1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-19 20:21:14 +00:00
Commit graph

14128 commits

Author SHA1 Message Date
Sandro 2fe06d9478
Merge pull request #106661 from IvarWithoutBones/update-rtl8821ce
linuxPackages.rtl8821ce: 5.5.2_34066.20200325 -> unstable-2020-12-16
2021-02-04 18:41:02 +01:00
Sandro 31bc8c38e6
Merge pull request #111908 from primeos/fscryptctl
fscryptctl-experimental: 2017-10-23 -> 0.1.0
2021-02-04 18:13:29 +01:00
Tim Steinbach 429800ea40 zfs: Add test references 2021-02-04 09:38:46 -05:00
Ryan Mulligan a130a0a0d2
Merge pull request #111806 from r-ryantm/auto-update/pcm
pcm: 202011 -> 202101
2021-02-04 05:28:40 -08:00
Michael Weiss 6f6ce15938
fscryptctl-experimental: 2017-10-23 -> 0.1.0
Version 0.1.0 is based on the last commit that included support for V1
encryption policies. Version 1.0 is about to be released and will
include a PR which removes V1 policy support and adds V2 policy support.
Source: https://github.com/google/fscryptctl/issues/12#issuecomment-772888154

When version 1.0 is released we'll likely package it as fscryptctl and
mark fscryptctl-experimental as broken (referring to fscryptctl).
2021-02-04 13:39:00 +01:00
Martin Weinelt 95164dc11b
wpa_supplicant: fix for security advisory 2020-2
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners. The actual
parsing of that information validates field lengths appropriately, but
processing of the parsed information misses a length check when storing
a copy of the secondary device types. This can result in writing
attacker controlled data into the peer entry after the area assigned for
the secondary device type. The overflow can result in corrupting
pointers for heap allocations. This can result in an attacker within
radio range of the device running P2P discovery being able to cause
unexpected behavior, including termination of the wpa_supplicant process
and potentially arbitrary code execution.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Fixes: CVE-2021-0326
2021-02-04 00:31:38 +01:00
R. RyanTM 21063beadb pcm: 202011 -> 202101 2021-02-03 20:24:21 +00:00
Henri Menke bde2fffbbe zfs: 2.0.1 -> 2.0.2 2021-02-03 11:18:48 -08:00
Sandro 0829a51862
Merge pull request #109626 from holymonson/darwin-impure-cmds
darwin: add impure-cmds
2021-02-03 18:11:58 +01:00
Jörg Thalheim 60d9784263
Merge pull request #109635 from mroi/patch-pam
linux-pam: fix cross compilation on Darwin
2021-02-03 05:42:45 +00:00
Michael Raskin e83ab2e04d
Merge pull request #111039 from 0x4A6F/master-firejail
firejail: 0.9.64 -> 0.9.64.2
2021-02-02 22:15:03 +00:00
Markus Kowalewski 2576e20085
open-isns: 0.100 -> 0.101 2021-02-02 21:39:49 +01:00
Martin Weinelt 4499ac8c75
Merge pull request #110171 from r-ryantm/auto-update/openvswitch
openvswitch: 2.14.0 -> 2.14.1
2021-02-02 14:53:21 +01:00
Daniël de Kok cf19c9f220
Merge pull request #111630 from danieldk/nvidia-settings-race
nvidia-settings: fix parallel build race condition
2021-02-02 13:03:03 +01:00
Sandro 24ae4d2b2a
Merge pull request #111607 from jtojnar/fwupd-1.5.5
fwupd: 1.5.3 → 1.5.5
2021-02-02 10:51:30 +01:00
Daniël de Kok 4db1c8b199 nvidia-settings: fix parallel build race condition
Fix a race condition that occurs in parallel builds of
nvidia-settings, frequently ending in the following error:

/bin/bash: _out/Linux_x86_64/antialias.png.h: No such file or directory
make[1]: *** [Makefile:320: _out/Linux_x86_64/antialias.png.h] Error 1

