aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-23T14:33:22Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1200[v2.2] Vulnerability in gimp < 2.8.x may allow code execution2019-07-23T14:33:22ZLeonardo Arena[v2.2] Vulnerability in gimp < 2.8.x may allow code executionhttp://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html
Solution:
\- Upgrade to 2.8.x release
*(from redmine: issue id 1200, created on 2012-06-10, closed on 2012-07-08)*
* Changesets:
* Revis...http://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html
Solution:
\- Upgrade to 2.8.x release
*(from redmine: issue id 1200, created on 2012-06-10, closed on 2012-07-08)*
* Changesets:
* Revision 7cbf993f1a9a0f30b833795efddd3979c2d646b9 by Natanael Copa on 2012-07-03T13:22:56Z:
```
main/gimp: upgrade to 2.6.12 and fix CVE-2012-2763
fixes #1200
```Alpine 2.2.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/1577G++ missing dependency2019-07-23T14:28:14Zhal clarkG++ missing dependencyThe g<span class="underline"></span> and clang(<span
class="underline"></span>) apks should include ‘uclibc-dev’ as a
dependency, else nothing can be built.
The problem manifests as an error during compilation:
fatal error: features.h:...The g<span class="underline"></span> and clang(<span
class="underline"></span>) apks should include ‘uclibc-dev’ as a
dependency, else nothing can be built.
The problem manifests as an error during compilation:
fatal error: features.h: No such file or directory
Because \*libc owns /usr/include/features.h. As far as I can tell, this
is a simple addition to the apks.
*(from redmine: issue id 1577, created on 2013-01-18, closed on 2013-02-08)*
* Changesets:
* Revision 7c4d46a2caa0f28acbf1fb255f5738f31ed93cfd by Natanael Copa on 2013-01-22T10:11:31Z:
```
main/gcc: g++ should depend on libc headers
fixes #1577
```Alpine 2.6.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2250setup-disk: syslinux trigger fails2019-07-23T14:18:44ZKaarle Ritvanensetup-disk: syslinux trigger failsIn the ‘sys’ mode, the trigger of the syslinux package fails when
installing the root file system. The boot loader is installed correctly
by setup-disk, but ‘apk fix’ must be run manually after the reboot to
recover the state of the sysl...In the ‘sys’ mode, the trigger of the syslinux package fails when
installing the root file system. The boot loader is installed correctly
by setup-disk, but ‘apk fix’ must be run manually after the reboot to
recover the state of the syslinux package.
*(from redmine: issue id 2250, created on 2013-09-10, closed on 2013-10-02)*
* Changesets:
* Revision 562765e842b43133319b1f084f0479ba4843abbe by Natanael Copa on 2013-10-02T09:58:33Z:
```
main/alpine-conf: fix running syslinux trigger from setup-disk
ref #2250
```
* Revision 754f8509b4e36cf2d08c08473daf979bae5569ba by Natanael Copa on 2013-10-02T10:22:49Z:
```
main/alpine-conf: fix running syslinux trigger from setup-disk
fixes #2250
(cherry picked from commit 562765e842b43133319b1f084f0479ba4843abbe)
Conflicts:
main/alpine-conf/APKBUILD
```Alpine 2.6.5https://gitlab.alpinelinux.org/alpine/aports/-/issues/1199[v2.3] Vulnerability in gimp < 2.8.x may allow code execution2019-07-23T14:33:23ZLeonardo Arena[v2.3] Vulnerability in gimp < 2.8.x may allow code executionhttp://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html
Solution:
\- Upgrade to 2.8.x release
*(from redmine: issue id 1199, created on 2012-06-10, closed on 2012-07-08)*
* Changesets:
* Revis...http://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html
Solution:
\- Upgrade to 2.8.x release
*(from redmine: issue id 1199, created on 2012-06-10, closed on 2012-07-08)*
* Changesets:
* Revision 6f6c15d5702091599711d14bafecaec639c40df8 by Natanael Copa on 2012-07-03T13:11:52Z:
```
main/gimp: upgrade to 2.6.12 and fix CVE-2012-2763
fixes #1199
```Alpine 2.3.7https://gitlab.alpinelinux.org/alpine/aports/-/issues/1917Alpine configures uClibc with COMPAT_ATEXIT, the need for which seems to have...2019-07-12T14:38:32ZDubiousjim .Alpine configures uClibc with COMPAT_ATEXIT, the need for which seems to have passedIn the uClibc 0.9.33.2 sources, extra/Configs/Config.in says:
config COMPAT\_ATEXIT
bool “Old (visible) atexit Support”
help
Enable this option if you want to update from 0.9.28 to git/0.9.29,
else you will be missing atexit() u...In the uClibc 0.9.33.2 sources, extra/Configs/Config.in says:
config COMPAT\_ATEXIT
bool “Old (visible) atexit Support”
help
Enable this option if you want to update from 0.9.28 to git/0.9.29,
else you will be missing atexit() until you rebuild all apps.
