alpine issueshttps://gitlab.alpinelinux.org/groups/alpine/-/issues2020-01-18T20:36:35Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3235Package request: fontconfig-ultimate2020-01-18T20:36:35ZEdward SeongPackage request: fontconfig-ultimateAlpine Linux users need a way to have gorgeous fonts too.
https://github.com/bohoomil/fontconfig-ultimate
Thank you!
*(from redmine: issue id 3235, created on 2014-07-24)*Alpine Linux users need a way to have gorgeous fonts too.
https://github.com/bohoomil/fontconfig-ultimate
Thank you!
*(from redmine: issue id 3235, created on 2014-07-24)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/3234Infinite folders (?)2019-07-23T14:04:17ZEdward SeongInfinite folders (?)I was trying to get to
/sys/devices/virtual/graphics/fbcon/subsystem/fb0/virtual\_size to check
if my current resolution was correct, because it wasn’t showing as it
should on boot, the font was huge.
But as I got to /sys/devices/virtua...I was trying to get to
/sys/devices/virtual/graphics/fbcon/subsystem/fb0/virtual\_size to check
if my current resolution was correct, because it wasn’t showing as it
should on boot, the font was huge.
But as I got to /sys/devices/virtual/graphics/fbcon/subsystem/ the only
folder there was fbcon itself again and inside it subsystem, ad
infinitum (apparently)
/sys/devices/virtual/graphics/fbcon/subsystem/fb0/virtual\_size/fb0/virtual\_size/fb0/virtual\_size/fb0/virtual\_size/fb0/virtual\_size/fb0/virtual\_size/fb0/virtual\_size/fb0/virtual\_size/fb0/virtual\_size/fb0/virtual\_size/fb0/virtual\_size/fb0/virtual\_size/fb0/virtual\_size
And I don’t know if this is related, but my boot resolution is horrible,
text is huge and ugly. Even after following
http://wiki.alpinelinux.org/wiki/Uvesafb
If I startx and go back to the tty, the font there is much better. But
there’s no way to make the boot font look good, neither the tty at the
first time.
Might be related to this
*(from redmine: issue id 3234, created on 2014-07-24, closed on 2019-06-11)*
* Changesets:
* Revision d4e0376c8e7aab4108f49cee93516d4ac2a420ed by Natanael Copa on 2014-07-28T14:43:54Z:
```
main/busybox: fix top
ref #3234
```
* Revision ce41db40a7eb89f052ce3019b34f3227b96398a4 by Natanael Copa on 2014-07-28T16:49:44Z:
```
main/busybox: fix the top patch
ref #3234
```
* Revision 62c02b4169d24678ab32f1fe6203afc32b9c9365 by Natanael Copa on 2014-07-30T11:44:22Z:
```
main/busybox: fix top
fixes #3234
```https://gitlab.alpinelinux.org/alpine/aports/-/issues/3233dwb2020-01-18T20:37:09ZWilliam Beachdwbdwb is a lightweight web browser based on the webkit web browser engine
and the gtk toolkit.
http://portix.bitbucket.org/dwb/
https://bitbucket.org/portix/dwb/get/master.tar.gz
*(from redmine: issue id 3233, created on 2014-07-23)*dwb is a lightweight web browser based on the webkit web browser engine
and the gtk toolkit.
http://portix.bitbucket.org/dwb/
https://bitbucket.org/portix/dwb/get/master.tar.gz
*(from redmine: issue id 3233, created on 2014-07-23)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/3232Package request: ARandR2019-07-23T14:04:18ZEdward SeongPackage request: ARandR*(from redmine: issue id 3232, created on 2014-07-22, closed on 2015-12-16)**(from redmine: issue id 3232, created on 2014-07-22, closed on 2015-12-16)*Scrumpy JackScrumpy Jackhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3231Package request: Apache OpenOffice2019-07-15T14:14:41ZEdward SeongPackage request: Apache OpenOfficeIt has many less dependencies than LibreOffice and is overall better.
An office suite like this is really necessary for Alpine Linux,
otherwise its use is greatly limited for the (many) people in need of
this.
I hope it’s not too har...It has many less dependencies than LibreOffice and is overall better.
