alpine issueshttps://gitlab.alpinelinux.org/groups/alpine/-/issues2019-07-23T13:41:26Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5063[3.0] privoxy: security issues (CVE-2016-1982, CVE-2016-1983)2019-07-23T13:41:26ZAlicha CH[3.0] privoxy: security issues (CVE-2016-1982, CVE-2016-1983)**CVE-2016-1982:** invalid reads in case of corrupt chunk-encoded
content
**CVE-2016-1983:** invalid read via empty host header in client request
### Fixed In Version:
privoxy 3.0.24
### References:
http://seclists.org/oss-sec/2016/...**CVE-2016-1982:** invalid reads in case of corrupt chunk-encoded
content
**CVE-2016-1983:** invalid read via empty host header in client request
### Fixed In Version:
privoxy 3.0.24
### References:
http://seclists.org/oss-sec/2016/q1/179
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-1982
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-1983
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/filters.c?r1=1.196&r2=1.197
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/parsers.c?r1=1.302&r2=1.303
*(from redmine: issue id 5063, created on 2016-02-02, closed on 2016-02-09)*
* Relations:
* parent #5059
* Changesets:
* Revision e3d466c9126c00d896faf5f620b4c3fe3579eda3 on 2016-02-09T09:26:40Z:
```
main/privoxy: security upgrade to 3.0.24 (CVE-2016-1982,CVE-2016-1983). Fixes #5063
(cherry picked from commit 3abe44615ddc514b7298119cef64498d06be639f)
```3.0.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5062[3.1] privoxy: security issues (CVE-2016-1982, CVE-2016-1983)2019-07-23T13:41:27ZAlicha CH[3.1] privoxy: security issues (CVE-2016-1982, CVE-2016-1983)**CVE-2016-1982:** invalid reads in case of corrupt chunk-encoded
content
**CVE-2016-1983:** invalid read via empty host header in client request
### Fixed In Version:
privoxy 3.0.24
### References:
http://seclists.org/oss-sec/2016/...**CVE-2016-1982:** invalid reads in case of corrupt chunk-encoded
content
**CVE-2016-1983:** invalid read via empty host header in client request
### Fixed In Version:
privoxy 3.0.24
### References:
http://seclists.org/oss-sec/2016/q1/179
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-1982
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-1983
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/filters.c?r1=1.196&r2=1.197
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/parsers.c?r1=1.302&r2=1.303
*(from redmine: issue id 5062, created on 2016-02-02, closed on 2016-02-09)*
* Relations:
* parent #5059
* Changesets:
* Revision 3abe44615ddc514b7298119cef64498d06be639f on 2016-02-09T09:24:04Z:
```
main/privoxy: security upgrade to 3.0.24 (CVE-2016-1982,CVE-2016-1983). Fixes #5062
(cherry picked from commit 51e24c0cf8b4c51e2a63b60ed33ad38c7c5632d2)
```3.1.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5061[3.2] privoxy: security issues (CVE-2016-1982, CVE-2016-1983)2019-07-23T13:41:28ZAlicha CH[3.2] privoxy: security issues (CVE-2016-1982, CVE-2016-1983)**CVE-2016-1982:** invalid reads in case of corrupt chunk-encoded
content
**CVE-2016-1983:** invalid read via empty host header in client request
### Fixed In Version:
privoxy 3.0.24
### References:
http://seclists.org/oss-sec/2016/...**CVE-2016-1982:** invalid reads in case of corrupt chunk-encoded
content
**CVE-2016-1983:** invalid read via empty host header in client request
### Fixed In Version:
privoxy 3.0.24
### References:
http://seclists.org/oss-sec/2016/q1/179
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-1982
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-1983
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/filters.c?r1=1.196&r2=1.197
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/parsers.c?r1=1.302&r2=1.303
*(from redmine: issue id 5061, created on 2016-02-02, closed on 2016-02-09)*
* Relations:
* parent #5059
* Changesets:
* Revision 619c55d0036ba9caf1ec466e73feab2418c1339c on 2016-02-09T09:19:55Z:
```
main/privoxy: security upgrade to 3.0.24 (CVE-2016-1982,CVE-2016-1983). Fixes #5061
