Commit graph

3316 commits

Author SHA1 Message Date
adam
a1cc34c65c Changes 2.1.0:
Incompatible changes:
---------------------
The 82573L NIC was incorrectly treated as an 8254xx model. It no longer works correctly on either Linux (3.14.*) or Windows 7 and has been removed.
On x86, migration from QEMU 1.7 to QEMU 2.0 was broken if the guest had PCI bridges or for some number of CPUs (12, 13, 14, 54, 55, 56, 97, 98, 99, 139, 140) are the only ones). QEMU 2.1 fixes this, so that migration from QEMU 1.7 to QEMU 2.1 should always work. However, the fix breaks the following scenarios instead:
migration from QEMU 2.0 to QEMU 2.1 with PCI bridges and machine types pc-i440fx-1.7/pc-i440fx-2.0
migration from QEMU 2.0 to QEMU 2.1 with the aforementioned number of CPUs and machine type pc-i440fx-1.7

Future incompatible changes:
----------------------------
Three options are using different names on the command line and in configuration file. In particular:
The "acpi" configuration file section matches command-line option "acpitable";
The "boot-opts" configuration file section matches command-line option "boot";
The "smp-opts" configuration file section matches command-line option "smp".
Starting with QEMU xyz.jkl, -readconfig will standardize on the name for the command line option.

ARM
---
Firmware can be passed to the vexpress machine via -bios.
Improvements to Allwinner SoC emulation.
AArch64 TCG system emulation support.
AArch64 SHA and Crypto instruction support.

LM32
----
Support for semihosting.

Microblaze
----------
Support for u-boot initrd images.

MIPS
----
Support for KVM in the Malta board.

more...
2014-08-17 08:57:01 +00:00
obache
23ad858670 Appy openSUSE-SU-2014:0939-1, fixes CVE-2014-1544.
Bump PKGREVISION.
2014-08-01 09:28:47 +00:00
wiz
01fe2702c3 Update mame+mess to 0.154. Share more information between packages.
Changes: the usual, better emulation for more systems.
2014-07-25 15:28:56 +00:00
obache
82a49dc1ed Apply security update for suse131_libdbus.
Bump PKGREVISION.

   openSUSE Security Update: dbus-1: fixes several issues
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2014:0926-1
Rating:             moderate
References:         #885241
Affected Products:
                    openSUSE 13.1
______________________________________________________________________________

   An update that contains security fixes can now be installed.

Description:

   CVE-2014-3532 CVE-2014-3533 bnc#885241 fdo#80163 fdo#79694 fdo#80469
2014-07-21 08:18:11 +00:00
gson
ed8422aec1 Fix qemu bug 1335444 aka PR pkg/48071. Patches from Kirill Batuzov,
with minor changes to make them apply to 2.0.0.  Bump PKGREVISION.
2014-07-11 19:15:08 +00:00
ryoon
9844ebe994 Update to 0.9.16
* Update EmuTOS image to 0.9.3

Changelog:
2013/04/12 - version 0.9.16 released @ atariada.cz

 Major highlights of this release:

 o JIT CPU compiler supported on 64-bit Linux and Mac OS X now!
   (Jens made a miracle)

 o MFPR FPU emulation should be perfect
   (Andreas ironed out few remainings bugs)

 o Ethernet support under Mac OS X should be way better
   (Philipp added support for big packets and multi-packets)

 o ARAnyM (with JIT?) now runs also on ARM platform driven by Linux
   (is Jens planning on making a blazing fast ARAnyM on Android?)

 o new config setting "LoadToFastRAM" to load kernel in FastRAM
   (is Andreas working on fixing Linux-m68k issues in FastRAM?)

 o David Gálvez improved NatFeat USB support (now requires FreeMiNT 1.17+)

 There's also a small set of bugs fixed in this release - mainly in Mac OS X
 thanks to Philipp but also some generic things like GPIP (Patrice).
2014-07-08 13:37:30 +00:00
dholland
08a9c2e47b oops, fix yesterday's patch 2014-06-29 18:11:32 +00:00
dholland
35480a50fc fix build failure on netbsd amd64 2014-06-28 21:20:06 +00:00
asau
854311e2c7 Close the string literal. 2014-06-27 00:07:27 +00:00
obache
fb19cfb2bd Apply openSUSE Security Update: dbus-1: Fixed possible DoS
Announcement ID:    openSUSE-SU-2014:0821-1

Description:

   dbus-1 was updated to fix a possible DoS (CVE-2014-3477).