It looks like we can now safely disable this.
*(from redmine: issue id 1917, created on 2013-05-19, closed on 2013-11-04)*Alpine 2.7.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/1909weirdness in libc0.9.32 APKBUILD2019-07-23T14:23:43ZDubiousjim .weirdness in libc0.9.32 APKBUILDbuild() has:
>local \_kh=
>…
>if \[ -n “$SYSROOT” \]; then
\_kh=KERNEL\_HEADERS=“$SYSROOT/include”; fi
>…
>make -j1 V=2 pregen KERNEL\_HEADERS=“$SYSROOT”/usr/include
CROSS=“$CROSS” || return 1
>make all V=2 KERNEL\_HEADERS=“$S...build() has:
>local \_kh=
>…
>if \[ -n “$SYSROOT” \]; then
\_kh=KERNEL\_HEADERS=“$SYSROOT/include”; fi
>…
>make -j1 V=2 pregen KERNEL\_HEADERS=“$SYSROOT”/usr/include
CROSS=“$CROSS” || return 1
>make all V=2 KERNEL\_HEADERS=“$SYSROOT/usr/include” CROSS=“$CROSS”
|| return 1
>…
\_kh is never used. Is this cruft from an earlier version?
*(from redmine: issue id 1909, created on 2013-05-18, closed on 2013-05-27)*
* Changesets:
* Revision 888a762e3e7bf47d79c8f2f87ae9c2382e936d63 by Natanael Copa on 2013-05-21T09:18:52Z:
```
main/libc0.9.32: clean up dead code
fixes #1909
```Alpine 2.7.0https://gitlab.alpinelinux.org/alpine/aports/-/issues/3029[v2.6] libcap-ng: capng_lock sets securebits in a scary manner (CVE-2014-3215)2019-07-23T14:07:19ZAlexander Belous[v2.6] libcap-ng: capng_lock sets securebits in a scary manner (CVE-2014-3215)capng\_lock sets securebits in an attempt to prevent regaining
capabilities using setuid-root programs. This works, but it has little
effect on setcap’d programs, and it allows a user to run setuid programs
as uid 0 but without capabilit...capng\_lock sets securebits in an attempt to prevent regaining
capabilities using setuid-root programs. This works, but it has little
effect on setcap’d programs, and it allows a user to run setuid programs
as uid 0 but without capabilities, which is potentially dangerous.
seunshare in policycoreutils 2.2.5 is owned by root with 4755
permissions, and executes programs in a way that changes the
relationship between the setuid system call and the getresuid saved
set-user-ID value, which makes it easier for local users to gain
privileges by leveraging a program that mistakenly expected that it
could permanently drop privileges.
