3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

278343 commits

Author SHA1 Message Date
Tim Steinbach 583c99ef13 linux: 4.19.181 -> 4.19.182 2021-03-23 09:19:18 -04:00
Domen Kožar 3d546fab4e
Merge pull request #117342 from turboMaCk/marek/fix-elm-format
elmPackages.elm-format: fix build
2021-03-23 13:57:27 +01:00
sternenseemann 80cef4476a vscode-extensions.redhat.java: mark as broken, not available
Is available for jdk >= 11 and broken for jdk < 11.
2021-03-23 13:24:39 +01:00
Michael Weiss 2a2a06cc09
python3Packages.tatsu: 5.6.0 -> 5.6.1 2021-03-23 13:20:27 +01:00
Maximilian Bosch eebfc250dd
Merge pull request #117317 from r-ryantm/auto-update/filezilla
filezilla: 3.52.2 -> 3.53.0
2021-03-23 11:55:00 +01:00
Marek Fajkus 09ea1dc766
elmPackages.elm-format: fix build
closes #117336
2021-03-23 11:47:29 +01:00
Peter Hoeg d527d1d528 home-manager: 2021-01-16 -> 2021-03-21 2021-03-23 18:38:25 +08:00
stigtsp 7949331040
Merge pull request #117161 from xworld21/latexml-perlmagick
perlPackages.LaTeXML: enable ImageMagick
2021-03-23 11:34:24 +01:00
zseri a9ec3f7b66 digitemp: init at 3.7.2
This does not include digitemp_DS2490, as that seems to require libusb0.1,
which isn't in nixpkgs.
2021-03-23 18:29:35 +08:00
Profpatsch c25ffa8b76
Merge pull request #117073 from sternenseemann/inspircd-3.9.0
inspircd: init at 3.9.0
2021-03-23 11:25:58 +01:00
Boris Pek eb225f5d9d
eiskaltdcpp: remove build dependency from boost (#116998)
eiskaltdcpp: remove build dependency from boost

+ Remove eiskaltdcpp-cli-xmlrpc: it is absolutely useless because XML-RPC
  support in eiskaltdcpp-daemon is currently in a broken state
+ Update cmake options
+ eiskaltdcpp: install eiskaltdcpp-cli-jsonrpc
+ eiskaltdcpp: symlink $pname-qt to $pname
2021-03-23 11:14:45 +01:00
Vincenzo Mantova 003af12c96 perlPackages.LaTeXML: enable ImageMagick 2021-03-23 10:04:24 +00:00
Maximilian Bosch e94cf01b2d
Merge pull request #117246 from robintown/matrix-synapse
matrix-synapse: 1.29.0 -> 1.30.0
2021-03-23 11:01:27 +01:00
Bernardo Meurer 7ecdc01b39
Merge pull request #117233 from mweinelt/firefox
firefox: 86.0.1 -> 87.0; firefox-esr: 78.8.0esr -> 78.9.0esr
2021-03-23 09:55:45 +00:00
Sandro 09d50b21f2
Merge pull request #117327 from Mic92/radare2
radare2: 5.0.0 -> 5.1.1
2021-03-23 10:55:07 +01:00
Jonas Chevalier 474664683c
Merge pull request #117332 from zimbatm/terraform-providers-kubernetes-alpha-0.3.2
terraform-providers.kubernetes-alpha: nightly20200608 -> 0.3.2
2021-03-23 09:44:23 +00:00
zimbatm 012b3a659e
terraform-providers.kubernetes-alpha: nightly20200608 -> 0.3.2 2021-03-23 10:40:35 +01:00
Jörg Thalheim d280e1f78c
Merge pull request #116788 from veprbl/pr/texlive_find_tarballs_fix
texlive.combine: export `packages` attribute to help find-tarballs.nix
2021-03-23 09:28:32 +00:00
Emery Hemingway ee80707159 Trim ehmry from some package maintainers
I prefer not to be associated with anything blockchain related.
2021-03-23 10:24:00 +01:00
R. RyanTM 90a9906637 libcpuid: 0.5.0 -> 0.5.1 2021-03-23 10:11:42 +01:00
Maximilian Bosch ceed556f0b
Merge pull request #117150 from aanderse/gitea
gitea: 1.13.4 -> 1.13.5
2021-03-23 10:05:41 +01:00
Jörg Thalheim 3ae466ad56
radare2: 5.0.0 -> 5.1.1 2021-03-23 09:42:22 +01:00
Jörg Thalheim 347976d980
Merge pull request #116410 from dotlambda/acpi-call-1.2.1 2021-03-23 08:38:22 +00:00
Antonio Nuno Monteiro 70c22f694b ocamlPackages.ocaml_extlib: 1.7.7 -> 1.7.8
1.7.8 changed the behavior of the minimal build type (which we are
keeping as the default because opam-repository does it as well): It now
excludes the Base64 module which is prone to namespacing problems.

