Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: a1a07025899a
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: c5f385d7eef1
Choose a head ref
  • 12 commits
  • 6 files changed
  • 4 contributors

Commits on Dec 15, 2019

  1. thunderbird-bin: 68.2.2 -> 68.3.0

    (cherry picked from commit e1699e3)
    andir committed Dec 15, 2019
    Copy the full SHA
    943560f View commit details
  2. ansible_2_7: 2.7.11 -> 2.7.15

    This fixes the following security issues:
      * Ansible: Splunk and Sumologic callback plugins leak sensitive data
        in logs (CVE-2019-14864)
      * CVE-2019-14846 - Several Ansible plugins could disclose aws
        credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
        lookup/aws_account_attribute.py, and lookup/aws_secret.py,
        lookup/aws_ssm.py use the boto3 library from the Ansible process. The
        boto3 library logs credentials at log level DEBUG. If Ansible's
        logging was enabled (by setting LOG_PATH to a value) Ansible would set
        the global log level to DEBUG. This was inherited by boto and would
        then log boto credentials to the file specified by LOG_PATH. This did
        not affect aws ansible modules as those are executed in a separate
        process. This has been fixed by switching to log level INFO
      * Convert CLI provided passwords to text initially, to prevent unsafe
        context being lost when converting from bytes->text during post
        processing of PlayContext. This prevents CLI provided passwords from
        being incorrectly templated (CVE-2019-14856)
      * properly hide parameters marked with no_log in suboptions when invalid
        parameters are passed to the module (CVE-2019-14858)
      * resolves CVE-2019-10206, by avoiding templating passwords from
        prompt as it is probable they have special characters.
      * Handle improper variable substitution that was happening in
        safe_eval, it was always meant to just do 'type enforcement' and have
        Jinja2 deal with all variable interpolation. Also see CVE-2019-10156
    
    Changelog: https://github.com/ansible/ansible/blob/0623dedf2d9c4afc09e5be30d3ef249f9d1ebece/changelogs/CHANGELOG-v2.7.rst#v2-7-15
    (cherry picked from commit 64e2791)
    andir committed Dec 15, 2019
    Copy the full SHA
    706c10b View commit details
  3. ansible_2_8: 2.8.4 -> 2.8.7

    This addresses the following security issues:
    
      * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864)
      * CVE-2019-14846 - Several Ansible plugins could disclose aws
        credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
        lookup/aws_account_attribute.py, and lookup/aws_secret.py,
        lookup/aws_ssm.py use the boto3 library from the Ansible process. The
        boto3 library logs credentials at log level DEBUG. If Ansible's
        logging was enabled (by setting LOG_PATH to a value) Ansible would set
        the global log level to DEBUG. This was inherited by boto and would
        then log boto credentials to the file specified by LOG_PATH. This did
        not affect aws ansible modules as those are executed in a separate
        process. This has been fixed by switching to log level INFO
      * Convert CLI provided passwords to text initially, to prevent unsafe
        context being lost when converting from bytes->text during post
        processing of PlayContext. This prevents CLI provided passwords from
        being incorrectly templated (CVE-2019-14856)
      * properly hide parameters marked with no_log in suboptions when
        invalid parameters are passed to the module (CVE-2019-14858)
    
    Changelog: https://github.com/ansible/ansible/blob/24220a618a6d5cd3b5c99f8c7f7771661ed08d33/changelogs/CHANGELOG-v2.8.rst
    (cherry picked from commit 71cde97)
    andir committed Dec 15, 2019
    Copy the full SHA
    b1ee58b View commit details
  4. ansible_2_6: 2.6.17 -> 2.6.20

    This addresses the following security issues:
    
