]> git.ipfire.org Git - ipfire-2.x.git/log
ipfire-2.x.git
8 months agohostapd: update to git 64d60bb4 core189 v2.29-core189
Arne Fitzenreiter [Sun, 29 Sep 2024 16:03:58 +0000 (18:03 +0200)] 
hostapd: update to git 64d60bb4

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agowlanap.cgi: Fix copying configuration
Michael Tremer [Fri, 20 Sep 2024 12:12:07 +0000 (14:12 +0200)] 
wlanap.cgi: Fix copying configuration

This allows to uncheck checkboxes again.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agowlanap.cgi: Change broadcast SSID to hide SSID
Michael Tremer [Fri, 20 Sep 2024 11:55:40 +0000 (13:55 +0200)] 
wlanap.cgi: Change broadcast SSID to hide SSID

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agowlanap.cgi: Default to channel 0 for ACS
Michael Tremer [Fri, 20 Sep 2024 11:19:10 +0000 (13:19 +0200)] 
wlanap.cgi: Default to channel 0 for ACS

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agowlanap.cgi: Enable Neighbourhood Scan by default
Michael Tremer [Fri, 20 Sep 2024 11:17:59 +0000 (13:17 +0200)] 
wlanap.cgi: Enable Neighbourhood Scan by default

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agowlanap.cgi: Don't try to show status if there is no interface
Michael Tremer [Fri, 20 Sep 2024 11:16:44 +0000 (13:16 +0200)] 
wlanap.cgi: Don't try to show status if there is no interface

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agowlanap.cgi: Correctly show broadcast SSID status
Michael Tremer [Fri, 20 Sep 2024 11:13:41 +0000 (13:13 +0200)] 
wlanap.cgi: Correctly show broadcast SSID status

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agowlanap.cgi: Disable generating Perl warnings
Michael Tremer [Fri, 20 Sep 2024 10:30:03 +0000 (11:30 +0100)] 
wlanap.cgi: Disable generating Perl warnings

Reported-by: Waynie <waynet@ucpix.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocore189: Ship rules.pl
Michael Tremer [Tue, 8 Oct 2024 08:43:39 +0000 (08:43 +0000)] 
core189: Ship rules.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agofirewall: Flush SYN_FLOOD_PROTECTION
Michael Tremer [Mon, 7 Oct 2024 09:13:12 +0000 (09:13 +0000)] 
firewall: Flush SYN_FLOOD_PROTECTION

This chain was not flushed when the firewall was being reloaded which
made any ports appear as open when rules have been disabled or deleted.

This has no security implications, but nevertheless isn't right.

Reported-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocore189: Ship ncat
Michael Tremer [Mon, 7 Oct 2024 10:22:33 +0000 (10:22 +0000)] 
core189: Ship ncat

This is required for the new Unbound/DHCP Leases bridge to work.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoncat: Make this package part of the core system
Michael Tremer [Mon, 7 Oct 2024 10:18:57 +0000 (10:18 +0000)] 
ncat: Make this package part of the core system

The nc command is required for the Unbound/DHCP leases bridge.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocore189: Ship and restart Unbound
Michael Tremer [Fri, 4 Oct 2024 11:46:22 +0000 (11:46 +0000)] 
core189: Ship and restart Unbound

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agounbound: Update to 1.21.1
Matthias Fischer [Fri, 4 Oct 2024 08:41:17 +0000 (10:41 +0200)] 
unbound: Update to 1.21.1

For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-21-1

"Fix CVE-2024-8508, unbounded name compression could lead to denial of service."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoovpnmain.cgi: Remove using dropped &General::getlastip() function
Michael Tremer [Thu, 26 Sep 2024 20:40:04 +0000 (20:40 +0000)] 
ovpnmain.cgi: Remove using dropped &General::getlastip() function

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoheader.pl: Force browsers to reload rrdimage.js
Michael Tremer [Thu, 26 Sep 2024 14:13:10 +0000 (14:13 +0000)] 
header.pl: Force browsers to reload rrdimage.js

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoovpnmain.cgi: Fix IP address calculation with static pools
Michael Tremer [Sun, 22 Sep 2024 14:33:03 +0000 (14:33 +0000)] 
ovpnmain.cgi: Fix IP address calculation with static pools

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocore189: Ship suricata changes
Michael Tremer [Tue, 24 Sep 2024 08:53:40 +0000 (08:53 +0000)] 
core189: Ship suricata changes

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Enable scanning IPsec packets
Michael Tremer [Tue, 24 Sep 2024 08:33:22 +0000 (10:33 +0200)] 
suricata: Enable scanning IPsec packets

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoids.cgi: Add UI to enable scanning on IPsec
Michael Tremer [Sun, 22 Sep 2024 15:22:48 +0000 (17:22 +0200)] 
ids.cgi: Add UI to enable scanning on IPsec

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Add support for zones having multiple interfaces
Michael Tremer [Sun, 22 Sep 2024 15:08:03 +0000 (17:08 +0200)] 
suricata: Add support for zones having multiple interfaces

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Split marking packets off into a separate chain
Michael Tremer [Sun, 22 Sep 2024 15:06:21 +0000 (17:06 +0200)] 
suricata: Split marking packets off into a separate chain

This is required so that we can have different policies for incoming and
outgoing packets.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Clear IPS bits after use
Michael Tremer [Sat, 21 Sep 2024 15:55:09 +0000 (17:55 +0200)] 
suricata: Clear IPS bits after use

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Always count the whitelisted packets
Michael Tremer [Sat, 21 Sep 2024 10:39:32 +0000 (12:39 +0200)] 
suricata: Always count the whitelisted packets

Even if there are no rules, if this does not exist, collectd will be
unhappy and we cannot generate the graph.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoids.cgi: Don't show the graph if there is no RRD data
Michael Tremer [Sat, 21 Sep 2024 10:37:09 +0000 (12:37 +0200)] 
ids.cgi: Don't show the graph if there is no RRD data

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoids.cgi: Fix empty states of tables
Michael Tremer [Sat, 21 Sep 2024 10:34:56 +0000 (12:34 +0200)] 
ids.cgi: Fix empty states of tables

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agographs.pl: Fix suricata graph name
Michael Tremer [Sat, 21 Sep 2024 10:28:50 +0000 (12:28 +0200)] 
graphs.pl: Fix suricata graph name

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agofirewall: Move the IPS back to INPUT/FORWARD/OUTPUT
Michael Tremer [Tue, 17 Sep 2024 02:04:07 +0000 (04:04 +0200)] 
firewall: Move the IPS back to INPUT/FORWARD/OUTPUT

