| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
| |
remove patches present upstream
(cherry picked from commit 7a82240b4bb9837ff01fee1dadb37e1f17ee50b8)
|
|
|
|
| |
(cherry picked from commit 986f52de429afaf6b1dca4b476c7b9038bccffc7)
|
| |
|
|
|
|
| |
(cherry picked from commit 4166ca276f4622ce65f308cd9dba352618d31d0d)
|
|
|
|
|
|
| |
Security fixes for nested virtualization. This only apply to Xen
4.2.x, only edge and 2.5.x Alpine Linux systems are affected.
(cherry picked from commit 0c0b33191e243c3b0de1d0331e6bd5a107b61626)
|
| |
|
|
|
|
| |
(cherry picked from commit 8b78a885fdc62fd626d0ca04e9c77b4b262ef363)
|
|
|
|
|
|
|
|
| |
Some patches where not included in the original XSA, this are the
remaining ones (so far).
To be applied to edge and 2.5
(cherry picked from commit 72b0ec467593775da3253251cecdb84f4bb10b13)
|
|
|
|
|
|
|
|
|
|
|
| |
fixes #1533
(cherry picked from commit da422d63cf72f05137326de21e931e64108f9636)
Conflicts:
main/statserial/APKBUILD
main/statserial/makefile.patch
main/statserial/statserial-1.patch
main/statserial/statserial-c.patch
|
|
|
|
| |
(cherry picked from commit 8255f4b746731d6d7aa45995a8fc35ec209b37d4)
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
fixes #1570
(cherry picked from commit 3e8415b972139e5e2487f97a037766b7f60685ca)
Conflicts:
main/linux-grsec/APKBUILD
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
Some info in this thread:
http://marc.info/?l=linux-netdev&m=135763417428530&w=2
(cherry picked from commit fdae0bf0aaa004a521fafec200ab4656a239b7eb)
Conflicts:
main/linux-grsec/APKBUILD
|
| |
|
| |
|
| |
|
|
|
|
| |
(cherry picked from commit 620c21a583decc9690be4e0e5121b348589baeec)
|
|
|
|
| |
(cherry picked from commit 87c8e99ab1dccdafe7741758a3be0d13cf0f39af)
|
|
|
|
|
| |
Conflicts:
main/linux-grsec/APKBUILD
|
| |
|
| |
|
|
|
|
|
|
| |
Rebase uclibc-daemon patch, and cherry-pick regression fix for
ASTERISK-20938.
(cherry picked from commit 7cdcfc5ff0305f0a806fd5c5a483275f329bbfdb)
|
|
|
|
|
|
| |
AST-2012-014 (CVE-2012-5976): stack overflow with TCP connections
AST-2012-015 (CVE-2012-5977): DoS through device state cache exploitation
(cherry picked from commit 43c4090824288439314ee365589a957eac4ef5b8)
|
|
|
|
| |
(cherry picked from commit a2187272ed74fb3e2a226e16cc462b34ff4c49ee)
|
|
|
|
|
| |
This should fix CVE-2013-0155 and CVE-2013-0156
(cherry picked from commit 44b292eee8cdce936dc038e83ee24cbf9f38c89f)
|
|
|
|
| |
(cherry picked from commit 6361af390c11b7cbac447b830e96101b558f5931)
|
|
|
|
| |
(cherry picked from commit 414d7bc16e0bd9fd882215b5a5107530f3433527)
|
|
|
|
| |
(cherry picked from commit 0a247d6a41cdd0799830f898f54ab378ef40e8b7)
|
|
|
|
| |
(cherry picked from commit 8b1b20b230106ba9b7f9a75b7afe6a8757b9960e)
|
|
|
|
| |
(cherry picked from commit dc56545ae7253791613d3509e3ab53b692c2e5bb)
|
|
|
|
| |
(cherry picked from commit 5d8167beb12943eae4fa76367fb691d475388ae7)
|
|
|
|
| |
(cherry picked from commit 4580f4b522c362c6fb4a8bf2d998c6c369b38c44)
|
|
|
|
| |
(cherry picked from commit 41871dd5ff3fb6ce5776ff30b364e783fcf04f9f)
|
|
|
|
| |
(cherry picked from commit 0e6185fc64c1bd6ca4a8b3a3e9143c4adce293bc)
|
|
|
|
| |
(cherry picked from commit 792394ac183e96e565fd12ba869b4f835c770ac9)
|
|
|
|
| |
(cherry picked from commit 78b2b69445b34b122374e9d939575483a4812445)
|
|
|
|
| |
(cherry picked from commit 25c80372095d6e856909d076be7b20be3f7a09a9)
|
|
|
|
| |
(cherry picked from commit 1b1918ceadd5ae10c8e048c28bb2c3d25a65f1b8)
|
|
|
|
| |
(cherry picked from commit ca65dbf51229d51561579dcf4ead20d291eb5489)
|
|
|
|
| |
(cherry picked from commit 6497c152d73b55522be0d9c2ad5ee228ee53d12a)
|
|
|
|
| |
(cherry picked from commit fe1cbe4ad76bd645a37888a00dc1eb28047e5617)
|
|
|
|
| |
(cherry picked from commit 7a188d09b5d3209f32809cc8842d60a7ee403a99)
|
|
|
|
| |
(cherry picked from commit 69dcf0c4b95efa6f864abee23dd9819be92a4a3a)
|
|
|
|
| |
(cherry picked from commit d7eb54ab7caa5e2e4b2060f044780231d3d7737d)
|
|
|
|
| |
(cherry picked from commit c1808f1884d3341892f5f257be36b84da40cff66)
|