1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-09-11 15:08:33 +01:00
Commit graph

18912 commits

Author SHA1 Message Date
Michał Pałka 80e0cda7ff xen: patch for XSAs: 216, 217, 218, 219, 220, 221, 222, and 224
XSA-216 Issue Description:

> The block interface response structure has some discontiguous fields.
> Certain backends populate the structure fields of an otherwise
> uninitialized instance of this structure on their stacks, leaking
> data through the (internal or trailing) padding field.

More: https://xenbits.xen.org/xsa/advisory-216.html

XSA-217 Issue Description:

> Domains controlling other domains are permitted to map pages owned by
> the domain being controlled.  If the controlling domain unmaps such a
> page without flushing the TLB, and if soon after the domain being
> controlled transfers this page to another PV domain (via
> GNTTABOP_transfer or, indirectly, XENMEM_exchange), and that third
> domain uses the page as a page table, the controlling domain will have
> write access to a live page table until the applicable TLB entry is
> flushed or evicted.  Note that the domain being controlled is
> necessarily HVM, while the controlling domain is PV.

More: https://xenbits.xen.org/xsa/advisory-217.html

XSA-218 Issue Description:

> We have discovered two bugs in the code unmapping grant references.
>
> * When a grant had been mapped twice by a backend domain, and then
> unmapped by two concurrent unmap calls, the frontend may be informed
> that the page had no further mappings when the first call completed rather
> than when the second call completed.
>
> * A race triggerable by an unprivileged guest could cause a grant
> maptrack entry for grants to be "freed" twice.  The ultimate effect of
> this would be for maptrack entries for a single domain to be re-used.

More: https://xenbits.xen.org/xsa/advisory-218.html

XSA-219 Issue Description:

> When using shadow paging, writes to guest pagetables must be trapped and
> emulated, so the shadows can be suitably adjusted as well.
>
> When emulating the write, Xen maps the guests pagetable(s) to make the final
> adjustment and leave the guest's view of its state consistent.
>
> However, when mapping the frame, Xen drops the page reference before
> performing the write.  This is a race window where the underlying frame can
> change ownership.
>
> One possible attack scenario is for the frame to change ownership and to be
> inserted into a PV guest's pagetables.  At that point, the emulated write will
> be an unaudited modification to the PV pagetables whose value is under guest
> control.

More: https://xenbits.xen.org/xsa/advisory-219.html

XSA-220 Issue Description:

> Memory Protection Extensions (MPX) and Protection Key (PKU) are features in
> newer processors, whose state is intended to be per-thread and context
> switched along with all other XSAVE state.
>
> Xen's vCPU context switch code would save and restore the state only
> if the guest had set the relevant XSTATE enable bits.  However,
> surprisingly, the use of these features is not dependent (PKU) or may
> not be dependent (MPX) on having the relevant XSTATE bits enabled.
>
> VMs which use MPX or PKU, and context switch the state manually rather
> than via XSAVE, will have the state leak between vCPUs (possibly,
> between vCPUs in different guests).  This in turn corrupts state in
> the destination vCPU, and hence may lead to weakened protections
>
> Experimentally, MPX appears not to make any interaction with BND*
> state if BNDCFGS.EN is set but XCR0.BND{CSR,REGS} are clear.  However,
> the SDM is not clear in this case; therefore MPX is included in this
> advisory as a precaution.

More: https://xenbits.xen.org/xsa/advisory-220.html

XSA-221 Issue Description:

> When polling event channels, in general arbitrary port numbers can be
> specified.  Specifically, there is no requirement that a polled event
> channel ports has ever been created.  When the code was generalised
> from an earlier implementation, introducing some intermediate
> pointers, a check should have been made that these intermediate
> pointers are non-NULL.  However, that check was omitted.