Bump PKGREVISION.
2014-06-21 13:52:49 +00:00
obache
25dc5a01ab Apply openSUSE Security Update: MozillaFirefox, mozilla-nspr:
Update fixes nine security issues

Announcement ID:    openSUSE-SU-2014:0819-1

Description:
   mozilla-nspr was updated to version 4.10.6 to fix one security issue:
   * OOB write with sprintf and console functions (CVE-2014-1545)

Bump PKGREVISION.
2014-06-21 13:35:54 +00:00
tsutsui
5b89e6054a Update xnp2 to 20140607. (leaf package update)
Upstream changes (no English changelog):

20140607:
 X11 dependent part:
  Change filenames of config file and status files for xnp21 binary
  built by --enable-build-all:
  - config files
    $(HOME)/.np2/np21rc
  - status files
    $(HOME)/.np2/sav/np21.sav
    $(HOME)/.np2/sav/np21.s00 etc.
2014-06-20 20:11:27 +00:00
wiz
a9dc16a509 Bump PKGREVISION for cups -> cups15 change. 2014-06-18 09:28:16 +00:00
wiz
a5caa2b4a1 Switch all cups packages to use cups15. 2014-06-18 09:26:09 +00:00
dsainty
924db03f7b Remove @hfill - not supported by gtexinfo 5+ 2014-06-13 04:06:26 +00:00
dsainty
46ec97e419 If TeX is installed it is used to build a PDF. Since we don't install the
PDF, there's no point in building it, so disable TeX auto-detection.
2014-06-13 03:41:46 +00:00
ryoon
31da25953c Recursive revbump from pulseaudio-5.0 2014-06-09 14:18:04 +00:00
obache
2a3bc4b5dd Apply openSUSE-SU-2014:0764-1
openSUSE Security Update: openssl: update to version 1.0.1h

Description:

   The openssl library was updated to version 1.0.1h fixing various security
   issues and bugs:

   Security issues fixed:
   - CVE-2014-0224: Fix for SSL/TLS MITM flaw. An attacker using a carefully
     crafted handshake can force the use of weak keying material in OpenSSL
     SSL/TLS clients and servers.
   - CVE-2014-0221: Fix DTLS recursion flaw. By sending an invalid DTLS
     handshake to an OpenSSL DTLS client the code can be made to recurse
     eventually crashing in a DoS attack.
   - CVE-2014-0195: Fix DTLS invalid fragment vulnerability. A buffer
     overrun attack can be triggered by sending invalid DTLS fragments to an
      OpenSSL DTLS client or server. This is potentially exploitable to run
      arbitrary code on a vulnerable client or server.
   - CVE-2014-3470: Fix bug in TLS code where clients enable anonymous ECDH
     ciphersuites are subject to a denial of service attack.

Bump PKGREVISION.
2014-06-06 09:53:29 +00:00
wiz
1ac2942de3 Update reference to font installation path. 2014-06-01 16:49:24 +00:00
wiz
3d8103bef9 Install fonts into default installation path. Bump PKGREVISION. 2014-06-01 16:48:31 +00:00
tsutsui
2a6b7d2c9d Update xnp2 to 20140531.
pkgsrc changes:
 - remove xnp2-ia32 option
 - always build both xnp2 (80286 core) and xnp21 (IA-32 core) binaries

Upstream changes (no English changelog):
 - --enable-build-all option to configure that enables to build
   both 80286 core and IA-32 core binaries is added
   (per my request, thanks nonaka@)
2014-06-01 14:59:42 +00:00
wiz
c26f5ca940 libungif is not relevant any longer since the GIF relevant patents
expired (about 10 years ago).

Unconditionally switch to libgif.

As discussed on tech-pkg without dissent.

