aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* main/wireshark: security fixes #7029Leonardo Arena2017-03-271-4/+13
| | | | | | | | | | | | CVE-2017-6467: NetScaler file parser infinite loop CVE-2017-6468: NetScaler file parser crash CVE-2017-6469: LDSS dissector crash CVE-2017-6470: IAX2 infinite loop CVE-2017-6471: WSP infinite loop CVE-2017-6472: RTMPT dissector infinite loop CVE-2017-6473: K12 file parser crash CVE-2017-6474: NetScaler file parser infinite loop wnpa-sec-2017-06: STANAG 4607 file parser infinite loop
* main/roundcubemail: upgrade to 1.1.8Leonardo Arena2017-03-131-4/+4
|
* main/apache2: upgrade to 2.4.25Andy Postnikov2017-03-062-29/+8
| | | | | | | Security release http://www.apache.org/dist/httpd/CHANGES_2.4.25 Also it includes previous patch for httpoxy fixes #6941
* main/acf-openssh: upgrade to 0.11.2Ted Trask2017-03-011-4/+2
| | | | (cherry picked from commit c054f989dea0c41c428b824c552db8829bc6d734)
* main/acf-provisioning: upgrade to 0.8.15Ted Trask2017-02-281-4/+2
|
* main/acf-core: upgrade to 0.19.2Ted Trask2017-02-271-4/+2
|
* main/acf-freeradius3: upgrade to 0.2.1Ted Trask2017-02-221-5/+3
|
* main/ffmpeg: security upgrade to 2.8.11 - fixes #6872Sergey Lukin2017-02-221-4/+25
| | | | | | | | | | | | | | | | | | | | CVE-2017-5024 CVE-2017-5025 CVE-2016-10190 CVE-2016-10191 CVE-2016-10192 CVE-2016-7502 CVE-2016-7785 CVE-2016-7905 CVE-2016-7562 CVE-2016-6164 CVE-2016-6881 CVE-2016-7122 CVE-2016-7450 CVE-2016-2213 CVE-2016-2328 CVE-2016-2329 CVE-2016-2330
* main/vim: security fixes #6865Sergey Lukin2017-02-162-4/+39
| | | | CVE-2017-5953: Tree length values not validated properly when handling a spell file
* main/postfixadmin: security upgrade to 3.0.2 - fixes #6837Sergey Lukin2017-02-151-4/+9
| | | | | | CVE-2017-5930: allows to delete protected aliases https://svn.code.sf.net/p/postfixadmin/code/trunk/CHANGELOG.TXT
* main/bind: security upgrade to 9.10.4_p6 - fixes #6831Sergey Lukin2017-02-151-4/+6
| | | | CVE-2017-3135: Combination of DNS64 and RPZ Can Lead to Crash
* main/postgresql: update to 9.4.11Jakub Jirutka2017-02-131-4/+4
|
* main/tcpdump: security upgrade to 4.9.0 - fixes #6814Sergey Lukin2017-02-091-4/+49
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CVE-2016-7922 (arbitrary code execution) CVE-2016-7923 (arbitrary code execution) CVE-2016-7924 (arbitrary code execution) CVE-2016-7925 (arbitrary code execution) CVE-2016-7926 (arbitrary code execution) CVE-2016-7927 (arbitrary code execution) CVE-2016-7928 (arbitrary code execution) CVE-2016-7929 (arbitrary code execution) CVE-2016-7930 (arbitrary code execution) CVE-2016-7931 (arbitrary code execution) CVE-2016-7932 (arbitrary code execution) CVE-2016-7933 (arbitrary code execution) CVE-2016-7934 (arbitrary code execution) CVE-2016-7935 (arbitrary code execution) CVE-2016-7936 (arbitrary code execution) CVE-2016-7937 (arbitrary code execution) CVE-2016-7938 (arbitrary code execution) CVE-2016-7939 (arbitrary code execution) CVE-2016-7940 (arbitrary code execution) CVE-2016-7973 (arbitrary code execution) CVE-2016-7974 (arbitrary code