (08:58 +0000)] 
Core Update 172: Ship libloc

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agolibloc: Update to 0.9.15
Peter Müller [Sat, 15 Oct 2022 15:53:07 +0000 (15:53 +0000)] 
libloc: Update to 0.9.15

Please refer to https://lists.ipfire.org/pipermail/location/2022-September/000579.html
for the release announcement of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agoCore Update 172: Ship and restart strongSwan
Peter Müller [Mon, 24 Oct 2022 08:57:00 +0000 (08:57 +0000)] 
Core Update 172: Ship and restart strongSwan

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agostrongSwan: Update to 5.9.8
Peter Müller [Sat, 15 Oct 2022 16:01:26 +0000 (16:01 +0000)] 
strongSwan: Update to 5.9.8

Please refer to https://github.com/strongswan/strongswan/releases/tag/5.9.8
for the release announcement of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agoStart Core Update 172
Peter Müller [Mon, 24 Oct 2022 08:55:12 +0000 (08:55 +0000)] 
Start Core Update 172

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agolinux: Add upstream patches for CVE-2022-4{1674,2719-2722}
Peter Müller [Mon, 17 Oct 2022 16:26:19 +0000 (16:26 +0000)] 
linux: Add upstream patches for CVE-2022-4{1674,2719-2722}

https://lists.ipfire.org/pipermail/development/2022-October/014562.html

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agocore171: Ship dhcp
Michael Tremer [Mon, 10 Oct 2022 18:41:10 +0000 (18:41 +0000)] 
core171: Ship dhcp

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agodhcp: Update to 4.4.3-P1
Matthias Fischer [Fri, 7 Oct 2022 19:59:21 +0000 (21:59 +0200)] 
dhcp: Update to 4.4.3-P1

For details see:
https://downloads.isc.org/isc/dhcp/4.4.3-P1/dhcp-4.4.3-P1-RELNOTES

Changelog since 4.4.1 is rather long...

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agomanualpages: add and update help links to Wiki
Jon Murphy [Fri, 7 Oct 2022 18:45:17 +0000 (13:45 -0500)] 
manualpages: add and update help links to Wiki

- add help links for two new ipblocklist WebGUI pages
- update help links to proxy accounting
- add links to OpenVPN Net-to-Net Statistics,
    MD Raid State, Update Accelerator,
    OpenVPN Roadwarrior Connections Log

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agoglibc: Fix added whitespace in syslog messages
Michael Tremer [Fri, 7 Oct 2022 16:24:15 +0000 (16:24 +0000)] 
glibc: Fix added whitespace in syslog messages

Fixes: #12949
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agofirewall: Fix missing whitespace for blocklist messages
Michael Tremer [Fri, 7 Oct 2022 16:21:16 +0000 (16:21 +0000)] 
firewall: Fix missing whitespace for blocklist messages

Fixes: #12934
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agounbound-dhcp-leases-bridge: Fall back to the default domain
Michael Tremer [Tue, 4 Oct 2022 13:32:47 +0000 (13:32 +0000)] 
unbound-dhcp-leases-bridge: Fall back to the default domain

When the bridge cannot detect a domain name for any of the leases, it
uses localdomain which is not always the best choice. So instead, this
patches changes the behaviour that we read the default domain of the
firewall.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
19 months agoCore Update 171: Ship setclock initscript
Peter Müller [Tue, 4 Oct 2022 14:48:04 +0000 (14:48 +0000)] 
Core Update 171: Ship setclock initscript

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoinitscripts: load RTC module (RX8025) for Ten64 board
Mathew McBride [Mon, 3 Oct 2022 06:20:19 +0000 (06:20 +0000)] 
initscripts: load RTC module (RX8025) for Ten64 board

For reasons I have not been able to determine, the RTC
module for the Ten64 board (rtc-rx8025) is not automatically
loaded at startup, despite every other relevant modules being
loaded.

modprobe it manually if we are on a Ten64 board.

