]> git.ipfire.org Git - ipfire-2.x.git/log
ipfire-2.x.git
23 months agocore167: generate uInit ramdisk images for u-boot core167
Arne Fitzenreiter [Mon, 2 May 2022 21:57:42 +0000 (21:57 +0000)] 
core167: generate uInit ramdisk images for u-boot

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoMerge branch 'next' v2.27-core167
Michael Tremer [Sun, 24 Apr 2022 10:23:12 +0000 (10:23 +0000)] 
Merge branch 'next'

2 years agoCore Update 167: Fix typo in update.sh
Peter Müller [Sat, 23 Apr 2022 19:40:01 +0000 (19:40 +0000)] 
Core Update 167: Fix typo in update.sh

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agodracut: Fix e2fsck call for filesystem checks
Peter Müller [Sat, 23 Apr 2022 14:20:06 +0000 (14:20 +0000)] 
dracut: Fix e2fsck call for filesystem checks

Fixes: #12842
Tested-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoipfirereboot.c: Remove orphaned comment
Peter Müller [Fri, 22 Apr 2022 19:58:48 +0000 (19:58 +0000)] 
ipfirereboot.c: Remove orphaned comment

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agokernel: update to 5.15.35
Arne Fitzenreiter [Fri, 22 Apr 2022 12:48:32 +0000 (12:48 +0000)] 
kernel: update to 5.15.35

in kernel 5.15.32 the driver for ATH9K wlan cards is unstable.
This is one of the most used cards so we need this update before
releasing core167 final.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: Do not enforce "integrity" mode of LSM
Peter Müller [Thu, 21 Apr 2022 19:30:42 +0000 (19:30 +0000)] 
kernel: Do not enforce "integrity" mode of LSM

LSM was found to render firmware flashing unusable, and patching out LSM
functionality for all features needed (such as /dev/io, direct memory
access and probably raw PCI access for older cards), this would
effectively render much of LSM's functionality useless as well.

For the time being, we do ship LSM, but do not enforce any protection
mode. Users hence can run it in "integrity" or even "confidentiality"
mode by custom commands; hopefully, we will be able to revert this
change at a future point.

Acked-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoRevert "linux: Disable LSM for /dev/io port access"
Peter Müller [Thu, 21 Apr 2022 19:29:32 +0000 (19:29 +0000)] 
Revert "linux: Disable LSM for /dev/io port access"

This reverts commit 5b966f1b0a0f191c7d79b1609c122c16a65d3bfc.

2 years agolinux: Disable LSM for /dev/io port access
Peter Müller [Tue, 19 Apr 2022 13:57:35 +0000 (13:57 +0000)] 
linux: Disable LSM for /dev/io port access

flashrom needs access to /dev/io ports for flashing firmware, a
functionality we cannot cease to support. Therefore, LSM constraints are
disabled for ioport.c, hopefully permitting us to keep it enabled.

Reported-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoMerge branch 'next'
Michael Tremer [Tue, 19 Apr 2022 09:45:39 +0000 (09:45 +0000)] 
Merge branch 'next'

2 years agocore167: ship xfsprogs
Arne Fitzenreiter [Tue, 19 Apr 2022 08:11:44 +0000 (10:11 +0200)] 
core167: ship xfsprogs

previous builds of mkfs.xfs links against libinih.so.0

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore167: ship pcmciautils
Arne Fitzenreiter [Tue, 19 Apr 2022 07:11:59 +0000 (09:11 +0200)] 
core167: ship pcmciautils

previous build is linked against libsysfs.so.1

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agocore167: ship elinks
Arne Fitzenreiter [Mon, 18 Apr 2022 08:27:46 +0000 (10:27 +0200)] 
core167: ship elinks

elinks need to be shipped because previuos builds search the old
libidn.so.11

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoMerge branch 'next'
Michael Tremer [Wed, 13 Apr 2022 14:50:07 +0000 (14:50 +0000)] 
Merge branch 'next'

2 years agocdrom: Symlink /etc/mtab to /proc/self/mounts
Peter Müller [Wed, 13 Apr 2022 11:39:31 +0000 (11:39 +0000)] 
cdrom: Symlink /etc/mtab to /proc/self/mounts

See cad2ce78dde6d3df70c1bbde011bb677b8df9ae4 for details.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agolibloc: Fix rootfile
Peter Müller [Wed, 13 Apr 2022 11:32:48 +0000 (11:32 +0000)] 
libloc: Fix rootfile

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship collectd initscript
Peter Müller [Wed, 13 Apr 2022 09:24:15 +0000 (09:24 +0000)] 
Core Update 167: Ship collectd initscript

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoSilence STDERR when calling 'sensors-detect' in collectd initscript
Peter Müller [Wed, 13 Apr 2022 09:22:58 +0000 (09:22 +0000)] 
Silence STDERR when calling 'sensors-detect' in collectd initscript

https://lists.ipfire.org/pipermail/development/2022-April/013189.html

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoMerge branch 'next'
Michael Tremer [Wed, 13 Apr 2022 08:11:05 +0000 (08:11 +0000)] 
Merge branch 'next'

2 years agoc167: Ship vnstat
Michael Tremer [Wed, 13 Apr 2022 08:10:16 +0000 (08:10 +0000)] 
c167: Ship vnstat

vnstat is linked against libgd which has had an SO bump and therefore
needs to be shipped again.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoCore Update 167: Replace /etc/mtab by symlink to /proc/self/mounts
Peter Müller [Mon, 11 Apr 2022 19:14:43 +0000 (19:14 +0000)] 
Core Update 167: Replace /etc/mtab by symlink to /proc/self/mounts

mount, as updated via util-linux, no longer writes /etc/mtab, causing
programs to rely on this file's content (such as the check_disk Nagios
plugin) to stop working.

/proc/self/mounts contains all the necessary information, so it is fine
to replace /etc/mtab by a symlink to it.

Fixes: #12843
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Export the location database again and reload the firewall
Peter Müller [Tue, 12 Apr 2022 14:05:04 +0000 (14:05 +0000)] 
Core Update 167: Export the location database again and reload the firewall

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship libloc
Peter Müller [Tue, 12 Apr 2022 12:53:29 +0000 (12:53 +0000)] 
Core Update 167: Ship libloc

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agolibloc: Update to 0.9.13
Peter Müller [Tue, 12 Apr 2022 12:53:03 +0000 (12:53 +0000)] 
libloc: Update to 0.9.13

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship accidentally deleted Perl library again
Peter Müller [Tue, 12 Apr 2022 11:57:07 +0000 (11:57 +0000)] 
Core Update 167: Ship accidentally deleted Perl library again

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoMerge branch 'next' of ssh://people.ipfire.org/pub/git/ipfire-2.x into next
Peter Müller [Tue, 12 Apr 2022 11:56:18 +0000 (11:56 +0000)] 
Merge branch 'next' of ssh://people.ipfire.org/pub/git/ipfire-2.x into next

2 years agoCore Update 167: Do not delete a file that should not have been deleted
Peter Müller [Tue, 12 Apr 2022 11:54:27 +0000 (11:54 +0000)] 
Core Update 167: Do not delete a file that should not have been deleted

My fault, again.

