206156 Commits

Author SHA1 Message Date
Mario Rodas
169fb13569
Merge pull request #75331 from r-ryantm/auto-update/python3.8-mysqlclient
python38Packages.mysqlclient: 1.4.5 -> 1.4.6
2019-12-15 16:02:28 -05:00
Mario Rodas
80af1ff9e1
Merge pull request #75368 from r-ryantm/auto-update/python3.8-sasmodels
python38Packages.sasmodels: 1.0.0 -> 1.0.1
2019-12-15 15:28:08 -05:00
Andreas Rammhold
b21b92947e ansible_2_6: 2.6.17 -> 2.6.20
This addresses the following security issues:

  * CVE-2019-14846 - Several Ansible plugins could disclose aws
    credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
    lookup/aws_account_attribute.py, and lookup/aws_secret.py,
    lookup/aws_ssm.py use the boto3 library from the Ansible process. The
    boto3 library logs credentials at log level DEBUG. If Ansible's
    logging was enabled (by setting LOG_PATH to a value) Ansible would set
    the global log level to DEBUG. This was inherited by boto and would
    then log boto credentials to the file specified by LOG_PATH. This did
    not affect aws ansible modules as those are executed in a separate
    process. This has been fixed by switching to log level INFO
  * Convert CLI provided passwords to text initially, to prevent unsafe
    context being lost when converting from bytes->text during post
    processing of PlayContext. This prevents CLI provided passwords from
    being incorrectly templated (CVE-2019-14856)
  * properly hide parameters marked with no_log in suboptions when
    invalid parameters are passed to the module (CVE-2019-14858)
  * resolves CVE-2019-10206, by avoiding templating passwords from
    prompt as it is probable they have special characters.
  * Handle improper variable substitution that was happening in
    safe_eval, it was always meant to just do 'type enforcement' and have
    Jinja2 deal with all variable interpolation. Also see CVE-2019-10156

Changelog: 9bdb89f740/changelogs/CHANGELOG-v2.6.rst
2019-12-15 21:25:07 +01:00
Andreas Rammhold
71cde971c7 ansible_2_8: 2.8.4 -> 2.8.7
This addresses the following security issues:

  * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864)
  * CVE-2019-14846 - Several Ansible plugins could disclose aws
    credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
    lookup/aws_account_attribute.py, and lookup/aws_secret.py,
    lookup/aws_ssm.py use the boto3 library from the Ansible process. The
    boto3 library logs credentials at log level DEBUG. If Ansible's
    logging was enabled (by setting LOG_PATH to a value) Ansible would set
    the global log level to DEBUG. This was inherited by boto and would
    then log boto credentials to the file specified by LOG_PATH. This did
    not affect aws ansible modules as those are executed in a separate
    process. This has been fixed by switching to log level INFO
  * Convert CLI provided passwords to text initially, to prevent unsafe
    context being lost when converting from bytes->text during post
    processing of PlayContext. This prevents CLI provided passwords from
    being incorrectly templated (CVE-2019-14856)
  * properly hide parameters marked with no_log in suboptions when
    invalid parameters are passed to the module (CVE-2019-14858)

Changelog: 24220a618a/changelogs/CHANGELOG-v2.8.rst
2019-12-15 21:25:02 +01:00
Andreas Rammhold
64e2791092 ansible_2_7: 2.7.11 -> 2.7.15
This fixes the following security issues:
  * Ansible: Splunk and Sumologic callback plugins leak sensitive data
    in logs (CVE-2019-14864)
  * CVE-2019-14846 - Several Ansible plugins could disclose aws
    credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
    lookup/aws_account_attribute.py, and lookup/aws_secret.py,
    lookup/aws_ssm.py use the boto3 library from the Ansible process. The
    boto3 library logs credentials at log level DEBUG. If Ansible's
    logging was enabled (by setting LOG_PATH to a value) Ansible would set
    the global log level to DEBUG. This was inherited by boto and would
    then log boto credentials to the file specified by LOG_PATH. This did
    not affect aws ansible modules as those are executed in a separate
    process. This has been fixed by switching to log level INFO
  * Convert CLI provided passwords to text initially, to prevent unsafe
    context being lost when converting from bytes->text during post
    processing of PlayContext. This prevents CLI provided passwords from
    being incorrectly templated (CVE-2019-14856)
  * properly hide parameters marked with no_log in suboptions when invalid
    parameters are passed to the module (CVE-2019-14858)
  * resolves CVE-2019-10206, by avoiding templating passwords from
    prompt as it is probable they have special characters.
  * Handle improper variable substitution that was happening in
    safe_eval, it was always meant to just do 'type enforcement' and have
    Jinja2 deal with all variable interpolation. Also see CVE-2019-10156