•MLIST:\[oss-security\] 20140429 local privilege escalation due to
capng\_lock as used in seunshare
•URL: http://openwall.com/lists/oss-security/2014/04/29/7
•MLIST:\[oss-security\] 20140430 Re: local privilege escalation due to
capng\_lock as used in seunshare
•URL: http://openwall.com/lists/oss-security/2014/04/30/4
•MLIST:\[oss-security\] 20140507 Re: local privilege escalation due to
capng\_lock as used in seunshare
•URL: http://openwall.com/lists/oss-security/2014/05/08/1
•BID:67341
•URL: http://www.securityfocus.com/bid/67341
•SECUNIA:59007
•URL: http://secunia.com/advisories/59007
*(from redmine: issue id 3029, created on 2014-06-12, closed on 2014-06-24)*
* Relations:
* parent #3026
* Changesets:
* Revision 09667d2fb33c78602017b0cb73c895e27459f76b on 2014-06-18T10:49:51Z:
```
Security fix (CVE-2013-3215). Fixes #3029
```Alpine 2.6.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2992[v2.6] bash: security feature bypassed2019-07-23T14:07:55ZAlexander Belous[v2.6] bash: security feature bypassedA bug was reported in bash up to 4.3. In some circumstances the bash
security feature could be bypassed allowing the bash to be a valid
target shell in an attack.
The bug has not been fixed by developers. However a patch exists.
http:...A bug was reported in bash up to 4.3. In some circumstances the bash
security feature could be bypassed allowing the bash to be a valid
target shell in an attack.
The bug has not been fixed by developers. However a patch exists.
http://seclists.org/bugtraq/2014/Jun/28
COMMIT: http://hmarco.org/bugs/bash\_4.3-setuid-bug.html
*(from redmine: issue id 2992, created on 2014-06-05, closed on 2014-06-19)*
* Relations:
* parent #2990
* Changesets:
* Revision 883b411c85593d30f2296a157a733aa799c32828 by Natanael Copa on 2014-06-17T11:57:19Z:
```
main/bash: fix setuid bug
ref #2990
fixes #2992
(cherry picked from commit 15eb98780f3c051d2835df3860b5bcba16bf1aae)
Conflicts:
main/bash/APKBUILD
```Alpine 2.6.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2909[v2.6] libmms: heap-based buffer overflow in the get_answer function (CVE-201...2019-07-23T14:09:15ZAlexander Belous[v2.6] libmms: heap-based buffer overflow in the get_answer function (CVE-2014-2892)Heap-based buffer overflow in the get\_answer function in mmsh.c in
libmms before 0.6.4 allows remote attackers to execute arbitrary code
via a long line in an MMS over HTTP (MMSH) server response.
•MLIST:\[oss-security\] 20140418 Re: l...Heap-based buffer overflow in the get\_answer function in mmsh.c in
libmms before 0.6.4 allows remote attackers to execute arbitrary code
via a long line in an MMS over HTTP (MMSH) server response.
•MLIST:\[oss-security\] 20140418 Re: libmms heap-based buffer overflow
fix
•URL: http://www.openwall.com/lists/oss-security/2014/04/18/14
•CONFIRM:
http://sourceforge.net/p/libmms/code/ci/03bcfccc22919c72742b7338d02859962861e0e8
•CONFIRM:
http://sourceforge.net/p/libmms/code/ci/master/tree/ChangeLog
•BID:66933
•URL: http://www.securityfocus.com/bid/66933
•SECUNIA:57875
•URL: http://secunia.com/advisories/57875
•XF:libmms-getanswer-bo(92640)
•URL: http://xforce.iss.net/xforce/xfdb/92640
*(from redmine: issue id 2909, created on 2014-05-20, closed on 2014-05-23)*
* Relations:
* parent #2907
* Changesets:
* Revision c543e6951cd74145741b0b300a9c730d7b261d26 by Natanael Copa on 2014-05-22T14:49:40Z:
```
main/libmms: security upgrade to 0.6.4 (CVE-2014-2892)
fixes #2909
```Alpine 2.6.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2680[v2.6] pidgin: multiple vulnerabilies2019-07-23T14:12:33ZAlexander Belous[v2.6] pidgin: multiple vulnerabiliesNew version of pidgin has been released recently that fixes multiple
security issues. Upgrade from version 2.10.7 is necessary for all the
Alpine Linux supported branches.
References:
http://seclists.org/bugtraq/2014/Feb/4
http://pi...New version of pidgin has been released recently that fixes multiple
security issues. Upgrade from version 2.10.7 is necessary for all the
Alpine Linux supported branches.
