Commit Graph

18751 Commits

Author SHA1 Message Date
Thomas Tuegel
98c38d51b9
dropbox: 27.4.22 -> 28.4.14 2017-06-14 15:14:06 -05:00
Peter Simons
f59104bc73 vcsh: patch broken parser for $GIT_VERSION_MINOR 2017-06-14 21:28:28 +02:00
Will Dietz
b2660fe3cc mplayer: Use system ffmpeg instead of vendored version. (#26572)
Fixes use of mplayer with https:// URL's.
2017-06-14 17:44:33 +02:00
Michael Raskin
0032e55232 Merge pull request #26568 from taku0/flashplayer-26.0.0.126
flashplayer: 25.0.0.171 -> 26.0.0.126 [Critical security fixes]
2017-06-14 15:25:38 +02:00
taku0
264ec9242f flashplayer: 25.0.0.171 -> 26.0.0.126 2017-06-14 20:56:19 +09:00
Jörg Thalheim
537944ea77
gajim: 0.16.7 -> 0.16.8 2017-06-14 09:23:56 +01:00
Peter Hoeg
fd2976bb20 syncthing: 0.14.29 -> 0.14.30 2017-06-14 10:22:31 +08:00
Gabriel Ebner
0edd78f7bc calibre: fix missing gsettings schemas 2017-06-13 22:09:48 +02:00
Wei Tang
727ec216dc go-ethereum-classic: init at 3.5.0 (#26551)
thanks
2017-06-13 21:43:33 +02:00
Yann Hodique
5c8192c7d6 hugo: 0.22 -> 0.22.1 (#26558)
thanks
2017-06-13 21:40:45 +02:00
Urban Škudnik
053377e49f google-play-music-desktop-player: 4.2.0 -> 4.3.0 2017-06-13 21:32:51 +02:00
Franz Pletz
58605e0ace Merge pull request #26543 from jbedo/snpeff
snpeff: 4.3i -> 4.3p
2017-06-13 21:30:59 +02:00
Peter Simons
14283b6a95 vcsh: update to latest Git head, enable test suite, install man page 2017-06-13 20:16:30 +02:00
Tim Shaffer
e973c75d65 vim: update URL for vimrc
Previous URL was returning a 404. Adjusting the query parameters fixes
things.
2017-06-13 13:31:17 -04:00
Peter Simons
b7f71bd2ad mr: update to version 1.20170129 2017-06-13 16:55:50 +02:00
Justin Bedo
94ec54598c
snpeff: 4.3i -> 4.3p 2017-06-13 15:31:52 +10:00
Joachim F
7f4098f2c1 Merge pull request #26538 from sigma/pr/hugo-0.22
hugo: 0.21 -> 0.22
2017-06-12 23:29:48 +01:00
Joachim F
766c2aa2e9 Merge pull request #26532 from mdorman/emacs-updates
Automated emacs package updates
2017-06-12 21:30:16 +01:00
gratuxri
f78362d64c fvwm: 2.6.6 -> 2.6.7
Release notes: https://github.com/fvwmorg/fvwm/releases/tag/2.6.7
2017-06-12 21:25:00 +01:00
Yann Hodique
3b29d702da hugo: 0.21 -> 0.22 2017-06-12 10:21:40 -07:00
Michael Alan Dorman
97d750eac0 melpa-packages: 2017-06-12 2017-06-12 09:54:26 -04:00
Michael Alan Dorman
76082b63e8 melpa-stable-packages: 2017-06-12 2017-06-12 09:54:22 -04:00
Michael Alan Dorman
beb18e1350 org-packages: 2017-06-12 2017-06-12 09:54:17 -04:00
Michael Alan Dorman
0e532a3ede elpa-packages: 2017-06-12 2017-06-12 09:54:17 -04:00
Florent Becker
1951578395 pijul: 0.4.4 -> 0.6.0 2017-06-12 13:37:14 +02:00
Daiderd Jordan
a3317da9f9 Merge pull request #26275 from anderspapitto/rust-updates
rust: 1.15.0 -> 1.17.0
2017-06-11 17:59:11 +02:00
Vladimír Čunát
86da6d441f
lyx: maintenance 2.2.2 -> 2.2.3
In particular, they claim some fixes related to Qt-5.8,
so I switched back to using the default Qt (=5.8 ATM).

