alpine issueshttps://gitlab.alpinelinux.org/groups/alpine/-/issues2019-07-23T12:08:04Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6198[3.2] phpmyadmin: Multiple vulnerabilities (Various CVEs)2019-07-23T12:08:04ZAlicha CH[3.2] phpmyadmin: Multiple vulnerabilities (Various CVEs)### CVE-2016-6606: Weakness with cookie encryption
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newe...### CVE-2016-6606: Weakness with cookie encryption
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-29/
### CVE-2016-6607: Multiple XSS vulnerabilities
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-30/
### CVE-2016-6608: Multiple XSS vulnerabilities
All 4.6.x versions (prior to 4.6.4) are affected
Upgrade to phpMyAdmin 4.6.4 or newer or apply patch.
https://www.phpmyadmin.net/security/PMASA-2016-31/
### CVE-2016-6609: PHP code injection
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-32/
### CVE-2016-6610: Full path disclosure
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-33/
### CVE-2016-6611: SQL injection attack
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-34/
### CVE-2016-6612: Local file exposure
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-35/
### CVE-2016-6613: Local file exposure through symlinks with UploadDir
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-36/
### CVE-2016-6614: Path traversal with SaveDir and UploadDir
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-37/
### CVE-2016-6615: Multiple XSS vulnerabilities
All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to
4.4.15.8) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or newer or apply patch.
https://www.phpmyadmin.net/security/PMASA-2016-38/
### CVE-2016-6616: SQL injection attack
All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to
4.4.15.8) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or newer or apply patch
https://www.phpmyadmin.net/security/PMASA-2016-39/
### CVE-2016-6617: SQL injection attack
All 4.6.x versions (prior to 4.6.4) are affected.
Upgrade to phpMyAdmin 4.6.4 or newer, or apply patch.
https://www.phpmyadmin.net/security/PMASA-2016-40/
### CVE-2016-6618: Denial of service (DOS) attack in transformation feature
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-41/
### CVE-2016-6619: SQL injection attack as control user
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-42/
### CVE-2016-6620: Unvalidated data passed to unserialize()
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-43/
### CVE-2016-6622: DOS attack with forced persistent connections
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-45/
### CVE-2016-6623: Denial of service (DOS) attack by for loops
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-46/
### CVE-2016-6624: IPv6 and proxy server IP-based authentication rule circumvention
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-47/
### CVE-2016-6625: Detect if user is logged in
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer, or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-48/
### CVE-2016-6626: Bypass URL redirect protection
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer.
https://www.phpmyadmin.net/security/PMASA-2016-49/
### CVE-2016-6627: Referrer leak in url.php
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer, or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-50/
### CVE-2016-6628: Reflected File Download attack
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, or 4.0.10.17 or newer, or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-51/
### CVE-2016-6629: ArbitraryServerRegexp bypass
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected.
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch.
https://www.phpmyadmin.net/security/PMASA-2016-52/
### CVE-2016-6630: Denial of service (DOS) attack by changing password to a very long string
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-53/
### CVE-2016-6631: Remote code execution vulnerability when run as CGI
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer, or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-54/
### CVE-2016-6632: Denial of service (DOS) attack with dbase extension
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-55/
### CVE-2016-6633: Remote code execution vulnerability when PHP is running with dbase extension
All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8),