Since google-drive-ocamlfuse still uses the Base64 module, we need to
override it to use extlib without the minimal build type. 1.7.9 (?)
should make this obsolete as it is planned to split the Base64 module
into a separate package.

Co-authored-by: sternenseemann <sternenseemann@systemli.org>
2021-03-23 08:36:25 +01:00
Paul Liétar 6f8eb1e65a coq: enable coqide on darwin
This was disabled a while ago, when itstool was broken on darwin.
Now that itstool works again, it can be re-enabled.
2021-03-23 08:17:13 +01:00
R. RyanTM 4c54b5575e simplenote: 2.5.0 -> 2.8.0 2021-03-23 01:42:41 -04:00
R. RyanTM c04f0f8413 cppcheck: 2.3 -> 2.4 2021-03-23 01:22:50 -04:00
David Birks ee7a7ffc30 microplane: 0.0.26 -> 0.0.28
Also switching from deps to go mod, since they made the change upstream.
2021-03-23 01:20:14 -04:00
Ryan Mulligan d20e020961
Merge pull request #116695 from r-ryantm/auto-update/drm_info
drm_info: 2.2.0 -> 2.3.0
2021-03-22 21:22:20 -07:00
Ryan Mulligan cee29bf85d
Merge pull request #116982 from r-ryantm/auto-update/sonobuoy
sonobuoy: 0.20.0 -> 0.50.0
2021-03-22 21:14:45 -07:00
Ryan Mulligan 42de022368
Merge pull request #115594 from r-ryantm/auto-update/simgear
simgear: 2020.3.4 -> 2020.3.6
2021-03-22 21:13:36 -07:00
Ryan Mulligan b9f8d6ecdf
Merge pull request #117182 from r-ryantm/auto-update/getmail6
getmail6: 6.14 -> 6.15
2021-03-22 21:11:53 -07:00
Ryan Mulligan 4b55c9bbca
Merge pull request #117205 from r-ryantm/auto-update/libcint
libcint: 4.1.0 -> 4.1.1
2021-03-22 21:10:51 -07:00
Ryan Mulligan 196342526d
Merge pull request #117185 from r-ryantm/auto-update/gleam
gleam: 0.14.2 -> 0.14.3
2021-03-22 21:08:59 -07:00
Ryan Mulligan 74fc46475a
Merge pull request #117211 from r-ryantm/auto-update/libplctag
libplctag: 2.3.5 -> 2.3.6
2021-03-22 21:08:23 -07:00
Ryan Mulligan 76330f830c
Merge pull request #117187 from r-ryantm/auto-update/go-task
go-task: 3.2.2 -> 3.3.0
2021-03-22 21:07:37 -07:00
Ryan Mulligan 444ca81faf
Merge pull request #117189 from r-ryantm/auto-update/goreleaser
goreleaser: 0.159.0 -> 0.160.0
2021-03-22 21:06:33 -07:00
Ryan Mulligan df6f49f639
Merge pull request #117232 from r-ryantm/auto-update/osu-lazer
osu-lazer: 2021.312.0 -> 2021.320.0
2021-03-22 21:05:35 -07:00
Ryan Mulligan 100549dfaa
Merge pull request #117260 from r-ryantm/auto-update/xchm
xchm: 1.31 -> 1.32
2021-03-22 21:04:32 -07:00
Ryan Mulligan c1721401e3
Merge pull request #117294 from r-ryantm/auto-update/eksctl
eksctl: 0.40.0 -> 0.41.0
2021-03-22 21:03:27 -07:00
R. RyanTM dd9f191289 filezilla: 3.52.2 -> 3.53.0 2021-03-23 03:59:22 +00:00
illustris 8fe3b43891 blender: fix build error 2021-03-22 22:56:17 -04:00
illustris 3bf443d46a openimageio: fix build error 2021-03-22 22:56:17 -04:00
illustris e9eee4a91d openimageio2: 2.1.9.0 -> 2.2.12.0 2021-03-22 22:56:17 -04:00
Graham Christensen 7eda163eac
Merge pull request #115310 from mweinelt/grub2
grub: 2.0.4 -> 2.0.6-rc1
2021-03-22 22:34:14 -04:00
Sandro c850fc863a
Merge pull request #117249 from otavio/otavio-pkg-updates 2021-03-23 02:54:28 +01:00
Martin Weinelt 97c52d5782
grub: 2.0.4 -> 2.0.6-rc1
Quoting from
https://lists.gnu.org/archive/html/grub-devel/2021-03/msg00007.html:

*******************************************************************************

CVE-2020-14372 grub2: The acpi command allows privileged user to load crafted
               ACPI tables when Secure Boot is enabled
CWE-184
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

GRUB2 enables the use of the command acpi even when Secure Boot is signaled by
the firmware. An attacker with local root privileges to can drop a small SSDT
in /boot/efi and modify grub.cfg to instruct grub to load said SSDT. The SSDT
then gets run by the kernel and it overwrites the kernel lock down configuration
enabling the attacker to load unsigned kernel modules and kexec unsigned code.

