Commit graph

18969 commits

Author SHA1 Message Date
Karn Kallio
815764096b Fix akonadi build.
Patch applied by James Cook <james.cook@utoronto.ca>.
2017-06-29 04:51:20 +00:00
Tim Steinbach
4cc729644e Merge pull request #26867 from michalpalka/xen-security-2017.06-new
xen: patch for XSAs: 216, 217, 218, 219, 220, 221, 222, and 224
2017-06-28 22:43:46 -04:00
Tim Steinbach
db17c508ef Merge pull request #26915 from diegs/terraform
terraform: 0.9.6 -> 0.9.9.
2017-06-28 22:39:18 -04:00
Tim Steinbach
fb8a66dcc9 Merge pull request #26945 from NeQuissimus/virtualbox_32bit
virtualbox: Add ability to disable 32-bit guest support
2017-06-28 22:32:12 -04:00
Tim Steinbach
312c2f7961
virtualbox: Add ability to disable 32-bit guest support 2017-06-28 22:24:19 -04:00
John Ericson
e1faeb574a Merge pull request #26884 from obsidiansystems/purge-stdenv-cross
Purge stdenv cross
2017-06-28 21:39:16 -04:00
Jörg Thalheim
7642a76c1a Merge pull request #26926 from dotlambda/master
dmensamenu: init at 1.0.0
2017-06-29 00:29:18 +01:00
John Ericson
aac32fe2d1 vim: cc-wrapper can be relied on to export this env var 2017-06-28 18:31:37 -04:00
John Ericson
9c163cebdd omxplayer: Don't use stdenv.cross 2017-06-28 18:21:05 -04:00
John Ericson
ffa535a0cc fossil: Don't use stdenv.cross 2017-06-28 18:21:05 -04:00
John Ericson
ca94de8c4c offrss: cc-wrapper can be relied on to export this env var 2017-06-28 18:21:05 -04:00
John Ericson
c4443d70df fbida: cc-wrapper can be relied on to export these env vars 2017-06-28 18:21:05 -04:00
John Ericson
a11426c523 ImageMagick: Don't use stdenv.cross
I'm guessing the salient aspect here is not cross compiling itself, but
just whether the host platform is MinGW, so I simplified the logic
accordingly
2017-06-28 18:20:38 -04:00
Will Dietz
a97c803b4b mendeley: ignore errors attempting to install link handler on startup
It's not critical functionality and AFAICT only fails in environments
that wouldn't benefit from "successfully" installing it anyway.

Fixes #24709
Fixes #24821
2017-06-28 17:05:11 -05:00
Robert Helgesson
fa6e946383
eclipse-plugin-jdt: 4.6.2 -> 4.7 2017-06-28 20:56:48 +02:00
Robert Helgesson
556a867186
eclipse-sdk: 4.6.2 -> 4.7 2017-06-28 20:56:48 +02:00
Robert Helgesson
0a52cc1851
eclipse-platform: 4.6.2 -> 4.7 2017-06-28 20:56:43 +02:00
Daniel Peebles
09194cafa8 Merge pull request #26937 from joachifm/lkl-4_11
lkl: 2017-03-24 -> 2017-06-27
2017-06-28 14:35:36 -04:00
Joachim Fasting
0bc3429e77
lkl: 2017-03-24 -> 2017-06-27
Now based on Linux 4.11
2017-06-28 20:14:00 +02:00
Joachim F
c7278cfc0b Merge pull request #26887 from taku0/thunderbird-bin-52.2.1
Thunderbird bin 52.2.1
2017-06-28 19:06:38 +01:00
Tim Steinbach
add90948bc
docker: 17.03.1-ce -> 17.03.2-ce 2017-06-28 12:49:59 -04:00
Shea Levy
24c59a4452 neuron: enable GUI 2017-06-28 11:59:54 -04:00
Thomas Tuegel
59f94b12f3
dropbox: 28.4.14 -> 29.4.20 2017-06-28 08:38:38 -05:00
Frederik Rietdijk
8a62a9b064 Merge pull request #26125 from volth/webkitgtk-naming
rename webkitgtk24x⇒webkitgtk24x-gtk3; webkitgtk2⇒webkitgtk24x-gtk2
2017-06-28 13:54:38 +02:00
Robert Schütz
1a7745d6ec dmensamenu: init at 1.0.0 2017-06-28 11:43:39 +02:00
Jörg Thalheim
ce88027294 jetbrains.gogland: 171.4694.35 -> 171.4694.61 2017-06-28 08:31:08 +01:00
Jörg Thalheim
f849eb2018 jetbrains.datagrip: 2017.1.4 -> 2017.1.5 2017-06-28 08:30:59 +01:00
Charles Strahan
8e73afb2e1 zoom-us: don't add mesa to the LD_LIBRARY_PATH
zoom-us was failing to launch under the proprietary nvidia drivers,
as described in the comments of #26596.