We cannot use the PREROUTING/POSTROUTING chains here because Suricata
will fail to track NAT-ed connections.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Track whitelisted traffic and add it to the IPS graph
Michael Tremer [Fri, 13 Sep 2024 08:12:30 +0000 (10:12 +0200)] 
suricata: Track whitelisted traffic and add it to the IPS graph

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoIPS: Ada a graph that shows the IPS throughput
Michael Tremer [Tue, 10 Sep 2024 22:43:59 +0000 (00:43 +0200)] 
IPS: Ada a graph that shows the IPS throughput

This graph is split into three parts. One shows bypassed packets, the
next one shows the actually scanned packets and lastly we show the total
throughput.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Collect metrics on scanned and bypassed packets
Michael Tremer [Tue, 10 Sep 2024 21:45:53 +0000 (23:45 +0200)] 
suricata: Collect metrics on scanned and bypassed packets

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Force Suricata to write a PID file again
Michael Tremer [Tue, 10 Sep 2024 21:23:38 +0000 (23:23 +0200)] 
suricata: Force Suricata to write a PID file again

The PID file does not get written when Suricata is not being started in
daemon mode and therefore we need to pass it as a command line
parameter.

The initscript should not deal with the PID file when starting but needs
it to terminate the process and to check the process status.

The web UI can use the PID file again.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Fix syntax error in watcher script
Michael Tremer [Tue, 10 Sep 2024 21:23:18 +0000 (23:23 +0200)] 
suricata: Fix syntax error in watcher script

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Remove debugging code
Michael Tremer [Tue, 10 Sep 2024 21:17:20 +0000 (23:17 +0200)] 
suricata: Remove debugging code

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agofirewall: Move the IPS after the NAT marking
Michael Tremer [Tue, 10 Sep 2024 09:37:38 +0000 (11:37 +0200)] 
firewall: Move the IPS after the NAT marking

This is because we might still land in the scenario where Suricata
crashes and NFQUEUE will simply ACCEPT all packets which will terminate
the processing of the mangle table.

Therefore the NFQUEUE rule should be the last one so that we never skip
any of the other processing.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoids.cgi: Fix detection for the Suricata process
Michael Tremer [Tue, 10 Sep 2024 09:35:18 +0000 (11:35 +0200)] 
ids.cgi: Fix detection for the Suricata process

We don't seem to have a PID file any more.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoids.cgi: Remove box from the top section
Michael Tremer [Tue, 10 Sep 2024 09:24:01 +0000 (11:24 +0200)] 
ids.cgi: Remove box from the top section

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoids.cgi: Sort whitelist entries
Michael Tremer [Tue, 10 Sep 2024 09:22:59 +0000 (11:22 +0200)] 
ids.cgi: Sort whitelist entries

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoids.cgi: Use new-style table for whitelist entries
Michael Tremer [Tue, 10 Sep 2024 09:17:33 +0000 (11:17 +0200)] 
ids.cgi: Use new-style table for whitelist entries

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoids.cgi: Use new style tables for rulesets
Michael Tremer [Tue, 10 Sep 2024 09:09:58 +0000 (11:09 +0200)] 
ids.cgi: Use new style tables for rulesets

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Fix broken spacing in the settings section
Michael Tremer [Tue, 10 Sep 2024 09:01:52 +0000 (11:01 +0200)] 
suricata: Fix broken spacing in the settings section

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Add option to scan WireGuard
Michael Tremer [Tue, 10 Sep 2024 08:50:15 +0000 (10:50 +0200)] 
suricata: Add option to scan WireGuard

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Don't load /var/ipfire/ethernet/settings
Michael Tremer [Tue, 10 Sep 2024 08:42:11 +0000 (10:42 +0200)] 
suricata: Don't load /var/ipfire/ethernet/settings

We no longer need this directly as it is being pulled in from the
network functions.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Remove superfluous bits from the initscript
Michael Tremer [Tue, 10 Sep 2024 08:41:19 +0000 (10:41 +0200)] 
suricata: Remove superfluous bits from the initscript

I don't know why these hacks are here.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Restore the interface selection
Michael Tremer [Tue, 10 Sep 2024 08:40:28 +0000 (10:40 +0200)] 
suricata: Restore the interface selection

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Start the new watcher in the background
Michael Tremer [Mon, 9 Sep 2024 21:08:11 +0000 (23:08 +0200)] 
suricata: Start the new watcher in the background

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Add a watcher to restart on unexpected termination
Michael Tremer [Mon, 9 Sep 2024 18:09:22 +0000 (20:09 +0200)] 
suricata: Add a watcher to restart on unexpected termination

This patch adds a watcher process that will restart suricata when it is
being killed by SIGKILL (e.g. by the OOM killer) or after a SEGV.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Be more efficient with marks
Michael Tremer [Mon, 9 Sep 2024 17:38:47 +0000 (19:38 +0200)] 
suricata: Be more efficient with marks

This patch changes that we introduce a new mark which allows us to
identify any newly bypassed connections and permanently store the bypass
flag.

We also only restore marks from the connection tracking when a packet
has no marks, yet.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Replace removed CPU count function
Michael Tremer [Mon, 9 Sep 2024 17:37:56 +0000 (19:37 +0200)] 
suricata: Replace removed CPU count function

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Add whitelist to iptables
Michael Tremer [Mon, 9 Sep 2024 10:46:23 +0000 (12:46 +0200)] 
suricata: Add whitelist to iptables

This allows us to workaround better against any problems in Suricata
because we never send any whitelisted packets to the IPS in the first
place.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Remove some unused constants
Michael Tremer [Mon, 9 Sep 2024 09:58:50 +0000 (11:58 +0200)] 
suricata: Remove some unused constants

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Use getconf to determine the number of processors
Michael Tremer [Mon, 9 Sep 2024 09:55:34 +0000 (11:55 +0200)] 
suricata: Use getconf to determine the number of processors

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoinitscripts: Fix bash function definitions in suricata
Michael Tremer [Mon, 9 Sep 2024 09:54:04 +0000 (11:54 +0200)] 
initscripts: Fix bash function definitions in suricata

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agosuricata: Move the IPS into the mangle table
Michael Tremer [Mon, 9 Sep 2024 09:49:30 +0000 (11:49 +0200)] 
suricata: Move the IPS into the mangle table