Fixes: #12841
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agocore167: add code needed for kernel update
Arne Fitzenreiter [Tue, 12 Apr 2022 09:35:20 +0000 (11:35 +0200)] 
core167: add code needed for kernel update

remove the old kernel and reconfigure bootscripts for arm boards
and run user scripts to switch to a new kernel.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoCore Update 167: Ship xz
Peter Müller [Mon, 11 Apr 2022 19:02:43 +0000 (19:02 +0000)] 
Core Update 167: Ship xz

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoxz: Apply patch to solve security fix (ZDI-CAN-16587)
Adolf Belka [Mon, 11 Apr 2022 13:40:00 +0000 (15:40 +0200)] 
xz: Apply patch to solve security fix (ZDI-CAN-16587)

- Malicious filenames can make xzgrep to write to arbitrary files
   or (with a GNU sed extension) lead to arbitrary code execution.
- xzgrep from XZ Utils versions up to and including 5.2.5 are
   affected. 5.3.1alpha and 5.3.2alpha are affected as well.
- This bug was inherited from gzip's zgrep. gzip 1.12 includes
   a fix for zgrep.
- CU167 has gzip-1.12 with the fix already merged.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoMerge branch 'next'
Michael Tremer [Mon, 11 Apr 2022 10:16:55 +0000 (10:16 +0000)] 
Merge branch 'next'

2 years agokernel: arm rootfile update
Arne Fitzenreiter [Sun, 10 Apr 2022 07:42:16 +0000 (09:42 +0200)] 
kernel: arm rootfile update

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agogzip: Symlink /usr/bin/zless to /usr/bin/zmore
Peter Müller [Sat, 9 Apr 2022 10:44:10 +0000 (10:44 +0000)] 
gzip: Symlink /usr/bin/zless to /usr/bin/zmore

gzip 1.12 no longer features zless. For convenience reasons, symlink
/usr/bin/zless to /usr/bin/zmore, so users won't need to relearn any
commands they were previously used to.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoMerge branch 'next'
Arne Fitzenreiter [Sat, 9 Apr 2022 09:25:23 +0000 (11:25 +0200)] 
Merge branch 'next'

2 years agoTor: glibc needs rseq syscall as well
Peter Müller [Sat, 9 Apr 2022 08:27:03 +0000 (08:27 +0000)] 
Tor: glibc needs rseq syscall as well

Fixes: #12807 (finally)
Tested-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship gzip
Peter Müller [Sat, 9 Apr 2022 07:39:45 +0000 (07:39 +0000)] 
Core Update 167: Ship gzip

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agogzip: Update to 1.12
Peter Müller [Sat, 9 Apr 2022 07:38:59 +0000 (07:38 +0000)] 
gzip: Update to 1.12

This fixes CVE-2022-1271.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship backupiso script
Peter Müller [Fri, 8 Apr 2022 16:05:29 +0000 (16:05 +0000)] 
Core Update 167: Ship backupiso script

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agobackupiso: Change checksum algorithm to BLAKE2
Peter Müller [Fri, 8 Apr 2022 15:11:15 +0000 (15:11 +0000)] 
backupiso: Change checksum algorithm to BLAKE2

Reported-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoinstaller: Update translation message
Peter Müller [Fri, 8 Apr 2022 15:10:54 +0000 (15:10 +0000)] 
installer: Update translation message

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agodownloadsource.sh: Change checksum algorithm to BLAKE2
Peter Müller [Fri, 8 Apr 2022 15:10:37 +0000 (15:10 +0000)] 
downloadsource.sh: Change checksum algorithm to BLAKE2

Reported-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Apply local SSH changes to configuration file
Peter Müller [Fri, 8 Apr 2022 16:01:03 +0000 (16:01 +0000)] 
Core Update 167: Apply local SSH changes to configuration file

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Update linker config before calling GPG
Peter Müller [Fri, 8 Apr 2022 15:59:25 +0000 (15:59 +0000)] 
Core Update 167: Update linker config before calling GPG

This avoids log messages like:
ldconfig: /lib/ld-linux-x86-64.so.2 is not a symbolic link

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship and apply sysctl changes
Peter Müller [Fri, 8 Apr 2022 15:58:41 +0000 (15:58 +0000)] 
Core Update 167: Ship and apply sysctl changes

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agogitignore: add *.b2 checksum files
Arne Fitzenreiter [Thu, 7 Apr 2022 22:32:40 +0000 (00:32 +0200)] 
gitignore: add *.b2 checksum files

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agokernel: run make oldconfig
Arne Fitzenreiter [Thu, 7 Apr 2022 22:27:47 +0000 (00:27 +0200)] 
kernel: run make oldconfig

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2 years agoMerge branch 'next'
Michael Tremer [Thu, 7 Apr 2022 15:56:39 +0000 (15:56 +0000)] 
Merge branch 'next'

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agocore167: Ship coreutils
Michael Tremer [Thu, 7 Apr 2022 09:14:08 +0000 (09:14 +0000)] 
core167: Ship coreutils

These have changed since they are now compiled with ACL/XATTR support

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agokernel: Align rootfile again due to forgotten hardening patch
Peter Müller [Wed, 6 Apr 2022 20:18:22 +0000 (20:18 +0000)] 
kernel: Align rootfile again due to forgotten hardening patch

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoKernel: Enable LSM support and set security level to "integrity"
Peter Müller [Sat, 19 Mar 2022 21:10:00 +0000 (21:10 +0000)] 
Kernel: Enable LSM support and set security level to "integrity"

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoCore Update 167: Ship getrrdimage.cgi
Peter Müller [Wed, 6 Apr 2022 17:16:59 +0000 (17:16 +0000)] 
Core Update 167: Ship getrrdimage.cgi

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agogetrrdimage.cgi: Add default values to parameters
Leo-Andres Hofmann [Wed, 6 Apr 2022 13:46:52 +0000 (15:46 +0200)] 
getrrdimage.cgi: Add default values to parameters

Prevents "use of uninitialized value" warnings when the
CGI is called with broken undefined GET parameters.

