157954 Commits

Author SHA1 Message Date
Andreas Rammhold
c8d45086d1
firefox-esr-60: drop skia patch on aarch64 2018-11-07 16:47:24 +01:00
Matthew Harm Bekkema
9973a266ab firefox-esr-60: 60.2.2 -> 60.3.0 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12392: Crash with nested event loops
  When manipulating user events in nested loops while opening a document
  through script, it is possible to trigger a potentially exploitable
  crash due to poor event handling.

- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript
  A potential vulnerability was found in 32-bit builds where an integer
  overflow during the conversion of scripts to an internal UTF-16
  representation could result in allocating a buffer too small for the
  conversion. This leads to a possible out-of-bounds write.
  Note: 64-bit builds are not vulnerable to this issue.

- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting
  By rewriting the Host request headers using the webRequest API, a
  WebExtension can bypass domain restrictions through domain fronting.
  This would allow access to domains that share a host that are
  otherwise restricted.

- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts
  A vulnerability where a WebExtension can run content scripts in
  disallowed contexts following navigation or other events. This allows
  for potential privilege escalation by the WebExtension on sites where
  content scripts should not be run.

- CVE-2018-12397: Missing warning prompt when WebExtension requests local file access
  A WebExtension can request access to local files without the warning
  prompt stating that the extension will "Access your data for all
  websites" being displayed to the user. This allows extensions to run
  content scripts in local pages without permission warnings when a
  local file is opened.

- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3
  Mozilla developers and community members Daniel Veditz and Philipp
  reported memory safety bugs present in Firefox ESR 60.2. Some of these
  bugs showed evidence of memory corruption and we presume that with
  enough effort that some of these could be exploited to run arbitrary
  code.

- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3
  Mozilla developers and community members Christian Holler, Bob Owen,
  Boris Zbarsky, Calixte Denizet, Jason Kratzer, Jed Davis, Taegeon Lee,
  Philipp, Ronald Crane, Raul Gurzau, Gary Kwong, Tyson Smith, Raymond
  Forbes, and Bogdan Tara reported memory safety bugs present in Firefox
  62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory
  corruption and we presume that with enough effort that some of these
  could be exploited to run arbitrary code.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-27/
2018-11-03 22:51:36 +11:00
aszlig
c64624b843
autoPatchelfHook: Correctly detect PIE binaries
I originally thought it would just be enough to just check for an INTERP
section in isExecutable, however this would mean that we don't detect
statically linked ELF files, which would break our recent improvement to
gracefully handle those.

In theory, we are only interested in ELF files that have an INTERP
section, so checking for INTERP would be enough. Unfortunately the
isExecutable function is already used outside of autoPatchelfHook, so we
can't easily get rid of it now, so let's actually strive for more
correctness and make isExecutable actually match ELF files that are
executable.

So what we're doing instead now is to check whether either the ELF type
is EXEC *or* we have an INTERP section and if one of them is true we
should have an ELF executable, even if it's statically linked.

Along the way I also set LANG=C for the invocations of readelf, just to
be sure we don't get locale-dependent output.

Tested this with the following command (which contains almost[1] all the
packages using autoPatchelfHook), checking whether we run into any
library-related errors:

  nix-build -E 'with import ./. { config.allowUnfree = true; };
    runCommand "test-executables" {
      drvs = [
        anydesk cups-kyodialog3 elasticsearch franz gurobi
        masterpdfeditor oracle-instantclient powershell reaper
        sourcetrail teamviewer unixODBCDrivers.msodbcsql17 virtlyst
        vk-messenger wavebox zoom-us
      ];
    } ("for i in $drvs; do for b in $i/bin/*; do " +
       "[ -x \"$b\" ] && timeout 10 \"$b\" || :; done; done")
  '

Apart from testing against library-related errors I also compared the
resulting store paths against the ones prior to this commit. Only
anydesk and virtlyst had the same as they didn't have self-references,
everything else differed only because of self-references, except
elasticsearch, which had the following PIE binaries:

  * modules/x-pack/x-pack-ml/platform/linux-x86_64/bin/autoconfig
  * modules/x-pack/x-pack-ml/platform/linux-x86_64/bin/autodetect
  * modules/x-pack/x-pack-ml/platform/linux-x86_64/bin/categorize
  * modules/x-pack/x-pack-ml/platform/linux-x86_64/bin/controller
  * modules/x-pack/x-pack-ml/platform/linux-x86_64/bin/normalize

These binaries were now patched, which is what this commit is all about.

[1]: I didn't include the "maxx" package (MaXX Interactive Desktop)
     because the upstream URLs are no longer existing and I couldn't
     find them elsewhere on the web.

