aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* main/spl-grsec: rebuild against kernel 4.4.52-r0Natanael Copa2017-02-281-1/+1
|
* main/open-vm-tools-grsec: rebuild against kernel 4.4.52-r0Natanael Copa2017-02-281-1/+1
|
* main/ipfw-grsec: rebuild against kernel 4.4.52-r0Natanael Copa2017-02-281-1/+1
|
* main/drbd9-grsec: rebuild against kernel 4.4.52-r0Natanael Copa2017-02-281-1/+1
|
* main/devicemaster-linux-grsec: rebuild against kernel 4.4.52-r0Natanael Copa2017-02-281-1/+1
|
* main/dahdi-linux-grsec: rebuild against kernel 4.4.52-r0Natanael Copa2017-02-281-1/+1
|
* main/linux-grsec: upgrade to 4.4.52Natanael Copa2017-02-281-7/+7
|
* main/acf-core: upgrade to 0.21.0Ted Trask2017-02-271-5/+3
| | | | (cherry picked from commit a833ffd23fed18614233166946b4f8341c5a26ef)
* main/acf-lib: upgrade to 0.10.0Ted Trask2017-02-271-5/+3
| | | | (cherry picked from commit 35961cf446867c55f378b508517422d36660bb2f)
* community/zoneminder: security upgrade to 1.30.2Kaarle Ritvanen2017-02-241-11/+8
| | | | ref #6913
* main/wireshark: security fixes #6907Sergey Lukin2017-02-232-9/+77
| | | | CVE-2017-6014: Memory exhaustion/infinite loop via malformed STANAG 4607 capture file
* main/uwsgi: fix config files perms, explicitly set perms for allJakub Jirutka2017-02-221-6/+6
| | | | | /etc/uwgi/uwsgi.ini and /etc/uwsgi/conf.d/readme.emperor had executable bit.
* main/acf-freeradius3: upgrade to 0.3.1Ted Trask2017-02-221-5/+3
| | | | (cherry picked from commit 7b8d41699ae88a726e7203d0ba67c025e4ae5169)
* main/curl: patch for CVE-2017-2629Sören Tempel2017-02-222-7/+49
|
* community/webkit2gtk: security upgrade to 2.14.5 - fixes #6888Sergey Lukin2017-02-221-4/+20
| | | | | | | | | | | | | | | CVE-2017-2350 CVE-2017-2354 CVE-2017-2355 CVE-2017-2356 CVE-2017-2362 CVE-2017-2363 CVE-2017-2364 CVE-2017-2365 CVE-2017-2366 CVE-2017-2369 CVE-2017-2371 CVE-2017-2373
* main/boost: fix boost_python3Natanael Copa2017-02-204-9/+116
| | | | | | fixes #6874 upstream: https://github.com/boostorg/build/issues/163
* community/php7: upgrade to 7.0.16Andy Postnikov2017-02-181-4/+4
| | | | Bug fix release http://php.net/archive/2017.php#id2017-02-16-1
* main/ffmpeg: security upgrade to 3.1.7 - fixes #6870Sergey Lukin2017-02-161-4/+10
| | | | | CVE-2017-5024 (arbitrary code execution) CVE-2017-5025 (arbitrary code execution)
* main/vim: security upgrade to 8.0.0329 - fixes #6863Sergey Lukin2017-02-161-4/+7
| | | | CVE-2017-5953: Tree length values not validated properly when handling a spell file
* main/owncloud: upgrade to 9.1.4Leonardo Arena2017-02-131-13/+13
|
* main/bind: security upgrade to 9.10.4_p6 - fixes #6829Sergey Lukin2017-02-131-5/+7
| | | | CVE-2017-3135: Combination of DNS64 and RPZ Can Lead to Crash
* main/postfixadmin: security upgrade to 3.0.2 - fixes #6835Sergey Lukin2017-02-131-15/+15
| | | | | | CVE-2017-5930: allows to delete protected aliases https://svn.code.sf.net/p/postfixadmin/code/trunk/CHANGELOG.TXT
* main/postgresql: update to 9.6.2Jakub Jirutka2017-02-131-4/+4
|
* main/opensmtpd: fix libressl arc4random circularityCarlo Landmeter2017-02-102-5/+44
|
* community/racktables: upgrade to 0.20.12Leonardo Arena2017-02-091-4/+4
| | | | (cherry picked from commit c78947b324c68dd1f194880e5b2a19963cbc25fe)
* main/nss: fix checksumTimo Teräs2017-02-091-0/+6
| | | | (cherry picked from commit b1397dbdb8c571b5368878b0624d30ef233c47b4)
* main/nss: add nss-softokn and nss-util pkgconfig filesTimo Teräs2017-02-093-12/+42
| | | | (cherry picked from commit 8e7189a1617d04d056d6936f4924d8ea7b647dc0)
* community/openjdk8: security upgrade to 3.3.0 (java 8 u121)Timo Teräs2017-02-092-54/+68
