| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
|
|
|
| |
switch to a stable release channel instead of docker 'edge'
|
|
|
|
| |
This reverts commit a14600015b1965e2c3815c1e259a6daaab5fdf7c.
|
| |
|
| |
|
| |
|
|
|
|
| |
fixes #8590
|
|
|
|
| |
https://www.drupal.org/SA-CORE-2018-001
|
|
|
|
| |
fixes #8539
|
|
|
|
| |
fixes #8512
|
|
|
|
| |
fixes #8508
|
| |
|
|
|
|
|
|
| |
Fixes #8505
Signed-off-by: Leonardo Arena <rnalrd@alpinelinux.org>
|
|
|
|
| |
contrib dir
|
| |
|
|
|
|
|
|
| |
CVE-2018-5334, CVE-2018-5335, CVE-2018-5336
Fixes #8434
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
=====================================================================
FAILED TEST SUMMARY
---------------------------------------------------------------------
Test for blowfish compatibility [ext/mcrypt/tests/blowfish.phpt]
OO API [ext/tidy/tests/020.phpt]
getConfig() method - basic test for getConfig() [ext/tidy/tests/030.phpt]
=====================================================================
=====================================================================
FAILED TEST SUMMARY
---------------------------------------------------------------------
Bug #65646 (re-enable CURLOPT_FOLLOWLOCATION with open_basedir or safe_mode): open_basedir disabled [ext/curl/tests/bug65646.phpt]
OO API [ext/tidy/tests/020.phpt]
getConfig() method - basic test for getConfig() [ext/tidy/tests/030.phpt]
=====================================================================
=====================================================================
FAILED TEST SUMMARY
---------------------------------------------------------------------
Test for bug 52013 about Phar::decompressFiles(). [ext/phar/tests/bug52013.phpt]
Phar: test readfile() interception [ext/phar/tests/readfile.phpt]
OO API [ext/tidy/tests/020.phpt]
getConfig() method - basic test for getConfig() [ext/tidy/tests/030.phpt]
=====================================================================
|
|
|
|
|
|
|
|
|
| |
- CVE-2018-5711
- CVE-2018-5712
Ref http://php.net/archive/2018.php#id2018-01-04-4
(cherry picked from commit 5e4dbc0d75238b02e3ad3bd55b5ac3a8b74bab3a)
|
|
|
|
|
|
|
| |
- CVE-2018-5711
- CVE-2018-5712
Ref http://php.net/archive/2018.php#id2018-01-04-3
|
|
|
|
|
|
| |
CVE-2018-5089 CVE-2018-5091 CVE-2018-5095 CVE-2018-5096
CVE-2018-5097 CVE-2018-5098 CVE-2018-5099 CVE-2018-5102
CVE-2018-5103 CVE-2018-5104 CVE-2018-5117
|
| |
|
|
|
|
|
|
| |
Enable check()
(cherry picked from commit 9e81be5f331abefc06aa5f2dec67f906d45e13d2)
|
| |
|
|
|
|
| |
Fixes #8298
|
| |
|
|
|
|
|
|
|
|
| |
CVE-2017-17784, CVE-2017-17785, CVE-2017-17786, CVE-2017-17787, CVE-2017-17789
Fixes #8351
CVE-2017-17788 applies only to >= v2.9.6
|
|
|
|
|
|
|
|
|
|
| |
CVE-2017-7156
CVE-2017-7157
CVE-2017-13856
CVE-2017-13866
CVE-2017-13870
fixes #8334
|
|
|
|
| |
CVE-2017-17084, CVE-2017-17085). Fixes #8269
|
|
|
|
| |
(CVE-2017-15090-15092-15093-15094). Fixes #8254
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
GH#5930
(cherry picked from commit 52c914aa8a597c5803e349c250ee9461f32f42cd)
|
|
|
|
|
| |
- Fixes #8095
- Fixes #7943 (last CVE was not fixed since the patch did not apply)
|
|
|
|
|
|
|
| |
See: https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/
CVE-2017-3738 does not affect our package, because we don't use bundled
OpenSSL library. I'm not sure about CVE-2017-15896.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
CVE-2017-8819 TROVE-2017-009: Replay-cache ineffective for v2 onion services
CVE-2017-8820 TROVE-2017-010: Remote DoS attack against directory authorities
CVE-2017-8821 TROVE-2017-011: An attacker can make Tor ask for a password
CVE-2017-8822 TROVE-2017-012: Relays can pick themselves in a circuit path
CVE-2017-8823 TROVE-2017-013: Use-after-free in onion service v2
fixes #8247
|
|
|
|
| |
(cherry picked from commit a3ab3a5186575f9ccb06789a864452359e0e5b22)
|
|
|
|
|
|
| |
To get rid of this warning message after loading:
WARNING: Nokogiri was built against LibXML version 2.9.6, but has dynamically loaded 2.9.7
|
| |
|
| |
|
|
|
|
| |
(cherry picked from commit 62b8ba5f8fe6d62d56b2d078b4f12f72830ee4af)
|
|
|
|
| |
was never suppoed to enter the repo
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
fixes #8193
CVE-2017-13783, CVE-2017-13784, CVE-2017-13785, CVE-2017-13788,
CVE-2017-13791, CVE-2017-13792, CVE-2017-13793, CVE-2017-13794,
CVE-2017-13795, CVE-2017-13796, CVE-2017-13798, CVE-2017-13802,
CVE-2017-13803
|
| |
|
|
|
|
|
|
| |
Ruby 2.2 is currently in "security maintenance" phase and EOL (end of
life) is scheduled for 2018-03-31. This is less than support period for
packages in the community repository (6 months).
|