and 4.0.x versions (prior to 4.0.10.17) are affected
Upgrade to phpMyAdmin 4.6.4, 4.4.15.8, 4.0.10.17, or newer or apply
patch
https://www.phpmyadmin.net/security/PMASA-2016-56/
*(from redmine: issue id 6198, created on 2016-09-20, closed on 2016-10-25)*
* Relations:
* parent #6194
* Changesets:
* Revision abae6704b5ad5fa0ac123378e37f2b81d2585ff0 on 2016-10-18T13:42:04Z:
```
main/phpmyadmin: security upgrade to 4.4.15.8. Fixes #6198
- CVE-2016-6606
- CVE-2016-6607
- CVE-2016-6608
- CVE-2016-6609
- CVE-2016-6610
- CVE-2016-6611
- CVE-2016-6612
- CVE-2016-6613
- CVE-2016-6614
- CVE-2016-6615
- CVE-2016-6616
- CVE-2016-6617
- CVE-2016-6618
- CVE-2016-6619
- CVE-2016-6620
- CVE-2016-6622
- CVE-2016-6623
- CVE-2016-6624
- CVE-2016-6625
- CVE-2016-6626
- CVE-2016-6627
- CVE-2016-6628
- CVE-2016-6629
- CVE-2016-6630
- CVE-2016-6631
- CVE-2016-6632
- CVE-2016-6633
```3.2.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/6200X509 certificate expired for forum.alpinelinux.org2019-07-23T12:08:04ZJames McGlashanX509 certificate expired for forum.alpinelinux.orghttps://forum.alpinelinux.org/forum
*(from redmine: issue id 6200, created on 2016-09-21, closed on 2016-09-29)*
* Relations:
* duplicates #6125https://forum.alpinelinux.org/forum
*(from redmine: issue id 6200, created on 2016-09-21, closed on 2016-09-29)*
* Relations:
* duplicates #6125https://gitlab.alpinelinux.org/alpine/aports/-/issues/6202Explicit HTTP links in header on the official site (Should be HTTPS!)2019-07-23T12:08:03ZJames McGlashanExplicit HTTP links in header on the official site (Should be HTTPS!)http://git.alpinelinux.org/cgit/alpine-mksite/tree/\_default.template.html
Either use //wiki., etc or https://
*(from redmine: issue id 6202, created on 2016-09-21, closed on 2017-05-22)*http://git.alpinelinux.org/cgit/alpine-mksite/tree/\_default.template.html
Either use //wiki., etc or https://
*(from redmine: issue id 6202, created on 2016-09-21, closed on 2017-05-22)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/6203Package Request: biblatex2019-07-23T12:08:02ZalgitbotPackage Request: biblatexERROR - Error: Found biblatex control file version 3.1, expected version
3.2.
This means that your biber (2.6) and biblatex (3.4) versions are
incompatible.
The biber package was updated and stopped working because it requires a
new v...ERROR - Error: Found biblatex control file version 3.1, expected version
3.2.
This means that your biber (2.6) and biblatex (3.4) versions are
incompatible.
The biber package was updated and stopped working because it requires a
new version of biblatex.
The biblatex version shipped with texlive is incompatible.
So I request a biblatex APKBUILD with the latest version, that is
up-to-date and compatible with the newest biber.
That way biber will work again.
Thanks.
*(from redmine: issue id 6203, created on 2016-09-21, closed on 2017-05-22)*
* Changesets:
* Revision 8db9f55a08657c45de84c0108bd4f71c9365194d on 2016-09-21T12:13:01Z:
```
testing/biblatex: new aport. Fixes #6203
```Francesco ColistaFrancesco Colistahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6204Upgrade irssi to 0.8.202019-07-23T12:08:01ZThorben WentUpgrade irssi to 0.8.20Please upgrade irssi to 0.8.20
Blog: https://irssi.org/2016/09/21/irssi-0.8.20-released/
From https://raw.githubusercontent.com/irssi/irssi/0.8.20/NEWS:
v0.8.20 2016-09-16 The Irssi team <staff@irssi.org>
- Correct the na...Please upgrade irssi to 0.8.20
Blog: https://irssi.org/2016/09/21/irssi-0.8.20-released/
From https://raw.githubusercontent.com/irssi/irssi/0.8.20/NEWS:
v0.8.20 2016-09-16 The Irssi team <staff@irssi.org>
- Correct the name of an emitted sasl signal (#484)
- Correct the prototype for the 'message private' signal (#515)
- Corrections in away and hilight help text (#477, #518)
- /squery and /servlist commands have been restored.
- Where Irssi would previously only report "System error" on connect,
it will now try harder to retrieve the system error message.
- Fixed issue with +channels not working properly (#533)
- Fixed crash in optchan when item has no server (#485)
- Fixed random remote crash in the nicklist handling (#529)
- Fixed remote crash due to incorrect bounds checking on
formats, reported by Gabriel Campana and Adrien Guinet from
Quarkslab.