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship header.pl
Peter Müller [Wed, 6 Apr 2022 17:16:15 +0000 (17:16 +0000)] 
Core Update 167: Ship header.pl

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoheader.pl: Add translation to DHCP leases table
Leo-Andres Hofmann [Wed, 6 Apr 2022 13:43:57 +0000 (15:43 +0200)] 
header.pl: Add translation to DHCP leases table

Signed-off-by: Leo-Andres Hofmann <hofmann@leo-andres.de>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship sudo
Peter Müller [Wed, 6 Apr 2022 17:15:02 +0000 (17:15 +0000)] 
Core Update 167: Ship sudo

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agosudo: Update to version 1.9.10
Adolf Belka [Tue, 5 Apr 2022 13:48:16 +0000 (15:48 +0200)] 
sudo: Update to version 1.9.10

- Update from 1.9.9 to 1.9.10
- Update of rootfile not required
- Changelog
    What's new in Sudo 1.9.10
 * Added new "log_passwords" and "passprompt_regex" sudoers options.
   If "log_passwords" is disabled, sudo will attempt to prevent passwords
   from being logged.  If sudo detects any of the regular expressions in
   the "passprompt_regex" list in the terminal output, sudo will log '*'
   characters instead of the terminal input until a newline or carriage
   return is found in the input or an output character is received.
 * Added new "log_passwords" and "passprompt_regex" settings to
   sudo_logsrvd that operate like the sudoers options when logging
   terminal input.
 * Fixed several few bugs in the cvtsudoers utility when merging
   multiple sudoers sources.
 * Fixed a bug in sudo_logsrvd when parsing the sudo_logsrvd.conf
   file, where the "retry_interval" in the [relay] section was not
   being recognized.
 * Restored the pre-1.9.9 behavior of not performing authentication
   when sudo's -n option is specified.  A new "noninteractive_auth"
   sudoers option has been added to enable PAM authentication in
   non-interactive mode.  GitHub issue #131.
 * On systems with /proc, if the /proc/self/stat (Linux) or
   /proc/pid/psinfo (other systems) file is missing or invalid,
   sudo will now check file descriptors 0-2 to determine the user's
   terminal.  Bug #1020.
 * Fixed a compilation problem on Debian kFreeBSD.  Bug #1021.
 * Fixed a crash in sudo_logsrvd when running in relay mode if
   an alert message is received.
 * Fixed an issue that resulting in "problem with defaults entries"
   email to be sent if a user ran sudo when the sudoers entry in
   the nsswitch.conf file includes "sss" but no sudo provider is
   configured in /etc/sssd/sssd.conf.  Bug #1022.
 * Updated the warning displayed when the invoking user is not
   allowed to run sudo.  If sudo has been configured to send mail
   on failed attempts (see the mail_* flags in sudoers), it will
   now print "This incident has been reported to the administrator."
   If the "mailto" or "mailerpath" sudoers settings are disabled,
   the message will not be printed and no mail will be sent.
   GitHub issue #48.
 * Fixed a bug where the user-specified command timeout was not
   being honored if the sudoers rule did not also specify a timeout.
 * Added support for using POSIX extended regular expressions in
   sudoers rules.  A command and/or arguments in sudoers are treated
   as a regular expression if they start with a '^' character and
   end with a '$'.  The command and arguments are matched separately,
   either one (or both) may be a regular expression.
   Bug #578, GitHub issue #15.
 * A user may now only run "sudo -U otheruser -l" if they have a
   "sudo ALL" privilege where the RunAs user contains either "root"
   or "otheruser".  Previously, having "sudo ALL" was sufficient,
   regardless of the RunAs user.  GitHub issue #134.
 * The sudo lecture is now displayed immediately before the password
   prompt.  As a result, sudo will no longer display the lecture
   unless the user needs to enter a password.  Authentication methods
   that don't interact with the user via a terminal do not trigger
   the lecture.
 * Sudo now uses its own closefrom() emulation on Linux systems.
   The glibc version may not work in a chroot jail where /proc is
   not available.  If close_range(2) is present, it will be used
   in preference to /proc/self/fd.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship curl
Peter Müller [Wed, 6 Apr 2022 17:14:14 +0000 (17:14 +0000)] 
Core Update 167: Ship curl

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agocurl: Update to version 7.82.0
Adolf Belka [Wed, 6 Apr 2022 13:05:10 +0000 (15:05 +0200)] 
curl: Update to version 7.82.0