An office suite like this is really necessary for Alpine Linux,
otherwise its use is greatly limited for the (many) people in need of
this.
I hope it’s not too hard to add it. Thanks!
*(from redmine: issue id 3231, created on 2014-07-22)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/3230[Package Request] SpaceFM2019-07-23T14:04:19ZEdward Seong[Package Request] SpaceFM*(from redmine: issue id 3230, created on 2014-07-22, closed on 2015-12-09)**(from redmine: issue id 3230, created on 2014-07-22, closed on 2015-12-09)*https://gitlab.alpinelinux.org/alpine/aports/-/issues/3229libvirtd can't find dnsmasq if it's not a make dependency2019-07-23T14:04:20ZStephen Caraherlibvirtd can't find dnsmasq if it's not a make dependencyLibvirt’s path to dnsmasq is set by its configure script, and defaults
to somewhere other than where dnsmasq is installed on Alpine. With
dnsmasq-2.71-r0 installed alongside either the 1.2.5-r0 or 1.2.6-r0
libvirt packages, I get the fol...Libvirt’s path to dnsmasq is set by its configure script, and defaults
to somewhere other than where dnsmasq is installed on Alpine. With
dnsmasq-2.71-r0 installed alongside either the 1.2.5-r0 or 1.2.6-r0
libvirt packages, I get the following message in syslog:
“dnsmasqCapsRefreshInternal:726 : Cannot check dnsmasq binary dnsmasq:
No such file or directory”, and virtual NAT networking won’t work. If I
build the package myself with dnsmasq in makedepends, then the problem
is fixed.
(Seems to be the same problem as this:
https://bugs.archlinux.org/task/35183)
*(from redmine: issue id 3229, created on 2014-07-22, closed on 2014-07-30)*
* Changesets:
* Revision 267f3f978531e6da2827381edace41f5caf8d05b by Natanael Copa on 2014-07-22T11:44:32Z:
```
main/libvirt: help libvirt to find path to dnsmasq
we simply add it to makedepends
ref #3229
```
* Revision 876777d00641a82436220e89f313d29851b74266 by Natanael Copa on 2014-07-22T11:45:47Z:
```
main/libvirt: help libvirt to find path to dnsmasq
we simply add it to makedepends
fixes #3229
(cherry picked from commit 267f3f978531e6da2827381edace41f5caf8d05b)
```3.0.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3228xen upgrade to 4.42019-07-23T14:04:21ZDieter Blomsxen upgrade to 4.4Hello,
since several month (march 2014) xen 4.4 is out.
I like the feature PVH where I can use HW virtualization in PV guest.
There are many other enhancments, too:
Look at http://wiki.xenproject.org/wiki/Xen\_4.4\_Feature\_List
I...Hello,
since several month (march 2014) xen 4.4 is out.
I like the feature PVH where I can use HW virtualization in PV guest.
There are many other enhancments, too:
Look at http://wiki.xenproject.org/wiki/Xen\_4.4\_Feature\_List
It would be nice, if there were xen 4.4 for alpinelinux.
Thank you.
*(from redmine: issue id 3228, created on 2014-07-22, closed on 2014-12-09)*
* Changesets:
* Revision d7fcf5542a0a6ab8f821862a9cc050db36c8c2e9 by Natanael Copa on 2014-10-09T14:17:58Z:
```
main/xen: upgrade to 4.4.1 and remove xend
fixes #3228
```3.1.0Ariadne Conillariadne@ariadne.spaceAriadne Conillariadne@ariadne.spacehttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3227[v3.0] file: remote DoS (CVE-2014-3538)2019-07-23T14:04:22ZAlexander Belous[v3.0] file: remote DoS (CVE-2014-3538)file before 5.19 does not properly restrict the amount of data read
during a regex search, which allows remote attackers to cause a denial
of service (CPU consumption) via a crafted file that triggers
backtracking during processing of an...file before 5.19 does not properly restrict the amount of data read
during a regex search, which allows remote attackers to cause a denial
of service (CPU consumption) via a crafted file that triggers
backtracking during processing of an awk rule. NOTE: this vulnerability
exists because of an incomplete fix for CVE-2013-7345.
