Commit Graph

2670 Commits

Author SHA1 Message Date
Michael Tremer
fb39daffef core96: Ship updated mdadm
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:17:51 +00:00
Michael Tremer
c7762365dc openssl: Update to 1.0.2e
OpenSSL Security Advisory [3 Dec 2015]
=======================================

NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE
0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS
PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS.

BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
==================================================================

Severity: Moderate

There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No
EC algorithms are affected. Analysis suggests that attacks against RSA and DSA
as a result of this defect would be very difficult to perform and are not
believed likely. Attacks against DH are considered just feasible (although very
difficult) because most of the work necessary to deduce information
about a private key may be performed offline. The amount of resources
required for such an attack would be very significant and likely only
accessible to a limited number of attackers. An attacker would
additionally need online access to an unpatched system using the target
private key in a scenario with persistent DH parameters and a private
key that is shared between multiple clients. For example this can occur by
default in OpenSSL DHE based SSL/TLS ciphersuites.

This issue affects OpenSSL version 1.0.2.

OpenSSL 1.0.2 users should upgrade to 1.0.2e

This issue was reported to OpenSSL on August 13 2015 by Hanno
Böck. The fix was developed by Andy Polyakov of the OpenSSL
development team.

Certificate verify crash with missing PSS parameter (CVE-2015-3194)
===================================================================

Severity: Moderate

The signature verification routines will crash with a NULL pointer dereference
if presented with an ASN.1 signature using the RSA PSS algorithm and absent
mask generation function parameter. Since these routines are used to verify
certificate signature algorithms this can be used to crash any certificate
verification operation and exploited in a DoS attack. Any application which
performs certificate verification is vulnerable including OpenSSL clients and
servers which enable client authentication.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q

This issue was reported to OpenSSL on August 27 2015 by Loïc Jonas Etienne
(Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL
development team.

X509_ATTRIBUTE memory leak (CVE-2015-3195)
==========================================

Severity: Moderate

When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
memory. This structure is used by the PKCS#7 and CMS routines so any
application which reads PKCS#7 or CMS data from untrusted sources is affected.
SSL/TLS is not affected.

This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q
OpenSSL 1.0.0 users should upgrade to 1.0.0t
OpenSSL 0.9.8 users should upgrade to 0.9.8zh

This issue was reported to OpenSSL on November 9 2015 by Adam Langley
(Google/BoringSSL) using libFuzzer. The fix was developed by Dr. Stephen
Henson of the OpenSSL development team.

Race condition handling PSK identify hint (CVE-2015-3196)
=========================================================

Severity: Low

If PSK identity hints are received by a multi-threaded client then
the values are wrongly updated in the parent SSL_CTX structure. This can
result in a race condition potentially leading to a double free of the
identify hint data.

This issue was fixed in OpenSSL 1.0.2d and 1.0.1p but has not been previously
listed in an OpenSSL security advisory. This issue also affects OpenSSL 1.0.0
and has not been previously fixed in an OpenSSL 1.0.0 release.

OpenSSL 1.0.2 users should upgrade to 1.0.2d
OpenSSL 1.0.1 users should upgrade to 1.0.1p
OpenSSL 1.0.0 users should upgrade to 1.0.0t

The fix for this issue can be identified in the OpenSSL git repository by commit
ids 3c66a669dfc7 (1.0.2), d6be3124f228 (1.0.1) and 1392c238657e (1.0.0).

The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

Note
====

As per our previous announcements and our Release Strategy
(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions
1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these
versions will be provided after that date. In the absence of significant
security issues being identified prior to that date, the 1.0.0t and 0.9.8zh
releases will be the last for those versions. Users of these versions are
advised to upgrade.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20151203.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-03 17:00:58 +00:00
Michael Tremer
228bec09bf ramdisk: Migrate everything during the update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-03 16:34:59 +00:00
Michael Tremer
84c5f0d66d ramdisk: Move crontab back to disk
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-03 14:57:30 +00:00
Arne Fitzenreiter
74e5c32e19 Merge branch 'master' into next 2015-12-02 21:39:20 +01:00
Arne Fitzenreiter
e5d5819437 core95: don't update snort.conf.
because this will erase selected rules.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-02 14:48:01 +01:00
Arne Fitzenreiter
f59b59db96 dhcpcd: revert dhclient config before core91.
the new config has some ipv6 defaults that conflict with
t-com entertain.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-02 14:39:19 +01:00
Michael Tremer
7fd716f81c core96: Don't restart services that have not been updated
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-01 22:37:07 +00:00
Michael Tremer
5a0ddc615d core96: Ship updated dnsmasq
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-01 22:36:21 +00:00
Michael Tremer
0b075172af core96: Ship changed files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-19 12:54:41 +00:00
Michael Tremer
915c88931a strongswan: Update to 5.3.4
Fixes a security vulnerability in the EAP-MSCHAPv2 plugin
that is filed under CVE-2015-8023.