More: https://xenbits.xen.org/xsa/advisory-221.html

XSA-222 Issue Description:

> Certain actions require removing pages from a guest's P2M
> (Physical-to-Machine) mapping.  When large pages are in use to map
> guest pages in the 2nd-stage page tables, such a removal operation may
> incur a memory allocation (to replace a large mapping with individual
> smaller ones).  If this allocation fails, these errors are ignored by
> the callers, which would then continue and (for example) free the
> referenced page for reuse.  This leaves the guest with a mapping to a
> page it shouldn't have access to.
>
> The allocation involved comes from a separate pool of memory created
> when the domain is created; under normal operating conditions it never
> fails, but a malicious guest may be able to engineer situations where
> this pool is exhausted.

More: https://xenbits.xen.org/xsa/advisory-222.html

XSA-224 Issue Description:

> We have discovered a number of bugs in the code mapping and unmapping
> grant references.
>
> * If a grant is mapped with both the GNTMAP_device_map and
> GNTMAP_host_map flags, but unmapped only with host_map, the device_map
> portion remains but the page reference counts are lowered as though it
> had been removed. This bug can be leveraged cause a page's reference
> counts and type counts to fall to zero while retaining writeable
> mappings to the page.
>
> * Under some specific conditions, if a grant is mapped with both the
> GNTMAP_device_map and GNTMAP_host_map flags, the operation may not
> grab sufficient type counts.  When the grant is then unmapped, the
> type count will be erroneously reduced.  This bug can be leveraged
> cause a page's reference counts and type counts to fall to zero while
> retaining writeable mappings to the page.
>
> * When a grant reference is given to an MMIO region (as opposed to a
> normal guest page), if the grant is mapped with only the
> GNTMAP_device_map flag set, a mapping is created at host_addr anyway.
> This does *not* cause reference counts to change, but there will be no
> record of this mapping, so it will not be considered when reporting
> whether the grant is still in use.

More: https://xenbits.xen.org/xsa/advisory-224.html
2017-06-26 07:01:24 +00:00
Jörg Thalheim 7df83abe85 keepassx-community: 2.1.4 -> 2.2.0 2017-06-26 07:31:44 +01:00
Franz Pletz 3156263876
rsync: build with iconv, zlib & popt from nixpkgs
The rsync binary was previously built without iconv support which is needed
for utf-8 conversions on darwin. Fixes #26864.

Additionally rsync used to be built with bundled versions of zlib and popt
that were outdated. This decreases the size of the rsync binary by ~82KB.
2017-06-26 03:48:41 +02:00
Tim Steinbach 1a25495b63
git: 2.13.1 -> 2.13.2 2017-06-25 21:13:23 -04:00
aszlig bd63daae03
chromium: Add installation of libGLESv2.so
The following errors occur when you start Chromium prior to this commit:

[2534:2534:0625/202928.673160:ERROR:gl_implementation.cc(246)] Failed to
load .../libexec/chromium/swiftshader/libGLESv2.so:
../libexec/chromium/swiftshader/libGLESv2.so: cannot open shared object
file: No such file or directory
[2534:2534:0625/202928.674434:ERROR:gpu_child_thread.cc(174)] Exiting
GPU process due to errors during initialization

While in theory we do not strictly need libGLESv2.so, in practice this
means that the GPU process isn't starting up at all which in turn leads
to crawling rendering performance on some sites.

So let's install all shared libraries in swiftshader.

