aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* main/py-lxc-python2: backport from edgeLeonardo Arena2017-02-241-0/+26
|
* main/acf-freeradius3: upgrade to 0.1.3Ted Trask2017-02-221-4/+2
|
* main/vim: security fixes #6866Sergey Lukin2017-02-162-4/+39
| | | | CVE-2017-5953: Tree length values not validated properly when handling a spell file
* main/postfixadmin: security fixes #6838Sergey Lukin2017-02-152-5/+418
| | | | CVE-2017-5930: allows to delete protected aliases
* main/bind: security upgrade to 9.10.4_p6 - fixes #6832Sergey Lukin2017-02-151-5/+8
| | | | CVE-2017-3135: Combination of DNS64 and RPZ Can Lead to Crash
* main/tcpdump: security upgrade to 4.9.0 - fixes #6815Sergey Lukin2017-02-091-4/+49
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CVE-2016-7922 (arbitrary code execution) CVE-2016-7923 (arbitrary code execution) CVE-2016-7924 (arbitrary code execution) CVE-2016-7925 (arbitrary code execution) CVE-2016-7926 (arbitrary code execution) CVE-2016-7927 (arbitrary code execution) CVE-2016-7928 (arbitrary code execution) CVE-2016-7929 (arbitrary code execution) CVE-2016-7930 (arbitrary code execution) CVE-2016-7931 (arbitrary code execution) CVE-2016-7932 (arbitrary code execution) CVE-2016-7933 (arbitrary code execution) CVE-2016-7934 (arbitrary code execution) CVE-2016-7935 (arbitrary code execution) CVE-2016-7936 (arbitrary code execution) CVE-2016-7937 (arbitrary code execution) CVE-2016-7938 (arbitrary code execution) CVE-2016-7939 (arbitrary code execution) CVE-2016-7940 (arbitrary code execution) CVE-2016-7973 (arbitrary code execution) CVE-2016-7974 (arbitrary code execution) CVE-2016-7975 (arbitrary code execution) CVE-2016-7983 (arbitrary code execution) CVE-2016-7984 (arbitrary code execution) CVE-2016-7985 (arbitrary code execution) CVE-2016-7986 (arbitrary code execution) CVE-2016-7992 (arbitrary code execution) CVE-2016-7993 (arbitrary code execution) CVE-2016-8574 (arbitrary code execution) CVE-2016-8575 (arbitrary code execution) CVE-2017-5202 (arbitrary code execution) CVE-2017-5203 (arbitrary code execution) CVE-2017-5204 (arbitrary code execution) CVE-2017-5205 (arbitrary code execution) CVE-2017-5341 (arbitrary code execution) CVE-2017-5342 (arbitrary code execution) CVE-2017-5482 (arbitrary code execution) CVE-2017-5483 (arbitrary code execution) CVE-2017-5484 (arbitrary code execution) CVE-2017-5485 (arbitrary code execution) CVE-2017-5486 (arbitrary code execution)
* main/wavpack: security upgrade to 5.1.0 - fixes #6821Sergey Lukin2017-02-071-11/+14
| | | | | | | CVE-2016-10169: global buffer overread in read_code / read_words.c CVE-2016-10170: Heap out of bounds read in WriteCaffHeader / caff.c CVE-2016-10171: heap out of bounds read in unreorder_channels / wvunpack.c CVE-2016-10172: Heap out of bounds read in read_new_config_info / open_utils.c
* main/libevent: security fixes #6802Sergey Lukin2017-02-074-9/+294
| | | | | | CVE-2016-10195: dns remote stack overread vulnerability CVE-2016-10196: (stack) buffer overflow in evutil_parse_sockaddr_port() CVE-2016-10197: out-of-bounds read in search_make_new()
* main/libarchive: security upgrade to 3.2.2 - fixes #6794Sergei Lukin2017-02-012-4/+35
| | | | CVE-2017-5601: Out of bounds read in lha_read_file_header_1() function
* main/lcms2: security upgrade to 2.8 - fixes #6781Sergei Lukin2017-02-012-6/+35
| | | | CVE-2016-10165: Out-of-bounds read in Type_MLU_Read()
* main/ca-certificates: update to 20161130Natanael Copa2017-02-011-13/+7
| | | | fixes #6528
* main/libxpm: security upgrade to 3.5.12 - fixes #6754Sergey Lukin2017-01-311-5/+10
| | | | | | | CVE-2016-10164: Out-of-bounds write in XPM extension parsing libXpm 3.5.12 changes: https://lists.freedesktop.org/archives/xorg/2016-December/058537.html