References:
http://seclists.org/bugtraq/2014/Feb/4
http://pidgin.im/
*(from redmine: issue id 2680, created on 2014-02-06, closed on 2014-03-03)*
* Relations:
* parent #2677Alpine 2.6.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2681[v2.7] pidgin: multiple vulnerabilies2019-07-23T14:12:32ZAlexander Belous[v2.7] pidgin: multiple vulnerabilies*(from redmine: issue id 2681, created on 2014-02-06, closed on 2014-03-03)*
* Relations:
* parent #2677
* Changesets:
* Revision 9fc8798bff8fb121be4a3bda0075f124967b12e7 by Natanael Copa on 2014-03-03T11:20:18Z:
```
main/pidgin: s...*(from redmine: issue id 2681, created on 2014-02-06, closed on 2014-03-03)*
* Relations:
* parent #2677
* Changesets:
* Revision 9fc8798bff8fb121be4a3bda0075f124967b12e7 by Natanael Copa on 2014-03-03T11:20:18Z:
```
main/pidgin: security upgrade to 2.10.9 (various CVEs)
fixes #2681
CVE-2014-0020 Remotely triggerable crash in IRC argument parsing
CVE-2013-6490 Buffer overflow in SIMPLE header parsing
CVE-2013-6489 Buffer overflow in MXit emoticon parsing
CVE-2013-6487 Buffer overflow in Gadu-Gadu HTTP parsing
CVE-2013-6486 Pidgin uses clickable links to untrusted executables
CVE-2013-6485 Buffer overflow parsing chunked HTTP responses
CVE-2013-6484 Crash reading response from STUN server
CVE-2013-6483 XMPP doesn't verify 'from' on some iq replies
CVE-2013-6482 NULL pointer dereference parsing SOAP data in MSN
CVE-2013-6482 NULL pointer dereference parsing OIM data in MSN
CVE-2013-6482 NULL pointer dereference parsing headers in MSN
CVE-2013-6481 Remote crash reading Yahoo! P2P message
CVE-2013-6479 Remote crash parsing HTTP responses
CVE-2013-6478 Crash when hovering pointer over a long URL
CVE-2013-6477 Crash handling bad XMPP timestamp
CVE-2012-6152 Yahoo! remote crash from incorrect character encoding
```
* Revision 3f7dfec3a08a89eb71c26eb2bb6852fa45e069fb by Natanael Copa on 2014-03-03T13:50:06Z:
```
main/pidgin: security upgrade to 2.10.9 (various CVEs)
fixes #2681
CVE-2014-0020 Remotely triggerable crash in IRC argument parsing
CVE-2013-6490 Buffer overflow in SIMPLE header parsing
CVE-2013-6489 Buffer overflow in MXit emoticon parsing
CVE-2013-6487 Buffer overflow in Gadu-Gadu HTTP parsing
CVE-2013-6486 Pidgin uses clickable links to untrusted executables
CVE-2013-6485 Buffer overflow parsing chunked HTTP responses
CVE-2013-6484 Crash reading response from STUN server
CVE-2013-6483 XMPP doesn't verify 'from' on some iq replies
CVE-2013-6482 NULL pointer dereference parsing SOAP data in MSN
CVE-2013-6482 NULL pointer dereference parsing OIM data in MSN
CVE-2013-6482 NULL pointer dereference parsing headers in MSN
CVE-2013-6481 Remote crash reading Yahoo! P2P message
CVE-2013-6479 Remote crash parsing HTTP responses
CVE-2013-6478 Crash when hovering pointer over a long URL
CVE-2013-6477 Crash handling bad XMPP timestamp
CVE-2012-6152 Yahoo! remote crash from incorrect character encoding
```Alpine 2.7.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2686dbus should create a "system" user/group2019-07-23T14:12:29ZIgor Falcomatadbus should create a "system" user/groupAt the moment the dbus installer creates a messagebus user with uid/gid
1000 (or the first “normale user” uid/gid free)
Something like:
addgroup -S messagebus
adduser -H -h /dev/null -s /bin/false -D -S -G messagebus messagebus
*(...At the moment the dbus installer creates a messagebus user with uid/gid
1000 (or the first “normale user” uid/gid free)
Something like:
addgroup -S messagebus
adduser -H -h /dev/null -s /bin/false -D -S -G messagebus messagebus
*(from redmine: issue id 2686, created on 2014-02-19, closed on 2014-03-07)*
* Changesets:
* Revision 267b0b0452c421add1ce9b7aa9efd3953898118c by Natanael Copa on 2014-03-04T15:49:25Z:
```
main/dbus: create use as system user
fixes #2686
(cherry picked from commit cd6e2e857e4f9a7fc60d8c141a53575e76bdf70f)
Conflicts:
main/dbus/APKBUILD
```Alpine 2.7.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3248[v2.7] ansible: input sanitization errors (CVE-2014-4966 CVE-2014-4967)2019-07-23T14:04:09ZAlexander Belous[v2.7] ansible: input sanitization errors (CVE-2014-4966 CVE-2014-4967)The Ansible project is an open source configuration management platform.
