Commit Graph

29894 Commits

Author SHA1 Message Date
Michał Pałka
80e0cda7ff xen: patch for XSAs: 216, 217, 218, 219, 220, 221, 222, and 224
XSA-216 Issue Description:

> The block interface response structure has some discontiguous fields.
> Certain backends populate the structure fields of an otherwise
> uninitialized instance of this structure on their stacks, leaking
> data through the (internal or trailing) padding field.

More: https://xenbits.xen.org/xsa/advisory-216.html

XSA-217 Issue Description:

> Domains controlling other domains are permitted to map pages owned by
> the domain being controlled.  If the controlling domain unmaps such a
> page without flushing the TLB, and if soon after the domain being
> controlled transfers this page to another PV domain (via
> GNTTABOP_transfer or, indirectly, XENMEM_exchange), and that third
> domain uses the page as a page table, the controlling domain will have
> write access to a live page table until the applicable TLB entry is
> flushed or evicted.  Note that the domain being controlled is
> necessarily HVM, while the controlling domain is PV.

More: https://xenbits.xen.org/xsa/advisory-217.html

XSA-218 Issue Description:

> We have discovered two bugs in the code unmapping grant references.
>
> * When a grant had been mapped twice by a backend domain, and then
> unmapped by two concurrent unmap calls, the frontend may be informed
> that the page had no further mappings when the first call completed rather
> than when the second call completed.
>
> * A race triggerable by an unprivileged guest could cause a grant
> maptrack entry for grants to be "freed" twice.  The ultimate effect of
> this would be for maptrack entries for a single domain to be re-used.

More: https://xenbits.xen.org/xsa/advisory-218.html

XSA-219 Issue Description:

> When using shadow paging, writes to guest pagetables must be trapped and
> emulated, so the shadows can be suitably adjusted as well.
>
> When emulating the write, Xen maps the guests pagetable(s) to make the final
> adjustment and leave the guest's view of its state consistent.
>
> However, when mapping the frame, Xen drops the page reference before
> performing the write.  This is a race window where the underlying frame can
> change ownership.
>
> One possible attack scenario is for the frame to change ownership and to be
> inserted into a PV guest's pagetables.  At that point, the emulated write will
> be an unaudited modification to the PV pagetables whose value is under guest
> control.

More: https://xenbits.xen.org/xsa/advisory-219.html

XSA-220 Issue Description:

> Memory Protection Extensions (MPX) and Protection Key (PKU) are features in
> newer processors, whose state is intended to be per-thread and context
> switched along with all other XSAVE state.
>
> Xen's vCPU context switch code would save and restore the state only
> if the guest had set the relevant XSTATE enable bits.  However,
> surprisingly, the use of these features is not dependent (PKU) or may
> not be dependent (MPX) on having the relevant XSTATE bits enabled.
>
> VMs which use MPX or PKU, and context switch the state manually rather
> than via XSAVE, will have the state leak between vCPUs (possibly,
> between vCPUs in different guests).  This in turn corrupts state in
> the destination vCPU, and hence may lead to weakened protections
>
> Experimentally, MPX appears not to make any interaction with BND*
> state if BNDCFGS.EN is set but XCR0.BND{CSR,REGS} are clear.  However,
> the SDM is not clear in this case; therefore MPX is included in this
> advisory as a precaution.

More: https://xenbits.xen.org/xsa/advisory-220.html

XSA-221 Issue Description:

> When polling event channels, in general arbitrary port numbers can be
> specified.  Specifically, there is no requirement that a polled event
> channel ports has ever been created.  When the code was generalised
> from an earlier implementation, introducing some intermediate
> pointers, a check should have been made that these intermediate
> pointers are non-NULL.  However, that check was omitted.

More: https://xenbits.xen.org/xsa/advisory-221.html

XSA-222 Issue Description:

> Certain actions require removing pages from a guest's P2M
> (Physical-to-Machine) mapping.  When large pages are in use to map
> guest pages in the 2nd-stage page tables, such a removal operation may
> incur a memory allocation (to replace a large mapping with individual
> smaller ones).  If this allocation fails, these errors are ignored by
> the callers, which would then continue and (for example) free the
> referenced page for reuse.  This leaves the guest with a mapping to a
> page it shouldn't have access to.
>
> The allocation involved comes from a separate pool of memory created
> when the domain is created; under normal operating conditions it never
> fails, but a malicious guest may be able to engineer situations where
> this pool is exhausted.

