Commit Graph

3553 Commits

Author SHA1 Message Date
Arne Fitzenreiter
56e211f66e u-boot: update to 2014.4. and add BPi support. 2014-12-19 07:12:40 +01:00
Arne Fitzenreiter
9894fb91f1 kernel: update to 3.14.27. 2014-12-19 07:10:50 +01:00
Michael Tremer
bbf2fe8902 fireinfo: Import latest patches 2014-12-15 23:28:35 +01:00
Arne Fitzenreiter
9982e01913 kernel: update to 3.14.26. 2014-12-07 20:48:32 +01:00
Arne Fitzenreiter
4d84d320a8 iw: update to 3.14. 2014-12-07 11:11:41 +01:00
Arne Fitzenreiter
32787fb0df kernel: add patches for rt5572 wlan chipset. 2014-12-07 10:55:24 +01:00
Michael Tremer
0c5dcca2ee openvpn: Update to 2.3.6
Fixes CVE-2014-8104
2014-12-02 12:28:49 +01:00
Arne Fitzenreiter
c3efda65df linux-initrd: skip initrd build of pae and rpi kernel. 2014-11-30 09:30:58 +01:00
Arne Fitzenreiter
d70f58f60c samba: fix mode of winbindd_privileged folder. 2014-11-30 09:25:56 +01:00
Arne Fitzenreiter
b3f5e2b2a9 remove more enused patches. 2014-11-30 01:45:15 +01:00
Arne Fitzenreiter
a158cbbb1d kenrel: fix build 2nd try. 2014-11-28 07:27:45 +01:00
Arne Fitzenreiter
cee50e12f6 kernel: fix build. 2014-11-27 07:57:54 +01:00
Arne Fitzenreiter
e40740b2e2 kernel: headers still not build with grsec patch on i586. 2014-11-27 07:48:05 +01:00
Arne Fitzenreiter
9156480159 Merge branch 'seventeen' of git.ipfire.org:/pub/git/ipfire-2.x into seventeen 2014-11-27 07:34:41 +01:00
Arne Fitzenreiter
01e64ad131 kernel: remove obsolete modules and patches. 2014-11-27 07:33:50 +01:00
Michael Tremer
df24f329fd tzdata: Fix build to include leap seconds 2014-11-23 01:16:12 +01:00
Michael Tremer
8b48e20bb3 tzdata: Update to 2014j 2014-11-23 01:01:58 +01:00
Arne Fitzenreiter
302fbdccc2 kernel: update to 3.14.25. 2014-11-22 23:13:49 +01:00
Arne Fitzenreiter
69640b0fcd kernel: fix rpi patches. 2014-11-17 06:31:29 +01:00
Arne Fitzenreiter
557d7459f5 kernel: update to 3.14.24. 2014-11-16 15:49:51 +01:00
Arne Fitzenreiter
817317ed9e kernel: update netdev ledtrigger patch. 2014-11-06 20:16:58 +01:00
Arne Fitzenreiter
0565657116 flash-images: use third partition again as root. 2014-11-06 00:06:43 +01:00
Michael Tremer
07686bd7e2 Merge remote-tracking branch 'origin/seventeen' into seventeen 2014-11-04 23:52:28 +01:00
Michael Tremer
bfb421f1bb fireinfo: Import latest fixes for ARM 2014-11-04 23:52:02 +01:00
Arne Fitzenreiter
21147a00f2 kernel: readd kirkwood legacy boot code. 2014-11-04 20:21:05 +01:00
Sascha Kilian
282c47bcb4 nagios+icinga plugins: removed ipv6 support 2014-11-03 23:16:19 +01:00
Arne Fitzenreiter
22820bf256 kernel: use correct external modules at initrd build. 2014-11-01 23:04:38 +01:00
Arne Fitzenreiter
932a34e57e kernel: patches and preliminary 3.14 config for arm. 2014-11-01 17:26:09 +01:00
Arne Fitzenreiter
9b35b114a0 flash-images: distro image is not compressed on arm. 2014-11-01 17:23:40 +01:00
Arne Fitzenreiter
9f5f4957cb Merge remote-tracking branch 'origin/seventeen' into kernel-test-next 2014-10-31 17:32:58 +01:00
Erik Kapfer
940c90d098 New Addon: tmux 2014-10-30 17:52:50 +01:00
Michael Tremer
99154ed19d squidclamav: Fix an error when parsing the client IP address 2014-10-30 17:49:43 +01:00
Michael Tremer
bb882aa1f9 strongswan: Update to 5.2.1 2014-10-26 21:00:08 +01:00
Michael Tremer
8acdb5225d glibc: Fix build on x86
Some files that are patched for ARM are not available
on the x86 source tree. Hence the sed command should not
be executed.
2014-10-26 20:51:14 +01:00
Michael Tremer
57629914e8 Merge remote-tracking branch 'origin/seventeen' into seventeen
Conflicts:
	make.sh
2014-10-26 20:11:57 +01:00
Arne Fitzenreiter
9d3616dc51 kernel: update to 3.14.22 (intel only yet). 2014-10-26 16:40:04 +01:00
Arne Fitzenreiter
048fb6b9ea cryptodev: update to unreleased 1.7 from git. 2014-10-26 16:38:38 +01:00
Arne Fitzenreiter
c409c33526 glibc: fix build on intel platform. 2014-10-26 16:37:44 +01:00
Michael Tremer
c0511f3ab3 installer: Rework downloading ISO and allow using a custom URL 2014-10-25 14:56:23 +02:00
Arne Fitzenreiter
b76a0377be Merge branch 'kernel-test' into seventeen 2014-10-24 12:00:34 +02:00
Arne Fitzenreiter
dbd34ac0f2 kernel: fix build on rpi. 2014-10-24 11:58:00 +02:00
Arne Fitzenreiter
f2a7ec21e3 kernel: fix uInit ramdisk build. 2014-10-23 21:58:23 +02:00
Michael Tremer
541fb9a8a1 glibc: fix build with new patches. 2014-10-23 21:57:36 +02:00
Arne Fitzenreiter
af886d0140 tzdata: fix build with new coreutils. 2014-10-22 21:34:42 +02:00
Arne Fitzenreiter
3a317084d6 Revert "Revert "toolchain: Fix compiling due to Stack Protector changes.""
This reverts commit 4ec728f840.
2014-10-22 13:49:54 +02:00
Michael Tremer
6e0b26ba7d Merge branch 'install-raid' into seventeen
Conflicts:
	make.sh
2014-10-15 23:39:20 +02:00
Michael Tremer
38c6822d3c installer: Make restoring the backup interactive 2014-10-15 23:38:05 +02:00
Arne Fitzenreiter
6c4319a1b8 openssl-compat: update to 0.9.8zc 2014-10-15 21:44:29 +02:00
Arne Fitzenreiter
6f23e39ee2 kernel: fix build for rpi.
the eMMC patch is also inside of the rpi patchset from rpi-foundation so it cannot applied again.
2014-10-15 20:42:38 +02:00
Michael Tremer
877e2ef8bb openssl: Update to version 1.0.1j
OpenSSL Security Advisory [15 Oct 2014]
=======================================