(cherry picked from commit 51e24c0cf8b4c51e2a63b60ed33ad38c7c5632d2)
```3.2.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5060[3.3] privoxy: security issues (CVE-2016-1982, CVE-2016-1983)2019-07-23T13:41:29ZAlicha CH[3.3] privoxy: security issues (CVE-2016-1982, CVE-2016-1983)**CVE-2016-1982:** invalid reads in case of corrupt chunk-encoded
content
**CVE-2016-1983:** invalid read via empty host header in client request
### Fixed In Version:
privoxy 3.0.24
### References:
http://seclists.org/oss-sec/2016/...**CVE-2016-1982:** invalid reads in case of corrupt chunk-encoded
content
**CVE-2016-1983:** invalid read via empty host header in client request
### Fixed In Version:
privoxy 3.0.24
### References:
http://seclists.org/oss-sec/2016/q1/179
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-1982
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-1983
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/filters.c?r1=1.196&r2=1.197
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/parsers.c?r1=1.302&r2=1.303
*(from redmine: issue id 5060, created on 2016-02-02, closed on 2016-02-09)*
* Relations:
* parent #5059
* Changesets:
* Revision 51e24c0cf8b4c51e2a63b60ed33ad38c7c5632d2 on 2016-02-09T09:18:38Z:
```
main/privoxy: security upgrade to 3.0.24 (CVE-2016-1982,CVE-2016-1983). Fixes #5060
```3.3.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5059privoxy: security issues (CVE-2016-1982, CVE-2016-1983)2019-07-23T13:41:30ZAlicha CHprivoxy: security issues (CVE-2016-1982, CVE-2016-1983)**CVE-2016-1982:** invalid reads in case of corrupt chunk-encoded
content
**CVE-2016-1983:** invalid read via empty host header in client request
### Fixed In Version:
privoxy 3.0.24
### References:
http://seclists.org/oss-sec/2016/...**CVE-2016-1982:** invalid reads in case of corrupt chunk-encoded
content
**CVE-2016-1983:** invalid read via empty host header in client request
### Fixed In Version:
privoxy 3.0.24
### References:
http://seclists.org/oss-sec/2016/q1/179
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-1982
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2016-1983
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/filters.c?r1=1.196&r2=1.197
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/parsers.c?r1=1.302&r2=1.303
*(from redmine: issue id 5059, created on 2016-02-02, closed on 2016-02-09)*
* Relations:
* child #5060
* child #5061
* child #5062
* child #5063Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5058Redundant /usr path in freerdp-plugins2019-07-23T13:41:32ZFrancesco ColistaRedundant /usr path in freerdp-pluginsShared drive with freerdp does not work because of wrong path of
libdrive-client library path:
\[11:35:41:859\] \[21783:<s>1769063760\]
\[ERROR\]\[com.winpr.library\]</s> LoadLibraryA: Error loading shared
library /usr/usr/lib/freerdp/l...Shared drive with freerdp does not work because of wrong path of
libdrive-client library path:
\[11:35:41:859\] \[21783:<s>1769063760\]
\[ERROR\]\[com.winpr.library\]</s> LoadLibraryA: Error loading shared
library /usr/usr/lib/freerdp/libdrive-client.so: No such file or
directory
There’s a redundant /usr path.
This happens in edge x86\_64, i’ve not tried in edge x86.
Francesco
*(from redmine: issue id 5058, created on 2016-02-02, closed on 2017-05-19)*
* Changesets:
* Revision de8787d1afd2603b3ef0d0209f9c2433790e0407 on 2016-07-13T14:17:21Z:
```
main/freerdp: changed lib dir path. Fixes #5058
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/5057ScyllaDb package for Alpine Linux2020-01-18T21:16:12ZAraaX ShamsScyllaDb package for Alpine LinuxHello
Already i tried to build the project but its need dependencies like
libasan libubsan that also find only in fedora apps
and ofcourse building from source is not clean for server .
http://www.scylladb.com/
NoSQL data store us...Hello
Already i tried to build the project but its need dependencies like
libasan libubsan that also find only in fedora apps
and ofcourse building from source is not clean for server .
