| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
| |
|
|
|
|
| |
CVE-2017-5953: Tree length values not validated properly when handling a spell file
|
|
|
|
| |
CVE-2017-5930: allows to delete protected aliases
|
|
|
|
| |
CVE-2017-3135: Combination of DNS64 and RPZ Can Lead to Crash
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-7922 (arbitrary code execution)
CVE-2016-7923 (arbitrary code execution)
CVE-2016-7924 (arbitrary code execution)
CVE-2016-7925 (arbitrary code execution)
CVE-2016-7926 (arbitrary code execution)
CVE-2016-7927 (arbitrary code execution)
CVE-2016-7928 (arbitrary code execution)
CVE-2016-7929 (arbitrary code execution)
CVE-2016-7930 (arbitrary code execution)
CVE-2016-7931 (arbitrary code execution)
CVE-2016-7932 (arbitrary code execution)
CVE-2016-7933 (arbitrary code execution)
CVE-2016-7934 (arbitrary code execution)
CVE-2016-7935 (arbitrary code execution)
CVE-2016-7936 (arbitrary code execution)
CVE-2016-7937 (arbitrary code execution)
CVE-2016-7938 (arbitrary code execution)
CVE-2016-7939 (arbitrary code execution)
CVE-2016-7940 (arbitrary code execution)
CVE-2016-7973 (arbitrary code execution)
CVE-2016-7974 (arbitrary code execution)
CVE-2016-7975 (arbitrary code execution)
CVE-2016-7983 (arbitrary code execution)
CVE-2016-7984 (arbitrary code execution)
CVE-2016-7985 (arbitrary code execution)
CVE-2016-7986 (arbitrary code execution)
CVE-2016-7992 (arbitrary code execution)
CVE-2016-7993 (arbitrary code execution)
CVE-2016-8574 (arbitrary code execution)
CVE-2016-8575 (arbitrary code execution)
CVE-2017-5202 (arbitrary code execution)
CVE-2017-5203 (arbitrary code execution)
CVE-2017-5204 (arbitrary code execution)
CVE-2017-5205 (arbitrary code execution)
CVE-2017-5341 (arbitrary code execution)
CVE-2017-5342 (arbitrary code execution)
CVE-2017-5482 (arbitrary code execution)
CVE-2017-5483 (arbitrary code execution)
CVE-2017-5484 (arbitrary code execution)
CVE-2017-5485 (arbitrary code execution)
CVE-2017-5486 (arbitrary code execution)
|
|
|
|
|
|
|
| |
CVE-2016-10169: global buffer overread in read_code / read_words.c
CVE-2016-10170: Heap out of bounds read in WriteCaffHeader / caff.c
CVE-2016-10171: heap out of bounds read in unreorder_channels / wvunpack.c
CVE-2016-10172: Heap out of bounds read in read_new_config_info / open_utils.c
|
|
|
|
|
|
| |
CVE-2016-10195: dns remote stack overread vulnerability
CVE-2016-10196: (stack) buffer overflow in evutil_parse_sockaddr_port()
CVE-2016-10197: out-of-bounds read in search_make_new()
|
|
|
|
| |
CVE-2017-5601: Out of bounds read in lha_read_file_header_1() function
|
|
|
|
| |
CVE-2016-10165: Out-of-bounds read in Type_MLU_Read()
|
|
|
|
| |
fixes #6528
|
|
|
|
|
|
|
| |
CVE-2016-10164: Out-of-bounds write in XPM extension parsing
libXpm 3.5.12 changes:
https://lists.freedesktop.org/archives/xorg/2016-December/058537.html
|
|
|
|
| |
CVE-2017-5225: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
