Commit Graph

4128 Commits

Author SHA1 Message Date
Michael Tremer
2b163f4497 Drop tripwire
This add-on is likely to be unused

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:27 +00:00
Michael Tremer
74e43e1493 xtables-addons: Make sure kernel module directory exists
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:23 +00:00
Michael Tremer
5b2155bfdd Drop cryptodev
This module isn't used by openssl any more and therefore
quite unnecessary.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:19 +00:00
Michael Tremer
5b2e3ab683 mISDNuser: Don't build with -Werror
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:13 +00:00
Michael Tremer
e31708279a liboping: Don't build with -Werror
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:08 +00:00
Michael Tremer
5c42412505 mdadm: Update to 3.3.4
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:17:13 +00:00
Michael Tremer
a5ba61b89b ebtables: Honour CFLAGS
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:17:08 +00:00
Michael Tremer
c7762365dc openssl: Update to 1.0.2e
OpenSSL Security Advisory [3 Dec 2015]
=======================================

NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE
0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS
PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS.

BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
==================================================================

Severity: Moderate

There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No
EC algorithms are affected. Analysis suggests that attacks against RSA and DSA
as a result of this defect would be very difficult to perform and are not
believed likely. Attacks against DH are considered just feasible (although very
difficult) because most of the work necessary to deduce information
about a private key may be performed offline. The amount of resources
required for such an attack would be very significant and likely only
accessible to a limited number of attackers. An attacker would
additionally need online access to an unpatched system using the target
private key in a scenario with persistent DH parameters and a private
key that is shared between multiple clients. For example this can occur by
default in OpenSSL DHE based SSL/TLS ciphersuites.

This issue affects OpenSSL version 1.0.2.

OpenSSL 1.0.2 users should upgrade to 1.0.2e

This issue was reported to OpenSSL on August 13 2015 by Hanno
Böck. The fix was developed by Andy Polyakov of the OpenSSL
development team.

Certificate verify crash with missing PSS parameter (CVE-2015-3194)
===================================================================

Severity: Moderate

The signature verification routines will crash with a NULL pointer dereference
if presented with an ASN.1 signature using the RSA PSS algorithm and absent
mask generation function parameter. Since these routines are used to verify
certificate signature algorithms this can be used to crash any certificate
verification operation and exploited in a DoS attack. Any application which
performs certificate verification is vulnerable including OpenSSL clients and
servers which enable client authentication.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q

This issue was reported to OpenSSL on August 27 2015 by Loïc Jonas Etienne
(Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL
development team.

X509_ATTRIBUTE memory leak (CVE-2015-3195)
==========================================

Severity: Moderate

When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
memory. This structure is used by the PKCS#7 and CMS routines so any
application which reads PKCS#7 or CMS data from untrusted sources is affected.
SSL/TLS is not affected.

This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q
OpenSSL 1.0.0 users should upgrade to 1.0.0t
OpenSSL 0.9.8 users should upgrade to 0.9.8zh

This issue was reported to OpenSSL on November 9 2015 by Adam Langley
(Google/BoringSSL) using libFuzzer. The fix was developed by Dr. Stephen
Henson of the OpenSSL development team.

Race condition handling PSK identify hint (CVE-2015-3196)
=========================================================

Severity: Low

If PSK identity hints are received by a multi-threaded client then
the values are wrongly updated in the parent SSL_CTX structure. This can
result in a race condition potentially leading to a double free of the
identify hint data.

This issue was fixed in OpenSSL 1.0.2d and 1.0.1p but has not been previously
listed in an OpenSSL security advisory. This issue also affects OpenSSL 1.0.0
and has not been previously fixed in an OpenSSL 1.0.0 release.

OpenSSL 1.0.2 users should upgrade to 1.0.2d
OpenSSL 1.0.1 users should upgrade to 1.0.1p
OpenSSL 1.0.0 users should upgrade to 1.0.0t

The fix for this issue can be identified in the OpenSSL git repository by commit
ids 3c66a669dfc7 (1.0.2), d6be3124f228 (1.0.1) and 1392c238657e (1.0.0).