- Update from 7.81.0 to 7.82.0
- Update of rootfile not required
- Changelog
    Versionl 7.82.0
      This release includes the following changes:
 o curl: add --json [67]
 o mesalink: remove support [23]
      This release includes the following bugfixes:
 o appveyor: update images from VS 2019 to 2022
 o appveyor: use VS 2017 image for the autotools builds
 o azure-pipelines: add a build on Windows with libssh [154]
 o bearssl: fix connect error on expired cert and no verify [132]
 o bearssl: fix EXC_BAD_ACCESS on incomplete CA cert [131]
 o bearssl: fix session resumption (session id) [133]
 o build: enable -Warith-conversion
 o build: fix -Wenum-conversion handling
 o build: fix ngtcp2 crypto library detection [63]
 o checkprefix: remove strlen calls [128]
 o checksrc: fix typo in comment [34]
 o CI: move 'distcheck' job from zuul to azure pipelines [60]
 o CI: move scan-build job from Zuul to Azure Pipelines [59]
 o CI: move the NSS job from zuul to GHA [84]
 o ci: move the OpenSSL + c-ares job from Zuul to Circle CI [75]
 o CI: move the rustls CI job to GHA from Zuul [8]
 o CI: move two jobs from Zuul to Circle CI [73]
 o CI: test building wolfssl with --enable-opensslextra [42]
 o CI: workflows/wolfssl: install impacket [47]
 o circleci: add a job using libssh [121]
 o cirlceci: also run a c-ares job on arm with debug enabled [74]
 o cmake: fix iOS CMake project generation error [13]
 o cmdline-opts/gen.pl: fix option matching to improve references [50]
 o config.d: Clarify _curlrc filename is still valid on Windows [95]
 o configure.ac: use user-specified gssapi dir when using pkg-config [136]
 o configure: change output for cross-compiled alt-svc support [140]
 o configure: fix '--enable-code-coverage' typo [110]
 o configure: remove support for "embedded ares" [82]
 o configure: requires --with-nss-deprecated to build with NSS [114]
 o configure: set CURL_LIBRARY_PATH for nghttp2 [58]
 o configure: support specification of a nghttp2 library path [101]
 o configure: use correct CFLAGS for threaded resolver with xlC on AIX [54]
 o curl tool: erase some more sensitive command line arguments [22]
 o curl-functions.m4: fix LIBRARY_PATH adjustment to avoid eval [5]
 o curl-functions.m4: revert DYLD_LIBRARY_PATH tricks in CURL_RUN_IFELSE [9]
 o curl-openssl: fix SRP check for OpenSSL 3.0 [86]
 o curl-openssl: remove the OpenSSL headers and library versions check [35]
 o curl.h: fix typo [129]
 o curl: remove "separators" (when using globbed URLs) [32]
 o curl_getdate.3: remove pointless .PP line [68]
 o curl_multi_socket.3: remove callback and typical usage descriptions [7]
 o curl_url_set.3: mention when CURLU_ALLOW_SPACE was added
 o CURLMOPT_TIMERFUNCTION/DATA.3: fix the examples [27]
 o CURLOPT_PROGRESSFUNCTION.3: fix example struct assignment [147]
 o CURLOPT_RESOLVE.3: change example port to 443
 o CURLOPT_XFERINFOFUNCTION.3: fix example struct assignment [153]
 o CURLOPT_XFERINFOFUNCTION.3: fix typo in example [81]
 o CURLSHOPT_LOCKFUNC.3: fix typo "relased" -> "released" [71]
 o des: fix compile break for OpenSSL without DES [141]
 o docs/cmdline-opts: add "mutexed" options for more http versions [25]
 o docs/DEPRECATE: remove NPN support in August 2022 [64]
 o docs: capitalize the name 'Netscape' [77]
 o docs: document HTTP/2 not insisting on TLS 1.2 [49]
 o docs: fix mandoc -T lint formatting complaints [2]
 o docs: update IETF links to use datatracker [41]
 o examples/curlx: support building with OpenSSL 1.1.0+ [148]
 o examples/multi-app.c: call curl_multi_remove_handle as well [19]
 o formdata: avoid size_t => long typecast overflows [37]
 o ftp: provide error message for control bytes in path [66]
 o gen.pl: terminate "example" sections better [4]
 o gha: add a macOS CI job with libssh [142]
 o gskit: Convert to using Curl_poll [111]
 o gskit: Fix errors from Curl_strerror refactor [113]
 o gskit: Fix initialization of Curl_ssl_gskit struct [112]
 o h2/h3: allow CURLOPT_HTTPHEADER change ":scheme" [88]
 o hostcheck: fixed to not touch used input strings [38]
 o hostcheck: reduce strlen calls on chained certificates [92]
 o hostip: avoid unused parameter error in Curl_resolv_check [144]
 o http2: move two infof calls to debug-h2-only [145]
 o http: make Curl_compareheader() take string length arguments too [87]
 o if2ip: make Curl_ipv6_scope a blank macro when IPv6-disabled [104]
 o KNOWN_BUGS: fix typo "libpsl"
 o ldap: return CURLE_URL_MALFORMAT for bad URL [24]
 o lib: remove support for CURL_DOES_CONVERSIONS [96]
 o libssh2: don't typecast socket to int for libssh2_session_handshake [151]
 o libssh: fix include files and defines use for Windows builds [156]
 o Makefile.am: Generate VS 2022 projects
 o maketgz: return error if 'make dist' fails [79]
 o mbedtls: enable use of mbedtls without CRL support [57]
 o mbedtls: enable use of mbedtls without filesystem functions support [100]
 o mbedtls: fix CURLOPT_SSLCERT_BLOB (again)
 o mbedtls: fix ssl_init error with mbedTLS 3.1.0+ [12]
 o mbedtls: remove #include <mbedtls/certs.h> [56]
 o mbedtls: return CURLcode result instead of a mbedtls error code [1]
 o md5: check md5_init_func return value
 o mime: use a define instead of the magic number 24 [89]
 o misc: allow curl to build with wolfssl --enable-opensslextra [43]
 o misc: remove BeOS code and references [30]
 o misc: remove the final watcom references [29]
 o misc: remove unused data when IPv6 is not supported [80]
 o mqtt: free 'sendleftovers' in disconnect [115]
 o mqtt: free any send leftover data when done [36]
 o multi: allow user callbacks to call curl_multi_assign [126]
 o multi: grammar fix in comment [69]
 o multi: remember connection_id before returning connection to pool [76]
 o multi: set in_callback for multi interface callbacks [28]
 o netware: remove support [72]
 o next.d. remove .fi/.nf as they are handled by gen.pl [3]
 o ngtcp2: adapt to changed end of headers callback proto [39]
 o ngtcp2: fix declaration of ‘result’ shadows a previous local [14]
 o ngtcp2: Reset dynbuf when it is fully drained [143]
 o nss: handshake callback during shutdown has no conn->bundle [55]
 o ntlm: remove unused feature defines [117]
 o openldap: fix compiler warning when built without SSL support [70]
 o openldap: implement SASL authentication [16]
 o openldap: pass string length arguments to client_write() [116]
 o openssl.h: avoid including OpenSSL headers here [15]
 o openssl: check if sessionid flag is enabled before retrieving session [125]
 o openssl: check SSL_get_ex_data to prevent potential NULL dereference [40]
 o openssl: check the return value of BIO_new_mem_buf() [18]
 o openssl: fix `ctx_option_t` for OpenSSL v3+
 o openssl: fix build for version < 1.1.0 [134]
 o openssl: return error if TLS 1.3 is requested when not supported [45]
 o os400: Add function wrapper for system command [138]
 o os400: Add link to QADRT devkit to README.OS400 [137]
 o os400: Default build to target current release [139]
 o OS400: fix typos in rpg include file [149]
 o projects: add support for Visual Studio 17 (2022) [124]
 o projects: fix Visual Studio wolfSSL configurations
 o projects: remove support for MSVC before VC10 (Visual Studio 2010) [123]
 o quiche: after leaving h3_recving state, poll again [108]
 o quiche: change qlog file extension to `.sqlog` [44]
 o quiche: fix upload for bigger content-length [146]
 o quiche: handle stream reset [83]
 o quiche: remove two leftover debug infof() outputs
 o quiche: verify the server cert on connect [33]
 o quiche: when *recv_body() returns data, drain it before polling again [109]
 o README.md: fix links [118]
 o remote-header-name.d: clarify [10]
 o runtests.pl: disable debuginfod [51]
 o runtests.pl: properly print the test if it contains binary zeros
 o runtests.pl: support the nonewline attribute for the data part [21]
 o runtests.pl: tolerate test directories without Makefile.inc [98]
 o runtests: allow client/file to specify multiple directories
 o runtests: make 'rustls' a testable feature
 o runtests: make 'wolfssl' a testable feature [6]
 o runtests: set 'oldlibssh' for libssh versions before 0.9.5 [122]
 o rustls: add CURLOPT_CAINFO_BLOB support [26]
 o schannel: move the algIds array out of schannel.h [135]
 o scripts/cijobs.pl: output data about all currect CI jobs [78]
 o scripts/completion.pl: improve zsh completion [46]
 o scripts/copyright.pl: support many provided file names on the cmdline
 o scripts/delta: check the file delta for current branch
 o sectransp: mark a 3DES cipher as weak [130]
 o setopt: do bounds-check before strdup [99]
 o setopt: fix the TLSAUTH #ifdefs for proxy-disabled builds [53]
 o sha256: Fix minimum OpenSSL version [102]
 o smb: pass socket for writing and reading data instead of FIRSTSOCKET [90]
 o ssl: reduce allocated space for ssl backend when FTP is disabled [127]
 o test3021: disable all msys2 path transformation
 o test374: gif data without new line at the end [20]
 o tests/disable-scan.pl: properly detect multiple symbols per line [94]
 o tests/unit/Makefile.am: add NSS_LIBS to build with NSS fine [85]
 o tool_findfile: check ~/.config/curlrc too [17]
 o tool_getparam: DNS options that need c-ares now fail without it [31]
 o TPF: drop support [97]
 o unit1610: init SSL library before calling SHA256 functions [152]
 o url: exclude zonefrom_url when no ipv6 is available [103]
 o url: given a user in the URL, find pwd for that user in netrc [11]
 o url: keep trailing dot in host name [62]
 o url: make Curl_disconnect return void [48]
 o urlapi: handle "redirects" smarter [119]
 o urldata: CONN_IS_PROXIED replaces bits.proxy when proxy can be disabled [52]
 o urldata: remove conn->bits.user_passwd [105]
 o version_win32: fix warning for `CURL_WINDOWS_APP` [93]
 o vtls: fix socket check conditions [150]
 o vtls: pass on the right SNI name [61]
 o vxworks: drop support [65]
 o winbuild: add parameter WITH_SSH [120]
 o wolfssl: return CURLE_AGAIN for the SSL_ERROR_NONE case [106]
 o wolfssl: when SSL_read() returns zero, check the error [107]
 o write-out.d: Fix num_headers formatting
 o x509asn1: toggle off functions not needed for diff tls backends [91]

