| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
|
|
|
|
|
| |
You could read following messages when starting haproxy:
'frontend' cannot handle unexpected argument '*:5000'.
please use the 'bind' keyword for listening addresses.
* haproxy.cfg: Use bind for listening addresses.
* APKBUILD: Update checksums.
(cherry picked from commit 9ec1afd13ac60aad9acc109c18788db8ff00035e)
|
|
|
|
|
|
|
| |
.pre-upgrade content was the same as .pre-install, so no change in .apk,
thus no pkgrel bump.
(cherry picked from commit 3cc3dde12d39c8bb39cd17c01b04c117691ffa59)
|
|
|
|
| |
(cherry picked from commit a643ff53e5b74b2453095c24d547cb3c02b59dd1)
|
|
|
|
|
|
| |
Just for consistency with what's in other packages's APKBUILDs.
(cherry picked from commit 7fd6410222bc2a5589f1ac7ad46a6ee697e109ef)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
apache2.pre-upgrade now links to apache2.pre-install.
It's not something we want to do for all packages in master (edge).
apache2 already had .pre-upgrade script (ensuring www-data group
existence and making apache user a member of it), which is what existing
.pre-install script also does, so this kind of unification is fine here.
In most other cases linking .pre-upgrade to .pre-install should happen
only in 3.4-stable branch.
(cherry picked from commit acfb821e3de3f26d07643213662fdedee918e457)
|
|
|
|
|
|
|
|
| |
CVE-2016-0772: smtplib StartTLS stripping attack.
CVE-2016-5636: Heap overflow in zipimporter module .
CVE-2016-5699: HTTP header injection in urrlib2/urllib/httplib/http.client.
fixes #5800
|
| |
|
|
|
|
| |
(cherry picked from commit a98a9d2c96162f9e5bb73a71cb3fc6de5b46aaa7)
|
|
|
|
| |
fixes #5816
|
| |
|
|
|
|
| |
fixes #5812
|
|
|
|
|
|
|
|
|
|
|
| |
tun/tap devices are created inside /dev/net by default, so tun[0-9]*
and tap[0-9]* doesn't match them.
When you run qemu as an unprivileged user, that user must have write
permission on the tun device. The group netdev seems to be appropriate
for this and it's already included in the baselayout's groups.
(cherry picked from commit bd4d9f0257b0c3a6aefe5b6e8d6c3eb986924594)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
fixes #5805
(cherry picked from commit cd81e7c06c1c1196c2b87bdf52a64b2eb39e1bed)
|
|
|
|
|
|
| |
we also need to disable RANDEXEC
(cherry picked from commit d9a924f2e457e76b4a6a3eba2a03e8dc8203340a)
|
|
|
|
|
|
|
| |
this works around problem when building docker
https://github.com/golang/go/issues/16081
(cherry picked from commit e7dca0ffe31a8a865554e8818e66b6ab8617434a)
|
|
|
|
| |
gid 35 is already reserved for group "games"
|
|
|
|
| |
(cherry picked from commit b064ccd99391513e413f6807c6566a8c4af17562)
|
| |
|
|
|
|
|
|
| |
fixes #5729
(cherry picked from commit f8a26e23fbb1e2aba3b77c6a449812e002b20f3f)
|
|
|
|
|
|
| |
Partly implements #5629, USB2 and Gadget (guest) mode only.
(cherry picked from commit 21c7909dd30ea71b0f605a7a08e62f00652f2269)
|
|
|
|
| |
(cherry picked from commit c30e6525162db8c3728eab6ec328a5426e840e9d)
|
|
|
|
| |
(cherry picked from commit bd87780d5cca8b28eb53f39a3c12abc29fc5148a)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
its obsolete
(cherry picked from commit c3ea8c18839b3a25e5ee6e8ec9ca3cb2c7475753)
|
| |
|
| |
|
|
|
|
|
|
| |
The syscall is obsolete and unmaintained upstream.
(cherry picked from commit 3dd682540091a579188076db96c77c4758a4f352)
|
|
|
|
|
|
| |
fixes #3951
(cherry picked from commit 49ffc7a9a06911b8b05a9b011195e42072bd279d)
|
|
|
|
|
|
| |
fixes #5791
(cherry picked from commit 36ab20a1ac9047916d193fc1aae1cf8be6b0ee23)
|
|
|
|
| |
fixes #5738
|
|
|
|
|
|
| |
fixes #5759
(cherry picked from commit 1b0a3e1c91915514f56293cb07768be638846185)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-4962, XSA-175: Unsanitised guest input in libxl device handling code
http://xenbits.xen.org/xsa/advisory-175.html
CVE-2016-4480, XSA-176: x86 software guest page walk PS bit handling flaw
http://xenbits.xen.org/xsa/advisory-176.html
CVE-2016-4963, XSA-178: Unsanitised driver domain input in libxl device handling
http://xenbits.xen.org/xsa/advisory-178.html
CVE-2016-3710 CVE-2016-3712, XSA-179: QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks
http://xenbits.xen.org/xsa/advisory-179.html
CVE-2014-3672, XSA-180: Unrestricted qemu logging
http://xenbits.xen.org/xsa/advisory-180.html
|
|
|
|
| |
(cherry picked from commit 9d0fa15cc4f29630f9813d9a438941a4f019774c)
|
| |
|
|
|
|
|
|
| |
fixes #5772
(cherry picked from commit 34a184ba931dbb3ae96e346f438955810f0eb765)
|
|
|
|
|
|
| |
upstream bug: https://bugs.busybox.net/show_bug.cgi?id=9046
(cherry picked from commit ec5a425f1186566350587d75cafec32802f64f7d)
|
|
|
|
| |
we applied the patch in commit 898dee74 but pkgrel was not bumped.
|
|
|
|
| |
(cherry picked from commit 510da6cf43e86bf53a64a018de95bd1e1621aee1)
|