Commit Graph

7598 Commits

Author SHA1 Message Date
Michael Tremer
0dc98b19ee openssl: Update to 1.1.1n
OpenSSL Security Advisory [15 March 2022]
============================================

Infinite loop in BN_mod_sqrt() reachable when parsing certificates
(CVE-2022-0778)
==================================================================================

Severity: High

The BN_mod_sqrt() function, which computes a modular square root,
contains
a bug that can cause it to loop forever for non-prime moduli.

Internally this function is used when parsing certificates that contain
elliptic curve public keys in compressed form or explicit elliptic curve
parameters with a base point encoded in compressed form.

It is possible to trigger the infinite loop by crafting a certificate
that
has invalid explicit curve parameters.

Since certificate parsing happens prior to verification of the
certificate
signature, any process that parses an externally supplied certificate
may thus
be subject to a denial of service attack. The infinite loop can also be
reached when parsing crafted private keys as they can contain explicit
elliptic curve parameters.

Thus vulnerable situations include:

 - TLS clients consuming server certificates
 - TLS servers consuming client certificates
 - Hosting providers taking certificates or private keys from customers
 - Certificate authorities parsing certification requests from
   subscribers
 - Anything else which parses ASN.1 elliptic curve parameters

Also any other applications that use the BN_mod_sqrt() where the
attacker
can control the parameter values are vulnerable to this DoS issue.

In the OpenSSL 1.0.2 version the public key is not parsed during initial
parsing of the certificate which makes it slightly harder to trigger
the infinite loop. However any operation which requires the public key
from the certificate will trigger the infinite loop. In particular the
attacker can use a self-signed certificate to trigger the loop during
verification of the certificate signature.

This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.  It was
addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022.

OpenSSL 1.0.2 users should upgrade to 1.0.2zd (premium support customers
only)
OpenSSL 1.1.1 users should upgrade to 1.1.1n
OpenSSL 3.0 users should upgrade to 3.0.2

This issue was reported to OpenSSL on the 24th February 2022 by Tavis
Ormandy
from Google. The fix was developed by David Benjamin from Google and
Tomáš Mráz
from OpenSSL.

Note
====

OpenSSL 1.0.2 is out of support and no longer receiving public updates.
Extended
support is available for premium support customers:
https://www.openssl.org/support/contracts.html

OpenSSL 1.1.0 is out of support and no longer receiving updates of any
kind.
It is affected by the issue.

Users of these versions should upgrade to OpenSSL 3.0 or 1.1.1.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20220315.txt

Note: the online version of the advisory may be updated with additional
details
over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/policies/secpolicy.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-15 17:53:06 +00:00
Michael Tremer
ebe404ef02 core165: Ship IPS rule updater again and unlock IPS page
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-15 11:16:22 +00:00
Michael Tremer
16cd2d674e core165: Rebuild IPS rules
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:56:40 +00:00
Michael Tremer
fe6b15f843 core165: Actually ship the core files
This filelist is there to ship files that contain the version number of
a release and *must* be shipped every time. For that, they will need to
be a part of the filelist.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:35:44 +00:00
Michael Tremer
817f4c1410 Merge branch 'next' 2022-03-10 10:27:51 +00:00
Michael Tremer
eb41bf304e samba: Fix rootfile on x86_64
The web UI menu entry, samba.cgi and the control binary were lost in
61d7aaa3ef.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:25:19 +00:00
Stefan Schantl
cd3e5923fe libloc: Update to 0.9.11
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-09 15:41:49 +00:00
Michael Tremer
7f8bb55a60 core165: Ship hyperscan
This package is being built with a different configuration.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-08 10:42:00 +00:00
Michael Tremer
b69659af02 core164: Ship backup exclude file
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-07 18:53:09 +00:00
Peter Müller
6fe4eb6094 Core Update 165: Rename squid-accounting add-on to proxy-accounting
https://lists.ipfire.org/pipermail/development/2022-February/012482.html

The second version of this patch omits bogus directives for restarting a
service, which proxy-accounting is not.

Cc: Michael Tremer <michael.tremer@ipfire.org>
Cc: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-07 18:47:23 +00:00
Michael Tremer
ea04468d07 core165: Ship ids.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-07 18:46:34 +00:00
Michael Tremer
7b82d83d7e core165: Ship optionsfw.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-07 18:45:58 +00:00
Peter Müller
ade2424f6b Revert "Core Update 165: Ship update-ids-ruleset"
update-ids-rulesets is relevant for Core Update 164, not Core Update 165.