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoghostscript: Update to version 9.56.1
Adolf Belka [Wed, 6 Apr 2022 13:05:42 +0000 (15:05 +0200)] 
ghostscript: Update to version 9.56.1

- Update from 9.55.0 to 9.56.1
- Update of rootfile
- Changelog
   Version 9.56.0 (2022-02-22)
     Highlights in this release include:
    New PDF Interpreter: This is an entirely new implementation written in C
             (rather than PostScript, as before). For a full discussion of this change
             and reasons for it see: Changes Coming to the PDF Interpreter.
    In this (9.56.0) release, the new PDF interpreter is now ENABLED by default
             in Ghostscript, but the old PDF interpreter can be used as a fallback by
             specifying -dNEWPDF=false. We've provided this so users that encounter
             issues with the new interpreter can keep working while we iron out those
             issues, the option will not be available in the long term.
    This also allows us to offer a new executable (gpdf, or gpdfwin??.exe on
             Windows) which is purely for PDF input. For this release, those new binaries
             are not included in the "install" make targets, nor in the Windows installers.
    Calling Ghostscript via the GS API is now thread safe. The one limitation is
             that the X11 devices for Unix-like systems (x11, x11alpha, x11cmyk, x11cmyk2,
             x11cmyk4, x11cmyk8, x11gray2, x11gray4 and x11mono) cannot be made thread
             safe, due to their interaction with the X11 server, those devices have been
             modified to only allow one instance in an executable.
    The PSD output device now writes ICC profiles to their output files, for
             improved color fidelity.
    Our efforts in code hygiene and maintainability continue.
    The usual round of bug fixes, compatibility changes, and incremental
             improvements.
     Included below are incompatible changes from recent releases (the specific release
      in question is listed in parentheses). We include these, for now, as we are aware
      that not everyone upgrades with every release.
    (9.55.0) Changes to the device API. This will affect developers and
                      maintainers of Ghostscript devices. Firstly, and most importantly,
                      the way device-specific "procs" are specified has been rewritten
                      to make it (we think!) clearer and less confusing. See The
                      Interface between Ghostscript and Device Drivers and The Great
                      Device Rework Of 2021 for more details.
    (9.55.0) The command line options -sGraphicsICCProfile=___,
                      -dGraphicsIntent=#, -dGraphicsBlackPt=#, -dGraphicsKPreserve=# have
                      been changed to -sVectorICCProfile=___, -dVectorIntent=#,
                      -dVectorBlackPt=#, -dVectorKPreserve=#.
    (9.53.0) As of 9.53.0, we have (re-)introduced the patch level to the
                      version number, this helps facilitate a revised policy on handling
                      security-related issues.
    Note for GSView Users: The patch level addition breaks GSView 5 (it is
             hardcoded to check for versions 704-999. It is possible, but not guaranteed
             that a GSView update might be forthcoming to resolve this.
    (9.52) -dALLOWPSTRANSPARENCY: The transparency compositor (and related
                    features), whilst we are improving it, remains sensitive to being
                    driven correctly, and incorrect use can have unexpected/undefined
                    results. Hence, as part of improving security, we limited access to
                    these operators, originally using the -dSAFER feature. As we made
                    "SAFER" the default mode, that became unacceptable, hence the new
                    option -dALLOWPSTRANSPARENCY which enables access to the operators.
    (9.50) There are a couple of subtle incompatibilities between the old and
                    new SAFER implementations. Firstly, as mentioned in the 9.50 release
                    notes, SAFER now leaves standard PostScript functionality unchanged
                    (except for the file access limitations). Secondly, the interaction
                    with save/restore operations has changed. See SAFER.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship iproute2
Peter Müller [Wed, 6 Apr 2022 17:13:14 +0000 (17:13 +0000)] 
Core Update 167: Ship iproute2

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoiproute2: Update to version 5.17.0
Adolf Belka [Wed, 6 Apr 2022 13:05:56 +0000 (15:05 +0200)] 
iproute2: Update to version 5.17.0