This should make the IPS more efficient, we should have fewer rules and
the IPS will now sit at the edge of the networking stack as it will see
packets immediately when they come and and just before they leave.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocore189: Ship cURL
Michael Tremer [Mon, 23 Sep 2024 21:22:22 +0000 (21:22 +0000)] 
core189: Ship cURL

This fixes a leaked SIGPIPE that makes transmission crash.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocurl: Update to version 8.10.0
Adolf Belka [Fri, 13 Sep 2024 16:25:16 +0000 (18:25 +0200)] 
curl: Update to version 8.10.0

- Update from vesion 8.9.1 to 8.10.0
- Update of rootfile
- In previous versions if libpsl was not found then the build excluded it. Now it needs
   to be explicitly disabled otherwise the build will stop with a warning that it could
   not be found.
- Changelog
    8.10.0
      changes:
 o autotools: add `--enable-windows-unicode` option [103]
 o curl: --help [option] displays documentation for given cmdline option [19]
 o curl: add --skip-existing [54]
 o curl: for -O, use "default" as filename when the URL has none [34]
 o curl: make --rate accept "number of units" [4]
 o curl: make --show-headers the same as --include [6]
 o curl: support --dump-header % to direct to stderr [31]
 o curl: support embedding a CA bundle and --dump-ca-embed [20]
 o curl: support repeated use of the verbose option; -vv etc [35]
 o curl: use libuv for parallel transfers with --test-event [82]
 o getinfo: add CURLINFO_POSTTRANSFER_TIME_T [87]
 o mbedtls: add CURLOPT_TLS13_CIPHERS support [78]
 o rustls: add support for setting TLS version and ciphers [113]
 o vtls: stop offering alpn http/1.1 for http2-prior-knowledge [53]
 o wolfssl: add CURLOPT_TLS13_CIPHERS support [76]
 o wolfssl: add support for ssl cert blob / ssl key blob options [50]
      bugfixes:
 o asyn-thread: stop using GetAddrInfoExW on Windows [241]
 o autotools: fix MS-DOS builds [249]
 o autotools: fix typo in tests/data target [30]
 o aws_sigv4: fix canon order for headers with same prefix [74]
 o bearssl: fix setting tls version [203]
 o bearssl: improve shutdown handling [45]
 o BINDINGS: add zig binding [100]
 o build: add `iphlpapi` lib for libssh on Windows [166]
 o build: add `poll()` detection for cross-builds [244]
 o build: add options to disable SHA-512/256 hash algo [239]
 o build: check OS-native IDN first, then libidn2 [223]
 o build: delete unused `REQUIRE_LIB_DEPS` [226]
 o build: drop unused `NROFF` reference [253]
 o build: drop unused feature-detection code for Apple `poll()` [227]
 o build: generate `buildinfo.txt` for test logs [256]
 o build: improve compiler version detection portability
 o build: make `CURL_FORMAT_CURL_OFF_T[U]` work with mingw-w64 <=7.0.0 [207]
 o build: silence C4232 MSVC warnings in vcpkg ngtcp2 builds [137]
 o build: use -Wno-format-overflow [195]
 o buildconf.bat: fix tool_hugehelp.c generation [173]
 o cf-socket: fix pollset for listening [179]
 o cf-socket: prevent KEEPALIVE_FACTOR being set to 1000 for Windows [185]
 o cfilters: send flush [13]
 o CHANGES: rename to CHANGES.md, no longer generated [40]
 o CI: enable parallel testing in CI builds [18]
 o ci: Update actions/upload-artifact digest to 89ef406 [24]
 o cmake: `Libs.private` improvements [215]
 o cmake: add `CURL_USE_PKGCONFIG` option [138]
 o cmake: add Linux CI job, fix pytest with cmake [71]
 o cmake: add math library when using wolfssl and ngtcp2 [66]
 o cmake: add missing `pkg-config` hints to Find modules [158]
 o cmake: add missing version detection to Find modules [170]
 o cmake: add rustls [116]
 o cmake: add support for versioned symbols option [51]
 o cmake: add wolfSSH support [117]
 o cmake: allow `pkg-config` in more envs [147]
 o cmake: cleanup header paths [59]
 o cmake: default `CURL_DISABLE_LDAPS` to the value of `CURL_DISABLE_LDAP` [231]
 o cmake: delete MSVC warning suppression for tests/server [101]
 o cmake: detect `nghttp2` via `pkg-config`, enable by default [21]
 o cmake: detect and show VCPKG in platform flags [84]
 o cmake: distcheck for files in CMake subdir [9]
 o cmake: drop custom `CMakeOutput.log`/`CMakeError.log` logs [27]
 o cmake: drop libssh CONFIG-style detection [167]
 o cmake: drop no-op `tests/data/CMakeLists.txt` [26]
 o cmake: drop reference to undefined variable [25]
 o cmake: drop unused `HAVE_IDNA_STRERROR` [62]
 o cmake: drop unused internal variable [22]
 o cmake: exclude tests/http/clients builds by default [110]
 o cmake: fix `GSS_VERSION` for Heimdal found via pkg-config [77]
 o cmake: fix `pkg-config`-based detection in `FindGSS.cmake` [94]
 o cmake: fix and tidy up c-ares builds, enable in more CI jobs [156]
 o cmake: fix find rustls [148]
 o cmake: fixup linking libgsasl when detected via CMake-native
 o cmake: honor custom `CMAKE_UNITY_BUILD_BATCH_SIZE` [163]
 o cmake: limit `pkg-config` to UNIX and MSVC+vcpkg by default [188]
 o cmake: limit libidn2 `pkg-config` detection to `UNIX` [109]
 o cmake: migrate dependency detections to Find modules [183]
 o cmake: more small tidy-ups and fixes [80]
 o cmake: rename wolfSSL and zstd config variables to uppercase [151]
 o cmake: respect cflags/libdirs of native pkg-config detections [175]
 o cmake: show CMake platform/compiler flags [63]
 o cmake: show warning if libpsl is not found [154]
 o cmake: sync code between test/example targets [234]
 o cmake: sync up formatting in Find modules [129]
 o cmake: TLS 1.3 warning only for bearssl and sectranp [118]
 o cmake: update `curl-config.cmake.in` template var list
 o cmake: update list of "advanced" variables [119]
 o cmake: use numeric comparison for `HAVE_WIN32_WINNT` [69]
 o cmdline-opts: language fix for expect100-timeout.md and max-time.md [192]
 o configure: delete unused `CURL_DEFINE_UNQUOTED` function [224]
 o configure: delete unused `HAVE_OPENSSL3` macro [225]
 o configure: delete unused `m4/xc-translit.m4` [114]
 o configure: detect AppleIDN [70]
 o configure: fail if PSL is not disabled but not found [46]
 o configure: fix WinIDN builds targeting old Windows [210]
 o configure: remove USE_EXPLICIT_LIB_DEPS [199]
 o configure: replace nonportable grep -o with awk [111]
 o connect: always prefer ipv6 in IP eyeballing [209]
 o connect: limit update IP info [191]
 o cookie.md: try to articulate the two different uses this option has [92]
 o curl: allow 500MB data URL encode strings [38]
 o curl: find curlrc in XDG_CONFIG_HOME without leading dot [186]
 o curl: fix --proxy-pinnedpubkey [91]
 o curl: fix the -w urle.* variables [153]
 o curl: make the progress bar detect terminal width changes [169]
 o curl: warn on unsupported SSL options [106]
 o Curl_rand_bytes to control env override [17]
 o curl_sha512_256: fix symbol collisions with nettle library [131]
 o CURLMOPT_SOCKETFUNCTION.md: expand on the easy argument [216]
 o CURLOPT_XFERINFOFUNCTION: clarify the callback return codes [141]
 o dist: add missing `docs/examples/CMakeLists.txt` [58]
 o dist: add missing `FindNettle.cmake` [11]
 o dist: add missing `lib/optiontable.pl` [115]
 o dist: add missing `test_*.py` scripts [102]
 o dist: drop buildconf [65]
 o dist: fix reproducible build from release tarball [36]
 o dmaketgz: only run 'make distclean' if Makefile exists
 o docs/SSLCERTS: rewrite [174]
 o docs: add description of effect of --location-trusted on cookie [157]
 o docs: document the (weak) random value situation in rustls builds [252]
 o docs: fix some examples in man pages
 o docs: improve cipher options documentation [159]
 o docs: mention "@-" in more places [67]
 o docs: remove ALTSVC.md, HSTS.md, HTTP2.md and PARALLEL-TRANSFERS.md [105]
 o docs: update CIPHERS.md [140]
