Commit Graph

4876 Commits

Author SHA1 Message Date
Michael Tremer
16d026cbcb Merge remote-tracking branch 'jlentfer/logwatch' into next 2012-06-20 11:54:00 +02:00
Jan Lentfer
9f5e031e6d logwatch: Enable Date::Manip 6.x support (using interface v5) 2012-06-20 11:47:30 +02:00
Michael Tremer
df106d88e5 Merge remote-tracking branch 'jlentfer/foomatic' into next 2012-06-17 20:27:19 +02:00
Jan Lentfer
477e28cf0d foomatic: Clean out /usr/share/foomatic prior to build to prevent hangs 2012-06-17 20:23:35 +02:00
Jan Lentfer
e659ba5b3a asterisk: Update to 1.8.13.0.
The 1.4 branch of asterisk does not build with the new flex and bison.
Also, the 1.4 branch was EOL'ed April 2012. The 1.8 branch has long
term support until 2015.

This patch also update chan_capi to the most recent version (HEAD),
as this is the only one that compiles with asterisk 1.8.

Asterisk 1.8 ships addons as part of the main tarball.
Asterisk 1.8 has no build in mp3 support anymore, mp3 libs need to be
downloaded seperatly via svn
(see asterisk-1.8.13.0/contrib/scripts/get_mp3_source.sh).
This patch DOES NOT include mp3 support.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:15 +02:00
Jan Lentfer
ce1f2fdb11 lcr: Update to 1.10.
This is a prerequisite for updating asterisk.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:13 +02:00
Jan Lentfer
f48a9af787 pam: Update 0.99.10.0.
The prior verion in base system did not build with
the new version of bison and flex.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:10 +02:00
Jan Lentfer
1477d98572 flex: Update to 2.5.35.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:08 +02:00
Jan Lentfer
f32b3974b4 m4: Update to 1.4.16.
This is a prerequisite for updating bison and flex

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:05 +02:00
Jan Lentfer
5794d15497 bison: Update to 2.5.1.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:00 +02:00
Michael Tremer
81b2c3f165 squid: Enable ICAP client. 2012-06-13 15:43:27 +02:00
Arne Fitzenreiter
e516f073d6 core61: add collectd initskript to updater. 2012-06-02 10:21:44 +02:00
Arne Fitzenreiter
15eb7e0a7f collectd: fix collectd on machines without rtc.
collectd hangs with 100% cpu usage if there is a very old entry
in the database. This was created at the first start without internet so
ntp cannot set the time.
2012-06-02 10:17:34 +02:00
Arne Fitzenreiter
a832f4f33e Merge remote-tracking branch 'origin/core60' into next
Conflicts:
	config/rootfiles/core/59/update.sh
	lfs/strongswan
	make.sh
2012-06-01 17:30:54 +02:00
Arne Fitzenreiter
3648650e76 Move core60 content to core61. 2012-06-01 17:25:10 +02:00
Arne Fitzenreiter
1346863ac7 core60: add strongswan security update. 2012-06-01 12:54:24 +02:00
Arne Fitzenreiter
6105282deb strongswan: security update to 4.6.4 (fix CVE-2012-2388).
RSA signature verification vulnerability
see http://http://www.strongswan.org/blog/2012/05/31/strongswan-4.6.4-released-%28cve-2012-2388%29.html for details.
2012-06-01 12:47:07 +02:00
Erik Kapfer
e70bd5b742 mtr+tcpick: Two new binary addons. 2012-05-27 21:36:44 +02:00
Michael Tremer
e98e3852ca openvpn: Import translation patch from #10137.
See comment 5 for more detail.
2012-05-27 18:19:35 +02:00
Nico Prenzel
8e148dc343 openvpn: Fix deletion of static routes. 2012-05-24 18:18:22 +02:00
Michael Tremer
aa7afd463d Start core update 60. 2012-05-24 10:48:44 +02:00
Erik Kapfer
7b82e24488 openvpn: Change colour of N2N connections.
From https://bugzilla.ipfire.org/show_bug.cgi?id=10137:
The first patch i have made is to give the index.cgi the origin colour (the
same then for the roadwarrior) for OpenVPN N2N connections on IPFire. At this
time the colour is stated in IPSec colour, so i made a patch to change this.
2012-05-24 10:47:37 +02:00
Michael Tremer
7de1da3fdf fireinfo: Update to 2.1.5.
Fixes issues on the Raspberry Pi Computer.
2012-05-19 11:22:18 +02:00
Arne Fitzenreiter
4bd2536f4b core59: start/stop ipsec and ssh at update. 2012-05-12 19:40:41 +02:00
Arne Fitzenreiter
a18da317d3 finished core59. 2012-05-12 19:35:42 +02:00
Arne Fitzenreiter
c7c8b4aaec GeoIP: update database to 01052012. 2012-05-12 19:35:10 +02:00
Arne Fitzenreiter
db083dd81e dhcpcd: ignore MTU Smaller than 577.
Normally 576 is the smallest valid mtu but some cable provider set this
also if they support much higher mtu's. Fedora does not accept
this to prevent speed problems with such isp connections so we do the same.
If you really need mtu=576 you can still force at at the setup.
2012-05-12 19:34:47 +02:00
Arne Fitzenreiter
58574e318b php: security update to 5.3.13 (CVE-2012-2311). 2012-05-12 19:34:19 +02:00
Arne Fitzenreiter
dc7239d678 openssh: update to 6.0p1. 2012-05-12 19:33:54 +02:00
Arne Fitzenreiter
8074eed711 openssl: security update to 0.9.8x (CVE-2012-2333).
Invalid TLS/DTLS record attack (CVE-2012-2333)
===============================================

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and
DTLS can be exploited in a denial of service attack on both clients and
servers.

