alpine issueshttps://gitlab.alpinelinux.org/groups/alpine/-/issues2019-07-23T12:01:02Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6725Installing bind creates /etc/bind/.screenrc copied from /etc/skel/.screenrc i...2019-07-23T12:01:02ZDaniel LangeInstalling bind creates /etc/bind/.screenrc copied from /etc/skel/.screenrc if screen is installed1) apk install screen
(creates /etc/skel/.screenrc)
2) apk add bind
(creates
-rw-r—r— 1 named named 3729 Jan 24 13:13 .screenrc
which is should not because the named user should be a deamon user only)
Affected version: Alpine ...1) apk install screen
(creates /etc/skel/.screenrc)
2) apk add bind
(creates
-rw-r—r— 1 named named 3729 Jan 24 13:13 .screenrc
which is should not because the named user should be a deamon user only)
Affected version: Alpine Linux 3.5.0 (can’t select that in the “Affected
versions list” as that has not been updated to include 3.5.0 yet)
*(from redmine: issue id 6725, created on 2017-01-24, closed on 2017-01-25)*
* Changesets:
* Revision 1328c94d12a24632191f20e762f6ebad5059750b by Natanael Copa on 2017-01-24T16:51:35Z:
```
main/bind: dont create homedir for bind user
We dont want copy the content of /etc/skel to /etc/bind
ref #6725
```
* Revision 7e6395d6325ab6f5cbb022ab8892871eb54c506d by Natanael Copa on 2017-01-25T08:41:18Z:
```
main/bind: dont create homedir for bind user
We dont want copy the content of /etc/skel to /etc/bind
fixes #6725
(cherry picked from commit 1328c94d12a24632191f20e762f6ebad5059750b)
```3.5.1Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5191Pure EFI boot not possible because of missing options in current kernel config2019-07-23T12:01:01ZRabmurb KipPure EFI boot not possible because of missing options in current kernel configI had many hours of struggle with this problem some time ago - syslinux
begins to load the kernel and everything just freezes. Eventually I
found the solution, but because it was not that critical back then I
didn’t create an issue in th...I had many hours of struggle with this problem some time ago - syslinux
begins to load the kernel and everything just freezes. Eventually I
found the solution, but because it was not that critical back then I
didn’t create an issue in the bug tracker. Things changed with my new
hardware and now I have no other choice but to use EFI boot so I’m
posting my findings and will hope the changes can get into the
linux-grsec package.
After many kernel recompilations I found that in order for pure EFI boot
to work the frame buffer device support should be build into the kernel
(not as a module). It then unlocks another option - CONFIG\_FB\_EFI
(which of course depends on EFI support being enabled but that’s already
done in current Alpine config) - which should also be build-in. And
that’s it, nothing more, nothing less. I tested it on my two old laptops
and in Virtualbox.To sum it up:
CONFIG\_FB=m —>CONFIG\_FB=y
CONFIG\_FB\_EFI=y
I’m not sure if these changes in kernel config would affect grsecurity
patches (I strongly hope that they will not).
I can provide my test kernel configs but they are for 3.12.38 kernel.
You can take a look at current Arch Linux [kernel
config](https://projects.archlinux.org/svntogit/packages.git/tree/trunk/config.x86_64?h=packages/linux)
for the above mentioned options.
*(from redmine: issue id 5191, created on 2016-02-25, closed on 2016-12-22)*
* Relations:
* relates #5731
* Changesets:
* Revision 31b878cc93db1bea9acbe9a2d2bf7e2d9920273b by Timo Teräs on 2016-11-24T09:23:43Z:
```
main/linux-vanilla: enable rtsx pci and efifb
ref #5191
ref #6486
```
* Revision 40e4c4722e7ea0753bb48e8c4965a914a308e749 by Timo Teräs on 2016-11-24T09:23:43Z:
```
main/linux-grsec: enable rtsx pci and efifb
fixes #5191
fixes #6486
```3.5.0https://gitlab.alpinelinux.org/alpine/aports/-/issues/6728Screen: root exploit 4.5.02019-07-23T12:01:00ZAlicha CHScreen: root exploit 4.5.0Commit f86a374 (“screen.c: adding permissions check for the logfile
name”, 2015-11-04)
The check opens the logfile with full root privileges. This allows us
to
truncate any file or create a root-owned file with any contents in any
d...Commit f86a374 (“screen.c: adding permissions check for the logfile
name”, 2015-11-04)
The check opens the logfile with full root privileges. This allows us
to
truncate any file or create a root-owned file with any contents in any
directory and can be easily exploited to full root access in several
ways.
