Commit Graph

133416 Commits (release-18.03-flake)
 

Author SHA1 Message Date
Tim Steinbach 1d8470b164
linux: 4.14.80 -> 4.14.81
(cherry picked from commit 338d38e57b68e12a2f015e9eabe561accefcad4f)
2018-11-13 14:36:09 -05:00
Tim Steinbach df1824013f
linux: 4.9.136 -> 4.9.137
(cherry picked from commit 7395bd34f76e22abc4e4c79847fd978a713da932)
2018-11-13 14:36:08 -05:00
Tim Steinbach 54539972c4
linux: 4.14.79 -> 4.14.80
(cherry picked from commit e64068cdbfe0a5d6543da6986376763e3d588711)
2018-11-10 16:14:12 -05:00
Tim Steinbach 643f6eb5e9
linux: 4.9.135 -> 4.9.136
(cherry picked from commit 98b6ecace1eea344987f6f942e88e550825f4aca)
2018-11-10 16:14:09 -05:00
Tim Steinbach af71ba5459
linux: 4.4.162 -> 4.4.163
(cherry picked from commit fb44ed79d22c88145132f49c0747def014528b68)
2018-11-10 16:13:09 -05:00
Tim Steinbach 21b7f59ae1
linux: 4.14.78 -> 4.14.79
(cherry picked from commit bd636c897724c4c26171a8486c153c37c2a38eac)
2018-11-04 11:45:26 -05:00
Linus Heckemann 0e614d0292
libssh: 0.7.5 -> 0.7.6
Fixes CVE-2018-10933:

libssh versions 0.6 and above have an authentication bypass
vulnerability in the server code. By presenting the server an
SSH2_MSG_USERAUTH_SUCCESS message in place of the
SSH2_MSG_USERAUTH_REQUEST message which the server would expect to
initiate authentication, the attacker could successfully authentciate
without any credentials.

Source:
https://www.libssh.org/2018/10/16/libssh-0-8-4-and-0-7-6-security-and-bugfix-release/
(cherry picked from commit eca462813d7586063deb5c9989ae9bcef29f9495)
2018-11-02 03:31:47 +01:00
R. RyanTM 036164bd63
ntp: 4.2.8p11 -> 4.2.8p12 (#45180)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/ntp/versions.

(cherry picked from commit 2524ad67da82f35d367e905994bd442b094f89c3)
2018-11-02 03:31:28 +01:00
Markus Kowalewski da9b96042e
ntp: add license
(cherry picked from commit 6aba5e26b3bf79ba8e193ea3ece74011c1b33ce0)
2018-11-02 03:31:27 +01:00
Franz Pletz 47d6c44827
strongswan: patch CVE-2018-16151 & CVE-2018-16152
(cherry picked from commit f71cc5f744d3fb4a08ce622a803b045e6ba4f013)
2018-11-02 03:19:27 +01:00
Franz Pletz 5ce0b90862
wireshark: 2.4.9 -> 2.4.10
Security release: https://www.wireshark.org/docs/relnotes/wireshark-2.4.10.html
2018-11-02 03:03:15 +01:00
Will Dietz ffe50cdf22
teeworlds: 0.6.4 -> 0.6.5
This release adds support for building with cmake!
So switch to that eagerly instead of fighting with bam.

(if nothing else cmake is the devil we know...)

Also:

* fixup 'DATA_DIR' so programs can find resources
  (without need for wrappers)
* install readme+license as previously done ("docs")
* don't install tools since not built or installed by default
  * esp since doesn't appear to have non-adhoc method for installation
  * other distros don't seem to include

(cherry picked from commit 18258bae34ad16e808a2f5447962008d082fd19f)

Fixes CVE-2018-18541.
2018-11-02 02:50:10 +01:00
Franz Pletz e87ace43d5
tomcat_connectors: 1.2.41-dev-1613051 -> 1.2.46
Fixes CVE-2018-11759, CVE-2018-1323, CVE-2016-6808.

(cherry picked from commit 9fe0e57d9d5e8ae95d081d8e33b867bcfbc4ba24)
2018-11-01 22:39:01 +01:00
Franz Pletz faaf1c2fcc
icecast: 2.4.3 -> 2.4.4
Fixes CVE-2018-18820.