 o doh-url.md: point out DOH server IP pinning [37]
 o doh: remove redundant checks [242]
 o easy: fix curl_easy_upkeep for shared connection caches [52]
 o escape: allow curl_easy_escape to generate 3*input length output [39]
 o FEATURES.md: fix typo [180]
 o ftp: always offer line end conversions [219]
 o ftp: flush pingpong before response [73]
 o getinfo: return zero for unsupported options (when disabled) [189]
 o GHA/windows: enable MulitSSL in an MSVC job [2]
 o GHA: scan git repository and detect unvetted binary files [3]
 o gnutls/wolfssl: improve error message when certificate fails [125]
 o gnutls: send all data [230]
 o gtls: fix OCSP stapling management [206]
 o haproxy: send though next filter [222]
 o hash: provide asserts to verify API use [96]
 o http/2: simplify eos/blocked handling [90]
 o http2+h3 filters: fix ctx init [142]
 o http2: fix GOAWAY message sent to server [171]
 o http2: improve rate limiting of downloads [33]
 o http2: improved upload eos handling [41]
 o http3.md: mention how the fallback can be h1 or h2 [194]
 o hyper: call Curl_req_set_upload_done() [126]
 o idn: more strictly check AppleIDN errors [98]
 o idn: support non-UTF-8 input under AppleIDN [99]
 o INSTALL.md: MultiSSL and QUIC are mutually exclusive [7]
 o KNOWN_BUGS: "special characers" in URL works with aws-sigv4 [81]
 o krb5: add Linux/macOS CI tests, fix cmake GSS detection [83]
 o krb5: fix `-Wcast-align` [95]
 o lib: add eos flag to send methods [14]
 o lib: avoid macro collisions between wolfSSL and GnuTLS headers [133]
 o lib: convert some debugf()s into traces [8]
 o lib: delete stray undefs for `vsnprintf`, `vsprintf` [152]
 o lib: fix AIX build issues [112]
 o lib: fix building with wolfSSL without DES support [134]
 o lib: make SSPI global symbols use Curl_ prefix [251]
 o lib: prefer `CURL_SHA256_DIGEST_LENGTH` over the unprefixed name [132]
 o lib: remove the final strncpy() calls [240]
 o lib: remove use of RANDOM_FILE [235]
 o libcurl.def: move from / into lib [238]
 o libcurl.pc: add `Cflags.private` [10]
 o libcurl.pc: add reference to `libgsasl` [150]
 o libcurl/docs: expand on redirect following and secrets to other hosts [85]
 o llist: remove direct struct accesses, use only functions [72]
 o Makefile.dist: fix `ca-firefox` target [254]
 o Makefile.mk: fixup enabling libidn2 [61]
 o Makefile: remove 'scripts' duplicate from DIST_SUBDIRS
 o maketgz: accept option to include latest commit hash [5]
 o maketgz: fix RELEASE-TOOLS.md for daily tarballs [243]
 o maketgz: move from / into scripts [237]
 o managen: fix superfluous leading blank line in quoted sections [211]
 o managen: in man output, remove the leading space from examples [198]
 o managen: wordwrap long example lines in ASCII output [143]
 o manpage: ensure a maximum width for the text version [75]
 o max-filesize.md: mention zero disables the limit [93]
 o mbedtls: add more informative logging [162]
 o mbedtls: fix setting tls version [200]
 o mbedtls: no longer use MBEDTLS_SSL_VERIFY_OPTIONAL [181]
 o mime: avoid inifite loop in client reader [155]
 o mk-ca-bundle.pl: include a link to the caextract webpage [68]
 o multi: make the "general" list of easy handles a Curl_llist [97]
 o multi: on socket callback error, remove socket hash entry nonetheless [149]
 o ngtcp2/osslq: remove NULL pointer dereferences [213]
 o ngtcp2: use NGHTTP3 prefix instead of NGTCP2 for errors in h3 callbacks [79]
 o openssl quic: fix memory leak [229]
 o openssl: certinfo errors now fail correctly [250]
 o openssl: fix the data race when sharing an SSL session between threads [221]
 o openssl: improve shutdown handling [44]
 o pingpong: drain the input buffer when reading responses [193]
 o POP3: fix multi-line responses [168]
 o pop3: use the protocol handler ->write_resp [220]
 o printf: fix mingw-w64 format checks [228]
 o progress: ratelimit/progress tweaks [32]
 o pytests: add tests for HEAD requests in all HTTP versions [42]
 o rand: only provide weak random when needed [233]
 o runtests: if DISABLED cannot be read, error out [56]
 o runtests: log ignored but passed tests [130]
 o runtests: remove "has_textaware" [217]
 o rustls: fix setting tls version [202]
 o rustls: make all tests pass [1]
 o schannel: avoid malloc for CAinfo_blob_digest [247]
 o scorecard: tweak request measurements [139]
 o sectransp: fix setting tls version [204]
 o SECURITY: mention OpenSSF best practices gold badge [161]
 o setopt: allow CURLOPT_INTERFACE to be set to NULL [165]
 o setopt: let CURLOPT_ECH set to NULL reset to default [187]
 o setopt: make CURLOPT_TFTP_BLKSIZE accept bad values [184]
 o sha256: fix symbol collision between nettle (GnuTLS) and OpenSSL [135]
 o share: don't reinitialize conncache [214]
 o sigpipe: init the struct so that first apply ignores [49]
 o smb: convert superflous assign into assert [246]
 o smtp: add tracing feature [120]
 o splay: use access functions, add asserts, use Curl_timediff [121]
 o spnego_gssapi: implement TLS channel bindings for openssl [146]
 o src: delete `curlx_m*printf()` aliases [197]
 o src: fix potential macro confusion in cmake unity builds [208]
 o src: namespace symbols clashing with lib [248]
 o src: replace copy of printf mappings with an include [190]
 o ssh: deduplicate SSH backend includes (and fix libssh cmake unity build) [177]
 o system_win32: fix typo
 o test httpd: tweak cipher list [124]
 o test1521: verify setting options to NULL better [182]
 o test1707: output diff more for debugging differences in CI outputs
 o test556: improve robustness [64]
 o test579: improve robustness [60]
 o test587: improve robustness [123]
 o test649: improve robustness [122]
 o test677: improve robustness [47]
 o tests/runner: only allow [!A-Za-z0-9_-] in %if feature names [55]
 o tests: constrain http pytest to tests/http directory [205]
 o tests: don't mangle output if hostname or type unknown
 o tests: ignore QUIT from FTP protocol comparisons [108]
 o tests: provide docs as curldown, not nroff [12]
 o tidy-up: misc build, tests, `lib/macos.c` [172]
 o tidy-up: OS names [57]
 o tool_operhlp: fix  "potentially uninitialized local variable 'pc' used" [48]
 o tool_paramhlp: bump maximum post data size in memory to 16GB [128]
 o transfer: Curl_sendrecv() and event related improvements [164]
 o transfer: remove comments, add asserts [218]
 o transfer: skip EOS read when download done [196]
 o url: dns_entry related improvements [16]
 o url: fix connection reuse for HTTP/2 upgrades [236]
 o urlapi: verify URL *decoded* hostname when set [160]
 o urldata: introduce `data->mid`, a unique identifier inside a multi [127]
 o urldata: remove 'scratch' from the UrlState struct [86]
 o urldata: remove crlf_conversions counter [232]
 o urldata: remove proxy_connect_closed bit [178]
 o verify-release: shell script that verifies a release tarball [29]
 o version: fix shadowing a `libssh.h` symbol [176]
 o vtls: add SSLSUPP_CIPHER_LIST [107]
 o vtls: fix MSVC 'cast truncates constant value' warning [23]
 o vtls: fix static function name collisions between TLS backends [136]
 o vtls: init ssl peer only once [15]
 o websocket: introduce blocking sends [145]
 o wolfssl: avoid taking cached x509 store ref if sslctx already using it [88]
 o wolfssl: fix CURLOPT_SSLVERSION [144]
 o wolfssl: fix setting tls version [201]
 o wolfssl: improve shutdown handling [43]
 o ws: flags to opcodes should ignore CURLWS_CONT flag [104]
 o x509asn1: raise size limit for x509 certification information [28]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoweb: Fix reloading graphs
Michael Tremer [Mon, 23 Sep 2024 19:44:42 +0000 (19:44 +0000)] 
web: Fix reloading graphs

