| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
fixes #6890
|
|
|
|
| |
CVE-2017-5953: Tree length values not validated properly when handling a spell file
|
|
|
|
| |
CVE-2017-5930: allows to delete protected aliases
|
|
|
|
| |
CVE-2017-3135: Combination of DNS64 and RPZ Can Lead to Crash
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-7922 (arbitrary code execution)
CVE-2016-7923 (arbitrary code execution)
CVE-2016-7924 (arbitrary code execution)
CVE-2016-7925 (arbitrary code execution)
CVE-2016-7926 (arbitrary code execution)
CVE-2016-7927 (arbitrary code execution)
CVE-2016-7928 (arbitrary code execution)
CVE-2016-7929 (arbitrary code execution)
CVE-2016-7930 (arbitrary code execution)
CVE-2016-7931 (arbitrary code execution)
CVE-2016-7932 (arbitrary code execution)
CVE-2016-7933 (arbitrary code execution)
CVE-2016-7934 (arbitrary code execution)
CVE-2016-7935 (arbitrary code execution)
CVE-2016-7936 (arbitrary code execution)
CVE-2016-7937 (arbitrary code execution)
CVE-2016-7938 (arbitrary code execution)
CVE-2016-7939 (arbitrary code execution)
CVE-2016-7940 (arbitrary code execution)
CVE-2016-7973 (arbitrary code execution)
CVE-2016-7974 (arbitrary code execution)
CVE-2016-7975 (arbitrary code execution)
CVE-2016-7983 (arbitrary code execution)
CVE-2016-7984 (arbitrary code execution)
CVE-2016-7985 (arbitrary code execution)
CVE-2016-7986 (arbitrary code execution)
CVE-2016-7992 (arbitrary code execution)
CVE-2016-7993 (arbitrary code execution)
CVE-2016-8574 (arbitrary code execution)
CVE-2016-8575 (arbitrary code execution)
CVE-2017-5202 (arbitrary code execution)
CVE-2017-5203 (arbitrary code execution)
CVE-2017-5204 (arbitrary code execution)
CVE-2017-5205 (arbitrary code execution)
CVE-2017-5341 (arbitrary code execution)
CVE-2017-5342 (arbitrary code execution)
CVE-2017-5482 (arbitrary code execution)
CVE-2017-5483 (arbitrary code execution)
CVE-2017-5484 (arbitrary code execution)
CVE-2017-5485 (arbitrary code execution)
CVE-2017-5486 (arbitrary code execution)
|
|
|
|
|
| |
CVE-2017-5596: ASTERIX infinite loop
CVE-2017-5597: DHCPv6 large loop
|
|
|
|
|
|
|
| |
CVE-2016-10169: global buffer overread in read_code / read_words.c
CVE-2016-10170: Heap out of bounds read in WriteCaffHeader / caff.c
CVE-2016-10171: heap out of bounds read in unreorder_channels / wvunpack.c
CVE-2016-10172: Heap out of bounds read in read_new_config_info / open_utils.c
|
|
|
|
|
|
| |
CVE-2016-10195: dns remote stack overread vulnerability
CVE-2016-10196: (stack) buffer overflow in evutil_parse_sockaddr_port()
CVE-2016-10197: out-of-bounds read in search_make_new()
|
|
|
|
| |
CVE-2017-5601: Out of bounds read in lha_read_file_header_1() function
|
|
|
|
| |
CVE-2016-9587: host to controller command execution vulnerability
|
|
|
|
| |
CVE-2016-10165: Out-of-bounds read in Type_MLU_Read()
|
|
|
|
|
|
|
| |
CVE-2016-10164: Out-of-bounds write in XPM extension parsing
libXpm 3.5.12 changes:
https://lists.freedesktop.org/archives/xorg/2016-December/058537.html
|
| |
|
|
|
|
|
|
| |
CVE-2016-10128: smart_pkt: verify packet length exceeds PKT_LEN_SIZE
CVE-2016-10129: smart_pkt: treat empty packet lines as error
CVE-2016-10130: http: check certificate validity before clobbering the error variable
|
|
|
|
| |
CVE-2017-5225: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
|
|
|
|
| |
ref #6528
|
|
|
|
|
|
| |
- CVE-2017-3731
- CVE-2017-3732
- CVE-2016-7055
|
|
|
|
| |
CVE-2016-9401
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-6664
CVE-2017-3238
CVE-2017-3243
CVE-2017-3244
CVE-2017-3257
CVE-2017-3258
CVE-2017-3265
CVE-2017-3291
CVE-2017-3312
CVE-2017-3317
CVE-2017-3318
|
|
|
|
| |
Security release http://php.net/archive/2017.php#id2017-01-19-3
|
|
|
|
| |
CVE-2016-6301: NTP server denial of service flaw
|
|
|
|
|
| |
CVE-2016-9941: Heap-based buffer overflow in rfbproto.c
CVE-2016-9942: Heap-based buffer overflow in ultra.c
|
|
|
|
|
|
|
|
| |
CVE-2017-5193: A NULL pointer dereference in the nickcmp function.