More: https://xenbits.xen.org/xsa/advisory-222.html

XSA-224 Issue Description:

> We have discovered a number of bugs in the code mapping and unmapping
> grant references.
>
> * If a grant is mapped with both the GNTMAP_device_map and
> GNTMAP_host_map flags, but unmapped only with host_map, the device_map
> portion remains but the page reference counts are lowered as though it
> had been removed. This bug can be leveraged cause a page's reference
> counts and type counts to fall to zero while retaining writeable
> mappings to the page.
>
> * Under some specific conditions, if a grant is mapped with both the
> GNTMAP_device_map and GNTMAP_host_map flags, the operation may not
> grab sufficient type counts.  When the grant is then unmapped, the
> type count will be erroneously reduced.  This bug can be leveraged
> cause a page's reference counts and type counts to fall to zero while
> retaining writeable mappings to the page.
>
> * When a grant reference is given to an MMIO region (as opposed to a
> normal guest page), if the grant is mapped with only the
> GNTMAP_device_map flag set, a mapping is created at host_addr anyway.
> This does *not* cause reference counts to change, but there will be no
> record of this mapping, so it will not be considered when reporting
> whether the grant is still in use.

More: https://xenbits.xen.org/xsa/advisory-224.html
2017-06-26 07:01:24 +00:00
Vincent Laporte
6b89bcbaa6 ocamlPackages.core_bench: fix on OCaml ≥ 4.03 2017-06-26 07:57:17 +02:00
Franz Pletz
1a7f330335
burp_1_3: remove 2017-06-26 03:48:41 +02:00
AndersonTorres
0e14a8621d mpv: eliminate config.mpv options
Removing all `config.mpv.*` options will improve readability. MPV has many
configurable options, and using the config approach is prone to confusion and
unnecessary code duplication. If needed, the user can `override` the relevant
variables in the function itself, so no functionality is lost.

Closes issue #26786
2017-06-26 02:51:09 +02:00
Jörg Thalheim
239920d745 Merge pull request #26831 from volth/plv8-init-2.0.3
plv8: init at 2.0.3
2017-06-25 18:20:37 +01:00
Jörg Thalheim
a93225fc6c Merge pull request #26835 from unaizalakain/init_qgo
qgo: init at unstable-2016-06-23
2017-06-25 12:05:32 +01:00
Jörg Thalheim
7a10cc84a0 rustRegistry: switch to mkDerivation
fixes #26582
2017-06-25 11:56:29 +01:00
tilpner
c610f99d8f Expose custom Rust registry versions
This allows users to specify a custom registry src,
because currently every packager would need to create
an outdated Cargo.lock just to be compatible with the
probably outdated rustRegistry in nixpkgs.

Currently there is no easy way to convince cargo to
do that, so this makes that workaround unnecessary.
2017-06-25 11:56:15 +01:00
Jörg Thalheim
46427b77f4 Merge pull request #26690 from DIzFer/telegram-update
tdesktop: 1.0.27 -> 1.1.7
2017-06-25 11:37:21 +01:00
Unai Zalakain
6e52efe9eb
qgo: init at unstable-2016-06-23 2017-06-25 12:29:18 +02:00
Jörg Thalheim
3913522a41 Merge pull request #26828 from rvolosatovs/init/mopidy-local-images
mopidy-local-images: init at 1.0.0
2017-06-25 08:39:56 +01:00
Roman Volosatovs
69eddfa090 pythonPackages.pylast: 0.5.11 -> 1.8.0 (#26825)
* maintainers: add rvolosatovs