Upstream issue and fix from:
https://github.com/NVIDIA/nvidia-settings/issues/59
2021-02-02 08:33:24 +01:00
Tim Steinbach b673417493
Revert "zfs: 2.0.1 -> 2.0.2"
This reverts commit e347e96601.
2021-02-01 20:23:03 -05:00
Jan Tojnar 8646063dd2
fwupd: 1.5.3 → 1.5.5
- https://github.com/fwupd/fwupd/releases/tag/1.5.4
- https://github.com/fwupd/fwupd/releases/tag/1.5.5
2021-02-01 21:27:05 +01:00
Tim Steinbach 67bdaf0655
linux/hardened/patches/5.4: 5.4.93-hardened1 -> 5.4.94-hardened1 2021-02-01 15:22:19 -05:00
Tim Steinbach d30f2daf5e
linux/hardened/patches/5.10: 5.10.11-hardened1 -> 5.10.12-hardened1 2021-02-01 15:22:19 -05:00
Tim Steinbach 75f91c80bc
linux/hardened/patches/4.19: 4.19.171-hardened1 -> 4.19.172-hardened1 2021-02-01 15:22:18 -05:00
Tim Steinbach e829b8379c
linux: 5.4.93 -> 5.4.94 2021-02-01 15:22:18 -05:00
Tim Steinbach ab661e6635
linux: 5.10.11 -> 5.10.12 2021-02-01 15:22:18 -05:00
Tim Steinbach 9dbb058f91
linux: 4.9.253 -> 4.9.254 2021-02-01 15:22:17 -05:00
Tim Steinbach 3d3a55c7d3
linux: 4.4.253 -> 4.4.254 2021-02-01 15:22:17 -05:00
Tim Steinbach 3cd3d80bd9
linux: 4.19.171 -> 4.19.172 2021-02-01 15:22:17 -05:00
Tim Steinbach 9e19fc4949
linux: 4.14.217 -> 4.14.218 2021-02-01 15:22:16 -05:00
Henri Menke e347e96601 zfs: 2.0.1 -> 2.0.2 2021-02-01 15:16:37 -05:00
Markus Kowalewski 119c1c55fd
linuxptp: fix license 2021-02-01 13:36:34 +01:00
Ninjatrappeur 4695a7ca51
Merge pull request #111498 from mweinelt/wpa_supplicant/owe
wpa_supplicant: backport support for OWE
2021-02-01 09:35:08 +01:00
Martin Weinelt 28f8b5f5f3 wpa_supplicant: backport support for OWE
The wpa_supplicant upstream is slow to push out new releases and has
been asked several times to do so. Support for Opportunistic Wireless
Encryption has been on master since late 2019 and still hasn't made it
into a release yet.

This backports a rather simple patchset to enable OWE key management
and exposes it also via DBus, so it can be used from Network-Manager.
2021-02-01 00:20:07 +01:00
Philipp Mildenberger c67f9d2935 zfs: fix zfs legacy mount
Closes #110376
2021-01-31 17:03:23 +01:00
Martin Weinelt 3e17f21396
batman-adv: 2020.4 -> 2021.0 (#111185)
* batman-adv: 2020.4 -> 2021.0

* batman-adv: add hexa to maintainers
2021-01-31 13:42:27 +01:00
Dmitry Kalinkin 161b9b2436
Merge pull request #99323 from eadwu/nvidia/hardware.nvidia.package
nixos: hardware.nvidia.package option for selecting nvidia package
2021-01-30 22:08:37 -05:00
Sandro Jäckel ced3ec6ce3
treewide: update permanent url redirects 2021-01-30 21:48:57 +01:00
Mario Rodas 532b223c91
Merge pull request #111269 from r-ryantm/auto-update/ipset
ipset: 7.9 -> 7.10
2021-01-30 15:16:28 -05:00
Guillaume Girol 04af7c02cd
Merge pull request #108725 from veehaitch/ath_regd_optional
kernelPatches: ath driver: allow setting regulatory domain
2021-01-30 14:07:25 +00:00
R. RyanTM 5571278f0b ipset: 7.9 -> 7.10 2021-01-30 05:48:12 +00:00
Silvan Mosberger aa48e205a2
Merge pull request #110787 from tfc/cartesian-product
lib/attrsets: add cartesianProductOfSets function
2021-01-29 20:22:12 +01:00
Tim Steinbach f10d197ef8
linux: 5.11-rc3 -> 5.11-rc5 2021-01-29 14:00:30 -05:00
markuskowa 8c72a38ad0
Merge pull request #111001 from markuskowa/upd-rdma-core
rdma-core: 33.0 -> 33.1
2021-01-29 19:46:07 +01:00
github-actions[bot] 5953c2bc94
Merge master into staging-next 2021-01-29 12:23:53 +00:00
Jörg Thalheim 6e8964256c
Merge pull request #110724 from ilian/fix/nvidia-rt 2021-01-29 09:28:39 +00:00
github-actions[bot] 98b8e8ebf8
Merge master into staging-next 2021-01-29 00:43:53 +00:00
markuskowa e29bef4b9c
Merge pull request #111009 from markuskowa/upd-isns
open-isns: 0.99 -> 0.100
2021-01-28 23:58:44 +01:00
Jacek Galowicz 001ba3934e Use lib.cartesianProducOfSets where lib.crossLists was used 2021-01-28 23:49:05 +01:00
IvarWithoutBones f93b241bd5 linuxPackages.rtl8821ce: 5.5.2_34066.20200325 -> unstable-2020-12-16 2021-01-28 21:55:06 +01:00
0x4A6F 2451c4d1d6
firejail: 0.9.64 -> 0.9.64.2 2021-01-28 19:42:59 +00:00
Markus Kowalewski a2498eabe2
rdma-core: 33.0 -> 33.1 2021-01-28 18:45:55 +01:00
Markus Kowalewski 886239148f
openisns: change attribute to open-isns
Make attribute consitent with pname to match the official name.
2021-01-28 15:28:06 +01:00