Commit Graph

4159 Commits

Author SHA1 Message Date
Arne Fitzenreiter
2eb67894ef binutils: update to 2.24
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2016-01-07 17:41:16 +01:00
Erik Kapfer
964700d414 openvpn: Update to version 2.3.7, added --verify-x509-name directive.
The tls-remote directive is deprecated and will be removed with
OpenVPN version 2.4 . Added instead --verify-x509-name HOST name
into ovpnmain.cgi.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-01-04 22:41:46 +00:00
Matthias Fischer
9977da131b bind: Update to 9.10.3-P2
Changelog:

[security]
Update allowed OpenSSL versions as named is potentially
vulnerable to CVE-2015-3193.

[maint]
H.ROOT-SERVERS.NET is 198.97.190.53 and 2001:500:1::53. [RT #40556]

[security]
Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted,
triggering a REQUIRE failure when those records
were subsequently cached. (CVE-2015-8000) [RT #40987]

[security]
Address fetch context reference count handling error
on socket error. (CVE-2015-8461) [RT#40945]

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-28 15:37:41 +01:00
Matthias Fischer
c3b4c861f5 dnsmasq 2.75: latest patches from upstream
Same procedure as... :-)

Best to all for xmas and 2016!

Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-28 15:35:34 +01:00
Arne Fitzenreiter
f25314afd7 vdr_eepg: fix source download.
the external server has changed the compression so the md5 has changed.
Always use the IPFire server as primary download source.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-25 12:45:05 +01:00
Arne Fitzenreiter
aa66842358 kernel: apply arm-multi grsecurity fixes only at arm-multi build 2015-12-23 10:14:26 +01:00
Michael Tremer
98b8cabf4d dnsdist: New package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 22:27:58 +00:00
Michael Tremer
6138d53bdd lua: New package
Simple scripting language. Supposed to be fast. Needed for dnsdist.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 22:27:39 +00:00
Michael Tremer
ffea9709f8 linux: Fix build of kernel and headers package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 22:25:18 +00:00
Michael Tremer
f295ca0cf7 kernel: Add grsecurity compile fix
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 13:58:46 +00:00
Michael Tremer
8675b78af9 gcc: Update to version 4.9.3
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 12:43:51 +00:00
Michael Tremer
9098b1e1c0 glibc: Fix headers to build with new GCC
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 12:40:38 +00:00
Michael Tremer
bdfd41c4f1 libmpc: New package
A dependency for GCC

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 12:40:26 +00:00
Matthias Fischer
c15da8c3b5 bind: Update to 9.10.3
bind: Update to 9.10.3

Security fixes:
An incorrect boundary check in the OPENPGPKEY rdatatype could trigger an assertion failure. This flaw is disclosed in CVE-2015-5986. [RT #40286]

A buffer accounting error could trigger an assertion failure when parsing certain malformed DNSSEC keys.
This flaw was discovered by Hanno Böck of the Fuzzing Project, and is disclosed in CVE-2015-5722. [RT #40212]

A specially crafted query could trigger an assertion failure in message.c.
This flaw was discovered by Jonathan Foote, and is disclosed in CVE-2015-5477. [RT #40046]

On servers configured to perform DNSSEC validation, an assertion failure could be triggered on answers from a specially configured server.
This flaw was discovered by Breno Silveira Soares, and is disclosed in CVE-2015-4620. [RT #39795]

Bug fixes:
Asynchronous zone loads were not handled correctly when the zone load was already in progress; this could trigger a crash in zt.c. [RT #37573]

A race during shutdown or reconfiguration could cause an assertion failure in mem.c. [RT #38979]

Some answer formatting options didn't work correctly with dig +short. [RT #39291]

Malformed records of some types, including NSAP and UNSPEC, could trigger assertion failures when loading text zone files. [RT #40274] [RT #40285]

Fixed a possible crash in ratelimiter.c caused by NOTIFY messages being removed from the wrong rate limiter queue. [RT #40350]

The default rrset-order of random was inconsistently applied. [RT #40456]

BADVERS responses from broken authoritative name servers were not handled correctly. [RT #40427]

Several bugs have been fixed in the RPZ implementation.

For a complete list, see:
https://kb.isc.org/article/AA-01306/0/BIND-9.10.3-Release-Notes.html

Regards,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 11:09:12 +00:00
Michael Tremer
54206b6e35 curl: Fix certificate validation
curl did not find the certificate bundle so that server
certificates could not be verified.

Fixes #10995

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-19 14:12:29 +00:00
Michael Tremer
4d7f9a81ac strongswan: Update to 5.3.5
Also ships a fix for #853 upstream.