Signed-off-by: Mathew McBride <matt@traverse.com.au>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agoconfig: u-boot: bypass the u-boot script on Traverse Ten64
Mathew McBride [Mon, 3 Oct 2022 06:20:18 +0000 (06:20 +0000)] 
config: u-boot: bypass the u-boot script on Traverse Ten64

The Ten64 board runs a U-Boot which works best directly
booting EFI. Attempting to load your own DTB or other steps
will cause issues.
(see https://ten64doc.traverse.com.au/faq/#common-issues)

The current stable Ten64 firmware unfortunately searches for
boot.scr before bootaa64.efi. So redirect it back to the EFI path.

A future Ten64 firmware package will prefer EFI first before
any boot script avoiding this issue. I will provide a patch
reversing this when that day comes.

Signed-off-by: Mathew McBride <matt@traverse.com.au>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agokernel: add patches for SFP support on NXP Layerscape/DPAA2 (arm64)
Mathew McBride [Mon, 3 Oct 2022 06:20:17 +0000 (06:20 +0000)] 
kernel: add patches for SFP support on NXP Layerscape/DPAA2 (arm64)

These two patches are needed to support SFP's on NXP DPAA2 platforms
(e.g Traverse Ten64).

The deadlock issue patch was submitted upstream a while ago and
rejected, however I am not aware of any better solutions at present.

The 10G mode additions are part of mainline since 5.16.

These two .patches were sourced from our patchset over here:
https://gitlab.com/traversetech/traverse-kernel-patches/-/tree/lts-5-15/patches

Signed-off-by: Mathew McBride <matt@traverse.com.au>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agolinux: enable options for NXP Layerscape
Mathew McBride [Mon, 3 Oct 2022 06:20:16 +0000 (06:20 +0000)] 
linux: enable options for NXP Layerscape

This change enables support for NXP's QorIQ/Layerscape platforms,
specifically the Traverse Technologies Ten64 (LS1088A).

Signed-off-by: Mathew McBride <matt@traverse.com.au>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agorsync: Update to version 3.2.6 and fix Bug#12947
Adolf Belka [Tue, 4 Oct 2022 10:54:42 +0000 (12:54 +0200)] 
rsync: Update to version 3.2.6 and fix Bug#12947