- Update from 5.16.0 to 5.17.0
- Update of rootfile not required
- Changelog
    v5.17.0
ip/geneve: add support for IFLA_GENEVE_INNER_PROTO_INHERIT
Merge branch 'gtp-netdev' into next
f_flower: Implement gtp options support
ip: GTP support in ip link Wojciech
man: bridge: document per-port mcast_router settings
bridge: support for controlling mcast_router per port
Update kernel headers
vdpa: Update man page with added support to configure max vq pair
link_xfrm: if_id must be non zero
testsuite: link xfrm delete no if_id test
vdpa: Support reading device features
vdpa: Support for configuring max VQ pairs for a device
vdpa: Allow for printing negotiated features of a device
vdpa: Remove unsupported command line option
Makefile: move HAVE_MNL check to top-level Makefile
Merge branch 'bridge-broadcast-flooding' into next
Merge branch 'main' into next
man: ip-link: whitespace fixes to odd line breaks mid sentence
man: ip-link: mention bridge port's default mcast_flood state
man: ip-link: document new bcast_flood flag on bridge ports
ip: iplink_bridge_slave: support for broadcast flooding
man: bridge: add missing closing " in bridge show mdb
man: bridge: document new bcast_flood flag for bridge ports
bridge: support for controlling flooding of broadcast per port
rdma: make RES_PID and RES_KERN_NAME alternative to each other
uapi: update vdpa.h
ipaddress: remove 'label' compatibility with Linux-2.0 net aliases
lib/fs: fix memory leak in get_task_name()
ip/batadv: allow to specify RA when creating link
Import batman_adv.h header from last kernel sync point
uapi: update magic.h
Revert "configure: Allow command line override of toolchain"
tc: separate action print for filter and action dump
rdma: Fix the logic to print unsigned int.
Revert "rdma: Fix res_print_uint() and add res_print_u64()"
Merge branch 'libbpf-fixups' into next
bpf: Remove use of bpf_create_map_xattr
bpf: Export bpf syscall wrapper
bpf_glue: Remove use of bpf_load_program from libbpf
rdma: Fix res_print_uint() and add res_print_u64()
uapi: update to xfrm.h
ss: display advertised TCP receive window and out-of-order counter
Merge branch 'link-layer-protocols' into next
tc: bash-completion: Add profinet and ethercat to procotol completion list
lib: add profinet and ethercat as link layer protocol names
Merge branch '802.1X-locked-bridge-ports' into next
man8/ip-link.8: add locked port feature description and cmd syntax
man8/bridge.8: add locked port feature description and cmd syntax
ip: iplink_bridge_slave: add locked port flag support
bridge: link: add command to set port in locked mode
Update kernel headers
configure: Allow command line override of toolchain
mptcp: add port support for setting flags
mptcp: add fullmesh support for setting flags
mptcp: add fullmesh check for adding address
bond: add ns_ip6_target option
Merge branch 'main' into next
devlink: Remove strtouint8_t in favor of get_u8
devlink: Remove strtouint16_t in favor of get_u16
devlink: Remove strtouint32_t in favor of get_u32
devlink: Remove strtouint64_t in favor of get_u64
Update kernel headers
f_flower: fix indentation for enc_key_id and u32
bridge: Remove vlan listing from `bridge link`
bridge: Fix error string typo
lnstat: fix strdup leak in -w argument parsing
iplink_can: print_usage: typo fix, add missing spaces
dcb: Fix error reporting when accessing "dcb app"
tc: fix duplicate fall-through
libnetlink: fix socket leak in rtnl_open_byproto()
tc_util: Fix parsing action control with space and slash
tunnel: Fix missing space after local/remote print
Merge branch 'ioam-insert-freq' into next
Update documentation
Add support for the IOAM insertion frequency
Update kernel headers
iplink: add ip-link documentation
iplink: add gro_max_size attribute handling
tc: u32: add json support in `print_raw`, `print_ipv4`, `print_ipv6`
tc: u32: add support for json output
iprule: Allow option dsfield in 'ip rule show'
tc/f_flower: fix indentation
tc_util: fix breakage from clang changes
tc: add skip_hw and skip_sw to control action offload
ss: use freecon() instead of free() when appropriate
man: Fix a typo in the flag documentation of ip address
dcb: app: Add missing "dcb app show dev X default-prio"
Merge branch 'clang-compile' into next
json_print: suppress clang format warning
libbpf: fix clang warning about format non-literal
tunnel: fix clang warning
tipc: fix clang warning about empty format string
can: fix clang warning
ipl2tp: fix clang warning
tc_util: fix clang warning in print_masked_type
flower: fix clang warnings
netem: fix clang warnings
utils: add format attribute
tc: add format attribute to tc_print_rate
Merge branch 'main' into next
uapi: update kernel headers from 5.17-rc1
tc/action: print error to stderr
mptcp: add id check for deleting address
dcb: Rewrite array-formatting code to not cause warnings with Clang
f_flower: fix checkpatch warnings
netem: fix checkpatch warnings
Merge branch 'main' into next
lib: fix ax25.h include for musl
uapi: add missing virtio headers
uapi: add missing rose and ax25 files
q_cake: allow changing to diffserv3
iplink_can: add ctrlmode_{supported,_static} to the "--details --json" output
Update kernel headers
Merge branch 'rdma-clang-compile' into next
rdma: Don't allocate sparse array
rdma: Limit copy data by the destination size

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agocups-filters: Update to version 1.28.14
Adolf Belka [Wed, 6 Apr 2022 13:03:58 +0000 (15:03 +0200)] 
cups-filters: Update to version 1.28.14

- Update from 1.28.10 to 1.28.14
- Update of rootfile not required
- Changelog
    CHANGES IN V1.28.14
- pdftopdf: Correct the output when suppressing auto-rotation
  (option "nopdfAutoRotate"). Depending on the situation pages
  got cropped in the wrong orientation or de-centered.
- pdftopdf: Correct the output when the
  "orientation-requested" or the "landscape" option is
  supplied. Output could be de-centered (Issue #456),
  portrait-oriented pages be wrongly cropped and division of
  the output page into cells for N-up done in the wrong
  orientation.
- rastertopdf: In PCLm output mode the filter failed to
  generate PCLm if the printer has no
  "pclm-source-resolution-default" IPP attribute.
    CHANGES IN V1.28.13
- pdftopdf: Fix N-up printing when paper is taken
  long-edge-first by the printer.
- pdftopdf: Fix cropping ("print-scaling=none" and
  "print-scaling=fill") when paper is taken long-edge-first by
  the printer (Issue #454).
- pdftops: Use Poppler for all Apple LaserWriter models (Issue
  #452).
    CHANGES IN V1.28.12
- imagetoraster, imagetopdf: Fixed comparison of the image
  size with the page size for print-scaling=auto. The image
  size in pixels was compared with the page size in PostScript
  points (1/72 inch).
- imagetoraster, imagetopdf: Fixed the "print-scaling=none"
     (crop-to-fit) mode, also use crop-to-fit always when
     requested, do not fall back to fit-to-page when the image
     size differs significantly from the page size (Issue #362).
- libcupsfilters: Changed the default PPI resolution for
  images as input files from 128 to 200 (Pull request #446).
- implicitclass: Do not check availability of "gs" and
  "pdftops" executables, instead, check by the presence of
  "gstoraster" and "pdftoraster" filters whether we have
  configured cups-filters for Ghostscript and/or Poppler use.
- libcupsfilters: In the PPD generator for the driverless
  utility and cups-browsed add "*cupsFilter2: ..." lines for
  all supported driverless data formats (PDF, Apple/PWG
  Raster, PCLm), and add lines for legacy data formats (PCL,
  PostScript) only if no driverless formats available.
- libcupsfilters: Always use encryption for ipps. RFC7472
  requires that 'ipps' must be used over HTTPS, but the
  driverless utility does not enforce encryption (Pull request
  #433).
- serial: Add a 10-msec sleep and at the end add a tcdrain().
  For some unknown reason, every printing file need sleep a
  little time to make sure the serial printer receive data is
  right (Pull request #431).
- libcupsfilters: Fix resolver functions for DNS-SD-based
  URIs, to make resolve_uri() also work when DEVICE_URI env
  variable is set and to make ippfind_based_uri_converter()
  not re-direct stdin.
- pdftopdf: Set default for print-scaling to avoid "should
  never happem" log messages and undefined behavior.
- pdftopdf: Fix orientation-requested = 0. Consider
  this as "automatic selection and not as error.
- pdftopdf: Fixed all combinations of print-scaling and
  number-up for printers with asymmetric margins (top !=
  bottom or left != right) and for input files containing
  pages with different sizes and/or orientations. Fixes
  backported from 2.x branch.
- pdftopdf: Add 2% tolerance for input size larger than output
  page when "print-scaling=auto" or "print-scaling=auto-fit"
  is used and too large input pages should be scaled, fitting
  documents not. This prevents a random-looking behavior if
  input and output page size seem to be equal, but in reality
  there are slight differences between size dimensions.
    CHANGES IN V1.28.11
- libcupsfilters: Let PPD generator take default ColorModel
  from printer (CUPS issue #277).
- Braille: In vectortopdf check inkscape version to call
  inkscape with the correct command line (Issue #315, Pull
  request #443).
- Build system: Make missing DejaVuSans.ttf non-fatal in
  ./configure as the font is only needed for test programs,
  not for actual use of cups-filters (Issue #411).
- libcupsfilters: In imagetoraster() fixed crash with SGray
          (Issue #435).
- cups-browsed: Naming of local queues is matched to CUPS'
  current naming of temporary queues (no leading or trailing
  underscores), to avoid duplicates in print dialogs which
  support CUPS' temporary queues.
- libcupsfilters: Make cupsRasterParseIPPOptions() work correctly
  with PPDs (Issue #436).
- libcupsfilters: Let colord_get_profile_for_device_id() not
  return empty file name, to avoid error messages in CUPS
  error_log.
- foomatic-rip: Debug message was wrongly sent to stdout and
  not to log (Issue #422).

