3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

2572 commits

Author SHA1 Message Date
Will Dietz 4b7de150a8 chromium/update.sh: don't use remote builders, lots of copying for work 2018-10-12 12:20:35 +02:00
xeji bde4483d13
flashplayer: 31.0.0.108 -> 31.0.0.122 (#48126)
previous version was removed upstream (404)
2018-10-10 23:49:40 +02:00
adisbladis ffc899dab1
firefox-beta-bin: 63.0b9 -> 63.0b13 2018-10-09 17:36:43 +08:00
adisbladis c19fc34926
firefox-devedition-bin: 63.0b9 -> 63.0b13 2018-10-09 17:36:42 +08:00
worldofpeace e5bea728ce eolie: 0.9.37 -> 0.9.41 (#47942) 2018-10-06 15:32:03 +02:00
Andreas Rammhold 248ed3575c tor-browser-bundle-bin: 8.0.1 -> 8.0.2
Update to latest version due to security updates and 8.0.1 not being
available on the mirrors anymore.

Release notes: https://blog.torproject.org/new-release-tor-browser-802
2018-10-06 14:49:19 +02:00
Corey O'Connor ba2fe3c9a6 firefox: disable auto updates using distribution policies.
Resolves #33884
2018-10-03 07:22:49 -07:00
Andreas Rammhold 246d2848ff
firefox-esr-60: 60.2.1 -> 60.2.2 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
Andreas Rammhold e7785f1148
firefox: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
Andreas Rammhold 64d02660cb
firefox-bin: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:35:54 +02:00
Jörg Thalheim c527619db6
Merge pull request #47485 from prusnak/remove-mozilla-plugins-trezor
mozilla-plugins/trezor: remove applications/networking/browsers/mozilla-plugins/trezor
2018-09-29 11:52:32 +01:00
Pavol Rusnak 62b15996a7
mozilla-plugins/trezor: remove applications/networking/browsers/mozilla-plugins/trezor
trezor-mozilla-plugin is no longer maintained software

package pkgs/servers/trezord should be used instead
2018-09-29 12:24:43 +02:00
Wael M. Nasreddine fa46ce3828
browsh: 1.4.10 -> 1.4.13 2018-09-28 15:32:02 -07:00
Will Dietz 3f0ae25538
Merge pull request #47444 from dtzWill/fix/patchelf-chrome-virtualbox-and-treewide
google-chrome, treewide: fix patchelf usages to not crash constantly, patchelf as native
2018-09-28 14:25:05 -05:00
R. RyanTM 42af103ae3 otter-browser: 0.9.96 -> 0.9.99.3 (#46217)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
otter-browser
2018-09-28 21:09:26 +02:00
Will Dietz 776e6da544 google-chrome: fix native inputs, otherwise uses wrong patchelf 2018-09-28 11:43:16 -05:00
Patrick Hilhorst 71eb7adfb2
vivaldi: 1.15.1147.64-1 -> 2.0.1309.29-2 2018-09-27 00:50:57 +02:00
worldofpeace 6cd28a468a eolie: 0.9.36 -> 0.9.37 (#47345) 2018-09-25 20:16:03 +02:00
adisbladis 3aaa9db32f
firefox-beta-bin: 63.0b6 -> 63.0b9 2018-09-25 22:55:22 +08:00
adisbladis 0aa0344804
firefox-devedition-bin: 63.0b6 -> 63.0b9 2018-09-25 22:55:21 +08:00
zimbatm 6060940c24 firefox-bin: fix channel patching
The patchPhase wasn't being applied at all.