I've tested this with the chromium.stable NixOS VM test and also locally
on my machine and the errors as well as the performance issues are gone.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2017-06-25 22:43:25 +02:00
Joachim F 90d3a0314c Merge pull request #26836 from Ma27/update/geogebra
geogebra: 5-0-361-0 -> 5-0-369-0
2017-06-25 16:35:13 +01:00
Joachim F c235bf3e3d Merge pull request #26792 from mdorman/emacs-updates
Automated Emacs package updates
2017-06-25 15:33:19 +01:00
Franz Pletz ed515c8080
weechat: 1.8 -> 1.9 2017-06-25 14:03:18 +02:00
Maximilian Bosch f5665e9ab4
geogebra: 5-0-361-0 -> 5-0-369-0 2017-06-25 12:39:30 +02:00
Jörg Thalheim 46427b77f4 Merge pull request #26690 from DIzFer/telegram-update
tdesktop: 1.0.27 -> 1.1.7
2017-06-25 11:37:21 +01:00
Jörg Thalheim bc488d4cb5 Merge pull request #26834 from calvertvl/upgrade-calibre-to-3.1.1
calibre: 2.84.0 -> 3.1.1
2017-06-25 10:22:50 +01:00
Jörg Thalheim f506b72308 krita: 3.1.3 -> 3.1.4 2017-06-25 10:18:45 +01:00
Jörg Thalheim de21c43257 Merge pull request #26829 from dywedir/tiled
tiled: 0.18.2 -> 1.0.1
2017-06-25 09:48:10 +01:00
Jörg Thalheim 24e9ec3166 marble: fix src hash 2017-06-25 09:38:32 +01:00
Jörg Thalheim f319442b77 keepassxc: fix 4.9 compatibility 2017-06-25 09:36:06 +01:00
Jörg Thalheim ad42e5f6e5 Merge pull request #26795 from veprbl/root_6.10.00
root: 6.09.02 -> 6.10.00
2017-06-25 09:14:30 +01:00
Frederik Rietdijk fcd5804d7f konversation: 1.6.2 -> 1.7.2 and fix build 2017-06-25 09:56:34 +02:00
Frederik Rietdijk fdf181237b yakuake: fix build 2017-06-25 09:56:34 +02:00
Frederik Rietdijk c7bc8b42f2 kdeconnect: fix build 2017-06-25 09:56:34 +02:00
Victor Calvert e600317768 calibre: 2.84.0 -> 3.1.1
links-privacy patch was removed as the content server was
rewritten in calibre 3.0.

The rewrite also needed a couple more python packages.
2017-06-25 03:52:36 -04:00
Roman Volosatovs 4ebaed854f
mopidy-local-images: init at 1.0.0 2017-06-25 00:26:02 +02:00
dywedir 33e4afa172 tiled: 0.18.2 -> 1.0.1 2017-06-25 01:08:00 +03:00
Jörg Thalheim c0303c7110 Merge pull request #26822 from 4z3/bitlbee-facebook
bitlbee-facebook: 1.1.0 -> 1.1.1
2017-06-24 20:45:18 +01:00
Der Pfirsich 2c6fbc737f spotify: 1.0.55.487.g256699aa-16 -> 1.0.57.474.gca9c9538-30 (#26794) 2017-06-24 20:41:05 +01:00
Jörg Thalheim 6741b3ac7c Merge pull request #26807 from ajevans85/crashplan-4-8-3
crashplan: 4.8.2 -> 4.8.3
2017-06-24 19:57:28 +01:00
tv 267ea50604 bitlbee-facebook: 1.1.0 -> 1.1.1 2017-06-24 20:37:32 +02:00
Dmitry Kalinkin ada12f46dc
root: 6.09.02 -> 6.10.00
also workaround #26197
2017-06-24 13:38:25 -04:00
Yann Hodique 1be7323f5a hugo: 0.24 -> 0.24.1 2017-06-24 08:26:44 -07:00
Jörg Thalheim 40ccf99373 Merge pull request #26743 from sigma/pr/hugo-0.24
hugo: 0.23 -> 0.24
2017-06-24 16:23:52 +01:00
ajevans 76e019ad9f crashplan: 4.8.2 -> 4.8.3 2017-06-24 16:19:30 +10:00
aszlig 06271b6eba
krita: Fix build dependencies
First of all, we need a newer version of Vc, because at least version
1.1.0 is required for Krita 3.1.3.

Also, qtmultimedia and qtx11extras were missing.