- Update from version 3.2.4 plus CVE-2022-29154 patch to 3.2.6
- Patch for CVE-2022-29154 applied  in CU170 turned out to have a bug within it causing
   rsync to fail with an error. Four additional commits were done to fix this bug and
   its consequences but these were all applied in the rsync git repo after the patch had
   been merged into CU170.
- Version 3.2.5 onwards contains the CVE-2022-29154 fix and associated commits.
- No update of rootfile required.
- Changelog
    NEWS for rsync 3.2.6 (9 Sep 2022)
BUG FIXES:
    More path-cleaning improvements in the file-list validation code to avoid
             rejecting of valid args.
    A file-list validation fix for a --files-from file that ends without a
             line-terminating character.
    Added a safety check that prevents the sender from removing destination
             files when a local copy using --remove-source-files has some files that are
             shared between the sending & receiving hierarchies, including the case
             where the source dir & destination dir are identical.
    Fixed a bug in the internal MD4 checksum code that could cause the digest to
             be sporadically incorrect (the openssl version was/is fine).
    A minor tweak to rrsync added "copy-devices" to the list of known args, but
             left it disabled by default.
ENHANCEMENTS:
    Rename --protect-args to --secluded-args to make it clearer how it differs
             from the default backslash-escaped arg-protecting behavior of rsync. The
             old option names are still accepted. The environment-variable override did
             not change its name.
PACKAGING RELATED:
    The configure option --with-protected-args was renamed to
             --with-secluded-args. This option makes --secluded-args the default rsync
             behavior instead of using backslash escaping for protecting args.
    The mkgitver script now makes sure that a .git dir/file is in the top-level
             source dir before calling git describe. It also runs a basic check on the
             version value. This should avoid using an unrelated git description for
             rsync's version.
DEVELOPER RELATED:
    The configure script no longer sets the -⁠pedantic-errors CFLAG (which it
             used to try to do only for gcc).
    The name_num_obj struct was modified to allow its dynamic name_num_item list
             to be initialized in a better way.
    NEWS for rsync 3.2.5 (14 Aug 2022)
SECURITY FIXES:
    Added some file-list safety checking that helps to ensure that a rogue
             sending rsync can't add unrequested top-level names and/or include
             recursive names that should have been excluded by the sender. These extra
             safety checks only require the receiver rsync to be updated. When dealing
             with an untrusted sending host, it is safest to copy into a dedicated
             destination directory for the remote content (i.e. don't copy into a
             destination directory that contains files that aren't from the remote host
             unless you trust the remote host). Fixes CVE-2022-29154.
    A fix for CVE-2022-37434 in the bundled zlib (buffer overflow issue).
BUG FIXES:
    Fixed the handling of filenames specified with backslash-quoted wildcards
             when the default remote-arg-escaping is enabled.
    Fixed the configure check for signed char that was causing a host that
             defaults to unsigned characters to generate bogus rolling checksums. This
             made rsync send mostly literal data for a copy instead of finding matching
             data in the receiver's basis file (for a file that contains high-bit
             characters).
    Lots of manpage improvements, including an attempt to better describe how
             include/exclude filters work.
    If rsync is compiled with an xxhash 0.8 library and then moved to a system
             with a dynamically linked xxhash 0.7 library, we now detect this and
             disable the XX3 hashes (since these routines didn't stabilize until 0.8).
ENHANCEMENTS:
    The --trust-sender option was added as a way to bypass the extra file-list
             safety checking (should that be required).
PACKAGING RELATED:
    A note to those wanting to patch older rsync versions: the changes in this
             release requires the quoted argument change from 3.2.4. Then, you'll want
             every single code change from 3.2.5 since there is no fluff in this release.
    The build date that goes into the manpages is now based on the developer's
             release date, not on the build's local-timezone interpretation of the date.
DEVELOPER RELATED:
    Configure now defaults GETGROUPS_T to gid_t when cross compiling.
    Configure now looks for the bsd/string.h include file in order to fix the
             build on a host that has strlcpy() in the main libc but not defined in the
             main string.h file.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agolibseccomp: Bump package version
Peter Müller [Mon, 3 Oct 2022 21:58:25 +0000 (21:58 +0000)] 
libseccomp: Bump package version

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agolinux: Enable seccomp filter on ARM
Peter Müller [Mon, 19 Sep 2022 12:35:41 +0000 (12:35 +0000)] 
linux: Enable seccomp filter on ARM

Since last time we checked, the kernel's security features on ARM have
improved notably (see CONFIG_RANDOMIZE_BASE discussion). This patch
therefore proposes to give the seccomp filter on both 32- and 64-bit ARM
another try, since it provides significant security benefit to
applications using it.

Due to operational constraints, rootfile changes have been omitted, and
will be conducted, should this patch be approved.

Note to future self: Once this patch is approved, applications using
seccomp (OpenSSH, Tor) need to be updated/shipped on ARM.

Fixes: #12366
Fixes: #12370
Cc: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agolinux: Remove user-space probe support
Peter Müller [Sun, 2 Oct 2022 14:47:52 +0000 (14:47 +0000)] 
linux: Remove user-space probe support

From the kernels' documentation:

> Uprobes is the user-space counterpart to kprobes: they
> enable instrumentation applications (such as 'perf probe')
> to establish unintrusive probes in user-space binaries and
> libraries, by executing handler functions when the probes
> are hit by user-space applications.
>
> ( These probes come in the form of single-byte breakpoints,
> managed by the kernel and kept transparent to the probed
> application. )

To the best of the authors' understanding, no application on IPFire
needs this functionality, and given its abuse potential, we should
probably not enable it.

