From mboxrd@z Thu Jan  1 00:00:00 1970
From: Michael Tremer <git@ipfire.org>
To: ipfire-scm@lists.ipfire.org
Subject: [git.ipfire.org] IPFire 2.x development tree branch, core183,
 created. ee4c8d28e493862cb630e79b7ffadd6807b465fa
Date: Fri, 09 Feb 2024 14:16:45 +0000
Message-ID: <4TWbWd4ywmz2xdb@people01.haj.ipfire.org>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===============4037624468436477167=="
List-Id: <ipfire-scm.lists.ipfire.org>

--===============4037624468436477167==
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "IPFire 2.x development tree".

The branch, core183 has been created
        at  ee4c8d28e493862cb630e79b7ffadd6807b465fa (commit)

- Log -----------------------------------------------------------------
commit ee4c8d28e493862cb630e79b7ffadd6807b465fa
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Feb 9 14:15:32 2024 +0000

    core183: Ship suricata
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 89941c3d131176a2cbc81f18dda2ab8a312e4aa0
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Feb 9 11:30:38 2024 +0000

    suricata: Update to 6.0.16
    
      https://redmine.openinfosecfoundation.org/versions/201
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 456aad9443bade55b2e8ef337191729c02632aed
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Fri Feb 9 11:33:23 2024 +0000

    libhtp: Update to 0.5.46
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 8c43d1481a99743ce23d8b92879ea04f7e0153c1
Author: Arne Fitzenreiter <arne_f(a)ipfire.org>
Date:   Fri Feb 2 07:33:38 2024 +0000

    kernel: update to 6.6.15
    
    Signed-off-by: Arne Fitzenreiter <arne_f(a)ipfire.org>

commit 7f7cbd68b8fc15de7d8a10569684611704f005b7
Author: Arne Fitzenreiter <arne_f(a)ipfire.org>
Date:   Wed Jan 31 21:09:14 2024 +0100

    mympd: create/check config before first start
    
    this create missing folders for webradio and state.
    
    Signed-off-by: Arne Fitzenreiter <arne_f(a)ipfire.org>

commit 664eac84834676fd0bd64b7a90c93e4c612a860c
Author: Arne Fitzenreiter <arne_f(a)ipfire.org>
Date:   Sun Jan 28 21:29:46 2024 +0100

    mympd: new addon to control mpd via WebGUI
    
    myMPD is written in C and has a nice WebGUI to play
    local music and also a WebRadio browser.
    This is to replace the removec client175.
    
    After install it can reached via
    https://IP_OF_THE_IPFIRE:8800
    
    Signed-off-by: Arne Fitzenreiter <arne_f(a)ipfire.org>
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit fdad4cf48f53556086fea1965b3e79b2c68ed3d5
Author: Arne Fitzenreiter <arne_f(a)ipfire.org>
Date:   Sun Jan 28 15:42:53 2024 +0100

    mpfire: fix initskript uninstall
    
    the uninstall with rm /etc/rc*.d/*mpd remove not only the mpd initlinks.
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 83338946dc2121d1f0d332d4e5f2f13b1bf078d5
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Wed Jan 31 17:09:16 2024 +0000

    core184: Ship glibc
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

commit 38c1be257f5d740a502112ee8eae3566d8f2ac4e
Author: Michael Tremer <michael.tremer(a)ipfire.org>
Date:   Wed Jan 31 11:09:41 2024 +0000

    glibc: Import latest patches from upstream
    
    These include (amongst others) fixes for:
    
    GLIBC-SA-2024-0001:
    ===================
    syslog: Heap buffer overflow in __vsyslog_internal (CVE-2023-6246)
    
    __vsyslog_internal did not handle a case where printing a SYSLOG_HEADER
    containing a long program name failed to update the required buffer
    size, leading to the allocation and overflow of a too-small buffer on
    the heap.
    
    GLIBC-SA-2024-0002:
    ===================
    syslog: Heap buffer overflow in __vsyslog_internal (CVE-2023-6779)
    
    __vsyslog_internal used the return value of snprintf/vsnprintf to
    calculate buffer sizes for memory allocation.  If these functions (for
    any reason) failed and returned -1, the resulting buffer would be too
    small to hold output.
    
    GLIBC-SA-2024-0003:
    ===================
    syslog: Integer overflow in __vsyslog_internal (CVE-2023-6780)
    
    __vsyslog_internal calculated a buffer size by adding two integers, but
    did not first check if the addition would overflow.
    
    Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>

-----------------------------------------------------------------------


hooks/post-receive
--
IPFire 2.x development tree

--===============4037624468436477167==--