| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
| |
fixes #3976
(cherry picked from commit 8751d8eebf4ec79352ab99ea542e4ff8e7611ff1)
|
|
|
|
|
|
| |
fixes #3979
(cherry picked from commit fa535ab866a2c4085039cb509567fa09239b0cfa)
|
|
|
|
|
|
|
|
|
|
|
| |
fixes #3872
CVE-2014-9625
CVE-2014-9626
CVE-2014-9627
CVE-2014-9628
CVE-2014-9629
CVE-2014-9630
|
|
|
|
|
|
| |
CVE-2014-9637
CVE-2015-1395
CVE-2015-1396
|
|
|
|
| |
fixes #4009
|
|
|
|
|
|
|
|
| |
So we can have /usr on separate filesystem
fixes #4011
(cherry picked from commit 68726cf157624bf6e040d6f8c1b1f9c0ebb21b38)
|
|
|
|
| |
fixes #3996
|
|
|
|
| |
fixes #4001
|
|
|
|
|
|
|
|
|
|
|
| |
fix a segault that will happen when a DNS response contains an
unsupported RR section. additional AAAA records in SRV response was
enough to trigger it.
This fix will sipsak simply stop parsing the DNS response when it hits
unsupported RR sections.
(cherry picked from commit 30ab0ecbb0385605cda2d6b3c5de7ff7c6797dd8)
|
|
|
|
| |
(cherry picked from commit 7af0b1392ab4eb22be78b22fe7f5dd3876cbdc66)
|
|
|
|
|
| |
ref #3986
fixes #3990
|
|
|
|
| |
fixes #3985
|
|
|
|
|
|
| |
Fix circular symlink /usr/lib/libacl.a -> /usr/lib/libacl.a
(cherry picked from commit a423d083072c162c940fa827ce773df83dc17a72)
|
|
|
|
| |
fixes #3882
|
|
|
|
| |
fixes #3894
|
|
|
|
| |
fixes #3899
|
|
|
|
|
|
| |
fixes #3940
(cherry picked from commit bea27cd485c3a9064c48c949edd32385333b9b80)
|
| |
|
|
|
|
|
|
| |
fixes #3955
(cherry picked from commit 7ee317045943d8700870e25f7974283c0b5a12b8)
|
|
|
|
|
|
|
| |
fixes #2972
fixes #3938
(cherry picked from commit f8b1a52e683440dcb7e4b3222f33669a79805802)
|
|
|
|
| |
fixes #3904
|
|
|
|
| |
fixes #3909
|
|
|
|
|
| |
ref #3971
fixes #3975
|
|
|
|
| |
fixes #3961
|
|
|
|
|
|
| |
ref #3965
ref #3966
fixes #3970
|
| |
|
| |
|
|
|
|
|
| |
(cherry picked from commit c74d667dde080bf04cef65a13303c797543bf3e7)
Signed-off-by: Leonardo Arena <rnalrd@alpinelinux.org>
|
|
|
|
| |
(cherry picked from commit caaa251a49013a0d9a2552a62bd0f47fcabfabbe)
|
| |
|
|
|
|
| |
(cherry picked from commit 46f864c5e1dfbd4f02c3b29491d57b3c38b5de43)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
It should be possible to make ping work as normal user with recent
linux: https://lkml.org/lkml/2011/5/13/382
However, it appears that it requires relatively intrusive changes in the
ping utility. Its not just opening the socket as SOCK_DGRAM and think
everything is ok (like it appears to work on OSX)
Busybox tried to add support for it:
http://git.busybox.net/busybox/commit/networking/ping.c?id=72745632a13ccd12232127b31e1656f2f7ebcaff
But later reverted it:
http://git.busybox.net/busybox/commit/networking/ping.c?id=f0058b1b1fe9f7e69b415616096fb9347f599426
The patch for the normal ping utility is also relatively intrusive:
http://openwall.info/wiki/_media/segoon/iputils-ss020927-pingsock.diff
I could also not find anything that indicates that this works for ipv6
in kernel. There are no /proc/sys/net/ipv6/ping_group_range
So it looks like we need to set suid root for now.
ref #3000
(cherry picked from commit d37ee34b7691ca0e2d59f39ec2dbc9484105c087)
|
|
|
|
|
|
|
|
|
|
| |
ref #3864
fixes #3866
(cherry picked from commit 35e60941855d77260fac5b98ec03ef6c6f6e639a)
Conflicts:
main/grep/APKBUILD
|
|
|
|
|
|
|
| |
ref #3854
fixes #3858
(cherry picked from commit 5ac69ea49d71a514ca0d499827d11c4b5bb05d93)
|
|
|
|
| |
fixes #3852
|
|
|
|
|
|
| |
we add workarounds for a couple of issues in musl libc
(cherry picked from commit 2abdc2eb07801022e8314da1b96378364a1d83f9)
|
|
|
|
| |
(cherry picked from commit b5baa711a9758d453cb33a6e23de7163e5b40c66)
|
| |
|
|
|
|
| |
(cherry picked from commit 0984fc1390552b232fa7d3b4c8b03a73707c5a05)
|
|
|
|
|
|
|
| |
ref #3799
fixes #3803
(cherry picked from commit 6c0f5b1515a834e3b68f2e199ccce1148f6c8054)
|
|
|
|
|
|
|
| |
ref #3784
fixes #3788
(cherry picked from commit b53e06d83f6743f8a5b6a7bac9893af4033d27be)
|
|
|
|
|
|
| |
fixes #3839
(cherry picked from commit b49992f595070138cedb536b7320199788836015)
|
|
|
|
|
|
|
| |
ref #3779
fixes #3818
(cherry picked from commit a3c611fae92fca14cdae49707d4c798def7df413)
|
|
|
|
|
| |
ref #3804
fixes #3808
|
|
|
|
|
|
|
|
|
| |
fixes #3826
(cherry picked from commit 6285fa299ce16c6502150c257935bfdbc3aaf5d9)
Conflicts:
main/sox/APKBUILD
|
|
|
|
|
|
| |
fixes #3778
(cherry picked from commit 637ed149e5b0f0c9b01d9dfcd233c981233ee4dd)
|
|
|
|
|
|
|
| |
ref #3771
fixes #3773
(cherry picked from commit c26ee7ddc49f3aa15cd9e0ac6c85259d5c3f186e)
|
|
|
|
|
|
|
|
|
|
| |
AST-2015-001: File descriptor leak when incompatible codecs are offered (chan_pjsip)
AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability
(cherry picked from commit e3128a9a5f09d6142974693a94c3274cd54cd1d1)
Conflicts:
main/asterisk/APKBUILD
|
|
|
|
| |
(cherry picked from commit a2463ed03b4578110ae177274c31ac948333e649)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
S8046656: Update protocol support
S8047125, CVE-2015-0395: (ref) More phantom object references
S8047130: Fewer escapes from escape analysis
S8048035, CVE-2015-0400: Ensure proper proxy protocols
S8049253: Better GC validation
S8050807, CVE-2015-0383: Better performing performance data handling
S8054367, CVE-2015-0412: More references for endpoints
S8055304, CVE-2015-0407: More boxing for DirectoryComboBoxModel
S8055309, CVE-2015-0408: RMI needs better transportation considerations
S8055479: TLAB stability
S8055489, CVE-2014-6585: Better substitution formats
S8056264, CVE-2014-6587: Multicast support improvements
S8056276, CVE-2014-6591: Fontmanager feature improvements
S8057555, CVE-2014-6593: Less cryptic cipher suite management
S8058982, CVE-2014-6601: Better verification of an exceptional invokespecial
S8059485, CVE-2015-0410: Resolve parsing ambiguity
S8061210, CVE-2014-3566: Issues in TLS
Along with numerous backports and bug fixes.
(cherry picked from commit 926c90d464a607b5d7566361f0b6b104371733bc)
|