### Affects:
screen 4.4.0 to and inclusive 4.5.0
### References:
http://www.openwall.com/lists/oss-security/2017/01/24/10
http://savannah.gnu.org/bugs/?50142
*(from redmine: issue id 6728, created on 2017-01-25, closed on 2017-03-02)*
* Relations:
* child #6729
* child #6730Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6729[3.6] Screen: root exploit 4.5.02019-07-23T12:00:59ZAlicha CH[3.6] Screen: root exploit 4.5.0Commit f86a374 (“screen.c: adding permissions check for the logfile
name”, 2015-11-04)
The check opens the logfile with full root privileges. This allows us
to
truncate any file or create a root-owned file with any contents in any
d...Commit f86a374 (“screen.c: adding permissions check for the logfile
name”, 2015-11-04)
The check opens the logfile with full root privileges. This allows us
to
truncate any file or create a root-owned file with any contents in any
directory and can be easily exploited to full root access in several
ways.
### Affects:
screen 4.4.0 to and inclusive 4.5.0
### References:
http://www.openwall.com/lists/oss-security/2017/01/24/10
http://savannah.gnu.org/bugs/?50142
*(from redmine: issue id 6729, created on 2017-01-25, closed on 2017-03-02)*
* Relations:
* parent #6728
* Changesets:
* Revision e3f80aa7d62f566fe0fb96cf97273092c599f13b by Natanael Copa on 2017-03-01T17:57:12Z:
```
main/screen: security upgrade to 4.5.1 (CVE-2017-5618)
fixes #6729
```3.6.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6730[3.5] Screen: root exploit 4.5.0 (CVE-2017-5618)2019-07-23T12:00:58ZAlicha CH[3.5] Screen: root exploit 4.5.0 (CVE-2017-5618)Commit f86a374 (“screen.c: adding permissions check for the logfile
name”, 2015-11-04)
The check opens the logfile with full root privileges. This allows us
to
truncate any file or create a root-owned file with any contents in any
d...Commit f86a374 (“screen.c: adding permissions check for the logfile
name”, 2015-11-04)
The check opens the logfile with full root privileges. This allows us
to
truncate any file or create a root-owned file with any contents in any
directory and can be easily exploited to full root access in several
ways.
### Affects:
screen 4.4.0 to and inclusive 4.5.0
### References:
http://www.openwall.com/lists/oss-security/2017/01/24/10
http://savannah.gnu.org/bugs/?50142
*(from redmine: issue id 6730, created on 2017-01-25, closed on 2017-03-02)*
* Relations:
* parent #6728
* Changesets:
* Revision 62ff75ac828e5f41d65a7b1b4785771a46f6107d by Natanael Copa on 2017-03-01T17:56:01Z:
```
main/screen: security upgrade to 4.5.1 (CVE-2017-5618)
fixes #6730
```3.5.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6732tiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value (C...2019-07-23T12:00:57ZAlicha CHtiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value (CVE-2017-5225)LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzill...LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzilla.maptools.org/show\_bug.cgi?id=2657
### Patch:
https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7
*(from redmine: issue id 6732, created on 2017-01-25, closed on 2017-01-28)*
* Relations:
* child #6733
* child #6734
* child #6735
* child #6736
* child #6737https://gitlab.alpinelinux.org/alpine/aports/-/issues/6733[3.6] tiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample va...2019-07-23T12:00:56ZAlicha CH[3.6] tiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value (CVE-2017-5225)LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzill...LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzilla.maptools.org/show\_bug.cgi?id=2657
### Patch:
https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7
*(from redmine: issue id 6733, created on 2017-01-25, closed on 2017-01-28)*
* Relations:
* parent #6732
* Changesets:
* Revision ab83f5e1f89d6fcb2eb66283aaf1cdf7c3610c82 by Sergei Lukin on 2017-01-26T15:57:48Z:
```
main/tiff: security fixes #6733
CVE-2017-5225
```3.6.0https://gitlab.alpinelinux.org/alpine/aports/-/issues/6734[3.5] tiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample va...2019-07-23T12:00:55ZAlicha CH[3.5] tiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value (CVE-2017-5225)LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzill...LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzilla.maptools.org/show\_bug.cgi?id=2657
### Patch:
https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7
*(from redmine: issue id 6734, created on 2017-01-25, closed on 2017-01-28)*
* Relations:
* parent #6732
* Changesets:
* Revision 11139bb70638967120dbd2ef70935b0fbb96052e by Sergei Lukin on 2017-01-26T13:27:59Z:
```
main/tiff: security fixes #6734
CVE-2017-5225: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
