3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

33607 commits

Author SHA1 Message Date
Sandro 06ee8e7580
Merge pull request #117402 from fabaff/bump-ldeep
ldeep: 1.0.9 -> 1.0.10
2021-03-24 13:12:39 +01:00
Sandro 6b74bbfb96
Merge pull request #117409 from fabaff/sipvicious
sipvicious: init at 0.3.2
2021-03-24 13:09:15 +01:00
Robert Schütz a710de5592
github-backup: init at 0.39.0 (#116976) 2021-03-24 13:02:12 +01:00
Maximilian Bosch dd14ecf90e
Merge pull request #117429 from marsam/update-starship
starship: 0.50.0 -> 0.51.0
2021-03-24 11:53:09 +01:00
ajs124 788575a4de jsawk: spidermonkey_38 -> spidermonkey_78
the examples from the readme work just fine, with this version
2021-03-24 10:39:11 +01:00
ajs124 5886dda306 plowshare: spidermonkey_38 -> spidermonkey_78 2021-03-24 10:39:11 +01:00
Silvan Mosberger 1638776b7b
botamusique: init at unstable-2021-03-13 2021-03-24 01:04:57 +01:00
Fabian Affolter 6214cfb3ec sipvicious: init at 0.3.2 2021-03-23 23:18:17 +01:00
Fabian Affolter 316146ae56 ldeep: 1.0.9 -> 1.0.10 2021-03-23 21:20:18 +01:00
Flakebi 2ce3eff490
salt: 3002.5 -> 3002.6 2021-03-23 19:38:14 +01:00
R. RyanTM 4552283352 pspg: 4.3.1 -> 4.4.0 2021-03-23 13:48:29 -04:00
Sandro 70b387da70
Merge pull request #117340 from fabaff/bump-metasploit
metasploit: 6.0.34 -> 6.0.36
2021-03-23 15:42:04 +01:00
Oleksii Filonenko 53552a03bf
Merge pull request #116850 from r-ryantm/auto-update/frp
frp: 0.36.0 -> 0.36.1
2021-03-23 16:25:33 +02:00
Ryan Mulligan 2525aa43a0
Merge pull request #116949 from r-ryantm/auto-update/lokalise2-cli
lokalise2-cli: 2.6.3 -> 2.6.4
2021-03-23 07:07:01 -07:00
Peter Hoeg d527d1d528 home-manager: 2021-01-16 -> 2021-03-21 2021-03-23 18:38:25 +08:00
Fabian Affolter 5ec1f89c23 metasploit: 6.0.34 -> 6.0.36 2021-03-23 11:32:40 +01:00
zseri a9ec3f7b66 digitemp: init at 3.7.2
This does not include digitemp_DS2490, as that seems to require libusb0.1,
which isn't in nixpkgs.
2021-03-23 18:29:35 +08:00
Jörg Thalheim d280e1f78c
Merge pull request #116788 from veprbl/pr/texlive_find_tarballs_fix
texlive.combine: export `packages` attribute to help find-tarballs.nix
2021-03-23 09:28:32 +00:00
Emery Hemingway ee80707159 Trim ehmry from some package maintainers
I prefer not to be associated with anything blockchain related.
2021-03-23 10:24:00 +01:00
R. RyanTM 90a9906637 libcpuid: 0.5.0 -> 0.5.1 2021-03-23 10:11:42 +01:00
David Birks ee7a7ffc30 microplane: 0.0.26 -> 0.0.28
Also switching from deps to go mod, since they made the change upstream.
2021-03-23 01:20:14 -04:00
Mario Rodas 245fe8f93d starship: 0.50.0 -> 0.51.0
https://github.com/starship/starship/releases/tag/v0.51.0
2021-03-23 04:20:00 +00:00
Ryan Mulligan b9f8d6ecdf
Merge pull request #117182 from r-ryantm/auto-update/getmail6
getmail6: 6.14 -> 6.15
2021-03-22 21:11:53 -07:00
Ryan Mulligan 444ca81faf
Merge pull request #117189 from r-ryantm/auto-update/goreleaser
goreleaser: 0.159.0 -> 0.160.0
2021-03-22 21:06:33 -07:00
Ryan Mulligan c1721401e3
Merge pull request #117294 from r-ryantm/auto-update/eksctl
eksctl: 0.40.0 -> 0.41.0
2021-03-22 21:03:27 -07:00
Graham Christensen 7eda163eac
Merge pull request #115310 from mweinelt/grub2
grub: 2.0.4 -> 2.0.6-rc1
2021-03-22 22:34:14 -04:00
Martin Weinelt 97c52d5782
grub: 2.0.4 -> 2.0.6-rc1
Quoting from
https://lists.gnu.org/archive/html/grub-devel/2021-03/msg00007.html:

