Skip to content
This repository has been archived by the owner on Mar 16, 2022. It is now read-only.

Releases: cloudfoundry/cflinuxfs2

1.30.0

20 Jan 13:08
Compare
Choose a tag to compare

Notably, this release addresses USN-2874-1 "Bind vulnerability" and USN-2875-1 "libxml2 vulnerabilities":

  • CVE-2015-8704: Denial of service via APL data that could trigger an INSIST
  • CVE-2015-7499: Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2
    before 2.9.3 allows context-dependent attackers to obtain sensitive process
    memory information via unspecified vectors.
  • CVE-2015-8710: out of bounds memory access via unclosed html comment

1.29.0

14 Jan 22:42
Compare
Choose a tag to compare

Notably, this release addresses USN-2869-1 "OpenSSH vulnerabilities":

1.28.0

13 Jan 23:10
Compare
Choose a tag to compare

Notably, this release addresses USN-2868-1 "DHCP vulnerability":

  • CVE-2015-8605: A badly formed packet with an invalid IPv4 UDP length field can cause a DHCP server, client, or relay program to terminate abnormally.

1.27.0

08 Jan 18:15
Compare
Choose a tag to compare

Notably, this release addresses USN-2865-1 "GnuTLS vulnerability":

  • CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature

1.26.0

08 Jan 14:35
Compare
Choose a tag to compare

Release due to erroneous deploy. Contains no changes. Same as Release 1.25.0

1.25.0

06 Jan 21:50
Compare
Choose a tag to compare

Notably, this release addresses USN-2861-1 "libpng vulnerabilities":

1.24.0

28 Dec 15:03
Compare
Choose a tag to compare

This release contains only non-critical updates to the rootfs. See the receipt changes at this commit for more information.

1.23.0

16 Dec 13:53
Compare
Choose a tag to compare

Notably, this release addresses USN-2837-1 "Bind vulnerability" and [USN-2835-1] "Git vulnerability" which address:

  • CVE-2015-8000 "Responses with a malformed class attribute can trigger an assertion failure in db.c"
  • CVE-2015-7545 "arbitrary code execution issues via URLs"

1.22.0

14 Dec 19:30
Compare
Choose a tag to compare

Notably, this release addresses USN-2834-1 "libxml2 vulnerabilities" which address:

  • CVE-2015-5312 "It is one case where the code in place to detect entities expansions failed to exit when the situation was detected, leading to DoS"
  • CVE-2015-7497 "heap buffer overflow in xmlDictComputeFastQKey"
  • CVE-2015-7499 "Add xmlHaltParser() to stop the parser The problem is doing it in a consistent and safe fashion It's more complex than just setting ctxt->instate = XML_PARSER_EOF Update the public function to reuse that new internal routine. Detect incoherency on GROW, the current pointer to the input has to be between the base and end if not stop everything we have an internal state error."
  • CVE-2015-7500 "memory access error due to incorrect entities boundaries"
  • CVE-2015-8241 "Buffer overread with XML parser in xmlNextChar"
  • CVE-2015-8242 "Buffer overread with HTML parser in push mode in xmlSAX2TextNode"
  • CVE-2015-8317 "out of bounds read issues in the xmlParseXMLDecl function"

1.21.0

07 Dec 17:43
Compare
Choose a tag to compare

Notably, this release addresses USN-2830-1 "OpenSSL vulnerabilities" which address: