3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

278638 commits

Author SHA1 Message Date
Ryan Mulligan 444ca81faf
Merge pull request #117189 from r-ryantm/auto-update/goreleaser
goreleaser: 0.159.0 -> 0.160.0
2021-03-22 21:06:33 -07:00
Ryan Mulligan df6f49f639
Merge pull request #117232 from r-ryantm/auto-update/osu-lazer
osu-lazer: 2021.312.0 -> 2021.320.0
2021-03-22 21:05:35 -07:00
Ryan Mulligan 100549dfaa
Merge pull request #117260 from r-ryantm/auto-update/xchm
xchm: 1.31 -> 1.32
2021-03-22 21:04:32 -07:00
Ryan Mulligan c1721401e3
Merge pull request #117294 from r-ryantm/auto-update/eksctl
eksctl: 0.40.0 -> 0.41.0
2021-03-22 21:03:27 -07:00
R. RyanTM dd9f191289 filezilla: 3.52.2 -> 3.53.0 2021-03-23 03:59:22 +00:00
R. RyanTM 8a6dff12ff recursive: 1.071 -> 1.077 2021-03-23 03:33:04 +00:00
illustris 8fe3b43891 blender: fix build error 2021-03-22 22:56:17 -04:00
illustris 3bf443d46a openimageio: fix build error 2021-03-22 22:56:17 -04:00
illustris e9eee4a91d openimageio2: 2.1.9.0 -> 2.2.12.0 2021-03-22 22:56:17 -04:00
Graham Christensen 7eda163eac
Merge pull request #115310 from mweinelt/grub2
grub: 2.0.4 -> 2.0.6-rc1
2021-03-22 22:34:14 -04:00
Sandro c850fc863a
Merge pull request #117249 from otavio/otavio-pkg-updates 2021-03-23 02:54:28 +01:00
Martin Weinelt 97c52d5782
grub: 2.0.4 -> 2.0.6-rc1
Quoting from
https://lists.gnu.org/archive/html/grub-devel/2021-03/msg00007.html:

*******************************************************************************

CVE-2020-14372 grub2: The acpi command allows privileged user to load crafted
               ACPI tables when Secure Boot is enabled
CWE-184
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

GRUB2 enables the use of the command acpi even when Secure Boot is signaled by
the firmware. An attacker with local root privileges to can drop a small SSDT
in /boot/efi and modify grub.cfg to instruct grub to load said SSDT. The SSDT
then gets run by the kernel and it overwrites the kernel lock down configuration
enabling the attacker to load unsigned kernel modules and kexec unsigned code.

Reported-by: Máté Kukri

*******************************************************************************

CVE-2020-25632 grub2: Use-after-free in rmmod command
CWE-416
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The rmmod implementation for GRUB2 is flawed, allowing an attacker to unload
a module used as dependency without checking if any other dependent module is
still loaded. This leads to an use-after-free scenario possibly allowing an
attacker to execute arbitrary code and by-pass Secure Boot protections.

Reported-by: Chris Coulson (Canonical)

*******************************************************************************

CVE-2020-25647 grub2: Out-of-bound write in grub_usb_device_initialize()
CWE-787
6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

grub_usb_device_initialize() is called to handle USB device initialization. It
reads out the descriptors it needs from the USB device and uses that data to
fill in some USB data structures. grub_usb_device_initialize() performs very
little bounds checking and simply assumes the USB device provides sane values.
This behavior can trigger memory corruption. If properly exploited, this would
lead to arbitrary code execution allowing the attacker to by-pass Secure Boot
mechanism.

Reported-by: Joseph Tartaro (IOActive) and Ilja van Sprundel (IOActive)

*******************************************************************************

CVE-2020-27749 grub2: Stack buffer overflow in grub_parser_split_cmdline
CWE-121
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

grub_parser_split_cmdline() expands variable names present in the supplied
command line in to their corresponding variable contents and uses a 1kB stack
buffer for temporary storage without sufficient bounds checking. If the
function is called with a command line that references a variable with a
sufficiently large payload, it is possible to overflow the stack buffer,
corrupt the stack frame and control execution. An attacker may use this to
circumvent Secure Boot protections.