Bump PKGREVISION.
2014-05-31 15:56:26 +00:00
wiz
7eeb51b534 Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
2014-05-29 23:35:13 +00:00
obache
2caffe812b Apply openSUSE Security Update: openSUSE-SU-2014:0716-1
libxml2, python-libxml2: Prevent external entities from being loaded

Description:

   Updated fix for openSUSE-SU-2014:0645-1 because of a regression that
   caused xmllint to break.

Bump PKGREVISION.
2014-05-27 13:27:25 +00:00
obache
4296dfa9ba Fixes build with giflib-5.1. 2014-05-25 09:44:43 +00:00
obache
b97364ef42 Revbump after updating graphics/giflib 2014-05-25 09:19:37 +00:00
obache
68554ed4f5 Bump PKGREVISION to refrect libXfont rpm update. 2014-05-23 13:20:50 +00:00
obache
25187bd757 Apply openSUSE Security Update: openSUSE-SU-2014:0711-1
libXfont: Fixed multiple vulnerabilities

   An update that fixes three vulnerabilities is now available.

Description:

   libxfont was updated to fix multiple vulnerabilities:
   - Integer overflow of allocations in font metadata file parsing
     (CVE-2014-0209).
   - Unvalidated length fields when parsing xfs protocol replies
     (CVE-2014-0210).
   - Integer overflows calculating memory needs for xfs replies
     (CVE-2014-0211).

   These vulnerabilities could be used by a local, authenticated user to
   raise privileges
   or by a remote attacker with control of the font server to execute code
    with the privileges of the X server.
2014-05-23 13:18:56 +00:00
obache
bd15dc22e7 Set big_endian flag for the case MACHINE_ENDIAN=big.
Fixes big-endian runtime failure, PR pkg/48823.

Bump PKGREVISION.
2014-05-20 12:38:25 +00:00
obache
06c6aca5b9 Pass EXTRALIBS with MAKE_FLAGS, multiple commented out lines in Makefile.local. 2014-05-20 12:33:18 +00:00
obache
2d9070ad46 CFLAGS/LDFLAGS are already defined as good enough, so use them. 2014-05-20 12:26:11 +00:00
obache
8041289ae7 Change SUBST_STAGEs from post-patch to post-configure for patch maintainance
easier.
2014-05-20 11:43:02 +00:00
obache
f9df99c79c Use ${COMPILER_RPATH_FLAG} instead of bare "-Wl,-R", and ${PKGMANDIR} instead
of "man".
2014-05-20 11:29:25 +00:00
joerg
91e2cf355b Don't assign PKGVERRSION. Set PKGNAME. Fixes bulk builds. 2014-05-18 21:20:33 +00:00
wiz
3faf991a33 Bump applications PKGREVISIONs for python users that might be using
python3, since the default changed from python33 to python34.

I probably bumped too many. I hope I got them all.
2014-05-17 16:10:41 +00:00
wiz
d142fd022d Fix fetch. 2014-05-15 18:39:28 +00:00
adam
28bb94d01f Revbump after updating graphics/giflib 2014-05-15 14:41:45 +00:00
wiz
014679da64 Add a patch based on upstream git fixing five different CVEs in one file.
Congratulations.

Bump PKGREVISION.
2014-05-15 12:28:13 +00:00
obache
e4ab297071 Apply openSUSE Recommended Update: openSUSE-RU-2014:0617-1
alsa-oss: bugfix update

Description:

   The ALSA OSS plugin was updated to fix bugs:
   - Fix for dmix with unaligned sample rate:

   - Revert patch 0001-Fix-path-to-libaoss.so.patch, as this
   causes regressions on multi-arch (bnc#874331)

Bump PKGREVISION.
2014-05-15 12:00:59 +00:00
obache
c68c5211d0 Apply openSUSE Security Update: openSUSE-SU-2014:0645-1
libxml2

Description:

   - fix for CVE-2014-0191 (bnc#876652)
   * libxml2: external parameter entity loaded when entity substitution is
   disabled
   * added libxml2-CVE-2014-0191.patch

Bump PKGREVISION.
2014-05-15 11:27:22 +00:00
obache
0f2356c468 Apply openSUSE Security Update: openSUSE-SU-2014:0635-1
update for openssl