Changelog: 0623dedf2d/changelogs/CHANGELOG-v2.7.rst (v2-7-15)
2019-12-15 21:24:59 +01:00
Mario Rodas
6b3720b395
Merge pull request #75675 from marsam/update-git-gone
gitAndTools.git-gone: 0.1.2 -> 0.2.0
2019-12-15 15:21:19 -05:00
Mario Rodas
22a8e0eb85
Merge pull request #75398 from r-ryantm/auto-update/tpm2-tools
tpm2-tools: 4.0.1 -> 4.1
2019-12-15 15:20:48 -05:00
Kevin Rauscher
73d577b0fd mopidy-iris: 3.42.2 -> 3.43.0 2019-12-15 21:16:17 +01:00
Nikolay Korotkiy
38294e3051
gpxlab: init at 0.7.0 2019-12-15 22:53:06 +03:00
Andreas Rammhold
5d3607b2da
spamassassin: 3.4.2 -> 3.4.3
Two security issues have been fixed in this release:
  * CVE-2019-12420 for Multipart Denial of Service Vulnerability
  * CVE-2018-11805 for nefarious CF files can be configured to
    run system commands without any output or errors.

https://svn.apache.org/repos/asf/spamassassin/branches/3.4/build/announcements/3.4.3.txt
2019-12-15 20:48:56 +01:00
Graham Christensen
aa4a1b01d5
Merge pull request #75516 from ivan/chromium-79.0.3945.79
chromium: 78.0.3904.108 -> 79.0.3945.79
2019-12-15 14:48:34 -05:00
Mario Rodas
eb2d272efd
Merge pull request #75671 from clayrat/tparsec-update
idrisPackages.tparsec: 2019-06-18 -> 2019-09-19
2019-12-15 14:43:44 -05:00
Andreas Rammhold
e1699e3c71
thunderbird-bin: 68.2.2 -> 68.3.0 2019-12-15 20:37:50 +01:00
gnidorah
c527e31c99 cdesktopenv: init at 2019-11-30 2019-12-15 22:28:31 +03:00
Andreas Rammhold
cd394340d8
dovecot: 2.3.8 -> 2.3.9.2
Update to latest version & updated the patch file to match with the
lastest verison.

