Commit Graph

17079 Commits

Author SHA1 Message Date
Thomas Tuegel
f28848cb4d
kde4.kdelibs -> kdelibs4
Our kdelibs4 package does not come from KDE 4, so per upstream's request I am
moving it out of the kde4 set.
2017-02-24 17:16:28 -06:00
Thomas Tuegel
ea6355f2c5
cantata: Remove KDE 4 support
It was permanently disabled anyway.
2017-02-24 17:14:06 -06:00
Thomas Tuegel
0f5dbc3854
Revert "Remove kde4.psi"
This reverts commit c2fcc909cb42d9aaa456d211f9c68cc24f4ef804.

- Upstream development is ongoing; we will keep psi for now to preserve
  continuity.
2017-02-24 16:49:07 -06:00
Thomas Tuegel
b4ba042924
qt4: Don't pass top-level attribute through kde4 2017-02-24 16:49:06 -06:00
Thomas Tuegel
7b17c83cbe
Remove kde4.semnotes
- No activity upstream
2017-02-24 16:49:06 -06:00
Thomas Tuegel
41d8b36461
Remove kde4.psi
- No activity upstream
- Known vulnerabilities
2017-02-24 16:49:06 -06:00
Thomas Tuegel
5dc5716634
Remove kde4.kuickshow
- No maintainer in Nixpkgs
2017-02-24 16:49:05 -06:00
Thomas Tuegel
72263bdd74
Remove kde4.kvirc
- No maintainer in Nixpkgs
2017-02-24 16:49:04 -06:00
Thomas Tuegel
f9a9d3d007
Remove kde4.kipi_plugins
- Already updated to KDE 5 in Nixpkgs
2017-02-24 16:49:04 -06:00
Thomas Tuegel
412b2b1859
Remove kde4.kmymoney
- No maintainer in Nixpkgs
2017-02-24 16:49:04 -06:00
Thomas Tuegel
1336b8dcc9
Remove kde4.kdesvn
- No upstream activity
2017-02-24 16:49:04 -06:00
Thomas Tuegel
9af7f6b9d4
Remove kde4.kdenlive and dependencies
- Already updated to KDE 5 in Nixpkgs
2017-02-24 16:49:03 -06:00
Thomas Tuegel
767787cb36
Remove kde4.kbibtex
- No maintainer in Nixpkgs
2017-02-24 16:49:03 -06:00
Thomas Tuegel
b4bdaeb38c
Remove kde4.choqok
- No maintainer in Nixpkgs
2017-02-24 16:49:03 -06:00
Thomas Tuegel
388d58f568
Remove kde4.basket
- No upstream activity
2017-02-24 16:49:03 -06:00
Thomas Tuegel
6e1d64a3c0
Remove kde4.bangarang
- No upstream activity
2017-02-24 16:49:03 -06:00
Thomas Tuegel
43d306c2f5
Remove kde4.rekonq and dependencies
- No upstream activity
- Known vulnerabilities
2017-02-24 16:49:02 -06:00
Thomas Tuegel
9d6bfacc85
kde4: remove inessential KDE 4 modules 2017-02-24 16:49:02 -06:00
Thomas Tuegel
f927276513
Remove kde4.rsibreak
- No maintainer in Nixpkgs
- No upstream activity
- Original source unavailable
2017-02-24 16:49:02 -06:00
Thomas Tuegel
7e77aaf221
Remove kde4.kwooty
- No maintainer in Nixpkgs
- No upstream activity
2017-02-24 16:49:02 -06:00
Thomas Tuegel
b1d78393bd
Remove kde4.ktorrent
- Already updated to KDE 5 in Nixpkgs
2017-02-24 16:49:01 -06:00
Thomas Tuegel
b12f87beb8
Remove kde4.kde_wacomtablet
- Not useful without the KDE 4 desktop
2017-02-24 16:49:00 -06:00
Thomas Tuegel
db5ab73ec8
Remove kde4.eventlist
- Not useful without the KDE 4 desktop
2017-02-24 16:49:00 -06:00
Thomas Tuegel
fabce0c4a8
Remove kde4.yakuake
- Already updated to KDE 5 in Nixpkgs
2017-02-24 16:48:59 -06:00
Thomas Tuegel
d768dcd4f3
Remove kde4.skrooge
- Already updated to KDE 5 in Nixpkgs
2017-02-24 16:48:59 -06:00
Thomas Tuegel
a8c58cf6ab
Remove kde4.quassel
- Already updated to KDE 5 in Nixpkgs
2017-02-24 16:48:59 -06:00
Thomas Tuegel
545e675cef
Remove kde4.konversation
- Already updated to KDE 5 in Nixpkgs
2017-02-24 16:48:59 -06:00
Thomas Tuegel
14b8fa7017
Remove kde4.krename
- Already updated to KDE 5 in Nixpkgs
2017-02-24 16:48:58 -06:00
Thomas Tuegel
0757d49800
Remove kde4.kdevelop
- Already updated to KDE 5 in Nixpkgs
2017-02-24 16:48:32 -06:00
Thomas Tuegel
e5e0f89612
Remove kde4.kdeconnect
- Already updated to KDE 5 in Nixpkgs
2017-02-24 16:48:32 -06:00
Thomas Tuegel
855690ba1d
Remove kde4.digikam
- Already updated to KDE 5 in Nixpkgs
2017-02-24 16:48:32 -06:00
Bjørn Forsman
52eab0376c spotify: 1.0.49.125.g72ee7853-83 -> 1.0.49.125.g72ee7853-111 2017-02-23 22:20:49 +01:00
Pascal Wittmann
04dcda3da4
homebank: 5.1.3 -> 5.1.4 2017-02-23 22:18:45 +01:00
Profpatsch
8e54fced98 flpsed: ghostscript patch, fixes, new url
gs was called at runtime, fix the execvp call.
The url changed to its own domain.
A little face-lift for the package code.
2017-02-23 18:52:30 +01:00
Jascha Geerds
11d86725df idea-ultimate: 2016.3.3 -> 2016.3.4 2017-02-23 15:07:59 +01:00
Nikolay Amiantov
0c50a62912 octoprint: jailbreak Jinja2 2017-02-23 13:15:58 +03:00
Peter Hoeg
84fd5daafc terragrunt: 0.10.2 -> 0.10.3 2017-02-23 17:14:45 +08:00
Jörg Thalheim
f25ff18c98
cmus: let ffmpeg handle mp4/aac 2017-02-23 01:47:45 +01:00
Jörg Thalheim
e868669c4a
cmus: mp4 support 2017-02-23 01:47:45 +01:00
Jörg Thalheim
744ce7e8e2
cmus: enable aac support 2017-02-23 01:47:45 +01:00
Thomas Lotze
4689dd2a79
cmus: enable opus support (re #23051)
Opus support was enabled since it didn't work in the past; I found it to be
working when I gave it a try now.
2017-02-23 01:47:44 +01:00
Peter Hoeg
354243c784 Merge pull request #23091 from peterhoeg/u/lynx
lynx: 2.8.8rel.2 -> 2.8.9dev.11
2017-02-23 07:35:28 +08:00
Peter Hoeg
a3bf71b76f lynx: 2.8.8rel.2 -> 2.8.9dev.11 2017-02-23 07:32:55 +08:00
Vladimír Čunát
145d3ea81c
Merge branch 'master' into staging 2017-02-22 17:47:49 +01:00
Vladimír Čunát
1d1dc2dcc3
open-vm-tools: fixup build with glibc-2.25 2017-02-22 16:54:07 +01:00
Vladimír Čunát
7ccaa9e652
solvespace: fixup build with glibc-2.25 2017-02-22 16:45:08 +01:00
Moritz Ulrich
51134cdbfe
digikam5: Fix build after kde merge. 2017-02-22 16:44:08 +01:00
Michael Raskin
194d137bd3 wireshark: patch for CVE-2017-6041 2017-02-22 14:17:02 +01:00
Graham Christensen
cc4919da89
xen: patch for XSAs: 197, 199, 207, 208, 209
XSA-197 Issue Description:

