]> git.ipfire.org Git - ipfire-2.x.git/log
ipfire-2.x.git
3 years agolibgcrypt: Update automake
Michael Tremer [Tue, 16 Feb 2021 16:53:41 +0000 (16:53 +0000)] 
libgcrypt: Update automake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agolibassuan: Update automake
Michael Tremer [Tue, 16 Feb 2021 16:53:25 +0000 (16:53 +0000)] 
libassuan: Update automake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agojson-c: Update automake
Michael Tremer [Tue, 16 Feb 2021 16:53:07 +0000 (16:53 +0000)] 
json-c: Update automake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoexpat: Update automake
Michael Tremer [Tue, 16 Feb 2021 16:52:54 +0000 (16:52 +0000)] 
expat: Update automake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agobind: Update automake
Michael Tremer [Tue, 16 Feb 2021 16:52:43 +0000 (16:52 +0000)] 
bind: Update automake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoshadow: Update automake
Michael Tremer [Tue, 9 Feb 2021 17:59:16 +0000 (17:59 +0000)] 
shadow: Update automake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoattr: Update automake
Michael Tremer [Tue, 9 Feb 2021 14:39:31 +0000 (14:39 +0000)] 
attr: Update automake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agogettext: Update automake
Michael Tremer [Tue, 9 Feb 2021 14:39:14 +0000 (14:39 +0000)] 
gettext: Update automake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agolibtool: Update automake
Michael Tremer [Tue, 9 Feb 2021 14:39:00 +0000 (14:39 +0000)] 
libtool: Update automake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agolibmpc: Update automake
Michael Tremer [Tue, 9 Feb 2021 14:38:43 +0000 (14:38 +0000)] 
libmpc: Update automake

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoautoconf: Update automake scripts for riscv64
Michael Tremer [Mon, 8 Feb 2021 19:05:25 +0000 (19:05 +0000)] 
autoconf: Update automake scripts for riscv64

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agogcc: Compile for rv64gc
Michael Tremer [Fri, 5 Feb 2021 14:50:39 +0000 (09:50 -0500)] 
gcc: Compile for rv64gc

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoriscv64: Enable stack clash protection
Michael Tremer [Fri, 5 Feb 2021 14:49:51 +0000 (09:49 -0500)] 
riscv64: Enable stack clash protection

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoriscv64: Move libraries back to /usr/lib64
Michael Tremer [Fri, 5 Feb 2021 14:48:08 +0000 (09:48 -0500)] 
riscv64: Move libraries back to /usr/lib64

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoConfig: riscv64 is a 64 bit architecture
Michael Tremer [Fri, 5 Feb 2021 14:45:04 +0000 (09:45 -0500)] 
Config: riscv64 is a 64 bit architecture

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agopkg-config: Update automake scripts
Michael Tremer [Fri, 5 Feb 2021 11:50:04 +0000 (06:50 -0500)] 
pkg-config: Update automake scripts

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agogawk: Update automake scripts
Michael Tremer [Fri, 5 Feb 2021 11:49:44 +0000 (06:49 -0500)] 
gawk: Update automake scripts

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoflex: Update automake scripts
Michael Tremer [Fri, 5 Feb 2021 11:49:30 +0000 (06:49 -0500)] 
flex: Update automake scripts

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoConfig: Enable UPDATE_AUTOMAKE for riscv64
Michael Tremer [Fri, 5 Feb 2021 11:48:58 +0000 (06:48 -0500)] 
Config: Enable UPDATE_AUTOMAKE for riscv64

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agomake.sh: Add support for building on riscv64
Michael Tremer [Fri, 29 Jan 2021 11:53:38 +0000 (11:53 +0000)] 
make.sh: Add support for building on riscv64

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoRename update accelerator passive mode
Leo-Andres Hofmann [Wed, 3 Mar 2021 19:55:17 +0000 (20:55 +0100)] 
Rename update accelerator passive mode

Fixes #12577

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoTor: update to 0.4.5.6
Peter Müller [Wed, 3 Mar 2021 17:56:19 +0000 (18:56 +0100)] 
Tor: update to 0.4.5.6

Please refer to
https://gitweb.torproject.org/tor.git/plain/ChangeLog?h=tor-0.4.5.6 for
the full changelog of this release.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agopython3: I didn't realise that i586 had a separate rootfile
Michael Tremer [Thu, 4 Mar 2021 10:49:18 +0000 (10:49 +0000)] 
python3: I didn't realise that i586 had a separate rootfile

