Commit Graph

8336 Commits

Author SHA1 Message Date
Michael Tremer
8acdb5225d glibc: Fix build on x86
Some files that are patched for ARM are not available
on the x86 source tree. Hence the sed command should not
be executed.
2014-10-26 20:51:14 +01:00
Michael Tremer
57629914e8 Merge remote-tracking branch 'origin/seventeen' into seventeen
Conflicts:
	make.sh
2014-10-26 20:11:57 +01:00
Michael Tremer
681c9bbe61 installer: Implement option to run a postinstall script in the installer 2014-10-26 20:11:04 +01:00
Michael Tremer
a8fca24560 installer: Allow to disable creation of swap space on command line 2014-10-26 16:00:03 +01:00
Michael Tremer
335c5bd1cd installer: Fix loads of compiler warnings 2014-10-25 15:54:45 +02:00
Michael Tremer
c0511f3ab3 installer: Rework downloading ISO and allow using a custom URL 2014-10-25 14:56:23 +02:00
Arne Fitzenreiter
f2a7ec21e3 kernel: fix uInit ramdisk build. 2014-10-23 21:58:23 +02:00
Michael Tremer
541fb9a8a1 glibc: fix build with new patches. 2014-10-23 21:57:36 +02:00
Michael Tremer
2404450b40 installer: Simplify kernel command line parsing 2014-10-23 01:05:56 +02:00
Arne Fitzenreiter
013153bc78 set toolchain to 8 and version to 2.17. 2014-10-22 21:35:13 +02:00
Arne Fitzenreiter
af886d0140 tzdata: fix build with new coreutils. 2014-10-22 21:34:42 +02:00
Arne Fitzenreiter
3a317084d6 Revert "Revert "toolchain: Fix compiling due to Stack Protector changes.""
This reverts commit 4ec728f840.
2014-10-22 13:49:54 +02:00
Michael Tremer
211c7984d4 installer: Create a config struct 2014-10-21 22:30:36 +02:00
Michael Tremer
e41fbb6f0d Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into seventeen 2014-10-21 21:14:19 +02:00
Ersan Yildirim
ad92967574 Update Turkish translation 2014-10-20 11:59:31 +02:00
Arne Fitzenreiter
f797c74a2b core85: set version to core85. 2014-10-16 11:34:20 +02:00
Michael Tremer
6e0b26ba7d Merge branch 'install-raid' into seventeen
Conflicts:
	make.sh
2014-10-15 23:39:20 +02:00
Michael Tremer
38c6822d3c installer: Make restoring the backup interactive 2014-10-15 23:38:05 +02:00
Michael Tremer
dadfa436c9 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2014-10-15 22:55:54 +02:00
Michael Tremer
a7006325c0 apache: Disable SSLv3 by default for the IPFire webinterface 2014-10-15 22:55:26 +02:00
Arne Fitzenreiter
6c4319a1b8 openssl-compat: update to 0.9.8zc 2014-10-15 21:44:29 +02:00
Michael Tremer
11a1a874e9 Create Core Update 85 2014-10-15 19:48:16 +02:00
Michael Tremer
877e2ef8bb openssl: Update to version 1.0.1j
OpenSSL Security Advisory [15 Oct 2014]
=======================================

SRTP Memory Leak (CVE-2014-3513)
================================

Severity: High

A flaw in the DTLS SRTP extension parsing code allows an attacker, who
sends a carefully crafted handshake message, to cause OpenSSL to fail
to free up to 64k of memory causing a memory leak. This could be
exploited in a Denial Of Service attack. This issue affects OpenSSL
1.0.1 server implementations for both SSL/TLS and DTLS regardless of
whether SRTP is used or configured. Implementations of OpenSSL that
have been compiled with OPENSSL_NO_SRTP defined are not affected.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.

This issue was reported to OpenSSL on 26th September 2014, based on an original
issue and patch developed by the LibreSSL project. Further analysis of the issue
was performed by the OpenSSL team.

The fix was developed by the OpenSSL team.

Session Ticket Memory Leak (CVE-2014-3567)
==========================================

Severity: Medium

When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
integrity of that ticket is first verified. In the event of a session
ticket integrity check failing, OpenSSL will fail to free memory
causing a memory leak. By sending a large number of invalid session
tickets an attacker could exploit this issue in a Denial Of Service
attack.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

This issue was reported to OpenSSL on 8th October 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

SSL 3.0 Fallback protection
===========================

Severity: Medium

OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
to block the ability for a MITM attacker to force a protocol
downgrade.

Some client applications (such as browsers) will reconnect using a
downgraded protocol to work around interoperability bugs in older
servers. This could be exploited by an active man-in-the-middle to
downgrade connections to SSL 3.0 even if both sides of the connection
support higher protocols. SSL 3.0 contains a number of weaknesses
including POODLE (CVE-2014-3566).