*******************************************************************************

CVE-2020-14372 grub2: The acpi command allows privileged user to load crafted
               ACPI tables when Secure Boot is enabled
CWE-184
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

GRUB2 enables the use of the command acpi even when Secure Boot is signaled by
the firmware. An attacker with local root privileges to can drop a small SSDT
in /boot/efi and modify grub.cfg to instruct grub to load said SSDT. The SSDT
then gets run by the kernel and it overwrites the kernel lock down configuration
enabling the attacker to load unsigned kernel modules and kexec unsigned code.

Reported-by: Máté Kukri

*******************************************************************************

CVE-2020-25632 grub2: Use-after-free in rmmod command
CWE-416
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The rmmod implementation for GRUB2 is flawed, allowing an attacker to unload
a module used as dependency without checking if any other dependent module is
still loaded. This leads to an use-after-free scenario possibly allowing an
attacker to execute arbitrary code and by-pass Secure Boot protections.

Reported-by: Chris Coulson (Canonical)

*******************************************************************************

CVE-2020-25647 grub2: Out-of-bound write in grub_usb_device_initialize()
CWE-787
6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

grub_usb_device_initialize() is called to handle USB device initialization. It
reads out the descriptors it needs from the USB device and uses that data to
fill in some USB data structures. grub_usb_device_initialize() performs very
little bounds checking and simply assumes the USB device provides sane values.
This behavior can trigger memory corruption. If properly exploited, this would
lead to arbitrary code execution allowing the attacker to by-pass Secure Boot
mechanism.

Reported-by: Joseph Tartaro (IOActive) and Ilja van Sprundel (IOActive)

*******************************************************************************

CVE-2020-27749 grub2: Stack buffer overflow in grub_parser_split_cmdline
CWE-121
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

grub_parser_split_cmdline() expands variable names present in the supplied
command line in to their corresponding variable contents and uses a 1kB stack
buffer for temporary storage without sufficient bounds checking. If the
function is called with a command line that references a variable with a
sufficiently large payload, it is possible to overflow the stack buffer,
corrupt the stack frame and control execution. An attacker may use this to
circumvent Secure Boot protections.

Reported-by: Chris Coulson (Canonical)

*******************************************************************************

CVE-2020-27779 grub2: The cutmem command allows privileged user to remove
               memory regions when Secure Boot is enabled
CWE-285
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The GRUB2's cutmem command does not honor Secure Boot locking. This allows an
privileged attacker to remove address ranges from memory creating an
opportunity to circumvent Secure Boot protections after proper triage about
grub's memory layout.

Reported-by: Teddy Reed

*******************************************************************************

CVE-2021-3418 - grub2: GRUB 2.05 reintroduced CVE-2020-15705
CWE-281
6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

The GRUB2 upstream reintroduced the CVE-2020-15705. This refers to a distro
specific flaw which made upstream in the mentioned version.

If certificates that signed GRUB2 are installed into db, GRUB2 can be booted
directly. It will then boot any kernel without signature validation. The booted
kernel will think it was booted in Secure Boot mode and will implement lock
down, yet it could have been tampered.

This flaw only affects upstream and distributions using the shim_lock verifier.

Reported-by: Dimitri John Ledkov (Canonical)

*******************************************************************************

CVE-2021-20225 grub2: Heap out-of-bounds write in short form option parser
CWE-787
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The option parser in GRUB2 allows an attacker to write past the end of
a heap-allocated buffer by calling certain commands with a large number
of specific short forms of options.

Reported-by: Daniel Axtens (IBM)

*******************************************************************************

CVE-2021-20233 grub2: Heap out-of-bound write due to mis-calculation of
               space required for quoting
CWE-787
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

There's a flaw on GRUB2 menu rendering code setparam_prefix() in the menu
rendering code performs a length calculation on the assumption that expressing
a quoted single quote will require 3 characters, while it actually requires
4 characters. This allow an attacker to corrupt memory by one byte for each
quote in the input.