This patch re-enables that and also re-thinks the setting that we want
to have. Turning off the auto-update is more accurate and doesn't lose
information like it did before.
2018-09-25 16:48:07 +02:00
Andreas Rammhold 24c58bd1cc
Merge pull request #47257 from taku0/firefox-bin-62.0.2
firefox, firefox-bin:: 61.0.2 -> 62.0.2,  firefox-esr: 60.2.0esr -> 60.2.1esr [Moderate security fixes]
2018-09-24 17:54:26 +02:00
taku0 e5778a9991 firefox-esr: 60.2.0esr -> 60.2.1esr 2018-09-24 09:13:03 +09:00
Joachim Fasting f2ba1a4284
tor-browser-bundle-bin: 8.0 -> 8.0.1 2018-09-22 20:13:55 +02:00
taku0 da9823672f firefox: 61.0.2 -> 62.0.2 2018-09-22 03:13:50 +09:00
taku0 5b79f81a39 firefox-bin: 61.0.2 -> 62.0.2 2018-09-22 03:12:20 +09:00
R. RyanTM da78d3e829 links2: 2.16 -> 2.17
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/links2/versions
2018-09-20 08:34:23 -07:00
xeji 5c7406c608
Merge pull request #46758 from lluchs/vivaldi-1.15.1147.64-1
vivaldi: 1.15.1147.42-1 -> 1.15.1147.64-1
2018-09-17 15:46:11 +02:00
Lukas Werling 478e1fe369 vivaldi-ffmpeg-codecs: 61.0.3163.91 -> 69.0.3497.73 2018-09-16 20:53:50 +02:00
Lukas Werling eb275c96f2 vivaldi: 1.15.1147.42-1 -> 1.15.1147.64-1 2018-09-16 20:53:04 +02:00
adisbladis c7a789100f
firefox-beta-bin: 62.0b20 -> 63.0b6 2018-09-16 11:09:42 +08:00
adisbladis 8e19799469
firefox-devedition-bin: 62.0b20 -> 63.0b6 2018-09-16 11:09:39 +08:00
Michael Raskin a9e50ec21a
Merge pull request #46643 from taku0/flashplayer-31.0.0.108
flashplayer: 30.0.0.154 -> 31.0.0.108 [Important security fix]
2018-09-14 11:25:59 +00:00
taku0 417cbb9307 flashplayer: 30.0.0.154 -> 31.0.0.108 2018-09-14 08:12:12 +09:00
Joachim Fasting aacf68a635
tor-browser-bundle-bin: stdenv.shell -> runtimeShell in wrapper 2018-09-13 17:45:50 +02:00
Joachim Fasting 546e511edc
tor-browser-bundle-bin: parameterize icon theme 2018-09-13 17:45:49 +02:00
Joachim Fasting 5710ee3bef
tor-browser-bundle-bin: add gsettings-schemas
See https://github.com/NixOS/nixpkgs/issues/46587
2018-09-13 17:45:43 +02:00
xeji decd819911
Merge pull request #46556 from rnhmjoj/lastpass
qutebrowser: patch all python scripts
2018-09-12 23:51:40 +02:00
worldofpeace 508e353fd4 eolie: 0.9.35 -> 0.9.36 2018-09-12 02:25:31 -04:00
rnhmjoj cf2603f144
qutebrowser: patch all python scripts 2018-09-12 03:35:26 +02:00
Florian Bruhin 84a0dc8191
qutebrowser: Fix patching of standarddir.py
The original patch was broken since a85e19a5e1 because an `APPNAME` variable was introduced there.
2018-09-11 20:33:25 +02:00
Joachim Fasting ed5283fcf5
tor-browser-bundle-bin: 7.5.6 -> 8.0 2018-09-11 13:27:27 +02:00
Yuriy Taraday c098f143b4 chromium: 68.0.3440.106 -> 69.0.3497.81
Also update to build with external gn.
2018-09-07 23:34:47 +04:00
Michael Raskin f9a0679297
Merge pull request #46157 from taku0/firefox-bin-62.0
firefox,  firefox-bin: 61.0.2 -> 62.0,  firefox-esr: 60.1.0esr -> 60.2.0esr, remove 52.9.0esr [Critical security fixes]
2018-09-07 12:10:47 +00:00
taku0 0a3f07077b firefox-esr: 60.1.0esr -> 60.2.0esr, mark 52.9.0esr insecure 2018-09-07 08:14:48 +09:00
Michele Guerini Rocco eadb7b1589 qutebrowser: patch scripts (#37316) 2018-09-05 19:06:18 +02:00
Bart Brouns bf0cec40ca qutebrowser: 1.4.1 -> 1.4.2 (#46096) 2018-09-05 16:35:12 +02:00
Samuel Dionne-Riel 7ec9a333df qtchan: Fixes build from Qt upgrade. (#46082)
Uses an upstream fix.
2018-09-05 08:23:29 +02:00
taku0 26cbfe1035 firefox: 61.0.2 -> 62.0 2018-09-04 21:16:46 +09:00
taku0 12723b105c firefox-bin: 61.0.2 -> 62.0 2018-09-04 21:13:35 +09:00