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agocifs-utils: Update to version 6.14
Adolf Belka [Tue, 5 Apr 2022 13:46:43 +0000 (15:46 +0200)] 
cifs-utils: Update to version 6.14

- Update from 6.13 to 6.14
- Update of rootfile not required
- Changelog
   September, 2021: Release 6.14
     cifs-utils: bump version to 6.14
     setcifsacl: fix formatting
     smbinfo: add support for new key dump ioctl
     mount.cifs: fix crash when mount point does not exist
     cifs.upcall: fix regression in kerberos mount
     smbinfo: Add command for displaying alternate data streams
     Reorder ACEs in preferred order during setcifsacl

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship collectd-/graphs-related changes
Peter Müller [Wed, 6 Apr 2022 17:05:35 +0000 (17:05 +0000)] 
Core Update 167: Ship collectd-/graphs-related changes

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agographs.pl: Change directory name to replace HOSTILE with HOSTILE_DROP - fixes bug...
Bernhard Bitsch [Mon, 4 Apr 2022 20:33:31 +0000 (22:33 +0200)] 
graphs.pl: Change directory name to replace HOSTILE with HOSTILE_DROP - fixes bug#12838

- The directory name for the hostile data was using HOSTILE while the chain was called
   HOSTILE_DROP. This resulted in the files in the directory not being updated.

Fixes: bug#12838
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
2 years agocollectd.conf: Change chain from HOSTILE to HOSTILE_DROP - fixes bug#12838
Bernhard Bitsch [Mon, 4 Apr 2022 20:33:30 +0000 (22:33 +0200)] 
collectd.conf: Change chain from HOSTILE to HOSTILE_DROP - fixes bug#12838

- Chain that was specified was HOSTILE but actual used is HOSTILE_DROP
- Using HOSTILE caused no update fro the hostile data used in the Firewall Hits graph

Fixes: bug#12838
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Acked-by: Bernhard Bitsch <bbitsch@ipfire.org>
2 years agohaproxy: Update to 2.4.15
Peter Müller [Mon, 4 Apr 2022 05:31:53 +0000 (05:31 +0000)] 
haproxy: Update to 2.4.15

The changelog of the entire 2.4.x series can be retrieved from
https://www.haproxy.org/download/2.4/src/CHANGELOG .

As-promised-to: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2 years agolinux: Update rootfile to reflect kernel hardening changes
Peter Müller [Tue, 5 Apr 2022 08:42:00 +0000 (08:42 +0000)] 
linux: Update rootfile to reflect kernel hardening changes

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship ddns
Peter Müller [Tue, 5 Apr 2022 05:55:21 +0000 (05:55 +0000)] 
Core Update 167: Ship ddns

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoddns: Pick up Michael's patch
Peter Müller [Tue, 5 Apr 2022 05:54:38 +0000 (05:54 +0000)] 
ddns: Pick up Michael's patch

https://wiki.ipfire.org/devel/telco/2022-04-04

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agolinux: Pick up Michael's patch for correctly holding RCU lock while nf_reinject'ing
Peter Müller [Tue, 5 Apr 2022 05:47:09 +0000 (05:47 +0000)] 
linux: Pick up Michael's patch for correctly holding RCU lock while nf_reinject'ing

Fixes: #12760
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agolinux: Fix BLAKE2 checksum
Peter Müller [Tue, 5 Apr 2022 05:33:06 +0000 (05:33 +0000)] 
linux: Fix BLAKE2 checksum

I accidentally copied & wasted the wrong one into it.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoRun ./make.sh update-contributors
Peter Müller [Mon, 4 Apr 2022 20:20:48 +0000 (20:20 +0000)] 
Run ./make.sh update-contributors

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship smartmontools
Peter Müller [Mon, 4 Apr 2022 20:17:14 +0000 (20:17 +0000)] 
Core Update 167: Ship smartmontools

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agosmartmontools: Update to 7.3
Peter Müller [Mon, 4 Apr 2022 05:30:01 +0000 (05:30 +0000)] 
smartmontools: Update to 7.3

Please refer to https://www.smartmontools.org/browser/tags/RELEASE_7_3/smartmontools/NEWS
for the changelog of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship DHCP advoptions related files
Peter Müller [Mon, 4 Apr 2022 20:10:23 +0000 (20:10 +0000)] 
Core Update 167: Ship DHCP advoptions related files

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agodhcp.cgi: Add domain-list type info in dhcp options - bug#12819
Adolf Belka [Mon, 4 Apr 2022 11:49:09 +0000 (13:49 +0200)] 
dhcp.cgi: Add domain-list type info in dhcp options - bug#12819

Fixes: bug#12819
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoadvoptions-list: Add domain-search to options - bug#12819
Adolf Belka [Mon, 4 Apr 2022 11:49:08 +0000 (13:49 +0200)] 
advoptions-list: Add domain-search to options - bug#12819

Fixes: bug#12819
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoCore Update 167: Ship unbound-dhcp-leases-bridge
Peter Müller [Mon, 4 Apr 2022 20:08:41 +0000 (20:08 +0000)] 
Core Update 167: Ship unbound-dhcp-leases-bridge

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agounbound-dhcp-leases-bridge: Don't open stderr on daemonization
Michael Tremer [Wed, 30 Mar 2022 09:56:35 +0000 (09:56 +0000)] 
unbound-dhcp-leases-bridge: Don't open stderr on daemonization

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agounbound-dhcp-leases-bridge: Initialize logging after daemonization
Michael Tremer [Wed, 30 Mar 2022 09:56:34 +0000 (09:56 +0000)] 
unbound-dhcp-leases-bridge: Initialize logging after daemonization

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agounbound-dhcp-leases-bridge: Read configuration only once
Michael Tremer [Wed, 30 Mar 2022 09:56:33 +0000 (09:56 +0000)] 
unbound-dhcp-leases-bridge: Read configuration only once

This saves some resources when we re-read the same configuration file
too often.

