Commit Graph

4005 Commits

Author SHA1 Message Date
Fredrik Rinnestam
60fd5b8a20 binutils: updated to 2.32 2019-04-05 17:01:56 +02:00
Fredrik Rinnestam
2e967a8b4c Merge branch '3.4' into 3.5 2019-04-05 16:59:23 +02:00
Fredrik Rinnestam
d6d808f213 [notify] wget: updated to 1.20.3. Fix for a buffer overflow vulnerability 2019-04-05 16:59:01 +02:00
d66579ad6a wget: update to 1.20.2 2019-04-03 19:19:25 +02:00
994ea99691 curl: update to 7.64.1 2019-03-28 16:09:24 +01:00
ba3c4193f4 tzdata: update to 2019a 2019-03-26 17:49:42 +01:00
3e34d1e2a7 Merge branch '3.4' into 3.5 2019-03-23 12:23:52 +01:00
c0d86c385b libdevmapper: update to 1.02.156 2019-03-22 15:48:37 +01:00
072a7e8aa2 iproute2: update to 5.0.0 2019-03-21 14:57:47 +01:00
6253b3d831 start-stop-daemon: update to 20190310 2019-03-19 14:03:37 +01:00
60fe76b233 crux-patch.diff: sync..
The new S-S-D would not work with CRUX since for example exim uses
a PID file with root:mail and then there is a root!=mail mismatch.
The manual says

  Warning: using this match option with a world-writable pidfile
  or using it alone with a daemon that writes the pidfile as an
  unprivileged (non-root) user will be refused with an error
  (since version 1.19.3) as this is a security risk, because
  either any user can write to it, or if the daemon gets
  compromised, the contents of the pidfile cannot be trusted, and
  then a privileged runner (such as an init script executed as
  root) would end up acting on any system process.  Using
  /dev/null is exempt from these checks.

The actual code contradicts this as the mail group in our example
cannot write the PID file, only read it.
I thus have adjusted the code to only refuse the operation if the
group can write the file, too.
(Maybe this is even a "bug" that should be reported upstream?)
2019-03-19 14:01:12 +01:00
ffed3f54f3 start-stop-daemon.8: import 2019-03-10 typo fix 2019-03-19 14:01:12 +01:00
50939d7190 Sync with dpkg 1.19.5 2019-03-19 14:01:12 +01:00
6def8c726a Sync with dpkg 1.19.4 2019-03-19 14:01:12 +01:00
bf12d4ef67 crux-patch.diff: adjust for latest sync 2019-03-19 14:01:12 +01:00
5c9e654aa5 Sync with dpkg 1.19.3 2019-03-19 14:01:12 +01:00
2c229a2dc6 crux-patch.diff: adjust for latest sync 2019-03-19 14:01:12 +01:00
122e382214 Sync with Debian Salsa [31ba2b1b10cfcc2149bb43fe9b918355177e4341], 2018-08-01 2019-03-19 14:01:12 +01:00
9d9e74493a Merge branch '3.4' into 3.5 2019-03-19 14:00:44 +01:00
fdbd589df1 [notify] patch: security update for CVE-2018-{6951,6952,1000156} 2019-03-19 10:24:29 +01:00
6a4124fb56 libusb-compat: moved to opt 2019-03-17 13:56:21 +01:00
3b84e89b81 openssl: cleanup Pkgfile
- split 'make' and 'make install' to allow parallel build
- use selective make install rule to avoid the installation
  of html docs and remove them afterwards
- we use config instead of Configure because detection of
  arch works just fine that way
- we must define LIBDIR to avoid installation into lib64
2019-03-17 13:38:55 +01:00
498602def0 Merge branch '3.4' into 3.5 2019-03-14 15:43:21 +01:00
087480f412 coreutils: update to 8.31 2019-03-11 18:53:48 +01:00
3df201d627 Merge branch '3.4' into 3.5 2019-03-10 18:13:29 -05:00
53bbd8b931 prt-get: updated to version 5.19.3 2019-03-10 18:11:35 -05:00
b68f72dfde Merge branch '3.4' into 3.5 2019-03-08 14:29:18 +01:00
3f78b391a0 vim: update to to 8.1.0999 2019-03-08 12:45:51 +01:00
Fredrik Rinnestam
667c6d89a8 Merge branch '3.4' into 3.5 2019-03-06 21:59:22 +01:00
Fredrik Rinnestam
fe1cab1dfb man-pages: updated to 5.00 2019-03-06 21:58:59 +01:00
Fredrik Rinnestam
f5c75e8088 e2fsprogs: updated to 1.44.6 2019-03-06 21:57:43 +01:00
38707a1f51 bindutils: update to 9.12.4 2019-03-02 18:32:18 +01:00
5f6d94c6da prt-get: update to 5.19.2 2019-03-02 11:45:18 +01:00
Fredrik Rinnestam
e3c40156dc Merge branch '3.4' into 3.5 2019-03-01 01:00:00 +01:00
cab2be67bb sysvinit: update to 2.94 2019-02-27 11:34:53 +01:00
Fredrik Rinnestam
d2ffeb4341 openssl: updated to 1.1.1b 2019-02-26 20:10:06 +01:00
Fredrik Rinnestam
afb704495f [notify] openssl: updated to 1.0.2r. Fix for CVE-2019-1559
Advisory: https://www.openssl.org/news/secadv/20190226.txt
2019-02-26 20:05:30 +01:00
c04479c238 libcap: updated footprint for PAM 2019-02-25 11:13:09 -06:00
80e1edb949 Merge branch '3.4' into 3.5 2019-02-25 12:54:33 +01:00
ba580e3291 libpcre: update to 8.43 2019-02-24 09:53:30 +01:00
Fredrik Rinnestam
8492ecafb4 tar: updated to 1.32 2019-02-23 14:56:08 +01:00
Fredrik Rinnestam
fdf509f2fc gcc: updated to 8.3.0 2019-02-22 20:20:29 +01:00
c1862c4163 rc: increase release number, update signature 2019-02-22 17:50:10 +01:00
7d48bd5f24 sysklogd: increase release number, update signature 2019-02-22 17:49:57 +01:00
James Buren
0b9b68615a rc: modify inittab to support LXC and LXD containter shutdown
This uses the largely unused entries that exists for UPS integration
with sysvinit to properly shutdown the containers when SIGPWR is sent
to the container's process 1.
2019-02-22 17:32:36 +01:00
James Buren
7bc644f97d sysklogd: force klogd to use the system call API
This fixes compatibility with LXC and LXD containers.
2019-02-22 17:32:11 +01:00
fae8ea2022 glibc-32: update kernel-headers to 4.19.24 2019-02-22 17:26:02 +01:00
6d0cc33c9e glibc: update kernel-headers to 4.19.24 2019-02-22 17:25:51 +01:00
a20568e7ac Merge branch '3.4' into 3.5 2019-02-22 12:08:23 +01:00
67feea6d3c file: update to 5.36 2019-02-21 17:34:56 +01:00