http://www.scylladb.com/
NoSQL data store using the seastar framework, compatible with Apache
Cassandra
*(from redmine: issue id 5057, created on 2016-02-02)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/5054Package upgrade: lxappearance2019-07-14T18:33:52ZRabmurb KipPackage upgrade: lxappearanceAlpine version:
[0.5.5](https://pkgs.alpinelinux.org/package/testing/x86_64/lxappearance)
Latest version:
[0.6.1](http://sourceforge.net/projects/lxde/files/LXAppearance/lxappearance-0.6.1.tar.xz/download)
*(from redmine: issue id 50...Alpine version:
[0.5.5](https://pkgs.alpinelinux.org/package/testing/x86_64/lxappearance)
Latest version:
[0.6.1](http://sourceforge.net/projects/lxde/files/LXAppearance/lxappearance-0.6.1.tar.xz/download)
*(from redmine: issue id 5054, created on 2016-01-29)*Bartłomiej PiotrowskiBartłomiej Piotrowskihttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5053[3.2] nginx: Mutiples vulnerabilities (CVE-2016-0742, CVE-2016-0746, CVE-201...2019-07-23T13:41:32ZAlicha CH[3.2] nginx: Mutiples vulnerabilities (CVE-2016-0742, CVE-2016-0746, CVE-2016-0747)**CVE-2016-0742:** Invalid pointer dereference in resolver
**CVE-2016-0746:** Use-after-free during CNAME response processing in
resolver
**CVE-2016-0747:** Insufficient limits of CNAME resolution in resolver
Vulnerable: 0.6.18-1.9.9
...**CVE-2016-0742:** Invalid pointer dereference in resolver
**CVE-2016-0746:** Use-after-free during CNAME response processing in
resolver
**CVE-2016-0747:** Insufficient limits of CNAME resolution in resolver
Vulnerable: 0.6.18-1.9.9
The problems are fixed in **nginx 1.9.10, 1.8.1**.
### References:
http://nginx.org/en/security\_advisories.html
*(from redmine: issue id 5053, created on 2016-01-27, closed on 2016-02-08)*
* Relations:
* parent #5051
* Changesets:
* Revision 31f2751e7d23e6b0027996e33522fb02e794a7cf by Natanael Copa on 2016-02-08T19:36:20Z:
```
main/nginx: security upgrade to 1.8.1
CVE-2016-0742
CVE-2016-0746
CVE-2016-0747
fixes #5053
```3.2.4https://gitlab.alpinelinux.org/alpine/aports/-/issues/5052[3.3] nginx: Mutiples vulnerabilities (CVE-2016-0742, CVE-2016-0746, CVE-201...2019-07-23T13:41:33ZAlicha CH[3.3] nginx: Mutiples vulnerabilities (CVE-2016-0742, CVE-2016-0746, CVE-2016-0747)**CVE-2016-0742:** Invalid pointer dereference in resolver
**CVE-2016-0746:** Use-after-free during CNAME response processing in
resolver
**CVE-2016-0747:** Insufficient limits of CNAME resolution in resolver
Vulnerable: 0.6.18-1.9.9
...**CVE-2016-0742:** Invalid pointer dereference in resolver
**CVE-2016-0746:** Use-after-free during CNAME response processing in
resolver
**CVE-2016-0747:** Insufficient limits of CNAME resolution in resolver
Vulnerable: 0.6.18-1.9.9
The problems are fixed in **nginx 1.9.10, 1.8.1**.
### References:
http://nginx.org/en/security\_advisories.html
*(from redmine: issue id 5052, created on 2016-01-27, closed on 2016-02-08)*
* Relations:
* parent #5051
* Changesets:
* Revision 372b38ff6d224156d67ef419b0f4e28a8ae538f6 by Natanael Copa on 2016-02-08T19:32:43Z:
```
main/nginx: security upgrade to 1.8.1
CVE-2016-0742
CVE-2016-0746
CVE-2016-0747
fixes #5052
```3.3.2https://gitlab.alpinelinux.org/alpine/aports/-/issues/5051nginx: Mutiples vulnerabilities (CVE-2016-0742, CVE-2016-0746, CVE-2016-0747)2019-07-23T13:41:34ZAlicha CHnginx: Mutiples vulnerabilities (CVE-2016-0742, CVE-2016-0746, CVE-2016-0747)**CVE-2016-0742:** Invalid pointer dereference in resolver
**CVE-2016-0746:** Use-after-free during CNAME response processing in
resolver
**CVE-2016-0747:** Insufficient limits of CNAME resolution in resolver
Vulnerable: 0.6.18-1.9.9
...**CVE-2016-0742:** Invalid pointer dereference in resolver
**CVE-2016-0746:** Use-after-free during CNAME response processing in
resolver
**CVE-2016-0747:** Insufficient limits of CNAME resolution in resolver
Vulnerable: 0.6.18-1.9.9
The problems are fixed in **nginx 1.9.10, 1.8.1**.
### References:
http://nginx.org/en/security\_advisories.html
*(from redmine: issue id 5051, created on 2016-01-27, closed on 2016-02-08)*
* Relations:
* child #5052
* child #5053https://gitlab.alpinelinux.org/alpine/aports/-/issues/5050Unable to finish boot with serial console2019-07-23T13:41:35ZalgitbotUnable to finish boot with serial consoleWhen trying to get working serial console the “init” always hung after
installing apks.
