Commit Graph

4863 Commits

Author SHA1 Message Date
Arne Fitzenreiter
a832f4f33e Merge remote-tracking branch 'origin/core60' into next
Conflicts:
	config/rootfiles/core/59/update.sh
	lfs/strongswan
	make.sh
2012-06-01 17:30:54 +02:00
Arne Fitzenreiter
3648650e76 Move core60 content to core61. 2012-06-01 17:25:10 +02:00
Arne Fitzenreiter
1346863ac7 core60: add strongswan security update. 2012-06-01 12:54:24 +02:00
Arne Fitzenreiter
6105282deb strongswan: security update to 4.6.4 (fix CVE-2012-2388).
RSA signature verification vulnerability
see http://http://www.strongswan.org/blog/2012/05/31/strongswan-4.6.4-released-%28cve-2012-2388%29.html for details.
2012-06-01 12:47:07 +02:00
Erik Kapfer
e70bd5b742 mtr+tcpick: Two new binary addons. 2012-05-27 21:36:44 +02:00
Michael Tremer
e98e3852ca openvpn: Import translation patch from #10137.
See comment 5 for more detail.
2012-05-27 18:19:35 +02:00
Nico Prenzel
8e148dc343 openvpn: Fix deletion of static routes. 2012-05-24 18:18:22 +02:00
Michael Tremer
aa7afd463d Start core update 60. 2012-05-24 10:48:44 +02:00
Erik Kapfer
7b82e24488 openvpn: Change colour of N2N connections.
From https://bugzilla.ipfire.org/show_bug.cgi?id=10137:
The first patch i have made is to give the index.cgi the origin colour (the
same then for the roadwarrior) for OpenVPN N2N connections on IPFire. At this
time the colour is stated in IPSec colour, so i made a patch to change this.
2012-05-24 10:47:37 +02:00
Michael Tremer
7de1da3fdf fireinfo: Update to 2.1.5.
Fixes issues on the Raspberry Pi Computer.
2012-05-19 11:22:18 +02:00
Arne Fitzenreiter
4bd2536f4b core59: start/stop ipsec and ssh at update. 2012-05-12 19:40:41 +02:00
Arne Fitzenreiter
a18da317d3 finished core59. 2012-05-12 19:35:42 +02:00
Arne Fitzenreiter
c7c8b4aaec GeoIP: update database to 01052012. 2012-05-12 19:35:10 +02:00
Arne Fitzenreiter
db083dd81e dhcpcd: ignore MTU Smaller than 577.
Normally 576 is the smallest valid mtu but some cable provider set this
also if they support much higher mtu's. Fedora does not accept
this to prevent speed problems with such isp connections so we do the same.
If you really need mtu=576 you can still force at at the setup.
2012-05-12 19:34:47 +02:00
Arne Fitzenreiter
58574e318b php: security update to 5.3.13 (CVE-2012-2311). 2012-05-12 19:34:19 +02:00
Arne Fitzenreiter
dc7239d678 openssh: update to 6.0p1. 2012-05-12 19:33:54 +02:00
Arne Fitzenreiter
8074eed711 openssl: security update to 0.9.8x (CVE-2012-2333).
Invalid TLS/DTLS record attack (CVE-2012-2333)
===============================================

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and
DTLS can be exploited in a denial of service attack on both clients and
servers.

DTLS applications are affected in all versions of OpenSSL. TLS is only
affected in OpenSSL 1.0.1 and later.

Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing
as a service testing platform.

The fix was developed by Stephen Henson of the OpenSSL core team.

Affected users should upgrade to OpenSSL 1.0.1c, 1.0.0j or 0.9.8x

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120510.txt
2012-05-12 19:33:31 +02:00
Arne Fitzenreiter
68eeed8285 traceroute: update to 2.0.18 and fix name resolution.
fixes #10097
2012-05-12 19:32:23 +02:00
Arne Fitzenreiter
d66d6f8827 strongswan: update to 4.6.3. 2012-05-12 19:31:46 +02:00
Arne Fitzenreiter
36585d00bd python: update to 2.7.3. 2012-05-12 19:31:17 +02:00
Arne Fitzenreiter
8f6a5178e8 fix core58 merge problem.
Conflicts:

	config/rootfiles/core/58/filelists/files
2012-05-12 19:30:30 +02:00
Arne Fitzenreiter
5479803667 core59: add openssl to core update. 2012-05-12 19:28:46 +02:00
Arne Fitzenreiter
a6f4183e83 openssl: security update to 0.9.8w. (CVE-2012-2131).
SN1 BIO incomplete fix (CVE-2012-2131)
=======================================

It was discovered that the fix for CVE-2012-2110 released on 19 Apr
2012 was not sufficient to correct the issue for OpenSSL 0.9.8.

Please see http://www.openssl.org/news/secadv_20120419.txt for details
of that vulnerability.

This issue only affects OpenSSL 0.9.8v.  OpenSSL 1.0.1a and 1.0.0i
already contain a patch sufficient to correct CVE-2012-2110.

Thanks to Red Hat for discovering and fixing this issue.

Affected users should upgrade to 0.9.8w.

