summaryrefslogtreecommitdiffstats
path: root/main
Commit message (Collapse)AuthorAgeFilesLines
* main/glew: fix -dev dependenciesTimo Teräs2015-02-021-2/+3
|
* main/fping: enable suid root for fping6Natanael Copa2015-02-021-2/+2
| | | | | | | | | | | | | | | | | | | | | | | It should be possible to make ping work as normal user with recent linux: https://lkml.org/lkml/2011/5/13/382 However, it appears that it requires relatively intrusive changes in the ping utility. Its not just opening the socket as SOCK_DGRAM and think everything is ok (like it appears to work on OSX) Busybox tried to add support for it: http://git.busybox.net/busybox/commit/networking/ping.c?id=72745632a13ccd12232127b31e1656f2f7ebcaff But later reverted it: http://git.busybox.net/busybox/commit/networking/ping.c?id=f0058b1b1fe9f7e69b415616096fb9347f599426 The patch for the normal ping utility is also relatively intrusive: http://openwall.info/wiki/_media/segoon/iputils-ss020927-pingsock.diff I could also not find anything that indicates that this works for ipv6 in kernel. There are no /proc/sys/net/ipv6/ping_group_range So it looks like we need to set suid root for now.
* main/grep: security fix for CVE-2015-1345Natanael Copa2015-02-022-6/+155
| | | | ref #3864
* main/patch: security fix for CVE-2015-119Natanael Copa2015-02-022-3/+192
| | | | ref #3854
* main/fping: fix fping6Natanael Copa2015-02-023-5/+59
| | | | we add workarounds for a couple of issues in musl libc
* main/acf-mariadb: Renamed from acf-mysql and bumped to 0.1.2Ted Trask2015-01-302-25/+26
|
* main/strongswan: security upgrade to 5.2.2 (CVE-2014-9221)Timo Teräs2015-01-301-5/+5
|
* main/geany: fix vte emulation (with patch)AmatCoder2015-01-302-7/+19
|
* main/linux-vanilla: upgrade to 3.14.31Natanael Copa2015-01-301-4/+4
|
* main/linux-grsec: remove unused patchNatanael Copa2015-01-301-126276/+0
|
* main/krb5: security fixes for CVE-2014-5353, CVE-2014-5354Natanael Copa2015-01-303-1/+185
| | | | ref #3799
* main/antiword: security fix for CVE-2014-8123Natanael Copa2015-01-302-5/+47
| | | | ref #3784
* main/sox: security fix for CVE-2014-8145Timo Teräs2015-01-303-1/+65
| | | | ref #3822
* main/lsyncd: additional fixes to lpostcmdTimo Teräs2015-01-306-37/+141
|
* main/gvfs: upgrade to 1.22.3Natanael Copa2015-01-291-5/+5
|
* main/gvfs: enable MTP supportNatanael Copa2015-01-291-2/+11
|
* main/jasper: security fix for CVE-2014-9029Natanael Copa2015-01-292-2/+47
| | | | ref #3779
* main/qemu: security fix for CVE-2014-8106Natanael Copa2015-01-292-2/+111
|
* main/yaml: security fix for CVE-2014-9130Natanael Copa2015-01-292-5/+38
| | | | ref #3771
* main/qt5-qttranslations: upgrade to 5.4.0Natanael Copa2015-01-291-4/+4
|
* main/qt5-qttools: upgrade to 5.4.0Natanael Copa2015-01-291-4/+4
|
* main/qt5-qtwebkit: upgrade to 5.4.0Natanael Copa2015-01-292-11/+11
|
* main/qt5-qtsvg: upgrade to 5.4.0Natanael Copa2015-01-291-4/+4
|
* main/qt5-qtquickcontrols: upgrade to 5.4.0Natanael Copa2015-01-291-4/+4
|
* main/qt5-qtquick1: upgrade to 5.4.0Natanael Copa2015-01-291-4/+4
|
* main/qt5-qtscript: upgrade to 5.4.0Natanael Copa2015-01-291-4/+4
|
* main/qt5-qtmultimedia: upgrade to 5.4.0Natanael Copa2015-01-291-4/+4
|
* main/qt5-qtimageformats: upgrade to 5.4.0Natanael Copa2015-01-291-4/+4
|
* main/qt5-qtdeclarative: upgrade to 5.4.0Natanael Copa2015-01-291-5/+5
|
* main/qt5-qtgraphicaleffects: upgrade to 5.4.0Natanael Copa2015-01-291-4/+4
|
* main/qt5-qtbase: upgrade to 5.4.0Natanael Copa2015-01-291-6/+5
|
* main/qt5-base: replace mysql with mariadbNatanael Copa2015-01-291-2/+2
|
* main/mpv: upgrade to 0.7.3Łukasz Jendrysik2015-01-291-4/+4
|
* main/clamav: upgrade to 0.98.6Łukasz Jendrysik2015-01-291-5/+6
|
* main/bison: upgrade to 3.0.4Łukasz Jendrysik2015-01-291-4/+5
|
* main/eglibc: removeNatanael Copa2015-01-296-401/+0
| | | | | we dont use it, we dont support it. it makes people who heard of GHOST vulnerability worried.
* main/asterisk: security upgrade to 13.1.1Timo Teräs2015-01-291-2/+5
| | | | | AST-2015-001: File descriptor leak when incompatible codecs are offered (chan_pjsip) AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability
* main/linux-vanilla: upgrade to 3.14.30Natanael Copa2015-01-281-4/+4
|
* main/linux-rpi: upgrade to 3.14.30Timo Teräs2015-01-281-4/+4
|
* main/linux-vanilla: upgrade to 3.14.20Natanael Copa2015-01-281-4/+4
|
* main/mpd: recompile with new gcc and abuildTimo Teräs2015-01-281-1/+1
| | | | fixes #3680, and should fix -dbg to have more complete debug info
* main/abuild: fix CXXFLAGS for debugNatanael Copa2015-01-282-4/+32
|
* main/gcc: cherry-pick fix for pr64037, and update ada pkgdescTimo Teräs2015-01-282-4/+91
| | | | ref #3680
* main/linux-virt-grsec: upgrade to 3.14.30Leonardo Arena2015-01-284-10/+9
|
* main/xtables-addons-grsec: rebuild against kernel 3.14.30-r0Natanael Copa2015-01-281-2/+2
|
* main/open-vm-tools-grsec: rebuild against kernel 3.14.30-r0Natanael Copa2015-01-281-2/+2
|
* main/ipfw-grsec: rebuild against kernel 3.14.30-r0Natanael Copa2015-01-281-2/+2
|
* main/dahdi-linux-grsec: rebuild against kernel 3.14.30-r0Natanael Copa2015-01-281-2/+2
|
* main/linux-grsec: upgrade to 3.14.30Natanael Copa2015-01-283-47/+126508
|
* main/mailx: bsd-compat-headers build fixNatanael Copa2015-01-281-1/+1
|