aboutsummaryrefslogtreecommitdiffstats
path: root/debian/patches/series (unfollow)
Commit message (Collapse)AuthorFilesLines
2020-05-01Update to 0.5.3-19+deb8u3 for jessie-securitydebian/0.5.3-19+deb8u3debian-jessieThorsten Alteholz1-0/+3
2017-01-06Fix multiple vulnerabilities (closes: #850432)Tatsuya Kinoshita1-0/+21
- New patch 934_menu.patch to fix buffer overflow (tats/w3m#49) - New patch 935_shiftanchor.patch to fix buffer overflow (tats/w3m#62) - New patch 936_metarefresh.patch to fix buffer overflow (tats/w3m#63) - New patch 937_lineproc0.patch to fix buffer overflow (tats/w3m#67) - New patch 938_lineproc2body.patch to fix buffer overflow (tats/w3m#61) - New patch 939_textarea.patch to fix buffer overflow (tats/w3m#58) - New patch 940_tabattr.patch to fix buffer overflow (tats/w3m#60) - New patch 941_integeredwidth.patch to fix buffer overflow (tats/w3m#70) - New patch 942_tridvalue.patch to fix buffer overflow (tats/w3m#71) - New patch 943_pushlink.patch to fix buffer overflow (tats/w3m#64, #66) - New patch 944_lineproc0.patch to fix use after free (tats/w3m#65) - New patch 945_wtfstrwidth.patch to fix buffer overflow (tats/w3m#57) - New patch 946_strnewsize.patch to fix buffer overflow (tats/w3m#72) - New patch 947_realcolumn.patch to fix buffer overflow (tats/w3m#69) - New patch 948_getmclen.patch to fix buffer overflow (tats/w3m#59, #73, #74, #75, #76, #78, #79, #80, #83, #84) - New patch 949_wtftowcs.patch to fix buffer overflow (tats/w3m#77) - New patch 950_textarea.patch to fix infinite loop (tats/w3m#85) - New patch 951_lineproc0.patch to fix use after free (tats/w3m#81) - New patch 952_formupdatebuffer.patch to fix buffer overflow (tats/w3m#82) - New patch 953_formupdateline.patch to fix buffer overflow (tats/w3m#68#issuecomment-266214643) - New patch 954_wtfparse1.patch to fix buffer overflow (tats/w3m#68)
2016-11-24New patch 933_table-level.patch to fix out of memory [CVE-2016-9633]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 932_ucsmap.patch to fix global-buffer-overflowTatsuya Kinoshita1-0/+1
2016-11-21New patch 931_parse-url.patch to fix global-buffer-overflowTatsuya Kinoshita1-0/+1
2016-11-21New patch 930_tbl-mode.patch to fix null derefTatsuya Kinoshita1-0/+1
2016-11-21New patch 929_anchor.patch to fix null derefTatsuya Kinoshita1-0/+1
2016-11-21New patch 928_form-id.patch to fix null derefTatsuya Kinoshita1-0/+1
2016-11-21New patch 927_symbol.patch to fix array indexTatsuya Kinoshita1-0/+1
2016-11-21New patch 926_indent-level.patch to fix stack overflowTatsuya Kinoshita1-0/+1
2016-11-21New patch 925_lineproc.patch to fix stack overflowTatsuya Kinoshita1-0/+1
2016-11-21New patch 924_curline.patch to fix near-null derefTatsuya Kinoshita1-0/+1
2016-11-21New patch 923_tagproc.patch to fix negative size allocationTatsuya Kinoshita1-0/+1
2016-11-21New patch 922_lineproc.patch to fix null derefTatsuya Kinoshita1-0/+1
2016-11-21New patch 921_cotable.patch to fix null derefTatsuya Kinoshita1-0/+1
2016-11-21New patch 920_table.patch to fix stack overflow [CVE-2016-9439]Tatsuya Kinoshita1-0/+1
(closes: #844726)
2016-11-21New patch 919_form-update.patch to fix buffer overflow [CVE-2016-9429]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 918_form-value.patch to fix null deref [CVE-2016-9443]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 917_strgrow.patch to fix potential heap buffer corruptionTatsuya Kinoshita1-0/+1
