aboutsummaryrefslogtreecommitdiffstats
path: root/community
Commit message (Collapse)AuthorAgeFilesLines
...
* community/docker: enable on s390xNatanael Copa2018-03-071-2/+2
|
* community/docker: upgrade to 17.12.0Kevin Daudt2018-03-071-10/+8
| | | | switch to a stable release channel instead of docker 'edge'
* Revert "community/texmf-dist: move from testing"William Pitcock2018-03-062-47/+0
| | | | This reverts commit a14600015b1965e2c3815c1e259a6daaab5fdf7c.
* community/texmf-dist: move from testingWilliam Pitcock2018-03-062-0/+47
|
* community/php7: upgrade to 7.1.15Valery Kartel2018-03-031-2/+2
|
* community/php5: upgrade to 5.6.34Valery Kartel2018-03-031-2/+2
|
* community/phpmyadmin: security upgrade to 4.7.8 (CVE-2017-1000499,CVE-2018-7260)Natanael Copa2018-02-271-2/+2
| | | | fixes #8590
* community/drupal7: security upgrade to 7.57Andy Postnikov2018-02-231-2/+2
| | | | https://www.drupal.org/SA-CORE-2018-001
* community/go: security upgrade to 1.9.4 (CVE-2018-6574)Natanael Copa2018-02-221-4/+8
| | | | fixes #8539
* community/webkit2gtk: upgrade to 2.18.6Natanael Copa2018-02-201-2/+2
| | | | fixes #8512
* community/libreoffice: security upgrade to 5.4.5.1 (CVE-2018-6871)Natanael Copa2018-02-201-7/+6
| | | | fixes #8508
* community/zabbix: upgrade to 3.4.7Leonardo Arena2018-02-201-2/+2
|
* community/exim: security upgrade to 4.90.1 (CVE-2018-6789)Valery Kartel2018-02-191-2/+4
| | | | | | Fixes #8505 Signed-off-by: Leonardo Arena <rnalrd@alpinelinux.org>
* community/icingaweb2-module-director: cherry-picked from edge to fix missing ↵Francesco Colista2018-02-171-1/+4
| | | | contrib dir
* community/php7: upgrade to 7.1.14Andy Postnikov2018-02-081-3/+3
|
* community/wireshark: security upgrade to 2.4.4Leonardo Arena2018-02-081-3/+7
| | | | | | CVE-2018-5334, CVE-2018-5335, CVE-2018-5336 Fixes #8434
* community/mpv: security fix CVE-2018-6360Leonardo Arena2018-02-072-3/+115
|
* community/php7: disable checks on ppc64leLeonardo Arena2018-02-071-1/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | ===================================================================== FAILED TEST SUMMARY --------------------------------------------------------------------- Test for blowfish compatibility [ext/mcrypt/tests/blowfish.phpt] OO API [ext/tidy/tests/020.phpt] getConfig() method - basic test for getConfig() [ext/tidy/tests/030.phpt] ===================================================================== ===================================================================== FAILED TEST SUMMARY --------------------------------------------------------------------- Bug #65646 (re-enable CURLOPT_FOLLOWLOCATION with open_basedir or safe_mode): open_basedir disabled [ext/curl/tests/bug65646.phpt] OO API [ext/tidy/tests/020.phpt] getConfig() method - basic test for getConfig() [ext/tidy/tests/030.phpt] ===================================================================== ===================================================================== FAILED TEST SUMMARY --------------------------------------------------------------------- Test for bug 52013 about Phar::decompressFiles(). [ext/phar/tests/bug52013.phpt] Phar: test readfile() interception [ext/phar/tests/readfile.phpt] OO API [ext/tidy/tests/020.phpt] getConfig() method - basic test for getConfig() [ext/tidy/tests/030.phpt] =====================================================================
* main/php5: security upgrade to 5.6.33Andy Postnikov2018-02-061-3/+6
| | | | | | | | | - CVE-2018-5711 - CVE-2018-5712 Ref http://php.net/archive/2018.php#id2018-01-04-4 (cherry picked from commit 5e4dbc0d75238b02e3ad3bd55b5ac3a8b74bab3a)
* community/php7: security upgrade to 7.1.13Andy Postnikov2018-02-062-35/+5
| | | | | | | - CVE-2018-5711 - CVE-2018-5712 Ref http://php.net/archive/2018.php#id2018-01-04-3
* community/firefox-esr: security upgrade to 52.6.0Leonardo Arena2018-01-251-2/+19
| | | | | | CVE-2018-5089 CVE-2018-5091 CVE-2018-5095 CVE-2018-5096 CVE-2018-5097 CVE-2018-5098 CVE-2018-5099 CVE-2018-5102 CVE-2018-5103 CVE-2018-5104 CVE-2018-5117
* community/nextcloud: upgrade to 12.0.5Leonardo Arena2018-01-241-3/+3
|
* community/wireshark: enable RTP streams playbackLeonardo Arena2018-01-191-3/+7
