Commit Graph

13245 Commits

Author SHA1 Message Date
Tim Steinbach
4d75ebab78
linux: 4.4.255 -> 4.4.256 2021-02-08 15:48:41 -05:00
Tim Steinbach
f1831d8586
linux: 4.19.173 -> 4.19.174 2021-02-08 15:48:40 -05:00
Tim Steinbach
bed08131cd
linux: 4.14.219 -> 4.14.220 2021-02-08 15:48:35 -05:00
Bas van Dijk
6005700c53 libsemanage: fix build by disabling clobbered warning
This turns the GCC clobbered error into a warning which should fix:

```
emanage_store.c: In function 'semanage_exec_prog':
semanage_store.c:1278:6: error: variable 'i' might be clobbered by 'longjmp' or 'vfork' [8;;https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wclobbered-Werror=clobbered8;;]
 1278 |  int i;
      |      ^
cc1: all warnings being treated as errors
```
2021-02-08 14:25:44 +01:00
Michael Weiss
df9dac5e77
fuse3: 3.10.1 -> 3.10.2 (#112016) 2021-02-06 11:52:09 +01:00
Jan Tojnar
493bbc968b
Merge pull request #95337 from pasqui23/switchctl 2021-02-05 18:05:39 +01:00
Pasquale
2d0ccc0ec0
switcheroo-control: init at 2.3
switcheroo-control: addded to package set
2021-02-05 17:39:44 +01:00
Tim Steinbach
686d43fb39 linux/hardened/patches/5.4: 5.4.94-hardened1 -> 5.4.95-hardened1 2021-02-05 09:33:41 -05:00
Tim Steinbach
10ed973da7 linux/hardened/patches/5.10: 5.10.12-hardened1 -> 5.10.13-hardened1 2021-02-05 09:33:41 -05:00
Tim Steinbach
043dbf804f linux/hardened/patches/4.19: 4.19.172-hardened1 -> 4.19.173-hardened1 2021-02-05 09:33:41 -05:00
Tim Steinbach
353c5d571a linux/hardened/patches/4.14: 4.14.217-hardened1 -> 4.14.219-hardened1 2021-02-05 09:33:41 -05:00
Tim Steinbach
8ae81a4c89 linux-rt_5_10: 5.10.8-rt24 -> 5.10.12-rt26 2021-02-05 09:33:41 -05:00
Tim Steinbach
13bc895a8f linux: 5.4.94 -> 5.4.95 2021-02-05 09:33:41 -05:00
Tim Steinbach
75d4d5fe85 linux: 5.10.12 -> 5.10.13 2021-02-05 09:33:41 -05:00
Tim Steinbach
dc3a812217 linux: 4.9.254 -> 4.9.255 2021-02-05 09:33:41 -05:00
Tim Steinbach
a72348cc48 linux: 4.4.254 -> 4.4.255 2021-02-05 09:33:41 -05:00
Tim Steinbach
da98a8c94b linux: 4.19.172 -> 4.19.173 2021-02-05 09:33:41 -05:00
Tim Steinbach
165ca30ecf linux: 4.14.218 -> 4.14.219 2021-02-05 09:33:41 -05:00
Domen Kožar
9e1c01f500
--no-net is now --offline 2021-02-05 11:57:42 +00:00
Sandro
2fe06d9478
Merge pull request #106661 from IvarWithoutBones/update-rtl8821ce
linuxPackages.rtl8821ce: 5.5.2_34066.20200325 -> unstable-2020-12-16
2021-02-04 18:41:02 +01:00
Sandro
31bc8c38e6
Merge pull request #111908 from primeos/fscryptctl
fscryptctl-experimental: 2017-10-23 -> 0.1.0
2021-02-04 18:13:29 +01:00
Tim Steinbach
429800ea40 zfs: Add test references 2021-02-04 09:38:46 -05:00
Ryan Mulligan
a130a0a0d2
Merge pull request #111806 from r-ryantm/auto-update/pcm
pcm: 202011 -> 202101
2021-02-04 05:28:40 -08:00
Michael Weiss
6f6ce15938
fscryptctl-experimental: 2017-10-23 -> 0.1.0
Version 0.1.0 is based on the last commit that included support for V1
encryption policies. Version 1.0 is about to be released and will
include a PR which removes V1 policy support and adds V2 policy support.
Source: https://github.com/google/fscryptctl/issues/12#issuecomment-772888154