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120424.txt
2012-05-12 19:28:24 +02:00
Arne Fitzenreiter
75c2cf6f51 started core59. 2012-05-12 19:24:46 +02:00
Arne Fitzenreiter
5b6fdbf9d5 finished core59. 2012-05-12 19:22:26 +02:00
Arne Fitzenreiter
7f76d8cb4a GeoIP: update database to 01052012. 2012-05-12 19:15:38 +02:00
Arne Fitzenreiter
4a3ae7fa37 dhcpcd: ignore MTU Smaller than 577.
Normally 576 is the smallest valid mtu but some cable provider set this
also if they support much higher mtu's. Fedora does not accept
this to prevent speed problems with such isp connections so we do the same.
If you really need mtu=576 you can still force at at the setup.
2012-05-12 17:13:45 +02:00
Arne Fitzenreiter
be5a3b36a7 php: security update to 5.3.13 (CVE-2012-2311). 2012-05-12 15:33:42 +02:00
Arne Fitzenreiter
d7d2dca964 openssh: update to 6.0p1. 2012-05-12 15:32:47 +02:00
Arne Fitzenreiter
423d77a71f openssl: security update to 0.9.8x (CVE-2012-2333).
Invalid TLS/DTLS record attack (CVE-2012-2333)
===============================================

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and
DTLS can be exploited in a denial of service attack on both clients and
servers.

DTLS applications are affected in all versions of OpenSSL. TLS is only
affected in OpenSSL 1.0.1 and later.

Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing
as a service testing platform.

The fix was developed by Stephen Henson of the OpenSSL core team.

Affected users should upgrade to OpenSSL 1.0.1c, 1.0.0j or 0.9.8x

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120510.txt
2012-05-12 15:30:38 +02:00
Arne Fitzenreiter
6666803d83 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2012-05-06 12:54:13 +02:00
Arne Fitzenreiter
9070a6c331 traceroute: update to 2.0.18 and fix name resolution.
fixes #10097
2012-05-06 12:51:14 +02:00
Arne Fitzenreiter
a526de38bc strongswan: update to 4.6.3. 2012-05-05 23:25:07 +02:00
Arne Fitzenreiter
6bdc390235 python: update to 2.7.3. 2012-05-05 23:23:53 +02:00
Arne Fitzenreiter
b5c3859e30 fix core58 merge problem. 2012-05-05 23:21:18 +02:00
Arne Fitzenreiter
717470058f core59: add openssl to core update. 2012-05-05 23:19:36 +02:00
Arne Fitzenreiter
8f17b54f96 openssl: security update to 0.9.8w. (CVE-2012-2131).
SN1 BIO incomplete fix (CVE-2012-2131)
=======================================

It was discovered that the fix for CVE-2012-2110 released on 19 Apr
2012 was not sufficient to correct the issue for OpenSSL 0.9.8.

Please see http://www.openssl.org/news/secadv_20120419.txt for details
of that vulnerability.

This issue only affects OpenSSL 0.9.8v.  OpenSSL 1.0.1a and 1.0.0i
already contain a patch sufficient to correct CVE-2012-2110.

Thanks to Red Hat for discovering and fixing this issue.

Affected users should upgrade to 0.9.8w.

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120424.txt
2012-05-02 19:42:02 +02:00
Arne Fitzenreiter
9c166bf2a6 Merge branch 'master' into next 2012-05-02 16:55:26 +02:00
Arne Fitzenreiter
9f82cdb1f8 samba: security update to 3.5.15. (CVE-2012-2111).
This security release addresses CVE-2012-2111 (incorrect permission checks when
granting/removing privileges could compromise file server security).
2012-05-02 10:10:07 +02:00
Arne Fitzenreiter
de887913ee samba: security update to 3.5.14. (CVE-2012-1182).
Further information can be found in the security advisory:
http://www.samba.org/samba/security/CVE-2012-1182
2012-04-10 20:21:37 +02:00
Arne Fitzenreiter
fdec431835 started core59. 2012-04-09 12:19:06 +02:00
Arne Fitzenreiter
6560ecaa51 Merge branch 'master' into next
Conflicts:
	config/rootfiles/core/58/filelists/files
	make.sh
2012-04-09 12:15:59 +02:00
Arne Fitzenreiter
5cbbd5f1ed finished core58. 2012-04-07 11:39:23 +02:00
Arne Fitzenreiter
8969d075e0 hwdata: updata usb and pci ids database. 2012-04-07 11:38:23 +02:00
Arne Fitzenreiter
b7d1e1c4a4 GeoIP: update database to 03032012. 2012-04-07 11:37:35 +02:00
Arne Fitzenreiter
2d40b8174b core58: add cryptodev module to updater. 2012-04-07 11:37:03 +02:00
Arne Fitzenreiter
2c0a849f7a cryptodev: update to 1.4. 2012-04-07 11:36:40 +02:00
Arne Fitzenreiter
f028065fd1 openssl: fix aes accleration via cryptodev. 2012-04-07 11:36:20 +02:00
Michael Tremer
a4826680bc pound: Add patch to select certificates by their SANs.
http://www.apsis.ch/pound/pound_list/archive/2012/2012-02/1329442080000#1329442080000
2012-04-07 11:35:46 +02:00
Arne Fitzenreiter
844d37795d clamav: updated to 0.97.4. 2012-04-07 11:35:28 +02:00