> The compiler can emit optimizations in qemu which can lead to double
> fetch vulnerabilities.  Specifically data on the rings shared
> between qemu and the hypervisor (which the guest under control can
> obtain mappings of) can be fetched twice (during which time the
> guest can alter the contents) possibly leading to arbitrary code
> execution in qemu.

More: https://xenbits.xen.org/xsa/advisory-197.html

XSA-199 Issue Description:

> The code in qemu which implements ioport read/write looks up the
> specified ioport address in a dispatch table.  The argument to the
> dispatch function is a uint32_t, and is used without a range check,
> even though the table has entries for only 2^16 ioports.
>
> When qemu is used as a standalone emulator, ioport accesses are
> generated only from cpu instructions emulated by qemu, and are
> therefore necessarily 16-bit, so there is no vulnerability.
>
> When qemu is used as a device model within Xen, io requests are
> generated by the hypervisor and read by qemu from a shared ring.  The
> entries in this ring use a common structure, including a 64-bit
> address field, for various accesses, including ioport addresses.
>
> Xen will write only 16-bit address ioport accesses.  However,
> depending on the Xen and qemu version, the ring may be writeable by
> the guest.  If so, the guest can generate out-of-range ioport
> accesses, resulting in wild pointer accesses within qemu.

More: https://xenbits.xen.org/xsa/advisory-199.html

XSA-207 Issue Description:

> Certain internal state is set up, during domain construction, in
> preparation for possible pass-through device assignment.  On ARM and
> AMD V-i hardware this setup includes memory allocation.  On guest
> teardown, cleanup was erroneously only performed when the guest
> actually had a pass-through device assigned.

More: https://xenbits.xen.org/xsa/advisory-207.html

XSA-209 Issue Description:

> When doing bitblt copy backwards, qemu should negate the blit width.
> This avoids an oob access before the start of video memory.

More: https://xenbits.xen.org/xsa/advisory-208.html

XSA-208 Issue Description:

> In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine
> cirrus_bitblt_cputovideo fails to check wethehr the specified memory
> region is safe.

More: https://xenbits.xen.org/xsa/advisory-209.html
2017-02-22 08:00:45 -05:00
Peter Hoeg
409dac4155 Merge branch 'u/tg' into real_master 2017-02-22 20:14:26 +08:00