Suggested-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agomake.sh: Flag rootfiles that have lines starting with + or -
Michael Tremer [Mon, 23 Sep 2024 19:35:24 +0000 (19:35 +0000)] 
make.sh: Flag rootfiles that have lines starting with + or -

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocore189: Ship libfdt (from dtc)
Michael Tremer [Mon, 23 Sep 2024 17:43:10 +0000 (17:43 +0000)] 
core189: Ship libfdt (from dtc)

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocore189: Ship ntp because of OpenSSL mismatch warning
Michael Tremer [Mon, 23 Sep 2024 14:39:04 +0000 (14:39 +0000)] 
core189: Ship ntp because of OpenSSL mismatch warning

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocore189: Fix IPS rule files again for c188
Michael Tremer [Fri, 20 Sep 2024 12:54:37 +0000 (12:54 +0000)] 
core189: Fix IPS rule files again for c188

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoMerge branch 'core188'
Michael Tremer [Fri, 20 Sep 2024 12:53:51 +0000 (12:53 +0000)] 
Merge branch 'core188'

8 months agocore188: Keep enabled providers core188
Michael Tremer [Fri, 20 Sep 2024 12:53:16 +0000 (12:53 +0000)] 
core188: Keep enabled providers

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocore188: Ship forgotten ids-functions.pl
Michael Tremer [Fri, 20 Sep 2024 12:51:52 +0000 (12:51 +0000)] 
core188: Ship forgotten ids-functions.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoMerge branch 'core188'
Michael Tremer [Fri, 20 Sep 2024 12:26:22 +0000 (12:26 +0000)] 
Merge branch 'core188'

8 months agocore188: Ship u-boot for aarch64
Michael Tremer [Fri, 20 Sep 2024 12:25:21 +0000 (12:25 +0000)] 
core188: Ship u-boot for aarch64

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agou-boot: fix KVER syntax
Arne Fitzenreiter [Fri, 20 Sep 2024 12:22:01 +0000 (14:22 +0200)] 
u-boot: fix KVER syntax

with some kernel build changes KVER also contains the -ipfire string
so this has to be removed in u-boot.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocore189: Regenerate Suricata rulefiles again
Michael Tremer [Fri, 20 Sep 2024 10:21:19 +0000 (10:21 +0000)] 
core189: Regenerate Suricata rulefiles again

This is needed for people who have missed this in Core Update 188.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agocore188: Regenerate Suricata rulefiles
Michael Tremer [Fri, 20 Sep 2024 10:19:57 +0000 (10:19 +0000)] 
core188: Regenerate Suricata rulefiles