execution) CVE-2016-7975 (arbitrary code execution) CVE-2016-7983 (arbitrary code execution) CVE-2016-7984 (arbitrary code execution) CVE-2016-7985 (arbitrary code execution) CVE-2016-7986 (arbitrary code execution) CVE-2016-7992 (arbitrary code execution) CVE-2016-7993 (arbitrary code execution) CVE-2016-8574 (arbitrary code execution) CVE-2016-8575 (arbitrary code execution) CVE-2017-5202 (arbitrary code execution) CVE-2017-5203 (arbitrary code execution) CVE-2017-5204 (arbitrary code execution) CVE-2017-5205 (arbitrary code execution) CVE-2017-5341 (arbitrary code execution) CVE-2017-5342 (arbitrary code execution) CVE-2017-5482 (arbitrary code execution) CVE-2017-5483 (arbitrary code execution) CVE-2017-5484 (arbitrary code execution) CVE-2017-5485 (arbitrary code execution) CVE-2017-5486 (arbitrary code execution)
* main/wireshark: security upgrade to 2.0.10 - fixes #6825Sergey Lukin2017-02-091-4/+8
| | | | | CVE-2017-5596: ASTERIX infinite loop CVE-2017-5597: DHCPv6 large loop
* main/wavpack: security upgrade to 5.1.0 - fixes #6820Sergey Lukin2017-02-071-4/+12
| | | | | | | CVE-2016-10169: global buffer overread in read_code / read_words.c CVE-2016-10170: Heap out of bounds read in WriteCaffHeader / caff.c CVE-2016-10171: heap out of bounds read in unreorder_channels / wvunpack.c CVE-2016-10172: Heap out of bounds read in read_new_config_info / open_utils.c
* main/libevent: security fixes #6801Sergey Lukin2017-02-074-9/+294
| | | | | | CVE-2016-10195: dns remote stack overread vulnerability CVE-2016-10196: (stack) buffer overflow in evutil_parse_sockaddr_port() CVE-2016-10197: out-of-bounds read in search_make_new()
* main/lcms2: security upgrade to 2.8 - fixes #6780Sergei Lukin2017-02-012-6/+36
| | | | CVE-2016-10165: Out-of-bounds read in Type_MLU_Read()
* main/libarchive: security upgrade to 3.2.2 - fixes #6793Sergei Lukin2017-02-012-4/+35
| | | | CVE-2017-5601: Out of bounds read in lha_read_file_header_1() function
* main/libxpm: security upgrade to 3.5.12 - fixes #6753Sergey Lukin2017-01-311-5/+10
| | | | | | | CVE-2016-10164: Out-of-bounds write in XPM extension parsing libXpm 3.5.12 changes: https://lists.freedesktop.org/archives/xorg/2016-December/058537.html
* main/bash: bump pkgrel to force rebuildLeonardo Arena2017-01-271-1/+1
|
* main/tiff: security fixes #6736Sergey Lukin2017-01-272-5/+81
| | | | CVE-2017-5225: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
* main/ca-certificates: upgrade to 20161130Sergei Lukin2017-01-261-5/+6
| | | | ref #6528
* main/openssl: security upgrade to 1.0.2kTimo Teräs2017-01-261-4/+8
| | | | | | | | - CVE-2017-3731 - CVE-2017-3732 - CVE-2016-7055 (cherry picked from commit 3eb2d51b3b6d1670a7763dddd331789b32fc36ad)
* main/bash: security fixes #6657Sergey Lukin2017-01-242-5/+42
| | | | CVE-2016-9401
* main/mariadb: security upgrade to 10.1.21 - fixes #6720Sergey Lukin2017-01-241-4/+17
| | | | | | | | | | | | | | CVE-2016-6664 CVE-2017-3238 CVE-2017-3243 CVE-2017-3244 CVE-2017-3257 CVE-2017-3258 CVE-2017-3265 CVE-2017-3291 CVE-2017-3312 CVE-2017-3317 CVE-2017-3318
