about summary refs log tree commit diff
path: root/pkgs/os-specific
Commit message (Collapse)AuthorAge
...
* | linux/hardened-patches/4.14: 4.14.176.a -> 4.14.177.aTim Steinbach2020-04-26
| |
* | linux: 4.9.219 -> 4.9.220Tim Steinbach2020-04-26
| |
* | linux: 4.4.219 -> 4.4.220Tim Steinbach2020-04-26
| |
* | linux: 4.14.176 -> 4.14.177Tim Steinbach2020-04-26
| |
* | Merge pull request #85984 from Mic92/wireguardJörg Thalheim2020-04-26
|\ \
| * | wireguard: 1.0.20200401 -> 1.0.20200413Jörg Thalheim2020-04-25
| |/
* | hostapd: apply patch for CVE-2019-16275Martin Weinelt2020-04-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | AP mode PMF disconnection protection bypass Published: September 11, 2019 Identifiers: - CVE-2019-16275 Latest version available from: https://w1.fi/security/2019-7/ Vulnerability hostapd (and wpa_supplicant when controlling AP mode) did not perform sufficient source address validation for some received Management frames and this could result in ending up sending a frame that caused associated stations to incorrectly believe they were disconnected from the network even if management frame protection (also known as PMF) was negotiated for the association. This could be considered to be a denial of service vulnerability since PMF is supposed to protect from this type of issues. It should be noted that if PMF is not enabled, there would be no protocol level protection against this type of denial service attacks. An attacker in radio range of the access point could inject a specially constructed unauthenticated IEEE 802.11 frame to the access point to cause associated stations to be disconnected and require a reconnection to the network. Vulnerable versions/configurations All hostapd and wpa_supplicants versions with PMF support (CONFIG_IEEE80211W=y) and a runtime configuration enabled AP mode with PMF being enabled (optional or required). In addition, this would be applicable only when using user space based MLME/SME in AP mode, i.e., when hostapd (or wpa_supplicant when controlling AP mode) would process authentication and association management frames. This condition would be applicable mainly with drivers that use mac80211. Possible mitigation steps - Merge the following commit to wpa_supplicant/hostapd and rebuild: AP: Silently ignore management frame from unexpected source address This patch is available from https://w1.fi/security/2019-7/ - Update to wpa_supplicant/hostapd v2.10 or newer, once available
* | iwd: 1.6 -> 1.7Maximilian Bosch2020-04-25
| |
* | ell: 0.30 -> 0.31Maximilian Bosch2020-04-25
|/
* linux_testing: 5.6-rc7 -> 5.7-rc2Austin Seipp2020-04-24
| | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* nvme-cli: 1.10.1 -> 1.11.1Michael Weiss2020-04-24
|
* Merge pull request #85880 from emilazy/linux-hardened-update-resilienceJörg Thalheim2020-04-24
|\
| * linux_*_hardened: index patches by major kernel versionEmily2020-04-23
| | | | | | | | | | | | | | This will avoid breaking the build whenever a non-major kernel update happens. In the update script, we map each kernel version to the latest patch for the latest kernel version less than or equal to what we have packaged.
* | Set version to 0.0.1Savanni D'Gerinel2020-04-23
| | | | | | | | | | | | ZenStates-Linux doesn't actually have a version, so I'm setting the version to 0.0.1 in case the developer eventually does start doing releases.