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoMerge branch 'core188'
Michael Tremer [Wed, 18 Sep 2024 10:06:54 +0000 (10:06 +0000)] 
Merge branch 'core188'

8 months agoncat: Fix rootfile and bump release
Michael Tremer [Wed, 18 Sep 2024 10:06:24 +0000 (10:06 +0000)] 
ncat: Fix rootfile and bump release

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
8 months agoMerge branch 'next'
Michael Tremer [Mon, 16 Sep 2024 14:49:58 +0000 (14:49 +0000)] 
Merge branch 'next'

8 months agomake.sh: Run "update-contributors"
Michael Tremer [Mon, 16 Sep 2024 14:48:50 +0000 (14:48 +0000)] 
make.sh: Run "update-contributors"

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Use devtmpfs to initialize /dev
Michael Tremer [Thu, 12 Sep 2024 09:17:05 +0000 (09:17 +0000)] 
make.sh: Use devtmpfs to initialize /dev

If we set up our /dev manually, we fail to deal with dynmically allocated loop
devices which are more common on modern distributions.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoRevert "make.sh: Bind-mount all loop devices"
Michael Tremer [Thu, 12 Sep 2024 09:07:02 +0000 (09:07 +0000)] 
Revert "make.sh: Bind-mount all loop devices"

This reverts commit 7ad12edfb0d233498410f2afc09753e70de50f80.

This patch does not fix the original problem and still leaves the build
environment without usable loop devices.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore189: Ship intel microcode and regenerate initramdisks
Michael Tremer [Thu, 12 Sep 2024 09:06:36 +0000 (09:06 +0000)] 
core189: Ship intel microcode and regenerate initramdisks

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agointel-microcode: Update to version 20240910
Adolf Belka [Wed, 11 Sep 2024 15:04:23 +0000 (17:04 +0200)] 
intel-microcode: Update to version 20240910

- Update from version 20240813 to 20240910
- Update of rootfile not required
- Changelog
    20240910
Security updates for INTEL-SA-01103
Security updates for INTEL-SA-01097
Update for functional issues. Refer to Intel® Core™ Ultra Processor for details.
Update for functional issues. Refer to 13th Generation Intel® Core™ Processor
 Specification Update for details.
Update for functional issues. Refer to 12th Generation Intel® Core™ Processor
 Family for details.
Update for functional issues. Refer to Intel® Processors and Intel® Core™ i3
 N-Series for details.
For information on New Platforms and Updated Platforms see
 https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore189: Ship header.pl
Michael Tremer [Wed, 11 Sep 2024 09:45:58 +0000 (09:45 +0000)] 
core189: Ship header.pl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoheader.pl: only get memory consumption when service is running
Robin Roevens [Tue, 10 Sep 2024 21:32:32 +0000 (23:32 +0200)] 
header.pl: only get memory consumption when service is running

It probably doesn't matter much as the get_memory_consumption function just returns 0 when no pids are found. But it shouldn't even try as the mem var is never used when the service is not running.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agozabbix_agentd: Add IPFire services.get item
Robin Roevens [Tue, 10 Sep 2024 21:12:31 +0000 (23:12 +0200)] 
zabbix_agentd: Add IPFire services.get item

- Adds Zabbix Agent userparameter `ipfire.services.get` for the agent to get details about configured IPFire services (builtin and addon-services)
- Includes `ipfire_services.pl` script in sudoers for Zabbix Agent as it needs root permission to call addonctrl for addon service states.
- Adapts lfs install script to install new script
- Adds new script to rootfiles

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agozabbix_agentd: Update to 6.0.33 (LTS)
Robin Roevens [Tue, 10 Sep 2024 18:25:59 +0000 (20:25 +0200)] 
zabbix_agentd: Update to 6.0.33 (LTS)

- Update from version 6.0.30 to 6.0.33
- Update of rootfile not required

Bugs fixed:
- ZBX-20766: Fixed confusing port binding error message
- ZBX-24391: Fixed Zabbix agent to return net.tcp.socket.count result without error if IPv6 is disabled

Full changelogs since 6.0.30:
- https://www.zabbix.com/rn/rn6.0.31
- https://www.zabbix.com/rn/rn6.0.32
- https://www.zabbix.com/rn/rn6.0.33

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Bind-mount all loop devices
Michael Tremer [Wed, 11 Sep 2024 09:31:43 +0000 (09:31 +0000)] 
make.sh: Bind-mount all loop devices

There seems to be a different way how to create loop devices. On my
Debian system, the first loop device is a block device with major=7 and
minor=0, the second device is major=7 and minor=1, and so on.

On a system running Grml, the second loop device has major=7 and
minor=32, and all following ones are increasing their minor by 32
as well instead of one.

Since I don't have an easy way to detect this, we will simply bind-mount
all available loop devices in to the build environment.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Copy the proxy configuration whenever we enable networking
Michael Tremer [Tue, 10 Sep 2024 16:30:31 +0000 (16:30 +0000)] 
make.sh: Copy the proxy configuration whenever we enable networking

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore189: Ship OpenVPN
Michael Tremer [Mon, 9 Sep 2024 15:42:59 +0000 (15:42 +0000)] 
core189: Ship OpenVPN

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoopenvpn: Update to version 2.5.10
Adolf Belka [Sat, 7 Sep 2024 17:29:27 +0000 (19:29 +0200)] 
openvpn: Update to version 2.5.10

- Update from version 2.5.9 to 2.5.10
- Update of rootfile not required
- 3 CVE Fixes in this version but all are for Windows installations.
- Changelog
    2.5.10
Security fixes
- CVE-2024-27459: Windows: fix a possible stack overflow in the
  interactive service component which might lead to a local privilege
  escalation.
Reported-by: Vladimir Tokarev <vtokarev@microsoft.com>
- CVE-2024-24974: Windows: disallow access to the interactive service
  pipe from remote computers.
Reported-by: Vladimir Tokarev <vtokarev@microsoft.com>
- CVE-2024-27903: Windows: disallow loading of plugins from untrusted
  installation paths, which could be used to attack openvpn.exe via
  a malicious plugin.  Plugins can now only be loaded from the OpenVPN
  install directory, the Windows system directory, and possibly from
  a directory specified by HKLM\SOFTWARE\OpenVPN\plugin_dir.
Reported-by: Vladimir Tokarev <vtokarev@microsoft.com>
User visible changes
- License amendment: all NEW commits fall under a modified license that
  explicitly permits linking with Apache2 libraries (mbedTLS, OpenSSL) -
  see COPYING for details.  Existing code in the release/2.5 branch
  will not been relicensed (only in release/2.6 and later branches).