Tested just briefly.
2017-06-11 17:10:06 +02:00
Graham Christensen
4a90156912 Merge pull request #26512 from ntruessel/update-chromium
chromium: 58.0.3029.110 -> 59.0.3071.86
2017-06-11 09:38:22 -04:00
Jörg Thalheim
c4dbc30213 Merge pull request #26374 from vbgl/gnumeric-34
gnumeric: 1.12.32 → 1.12.34
2017-06-11 13:00:38 +01:00
Nicolas Truessel
74fd4de956 chromium: 58.0.3029.110 -> 59.0.3071.86 2017-06-11 13:26:03 +02:00
Tuomas Tynkkynen
94fd91742a bristol: Broken on aarch64
https://nix-cache.s3.amazonaws.com/log/lidml6isyxw55aly6p8q40y2ga64ay01-bristol-0.60.11.drv
2017-06-11 04:39:57 +03:00
Jörg Thalheim
f80d786853 Merge pull request #26343 from gnidorah/master4
wpsoffice: cleanup and i686 version
2017-06-10 23:40:04 +01:00
Anders Papitto
1e0866e064 rust: 1.15.0 -> 1.17.0
Also updates beta, nightly, nightlyBin, and bootstrap compilers.
Also updates the registry.
Also consolidates logic between bootstrap and nightlyBin compilers.
Also contains some miscellaneous cleanups.
Also patches firefox to build with the newer cargo
2017-06-10 15:15:50 -07:00
Jörg Thalheim
f2e1e7f3cd Merge pull request #26503 from vdemeester/update-runc
Update runc to 1.0.0-rc3
2017-06-10 22:48:03 +01:00
Jörg Thalheim
a1b7dec225 Merge pull request #26502 from vdemeester/update-gogland
idea.gogland: 171.4424.55 -> 171.4694.35
2017-06-10 21:59:46 +01:00
Jörg Thalheim
0cec85d0eb
jetbrains.clion: fix bundled tools 2017-06-10 21:46:56 +01:00
Vincent Demeester
46b00e0b15
Update runc to 1.0.0-rc3
- Fix compilation problems
- Remove patches as those are included in the sources now

Signed-off-by: Vincent Demeester <vincent@sbr.pm>
2017-06-10 18:05:57 +02:00
Vincent Demeester
0a6dd6d07b
idea.gogland: 171.4424.55 -> 171.4694.35
Signed-off-by: Vincent Demeester <vincent@sbr.pm>
2017-06-10 16:33:11 +02:00
Aristid Breitkreuz
1fe951816c ipmiview: 2.12.0 -> 2.13.0 2017-06-10 13:34:52 +02:00
Jörg Thalheim
f56d83761c Merge pull request #26254 from boomshroom/fix/i3block-scripts
i3blocks: add optional dependencies for scripts
2017-06-10 11:05:48 +01:00
Jörg Thalheim
800d525ac4 Merge pull request #26349 from midchildan/tilix
tilix: init at 1.5.8
2017-06-10 10:31:08 +01:00
Jörg Thalheim
308acf3199 Merge pull request #26478 from Moredread/profanity_tray
profanity: enable tray icon support
2017-06-10 09:25:53 +01:00
Jörg Thalheim
9e4eb9b696 Merge pull request #26498 from winniequinn/vscode-1.13.0
vscode: 1.12.2 -> 1.13.0
2017-06-10 09:22:26 +01:00
Karn Kallio
dc07372692
kdenlive : patch CMakeLists.txt to find Concurrent module. 2017-06-10 10:14:57 +02:00
Winnie Quinn
6736ec318a vscode: 1.12.2 -> 1.13.0 2017-06-09 22:17:23 -04:00
Joachim F
1a0b1d94ed Merge pull request #26454 from DeltaEvo/teamspeak
Teamspeak (client: 3.0.19.4 -> 3.1.4, server: 3.0.13.5 -> 3.0.13.6)
2017-06-09 22:59:01 +01:00
Michael Weiss
b615c2e992 android-studio: 2.3.2.0 -> 2.3.3.0 2017-06-09 18:46:54 +02:00
Joachim F
66e82eaea8 Merge pull request #26488 from romildo/upd.jwm
jwm: 1582 -> 1594
2017-06-09 15:33:54 +01:00
Graham Christensen
7d8218a351 Merge pull request #26489 from michalpalka/xen-security
xen: patch for XSAs: 206, 211, 212, 213, 214 and 215
2017-06-09 09:31:42 -04:00
Michał Pałka
dd3dcceb23 xen: patch for XSAs: 206, 211, 212, 213, 214 and 215
XSA-206 Issue Description:

> xenstored supports transactions, such that if writes which would
> invalidate assumptions of a transaction occur, the entire transaction
> fails.  Typical response on a failed transaction is to simply retry
> the transaction until it succeeds.
>
> Unprivileged domains may issue writes to xenstore which conflict with
> transactions either of the toolstack or of backends such as the driver
> domain. Depending on the exact timing, repeated writes may cause
> transactions made by these entities to fail indefinitely.

More: https://xenbits.xen.org/xsa/advisory-206.html

XSA-211 Issue Description:

> When a graphics update command gets passed to the VGA emulator, there
> are 3 possible modes that can be used to update the display:
>
> * blank - Clears the display
> * text - Treats the display as showing text
> * graph - Treats the display as showing graphics
>
> After the display geometry gets changed (i.e., after the CIRRUS VGA
> emulation has resized the display), the VGA emulator will resize the
> console during the next update command. However, when a blank mode is
> also selected during an update, this resize doesn't happen. The resize
> will be properly handled during the next time a non-blank mode is
> selected during an update.
>
> However, other console components - such as the VNC emulation - will
> operate as though this resize had happened. When the display is
> resized to be larger than before, this can result in a heap overflow
> as console components will expect the display buffer to be larger than
> it is currently allocated.

More: https://xenbits.xen.org/xsa/advisory-211.html

XSA-212 Issue Description:

> The XSA-29 fix introduced an insufficient check on XENMEM_exchange
> input, allowing the caller to drive hypervisor memory accesses outside
> of the guest provided input/output arrays.

More: https://xenbits.xen.org/xsa/advisory-212.html

XSA-213 Issue Description:

> 64-bit PV guests typically use separate (root) page tables for their
> kernel and user modes.  Hypercalls are accessible to guest kernel
> context only, which certain hypercall handlers make assumptions on.
> The IRET hypercall (replacing the identically name CPU instruction)
> is used by guest kernels to transfer control from kernel mode to user
> mode.  If such an IRET hypercall is placed in the middle of a multicall
> batch, subsequent operations invoked by the same multicall batch may
> wrongly assume the guest to still be in kernel mode.  If one or more of
> these subsequent operations involve operations on page tables, they may
> be using the wrong root page table, confusing internal accounting.  As
> a result the guest may gain writable access to some of its page tables.

More: https://xenbits.xen.org/xsa/advisory-213.html

XSA-214 Issue Description:

> The GNTTABOP_transfer operation allows one guest to transfer a page to
> another guest.  The internal processing of this, however, does not
> include zapping the previous type of the page being transferred.  This
> makes it possible for a PV guest to transfer a page previously used as
> part of a segment descriptor table to another guest while retaining the
> "contains segment descriptors" property.
>
> If the destination guest is a PV one of different bitness, it may gain
> access to segment descriptors it is not normally allowed to have, like
> 64-bit code segments in a 32-bit PV guest.
>
> If the destination guest is a HVM one, that guest may freely alter the
> page contents and then hand the page back to the same or another PV
> guest.
>
> In either case, if the destination PV guest then inserts that page into
> one of its own descriptor tables, the page still having the designated
> type results in validation of its contents being skipped.

More: https://xenbits.xen.org/xsa/advisory-214.html

XSA-215 Issue Description:

> Under certain special conditions Xen reports an exception resulting
> from returning to guest mode not via ordinary exception entry points,
> but via a so call failsafe callback.  This callback, unlike exception
> handlers, takes 4 extra arguments on the stack (the saved data
> selectors DS, ES, FS, and GS).  Prior to placing exception or failsafe
> callback frames on the guest kernel stack, Xen checks the linear
> address range to not overlap with hypervisor space.  The range spanned
> by that check was mistakenly not covering these extra 4 slots.

More: https://xenbits.xen.org/xsa/advisory-215.html
2017-06-09 13:09:01 +00:00