This reverts commit 9713023546.
2022-03-05 14:35:09 +00:00
Peter Müller
4003479449 Core Update 164: Ship update-ids-rulesets
@Michael: Please cherry-pick this one into "master" as well.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-05 14:34:39 +00:00
Peter Müller
9713023546 Core Update 165: Ship update-ids-ruleset
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-05 14:30:10 +00:00
Michael Tremer
a735dad621 python3-cffi: Fix armv6l rootfile
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-02 13:37:28 +00:00
Peter Müller
d739da6f47 python3-cffi: Add 32 bit ARM rootfile again due to "gnueabi" != "gnu"
My fault, again. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-01 15:25:01 +00:00
Peter Müller
70e23c18a4 python3-yaml: Drop unnecessary armv6l rootfile
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-28 20:18:58 +00:00
Peter Müller
f6ec32737f borgbackup: Fix rootfile on 32 bit ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-26 12:16:39 +00:00
Peter Müller
d03ee3218f Python3: Fix rootfile for 32 bit ARM again
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-25 14:04:06 +00:00
Peter Müller
82674728e3 Core Update 165: Ship vpnmain.cgi
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-23 15:54:13 +00:00
Peter Müller
2598706f23 Core Update 165: Ship dhcpcd-related changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-23 15:51:33 +00:00
Michael Tremer
9c68992498 dhcpcd: Remove old MTU setting script
This is being replaced by adding the MTU option to any routes that
dhcpcd installs.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-23 15:46:45 +00:00
Peter Müller
5de5bec3f4 Python3: Attempt to fix rootfile on 32 bit ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-22 20:18:27 +00:00
Peter Müller
61d2d36f6c python3-cffi: Fix rootfile more elegant on ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-22 20:13:44 +00:00
Peter Müller
286098fdfd Revert "python3-cffi: Fix rootfiles on ARM"
This reverts commit 410758e03f.
2022-02-22 20:13:19 +00:00
Peter Müller
410758e03f python3-cffi: Fix rootfiles on ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-22 19:46:53 +00:00
Michael Tremer
d1283a8047 rust: Package for riscv64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-22 19:41:39 +00:00
Arne Fitzenreiter
72718c896c Merge branch 'master' into next 2022-02-22 11:40:44 +00:00
Arne Fitzenreiter
ad9d6bf585 core164: exclude boot/uEnv.txt
uEnv.txt was destroyed on aarch64 because here a new u-boot was shipped.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-02-22 11:38:15 +00:00
Peter Müller
f1180ec2dc Core Update 165: Ship oci-setup initscript
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-21 21:36:18 +00:00
Peter Müller
efb999548a samba: Fix rootfiles on ARM
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-21 21:28:03 +00:00
Michael Tremer
ebd2d75952 oci-cli: Ship egg metadata
This package tries to identify if it is actually installed and does that
in a rather unorthodox way. So, thoses files are needed to run the "oci"
command. Only god knows why.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
439e713e78 python3-terminaltables: New package
Required by oci-cli.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
91f907df8e python3-arrow: New package
Required by oci-cli.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
d92b81e9df python3-click: New package
Required by oci-python-sdk

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
cb0c310e47 python3-pytz: New package
Required by oci-python-sdk

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
03d1f485a2 python3-circuitbreaker: New package
Required by oci-python-sdk

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
0762a36be2 python3-pycparser: New package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
5868a78eb5 python3-install: New package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
8debeb1da0 python3-pep517: New package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
396cbbae0b python3-build: New package
This can build packages.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
15293beded python3-flit: New package
Yet another build system for Python

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
a7e60957a3 python3-idna: New package
Adds support for international domain names to python3-requests.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
3992da532d python3-certifi: New package
This package provides the Mozilla CA list for python3-requests.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
1acceaadb2 python3-requests: New package
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
2bc596c667 python3-charset-normalizer: New package
Required by python3-requests

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
7c49b08794 python3-cryptography: New package required by oci-python-sdk
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
cdb6d532d7 python3-cffi: New package
Required by python3-cryptography.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00
Michael Tremer
bd5d153561 python3-semantic-version: New package
This is required by setuptools-rust.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-21 21:13:50 +00:00