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | enable sunec (ref #6809) S8138725: Add options for Javadoc generation S8140353: Improve signature checking S8151934, CVE-2017-3231: Resolve class resolution S8156804, CVE-2017-3241: Better constraint checking S8158406: Limited Parameter Processing S8158997: JNDI Protocols Switch S8159507: RuntimeVisibleAnnotation validation S8161218: Better bytecode loading S8161743, CVE-2017-3252: Provide proper login context S8162577: Standardize logging levels S8162973: Better component components S8164143, CVE-2017-3260: Improve components for menu items S8164147, CVE-2017-3261: Improve streaming socket output S8165071, CVE-2016-2183: Expand TLS support S8165344, CVE-2017-3272: Update concurrency support S8166988, CVE-2017-3253: Improve image processing performance S8167104, CVE-2017-3289: Additional class construction refinements S8167223, CVE-2016-5552: URL handling improvements S8168705, CVE-2016-5547: Better ObjectIdentifier validation S8168714, CVE-2016-5546: Tighten ECDSA validation S8168728, CVE-2016-5548: DSA signing improvments S8168724, CVE-2016-5549: ECDSA signing improvments (cherry picked from commit 51235b6d75fcf6e3cea97c71c2f89d79fb0f7d48)
* main/wireshark: security upgrade to 2.2.4 - fixes #6823Sergey Lukin2017-02-081-4/+8
| | | | | CVE-2017-5596: ASTERIX infinite loop CVE-2017-5597: DHCPv6 large loop
* main/git: Upgrade to 2.11.1pbregener2017-02-071-4/+4
| | | | (cherry picked from commit e4a237db89475f7747c8ad13feea37f51a10d7da)
* community/php7-apcu: upgrade to 5.1.8Andy Postnikov2017-02-071-4/+4
| | | | | | | | | | Bugfix release for PHP 7 - fix #207 Segmentation fault in apc_sma_api_free() - fix #221 memory leak - update to apc dashboard (Tyson Andre) https://pecl.php.net/package-changelog.php?package=APCu&release=5.1.8
* main/tcpdump: security upgrade to 4.9.0 - fixes #6812Sergey Lukin2017-02-071-5/+50
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CVE-2016-7922 (arbitrary code execution) CVE-2016-7923 (arbitrary code execution) CVE-2016-7924 (arbitrary code execution) CVE-2016-7925 (arbitrary code execution) CVE-2016-7926 (arbitrary code execution) CVE-2016-7927 (arbitrary code execution) CVE-2016-7928 (arbitrary code execution) CVE-2016-7929 (arbitrary code execution) CVE-2016-7930 (arbitrary code execution) CVE-2016-7931 (arbitrary code execution) CVE-2016-7932 (arbitrary code execution) CVE-2016-7933 (arbitrary code execution) CVE-2016-7934 (arbitrary code execution) CVE-2016-7935 (arbitrary code execution) CVE-2016-7936 (arbitrary code execution) CVE-2016-7937 (arbitrary code execution) CVE-2016-7938 (arbitrary code execution) CVE-2016-7939 (arbitrary code execution) CVE-2016-7940 (arbitrary code execution) CVE-2016-7973 (arbitrary code execution) CVE-2016-7974 (arbitrary code execution) CVE-2016-7975 (arbitrary code execution) CVE-2016-7983 (arbitrary code execution) CVE-2016-7984 (arbitrary code execution) CVE-2016-7985 (arbitrary code execution) CVE-2016-7986 (arbitrary code execution) CVE-2016-7992 (arbitrary code execution) CVE-2016-7993 (arbitrary code execution) CVE-2016-8574 (arbitrary code execution) CVE-2016-8575 (arbitrary code execution) CVE-2017-5202 (arbitrary code execution) CVE-2017-5203 (arbitrary code execution) CVE-2017-5204 (arbitrary code execution) CVE-2017-5205 (arbitrary code execution) CVE-2017-5341 (arbitrary code execution) CVE-2017-5342 (arbitrary code execution) CVE-2017-5482 (arbitrary code execution) CVE-2017-5483 (arbitrary code execution) CVE-2017-5484 (arbitrary code execution) CVE-2017-5485 (arbitrary code execution) CVE-2017-5486 (arbitrary code execution)
* main/wavpack: security upgrade to 5.1.0 - fixes #6818Sergey Lukin2017-02-071-13/+17