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agobind: Enable parallel build
Michael Tremer [Wed, 3 Mar 2021 13:56:05 +0000 (13:56 +0000)] 
bind: Enable parallel build

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship dhcp
Michael Tremer [Wed, 3 Mar 2021 16:49:39 +0000 (16:49 +0000)] 
core155: Ship dhcp

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agodhcp: Update to 4.4.2
Matthias Fischer [Wed, 3 Mar 2021 14:01:58 +0000 (15:01 +0100)] 
dhcp: Update to 4.4.2

For details see:
https://downloads.isc.org/isc/dhcp/4.4.2/dhcp-4.4.2-RELNOTES

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship wget
Michael Tremer [Wed, 3 Mar 2021 16:49:00 +0000 (16:49 +0000)] 
core155: Ship wget

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agowget: Update to 1.21.1
Matthias Fischer [Wed, 3 Mar 2021 13:50:35 +0000 (14:50 +0100)] 
wget: Update to 1.21.1

Sorry, no changelog found, only:
https://fossies.org/linux/wget/ChangeLog

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agomc: Update to 4.8.26
Matthias Fischer [Wed, 3 Mar 2021 13:49:17 +0000 (14:49 +0100)] 
mc: Update to 4.8.26

For details see:
http://midnight-commander.org/wiki/NEWS-4.8.26

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agopython3: Update to 3.8.7
Michael Tremer [Wed, 3 Mar 2021 13:41:58 +0000 (13:41 +0000)] 
python3: Update to 3.8.7

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship libffi and all dependencies
Michael Tremer [Wed, 3 Mar 2021 13:40:33 +0000 (13:40 +0000)] 
core155: Ship libffi and all dependencies

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agolibffi: Update to 3.3
Michael Tremer [Tue, 16 Feb 2021 17:03:50 +0000 (17:03 +0000)] 
libffi: Update to 3.3

This contains a version bump which requires us to ship Python 2 and
Python 3 again.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agosuricata: Update to 5.0.6
Matthias Fischer [Wed, 3 Mar 2021 12:56:56 +0000 (13:56 +0100)] 
suricata: Update to 5.0.6

For details see:
https://forum.suricata.io/t/suricata-6-0-2-and-5-0-6-released/1170

and

https://redmine.openinfosecfoundation.org/versions/164

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship libhtp
Michael Tremer [Wed, 3 Mar 2021 13:25:02 +0000 (13:25 +0000)] 
core155: Ship libhtp

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agolibhtp: Update to 0.5.37
Matthias Fischer [Wed, 3 Mar 2021 12:52:43 +0000 (13:52 +0100)] 
libhtp: Update to 0.5.37

For details see:
https://github.com/OISF/libhtp/releases

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agofirewall: Remove ALGs from UI
Michael Tremer [Tue, 2 Mar 2021 18:43:06 +0000 (18:43 +0000)] 
firewall: Remove ALGs from UI

This change drops the UIs that could enable ALGs for various protocols.

Those have been all forcibly disabled because "NAT Slipstream".

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Disable all connection tracking helpers
Michael Tremer [Tue, 2 Mar 2021 18:35:13 +0000 (18:35 +0000)] 
core155: Disable all connection tracking helpers

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoe2fsprogs: Disable libraries provided by util-linux
Michael Tremer [Tue, 2 Mar 2021 17:40:34 +0000 (17:40 +0000)] 
e2fsprogs: Disable libraries provided by util-linux

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agofirewall: Disable all connection tracking helpers by default
Michael Tremer [Tue, 2 Mar 2021 10:04:46 +0000 (10:04 +0000)] 
firewall: Disable all connection tracking helpers by default

This will mitigate exploiting networks secured by IPFire using NAT
Slipstreaming:

https://lists.ipfire.org/pipermail/development/2021-February/009303.html

Suggested-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agosuricata: Ship after updating rust compiler
Michael Tremer [Mon, 1 Mar 2021 21:32:08 +0000 (21:32 +0000)] 
suricata: Ship after updating rust compiler

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155_ Ship boost again
Michael Tremer [Sat, 27 Feb 2021 15:31:07 +0000 (15:31 +0000)] 
core155_ Ship boost again