The Ansible platform suffers from input sanitization errors that allow
arbitrary code execution as well as information leak, in case an
attacker is
able to con...The Ansible project is an open source configuration management platform.
The Ansible platform suffers from input sanitization errors that allow
arbitrary code execution as well as information leak, in case an
attacker is
able to control certain playbook variables.
The first vulnerability involves the escalation of a local permission
access
level into arbitrary code execution. The code execution can be triggered
by
interpolation of file names maliciously crafted as lookup plugin
commands, in
combination with its pipe feature.
The second vulnerability concerns the unsafe parsing of action arguments
in
the face of an attacker controlling variable data (whether fact data,
with\_fileglob data, or other sources), allowing an attacker to supply
their
own options to an action. The impact of this is dependent on the
action
module the attacker targets. For example, an attacker controlling
variables
passed to the copy or template actions would be able to trigger
arbitrary
code execution (in addition to simple information leakage) via the
validate
option’s acceptance of arbitrary shell code.
Affected version:
Ansible <= 1.6.6
Fixed version:
Ansible >= 1.6.7
Credit: vulnerability report received from Brian Harring <ferringb
AT
gmail.com>.
CVE: CVE-2014-4966 (lookup function), CVE-2014-4967 (action arguments)
References:
http://www.ocert.org/advisories/ocert-2014-004.html
*(from redmine: issue id 3248, created on 2014-07-29, closed on 2014-07-30)*
* Relations:
* parent #3247
* Changesets:
* Revision df5d783daeabfe8bafa649868e6c5797ea66655b by Natanael Copa on 2014-07-29T14:06:24Z:
```
main/ansible: security upgrade to 1.6.7 (CVE-2014-4966,CVE-2014-4967)
fixes #3248
```Alpine 2.7.10Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3142[v2.7] ansible: remote data checking code fixes (CVE-2014-4678 and related)2019-07-23T14:05:39ZAlexander Belous[v2.7] ansible: remote data checking code fixes (CVE-2014-4678 and related)Ansible remote data checking code was updated to lock down some security
items related to deal with untrusted data from pre-compromised remote
hosts. It was a series of changes made. Some of the issues was assigned
CVE-2014-4678. However...Ansible remote data checking code was updated to lock down some security
items related to deal with untrusted data from pre-compromised remote
hosts. It was a series of changes made. Some of the issues was assigned
CVE-2014-4678. However the additional ones do not have CVE assigned yet.
Update to Ansible 1.6.6 is recommended.
