Commit Graph

2287 Commits

Author SHA1 Message Date
Michael Tremer
b651586493 apcupsd: Bump package release number. 2012-08-24 16:14:16 +02:00
Przemek Zdroik
6bea011ac9 apcupsd: updated to version 3.14.10 (directly from sf.net) 2012-08-24 16:11:33 +02:00
Michael Tremer
d23fc91220 Add a script to create VLAN interfaces (on console). 2012-08-24 15:58:38 +02:00
Erik Kapfer
3eeb913b05 nmap: Update to 6.01. 2012-08-24 15:47:01 +02:00
Erik Kapfer
9d0acf61e0 fping: New package. 2012-08-24 15:44:11 +02:00
Michael Tremer
e967320c35 icecc: Update to 0.9.7.
Add patch for ARM support.
2012-08-10 14:28:33 +02:00
Michael Tremer
3bdc010272 New package: minidlna.
Yet another UPnP/DLNA server.
2012-08-08 10:48:55 +02:00
Michael Tremer
946a2afee8 New packages: flac+libexif. 2012-08-07 20:29:06 +02:00
Michael Tremer
45fba4eaff nasm: Update to 2.10.03.
nasm >= 2.0 is required to build flac.
2012-08-07 20:21:06 +02:00
Arne Fitzenreiter
50ffddd92b usb-modeswitch-data: update database to 20120531. 2012-07-06 22:51:49 +02:00
Arne Fitzenreiter
4e7ad99212 GeoIP: update database to 04072012. 2012-07-06 17:05:51 +02:00
Arne Fitzenreiter
eba8a82614 squid: update to 3.1.20. 2012-07-03 13:41:13 +02:00
Arne Fitzenreiter
0aa49a6b3b php: security update to 5.3.14.
The release fixes multiple security issues: A weakness in the DES implementation of crypt and a heap overflow issue in the phar extension

PHP 5.4.4 and PHP 5.3.14 fixes over 30 bugs. Please note that the use of php://fd streams is now restricted to the CLI SAPI.
2012-07-03 09:48:49 +02:00
Arne Fitzenreiter
0d42931bcd samba: update to 3.5.16. 2012-07-02 15:16:23 +02:00
Erik Kapfer
6140e7e0c2 openvpn: Introduce CCD. 2012-06-20 19:58:38 +02:00
Michael Tremer
953073459e Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2012-06-20 15:40:28 +02:00
Michael Tremer
16d026cbcb Merge remote-tracking branch 'jlentfer/logwatch' into next 2012-06-20 11:54:00 +02:00
Jan Lentfer
9f5e031e6d logwatch: Enable Date::Manip 6.x support (using interface v5) 2012-06-20 11:47:30 +02:00
Arne Fitzenreiter
dd0411c646 clamav: update to 0.97.5. 2012-06-19 21:24:51 +02:00
Michael Tremer
df106d88e5 Merge remote-tracking branch 'jlentfer/foomatic' into next 2012-06-17 20:27:19 +02:00
Jan Lentfer
477e28cf0d foomatic: Clean out /usr/share/foomatic prior to build to prevent hangs 2012-06-17 20:23:35 +02:00
Jan Lentfer
e659ba5b3a asterisk: Update to 1.8.13.0.
The 1.4 branch of asterisk does not build with the new flex and bison.
Also, the 1.4 branch was EOL'ed April 2012. The 1.8 branch has long
term support until 2015.

This patch also update chan_capi to the most recent version (HEAD),
as this is the only one that compiles with asterisk 1.8.

Asterisk 1.8 ships addons as part of the main tarball.
Asterisk 1.8 has no build in mp3 support anymore, mp3 libs need to be
downloaded seperatly via svn
(see asterisk-1.8.13.0/contrib/scripts/get_mp3_source.sh).
This patch DOES NOT include mp3 support.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:15 +02:00
Jan Lentfer
ce1f2fdb11 lcr: Update to 1.10.
This is a prerequisite for updating asterisk.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:13 +02:00
Jan Lentfer
f48a9af787 pam: Update 0.99.10.0.
The prior verion in base system did not build with
the new version of bison and flex.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:10 +02:00
Jan Lentfer
1477d98572 flex: Update to 2.5.35.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:08 +02:00
Jan Lentfer
f32b3974b4 m4: Update to 1.4.16.
This is a prerequisite for updating bison and flex