This is necessary because boost has been removed by filesystem-cleanup.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agofilesystem-cleanup: Ignore boost
Michael Tremer [Sat, 27 Feb 2021 15:27:42 +0000 (15:27 +0000)] 
filesystem-cleanup: Ignore boost

This package does not behave according to standard distribution rules
and our script deletes all libraries

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agorust: Update rootfiles for aarch64 and armv5tel
Michael Tremer [Thu, 25 Feb 2021 17:56:11 +0000 (17:56 +0000)] 
rust: Update rootfiles for aarch64 and armv5tel

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agorust: Remove LLVM tools
Michael Tremer [Thu, 25 Feb 2021 13:55:16 +0000 (13:55 +0000)] 
rust: Remove LLVM tools

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agorust: Update to 1.50
Matthias Fischer [Wed, 24 Feb 2021 12:43:53 +0000 (13:43 +0100)] 
rust: Update to 1.50

For details see:
https://github.com/rust-lang/rust/blob/master/RELEASES.md

Unfortunately I can only build with 32bit and 64bit, this is why I
couldn't upload the rootfiles for 'aarch64' and 'armv5tel'.

Tested here with 'suricata 5.0.5' - running without seen problems.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agofireperf: Update to version 0.2.0
Michael Tremer [Tue, 23 Feb 2021 15:11:57 +0000 (15:11 +0000)] 
fireperf: Update to version 0.2.0

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoRun "./make.sh lang"
Michael Tremer [Mon, 22 Feb 2021 19:01:07 +0000 (19:01 +0000)] 
Run "./make.sh lang"

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship zoneconf
Michael Tremer [Mon, 22 Feb 2021 19:00:45 +0000 (19:00 +0000)] 
core155: Ship zoneconf

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agozoneconf.cgi: Add default value for STP and require input
Leo-Andres Hofmann [Thu, 18 Feb 2021 14:30:16 +0000 (15:30 +0100)] 
zoneconf.cgi: Add default value for STP and require input

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agozoneconf.cgi: Import network-functions.pl
Leo-Andres Hofmann [Thu, 18 Feb 2021 14:30:15 +0000 (15:30 +0100)] 
zoneconf.cgi: Import network-functions.pl

Remove custom functions and use network-functions.pl instead to detect
the available zones correctly. This also removes the requirement that
a device must be assigned for a zone to become visible/configurable.

Fixes: #12568
Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agozoneconf.cgi: Add Javascript for new GUI elements
Leo-Andres Hofmann [Thu, 18 Feb 2021 14:30:14 +0000 (15:30 +0100)] 
zoneconf.cgi: Add Javascript for new GUI elements

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agozoneconf.cgi: Add STP options to GUI
Leo-Andres Hofmann [Thu, 18 Feb 2021 14:30:13 +0000 (15:30 +0100)] 
zoneconf.cgi: Add STP options to GUI

Changes & new features:
- Add CSS for STP options, add texts to language files
- Read STP settings from ethernet configuration and display inputs
- Validate and save STP settings

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agozoneconf.cgi: Modify CSS to allow additional rows
Leo-Andres Hofmann [Thu, 18 Feb 2021 14:30:12 +0000 (15:30 +0100)] 
zoneconf.cgi: Modify CSS to allow additional rows

Simplify borders, load more colors from header and add dividers

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agozoneconf.cgi: Change NIC display order, improve code
Leo-Andres Hofmann [Thu, 18 Feb 2021 14:30:11 +0000 (15:30 +0100)] 
zoneconf.cgi: Change NIC display order, improve code

Refactor duplicate perl code and add comments

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agohaproxy: Use new PCRE2 library
Michael Tremer [Mon, 22 Feb 2021 13:58:28 +0000 (13:58 +0000)] 
haproxy: Use new PCRE2 library

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agolang: Actually check Polish translation
Michael Tremer [Mon, 22 Feb 2021 13:41:31 +0000 (13:41 +0000)] 
lang: Actually check Polish translation

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoAdd Spanish translations for Captive Portal
Roberto Peña [Sun, 21 Feb 2021 11:11:47 +0000 (12:11 +0100)] 
Add Spanish translations for Captive Portal

- Ran ./make lang before adding translations and git status was clear
- Ran ./make lang after adding translations and git status included also
    doc/language_issues.pl although I did not change anything for Polish
    and it was clear before making any changes

