Commit Graph

3421 Commits

Author SHA1 Message Date
Arne Fitzenreiter
6c4319a1b8 openssl-compat: update to 0.9.8zc 2014-10-15 21:44:29 +02:00
Michael Tremer
877e2ef8bb openssl: Update to version 1.0.1j
OpenSSL Security Advisory [15 Oct 2014]
=======================================

SRTP Memory Leak (CVE-2014-3513)
================================

Severity: High

A flaw in the DTLS SRTP extension parsing code allows an attacker, who
sends a carefully crafted handshake message, to cause OpenSSL to fail
to free up to 64k of memory causing a memory leak. This could be
exploited in a Denial Of Service attack. This issue affects OpenSSL
1.0.1 server implementations for both SSL/TLS and DTLS regardless of
whether SRTP is used or configured. Implementations of OpenSSL that
have been compiled with OPENSSL_NO_SRTP defined are not affected.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.

This issue was reported to OpenSSL on 26th September 2014, based on an original
issue and patch developed by the LibreSSL project. Further analysis of the issue
was performed by the OpenSSL team.

The fix was developed by the OpenSSL team.

Session Ticket Memory Leak (CVE-2014-3567)
==========================================

Severity: Medium

When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
integrity of that ticket is first verified. In the event of a session
ticket integrity check failing, OpenSSL will fail to free memory
causing a memory leak. By sending a large number of invalid session
tickets an attacker could exploit this issue in a Denial Of Service
attack.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

This issue was reported to OpenSSL on 8th October 2014.

The fix was developed by Stephen Henson of the OpenSSL core team.

SSL 3.0 Fallback protection
===========================

Severity: Medium

OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
to block the ability for a MITM attacker to force a protocol
downgrade.

Some client applications (such as browsers) will reconnect using a
downgraded protocol to work around interoperability bugs in older
servers. This could be exploited by an active man-in-the-middle to
downgrade connections to SSL 3.0 even if both sides of the connection
support higher protocols. SSL 3.0 contains a number of weaknesses
including POODLE (CVE-2014-3566).

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
https://www.openssl.org/~bodo/ssl-poodle.pdf

Support for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller.

Build option no-ssl3 is incomplete (CVE-2014-3568)
==================================================

Severity: Low

When OpenSSL is configured with "no-ssl3" as a build option, servers
could accept and complete a SSL 3.0 handshake, and clients could be
configured to send them.

OpenSSL 1.0.1 users should upgrade to 1.0.1j.
OpenSSL 1.0.0 users should upgrade to 1.0.0o.
OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

This issue was reported to OpenSSL by Akamai Technologies on 14th October 2014.

The fix was developed by Akamai and the OpenSSL team.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv_20141015.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html
2014-10-15 19:19:15 +02:00
Michael Tremer
474daba689 bash: Update to version 4.3.30
Fixes #10633.
2014-10-06 12:23:35 +02:00
Michael Tremer
243f8ca6e9 squid: Update to 3.4.8
Contains some security fixes:

 * CVE-2014-6270
   http://www.squid-cache.org/Advisories/SQUID-2014_3.txt
 * CVE-2014-7141
   CVE-2014-7142
   http://www.squid-cache.org/Advisories/SQUID-2014_4.txt
2014-10-02 18:21:51 +02:00
Michael Tremer
da8c74ee53 parted: Update to 3.1. 2014-09-30 19:28:55 +02:00
Michael Tremer
801dcd70b0 bash: Import patch for version 4.3.27
See #10633
2014-09-29 21:29:57 +02:00
Michael Tremer
c02899be04 readline: Update to 6.3. 2014-09-29 13:51:26 +02:00
Michael Tremer
3347f993b6 bash: Import upstream fixes 2014-09-29 13:50:03 +02:00
Michael Tremer
56a435a001 bash: Import fix for CVE-2014-7169
http://www.openwall.com/lists/oss-security/2014/09/25/10