Appended “console=ttyS0,115200” as a kernel parameter to syslinux.cfg.
Enabled debug\_init to find out what’s wrong with the boot script and
found ...When trying to get working serial console the “init” always hung after
installing apks.
Appended “console=ttyS0,115200” as a kernel parameter to syslinux.cfg.
Enabled debug\_init to find out what’s wrong with the boot script and
found a bug in the “init”.
There is a procedure “setup\_inittab\_console()” that is intended to
configure Alpine for serial console.
A last thing it try to do is to add “ttyS0” (in my case) to
/etc/securetty, but it failed due to a bug in grep statement.
The original line was like this:
line 145: if \[ -e “$sysroot”/etc/securetty \] && ! grep -q -w “$tty”;
then
I’ve changed the line to:
line 145: if \[ -e “$sysroot”/etc/securetty \] && ! grep -q -w “$tty”
“$sysroot”/etc/securetty; then
compressed into new initramfs and since that time it works like a charm.
*(from redmine: issue id 5050, created on 2016-01-26, closed on 2016-06-06)*Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5049numpy numeric tests fails2019-12-05T05:39:21ZDmitry Odzerikhonumpy numeric tests failsHi,
Some of numpy tests fails on AlpineLinux 3.3.0 (I haven’t tested it on
other versions). The complete log is attached.
Some of tests (related to the inexact calculations) can be fixed simply
by disabling trigonometric functions from...Hi,
Some of numpy tests fails on AlpineLinux 3.3.0 (I haven’t tested it on
other versions). The complete log is attached.
Some of tests (related to the inexact calculations) can be fixed simply
by disabling trigonometric functions from musl math library, but it
doesn’t help to avoid all the failures.
Python: 2.7
Numpy: py-numpy@testing
*(from redmine: issue id 5049, created on 2016-01-26)*
* Uploads:
* [log.txt](/uploads/7435aebd211f61942f0f694c2db22e03/log.txt)https://gitlab.alpinelinux.org/alpine/aports/-/issues/5048[3.2] mariadb: Multiple security vulnerabilities (various CVEs)2019-07-23T13:41:36ZAlicha CH[3.2] mariadb: Multiple security vulnerabilities (various CVEs)CVE-2016-2047: MariaDB 5.5.47
CVE-2016-0616: MariaDB 5.5.47
CVE-2016-0609: MariaDB 5.5.47
CVE-2016-0608: MariaDB 5.5.47
CVE-2016-0606: MariaDB 5.5.47
CVE-2016-0600: MariaDB 5.5.47
CVE-2016-0598: MariaDB 5.5.47
CVE-2016-0597...CVE-2016-2047: MariaDB 5.5.47
CVE-2016-0616: MariaDB 5.5.47
CVE-2016-0609: MariaDB 5.5.47
CVE-2016-0608: MariaDB 5.5.47
CVE-2016-0606: MariaDB 5.5.47
CVE-2016-0600: MariaDB 5.5.47
CVE-2016-0598: MariaDB 5.5.47
CVE-2016-0597: MariaDB 5.5.47
CVE-2016-0596: MariaDB 5.5.47
CVE-2016-0546: MariaDB 5.5.47
CVE-2016-0505: MariaDB 5.5.47
CVE-2015-7744: MariaDB 5.5.46
### References:
https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
*(from redmine: issue id 5048, created on 2016-01-26, closed on 2016-02-09)*
* Relations:
* parent #5045
* Changesets:
* Revision 98e9c74b533fb7e705e680579fde57df7be90a86 on 2016-02-09T09:14:48Z:
```
main/mariadb: security upgrade to 5.5.47. Fixes #5048 (Multiple CVEs)
CVE-2016-0546
CVE-2016-0505
CVE-2016-0596
CVE-2016-0597
CVE-2016-0616
CVE-2016-0598
CVE-2016-0600
CVE-2016-0606
CVE-2016-0608
CVE-2016-0609
CVE-2016-2047: MDEV-9212
```3.2.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5047[3.3] mariadb: Multiple security vulnerabilities (various CVEs)2019-07-23T13:41:37ZAlicha CH[3.3] mariadb: Multiple security vulnerabilities (various CVEs)CVE-2016-2047: MariaDB 10.1.10
CVE-2016-0616: MariaDB 10.1.10
CVE-2016-0610: MariaDB 10.1.9
CVE-2016-0609: MariaDB 10.1.10
CVE-2016-0608: MariaDB 10.1.10
CVE-2016-0606: MariaDB 10.1.10
CVE-2016-0600: MariaDB 10.1.10
CVE-201...CVE-2016-2047: MariaDB 10.1.10
CVE-2016-0616: MariaDB 10.1.10
CVE-2016-0610: MariaDB 10.1.9
CVE-2016-0609: MariaDB 10.1.10
CVE-2016-0608: MariaDB 10.1.10
CVE-2016-0606: MariaDB 10.1.10
CVE-2016-0600: MariaDB 10.1.10
CVE-2016-0598: MariaDB 10.1.10
CVE-2016-0597: MariaDB 10.1.10
CVE-2016-0596: MariaDB 10.1.10
CVE-2016-0546: MariaDB 10.1.10
CVE-2016-0505: MariaDB 10.1.10