* main/tiff: security upgrade to 4.0.7 - fixes #6666Sergey Lukin2017-01-2010-727/+31
| | | | | | | | | | | | | | | | | | | CVE-2016-9273: heap-buffer-overflow in cpStrips CVE-2016-9297: segfault in _TIFFPrintField CVE-2016-9448: Invalid read of size 1 in TIFFFetchNormalTag CVE-2016-9453: out-of-bounds Write Caused by memcpy and no bound check in tiff2pdf CVE-2016-3186: Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file. CVE-2016-3621: Out-of-bounds Read in the bmp2tiff tool CVE-2016-3622: Divide By Zero in the tiff2rgba tool CVE-2016-3623, CVE-2016-3624: Divide By Zero in the rgb2ycbcr tool CVE-2016-3625: Out-of-bounds Read in the tiff2bw tool CVE-2016-3658, CVE-2014-8127: Illegal read in TIFFWriteDirectoryTagLongLong8Array function in tiffset / tif_dirwrite.c CVE-2016-5314, CVE-2016-5315, CVE-2016-5316, CVE-2016-5317: PixarLogDecode() out-of-bound writes CVE-2016-5320, CVE-2016-5875: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c bugzilla suppose that CVE-2016-5320 is a duplicate of CVE-2016-5314 (https://bugs.alpinelinux.org/issues/6661) which was fixed in tiff 4.0.7 (http://bugzilla.maptools.org/show_bug.cgi?id=2554#c1) CVE-2016-5321: out-of-bounds read in tiffcrop / DumpModeDecode() function CVE-2016-5323: Divide-by-zero in _TIFFFax3fillruns() function CVE-2016-5652: tiff2pdf JPEG Compression Tables Heap Buffer Overflow
* main/php5: upgrade to 5.6.30 (security fixes)Andy Postnikov2017-01-201-4/+4
| | | | Security release http://php.net/archive/2017.php#id2017-01-19-3
* main/php-phpmailer: security upgrade to 5.2.4 - fixes #6625Sergey Lukin2017-01-192-9/+93
| | | | | | | | | | | | | | | | | | | | CVE-2016-10033 CVE-2016-10045 Issues were fixed in 5.2.18 and 5.2.20 However, there were major changes between 5.2.0 and 5.2.20 https://github.com/PHPMailer/PHPMailer/blob/master/changelog.md 5.2.0 is NOT AVAILABLE anymore for download Next available version is 5.2.4 https://github.com/PHPMailer/PHPMailer/releases?after=v5.2.5 (not sure if there were major changes between 5.2.0 and 5.2.4) This upgrade contains patch which is based on 2 commits containing fix for CVE-2016-10045 and CVE-2016-10033: https://github.com/PHPMailer/PHPMailer/commit/9743ff5c7ee16e8d49187bd2e11149afb9485eae https://github.com/PHPMailer/PHPMailer/commit/833c35fe39715c3d01934508987e97af1fbc1ba0 These commits were adjusted to 5.2.4
* main/busybox: security fixes #6618Sergey Lukin2017-01-192-5/+55
| | | | CVE-2016-6301: NTP server denial of service flaw
* main/libvncserver: security fixes #6640Sergey Lukin2017-01-193-4/+125
| | | | | CVE-2016-9941: Heap-based buffer overflow in rfbproto.c CVE-2016-9942: Heap-based buffer overflow in ultra.c
* main/irssi: security upgrade to 0.8.21 - fixes #6693Sergey Lukin2017-01-181-6/+13
| | | | | | | | CVE-2017-5193: A NULL pointer dereference in the nickcmp function. CVE-2017-5194: Use after free when receiving invalid nick message. CVE-2017-5356: Out of bounds read when Printing the value. CVE-2017-5195: Out of bounds read in certain incomplete control codes. CVE-2017-5196: Out of bounds read in certain incomplete character sequences.