Conflicts:
	lfs/bash
2014-09-29 13:49:56 +02:00
Michael Tremer
77b3d64a16 bash: Fix for CVE-2014-6271
A flaw was found in the way Bash evaluated certain specially crafted
environment variables. An attacker could use this flaw to override
or bypass environment restrictions to execute shell commands.
Certain services and applications allow remote unauthenticated
attackers to provide environment variables, allowing them to exploit
this issue.
2014-09-29 13:49:51 +02:00
Michael Tremer
ce84ace5bf bash: Update to 4.3.
Conflicts:
	lfs/bash
2014-09-29 13:49:39 +02:00
Alexander Marx
d71bcfce59 squid-accounting: set right permissions of html directory for graphs and logo 2014-09-26 13:05:22 +02:00
Michael Tremer
b30890aa06 bash: Import upstream patches for CVE-2014-6271 and CVE-2014-7169 2014-09-26 12:42:27 +02:00
Michael Tremer
7a35d102cb dnsmasq: Update to 2.72 2014-09-25 21:16:01 +02:00
Michael Tremer
e86c70a99f bash: Import fix for CVE-2014-7169
http://www.openwall.com/lists/oss-security/2014/09/25/10
2014-09-25 19:38:23 +02:00
Michael Tremer
a4c895e569 Merge branch 'master' into next 2014-09-24 20:39:43 +02:00
Michael Tremer
6cda6f906e bash: Fix for CVE-2014-6271
A flaw was found in the way Bash evaluated certain specially crafted
environment variables. An attacker could use this flaw to override
or bypass environment restrictions to execute shell commands.
Certain services and applications allow remote unauthenticated
attackers to provide environment variables, allowing them to exploit
this issue.
2014-09-24 18:48:35 +02:00
Arne Fitzenreiter
cce37f04af openssl-compat: update to 0.9.8zb. 2014-09-09 19:20:54 +02:00
Arne Fitzenreiter
7b0afb50d3 Merge remote-tracking branch 'origin/master' into core82 2014-09-09 17:57:27 +02:00
Arne Fitzenreiter
35880220b0 rsync: update to 3.1.1. 2014-09-05 21:56:01 +02:00
Michael Tremer
bd76bcb8b4 glibc: Import several fixes from RHEL.
Fixes #10611, CVE-2014-5119 among other bug fixes.
2014-09-03 21:49:01 +02:00
Michael Tremer
94b3d7d2f2 squid: Update to 3.4.7
Solves a DoS issue "Ignore Range headers with unidentifiable byte-range values"
filed under security advisory SQUID-2014:2 and CVE-2014-3609.
2014-08-28 16:09:31 +02:00
Michael Tremer
ff6d34ab8b minidlna: Update to 1.1.3
Fixes #10573
2014-08-24 15:14:25 +02:00
Michael Tremer
bfea8d7d2f findutils: Run updatedb once a week
As suggested in bug #10303
2014-08-24 14:46:06 +02:00
Arne Fitzenreiter
d2ff1cc455 samba: bump PAK_VER. 2014-08-22 17:03:19 +02:00
Arne Fitzenreiter
d49a04c939 sane: depends on cups libs. 2014-08-22 12:05:39 +02:00
Arne Fitzenreiter
9bd0bfd233 Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next
Conflicts:
	lfs/iputils
2014-08-22 09:17:27 +02:00
Michael Tremer
f204a2e649 initscripts: Remove old firewall-reload symlink 2014-08-21 10:47:41 +02:00
Arne Fitzenreiter
6b271ee283 iputils: Ship tracepath 2014-08-20 21:56:35 +02:00
Arne Fitzenreiter
d2a08170b9 ppp: update to 2.4.7.
Fix for ms-chap-v2.
fixes #10575.
2014-08-19 16:17:44 +02:00
Timo Eissler
4b12aa414c firewall: fix faulty masquerading packets 2014-08-08 09:53:56 +02:00
Michael Tremer
935c2f233b Merge remote-tracking branch 'ms/ddns.cgi-fixes' into next
Conflicts:
	html/cgi-bin/ddns.cgi
2014-08-07 21:06:13 +02:00
Michael Tremer
89e9f46e5b Merge remote-tracking branch 'amarx/ACCOUNTING' into next
Conflicts:
	make.sh
2014-08-07 14:59:17 +02:00
Michael Tremer
f808e5891c Add batctl and libnl-3. 2014-08-07 14:49:50 +02:00
Arne Fitzenreiter
5ecf77e730 openssl: update to 1.0.1i. 2014-08-07 00:57:23 +02:00
Alexander Marx
f38af1a976 Per-PDF-API2: new perl module used by squid-accounting 2014-08-06 13:38:21 +02:00
Michael Tremer
9188f6142c check_mk_agent: Bump release version to 4. 2014-08-06 10:30:44 +02:00
Arne Fitzenreiter
a0a3d81c12 Merge branch 'master' of git.ipfire.org:/pub/git/ipfire-2.x 2014-08-06 09:36:31 +02:00
Arne Fitzenreiter
b283b2cf8f lzo: Downgrade to 2.0.6 (CVE-2014-4607 patched).
openvpn fails at lzo_init with lzo-2.07 and 2.08 on armv5tel.
2014-08-06 09:35:46 +02:00
Alexander Marx
db8a01e027 Squid-accounting: new addon for measuring proxy traffic per user/ip 2014-08-06 08:58:43 +02:00
Michael Tremer
5354d0f5c9 ddns: Update to 004. 2014-08-05 19:49:28 +02:00
Michael Tremer
06dbe99dbb tor: Update to 0.2.4.23
http://www.heise.de/security/meldung/Erfolgreicher-Angriff-auf-Tor-Anonymisierung-2278774.html
2014-08-04 19:39:16 +02:00
Michael Tremer
612ce88182 Merge remote-tracking branch 'dweismueller/owncloud-7' into next 2014-07-30 13:15:33 +02:00
Arne Fitzenreiter
f0728c790f Merge remote-tracking branch 'origin/master' into next
Conflicts:
	config/cfgroot/general-functions.pl
2014-07-29 22:01:19 +02:00
Daniel Weismüller
3bd9129df0 owncloud: updatet to version 7.0.0 2014-07-29 15:55:36 +02:00
Michael Tremer
4e9a2b5732 general-functions.pl: Replace lots of broken network code.
The state of some code especially in general-functions.pl
is in such a bad shape and faulty.
This is a first step that replaces some of the network
functions with those who have been tested and work for
undefined inputs.

The old functions have been left in place as stubs
and must be removed at some time.
2014-07-27 22:46:20 +02:00
Michael Tremer
2deb75c0f3 Merge remote-tracking branch 'ms/squid-ad' into next 2014-07-27 12:01:50 +02:00
Michael Tremer
bb5902b6f4 mpfr: Update to 3.2.1. 2014-07-26 22:12:49 +02:00
Michael Tremer
45cd74d708 gmp: Update to 6.0.0. 2014-07-26 22:09:20 +02:00
Michael Tremer
cc7411e791 Merge remote-tracking branch 'morlix/bacula' into next
Conflicts:
	make.sh
2014-07-26 21:34:45 +02:00