As the first update of the year, we have bundled a number of package updates, security and bug fixes for you: IPFire 2.19 – Core Update 109
The DNS proxy which is working inside IPFire has been updated to
unbound 1.6.0 which brings various bug fixes. Therefore, QNAME minimisation and hardening below NX domains have been re-activated.
At start time, IPFire now also checks if a router in front of IPFire drops DNS responses which are longer than a certain threshold (some Cisco devices do this to “harden” DNS). If this is detected, the EDNS buffer size if reduced which makes unbound fall back to TCP for larger responses. This might slow down DNS slightly, but keeps it working after all in those misconfigured environments.
opensslhas been updated to 1.0.2k which fixes a number of security vulnerabilities with “moderate” severity
- The kernel is now supporting some newer eMMC modules
- The backup script is now working more reliably on all architectures
- The network scripts that created MACVTAP bridges for virtualisation among other things now support standard 802.3 bridges, too
- The firewall GUI denied creating subnets which were a subnet of any of the standard networks which has been fixed
- Matthias Fischer submitted package updates for:
bind9.11.0-P2 with some security fixes,
squid3.5.24 which fixes various bugs,
libpnghas been updated to 1.2.57 which fixes some security vulnerabilities
- Jonatan Schlag packaged Python 3 for IPFire
- He also updated
libvirtto version 2.5 and
qemuto version 2.8
- Matthias Fischer submitted a number of updates for the following packages:
torhas been updated to 0.2.9.9 which fixes a number of denial-of-service vulnerabilities
sarghas been updated to 2.3.10
We are currently crowdfunding a Captive Portal for IPFire and would like you to ask to check it out and support us!
Please help us to support the work on IPFire Project with your donation.