SRTP Memory Leak (CVE-2014-3513)
================================

Severity: High

A flaw in the DTLS SRTP extension parsing code allows an attacker, who
sends a carefully crafted handshake message, to cause OpenSSL to fail
to free up to 64k of memory causing a memory leak. This could be
exploited in a Denial Of Service attack. This issue affects OpenSSL
1.0.1 server implementations for both SSL/TLS and DTLS regardless of
whether SRTP is used or configured. Implementations of OpenSSL that
have been compiled with OPENSSL_NO_SRTP defined are not affected.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.

This issue was reported to OpenSSL on 26th September 2014, based on an original
issue and patch developed by the LibreSSL project. Further analysis of the issue
was performed by the OpenSSL team.

The fix was developed by the OpenSSL team.

Session Ticket Memory Leak (CVE-2014-3567)
==========================================

Severity: Medium

When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
integrity of that ticket is first verified. In the event of a session
ticket integrity check failing, OpenSSL will fail to free memory
causing a memory leak. By sending a large number of invalid session
tickets an attacker could exploit this issue in a Denial Of Service
attack.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

This issue was reported to OpenSSL on 8th October 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

SSL 3.0 Fallback protection
===========================

Severity: Medium

OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
to block the ability for a MITM attacker to force a protocol
downgrade.

Some client applications (such as browsers) will reconnect using a
downgraded protocol to work around interoperability bugs in older
servers. This could be exploited by an active man-in-the-middle to
downgrade connections to SSL 3.0 even if both sides of the connection
support higher protocols. SSL 3.0 contains a number of weaknesses
including POODLE (CVE-2014-3566).

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
https://www.openssl.org/~bodo/ssl-poodle.pdf

Support for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller.

Build option no-ssl3 is incomplete (CVE-2014-3568)
==================================================

Severity: Low

When OpenSSL is configured with "no-ssl3" as a build option, servers
could accept and complete a SSL 3.0 handshake, and clients could be
configured to send them.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

This issue was reported to OpenSSL by Akamai Technologies on 14th October 2014.

The fix was developed by Akamai and the OpenSSL team.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv_20141015.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html
2014-10-15 19:19:15 +02:00