As expected, strace functionality is not impaired by this.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agosuricata 6.0.8 - suggested change in 'suricata.yaml': set app-layer mqtt: enabled...
Matthias Fischer [Thu, 29 Sep 2022 20:35:18 +0000 (22:35 +0200)] 
suricata 6.0.8 - suggested change in 'suricata.yaml': set app-layer mqtt: enabled: yes

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
19 months agomodules.d: Drop orphaned blacklist statements
Peter Müller [Mon, 3 Oct 2022 10:21:24 +0000 (10:21 +0000)] 
modules.d: Drop orphaned blacklist statements

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoUpdate contributor list
Peter Müller [Mon, 3 Oct 2022 10:07:49 +0000 (10:07 +0000)] 
Update contributor list

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agobackup: Fix file permissions of in-/exclude files, again
Peter Müller [Mon, 3 Oct 2022 09:22:57 +0000 (09:22 +0000)] 
backup: Fix file permissions of in-/exclude files, again

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoCore Update 171: Do not ship /sbin/tipc
Peter Müller [Sun, 2 Oct 2022 10:20:38 +0000 (10:20 +0000)] 
Core Update 171: Do not ship /sbin/tipc

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoCore Update 171: Fix Suricata stop/start
Peter Müller [Sun, 2 Oct 2022 09:46:47 +0000 (09:46 +0000)] 
Core Update 171: Fix Suricata stop/start

My fault, again. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoAvoid manpages from being shipped and delete them on existing installations
Peter Müller [Sun, 2 Oct 2022 09:43:47 +0000 (09:43 +0000)] 
Avoid manpages from being shipped and delete them on existing installations

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoCore Update 171: Ship proxy.cgi
Peter Müller [Sun, 2 Oct 2022 08:51:03 +0000 (08:51 +0000)] 
Core Update 171: Ship proxy.cgi

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoproxy.cgi: Fix for Bug #12826 'squid >=5 crashes on literal IPv6 addresses'
Matthias Fischer [Fri, 30 Sep 2022 19:05:56 +0000 (21:05 +0200)] 
proxy.cgi: Fix for Bug #12826 'squid >=5 crashes on literal IPv6 addresses'

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
19 months agobackup: Increase chown verbosiness
Peter Müller [Sun, 2 Oct 2022 08:49:53 +0000 (08:49 +0000)] 
backup: Increase chown verbosiness

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agolangs: Fix missing spaces for proxy password length error message
Peter Müller [Fri, 30 Sep 2022 22:09:31 +0000 (22:09 +0000)] 
langs: Fix missing spaces for proxy password length error message

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoncat: Update to 7.92
Peter Müller [Fri, 30 Sep 2022 21:18:38 +0000 (21:18 +0000)] 
ncat: Update to 7.92

This was forgotten when updating nmap to 7.92.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agolinux: Update to 5.15.71
Peter Müller [Fri, 30 Sep 2022 17:20:37 +0000 (17:20 +0000)] 
linux: Update to 5.15.71

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoconfigroot: Increase verbosiness of chown operations
Peter Müller [Fri, 30 Sep 2022 17:20:17 +0000 (17:20 +0000)] 
configroot: Increase verbosiness of chown operations

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoCore Update 171: Ship and restart Suricata
Peter Müller [Fri, 30 Sep 2022 15:48:03 +0000 (15:48 +0000)] 
Core Update 171: Ship and restart Suricata

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agolibhtp: Update to 0.5.41
Matthias Fischer [Thu, 29 Sep 2022 20:21:57 +0000 (22:21 +0200)] 
libhtp: Update to 0.5.41

Needed for 'suricata 6.0.8'

For details see:
https://github.com/OISF/libhtp/releases/tag/0.5.41

"trim white space of invalid folding for first header

clear buffered data for body data

minor optimization for decompression code"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
19 months agosuricata: Update to 6.0.8
Matthias Fischer [Thu, 29 Sep 2022 20:21:56 +0000 (22:21 +0200)] 
suricata: Update to 6.0.8

Changelog:

"6.0.8 -- 2022-09-27

Task #5552: libhtp 0.5.41

6.0.7 -- 2022-09-27

Security #5430: mqtt: DOS by quadratic with too many transactions in one parse (6.0.x backport)
Bug #5559: BUG_ON triggered from TmThreadsInjectFlowById (6.0.x backport)
Bug #5549: Failed assert DeStateSearchState (6.0.x)
Bug #5548: tcp: assertion failed in DoInsertSegment (BUG_ON) (6.0.x)
Bug #5547: rules: less strict parsing of unexpected flowbit options
Bug #5546: rules: don't error on bad hex in content
Bug #5540: detect: transform strip whitespace creates a 0-sized variable-length array: backport6
Bug #5505: http2: slow http2_frames_get_header_value_vec because of allocation [backport6]
Bug #5471: Reject action is no longer working (6.0.x backport)
Bug #5467: rules: more graceful handling of anomalies for stable versions
Bug #5459: Counters are not initialized in all places. (6.0.x backport)
Bug #5448: nfs: add maximum number of operations per compound (6.0.x backport)
Bug #5436: Infinite loop if the sniffing interface temporarily goes down (6.0.x backports)
Bug #5335: flow: vlan.use-for-tracking is not used for ICMPv4 (6.0.x backport)
Bug #4421: flow manager: using too much CPU during idle (6.0.x backport)
Feature #5535: ips: add "reject" action to exception policies (6.0.x backport)
Feature #5500: ips: midstream: add "exception policy" for midstream (6.0.x backport)
Task #5551: doc: add exception policy documentation (6.0.x)
Task #5533: detect/parse: add tests for parsing signatures with reject and drop action (6.0.x backport)
Task #5525: exceptions: error out when invalid configuration value is passed (6.0.x backport)
Task #5381: add `alert-queue-expand-fails` command-line option (6.0.x backport)
Task #5328: python: distutils deprecation warning (6.0.x backport)"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoCore Update 171: Fix backup {ex,in}clude file permissions
Peter Müller [Tue, 27 Sep 2022 10:54:45 +0000 (10:54 +0000)] 
Core Update 171: Fix backup {ex,in}clude file permissions

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agobackup: Set owner of {ex,in}clude{,.user} files to "root"
Peter Müller [Mon, 26 Sep 2022 18:50:08 +0000 (18:50 +0000)] 
backup: Set owner of {ex,in}clude{,.user} files to "root"

Since these files are static, there is no legitimate reason why they
should be owned (hence writable) by "nobody". Also, according to
configroot's LFS file, this is the intended behaviour for the *.user
files, which is then overwritten by the backup LFS file. Therefore, set
the file mode of these statically - configroot does not feature other
files in /var/ipfire/backup/ anyway.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
19 months agoCore Update 171: Remove some orphaned files
Peter Müller [Mon, 26 Sep 2022 19:18:51 +0000 (19:18 +0000)] 
Core Update 171: Remove some orphaned files

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoCore Update 171: Ship ipblocklist/sources
Peter Müller [Mon, 26 Sep 2022 08:54:36 +0000 (08:54 +0000)] 
Core Update 171: Ship ipblocklist/sources

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
19 months agoipblocklist-sources: Correct the info url - Fixes bug#12938
Adolf Belka [Sat, 24 Sep 2022 11:53:12 +0000 (13:53 +0200)] 
ipblocklist-sources: Correct the info url - Fixes bug#12938

- With the .html ending the link gets a 404 Page not found error

Fixes: Bug#12938
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
20 months agoCore Update 171: Ship expat
Peter Müller [Fri, 23 Sep 2022 10:43:27 +0000 (10:43 +0000)] 
Core Update 171: Ship expat

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agoexpat: Update to version 2.4.9
Adolf Belka [Wed, 21 Sep 2022 17:16:11 +0000 (19:16 +0200)] 
expat: Update to version 2.4.9

