Commit Graph

8173 Commits

Author SHA1 Message Date
Matthias Fischer
6deed5addb smartmontools: Update to 6.3 2014-11-07 12:47:08 +01:00
Arne Fitzenreiter
4091a94508 Merge branch 'next'
Conflicts:
	make.sh
2014-10-16 11:36:21 +02:00
Arne Fitzenreiter
f797c74a2b core85: set version to core85. 2014-10-16 11:34:20 +02:00
Michael Tremer
dadfa436c9 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2014-10-15 22:55:54 +02:00
Michael Tremer
a7006325c0 apache: Disable SSLv3 by default for the IPFire webinterface 2014-10-15 22:55:26 +02:00
Arne Fitzenreiter
6c4319a1b8 openssl-compat: update to 0.9.8zc 2014-10-15 21:44:29 +02:00
Michael Tremer
11a1a874e9 Create Core Update 85 2014-10-15 19:48:16 +02:00
Michael Tremer
877e2ef8bb openssl: Update to version 1.0.1j
OpenSSL Security Advisory [15 Oct 2014]
=======================================

SRTP Memory Leak (CVE-2014-3513)
================================

Severity: High

A flaw in the DTLS SRTP extension parsing code allows an attacker, who
sends a carefully crafted handshake message, to cause OpenSSL to fail
to free up to 64k of memory causing a memory leak. This could be
exploited in a Denial Of Service attack. This issue affects OpenSSL
1.0.1 server implementations for both SSL/TLS and DTLS regardless of
whether SRTP is used or configured. Implementations of OpenSSL that
have been compiled with OPENSSL_NO_SRTP defined are not affected.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.

This issue was reported to OpenSSL on 26th September 2014, based on an original
issue and patch developed by the LibreSSL project. Further analysis of the issue
was performed by the OpenSSL team.

The fix was developed by the OpenSSL team.

Session Ticket Memory Leak (CVE-2014-3567)
==========================================

Severity: Medium

When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
integrity of that ticket is first verified. In the event of a session
ticket integrity check failing, OpenSSL will fail to free memory
causing a memory leak. By sending a large number of invalid session
tickets an attacker could exploit this issue in a Denial Of Service
attack.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

This issue was reported to OpenSSL on 8th October 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

SSL 3.0 Fallback protection
===========================

Severity: Medium

OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
to block the ability for a MITM attacker to force a protocol
downgrade.

Some client applications (such as browsers) will reconnect using a
downgraded protocol to work around interoperability bugs in older
servers. This could be exploited by an active man-in-the-middle to
downgrade connections to SSL 3.0 even if both sides of the connection
support higher protocols. SSL 3.0 contains a number of weaknesses
including POODLE (CVE-2014-3566).

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
https://www.openssl.org/~bodo/ssl-poodle.pdf

Support for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller.

Build option no-ssl3 is incomplete (CVE-2014-3568)
==================================================

Severity: Low

When OpenSSL is configured with "no-ssl3" as a build option, servers
could accept and complete a SSL 3.0 handshake, and clients could be
configured to send them.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

This issue was reported to OpenSSL by Akamai Technologies on 14th October 2014.

The fix was developed by Akamai and the OpenSSL team.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv_20141015.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html
2014-10-15 19:19:15 +02:00
Ersan Yildirim
95a1679c6b Update Turkish translation 2014-10-13 10:19:45 +02:00
Arne Fitzenreiter
52dae2ba3f Merge branch 'next' 2014-10-10 18:13:13 +02:00
Arne Fitzenreiter
e3d5a18d4a core84: add update-lang-cache.
this file is missing on some machines.
2014-10-10 18:11:52 +02:00
Arne Fitzenreiter
215043936e Merge remote-tracking branch 'origin/next' 2014-10-07 18:37:01 +02:00
Michael Tremer
a21f2f6a76 firewall: Use correct interface for RED 2014-10-07 14:54:12 +02:00
Michael Tremer
474daba689 bash: Update to version 4.3.30
Fixes #10633.
2014-10-06 12:23:35 +02:00
Arne Fitzenreiter
24d36c80a6 p2pblock: fix flush rules if all p2p's are allowed. 2014-10-05 15:12:44 +02:00
Arne Fitzenreiter
2a5b19c56f p2pblock: ipp2p must run before CONNTRACK.
And can only used for blocking, not for accept conenections bacause connections must already established for detecting protocol types.
2014-10-04 17:39:51 +02:00
Arne Fitzenreiter
e43b21264f Merge branch 'next' 2014-10-04 13:53:49 +02:00
Michael Tremer
791c2b45d8 firewall: fix rules.pl for old rules without ratelimiting. 2014-10-04 13:52:15 +02:00
Michael Tremer
243f8ca6e9 squid: Update to 3.4.8
Contains some security fixes:

 * CVE-2014-6270
   http://www.squid-cache.org/Advisories/SQUID-2014_3.txt
 * CVE-2014-7141
   CVE-2014-7142
   http://www.squid-cache.org/Advisories/SQUID-2014_4.txt
2014-10-02 18:21:51 +02:00
Arne Fitzenreiter
8285512a18 Merge remote-tracking branch 'origin/next' 2014-09-30 23:53:00 +02:00
Arne Fitzenreiter
34b26caca1 bash: rootfile update. 2014-09-30 23:49:47 +02:00
Arne Fitzenreiter
8930d79dc2 Merge remote-tracking branch 'origin/next' 2014-09-30 19:30:45 +02:00
Michael Tremer
da8c74ee53 parted: Update to 3.1. 2014-09-30 19:28:55 +02:00
Arne Fitzenreiter
a00d943206 set PAK_VER to core84. 2014-09-30 09:33:27 +02:00
Arne Fitzenreiter
9bdc5896dd Merge remote-tracking branch 'origin/next' 2014-09-30 09:32:01 +02:00
Michael Tremer
efa808ba11 readline: Re-add accidentially deleted patches of -compat package 2014-09-29 22:43:04 +02:00
Michael Tremer
801dcd70b0 bash: Import patch for version 4.3.27
See #10633
2014-09-29 21:29:57 +02:00
Michael Tremer
625c95d2be core84: Add updated readline 2014-09-29 13:52:16 +02:00
Michael Tremer
c02899be04 readline: Update to 6.3. 2014-09-29 13:51:26 +02:00
Michael Tremer
3347f993b6 bash: Import upstream fixes 2014-09-29 13:50:03 +02:00
Michael Tremer
56a435a001 bash: Import fix for CVE-2014-7169
http://www.openwall.com/lists/oss-security/2014/09/25/10

Conflicts:
	lfs/bash
2014-09-29 13:49:56 +02:00
Michael Tremer
77b3d64a16 bash: Fix for CVE-2014-6271
A flaw was found in the way Bash evaluated certain specially crafted
environment variables. An attacker could use this flaw to override
or bypass environment restrictions to execute shell commands.
Certain services and applications allow remote unauthenticated
attackers to provide environment variables, allowing them to exploit
this issue.
2014-09-29 13:49:51 +02:00
Michael Tremer
ce84ace5bf bash: Update to 4.3.
Conflicts:
	lfs/bash
2014-09-29 13:49:39 +02:00
Arne Fitzenreiter
416bf5f3f9 fix merge problem. 2014-09-29 13:44:26 +02:00
Michael Tremer
9a818c0eb4 core84: Add changed /etc/rc.d/init.d/network 2014-09-28 13:32:17 +02:00
Michael Tremer
09e0890109 Merge remote-tracking branch 'teissler/bug_10454' into next 2014-09-28 13:31:53 +02:00
Timo Eissler
1d4897f308 network: move start of static-routes
Fixes #10454

Create static routes after network interfaces are initialised.
2014-09-27 23:28:04 +02:00
Timo Eissler
d51e490664 network: fix coding style 2014-09-27 23:16:57 +02:00
Michael Tremer
478d8bb5da Merge remote-tracking branch 'teissler/bug_10535' into next 2014-09-27 23:00:05 +02:00
Michael Tremer
627fdda8e8 Fix wording. Remove "got".
Fixes #10632
2014-09-27 22:59:05 +02:00
Timo Eissler
1c4308c1f2 urlfilter.cgi: enhance file extension blocking
Fixes #10535

Add flv, mkv and mp4 as audio/video file exentions.
Add 7z as archive file extension.
2014-09-27 22:24:26 +02:00
Michael Tremer
b7981215da core84: Add changed urlfilter.cgi 2014-09-27 20:43:49 +02:00
Michael Tremer
0e6e5d46c1 Merge remote-tracking branch 'teissler/Bug_10415' into next 2014-09-27 20:43:23 +02:00
Timo Eissler
6ae884e5f9 urlfilter.cgi: safe search enhancements
Fixes: #10415

Activate bing safe search.
Add nwshp to google url patterns.
2014-09-26 22:15:13 +02:00
Alexander Marx
d71bcfce59 squid-accounting: set right permissions of html directory for graphs and logo 2014-09-26 13:05:22 +02:00
Michael Tremer
21df0788ab core84: Add changed files from #10620 2014-09-26 13:03:48 +02:00
Michael Tremer
7e09a94a81 Merge remote-tracking branch 'amarx/BUG10620' into next 2014-09-26 13:03:22 +02:00
Michael Tremer
60bce6ba6a Merge remote-tracking branch 'amarx/BUG10615' into next 2014-09-26 13:02:28 +02:00
Michael Tremer
2acc3cd9e7 core84: Add changed files from fw-checksubnet branch 2014-09-26 13:00:38 +02:00
Michael Tremer
b14e0f7d0e Merge remote-tracking branch 'amarx/fw-checksubnet' into next 2014-09-26 12:59:26 +02:00