Reported-by: Máté Kukri

*******************************************************************************

CVE-2020-25632 grub2: Use-after-free in rmmod command
CWE-416
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The rmmod implementation for GRUB2 is flawed, allowing an attacker to unload
a module used as dependency without checking if any other dependent module is
still loaded. This leads to an use-after-free scenario possibly allowing an
attacker to execute arbitrary code and by-pass Secure Boot protections.

Reported-by: Chris Coulson (Canonical)

*******************************************************************************

CVE-2020-25647 grub2: Out-of-bound write in grub_usb_device_initialize()
CWE-787
6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

grub_usb_device_initialize() is called to handle USB device initialization. It
reads out the descriptors it needs from the USB device and uses that data to
fill in some USB data structures. grub_usb_device_initialize() performs very
little bounds checking and simply assumes the USB device provides sane values.
This behavior can trigger memory corruption. If properly exploited, this would
lead to arbitrary code execution allowing the attacker to by-pass Secure Boot
mechanism.

Reported-by: Joseph Tartaro (IOActive) and Ilja van Sprundel (IOActive)

*******************************************************************************

CVE-2020-27749 grub2: Stack buffer overflow in grub_parser_split_cmdline
CWE-121
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

grub_parser_split_cmdline() expands variable names present in the supplied
command line in to their corresponding variable contents and uses a 1kB stack
buffer for temporary storage without sufficient bounds checking. If the
function is called with a command line that references a variable with a
sufficiently large payload, it is possible to overflow the stack buffer,
corrupt the stack frame and control execution. An attacker may use this to
circumvent Secure Boot protections.

Reported-by: Chris Coulson (Canonical)

*******************************************************************************

CVE-2020-27779 grub2: The cutmem command allows privileged user to remove
               memory regions when Secure Boot is enabled
CWE-285
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The GRUB2's cutmem command does not honor Secure Boot locking. This allows an
privileged attacker to remove address ranges from memory creating an
opportunity to circumvent Secure Boot protections after proper triage about
grub's memory layout.

Reported-by: Teddy Reed

*******************************************************************************

CVE-2021-3418 - grub2: GRUB 2.05 reintroduced CVE-2020-15705
CWE-281
6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

The GRUB2 upstream reintroduced the CVE-2020-15705. This refers to a distro
specific flaw which made upstream in the mentioned version.

If certificates that signed GRUB2 are installed into db, GRUB2 can be booted
directly. It will then boot any kernel without signature validation. The booted
kernel will think it was booted in Secure Boot mode and will implement lock
down, yet it could have been tampered.

This flaw only affects upstream and distributions using the shim_lock verifier.

Reported-by: Dimitri John Ledkov (Canonical)

*******************************************************************************

CVE-2021-20225 grub2: Heap out-of-bounds write in short form option parser
CWE-787
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

The option parser in GRUB2 allows an attacker to write past the end of
a heap-allocated buffer by calling certain commands with a large number
of specific short forms of options.

Reported-by: Daniel Axtens (IBM)

*******************************************************************************

CVE-2021-20233 grub2: Heap out-of-bound write due to mis-calculation of
               space required for quoting
CWE-787
7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

There's a flaw on GRUB2 menu rendering code setparam_prefix() in the menu
rendering code performs a length calculation on the assumption that expressing
a quoted single quote will require 3 characters, while it actually requires
4 characters. This allow an attacker to corrupt memory by one byte for each
quote in the input.

Reported-by: Daniel Axtens (IBM)
2021-03-23 02:48:30 +01:00
Peter Hoeg 6b815bbb99 nixos/systemd: missing a few units for KDE to use systemd 2021-03-23 09:44:34 +08:00
Sandro b8ed926d78
Merge pull request #117270 from aanderse/libapreq2
perlPackages.libapreq2: 2.13 -> 2.16
2021-03-23 02:43:11 +01:00
Sandro fd45ac69d3
Merge pull request #117251 from jhillyerd/chezmoi
chezmoi: 1.8.11 -> 2.0.3
2021-03-23 02:41:56 +01:00