2d273237fb
file: update to 5.37
2019-05-18 16:00:18 +02:00
ba32890215
Merge branch '3.4' into 3.5
2019-05-15 12:39:28 +02:00
90f52bafad
ca-certificates: update to 20190515
2019-05-15 12:38:26 +02:00
f27c9a4c56
Merge branch '3.4' into 3.5
2019-05-14 13:11:36 -05:00
1981dc223f
ports: updated to version 1.6
2019-05-14 09:44:47 -05:00
1a34a6b38c
Merge branch '3.4' into 3.5
2019-05-14 10:15:14 +02:00
cd41677a6e
e2fsprogs: update to 1.45.1
2019-05-14 10:13:34 +02:00
fb910e6b22
libdevmapper: update to 1.02.158
2019-05-14 10:13:10 +02:00
1216cf6065
Merge branch '3.4' into 3.5
2019-05-12 21:58:55 +02:00
4f61b3210f
iproute2: update to 5.1.0
2019-05-12 21:56:54 +02:00
bb40ed8a57
gettext: update to 0.20.1
2019-05-12 21:56:20 +02:00
0fa7f2d79c
Merge branch '3.4' into 3.5
2019-05-10 08:51:54 +02:00
37511f45e0
man-pages: update to 5.01
2019-05-10 08:51:09 +02:00
4bc9cbb8e9
gettext: update to 0.20
2019-05-10 08:50:18 +02:00
Fredrik Rinnestam
45ebb547e8
Merge branch '3.4' into 3.5
2019-05-07 23:46:06 +02:00
01db6c6a6f
usbutils: update 012
2019-05-07 18:20:28 +02:00
d05433b92f
[notify] dhcpcd: update to 7.2.2
...
includes one security fix, see
https://roy.marples.name/archives/dhcpcd-discuss/0002428.html
2019-05-04 13:20:58 +02:00
f0255522f7
Merge branch '3.4' into 3.5
2019-04-26 17:41:01 +02:00
8c5fd3a4bf
[notify] dhcpcd: update to 7.2.1
...
includes security fixes, see
https://roy.marples.name/archives/dhcpcd-discuss/0002415.html
2019-04-26 17:34:46 +02:00
4c3aab320e
perl: update to 5.28.2
2019-04-22 10:36:17 +02:00
9b40ede8f3
Merge branch '3.4' into 3.5
2019-04-22 10:30:42 +02:00
2addaea288
openssh: update to 8.0p1
2019-04-21 13:35:50 +02:00
dd7f417205
Merge branch '3.4' into 3.5
2019-04-19 13:38:57 +02:00
02cd4f54c4
dhcpcd: update to 7.2.0
2019-04-19 13:38:12 +02:00
a28dfb540c
libcap: fix dependencies
2019-04-16 13:25:23 +02:00
2b1d8cf1d5
Merge branch '3.4' into 3.5
...
Conflicts:
libcap/.footprint
libcap/.signature
2019-04-16 13:20:52 +02:00
19ee5d9fdc
libcap: update to 2.27
2019-04-16 11:37:35 +02:00
073cd31a0c
Merge branch '3.4' into 3.5
2019-04-13 11:27:35 +02:00
1a8090cbe9
gawk: update to 5.0.0
2019-04-13 11:26:51 +02:00
Fredrik Rinnestam
b2160a8b56
Merge branch '3.4' into 3.5
2019-04-09 23:04:31 +02:00
Fredrik Rinnestam
02400efa56
util-linux: updated to 2.33.2
2019-04-09 23:04:14 +02:00
Fredrik Rinnestam
5576fcf718
httpup: updated to 0.5.0
2019-04-06 19:16:59 +02:00
Fredrik Rinnestam
d64f340f89
httpup: updated to 0.5.0
2019-04-06 19:16:41 +02:00
Fredrik Rinnestam
60fd5b8a20
binutils: updated to 2.32
2019-04-05 17:01:56 +02:00
Fredrik Rinnestam
2e967a8b4c
Merge branch '3.4' into 3.5
2019-04-05 16:59:23 +02:00
Fredrik Rinnestam
d6d808f213
[notify] wget: updated to 1.20.3. Fix for a buffer overflow vulnerability
2019-04-05 16:59:01 +02:00
d66579ad6a
wget: update to 1.20.2
2019-04-03 19:19:25 +02:00
994ea99691
curl: update to 7.64.1
2019-03-28 16:09:24 +01:00
ba3c4193f4
tzdata: update to 2019a
2019-03-26 17:49:42 +01:00
3e34d1e2a7
Merge branch '3.4' into 3.5
2019-03-23 12:23:52 +01:00
c0d86c385b
libdevmapper: update to 1.02.156
2019-03-22 15:48:37 +01:00
072a7e8aa2
iproute2: update to 5.0.0
2019-03-21 14:57:47 +01:00
6253b3d831
start-stop-daemon: update to 20190310
2019-03-19 14:03:37 +01:00
60fe76b233
crux-patch.diff: sync..
...
The new S-S-D would not work with CRUX since for example exim uses
a PID file with root:mail and then there is a root!=mail mismatch.
The manual says
Warning: using this match option with a world-writable pidfile
or using it alone with a daemon that writes the pidfile as an
unprivileged (non-root) user will be refused with an error
(since version 1.19.3) as this is a security risk, because
either any user can write to it, or if the daemon gets
compromised, the contents of the pidfile cannot be trusted, and
then a privileged runner (such as an init script executed as
root) would end up acting on any system process. Using
/dev/null is exempt from these checks.
The actual code contradicts this as the mail group in our example
cannot write the PID file, only read it.
I thus have adjusted the code to only refuse the operation if the
group can write the file, too.
(Maybe this is even a "bug" that should be reported upstream?)
2019-03-19 14:01:12 +01:00
ffed3f54f3
start-stop-daemon.8: import 2019-03-10 typo fix
2019-03-19 14:01:12 +01:00
50939d7190
Sync with dpkg 1.19.5
2019-03-19 14:01:12 +01:00
6def8c726a
Sync with dpkg 1.19.4
2019-03-19 14:01:12 +01:00
bf12d4ef67
crux-patch.diff: adjust for latest sync
2019-03-19 14:01:12 +01:00
5c9e654aa5
Sync with dpkg 1.19.3
2019-03-19 14:01:12 +01:00
2c229a2dc6
crux-patch.diff: adjust for latest sync
2019-03-19 14:01:12 +01:00