aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* main/nss: upgrade to 3.14.1.1.93Bartłomiej Piotrowski2013-01-121-6/+8
|
* main/ffmpeg: upgrade to 1.1Bartłomiej Piotrowski2013-01-121-1/+1
|
* main/bitlbee: upgrade to 3.2Bartłomiej Piotrowski2013-01-121-1/+1
|
* main/eglibc: really remove tzselectCarlo Landmeter2013-01-111-2/+3
|
* main/tzdata: fix for eglibcCarlo Landmeter2013-01-111-4/+12
|
* main/eglibc: cleanup and remove tzselectCarlo Landmeter2013-01-111-6/+20
|
* main/xf86-video-mach64: upgrade to 6.9.4Natanael Copa2013-01-111-3/+3
|
* main/xf86-video-cirrus: upgrade to 1.5.2Natanael Copa2013-01-111-3/+3
|
* main/parole: upgrade to 0.4.0Natanael Copa2013-01-111-2/+2
|
* main/dhcpcd: upgrade to 5.6.4Natanael Copa2013-01-111-2/+2
|
* main/ruby-sprockets: upgrade to 2.2.1Carlo Landmeter2013-01-101-2/+2
|
* main/ruby-rails: upgrade rails pacakges to 3.8.11Carlo Landmeter2013-01-108-16/+16
| | | | This should fix CVE-2013-0155 and CVE-2013-0156
* main/libisofs: upgrade to 1.2.6Natanael Copa2013-01-101-2/+2
|
* main/libburn: upgrade to 1.2.6Natanael Copa2013-01-101-2/+2
|
* main/desktop-file-utils: upgrade to 0.21Natanael Copa2013-01-101-2/+2
|
* main/b43-fwcutter: upgrade to 017Natanael Copa2013-01-101-2/+2
|
* main/dhcp: upgrade to 4.2.5Natanael Copa2013-01-101-3/+3
|
* main/sqlite: upgrade to 3.7.15.2Natanael Copa2013-01-101-2/+2
|
* main/squid: upgrade to 3.2.6Natanael Copa2013-01-101-2/+2
|
* main/transmission: upgrade to 2.76Natanael Copa2013-01-101-3/+3
|
* main/gst-libav1: upgrade to 1.0.5Natanael Copa2013-01-101-2/+2
|
* main/gst-plugins-bad1: upgrade to 1.0.5Natanael Copa2013-01-101-2/+2
|
* main/gst-plugins-ugly1: upgrade to 1.0.5Natanael Copa2013-01-101-2/+2
|
* main/gst-plugins-good1: upgrade to 1.0.5Natanael Copa2013-01-101-3/+3
|
* main/gst-plugins-base1: upgrade to 1.0.5Natanael Copa2013-01-101-2/+2
|
* main/gstreamer1: upgrade to 1.0.5Natanael Copa2013-01-101-2/+2
|
* main/zfs-grsec: rebuild against kernel 3.6.11-r2Natanael Copa2013-01-101-1/+1
|
* main/zfs-git-grsec: rebuild against kernel 3.6.11-r2Natanael Copa2013-01-101-1/+1
|
* main/wanpipe-grsec: rebuild against kernel 3.6.11-r2Natanael Copa2013-01-101-1/+1
|
* main/virtualbox-additions-grsec: rebuild against kernel 3.6.11-r2Natanael Copa2013-01-101-1/+1
|
* main/spl-grsec: rebuild against kernel 3.6.11-r2Natanael Copa2013-01-101-1/+1
|
* main/spl-git-grsec: rebuild against kernel 3.6.11-r2Natanael Copa2013-01-101-1/+1
|
* main/crystalhd-git-grsec: rebuild against kernel 3.6.11-r2Natanael Copa2013-01-101-1/+1
|
* main/xtables-addons-grsec: rebuild against kernel 3.6.11-r2Natanael Copa2013-01-101-1/+1
|
* main/open-vm-tools-grsec: rebuild against kernel 3.6.11-r2Natanael Copa2013-01-101-1/+1
|
* main/dahdi-linux-grsec: rebuild against kernel 3.6.11-r2Natanael Copa2013-01-101-1/+1
|
* main/linux-grsec: fix for rx_missed on r8169 driverNatanael Copa2013-01-102-1/+16
| | | | | Some info in this thread: http://marc.info/?l=linux-netdev&m=135763417428530&w=2
* main/linux-grsec: remove unused patchNatanael Copa2013-01-101-8252/+0
|
* testing/aha: new aportCarlo Landmeter2013-01-093-0/+111
|
* Merge git://git.alpinelinux.org/fab/aportsBartłomiej Piotrowski2013-01-099-18/+167
|\
| * testing/bannergrab: new aportFabian Affolter2013-01-081-0/+41
| | | | | | | | | | | | | | | | | | Bannergrab is a simple tool, designed to collect information from network services. It can do this using two different methods; grab the connection banners and send triggers and collect the responses. Bannergrab defaults to sending triggers. http://sourceforge.net/projects/bannergrab
| * testing/pylint: upgrade to 0.26.0Fabian Affolter2013-01-081-2/+2
| |
| * testing/py-logilab-common: upgrade to 0.58.3Fabian Affolter2013-01-081-2/+2
| |
| * testing/py-logilab-astng: upgrade to 0.24.1Fabian Affolter2013-01-081-2/+2
| |
| * testting/slowhttptest: new aportFabian Affolter2013-01-081-0/+43
| | | | | | | | | | | | | | | | | | | | | | | | | | SlowHTTPTest is a highly configurable tool that simulates some Application Layer Denial of Service attacks. It implements most common low-bandwidth Application Layer DoS attacks, such as slow-loris, Slow HTTP POST, Slow Read attack (based on TCP persist timer exploit) by draining concurrent connections pool, as well as Apache Range Header attack by causing very significant memory and CPU usage on the server. http://code.google.com/p/slowhttptest/ ease enter the commit message for your changes. Lines starting
| * testing/sslscan: patch addedFabian Affolter2013-01-081-0/+28
| |
| * testing/sslscan: new aportFabian Affolter2013-01-081-0/+41
| | | | | | | | | | | | | | | | | | SSLScan queries SSL services, such as HTTPS, in order to determine the ciphers that are supported. SSLScan is designed to be easy, lean and fast. The output includes preferred ciphers of the SSL service, the certificate and is in Text and XML formats. https://www.titania-security.com/labs/sslscan
| * testing/hping3: clarify licenseFabian Affolter2013-01-081-10/+6
| |
| * testing/ansible: upgrade to 0.9Fabian Affolter2013-01-081-2/+2
| |
| * testing/ansible: checksum updatedFabian Affolter2013-01-081-1/+1
| |