CVE-2017-5194: Use after free when receiving invalid nick message.
CVE-2017-5356: Out of bounds read when Printing the value.
CVE-2017-5195: Out of bounds read in certain incomplete control codes.
CVE-2017-5196: Out of bounds read in certain incomplete character sequences.
|
|
|
|
| |
fixes #6648
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-10033
CVE-2016-10045
Issues were fixed in 5.2.18 and 5.2.20
However, there were major changes between 5.2.0 and 5.2.20
https://github.com/PHPMailer/PHPMailer/blob/master/changelog.md
5.2.0 is NOT AVAILABLE anymore for download
Next available version is 5.2.4
https://github.com/PHPMailer/PHPMailer/releases?after=v5.2.5
(not sure if there were major changes between 5.2.0 and 5.2.4)
This upgrade contains patch which is based on 2 commits
containing fix for CVE-2016-10045 and CVE-2016-10033:
https://github.com/PHPMailer/PHPMailer/commit/9743ff5c7ee16e8d49187bd2e11149afb9485eae
https://github.com/PHPMailer/PHPMailer/commit/833c35fe39715c3d01934508987e97af1fbc1ba0
These commits were adjusted to 5.2.4
|
|
|
|
|
|
| |
CVE-2016-9131: A malformed response to an ANY query can cause an assertion failure during recursion
CVE-2016-9147: An error handling a query response containing inconsistent DNSSEC information could cause an assertion failure
CVE-2016-9444: An unusually-formed DS record response could cause an assertion failure
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes:
CVE-2016-9273: heap-buffer-overflow in cpStrips
CVE-2016-9297: segfault in _TIFFPrintField
CVE-2016-9448: Invalid read of size 1 in TIFFFetchNormalTag
CVE-2016-9453: out-of-bounds Write Caused by memcpy and no bound check in tiff2pdf
CVE-2016-3186: Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.
CVE-2016-3621: Out-of-bounds Read in the bmp2tiff tool
CVE-2016-3622: Divide By Zero in the tiff2rgba tool
CVE-2016-3623, CVE-2016-3624: Divide By Zero in the rgb2ycbcr tool
CVE-2016-3625: Out-of-bounds Read in the tiff2bw tool
CVE-2016-3658, CVE-2014-8127: Illegal read in TIFFWriteDirectoryTagLongLong8Array function in tiffset / tif_dirwrite.c
CVE-2016-5314, CVE-2016-5315, CVE-2016-5316, CVE-2016-5317: PixarLogDecode() out-of-bound writes
CVE-2016-5320, CVE-2016-5875: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c
bugzilla suppose that CVE-2016-5320 is a duplicate of CVE-2016-5314 (https://bugs.alpinelinux.org/issues/6661) which was fixed in tiff 4.0.7 (http://bugzilla.maptools.org/show_bug.cgi?id=2554#c1)
CVE-2016-5321: out-of-bounds read in tiffcrop / DumpModeDecode() function
CVE-2016-5323: Divide-by-zero in _TIFFFax3fillruns() function
CVE-2016-5652: tiff2pdf JPEG Compression Tables Heap Buffer Overflow
TODO:
CVE-2016-5318: Memory corruption in _TIFFVGetField (thumbnail)
remains unfixed still (http://bugzilla.maptools.org/show_bug.cgi?id=2561)
because of that #6661 could not be marked as fixed
Comments:
4.0.7 contains lots of fixes:
http://libtiff.maptools.org/v4.0.7.html
https://fossies.org/diffs/tiff/4.0.6_vs_4.0.7/ChangeLog-diff.html
There is only one major change mentioned: The libtiff tools bmp2tiff, gif2tiff, ras2tiff, sgi2tiff, sgisv, and ycbcr are completely removed from the distribution. These tools were written in the late 1980s and early 1990s for test and demonstration purposes. In some cases the tools were never updated to support updates to the file format, or the file formats are now rarely used. In all cases these tools increased the libtiff security and maintenance exposure beyond the value offered by the tool.