(cherry picked from commit 24d6c0dbde49ca939751fe6caff0f9af3d0e6723)
2018-11-01 21:50:41 +01:00
Jörg Thalheim 19fc6daa53 Merge pull request #45017 from chpatrick/meshlab-update
meshlab: 2016.02 -> 20180627-beta
2018-10-29 09:08:09 +01:00
Silvan Mosberger 6f07d27625
Merge pull request #49157 from 1000101/backport-release-18.03
[18.03] nixos/trezord: revised and updated udev rules
2018-10-28 00:58:30 +02:00
Andreas Rammhold 02fc3d3619
Merge pull request #49187 from andir/18.03/mosquitto
[18.03] mosquitto: 1.4.14 ->1.5.3
2018-10-28 00:23:33 +02:00
Franz Pletz ee9df2b79b
Merge pull request #49230 from ciil/jira-update-18.03
atlassian-jira: 7.12.0 -> 7.12.3 (18.03)
2018-10-27 11:13:55 +00:00
Simon Lackerbauer eb7e010dbd atlassian-jira: 7.12.1 -> 7.12.3
(cherry picked from commit 50abe602b1ac61643b1fda36f7a6a6006108e748)
2018-10-27 11:38:13 +02:00
Simon Lackerbauer 83fa2ccecc atlassian-jira: 7.12.0 -> 7.12.1
(cherry picked from commit a431f3e35d68debdb16537e4563dd290dbe15500)
2018-10-27 11:38:13 +02:00
Ján Hrnko 4d6e4b9652 nixos/trezord: revised and updated udev rules
(cherry picked from commit a88e0ef9aa79ec3910898b056e087e9452c1964d)
2018-10-26 16:22:25 +02:00
Peter Hoeg c7d5cbc3be
mosquitto: 1.4.15 -> 1.5.3
Use cmake on all platforms instead of only macos.

(cherry picked from commit a45fa35742ac3bc109aa8516bf25a17759e84da9)
2018-10-26 15:03:47 +02:00
Ryan Mulligan 559a4a31c7
mosquitto: 1.4.14 -> 1.4.15
Semi-automatic update. These checks were done:

- built on NixOS
- Warning: no binary found that responded to help or version flags. (This warning appears even if the package isn't expected to have binaries.)
- found 1.4.15 with grep in /nix/store/7nifpbj16dlhljb2jwbwxyv4wx1zwa1y-mosquitto-1.4.15
- found 1.4.15 in filename of file in /nix/store/7nifpbj16dlhljb2jwbwxyv4wx1zwa1y-mosquitto-1.4.15

(cherry picked from commit a28a2e382970fb94a4e07b09946aafe799b5f391)
2018-10-26 15:03:35 +02:00
Andreas Rammhold b4e3a404e6
Merge pull request #49096 from andir/18.03/firefox
[18.03] firefox{,-bin}: 62.0.3 -> 63.0 & nss: 3.38-> 3.39
2018-10-26 00:53:39 +02:00
Michael Weiss ede8a2f1ac
Merge pull request #48757 from primeos/security-backports-for-18.03
[18.03] Security backport for fuse (CVE-2018-10906)
2018-10-25 23:35:26 +02:00
Michael Weiss 228acdca45 fuse: 2.9.7 -> 2.9.8 (security, CVE-2018-10906)
Upstream changelog:
- SECURITY UPDATE: In previous versions of libfuse it was possible to
  for unprivileged users to specify the allow_other option even when
  this was forbidden in /etc/fuse.conf. The vulnerability is present
  only on systems where SELinux is active (including in permissive
  mode).
- libfuse no longer segfaults when fuse_interrupted() is called outside
  the event loop.
- The fusermount binary has been hardened in several ways to reduce
  potential attack surface. Most importantly, mountpoints and mount
  options must now match a hard-coded whitelist. It is expected that
  this whitelist covers all regular use-cases.
- Fixed rename deadlock on FreeBSD.

(cherry picked from commit ec1082c58fec2f0739855d4dc01df6fdd335e0a3)
2018-10-25 21:19:47 +02:00
Michael Weiss 0e58950619 fuse3: 3.2.4 -> 3.2.5 (security, CVE-2018-10906)
Upstream changelog:
- SECURITY UPDATE: In previous versions of libfuse it was possible to
  for unprivileged users to specify the allow_other option even when
  this was forbidden in /etc/fuse.conf. The vulnerability is present
  only on systems where SELinux is active (including in permissive
  mode).
- The fusermount binary has been hardened in several ways to reduce
  potential attack surface. Most importantly, mountpoints and mount
  options must now match a hard-coded whitelist. It is expected that
  this whitelist covers all regular use-cases.
- Added a test of seekdir to test_syscalls.
- Fixed readdir bug when non-zero offsets are given to filler and the
  filesystem client, after reading a whole directory, re-reads it from a
  non-zero offset e. g. by calling seekdir followed by readdir.

(cherry picked from commit 46cd782b43416969b1f11232ecf5b80e798a92a2)
2018-10-25 21:19:47 +02:00
Michael Weiss 289390b8d4 fuse3: 3.2.3 -> 3.2.4
(cherry picked from commit fa6941f1086bae9f1f747e974af2a289143fac31)
2018-10-25 21:19:47 +02:00
Michael Weiss ea1b61cf75 fuse3: 3.2.2 -> 3.2.3
(cherry picked from commit d3e3e131f565be1d72e98980e0e22cc0b05f46ec)
2018-10-25 21:19:47 +02:00
Michael Raskin f486260f55 fuse3: install fuse.conf without execute bit
(cherry picked from commit 085eab7ef644a9c0fd38b6e81d546916db150f1d)
2018-10-25 21:19:47 +02:00
Michael Weiss c1781119df fuse3: 3.2.1 -> 3.2.2
Stop using bin/mount.fuse from fuse3 for fuse2 (mount.fuse from fuse3
isn't guaranteed to remain backwards compatible).