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore189: Ship sudo
Michael Tremer [Fri, 6 Sep 2024 10:42:27 +0000 (10:42 +0000)] 
core189: Ship sudo

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agosudo: Update to version 1.9.16
Adolf Belka [Thu, 5 Sep 2024 13:28:50 +0000 (15:28 +0200)] 
sudo: Update to version 1.9.16

- Update from version 1.9.15p5 to 1.9.16
- Update of rootfile
- Changelog
    1.9.16
 * Added the "cmddenial_message" sudoers option to provide additional
   information to the user when a command is denied by the sudoers
   policy.  The default message is still displayed.
 * The time stamp used for file-based logs is now more consistent
   with the time stamp produced by syslog.  GitHub issues #327.
 * Sudo will now warn the user if it can detect the user's terminal
   but cannot determine the path to the terminal device.  The sudoers
   time stamp file will now use the terminal device number directly.
   GitHub issue #329.
 * The embedded copy of zlib has been updated to version 1.3.1.
 * Improved error handling if generating the list of signals and signal
   names fails at build time.
 * Fixed a compilation issue on Linux systems without process_vm_readv().
 * Fixed cross-compilation with WolfSSL.
 * Added a "json_compact" value for the sudoers "log_format" option
   which can be used when logging to a file.  The existing "json"
   value has been aliased to "json_pretty".  In a future release,
   "json" will be an alias for "json_compact".  GitHub issue #357.
 * A new "pam_silent" sudoers option has been added which may be
   negated to avoid suppressing output from PAM authentication modules.
   GitHub issue #216.
 * Fixed several cvtsudoers JSON output problems.
   GitHub issues #369, #370, #371, #373, #381.
 * When sudo runs a command in a pseudo-terminal and the user's
   terminal is revoked, the pseudo-terminal's foreground process
   group will now receive SIGHUP before the terminal is revoked.
   This emulates the behavior of the session leader exiting and is
   consistent with what happens when, for example, an ssh session
   is closed.  GitHub issue #367.
 * Fixed "make test" with Python 3.12.  GitHub issue #374.
 * In schema.ActiveDirectory, fixed the quoting in the example command.
   GitHub issue #376.
 * Paths specified via a Chdir_Spec or Chroot_Spec in sudoers may
   now be double-quoted.
 * Sudo insults are now included by default, but disabled unless
   the --with-insults configure option is specified or the "insults"
   sudoers option is enabled.
 * The default sudoers file now enables the "secure_path" option by
   default and preserves the EDITOR, VISUAL, and SUDO_EDITOR environment
   variables when running visudo.  The new --with-secure-path-value
   configure option can be used to set the value of "secure_path" in
   the default sudoers file.  GitHub issue #387.
 * A sudoers schema for IBM Directory Server (aka IBM Tivoli Directory
   Server, IBM Security Directory Server, and IBM Security Verify
   Directory) is now included.
 * When cross-compiling sudo, the configure script now assumes that
   the snprintf() function is C99-compliant if the C compiler
   supports the C99 standard.  Previously, configure would use
   sudo's own snprintf() when cross-compiling.  GitHub issue #386.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agogrub: Fix build on riscv64
Michael Tremer [Fri, 6 Sep 2024 10:41:23 +0000 (10:41 +0000)] 
grub: Fix build on riscv64

  https://savannah.gnu.org/bugs/?65909

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Silence an error when we have low space in a fresh environment
Michael Tremer [Thu, 5 Sep 2024 09:50:59 +0000 (09:50 +0000)] 
make.sh: Silence an error when we have low space in a fresh environment

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore189: Ship dhcpcd
Michael Tremer [Thu, 5 Sep 2024 09:31:40 +0000 (09:31 +0000)] 
core189: Ship dhcpcd

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agodhcpcd: Update to version 10.0.10
Adolf Belka [Thu, 5 Sep 2024 08:44:49 +0000 (10:44 +0200)] 
dhcpcd: Update to version 10.0.10

- Update from version 10.0.8 to 10.0.10
- Update of rootfile not required
- Patch for free selection of MTU has been removed as in version 10.0.9 the MTU code
   was changed to not apply limits to it.
- Changelog
    10.0.10
Reversion of commit "linux: make if_getnetworknamespace static"
    10.0.9
Option 2: Fix stdin parsing by @holmanb in #289
IPv4LL: Restart ARP probling on address conflict by @LeoRuan in #340
DHCP: Handle option 108 correctly when receiving 0.0.0.0 OFFER by @taoyl-g
 in #342
DHCP: No longer set interface mtu by @rsmarples in #346
Update privsep-linux.c to allow statx by @Jabrwock in #349

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoclamav: Update to version 1.3.2
Adolf Belka [Thu, 5 Sep 2024 08:31:53 +0000 (10:31 +0200)] 
clamav: Update to version 1.3.2

- Update from version 1.3.1 to 1.3.2
- Update of rootfile
- 2 CVE Fixes
- Changelog
    1.3.2
- [CVE-2024-20506](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20506):
  Changed the logging module to disable following symlinks on Linux and Unix
  systems so as to prevent an attacker with existing access to the 'clamd' or
  'freshclam' services from using a symlink to corrupt system files.
  This issue affects all currently supported versions. It will be fixed in:
  - 1.4.1
  - 1.3.2
  - 1.0.7
  - 0.103.12
  Thank you to Detlef for identifying this issue.
- [CVE-2024-20505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20505):
  Fixed a possible out-of-bounds read bug in the PDF file parser that could
  cause a denial-of-service (DoS) condition.
  This issue affects all currently supported versions. It will be fixed in:
  - 1.4.1
  - 1.3.2
  - 1.0.7
  - 0.103.12
  Thank you to OSS-Fuzz for identifying this issue.
- Removed unused Python modules from freshclam tests including deprecated
  'cgi' module that is expected to cause test failures in Python 3.13.
- Fix unit test caused by expiring signing certificate.
  - Backport of [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1305)
- Fixed a build issue on Windows with newer versions of Rust.
  Also upgraded GitHub Actions imports to fix CI failures.
  Fixes courtesy of liushuyu.
  - Backport of [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1307)
- Fixed an unaligned pointer dereference issue on select architectures.
  Fix courtesy of Sebastian Andrzej Siewior.
  - Backport of [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1293)
- Fixes to Jenkins CI pipeline.
  For details, see [GitHub pull request](https://github.com/Cisco-Talos/clamav/pull/1330)