* | Add a Zenstates derivationSavanni D'Gerinel2020-04-23
|/
* linux_latest-hardened: fix evaluationJörg Thalheim2020-04-23
|
* linux_hardened: fix evaluationJörg Thalheim2020-04-23
|
* linux: 5.6.6 -> 5.6.7Tim Steinbach2020-04-23
|
* linux: 5.4.34 -> 5.4.35Tim Steinbach2020-04-23
|
* linux: 4.19.117 -> 4.19.118Tim Steinbach2020-04-23
|
* Merge master into staging-nextFrederik Rietdijk2020-04-23
|\
| * linux_latest-libre: 17402 -> 17445Tim Steinbach2020-04-22
| |
| * linux/hardened-patches/4.19.117: init at 4.19.117.akraem2020-04-22
| |
| * linux/hardened-patches/5.4.34: init at 5.4.34.akraem2020-04-22
| |
| * linux/hardened-patches/5.5.19: init at 5.5.19.akraem2020-04-22
| |
| * linux/hardened-patches/5.6.6: init at 5.6.6.akraem2020-04-22
| |
| * linux/hardened-patches/4.19.116: removekraem2020-04-21
| |
| * linux/hardened-patches/5.5.18: removekraem2020-04-21
| |
| * linux/hardened-patches/5.6.5: removekraem2020-04-21
| |
| * linux/hardened-patches/5.4.33: removekraem2020-04-21
| |
| * linux: 5.6.5 -> 5.6.6kraem2020-04-21
| |
| * linux: 5.5.18 -> 5.5.19kraem2020-04-21
| |
| * linux: 5.4.33 -> 5.4.34kraem2020-04-21
| |
| * linux: 4.19.116 -> 4.19.117kraem2020-04-21
| |
* | gnupg: use libusb1 (#85374)Linus Heckemann2020-04-21
| | | | | | | | | | | | | | * gnupg: use libusb1 This fixes scdaemon's direct ccid support. * systemd: fix gnupg-minimal
* | Merge staging-next into stagingFrederik Rietdijk2020-04-21
|\|
| * linux/hardened-patches/4.19.116: 4.19.116.NixOS-a -> 4.19.116.akraem2020-04-20
| |
| * linux/hardened-patches/5.4.33: 5.4.33.NixOS-a -> 5.4.33.akraem2020-04-20
| |
| * linux/hardened-patches/5.5.18: init at 5.5.18.akraem2020-04-20
| |
| * linux/hardened-patches/5.6.5: init at 5.6.5.akraem2020-04-20
| |
| * linux/hardened-patches/5.5.17: removekraem2020-04-20
| |
| * linux/hardened-patches/5.6.4: removekraem2020-04-20
| |
| * linux: 5.5.17 -> 5.5.18kraem2020-04-20
| |
| * linux: 5.6.4 -> 5.6.5kraem2020-04-20
| |
| * Merge pull request #84522 from emilazy/add-linux-hardened-patchesYegor Timoshenko2020-04-19
| |\ | | | | | | linux_*_hardened: use linux-hardened patch set
| | * linux_*_hardened: don't set FORTIFY_SOURCEEmily2020-04-17
| | | | | | | | | | | | Upstreamed in anthraxx/linux-hardened@d12c0d5f0c43f299634af7268f63929c1aaa10ee.
| | * linux_*_hardened: don't set PANIC_ON_OOPSEmily2020-04-17
| | | | | | | | | | | | Upstreamed in anthraxx/linux-hardened@366e0216f15b7007c1f8b7ca86df681cbc22b50a.
| | * linux_*_hardened: don't set SLAB_FREELIST_{RANDOM,HARDENED}Emily2020-04-17
| | | | | | | | | | | | | | | Upstreamed in anthraxx/linux-hardened@786126f177aba14110394be49b404beba061292f, anthraxx/linux-hardened@44822ebeb7c3ede030c58cc64fc1c8e8489c9063.
| | * linux_*_hardened: don't set HARDENED_USERCOPY_FALLBACKEmily2020-04-17
| | | | | | | | | | | | | | | Upstreamed in anthraxx/linux-hardened@c1fe7a68e368d05e109e69ee3491da69093883a3, anthraxx/linux-hardened@2c553a2bb115211c8e1c97eb8c949320aeb29a1d.
| | * linux_*_hardened: don't set DEBUG_LISTEmily2020-04-17
| | | | | | | | | | | | Upstreamed in anthraxx/linux-hardened@6b20124185e0548c1791bc8b7fde053de4fda269.