After the single-issue Core Update 166, the next regular update is available for testing. It brings an updated kernel in which we continue our efforts to harden IPFire even further; various package updates including bug and security fixes as well as smaller improvements throughout the distribution.
Linux Kernel 5.15.35
As usual, the updated kernel comes with a heap of bug fixes, security fixes, and hardware support improvements from upstream. In addition to that, Michael contributed a patch, which is not only fixing bug #12760, but also believed to cure some long-standing quirks, causing especially VoIP calls not to be established properly every now and then. Should the patch pass testing successfully, we will of course upstream it to the Linux kernel in order to let the whole open-source community benefit from it.
We took the opportunity to harden the kernel even further.
Most notably, it now comes with the Linux Security Module (LSM), also known as kernel lockdown,1 preventing IPFire's kernel from being tampered with, even if an attacker managed to get
root access to an IPFire installation.
dracuthas been updated to version 056 and improved to compress initial ramdisks better and faster. This also fixes boot issues on Xen hypervisors (#12773).
- Support for ReiserFS has been dropped from the installer, as this filesystem is now marked as deprecated in the Linux kernel since it is not compatible and won't be made compatible for the Y2k38 problem. Existing installations will continue to be supported for the time being.
- ARM: OrangePi Zero Plus and NanoPi R1S H5 are now supported
- Stefan contributed various fixes and improvements to the Intrusion Prevention System, resolving a couple of bugs
- In addition, he and Michael squashed some bugs in the firewall engine that were unfortunately not spotted during the testing phase for Core Update 165
unbound-dhcp-leases-bridgehas received improvements to reliably propagate DHCP hosts to the DNS. Thanks go to Anthony Heading for his work on that front.
- Text editor
nanois now part of the core system, to provide users with an alternative to
vimwithout needing to install an add-on
- A GPG key rollover for Pakfire, IPFire's package management, was performed
- Irrelevant parts of
linux-firmware, such as firmware blobs for switches, are no longer shipped and installed, saving a couple of megabytes
- A spring clean is performed on existing installation, removing orphaned system files accidentally left over from previous updates
- Bernhard contributed patches for fixing the "hostile networks" in the firewall hits graph
- The checksum algorithm for compilation routines and development has switched from
BLAKE2, requiring a couple of changes under the hood
- Several improvements were made to the web interface by Matthias
- After Core Update 165, Tor crashed due to its sandbox not permitting some syscalls required by updated
glibc. This has now been fixed.
- Updated packages:
gzip1.12 to fix CVE-2022-1271 (
xzwas patched in this occasion as well),
ntfs-3g2021.8.22, OpenSSH 8.9p1, OpenSSL 1.1.1n,
zlib1.2.12 to fix another vulnerability not covered in Core Update 166
- Updated add-ons:
nmap7.92, Postfix 3.7.0
For the sake of completeness, compressing
linux-firmware contents was heavily discussed and worked on during prior to this update. We ultimately had to step back from doing so, since we could not ship the compressed
linux-firmware due to size limitations, and compressing the files on existing installations would have taken ages, especially on systems with a slower CPU.
As always, we thank all people contributing to this release in whatever shape and form. Please test this update, especially if you are using exotic hardware or uncommon network setups, and provide feedback. IPFire is backed by volunteers - should you like what we are doing, please donate to keep the lights on.
Given the fact that LSM has been under development since 2012, the term "lockdown" was coined way before the pandemic. :-) ↩