Commit Graph

14171 Commits

Author SHA1 Message Date
Linus Heckemann
e4cf0e7a45
Merge pull request #109345 from cole-h/zfs-closure
Shrink the ZFS closure by making mail support optional
2021-02-10 23:04:24 +01:00
Martin Weinelt
8d8c27fb68
compsize: update license to gpl2Plus 2021-02-10 03:49:56 +01:00
R. RyanTM
2ed94d81cd compsize: 1.4 -> 1.5 2021-02-10 00:59:14 +00:00
Stig
40b3dc935d
Merge pull request #112439 from 0x4A6F/master-firejail
firejail: 0.9.64.2 -> 0.9.64.4
2021-02-09 17:32:31 +01:00
Sandro
30e3ed5234
Merge pull request #112416 from qzle/master 2021-02-09 12:18:00 +01:00
Jens Nolte
fbc669e12f aseq2json: init at 2018-04-28 2021-02-09 11:59:06 +01:00
Mario Rodas
24a7ad1441
Merge pull request #112368 from r-ryantm/auto-update/psmisc
psmisc: 23.3 -> 23.4
2021-02-08 20:48:51 -05:00
Bernardo Meurer
c83a3d6fa7
Merge pull request #112335 from lovesegfault/firefox-no-flash
treewide: cleanup Adobe Flash Player
2021-02-09 01:35:24 +00:00
Jan Tojnar
faf133f854
Merge pull request #97972 from mvnetbiz/power-profiles-daemon 2021-02-09 01:41:04 +01:00
Matt Votava
9a3190a960
power-profiles-daemon: init at 0.1, add service module 2021-02-09 01:25:56 +01:00
TredwellGit
d7c4ca2de6 firmwareLinuxNonfree: 2020-12-18 -> 2021-02-08 2021-02-08 16:09:22 -05:00
Tim Steinbach
325df29630
linux/hardened/patches/5.4: 5.4.95-hardened1 -> 5.4.96-hardened1 2021-02-08 15:48:47 -05:00
Tim Steinbach
35c2b6a578
linux/hardened/patches/5.10: 5.10.13-hardened1 -> 5.10.14-hardened1 2021-02-08 15:48:46 -05:00
Tim Steinbach
c338363969
linux/hardened/patches/4.19: 4.19.173-hardened1 -> 4.19.174-hardened1 2021-02-08 15:48:45 -05:00
Tim Steinbach
a1c4ddf275
linux/hardened/patches/4.14: 4.14.219-hardened1 -> 4.14.220-hardened1 2021-02-08 15:48:45 -05:00
Tim Steinbach
f891d28420
linux_latest-libre: 17812 -> 17873 2021-02-08 15:48:44 -05:00
Tim Steinbach
6a9fe0b972
linux: 5.4.95 -> 5.4.96 2021-02-08 15:48:43 -05:00
Tim Steinbach
1d0d45860e
linux: 5.10.13 -> 5.10.14 2021-02-08 15:48:42 -05:00
Tim Steinbach
5eba1183f6
linux: 4.9.255 -> 4.9.256 2021-02-08 15:48:41 -05:00
Tim Steinbach
4d75ebab78
linux: 4.4.255 -> 4.4.256 2021-02-08 15:48:41 -05:00
Tim Steinbach
f1831d8586
linux: 4.19.173 -> 4.19.174 2021-02-08 15:48:40 -05:00
Tim Steinbach
bed08131cd
linux: 4.14.219 -> 4.14.220 2021-02-08 15:48:35 -05:00
Bernardo Meurer
544fdb05a5
hal-flash: drop 2021-02-08 09:38:45 -08:00
Bas van Dijk
6005700c53 libsemanage: fix build by disabling clobbered warning
This turns the GCC clobbered error into a warning which should fix:

```
emanage_store.c: In function 'semanage_exec_prog':
semanage_store.c:1278:6: error: variable 'i' might be clobbered by 'longjmp' or 'vfork' [8;;https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wclobbered-Werror=clobbered8;;]
 1278 |  int i;
      |      ^
cc1: all warnings being treated as errors
```
2021-02-08 14:25:44 +01:00
R. RyanTM
bebd399724 psmisc: 23.3 -> 23.4 2021-02-08 06:55:47 +00:00
0x4A6F
75351261fc
firejail: 0.9.64.2 -> 0.9.64.4 2021-02-07 23:40:58 +00:00
Cole Helbling
1ed5b6a285
zfs: disable smartmontools mail functionality 2021-02-06 22:04:00 -08:00
R. RyanTM
bc898deb77 solo5: 0.6.7 -> 0.6.8 2021-02-06 22:07:22 +01:00
Michael Weiss
df9dac5e77
fuse3: 3.10.1 -> 3.10.2 (#112016) 2021-02-06 11:52:09 +01:00
Jan Tojnar
493bbc968b