Suggested-by: Anthony Heading <ajrh@ajrh.net>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agounbound-dhcp-leases-bridge: Fix inotify handling
Michael Tremer [Wed, 30 Mar 2022 09:56:32 +0000 (09:56 +0000)] 
unbound-dhcp-leases-bridge: Fix inotify handling

This patch changes that the script will listen to changes to the
directory instead of the file which got complicated when files got
renamed.

It also processes all changes at the same time and tries finding out
what actions have to be performed in order to avoid unnecessary
iterations.

The script is also limited to process any changes only once every five
seconds to keep resource usage in check on busy systems.

Suggested-by: Anthony Heading <ajrh@ajrh.net>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agounbound-dhcp-leases-bridge: Improve logging
Michael Tremer [Wed, 30 Mar 2022 09:56:31 +0000 (09:56 +0000)] 
unbound-dhcp-leases-bridge: Improve logging

This improves logging and enables logging to the console.

Suggested-by: Anthony Heading <ajrh@ajrh.net>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoRevert "dvb-firmwares: Don't ship firmware that comes from linux-firmware"
Peter Müller [Mon, 4 Apr 2022 20:06:31 +0000 (20:06 +0000)] 
Revert "dvb-firmwares: Don't ship firmware that comes from linux-firmware"

This reverts commit 7ce3223dd842465b92a3cc93273b4fa02579ebe7.

https://wiki.ipfire.org/devel/telco/2022-04-04

2 years agoRevert "alsa: Do not ship compressed firmware again"
Peter Müller [Mon, 4 Apr 2022 20:06:14 +0000 (20:06 +0000)] 
Revert "alsa: Do not ship compressed firmware again"

This reverts commit f0dc569d79cecdc2f03750734f904ddedf97d3a7.

https://wiki.ipfire.org/devel/telco/2022-04-04

2 years agoCore Update 167: Ship the Linux kernel
Peter Müller [Mon, 4 Apr 2022 20:05:36 +0000 (20:05 +0000)] 
Core Update 167: Ship the Linux kernel

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agokernel: Update to 5.15.32
Peter Müller [Sat, 2 Apr 2022 11:20:31 +0000 (11:20 +0000)] 
kernel: Update to 5.15.32

Refer to https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.32
for the changelog of this version.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoKernel: Enable SVA support for both Intel and AMD CPUs
Peter Müller [Sat, 19 Mar 2022 21:10:50 +0000 (21:10 +0000)] 
Kernel: Enable SVA support for both Intel and AMD CPUs

Since running virtual machines is one of our legitimate use cases, it
makes sense to provide Qemu with the ability of taking advantage of
IOMMU support for safer virtuall memory allocation, if available.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoKernel: Do not automatically load TTY line disciplines, only if necessary
Peter Müller [Sat, 19 Mar 2022 21:10:34 +0000 (21:10 +0000)] 
Kernel: Do not automatically load TTY line disciplines, only if necessary

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoKernel: Disable support for tracing block I/O actions
Peter Müller [Sat, 19 Mar 2022 21:08:56 +0000 (21:08 +0000)] 
Kernel: Disable support for tracing block I/O actions

This is not needed on IPFire systems, and grsecurity recommends to turn
this off.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoKernel: Set CONFIG_ARCH_MMAP_RND_BITS to 32 bits
Peter Müller [Sat, 19 Mar 2022 21:08:32 +0000 (21:08 +0000)] 
Kernel: Set CONFIG_ARCH_MMAP_RND_BITS to 32 bits

This follows a recommendation by ClipOS, making ASLR bypassing attempts
harder.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoKernel: Block non-UID-0 profiling completely
Peter Müller [Fri, 11 Feb 2022 19:42:57 +0000 (19:42 +0000)] 
Kernel: Block non-UID-0 profiling completely

This is recommended by KSPP, Lynis, and others. Indeed, there is no
legitimate reason why an unprivileged user on IPFire should do any
profiling. Unfortunately, this change never landed in the mainline
kernel, hence a distribution patch is necessary.

The second version of this patch rebases the kernel patch by Jeff
Vander Stoep against Linux 5.15.17 to avoid fuzzying.

Tested-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoCore Update 167: Ship ca-certificates
Peter Müller [Mon, 4 Apr 2022 19:58:25 +0000 (19:58 +0000)] 
Core Update 167: Ship ca-certificates

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoupdate ca-certificates CA bundle
Peter Müller [Sat, 2 Apr 2022 11:38:31 +0000 (11:38 +0000)] 
update ca-certificates CA bundle

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoRevert "Core Update 167: Ship qos.cgi"
Peter Müller [Mon, 4 Apr 2022 18:10:43 +0000 (18:10 +0000)] 
Revert "Core Update 167: Ship qos.cgi"

This reverts commit dcb3c4aaac5f572f0198d09a504b1cd8103d77b6.

https://lists.ipfire.org/pipermail/development/2022-April/013014.html

2 years agoRevert "qos.cgi: Removed last two P2P lines"
Peter Müller [Mon, 4 Apr 2022 18:09:29 +0000 (18:09 +0000)] 
Revert "qos.cgi: Removed last two P2P lines"

This reverts commit 652da33c019a9ed4bab40670c88356b18ac9cccf.

https://lists.ipfire.org/pipermail/development/2022-April/013014.html

2 years agoConfig: Fix calling b2sum
Michael Tremer [Mon, 4 Apr 2022 16:03:18 +0000 (16:03 +0000)] 
Config: Fix calling b2sum

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2 years agoCore Update 167: Ship qos.cgi
Peter Müller [Mon, 4 Apr 2022 05:36:06 +0000 (05:36 +0000)] 
Core Update 167: Ship qos.cgi

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2 years agoqos.cgi: Removed last two P2P lines
Matthias Fischer [Sun, 3 Apr 2022 16:04:04 +0000 (18:04 +0200)] 
qos.cgi: Removed last two P2P lines

P2P "has left da house"...

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>