The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

Note
====

As per our previous announcements and our Release Strategy
(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions
1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these
versions will be provided after that date. In the absence of significant
security issues being identified prior to that date, the 1.0.0t and 0.9.8zh
releases will be the last for those versions. Users of these versions are
advised to upgrade.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20151203.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-03 17:00:58 +00:00
Michael Tremer
ee3dec50a3 ramdisk: Make usage of ramdisk configurable
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-03 14:41:49 +00:00
Alexander Marx
c4a451eead Remove ramdisks for RRD databases
Ramdisks are very limited in space and as new graphs
are generated for OpenVPN N2N connections, etc. more
space is necessary.

This patch will enable ramdisks for all systems with more
than 490M of memory and allows the user to force using
a ramdisk on systems with less memory.

Signed-off-by: Alexander Marx <alexander.marx@ipfire.org>
Acked-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-03 13:14:23 +00:00
Arne Fitzenreiter
74e5c32e19 Merge branch 'master' into next 2015-12-02 21:39:20 +01:00
Arne Fitzenreiter
f59b59db96 dhcpcd: revert dhclient config before core91.
the new config has some ipv6 defaults that conflict with
t-com entertain.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-02 14:39:19 +01:00
Arne Fitzenreiter
4c031dc085 kernel: bump pak version for pae kernel.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-02 14:36:07 +01:00
Arne Fitzenreiter
1f182999bc cpufreq: change initscript for intel pstate driver.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-02 14:17:34 +01:00
Matthias Fischer
40e1bbda54 dnsmasq 2.75: latest upstream patches
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-01 22:35:21 +00:00
Michael Tremer
915c88931a strongswan: Update to 5.3.4
Fixes a security vulnerability in the EAP-MSCHAPv2 plugin
that is filed under CVE-2015-8023.

https://www.strongswan.org/blog/2015/11/16/strongswan-vulnerability-%28cve-2015-8023%29.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-19 12:52:31 +00:00
Arne Fitzenreiter
e9fbc1cecf boost: build also on x86 with -j2
boost need to much memory if it was build with more
than 2 parallel processes.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-11 22:05:15 +01:00
Arne Fitzenreiter
e42d35f496 kernel: update to 3.14.57
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-10 21:13:51 +01:00
Arne Fitzenreiter
c88002c48b ipset: fix build om arm.
Never hardcode KVER-ipfire in any patches because on arm there is no KVER-ipfire kernel.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-07 09:11:27 +01:00
Arne Fitzenreiter
ea2b8089e6 Merge branch 'next' of git.ipfire.org:/pub/git/ipfire-2.x into next 2015-11-05 21:39:39 +01:00
Erik Kapfer
63cbd2c1df ipset: New package
Signed-off-by: Erik Kapfer <erik.kapfer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-05 11:47:14 +00:00
Arne Fitzenreiter
89f7654673 openvmtools: enable build on x86_64
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-05 11:40:06 +01:00
Matthias Fischer
b6f571fa88 snort: Update to 2.9.7.6
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-04 21:18:56 +00:00
Erik Kapfer
6411f1baa6 lzo: Update to version 2.09
Signed-off-by: Erik Kapfer <erik.kapfer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-04 21:11:07 +00:00
Matthias Fischer
93a08fe261 dma: Update to 0.10
Sorry, I borked the PATCH from yesterday...second try:

dma: Update to 0.10
Changes: dns.c, do not treat unreachable DNS server as permanent error
See: 1a1306df01 (diff-8e1267319329e5ee7e6a92fb2aa01c6b)

Deleted unnecessary blank lines in 'mail.cgi'

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-04 21:10:04 +00:00
Michael Tremer
c98981ae3d Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2015-10-29 23:25:45 +00:00
Arne Fitzenreiter
5215a0f2c1 e1000e: update to 3.2.7.1
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-28 19:36:22 +01:00
Arne Fitzenreiter
8d4cae8736 kernel: update to 3.14.56
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-27 17:31:51 +01:00
Arne Fitzenreiter
e0d5c35122 Merge branch 'next' of git.ipfire.org:/pub/git/ipfire-2.x into next 2015-10-27 17:31:19 +01:00
Arne Fitzenreiter
bd64e2a02a kernel: genksyms fix empty symbol crc.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-27 16:57:24 +01:00
Matthias Fischer
c267b2da2d snort 2.9.7.6: removed unrecognized configure options in lfs file
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-27 14:37:56 +00:00
Matthias Fischer
6e11539dc2 ntp: Update to 4.2.8p4
ntp-Update to 4.2.8p4, regarding "13 low- and medium-severity vulnerabilities".

