Commit Graph

2278 Commits

Author SHA1 Message Date
Arne Fitzenreiter
50ffddd92b usb-modeswitch-data: update database to 20120531. 2012-07-06 22:51:49 +02:00
Arne Fitzenreiter
4e7ad99212 GeoIP: update database to 04072012. 2012-07-06 17:05:51 +02:00
Arne Fitzenreiter
eba8a82614 squid: update to 3.1.20. 2012-07-03 13:41:13 +02:00
Arne Fitzenreiter
0aa49a6b3b php: security update to 5.3.14.
The release fixes multiple security issues: A weakness in the DES implementation of crypt and a heap overflow issue in the phar extension

PHP 5.4.4 and PHP 5.3.14 fixes over 30 bugs. Please note that the use of php://fd streams is now restricted to the CLI SAPI.
2012-07-03 09:48:49 +02:00
Arne Fitzenreiter
0d42931bcd samba: update to 3.5.16. 2012-07-02 15:16:23 +02:00
Erik Kapfer
6140e7e0c2 openvpn: Introduce CCD. 2012-06-20 19:58:38 +02:00
Michael Tremer
953073459e Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2012-06-20 15:40:28 +02:00
Michael Tremer
16d026cbcb Merge remote-tracking branch 'jlentfer/logwatch' into next 2012-06-20 11:54:00 +02:00
Jan Lentfer
9f5e031e6d logwatch: Enable Date::Manip 6.x support (using interface v5) 2012-06-20 11:47:30 +02:00
Arne Fitzenreiter
dd0411c646 clamav: update to 0.97.5. 2012-06-19 21:24:51 +02:00
Michael Tremer
df106d88e5 Merge remote-tracking branch 'jlentfer/foomatic' into next 2012-06-17 20:27:19 +02:00
Jan Lentfer
477e28cf0d foomatic: Clean out /usr/share/foomatic prior to build to prevent hangs 2012-06-17 20:23:35 +02:00
Jan Lentfer
e659ba5b3a asterisk: Update to 1.8.13.0.
The 1.4 branch of asterisk does not build with the new flex and bison.
Also, the 1.4 branch was EOL'ed April 2012. The 1.8 branch has long
term support until 2015.

This patch also update chan_capi to the most recent version (HEAD),
as this is the only one that compiles with asterisk 1.8.

Asterisk 1.8 ships addons as part of the main tarball.
Asterisk 1.8 has no build in mp3 support anymore, mp3 libs need to be
downloaded seperatly via svn
(see asterisk-1.8.13.0/contrib/scripts/get_mp3_source.sh).
This patch DOES NOT include mp3 support.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:15 +02:00
Jan Lentfer
ce1f2fdb11 lcr: Update to 1.10.
This is a prerequisite for updating asterisk.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:13 +02:00
Jan Lentfer
f48a9af787 pam: Update 0.99.10.0.
The prior verion in base system did not build with
the new version of bison and flex.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:10 +02:00
Jan Lentfer
1477d98572 flex: Update to 2.5.35.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:08 +02:00
Jan Lentfer
f32b3974b4 m4: Update to 1.4.16.
This is a prerequisite for updating bison and flex

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:05 +02:00
Jan Lentfer
5794d15497 bison: Update to 2.5.1.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:00 +02:00
Michael Tremer
81b2c3f165 squid: Enable ICAP client. 2012-06-13 15:43:27 +02:00
Arne Fitzenreiter
a832f4f33e Merge remote-tracking branch 'origin/core60' into next
Conflicts:
	config/rootfiles/core/59/update.sh
	lfs/strongswan
	make.sh
2012-06-01 17:30:54 +02:00
Arne Fitzenreiter
6105282deb strongswan: security update to 4.6.4 (fix CVE-2012-2388).
RSA signature verification vulnerability
see http://http://www.strongswan.org/blog/2012/05/31/strongswan-4.6.4-released-%28cve-2012-2388%29.html for details.
2012-06-01 12:47:07 +02:00
Erik Kapfer
e70bd5b742 mtr+tcpick: Two new binary addons. 2012-05-27 21:36:44 +02:00
Michael Tremer
7de1da3fdf fireinfo: Update to 2.1.5.
Fixes issues on the Raspberry Pi Computer.
2012-05-19 11:22:18 +02:00
Arne Fitzenreiter
c7c8b4aaec GeoIP: update database to 01052012. 2012-05-12 19:35:10 +02:00
Arne Fitzenreiter
db083dd81e dhcpcd: ignore MTU Smaller than 577.
Normally 576 is the smallest valid mtu but some cable provider set this
also if they support much higher mtu's. Fedora does not accept
this to prevent speed problems with such isp connections so we do the same.
If you really need mtu=576 you can still force at at the setup.
2012-05-12 19:34:47 +02:00
Arne Fitzenreiter
58574e318b php: security update to 5.3.13 (CVE-2012-2311). 2012-05-12 19:34:19 +02:00
Arne Fitzenreiter
dc7239d678 openssh: update to 6.0p1. 2012-05-12 19:33:54 +02:00
Arne Fitzenreiter
8074eed711 openssl: security update to 0.9.8x (CVE-2012-2333).
Invalid TLS/DTLS record attack (CVE-2012-2333)
===============================================

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and
DTLS can be exploited in a denial of service attack on both clients and
servers.

DTLS applications are affected in all versions of OpenSSL. TLS is only
affected in OpenSSL 1.0.1 and later.

Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing
as a service testing platform.

The fix was developed by Stephen Henson of the OpenSSL core team.