•MLIST:\[file\] 20140612 file-5.19 is now available
•URL: http://mx.gw.com/pipermail/file/2014/001553.html
•MLIST:\[oss-security\] 20140630 changing CVE ID for RH Bugzilla 1098222
(from CVE-2014-0235)
•URL: http://openwall.com/lists/oss-security/2014/06/30/7
•CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1098222
•CONFIRM:
https://github.com/file/file/commit/4a284c89d6ef11aca34da65da7d673050a5ea320
•CONFIRM:
https://github.com/file/file/commit/69a5a43b3b71f53b0577f41264a073f495799610
•CONFIRM:
https://github.com/file/file/commit/71a8b6c0d758acb0f73e2e51421a711b5e9d6668
•CONFIRM:
https://github.com/file/file/commit/74cafd7de9ec99a14f4480927580e501c8f852c3
•CONFIRM:
https://github.com/file/file/commit/758e066df72fb1ac08d2eea91ddc3973d259e991
*(from redmine: issue id 3227, created on 2014-07-21, closed on 2014-07-24)*
* Relations:
* parent #3223
* Changesets:
* Revision 1faa3f503104ad3e8cb9273cc73b15894e48c650 by Natanael Copa on 2014-07-21T16:57:01Z:
```
main/file: security upgrade to 5.19 (CVE-2014-3538)
fixes #3227
```3.0.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3226[v2.7] file: remote DoS (CVE-2014-3538)2019-07-23T14:04:23ZAlexander Belous[v2.7] file: remote DoS (CVE-2014-3538)file before 5.19 does not properly restrict the amount of data read
during a regex search, which allows remote attackers to cause a denial
of service (CPU consumption) via a crafted file that triggers
backtracking during processing of an...file before 5.19 does not properly restrict the amount of data read
during a regex search, which allows remote attackers to cause a denial
of service (CPU consumption) via a crafted file that triggers
backtracking during processing of an awk rule. NOTE: this vulnerability
exists because of an incomplete fix for CVE-2013-7345.
•MLIST:\[file\] 20140612 file-5.19 is now available
•URL: http://mx.gw.com/pipermail/file/2014/001553.html
•MLIST:\[oss-security\] 20140630 changing CVE ID for RH Bugzilla 1098222
(from CVE-2014-0235)
•URL: http://openwall.com/lists/oss-security/2014/06/30/7
•CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1098222
•CONFIRM:
https://github.com/file/file/commit/4a284c89d6ef11aca34da65da7d673050a5ea320
•CONFIRM:
https://github.com/file/file/commit/69a5a43b3b71f53b0577f41264a073f495799610
•CONFIRM:
https://github.com/file/file/commit/71a8b6c0d758acb0f73e2e51421a711b5e9d6668
•CONFIRM:
https://github.com/file/file/commit/74cafd7de9ec99a14f4480927580e501c8f852c3
•CONFIRM:
https://github.com/file/file/commit/758e066df72fb1ac08d2eea91ddc3973d259e991
*(from redmine: issue id 3226, created on 2014-07-21, closed on 2014-07-24)*
* Relations:
* parent #3223
* Changesets:
* Revision 17ef6c9a8874eebd2fac041843bbb1f72bdb2585 by Natanael Copa on 2014-07-21T16:57:28Z:
```
main/file: security upgrade to 5.19 (CVE-2014-3538)
fixes #3226
```Alpine 2.7.10Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3225[v2.6] file: remote DoS (CVE-2014-3538)2020-01-20T22:34:28ZAlexander Belous[v2.6] file: remote DoS (CVE-2014-3538)file before 5.19 does not properly restrict the amount of data read
during a regex search, which allows remote attackers to cause a denial
of service (CPU consumption) via a crafted file that triggers
backtracking during processing of an...file before 5.19 does not properly restrict the amount of data read
during a regex search, which allows remote attackers to cause a denial
of service (CPU consumption) via a crafted file that triggers
backtracking during processing of an awk rule. NOTE: this vulnerability
exists because of an incomplete fix for CVE-2013-7345.