```3.5.1https://gitlab.alpinelinux.org/alpine/aports/-/issues/6735[3.4] tiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample va...2019-07-23T12:00:54ZAlicha CH[3.4] tiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value (CVE-2017-5225)LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzill...LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzilla.maptools.org/show\_bug.cgi?id=2657
### Patch:
https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7
*(from redmine: issue id 6735, created on 2017-01-25, closed on 2017-01-28)*
* Relations:
* parent #6732
* Changesets:
* Revision b25bdff84bd42e9c012c562afe3a312e433a3420 by Sergei Lukin on 2017-01-27T13:37:43Z:
```
main/tiff: security fixes #6735
CVE-2017-5225: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
```3.4.7https://gitlab.alpinelinux.org/alpine/aports/-/issues/6736[3.3] tiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample va...2019-07-23T12:00:53ZAlicha CH[3.3] tiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value (CVE-2017-5225)LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzill...LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzilla.maptools.org/show\_bug.cgi?id=2657
### Patch:
https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7
*(from redmine: issue id 6736, created on 2017-01-25, closed on 2017-01-28)*
* Relations:
* parent #6732
* Changesets:
* Revision 66709766026c437c20e5b34a781839f7c24494b6 by Sergei Lukin on 2017-01-27T13:38:59Z:
```
main/tiff: security fixes #6736
CVE-2017-5225: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
```3.3.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/6737[3.2] tiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample va...2019-07-23T12:00:52ZAlicha CH[3.2] tiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value (CVE-2017-5225)LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzill...LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
tools/tiffcp resulting in DoS or code execution via a crafted
BitsPerSample value.
### References:
http://bugzilla.maptools.org/show\_bug.cgi?id=2656
http://bugzilla.maptools.org/show\_bug.cgi?id=2657
### Patch:
https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7
*(from redmine: issue id 6737, created on 2017-01-25, closed on 2017-01-28)*
* Relations:
* parent #6732
* Changesets:
* Revision 5bb012e37bf60bec80128ff50650ad4353f24e18 by Sergei Lukin on 2017-01-27T13:42:04Z:
```
main/tiff: security fixes #6737
CVE-2017-5225: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
```3.2.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/6738libgit2: Multiple vulnerabilities (CVE-2016-10128, CVE-2016-10129, CVE-2016-1...2019-07-23T12:00:51ZAlicha CHlibgit2: Multiple vulnerabilities (CVE-2016-10128, CVE-2016-10129, CVE-2016-10130)CVE-2016-10128: smart\_pkt: verify packet length exceeds PKT\_LEN\_SIZE
-----------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/...CVE-2016-10128: smart\_pkt: verify packet length exceeds PKT\_LEN\_SIZE
-----------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2
CVE-2016-10129: smart\_pkt: treat empty packet lines as error
-------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
CVE-2016-10130: http: check certificate validity before clobbering the error variable
-------------------------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
*(from redmine: issue id 6738, created on 2017-01-25, closed on 2017-01-28)*
* Relations:
* child #6739
* child #6740
* child #6741Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6739[3.6] libgit2: Multiple vulnerabilities (CVE-2016-10128, CVE-2016-10129, CVE-...2019-07-23T12:00:50ZAlicha CH[3.6] libgit2: Multiple vulnerabilities (CVE-2016-10128, CVE-2016-10129, CVE-2016-10130)CVE-2016-10128: smart\_pkt: verify packet length exceeds PKT\_LEN\_SIZE
-----------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/...CVE-2016-10128: smart\_pkt: verify packet length exceeds PKT\_LEN\_SIZE
-----------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2
CVE-2016-10129: smart\_pkt: treat empty packet lines as error
-------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
CVE-2016-10130: http: check certificate validity before clobbering the error variable
-------------------------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
*(from redmine: issue id 6739, created on 2017-01-25, closed on 2017-01-28)*
* Relations:
* parent #6738
* Changesets:
* Revision 8a9c19caf7beab76554fea239c4ba9a2d2ec95de by Sergei Lukin on 2017-01-26T15:56:07Z:
```
main/libgit2: security upgrade to 0.25.1 - fixes #6739
CVE-2016-10128: smart_pkt: verify packet length exceeds PKT_LEN_SIZE
CVE-2016-10129: smart_pkt: treat empty packet lines as error
CVE-2016-10130: http: check certificate validity before clobbering the error variable