Description:

   - Fixed bug[ bnc#876282], CVE-2014-0198 openssl: OpenSSL NULL pointer
   dereference in do_ssl3_write Add file: CVE-2014-0198.patch

Bump PKGREVISION.
2014-05-14 09:31:44 +00:00
wiz
c1b44346cd Mark packages that are not ready for python-3.3 also not ready for 3.4,
until proven otherwise.
2014-05-09 07:36:53 +00:00
obache
f4b8d4f15b Apply openSUSE Security Update: openSUSE-SU-2014:0618-1
update for libpng12

Description:

   This libpng12 update fixes the following two security
   issues.

   - bnc#873123: Fixed integer overflow leading to a
   heap-based buffer  overflow in png_set_sPLT() and
   png_set_text_2() (CVE-2013-7354).
   - bnc#873124: Fixed integer overflow leading to a
   heap-based buffer  overflow in png_set_unknown_chunks()
   (CVE-2013-7353).

Bump PKGREVISION.
2014-05-08 12:46:36 +00:00
obache
5b7cbb14b7 Not found sites providing update rpm for suse-10.0. 2014-05-05 02:08:20 +00:00
obache
8774de16c8 Add entries for ppc. 2014-05-05 01:32:33 +00:00
obache
e2f3e8d83d Update MASTER_SITES for suse10.0 distributuion. 2014-05-05 01:31:49 +00:00
ryoon
60806aa001 Recursive revbump from x11/pixman
Fix PR pkg/48777
2014-05-05 00:47:34 +00:00
wiz
e2247f2082 Stop maintaining it. 2014-05-04 16:18:55 +00:00
obache
f9f8b72048 Apply Security Update: openSUSE-SU-2014:0599-1
update for MozillaFirefox

Description:

   This is also a mozilla-nss update to version 3.16:
   * required for Firefox 29
   * bmo#903885 - (CVE-2014-1492) In a wildcard certificate,
   the wildcard character should not be embedded within
   the U-label of an internationalized domain name. See
   the last bullet point in RFC 6125, Section 7.2.
   * Supports the Linux x32 ABI. To build for the Linux x32
   target, set the environment variable USE_X32=1 when
   building NSS. New Functions:
   * NSS_CMSSignerInfo_Verify New Macros
   * TLS_RSA_WITH_RC4_128_SHA,
   TLS_RSA_WITH_3DES_EDE_CBC_SHA, etc., cipher suites that
   were first defined in SSL 3.0 can now be referred to
   with their official IANA names in TLS, with the TLS_
   prefix. Previously, they had to be referred to with
   their names in SSL 3.0, with the SSL_ prefix. Notable
   Changes:
   * ECC is enabled by default. It is no longer necessary to
   set the environment variable NSS_ENABLE_ECC=1 when
   building NSS. To disable ECC, set the environment
   variable NSS_DISABLE_ECC=1 when building NSS.
   * libpkix should not include the common name of CA as DNS
   names when evaluating name constraints.
   * AESKeyWrap_Decrypt should not return SECSuccess for
   invalid keys.
   * Fix a memory corruption in sec_pkcs12_new_asafe.
   * If the NSS_SDB_USE_CACHE environment variable is set,
   skip the runtime test sdb_measureAccess.
   * The built-in roots module has been updated to version
   1.97, which adds, removes, and distrusts several
   certificates.
   * The atob utility has been improved to automatically
   ignore lines of text that aren't in base64 format.
   * The certutil utility has been improved to support
   creation of version 1 and version 2 certificates, in
   addition to the existing version 3 support.

Bump PKGREVISION.
2014-05-03 02:19:27 +00:00
obache
91b791163c Apply Security Update: openSUSE-SU-2014:0598-1
update for curl

Description:

   This curl update fixes two security issues:

   - bnc#868627: Fixed wrong re-use of connections
   (CVE-2014-0138).
   - bnc#868629: Fixed IP address wildcard certificate
   validation  (CVE-2014-0139).

Bump PKGREVISION.
2014-05-03 02:13:44 +00:00