Reported-by: Chris Coulson (Canonical)

*******************************************************************************

CVE-2020-27779 grub2: The cutmem command allows privileged user to remove
               memory regions when Secure Boot is enabled
CWE-285
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The GRUB2's cutmem command does not honor Secure Boot locking. This allows an
privileged attacker to remove address ranges from memory creating an
opportunity to circumvent Secure Boot protections after proper triage about
grub's memory layout.

Reported-by: Teddy Reed

*******************************************************************************

CVE-2021-3418 - grub2: GRUB 2.05 reintroduced CVE-2020-15705
CWE-281
6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

The GRUB2 upstream reintroduced the CVE-2020-15705. This refers to a distro
specific flaw which made upstream in the mentioned version.

If certificates that signed GRUB2 are installed into db, GRUB2 can be booted
directly. It will then boot any kernel without signature validation. The booted
kernel will think it was booted in Secure Boot mode and will implement lock
down, yet it could have been tampered.

This flaw only affects upstream and distributions using the shim_lock verifier.

Reported-by: Dimitri John Ledkov (Canonical)

*******************************************************************************

CVE-2021-20225 grub2: Heap out-of-bounds write in short form option parser
CWE-787
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The option parser in GRUB2 allows an attacker to write past the end of
a heap-allocated buffer by calling certain commands with a large number
of specific short forms of options.

Reported-by: Daniel Axtens (IBM)

*******************************************************************************

CVE-2021-20233 grub2: Heap out-of-bound write due to mis-calculation of
               space required for quoting
CWE-787
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

There's a flaw on GRUB2 menu rendering code setparam_prefix() in the menu
rendering code performs a length calculation on the assumption that expressing
a quoted single quote will require 3 characters, while it actually requires
4 characters. This allow an attacker to corrupt memory by one byte for each
quote in the input.

Reported-by: Daniel Axtens (IBM)
2021-03-23 02:48:30 +01:00
Peter Hoeg 6b815bbb99 nixos/systemd: missing a few units for KDE to use systemd 2021-03-23 09:44:34 +08:00
Sandro b8ed926d78
Merge pull request #117270 from aanderse/libapreq2
perlPackages.libapreq2: 2.13 -> 2.16
2021-03-23 02:43:11 +01:00
Sandro fd45ac69d3
Merge pull request #117251 from jhillyerd/chezmoi
chezmoi: 1.8.11 -> 2.0.3
2021-03-23 02:41:56 +01:00
Sandro dc4e5654b4
Merge pull request #117250 from 0x4A6F/master-dasel
dasel: 1.13.4 -> 1.13.5
2021-03-23 02:41:41 +01:00
Sandro 6c75cc1584
Merge pull request #117247 from eraserhd/kak-ansi-0.2.3
kakounePlugins.kak-ansi: 0.2.1 -> 0.2.3
2021-03-23 02:40:30 +01:00
Sandro 09fb0da465
Merge pull request #117241 from NeQuissimus/awscli 2021-03-23 02:28:14 +01:00
Sandro 447fb4c904
Merge pull request #117031 from chvp/fix-mu-scripts
mu: Fix included scripts not finding their dependencies
2021-03-23 02:27:41 +01:00
Sandro 238fba1b71
Merge pull request #117231 from dotlambda/rope-fix
python39Packages.rope: fix tests
2021-03-23 02:25:13 +01:00
Sandro 4846980e23
Merge pull request #116768 from jluttine/update-linphone 2021-03-23 02:21:36 +01:00
Sandro 0088d95227
Merge pull request #112802 from r-ryantm/auto-update/libupnp
libupnp: 1.14.0 -> 1.14.1
2021-03-23 02:15:15 +01:00
sternenseemann f0f79f7643 codeowners: add sternenseemann for haskell
I want to get notified about haskell PRs.
2021-03-23 02:05:13 +01:00
Martin Weinelt 368329907b
Merge pull request #117300 from fabaff/bump-pysma 2021-03-23 02:01:59 +01:00
Otavio Salvador e6bab7c0dc cargo-valgrind: 1.3.0 -> 2.0.0
Signed-off-by: Otavio Salvador <otavio@ossystems.com.br>
2021-03-22 21:51:42 -03:00
Otavio Salvador a3d4217857 shellhub-agent: 0.5.2 -> 0.6.0
Signed-off-by: Otavio Salvador <otavio@ossystems.com.br>
2021-03-22 21:51:41 -03:00
Martin Weinelt 55b7888f43
Merge pull request #117298 from fabaff/pydeconz 2021-03-23 01:51:05 +01:00
Martin Weinelt 2e110025a8
Merge pull request #117302 from fabaff/bump-subarulink 2021-03-23 01:40:04 +01:00
Fabian Affolter 99235e5560 home-assistant: enable subaru tests 2021-03-23 00:59:02 +01:00
Fabian Affolter afb1275b84 python3Packages.subarulink: 0.3.12 -> 0.3.13 2021-03-23 00:59:02 +01:00
Fabian Affolter 8bc8a51c04 home-assistant: enable sma tests 2021-03-23 00:41:26 +01:00
Fabian Affolter 7541639950 python3Packages.pysma: 0.3.5 -> 0.4 2021-03-23 00:40:22 +01:00
sternenseemann a344386cc4 haskellPackages.darcs: unbreak
(cherry picked from commit 305433cb2c369dcb17e8373aaa7c533b39b6e025)
2021-03-23 00:32:53 +01:00
Fabian Affolter b6f41fc351 home-assistant: enable deconz tests 2021-03-23 00:12:47 +01:00
Fabian Affolter 3f2e683ca1 home-assistant: update component-packages 2021-03-23 00:10:32 +01:00
Fabian Affolter a42d22339f python3Packages.pydeconz: init at 77 2021-03-23 00:08:39 +01:00
Ricardo Guevara 5faa02940a
velero: add darwin as supported platform (#117278) 2021-03-22 15:50:40 -07:00
R. RyanTM 67493c1ad4 eksctl: 0.40.0 -> 0.41.0 2021-03-22 22:43:42 +00:00
Michele Guerini Rocco e0c05e18ae
Merge pull request #117267 from r-ryantm/auto-update/bdf2psf
bdf2psf: 1.201 -> 1.202
2021-03-22 23:40:52 +01:00
sternenseemann 0435d26450 vscode-extensions.redhat.java: fix versionAtLeast invocation
lib.versionAtLeast a b ~=~ a >= b, not the other way round.
https://github.com/NixOS/nixpkgs/pull/116941#discussion_r599107310
2021-03-22 23:38:50 +01:00
Sandro f4430c23a4
Merge pull request #117226 from dotlambda/colorlog-4.8.0
pythonPackages.colorlog: 4.7.2 -> 4.8.0
2021-03-22 23:03:20 +01:00
Sander van der Burg 8fc9423565
Merge pull request #116455 from svanderburg/systemdunitpath
systemd: allow custom unit folders to be configured with SYSTEMD_UNIT…
2021-03-22 22:58:49 +01:00
Sandro 31e4678c6b
Merge pull request #117214 from siraben/openjdk-darwin-eval
openjdk/darwin: move version out of name
2021-03-22 22:52:50 +01:00
FliegendeWurst 64b9e86178 trilium: 0.45.10 -> 0.46.5 2021-03-22 22:38:55 +01:00
Robert Scott fdb83b81b2
Merge pull request #116205 from r-ryantm/auto-update/symengine
symengine: 0.6.0 -> 0.7.0
2021-03-22 21:30:45 +00:00
Martin Weinelt ce63f70f31
Merge pull request #117272 from SuperSandro2000/ha-fix
home-assistant: fix github tag of iaqualink-py
2021-03-22 22:17:15 +01:00
Robert Scott 7ccfe2be6a
Merge pull request #115679 from r-ryantm/auto-update/liburcu
liburcu: 0.12.1 -> 0.12.2
2021-03-22 20:59:00 +00:00
Sandro 04bd5af2a7
Merge pull request #117237 from siraben/sccache-platforms
sccache: remove platforms and fix darwin build
2021-03-22 21:46:12 +01:00
Ryan Mulligan 65840088d6
Merge pull request #117254 from r-ryantm/auto-update/unciv
unciv: 3.13.8 -> 3.13.10
2021-03-22 13:42:18 -07:00
Sandro 2bb10a1617
Merge pull request #116776 from sternenseemann/fdtools-fix-gcc-clang
fdtools: set platforms to linux only
2021-03-22 21:39:40 +01:00