| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
CVE-2017-5953: Tree length values not validated properly when handling a spell file
|
| |
|
|
|
|
| |
CVE-2017-3135: Combination of DNS64 and RPZ Can Lead to Crash
|
|
|
|
|
|
| |
CVE-2017-5930: allows to delete protected aliases
https://svn.code.sf.net/p/postfixadmin/code/trunk/CHANGELOG.TXT
|
| |
|
| |
|
|
|
|
| |
(cherry picked from commit b1397dbdb8c571b5368878b0624d30ef233c47b4)
|
|
|
|
| |
(cherry picked from commit 8e7189a1617d04d056d6936f4924d8ea7b647dc0)
|
|
|
|
|
| |
CVE-2017-5596: ASTERIX infinite loop
CVE-2017-5597: DHCPv6 large loop
|
|
|
|
| |
(cherry picked from commit e4a237db89475f7747c8ad13feea37f51a10d7da)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-7922 (arbitrary code execution)
CVE-2016-7923 (arbitrary code execution)
CVE-2016-7924 (arbitrary code execution)
CVE-2016-7925 (arbitrary code execution)
CVE-2016-7926 (arbitrary code execution)
CVE-2016-7927 (arbitrary code execution)
CVE-2016-7928 (arbitrary code execution)
CVE-2016-7929 (arbitrary code execution)
CVE-2016-7930 (arbitrary code execution)
CVE-2016-7931 (arbitrary code execution)
CVE-2016-7932 (arbitrary code execution)
CVE-2016-7933 (arbitrary code execution)
CVE-2016-7934 (arbitrary code execution)
CVE-2016-7935 (arbitrary code execution)
CVE-2016-7936 (arbitrary code execution)
CVE-2016-7937 (arbitrary code execution)
CVE-2016-7938 (arbitrary code execution)
CVE-2016-7939 (arbitrary code execution)
CVE-2016-7940 (arbitrary code execution)
CVE-2016-7973 (arbitrary code execution)
CVE-2016-7974 (arbitrary code execution)
CVE-2016-7975 (arbitrary code execution)
CVE-2016-7983 (arbitrary code execution)
CVE-2016-7984 (arbitrary code execution)
CVE-2016-7985 (arbitrary code execution)
CVE-2016-7986 (arbitrary code execution)
CVE-2016-7992 (arbitrary code execution)
CVE-2016-7993 (arbitrary code execution)
CVE-2016-8574 (arbitrary code execution)
CVE-2016-8575 (arbitrary code execution)
CVE-2017-5202 (arbitrary code execution)
CVE-2017-5203 (arbitrary code execution)
CVE-2017-5204 (arbitrary code execution)
CVE-2017-5205 (arbitrary code execution)
CVE-2017-5341 (arbitrary code execution)
CVE-2017-5342 (arbitrary code execution)
CVE-2017-5482 (arbitrary code execution)
CVE-2017-5483 (arbitrary code execution)
CVE-2017-5484 (arbitrary code execution)
CVE-2017-5485 (arbitrary code execution)
CVE-2017-5486 (arbitrary code execution)
|
|
|
|
|
|
|
| |
CVE-2016-10169: global buffer overread in read_code / read_words.c
CVE-2016-10170: Heap out of bounds read in WriteCaffHeader / caff.c
CVE-2016-10171: heap out of bounds read in unreorder_channels / wvunpack.c
CVE-2016-10172: Heap out of bounds read in read_new_config_info / open_utils.c
|
|
|
|
|
|
| |
CVE-2016-10195: dns remote stack overread vulnerability
CVE-2016-10196: (stack) buffer overflow in evutil_parse_sockaddr_port()
CVE-2016-10197: out-of-bounds read in search_make_new()
|
|
|
|
|
|
| |
also triggers rebuild which might fix apk.static (ref #6795)
(cherry picked from commit 5ef7a332f8186986761c3280b8b2c2bf1c02f230)
|
|
|
|
| |
replace tabs with space
|
|
|
|
| |
CVE-2017-5601: Out of bounds read in lha_read_file_header_1() function
|
|
|
|
| |
CVE-2016-9587: host to controller command execution vulnerability
|
|
|
|
| |
CVE-2016-10165: Out-of-bounds read in Type_MLU_Read()
|
| |
|
|
|
|
|
|
| |
For some reason 3.5 builders failed to build ulogd_output_PCAP.so
properly, while it is present in both 3.4 and edge. Simple rebuild
fixes that.
|
|
|
|
| |
(cherry picked from commit 5f63fb537b4d2008af0fea3d3035ab03d22748ab)
|
|
|
|
| |
(cherry picked from commit 2cc0910fda6fa2a5050af4239eef196d797e68a2)
|
|
|
|
| |
(cherry picked from commit 7da0f80150904aec3298e62e0dffdb917153c94d)
|
|
|
|
| |
(cherry picked from commit 49effa784421467508e5906d4e037c39d311929f)
|
| |
|
|
|
|
|
|
| |
fixes #6590
(cherry picked from commit 89a718d88ec7466e721f3bbe9ede5ffe58061d78)
|
|
|
|
| |
fixes #6751
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
CVE-2017-5225: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
|
|
|
|
|
|
| |
CVE-2016-10128: smart_pkt: verify packet length exceeds PKT_LEN_SIZE
CVE-2016-10129: smart_pkt: treat empty packet lines as error
CVE-2016-10130: http: check certificate validity before clobbering the error variable
|
|
|
|
|
|
|
| |
ref #6644
(cherry picked from commit c7e134d319bd095176cdcc8f232bc101c4d33253)
(cherry picked from commit 702ee464938cd48e962c8963b10967d743c0bcad)
|
|
|
|
| |
(cherry picked from commit 74cb67a0f5c64a0b2d56a97e61edd436b3cf97dc)
|
|
|
|
|
|
|
|
| |
fixes #6603
sent upstream: https://github.com/diegonehab/luasocket/pull/206
(cherry picked from commit 72ccba0e9bd2e371b6356a045431674d471ed5a2)
|
|
|
|
| |
fixes #6689
|
|
|
|
|
|
|
| |
We dont want copy the content of /etc/skel to /etc/bind
fixes #6725
(cherry picked from commit 1328c94d12a24632191f20e762f6ebad5059750b)
|
|
|
|
|
|
|
|
|
|
|
| |
Instead of checking for fb module we check for /dev/fb0 since we now
compile fb directly into the kernel instead of module.
We also allow blacklisting it by using `modprobe -b`
ref #6723
(cherry picked from commit ab0a08bd0106ce966db6049ca05a0ef7133c7ae0)
|
|
|
|
|
|
|
|
|
|
| |
If this does not work, you probably have not setup udev-trigger
init.d service to run. Use 'setup-udev' script to fix this.
ref #6490
ref #6723
(cherry picked from commit a7d791240b62a09a49b910469aad1ef54e69aa2a)
|
|
|
|
| |
(cherry picked from commit f9d59b0848ca947d3e4d45130dcc25e308d27e91)
|