Skip to content
This repository has been archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
base: 915d2c3e69ca
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
compare: 4786f8e5b73f
Choose a head ref
  • 7 commits
  • 4 files changed
  • 4 contributors

Commits on Apr 24, 2020

  1. skypeforlinux: 8.56.0.103 -> 8.58.0.93

    Cherry-picked 36c7dc2
    Original commit merged in PR NixOS/nixpkgs#83355
    bachp authored and emmanuelrosa committed Apr 24, 2020
    Copy the full SHA
    08630e5 View commit details
    Browse the repository at this point in the history

Commits on Apr 25, 2020

  1. linux_5_5: throw a meaningful error instead of just removing the attr…

    …ibute
    
    I was using a 5.5 kernel on NixOS 20.03 and got an "attribute not found"
    error yesterday when trying to update my system.
    
    In order to understand why, I had to look up what happened in the `git
    log` which is IMHO not a good experience for e.g. a beginner.
    Ma27 committed Apr 25, 2020
    Copy the full SHA
    b938618 View commit details
    Browse the repository at this point in the history
  2. hostapd: apply patch for CVE-2019-16275

    AP mode PMF disconnection protection bypass
    
    Published: September 11, 2019
    Identifiers:
    - CVE-2019-16275
    Latest version available from: https://w1.fi/security/2019-7/
    
    Vulnerability
    
    hostapd (and wpa_supplicant when controlling AP mode) did not perform
    sufficient source address validation for some received Management frames
    and this could result in ending up sending a frame that caused
    associated stations to incorrectly believe they were disconnected from
    the network even if management frame protection (also known as PMF) was
    negotiated for the association. This could be considered to be a denial
    of service vulnerability since PMF is supposed to protect from this type
    of issues. It should be noted that if PMF is not enabled, there would be
    no protocol level protection against this type of denial service
    attacks.
    
    An attacker in radio range of the access point could inject a specially
    constructed unauthenticated IEEE 802.11 frame to the access point to
    cause associated stations to be disconnected and require a reconnection
    to the network.
    
    Vulnerable versions/configurations
    
    All hostapd and wpa_supplicants versions with PMF support
    (CONFIG_IEEE80211W=y) and a runtime configuration enabled AP mode with
    PMF being enabled (optional or required). In addition, this would be
    applicable only when using user space based MLME/SME in AP mode, i.e.,
    when hostapd (or wpa_supplicant when controlling AP mode) would process
    authentication and association management frames. This condition would
    be applicable mainly with drivers that use mac80211.
    
    Possible mitigation steps
    
    - Merge the following commit to wpa_supplicant/hostapd and rebuild:
    
      AP: Silently ignore management frame from unexpected source address
    
      This patch is available from https://w1.fi/security/2019-7/
    
    - Update to wpa_supplicant/hostapd v2.10 or newer, once available
    
    (cherry picked from commit 3e9f3a3)
    mweinelt committed Apr 25, 2020
    Copy the full SHA
    356c899 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #85990 from Ma27/linux-5.5-eval-error

    [20.03] linux_5_5: throw a meaningful error instead of just removing the attribute
    worldofpeace committed Apr 25, 2020
    Copy the full SHA
    1cdb903 View commit details
    Browse the repository at this point in the history
  4. Copy the full SHA
    5450e23 View commit details
    Browse the repository at this point in the history
  5. epson-escpr2: 1.1.1 -> 1.1.11

    (cherry picked from commit f5f85d1)
    Ma27 committed Apr 25, 2020
    Copy the full SHA
    9aa5f83 View commit details
    Browse the repository at this point in the history
  6. Merge pull request #85854 from emmanuelrosa/skype-dep-8.56

    skypeforlinux: 8.55.0.141 -> 8.56.0.103
    worldofpeace committed Apr 25, 2020
    Copy the full SHA
    4786f8e View commit details
    Browse the repository at this point in the history