https://www.strongswan.org/blog/2015/11/16/strongswan-vulnerability-%28cve-2015-8023%29.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-19 12:52:31 +00:00
Michael Tremer
06988eaf49 core96: Ship updated core initscript
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-18 17:31:32 +00:00
Arne Fitzenreiter
dccbe309d2 core96: add pakfire changes to updater 2015-11-11 15:01:13 +01:00
Arne Fitzenreiter
cfac8f9476 start core96
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-11 14:49:02 +01:00
Michael Tremer
a9efe3bd68 core95: Add changed network-functions.pl to updater
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-09 17:33:50 +00:00
Arne Fitzenreiter
f7d4c48ded core95: ship settime and timecheck scripts.
on some installations this scripts are outdated.
Fixes: #10976

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-08 18:03:53 +01:00
Arne Fitzenreiter
f75dee7afd core95: exclude ntp config files.
Fixes: #10974

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-08 15:45:15 +01:00
Arne Fitzenreiter
769a0c072a core95: exclude dma config files.
Fixes: #10975

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-08 15:42:53 +01:00
Arne Fitzenreiter
28bee14ecc core95: add ipset to updater.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-08 10:04:13 +01:00
Michael Tremer
9ce3b858a6 core95: Ship changed mail.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-05 15:35:46 +00:00
Michael Tremer
87fb870b5e core95: Ship updated packages
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-04 21:20:14 +00:00
Michael Tremer
71af643cda openvpn: Add option to download a client package with PEM files
This patch adds the option to download a client package
that comes with a regular PEM and key file instead of a
PKCS12 file which is easier to use with clients that
don't support PKCS12 (like iOS) opposed to converting
the file manually.

This requires that the connection is created without
using a password for the certificate. Then the certificate
is already stored in an insecure way.

This patch also adds this to the Core Update 95 updater.

Fixes: #10966

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
CC: Alexander Marx <alexander.marx@ipfire.org>
2015-11-04 21:10:41 +00:00
Arne Fitzenreiter
123205fdbf core95: add upadated backup exclude list.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-01 21:49:22 +01:00
Michael Tremer
6feea5f778 credits.cgi: Update credits
Promotes Alexander Marx to the group of Core Developers.

Also lots of reformatting of old HTML code.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-31 21:41:58 +00:00
Arne Fitzenreiter
12b5c00d3e core95: add kernel to updater.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-31 17:41:25 +01:00
Arne Fitzenreiter
ec72ebbfda core95: add ntp, backup and geoip changes to updater.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-31 17:07:01 +01:00
Michael Tremer
2b952557f4 core95: Ship DHCP RFC2136 changes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-21 13:52:22 +01:00
Michael Tremer
4e8949e817 core95: Ship changed routing.cgi file
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-18 19:20:18 +01:00
Michael Tremer
307327a946 core95: Ship changed firewall.cgi file
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-18 19:19:31 +01:00
Michael Tremer
924f5d6f1a core95: Ship changed firewalllogcountry.dat
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-18 18:54:25 +01:00
Michael Tremer
ea3eac2c50 core95: Ship changed pppsetup.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-18 18:52:07 +01:00
Michael Tremer
f439097499 core95: Ship ddns update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-17 01:27:07 +01:00
Michael Tremer
075b6e10db core95: Ship IPsec blocking changes
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-15 22:46:33 +01:00
Michael Tremer
8235f17df5 strongswan: Update to 5.3.3
ChaCha is disabled since our kernel does not support it yet

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-10-03 19:17:01 +01:00
Michael Tremer
55eb745e65 core95: Ship changed files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-28 14:35:54 +01:00
Michael Tremer
c400bc2d7d core95: Ship changed files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-28 14:25:53 +01:00
Michael Tremer
4b046d735d Start Core Update 95
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-28 14:08:27 +01:00
Michael Tremer
9dd14089ce core94: Fix dead symlinks in filelist
The rootfiles have been renamed, but not the symlinks
were not.

Fixes #10931

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-28 11:59:20 +01:00
Arne Fitzenreiter
8f1fe7c531 core94: fix chrontab modification check for dma.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-09-27 10:56:34 +02:00
Arne Fitzenreiter
ccb8e47d0e core94: allow rootlogin only if the user has not blocked it before.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-09-27 10:42:38 +02:00
Arne Fitzenreiter
d82c564b23 core94: fix sed syntax.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-09-27 10:42:01 +02:00
Michael Tremer
ed5fee308f core94: Ship changed CGI files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-21 16:46:21 +01:00
Michael Tremer
34ca230867 core94: Ship changed setup package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-20 13:31:58 +01:00
Michael Tremer
83490805a4 core94: Ship updated initscripts
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-19 18:51:38 +01:00
Michael Tremer
048c2ff77d core94: Ship updated iproute2 package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-19 18:50:14 +01:00
Michael Tremer
c97b3aa372 core94: Add changed snort initscript
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-14 23:21:48 +01:00
Michael Tremer
5a9e755a2a core94: Add recently updated packages
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-12 16:47:12 +01:00
Michael Tremer
f6529a04a3 IPsec: Add option to force using MOBIKE
Some peers that are behind a NAT router that fails
to properly forward IKE packets on UDP port 500 cannot
establish an IPsec connection. MOBIKE tries to solve that
by sending these packets to UDP port 4500 instead.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-10 13:35:24 +01:00
Michael Tremer
71940784ef fireinfo: Import upstream patch
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-09-01 00:12:31 +01:00
Michael Tremer
e9358dccee core94: Ship updated squid
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-08-31 23:35:52 +01:00