Closes #26916
2017-06-27 18:43:20 -04:00
Diego Pontoriero
5b90fa0151
terraform: 0.9.6 -> 0.9.9. 2017-06-27 15:04:11 -07:00
Karn Kallio
07dc20e436 kcachegrind : Fix build by adding missing dependencies. 2017-06-27 22:33:06 +02:00
Shea Levy
4d2597981d Partially revert "terraform: 0.9.4 -> 0.9.6."
Terraform point releases are significant changes, we need to keep old ones around

This reverts commit 6a27b46dee.
2017-06-27 16:26:07 -04:00
Karn Kallio
c710ddf7cd okteta : Fix build by adding missing dependencies. 2017-06-27 22:10:00 +02:00
Joachim F
2c30e5e754 Merge pull request #25441 from Hodapp87/draftsight
draftsight: init at 2017-SP1
2017-06-27 21:04:30 +01:00
Joachim F
bccd3feed2 Merge pull request #26450 from oxij/pkg/fix/tor-browser
firefoxPackages: tor-browser: use gtk2 by default (like tor-browser-bin does)
2017-06-27 20:41:27 +01:00
Joachim F
4e44b63892 Merge pull request #26453 from oxij/pkg/fix/ranger
ranger: add imagePreviewSupport option and make previews work out of the box
2017-06-27 20:40:57 +01:00
Karn Kallio
67e4072282 k3b : Fix build by adding missing dependencies. 2017-06-27 21:14:00 +02:00
Joachim F
c27fc66856 Merge pull request #26904 from Ma27/geogebra/make-language-configurable
geogebra: make `language` configurable
2017-06-27 16:21:00 +01:00
Joachim F
bcbf45ff1f Merge pull request #26886 from jonafato/remove-thunderbird-bin-updater
Remove old thunderbird-bin update script
2017-06-27 16:12:37 +01:00
Tim Steinbach
493ae24872 Merge pull request #26870 from lsix/update_nano
nano: 2.8.4 -> 2.8.5
2017-06-27 08:12:52 -04:00
Tim Steinbach
719b506bad Merge pull request #26803 from NeQuissimus/rkt_1_27_0
rkt: 1.26.0 -> 1.27.0
2017-06-27 08:09:40 -04:00
Maximilian Bosch
9516bbf172
geogebra: make language configurable 2017-06-27 09:51:06 +02:00
Jon Banafato
d8e5c75f75 Remove old thunderbird-bin update script
`thunderbird-bin` appears to now use the
`maintainers/scripts/update.nix` script instead of this ruby script, so
the latter should be removed.
2017-06-26 19:54:24 -04:00
Frederik Rietdijk
9dbfd87ab6 Merge pull request #26849 from vbgl/skrooge-2.8
skrooge: 2.7.0 -> 2.8.1
2017-06-26 22:23:36 +02:00
Frederik Rietdijk
25b12febee Merge pull request #26857 from jerith666/krfb-qtx11extras
krfb: add new qtx11extras dependency
2017-06-26 22:16:28 +02:00
Vincent Laporte
ac83ef3994 glsurf: 3.3 -> 3.3.1 2017-06-26 19:24:33 +02:00
Lancelot SIX
1b792b4edf
nano: 2.8.4 -> 2.8.5
See http://lists.gnu.org/archive/html/info-gnu/2017-06/msg00012.html
for release information.
2017-06-26 11:01:55 +02:00
Nicolas Truessel
813feae594 chromium: 59.0.3071.86 -> 59.0.3071.109 2017-06-26 09:24:56 +02:00
Emmanuel Rosa
994998e475 thunderbird: 52.2.0 -> 52.2.1 2017-06-26 09:01:45 +02:00
Michał Pałka
80e0cda7ff xen: patch for XSAs: 216, 217, 218, 219, 220, 221, 222, and 224
XSA-216 Issue Description:

> The block interface response structure has some discontiguous fields.
> Certain backends populate the structure fields of an otherwise
> uninitialized instance of this structure on their stacks, leaking
> data through the (internal or trailing) padding field.

More: https://xenbits.xen.org/xsa/advisory-216.html

XSA-217 Issue Description:

> Domains controlling other domains are permitted to map pages owned by
> the domain being controlled.  If the controlling domain unmaps such a
> page without flushing the TLB, and if soon after the domain being
> controlled transfers this page to another PV domain (via
> GNTTABOP_transfer or, indirectly, XENMEM_exchange), and that third
> domain uses the page as a page table, the controlling domain will have
> write access to a live page table until the applicable TLB entry is
> flushed or evicted.  Note that the domain being controlled is
> necessarily HVM, while the controlling domain is PV.

