about summary refs log tree commit diff
Commit message (Collapse)AuthorAge
* runInLinuxVM, test-driver: pass host's cpu type to guest vmvolth2020-01-15
| | | | 'kvm64' is the most generic CPU, which does not support SSE4.2, AVX and other ISA extentions.
* Merge pull request #75698 from scaredmushroom/aircrack-ng_masterFranz Pletz2019-12-15
|\ | | | | aircrack-ng: fixed missing dependency for airmon-ng
| * aircrack-ng: fixed missing dependency for airmon-ngcap2019-12-15
| |
* | Merge pull request #75694 from plutotulp/spamassassin-ipv6-masterFranz Pletz2019-12-15
|\ \ | | | | | | spamassassin: enable IPv6 support with Socket6
| * | spamassassin: enable IPv6 support with Socket6Erlend Pedersen2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Communication between spamc and spamd would fail with messages about addresses being too long: error: Bad arg length for Socket::unpack_sockaddr_in, length is 28, should be 16 By adding Socket6 as a buildInput, spamd is now able to process emails without choking on IPv6 addresses.
* | | dolt: init at 0.12.0 (#75693)Danylo Hlynskyi2019-12-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * dolt: init at 0.12.0 * Update pkgs/servers/sql/dolt/default.nix Co-Authored-By: robert seaton <robbpseaton@gmail.com> * fix eval * Update pkgs/servers/sql/dolt/default.nix Co-Authored-By: Wael Nasreddine <wael.nasreddine@gmail.com> * update Go docs as well
* | | Merge pull request #75722 from flokli/xilinx-bootgenFlorian Klink2019-12-15
|\ \ \ | | | | | | | | xilinx-bootgen: init at 2019-10-23
| * | | xilinx-bootgen: init at unstable-2019-10-23Florian Klink2019-12-15
| | |/ | |/|
* | | Merge pull request #75723 from andir/advancecompMichael Raskin2019-12-15
|\ \ \ | | | | | | | | advancecomp: fix CVE-2019-9210
| * | | advancecomp: fix CVE-2019-9210Andreas Rammhold2019-12-15
| | | |
* | | | Merge pull request #75715 from andir/ansibleFranz Pletz2019-12-15
|\ \ \ \ | | | | | | | | | | ansible fixes for CVE-2019-10156 CVE-2019-10206 CVE-2019-14846 CVE-2019-14856 CVE-2019-14858 CVE-2019-14864
| * | | | ansible_2_6: 2.6.17 -> 2.6.20Andreas Rammhold2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This addresses the following security issues: * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/9bdb89f740a87bcf760424577ce18a8f68d7a741/changelogs/CHANGELOG-v2.6.rst
| * | | | ansible_2_8: 2.8.4 -> 2.8.7Andreas Rammhold2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This addresses the following security issues: * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864) * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) Changelog: https://github.com/ansible/ansible/blob/24220a618a6d5cd3b5c99f8c7f7771661ed08d33/changelogs/CHANGELOG-v2.8.rst
| * | | | ansible_2_7: 2.7.11 -> 2.7.15Andreas Rammhold2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This fixes the following security issues: * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864) * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/0623dedf2d9c4afc09e5be30d3ef249f9d1ebece/changelogs/CHANGELOG-v2.7.rst#v2-7-15
* | | | | Merge pull request #75708 from andir/thunderbird-binFranz Pletz2019-12-15
|\ \ \ \ \ | | | | | | | | | | | | thunderbird-bin: 68.2.2 -> 68.3.0
| * | | | | thunderbird-bin: 68.2.2 -> 68.3.0Andreas Rammhold2019-12-15
| | |_|/ / | |/| | |