CVE-2015-7744: MariaDB 10.1.9
### References:
https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
*(from redmine: issue id 5047, created on 2016-01-26, closed on 2016-02-09)*
* Relations:
* parent #5045
* Changesets:
* Revision f33b0f2cc2ecd60d683e8b5914fb67f38ade23b2 on 2016-02-09T09:02:15Z:
```
main/mariadb: security upgrade to 10.1.11. Fixes #5047 (Multiple CVEs)
CVE-2016-0546
CVE-2016-0505
CVE-2016-0596
CVE-2016-0597
CVE-2016-0616
CVE-2016-0598
CVE-2016-0600
CVE-2016-0606
CVE-2016-0608
CVE-2016-0609
CVE-2016-2047: MDEV-9212
Signed-off-by: Leonardo Arena <rnalrd@alpinelinux.org>
(cherry picked from commit 3d14ab3088a6be734caa7e423b16c7b816726b9b)
```3.3.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5046[3.4] mariadb: Multiple security vulnerabilities (various CVEs)2019-07-23T13:41:38ZAlicha CH[3.4] mariadb: Multiple security vulnerabilities (various CVEs)CVE-2016-2047: MariaDB 10.1.10
CVE-2016-0616: MariaDB 10.1.10
CVE-2016-0610: MariaDB 10.1.9
CVE-2016-0609: MariaDB 10.1.10
CVE-2016-0608: MariaDB 10.1.10
CVE-2016-0606: MariaDB 10.1.10
CVE-2016-0600: MariaDB 10.1.10
CVE-201...CVE-2016-2047: MariaDB 10.1.10
CVE-2016-0616: MariaDB 10.1.10
CVE-2016-0610: MariaDB 10.1.9
CVE-2016-0609: MariaDB 10.1.10
CVE-2016-0608: MariaDB 10.1.10
CVE-2016-0606: MariaDB 10.1.10
CVE-2016-0600: MariaDB 10.1.10
CVE-2016-0598: MariaDB 10.1.10
CVE-2016-0597: MariaDB 10.1.10
CVE-2016-0596: MariaDB 10.1.10
CVE-2016-0546: MariaDB 10.1.10
CVE-2016-0505: MariaDB 10.1.10
CVE-2015-7744: MariaDB 10.1.9
### References:
https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
*(from redmine: issue id 5046, created on 2016-01-26, closed on 2016-02-09)*
* Relations:
* parent #5045
* Changesets:
* Revision 3d14ab3088a6be734caa7e423b16c7b816726b9b on 2016-02-09T08:49:26Z:
```
main/mariadb: security upgrade to 10.1.11. Fixes #5046 (Multiple CVEs)
CVE-2016-0546
CVE-2016-0505
CVE-2016-0596
CVE-2016-0597
CVE-2016-0616
CVE-2016-0598
CVE-2016-0600
CVE-2016-0606
CVE-2016-0608
CVE-2016-0609
CVE-2016-2047: MDEV-9212
Signed-off-by: Leonardo Arena <rnalrd@alpinelinux.org>
```3.4.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5045mariadb: Multiple security vulnerabilities (various CVEs)2019-07-23T13:41:39ZAlicha CHmariadb: Multiple security vulnerabilities (various CVEs)CVE-2016-2047: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0616: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0610: MariaDB 10.1.9
CVE-2016-0609: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0608: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-...CVE-2016-2047: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0616: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0610: MariaDB 10.1.9
CVE-2016-0609: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0608: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0606: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0600: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0598: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0597: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0596: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0546: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2016-0505: MariaDB 5.5.47, MariaDB 10.1.10
CVE-2015-7744: MariaDB 5.5.46, MariaDB 10.1.9
### References:
https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
*(from redmine: issue id 5045, created on 2016-01-26, closed on 2016-02-09)*
* Relations:
* child #5046
* child #5047
* child #5048Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5044[3.0] samba: Several vulnerabilities (CVE-2015-3223, CVE-2015-5252, CVE-2015-...2019-07-12T15:05:23ZAlicha CH[3.0] samba: Several vulnerabilities (CVE-2015-3223, CVE-2015-5252, CVE-2015-5296, CVE-2015-5299, CVE-2015-5330, CVE-2015-7540, CVE-2015-8467)### CVE-2015-3223: libldb: Remote DoS in Samba (AD) LDAP server
All versions of Samba from 4.0.0 to 4.3.2 inclusive are vulnerable to a
denial of service attack in the samba daemon LDAP server.