•MLIST:\[file\] 20140612 file-5.19 is now available
•URL: http://mx.gw.com/pipermail/file/2014/001553.html
•MLIST:\[oss-security\] 20140630 changing CVE ID for RH Bugzilla 1098222
(from CVE-2014-0235)
•URL: http://openwall.com/lists/oss-security/2014/06/30/7
•CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1098222
•CONFIRM:
https://github.com/file/file/commit/4a284c89d6ef11aca34da65da7d673050a5ea320
•CONFIRM:
https://github.com/file/file/commit/69a5a43b3b71f53b0577f41264a073f495799610
•CONFIRM:
https://github.com/file/file/commit/71a8b6c0d758acb0f73e2e51421a711b5e9d6668
•CONFIRM:
https://github.com/file/file/commit/74cafd7de9ec99a14f4480927580e501c8f852c3
•CONFIRM:
https://github.com/file/file/commit/758e066df72fb1ac08d2eea91ddc3973d259e991
*(from redmine: issue id 3225, created on 2014-07-21, closed on 2014-07-24)*
* Relations:
* parent #3223
* Changesets:
* Revision eae47f6d919fafbbd2dd077106f5558a67e59a39 by Natanael Copa on 2014-07-21T16:57:54Z:
```
main/file: security upgrade to 5.19 (CVE-2014-3538)
fixes #3225
```Alpine 2.6.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3224[v2.5] file: remote DoS (CVE-2014-3538)2019-07-23T14:04:25ZAlexander Belous[v2.5] file: remote DoS (CVE-2014-3538)file before 5.19 does not properly restrict the amount of data read
during a regex search, which allows remote attackers to cause a denial
of service (CPU consumption) via a crafted file that triggers
backtracking during processing of an...file before 5.19 does not properly restrict the amount of data read
during a regex search, which allows remote attackers to cause a denial
of service (CPU consumption) via a crafted file that triggers
backtracking during processing of an awk rule. NOTE: this vulnerability
exists because of an incomplete fix for CVE-2013-7345.
•MLIST:\[file\] 20140612 file-5.19 is now available
•URL: http://mx.gw.com/pipermail/file/2014/001553.html
•MLIST:\[oss-security\] 20140630 changing CVE ID for RH Bugzilla 1098222
(from CVE-2014-0235)
•URL: http://openwall.com/lists/oss-security/2014/06/30/7
•CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1098222
•CONFIRM:
https://github.com/file/file/commit/4a284c89d6ef11aca34da65da7d673050a5ea320
•CONFIRM:
https://github.com/file/file/commit/69a5a43b3b71f53b0577f41264a073f495799610
•CONFIRM:
https://github.com/file/file/commit/71a8b6c0d758acb0f73e2e51421a711b5e9d6668
•CONFIRM:
https://github.com/file/file/commit/74cafd7de9ec99a14f4480927580e501c8f852c3
•CONFIRM:
https://github.com/file/file/commit/758e066df72fb1ac08d2eea91ddc3973d259e991
*(from redmine: issue id 3224, created on 2014-07-21, closed on 2014-07-24)*
* Relations:
* parent #3223
* Changesets:
* Revision 1b61a767ec46a4a7eb1d76f2e4459de38eb97c28 by Natanael Copa on 2014-07-21T16:58:13Z:
```
main/file: security upgrade to 5.19 (CVE-2014-3538)
fixes #3224
```Alpine 2.5.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3223file: remote DoS (CVE-2014-3538)2019-07-23T14:04:26ZAlexander Belousfile: remote DoS (CVE-2014-3538)file before 5.19 does not properly restrict the amount of data read
during a regex search, which allows remote attackers to cause a denial
of service (CPU consumption) via a crafted file that triggers
backtracking during processing of an...file before 5.19 does not properly restrict the amount of data read
during a regex search, which allows remote attackers to cause a denial
of service (CPU consumption) via a crafted file that triggers
backtracking during processing of an awk rule. NOTE: this vulnerability
exists because of an incomplete fix for CVE-2013-7345.
