[EPEL-devel] Fedora EPEL 8 updates-testing report

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The following Fedora EPEL 8 Security updates need testing:
 Age  URL
   3  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2025-eb0d031bce   lemonldap-ng-2.20.2-1.el8
   3  https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2025-750a988e70   easy-rsa-3.2.1-2.el8


The following builds have been pushed to Fedora EPEL 8 updates-testing

    clamav-1.0.8-1.el8
    fastd-23-2.el8
    radicale-3.4.1-1.el8

Details about builds:


================================================================================
 clamav-1.0.8-1.el8 (FEDORA-EPEL-2025-80c00be088)
 End-user tools for the Clam Antivirus scanner
--------------------------------------------------------------------------------
Update Information:

Update to 1.0.8
--------------------------------------------------------------------------------
ChangeLog:

* Sun Jan 26 2025 Orion Poplawski <orion@xxxxxxxx> - 1.0.8-1
- Update to 1.0.8
--------------------------------------------------------------------------------


================================================================================
 fastd-23-2.el8 (FEDORA-EPEL-2025-c38ff34ea4)
 Fast and secure tunneling daemon
--------------------------------------------------------------------------------
Update Information:

This release contains a number of small improvements and bugfixes, including
mitigations for the LOW severity vulnerability CVE-2025-24356.
Bugfixes
Add mitigations for fast-reconnect amplification attacks
When receiving a data packet from an unknown IP address/port combination, fastd
will assume that one of its connected peers has moved to a new address (for
example due to internet lines with dynamic IP, or roaming between WWAN and a
local internet connection) and initiate a reconnect by sending a handshake
packet. This â??fast reconnectâ?? avoids having to wait for a session timeout (up to
~90s) until a new connection is established.
Even a 1-byte UDP packet just containing the fastd packet type header can
trigger a much larger handshake packet (~150 bytes of UDP payload). With fastd
v22, this number is doubled, because two handshakes are sent (one in a
pre-v22-compatible format and one in a new L2TP-style format). Including IPv4
and UDP headers, the resulting amplification factor is roughly 12-13.
By sending data packets with a spoofed source address to fastd instances
reachable on the internet, this amplification of UDP traffic might be used to
facilitate a Distributed Denial of Service attack.
fastd has always implemented rate limiting for handshakes to unknown IP
addresses and ports to 1 handshake per 15s to avoid this kind of attack, however
the rate is limited per-port and not per-address, thus still allowing handshakes
to be sent to all 65535 UDP ports of the same IP address unlimited.
The issue has been mitigated in fastd v23 by a number of changes:
Rate-limiting has been changed changed to be applied per-address instead of per-
port
Only one handshake instead of two handshakes is sent for fast-reconnect (by
determining from the format of the data packet whether a pre-v22 or L2TP-style
handshake should be used)
Require at least a full method header instead of just a single byte for a data
packet to be considered valid. This does not have an effect on instances that
enable the null method (regardless of null being actually in use), as a single-
byte UDP packet is a valid null keepalive, but for all other methods the
amplification factor is slightly reduced.
Only fastd instances that allow connections from arbitrary IP addresses are
vulnerable. Instances in a â??clientâ?? role that configure their peers using the
remote config option (which includes the common deployment as part of the Gluon
wireless mesh firmware) will not respond to unexpected data packets with a
handshake and are therefore unaffected.
CVE-2025-24356 has been assigned to this issue. The severity of this
vulnerability is considered LOW.
A GitHub security advisory can be found under GHSA-pggg-vpfv-4rcv.
Fix config loading to fail on offload l2tp no; when L2TP offloading is
unsupported by the fastd build or the kernel
Fix assembly Salsa20(/12) implementations accidentally generating the Linux-
specific .note.GNU-stack ELF section on non-Linux systems
This is unlikely to have caused any issues, as other systems should just ignore
the unknown section.
Status socket: - Fix interface name information with L2TP offloading - Add per-
peer MTU information
Documentation: - Fix incorrect â??persist interfaceâ?? examples - Improve
explanation of float option
Build: - Fix build on macOS (again) - Fix build with Meson 0.49 (the minimum
version marked as supported by fastd)
Other changes
Add support for Indirect Branch Tracking and Shadow Stacks on x86
The assembly Salsa20(/12) implementations have been marked compatible with IBT
and SHSTK, which are part of Intel CET (Control-flow Enforcement Technology) and
can be enabled using the -fcf-protection GCC option.
The file COPYRIGHT has been renamed to LICENSE
The vendored version of libmnl that is used with libmnl_builtin=true has been
updated to 1.0.5
--------------------------------------------------------------------------------
ChangeLog:

* Sun Jan 26 2025 Felix Kaechele <felix@xxxxxxxxxxx> - 23-1
- update to 23
* Thu Jan 16 2025 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 22-17
- Rebuilt for https://fedoraproject.org/wiki/Fedora_42_Mass_Rebuild
* Wed Jul 17 2024 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 22-16
- Rebuilt for https://fedoraproject.org/wiki/Fedora_41_Mass_Rebuild
* Thu Feb  8 2024 Felix Kaechele <felix@xxxxxxxxxxx> - 22-15
- Add tmpfiles configuration for potential socket location
* Wed Jan 24 2024 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 22-14
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Fri Jan 19 2024 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 22-13
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Thu Oct  5 2023 Remi Collet <remi@xxxxxxxxxxxxxxxxx> - 22-12
- rebuild for new libsodium
* Sat Sep  9 2023 Felix Kaechele <felix@xxxxxxxxxxx> - 22-11
- clean up spec file
- use rpmautospec
- use forge macros
- fix License tag
* Wed Jul 19 2023 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 22-9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
* Thu Jan 19 2023 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 22-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
* Thu Jul 21 2022 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 22-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2342133 - fastd-23 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=2342133
--------------------------------------------------------------------------------


================================================================================
 radicale-3.4.1-1.el8 (FEDORA-EPEL-2025-7b63c58a57)
 A simple CalDAV (calendar) and CardDAV (contact) server
--------------------------------------------------------------------------------
Update Information:

Update to 3.4.1
--------------------------------------------------------------------------------
ChangeLog:

--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2342121 - radicale-3.4.1 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=2342121
--------------------------------------------------------------------------------


-- 
_______________________________________________
epel-devel mailing list -- epel-devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to epel-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/epel-devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

[Index of Archives]     [Fedora Announce]     [Fedora News]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Announce]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora QA]     [Fedora Triage]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Linux Apps]     [Gnome Users]     [KDE Users]     [Fedora Tools]     [Fedora Art]     [Fedora Docs]     [Maemo Users]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Fedora ARM]

  Powered by Linux