* main/subversion: security upgrade to 1.9.5 (CVE-2016-8734)Natanael Copa2017-01-131-4/+4
| | | | fixes #6649
* main/bind: security upgrade to 9.10.4_p5 - fixes #6678Sergei Lukin2017-01-131-5/+12
| | | | | | CVE-2016-9131: A malformed response to an ANY query can cause an assertion failure during recursion CVE-2016-9147: An error handling a query response containing inconsistent DNSSEC information could cause an assertion failure CVE-2016-9444: An unusually-formed DS record response could cause an assertion failure
* main/curl: security upgrade to 7.52.1 - fixes #6600Sergey Lukin2017-01-0916-1317/+31
| | | | | | | | | | CVE-2016-9594: unititialized random CVE-2016-9586: printf floating point buffer overflow CVE-2016-9952: Win CE schannel cert wildcard matches too much CVE-2016-9953: Win CE schannel cert name out of buffer read CVE-2016-8625: IDNA 2003 makes curl use wrong host https://curl.haxx.se/changes.html
* main/pcsc-lite: security upgrade to 1.8.20 (CVE-2016-10109)Timo Teräs2017-01-062-31/+10
| | | | | fixes #6632 remove unneeded patch (upstream fixed issue)
* main/pcsc-lite: keep libpcsclite.so in -libsTimo Teräs2017-01-061-2/+10
| | | | | fixes #3236 fixes #6392
* main/pcsc-lite: upgrade to 1.8.18Timo Teräs2017-01-062-65/+16
| | | | fix pcscd capabilities
* main/samba: security fixes #6560Sergey Lukin2017-01-032-4/+215
| | | | | | | | | | | CVE-2016-2123: NDR Parsing ndr_pull_dnsp_name Heap-based Buffer Overflow Remote Code Execution Vulnerability https://www.samba.org/samba/security/CVE-2016-2123.html CVE-2016-2125: Unconditional privilege delegation to Kerberos servers in trusted realms https://www.samba.org/samba/security/CVE-2016-2125.html CVE-2016-2126: Flaws in Kerberos PAC validation can trigger privilege elevation https://www.samba.org/samba/security/CVE-2016-2126.html https://www.samba.org/samba/history/security.html
* main/squid: security upgrade to 3.5.23 - fixes #6581Sergey Lukin2016-12-291-9/+15
| | | | | CVE-2016-10002: Information disclosure in HTTP Request processing. CVE-2016-10003: Information disclosure in Collapsed Forwarding.
* main/openssh: security fixes #6585Sergey Lukin2016-12-297-4/+369
| | | | | | | CVE-2016-10009: loading of untrusted PKCS#11 modules in ssh-agent CVE-2016-10010: privilege escalation via Unix domain socket forwarding CVE-2016-10011: Leak of host private key material to privilege-separated child process via realloc() CVE-2016-10012: Bounds check can be evaded in the shared memory manager used by pre-authentication compression support
* main/xen: security fixes #6572Sergey Lukin2016-12-294-1/+179
| | | | | | | | | | | CVE-2016-10024, XSA-202: x86 PV guests may be able to mask interrupts http://xenbits.xen.org/xsa/advisory-202.html CVE-2016-10025, XSA-203: x86: missing NULL pointer check in VMFUNC emulation http://xenbits.xen.org/xsa/advisory-203.html CVE-2016-10013, XSA-204: x86: Mishandling of SYSCALL singlestep during emulation http://xenbits.xen.org/xsa/advisory-204.html
* main/icu: security fix (CVE-2016-7415). Fixes #6550Leonardo Arena2016-12-292-30/+2
|
* main/icu: security fix (CVE-2016-7415). Fixes #6549Leonardo Arena2016-12-272-1/+193
|
* main/ruby-rmagick: rebuild against imagemagick-6.9.6.8Leonardo Arena2016-12-271-1/+1
|
* main/tango-icon-theme: rebuild against imagemagick-6.9.6.8Leonardo Arena2016-12-271-1/+1
|
* community/inkscape: rebuild against imagemagick-6.9.6.8Leonardo Arena2016-12-271-1/+1
|
* main/imagemagick: security upgrade to 6.9.6.8 - fixes #5750, #6103, #6326Sergey Lukin2016-12-261-8/+27
| | | | | | | | CVE-2016-5118 CVE-2016-7799, CVE-2016-7906 CVE-2016-4562, CVE-2016-4563, CVE-2016-4564, CVE-2016-5010, CVE-2016-5687, CVE-2016-5688, CVE-2016-5689, CVE-2016-5690, CVE-2016-5691, CVE-2016-5841, CVE-2016-5842, CVE-2016-6491
* main/tiff: security fixes #6011Sergey Lukin2016-12-267-9/+384
| | | | | CVE-2015-7554, CVE-2015-8668, CVE-2016-3945, CVE-2016-3632, CVE-2016-3990, CVE-2016-3991
* main/openjpeg: security fixes (CVE-2016-9580, CVE-2016-9581). Fixes #6567Francesco Colista2016-12-222-22/+258
| | | | (cherry picked from commit 91f0ed50281f76fcbbc7760fd7617e01b9a50c47)
* main/xen: security fixes. Fixes #6542Leonardo Arena2016-12-206-1/+547
| | | | | | | | | | CVE-2016-9932 CVE-2016-9815 CVE-2016-9816 CVE-2016-9817 CVE-2016-9818 (cherry picked from commit 3b5fa3b170637b8149c63d415d3a42c638b8b71a)