This repository was archived by the owner on Apr 12, 2021. It is now read-only.
-
-
Notifications
You must be signed in to change notification settings - Fork 104
Permalink
Choose a base ref
{{ refName }}
default
Choose a head ref
{{ refName }}
default
Comparing changes
Choose two branches to see what’s changed or to start a new pull request.
If you need to, you can also or
learn more about diff comparisons.
Open a pull request
Create a new pull request by comparing changes across two branches. If you need to, you can also .
Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: a1a07025899a
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: c5f385d7eef1
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
- 12 commits
- 6 files changed
- 4 contributors
Commits on Dec 15, 2019
-
Configuration menu - View commit details
-
Copy full SHA for 943560f - Browse repository at this point
Copy the full SHA 943560fView commit details -
This fixes the following security issues: * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864) * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/0623dedf2d9c4afc09e5be30d3ef249f9d1ebece/changelogs/CHANGELOG-v2.7.rst#v2-7-15 (cherry picked from commit 64e2791)
Configuration menu - View commit details
-
Copy full SHA for 706c10b - Browse repository at this point
Copy the full SHA 706c10bView commit details -
This addresses the following security issues: * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864) * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) Changelog: https://github.com/ansible/ansible/blob/24220a618a6d5cd3b5c99f8c7f7771661ed08d33/changelogs/CHANGELOG-v2.8.rst (cherry picked from commit 71cde97)
Configuration menu - View commit details
-
Copy full SHA for b1ee58b - Browse repository at this point
Copy the full SHA b1ee58bView commit details -
This addresses the following security issues: * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/9bdb89f740a87bcf760424577ce18a8f68d7a741/changelogs/CHANGELOG-v2.6.rst (cherry picked from commit b21b929)
Configuration menu - View commit details
-
Copy full SHA for 6d01dd8 - Browse repository at this point
Copy the full SHA 6d01dd8View commit details -
Configuration menu - View commit details
-
Copy full SHA for 8fe113b - Browse repository at this point
Copy the full SHA 8fe113bView commit details -
Merge pull request #75709 from andir/19.09/thunderbird-bin
[19.09] thunderbird-bin: 68.2.2 -> 68.3.0
Configuration menu - View commit details
-
Copy full SHA for 168ab93 - Browse repository at this point
Copy the full SHA 168ab93View commit details -
Merge pull request #75716 from andir/19.09/ansible
[19.09] ansible fixes for CVE-2019-10156 CVE-2019-10206 CVE-2019-14846 CVE-2019-14856 CVE-2019-14858 CVE-2019-14864
Configuration menu - View commit details
-
Copy full SHA for dfceeb0 - Browse repository at this point
Copy the full SHA dfceeb0View commit details -
Merge pull request #75724 from andir/19.09/advancecomp
[19.09] advancecomp: fix CVE-2019-9210
Configuration menu - View commit details
-
Copy full SHA for cdd5a99 - Browse repository at this point
Copy the full SHA cdd5a99View commit details -
tor-browser-bundle-bin: 9.0.1 -> 9.0.2
(cherry picked from commit fca98ea)
Configuration menu - View commit details
-
Copy full SHA for 337e008 - Browse repository at this point
Copy the full SHA 337e008View commit details -
Merge pull request #75685 from scaredmushroom/tor-browser-bundle-bin_…
…release-19.09 backport: tor-browser-bundle-bin: 9.0.1 -> 9.0.2
Configuration menu - View commit details
-
Copy full SHA for 931a430 - Browse repository at this point
Copy the full SHA 931a430View commit details -
aircrack-ng: fixed missing dependency for airmon-ng
(cherry picked from commit 2978ca2)
Configuration menu - View commit details
-
Copy full SHA for 6d44cb6 - Browse repository at this point
Copy the full SHA 6d44cb6View commit details -
Merge pull request #75699 from scaredmushroom/aircrack-ng_release-19.09
backport: aircrack-ng: fixed missing dependency for airmon-ng
Configuration menu - View commit details
-
Copy full SHA for c5f385d - Browse repository at this point
Copy the full SHA c5f385dView commit details
There are no files selected for viewing