References:
https://groups.google.com/forum/message/raw?msg=ansible-announce/ieV1vZvcTXU/5Q93ThkY9rIJ
https://groups.google.com/forum/message/raw?msg=ansible-announce/A1px5egCnGQ/jH6f5HM7kpkJ
https://groups.google.com/forum/message/raw?msg=ansible-announce/WKL7BY3qddo/JkJiNrZzy3AJ
CONFIRM: http://seclists.org/oss-sec/2014/q3/2
COMMIT:
https://github.com/ansible/ansible/commit/5429b85b9f6c2e640074176f36ff05fd5e4d1916
(not fully fix all the issues)
*(from redmine: issue id 3142, created on 2014-07-03, closed on 2014-07-17)*
* Relations:
* parent #3141
* Changesets:
* Revision 87ec1c872a344b27d101746eb221bf32a8208cf4 by Natanael Copa on 2014-07-16T09:59:52Z:
```
main/ansible: security upgrade to 1.6.6 (CVE-2014-4678)
fixes #3142
```Alpine 2.7.10Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2678[v2.4] pidgin: multiple vulnerabilies2019-07-23T14:12:35ZAlexander Belous[v2.4] pidgin: multiple vulnerabiliesNew version of pidgin has been released recently that fixes multiple
security issues. Upgrade from version 2.10.7 is necessary for all the
Alpine Linux supported branches.
References:
http://seclists.org/bugtraq/2014/Feb/4
http://pi...New version of pidgin has been released recently that fixes multiple
security issues. Upgrade from version 2.10.7 is necessary for all the
Alpine Linux supported branches.
References:
http://seclists.org/bugtraq/2014/Feb/4
http://pidgin.im/
*(from redmine: issue id 2678, created on 2014-02-06, closed on 2014-03-03)*
* Relations:
* parent #2677
* Changesets:
* Revision 6c587ad3a39bae5d6a3f4c0d78f0a239b253242e by Natanael Copa on 2014-03-03T11:22:54Z:
```
main/pidgin: security upgrade to 2.10.9 (various CVEs)
fixes #2678
CVE-2014-0020 Remotely triggerable crash in IRC argument parsing
CVE-2013-6490 Buffer overflow in SIMPLE header parsing
CVE-2013-6489 Buffer overflow in MXit emoticon parsing
CVE-2013-6487 Buffer overflow in Gadu-Gadu HTTP parsing
CVE-2013-6486 Pidgin uses clickable links to untrusted executables
CVE-2013-6485 Buffer overflow parsing chunked HTTP responses
CVE-2013-6484 Crash reading response from STUN server
CVE-2013-6483 XMPP doesn't verify 'from' on some iq replies
CVE-2013-6482 NULL pointer dereference parsing SOAP data in MSN
CVE-2013-6482 NULL pointer dereference parsing OIM data in MSN
CVE-2013-6482 NULL pointer dereference parsing headers in MSN
CVE-2013-6481 Remote crash reading Yahoo! P2P message
CVE-2013-6479 Remote crash parsing HTTP responses
CVE-2013-6478 Crash when hovering pointer over a long URL
CVE-2013-6477 Crash handling bad XMPP timestamp
CVE-2012-6152 Yahoo! remote crash from incorrect character encoding
```Alpine 2.4.12Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2910[v2.7] libmms: heap-based buffer overflow in the get_answer function (CVE-201...2019-07-23T14:09:13ZAlexander Belous[v2.7] libmms: heap-based buffer overflow in the get_answer function (CVE-2014-2892)Heap-based buffer overflow in the get\_answer function in mmsh.c in
libmms before 0.6.4 allows remote attackers to execute arbitrary code
via a long line in an MMS over HTTP (MMSH) server response.
•MLIST:\[oss-security\] 20140418 Re: l...Heap-based buffer overflow in the get\_answer function in mmsh.c in
libmms before 0.6.4 allows remote attackers to execute arbitrary code
via a long line in an MMS over HTTP (MMSH) server response.