| | | | | | Enable check() (cherry picked from commit 9e81be5f331abefc06aa5f2dec67f906d45e13d2)
* community/firefox-esr: upgrade to 52.5.3Leonardo Arena2018-01-081-2/+2
|
* community/bzr: security fix (CVE-2017-14176)Leonardo Arena2017-12-292-10/+177
| | | | Fixes #8298
* community/zabbix: upgrade to 3.4.5Leonardo Arena2017-12-281-2/+2
|
* community/gimp: security fixesLeonardo Arena2017-12-287-3/+373
| | | | | | | | CVE-2017-17784, CVE-2017-17785, CVE-2017-17786, CVE-2017-17787, CVE-2017-17789 Fixes #8351 CVE-2017-17788 applies only to >= v2.9.6
* community/webkit2gtk: security upgrade to 2.18.4Natanael Copa2017-12-261-2/+8
| | | | | | | | | | CVE-2017-7156 CVE-2017-7157 CVE-2017-13856 CVE-2017-13866 CVE-2017-13870 fixes #8334
* community/wireshark: security upgrade to 2.4.3 (CVE-2017-17083, ↵Francesco Colista2017-12-171-3/+7
| | | | CVE-2017-17084, CVE-2017-17085). Fixes #8269
* community/pdns-recursor: security upgrade to 4.0.7 ↵Francesco Colista2017-12-151-3/+10
| | | | (CVE-2017-15090-15092-15093-15094). Fixes #8254
* community/pdns: security upgrade to 4.0.5 (CVE-2017-15091). Fixes #8251Francesco Colista2017-12-151-3/+7
|
* community/exim: security upgrade to 4.89.1 (CVE-2017-16944). Fixes #8288Francesco Colista2017-12-151-9/+7
|
* community/homer-api: apply LDAP security fixKaarle Ritvanen2017-12-142-4/+34
|
* community/nextcloud: fix update on PGSQL10Leonardo Arena2017-12-122-1/+23
| | | | | | GH#5930 (cherry picked from commit 52c914aa8a597c5803e349c250ee9461f32f42cd)
* community/graphicsmagick: security upgrade to 1.3.27.Francesco Colista2017-12-111-29/+13
| | | | | - Fixes #8095 - Fixes #7943 (last CVE was not fixed since the patch did not apply)
* community/nodejs-current: upgrade to 9.2.1Jakub Jirutka2017-12-091-2/+8
| | | | | | | See: https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/ CVE-2017-3738 does not affect our package, because we don't use bundled OpenSSL library. I'm not sure about CVE-2017-15896.
* community/borgbackup: upgrade to 1.1.3Jakub Jirutka2017-12-081-2/+2
|
* community/imagemagick6: upgrade to 6.9.9.26Jakub Jirutka2017-12-081-2/+2
|
* community/tor: security upgrade to 0.3.1.9Natanael Copa2017-12-071-3/+3
| | | | | | | | | | CVE-2017-8819 TROVE-2017-009: Replay-cache ineffective for v2 onion services CVE-2017-8820 TROVE-2017-010: Remote DoS attack against directory authorities CVE-2017-8821 TROVE-2017-011: An attacker can make Tor ask for a password CVE-2017-8822 TROVE-2017-012: Relays can pick themselves in a circuit path CVE-2017-8823 TROVE-2017-013: Use-after-free in onion service v2 fixes #8247
* community/nextcloud: upgrade to 12.0.4Leonardo Arena2017-12-054-434/+3
| | | | (cherry picked from commit a3ab3a5186575f9ccb06789a864452359e0e5b22)
* community/ruby-nokogiri: rebuild against libxml 2.9.7Jakub Jirutka2017-12-041-1/+1
| | | | | | To get rid of this warning message after loading: WARNING: Nokogiri was built against LibXML version 2.9.6, but has dynamically loaded 2.9.7
* community/php7-memcached: upgrade to 3.0.4Andy Postnikov2017-12-031-3/+3
|
* community/imagemagick6: upgrade to 6.9.9.25Jakub Jirutka2017-12-031-2/+2
|
* community/virtualbox-guest-additions: upgrade to 5.1.30Natanael Copa2017-12-011-2/+2
| | | | (cherry picked from commit 62b8ba5f8fe6d62d56b2d078b4f12f72830ee4af)
* community/webkit2gtk: remove core binaryNatanael Copa2017-11-301-0/+0
| | | | was never suppoed to enter the repo
* community/py3-aiohttp: upgrade to 2.3.4Francesco Colista2017-11-301-3/+3
|
* community/perl-moose: upgrade to 2.2009Francesco Colista2017-11-301-2/+2
|
* community/webkit2gtk: upgrade to 2.18.3Natanael Copa2017-11-305-42/+45
| | | | | | | | | fixes #8193 CVE-2017-13783, CVE-2017-13784, CVE-2017-13785, CVE-2017-13788, CVE-2017-13791, CVE-2017-13792, CVE-2017-13793, CVE-2017-13794, CVE-2017-13795, CVE-2017-13796, CVE-2017-13798, CVE-2017-13802, CVE-2017-13803
* community/gammu: upgrade to 1.38.5 and modernize abuildTBK2017-11-292-28/+46
|
* unmaintained/ruby2.2: move from communityJakub Jirutka2017-11-291-191/+0
| | | | | | Ruby 2.2 is currently in "security maintenance" phase and EOL (end of life) is scheduled for 2018-03-31. This is less than support period for packages in the community repository (6 months).