The next Core Update with number 109 has been released for testing. It comes with a number of package updates which include security fixes and bug fixes all across the place.
The DNS proxy which is working inside IPFire has been updated to
unbound 1.6.0 which brings various bug fixes. Therefore, QNAME minimisation and hardening below NX domains have been re-activated.
At start time, IPFire now also checks if a router in front of IPFire drops DNS responses which are longer than a certain threshold (some Cisco devices do this to “harden” DNS). If this is detected, the EDNS buffer size if reduced which makes unbound fall back to TCP for larger responses. This might slow down DNS slightly, but keeps it working after all in those misconfigured environments.
opensslhas been updated to 1.0.2k which fixes a number of security vulnerabilities with “moderate” severity
- The kernel is now supporting some newer eMMC modules
- The backup script is now working more reliably on all architectures
- The network scripts that created MACVTAP bridges for virtualisation among other things now support standard 802.3 bridges, too
- The firewall GUI denied creating subnets which were a subnet of any of the standard networks which has been fixed
- Matthias Fischer submitted package updates for:
bind9.11.0-P2 with some security fixes,
squid3.5.24 which fixes various bugs,
libpnghas been updated to 1.2.57 which fixes some security vulnerabilities
- Jonatan Schlag packaged Python 3 for IPFire
- He also updated
libvirtto version 2.5 and
qemuto version 2.8
- Matthias Fischer submitted a number of updates for the following packages:
torhas been updated to 0.2.9.9 which fixes a number of denial-of-service vulnerabilities
sarghas been updated to 2.3.10
As always, we would like to ask all users to participate in testing which will highly improve the quality of this update.
Please report any bugs to our bug tracker and provide any feedback on our development mailing list.