*(from redmine: issue id 6204, created on 2016-09-22, closed on 2016-09-23)*
* Changesets:
* Revision 8e2f95e21e5b577b7653f992e408ddb767da1cf3 by Natanael Copa on 2016-09-22T08:35:53Z:
```
main/irssi: upgrade to 0.8.20
ref #6204
```
* Revision b86088878d20d3e51754c70701fc2ce39bc2ab97 by Natanael Copa on 2016-09-22T09:28:35Z:
```
main/irssi: upgrade to 0.8.20
fixes #6204
(cherry picked from commit 8e2f95e21e5b577b7653f992e408ddb767da1cf3)
```3.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/6207[3.4] openssl: Security issues (CVE-2016-2183, CVE-2016-6304, CVE-2016-6306)2019-07-23T12:07:58ZAlicha CH[3.4] openssl: Security issues (CVE-2016-2183, CVE-2016-6304, CVE-2016-6306)CVE-2016-2183: SWEET32 Mitigation
---------------------------------
SWEET32 (https://sweet32.info) is an attack on older block cipher
algorithms
that use a block size of 64 bits. In mitigation for the SWEET32 attack
DES based
cipher...CVE-2016-2183: SWEET32 Mitigation
---------------------------------
SWEET32 (https://sweet32.info) is an attack on older block cipher
algorithms
that use a block size of 64 bits. In mitigation for the SWEET32 attack
DES based
ciphersuites have been moved from the HIGH cipherstring group to MEDIUM
in
OpenSSL 1.0.1 and OpenSSL 1.0.2. OpenSSL 1.1.0 since release has had
these
ciphersuites disabled by default.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
CVE-2016-6304: OCSP Status Request extension unbounded memory growth
--------------------------------------------------------------------
A malicious client can send an excessively large OCSP Status Request
extension.
If that client continually requests renegotiation, sending a large OCSP
Status
Request extension each time, then there will be unbounded memory growth
on the
server.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
CVE-2016-6306: Certificate message OOB reads
--------------------------------------------
In OpenSSL 1.0.2 and earlier some missing message length checks can
result in
OOB reads of up to 2 bytes beyond an allocated buffer. There is a
theoretical
DoS risk but this has not been observed in practice on common platforms.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
*(from redmine: issue id 6207, created on 2016-09-22, closed on 2016-09-22)*
* Relations:
* parent #6206
* Changesets:
* Revision a38f0ddf93adc4fd2f8255cbd1c94ab704b007ac by Natanael Copa on 2016-09-22T14:09:40Z:
```
main/openssl: upgrade to 1.0.2i
fixes #6207
- CVE-2016-2183
- CVE-2016-6304
- CVE-2016-6306
```3.4.4Timo TeräsTimo Teräshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6208[3.3] openssl: Security issues (CVE-2016-2183, CVE-2016-6304, CVE-2016-6306)2019-07-23T12:07:57ZAlicha CH[3.3] openssl: Security issues (CVE-2016-2183, CVE-2016-6304, CVE-2016-6306)CVE-2016-2183: SWEET32 Mitigation
---------------------------------
SWEET32 (https://sweet32.info) is an attack on older block cipher
algorithms
that use a block size of 64 bits. In mitigation for the SWEET32 attack
DES based
cipher...CVE-2016-2183: SWEET32 Mitigation
---------------------------------
SWEET32 (https://sweet32.info) is an attack on older block cipher
algorithms
that use a block size of 64 bits. In mitigation for the SWEET32 attack
DES based
ciphersuites have been moved from the HIGH cipherstring group to MEDIUM
in
OpenSSL 1.0.1 and OpenSSL 1.0.2. OpenSSL 1.1.0 since release has had
these
ciphersuites disabled by default.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
CVE-2016-6304: OCSP Status Request extension unbounded memory growth
--------------------------------------------------------------------
A malicious client can send an excessively large OCSP Status Request
extension.
If that client continually requests renegotiation, sending a large OCSP
Status
Request extension each time, then there will be unbounded memory growth
on the
server.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
CVE-2016-6306: Certificate message OOB reads
--------------------------------------------
In OpenSSL 1.0.2 and earlier some missing message length checks can
result in
OOB reads of up to 2 bytes beyond an allocated buffer. There is a
theoretical
DoS risk but this has not been observed in practice on common platforms.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
*(from redmine: issue id 6208, created on 2016-09-22, closed on 2016-09-22)*
* Relations:
* parent #6206
* Changesets:
* Revision 3cd2cd34c2859d94c7cfa8bfd46c5ac71b26893e by Natanael Copa on 2016-09-22T14:13:17Z:
```
main/openssl: upgrade to 1.0.2i
fixes #6208
- CVE-2016-2183
- CVE-2016-6304
- CVE-2016-6306
```3.3.4Timo TeräsTimo Teräshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6209[3.2] openssl: Security issues (CVE-2016-2183, CVE-2016-6304, CVE-2016-6306)2019-07-23T12:07:56ZAlicha CH[3.2] openssl: Security issues (CVE-2016-2183, CVE-2016-6304, CVE-2016-6306)CVE-2016-2183: SWEET32 Mitigation
---------------------------------
SWEET32 (https://sweet32.info) is an attack on older block cipher
algorithms
that use a block size of 64 bits. In mitigation for the SWEET32 attack
DES based
cipher...CVE-2016-2183: SWEET32 Mitigation
---------------------------------
SWEET32 (https://sweet32.info) is an attack on older block cipher
algorithms
that use a block size of 64 bits. In mitigation for the SWEET32 attack
DES based
ciphersuites have been moved from the HIGH cipherstring group to MEDIUM
in
OpenSSL 1.0.1 and OpenSSL 1.0.2. OpenSSL 1.1.0 since release has had
these
ciphersuites disabled by default.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
CVE-2016-6304: OCSP Status Request extension unbounded memory growth
--------------------------------------------------------------------
A malicious client can send an excessively large OCSP Status Request
extension.
If that client continually requests renegotiation, sending a large OCSP
Status
Request extension each time, then there will be unbounded memory growth
on the
server.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
CVE-2016-6306: Certificate message OOB reads
--------------------------------------------
In OpenSSL 1.0.2 and earlier some missing message length checks can
result in
OOB reads of up to 2 bytes beyond an allocated buffer. There is a
theoretical
DoS risk but this has not been observed in practice on common platforms.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
*(from redmine: issue id 6209, created on 2016-09-22, closed on 2016-09-22)*
* Relations:
* parent #6206
* Changesets:
* Revision 7cfa29eeb94474b3bf44e4be19b4e2263ac6b479 by Natanael Copa on 2016-09-22T14:16:10Z:
```
main/openssl: security upgrade to 1.0.2i
fixes #6209
- CVE-2016-2183
- CVE-2016-6304
- CVE-2016-6306
```3.2.4Timo TeräsTimo Teräshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6210[3.1] openssl: Security issues (CVE-2016-2183, CVE-2016-6304, CVE-2016-6306)2019-07-23T12:07:55ZAlicha CH[3.1] openssl: Security issues (CVE-2016-2183, CVE-2016-6304, CVE-2016-6306)CVE-2016-2183: SWEET32 Mitigation
---------------------------------
SWEET32 (https://sweet32.info) is an attack on older block cipher
algorithms
that use a block size of 64 bits. In mitigation for the SWEET32 attack
DES based
cipher...CVE-2016-2183: SWEET32 Mitigation
---------------------------------
SWEET32 (https://sweet32.info) is an attack on older block cipher
algorithms
that use a block size of 64 bits. In mitigation for the SWEET32 attack
DES based
ciphersuites have been moved from the HIGH cipherstring group to MEDIUM
in
OpenSSL 1.0.1 and OpenSSL 1.0.2. OpenSSL 1.1.0 since release has had
these
ciphersuites disabled by default.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
CVE-2016-6304: OCSP Status Request extension unbounded memory growth
--------------------------------------------------------------------
A malicious client can send an excessively large OCSP Status Request
extension.
If that client continually requests renegotiation, sending a large OCSP
Status
Request extension each time, then there will be unbounded memory growth
on the
server.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
CVE-2016-6306: Certificate message OOB reads
--------------------------------------------
In OpenSSL 1.0.2 and earlier some missing message length checks can
result in
OOB reads of up to 2 bytes beyond an allocated buffer. There is a
theoretical
DoS risk but this has not been observed in practice on common platforms.
