From mboxrd@z Thu Jan 1 00:00:00 1970 From: The IPFire Project To: ipfire-announce@lists.ipfire.org Subject: IPFire 2.15 - Core Update 86 released Date: Sat, 24 Jan 2015 18:26:34 +0100 Message-ID: MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============5266836521643030210==" List-Id: --===============5266836521643030210== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit http://www.ipfire.org/news/ipfire-2-15-core-update-86-released This is the official release announcement of IPFire 2.15 – Core Update 86 which brings various security fixes across several packages. Hence we recommend installing this update as soon as possible and to execute a reboot afterwards. Security vulnerabilities openssl The openssl library which implements the TLS/SSL protocol and is used by various other packages in the system has been updated to version 1.0.1k. This release fixes eight security issues that have all been classified with “moderate” or less severity (CVE-2014-3571, CVE-2015-0206, CVE-2014-3569, CVE-2014-3572, CVE-2015-0204, CVE-2015-0205, CVE-2014-8275, CVE-2014-3570). openvpn openvpn has been updated to version 2.3.6 which also fixes a security vulnerability (CVE-2014-8104) which allowed remote authenticated users to cause a denial of service. strongswan strongswan has been updated to version 5.2.1 and we added a patch that fixes CVE-2014-9221. Before that it was possible to crash the service remotely with a custom DH key size. Originally, Core Update 86 was planned to become IPFire 2.17. This release has been postponed because we still require some people to send us back their testing feedback, especially about updating the bootloader. If you want to join the group of testers, that would help us out a lot. If you want to support the project otherwise, please check out the current fundings running on the IPFire wishlist [1]. Sincerely, -The IPFire Team [1] http://wishlist.ipfire.org/ --===============5266836521643030210== Content-Type: application/pgp-signature Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="signature.asc" MIME-Version: 1.0 LS0tLS1CRUdJTiBQR1AgU0lHTkFUVVJFLS0tLS0KVmVyc2lvbjogR251UEcgdjIKCmlRSWNCQUFC Q2dBR0JRSlV3OVhLQUFvSkVJQjU4UDl2a0FrSFc5b1AvajVaZmlqVGRJeWc0Q2dFaSs3a1pLTXAK NTJXalRFdm9oQUo5RXRkRWtCaGN4d2g2UXg0TFhvb2MzN0JyQm9hWUhyYzVFeWx1RytOSmk4bGFn LzBWTUFOUQpsTm9aMkIzUVJXMzlYSUdXMnl3OThmeFduYVd5ZTlUVy8yamVtbmJLU09JZDRJTlYz ZDVqbVVFRVpHUWRGNEZQCnQ5dUNkeHRUN1l4VGxnSzNicTltYWNKNzBDeis3eWwvOUY1ZDF2dWNo cnZmbmEwOThMYWtyVmIzdnVoK0RhdzgKaDF6SzdlbE9Jc093eC9jWWdYTXBBckJWcU92QVdWSUw1 UkNobmZMcm54VGM1UTlyZkRqbDgxUFFzNTd4TzU2QgoxN1AxZlZZS1NMMVF0UHlDV0JmMndDdFZs RUkxc05HV1l2UEZtaEM5NkIveXhwSVhIUi9wdXFLMlZuaitTcHd6ClJacnU0OTI5S1FkKzRjNlJj TURRMXFVRldGSE43M0NES09JZ28wTlZyanBtOUNyUkpKZ2s3M1FYK3VWUDdyYTYKVU5yVGQ3Zmgv Y2hiREIxbmlLQ3ZhNWZuWFl6VHFGT1RJV2JxenhyZnNIZkErMTBtRnFhUGs1RGZtUC85bENqLwpr UEhJYUZ6aVByRDlzRVQwakN2ZHhzVGJnNzdvVm1zOGx2SlZna2ZWSUVRS3pYY28yc0NzZ3RtenNa RktMZ0dtCjNqcE9BdlFLOCtaUkJ0NHpXbjVweWl2d0x6Nm1RcHVvM1dyYWlzSDQrS1JRSWxJaVIz d1F3Uld5UThNa0NoRVUKY3BoWnFrakIwYjlIdFRVTEg4aXJBaDdJSWozdjlyQmFPRFlISUJxNG5U S2lmejJ5R2VqaHRwY2kzUkpKRFh6aApJTWVGSEdVaEpFRklaMHNVTzRtZQo9QWpVZQotLS0tLUVO RCBQR1AgU0lHTkFUVVJFLS0tLS0K --===============5266836521643030210==--