about summary refs log tree commit diff
path: root/pkgs/os-specific
Commit message (Collapse)AuthorAge
* Merge branch 'staging' into masterDaiderd Jordan2017-07-08
|\
| * Merge branch 'glibc' of https://github.com/rnhmjoj/nixpkgs into stagingEelco Dolstra2017-07-06
| |\
| * \ Merge pull request #26974 from obsidiansystems/response-file-parsing-speedRyan Trinkle2017-07-05
| |\ \ | | | | | | | | cc-wrapper: improve response file parsing speed
| | * | cc-wrapper: fix response file parsing on ios-crossRyan Trinkle2017-07-05
| | | |
* | | | busybox: 1.26.2 -> 1.27.0Tim Steinbach2017-07-08
| | | |
* | | | Merge pull request #27161 from NeQuissimus/kernel_config_cleanupTim Steinbach2017-07-07
|\ \ \ \ | | | | | | | | | | linux: Clean up kernel config warnings
| * | | | linux: Clean up kernel config warningsTim Steinbach2017-07-05
| | |_|/ | |/| |
* | | | linux: Enable more I/O schedulersgnidorah2017-07-07
| | | |
* | | | nfs-utils: Replace reference to /bin/true0xABAB2017-07-06
| | | |
* | | | linux-copperhead: 4.11.8.a -> 4.12.bTim Steinbach2017-07-06
|/ / /
* | | firmwareLinuxNonfree: 2017-04-16 -> 2017-07-05Franz Pletz2017-07-05
| | | | | | | | | | | | Fixes #27129.
* | | linux: 4.4.75 -> 4.4.76Tim Steinbach2017-07-05
| | |
* | | linux: 4.9.35 -> 4.9.36Tim Steinbach2017-07-05
| | |
* | | linux: 4.11.8 -> 4.11.9Tim Steinbach2017-07-05
| | |
* | | Merge #27153: atop: don't chmod u+sVladimír Čunát2017-07-05
|\ \ \ | |/ / |/| |
| * | atop: don't chmod u+s, otherwise Nix build failsRicardo M. Correia2017-07-03
| | |
* | | Merge branch 'staging'Vladimír Čunát2017-07-05
|\ \ \ | | | | | | | | | | | | | | | | Comparison looks OK; I'll try some fixes on master directly. http://hydra.nixos.org/eval/1372577?compare=1372497
| * \ \ Merge branch 'master' into stagingVladimír Čunát2017-07-03
| |\ \ \
| * \ \ \ Merge branch 'master' into stagingVladimír Čunát2017-06-30
| |\ \ \ \ | | |_|_|/ | |/| | | | | | | | Mass rebuilds from master (>7k on x86_64-linux).
| * | | | misc pkgs: Remove unneeded *Platform == *Platform comparisonsJohn Ericson2017-06-30
| | | | | | | | | | | | | | | | | | | | | | | | | PR #26007 used these to avoid causing a mass rebuild. Now that we know things work, we do that to clean up.
| * | | | Merge accepted cross compilation PRs into stagingJohn Ericson2017-06-28
| |\ \ \ \
| * | | | | procps-ng: allow cygwinDavid McFarland2017-06-26
| | | | | |
| * | | | | Revert "linux: patch CVE-2017-1000364 (stack clash)"Franz Pletz2017-06-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This reverts commit aab71b31d5030bea94804d3677a3ffbc60e1876a. This was integrated into the stable 4.9 and 4.11 kernels.
| * | | | | Merge branch 'master' into stagingFranz Pletz2017-06-26
| |\ \ \ \ \
| * \ \ \ \ \ Merge some merged cross-compilation PRs into into stagingJohn Ericson2017-06-23
| |\ \ \ \ \ \
| * | | | | | | linux: patch CVE-2017-1000364 (stack clash)Franz Pletz2017-06-22
| | | | | | | |
| * | | | | | | Merge branch 'master' into stagingFranz Pletz2017-06-22
| |\ \ \ \ \ \ \
| * | | | | | | | utillinux: 2.29.2 -> 2.30Franz Pletz2017-06-22
| | | | | | | | |
| * | | | | | | | alsa-utils: 1.1.2 -> 1.1.4Bart Brouns2017-06-19
| | | | | | | | |
| * | | | | | | | alsa-tools: 1.1.0 -> 1.1.3Bart Brouns2017-06-19
| | | | | | | | |
| * | | | | | | | alsa-plugins: 1.1.1 -> 1.1.4Bart Brouns2017-06-19
| | | | | | | | |
| * | | | | | | | alsa-lib: 1.1.2 -> 1.1.4.1Bart Brouns2017-06-19
| | | | | | | | |
* | | | | | | | | Revert "linux-copperhead: 4.11.8.a -> 4.12.a"Tim Steinbach2017-07-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This reverts commit cb703f1314987fe22a9a5fc3b468b7f311cc1ab7.