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:05 +02:00
Jan Lentfer
5794d15497 bison: Update to 2.5.1.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2012-06-17 17:00:00 +02:00
Michael Tremer
81b2c3f165 squid: Enable ICAP client. 2012-06-13 15:43:27 +02:00
Arne Fitzenreiter
a832f4f33e Merge remote-tracking branch 'origin/core60' into next
Conflicts:
	config/rootfiles/core/59/update.sh
	lfs/strongswan
	make.sh
2012-06-01 17:30:54 +02:00
Arne Fitzenreiter
6105282deb strongswan: security update to 4.6.4 (fix CVE-2012-2388).
RSA signature verification vulnerability
see http://http://www.strongswan.org/blog/2012/05/31/strongswan-4.6.4-released-%28cve-2012-2388%29.html for details.
2012-06-01 12:47:07 +02:00
Erik Kapfer
e70bd5b742 mtr+tcpick: Two new binary addons. 2012-05-27 21:36:44 +02:00
Michael Tremer
7de1da3fdf fireinfo: Update to 2.1.5.
Fixes issues on the Raspberry Pi Computer.
2012-05-19 11:22:18 +02:00
Arne Fitzenreiter
c7c8b4aaec GeoIP: update database to 01052012. 2012-05-12 19:35:10 +02:00
Arne Fitzenreiter
db083dd81e dhcpcd: ignore MTU Smaller than 577.
Normally 576 is the smallest valid mtu but some cable provider set this
also if they support much higher mtu's. Fedora does not accept
this to prevent speed problems with such isp connections so we do the same.
If you really need mtu=576 you can still force at at the setup.
2012-05-12 19:34:47 +02:00
Arne Fitzenreiter
58574e318b php: security update to 5.3.13 (CVE-2012-2311). 2012-05-12 19:34:19 +02:00
Arne Fitzenreiter
dc7239d678 openssh: update to 6.0p1. 2012-05-12 19:33:54 +02:00
Arne Fitzenreiter
8074eed711 openssl: security update to 0.9.8x (CVE-2012-2333).
Invalid TLS/DTLS record attack (CVE-2012-2333)
===============================================

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and
DTLS can be exploited in a denial of service attack on both clients and
servers.

DTLS applications are affected in all versions of OpenSSL. TLS is only
affected in OpenSSL 1.0.1 and later.

Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing
as a service testing platform.

The fix was developed by Stephen Henson of the OpenSSL core team.

Affected users should upgrade to OpenSSL 1.0.1c, 1.0.0j or 0.9.8x

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120510.txt
2012-05-12 19:33:31 +02:00
Arne Fitzenreiter
68eeed8285 traceroute: update to 2.0.18 and fix name resolution.
fixes #10097
2012-05-12 19:32:23 +02:00
Arne Fitzenreiter
d66d6f8827 strongswan: update to 4.6.3. 2012-05-12 19:31:46 +02:00
Arne Fitzenreiter
36585d00bd python: update to 2.7.3. 2012-05-12 19:31:17 +02:00
Arne Fitzenreiter
a6f4183e83 openssl: security update to 0.9.8w. (CVE-2012-2131).
SN1 BIO incomplete fix (CVE-2012-2131)
=======================================

It was discovered that the fix for CVE-2012-2110 released on 19 Apr
2012 was not sufficient to correct the issue for OpenSSL 0.9.8.

Please see http://www.openssl.org/news/secadv_20120419.txt for details
of that vulnerability.

This issue only affects OpenSSL 0.9.8v.  OpenSSL 1.0.1a and 1.0.0i
already contain a patch sufficient to correct CVE-2012-2110.

Thanks to Red Hat for discovering and fixing this issue.

Affected users should upgrade to 0.9.8w.

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120424.txt
2012-05-12 19:28:24 +02:00
Arne Fitzenreiter
7f76d8cb4a GeoIP: update database to 01052012. 2012-05-12 19:15:38 +02:00
Arne Fitzenreiter
4a3ae7fa37 dhcpcd: ignore MTU Smaller than 577.
Normally 576 is the smallest valid mtu but some cable provider set this
also if they support much higher mtu's. Fedora does not accept
this to prevent speed problems with such isp connections so we do the same.
If you really need mtu=576 you can still force at at the setup.
2012-05-12 17:13:45 +02:00
Arne Fitzenreiter
be5a3b36a7 php: security update to 5.3.13 (CVE-2012-2311). 2012-05-12 15:33:42 +02:00
Arne Fitzenreiter
d7d2dca964 openssh: update to 6.0p1. 2012-05-12 15:32:47 +02:00
Arne Fitzenreiter
423d77a71f openssl: security update to 0.9.8x (CVE-2012-2333).
Invalid TLS/DTLS record attack (CVE-2012-2333)
===============================================

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and
DTLS can be exploited in a denial of service attack on both clients and
servers.

DTLS applications are affected in all versions of OpenSSL. TLS is only
affected in OpenSSL 1.0.1 and later.

Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing
as a service testing platform.

The fix was developed by Stephen Henson of the OpenSSL core team.

Affected users should upgrade to OpenSSL 1.0.1c, 1.0.0j or 0.9.8x

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120510.txt
2012-05-12 15:30:38 +02:00
Arne Fitzenreiter
6666803d83 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2012-05-06 12:54:13 +02:00
Arne Fitzenreiter
9070a6c331 traceroute: update to 2.0.18 and fix name resolution.
fixes #10097
2012-05-06 12:51:14 +02:00
Arne Fitzenreiter
a526de38bc strongswan: update to 4.6.3. 2012-05-05 23:25:07 +02:00
Arne Fitzenreiter
6bdc390235 python: update to 2.7.3. 2012-05-05 23:23:53 +02:00