      * CVE-2019-14846 - Several Ansible plugins could disclose aws
        credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
        lookup/aws_account_attribute.py, and lookup/aws_secret.py,
        lookup/aws_ssm.py use the boto3 library from the Ansible process. The
        boto3 library logs credentials at log level DEBUG. If Ansible's
        logging was enabled (by setting LOG_PATH to a value) Ansible would set
        the global log level to DEBUG. This was inherited by boto and would
        then log boto credentials to the file specified by LOG_PATH. This did
        not affect aws ansible modules as those are executed in a separate
        process. This has been fixed by switching to log level INFO
      * Convert CLI provided passwords to text initially, to prevent unsafe
        context being lost when converting from bytes->text during post
        processing of PlayContext. This prevents CLI provided passwords from
        being incorrectly templated (CVE-2019-14856)
      * properly hide parameters marked with no_log in suboptions when
        invalid parameters are passed to the module (CVE-2019-14858)
      * resolves CVE-2019-10206, by avoiding templating passwords from
        prompt as it is probable they have special characters.
      * Handle improper variable substitution that was happening in
        safe_eval, it was always meant to just do 'type enforcement' and have
        Jinja2 deal with all variable interpolation. Also see CVE-2019-10156
    
    Changelog: https://github.com/ansible/ansible/blob/9bdb89f740a87bcf760424577ce18a8f68d7a741/changelogs/CHANGELOG-v2.6.rst
    (cherry picked from commit b21b929)
    andir committed Dec 15, 2019
    Copy the full SHA
    6d01dd8 View commit details
  5. advancecomp: fix CVE-2019-9210

    (cherry picked from commit f23627c)
    andir committed Dec 15, 2019
    Copy the full SHA
    8fe113b View commit details
  6. Merge pull request #75709 from andir/19.09/thunderbird-bin

    [19.09] thunderbird-bin: 68.2.2 -> 68.3.0
    fpletz authored Dec 15, 2019
    Copy the full SHA
    168ab93 View commit details
  7. Copy the full SHA
    dfceeb0 View commit details
  8. Merge pull request #75724 from andir/19.09/advancecomp

    [19.09] advancecomp: fix CVE-2019-9210
    7c6f434c authored Dec 15, 2019
    Copy the full SHA
    cdd5a99 View commit details
  9. tor-browser-bundle-bin: 9.0.1 -> 9.0.2

    (cherry picked from commit fca98ea)
    cap authored and fpletz committed Dec 15, 2019
    Copy the full SHA
    337e008 View commit details
  10. Merge pull request #75685 from scaredmushroom/tor-browser-bundle-bin_…

    …release-19.09
    
    backport: tor-browser-bundle-bin: 9.0.1 -> 9.0.2
    fpletz authored Dec 15, 2019
    Copy the full SHA
    931a430 View commit details
  11. aircrack-ng: fixed missing dependency for airmon-ng

    (cherry picked from commit 2978ca2)
    cap authored and fpletz committed Dec 15, 2019
    Copy the full SHA
    6d44cb6 View commit details
  12. Merge pull request #75699 from scaredmushroom/aircrack-ng_release-19.09

    backport: aircrack-ng: fixed missing dependency for airmon-ng
    fpletz authored Dec 15, 2019
    Copy the full SHA
    c5f385d View commit details
Original file line number Diff line number Diff line change
@@ -89,19 +89,19 @@ let
fteLibPath = makeLibraryPath [ stdenv.cc.cc gmp ];

# Upstream source
version = "9.0.1";
version = "9.0.2";

lang = "en-US";

srcs = {
x86_64-linux = fetchurl {
url = "https://dist.torproject.org/torbrowser/${version}/tor-browser-linux64-${version}_${lang}.tar.xz";
sha256 = "09iasj13wn3d1dygpxn4www4rx8wnxxlm9h6df9lzf4wll15px55";
sha256 = "1xdnqphsj7wzwyv927jwd3fi36srx0minydwl5jg5yyd3m3if9hb";
};

i686-linux = fetchurl {
url = "https://dist.torproject.org/torbrowser/${version}/tor-browser-linux32-${version}_${lang}.tar.xz";
sha256 = "1vz3pvqi114c9lkyhqy754ngi90708c187xwiyr9786ff89sjw5i";
sha256 = "1qk9fg5dvyyvbngsqla00by8a974mpvq9pnm2djif54lr2nfivwf";
};
};
in
Loading