OpenSSL 1.0.2 users should upgrade to 1.0.2i
OpenSSL 1.0.1 users should upgrade to 1.0.1u
### Reference:
https://www.openssl.org/news/secadv/20160922.txt
*(from redmine: issue id 6210, created on 2016-09-22, closed on 2016-09-22)*
* Relations:
* parent #6206
* Changesets:
* Revision 3e8e66af8eb57c1dc45545c6ad7ad09d2ad1bc8c by Natanael Copa on 2016-09-22T14:19:05Z:
```
main/openssl: upgrade to 1.0.1u
fixes #6210
```3.1.5Timo TeräsTimo Teräshttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6211irssi: crash and heap corruption vulnerabilites (CVE-2016-7044, CVE-2016-7045)2019-07-23T12:07:53ZAlicha CHirssi: crash and heap corruption vulnerabilites (CVE-2016-7044, CVE-2016-7045)**CVE-2016-7044**: Unchecked input in unformat\_24bit\_color() can lead
to crash
**CVE-2016-7045**: String length not validated in
format\_send\_to\_gui() causing crash
### Fixed In Version:
irssi 0.8.20
### Reference:
https://irssi...**CVE-2016-7044**: Unchecked input in unformat\_24bit\_color() can lead
to crash
**CVE-2016-7045**: String length not validated in
format\_send\_to\_gui() causing crash
### Fixed In Version:
irssi 0.8.20
### Reference:
https://irssi.org/security/irssi\_sa\_2016.txt
*(from redmine: issue id 6211, created on 2016-09-22, closed on 2016-10-25)*
* Relations:
* child #6212
* child #6213
* child #6214https://gitlab.alpinelinux.org/alpine/aports/-/issues/6212[3.3] irssi: crash and heap corruption vulnerabilites (CVE-2016-7044, CVE-201...2019-07-23T12:07:52ZAlicha CH[3.3] irssi: crash and heap corruption vulnerabilites (CVE-2016-7044, CVE-2016-7045)**CVE-2016-7044**: Unchecked input in unformat\_24bit\_color() can lead
to crash
**CVE-2016-7045**: String length not validated in
format\_send\_to\_gui() causing crash
### Fixed In Version:
irssi 0.8.20
### Reference:
https://irssi...**CVE-2016-7044**: Unchecked input in unformat\_24bit\_color() can lead
to crash
**CVE-2016-7045**: String length not validated in
format\_send\_to\_gui() causing crash
### Fixed In Version:
irssi 0.8.20
### Reference:
https://irssi.org/security/irssi\_sa\_2016.txt
*(from redmine: issue id 6212, created on 2016-09-22, closed on 2016-10-25)*
* Relations:
* parent #6211
* Changesets:
* Revision 085fefb455517f1609a5854eff3fb024b22bcbfb on 2016-10-19T07:50:25Z:
```
main/irssi: security upgrade to 0.8.20 (CVE-2016-7044, CVE-2016-7045)
Fixes #6212
```3.3.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/6213[3.2] irssi: crash and heap corruption vulnerabilites (CVE-2016-7044, CVE-201...2019-07-23T12:07:51ZAlicha CH[3.2] irssi: crash and heap corruption vulnerabilites (CVE-2016-7044, CVE-2016-7045)**CVE-2016-7044**: Unchecked input in unformat\_24bit\_color() can lead
to crash
**CVE-2016-7045**: String length not validated in
format\_send\_to\_gui() causing crash
### Fixed In Version:
irssi 0.8.20
### Reference:
https://irssi...**CVE-2016-7044**: Unchecked input in unformat\_24bit\_color() can lead
to crash
**CVE-2016-7045**: String length not validated in
format\_send\_to\_gui() causing crash
### Fixed In Version:
irssi 0.8.20
### Reference:
https://irssi.org/security/irssi\_sa\_2016.txt
*(from redmine: issue id 6213, created on 2016-09-22, closed on 2016-10-25)*
* Relations:
* parent #6211
* Changesets:
* Revision b37c51d94a10eb6d1ef13bb1621230713c178057 on 2016-10-19T08:13:45Z:
```
main/irssi: security upgrade to 0.8.20 (CVE-2016-7044, CVE-2016-7045)
Fixes #6213
```3.2.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/6214[3.1] irssi: crash and heap corruption vulnerabilites (CVE-2016-7044, CVE-201...2019-07-23T12:07:50ZAlicha CH[3.1] irssi: crash and heap corruption vulnerabilites (CVE-2016-7044, CVE-2016-7045)**CVE-2016-7044**: Unchecked input in unformat\_24bit\_color() can lead
to crash