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
https://www.openssl.org/~bodo/ssl-poodle.pdf

Support for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller.

Build option no-ssl3 is incomplete (CVE-2014-3568)
==================================================

Severity: Low

When OpenSSL is configured with "no-ssl3" as a build option, servers
could accept and complete a SSL 3.0 handshake, and clients could be
configured to send them.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

This issue was reported to OpenSSL by Akamai Technologies on 14th October 2014.

The fix was developed by Akamai and the OpenSSL team.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv_20141015.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html
2014-10-15 19:19:15 +02:00
Ersan Yildirim
95a1679c6b Update Turkish translation 2014-10-13 10:19:45 +02:00
Michael Tremer
35853bb47b installer: Make networking and download functions more user-friendly
Allows to retry after a failed attempt or abort
2014-10-12 16:53:12 +02:00
Michael Tremer
b84813b432 installer: Remove reading the path of the downloaded ISO 2014-10-12 15:04:25 +02:00
Michael Tremer
7d11428465 installer: Allow to start networking without ISO download 2014-10-12 14:30:51 +02:00
Michael Tremer
15f706806d installer: Remove Makefile of old build system 2014-10-11 19:19:14 +02:00
Michael Tremer
07d6f947a4 installer: Remove old unattended installation code 2014-10-11 19:18:27 +02:00
Michael Tremer
a3e135c8bd installer: Enable new partitioning code to be run in unattended mode
The first disk of the system will automatically be used and
a standard installation will be done. After that is done, the
system will reboot into the freshly installed system and execute
setup.
2014-10-11 18:59:31 +02:00
Michael Tremer
746e71a629 Merge branch 'master' of ssh://git.ipfire.org/pub/git/ipfire-2.x into install-raid 2014-10-11 07:18:03 +02:00
Arne Fitzenreiter
52dae2ba3f Merge branch 'next' 2014-10-10 18:13:13 +02:00
Arne Fitzenreiter
e3d5a18d4a core84: add update-lang-cache.
this file is missing on some machines.
2014-10-10 18:11:52 +02:00
Michael Tremer
eb117f5e27 Merge remote-tracking branch 'ms/install-raid' into install-raid
Conflicts:
	lfs/bash
2014-10-10 15:03:45 +02:00
Michael Tremer
6272b1b85e Merge branch 'master' into install-raid
Conflicts:
	config/rootfiles/common/bash
	lfs/bash
2014-10-10 14:52:30 +02:00
Arne Fitzenreiter
215043936e Merge remote-tracking branch 'origin/next' 2014-10-07 18:37:01 +02:00
Michael Tremer
a21f2f6a76 firewall: Use correct interface for RED 2014-10-07 14:54:12 +02:00
Michael Tremer
474daba689 bash: Update to version 4.3.30
Fixes #10633.
2014-10-06 12:23:35 +02:00
Arne Fitzenreiter
24d36c80a6 p2pblock: fix flush rules if all p2p's are allowed. 2014-10-05 15:12:44 +02:00
Arne Fitzenreiter
2a5b19c56f p2pblock: ipp2p must run before CONNTRACK.
And can only used for blocking, not for accept conenections bacause connections must already established for detecting protocol types.
2014-10-04 17:39:51 +02:00
Arne Fitzenreiter
e43b21264f Merge branch 'next' 2014-10-04 13:53:49 +02:00
Michael Tremer
791c2b45d8 firewall: fix rules.pl for old rules without ratelimiting. 2014-10-04 13:52:15 +02:00
Michael Tremer
243f8ca6e9 squid: Update to 3.4.8
Contains some security fixes:

 * CVE-2014-6270
   http://www.squid-cache.org/Advisories/SQUID-2014_3.txt
 * CVE-2014-7141
   CVE-2014-7142
   http://www.squid-cache.org/Advisories/SQUID-2014_4.txt
2014-10-02 18:21:51 +02:00
Arne Fitzenreiter
8285512a18 Merge remote-tracking branch 'origin/next' 2014-09-30 23:53:00 +02:00
Arne Fitzenreiter
34b26caca1 bash: rootfile update. 2014-09-30 23:49:47 +02:00
Arne Fitzenreiter
8930d79dc2 Merge remote-tracking branch 'origin/next' 2014-09-30 19:30:45 +02:00
Michael Tremer
da8c74ee53 parted: Update to 3.1. 2014-09-30 19:28:55 +02:00
Arne Fitzenreiter
a00d943206 set PAK_VER to core84. 2014-09-30 09:33:27 +02:00
Arne Fitzenreiter
9bdc5896dd Merge remote-tracking branch 'origin/next' 2014-09-30 09:32:01 +02:00
Michael Tremer
efa808ba11 readline: Re-add accidentially deleted patches of -compat package 2014-09-29 22:43:04 +02:00