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agolibxcrypt 4.4.17: Fix for rootfile
Matthias Fischer [Sat, 20 Feb 2021 10:14:05 +0000 (11:14 +0100)] 
libxcrypt 4.4.17: Fix for rootfile

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship tar
Michael Tremer [Mon, 22 Feb 2021 11:27:40 +0000 (11:27 +0000)] 
core155: Ship tar

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agotar: Update to 1.34
Matthias Fischer [Fri, 19 Feb 2021 23:17:28 +0000 (00:17 +0100)] 
tar: Update to 1.34

For details see:
https://lists.gnu.org/archive/html/info-gnu/2021-02/msg00006.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship libgcrypt
Michael Tremer [Mon, 22 Feb 2021 11:26:50 +0000 (11:26 +0000)] 
core155: Ship libgcrypt

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agolibgcrypt: Update to 1.9.2
Matthias Fischer [Fri, 19 Feb 2021 23:14:12 +0000 (00:14 +0100)] 
libgcrypt: Update to 1.9.2

For details see:
https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000457.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship nettle
Michael Tremer [Mon, 22 Feb 2021 11:26:19 +0000 (11:26 +0000)] 
core155: Ship nettle

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agonettle: Update to 3.7.1
Matthias Fischer [Fri, 19 Feb 2021 23:09:50 +0000 (00:09 +0100)] 
nettle: Update to 3.7.1

For details see:

Annonce for 3.7.1:
http://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009434.html

Announce for 3.6:
http://lists.lysator.liu.se/pipermail/nettle-bugs/2020/008967.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoWIO - Patch PPPOE show right Icon
Stephan Feddersen [Tue, 16 Feb 2021 21:45:07 +0000 (22:45 +0100)] 
WIO - Patch PPPOE show right Icon

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agokrb5: Update to 1.19.1
Matthias Fischer [Fri, 19 Feb 2021 17:51:14 +0000 (18:51 +0100)] 
krb5: Update to 1.19.1

For details see:
https://web.mit.edu/kerberos/krb5-1.19/README-1.19.1.txt

"This is a bug fix release.

* Fix a linking issue with Samba.

* Better support multiple pkinit_identities values by checking whether
  certificates can be loaded for each value.

krb5-1.19.1 changes by ticket ID
--------------------------------

8984    Load certs when checking pkinit_identities values
8985    Restore krb5_set_default_tgs_ktypes()
8987    Synchronize command-line option documentation"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship bind
Michael Tremer [Fri, 19 Feb 2021 19:32:43 +0000 (19:32 +0000)] 
core155: Ship bind

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agobind: Update to 9.11.28
Matthias Fischer [Fri, 19 Feb 2021 17:44:27 +0000 (18:44 +0100)] 
bind: Update to 9.11.28

For details see:
https://downloads.isc.org/isc/bind9/9.11.28/RELEASE-NOTES-bind-9.11.28.html

"Notes for BIND 9.11.28
Security Fixes

When tkey-gssapi-keytab or tkey-gssapi-credential was configured,
a specially crafted GSS-TSIG query could cause a buffer overflow in the
ISC implementation of SPNEGO (a protocol enabling negotiation of the
security mechanism to use for GSSAPI authentication). This flaw could
be exploited to crash named. Theoretically, it also enabled remote code
execution, but achieving the latter is very difficult in real-world
conditions. (CVE-2020-8625)

This vulnerability was responsibly reported to us as ZDI-CAN-12302
by Trend Micro Zero Day Initiative. [GL #2354]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agomonit: Update to 5.27.2
Matthias Fischer [Fri, 12 Feb 2021 13:15:59 +0000 (14:15 +0100)] 
monit: Update to 5.27.2

For details see:
https://mmonit.com/monit/changes/

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agolibjpeg-compat: Drop package
Michael Tremer [Wed, 17 Feb 2021 16:25:14 +0000 (16:25 +0000)] 
libjpeg-compat: Drop package

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoreadline-compat: Drop package
Michael Tremer [Wed, 17 Feb 2021 16:23:17 +0000 (16:23 +0000)] 
readline-compat: Drop package

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoberkeley-compat: Drop package
Michael Tremer [Wed, 17 Feb 2021 16:21:24 +0000 (16:21 +0000)] 
berkeley-compat: Drop package