(cherry picked from commit c00b5bf6a2ec642c7088c22f825d56629ebbba5e)
2018-10-25 21:19:47 +02:00
Andreas Rammhold 5dd4087273
firefox-esr-60: 60.2.2esr -> 60.3.0esr
(cherry picked from commit 3db6ca50ef0ce27b4f9765b783dcc32c0a613a2d)
2018-10-25 16:31:11 +02:00
Andreas Rammhold caf1a09c8c
firefox: 62.0.3 -> 63.0 2018-10-25 09:35:22 +02:00
Andreas Rammhold dc2becf42f
rust_1_29: backport for rust 1.29.1 from unstable
Based on commit aef6830d3e59d554dea2cb96c07326922cffe416
2018-10-25 09:29:00 +02:00
Jan Tojnar b221c255bc
rust-cbindgen: init at 0.6.3 (backport from master)
version as of commit f41a35bf14bc1825c4bdd53f92cf04624c03f09d
2018-10-25 09:29:00 +02:00
Andreas Rammhold 15bd77a6fd
firefox-bin: 62.0.3 -> 63.0
(cherry picked from commit 5137c04770d173c8f3d08dc66f72a10a4f885ae9)
2018-10-24 18:33:29 +02:00
Tim Steinbach d3be52c83b
linux: 4.14.77 -> 4.14.78
(cherry picked from commit 719087fb8c31d415862815153409a186e0908049)
2018-10-20 11:18:34 -04:00
Tim Steinbach f03886a8db
linux: 4.9.134 -> 4.9.135
(cherry picked from commit 560e61a3fd5ab5872d0b23cc19ec1e96ba5201f7)
2018-10-20 11:18:33 -04:00
Tim Steinbach 9ee9e4e887
linux: 4.4.161 -> 4.4.162
(cherry picked from commit 218bf14c3ea96f7b55978edb8ffe3dcf7c2615cd)
2018-10-20 11:18:31 -04:00
Tim Steinbach 43631e2b01
linux: 4.14.76 -> 4.14.77
(cherry picked from commit 7abe0e881e4a1167f124234efe4f4ed43d84d6bd)
2018-10-18 08:28:21 -04:00
Tim Steinbach afef91f92a
linux: 4.9.133 -> 4.9.134
(cherry picked from commit ab8ff7c07c7f90fa0a5969c21d0c5611924fac48)
2018-10-18 08:28:20 -04:00
Michael Weiss ed819d8d4f
Merge pull request #48484 from primeos/signal-desktop-backport
[18.03] Backport Signal-Desktop

Reason: Signal-Desktop displayed the following message: "This version of
Signal Desktop has expired. Please upgrade to the latest version to
continue messaging." (see #48436).
2018-10-15 22:54:43 +02:00
tobiasBora 17f1e9b350 signal-desktop: enable notifications
(cherry picked from commit 820e1caf8610e6e9a22935ea8e198e0111c3cd00)
2018-10-15 21:33:12 +02:00
Michael Weiss 1f8f5b1f43 signal-desktop: 1.16.1 -> 1.16.2
(cherry picked from commit a526719184e6dbfff9992bdac52ce3d65ec09fa7)
2018-10-15 21:33:12 +02:00
Michael Weiss acc9de027a signal-desktop: 1.16.0 -> 1.16.1
(cherry picked from commit 3410dcd90e0d1ddcf3e3ec483bab7c0cbfc152c9)
2018-10-15 21:33:12 +02:00
Michael Weiss ce97b869f2 signal-desktop: 1.15.5 -> 1.16.0
(cherry picked from commit 7c1b85cf6de1dc431e5736bff8adf01224e6abe5)
2018-10-15 21:32:39 +02:00
Michael Weiss 600065efb3 signal-desktop: 1.15.4 -> 1.15.5
(cherry picked from commit 9f4e76be5ffa4e116de395e92de156be4cd0b0e4)
2018-10-15 21:32:39 +02:00
Michael Weiss 51fc1ed3cf signal-desktop: 1.15.3 -> 1.15.4
(cherry picked from commit b28f8b4c94247c5afcae7a461173133a836343f0)
2018-10-15 21:32:38 +02:00
Michael Weiss 0c19b381da signal-desktop: 1.15.0 -> 1.15.3
Skipped 1.15.1 due to upstream issues (see GitHub), 1.15.2 and 1.15.3
should be fine (at least there are fewer issues).

(cherry picked from commit c7e04336a71df05d3c761782fbb8439462c133b0)
2018-10-15 21:32:38 +02:00
Michael Weiss a1d4e9812e signal-desktop: Allow overriding the spell checker language (#44456)
Thought this could be useful for others as well. Unfortunately it will
also override the UI language.

Example usage:

  environment.systemPackages = with pkgs; [
    (signal-desktop.override {
      spellcheckerLanguage = "de_DE";
    })
  ];

(cherry picked from commit 9ef1406a9918f3414d081563ba34084c5e187a58)
2018-10-15 21:32:37 +02:00