More: https://xenbits.xen.org/xsa/advisory-217.html

XSA-218 Issue Description:

> We have discovered two bugs in the code unmapping grant references.
>
> * When a grant had been mapped twice by a backend domain, and then
> unmapped by two concurrent unmap calls, the frontend may be informed
> that the page had no further mappings when the first call completed rather
> than when the second call completed.
>
> * A race triggerable by an unprivileged guest could cause a grant
> maptrack entry for grants to be "freed" twice.  The ultimate effect of
> this would be for maptrack entries for a single domain to be re-used.

More: https://xenbits.xen.org/xsa/advisory-218.html

XSA-219 Issue Description:

> When using shadow paging, writes to guest pagetables must be trapped and
> emulated, so the shadows can be suitably adjusted as well.
>
> When emulating the write, Xen maps the guests pagetable(s) to make the final
> adjustment and leave the guest's view of its state consistent.
>
> However, when mapping the frame, Xen drops the page reference before
> performing the write.  This is a race window where the underlying frame can
> change ownership.
>
> One possible attack scenario is for the frame to change ownership and to be
> inserted into a PV guest's pagetables.  At that point, the emulated write will
> be an unaudited modification to the PV pagetables whose value is under guest
> control.

More: https://xenbits.xen.org/xsa/advisory-219.html

XSA-220 Issue Description:

> Memory Protection Extensions (MPX) and Protection Key (PKU) are features in
> newer processors, whose state is intended to be per-thread and context
> switched along with all other XSAVE state.
>
> Xen's vCPU context switch code would save and restore the state only
> if the guest had set the relevant XSTATE enable bits.  However,
> surprisingly, the use of these features is not dependent (PKU) or may
> not be dependent (MPX) on having the relevant XSTATE bits enabled.
>
> VMs which use MPX or PKU, and context switch the state manually rather
> than via XSAVE, will have the state leak between vCPUs (possibly,
> between vCPUs in different guests).  This in turn corrupts state in
> the destination vCPU, and hence may lead to weakened protections
>
> Experimentally, MPX appears not to make any interaction with BND*
> state if BNDCFGS.EN is set but XCR0.BND{CSR,REGS} are clear.  However,
> the SDM is not clear in this case; therefore MPX is included in this
> advisory as a precaution.

More: https://xenbits.xen.org/xsa/advisory-220.html

XSA-221 Issue Description:

> When polling event channels, in general arbitrary port numbers can be
> specified.  Specifically, there is no requirement that a polled event
> channel ports has ever been created.  When the code was generalised
> from an earlier implementation, introducing some intermediate
> pointers, a check should have been made that these intermediate
> pointers are non-NULL.  However, that check was omitted.

More: https://xenbits.xen.org/xsa/advisory-221.html

XSA-222 Issue Description:

> Certain actions require removing pages from a guest's P2M
> (Physical-to-Machine) mapping.  When large pages are in use to map
> guest pages in the 2nd-stage page tables, such a removal operation may
> incur a memory allocation (to replace a large mapping with individual
> smaller ones).  If this allocation fails, these errors are ignored by
> the callers, which would then continue and (for example) free the
> referenced page for reuse.  This leaves the guest with a mapping to a
> page it shouldn't have access to.
>
> The allocation involved comes from a separate pool of memory created
> when the domain is created; under normal operating conditions it never
> fails, but a malicious guest may be able to engineer situations where
> this pool is exhausted.

More: https://xenbits.xen.org/xsa/advisory-222.html

XSA-224 Issue Description:

> We have discovered a number of bugs in the code mapping and unmapping
> grant references.
>
> * If a grant is mapped with both the GNTMAP_device_map and
> GNTMAP_host_map flags, but unmapped only with host_map, the device_map
> portion remains but the page reference counts are lowered as though it
> had been removed. This bug can be leveraged cause a page's reference
> counts and type counts to fall to zero while retaining writeable
> mappings to the page.
>
> * Under some specific conditions, if a grant is mapped with both the
> GNTMAP_device_map and GNTMAP_host_map flags, the operation may not
> grab sufficient type counts.  When the grant is then unmapped, the
> type count will be erroneously reduced.  This bug can be leveraged
> cause a page's reference counts and type counts to fall to zero while
> retaining writeable mappings to the page.
>
> * When a grant reference is given to an MMIO region (as opposed to a
> normal guest page), if the grant is mapped with only the
> GNTMAP_device_map flag set, a mapping is created at host_addr anyway.
> This does *not* cause reference counts to change, but there will be no
> record of this mapping, so it will not be considered when reporting
> whether the grant is still in use.

More: https://xenbits.xen.org/xsa/advisory-224.html
2017-06-26 07:01:24 +00:00
Jörg Thalheim
7df83abe85 keepassx-community: 2.1.4 -> 2.2.0 2017-06-26 07:31:44 +01:00