aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* main/tiff: various security fixesNatanael Copa2018-08-025-2/+283
| | | | | | | | | | - CVE-2017-9935 - CVE-2017-11613 - CVE-2017-17095 - CVE-2018-10963 fixes #8241 fixes #9164
* main/fuse: security upgrade to 2.9.8 (CVE-2018-10906)Natanael Copa2018-07-301-9/+7
| | | | fixes #9153
* main/fuse: Move /etc/udev/rules.d to /libMax Rees2018-07-301-2/+2
| | | | See: https://github.com/alpinelinux/aports/pull/3759#issuecomment-376883202
* main/kamailio: upgrade to 5.0.7Leonardo Arena2018-07-301-2/+2
|
* community/prosody: security upgrade to 0.10.2 (CVE-2018-10847)Natanael Copa2018-07-301-3/+7
| | | | fixes #9038
* main/libvorbis: security fix for CVE-2018-10392Natanael Copa2018-07-302-3/+33
| | | | fixes #9141
* main/libvorbis: upgrade to 1.3.6, enable testsprspkt2018-07-303-35/+19
| | | | fixes #8671
* main/mercurial: security upgrade to 4.5.2 (CVE-2018-1000132)Natanael Copa2018-07-301-2/+6
| | | | fixes #8826
* community/roundcubemail: fix missing JS libsJakub Jirutka2018-07-281-3/+3
|
* main/mutt: security upgrade to 1.10.1Natanael Copa2018-07-241-4/+19
| | | | | | | | CVE-2018-14349, CVE-2018-14350, CVE-2018-14351, CVE-2018-14352, CVE-2018-14353, CVE-2018-14354, CVE-2018-14355, CVE-2018-14356, CVE-2018-14357, CVE-2018-14358, CVE-2018-14359, CVE-2018-14362 fixes #9130
* community/php5: security upgrade to 5.6.37Andy Postnikov2018-07-241-2/+2
| | | | requested by andypost
* community/nextcloud: upgrade to 12.0.10Leonardo Arena2018-07-241-2/+2
|
* main/mqtt-exec: backport password auth supportNatanael Copa2018-07-183-78/+92
| | | | and remove unused patch
* main/znc: security upgrade to 1.7.1 (CVE-2018-14055,CVE-2018-14056)Natanael Copa2018-07-181-5/+10
| | | | fixes #9102
* main/openssl: fix CVE-2018-0732 and CVE-2018-0737Timo Teräs2018-07-183-2/+76
| | | | | fixes #8814 fixes #9009
* main/asterisk: security upgrade to 15.5.0Timo Teräs2018-07-181-2/+2
| | | | | | | AST-2018-007: Infinite loop when reading iostreams AST-2018-008: PJSIP endpoint presence disclosure when using ACL (cherry picked from commit 40fd8ce8d8419d7627964e69c29ea7c30b65a953) (cherry picked from commit 4c6b45d7a5f74edf465b9f41c36dbd96182c8592)
* main/curl: upgrade to 7.61.0, add secfixes commentprspkt2018-07-131-5/+7
|
* community/firefox-esr: security upgrade to 52.8.1 (CVE-2018-6126)Natanael Copa2018-07-111-2/+4
| | | | fixes #9036
* main/acf-alpine-baselayout: upgrade to 0.13.2Ted Trask2018-06-261-5/+4
| | | | (cherry picked from commit 26a78bb0bddafc8ca808b00f83f4d304f8c5c7bf)
* main/xen: XSA-263 & 267Henrik Riomar2018-06-2225-1/+4078
| | | | | - CVE-2018-3639 XSA-263 (depends on 5 patches from stable-4.9) - CVE-2018-3665 XSA-267 (depends on 3 patches from stable-4.9)
* main/one-context: upgrade to 0.5.4Jakub Jirutka2018-06-221-2/+2
|
* main/vlan: fix support for both ipv4 and ipv6 address on vlansNatanael Copa2018-06-212-12/+9
| | | | fixes #9018
* Revert "main/vlan: check if subinterface already exists"Kaarle Ritvanen2018-06-213-19/+15
| | | | | | This reverts commit 6073409488faf0051dc1f188042f444bbd4c4743. Reason: bashism (trap ERR)
* main/vlan: check if subinterface already existsAnthony Ruhier2018-06-213-15/+19
| | | | | | | | | The vlan preup script tried to create the subinterface even if it already exists. It does not work on dualstack (ipv4 + ipv6) configurations, and on subinterfaces with multiple addresses setup. Now the vlan and mvlan scripts check if the interface does not already exist, and only if it does not, try to create it.