```3.6.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6740[3.5] libgit2: Multiple vulnerabilities (CVE-2016-10128, CVE-2016-10129, CVE-...2019-07-23T12:00:49ZAlicha CH[3.5] libgit2: Multiple vulnerabilities (CVE-2016-10128, CVE-2016-10129, CVE-2016-10130)CVE-2016-10128: smart\_pkt: verify packet length exceeds PKT\_LEN\_SIZE
-----------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/...CVE-2016-10128: smart\_pkt: verify packet length exceeds PKT\_LEN\_SIZE
-----------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2
CVE-2016-10129: smart\_pkt: treat empty packet lines as error
-------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
CVE-2016-10130: http: check certificate validity before clobbering the error variable
-------------------------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
*(from redmine: issue id 6740, created on 2017-01-25, closed on 2017-01-28)*
* Relations:
* parent #6738
* Changesets:
* Revision 322e4dec713220f3d26b24753df9fdb5d389928e by Sergei Lukin on 2017-01-26T13:27:59Z:
```
main/libgit2: security upgrade to 0.24.6 - fixes #6740
CVE-2016-10128: smart_pkt: verify packet length exceeds PKT_LEN_SIZE
CVE-2016-10129: smart_pkt: treat empty packet lines as error
CVE-2016-10130: http: check certificate validity before clobbering the error variable
```3.5.1Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6741[3.4] libgit2: Multiple vulnerabilities (CVE-2016-10128, CVE-2016-10129, CVE-...2019-07-23T12:00:48ZAlicha CH[3.4] libgit2: Multiple vulnerabilities (CVE-2016-10128, CVE-2016-10129, CVE-2016-10130)CVE-2016-10128: smart\_pkt: verify packet length exceeds PKT\_LEN\_SIZE
-----------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/...CVE-2016-10128: smart\_pkt: verify packet length exceeds PKT\_LEN\_SIZE
-----------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2
CVE-2016-10129: smart\_pkt: treat empty packet lines as error
-------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
CVE-2016-10130: http: check certificate validity before clobbering the error variable
-------------------------------------------------------------------------------------
### Fixed In Version:
libgit2 0.25.1, libgit2 0.24.6
### References:
http://seclists.org/oss-sec/2017/q1/59
https://github.com/libgit2/libgit2/releases/tag/v0.24.6
### Patch:
https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
*(from redmine: issue id 6741, created on 2017-01-25, closed on 2017-01-28)*
* Relations:
* parent #6738
* Changesets:
* Revision 60e6b42c26c116a5810745d0da6792f3f8fe1d5f by Sergei Lukin on 2017-01-27T13:42:43Z:
```
main/libgit2: security upgrade to 0.24.6 - fixes #6741
CVE-2016-10128: smart_pkt: verify packet length exceeds PKT_LEN_SIZE
CVE-2016-10129: smart_pkt: treat empty packet lines as error
CVE-2016-10130: http: check certificate validity before clobbering the error variable
```3.4.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6742adduser produces garbage /etc/passwd2019-07-23T12:00:47ZDennis Schriddeadduser produces garbage /etc/passwdRunning \`adduser\` in the official Alpine Linux 3.5 Docker container
results in a garbage \`/etc/passwd\` file:
\`\`\`
$ docker run -ti alpine:3.5 /bin/sh
/ \# addgroup -g 1000 xgroup
/ \# adduser -u 1012 -G xgroup -h /home/user...Running \`adduser\` in the official Alpine Linux 3.5 Docker container
results in a garbage \`/etc/passwd\` file:
\`\`\`
$ docker run -ti alpine:3.5 /bin/sh
/ \# addgroup -g 1000 xgroup
/ \# adduser -u 1012 -G xgroup -h /home/user -D xuser
/ \# grep xuser /etc/passwd
xuser:x:1012:1000:Linux User,,,:/home/user:,,,:/home/
/ \# grep another /etc/passwd
another-user:x:1013:1000:Linux User,,,:/home/another:/sbin/halt
\`\`\`
Note the shell part having the value \`,,,:/home/\`, and \`/sbin/halt\`
in the second example, instead of a sensible default.
*(from redmine: issue id 6742, created on 2017-01-25, closed on 2019-02-25)*
* Relations:
* duplicates #5083
* Changesets:
* Revision 4a3258e65e2f2e79256cc2736ebaf5480dd69b58 on 2019-01-12T11:44:45Z:
```
main/busybox: fix creation of invalid shell entry by adduser
Fixes #5083
Fixes #6742
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/6743Package request: xxhash2019-07-23T12:00:46ZDennis SchriddePackage request: xxhashIt would be great if Alpine Linux would provide a package for the xxhash
library: https://github.com/Cyan4973/xxHash
This is required for the py-xxhash Python bindings (not yet in Alpine),
which in turn are required by xpra (in Alpine) ...It would be great if Alpine Linux would provide a package for the xxhash
library: https://github.com/Cyan4973/xxHash
This is required for the py-xxhash Python bindings (not yet in Alpine),
which in turn are required by xpra (in Alpine) to enable optional
features at runtime.