Reported-by: Daniel Axtens (IBM)
2021-03-23 02:48:30 +01:00
Sandro fd45ac69d3
Merge pull request #117251 from jhillyerd/chezmoi
chezmoi: 1.8.11 -> 2.0.3
2021-03-23 02:41:56 +01:00
Sandro 09fb0da465
Merge pull request #117241 from NeQuissimus/awscli 2021-03-23 02:28:14 +01:00
Sandro 447fb4c904
Merge pull request #117031 from chvp/fix-mu-scripts
mu: Fix included scripts not finding their dependencies
2021-03-23 02:27:41 +01:00
R. RyanTM 67493c1ad4 eksctl: 0.40.0 -> 0.41.0 2021-03-22 22:43:42 +00:00
Michele Guerini Rocco e0c05e18ae
Merge pull request #117267 from r-ryantm/auto-update/bdf2psf
bdf2psf: 1.201 -> 1.202
2021-03-22 23:40:52 +01:00
Sandro 2bb10a1617
Merge pull request #116776 from sternenseemann/fdtools-fix-gcc-clang
fdtools: set platforms to linux only
2021-03-22 21:39:40 +01:00
R. RyanTM a3fec5f8cd
aws-vault: 6.2.0 -> 6.3.0 (#117006) 2021-03-22 19:47:04 +00:00
R. RyanTM 96b7afb496 bdf2psf: 1.201 -> 1.202 2021-03-22 19:10:36 +00:00
Ryan Mulligan d70781f103
Merge pull request #117255 from ckauhaus/116923-remove-steghide
steghide-0.5.1: remove package
2021-03-22 11:53:41 -07:00
Christian Kauhaus 16302209c2 steghide-0.5.1: remove package
This package is considered insecure (week RNG seeding). As it has seen
no upstream activity for 18 years, a bug fix is unlikely.

See also:
* CVE-2021-27211
* https://discourse.nixos.org/t/removal-of-insecure-steghide-package/12071

Fixes #116923
2021-03-22 18:35:23 +01:00
James Hillyerd b9bb7add79 chezmoi: 1.8.11 -> 2.0.3 2021-03-22 10:02:15 -07:00
Tim Steinbach 84dcedc075
awscli: 1.19.30 -> 1.19.33 2021-03-22 11:24:50 -04:00
Fabian Affolter f2b936edf5
Merge pull request #117173 from r-ryantm/auto-update/disfetch
disfetch: 1.20 -> 1.21
2021-03-22 13:13:51 +01:00
Sandro 6f9ac9eb8a
Merge pull request #117184 from siraben/fet-sh-update
fet-sh: 1.8 -> 1.9
2021-03-22 12:23:17 +01:00
Sandro e905e228ef
Merge pull request #117190 from siraben/darwin-mass-fix-buildInputs=0 2021-03-22 12:04:15 +01:00
Profpatsch 841b753e92 s6-networking: default to bearssl
18·27 <Profpatsch> skarnet: would you recommend putting bearssl as the default backend for s6-networking?
18·27 <Profpatsch> uh, bearssl isn’t even packaged
18·27 <Profpatsch> yak shave
18·28 <Profpatsch> skarnet: The current backend uses libressl
18·29 <@skarnet> well at least CAFILE works
18·29 <@skarnet> but yes, I would recommend putting bearssl as the default backend
2021-03-22 10:29:01 +01:00
Ben Siraphob 9398fc3c27 profile-cleaner: expand platforms to all 2021-03-22 15:56:00 +07:00
Ben Siraphob 4eda69a8ec kargo: expand platforms to all 2021-03-22 15:55:48 +07:00
Ben Siraphob 8e86eec6de pdf-parser: expand platforms to all 2021-03-22 15:55:34 +07:00
Ben Siraphob 55ce4c9b03 rmtrash: use stdenvNoCC 2021-03-22 15:47:11 +07:00
R. RyanTM c7766c5733 goreleaser: 0.159.0 -> 0.160.0 2021-03-22 08:46:13 +00:00
Ben Siraphob b773fd7e2a fet-sh: 1.8 -> 1.9 2021-03-22 15:20:59 +07:00
R. RyanTM 7093e238c7 getmail6: 6.14 -> 6.15 2021-03-22 08:13:54 +00:00