|
|
|
|
|
|
|
|
| |
- CVE-2017-3731
- CVE-2017-3732
- CVE-2016-7055
(cherry picked from commit f8bf827fae4885976509355d07182af03796ddda)
|
|
|
|
| |
CVE-2016-9401
|
|
|
|
|
|
|
|
|
| |
CVE-2017-3238
CVE-2017-3243
CVE-2017-3244
CVE-2017-3258
CVE-2017-3317
CVE-2017-3318
|
|
|
|
| |
CVE-2016-8605: Thread-unsafe umask modification
|
|
|
|
| |
CVE-2016-6301: NTP server denial of service flaw
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-10033
CVE-2016-10045
Issues were fixed in 5.2.18 and 5.2.20
However, there were major changes between 5.2.0 and 5.2.20
https://github.com/PHPMailer/PHPMailer/blob/master/changelog.md
5.2.0 is NOT AVAILABLE anymore for download
Next available version is 5.2.4
https://github.com/PHPMailer/PHPMailer/releases?after=v5.2.5
(not sure if there were major changes between 5.2.0 and 5.2.4)
This upgrade contains patch which is based on 2 commits
containing fix for CVE-2016-10045 and CVE-2016-10033:
https://github.com/PHPMailer/PHPMailer/commit/9743ff5c7ee16e8d49187bd2e11149afb9485eae
https://github.com/PHPMailer/PHPMailer/commit/833c35fe39715c3d01934508987e97af1fbc1ba0
These commits were adjusted to 5.2.4
|
|
|
|
|
| |
CVE-2016-9941: Heap-based buffer overflow in rfbproto.c
CVE-2016-9942: Heap-based buffer overflow in ultra.c
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9273: heap-buffer-overflow in cpStrips
CVE-2016-9297: segfault in _TIFFPrintField
CVE-2016-9448: Invalid read of size 1 in TIFFFetchNormalTag
CVE-2016-9453: out-of-bounds Write Caused by memcpy and no bound check in tiff2pdf
CVE-2016-3186: Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.
CVE-2016-3621: Out-of-bounds Read in the bmp2tiff tool
CVE-2016-3622: Divide By Zero in the tiff2rgba tool
CVE-2016-3623, CVE-2016-3624: Divide By Zero in the rgb2ycbcr tool
CVE-2016-3625: Out-of-bounds Read in the tiff2bw tool
CVE-2016-3658, CVE-2014-8127: Illegal read in TIFFWriteDirectoryTagLongLong8Array function in tiffset / tif_dirwrite.c
CVE-2016-5314, CVE-2016-5315, CVE-2016-5316, CVE-2016-5317: PixarLogDecode() out-of-bound writes
CVE-2016-5320, CVE-2016-5875: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c
bugzilla suppose that CVE-2016-5320 is a duplicate of CVE-2016-5314 (https://bugs.alpinelinux.org/issues/6661) which was fixed in tiff 4.0.7 (http://bugzilla.maptools.org/show_bug.cgi?id=2554#c1)
CVE-2016-5321: out-of-bounds read in tiffcrop / DumpModeDecode() function
CVE-2016-5323: Divide-by-zero in _TIFFFax3fillruns() function
CVE-2016-5652: tiff2pdf JPEG Compression Tables Heap Buffer Overflow
|
|
|
|
|
|
|
|
| |
CVE-2017-5193: A NULL pointer dereference in the nickcmp function.
CVE-2017-5194: Use after free when receiving invalid nick message.
CVE-2017-5356: Out of bounds read when Printing the value.
CVE-2017-5195: Out of bounds read in certain incomplete control codes.
CVE-2017-5196: Out of bounds read in certain incomplete character sequences.