Fixes #10998

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-19 14:09:10 +00:00
Matthias Fischer
44fb4620ee grub 2.00: Bugfix for CVE-2015-8370
See: http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html

"A vulnerability in Grub2 has been found. Versions from 1.98 (December, 2009)
to 2.02 (December, 2015) are affected. The vulnerability can be exploited
under certain circumstances, allowing local attackers to bypass any kind of
authentication (plain or hashed passwords). And so, the attacker may take
control of the computer."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-18 23:40:00 +00:00
Matthias Fischer
1e1b03d581 dnsmasq 2.75: latest upstream patches ;-)
The neverending story continues...

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-18 15:02:30 +00:00
Matthias Fischer
fbcc3cb784 dnsmasq 2.75: latest upstream patches
Since 'Makefile' was affected, I had to rewrite
'dnsmasq-Add-support-to-read-ISC-DHCP-lease-file.patch', too.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-18 15:02:26 +00:00
Alexander Marx
78af2f67bb Squid-Accounting: Bugfix & clean up data
There was a Bug in the addon so that no data was displayed because of a
typo. Additionally the computeraccounts are now filtered out of
trafficdata collection.
Only Proxy/AD/LDAP Accounts and IP adresses are collected.

Signed-off-by: Alexander Marx <alexander.marx@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-17 11:35:53 +00:00
Michael Tremer
429524c040 ntp: Prefer local clock
For some reason, ntp won't use a local clock even if it is
there and up and running. Therefore we need to "prefer" our
only source of time.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Daniel Weismüller <daniel.weismueller@ipfire.org>
2015-12-15 12:49:27 +00:00
Michael Tremer
93d6eed9a4 ntp: Fix syncing with local clock
This is a bug that was introduced with the latest release
from upstream

Fixes #10997
Upstream: http://bugs.ntp.org/show_bug.cgi?id=2965

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-15 12:39:19 +00:00
Matthias Fischer
50923742ba nano: Update to 2.5.0
Changelog: http://www.nano-editor.org/dist/v2.5/ChangeLog

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-13 22:28:31 +00:00
Michael Tremer
1b169a72da Speed up rootfile generation
The old usage of find walked through the entire filesystem tree
and excluded some paths from being printed. The more efficient
solution is to skip walking through excluded directories entirely.

This is a slight speedup of the build process by a few minutes.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-12 17:06:10 +00:00
Matthias Fischer
ca762aaf6e arping: Update to 2.15
arping: Update to 2.15

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Erik Kapfer <ummeegge@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-12 13:11:45 +00:00
Matthias Fischer
db1404051f clamav: Update to 0.99
clamav: Update to 0.99

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-11 18:46:02 +00:00
Matthias Fischer
4955d7239b rrdtool: Update to 1.5.5
rrdtool: Update to 1.5.5

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-11 18:43:24 +00:00
Matthias Fischer
db7d2b1312 Midnight Commander: Update to 4.8.15
Removed uncognized option: --with-samba

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-10 17:45:30 +00:00
Michael Tremer
b1372c3bef dma: Import patch for better authentication
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-10 16:35:09 +00:00
Michael Tremer
688a79a45e libpri: Honour CFLAGS
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:37 +00:00
Michael Tremer
b51ffa68db openvmtools: Update to version 10.0.5
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:31 +00:00
Michael Tremer
2b163f4497 Drop tripwire
This add-on is likely to be unused

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:27 +00:00
Michael Tremer
74e43e1493 xtables-addons: Make sure kernel module directory exists
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:23 +00:00
Michael Tremer
5b2155bfdd Drop cryptodev
This module isn't used by openssl any more and therefore
quite unnecessary.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:19 +00:00
Michael Tremer
5b2e3ab683 mISDNuser: Don't build with -Werror
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:13 +00:00
Michael Tremer
e31708279a liboping: Don't build with -Werror
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:08 +00:00
Michael Tremer
5c42412505 mdadm: Update to 3.3.4
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:17:13 +00:00
Michael Tremer
a5ba61b89b ebtables: Honour CFLAGS
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:17:08 +00:00
Michael Tremer
c7762365dc openssl: Update to 1.0.2e
OpenSSL Security Advisory [3 Dec 2015]
=======================================

NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE
0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS
PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS.

BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
==================================================================

Severity: Moderate

There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No
EC algorithms are affected. Analysis suggests that attacks against RSA and DSA
as a result of this defect would be very difficult to perform and are not
believed likely. Attacks against DH are considered just feasible (although very
difficult) because most of the work necessary to deduce information
about a private key may be performed offline. The amount of resources
required for such an attack would be very significant and likely only
accessible to a limited number of attackers. An attacker would
additionally need online access to an unpatched system using the target
private key in a scenario with persistent DH parameters and a private
key that is shared between multiple clients. For example this can occur by
default in OpenSSL DHE based SSL/TLS ciphersuites.

This issue affects OpenSSL version 1.0.2.