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agogmp-compat: Drop package
Michael Tremer [Wed, 17 Feb 2021 16:18:30 +0000 (16:18 +0000)] 
gmp-compat: Drop package

This is no longer required because everything should be linked against
the current version.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoDrop /usr/lib/sse2
Michael Tremer [Tue, 16 Feb 2021 18:00:16 +0000 (18:00 +0000)] 
Drop /usr/lib/sse2

This is now unused

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoopenssl: Drop SSE2-optimized version
Michael Tremer [Tue, 16 Feb 2021 17:55:29 +0000 (17:55 +0000)] 
openssl: Drop SSE2-optimized version

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agogmp: Drop SSE2-optimized version on i586
Michael Tremer [Tue, 16 Feb 2021 17:43:12 +0000 (17:43 +0000)] 
gmp: Drop SSE2-optimized version on i586

The next version of glibc has removed support for this and this patch
removes it.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoMerge branch 'master' into next
Michael Tremer [Tue, 16 Feb 2021 17:37:26 +0000 (17:37 +0000)] 
Merge branch 'master' into next

3 years agoMerge remote-tracking branch 'ms/wifi-fixes' core154
Michael Tremer [Tue, 16 Feb 2021 17:36:41 +0000 (17:36 +0000)] 
Merge remote-tracking branch 'ms/wifi-fixes'

3 years agocore154: Ship openssl
Michael Tremer [Tue, 16 Feb 2021 17:36:22 +0000 (17:36 +0000)] 
core154: Ship openssl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoopenssl: Update to 1.1.1j
Michael Tremer [Tue, 16 Feb 2021 17:28:17 +0000 (17:28 +0000)] 
openssl: Update to 1.1.1j

Null pointer deref in X509_issuer_and_serial_hash() (CVE-2021-23841)
====================================================================

Severity: Moderate

The OpenSSL public API function X509_issuer_and_serial_hash() attempts to
create a unique hash value based on the issuer and serial number data contained
within an X509 certificate. However it fails to correctly handle any errors
that may occur while parsing the issuer field (which might occur if the issuer
field is maliciously constructed). This may subsequently result in a NULL
pointer deref and a crash leading to a potential denial of service attack.

The function X509_issuer_and_serial_hash() is never directly called by OpenSSL
itself so applications are only vulnerable if they use this function directly
and they use it on certificates that may have been obtained from untrusted
sources.

OpenSSL versions 1.1.1i and below are affected by this issue. Users of these
versions should upgrade to OpenSSL 1.1.1j.

OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL
1.0.2 is out of support and no longer receiving public updates. Premium support
customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade
to 1.1.1j.

This issue was reported to OpenSSL on 15th December 2020 by Tavis Ormandy from
Google. The fix was developed by Matt Caswell.

Incorrect SSLv2 rollback protection (CVE-2021-23839)
====================================================

Severity: Low

OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a
server that is configured to support both SSLv2 and more recent SSL and TLS
versions then a check is made for a version rollback attack when unpadding an
RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are
supposed to use a special form of padding. A server that supports greater than
SSLv2 is supposed to reject connection attempts from a client where this special
form of padding is present, because this indicates that a version rollback has
occurred (i.e. both client and server support greater than SSLv2, and yet this
is the version that is being requested).

The implementation of this padding check inverted the logic so that the
connection attempt is accepted if the padding is present, and rejected if it
is absent. This means that such as server will accept a connection if a version
rollback attack has occurred. Further the server will erroneously reject a
connection if a normal SSLv2 connection attempt is made.

Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this
issue. In order to be vulnerable a 1.0.2 server must:

1) have configured SSLv2 support at compile time (this is off by default),
2) have configured SSLv2 support at runtime (this is off by default),
3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite
  list)

OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to
this issue. The underlying error is in the implementation of the
RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING
padding mode used by various other functions. Although 1.1.1 does not support
SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the
RSA_SSLV23_PADDING padding mode. Applications that directly call that function
or use that padding mode will encounter this issue. However since there is no
support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a
security issue in that version.

OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium
support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should
upgrade to 1.1.1j.

This issue was reported to OpenSSL on 21st January 2021 by D. Katz and Joel
Luellwitz from Trustwave. The fix was developed by Matt Caswell.