http://libtiff.maptools.org/v4.0.7.html
Patches: CVE-2015-7554.patch, CVE-2015-8665.patch, CVE-2015-8668.patch, CVE-2015-8781-8782-8783.patch, CVE-2015-8784.patch, CVE-2016-3632.patch, CVE-2016-3945.patch, CVE-2016-3990.patch, CVE-2016-3991.patch
are not needed anymore, because these issues were fixed in 4.0.7
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9594: unititialized random
CVE-2016-9586: printf floating point buffer overflow
CVE-2016-9952: Win CE schannel cert wildcard matches too much
CVE-2016-9953: Win CE schannel cert name out of buffer read
https://curl.haxx.se/changes.html
|
|
|
|
|
| |
fixes #6631
remove unneeded patch (upstream fixed issue)
|
|
|
|
|
| |
fixes #3236
fixes #6392
|
|
|
|
| |
fix pcscd capabilities
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-2123: NDR Parsing ndr_pull_dnsp_name Heap-based Buffer Overflow Remote Code Execution Vulnerability
https://www.samba.org/samba/security/CVE-2016-2123.html
CVE-2016-2125: Unconditional privilege delegation to Kerberos servers in trusted realms
https://www.samba.org/samba/security/CVE-2016-2125.html
CVE-2016-2126: Flaws in Kerberos PAC validation can trigger privilege elevation
https://www.samba.org/samba/security/CVE-2016-2126.html
https://www.samba.org/samba/history/security.html
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9847: Unsafe generation of blowfish secret
CVE-2016-9848: phpinfo information leak value of sensitive (HttpOnly) cookies
CVE-2016-9849: Username deny rules bypass (AllowRoot & Others) by using Null Byte
CVE-2016-9850: Username rule matching issues
CVE-2016-9851: With a crafted request parameter value it is possible to bypass the logout timeout.
CVE-2016-9852 CVE-2016-9853 CVE-2016-9854 CVE-2016-9855: Multiple full path disclosure vulnerabilities
CVE-2016-9856 CVE-2016-9857: Multiple XSS vulnerabilities
CVE-2016-9858 CVE-2016-9859 CVE-2016-9860: We consider these vulnerabilities to be of moderate severity.
CVE-2016-9861: Bypass white-list protection for URL redirection
CVE-2016-9862: BBCode injection vulnerability
CVE-2016-9863: DOS vulnerability in table partitioning
CVE-2016-9864: Multiple SQL injection vulnerabilities
CVE-2016-9865: Incorrect serialized string parsing
CVE-2016-9866: CSRF token not stripped from the URL
Jumping through 3 versions: 4.6.5, 4.6.5.1, 4.6.5.2
These upgrades do not contain major changes:
https://www.phpmyadmin.net/news/2016/11/25/phpmyadmin-401018-44159-and-465-are-released/
https://www.phpmyadmin.net/news/2016/11/26/phpmyadmin-4651-released/
https://www.phpmyadmin.net/news/2016/12/5/phpmyadmin-4652-released/
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-10002: Information disclosure in HTTP Request processing.
CVE-2016-10003: Information disclosure in Collapsed Forwarding.
There were no major changes from 3.5.20 to 3.5.23
http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID_3_5_21.html
http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID_3_5_22.html
http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID_3_5_23.html
|
|
|
|
|
|
|
| |
CVE-2016-10009: loading of untrusted PKCS#11 modules in ssh-agent
CVE-2016-10010: privilege escalation via Unix domain socket forwarding
CVE-2016-10011: Leak of host private key material to privilege-separated child process via realloc()
CVE-2016-10012: Bounds check can be evaded in the shared memory manager used by pre-authentication compression support
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-10024, XSA-202: x86 PV guests may be able to mask interrupts
http://xenbits.xen.org/xsa/advisory-202.html
CVE-2016-10025, XSA-203: x86: missing NULL pointer check in VMFUNC emulation
http://xenbits.xen.org/xsa/advisory-203.html
CVE-2016-10013, XSA-204: x86: Mishandling of SYSCALL singlestep during emulation
http://xenbits.xen.org/xsa/advisory-204.html
|
| |
|
| |
|
|
|
|
|
| |
CVE-2015-7554, CVE-2015-8668, CVE-2016-3945,
CVE-2016-3632, CVE-2016-3990, CVE-2016-3991
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
2.8.9
CVE-2016-7502
CVE-2016-7785
CVE-2016-7905
CVE-2016-7562
2.8.8
CVE-2016-6164
CVE-2016-6881
CVE-2016-7122
CVE-2016-7450
(cherry picked from commit 00a2dbef659f87f6897cbdd299719f64a679bdcf)
|
| |
|
| |
|
|
|
|
|
|
| |
upstream bug report: https://bugs.python.org/issue27955
(cherry picked from commit ddfa383303714cbd8ad18f447924678a7fabbcc9)
|
|
|
|
| |
(cherry picked from commit 39df8950b2072203f0c6afec938c35be8d28be51)
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9932
CVE-2016-9815
CVE-2016-9816
CVE-2016-9817
CVE-2016-9818
(cherry picked from commit 3b5fa3b170637b8149c63d415d3a42c638b8b71a)
|
|
|
|
|
|
|
|
|
| |
CVE-2016-7969
CVE-2016-7970
CVE-2016-7971
CVE-2016-7972
(cherry picked from commit 8887c484286e50ad0cf41a47ffe52f2954ec7921)
|
|
|
|
| |
(cherry picked from commit cf24cc64fbe2e718b0bee91cc486ca9071a87ddf)
|