-
-
Notifications
You must be signed in to change notification settings - Fork 104
Comparing changes
Open a pull request
base repository: NixOS/nixpkgs-channels
base: fbe321e66693
head repository: NixOS/nixpkgs-channels
compare: cfc23a2904c4
- 16 commits
- 12 files changed
- 6 contributors
Commits on Dec 15, 2019
-
Update to latest version & updated the patch file to match with the lastest verison. Fixes the following security issue: * CVE-2019-19722: Mails with group addresses in From or To fields caused crash in push notification drivers. (cherry picked from commit cd39434)
Configuration menu - View commit details
-
Copy full SHA for 6d237b7 - Browse repository at this point
Copy the full SHA 6d237b7View commit details -
Configuration menu - View commit details
-
Copy full SHA for 943560f - Browse repository at this point
Copy the full SHA 943560fView commit details -
This fixes the following security issues: * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864) * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/0623dedf2d9c4afc09e5be30d3ef249f9d1ebece/changelogs/CHANGELOG-v2.7.rst#v2-7-15 (cherry picked from commit 64e2791)
Configuration menu - View commit details
-
Copy full SHA for 706c10b - Browse repository at this point
Copy the full SHA 706c10bView commit details -
This addresses the following security issues: * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864) * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) Changelog: https://github.com/ansible/ansible/blob/24220a618a6d5cd3b5c99f8c7f7771661ed08d33/changelogs/CHANGELOG-v2.8.rst (cherry picked from commit 71cde97)
Configuration menu - View commit details
-
Copy full SHA for b1ee58b - Browse repository at this point
Copy the full SHA b1ee58bView commit details -
This addresses the following security issues: * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/9bdb89f740a87bcf760424577ce18a8f68d7a741/changelogs/CHANGELOG-v2.6.rst (cherry picked from commit b21b929)
Configuration menu - View commit details
-
Copy full SHA for 6d01dd8 - Browse repository at this point
Copy the full SHA 6d01dd8View commit details -
wire-desktop: fix desktop icon
Update the Name attribute in the wire-desktop.desktop applications file and add StartupWMClass key. This fixes the icons on plasma5 and gnome3 which, in certain places, showed a generic X.org icon instead of the Wire icon. (cherry picked from commit 4a73fbc)
Configuration menu - View commit details
-
Copy full SHA for 9436766 - Browse repository at this point
Copy the full SHA 9436766View commit details -
Merge pull request #75707 from andir/19.09/dovecot
[19.09] dovecot: 2.3.8 -> 2.3.9.2
Configuration menu - View commit details
-
Copy full SHA for a1a0702 - Browse repository at this point
Copy the full SHA a1a0702View commit details -
Configuration menu - View commit details
-
Copy full SHA for 8fe113b - Browse repository at this point
Copy the full SHA 8fe113bView commit details -
Merge pull request #75709 from andir/19.09/thunderbird-bin
[19.09] thunderbird-bin: 68.2.2 -> 68.3.0
Configuration menu - View commit details
-
Copy full SHA for 168ab93 - Browse repository at this point
Copy the full SHA 168ab93View commit details -
Merge pull request #75716 from andir/19.09/ansible
[19.09] ansible fixes for CVE-2019-10156 CVE-2019-10206 CVE-2019-14846 CVE-2019-14856 CVE-2019-14858 CVE-2019-14864
Configuration menu - View commit details
-
Copy full SHA for dfceeb0 - Browse repository at this point
Copy the full SHA dfceeb0View commit details -
Merge pull request #75724 from andir/19.09/advancecomp
[19.09] advancecomp: fix CVE-2019-9210
Configuration menu - View commit details
-
Copy full SHA for cdd5a99 - Browse repository at this point
Copy the full SHA cdd5a99View commit details -
tor-browser-bundle-bin: 9.0.1 -> 9.0.2
(cherry picked from commit fca98ea)
Configuration menu - View commit details
-
Copy full SHA for 337e008 - Browse repository at this point
Copy the full SHA 337e008View commit details -
Merge pull request #75685 from scaredmushroom/tor-browser-bundle-bin_…
…release-19.09 backport: tor-browser-bundle-bin: 9.0.1 -> 9.0.2
Configuration menu - View commit details
-
Copy full SHA for 931a430 - Browse repository at this point
Copy the full SHA 931a430View commit details -
aircrack-ng: fixed missing dependency for airmon-ng
(cherry picked from commit 2978ca2)
Configuration menu - View commit details
-
Copy full SHA for 6d44cb6 - Browse repository at this point
Copy the full SHA 6d44cb6View commit details -
Merge pull request #75699 from scaredmushroom/aircrack-ng_release-19.09
backport: aircrack-ng: fixed missing dependency for airmon-ng
Configuration menu - View commit details
-
Copy full SHA for c5f385d - Browse repository at this point
Copy the full SHA c5f385dView commit details
Commits on Dec 16, 2019
-
thepeg: 2.1.5 -> 2.1.6 (cherry picked from commit 2f79be4)
Configuration menu - View commit details
-
Copy full SHA for cfc23a2 - Browse repository at this point
Copy the full SHA cfc23a2View commit details
There are no files selected for viewing
Large diffs are not rendered by default.
This file was deleted.