Integer overflow in CipherUpdate (CVE-2021-23840)
=================================================

Severity: Low

Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow
the output length argument in some cases where the input length is close to the
maximum permissable length for an integer on the platform. In such cases the
return value from the function call will be 1 (indicating success), but the
output length value will be negative. This could cause applications to behave
incorrectly or crash.

OpenSSL versions 1.1.1i and below are affected by this issue. Users of these
versions should upgrade to OpenSSL 1.1.1j.

OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL
1.0.2 is out of support and no longer receiving public updates. Premium support
customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade
to 1.1.1j.

This issue was reported to OpenSSL on 13th December 2020 by Paul Kehrer. The fix
was developed by Matt Caswell.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship openssl
Michael Tremer [Tue, 16 Feb 2021 17:34:10 +0000 (17:34 +0000)] 
core155: Ship openssl

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoopenssl: Update to 1.1.1j
Michael Tremer [Tue, 16 Feb 2021 17:28:17 +0000 (17:28 +0000)] 
openssl: Update to 1.1.1j

Null pointer deref in X509_issuer_and_serial_hash() (CVE-2021-23841)
====================================================================

Severity: Moderate

The OpenSSL public API function X509_issuer_and_serial_hash() attempts to
create a unique hash value based on the issuer and serial number data contained
within an X509 certificate. However it fails to correctly handle any errors
that may occur while parsing the issuer field (which might occur if the issuer
field is maliciously constructed). This may subsequently result in a NULL
pointer deref and a crash leading to a potential denial of service attack.

The function X509_issuer_and_serial_hash() is never directly called by OpenSSL
itself so applications are only vulnerable if they use this function directly
and they use it on certificates that may have been obtained from untrusted
sources.

OpenSSL versions 1.1.1i and below are affected by this issue. Users of these
versions should upgrade to OpenSSL 1.1.1j.

OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL
1.0.2 is out of support and no longer receiving public updates. Premium support
customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade
to 1.1.1j.

This issue was reported to OpenSSL on 15th December 2020 by Tavis Ormandy from
Google. The fix was developed by Matt Caswell.

Incorrect SSLv2 rollback protection (CVE-2021-23839)
====================================================

Severity: Low

OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a
server that is configured to support both SSLv2 and more recent SSL and TLS
versions then a check is made for a version rollback attack when unpadding an
RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are
supposed to use a special form of padding. A server that supports greater than
SSLv2 is supposed to reject connection attempts from a client where this special
form of padding is present, because this indicates that a version rollback has
occurred (i.e. both client and server support greater than SSLv2, and yet this
is the version that is being requested).

The implementation of this padding check inverted the logic so that the
connection attempt is accepted if the padding is present, and rejected if it
is absent. This means that such as server will accept a connection if a version
rollback attack has occurred. Further the server will erroneously reject a
connection if a normal SSLv2 connection attempt is made.

Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this
issue. In order to be vulnerable a 1.0.2 server must:

1) have configured SSLv2 support at compile time (this is off by default),
2) have configured SSLv2 support at runtime (this is off by default),
3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite
  list)

OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to
this issue. The underlying error is in the implementation of the
RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING
padding mode used by various other functions. Although 1.1.1 does not support
SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the
RSA_SSLV23_PADDING padding mode. Applications that directly call that function
or use that padding mode will encounter this issue. However since there is no
support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a
security issue in that version.

OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium
support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should
upgrade to 1.1.1j.

This issue was reported to OpenSSL on 21st January 2021 by D. Katz and Joel
Luellwitz from Trustwave. The fix was developed by Matt Caswell.

Integer overflow in CipherUpdate (CVE-2021-23840)
=================================================

Severity: Low

Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow
the output length argument in some cases where the input length is close to the
maximum permissable length for an integer on the platform. In such cases the
return value from the function call will be 1 (indicating success), but the
output length value will be negative. This could cause applications to behave
incorrectly or crash.

OpenSSL versions 1.1.1i and below are affected by this issue. Users of these
versions should upgrade to OpenSSL 1.1.1j.

OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL
1.0.2 is out of support and no longer receiving public updates. Premium support
customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade
to 1.1.1j.

This issue was reported to OpenSSL on 13th December 2020 by Paul Kehrer. The fix
was developed by Matt Caswell.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agowlanclient: Do not force using legacy interface to talk to the kernel
Michael Tremer [Tue, 16 Feb 2021 16:44:45 +0000 (17:44 +0100)] 
wlanclient: Do not force using legacy interface to talk to the kernel

"wireless extensions" is the old interface to speak to the kernel.