* pythonPackages.pylast: 0.5.11 -> 1.8.0

* pythonPackages.pylast: refactor

- Update homepage
- Add rvolosatovs to maintainers
- Fix test comment

* pylast: move out of python-packages.nix
2017-06-25 08:32:05 +01:00
Jörg Thalheim
6aad18a668 pythonPackages.uritools: keep alphabetic order 2017-06-25 08:24:50 +01:00
Jörg Thalheim
6450a14880 Merge pull request #26826 from rvolosatovs/init/uritools
pythonPackages.uritools: init at 2.0.0
2017-06-25 08:22:31 +01:00
Jörg Thalheim
4b6b811b34 Merge pull request #26827 from rvolosatovs/init/spotipy
pythonPackages.spotipy: init at 2.4.4
2017-06-25 08:18:09 +01:00
Jörg Thalheim
5d5dde671e pythonPackages.spotipy: keep alphabetic ordering 2017-06-25 08:16:58 +01:00
Volth
60e19e7393 plv8: init at 2.0.3 2017-06-25 01:20:51 +00:00
Volth
649a036dcc nailgun: init at 0.9.1 2017-06-25 01:08:09 +00:00
Roman Volosatovs
4ebaed854f
mopidy-local-images: init at 1.0.0 2017-06-25 00:26:02 +02:00
Roman Volosatovs
ca69972f9a
pythonPackages.spotipy: init at 2.4.4 2017-06-24 23:56:34 +02:00
Roman Volosatovs
90f85a2de5
pythonPackages.uritools: init at 2.0.0 2017-06-24 23:54:19 +02:00
Thomas Tuegel
1593bd2423 Merge pull request #26817 from ttuegel/qt-5.9
Qt 5.9
2017-06-24 15:19:36 -05:00
Jörg Thalheim
09704d35f2 Merge pull request #26762 from dtzWill/update/creduce
creduce: 2.6.0 -> 2.7.0, now uses LLVM 4
2017-06-24 19:59:30 +01:00
Jörg Thalheim
8f9d3bfddb Merge pull request #26594 from jchildren/master
antlr4_7: init at 4.7
2017-06-24 18:55:08 +01:00
Samuel Leathers
5d7fd7e7fa mailhog: init at 1.0.0 (#26821)
* mailhog: init at 1.0.0

* formatting nitpicks
2017-06-24 17:05:34 +01:00
Hector Jusforgues
6bb5e991ab perl-packages: fix typo in comment (#26819) 2017-06-24 16:25:19 +01:00
Thomas Tuegel
22b10bac78
qt5: 5.8.0 -> 5.9.0
Qt 5.8 is immediately removed because its support window is ended.

The qtlocation module is built with `enableParallelBuilding = false` so that the
clipper library will be built before the components which link to it.

kjs now depends directly on pcre. The dependency was previously propagated from
qtbase, which now depends on pcre2.
2017-06-24 07:43:57 -05:00
Peter Hoeg
276adb96fa heimdall: 1.4.1 -> 1.4.2 2017-06-24 12:49:11 +08:00
aszlig
06271b6eba
krita: Fix build dependencies
First of all, we need a newer version of Vc, because at least version
1.1.0 is required for Krita 3.1.3.

Also, qtmultimedia and qtx11extras were missing.

Built and tested successfully on my machine.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
Cc: @abbradar
2017-06-23 22:15:05 +02:00
Daiderd Jordan
54a370ff5f
beam-packages: add erlangR20 2017-06-23 19:42:31 +02:00
Daiderd Jordan
b0b5911fc1 Merge pull request #26764 from mdaiter/erlangR20
erlangR20: init
2017-06-23 19:37:49 +02:00
Frederik Rietdijk
cb0851d5fa Merge pull request #26714 from siddharthist/flask-restplus
flask-restplus: update to 0.10
2017-06-23 19:19:11 +02:00
John Ericson
afd2bdbad2 Merge pull request #26007 from obsidiansystems/cc-wrapper-prefix
Get rid of gcc-cross-wrapper
2017-06-23 11:22:34 -04:00
Matthew Daiter
d79b4766a5 erlangR20: init 2017-06-23 12:51:58 +02:00
Alexandre Peyroux
be2b6c2e47 gramalecte: init at v0.5.17 2017-06-23 11:21:40 +02:00
Peter Jones
aa3f37ceed pythonPackages.intelhex init at 2.1 2017-06-23 10:54:48 +02:00
Frederik Rietdijk
a807c96e20 Merge pull request #26752 from rnhmjoj/graphviz
pythonPackages.pygraphviz: fix build
2017-06-23 10:40:01 +02:00
John Ericson
f55ccbb60f xbursttools: Fix eval at least so tests pass 2017-06-22 17:53:52 -04:00
John Ericson
bb7067f882 mingw-w64: Clean up, especially clarifying staging 2017-06-22 17:53:51 -04:00
John Ericson
594d264205 cross stdenv adaptor: Support --host --build --target across the board
Packages get --host and --target by default, but can explicitly request
any subset to be passed as needed. See docs for more info.