Fixed In Version:
ldb 1.1.24
### CVE-20...### CVE-2015-3223: libldb: Remote DoS in Samba (AD) LDAP server
All versions of Samba from 4.0.0 to 4.3.2 inclusive are vulnerable to a
denial of service attack in the samba daemon LDAP server.
Fixed In Version:
ldb 1.1.24
### CVE-2015-5252: Insufficient symlink verification in smbd
All versions of Samba from 3.0.0 to 4.3.2 inclusive are vulnerable to a
bug in symlink verification, which under certain circumstances could
allow client access to files outside the exported share path.
Fixed In Version:
samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-5296: client requesting encryption vulnerable to downgrade attack
Versions of Samba from 3.2.0 to 4.3.2 inclusive do not ensure that
signing is negotiated when creating an encrypted client connection to a
server.
Fixed In Version:
samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-5299: Missing access control check in shadow copy code
All versions of Samba from 3.2.0 to 4.3.1 inclusive are vulnerable to
a missing access control check in the vfs\_shadow\_copy2 module. When
looking for the shadow copy directory under the share path the current
accessing user should have DIRECTORY\_LIST access rights in order to
view the current snapshots.
Fixed In Version:
samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-5330: samba, ldb: remote memory read in the Samba LDAP server
Fixed In Version:
ldb 1.1.24, samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-7540: DoS to AD-DC due to insufficient checking of asn1 memory allocation
The LDAP server in the AD domain controller in Samba 4.x before 4.1.22
does not check return values to ensure successful ASN.1 memory
allocation, which allows remote attackers to cause a denial of service
(memory consumption and daemon crash) via crafted packets.
Fixed In Version:
samba 4.1.22, samba 4.2.0
### CVE-2015-8467: Denial of service attack against Windows Active Directory server.
Samba, operating as an AD DC, is sometimes operated in a domain with a
mix of Samba and Windows Active Directory Domain Controllers.
All versions of Samba from 4.0.0 to 4.3.2 inclusive, when deployed as
an AD DC in the same domain with Windows DCs, could be used to
override the protection against the MS15-096 / CVE-2015-2535 security
issue in Windows.
### References:
https://www.samba.org/samba/security/CVE-2015-3223.html
https://www.samba.org/samba/security/CVE-2015-5252.html
https://www.samba.org/samba/security/CVE-2015-5296.html
https://www.samba.org/samba/security/CVE-2015-5299.html
https://www.samba.org/samba/security/CVE-2015-5330.html
https://www.samba.org/samba/security/CVE-2015-7540.html
https://www.samba.org/samba/security/CVE-2015-8467.html
### Upstream commits:
https://git.samba.org/?p=samba.git;a=commitdiff;h=ec504dbf69636a554add1f3d5703dd6c3ad450b8
https://git.samba.org/?p=samba.git;a=commitdiff;h=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
https://git.samba.org/?p=samba.git;a=commitdiff;h=d724f835acb9f4886c0001af32cd325dbbf1f895
https://git.samba.org/?p=samba.git;a=commitdiff;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
https://git.samba.org/?p=samba.git;a=commitdiff;h=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7
https://git.samba.org/?p=samba.git;a=commitdiff;h=ba5dbda6d0174a59d221c45cca52ecd232820d48
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
https://git.samba.org/?p=samba.git;a=commitdiff;h=530d50a1abdcdf4d1775652d4c456c1274d83d8d
https://git.samba.org/?p=samba.git;a=commitdiff;h=9d989c9dd7a5b92d0c5d65287935471b83b6e884
*(from redmine: issue id 5044, created on 2016-01-22, closed on 2016-05-31)*
* Relations:
* parent #50393.0.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5043[3.1] samba: Several vulnerabilities (CVE-2015-3223, CVE-2015-5252, CVE-2015-...2019-07-23T13:41:41ZAlicha CH[3.1] samba: Several vulnerabilities (CVE-2015-3223, CVE-2015-5252, CVE-2015-5296, CVE-2015-5299, CVE-2015-5330, CVE-2015-7540, CVE-2015-8467)### CVE-2015-3223: libldb: Remote DoS in Samba (AD) LDAP server
All versions of Samba from 4.0.0 to 4.3.2 inclusive are vulnerable to a
denial of service attack in the samba daemon LDAP server.