All newer drivers support nl80211 now.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agowirelessclient.cgi: Show when 802.11w is active
Michael Tremer [Tue, 16 Feb 2021 16:41:23 +0000 (17:41 +0100)] 
wirelessclient.cgi: Show when 802.11w is active

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agowirelessclient.cgi: Show when actually connected using WPA3
Michael Tremer [Tue, 16 Feb 2021 16:37:07 +0000 (17:37 +0100)] 
wirelessclient.cgi: Show when actually connected using WPA3

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agowirelessclient.cgi: Show when using WPA3
Michael Tremer [Tue, 16 Feb 2021 16:34:02 +0000 (17:34 +0100)] 
wirelessclient.cgi: Show when using WPA3

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agodhcp.cgi: Fix incorrect { placement from patch 3724
Adolf Belka [Tue, 16 Feb 2021 13:30:10 +0000 (14:30 +0100)] 
dhcp.cgi: Fix incorrect { placement from patch 3724

- When patch 3724 was created for bug #10743 a curly bracket was placed in the wrong place
This results in the overlap of two if loops meaning that there will be no validity
check carried out on Default Lease Time if Deny Known Clients is not checked.
- This patch moves the { bracket to the right location.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoRevert "dhcpcd: Update to 9.3.4"
Michael Tremer [Tue, 16 Feb 2021 11:50:16 +0000 (11:50 +0000)] 
Revert "dhcpcd: Update to 9.3.4"

This reverts commit d96d979e2a0bb199b5ae7bec75964f4091996268.

Arne requested to revert this commit as well since dhcpcd still does not
run without any problems on i586 systems.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship country.cgi
Michael Tremer [Mon, 15 Feb 2021 13:14:13 +0000 (13:14 +0000)] 
core155: Ship country.cgi

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocountry.cgi: Fix for copy&paste typo
Matthias Fischer [Fri, 12 Feb 2021 19:40:38 +0000 (20:40 +0100)] 
country.cgi: Fix for copy&paste typo

Fixes typo in line 103 (<-> is no tab...)

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship sysvinit
Michael Tremer [Mon, 15 Feb 2021 13:13:45 +0000 (13:13 +0000)] 
core155: Ship sysvinit

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agosysvinit: Update to 2.98
Adolf Belka [Fri, 12 Feb 2021 17:59:15 +0000 (18:59 +0100)] 
sysvinit: Update to 2.98

- Update sysvinit from 2.88dsf to 2.98
- From version 2.89 mounpoint build was not enabled as standard
- Patch created to modify Makefile to define mountpoint to be built
- Update of rootfiles
- Changelog is ~400 lines long from 2.88dsf to 2.98
- For details see the Changelog in the doc directory in the tarball

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship wirelessclient.cgi
Michael Tremer [Fri, 12 Feb 2021 12:00:15 +0000 (12:00 +0000)] 
core155: Ship wirelessclient.cgi

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agowirelessclient.cgi: Fix for bug #12571
Adolf Belka [Thu, 11 Feb 2021 12:41:29 +0000 (13:41 +0100)] 
wirelessclient.cgi: Fix for bug #12571

- Wirelessclient shows priority 0 to be most preferred and priority 4 as
least preferred. Based on forum posters experience and the wpa_supplicant
man page it is the other way round.
- This patch moves the least preferred title to priority 0 and vice versa
- Will ask bug reporter to test out the patch and confirm it works. The page
is only shown if you have a wifi connection on red.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agopython-xattr: Removal of addon
Adolf Belka [Wed, 10 Feb 2021 11:06:02 +0000 (12:06 +0100)] 
python-xattr: Removal of addon

- Update of attr causes current version of python-xattr to fail to build
- Following input from Michael Tremer
- This package was orihinally required for pakfire 3 which no longer depends on it
- This is a python 2 module. Python 2 is EOL
- lfs and rootfile removed from IPFire
- make.sh updated to remove python-xattr entry

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship attr
Michael Tremer [Fri, 12 Feb 2021 11:58:00 +0000 (11:58 +0000)] 
core155: Ship attr

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agoattr: Update to 2.4.48
Adolf Belka [Wed, 10 Feb 2021 11:05:44 +0000 (12:05 +0100)] 
attr: Update to 2.4.48