DTLS applications are affected in all versions of OpenSSL. TLS is only
affected in OpenSSL 1.0.1 and later.

Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing
as a service testing platform.

The fix was developed by Stephen Henson of the OpenSSL core team.

Affected users should upgrade to OpenSSL 1.0.1c, 1.0.0j or 0.9.8x

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120510.txt
2012-05-12 19:33:31 +02:00
Arne Fitzenreiter
68eeed8285 traceroute: update to 2.0.18 and fix name resolution.
fixes #10097
2012-05-12 19:32:23 +02:00
Arne Fitzenreiter
d66d6f8827 strongswan: update to 4.6.3. 2012-05-12 19:31:46 +02:00
Arne Fitzenreiter
36585d00bd python: update to 2.7.3. 2012-05-12 19:31:17 +02:00
Arne Fitzenreiter
8f6a5178e8 fix core58 merge problem.
Conflicts:

	config/rootfiles/core/58/filelists/files
2012-05-12 19:30:30 +02:00
Arne Fitzenreiter
5479803667 core59: add openssl to core update. 2012-05-12 19:28:46 +02:00
Arne Fitzenreiter
a6f4183e83 openssl: security update to 0.9.8w. (CVE-2012-2131).
SN1 BIO incomplete fix (CVE-2012-2131)
=======================================

It was discovered that the fix for CVE-2012-2110 released on 19 Apr
2012 was not sufficient to correct the issue for OpenSSL 0.9.8.

Please see http://www.openssl.org/news/secadv_20120419.txt for details
of that vulnerability.

This issue only affects OpenSSL 0.9.8v.  OpenSSL 1.0.1a and 1.0.0i
already contain a patch sufficient to correct CVE-2012-2110.

Thanks to Red Hat for discovering and fixing this issue.

Affected users should upgrade to 0.9.8w.

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120424.txt
2012-05-12 19:28:24 +02:00
Arne Fitzenreiter
75c2cf6f51 started core59. 2012-05-12 19:24:46 +02:00
Arne Fitzenreiter
5b6fdbf9d5 finished core59. 2012-05-12 19:22:26 +02:00
Arne Fitzenreiter
7f76d8cb4a GeoIP: update database to 01052012. 2012-05-12 19:15:38 +02:00
Arne Fitzenreiter
4a3ae7fa37 dhcpcd: ignore MTU Smaller than 577.
Normally 576 is the smallest valid mtu but some cable provider set this
also if they support much higher mtu's. Fedora does not accept
this to prevent speed problems with such isp connections so we do the same.
If you really need mtu=576 you can still force at at the setup.
2012-05-12 17:13:45 +02:00
Arne Fitzenreiter
be5a3b36a7 php: security update to 5.3.13 (CVE-2012-2311). 2012-05-12 15:33:42 +02:00
Arne Fitzenreiter
d7d2dca964 openssh: update to 6.0p1. 2012-05-12 15:32:47 +02:00
Arne Fitzenreiter
423d77a71f openssl: security update to 0.9.8x (CVE-2012-2333).
Invalid TLS/DTLS record attack (CVE-2012-2333)
===============================================

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and
DTLS can be exploited in a denial of service attack on both clients and
servers.

DTLS applications are affected in all versions of OpenSSL. TLS is only
affected in OpenSSL 1.0.1 and later.

Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing
as a service testing platform.

The fix was developed by Stephen Henson of the OpenSSL core team.

Affected users should upgrade to OpenSSL 1.0.1c, 1.0.0j or 0.9.8x

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120510.txt
2012-05-12 15:30:38 +02:00
Arne Fitzenreiter
6666803d83 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2012-05-06 12:54:13 +02:00
Arne Fitzenreiter
9070a6c331 traceroute: update to 2.0.18 and fix name resolution.
fixes #10097
2012-05-06 12:51:14 +02:00
Arne Fitzenreiter
a526de38bc strongswan: update to 4.6.3. 2012-05-05 23:25:07 +02:00
Arne Fitzenreiter
6bdc390235 python: update to 2.7.3. 2012-05-05 23:23:53 +02:00
Arne Fitzenreiter
b5c3859e30 fix core58 merge problem. 2012-05-05 23:21:18 +02:00
Arne Fitzenreiter
717470058f core59: add openssl to core update. 2012-05-05 23:19:36 +02:00
Arne Fitzenreiter
8f17b54f96 openssl: security update to 0.9.8w. (CVE-2012-2131).
SN1 BIO incomplete fix (CVE-2012-2131)
=======================================

It was discovered that the fix for CVE-2012-2110 released on 19 Apr
2012 was not sufficient to correct the issue for OpenSSL 0.9.8.

Please see http://www.openssl.org/news/secadv_20120419.txt for details
of that vulnerability.

This issue only affects OpenSSL 0.9.8v.  OpenSSL 1.0.1a and 1.0.0i
already contain a patch sufficient to correct CVE-2012-2110.

Thanks to Red Hat for discovering and fixing this issue.

Affected users should upgrade to 0.9.8w.

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120424.txt
2012-05-02 19:42:02 +02:00