Built and tested successfully on my machine.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
Cc: @abbradar
2017-06-23 22:15:05 +02:00
John Ericson afd2bdbad2 Merge pull request #26007 from obsidiansystems/cc-wrapper-prefix
Get rid of gcc-cross-wrapper
2017-06-23 11:22:34 -04:00
Michael Alan Dorman eea95af5d1 melpa-packages: 2017-06-23
Removals:
 - todochiku - Removed from melpa
2017-06-23 11:05:12 -04:00
Michael Alan Dorman 40e17794ce melpa-stable-packages: 2017-06-23 2017-06-23 11:05:12 -04:00
Michael Alan Dorman a10c8a97b4 org-packages: 2017-06-23 2017-06-23 11:05:12 -04:00
Michael Alan Dorman 8a714e3bb6 elpa-packages: 2017-06-23 2017-06-23 11:05:11 -04:00
Frederik Rietdijk 4f0d812abc python.pkgs.spyder: remove maintainers
since we both do not use this package anymore.
cc @bjornfor
2017-06-23 10:44:42 +02:00
Jörg Thalheim f3b626cf4d Merge pull request #26770 from volth/jetbrains-update-script-2
jetbrains updater: use perlPackages.LWPProtocolhttps
2017-06-23 09:42:51 +01:00
aszlig 63fb845fcf
virtualbox: Rebase hardened.patch on top of 5.1.22
The merge of the version bump in
6fb9f89238 didn't take care of our patch
for the hardening mode and thus enabling VirtualBox without also
force-disabling hardening mode will result in a build error.

While the patch is largely identical with the old version, I've removed
one particular change around the following code:

    if (pFsObjState->Stat.st_mode & S_IWOTH)
        return supR3HardenedSetError3(VERR_SUPLIB_WORLD_WRITABLE, pErrInfo,
                                      "World writable: '", pszPath, "'");

In the old version of the patch we have checked whether the path is
within the Nix store and suppressed the error return if that's the case.

The reason why I did that in the first place was because we had a bunch
of symlinks which were writable.

In VirtualBox 5.1.22 the code specifically checks whether the file is a
symlink, so we can safely drop our change.

Tested via all of the "virtualbox" NixOS VM subtests and they now all
succeed.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2017-06-23 05:48:54 +02:00
Tim Steinbach 6fb9f89238 Merge pull request #25368 from bachp/virtualbox-5.1.22
virtualbox: 5.1.18 -> 5.1.22
2017-06-22 21:23:47 -04:00
John Ericson 7c754b1e3b mpg123: Modernize and fix for cross
Do not even think about configureFlags unless in cross, to avoid hash
breaking when not in cross.
2017-06-22 17:53:55 -04:00
John Ericson 502902f1c6 lynx: Fix for cross
Needed C toolchain targeting build platform
2017-06-22 17:53:55 -04:00
John Ericson 7bdacad8b3 ed: Modernize and fix for cross 2017-06-22 17:53:53 -04:00
John Ericson 8b22e497f2 vim: Modernize derivation, hopefully fixing cross 2017-06-22 17:53:53 -04:00
John Ericson 594d264205 cross stdenv adaptor: Support --host --build --target across the board
Packages get --host and --target by default, but can explicitly request
any subset to be passed as needed. See docs for more info.

rustc: Avoid hash breakage by using the old (ignored)
dontSetConfigureCross when not cross building
2017-06-22 17:52:28 -04:00
Volth a2605322c6 fixed regexp, it did not match the last block 2017-06-22 19:16:19 +00:00
Volth 7fa29f39d1 a little simpification (use File::Slurp) 2017-06-22 19:08:19 +00:00
aszlig 1f65182272
electrum: Unify protobuf dependencies
Since 9c57f3b5c0 bumped the protobuf
version because the new upstream requires it, electrum now gets
protobuf3_0 *and* protobuf3_2 instead of just one version.

This leads to the following build errer:

Found duplicated packages in closure for dependency 'protobuf':
  protobuf 3.0.2 (...-python2.7-protobuf-3.0.2/lib/python2.7/site-packages)
  protobuf 3.2.0 (...-python2.7-protobuf-3.2.0/lib/python2.7/site-packages)

Using protobuf3_2 for keepkey and electrum fixes the build.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
Cc: @np
2017-06-22 21:06:17 +02:00
Volth 00101eb7c9 jetbrains updater: use perlPackages.LWPProtocolhttps 2017-06-22 19:00:28 +00:00
Jörg Thalheim d1eefba3a4 jetbrains: use nix-shell shebang in update script 2017-06-22 17:34:04 +01:00