rustc: Avoid hash breakage by using the old (ignored)
dontSetConfigureCross when not cross building
2017-06-22 17:52:28 -04:00
John Ericson
9bfd03eff7 cross stdenv adaptor: Remove ccCross binutils attrs and binutils extra buildDepends
It now has the correct wrapped tools and nothing else is needed.
2017-06-22 17:52:28 -04:00
John Ericson
121e7d9335 gcc-cross-wrapper: Remove in favor of newly-cross-supporting cc-wrapper 2017-06-22 17:52:28 -04:00
Daiderd Jordan
aba574c4fa Merge pull request #26668 from gleber/fixpoint-erlang-packages
erlang: refactor: build packages per Erlang/OTP version.
2017-06-22 21:49:30 +02:00
Robert Hensing
86dc6469ba arelle: init at 2017-06-01 2017-06-22 21:37:15 +02:00
Will Dietz
1e9a9ba149 creduce: 2.6.0 -> 2.7.0, now uses LLVM 4 2017-06-22 07:47:53 -05:00
rnhmjoj
d8027bd9c4
pythonPackages.pygraphviz: fix build 2017-06-22 13:33:30 +02:00
David Izquierdo
aa2b643e4b tdesktop: 1.0.27 -> 1.1.7 2017-06-22 09:20:51 +02:00
aszlig
7c0f6f4be5
pyopenssl: 16.2.0 -> 17.0.0 and fix tests
Upstream changes:

 * Added OpenSSL.X509Store.set_time() to set a custom verification time
   when verifying certificate chains. pyca/pyopenssl#567
 * Added a collection of functions for working with OCSP stapling. None
   of these functions make it possible to validate OCSP assertions, only
   to staple them into the handshake and to retrieve the stapled
   assertion if provided. Users will need to write their own code to
   handle OCSP assertions. We specifically added:
   Context.set_ocsp_server_callback, Context.set_ocsp_client_callback,
   and Connection.request_ocsp. pyca/pyopenssl#580
 * Changed the SSL module's memory allocation policy to avoid zeroing
   memory it allocates when unnecessary. This reduces CPU usage and
   memory allocation time by an amount proportional to the size of the
   allocation. For applications that process a lot of TLS data or that
   use very lage allocations this can provide considerable performance
   improvements. pyca/pyopenssl#578
 * Automatically set SSL_CTX_set_ecdh_auto() on OpenSSL.SSL.Context.
   pyca/pyopenssl#575
 * Fix empty exceptions from OpenSSL.crypto.load_privatekey().
   pyca/pyopenssl#581

The full upstream changelog can be found at:

https://pyopenssl.readthedocs.io/en/17.0.0/changelog.html

I've also added a patch from pyca/pyopenssl#637 in order to fix the
tests, which was the main reason for the version bump because that patch
won't apply for 16.2.0.

According to the upstream changelog there should be no
backwards-incompatible changes, but I've tested building against some of
the packages depending on pyopenssl anyway. Regardless of this, the
build for pyopenssl fails right now anyway, so the worst that could
happen via this commit would be that we break something that's already
broken.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2017-06-22 01:30:10 +02:00
Franz Pletz
dd3f2e648a
linux_hardened_copperhead: init at 4.11.6.c 2017-06-21 23:49:00 +02:00
Shea Levy
a21ddfb158 pythonPackages.bcdoc: Disable tests 2017-06-20 16:08:47 -04:00