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agocore189: Ship expat
Michael Tremer [Thu, 5 Sep 2024 08:56:52 +0000 (08:56 +0000)] 
core189: Ship expat

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoexpat: Update to version 2.6.3
Adolf Belka [Wed, 4 Sep 2024 21:49:24 +0000 (23:49 +0200)] 
expat: Update to version 2.6.3

- Update from version 2.6.2 to 2.6.3
- Update of rootfile
- 3 CVE Fixes in this release.
- Changelog
    2.6.3
Security fixes:
       #887 #890  CVE-2024-45490 -- Calling function XML_ParseBuffer with
                    len < 0 without noticing and then calling XML_GetBuffer
                    will have XML_ParseBuffer fail to recognize the problem
                    and XML_GetBuffer corrupt memory.
                    With the fix, XML_ParseBuffer now complains with error
                    XML_ERROR_INVALID_ARGUMENT just like sibling XML_Parse
                    has been doing since Expat 2.2.1, and now documented.
                    Impact is denial of service to potentially artitrary code
                    execution.
       #888 #891  CVE-2024-45491 -- Internal function dtdCopy can have an
                    integer overflow for nDefaultAtts on 32-bit platforms
                    (where UINT_MAX equals SIZE_MAX).
                    Impact is denial of service to potentially artitrary code
                    execution.
       #889 #892  CVE-2024-45492 -- Internal function nextScaffoldPart can
                    have an integer overflow for m_groupSize on 32-bit
                    platforms (where UINT_MAX equals SIZE_MAX).
                    Impact is denial of service to potentially artitrary code
                    execution.
Other changes:
       #851 #879  Autotools: Sync CMake templates with CMake 3.28
            #853  Autotools: Always provide path to find(1) for portability
            #861  Autotools: Ensure that the m4 directory always exists.
            #870  Autotools: Simplify handling of SIZEOF_VOID_P
            #869  Autotools: Support non-GNU sed
            #856  Autotools|CMake: Fix main() to main(void)
            #865  Autotools|CMake: Fix compile tests for HAVE_SYSCALL_GETRANDOM
            #863  Autotools|CMake: Stop requiring dos2unix
       #854 #855  CMake: Fix check for symbols size_t and off_t
            #864  docs|tests: Convert README to Markdown and update
            #741  Windows: Drop support for Visual Studio <=15.0/2017
            #886  Drop needless XML_DTD guards around is_param access
            #885  Fix typo in a code comment
       #894 #896  Version info bumped from 10:2:9 (libexpat*.so.1.9.2)
                    to 10:3:9 (libexpat*.so.1.9.3); see https://verbump.de/
                    for what these numbers do
Infrastructure:
            #880  Readme: Promote the call for help
            #868  CI: Fix various issues
            #849  CI: Allow triggering GitHub Actions workflows manually
    #851 #872 ..
       #873 #879  CI: Adapt to breaking changes in GitHub Actions

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoqemu-ga: Update to version 9.0.2
Adolf Belka [Wed, 4 Sep 2024 18:51:25 +0000 (20:51 +0200)] 
qemu-ga: Update to version 9.0.2

- Follow the qemu update version

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agodtc: update to version 1.7.1 and move to before qemu build
Adolf Belka [Wed, 4 Sep 2024 18:51:24 +0000 (20:51 +0200)] 
dtc: update to version 1.7.1 and move to before qemu build

- Update from version 1.6.1 to 1.7.1
- Move to before qemu build as it now requires a system libfdt for build as the bundled
   version has been removed.
- Change HOME= to HOME=/usr so that the include files are placed in /usr/include which
   is where qemu is looking for them when it checks that libfdt is available.
- Update disable_Werror patch to take account of differences in the source tarball
- Update of architectures from only aarch64 to all.
- Move rootfile from common/aarch64 to common/
- The previous fdt python files were commented out, hence not used at runtime and are
   not needed at buildtime. From 9.0.1 onwards they require swig and python to be built
   but as they are not needed there was no point to move swig to before dtc
- Changelog
    1.7.1
 * dtc
   * Fix -Oasm output on PA-RISC by avoiding ';' separators
   * Put symbolic label references in -Odts output when possible
   * Add label relative path references
   * Don't incorrectly attempt to create fixups for reference to path
     in overlays
   * Warning rather than hard error if integer expression results are
     truncated due to cell size
 * libfdt
   * Add fdt_get_property_by_offset_w() function
 * pylibfdt
   * Fixed to work with Python 3.10
   * A number of extra methods
   * Fix out of tree build
 * fdtget
   * Add raw bytes output mode
 * General
   * Fixes for mixed-signedness comparison warnings
   * Assorted other warning fixes
   * Assorted updates to checks
   * Assorted bugfixes
   * Fix scripts to work with dash as well as bash
   * Allow static builds
   * Formalize Signed-off-by usage

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoqemu: Update to version 9.0.2
Adolf Belka [Wed, 4 Sep 2024 18:51:23 +0000 (20:51 +0200)] 
qemu: Update to version 9.0.2

- Update from version 9.0.0 to 9.0.2
- Update of rootfile not required
- From version 9.0.1 onwards the bundled dtc has been removed but is required for the
   build. In an associated patch dtc has been moved to before qemu.
- Changelog is only available at x.0 level
    9.0  https://wiki.qemu.org/ChangeLog/9.0

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoqemu-ga: Update to version 9.0.0
Adolf Belka [Tue, 3 Sep 2024 17:55:42 +0000 (19:55 +0200)] 
qemu-ga: Update to version 9.0.0

- Follow the qemu update version

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agoqemu: Update to version 9.0.0
Adolf Belka [Tue, 3 Sep 2024 17:55:41 +0000 (19:55 +0200)] 
qemu: Update to version 9.0.0

- Update from version 8.1.2 to 9.0.0
- Update of rootfile
- Version 9.0.1 and 9.0.2 no longer have the bundled dtc package to provide the libfdt
   library and require a system version but identify the 1.7.1 version of dtc as being
   older than 1.5.1. So currently qemu has only been updated to 9.0.0 until the reason
   for this is identified and can be fixed. It has been raised as an issue on the qemu
   gitlab site.
- Changelog is only available at x.0 level
    9.0  https://wiki.qemu.org/ChangeLog/9.0
    8.2  https://wiki.qemu.org/ChangeLog/8.2

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
9 months agomake.sh: Require at least 8 GiB of space for the build
Michael Tremer [Tue, 3 Sep 2024 18:42:41 +0000 (18:42 +0000)] 
make.sh: Require at least 8 GiB of space for the build

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>