* | | | | Merge pull request #67781 from jonringer/bump-errbotFranz Pletz2019-12-15
|\ \ \ \ \ | | | | | | | | | | | | errbot: 5.2.0 -> 6.1.1
| * | | | | errbot: 5.2.0 -> 6.1.1Jonathan Ringer2019-12-15
| | | | | |
* | | | | | Merge pull request #75193 from Ma27/optional-networkd-gatewayFranz Pletz2019-12-15
|\ \ \ \ \ \ | | | | | | | | | | | | | | nixos/networkd: only set gateway if it's explicitly specified in the module system
| * | | | | | nixos/networkd: only set gateway if it's explicitly specified in the module ↵Maximilian Bosch2019-12-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | system
* | | | | | | xmr-stak: 2.10.7 -> 2.10.8R. RyanTM2019-12-15
| | | | | | |
* | | | | | | Merge pull request #75234 from filalex77/subfinder-2.2.2Franz Pletz2019-12-15
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | subfinder: 2018-07-15 -> 2.2.4
| * | | | | | | subfinder: 2.2.2 -> 2.2.4Oleksii Filonenko2019-12-15
| | | | | | | |
| * | | | | | | subfinder: add filalex77 to maintainersOleksii Filonenko2019-12-08
| | | | | | | |
| * | | | | | | subfinder: 2018-07-15 -> 2.2.2Oleksii Filonenko2019-12-08
| | | | | | | |
* | | | | | | | Merge pull request #75474 from chkno/xsecurelock-no-longer-needs-xset-path-fixedFranz Pletz2019-12-15
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | xsecurelock: Remove obsolete path fix
| * | | | | | | | xsecurelock: Remove obsolete path fixChuck2019-12-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | helpers/saver_blank became trivial in xsecurelock commit d4a817ae5e071540a1b11825908dd91a8697591a, which first appeared in release 1.4.0.
* | | | | | | | | Merge pull request #75704 from andir/dovecotFranz Pletz2019-12-15
|\ \ \ \ \ \ \ \ \ | |_|_|_|_|_|_|/ / |/| | | | | | | | dovecot: 2.3.8 -> 2.3.9.2
| * | | | | | | | dovecot: 2.3.8 -> 2.3.9.2Andreas Rammhold2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Update to latest version & updated the patch file to match with the lastest verison. Fixes the following security issue: * CVE-2019-19722: Mails with group addresses in From or To fields caused crash in push notification drivers.
* | | | | | | | | Merge pull request #75682 from Kiwi/wire-desktop-iconworldofpeace2019-12-15
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | wire-desktop: fix desktop icon
| * | | | | | | | | wire-desktop: fix desktop iconRobert Djubek2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Update the Name attribute in the wire-desktop.desktop applications file and add StartupWMClass key. This fixes the icons on plasma5 and gnome3 which, in certain places, showed a generic X.org icon instead of the Wire icon.
* | | | | | | | | | gtk-server: 2.3.1 -> 2.4.5Jonathan Ringer2019-12-15
| |_|_|_|_|/ / / / |/| | | | | | | | | | | | | | | | | | | | | | | | | | Also bumped gtk version from gtk2 to gtk3
* | | | | | | | | Merge pull request #75692 from kampka/postgresql-backup-defaultDanylo Hlynskyi2019-12-15
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | postgresql-backup: Use saner defaults for pg_dump
| * | | | | | | | | postgresql-backup: Use saner defaults for pg_dumpChristian Kampka2019-12-15
| | | | | | | | | |
* | | | | | | | | | Merge pull request #75331 from r-ryantm/auto-update/python3.8-mysqlclientMario Rodas2019-12-15
|\ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | python38Packages.mysqlclient: 1.4.5 -> 1.4.6
