Commit Graph

4924 Commits

Author SHA1 Message Date
Matthias Fischer
c1de76704a ntp: Update to 4.2.8p5
"...addresses 1 medium-severity security issue, 14 bugfixes,
and contains other improvements over 4.2.8p4."

For a complete list, see:
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-01-10 21:18:20 +00:00
Michael Tremer
b75b6382ab grub: Disable hardening for grub-script-check
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-01-10 19:35:42 +00:00
Michael Tremer
cec5c724f5 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next 2016-01-09 14:56:33 +00:00
Michael Tremer
16260e2c69 timectrl: Stop ntp daemon when disabled
Fixes #11000

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-01-07 23:47:39 +00:00
Arne Fitzenreiter
2eb67894ef binutils: update to 2.24
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2016-01-07 17:41:16 +01:00
Daniel Weismüller
820a4ab564 owncloud: updated to version 7.0.11
Signed-off-by: Daniel Weismüller <daniel.weismueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-01-06 15:09:16 +00:00
Michael Tremer
b0a014b7f8 QoS: Improve saving enabled/disable state
It was reported that the QoS did not stop when
the user clicked the "stop" button. This patch
fixes that.

Fixes #10664

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Acked-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
2016-01-05 21:04:05 +00:00
Michael Tremer
84032d0845 core97: Ship updated openvpn package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-01-04 22:46:13 +00:00
Michael Tremer
21ac63688a core97: Ship dnsmasq
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-28 15:37:02 +01:00
Michael Tremer
2135528774 core97: Ship pgrep with the updater
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-28 15:30:13 +01:00
Arne Fitzenreiter
4df3276bb4 ncurses: rootfile update.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-26 17:37:53 +01:00
Arne Fitzenreiter
b94e0ffc68 dnsdist: rootfile update.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-26 17:34:13 +01:00
Arne Fitzenreiter
b37e91c3b5 diffutils: rootfile update.
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-26 17:33:30 +01:00
Arne Fitzenreiter
eddda7f9bd gcc: include libstdc++ to rootfile
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-12-26 13:16:59 +01:00
Michael Tremer
98b8cabf4d dnsdist: New package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 22:27:58 +00:00
Michael Tremer
6138d53bdd lua: New package
Simple scripting language. Supposed to be fast. Needed for dnsdist.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 22:27:39 +00:00
Michael Tremer
3b7808295e Disable packaging mediatomb
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 22:27:10 +00:00
Michael Tremer
9f0f7c50cd gcc: Update armv5tel rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 12:44:27 +00:00
Michael Tremer
a9fd979619 gcc: Update x86_64 rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 12:44:21 +00:00
Michael Tremer
8675b78af9 gcc: Update to version 4.9.3
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 12:43:51 +00:00
Michael Tremer
bdfd41c4f1 libmpc: New package
A dependency for GCC

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 12:40:26 +00:00
Michael Tremer
9753936f4c core97: Ship updated bind package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 12:34:59 +00:00
Michael Tremer
d31345a50b Create Core Update 97
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 12:34:18 +00:00
Michael Tremer
ea155e2d2b Move Core Update 96 to oldcore
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-22 11:13:03 +00:00
Michael Tremer
54206b6e35 curl: Fix certificate validation
curl did not find the certificate bundle so that server
certificates could not be verified.

Fixes #10995

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-19 14:12:29 +00:00
Michael Tremer
b84a9b078d core96: Ship updated grub
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-18 23:42:15 +00:00
Michael Tremer
b42a7ec1a6 Rootfile update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-15 18:32:55 +00:00
Matthias Fischer
d9ef106e5c Midnight Commander 4.8.15: Update for rootfile
There was a syntax file which I overlooked...

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-15 13:54:33 +00:00
Michael Tremer
a8d24cee43 core96: Ship rules.pl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-15 13:54:04 +00:00
Alexander Marx
306098a498 BUG10994: SNAT rules are missing the outgoing interface
When creating SNAT rules, the outgoing interface is not set. As a side
effect, traffic that should be send unnatted to a vpn tunnel can be
natted which is a BUG.
With this patch the SNAT rules are getting a outgoing interface
according to the configuration. When selecting the RED Target network,
all SNAT rules will be configured with "-o red0". Otherwise if "all" is
selected, there is no interface in the rule, which matches all networks.

Signed-off-by: Alexander Marx <alexander.marx@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-15 13:53:03 +00:00
Michael Tremer
08729f79fb ramdisk: Backup ramdisks once a night
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-15 13:47:52 +00:00
Matthias Fischer
73a000f9d1 ntp 4.2.8p4: Update for rootfile
'/usr/share/ntp/lib/NTP/Util.pm' is needed for 'ntptrace'
to run correctly

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-15 12:39:53 +00:00
Michael Tremer
93d6eed9a4 ntp: Fix syncing with local clock
This is a bug that was introduced with the latest release
from upstream

Fixes #10997
Upstream: http://bugs.ntp.org/show_bug.cgi?id=2965

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-15 12:39:19 +00:00
Matthias Fischer
c4b28466d1 arping 2.15: Update for rootfile
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-13 22:28:15 +00:00
Michael Tremer
0909a0a1d8 Update rootfiles
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-12 11:52:18 +00:00
Michael Tremer
ffeaaef618 connections.cgi: Fix page crash with IPsec connections with one subnet only
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-12 09:50:19 +00:00
Michael Tremer
ea6fa9de5a core96: Ship missing libnet
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-11 18:48:19 +00:00
Matthias Fischer
600ac5c657 libnet 1.1.6: Fix for rootfile
libnet 1.1.6: Fix for rootfile