- Update from version 2.4.8 to 2.4.9
- Update of rootfile
- Changelog
   Release 2.4.9 Tue September 20 2022
        Security fixes:
       #629 #640  CVE-2022-40674 -- Heap use-after-free vulnerability in
                    function doContent. Expected impact is denial of service
                    or potentially arbitrary code execution.
        Bug fixes:
            #634  MinGW: Fix mis-compilation for -D__USE_MINGW_ANSI_STDIO=0
            #614  docs: Fix documentation on effect of switch XML_DTD on
                    symbol visibility in doc/reference.html
        Other changes:
            #638  MinGW: Make fix-xmltest-log.sh drop more Wine bug output
       #596 #625  Autotools: Sync CMake templates with CMake 3.22
            #608  CMake: Migrate from use of CMAKE_*_POSTFIX to
                    dedicated variables EXPAT_*_POSTFIX to stop affecting
                    other projects
       #597 #599  Windows|CMake: Add missing -DXML_STATIC to test runners
                    and fuzzers
       #512 #621  Windows|CMake: Render .def file from a template to fix
                    linking with -DEXPAT_DTD=OFF and/or -DEXPAT_ATTR_INFO=ON
       #611 #621  MinGW|CMake: Apply MSVC .def file when linking
       #622 #624  MinGW|CMake: Sync library name with GNU Autotools,
                    i.e. produce libexpat-1.dll rather than libexpat.dll
                    by default.  Filename libexpat.dll.a is unaffected.
            #632  MinGW|CMake: Set missing variable CMAKE_RC_COMPILER in
                    toolchain file "cmake/mingw-toolchain.cmake" to avoid
                    error "windres: Command not found" on e.g. Ubuntu 20.04
       #597 #627  CMake: Unify inconsistent use of set() and option() in
                    context of public build time options to take need for
                    set(.. FORCE) in projects using Expat by means of
                    add_subdirectory(..) off Expat's users' shoulders
       #626 #641  Stop exporting API symbols when building a static library
            #644  Resolve use of deprecated "fgrep" by "grep -F"
            #620  CMake: Make documentation on variables a bit more consistent
            #636  CMake: Drop leading whitespace from a #cmakedefine line in
                    file expat_config.h.cmake
            #594  xmlwf: Fix harmless variable mix-up in function nsattcmp
  #592 #593 #610  Address Cppcheck warnings
            #643  Address Clang 15 compiler warnings
       #642 #644  Version info bumped from 9:8:8 to 9:9:8;
                    see https://verbump.de/ for what these numbers do
        Infrastructure:
       #597 #598  CI: Windows: Start covering MSVC 2022
            #619  CI: macOS: Migrate off deprecated macOS 10.15
            #632  CI: Linux: Make migration off deprecated Ubuntu 18.04 work
            #643  CI: Upgrade Clang from 14 to 15
            #637  apply-clang-format.sh: Add support for BSD find
            #633  coverage.sh: Exclude MinGW headers
    #635  coverage.sh: Fix name collision for -funsigned-char

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
20 months agoCore Update 171: Delete stale Bind 9.16.32 libraries
Peter Müller [Fri, 23 Sep 2022 10:42:14 +0000 (10:42 +0000)] 
Core Update 171: Delete stale Bind 9.16.32 libraries

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agobind: Update to 9.16.33
Matthias Fischer [Fri, 23 Sep 2022 07:03:02 +0000 (09:03 +0200)] 
bind: Update to 9.16.33

For details see:
https://downloads.isc.org/isc/bind9/9.16.33/doc/arm/html/notes.html#notes-for-bind-9-16-33

"Security Fixes

    Previously, there was no limit to the number of database lookups
    performed while processing large delegations, which could be abused to
    severely impact the performance of named running as a recursive
    resolver. This has been fixed. (CVE-2022-2795)

    ISC would like to thank Yehuda Afek from Tel-Aviv University and Anat
    Bremler-Barr & Shani Stajnrod from Reichman University for bringing
    this vulnerability to our attention. [GL #3394]

    named running as a resolver with the stale-answer-client-timeout option
    set to 0 could crash with an assertion failure, when there was a stale
    CNAME in the cache for the incoming query. This has been fixed.
    (CVE-2022-3080) [GL #3517]

    A memory leak was fixed that could be externally triggered in the
    DNSSEC verification code for the ECDSA algorithm. (CVE-2022-38177) [GL
    #3487]

    Memory leaks were fixed that could be externally triggered in the
    DNSSEC verification code for the EdDSA algorithm. (CVE-2022-38178) [GL
    #3487]

Feature Changes

    Response Rate Limiting (RRL) code now treats all QNAMEs that are
    subject to wildcard processing within a given zone as the same name, to
    prevent circumventing the limits enforced by RRL. [GL #3459]

    Zones using dnssec-policy now require dynamic DNS or inline-signing to
    be configured explicitly. [GL #3381]

    A backward-compatible approach was implemented for encoding
    internationalized domain names (IDN) in dig and converting the domain
    to IDNA2008 form; if that fails, BIND tries an IDNA2003 conversion. [GL
    #3485]