[CVE-2016-9442]
2016-11-21New patch 916_anchor.patch to fix heap writeTatsuya Kinoshita1-0/+1
[CVE-2016-9425] [CVE-2016-9428]
2016-11-21New patch 915_table-alt.patch to fix near-null deref [CVE-2016-9441]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 914_curline.patch to fix near-null deref [CVE-2016-9440]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 913_tabwidth.patch to fix heap corruption [CVE-2016-9426]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 912_i-dd.patch to fix uninit valuesTatsuya Kinoshita1-0/+1
[CVE-2016-9435] [CVE-2016-9436]
2016-11-21New patch 911_rowcolspan.patch to fix stack smashing [CVE-2016-9422]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 910_input-alt.patch to fix null deref [CVE-2016-9438]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 909_button-type.patch to fix rodata write [CVE-2016-9437]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 908_forms.patch to fix null deref [CVE-2016-9434]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 907_iso2022.patch to fix array index [CVE-2016-9433]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 906_form-update.patch to fix bcopy size [CVE-2016-9432]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 905_textarea.patch to fix heap write [CVE-2016-9424]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 904_form-update.patch to fix overflowTatsuya Kinoshita1-0/+1
[CVE-2016-9423] [CVE-2016-9431]
2016-11-21New patch 903_input-type.patch to fix null deref [CVE-2016-9430]Tatsuya Kinoshita1-0/+1
2016-11-21New patch 902_johab1.patch to fix array index (closes: #820373)Tatsuya Kinoshita1-0/+1
2016-11-21New patch 901_ucsmap.patch to fix array index (closes: #820162)Tatsuya Kinoshita1-0/+1
2014-10-21New patch 360_lang-de.patch to add German translation (closes: #763964)Tatsuya Kinoshita1-0/+1
2014-10-15New patch 350_ambwidth.patch to correct ucs_ambwidth_mapTatsuya Kinoshita1-0/+1
2014-10-15New patch 340_ssl-init.patch to disable SSLv3 [CVE-2014-3566]Tatsuya Kinoshita1-0/+1
2014-06-23New patch 330_Disable-weak-ciphers.patch (LP: #1325674)Tatsuya Kinoshita1-0/+1
2014-01-03New patch 320_imlib2-config.patch to build with imlib2 1.4.6Tatsuya Kinoshita1-0/+1
2014-01-03New patch 310_doc-ascii.patch to prefer US-ASCII in English documentsTatsuya Kinoshita1-0/+1
2013-12-27New patch 300_manual-links.patch to fix links in MANUAL.html (closes: #517315)Tatsuya Kinoshita1-0/+1
2013-12-14Drop 050_autotools-config.patch (comment out)Tatsuya Kinoshita1-1/+1
2013-12-07New patch 290_closedir.patch to fix a directory descriptor leakTatsuya Kinoshita1-0/+1
2013-12-07New patch 280_search-next.patch to fix crash after SEARCH_NEXTTatsuya Kinoshita1-0/+1
2013-11-10New patch 270_refresh-url.patch to accept single quoted URLTatsuya Kinoshita1-0/+1
2013-11-07New patch 260_openssl.patch from openSUSE for OpenSSL issuesTatsuya Kinoshita1-0/+1
- Use SSL_OP_NO_COMPRESSION if available due to the "CRIME attack". [CVE-2012-4929] - Use SSL_MODE_RELEASE_BUFFERS if available.
2013-10-15Update 040_link_gcc45.patch to 040_link-gtk2.patchTatsuya Kinoshita1-1/+1
2013-10-14New patch 250_schemebug.patch to fix scheme bugTatsuya Kinoshita1-0/+1
2013-10-14New patch 240_win64gc.patch for GC on Cygwin64Tatsuya Kinoshita1-0/+1