* main/tiff: security fixes #6737Sergey Lukin2017-01-272-5/+81
| | | | CVE-2017-5225: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
* main/openssl: security upgrade to 1.0.2kTimo Teräs2017-01-261-4/+8
| | | | | | | | - CVE-2017-3731 - CVE-2017-3732 - CVE-2016-7055 (cherry picked from commit f8bf827fae4885976509355d07182af03796ddda)
* main/bash: security fixes #6658Sergey Lukin2017-01-242-1/+38
| | | | CVE-2016-9401
* main/mariadb: security upgrade to 5.5.54 - fixes #6721Sergey Lukin2017-01-241-4/+12
| | | | | | | | | CVE-2017-3238 CVE-2017-3243 CVE-2017-3244 CVE-2017-3258 CVE-2017-3317 CVE-2017-3318
* main/guile: security fixes #6367Sergei Lukin2017-01-232-4/+62
| | | | CVE-2016-8605: Thread-unsafe umask modification
* main/busybox: security fixes #6619Sergey Lukin2017-01-202-5/+55
| | | | CVE-2016-6301: NTP server denial of service flaw
* main/php-phpmailer: security upgrade to 5.2.4 - fixes #6626Sergey Lukin2017-01-202-8/+92
| | | | | | | | | | | | | | | | | | | | CVE-2016-10033 CVE-2016-10045 Issues were fixed in 5.2.18 and 5.2.20 However, there were major changes between 5.2.0 and 5.2.20 https://github.com/PHPMailer/PHPMailer/blob/master/changelog.md 5.2.0 is NOT AVAILABLE anymore for download Next available version is 5.2.4 https://github.com/PHPMailer/PHPMailer/releases?after=v5.2.5 (not sure if there were major changes between 5.2.0 and 5.2.4) This upgrade contains patch which is based on 2 commits containing fix for CVE-2016-10045 and CVE-2016-10033: https://github.com/PHPMailer/PHPMailer/commit/9743ff5c7ee16e8d49187bd2e11149afb9485eae https://github.com/PHPMailer/PHPMailer/commit/833c35fe39715c3d01934508987e97af1fbc1ba0 These commits were adjusted to 5.2.4
* main/libvncserver: security fixes #6641Sergey Lukin2017-01-203-4/+125
| | | | | CVE-2016-9941: Heap-based buffer overflow in rfbproto.c CVE-2016-9942: Heap-based buffer overflow in ultra.c
* main/tiff: security upgrade to 4.0.7 - fixes #6667Sergey Lukin2017-01-2010-727/+31
| | | | | | | | | | | | | | | | | | | CVE-2016-9273: heap-buffer-overflow in cpStrips CVE-2016-9297: segfault in _TIFFPrintField CVE-2016-9448: Invalid read of size 1 in TIFFFetchNormalTag CVE-2016-9453: out-of-bounds Write Caused by memcpy and no bound check in tiff2pdf CVE-2016-3186: Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file. CVE-2016-3621: Out-of-bounds Read in the bmp2tiff tool CVE-2016-3622: Divide By Zero in the tiff2rgba tool CVE-2016-3623, CVE-2016-3624: Divide By Zero in the rgb2ycbcr tool CVE-2016-3625: Out-of-bounds Read in the tiff2bw tool CVE-2016-3658, CVE-2014-8127: Illegal read in TIFFWriteDirectoryTagLongLong8Array function in tiffset / tif_dirwrite.c CVE-2016-5314, CVE-2016-5315, CVE-2016-5316, CVE-2016-5317: PixarLogDecode() out-of-bound writes CVE-2016-5320, CVE-2016-5875: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c bugzilla suppose that CVE-2016-5320 is a duplicate of CVE-2016-5314 (https://bugs.alpinelinux.org/issues/6661) which was fixed in tiff 4.0.7 (http://bugzilla.maptools.org/show_bug.cgi?id=2554#c1) CVE-2016-5321: out-of-bounds read in tiffcrop / DumpModeDecode() function CVE-2016-5323: Divide-by-zero in _TIFFFax3fillruns() function CVE-2016-5652: tiff2pdf JPEG Compression Tables Heap Buffer Overflow
* main/irssi: security upgrade to 0.8.21 - fixes #6694Sergey Lukin2017-01-181-4/+11
| | | | | | | | CVE-2017-5193: A NULL pointer dereference in the nickcmp function. CVE-2017-5194: Use after free when receiving invalid nick message. CVE-2017-5356: Out of bounds read when Printing the value. CVE-2017-5195: Out of bounds read in certain incomplete control codes. CVE-2017-5196: Out of bounds read in certain incomplete character sequences.
* main/subversion: security upgrade to 1.8.17 (CVE-2016-8734)Natanael Copa2017-01-131-4/+4
| | | | fixes #6650
* main/bind: security upgrade to 9.10.4_p5 - fixes #6679Sergei Lukin2017-01-131-6/+12
| | | | | | CVE-2016-9131: A malformed response to an ANY query can cause an assertion failure during recursion CVE-2016-9147: An error handling a query response containing inconsistent DNSSEC information could cause an assertion failure CVE-2016-9444: An unusually-formed DS record response could cause an assertion failure
* main/curl: security upgrade to 7.52.1 - fixes #6601Sergey Lukin2017-01-0915-1256/+30
| | | | | | | | | | CVE-2016-9594: unititialized random CVE-2016-9586: printf floating point buffer overflow CVE-2016-9952: Win CE schannel cert wildcard matches too much CVE-2016-9953: Win CE schannel cert name out of buffer read CVE-2016-8625: IDNA 2003 makes curl use wrong host https://curl.haxx.se/changes.html
* main/pcsc-lite: security upgrade to 1.8.20 (CVE-2016-10109)Timo Teräs2017-01-062-31/+10
| | | | | fixes #6633 remove unneeded patch (upstream fixed issue)
* main/pcsc-lite: keep libpcsclite.so in -libsTimo Teräs2017-01-061-2/+10
| | | | | fixes #3236 fixes #6392
* main/pcsc-lite: upgrade to 1.8.18Timo Teräs2017-01-062-57/+17
| | | | fix pcscd capabilities
* main/samba: security fixes #6561Sergey Lukin2017-01-032-4/+215
| | | | | | | | | | | CVE-2016-2123: NDR Parsing ndr_pull_dnsp_name Heap-based Buffer Overflow Remote Code Execution Vulnerability https://www.samba.org/samba/security/CVE-2016-2123.html CVE-2016-2125: Unconditional privilege delegation to Kerberos servers in trusted realms https://www.samba.org/samba/security/CVE-2016-2125.html CVE-2016-2126: Flaws in Kerberos PAC validation can trigger privilege elevation https://www.samba.org/samba/security/CVE-2016-2126.html https://www.samba.org/samba/history/security.html
* main/phpmyadmin: security upgrade to 4.4.15.9 - fixes #6597Sergey Lukin2017-01-021-4/+24
| | | | | | | | | | | | | | | | | | CVE-2016-9847: Unsafe generation of blowfish secret CVE-2016-9848: phpinfo information leak value of sensitive (HttpOnly) cookies CVE-2016-9849: Username deny rules bypass (AllowRoot & Others) by using Null Byte CVE-2016-9850: Username rule matching issues CVE-2016-9851: With a crafted request parameter value it is possible to bypass the logout timeout. CVE-2016-9852 CVE-2016-9853 CVE-2016-9854 CVE-2016-9855: Multiple full path disclosure vulnerabilities CVE-2016-9856 CVE-2016-9857: Multiple XSS vulnerabilities CVE-2016-9858 CVE-2016-9859 CVE-2016-9860: We consider these vulnerabilities to be of moderate severity. CVE-2016-9861: Bypass white-list protection for URL redirection CVE-2016-9864: Multiple SQL injection vulnerabilities CVE-2016-9865: Incorrect serialized string parsing CVE-2016-9866: CSRF token not stripped from the URL 4.4.15.9 is minor security upgrade https://www.phpmyadmin.net/news/2016/11/25/phpmyadmin-401018-44159-and-465-are-released/
* main/squid: security upgrade to 3.5.23 - fixes #6582Sergey Lukin2016-12-291-10/+15
| | | | | CVE-2016-10002: Information disclosure in HTTP Request processing. CVE-2016-10003: Information disclosure in Collapsed Forwarding.