Merge pull request #95337 from pasqui23/switchctl 2021-02-05 18:05:39 +01:00
Pasquale
2d0ccc0ec0
switcheroo-control: init at 2.3
switcheroo-control: addded to package set
2021-02-05 17:39:44 +01:00
Tim Steinbach
686d43fb39 linux/hardened/patches/5.4: 5.4.94-hardened1 -> 5.4.95-hardened1 2021-02-05 09:33:41 -05:00
Tim Steinbach
10ed973da7 linux/hardened/patches/5.10: 5.10.12-hardened1 -> 5.10.13-hardened1 2021-02-05 09:33:41 -05:00
Tim Steinbach
043dbf804f linux/hardened/patches/4.19: 4.19.172-hardened1 -> 4.19.173-hardened1 2021-02-05 09:33:41 -05:00
Tim Steinbach
353c5d571a linux/hardened/patches/4.14: 4.14.217-hardened1 -> 4.14.219-hardened1 2021-02-05 09:33:41 -05:00
Tim Steinbach
8ae81a4c89 linux-rt_5_10: 5.10.8-rt24 -> 5.10.12-rt26 2021-02-05 09:33:41 -05:00
Tim Steinbach
13bc895a8f linux: 5.4.94 -> 5.4.95 2021-02-05 09:33:41 -05:00
Tim Steinbach
75d4d5fe85 linux: 5.10.12 -> 5.10.13 2021-02-05 09:33:41 -05:00
Tim Steinbach
dc3a812217 linux: 4.9.254 -> 4.9.255 2021-02-05 09:33:41 -05:00
Tim Steinbach
a72348cc48 linux: 4.4.254 -> 4.4.255 2021-02-05 09:33:41 -05:00
Tim Steinbach
da98a8c94b linux: 4.19.172 -> 4.19.173 2021-02-05 09:33:41 -05:00
Tim Steinbach
165ca30ecf linux: 4.14.218 -> 4.14.219 2021-02-05 09:33:41 -05:00
Domen Kožar
9e1c01f500
--no-net is now --offline 2021-02-05 11:57:42 +00:00
Sandro
2fe06d9478
Merge pull request #106661 from IvarWithoutBones/update-rtl8821ce
linuxPackages.rtl8821ce: 5.5.2_34066.20200325 -> unstable-2020-12-16
2021-02-04 18:41:02 +01:00
Sandro
31bc8c38e6
Merge pull request #111908 from primeos/fscryptctl
fscryptctl-experimental: 2017-10-23 -> 0.1.0
2021-02-04 18:13:29 +01:00
Tim Steinbach
429800ea40 zfs: Add test references 2021-02-04 09:38:46 -05:00
Ryan Mulligan
a130a0a0d2
Merge pull request #111806 from r-ryantm/auto-update/pcm
pcm: 202011 -> 202101
2021-02-04 05:28:40 -08:00
Michael Weiss
6f6ce15938
fscryptctl-experimental: 2017-10-23 -> 0.1.0
Version 0.1.0 is based on the last commit that included support for V1
encryption policies. Version 1.0 is about to be released and will
include a PR which removes V1 policy support and adds V2 policy support.
Source: https://github.com/google/fscryptctl/issues/12#issuecomment-772888154

When version 1.0 is released we'll likely package it as fscryptctl and
mark fscryptctl-experimental as broken (referring to fscryptctl).
2021-02-04 13:39:00 +01:00
Martin Weinelt
95164dc11b
wpa_supplicant: fix for security advisory 2020-2
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners. The actual
parsing of that information validates field lengths appropriately, but
processing of the parsed information misses a length check when storing
a copy of the secondary device types. This can result in writing
attacker controlled data into the peer entry after the area assigned for
the secondary device type. The overflow can result in corrupting
pointers for heap allocations. This can result in an attacker within
radio range of the device running P2P discovery being able to cause
unexpected behavior, including termination of the wpa_supplicant process
and potentially arbitrary code execution.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Fixes: CVE-2021-0326
2021-02-04 00:31:38 +01:00
R. RyanTM
21063beadb pcm: 202011 -> 202101 2021-02-03 20:24:21 +00:00