Signed-off-by: aszlig <aszlig@nix.build>
Fixes: https://github.com/NixOS/nixpkgs/issues/48330
Cc: @gnidorah (for MaXX Interactive Desktop)
2018-11-03 08:07:42 +01:00
Matthew Bauer
08b5cffe87 Revert "stage.nix: pkgsi686Linux only works on x86 family"
This reverts commit 78ca6d885ffbeba8b2cfe1fe68c3980e74fd4e5d.

Broke eval on aarch64
2018-11-03 00:47:39 -05:00
Jörg Thalheim
5ea21ad32a
Merge pull request #49629 from marsam/feature/fixes-pyre
pyre: 0.0.14 -> 0.0.17
2018-11-03 02:32:16 +00:00
Matthew Bauer
78ca6d885f stage.nix: pkgsi686Linux only works on x86 family
aarch64 cpus are going to break on pkgsi686Linux packages.

See this error:

https://hydra.nixos.org/build/82962379/
2018-11-02 21:24:55 -05:00
Matthew Bauer
e9db1e2917 grpc: disable werror for unknown warning option
This seems silly to do an error for. It breaks clang builds.
2018-11-02 21:24:55 -05:00
Matthew Bauer
3085f5fcb8 libobjc2: mark aarch64 as bad platform
Apparently some assembly has not been ported. This commit should fix
it:

b952a21abe (diff-e49aa4e60f8ccec1be46afc5e6ffcee5)

But no release has been made by the gnustep team yet!
2018-11-02 21:24:55 -05:00
Matthew Bauer
8bae7d328e
gsasl: disable check on darwin 2018-11-02 20:41:38 -05:00
Matthew Bauer
0923607ff7
gemrb: add libiconv
https://hydra.nixos.org/build/83508053/
2018-11-02 20:39:40 -05:00
Florian Klink
93f8ff68ea
Merge pull request #49658 from mayflower/gitlab-refactor
gitlab: refactor and fix test
2018-11-03 01:49:23 +01:00
Jörg Thalheim
469cce069b
Merge pull request #49661 from dywedir/bat
bat: fix build on darwin
2018-11-03 00:22:22 +00:00
Matthew Bauer
791e98eb90
Add myself to a few CODEOWNERS paths 2018-11-02 19:07:08 -05:00
Vladyslav Mykhailichenko
d87a2481d2
bat: fix build on darwin 2018-11-03 02:06:08 +02:00
lewo
3fb4eb1c43 nixos/dockerPreloader: preload docker images (#49379)
This module permits to preload Docker image in a VM in order to reduce
OIs on file copies. This module has to be only used in testing
environments, when the test requires several Docker images such as in
Kubernetes tests. In this case,
`virtualisation.dockerPreloader.images` can replace the
`services.kubernetes.kubelet.seedDockerImages` options.

The idea is to populate the /var/lib/docker directory by mounting qcow
files (we uses qcow file to avoid permission issues) that contain images.

For each image specified in
config.virtualisation.dockerPreloader.images:
1. The image is loaded by Docker in a VM
2. The resulting /var/lib/docker is written to a QCOW file

