IPFire 2.29 Core Update 198 marks a significant advancement for users of this open-source firewall, introducing enhanced Intrusion Prevention System (IPS) capabilities powered by Suricata 8.0.1.
This release emphasizes improved network monitoring through innovative reporting tools, alongside toolchain rebasing and extensive package updates to bolster security and performance.
Designed for both small offices and large enterprises, the update addresses long-standing user requests for better visibility into security events, ensuring administrators can respond swiftly to threats.
The standout addition in IPFire 2.29 is the new IPS reporting suite, which transforms how network activity is tracked and documented.
Administrators can now receive immediate email notifications for alerts exceeding a user-defined threshold, ensuring critical incidents are flagged in real-time without sifting through logs.
Scheduled PDF reports, generated daily, weekly, or monthly, offer comprehensive summaries of all alerts in a readable format suitable for archiving or sharing with stakeholders.
Additionally, alerts can be forwarded to remote syslog servers, providing an independent log trail that survives potential firewall compromise for robust forensic analysis.
These features enhance auditability, allowing teams to maintain verifiable records of threat detection and response, even in adversarial scenarios.
A sample PDF report demonstrates the clarity of these outputs, including event timelines and severity highlights. By extending IPS data beyond the device itself, IPFire strengthens operational accountability and simplifies compliance efforts.
Upgrading to Suricata 8.0.1, the IPS now caches compiled rules for faster startups and includes more resilient memory management.
Expanded protocol support covers DNS-over-HTTP/2, Multicast DNS, LDAP, POP3, SDP in SIP, SIP over TCP, and WebSocket, enabling deeper traffic inspection.
On ARM architectures, the Vectorscan library optimizes pattern matching using advanced vector instructions, delivering sharper performance in resource-constrained environments.
These enhancements ensure the IPS remains efficient against evolving threats while minimizing overhead on hardware.
The IPFire toolchain has been rebased on GNU Compiler Collection 15.2.0, GNU Binutils 2.42, and GNU glibc 2.42, incorporating bug fixes, security patches, and performance gains.
A broad array of packages received updates, including BIND 9.20.13 for DNS stability, cURL 8.16.0 for secure transfers, and sudo 1.9.17p2 for privilege management improvements.
Intel’s latest microcode addresses recent processor vulnerabilities, while GRUB has been fortified against multiple exploits.
Notably, responsible disclosure from VulnCheck and Pellera Technologies revealed 18 web UI vulnerabilities due to insufficient input validation from browsers.
These have been patched and assigned CVEs from 2025-34301 to 2025-34318, all rated with potential for cross-site scripting or injection if exploited by authenticated admins.
| CVE ID | Description | Bugzilla ID | CVSS Score (Estimated) |
|---|---|---|---|
| CVE-2025-34301 | Web UI input validation flaw | #13876 | Medium (6.1) |
| CVE-2025-34302 | Web UI input validation flaw | #13877 | Medium (6.1) |
| CVE-2025-34303 | Web UI input validation flaw | #13878 | Medium (6.1) |
| CVE-2025-34304 | Web UI input validation flaw | #13879 | Medium (6.1) |
| CVE-2025-34305 | Web UI input validation flaw | #13880 | Medium (6.1) |
| CVE-2025-34306 | Web UI input validation flaw | #13881 | Medium (6.1) |
| CVE-2025-34307 | Web UI input validation flaw | #13882 | Medium (6.1) |
| CVE-2025-34308 | Web UI input validation flaw | #13883 | Medium (6.1) |
| CVE-2025-34309 | Web UI input validation flaw | #13884 | Medium (6.1) |
| CVE-2025-34310 | Web UI input validation flaw | #13885 | Medium (6.1) |
| CVE-2025-34311 | Web UI input validation flaw | #13886 | Medium (6.1) |
| CVE-2025-34312 | Web UI input validation flaw | #13887 | Medium (6.1) |
| CVE-2025-34313 | Web UI input validation flaw | #13888 | Medium (6.1) |
| CVE-2025-34314 | Web UI input validation flaw | #13889 | Medium (6.1) |
| CVE-2025-34315 | Web UI input validation flaw | #13890 | Medium (6.1) |
| CVE-2025-34316 | Web UI input validation flaw | #13891 | Medium (6.1) |
| CVE-2025-34317 | Web UI input validation flaw | #13892 | Medium (6.1) |
| CVE-2025-34318 | Web UI input validation flaw | #13893 | Medium (6.1) |
Add-on packages like HAProxy 3.2.4, nginx 1.29.1, and Samba 4.22.4 also saw updates, extending IPFire’s versatility for advanced deployments. This release solidifies IPFire’s role as a reliable, evolving security cornerstone.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
A groundbreaking security vulnerability has emerged that fundamentally challenges the integrity of modern trusted execution…
Tel Aviv, Israel, October 29th, 2025, CyberNewsWire Sweet Security Brings Runtime-CNAPP Power to Windows Sweet…
Amazon Web Services encountered significant operational challenges in its US-EAST-1 region on October 28, 2025,…
A critical cross-site scripting (XSS) vulnerability has been discovered in the popular LiteSpeed Cache plugin…
A new open-source tool called HikvisionExploiter has emerged, designed to automate attacks on vulnerable Hikvision…
The npm ecosystem faces a sophisticated new threat as ten malicious packages have emerged, each…