1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-20 04:31:52 +00:00
Commit graph

222971 commits

Author SHA1 Message Date
Jan Tojnar 2dee6ad280
Merge pull request #85985 from Emantor/fix/pipewire 2020-04-25 15:14:03 +02:00
sternenseemann 0c4386bf0a
ocamlPackages.dns(-client): 4.4.1 -> 4.5.0
jackline: 2020-03-22 -> 2020-04-24

Dependency mtime is no longer needed
2020-04-25 14:51:05 +02:00
sternenseemann b5f9eb06b5
ocamlPackages.mirage-time(-unix): init at 2.0.1 2020-04-25 14:50:57 +02:00
Martin Weinelt 3e9f3a3ebd
hostapd: apply patch for CVE-2019-16275
AP mode PMF disconnection protection bypass

Published: September 11, 2019
Identifiers:
- CVE-2019-16275
Latest version available from: https://w1.fi/security/2019-7/

Vulnerability

hostapd (and wpa_supplicant when controlling AP mode) did not perform
sufficient source address validation for some received Management frames
and this could result in ending up sending a frame that caused
associated stations to incorrectly believe they were disconnected from
the network even if management frame protection (also known as PMF) was
negotiated for the association. This could be considered to be a denial
of service vulnerability since PMF is supposed to protect from this type
of issues. It should be noted that if PMF is not enabled, there would be
no protocol level protection against this type of denial service
attacks.

An attacker in radio range of the access point could inject a specially
constructed unauthenticated IEEE 802.11 frame to the access point to
cause associated stations to be disconnected and require a reconnection
to the network.

Vulnerable versions/configurations

All hostapd and wpa_supplicants versions with PMF support
(CONFIG_IEEE80211W=y) and a runtime configuration enabled AP mode with
PMF being enabled (optional or required). In addition, this would be
applicable only when using user space based MLME/SME in AP mode, i.e.,
when hostapd (or wpa_supplicant when controlling AP mode) would process
authentication and association management frames. This condition would
be applicable mainly with drivers that use mac80211.

Possible mitigation steps

- Merge the following commit to wpa_supplicant/hostapd and rebuild:

  AP: Silently ignore management frame from unexpected source address

  This patch is available from https://w1.fi/security/2019-7/

- Update to wpa_supplicant/hostapd v2.10 or newer, once available
2020-04-25 14:35:20 +02:00
markuskowa bc675971da
Merge pull request #85279 from r-ryantm/auto-update/pwsafe
pwsafe: 1.09.0 -> 3.52.0
2020-04-25 14:26:11 +02:00
Maximilian Bosch 61c95a2eec
iwd: 1.6 -> 1.7 2020-04-25 12:13:01 +02:00
Maximilian Bosch 74fcd4f2d6
ell: 0.30 -> 0.31 2020-04-25 12:12:54 +02:00
Maximilian Bosch a194de9a9d
diffoscope: 138 -> 142 2020-04-25 12:07:38 +02:00
Maximilian Bosch aefb4d3dc9
dmenu-wayland: 2020-02-28 -> 2020-04-03 2020-04-25 12:07:38 +02:00
Piotr Bogdan 3acee22791
tartube: init at 2.0.016 2020-04-25 11:40:57 +02:00
Mario Rodas 69bb53604e
cloud-nuke: 0.1.7 -> 0.1.18 2020-04-25 04:20:00 -05:00
Mario Rodas b9c221ccd8
awsweeper: 0.6.0 -> 0.7.0 2020-04-25 04:20:00 -05:00
Bruno Bigras 6478e659da httplz: 1.8.0 -> 1.9.2 2020-04-25 04:10:37 -04:00
lewo fcf547d0e2
Merge pull request #85813 from johnae/fix-k3s-systemd-units
The systemd unit for k3s should differ between agents and servers
2020-04-25 09:45:49 +02:00
sternenseemann 79e6d13a4a ocamlPackages.cow: 2.2.0 -> 2.4.0 2020-04-25 09:45:22 +02:00
Rouven Czerwinski bc8e1f3ad5 pipewire: patch for SIGILL in fmt-ops
Hydra run tests are failing with SIGILL, see [1] , import the upstream
patch to fix the issue. Presumably not all hydra runners have the same
instruction extensions, this should fix the tests on those without AVX2.

[1]: https://hydra.nixos.org/build/117012754
2020-04-25 08:28:50 +02:00
Frederik Rietdijk 93a9ac696b playonlinux: fix build 2020-04-25 08:00:03 +02:00
Frederik Rietdijk 6f873e98f4 Python integration tests: disable for older python 3 versions
because the package that is used as part of the test does not support
older versions.
2020-04-25 07:59:37 +02:00
Frederik Rietdijk 71171b3225 Python tests: test venv from a nix env with Python 3.8
This test was disabled because it did not function yet, however,
apparently it does with 3.8.
2020-04-25 07:59:37 +02:00
Ryan Mulligan e7460e9412
Merge pull request #84309 from r-ryantm/auto-update/micronaut
micronaut: 1.3.2 -> 1.3.4
2020-04-24 21:42:42 -07:00
Konrad Borowski df81d9a41c clementineUnfree: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 1e802d70af clementine: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski f527f9db3a snakemake: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 5054133224 serviio: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 1659c302dd scribusUnstable: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 6d8e791b28 rtptools: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 7a29abc75c restya-board: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 40dd2c27c6 rink: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 56a7c4f056 remarkjs: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski f284354712 rambox: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 77ab79cb4b pythonPackages.untangle: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 41268500ae pythonPackages.subdownloader: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 2f49365ab9 pythonPackages.scikitlearn: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski ed1136b879 pythonPackages.geopandas: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski a55b6f1d06 pythonPackages.evernote: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski e538248f69 pythonPackages.certifi: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 79a11bd310 pcg-c: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski cedcfede5e p0f: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 5fac10ccb1 lv2: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 308636a84c lirc: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 25180cd2d5 pgf: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 47dc4104d4 libpgf: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski cfa5b41053 elm-instrument: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 16b7e0c909 darling-dmg: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 4f62d1f0b0 ciopfs: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 8998be8efb AgdaStdlib: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 02af438989 libdislocator: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Konrad Borowski 58d59e58d2 afl: update homepage link to use HTTPS 2020-04-24 19:44:59 -07:00
Lily Ballard 19b77d4ad1 jazzy: 0.13.1 -> 0.13.3 2020-04-24 19:40:00 -07:00
Renato Florentino Garcia de9866e38c asttokens: 1.1.13 -> 2.0.4 2020-04-24 22:27:27 -03:00