- Update attr from 2.4.47 (2013) to 2.4.48 (2018)
- Update rootfiles
- Changelog in tarball only goes up to 2.4.44 so extracted changes
from commits between 2.4.47 and release of 2.4.48
v2.4.48
attr: Fix segmentation fault Andreas Gruenbacher
po: update Andreas Gruenbacher
setfacl: Include errno.h Andreas Gruenbacher
copy_action: drop unused alloca.h include Mike Frysinger
include: add uninstall target to fix distcheck Mike Frysinger
attr_copy_{fd,file}: sync changes between the files Mike Frysinger
xattr.conf: do not copy security.evm Stefan Berger
Cleanup visibility of API functions Yury Usishchev
Cleanup config.h usage Yury Usishchev
Use stdint types consistently Felix Janda
walk_tree_rec: Add parentheses to clarify code Andreas Gruenbacher
Reintroduce symbols that used to be syscall wrappers Dmitry V. Levin
Do not export symbols that are not supposed to be exported Dmitry V. Levin
Add explicit symbol versioning for attr_copy_action Dmitry V. Levin
ignore configure.lineno Mike Frysinger
walk_tree: mark internal variables as static Dmitry V. Levin
Remove the attr.5 man page (moved to man-pages) Andreas Gruenbacher
Remove <attr/xattr.h> and the syscall wrappers Andreas Gruenbacher
Remove the section 2 man pages Andreas Gruenbacher
Remove outdated tests from test/attr.test Andreas Gruenbacher
Remove test/ext/fs.test Andreas Gruenbacher
Add setfattr --raw option Andreas Gruenbacher
Properly set and report empty attribute values Andreas Gruenbacher
Man pages: Minor fixes Andreas Gruenbacher
build: unbreak attr_copy_fd() and attr_copy_file(). Nick Alcock
attr: Don't report a NULL attribute name when -l (list) fails Andreas Gruenbacher
attr_list / attr_listf: Fix cursor off-by-one error Andreas Gruenbacher
Portability fix: <alloca.h> is Linux specific Emmanuel Dreyfus
Portability fixes Emmanuel Dreyfus
telldir return value and seekdir second parameters are of type long Cristian Rodríguez
License fixes Andreas Gruenbacher
test: fix cleanup & running as root Mike Frysinger
include examples/ in dist tarball Mike Frysinger
build: ship a pkgconfig file for libattr Jan Engelhardt
build: make use of an aux-dir to stow away helper scripts Jan Engelhardt
avoid glibc-specific DECLS defines Mike Frysinger
build: drop attrincludedir, use pkgincludedir Jan Engelhardt
disable installation of man(2) pages by default Mike Frysinger
po: regenerate files after move Mike Frysinger
modernize build system Mike Frysinger
test: make running parallel/out-of-tree safe Mike Frysinger
move gettext logic into misc.h Mike Frysinger
punt debian/rpm packaging logic Mike Frysinger
Suppress deprecation warnings when building attr and libattr Andreas Gruenbacher
Add a default /etc/xattr.conf file Andreas Gruenbacher
Mark the Irix compatibility functions as deprecated Andreas Gruenbacher
Make attr_get and attr_getf behave as described in the man page Andreas Gruenbacher
Use autoreconf rather than autoconf to regenerate the files. Fabrice Bauzac
.gitignore: ignore *~ and config.h.in. Fabrice Bauzac
Fix ATTR_OP_REMOVE operation in attr_multi()
Makefile: rename configure.in to configure.ac

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agolcd4linux: Update due to autoconf change
Adolf Belka [Tue, 9 Feb 2021 20:23:36 +0000 (21:23 +0100)] 
lcd4linux: Update due to autoconf change

- lcd4linux fails to build with autoconf-2.71
Required running of autoupdate on configure.in
and autoreconf to solve files not found errors

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocore155: Ship collectd
Michael Tremer [Fri, 12 Feb 2021 11:55:23 +0000 (11:55 +0000)] 
core155: Ship collectd

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
3 years agocollectd: Update due to autoconf change
Adolf Belka [Tue, 9 Feb 2021 20:23:25 +0000 (21:23 +0100)] 
collectd: Update due to autoconf change

- collectd fails to build with autoconf-2.71
Required running of autoupdate on configure.in
and addition of --with-fp-layout=nothing to configure options

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>