This repository has been archived by the owner on Mar 16, 2022. It is now read-only.
Releases: cloudfoundry/cflinuxfs2
Releases · cloudfoundry/cflinuxfs2
1.30.0
Notably, this release addresses USN-2874-1 "Bind vulnerability" and USN-2875-1 "libxml2 vulnerabilities":
- CVE-2015-8704: Denial of service via APL data that could trigger an INSIST
- CVE-2015-7499: Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2
before 2.9.3 allows context-dependent attackers to obtain sensitive process
memory information via unspecified vectors. - CVE-2015-8710: out of bounds memory access via unclosed html comment
1.29.0
Notably, this release addresses USN-2869-1 "OpenSSH vulnerabilities":
- CVE-2016-0777: information leak in roaming support
- CVE-2016-0778: buffer overflow in roaming support
1.28.0
Notably, this release addresses USN-2868-1 "DHCP vulnerability":
- CVE-2015-8605: A badly formed packet with an invalid IPv4 UDP length field can cause a DHCP server, client, or relay program to terminate abnormally.
1.27.0
Notably, this release addresses USN-2865-1 "GnuTLS vulnerability":
- CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature
1.26.0
Release due to erroneous deploy. Contains no changes. Same as Release 1.25.0
1.25.0
Notably, this release addresses USN-2861-1 "libpng vulnerabilities":
- CVE-2015-8540: underflow read in png_check_keyword in pngwutil.c
- CVE-2015-8472: Incomplete fix for CVE-2015-8126
1.24.0
1.23.0
Notably, this release addresses USN-2837-1 "Bind vulnerability" and [USN-2835-1] "Git vulnerability" which address:
- CVE-2015-8000 "Responses with a malformed class attribute can trigger an assertion failure in db.c"
- CVE-2015-7545 "arbitrary code execution issues via URLs"
1.22.0
Notably, this release addresses USN-2834-1 "libxml2 vulnerabilities" which address:
- CVE-2015-5312 "It is one case where the code in place to detect entities expansions failed to exit when the situation was detected, leading to DoS"
- CVE-2015-7497 "heap buffer overflow in xmlDictComputeFastQKey"
- CVE-2015-7499 "Add xmlHaltParser() to stop the parser The problem is doing it in a consistent and safe fashion It's more complex than just setting ctxt->instate = XML_PARSER_EOF Update the public function to reuse that new internal routine. Detect incoherency on GROW, the current pointer to the input has to be between the base and end if not stop everything we have an internal state error."
- CVE-2015-7500 "memory access error due to incorrect entities boundaries"
- CVE-2015-8241 "Buffer overread with XML parser in xmlNextChar"
- CVE-2015-8242 "Buffer overread with HTML parser in push mode in xmlSAX2TextNode"
- CVE-2015-8317 "out of bounds read issues in the xmlParseXMLDecl function"
1.21.0
Notably, this release addresses USN-2830-1 "OpenSSL vulnerabilities" which address:
- CVE-2015-1794 "Anon DH ServerKeyExchange with 0 p parameter"
- CVE-2015-3193 "BN_mod_exp may produce incorrect results on x86_64"
- CVE-2015-3194 "Certificate verify crash with missing PSS parameter"
- CVE-2015-3195 "X509_ATTRIBUTE memory leak"