|
|
|
|
| |
fixes #6650
|
|
|
|
|
|
| |
CVE-2016-9131: A malformed response to an ANY query can cause an assertion failure during recursion
CVE-2016-9147: An error handling a query response containing inconsistent DNSSEC information could cause an assertion failure
CVE-2016-9444: An unusually-formed DS record response could cause an assertion failure
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9594: unititialized random
CVE-2016-9586: printf floating point buffer overflow
CVE-2016-9952: Win CE schannel cert wildcard matches too much
CVE-2016-9953: Win CE schannel cert name out of buffer read
CVE-2016-8625: IDNA 2003 makes curl use wrong host
https://curl.haxx.se/changes.html
|
|
|
|
|
| |
fixes #6633
remove unneeded patch (upstream fixed issue)
|
|
|
|
|
| |
fixes #3236
fixes #6392
|
|
|
|
| |
fix pcscd capabilities
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-2123: NDR Parsing ndr_pull_dnsp_name Heap-based Buffer Overflow Remote Code Execution Vulnerability
https://www.samba.org/samba/security/CVE-2016-2123.html
CVE-2016-2125: Unconditional privilege delegation to Kerberos servers in trusted realms
https://www.samba.org/samba/security/CVE-2016-2125.html
CVE-2016-2126: Flaws in Kerberos PAC validation can trigger privilege elevation
https://www.samba.org/samba/security/CVE-2016-2126.html
https://www.samba.org/samba/history/security.html
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9847: Unsafe generation of blowfish secret
CVE-2016-9848: phpinfo information leak value of sensitive (HttpOnly) cookies
CVE-2016-9849: Username deny rules bypass (AllowRoot & Others) by using Null Byte
CVE-2016-9850: Username rule matching issues
CVE-2016-9851: With a crafted request parameter value it is possible to bypass the logout timeout.
CVE-2016-9852 CVE-2016-9853 CVE-2016-9854 CVE-2016-9855: Multiple full path disclosure vulnerabilities
CVE-2016-9856 CVE-2016-9857: Multiple XSS vulnerabilities
CVE-2016-9858 CVE-2016-9859 CVE-2016-9860: We consider these vulnerabilities to be of moderate severity.
CVE-2016-9861: Bypass white-list protection for URL redirection
CVE-2016-9864: Multiple SQL injection vulnerabilities
CVE-2016-9865: Incorrect serialized string parsing
CVE-2016-9866: CSRF token not stripped from the URL
4.4.15.9 is minor security upgrade
https://www.phpmyadmin.net/news/2016/11/25/phpmyadmin-401018-44159-and-465-are-released/
|
|
|
|
|
| |
CVE-2016-10002: Information disclosure in HTTP Request processing.
CVE-2016-10003: Information disclosure in Collapsed Forwarding.
|
|
|
|
| |
CVE-2016-10010, CVE-2016-10011
|
| |
|
|
|
|
| |
(cherry picked from commit 1fa78865839b8c66006d1ae3a0a626e7acc7787d)
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
CVE-2016-5118
CVE-2016-7799, CVE-2016-7906
CVE-2016-4562, CVE-2016-4563, CVE-2016-4564, CVE-2016-5010, CVE-2016-5687,
CVE-2016-5688, CVE-2016-5689, CVE-2016-5690, CVE-2016-5691, CVE-2016-5841,
CVE-2016-5842, CVE-2016-6491
|
|
|
|
|
|
|
|
|
|
|
|
| |
Removed patches that are already applied in xen-4.5.5
https://www.xenproject.org/downloads/xen-archives/xen-45-series/xen-455.html
New fixes:
CVE-2016-10024, XSA-202: x86 PV guests may be able to mask interrupts
http://xenbits.xen.org/xsa/advisory-202.html
CVE-2016-10013, XSA-204: x86: Mishandling of SYSCALL singlestep during emulation
http://xenbits.xen.org/xsa/advisory-204.html
|
|
|
|
|
| |
CVE-2015-7554, CVE-2015-8668, CVE-2016-3945,
CVE-2016-3632, CVE-2016-3990, CVE-2016-3991
|
|
|
|
| |
(cherry picked from commit 91f0ed50281f76fcbbc7760fd7617e01b9a50c47)
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9932
CVE-2016-9815
CVE-2016-9816
CVE-2016-9818
(cherry picked from commit 3b5fa3b170637b8149c63d415d3a42c638b8b71a)
|
| |
|
| |
|
|
|
|
| |
(cherry picked from commit cf24cc64fbe2e718b0bee91cc486ca9071a87ddf)
|
|
|
|
| |
CVE-2016-6254
|
|
|
|
| |
CVE-2016-6321
|
|
|
|
| |
CVE-2016-7543
|
|
|
|
| |
CVE-2016-8864
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-8615
CVE-2016-8616
CVE-2016-8617
CVE-2016-8618
CVE-2016-8619
CVE-2016-8620
CVE-2016-8621
CVE-2016-8622
CVE-2016-8623
CVE-2016-8624
|