* main/openssh: security fixes #6586Leonardo Arena2016-12-297-1/+347
| | | | CVE-2016-10010, CVE-2016-10011
* main/imagemagick: update sourceLeonardo Arena2016-12-291-2/+2
|
* main/icu: security fix (CVE-2016-7415). Fixes #6551Leonardo Arena2016-12-292-4/+186
| | | | (cherry picked from commit 1fa78865839b8c66006d1ae3a0a626e7acc7787d)
* main/ruby-rmagick: rebuild against imagemagick-6.9.6.8Leonardo Arena2016-12-271-1/+1
|
* main/inkscape: rebuild against imagemagick-6.9.6.8Leonardo Arena2016-12-271-1/+1
|
* main/tango-icon-theme: rebuild against imagemagick-6.9.6.8Leonardo Arena2016-12-271-1/+1
|
* main/imagemagick: security upgrade to 6.9.6.8 - fixes #5751, #6327, #6104Sergey Lukin2016-12-261-9/+28
| | | | | | | | CVE-2016-5118 CVE-2016-7799, CVE-2016-7906 CVE-2016-4562, CVE-2016-4563, CVE-2016-4564, CVE-2016-5010, CVE-2016-5687, CVE-2016-5688, CVE-2016-5689, CVE-2016-5690, CVE-2016-5691, CVE-2016-5841, CVE-2016-5842, CVE-2016-6491
* main/xen: security upgrade to 4.5.5 - fixes #6573Sergey Lukin2016-12-2650-3638/+156
| | | | | | | | | | | | Removed patches that are already applied in xen-4.5.5 https://www.xenproject.org/downloads/xen-archives/xen-45-series/xen-455.html New fixes: CVE-2016-10024, XSA-202: x86 PV guests may be able to mask interrupts http://xenbits.xen.org/xsa/advisory-202.html CVE-2016-10013, XSA-204: x86: Mishandling of SYSCALL singlestep during emulation http://xenbits.xen.org/xsa/advisory-204.html
* main/tiff: security fixes #6012Sergey Lukin2016-12-267-9/+384
| | | | | CVE-2015-7554, CVE-2015-8668, CVE-2016-3945, CVE-2016-3632, CVE-2016-3990, CVE-2016-3991
* main/openjpeg: security fixes (CVE-2016-9580, CVE-2016-9581). Fixes #6568Francesco Colista2016-12-222-22/+258
| | | | (cherry picked from commit 91f0ed50281f76fcbbc7760fd7617e01b9a50c47)
* main/xen: security fixes. Fixes #6543Leonardo Arena2016-12-205-1/+493
| | | | | | | | | CVE-2016-9932 CVE-2016-9815 CVE-2016-9816 CVE-2016-9818 (cherry picked from commit 3b5fa3b170637b8149c63d415d3a42c638b8b71a)
* main/vim: security fix (CVE-2016-1248). Fixes #6503Leonardo Arena2016-12-202-4/+105
|
* main/libass: security fixes (CVE-2016-7969, CVE-2016-7972). Fixes #6538Leonardo Arena2016-12-203-5/+95
|
* main/libgsf: security upgrade to 1.14.41 (CVE-2016-9888). Fixes #6557Leonardo Arena2016-12-201-6/+9
| | | | (cherry picked from commit cf24cc64fbe2e718b0bee91cc486ca9071a87ddf)
* main/collectd: security upgrade to 5.4.3 - fixes #5991Sergey Lukin2016-12-141-5/+6
| | | | CVE-2016-6254
* main/tar: security upgrade - fixes #6400Sergey Lukin2016-12-142-5/+42
| | | | CVE-2016-6321
* main/bash: security upgrade - fixes #6412Sergey Lukin2016-12-142-1/+25
| | | | CVE-2016-7543
* main/bind: security upgrade - fixes #6423Sergey Lukin2016-12-142-9/+215
| | | | CVE-2016-8864
* main/curl: security upgrade - fixes #6436Sergey Lukin2016-12-1311-4/+1042
| | | | | | | | | | | | | CVE-2016-8615 CVE-2016-8616 CVE-2016-8617 CVE-2016-8618 CVE-2016-8619 CVE-2016-8620 CVE-2016-8621 CVE-2016-8622 CVE-2016-8623 CVE-2016-8624