| * | | | | | | | | | python38Packages.mysqlclient: 1.4.5 -> 1.4.6R. RyanTM2019-12-08
| | | | | | | | | | |
* | | | | | | | | | | Merge pull request #75368 from r-ryantm/auto-update/python3.8-sasmodelsMario Rodas2019-12-15
|\ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | python38Packages.sasmodels: 1.0.0 -> 1.0.1
| * | | | | | | | | | | python38Packages.sasmodels: 1.0.0 -> 1.0.1R. RyanTM2019-12-09
| |/ / / / / / / / / /
* | | | | | | | | | | Merge pull request #75675 from marsam/update-git-goneMario Rodas2019-12-15
|\ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | gitAndTools.git-gone: 0.1.2 -> 0.2.0
| * | | | | | | | | | | gitAndTools.git-gone: 0.1.2 -> 0.2.0Mario Rodas2019-12-14
| | |_|_|/ / / / / / / | |/| | | | | | | | |
* | | | | | | | | | | Merge pull request #75398 from r-ryantm/auto-update/tpm2-toolsMario Rodas2019-12-15
|\ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | tpm2-tools: 4.0.1 -> 4.1
| * | | | | | | | | | | tpm2-tools: 4.0.1 -> 4.1R. RyanTM2019-12-09
| | |/ / / / / / / / / | |/| | | | | | | | |
* | | | | | | | | | | Merge pull request #75516 from ivan/chromium-79.0.3945.79Graham Christensen2019-12-15
|\ \ \ \ \ \ \ \ \ \ \ | |_|_|_|_|_|_|_|_|/ / |/| | | | | | | | | | chromium: 78.0.3904.108 -> 79.0.3945.79
| * | | | | | | | | | chromium: fix enableWideVine for v79 which needs the manifest.json in ↵Ivan Kozik2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | WidevineCdm/
| * | | | | | | | | | chromium: explain enable_widevine = trueIvan Kozik2019-12-15
| | | | | | | | | | |
| * | | | | | | | | | chromium: remove enableNaCl optionIvan Kozik2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This hasn't worked since 2016 (https://github.com/NixOS/nixpkgs/issues/13983) and is being removed very soon, per "Q4 2019" in https://developer.chrome.com/native-client/migration (It's staying around for "Chrome Apps", but those only run on ChromeOS now.) earth.google.com users can use https://earth.google.com/web/?beta=1 to get the wasm version instead of the PNaCl version.
| * | | | | | | | | | chromium: use llvmPackages_9 to more closely match upstreamIvan Kozik2019-12-15
| | | | | | | | | | |
| * | | | | | | | | | chromium: fix GL support by not using the ANGLE GL implementationIvan Kozik2019-12-15
| | | | | | | | | | |
| * | | | | | | | | | chromium: 78.0.3904.108 -> 79.0.3945.79Ivan Kozik2019-12-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html CVE-2019-13725 CVE-2019-13726 CVE-2019-13727 CVE-2019-13728 CVE-2019-13729 CVE-2019-13730 CVE-2019-13732 CVE-2019-13734 CVE-2019-13735 CVE-2019-13764 CVE-2019-13736 CVE-2019-13737 CVE-2019-13738 CVE-2019-13739 CVE-2019-13740 CVE-2019-13741 CVE-2019-13742 CVE-2019-13743 CVE-2019-13744 CVE-2019-13745 CVE-2019-13746 CVE-2019-13747 CVE-2019-13748 CVE-2019-13749 CVE-2019-13750 CVE-2019-13751 CVE-2019-13752 CVE-2019-13753 CVE-2019-13754 CVE-2019-13755 CVE-2019-13756 CVE-2019-13757 CVE-2019-13758 CVE-2019-13759 CVE-2019-13761 CVE-2019-13762 CVE-2019-13763 The new widevine patch was taken from https://git.archlinux.org/svntogit/packages.git/plain/trunk/chromium-widevine.patch?h=packages/chromium
* | | | | | | | | | | Merge pull request #75671 from clayrat/tparsec-updateMario Rodas2019-12-15
|\ \ \ \ \ \ \ \ \ \ \ | |_|_|_|_|_|_|_|_|/ / |/| | | | | | | | | | idrisPackages.tparsec: 2019-06-18 -> 2019-09-19