* main/vlan: do not fail if iface existsKaarle Ritvanen2018-06-212-4/+6
|
* main/libgcrypt: security upgrade to 1.8.3Natanael Copa2018-06-192-3/+55
| | | | fixes #9004
* main/redis: security upgrade to 4.0.10 (CVE-2018-11218,CVE-2018-11219)Natanael Copa2018-06-191-2/+7
| | | | fixes #9021
* community/openjdk7: upgrade to 7.181.2.6.14J0WI2018-06-153-94/+94
|
* [various]: unify names of licenses according to SPDXJakub Jirutka2018-06-151-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates $license variable in all APKBUILDs to comply with short names specified by SPDX version 3.0 [1] where possible. It was done using find-and-replace method on substrings inside $license variables. Only license names were updated, not "expressions" specifying relation between the licenses (e.g. "X and Y", "X or Y", "X and (Y or Z)") or exceptions (e.g. "X with exceptions"). Many licenses have a version or multiple variants, e.g. MPL-2.0, BSD-2-Clause, BSD-3-Clause. However, $license in many aports do not contain license version or variant. Since there's no way how to infer this information just from abuild, it were left without the variant suffix or version, i.e. non SPDX compliant. GNU licenses (AGPL, GFDL, GPL, LGPL) are especially complicated. They exist in two variants: -only (formerly e.g. GPL-2.0) and -or-later (formerly e.g. GPL-2.0+). We did not systematically noted distinguish between these variants, so GPL-2.0, GPL2, GPLv2 etc. may mean GPL-2.0-only or GPL-2.0-or-later. Thus GNU licenses without "+" (e.g. GPL2+) were left without the variant suffix, i.e. non SPDX compliant. Note: This commit just fixes format of the license names, no verification has been done if the specified license information is actually correct! [1]: https://spdx.org/licenses/
* main/libressl: upgrade to 2.6.5, add secfixes commentJ0WI2018-06-151-5/+8
|
* community/openjdk8: upgrade to 3.8.0 (java 8u171b11)J0WI2018-06-132-19/+19
|
* community/openjdk8: upgrade to 3.7.0 (java 8u161b12)Timo Teräs2018-06-133-30/+17
| | | | | fixes #3678 ref https://github.com/alpinelinux/aports/pull/3678
* main/gnupg: security fix (CVE-2018-12020)Leonardo Arena2018-06-132-3/+53
| | | | Fixes #8994
* main/freetype: security fix (CVE-2018-6942)Leonardo Arena2018-06-132-1/+43
| | | | Fixes #8988
* main/perl: security fix (CVE-2018-12015)Leonardo Arena2018-06-132-2/+47
| | | | Fixes #8983
* main/wavpack: add secfixesprspkt2018-06-113-2/+143
| | | | | | | | | | | fixes for: -CVE-2018-10536 -CVE-2018-10537 -CVE-2018-10538 -CVE-2018-10539 -CVE-2018-10540 Fixes #8912
* main/wavpack: security fixesLeonardo Arena2018-06-114-14/+231
| | | | | | CVE-2018-6767, CVE-2018-7253, CVE-2018-7254 Fixes #8592
* community/wireshark: security upgrade to 2.4.7Leonardo Arena2018-06-111-2/+9
| | | | | | | CVE-2018-11356, CVE-2018-11357, CVE-2018-11358, CVE-2018-11359, CVE-2018-11360, CVE-2018-11362 Fixes #8932
* main/strongswan: security upgrade to 5.6.3 (CVE-2018-5388)Leonardo Arena2018-06-111-2/+4
| | | | Fixes #8955
* community/nextcloud: upgrade to 12.0.8Leonardo Arena2018-06-081-2/+2
|
* main/sdl2_image: security fixes. Fixes #8941Francesco Colista2018-06-0611-3/+361
| | | | | | | | | | | | | | Security fixes for the following CVEs: CVE-2017-12122 CVE-2017-14440 CVE-2017-14441 CVE-2017-14442 CVE-2017-14448 CVE-2017-14450 CVE-2018-3837 CVE-2018-3838 CVE-2018-3839
* main/xfsprogs: fix owner of filesNatanael Copa2018-06-061-1/+2
| | | | fixes #8967
* main/busybox: rebuild to make sure package is signedNatanael Copa2018-06-061-1/+1
| | | | | | | The -r10 package got not properly signed due to ABI breakage in openssl (commit 1b2b08e28cbf2539b23cd4fc487cf00caaf19163) Bump pkgrel so we rebuild it.
* main/abuild: fix race when strippingNatanael Copa2018-06-012-2/+39
|
* main/git: security upgrade to 2.15.2 (CVE-2018-11233,CVE-2018-11235)Natanael Copa2018-05-301-3/+6
| | | | fixes #8947
* main/binutils: backport fix for ppc64leNatanael Copa2018-05-302-1/+96
| | | | | | | | | | This fixes clang testsuite. Patch was taken from upstream binutils-2_30-branch https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=shortlog;h=refs/heads/binutils-2_30-branch Upstream report: https://sourceware.org/ml/binutils/2018-03/msg00183.html
* main/binutils: upgrade to 2.30Natanael Copa2018-05-303-439/+3
| | | | ref #7314
* Revert "main/libressl: add options -verify_{hostname,email,ip} to s_client"Natanael Copa2018-05-303-109/+2
| | | | | | | | | | This patch introduced new symbols that broke pip cryptography=2.2.2. The busybox wget issue was fixed by implementing ssl_client so this backport is no longer needed. ref #8939 This reverts commit 3cf23fc4eefde870de2c80c0dae5a3f48d676c1f.
* main/busybox: properly fix wget https supportNatanael Copa2018-05-307-170/+307
| | | | | | | | | | | | | | | | | | | | | fix busybox wget https support by using an external ssl_client helper for https. Disable the use of external openssl. This was fixed to check certificates as a temporary solution. openssl can not produce any useful error messages on certificate errors. It is big. So we simply disable its use. For dynamic busybox we disable the internal ssl_client and the internal (broken) tls code, and build our own ssl_client which properly verifies the certificates. For the static busybox we enable the internal ssl_client and tls code, but we only allow its use with --no-check-certificates. This is so we still can fetch things from https in an emergency situation. We auto-install ssl_client if both libssl and busybox are installed. This is to keep backwards compatibility.
* community/nextcloud: upgrade to 12.0.7Leonardo Arena2018-05-302-48/+2
|