Fixed In Version:
ldb 1.1.24
### CVE-20...### CVE-2015-3223: libldb: Remote DoS in Samba (AD) LDAP server
All versions of Samba from 4.0.0 to 4.3.2 inclusive are vulnerable to a
denial of service attack in the samba daemon LDAP server.
Fixed In Version:
ldb 1.1.24
### CVE-2015-5252: Insufficient symlink verification in smbd
All versions of Samba from 3.0.0 to 4.3.2 inclusive are vulnerable to a
bug in symlink verification, which under certain circumstances could
allow client access to files outside the exported share path.
Fixed In Version:
samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-5296: client requesting encryption vulnerable to downgrade attack
Versions of Samba from 3.2.0 to 4.3.2 inclusive do not ensure that
signing is negotiated when creating an encrypted client connection to a
server.
Fixed In Version:
samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-5299: Missing access control check in shadow copy code
All versions of Samba from 3.2.0 to 4.3.1 inclusive are vulnerable to
a missing access control check in the vfs\_shadow\_copy2 module. When
looking for the shadow copy directory under the share path the current
accessing user should have DIRECTORY\_LIST access rights in order to
view the current snapshots.
Fixed In Version:
samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-5330: samba, ldb: remote memory read in the Samba LDAP server
Fixed In Version:
ldb 1.1.24, samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-7540: DoS to AD-DC due to insufficient checking of asn1 memory allocation
The LDAP server in the AD domain controller in Samba 4.x before 4.1.22
does not check return values to ensure successful ASN.1 memory
allocation, which allows remote attackers to cause a denial of service
(memory consumption and daemon crash) via crafted packets.
Fixed In Version:
samba 4.1.22, samba 4.2.0
### CVE-2015-8467: Denial of service attack against Windows Active Directory server.
Samba, operating as an AD DC, is sometimes operated in a domain with a
mix of Samba and Windows Active Directory Domain Controllers.
All versions of Samba from 4.0.0 to 4.3.2 inclusive, when deployed as
an AD DC in the same domain with Windows DCs, could be used to
override the protection against the MS15-096 / CVE-2015-2535 security
issue in Windows.
### References:
https://www.samba.org/samba/security/CVE-2015-3223.html
https://www.samba.org/samba/security/CVE-2015-5252.html
https://www.samba.org/samba/security/CVE-2015-5296.html
https://www.samba.org/samba/security/CVE-2015-5299.html
https://www.samba.org/samba/security/CVE-2015-5330.html
https://www.samba.org/samba/security/CVE-2015-7540.html
https://www.samba.org/samba/security/CVE-2015-8467.html
### Upstream commits:
https://git.samba.org/?p=samba.git;a=commitdiff;h=ec504dbf69636a554add1f3d5703dd6c3ad450b8
https://git.samba.org/?p=samba.git;a=commitdiff;h=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
https://git.samba.org/?p=samba.git;a=commitdiff;h=d724f835acb9f4886c0001af32cd325dbbf1f895
https://git.samba.org/?p=samba.git;a=commitdiff;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
https://git.samba.org/?p=samba.git;a=commitdiff;h=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7
https://git.samba.org/?p=samba.git;a=commitdiff;h=ba5dbda6d0174a59d221c45cca52ecd232820d48
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
https://git.samba.org/?p=samba.git;a=commitdiff;h=530d50a1abdcdf4d1775652d4c456c1274d83d8d
https://git.samba.org/?p=samba.git;a=commitdiff;h=9d989c9dd7a5b92d0c5d65287935471b83b6e884
*(from redmine: issue id 5043, created on 2016-01-22, closed on 2016-06-15)*
* Relations:
* parent #5039
* Changesets:
* Revision dc909b6939e05d916f20501d052194be85e118f8 on 2016-02-26T15:01:20Z:
```
main/samba: security upgrade to 4.1.22. Fixes #5043
(CVE-2015-3223, CVE-2015-5252, CVE-2015-5296, CVE-2015-5299, CVE-2015-5330, CVE-2015-7540, CVE-2015-8467)
```3.1.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/5042[3.2] samba: Several vulnerabilities (CVE-2015-3223, CVE-2015-5252, CVE-2015-...2019-07-23T13:41:42ZAlicha CH[3.2] samba: Several vulnerabilities (CVE-2015-3223, CVE-2015-5252, CVE-2015-5296, CVE-2015-5299, CVE-2015-5330, CVE-2015-8467)### CVE-2015-3223: libldb: Remote DoS in Samba (AD) LDAP server
All versions of Samba from 4.0.0 to 4.3.2 inclusive are vulnerable to a
denial of service attack in the samba daemon LDAP server.