•MLIST:\[oss-security\] 20140418 Re: libmms heap-based buffer overflow
fix
•URL: http://www.openwall.com/lists/oss-security/2014/04/18/14
•CONFIRM:
http://sourceforge.net/p/libmms/code/ci/03bcfccc22919c72742b7338d02859962861e0e8
•CONFIRM:
http://sourceforge.net/p/libmms/code/ci/master/tree/ChangeLog
•BID:66933
•URL: http://www.securityfocus.com/bid/66933
•SECUNIA:57875
•URL: http://secunia.com/advisories/57875
•XF:libmms-getanswer-bo(92640)
•URL: http://xforce.iss.net/xforce/xfdb/92640
*(from redmine: issue id 2910, created on 2014-05-20, closed on 2014-05-23)*
* Relations:
* parent #2907
* Changesets:
* Revision fb608dbe599624f5f4345feaa292ad2c84c165c9 by Natanael Copa on 2014-05-21T13:37:40Z:
```
main/libmms: security upgrade to 0.6.4 (CVE-2014-2892)
fixes #2910
```Alpine 2.7.8Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2296testing/mplayer2 won't build2019-07-23T14:18:08ZLeslie Polzertesting/mplayer2 won't buildWhen trying to build mplayer2 2.0-3 on an up to date edge system (as per
4 Nov 2013), the build fails.
>>> mplayer2: Unpacking /var/cache/distfiles/mplayer2-2.0.tar.xz...
>>> mplayer2: mplayer-gcc-4.6-audio-fix.patch
patchin...When trying to build mplayer2 2.0-3 on an up to date edge system (as per
4 Nov 2013), the build fails.
>>> mplayer2: Unpacking /var/cache/distfiles/mplayer2-2.0.tar.xz...
>>> mplayer2: mplayer-gcc-4.6-audio-fix.patch
patching file mp3lib/dct64_sse.c
>>> mplayer2: c33fafd6f1bc2a430c114231cecc6e1c56c1f939.patch
patching file av_log.c
Hunk #1 succeeded at 56 (offset -1 lines).
patching file av_opts.c
patching file libmpcodecs/ad_ffmpeg.c
patching file libmpcodecs/vd_ffmpeg.c
Hunk #2 succeeded at 539 (offset -2 lines).
Hunk #3 succeeded at 783 (offset -2 lines).
patching file libmpcodecs/vf_geq.c
patching file libmpcodecs/vf_pp.c
patching file libmpdemux/demux_lavf.c
Hunk #2 succeeded at 366 (offset 5 lines).
Hunk #3 succeeded at 437 (offset 4 lines).
Hunk #4 succeeded at 480 (offset 4 lines).
Hunk #5 succeeded at 759 (offset 1 line).
Hunk #6 succeeded at 930 (offset 5 lines).
Detected operating system: Linux
Detected host architecture: i386
Checking for host cc ... cc
Checking for cross compilation ... yes
cc: error: /usr/share/gcc/hardenednopie.specs: No such file or directory
cc: error: /usr/share/gcc/hardenednopie.specs: No such file or directory
Checking for GCC & CPU optimization abilities ... i486
Checking for byte order ... failed to autodetect byte order, defaulting to little-endian
Checking for extern symbol prefix ...
Error: Symbol mangling check failed.
Check "config.log" if you do not understand why it failed.
>>> ERROR: mplayer2: all failed
Removing the gcc spec envvar export in the APKBUILD we get:
gcc -MD -MP -Wundef -Wstrict-prototypes -Wmissing-prototypes -Wdisabled-optimization -Wno-pointer-sign -std=gnu99 -Os -fomit-frame-pointer -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -I. -Os -fomit-frame-pointer -DPIC -D_REENTRANT -I/usr/include/freetype2 -c -o libmpcodecs/vf_eq2.o libmpcodecs/vf_eq2.c
libmpcodecs/vf_eq.c: In function 'process_MMX':
libmpcodecs/vf_eq.c:65:3: error: 'asm' operand has impossible constraints
__asm__ volatile (
^
Makefile:606: recipe for target 'libmpcodecs/vf_eq.o' failed
make: *** [libmpcodecs/vf_eq.o] Error 1
make: *** Waiting for unfinished jobs....
libmpcodecs/vf_eq2.c: In function 'affine_1d_MMX':
libmpcodecs/vf_eq2.c:147:5: error: 'asm' operand has impossible constraints
__asm__ volatile (
^
Makefile:606: recipe for target 'libmpcodecs/vf_eq2.o' failed
make: *** [libmpcodecs/vf_eq2.o] Error 1
>>> ERROR: mplayer2: all failed
*(from redmine: issue id 2296, created on 2013-11-04, closed on 2013-11-25)*
* Relations:
* relates #24383.0.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2130ACF WebLog - Highlight Blocked and Bypassed entries2019-07-23T14:20:17ZRay PatingACF WebLog - Highlight Blocked and Bypassed entriesWould it be possible for us to highlight or place a red background for
the entries which are blocked and/or bypassed by users? Thanks!