This set of QCOW files can then be used to populate the
/var/lib/docker:
1. Each QCOW is mounted in the VM
2. Symlink are created from these mount points to /var/lib/docker
3. A /var/lib/docker/image/overlay2/repositories.json file is generated
4. The docker daemon is started.
2018-11-03 01:00:53 +01:00
zimbatm
f9bf6cef54
terraform_0_11: 0.11.8 -> 0.11.10 2018-11-03 00:52:24 +01:00
Arian van Putten
13effc913d terraform-providers: Bump all releases (#49582)
Does what it says on the tin. Auto-generated.
2018-11-03 00:50:35 +01:00
Matthew Bauer
29b4ac8e41 release-corss.nix: fix ppc-embedded name
s/powerpc-embedded/ppc-embedded
2018-11-02 18:42:58 -05:00
Renaud
4e8bed52ce
Merge pull request #49352 from talyz/master
nomachine-client: init at 6.3.6_1
2018-11-03 00:01:10 +01:00
Robert Helgesson
1851203c7b
comfortaa: 2.004 -> 3.001 2018-11-02 23:38:37 +01:00
Robert Helgesson
6b9e570bc2
open-dyslexic: 2014-11-11 -> 2016-06-23 2018-11-02 23:29:29 +01:00
Robert Helgesson
7bade1b0f3
overpass: 3.0.2 -> 3.0.3 2018-11-02 23:23:33 +01:00
Robert Helgesson
2db8372554
pythonPackages.PyICU: 2.0.3 -> 2.2 2018-11-02 23:19:18 +01:00
Robert Helgesson
811509e5a3
abcmidi: 2018.06.23 -> 2018.10.25 2018-11-02 23:19:18 +01:00
Robert Helgesson
a562c5fc75
josm: 14289 -> 14382 2018-11-02 23:19:18 +01:00
Robin Gloster
ec7cb84bf0
gitlab: refactor and fix test 2018-11-02 22:40:21 +01:00
Matthew Bauer
a4234645fe betaflight: don’t use nano
not in newlib
2018-11-02 15:42:33 -05:00
Matthew Bauer
94a2cdebaa inav: don’t use nano
not in newlib
2018-11-02 15:42:32 -05:00
Matthew Bauer
5df22e343d axoloti: don’t hardode paths
Some of these paths are not in gcc-arm-embedded (instead binutils-arm-embedded).
2018-11-02 15:42:32 -05:00
Matthew Bauer
836cbf6a5c opentx: don’t use nano
Vanilla newlib doesn’t install nano.
2018-11-02 15:42:32 -05:00
Matthew Bauer
0b66270ada avrlibc: set platforms to avr-none
It will only build on avr architectures.
2018-11-02 15:42:32 -05:00
Jan Tojnar
3493f44727
Merge pull request #49560 from worldofpeace/eos-third-update
update some elementary thirdparty apps
2018-11-02 21:29:57 +01:00
worldofpeace
0a2420bccd nasc: 0.4.7 -> 0.5.0 2018-11-02 16:01:05 -04:00
Peter Simons
82822c66e4
Merge pull request #48697 from ElvishJerricco/jailbreak-cabal-helper
haskellPackages.cabal-helper: Jailbreak restrictive bounds.
2018-11-02 20:42:42 +01:00
Peter Simons
fdc19ff311 haskell-polyparse: use latest version for ghc-8.6.1 2018-11-02 20:25:13 +01:00
Austin Seipp
5ca1b19dab timescaledb-parallel-copy: init at 2018-05-14
Signed-off-by: Austin Seipp <aseipp@pobox.com>
2018-11-02 14:16:09 -05:00
Peter Simons
32dcb6051a haskell-brick: drop obsolete jailbreak for ghc-8.6.x 2018-11-02 20:00:28 +01:00
Austin Seipp
648f4a2769 nixpkgs: tidy up pgjwt package
This makes pgjwt take a dummy 'postgresql' argument, which it does not *need*
in the buildInputs (it is purely a SQL extension with no C code). However, this
argument will be necessary for an upcoming change that will parameterize the
extensions over a particular PostgreSQL version.

It also does some tiny cleanup, setting a null build phase.

Signed-off-by: Austin Seipp <aseipp@pobox.com>
2018-11-02 13:52:48 -05:00
Austin Seipp
2266f2014b nixos/postgresql: add myself as maintainer
Signed-off-by: Austin Seipp <aseipp@pobox.com>
2018-11-02 13:52:33 -05:00
Jan Tojnar
b603856e44
Merge pull request #49648 from worldofpeace/granite/5.2.0
granite: 5.1.0 -> 5.2.0
2018-11-02 19:45:45 +01:00
Peter Simons
f648605b4e all-cabal-hashes: update to Hackage at 2018-11-02T16:36:33Z 2018-11-02 19:22:17 +01:00
Peter Simons
1bc120fa5f git-annex: update sha256 hash for new version 7.20181031 2018-11-02 19:22:17 +01:00
Peter Simons
7766df8eba hackage-packages.nix: automatic Haskell package set update
This update was generated by hackage2nix v2.11.1-2-g57c4f0f from Hackage revision
98ec0eee2d.
2018-11-02 19:22:10 +01:00
Peter Simons
508ce6e208 haskellPackages: default to ghc 8.4.4 as per Stackage LTS 12.16 2018-11-02 19:21:58 +01:00
Peter Simons
c9e1380626 r-nloptr: fix build by adding pkgconfig 2018-11-02 17:50:18 +01:00
Peter Simons
9f9fc7ae15 nlopt: update from 2.4.2 to 2.5.0 2018-11-02 17:50:18 +01:00
Peter Simons
9b63cc6313 r-rlang: patch shebang in configure script to fix the build 2018-11-02 17:50:18 +01:00
Tom McLaughlin
cac5c9401e R: update CRAN and BIOC package sets
Closes https://github.com/NixOS/nixpkgs/pull/49430.
2018-11-02 17:50:18 +01:00
worldofpeace
8cf1e97fcf granite: 5.1.0 -> 5.2.0
- Correct License to LGPLv3+
2018-11-02 12:44:05 -04:00
Vladimír Čunát
1fe3328593
knot-resolver: 3.0.0 -> 3.1.0
https://lists.nic.cz/pipermail/knot-resolver-users/2018/000086.html
2018-11-02 16:46:03 +01:00