Bug Fixes

    A serve-stale bug was fixed, where BIND would try to return stale data
    from cache for lookups that received duplicate queries or queries that
    would be dropped. This bug resulted in premature SERVFAIL responses,
    and has now been resolved. [GL #2982]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
20 months agoCore Update 171: Ship manualpages
Peter Müller [Fri, 23 Sep 2022 10:39:57 +0000 (10:39 +0000)] 
Core Update 171: Ship manualpages

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agomanualpages: Correct link to wiki for Network (other)
Adolf Belka [Thu, 22 Sep 2022 11:43:10 +0000 (13:43 +0200)] 
manualpages: Correct link to wiki for Network (other)

- Network (other) help link was set to go to Network (internal) wiki page
  Link modified
- Running the check_manualpages.pl script requires it to be executable so the build
   changed the permissions mode from 644 to 755

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
20 months agoCore Update 171: Ship and rebuild crontab
Peter Müller [Fri, 23 Sep 2022 10:39:04 +0000 (10:39 +0000)] 
Core Update 171: Ship and rebuild crontab

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agocrontab: add periodic cleanup the collectd RRD (graphs)
Jon Murphy [Thu, 25 Aug 2022 00:31:29 +0000 (19:31 -0500)] 
crontab: add periodic cleanup the collectd RRD (graphs)

- Created (mostly) for old openvpn graphs
- RRD removed when no graph modification for +365 days
  - chosen since graph max out is 365 days
- fcron job runs once per week
  - chosen since this is just a cleanup and it doesnt need to run everyday
Note: logging can be added if needed.

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
20 months agoCore Update 171: Ship log.dat
Peter Müller [Fri, 23 Sep 2022 10:37:33 +0000 (10:37 +0000)] 
Core Update 171: Ship log.dat

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agolog.dat: Add NUT entry for System Logs - Fixes bug#12921
Adolf Belka [Mon, 19 Sep 2022 13:15:18 +0000 (15:15 +0200)] 
log.dat: Add NUT entry for System Logs - Fixes bug#12921

- Also aligned all the code entries in %sections and %trsections

Suggested-by: Michael <ip.fire@die-fritzens.de>
Tested-by: Michael <ip.fire@die-fritzens.de>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
20 months agocpufrequtils: Remove SERVICES entry for this package - fixes Bug#12933
Adolf Belka [Wed, 21 Sep 2022 10:37:19 +0000 (12:37 +0200)] 
cpufrequtils: Remove SERVICES entry for this package - fixes Bug#12933

- cpufrequtils is a set of "tools" to manage and set cpu freq settings.
- There is an initscript but this is only loading the cpu dependent kernel modules that
   are required by cpufrequtils.
- Therefore cpufrequtils is not a service but a set of tools that are used when required.
- SERVICES line made blank so that this addon does not show up in the services addon table.
- Modified install initscript line to not use SERVICES variable

Fixes: Bug#12933
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
20 months agoCore Update 171: Ship and restart Unbound
Peter Müller [Fri, 23 Sep 2022 10:35:39 +0000 (10:35 +0000)] 
Core Update 171: Ship and restart Unbound

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agounbound: Update to 1.16.3
Matthias Fischer [Fri, 23 Sep 2022 07:09:38 +0000 (09:09 +0200)] 
unbound: Update to 1.16.3

For details see:
https://lists.nlnetlabs.nl/pipermail/unbound-users/2022-September/007885.html

"This release fixes CVE-2022-3204 Non-Responsive Delegation
Attack. It was reported by Yehuda Afek from Tel-Aviv
University and Anat Bremler-Barr and Shani Stajnrod from
Reichman University.

This fixes for better performance when under load, by cutting
promiscuous queries for nameserver discovery and limiting the
number of times a delegation point can look in the cache for
missing records.