Fixes the following security issue:
  * CVE-2019-19722: Mails with group addresses in From or To fields
    caused crash in push notification drivers.
2019-12-15 20:11:01 +01:00
Christian Kampka
229a0afb28
nixosTests.paperless: Port tests to python 2019-12-15 20:10:57 +01:00
Christian Kampka
d76ab647e6
nixosTests.pdns-recursor: Port tests not python 2019-12-15 20:08:02 +01:00
Christian Kampka
d58814ac5a
nixosTests.peerflix: Port tests to python 2019-12-15 20:08:01 +01:00
Christian Kampka
a20683acbe
nixosTests.pgmanage: Port tests to python 2019-12-15 20:08:00 +01:00
Christian Kampka
1bf1ec35bc
nixosTests.php-pcre: Port tests to python 2019-12-15 20:07:59 +01:00
Christian Kampka
d029e28b78
nixosTests.postgis: Port tests to python 2019-12-15 20:07:58 +01:00
Christian Kampka
e96802ccb2
nixosTests.quagga: Port tests to python 2019-12-15 20:07:52 +01:00
Christian Kampka
c811e76d82
nixosTests.mutable-users: Port tests to python 2019-12-15 19:53:17 +01:00
Christian Kampka
58cd46ba21
nixosTests.mxisd: Port tests to python 2019-12-15 19:46:53 +01:00
Christian Kampka
8c683b3b13
nixosTests.nesting: Port tests to python 2019-12-15 19:42:21 +01:00
Christian Kampka
e51673bb77
nixosTests.nghttpx: Port tests to python 2019-12-15 19:36:44 +01:00
Christian Kampka
1f3f9fd3a2
nixosTests.novacomd: Port tests to python 2019-12-15 19:35:33 +01:00
Christian Kampka
065770607e
nixosTests.nzbget: Port tests to python 2019-12-15 19:29:17 +01:00
Christian Kampka
57e8bd9ebe
nixosTest.orangefs: Port tests to python 2019-12-15 19:26:06 +01:00
Christian Kampka
862a7393f3
nixosTests.osrm-backend: Port tests to python 2019-12-15 19:19:11 +01:00
Christian Kampka
5ae92144ba
nixosTests.overlayfs: Port tests to python 2019-12-15 19:13:56 +01:00
Robert Scott
e1e3df423a allowInsecureDefaultPredicate: fix to use getName
this allows correct operation with packages only having pname and version
specified, resolving issue #73737
2019-12-15 18:01:19 +00:00
Frederik Rietdijk
49b3d9ae62 Merge staging into staging-next 2019-12-15 18:49:26 +01:00
Frederik Rietdijk
47efb03cd3 Merge master into staging-next 2019-12-15 18:49:15 +01:00
Will Dietz
3e046ee556 gst_all_1.gstreamer: 1.16.1 -> 1.16.2 2019-12-15 18:49:13 +01:00
Will Dietz
0de5452c84 gst_all_1.gst-vaapi: 1.16.1 -> 1.16.2 2019-12-15 18:49:13 +01:00
Will Dietz
94dd6d0789 gst_all_1.gst-plugins-ugly: 1.16.1 -> 1.16.2 2019-12-15 18:49:13 +01:00
Will Dietz
d12f31a0da gst_all_1.gst-plugins-base: 1.16.1 -> 1.16.2 2019-12-15 18:49:13 +01:00
Will Dietz
800ba7974e gst_all_1.gst-libav: 1.16.1 -> 1.16.2 2019-12-15 18:49:13 +01:00
Will Dietz
a4f6196485 gst_all_1.gst-validate: 1.16.1 -> 1.16.2 2019-12-15 18:49:13 +01:00
Will Dietz
8040ac8b79 gst_all_1.gst-rtsp-server: 1.16.1 -> 1.16.2 2019-12-15 18:49:13 +01:00
Will Dietz
560c4c9fdb gst_all_1.gst-plugins-good: 1.16.1 -> 1.16.2 2019-12-15 18:49:13 +01:00
Will Dietz
6c1f9493ed gst_all_1.gst-plugins-bad: 1.16.1 -> 1.16.2 2019-12-15 18:49:13 +01:00
Will Dietz
04f53c483e gst_all_1.gst-editing-services: 1.16.1 -> 1.16.2 2019-12-15 18:49:13 +01:00
Robert Scott
183ef82f98 libreswan: 3.18 -> 3.29 (security)
addressing CVE-2019-12312 & CVE-2019-10155
2019-12-15 18:48:53 +01:00
Robert Scott
d17ecebcf0 unbound: install headers etc for libevent support as postInstall step 2019-12-15 18:48:53 +01:00
Will Dietz
d67f29261d nghttp2: 1.39.2 -> 1.40.0 2019-12-15 18:45:29 +01:00
R. RyanTM
ef135db301 libuv: 1.33.1 -> 1.34.0 2019-12-15 18:45:16 +01:00
cap
2978ca2180 aircrack-ng: fixed missing dependency for airmon-ng 2019-12-15 18:38:43 +01:00
Christian Kampka
bcf6aa5519
nixosTests.sonarr: Port tests to python 2019-12-15 18:24:45 +01:00