* | | | | | | | | zfs: update kernel versions constraint for linux 4.12Jörg Thalheim2017-07-04
| | | | | | | | |
* | | | | | | | | psmisc: 23.0 -> 23.1Tuomas Tynkkynen2017-07-04
| | | | | | | | |
* | | | | | | | | iw: 4.3 -> 4.9Tuomas Tynkkynen2017-07-04
| | | | | | | | |
* | | | | | | | | linux-copperhead: 4.11.8.a -> 4.12.aTim Steinbach2017-07-03
| |_|_|_|_|_|_|/ |/| | | | | | |
* | | | | | | | linux: Add 4.12Tim Steinbach2017-07-03
| |_|_|_|_|_|/ |/| | | | | |
* | | | | | | kmod-debian-aliases: Fix source tarball URL.es_github2017-07-03
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The original URL for this package was pointed at a location that wasn't longterm-stable, and has by now been removed by Debian. This commit fixes the URL to point at a debian snapshot entry, which should stick around for the long run. Hash is unchanged, so this is safe.
* | | | | | | Merge pull request #26939 from dtzWill/fix/perms-fallout-misc-2Joachim F2017-06-30
|\ \ \ \ \ \ \ | |_|_|_|_|_|/ |/| | | | | | Fixup various setuid/setgid permission problems, part 2
| * | | | | | firejail: don't try to set setuid bitWill Dietz2017-06-28
| | | | | | |
| * | | | | | kbdlight: Fix installation permissionsWill Dietz2017-06-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Looks like NixOS creates a security wrapper for this already, FWIW.
* | | | | | | Merge pull request #26972 from zx2c4/patch-5Jörg Thalheim2017-06-30
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | wireguard: 0.0.20170613 -> 0.0.20170629
| * | | | | | | wireguard: 0.0.20170613 -> 0.0.20170629Jason A. Donenfeld2017-06-29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Simple version bump. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* | | | | | | | linux-copperhead: 4.11.7.a -> 4.11.8.aTim Steinbach2017-06-29
|/ / / / / / / | | | | | | | | | | | | | | | | | | | | | Fixes #26790 by properly including built modules
* | | | | | | linux: 4.11.7 -> 4.11.8Tim Steinbach2017-06-29
| | | | | | |
* | | | | | | linux: 4.9.34 -> 4.9.35Tim Steinbach2017-06-29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Also, remove XSA-216 patches, the fixes are now integrated upstream
* | | | | | | linux: 4.4.74 -> 4.4.75Tim Steinbach2017-06-29
| | | | | | |
* | | | | | | Merge pull request #26867 from michalpalka/xen-security-2017.06-newTim Steinbach2017-06-28
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | xen: patch for XSAs: 216, 217, 218, 219, 220, 221, 222, and 224
| * | | | | | | xen: patch for XSAs: 216, 217, 218, 219, 220, 221, 222, and 224Michał Pałka2017-06-26
| | |_|_|_|/ / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | XSA-216 Issue Description: > The block interface response structure has some discontiguous fields. > Certain backends populate the structure fields of an otherwise > uninitialized instance of this structure on their stacks, leaking > data through the (internal or trailing) padding field. More: https://xenbits.xen.org/xsa/advisory-216.html XSA-217 Issue Description: > Domains controlling other domains are permitted to map pages owned by > the domain being controlled. If the controlling domain unmaps such a > page without flushing the TLB, and if soon after the domain being > controlled transfers this page to another PV domain (via > GNTTABOP_transfer or, indirectly, XENMEM_exchange), and that third > domain uses the page as a page table, the controlling domain will have > write access to a live page table until the applicable TLB entry is > flushed or evicted. Note that the domain being controlled is > necessarily HVM, while the controlling domain is PV. More: https://xenbits.xen.org/xsa/advisory-217.html XSA-218 Issue Description: > We have discovered two bugs in the code unmapping grant references. > > * When a grant had been mapped twice by a backend domain, and then > unmapped by two concurrent unmap calls, the frontend may be informed > that the page had no further mappings when the first call completed rather > than when the second call completed. > > * A race triggerable by an unprivileged guest could cause a grant > maptrack entry for grants to be "freed" twice. The ultimate effect of > this would be for maptrack entries for a single domain to be re-used. More: https://xenbits.xen.org/xsa/advisory-218.html XSA-219 Issue Description: > When using shadow paging, writes to guest pagetables must be trapped and > emulated, so the shadows can be suitably adjusted as well. > > When emulating the write, Xen maps the guests pagetable(s) to make the final > adjustment and leave the guest's view of its state consistent. > > However, when mapping the frame, Xen drops the page reference before > performing the write. This is a race window where the underlying frame can > change ownership. > > One possible attack scenario is for the frame to change ownership and to be > inserted into a PV guest's pagetables. At that point, the emulated write will > be an unaudited modification to the PV pagetables whose value is under guest > control. More: https://xenbits.xen.org/xsa/advisory-219.html XSA-220 Issue Description: > Memory Protection Extensions (MPX) and Protection Key (PKU) are features in > newer processors, whose state is intended to be per-thread and context > switched along with all other XSAVE state. > > Xen's vCPU context switch code would save and restore the state only > if the guest had set the relevant XSTATE enable bits. However, > surprisingly, the use of these features is not dependent (PKU) or may > not be dependent (MPX) on having the relevant XSTATE bits enabled. > > VMs which use MPX or PKU, and context switch the state manually rather > than via XSAVE, will have the state leak between vCPUs (possibly, > between vCPUs in different guests). This in turn corrupts state in > the destination vCPU, and hence may lead to weakened protections > > Experimentally, MPX appears not to make any interaction with BND* > state if BNDCFGS.EN is set but XCR0.BND{CSR,REGS} are clear. However, > the SDM is not clear in this case; therefore MPX is included in this > advisory as a precaution. More: https://xenbits.xen.org/xsa/advisory-220.html XSA-221 Issue Description: > When polling event channels, in general arbitrary port numbers can be > specified. Specifically, there is no requirement that a polled event > channel ports has ever been created. When the code was generalised > from an earlier implementation, introducing some intermediate > pointers, a check should have been made that these intermediate > pointers are non-NULL. However, that check was omitted. More: https://xenbits.xen.org/xsa/advisory-221.html XSA-222 Issue Description: > Certain actions require removing pages from a guest's P2M > (Physical-to-Machine) mapping. When large pages are in use to map > guest pages in the 2nd-stage page tables, such a removal operation may > incur a memory allocation (to replace a large mapping with individual > smaller ones). If this allocation fails, these errors are ignored by > the callers, which would then continue and (for example) free the > referenced page for reuse. This leaves the guest with a mapping to a > page it shouldn't have access to. > > The allocation involved comes from a separate pool of memory created > when the domain is created; under normal operating conditions it never > fails, but a malicious guest may be able to engineer situations where > this pool is exhausted. More: https://xenbits.xen.org/xsa/advisory-222.html XSA-224 Issue Description: > We have discovered a number of bugs in the code mapping and unmapping > grant references. > > * If a grant is mapped with both the GNTMAP_device_map and > GNTMAP_host_map flags, but unmapped only with host_map, the device_map > portion remains but the page reference counts are lowered as though it > had been removed. This bug can be leveraged cause a page's reference > counts and type counts to fall to zero while retaining writeable > mappings to the page. > > * Under some specific conditions, if a grant is mapped with both the > GNTMAP_device_map and GNTMAP_host_map flags, the operation may not > grab sufficient type counts. When the grant is then unmapped, the > type count will be erroneously reduced. This bug can be leveraged > cause a page's reference counts and type counts to fall to zero while > retaining writeable mappings to the page. > > * When a grant reference is given to an MMIO region (as opposed to a > normal guest page), if the grant is mapped with only the > GNTMAP_device_map flag set, a mapping is created at host_addr anyway. > This does *not* cause reference counts to change, but there will be no > record of this mapping, so it will not be considered when reporting > whether the grant is still in use. More: https://xenbits.xen.org/xsa/advisory-224.html