*(from redmine: issue id 2130, created on 2013-07-08, closed on 2013-11-19)*Would it be possible for us to highlight or place a red background for
the entries which are blocked and/or bypassed by users? Thanks!
*(from redmine: issue id 2130, created on 2013-07-08, closed on 2013-11-19)*3.0.0Ted TraskTed Traskhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3030[v2.7] libcap-ng: capng_lock sets securebits in a scary manner (CVE-2014-3215)2019-07-23T14:07:18ZAlexander Belous[v2.7] libcap-ng: capng_lock sets securebits in a scary manner (CVE-2014-3215)capng\_lock sets securebits in an attempt to prevent regaining
capabilities using setuid-root programs. This works, but it has little
effect on setcap’d programs, and it allows a user to run setuid programs
as uid 0 but without capabilit...capng\_lock sets securebits in an attempt to prevent regaining
capabilities using setuid-root programs. This works, but it has little
effect on setcap’d programs, and it allows a user to run setuid programs
as uid 0 but without capabilities, which is potentially dangerous.
seunshare in policycoreutils 2.2.5 is owned by root with 4755
permissions, and executes programs in a way that changes the
relationship between the setuid system call and the getresuid saved
set-user-ID value, which makes it easier for local users to gain
privileges by leveraging a program that mistakenly expected that it
could permanently drop privileges.
•MLIST:\[oss-security\] 20140429 local privilege escalation due to
capng\_lock as used in seunshare
•URL: http://openwall.com/lists/oss-security/2014/04/29/7
•MLIST:\[oss-security\] 20140430 Re: local privilege escalation due to
capng\_lock as used in seunshare
•URL: http://openwall.com/lists/oss-security/2014/04/30/4
•MLIST:\[oss-security\] 20140507 Re: local privilege escalation due to
capng\_lock as used in seunshare
•URL: http://openwall.com/lists/oss-security/2014/05/08/1
•BID:67341
•URL: http://www.securityfocus.com/bid/67341
•SECUNIA:59007
•URL: http://secunia.com/advisories/59007
*(from redmine: issue id 3030, created on 2014-06-12, closed on 2014-06-24)*
* Relations:
* parent #3026
* Changesets:
* Revision 88a25f5aabc145f8e2063a3200ef0a8f4194eee3 by Leonardo Arena on 2014-06-18T10:28:29Z:
```
Security fix (CVE-2013-3215). Fixes #3030
```Alpine 2.7.9Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/2993[v2.7] bash: security feature bypassed2019-07-23T14:07:54ZAlexander Belous[v2.7] bash: security feature bypassedA bug was reported in bash up to 4.3. In some circumstances the bash
security feature could be bypassed allowing the bash to be a valid
target shell in an attack.
The bug has not been fixed by developers. However a patch exists.
http:...A bug was reported in bash up to 4.3. In some circumstances the bash
security feature could be bypassed allowing the bash to be a valid
target shell in an attack.
The bug has not been fixed by developers. However a patch exists.
http://seclists.org/bugtraq/2014/Jun/28
COMMIT: http://hmarco.org/bugs/bash\_4.3-setuid-bug.html
*(from redmine: issue id 2993, created on 2014-06-05, closed on 2014-06-19)*
* Relations:
* parent #2990
* Changesets:
* Revision 3e589033a44832ab8b4f5a8e9a68aac077beae59 by Natanael Copa on 2014-06-17T11:55:11Z:
```
main/bash: fix setuid bug
ref #2990
fixes #2993
(cherry picked from commit 15eb98780f3c051d2835df3860b5bcba16bf1aae)
Conflicts:
main/bash/APKBUILD
```Alpine 2.7.9Natanael CopaNatanael Copa