See: https://forum.ipfire.org/viewtopic.php?f=27&t=15377, "error with
arping and libnet.so.1"
Should fix: Bug #10996 / https://bugzilla.ipfire.org/show_bug.cgi?id=10996

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-11 18:47:20 +00:00
Matthias Fischer
db1404051f clamav: Update to 0.99
clamav: Update to 0.99

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-11 18:46:02 +00:00
Michael Tremer
b7488afd89 core96: Ship updated rrdtool
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-11 18:43:39 +00:00
Matthias Fischer
4955d7239b rrdtool: Update to 1.5.5
rrdtool: Update to 1.5.5

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-11 18:43:24 +00:00
Michael Tremer
e0eb23de56 core96: Ship routing.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-10 16:38:36 +00:00
Michael Tremer
b1372c3bef dma: Import patch for better authentication
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-10 16:35:09 +00:00
Michael Tremer
24f05f3271 Update rootfiles
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:22:41 +00:00
Michael Tremer
b51ffa68db openvmtools: Update to version 10.0.5
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:31 +00:00
Michael Tremer
2b163f4497 Drop tripwire
This add-on is likely to be unused

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:27 +00:00
Michael Tremer
5b2155bfdd Drop cryptodev
This module isn't used by openssl any more and therefore
quite unnecessary.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:18:19 +00:00
Michael Tremer
fb39daffef core96: Ship updated mdadm
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-04 22:17:51 +00:00
Michael Tremer
c7762365dc openssl: Update to 1.0.2e
OpenSSL Security Advisory [3 Dec 2015]
=======================================

NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE
0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS
PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS.

BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
==================================================================

Severity: Moderate

There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No
EC algorithms are affected. Analysis suggests that attacks against RSA and DSA
as a result of this defect would be very difficult to perform and are not
believed likely. Attacks against DH are considered just feasible (although very
difficult) because most of the work necessary to deduce information
about a private key may be performed offline. The amount of resources
required for such an attack would be very significant and likely only
accessible to a limited number of attackers. An attacker would
additionally need online access to an unpatched system using the target
private key in a scenario with persistent DH parameters and a private
key that is shared between multiple clients. For example this can occur by
default in OpenSSL DHE based SSL/TLS ciphersuites.

This issue affects OpenSSL version 1.0.2.

OpenSSL 1.0.2 users should upgrade to 1.0.2e

This issue was reported to OpenSSL on August 13 2015 by Hanno
Böck. The fix was developed by Andy Polyakov of the OpenSSL
development team.

Certificate verify crash with missing PSS parameter (CVE-2015-3194)
===================================================================

Severity: Moderate

The signature verification routines will crash with a NULL pointer dereference
if presented with an ASN.1 signature using the RSA PSS algorithm and absent
mask generation function parameter. Since these routines are used to verify
certificate signature algorithms this can be used to crash any certificate
verification operation and exploited in a DoS attack. Any application which
performs certificate verification is vulnerable including OpenSSL clients and
servers which enable client authentication.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q

This issue was reported to OpenSSL on August 27 2015 by Loïc Jonas Etienne
(Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL
development team.

X509_ATTRIBUTE memory leak (CVE-2015-3195)
==========================================

Severity: Moderate

When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
memory. This structure is used by the PKCS#7 and CMS routines so any
application which reads PKCS#7 or CMS data from untrusted sources is affected.
SSL/TLS is not affected.

This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q
OpenSSL 1.0.0 users should upgrade to 1.0.0t
OpenSSL 0.9.8 users should upgrade to 0.9.8zh

This issue was reported to OpenSSL on November 9 2015 by Adam Langley
(Google/BoringSSL) using libFuzzer. The fix was developed by Dr. Stephen
Henson of the OpenSSL development team.

Race condition handling PSK identify hint (CVE-2015-3196)
=========================================================

Severity: Low

If PSK identity hints are received by a multi-threaded client then
the values are wrongly updated in the parent SSL_CTX structure. This can
result in a race condition potentially leading to a double free of the
identify hint data.

This issue was fixed in OpenSSL 1.0.2d and 1.0.1p but has not been previously
listed in an OpenSSL security advisory. This issue also affects OpenSSL 1.0.0
and has not been previously fixed in an OpenSSL 1.0.0 release.

OpenSSL 1.0.2 users should upgrade to 1.0.2d
OpenSSL 1.0.1 users should upgrade to 1.0.1p
OpenSSL 1.0.0 users should upgrade to 1.0.0t

The fix for this issue can be identified in the OpenSSL git repository by commit
ids 3c66a669dfc7 (1.0.2), d6be3124f228 (1.0.1) and 1392c238657e (1.0.0).

The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

Note
====

As per our previous announcements and our Release Strategy
(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions
1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these
versions will be provided after that date. In the absence of significant
security issues being identified prior to that date, the 1.0.0t and 0.9.8zh
releases will be the last for those versions. Users of these versions are
advised to upgrade.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20151203.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-03 17:00:58 +00:00
Michael Tremer
228bec09bf ramdisk: Migrate everything during the update
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-12-03 16:34:59 +00:00