*(from redmine: issue id 6743, created on 2017-01-25, closed on 2017-05-22)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/5083adduser mangles /etc/passwd entry if shell argument not given2019-07-23T12:00:45ZPhillip Jaenkeadduser mangles /etc/passwd entry if shell argument not givenFound in alpine 3.3.1 (gliderlabs/alpine for Docker) with confirmed
reproduction on hardware (VM).
https://github.com/gliderlabs/docker-alpine/issues/141
There is an upstream bug in BusyBox 8586 but it is indicated this should
already ...Found in alpine 3.3.1 (gliderlabs/alpine for Docker) with confirmed
reproduction on hardware (VM).
https://github.com/gliderlabs/docker-alpine/issues/141
There is an upstream bug in BusyBox 8586 but it is indicated this should
already have been fixed in 1.24.1.
https://bugs.busybox.net/show\_bug.cgi?id=8586
# adduser -h /home/lxcmedia -g "lxc-media user" -u 1024 -G 100 -D lxcmedia
# grep lxc-media /etc/passwd
lxcmedia:x:1024:100:lxc-media user:/home/lxcmedia:obody
# adduser -h /home/bugtest -g "bugtest user" -u 2048 -G 100 -D -s /bin/sh bugtest
# grep bugtest /etc/passwd
bugtest:x:2048:100:bugtest user:/home/bugtest:/bin/sh
*(from redmine: issue id 5083, created on 2016-02-07, closed on 2019-03-05)*
* Relations:
* duplicates #6742
* Changesets:
* Revision 4a3258e65e2f2e79256cc2736ebaf5480dd69b58 on 2019-01-12T11:44:45Z:
```
main/busybox: fix creation of invalid shell entry by adduser
Fixes #5083
Fixes #6742
```3.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/6744Package request: py-xxhash2019-07-23T12:00:44ZDennis SchriddePackage request: py-xxhashIt would be great if Alpine Linux would provide a package for the Python
bindings for xxhash: https://pypi.python.org/pypi/xxhash
This is required to enable certain features in xpra (available in
Alpine):
Warning: xxhash python bin...It would be great if Alpine Linux would provide a package for the Python
bindings for xxhash: https://pypi.python.org/pypi/xxhash
This is required to enable certain features in xpra (available in
Alpine):
Warning: xxhash python bindings not found
no scrolling detection
This package would require another package that is not yet in Alpine:
xxhash (bug \#6743)
*(from redmine: issue id 6744, created on 2017-01-25, closed on 2017-05-22)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/6745firefox-esr: Security vulnerabilities (CVE-2017-5373, CVE-2017-5375, CVE-2017...2019-07-23T12:00:43ZAlicha CHfirefox-esr: Security vulnerabilities (CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380, CVE-2017-5383, CVE-2017-5386, CVE-2017-5390, CVE-2017-5396)**CVE-2017-5373:** Memory safety bugs fixed in Firefox 51 and Firefox
ESR 45.7
**CVE-2017-5375:** Excessive JIT code allocation allows bypass of ASLR
and DEP
**CVE-2017-5376:** Use-after-free in XSL
**CVE-2017-5378:** Pointer and f...**CVE-2017-5373:** Memory safety bugs fixed in Firefox 51 and Firefox
ESR 45.7
**CVE-2017-5375:** Excessive JIT code allocation allows bypass of ASLR
and DEP
**CVE-2017-5376:** Use-after-free in XSL
**CVE-2017-5378:** Pointer and frame data leakage of Javascript
objects
**CVE-2017-5380:** Potential use-after-free during DOM manipulations
**CVE-2017-5383:** Location bar spoofing with unicode characters
**CVE-2017-5386:** WebExtensions can use data: protocol to affect other
extensions
**CVE-2017-5390:** Insecure communication methods in Developer Tools
JSON viewer
**CVE-2017-5396:** Use-after-free with Media Decoder
### Fixed in:
Firefox ESR 45.7
### Reference:
https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
*(from redmine: issue id 6745, created on 2017-01-26, closed on 2017-01-28)*
* Relations:
* child #6746
* child #6747Natanael CopaNatanael Copa