•MLIST:\[file\] 20140612 file-5.19 is now available
•URL: http://mx.gw.com/pipermail/file/2014/001553.html
•MLIST:\[oss-security\] 20140630 changing CVE ID for RH Bugzilla 1098222
(from CVE-2014-0235)
•URL: http://openwall.com/lists/oss-security/2014/06/30/7
•CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1098222
•CONFIRM:
https://github.com/file/file/commit/4a284c89d6ef11aca34da65da7d673050a5ea320
•CONFIRM:
https://github.com/file/file/commit/69a5a43b3b71f53b0577f41264a073f495799610
•CONFIRM:
https://github.com/file/file/commit/71a8b6c0d758acb0f73e2e51421a711b5e9d6668
•CONFIRM:
https://github.com/file/file/commit/74cafd7de9ec99a14f4480927580e501c8f852c3
•CONFIRM:
https://github.com/file/file/commit/758e066df72fb1ac08d2eea91ddc3973d259e991
*(from redmine: issue id 3223, created on 2014-07-21, closed on 2014-07-24)*
* Relations:
* child #3224
* child #3225
* child #3226
* child #3227https://gitlab.alpinelinux.org/alpine/aports/-/issues/3222[v3.0] php: multiple issues fixed in new 5.5.142019-07-23T14:04:27ZAlexander Belous[v3.0] php: multiple issues fixed in new 5.5.14The PHP Development Team announces the immediate availability of PHP
5.5.14. This release fixes several bugs against PHP 5.5.13. Also, this
release fixes a total of 8 CVEs, half of them concerning the FileInfo
extension:
http://web.nvd....The PHP Development Team announces the immediate availability of PHP
5.5.14. This release fixes several bugs against PHP 5.5.13. Also, this
release fixes a total of 8 CVEs, half of them concerning the FileInfo
extension:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4698
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4670
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0207
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3478
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3479
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3480
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3487
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3515
References and downloads:
http://php.net/archive/2014.php\#id2014-06-27-1
http://php.net/downloads.php
*(from redmine: issue id 3222, created on 2014-07-21, closed on 2014-07-24)*
* Relations:
* parent #32183.0.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3221[v2.7] php: multiple issues fixed in new 5.5.142019-07-23T14:04:28ZAlexander Belous[v2.7] php: multiple issues fixed in new 5.5.14The PHP Development Team announces the immediate availability of PHP
5.5.14. This release fixes several bugs against PHP 5.5.13. Also, this
release fixes a total of 8 CVEs, half of them concerning the FileInfo
extension:
http://web.nvd....The PHP Development Team announces the immediate availability of PHP
5.5.14. This release fixes several bugs against PHP 5.5.13. Also, this
release fixes a total of 8 CVEs, half of them concerning the FileInfo
extension:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4698
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4670
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0207
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3478
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3479
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3480
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3487
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3515
References and downloads:
http://php.net/archive/2014.php\#id2014-06-27-1
http://php.net/downloads.php
*(from redmine: issue id 3221, created on 2014-07-21, closed on 2014-07-24)*
* Relations:
* parent #3218Alpine 2.7.10Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3220[v2.6] php: multiple issues fixed in new 5.5.142019-07-23T14:04:29ZAlexander Belous[v2.6] php: multiple issues fixed in new 5.5.14The PHP Development Team announces the immediate availability of PHP
5.5.14. This release fixes several bugs against PHP 5.5.13. Also, this
release fixes a total of 8 CVEs, half of them concerning the FileInfo
extension:
http://web.nvd....The PHP Development Team announces the immediate availability of PHP
5.5.14. This release fixes several bugs against PHP 5.5.13. Also, this
release fixes a total of 8 CVEs, half of them concerning the FileInfo
extension:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4698
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4670
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0207
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3478
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3479
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3480
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3487
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3515
References and downloads:
http://php.net/archive/2014.php\#id2014-06-27-1
http://php.net/downloads.php
*(from redmine: issue id 3220, created on 2014-07-21, closed on 2014-07-24)*
* Relations:
* parent #3218Alpine 2.6.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3219[v2.5] php: multiple issues fixed in new 5.5.142019-07-23T14:04:30ZAlexander Belous[v2.5] php: multiple issues fixed in new 5.5.14The PHP Development Team announces the immediate availability of PHP
5.5.14. This release fixes several bugs against PHP 5.5.13. Also, this
release fixes a total of 8 CVEs, half of them concerning the FileInfo
extension:
http://web.nvd....The PHP Development Team announces the immediate availability of PHP
5.5.14. This release fixes several bugs against PHP 5.5.13. Also, this
release fixes a total of 8 CVEs, half of them concerning the FileInfo
extension:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4698
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4670
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0207
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3478
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3479
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3480
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3487
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3515
References and downloads:
http://php.net/archive/2014.php\#id2014-06-27-1
http://php.net/downloads.php
*(from redmine: issue id 3219, created on 2014-07-21, closed on 2014-07-24)*
* Relations:
* parent #3218Alpine 2.5.5Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3218php: multiple issues fixed in new 5.5.142019-07-23T14:04:31ZAlexander Belousphp: multiple issues fixed in new 5.5.14The PHP Development Team announces the immediate availability of PHP
5.5.14. This release fixes several bugs against PHP 5.5.13. Also, this
release fixes a total of 8 CVEs, half of them concerning the FileInfo
extension:
http://web.nvd....The PHP Development Team announces the immediate availability of PHP
5.5.14. This release fixes several bugs against PHP 5.5.13. Also, this
release fixes a total of 8 CVEs, half of them concerning the FileInfo
extension:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4698
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4670
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0207
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3478
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3479
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3480
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3487
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3515
References and downloads:
http://php.net/archive/2014.php\#id2014-06-27-1
http://php.net/downloads.php
*(from redmine: issue id 3218, created on 2014-07-21, closed on 2014-07-24)*
* Relations:
* child #3219
* child #3220
* child #3221
* child #3222https://gitlab.alpinelinux.org/alpine/aports/-/issues/3217[v3.0] kernel: gain privileges in net/l2tp/l2tp_ppp.c (CVE-2014-4943)2019-07-23T14:04:33ZAlexander Belous[v3.0] kernel: gain privileges in net/l2tp/l2tp_ppp.c (CVE-2014-4943)The PPPoL2TP feature in net/l2tp/l2tp\_ppp.c in the Linux kernel through
3.15.6 allows local users to gain privileges by leveraging
data-structure differences between an l2tp socket and an inet socket.
CONFIRM: https://bugzilla.redhat.c...The PPPoL2TP feature in net/l2tp/l2tp\_ppp.c in the Linux kernel through
3.15.6 allows local users to gain privileges by leveraging
data-structure differences between an l2tp socket and an inet socket.
CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1119458
COMMIT:
https://github.com/torvalds/linux/commit/3cf521f7dc87c031617fd47e4b7aa2593c2f3daf
MLIST: http://openwall.com/lists/oss-security/2014/07/17/1
CONFIRM: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4943
*(from redmine: issue id 3217, created on 2014-07-21, closed on 2017-05-17)*
* Relations:
* parent #3213
* Changesets:
* Revision 3a97f6f67fab612a4b508296b911e38df997358a by Natanael Copa on 2014-07-24T16:55:06Z:
```
main/linux-grsec: upgrade to 3.14.13
grsecurity patch has fixes for various issues:
CVE-2014-4943
CVE-2014-4171
fixes #3178
fixes #3217
```3.0.2Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/3216[v2.7] kernel: gain privileges in net/l2tp/l2tp_ppp.c (CVE-2014-4943)2019-07-23T14:04:34ZAlexander Belous[v2.7] kernel: gain privileges in net/l2tp/l2tp_ppp.c (CVE-2014-4943)The PPPoL2TP feature in net/l2tp/l2tp\_ppp.c in the Linux kernel through
3.15.6 allows local users to gain privileges by leveraging
data-structure differences between an l2tp socket and an inet socket.
CONFIRM: https://bugzilla.redhat.c...The PPPoL2TP feature in net/l2tp/l2tp\_ppp.c in the Linux kernel through
3.15.6 allows local users to gain privileges by leveraging
data-structure differences between an l2tp socket and an inet socket.
CONFIRM: https://bugzilla.redhat.com/show\_bug.cgi?id=1119458
COMMIT:
https://github.com/torvalds/linux/commit/3cf521f7dc87c031617fd47e4b7aa2593c2f3daf
MLIST: http://openwall.com/lists/oss-security/2014/07/17/1
CONFIRM: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4943
*(from redmine: issue id 3216, created on 2014-07-21, closed on 2017-05-17)*
* Relations:
* parent #3213Alpine 2.7.10Natanael CopaNatanael Copa