| | | | | | | CVE-2016-10169: global buffer overread in read_code / read_words.c CVE-2016-10170: Heap out of bounds read in WriteCaffHeader / caff.c CVE-2016-10171: heap out of bounds read in unreorder_channels / wvunpack.c CVE-2016-10172: Heap out of bounds read in read_new_config_info / open_utils.c
* main/libevent: security fixes #6799Sergey Lukin2017-02-074-9/+290
| | | | | | CVE-2016-10195: dns remote stack overread vulnerability CVE-2016-10196: (stack) buffer overflow in evutil_parse_sockaddr_port() CVE-2016-10197: out-of-bounds read in search_make_new()
* community/salt: security upgrade to 2016.11.2 - fixes #6803Sergey Lukin2017-02-061-4/+11
| | | | | CVE-2017-5192: local_batch client external authentication not respected CVE-2017-5200: Salt-api allows arbitrary command execution on a salt-master via Salt's ssh_client
* community/chromium: security upgrade to 56.0.2924.76Jakub Jirutka2017-02-022-7/+70
| | | | fixes #6787
* main/apk-tools: fix error message short readNatanael Copa2017-02-022-4/+45
| | | | | | also triggers rebuild which might fix apk.static (ref #6795) (cherry picked from commit 5ef7a332f8186986761c3280b8b2c2bf1c02f230)
* main/xen: fix secdb commentNatanael Copa2017-02-011-4/+4
| | | | replace tabs with space
* main/libarchive: security fixes #6791Sergei Lukin2017-02-012-5/+40
| | | | CVE-2017-5601: Out of bounds read in lha_read_file_header_1() function
* main/ansible: security upgrade to 2.2.1.0 - fixes #6783Sergei Lukin2017-02-011-4/+9
| | | | CVE-2016-9587: host to controller command execution vulnerability
* main/lcms2: security fixes #6778Sergei Lukin2017-02-012-9/+39
| | | | CVE-2016-10165: Out-of-bounds read in Type_MLU_Read()
* main/bzip2: fix secfixes commentNatanael Copa2017-02-011-1/+2
|
* main/ulogd: bump pkgrel to build ulogd_output_PCAP.soBartłomiej Piotrowski2017-02-011-1/+1
| | | | | | For some reason 3.5 builders failed to build ulogd_output_PCAP.so properly, while it is present in both 3.4 and edge. Simple rebuild fixes that.
* main/lighttpd: upgrade to 1.4.45Łukasz Jendrysik2017-01-311-4/+4
| | | | (cherry picked from commit 5f63fb537b4d2008af0fea3d3035ab03d22748ab)
* main/lighttpd: upgrade to 1.4.44André Klitzing2017-01-311-4/+4
| | | | (cherry picked from commit 2cc0910fda6fa2a5050af4239eef196d797e68a2)
* community/firefox-esr: security upgrade to 45.7.0 - fixes #6747Sergei Lukin2017-01-271-9/+22
| | | | | | | | | | | | CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP CVE-2017-5376: Use-after-free in XSL CVE-2017-5378: Pointer and frame data leakage of Javascript objects CVE-2017-5380: Potential use-after-free during DOM manipulations CVE-2017-5383: Location bar spoofing with unicode characters CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer CVE-2017-5396: Use-after-free with Media Decoder
* scripts/mkimg: raspberry pi bootloader 2017-01-25Timo Teräs2017-01-271-1/+1
| | | | (cherry picked from commit 5164608aabae7bd063a7a58573e2e297c8a66584)
* community/borgbackup: security upgrade to 1.0.9 (CVE-2016-10099,CVE-2016-10100)Natanael Copa2017-01-271-4/+4
| | | | fixes #6762
* scripts/mkimage: fix generation of checksumsNatanael Copa2017-01-272-2/+2
| | | | | | we need remove the leading path to file (cherry picked from commit 26766bf9d25397508131386f6db9d727b684a473)
* scripts/mkimage-yaml: fix branchNatanael Copa2017-01-271-5/+11
| | | | | | | | we need get the branch from tag instead of git branch, because we generate releasecandidates and the first stable release from git master and only do the git branch after the release is done. (cherry picked from commit 752bd10135e430259e3fe9bf11e69822210b3fcb)