Commit Graph

4925 Commits

Author SHA1 Message Date
Michael Tremer
e41b341faf mbr: Update to 1.1.11 and move tools to /usr.
The previous version did not build with the new kernel headers.
2012-06-15 11:36:40 +02:00
Michael Tremer
75556d531b sdl: Add patches for PAGE_SIZE on i586 as well.
asm/page.h does not exist in the new kernel headers
and that needs to be fixed in the SDL code.
2012-06-15 11:35:13 +02:00
Michael Tremer
00b73e3b0f man: Remove obsolete compiler flag to fix the build. 2012-06-15 11:34:09 +02:00
Michael Tremer
4dca0bd05d libc-headers: Extract header files from kernel.
Previously, there have been header sanizied header files used
from kernel 2.6.12.0, which got harder to maintain over the
years and may cause unseen problems.
2012-06-15 11:32:00 +02:00
Michael Tremer
86d3ada4c6 Merge branch 'glibc-update' into thirteen 2012-06-14 23:31:17 +02:00
Michael Tremer
7c8031e54e Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into glibc-update 2012-06-13 18:41:17 +02:00
Michael Tremer
81b2c3f165 squid: Enable ICAP client. 2012-06-13 15:43:27 +02:00
Michael Tremer
ee717901ed glibc: Update to 2.5 on i586.
This enabled IPFire to run some precompiled third-party software
on it. We may as well expect some performance improvements.
2012-06-13 15:22:56 +02:00
Arne Fitzenreiter
3e011c27dd flashimages: switch to single ext4 (wo journal)
also support video out on pandaboard.
2012-06-10 11:16:57 +02:00
Arne Fitzenreiter
1f6abd5362 kernel: updated omap and rpi kernel to 2.6.42.19 (aka 3.2.19). 2012-06-10 11:13:59 +02:00
Arne Fitzenreiter
fddc02a51a Merge remote-tracking branch 'origin/next' into kernel-update 2012-06-02 10:25:02 +02:00
Arne Fitzenreiter
e516f073d6 core61: add collectd initskript to updater. 2012-06-02 10:21:44 +02:00
Arne Fitzenreiter
15eb7e0a7f collectd: fix collectd on machines without rtc.
collectd hangs with 100% cpu usage if there is a very old entry
in the database. This was created at the first start without internet so
ntp cannot set the time.
2012-06-02 10:17:34 +02:00
Arne Fitzenreiter
a832f4f33e Merge remote-tracking branch 'origin/core60' into next
Conflicts:
	config/rootfiles/core/59/update.sh
	lfs/strongswan
	make.sh
2012-06-01 17:30:54 +02:00
Arne Fitzenreiter
3648650e76 Move core60 content to core61. 2012-06-01 17:25:10 +02:00
Arne Fitzenreiter
1346863ac7 core60: add strongswan security update. 2012-06-01 12:54:24 +02:00
Arne Fitzenreiter
6105282deb strongswan: security update to 4.6.4 (fix CVE-2012-2388).
RSA signature verification vulnerability
see http://http://www.strongswan.org/blog/2012/05/31/strongswan-4.6.4-released-%28cve-2012-2388%29.html for details.
2012-06-01 12:47:07 +02:00
Erik Kapfer
e70bd5b742 mtr+tcpick: Two new binary addons. 2012-05-27 21:36:44 +02:00
Michael Tremer
e98e3852ca openvpn: Import translation patch from #10137.
See comment 5 for more detail.
2012-05-27 18:19:35 +02:00
Nico Prenzel
8e148dc343 openvpn: Fix deletion of static routes. 2012-05-24 18:18:22 +02:00
Michael Tremer
aa7afd463d Start core update 60. 2012-05-24 10:48:44 +02:00
Erik Kapfer
7b82e24488 openvpn: Change colour of N2N connections.
From https://bugzilla.ipfire.org/show_bug.cgi?id=10137:
The first patch i have made is to give the index.cgi the origin colour (the
same then for the roadwarrior) for OpenVPN N2N connections on IPFire. At this
time the colour is stated in IPSec colour, so i made a patch to change this.
2012-05-24 10:47:37 +02:00
Arne Fitzenreiter
9007007b4e kernel: add kernel for Raspberry Pi. 2012-05-23 13:43:03 +02:00
Arne Fitzenreiter
d30f0e5ad8 build: add armv6l to supported buildplatforms. 2012-05-23 13:38:18 +02:00
Arne Fitzenreiter
eaaf33b609 kernel: updated omap kernel to 2.6.40.32 aka 3.0.32. 2012-05-23 13:34:39 +02:00
Arne Fitzenreiter
c74d2398dc Merge remote-tracking branch 'origin/next' into kernel-update 2012-05-20 17:14:56 +02:00
Michael Tremer
7de1da3fdf fireinfo: Update to 2.1.5.
Fixes issues on the Raspberry Pi Computer.
2012-05-19 11:22:18 +02:00
Arne Fitzenreiter
4c836f54c2 Merge branch 'kernel-update' of git.ipfire.org:/pub/git/ipfire-2.x into kernel-update 2012-05-14 17:12:27 +02:00
Arne Fitzenreiter
fef20dab74 Merge remote-tracking branch 'origin/next' into kernel-update 2012-05-14 10:40:15 +02:00
Arne Fitzenreiter
4bd2536f4b core59: start/stop ipsec and ssh at update. 2012-05-12 19:40:41 +02:00
Arne Fitzenreiter
a18da317d3 finished core59. 2012-05-12 19:35:42 +02:00
Arne Fitzenreiter
c7c8b4aaec GeoIP: update database to 01052012. 2012-05-12 19:35:10 +02:00
Arne Fitzenreiter
db083dd81e dhcpcd: ignore MTU Smaller than 577.
Normally 576 is the smallest valid mtu but some cable provider set this
also if they support much higher mtu's. Fedora does not accept
this to prevent speed problems with such isp connections so we do the same.
If you really need mtu=576 you can still force at at the setup.
2012-05-12 19:34:47 +02:00
Arne Fitzenreiter
58574e318b php: security update to 5.3.13 (CVE-2012-2311). 2012-05-12 19:34:19 +02:00
Arne Fitzenreiter
dc7239d678 openssh: update to 6.0p1. 2012-05-12 19:33:54 +02:00
Arne Fitzenreiter
8074eed711 openssl: security update to 0.9.8x (CVE-2012-2333).
Invalid TLS/DTLS record attack (CVE-2012-2333)
===============================================

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and
DTLS can be exploited in a denial of service attack on both clients and
servers.

DTLS applications are affected in all versions of OpenSSL. TLS is only
affected in OpenSSL 1.0.1 and later.

Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing
as a service testing platform.

The fix was developed by Stephen Henson of the OpenSSL core team.

Affected users should upgrade to OpenSSL 1.0.1c, 1.0.0j or 0.9.8x

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120510.txt
2012-05-12 19:33:31 +02:00
Arne Fitzenreiter
68eeed8285 traceroute: update to 2.0.18 and fix name resolution.
fixes #10097
2012-05-12 19:32:23 +02:00
Arne Fitzenreiter
d66d6f8827 strongswan: update to 4.6.3. 2012-05-12 19:31:46 +02:00
Arne Fitzenreiter
36585d00bd python: update to 2.7.3. 2012-05-12 19:31:17 +02:00
Arne Fitzenreiter
8f6a5178e8 fix core58 merge problem.
Conflicts:

	config/rootfiles/core/58/filelists/files
2012-05-12 19:30:30 +02:00
Arne Fitzenreiter
5479803667 core59: add openssl to core update. 2012-05-12 19:28:46 +02:00
Arne Fitzenreiter
a6f4183e83 openssl: security update to 0.9.8w. (CVE-2012-2131).
SN1 BIO incomplete fix (CVE-2012-2131)
=======================================

It was discovered that the fix for CVE-2012-2110 released on 19 Apr
2012 was not sufficient to correct the issue for OpenSSL 0.9.8.

Please see http://www.openssl.org/news/secadv_20120419.txt for details
of that vulnerability.

This issue only affects OpenSSL 0.9.8v.  OpenSSL 1.0.1a and 1.0.0i
already contain a patch sufficient to correct CVE-2012-2110.

Thanks to Red Hat for discovering and fixing this issue.

Affected users should upgrade to 0.9.8w.

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120424.txt
2012-05-12 19:28:24 +02:00
Arne Fitzenreiter
75c2cf6f51 started core59. 2012-05-12 19:24:46 +02:00
Arne Fitzenreiter
5b6fdbf9d5 finished core59. 2012-05-12 19:22:26 +02:00
Arne Fitzenreiter
7f76d8cb4a GeoIP: update database to 01052012. 2012-05-12 19:15:38 +02:00
Arne Fitzenreiter
4a3ae7fa37 dhcpcd: ignore MTU Smaller than 577.
Normally 576 is the smallest valid mtu but some cable provider set this
also if they support much higher mtu's. Fedora does not accept
this to prevent speed problems with such isp connections so we do the same.
If you really need mtu=576 you can still force at at the setup.
2012-05-12 17:13:45 +02:00
Arne Fitzenreiter
be5a3b36a7 php: security update to 5.3.13 (CVE-2012-2311). 2012-05-12 15:33:42 +02:00
Arne Fitzenreiter
d7d2dca964 openssh: update to 6.0p1. 2012-05-12 15:32:47 +02:00
Arne Fitzenreiter
423d77a71f openssl: security update to 0.9.8x (CVE-2012-2333).
Invalid TLS/DTLS record attack (CVE-2012-2333)
===============================================

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and
DTLS can be exploited in a denial of service attack on both clients and
servers.

DTLS applications are affected in all versions of OpenSSL. TLS is only
affected in OpenSSL 1.0.1 and later.

Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic fuzzing
as a service testing platform.

The fix was developed by Stephen Henson of the OpenSSL core team.

Affected users should upgrade to OpenSSL 1.0.1c, 1.0.0j or 0.9.8x

References
==========

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20120510.txt
2012-05-12 15:30:38 +02:00
Arne Fitzenreiter
36900a8186 Merge remote-tracking branch 'origin/next' into kernel-update 2012-05-09 20:51:23 +02:00