**CVE-2016-7045**: String length not validated in
format\_send\_to\_gui() causing crash
### Fixed In Version:
irssi 0.8.20
### Reference:
https://irssi...**CVE-2016-7044**: Unchecked input in unformat\_24bit\_color() can lead
to crash
**CVE-2016-7045**: String length not validated in
format\_send\_to\_gui() causing crash
### Fixed In Version:
irssi 0.8.20
### Reference:
https://irssi.org/security/irssi\_sa\_2016.txt
*(from redmine: issue id 6214, created on 2016-09-22, closed on 2016-10-25)*
* Relations:
* parent #6211
* Changesets:
* Revision 9efd168e12368c2f2f24d4ba2474d1f18593b917 on 2016-10-19T08:14:47Z:
```
main/irssi: security upgrade to 0.8.20 (CVE-2016-7044, CVE-2016-7045)
Fixes #6214
(cherry picked from commit b37c51d94a10eb6d1ef13bb1621230713c178057)
```3.1.5https://gitlab.alpinelinux.org/alpine/aports/-/issues/6217nlplug-findfs segfaults on bogus extraneous cryptsetup execution2019-07-23T12:07:49Z7heo .tknlplug-findfs segfaults on bogus extraneous cryptsetup executionWhen opening a <code>cryptsetup</code> device with
<code>nlplug-findfs</code>, the device is first unlocked correctly, and
then <code>cryptsetup</code> is called a second time, and continues
asking for the passphrase until the amount of ...When opening a <code>cryptsetup</code> device with
<code>nlplug-findfs</code>, the device is first unlocked correctly, and
then <code>cryptsetup</code> is called a second time, and continues
asking for the passphrase until the amount of tries is exhausted. Then
the application segfaults, while the <code>cryptsetup</code> device is
open correctly (from the first execution).
*(from redmine: issue id 6217, created on 2016-09-26, closed on 2017-04-07)*
* Changesets:
* Revision 386aab2ad0e7becf3db1de3fc70d124cd85f5d47 by Timo Teräs on 2016-11-24T12:07:52Z:
```
main/mkinitfs: upgrade to 3.0.6
fixes #6217
fixes #6469
fixes #6473
```7heo .tk7heo .tkhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6219Can't run setup-alpine on a machine behind a proxy2019-07-23T12:07:48ZAdrian HeskethCan't run setup-alpine on a machine behind a proxyI tried to setup Alpine on a Virtualbox machine behind a corporate
proxy, but couldn’t get the setup-alpine to run.
I followed the steps at
https://wiki.alpinelinux.org/wiki/Alpine\_setup\_scripts :
- Insert Alpine ISO into VirtualBo...I tried to setup Alpine on a Virtualbox machine behind a corporate
proxy, but couldn’t get the setup-alpine to run.
I followed the steps at
https://wiki.alpinelinux.org/wiki/Alpine\_setup\_scripts :
- Insert Alpine ISO into VirtualBox machine.
- Start up Alpine, logon as root.
- Run setup-alpine.
- Follow the network setup.
- Enter the proxy address, e.g. http://10.0.2.2:3128
- (10.0.2.2 is the address of the virtualbox host, using this as the
proxy works fine for wget requests other than in the setup scripts)
- When the setup-apkrepos section runs with option f -
“find\_fastest\_mirror()”, none of the endpoints can be reached
(destination unreachable)
- When the setup-disk section runs, it then quits with error:
<!-- -->
ERROR: unsatisfiable constraints:
e2fsprogs (missing):
required by: world[e2fsprogs]
When I reviewed the script at /sbin/setup-apkrepos I found a line which
actually clears the proxy setting:
find_fastest_mirror() {
export http_proxy=
I think it’s in git at:
http://git.alpinelinux.org/cgit/alpine-conf/tree/setup-apkrepos.in
As a workaround, I commented out that line, then ran setup-apkrepos
again, followed by setup-disk. This resolved the issue for me, and I was
able to install.
I can’t think why that line would be present in the script, but there
must be a reason. If there isn’t a really good reason, then that line
should probably be removed, on the basis that people who have to work
behind a proxy already suffer enough.
