This release emphasizes improved network monitoring through innovative reporting tools, alongside toolchain rebasing and extensive package updates to bolster security and performance.
Designed for both small offices and large enterprises, the update addresses long-standing user requests for better visibility into security events, ensuring administrators can respond swiftly to threats.
The standout addition in IPFire 2.29 is the new IPS reporting suite, which transforms how network activity is tracked and documented.
Administrators can now receive immediate email notifications for alerts exceeding a user-defined threshold, ensuring critical incidents are flagged in real-time without sifting through logs.
Scheduled PDF reports, generated daily, weekly, or monthly, offer comprehensive summaries of all alerts in a readable format suitable for archiving or sharing with stakeholders.
Additionally, alerts can be forwarded to remote syslog servers, providing an independent log trail that survives potential firewall compromise for robust forensic analysis.
These features enhance auditability, allowing teams to maintain verifiable records of threat detection and response, even in adversarial scenarios.
A sample PDF report demonstrates the clarity of these outputs, including event timelines and severity highlights. By extending IPS data beyond the device itself, IPFire strengthens operational accountability and simplifies compliance efforts.
Upgrading to Suricata 8.0.1, the IPS now caches compiled rules for faster startups and includes more resilient memory management.
Expanded protocol support covers DNS-over-HTTP/2, Multicast DNS, LDAP, POP3, SDP in SIP, SIP over TCP, and WebSocket, enabling deeper traffic inspection.
On ARM architectures, the Vectorscan library optimizes pattern matching using advanced vector instructions, delivering sharper performance in resource-constrained environments.
These enhancements ensure the IPS remains efficient against evolving threats while minimizing overhead on hardware.
The IPFire toolchain has been rebased on GNU Compiler Collection 15.2.0, GNU Binutils 2.42, and GNU glibc 2.42, incorporating bug fixes, security patches, and performance gains.
A broad array of packages received updates, including BIND 9.20.13 for DNS stability, cURL 8.16.0 for secure transfers, and sudo 1.9.17p2 for privilege management improvements.
Intel’s latest microcode addresses recent processor vulnerabilities, while GRUB has been fortified against multiple exploits.
Notably, responsible disclosure from VulnCheck and Pellera Technologies revealed 18 web UI vulnerabilities due to insufficient input validation from browsers.
These have been patched and assigned CVEs from 2025-34301 to 2025-34318, all rated with potential for cross-site scripting or injection if exploited by authenticated admins.
| CVE ID | Description | Bugzilla ID | CVSS Score (Estimated) |
|---|---|---|---|
| CVE-2025-34301 | Web UI input validation flaw | #13876 | Medium (6.1) |
| CVE-2025-34302 | Web UI input validation flaw | #13877 | Medium (6.1) |
| CVE-2025-34303 | Web UI input validation flaw | #13878 | Medium (6.1) |
| CVE-2025-34304 | Web UI input validation flaw | #13879 | Medium (6.1) |
| CVE-2025-34305 | Web UI input validation flaw | #13880 | Medium (6.1) |
| CVE-2025-34306 | Web UI input validation flaw | #13881 | Medium (6.1) |
| CVE-2025-34307 | Web UI input validation flaw | #13882 | Medium (6.1) |
| CVE-2025-34308 | Web UI input validation flaw | #13883 | Medium (6.1) |
| CVE-2025-34309 | Web UI input validation flaw | #13884 | Medium (6.1) |
| CVE-2025-34310 | Web UI input validation flaw | #13885 | Medium (6.1) |
| CVE-2025-34311 | Web UI input validation flaw | #13886 | Medium (6.1) |
| CVE-2025-34312 | Web UI input validation flaw | #13887 | Medium (6.1) |
| CVE-2025-34313 | Web UI input validation flaw | #13888 | Medium (6.1) |
| CVE-2025-34314 | Web UI input validation flaw | #13889 | Medium (6.1) |
| CVE-2025-34315 | Web UI input validation flaw | #13890 | Medium (6.1) |
| CVE-2025-34316 | Web UI input validation flaw | #13891 | Medium (6.1) |
| CVE-2025-34317 | Web UI input validation flaw | #13892 | Medium (6.1) |
| CVE-2025-34318 | Web UI input validation flaw | #13893 | Medium (6.1) |
Add-on packages like HAProxy 3.2.4, nginx 1.29.1, and Samba 4.22.4 also saw updates, extending IPFire’s versatility for advanced deployments. This release solidifies IPFire’s role as a reliable, evolving security cornerstone.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System appeared first on Cyber Security News.
FREEPORT, Ill. (WTVO) — The city of Freeport is in the process of demolishing One…
Shipping cranes stand above container ships loaded with shipping containers at the Port of Los…
The Nintendo Switch 2 Mario Kart World Bundle currently sells for $500 just about everywhere,…
From its gorgeous landscapes, gripping acting, and historically inspired combat animations, 1348 Ex Voto makes…
As part of a big Sonos Spring Sale event that started this week, Sonos is…
I have been on vacation or sick for most of the last two weeks. In…
This website uses cookies.