Fixed In Version:
ldb 1.1.24
### CVE-20...### CVE-2015-3223: libldb: Remote DoS in Samba (AD) LDAP server
All versions of Samba from 4.0.0 to 4.3.2 inclusive are vulnerable to a
denial of service attack in the samba daemon LDAP server.
Fixed In Version:
ldb 1.1.24
### CVE-2015-5252: Insufficient symlink verification in smbd
All versions of Samba from 3.0.0 to 4.3.2 inclusive are vulnerable to a
bug in symlink verification, which under certain circumstances could
allow client access to files outside the exported share path.
Fixed In Version:
samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-5296: client requesting encryption vulnerable to downgrade attack
Versions of Samba from 3.2.0 to 4.3.2 inclusive do not ensure that
signing is negotiated when creating an encrypted client connection to a
server.
Fixed In Version:
samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-5299: Missing access control check in shadow copy code
All versions of Samba from 3.2.0 to 4.3.1 inclusive are vulnerable to
a missing access control check in the vfs\_shadow\_copy2 module. When
looking for the shadow copy directory under the share path the current
accessing user should have DIRECTORY\_LIST access rights in order to
view the current snapshots.
Fixed In Version:
samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-5330: samba, ldb: remote memory read in the Samba LDAP server
Fixed In Version:
ldb 1.1.24, samba 4.1.22, samba 4.2.7, samba 4.3.3
### CVE-2015-8467: Denial of service attack against Windows Active Directory server.
Samba, operating as an AD DC, is sometimes operated in a domain with a
mix of Samba and Windows Active Directory Domain Controllers.
All versions of Samba from 4.0.0 to 4.3.2 inclusive, when deployed as
an AD DC in the same domain with Windows DCs, could be used to
override the protection against the MS15-096 / CVE-2015-2535 security
issue in Windows.
### References:
https://www.samba.org/samba/security/CVE-2015-3223.html
https://www.samba.org/samba/security/CVE-2015-5252.html
https://www.samba.org/samba/security/CVE-2015-5296.html
https://www.samba.org/samba/security/CVE-2015-5299.html
https://www.samba.org/samba/security/CVE-2015-5330.html
https://www.samba.org/samba/security/CVE-2015-7540.html
https://www.samba.org/samba/security/CVE-2015-8467.html
### Upstream commits:
https://git.samba.org/?p=samba.git;a=commitdiff;h=ec504dbf69636a554add1f3d5703dd6c3ad450b8
https://git.samba.org/?p=samba.git;a=commitdiff;h=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
https://git.samba.org/?p=samba.git;a=commitdiff;h=d724f835acb9f4886c0001af32cd325dbbf1f895
https://git.samba.org/?p=samba.git;a=commitdiff;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1
https://git.samba.org/?p=samba.git;a=commitdiff;h=a819d2b440aafa3138d95ff6e8b824da885a70e9
https://git.samba.org/?p=samba.git;a=commitdiff;h=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7
https://git.samba.org/?p=samba.git;a=commitdiff;h=ba5dbda6d0174a59d221c45cca52ecd232820d48
https://git.samba.org/?p=samba.git;a=commitdiff;h=a118d4220ed85749c07fb43c1229d9e2fecbea6b
https://git.samba.org/?p=samba.git;a=commitdiff;h=538d305de91e34a2938f5f219f18bf0e1918763f
https://git.samba.org/?p=samba.git;a=commitdiff;h=530d50a1abdcdf4d1775652d4c456c1274d83d8d
https://git.samba.org/?p=samba.git;a=commitdiff;h=9d989c9dd7a5b92d0c5d65287935471b83b6e884
*(from redmine: issue id 5042, created on 2016-01-22, closed on 2016-06-15)*
* Relations:
* parent #5039
* Changesets:
* Revision 3462c99e4d334710f649323bd6360b28b6b2f71f on 2016-02-26T14:36:47Z:
```
main/samba: security upgrade to 4.2.7. Fixes #5042
(CVE-2015-3223, CVE-2015-5252, CVE-2015-5296, CVE-2015-5299, CVE-2015-5330, CVE-2015-8467)
```3.2.4Natanael CopaNatanael Copa