When version 1.0 is released we'll likely package it as fscryptctl and
mark fscryptctl-experimental as broken (referring to fscryptctl).
2021-02-04 13:39:00 +01:00
Martin Weinelt
95164dc11b
wpa_supplicant: fix for security advisory 2020-2
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners. The actual
parsing of that information validates field lengths appropriately, but
processing of the parsed information misses a length check when storing
a copy of the secondary device types. This can result in writing
attacker controlled data into the peer entry after the area assigned for
the secondary device type. The overflow can result in corrupting
pointers for heap allocations. This can result in an attacker within
radio range of the device running P2P discovery being able to cause
unexpected behavior, including termination of the wpa_supplicant process
and potentially arbitrary code execution.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Fixes: CVE-2021-0326
2021-02-04 00:31:38 +01:00
R. RyanTM
21063beadb pcm: 202011 -> 202101 2021-02-03 20:24:21 +00:00
Henri Menke
bde2fffbbe zfs: 2.0.1 -> 2.0.2 2021-02-03 11:18:48 -08:00
Jörg Thalheim
60d9784263
Merge pull request #109635 from mroi/patch-pam
linux-pam: fix cross compilation on Darwin
2021-02-03 05:42:45 +00:00
Michael Raskin
e83ab2e04d
Merge pull request #111039 from 0x4A6F/master-firejail
firejail: 0.9.64 -> 0.9.64.2
2021-02-02 22:15:03 +00:00
Markus Kowalewski
2576e20085
open-isns: 0.100 -> 0.101 2021-02-02 21:39:49 +01:00
Martin Weinelt
4499ac8c75
Merge pull request #110171 from r-ryantm/auto-update/openvswitch
openvswitch: 2.14.0 -> 2.14.1
2021-02-02 14:53:21 +01:00
Daniël de Kok
cf19c9f220
Merge pull request #111630 from danieldk/nvidia-settings-race
nvidia-settings: fix parallel build race condition
2021-02-02 13:03:03 +01:00
Sandro
24ae4d2b2a
Merge pull request #111607 from jtojnar/fwupd-1.5.5
fwupd: 1.5.3 → 1.5.5
2021-02-02 10:51:30 +01:00
Daniël de Kok
4db1c8b199 nvidia-settings: fix parallel build race condition
Fix a race condition that occurs in parallel builds of
nvidia-settings, frequently ending in the following error:

/bin/bash: _out/Linux_x86_64/antialias.png.h: No such file or directory
make[1]: *** [Makefile:320: _out/Linux_x86_64/antialias.png.h] Error 1

Upstream issue and fix from:
https://github.com/NVIDIA/nvidia-settings/issues/59
2021-02-02 08:33:24 +01:00
Tim Steinbach
b673417493
Revert "zfs: 2.0.1 -> 2.0.2"
This reverts commit e347e96601.
2021-02-01 20:23:03 -05:00
Jan Tojnar
8646063dd2
fwupd: 1.5.3 → 1.5.5
- https://github.com/fwupd/fwupd/releases/tag/1.5.4
- https://github.com/fwupd/fwupd/releases/tag/1.5.5
2021-02-01 21:27:05 +01:00
Tim Steinbach
67bdaf0655
linux/hardened/patches/5.4: 5.4.93-hardened1 -> 5.4.94-hardened1 2021-02-01 15:22:19 -05:00
Tim Steinbach
d30f2daf5e
linux/hardened/patches/5.10: 5.10.11-hardened1 -> 5.10.12-hardened1 2021-02-01 15:22:19 -05:00
Tim Steinbach
75f91c80bc
linux/hardened/patches/4.19: 4.19.171-hardened1 -> 4.19.172-hardened1 2021-02-01 15:22:18 -05:00
Tim Steinbach
e829b8379c
linux: 5.4.93 -> 5.4.94 2021-02-01 15:22:18 -05:00
Tim Steinbach
ab661e6635
linux: 5.10.11 -> 5.10.12 2021-02-01 15:22:18 -05:00
Tim Steinbach
9dbb058f91
linux: 4.9.253 -> 4.9.254 2021-02-01 15:22:17 -05:00
Tim Steinbach
3d3a55c7d3
linux: 4.4.253 -> 4.4.254 2021-02-01 15:22:17 -05:00
Tim Steinbach
3cd3d80bd9
linux: 4.19.171 -> 4.19.172 2021-02-01 15:22:17 -05:00
Tim Steinbach
9e19fc4949
linux: 4.14.217 -> 4.14.218 2021-02-01 15:22:16 -05:00
Henri Menke
e347e96601 zfs: 2.0.1 -> 2.0.2 2021-02-01 15:16:37 -05:00
Markus Kowalewski
119c1c55fd
linuxptp: fix license 2021-02-01 13:36:34 +01:00
Ninjatrappeur
4695a7ca51
Merge pull request #111498 from mweinelt/wpa_supplicant/owe
wpa_supplicant: backport support for OWE
2021-02-01 09:35:08 +01:00
Martin Weinelt
28f8b5f5f3 wpa_supplicant: backport support for OWE
The wpa_supplicant upstream is slow to push out new releases and has
been asked several times to do so. Support for Opportunistic Wireless
Encryption has been on master since late 2019 and still hasn't made it
into a release yet.

This backports a rather simple patchset to enable OWE key management
and exposes it also via DBus, so it can be used from Network-Manager.
2021-02-01 00:20:07 +01:00
Philipp Mildenberger
c67f9d2935 zfs: fix zfs legacy mount
Closes #110376
2021-01-31 17:03:23 +01:00