Bug Fixes
- Patch for CVE-2022-3204 Non-Responsive Delegation Attack."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
20 months agolinux: Align configurations and rootfiles for ARM
Peter Müller [Wed, 21 Sep 2022 13:36:59 +0000 (13:36 +0000)] 
linux: Align configurations and rootfiles for ARM

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agolinux: Prepare CONFIG_DEBUG_FS disabling on non-x86_64 architectures
Peter Müller [Tue, 20 Sep 2022 14:30:28 +0000 (14:30 +0000)] 
linux: Prepare CONFIG_DEBUG_FS disabling on non-x86_64 architectures

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agoCore Update 171: Ship kernel and regenerate initial ramdisks locally
Peter Müller [Tue, 20 Sep 2022 10:39:08 +0000 (10:39 +0000)] 
Core Update 171: Ship kernel and regenerate initial ramdisks locally

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agolinux: Update to 5.15.68
Peter Müller [Mon, 19 Sep 2022 12:28:14 +0000 (12:28 +0000)] 
linux: Update to 5.15.68

Please refer to https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.68
for the changelog of this release. Due to the lack of local build
hardware, ARM rootfile and configuration changes have been omitted.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agokernel: Disable CONFIG_DEBUG_FS
Peter Müller [Sat, 17 Sep 2022 19:24:46 +0000 (19:24 +0000)] 
kernel: Disable CONFIG_DEBUG_FS

According to the kernel's documentation,

> debugfs is a virtual file system that kernel developers use to put
> debugging files into. Enable this option to be able to read and
> write to these files.

There is no legitimate reason why one has to do so on an IPFire machine.
Further, the vast debugging options (i.e. related to various drivers)
have never been enabled, limiting the use of this virtual file system
even further.

This patch therefore proposes to disable it entirely, since its
potential security impact outweights its benefits. Due to operational
constraints, changes to ARM kernel configurations will be made if this
patch is approved for x86_64.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
20 months agoCore Update 171: Ship backupiso
Peter Müller [Mon, 19 Sep 2022 12:37:45 +0000 (12:37 +0000)] 
Core Update 171: Ship backupiso

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agobackupiso: Update to ISO file naming - bug#12932
Adolf Belka [Sun, 18 Sep 2022 11:45:17 +0000 (13:45 +0200)] 
backupiso: Update to ISO file naming - bug#12932

- commit https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=fbd0608c2cb5372fff7857065ec7e605b1bf9cf7
   aligned the ISO file name to the image file name. This change also needed to be added
   to backupiso as the filename is used to download the iso from the IPFire server when
   creating an ISO backup.

Fixes: Bug#12932
Suggested-by: Matthias Fischer <matthias.fischer@ipfire.org>
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
20 months agoGuardian: Bump package version for Perl changes
Peter Müller [Sun, 18 Sep 2022 20:55:51 +0000 (20:55 +0000)] 
Guardian: Bump package version for Perl changes

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agoCore Update 171: Ship libloc
Peter Müller [Sun, 18 Sep 2022 20:27:12 +0000 (20:27 +0000)] 
Core Update 171: Ship libloc

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agoCore Update 171: Stop and restart collectd
Peter Müller [Sun, 18 Sep 2022 20:24:50 +0000 (20:24 +0000)] 
Core Update 171: Stop and restart collectd

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agoFix restarting Squid and OpenVPN during Core Update 171
Peter Müller [Sun, 18 Sep 2022 20:21:24 +0000 (20:21 +0000)] 
Fix restarting Squid and OpenVPN during Core Update 171

My fault, again. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agoCore Update 171: Stop Apache before applying the upgrade
Peter Müller [Sun, 18 Sep 2022 08:02:14 +0000 (08:02 +0000)] 
Core Update 171: Stop Apache before applying the upgrade

Since we replace Perl, users most likely get to see some nasty "Internal
Server Error" messages during the upgrade. To suppres them, and to limit
the chance of side effects, stop Apache before applying the update, and
start it again afterwards.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agoCore Update 171: Only start services if they are actually enabled
Peter Müller [Sun, 18 Sep 2022 08:01:18 +0000 (08:01 +0000)] 
Core Update 171: Only start services if they are actually enabled

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
20 months agoCore Update 171: Ship and restart strongSwan
Peter Müller [Sun, 18 Sep 2022 07:58:39 +0000 (07:58 +0000)] 
Core Update 171: Ship and restart strongSwan

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>