Affected users should upgrade to OpenSSL 1.0.1c, 1.0.0j or 0.9.8x

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120510.txt
2012-05-12 19:33:31 +02:00
Arne Fitzenreiter
68eeed8285 traceroute: update to 2.0.18 and fix name resolution.
fixes #10097
2012-05-12 19:32:23 +02:00
Arne Fitzenreiter
d66d6f8827 strongswan: update to 4.6.3. 2012-05-12 19:31:46 +02:00
Arne Fitzenreiter
36585d00bd python: update to 2.7.3. 2012-05-12 19:31:17 +02:00
Arne Fitzenreiter
a6f4183e83 openssl: security update to 0.9.8w. (CVE-2012-2131).
SN1 BIO incomplete fix (CVE-2012-2131)
=======================================

It was discovered that the fix for CVE-2012-2110 released on 19 Apr
2012 was not sufficient to correct the issue for OpenSSL 0.9.8.

Please see http://www.openssl.org/news/secadv_20120419.txt for details
of that vulnerability.

This issue only affects OpenSSL 0.9.8v.  OpenSSL 1.0.1a and 1.0.0i
already contain a patch sufficient to correct CVE-2012-2110.

Thanks to Red Hat for discovering and fixing this issue.

Affected users should upgrade to 0.9.8w.

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120424.txt
2012-05-12 19:28:24 +02:00
Arne Fitzenreiter
7f76d8cb4a GeoIP: update database to 01052012. 2012-05-12 19:15:38 +02:00
Arne Fitzenreiter
4a3ae7fa37 dhcpcd: ignore MTU Smaller than 577.
Normally 576 is the smallest valid mtu but some cable provider set this
also if they support much higher mtu's. Fedora does not accept
this to prevent speed problems with such isp connections so we do the same.
If you really need mtu=576 you can still force at at the setup.
2012-05-12 17:13:45 +02:00
Arne Fitzenreiter
be5a3b36a7 php: security update to 5.3.13 (CVE-2012-2311). 2012-05-12 15:33:42 +02:00
Arne Fitzenreiter
d7d2dca964 openssh: update to 6.0p1. 2012-05-12 15:32:47 +02:00
Arne Fitzenreiter
423d77a71f openssl: security update to 0.9.8x (CVE-2012-2333).
Invalid TLS/DTLS record attack (CVE-2012-2333)
===============================================

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and
DTLS can be exploited in a denial of service attack on both clients and
servers.

DTLS applications are affected in all versions of OpenSSL. TLS is only
affected in OpenSSL 1.0.1 and later.

Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing
as a service testing platform.

The fix was developed by Stephen Henson of the OpenSSL core team.

Affected users should upgrade to OpenSSL 1.0.1c, 1.0.0j or 0.9.8x

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120510.txt
2012-05-12 15:30:38 +02:00
Arne Fitzenreiter
6666803d83 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2012-05-06 12:54:13 +02:00
Arne Fitzenreiter
9070a6c331 traceroute: update to 2.0.18 and fix name resolution.
fixes #10097
2012-05-06 12:51:14 +02:00
Arne Fitzenreiter
a526de38bc strongswan: update to 4.6.3. 2012-05-05 23:25:07 +02:00
Arne Fitzenreiter
6bdc390235 python: update to 2.7.3. 2012-05-05 23:23:53 +02:00
Arne Fitzenreiter
8f17b54f96 openssl: security update to 0.9.8w. (CVE-2012-2131).
SN1 BIO incomplete fix (CVE-2012-2131)
=======================================

It was discovered that the fix for CVE-2012-2110 released on 19 Apr
2012 was not sufficient to correct the issue for OpenSSL 0.9.8.

Please see http://www.openssl.org/news/secadv_20120419.txt for details
of that vulnerability.

This issue only affects OpenSSL 0.9.8v.  OpenSSL 1.0.1a and 1.0.0i
already contain a patch sufficient to correct CVE-2012-2110.

Thanks to Red Hat for discovering and fixing this issue.

Affected users should upgrade to 0.9.8w.

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120424.txt
2012-05-02 19:42:02 +02:00
Arne Fitzenreiter
9c166bf2a6 Merge branch 'master' into next 2012-05-02 16:55:26 +02:00
Arne Fitzenreiter
9f82cdb1f8 samba: security update to 3.5.15. (CVE-2012-2111).
This security release addresses CVE-2012-2111 (incorrect permission checks when
granting/removing privileges could compromise file server security).
2012-05-02 10:10:07 +02:00
Arne Fitzenreiter
de887913ee samba: security update to 3.5.14. (CVE-2012-1182).
Further information can be found in the security advisory:
http://www.samba.org/samba/security/CVE-2012-1182
2012-04-10 20:21:37 +02:00
Arne Fitzenreiter
b7d1e1c4a4 GeoIP: update database to 03032012. 2012-04-07 11:37:35 +02:00
Arne Fitzenreiter
2c0a849f7a cryptodev: update to 1.4. 2012-04-07 11:36:40 +02:00
Arne Fitzenreiter
f028065fd1 openssl: fix aes accleration via cryptodev. 2012-04-07 11:36:20 +02:00
Michael Tremer
a4826680bc pound: Add patch to select certificates by their SANs.
http://www.apsis.ch/pound/pound_list/archive/2012/2012-02/1329442080000#1329442080000
2012-04-07 11:35:46 +02:00
Arne Fitzenreiter
844d37795d clamav: updated to 0.97.4. 2012-04-07 11:35:28 +02:00