*(from redmine: issue id 6219, created on 2016-09-26, closed on 2016-09-28)*
* Changesets:
* Revision 380c607492fcd9f09d104653b664a26c4b048ff5 by Natanael Copa on 2016-09-27T18:36:29Z:
```
main/alpine-conf: dont reset http_proxy in setup-apkrepos
ref #6219
```
* Revision 14d3fa6490c97334b4f25dbf1bcb329b61e5b63d by Natanael Copa on 2016-09-27T18:46:19Z:
```
main/alpine-conf: dont reset http_proxy in setup-apkrepos
fixes #6219
(cherry picked from commit 380c607492fcd9f09d104653b664a26c4b048ff5)
```
* Revision be595d2f343ecd075a57930f475df1408a7b6b57 by Natanael Copa on 2016-11-10T10:20:39Z:
```
setup-apkrepos: dont reset http_proxy
it is likely needed if it is set.
ref #6219
```3.4.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/6220Podbeuter/Newsbeuter segfault on download2019-07-23T12:07:47ZMike DevinePodbeuter/Newsbeuter segfault on downloadnewsbeuter 2.9-r2 is fundamentally broken - as podbeuter segfaults as
soon as any download is started.
Same bug as described here: https://bugs.archlinux.org/task/44421
and here: https://github.com/akrennmair/newsbeuter/issues/167
Re...newsbeuter 2.9-r2 is fundamentally broken - as podbeuter segfaults as
soon as any download is started.
Same bug as described here: https://bugs.archlinux.org/task/44421
and here: https://github.com/akrennmair/newsbeuter/issues/167
Reverting to newsbeuter 2.8-1 fixes the issue.
*(from redmine: issue id 6220, created on 2016-09-26, closed on 2016-09-28)*
* Changesets:
* Revision 57d85d500f14cf07ad4a797d68d221a59a29cb0c by Natanael Copa on 2016-09-26T20:07:01Z:
```
main/newsbeuter: fix segfault
ref #6220
```
* Revision 44636dcb11d4586c00be1a459701ef46e1441a53 by Natanael Copa on 2016-09-26T20:08:04Z:
```
main/newsbeuter: fix segfault
fixes #6220
```
* Revision c35b0b809dc21194dae7b0d8a733b5dbf22535cd by Natanael Copa on 2017-08-22T17:51:31Z:
```
main/newsbeuter: fix segfault
fixes #6220
(cherry picked from commit 44636dcb11d4586c00be1a459701ef46e1441a53)
```3.4.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6222bind: Assertion Failure in buffer.c While Building Responses to a Specificall...2019-07-23T12:07:46ZAlicha CHbind: Assertion Failure in buffer.c While Building Responses to a Specifically Constructed Request (CVE-2016-2776)A defect in the rendering of messages into packets can cause named to
exit with an assertion
failure in buffer.c while constructing a response to a query that meets
certain criteria.
This assertion can be triggered even if the apparen...A defect in the rendering of messages into packets can cause named to
exit with an assertion
failure in buffer.c while constructing a response to a query that meets
certain criteria.
This assertion can be triggered even if the apparent source address
isn’t allowed to make queries (i.e. doesn’t match ‘allow-query’).
### Affected versions:
9.0.x ->9.8.x, 9.9.0<s><span style="text-align:right;">9.9.9-P2,
9.9.3-S1</span></s>>9.9.9-S3, 9.10.0<s><span
style="text-align:right;">9.10.4-P2, 9.11.0a1</span></s>>9.11.0rc1
### Fixed In Version:
bind 9.9.9-P3, **bind 9.10.4-P3**
### Reference:
https://kb.isc.org/article/AA-01419/0
*(from redmine: issue id 6222, created on 2016-09-28, closed on 2016-10-25)*
* Relations:
* child #6223
* child #6224
* child #6225
* child #6226
* child #6227Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6223[3.5] bind: Assertion Failure in buffer.c While Building Responses to a Speci...2019-07-23T12:07:45ZAlicha CH[3.5] bind: Assertion Failure in buffer.c While Building Responses to a Specifically Constructed Request (CVE-2016-2776)A defect in the rendering of messages into packets can cause named to
exit with an assertion
failure in buffer.c while constructing a response to a query that meets
certain criteria.
This assertion can be triggered even if the apparen...A defect in the rendering of messages into packets can cause named to
exit with an assertion
failure in buffer.c while constructing a response to a query that meets
certain criteria.
