| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
| |
headers-more-nginx-module: update to 0.32
lua-nginx-module: update to 0.10.7
nchan: update to 1.0.8
|
| |
|
| |
|
|
|
|
| |
fixes #6730
|
|
|
|
| |
(cherry picked from commit c054f989dea0c41c428b824c552db8829bc6d734)
|
|
|
|
| |
(cherry picked from commit 135cf1dadeda1263f5829fa161f8a7445d782298)
|
|
|
|
| |
fixes #6932
|
|
|
|
| |
fixes #6931
|
| |
|
|
|
|
|
|
|
|
|
| |
libcrypto
Fixes recursive call loop which causes a stack overflow in opensmtpd.
fixes #6578
(cherry picked from commit d3a7437a76d864f6aa585e6ae82789cd5455c04d)
|
|
|
|
| |
fixes #6930
|
|
|
|
| |
fixes #6929
|
|
|
|
|
|
|
|
|
| |
Security release http://www.apache.org/dist/httpd/CHANGES_2.4.25
Also it includes previous patch for httpoxy
fixes #6939
(cherry picked from commit 57ba71e0786da6d5383c4785fb65be50a2cad693)
|
|
|
|
|
|
|
|
|
|
|
| |
added perl-dev as makedepends due to man2pod moved to there.
- XSA-207
- CVE-2017-2615 XSA-208
- CVE-2017-2620 XSA-209
- XSA-210
fixes #6916
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
(cherry picked from commit a833ffd23fed18614233166946b4f8341c5a26ef)
|
|
|
|
| |
(cherry picked from commit 35961cf446867c55f378b508517422d36660bb2f)
|
|
|
|
| |
CVE-2017-6014: Memory exhaustion/infinite loop via malformed STANAG 4607 capture file
|
|
|
|
|
| |
/etc/uwgi/uwsgi.ini and /etc/uwsgi/conf.d/readme.emperor had
executable bit.
|
|
|
|
| |
(cherry picked from commit 7b8d41699ae88a726e7203d0ba67c025e4ae5169)
|
| |
|
|
|
|
|
|
| |
fixes #6874
upstream: https://github.com/boostorg/build/issues/163
|
|
|
|
|
| |
CVE-2017-5024 (arbitrary code execution)
CVE-2017-5025 (arbitrary code execution)
|
|
|
|
| |
CVE-2017-5953: Tree length values not validated properly when handling a spell file
|
| |
|
|
|
|
| |
CVE-2017-3135: Combination of DNS64 and RPZ Can Lead to Crash
|
|
|
|
|
|
| |
CVE-2017-5930: allows to delete protected aliases
https://svn.code.sf.net/p/postfixadmin/code/trunk/CHANGELOG.TXT
|
| |
|
| |
|
|
|
|
| |
(cherry picked from commit b1397dbdb8c571b5368878b0624d30ef233c47b4)
|
|
|
|
| |
(cherry picked from commit 8e7189a1617d04d056d6936f4924d8ea7b647dc0)
|
|
|
|
|
| |
CVE-2017-5596: ASTERIX infinite loop
CVE-2017-5597: DHCPv6 large loop
|
|
|
|
| |
(cherry picked from commit e4a237db89475f7747c8ad13feea37f51a10d7da)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-7922 (arbitrary code execution)
CVE-2016-7923 (arbitrary code execution)
CVE-2016-7924 (arbitrary code execution)
CVE-2016-7925 (arbitrary code execution)
CVE-2016-7926 (arbitrary code execution)
CVE-2016-7927 (arbitrary code execution)
CVE-2016-7928 (arbitrary code execution)
CVE-2016-7929 (arbitrary code execution)
CVE-2016-7930 (arbitrary code execution)
CVE-2016-7931 (arbitrary code execution)
CVE-2016-7932 (arbitrary code execution)
CVE-2016-7933 (arbitrary code execution)
CVE-2016-7934 (arbitrary code execution)
CVE-2016-7935 (arbitrary code execution)
CVE-2016-7936 (arbitrary code execution)
CVE-2016-7937 (arbitrary code execution)
CVE-2016-7938 (arbitrary code execution)
CVE-2016-7939 (arbitrary code execution)
CVE-2016-7940 (arbitrary code execution)
CVE-2016-7973 (arbitrary code execution)
CVE-2016-7974 (arbitrary code execution)
CVE-2016-7975 (arbitrary code execution)
CVE-2016-7983 (arbitrary code execution)
CVE-2016-7984 (arbitrary code execution)
CVE-2016-7985 (arbitrary code execution)
CVE-2016-7986 (arbitrary code execution)
CVE-2016-7992 (arbitrary code execution)
CVE-2016-7993 (arbitrary code execution)
CVE-2016-8574 (arbitrary code execution)
CVE-2016-8575 (arbitrary code execution)
CVE-2017-5202 (arbitrary code execution)
CVE-2017-5203 (arbitrary code execution)
CVE-2017-5204 (arbitrary code execution)
CVE-2017-5205 (arbitrary code execution)
CVE-2017-5341 (arbitrary code execution)
CVE-2017-5342 (arbitrary code execution)
CVE-2017-5482 (arbitrary code execution)
CVE-2017-5483 (arbitrary code execution)
CVE-2017-5484 (arbitrary code execution)
CVE-2017-5485 (arbitrary code execution)
CVE-2017-5486 (arbitrary code execution)
|
|
|
|
|
|
|
| |
CVE-2016-10169: global buffer overread in read_code / read_words.c
CVE-2016-10170: Heap out of bounds read in WriteCaffHeader / caff.c
CVE-2016-10171: heap out of bounds read in unreorder_channels / wvunpack.c
CVE-2016-10172: Heap out of bounds read in read_new_config_info / open_utils.c
|
|
|
|
|
|
| |
CVE-2016-10195: dns remote stack overread vulnerability
CVE-2016-10196: (stack) buffer overflow in evutil_parse_sockaddr_port()
CVE-2016-10197: out-of-bounds read in search_make_new()
|