OpenSSL 1.0.2 users should upgrade to 1.0.2e

This issue was reported to OpenSSL on August 13 2015 by Hanno
Böck. The fix was developed by Andy Polyakov of the OpenSSL
development team.

Certificate verify crash with missing PSS parameter (CVE-2015-3194)
===================================================================

Severity: Moderate

The signature verification routines will crash with a NULL pointer dereference
if presented with an ASN.1 signature using the RSA PSS algorithm and absent
mask generation function parameter. Since these routines are used to verify
certificate signature algorithms this can be used to crash any certificate
verification operation and exploited in a DoS attack. Any application which
performs certificate verification is vulnerable including OpenSSL clients and
servers which enable client authentication.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q

This issue was reported to OpenSSL on August 27 2015 by Loïc Jonas Etienne
(Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL
development team.

X509_ATTRIBUTE memory leak (CVE-2015-3195)
==========================================

Severity: Moderate

When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
memory. This structure is used by the PKCS#7 and CMS routines so any
application which reads PKCS#7 or CMS data from untrusted sources is affected.
SSL/TLS is not affected.

This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q
OpenSSL 1.0.0 users should upgrade to 1.0.0t
OpenSSL 0.9.8 users should upgrade to 0.9.8zh

This issue was reported to OpenSSL on November 9 2015 by Adam Langley
(Google/BoringSSL) using libFuzzer. The fix was developed by Dr. Stephen
Henson of the OpenSSL development team.

Race condition handling PSK identify hint (CVE-2015-3196)
=========================================================

Severity: Low

If PSK identity hints are received by a multi-threaded client then
the values are wrongly updated in the parent SSL_CTX structure. This can
result in a race condition potentially leading to a double free of the
identify hint data.

This issue was fixed in OpenSSL 1.0.2d and 1.0.1p but has not been previously
listed in an OpenSSL security advisory. This issue also affects OpenSSL 1.0.0
and has not been previously fixed in an OpenSSL 1.0.0 release.

OpenSSL 1.0.2 users should upgrade to 1.0.2d
OpenSSL 1.0.1 users should upgrade to 1.0.1p
OpenSSL 1.0.0 users should upgrade to 1.0.0t

The fix for this issue can be identified in the OpenSSL git repository by commit
ids 3c66a669dfc7 (1.0.2), d6be3124f228 (1.0.1) and 1392c238657e (1.0.0).

The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

Note
====

As per our previous announcements and our Release Strategy
(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions
1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these
versions will be provided after that date. In the absence of significant
security issues being identified prior to that date, the 1.0.0t and 0.9.8zh
releases will be the last for those versions. Users of these versions are
advised to upgrade.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20151203.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-03 17:00:58 +00:00
Michael Tremer
ee3dec50a3 ramdisk: Make usage of ramdisk configurable
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-03 14:41:49 +00:00
Alexander Marx
c4a451eead Remove ramdisks for RRD databases
Ramdisks are very limited in space and as new graphs
are generated for OpenVPN N2N connections, etc. more
space is necessary.

This patch will enable ramdisks for all systems with more
than 490M of memory and allows the user to force using
a ramdisk on systems with less memory.

Signed-off-by: Alexander Marx <alexander.marx@ipfire.org>
Acked-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-03 13:14:23 +00:00
Arne Fitzenreiter
74e5c32e19 Merge branch 'master' into next 2015-12-02 21:39:20 +01:00
Arne Fitzenreiter
f59b59db96 dhcpcd: revert dhclient config before core91.
the new config has some ipv6 defaults that conflict with
t-com entertain.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-02 14:39:19 +01:00
Arne Fitzenreiter
4c031dc085 kernel: bump pak version for pae kernel.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-02 14:36:07 +01:00
Arne Fitzenreiter
1f182999bc cpufreq: change initscript for intel pstate driver.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-02 14:17:34 +01:00
Matthias Fischer
40e1bbda54 dnsmasq 2.75: latest upstream patches
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-01 22:35:21 +00:00
Michael Tremer
915c88931a strongswan: Update to 5.3.4
Fixes a security vulnerability in the EAP-MSCHAPv2 plugin
that is filed under CVE-2015-8023.

https://www.strongswan.org/blog/2015/11/16/strongswan-vulnerability-%28cve-2015-8023%29.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-11-19 12:52:31 +00:00
Arne Fitzenreiter
e9fbc1cecf boost: build also on x86 with -j2
boost need to much memory if it was build with more
than 2 parallel processes.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-11 22:05:15 +01:00
Arne Fitzenreiter
e42d35f496 kernel: update to 3.14.57
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-10 21:13:51 +01:00
Arne Fitzenreiter
c88002c48b ipset: fix build om arm.
Never hardcode KVER-ipfire in any patches because on arm there is no KVER-ipfire kernel.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-11-07 09:11:27 +01:00