This assertion can be triggered even if the apparent source address
isn’t allowed to make queries (i.e. doesn’t match ‘allow-query’).
### Affected versions:
9.0.x ->9.8.x, 9.9.0<s><span style="text-align:right;">9.9.9-P2,
9.9.3-S1</span></s>>9.9.9-S3, 9.10.0<s><span
style="text-align:right;">9.10.4-P2, 9.11.0a1</span></s>>9.11.0rc1
### Fixed In Version:
bind 9.9.9-P3, **bind 9.10.4-P3**
### Reference:
https://kb.isc.org/article/AA-01419/0
*(from redmine: issue id 6223, created on 2016-09-28, closed on 2016-10-25)*
* Relations:
* parent #6222
* Changesets:
* Revision 201cf7c3ba5f236e01c5a693526928ebc67ce3b4 by Natanael Copa on 2016-09-28T09:22:42Z:
```
main/bind: security upgrade to 9.10.4_p3 (CVE-2016-2776)
fixes #6223
```3.5.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6224[3.4] bind: Assertion Failure in buffer.c While Building Responses to a Speci...2019-07-23T12:07:44ZAlicha CH[3.4] bind: Assertion Failure in buffer.c While Building Responses to a Specifically Constructed Request (CVE-2016-2776)A defect in the rendering of messages into packets can cause named to
exit with an assertion
failure in buffer.c while constructing a response to a query that meets
certain criteria.
This assertion can be triggered even if the apparen...A defect in the rendering of messages into packets can cause named to
exit with an assertion
failure in buffer.c while constructing a response to a query that meets
certain criteria.
This assertion can be triggered even if the apparent source address
isn’t allowed to make queries (i.e. doesn’t match ‘allow-query’).
### Affected versions:
9.0.x ->9.8.x, 9.9.0<s><span style="text-align:right;">9.9.9-P2,
9.9.3-S1</span></s>>9.9.9-S3, 9.10.0<s><span
style="text-align:right;">9.10.4-P2, 9.11.0a1</span></s>>9.11.0rc1
### Fixed In Version:
bind 9.9.9-P3, **bind 9.10.4-P3**
### Reference:
https://kb.isc.org/article/AA-01419/0
*(from redmine: issue id 6224, created on 2016-09-28, closed on 2016-10-25)*
* Relations:
* parent #6222
* Changesets:
* Revision 15e6fbb4db3b1b218d6d4d006166b5253a1e5b0a by Natanael Copa on 2016-09-28T09:24:35Z:
```
main/bind: security upgrade to 9.10.4_p3 (CVE-2016-2776)
fixes #6224
```3.4.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6225[3.3] bind: Assertion Failure in buffer.c While Building Responses to a Speci...2019-07-23T12:07:43ZAlicha CH[3.3] bind: Assertion Failure in buffer.c While Building Responses to a Specifically Constructed Request (CVE-2016-2776)A defect in the rendering of messages into packets can cause named to
exit with an assertion
failure in buffer.c while constructing a response to a query that meets
certain criteria.
This assertion can be triggered even if the apparen...A defect in the rendering of messages into packets can cause named to
exit with an assertion
failure in buffer.c while constructing a response to a query that meets
certain criteria.
This assertion can be triggered even if the apparent source address
isn’t allowed to make queries (i.e. doesn’t match ‘allow-query’).
### Affected versions:
9.0.x ->9.8.x, 9.9.0<s><span style="text-align:right;">9.9.9-P2,
9.9.3-S1</span></s>>9.9.9-S3, 9.10.0<s><span
style="text-align:right;">9.10.4-P2, 9.11.0a1</span></s>>9.11.0rc1
### Fixed In Version:
bind 9.9.9-P3, **bind 9.10.4-P3**
### Reference:
https://kb.isc.org/article/AA-01419/0
*(from redmine: issue id 6225, created on 2016-09-28, closed on 2016-10-25)*
* Relations:
* parent #6222
* Changesets:
* Revision 19c47827cc4fe347604ca5553ada4bafc341ebb2 on 2016-10-19T08:22:47Z:
```
main/bind: security upgrade to 9.10.4_p3 (CVE-2016-2776)
Fixes #6225
```3.3.4Natanael CopaNatanael Copa