Commit Graph

4191 Commits

Author SHA1 Message Date
de76c8e821 Merge branch '3.4' into 3.5 2019-05-22 16:57:18 +02:00
a517fc4040 [notify] curl: update to 7.65.0
includes two security fixes, see
- https://curl.haxx.se/changes.html
- https://curl.haxx.se/docs/CVE-2019-5435.html
- https://curl.haxx.se/docs/CVE-2019-5436.html
2019-05-22 16:55:03 +02:00
efb69c6293 eudev: update to 3.2.8 2019-05-22 16:36:18 +02:00
2d273237fb file: update to 5.37 2019-05-18 16:00:18 +02:00
ba32890215 Merge branch '3.4' into 3.5 2019-05-15 12:39:28 +02:00
90f52bafad ca-certificates: update to 20190515 2019-05-15 12:38:26 +02:00
f27c9a4c56 Merge branch '3.4' into 3.5 2019-05-14 13:11:36 -05:00
1981dc223f ports: updated to version 1.6 2019-05-14 09:44:47 -05:00
1a34a6b38c Merge branch '3.4' into 3.5 2019-05-14 10:15:14 +02:00
cd41677a6e e2fsprogs: update to 1.45.1 2019-05-14 10:13:34 +02:00
fb910e6b22 libdevmapper: update to 1.02.158 2019-05-14 10:13:10 +02:00
1216cf6065 Merge branch '3.4' into 3.5 2019-05-12 21:58:55 +02:00
4f61b3210f iproute2: update to 5.1.0 2019-05-12 21:56:54 +02:00
bb40ed8a57 gettext: update to 0.20.1 2019-05-12 21:56:20 +02:00
0fa7f2d79c Merge branch '3.4' into 3.5 2019-05-10 08:51:54 +02:00
37511f45e0 man-pages: update to 5.01 2019-05-10 08:51:09 +02:00
4bc9cbb8e9 gettext: update to 0.20 2019-05-10 08:50:18 +02:00
Fredrik Rinnestam
45ebb547e8 Merge branch '3.4' into 3.5 2019-05-07 23:46:06 +02:00
01db6c6a6f usbutils: update 012 2019-05-07 18:20:28 +02:00
d05433b92f [notify] dhcpcd: update to 7.2.2
includes one security fix, see
https://roy.marples.name/archives/dhcpcd-discuss/0002428.html
2019-05-04 13:20:58 +02:00
f0255522f7 Merge branch '3.4' into 3.5 2019-04-26 17:41:01 +02:00
8c5fd3a4bf [notify] dhcpcd: update to 7.2.1
includes security fixes, see
https://roy.marples.name/archives/dhcpcd-discuss/0002415.html
2019-04-26 17:34:46 +02:00
4c3aab320e perl: update to 5.28.2 2019-04-22 10:36:17 +02:00
9b40ede8f3 Merge branch '3.4' into 3.5 2019-04-22 10:30:42 +02:00
2addaea288 openssh: update to 8.0p1 2019-04-21 13:35:50 +02:00
dd7f417205 Merge branch '3.4' into 3.5 2019-04-19 13:38:57 +02:00
02cd4f54c4 dhcpcd: update to 7.2.0 2019-04-19 13:38:12 +02:00
a28dfb540c libcap: fix dependencies 2019-04-16 13:25:23 +02:00
2b1d8cf1d5 Merge branch '3.4' into 3.5
Conflicts:
	libcap/.footprint
	libcap/.signature
2019-04-16 13:20:52 +02:00
19ee5d9fdc libcap: update to 2.27 2019-04-16 11:37:35 +02:00
073cd31a0c Merge branch '3.4' into 3.5 2019-04-13 11:27:35 +02:00
1a8090cbe9 gawk: update to 5.0.0 2019-04-13 11:26:51 +02:00
Fredrik Rinnestam
b2160a8b56 Merge branch '3.4' into 3.5 2019-04-09 23:04:31 +02:00
Fredrik Rinnestam
02400efa56 util-linux: updated to 2.33.2 2019-04-09 23:04:14 +02:00
Fredrik Rinnestam
5576fcf718 httpup: updated to 0.5.0 2019-04-06 19:16:59 +02:00
Fredrik Rinnestam
d64f340f89 httpup: updated to 0.5.0 2019-04-06 19:16:41 +02:00
Fredrik Rinnestam
60fd5b8a20 binutils: updated to 2.32 2019-04-05 17:01:56 +02:00
Fredrik Rinnestam
2e967a8b4c Merge branch '3.4' into 3.5 2019-04-05 16:59:23 +02:00
Fredrik Rinnestam
d6d808f213 [notify] wget: updated to 1.20.3. Fix for a buffer overflow vulnerability 2019-04-05 16:59:01 +02:00
d66579ad6a wget: update to 1.20.2 2019-04-03 19:19:25 +02:00
994ea99691 curl: update to 7.64.1 2019-03-28 16:09:24 +01:00
ba3c4193f4 tzdata: update to 2019a 2019-03-26 17:49:42 +01:00
3e34d1e2a7 Merge branch '3.4' into 3.5 2019-03-23 12:23:52 +01:00
c0d86c385b libdevmapper: update to 1.02.156 2019-03-22 15:48:37 +01:00
072a7e8aa2 iproute2: update to 5.0.0 2019-03-21 14:57:47 +01:00
6253b3d831 start-stop-daemon: update to 20190310 2019-03-19 14:03:37 +01:00
60fe76b233 crux-patch.diff: sync..
The new S-S-D would not work with CRUX since for example exim uses
a PID file with root:mail and then there is a root!=mail mismatch.
The manual says

  Warning: using this match option with a world-writable pidfile
  or using it alone with a daemon that writes the pidfile as an
  unprivileged (non-root) user will be refused with an error
  (since version 1.19.3) as this is a security risk, because
  either any user can write to it, or if the daemon gets
  compromised, the contents of the pidfile cannot be trusted, and
  then a privileged runner (such as an init script executed as
  root) would end up acting on any system process.  Using
  /dev/null is exempt from these checks.

The actual code contradicts this as the mail group in our example
cannot write the PID file, only read it.
I thus have adjusted the code to only refuse the operation if the
group can write the file, too.
(Maybe this is even a "bug" that should be reported upstream?)
2019-03-19 14:01:12 +01:00
ffed3f54f3 start-stop-daemon.8: import 2019-03-10 typo fix 2019-03-19 14:01:12 +01:00
50939d7190 Sync with dpkg 1.19.5 2019-03-19 14:01:12 +01:00
6def8c726a Sync with dpkg 1.19.4 2019-03-19 14:01:12 +01:00