For a complete list, see: http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-26 13:08:53 +00:00
Arne Fitzenreiter
a14e8d0256 Merge remote-tracking branch 'origin/master' into next 2015-10-25 09:21:12 +01:00
Arne Fitzenreiter
3a6784c065 ssh: preferre ecdsa cipher again.
Previous we had not configured it so the ssh default order was used.
Now we define it to disable dsa so we had to give the correct order but
in the example cfg rsa is prefered.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-24 12:07:29 +02:00
Arne Fitzenreiter
038169b894 kernel: uppdate to 3.14.55
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-23 11:00:03 +02:00
Arne Fitzenreiter
159c9eb9b1 Merge remote-tracking branch 'origin/master' into next 2015-10-22 13:11:17 +02:00
Arne Fitzenreiter
d7b82e7cce openssh: disable dsa key usage.
fixes #10934

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-22 13:08:27 +02:00
Arne Fitzenreiter
52daacc5c4 kernel: update to 3.14.54
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-21 18:48:32 +02:00
Dirk Wagner
4bb2df502d monit addon: Upgrade to 5.14
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-18 00:31:06 +01:00
Dirk Wagner
187154380c asterisk addon: Update to 11.20.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-18 00:31:04 +01:00
Stefan Schantl
a9929e324f ddns: Update to 009
This update contains the latest upstream changes which are
a better SSL error handling and support for desec.io.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-17 01:26:46 +01:00
Michael Tremer
80fbd89949 ipsec: Add block rules to avoid conntrack entries
If an IPsec VPN connections is not established, there are
rare cases when packets are supposed to be sent through
that said tunnel and incorrectly handled.

Those packets are sent to the default gateway an entry
for this connection is created in the connection tracking
table (usually only happens to UDP). All following packets
are sent the same route even after the tunnel has been
brought up. That leads to SIP phones not being able to
register among other things.

This patch adds firewall rules that these packets are
rejected. That will sent a notification to the client
that the tunnel is not up and avoid the connection to
be added to the connection tracking table.

Apart from a small performance penalty there should
be no other side-effects.

Fixes: #10908

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Cc: tomvend@rymes.com
Cc: daniel.weismueller@ipfire.org
Cc: morlix@morlix.de
Reviewed-by: Timo Eissler <timo.eissler@ipfire.org>
2015-10-15 22:44:47 +01:00
Stefan Schantl
a9a28430b5 tor.cgi: Fix missing country flag icons.
The CGI now is using the GeoIP::get_flag_icon function provided by the
geoip-functions.pl, which takes care of the changed flag icons shipped
by core update 90.

Fixes #10919.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Tested-by: Jan Paul Tuecking <jan.paul.tuecking@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-15 15:42:44 +01:00
Arne Fitzenreiter
0171486695 sox: Disable parallel build
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-04 16:01:33 +02:00
Michael Tremer
8235f17df5 strongswan: Update to 5.3.3
ChaCha is disabled since our kernel does not support it yet

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-03 19:17:01 +01:00
Michael Tremer
75ccb6a693 krb5: Disable parallel build
Builds of this package crash randomly on all architectures
which might be related to the parallel build.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-02 19:00:13 +01:00
Arne Fitzenreiter
1f011c6594 backports: add Tevii S482 patch
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-01 11:14:58 +02:00
Arne Fitzenreiter
16016ff2b0 Merge branch 'next' of git.ipfire.org:/pub/git/ipfire-2.x into next 2015-09-28 18:42:57 +02:00
Arne Fitzenreiter
db151fde63 igb: update to 5.3.3.2
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-09-28 18:39:26 +02:00
Arne Fitzenreiter
1d664fe1db e1000e: update to 3.2.4.2
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-09-28 18:38:55 +02:00